Corporate Headquarters


Generic Routing Encapsulation Inside IPSec



Download 2,05 Mb.
Pdf ko'rish
bet33/135
Sana21.04.2022
Hajmi2,05 Mb.
#569058
1   ...   29   30   31   32   33   34   35   36   ...   135
Bog'liq
vpn cg

Generic Routing Encapsulation Inside IPSec
Generic routing encapsulation (GRE) is best suited for site-to-site VPNs because it supports routing 
updates, multiprotocol, and multicast traffic. Packets are first encapsulated by GRE, and then 
encapsulated by IPSec. GRE also allows for a single set of IPSec security associations (SAs) to tunnel 
traffic from one site to another. Typically, IPSec requires a unique set of IPSec SAs to provide tunneling 
capability for each local network to each remote network. GRE encapsulates all traffic, regardless of its 
source and destination, and does not encrypt packets. Use GRE when you need support for tunneling 
packets other than IP unicast type.


2-7
Cisco IOS VPN Configuration Guide
OL-8336-01
Chapter 2 Network Design Considerations
Network Traffic Considerations
Cisco recommends using GRE tunnels with IPSec in tunnel mode to improve the flow of network traffic. 
IPSec in tunnel mode can be used as a tunneling protocol itself for unicast traffic, but not for multicast 
traffic. Multicast IPSec traffic requires a GRE tunnel, and that IPSec be used in either transport or tunnel 
mode. Cisco recommends using IPSec in tunnel mode for the best network traffic performance.
Changing these values increases the level of security; at the same time, however, it increases the 
processor overhead. The default behavior for SA rekeying is to base the new key in part on the old key 
to save processing resources. Perfect forward secrecy (PFS) generates a new key based on new seed 
material by carrying out a Diffie-Hellman (DH) exponentiation every time a new quick-mode (QM) SA 
needs new key generation. Again, this option increases the level of security but at the same time 
increases processor overhead. Cisco does not recommend changing the SA lifetimes or enabling PFS 
unless the sensitivity of the data mandates it. If you choose to change these values, make sure you include 
this variable when determining the network design. The strength of the Diffie-Hellman exponentiation 
is configurable; Groups 1 (768 bits), 2 (1024 bits), and 5 (1536 bits) are supported. Group 2 is 
recommended. 

Download 2,05 Mb.

Do'stlaringiz bilan baham:
1   ...   29   30   31   32   33   34   35   36   ...   135




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish