IPSEC
IPSEC encryption related links. gre
http://www.ccierants.com/2009/09/ipsec-with-vti-best-damn-way-to-do-it.html
Step by step gre to ipsec tunnel
Compare GRE vs VTI ipsec http://henrydu.com/blog/networks/vpn/ipsec-over-gre-and-ipsec-vti-368.html
Sample Cisco Config
!!# Phase One - isakmp #!!
crypto isakmp policy 10 hash sha authentication pre-share crypto isakmp key vpnkey address 10.0.0.2
!!# Phase Two - ipsec #!!
! crypto ipsec security-association lifetime seconds 28800 crypto ipsec transform-set vpnset esp-aes esp-sha-hmac exit crypto map vpnset 10 ipsec-isakmp set peer 10.0.0.2 set transform-set vpnset ! set pfs group2 match address 100
!!#Apply to outside int #!!
int ?? !ip address 10.0.0.1 crypto map vpnset access-list 100 permit ip 10.10.10.0 0.0.0.255 10.20.0.0 0.0.0.255 ip route 0.0.0.0 0.0.0.0 192.168.16.1
Verify IPSec VPN connections
- The following two commands can be used to verify VPN connections:
show crypto ipsec sa show crypto isakmp sa debug crypto isakmp debug crypto ipsec
Example VTI
- Tunnel interface protected by ipsec - new since 2010.
- See. No crypto map
Link Linux strongswan VTI http://end.re/2015/01/06/vti-tunnel-interface-with-strongswan/
! crypto isakmp policy 1 encr 3des authentication pre-share group 2 crypto isakmp key ******** address 0.0.0.0 0.0.0.0 crypto isakmp keepalive 10 ! crypto ipsec transform-set TSET esp-3des esp-sha-hmac ! crypto ipsec profile VTI set transform-set TSET ! interface Tunnel0 ip address 192.168.10.2 255.255.255.0 tunnel source 10.0.149.220 tunnel destination 10.0.149.221 tunnel mode ipsec ipv4 tunnel protection ipsec profile VTI !
...