Table Of Contents
Generic Routing Encapsulation on the Cisco CMTS
Prerequisites for Generic Routing Encapsulation
Important Notes about Configuring GRE
Restrictions for Generic Routing Encapsulation
Information About Generic Routing Encapsulation
Generic Routing Encapsulation Overview
How to Configure Generic Routing Encapsulation
Generic Routing Encapsulation on the Cisco CMTS
Revised: January 24, 2007, OL-9503-01This document describes the Generic Routing Encapsulation (GRE) feature. This feature is a tunneling protocol that enables the encapsulation of a wide variety of protocol packet types inside IP tunnels, creating a virtual point-to-point link to Cisco routers at remote points over an IP internetwork.
History for the Generic Routing Encapsulation Feature
Finding Support Information for Platforms and Cisco IOS Software Images
Use Cisco Feature Navigator to find information about platform support and Cisco IOS software image support. Access Cisco Feature Navigator at http://www.cisco.com/go/fn. You must have an account on Cisco.com. If you do not have an account or have forgotten your username or password, click Cancel at the login dialog box and follow the instructions that appear.
Contents
•
Prerequisites for Generic Routing Encapsulation
•
Restrictions for Generic Routing Encapsulation
•
Information About Generic Routing Encapsulation
•
How to Configure Generic Routing Encapsulation
Prerequisites for Generic Routing Encapsulation
•
The Cisco uBR7246VXR or Cisco uBR10012 router must be running Cisco IOS 12.3(17a)BC or later release.
•
The Cisco uBR10012 router requires the Performance Routing Engine 2 (PRE2) module for use with Generic Routing Encapsulation.
•
To use GRE, you must identify the inside interfaces on your devices and specify these in the Router MC Settings configuration area. Inside interfaces are the physical interfaces on the device that connect the device to its internal subnets and networks.
•
In Router MC, you must select a routing protocol whenever you enable GRE. The available routing protocols in Router MC are EIGRP and OSPF:
–
Enhanced Interior Gateway Routing Protocol (EIGRP) allows the exchange of routing information within an autonomous system and addresses some of the more difficult issues associated with routing in large, heterogeneous networks. Compared to other protocols, EIGRP provides superior convergence properties and operating efficiency. EIGRP combines the advantages of several different protocols.
–
Open Shortest Path First (OSPF) is a link-state, hierarchical protocol that features least-cost routing, multipath routing, and load balancing.
•
In Router MC, you must specify an Interior Gateway Protocol (IGP) process number. This number identifies the IGP. When GRE is implemented, this IGP will be the secured IGP. See How Does Router MC Implement GRE? for more information about IGPs. For secure communication, the inside interfaces on peering devices in your VPN must belong to the same IGP. The IGP process number must be within the range specified in the configuration support settings under the Admin tab. If you have an existing IGP on the device that is within this range, but is different from the IGP process number specified in your GRE settings, Router MC will remove the existing IGP. If the existing IGP process number matches the one specified in your GRE settings, any networks included in the existing IGP process that do not match the specified inside interfaces, will be removed.
•
If the inside interfaces on your devices are configured to use an IGP other than the IGP specified in your GRE settings (meaning that the interfaces belong to an unsecured IGP):
–
For spokes: Manually remove the inside interfaces from the unsecured IGP by means of the device CLI before configuring GRE with Router MC.
–
For hubs: If the hub inside interface is used as a network access point for Router MC, then on deployment, the interface will be published in both secured and unsecured IGPs. To ensure that the spoke peers use only the secured IGP, manually add the auto-summary command for the unsecured IGP or remove the unsecured IGP for that inside interface.
•
In Router MC, you must provide a subnet that is unique and not globally-routable for loopback. This subnet must only be used to support the implementation of loopback for GRE. The loopback interfaces are created, maintained, and used only by Router MC. You should not use them for any other purpose.
•
If you are using static routes instead of unsecured IGP, make sure you configure static routes on the spokes through to the hub inside interfaces
Important Notes about Configuring GRE
•
You can define GRE on the Global object or on any device group (with the exception of a High Availability (HA) group).
•
You can define different GRE policies for different groups of devices within your hierarchy. If you define GRE on Global, the GRE settings will be inherited by all device groups and devices in the hierarchy. You can override the Global GRE policy by defining a different GRE policy on one or more device groups.
•
Peering devices must be configured with the same failover and routing policy. Therefore, if you define a specific GRE policy on a device group, both the hub and the spoke must be descendants of that device group and there must be no overriding policy on a lower level that changes the GRE policy on either the peering hub or spoke.
•
Switching from IKE keepalive to GRE—If you previously used IKE keepalive for failover, and you later switch to GRE, everything outside your attached networks will no longer be a part of your VPN. Attached networks include only those networks that are directly connected to the router's inside interfaces.
Restrictions for Generic Routing Encapsulation
•
To run GRE configuration, you need to have IP connectivity between the cable modems.
•
The Cisco uBR10012 router requires the Performance Routing Engine 2 (PRE2) modules for use with Generic Routing Encapsulation. The GRE feature is not supported for PRE1 modules in the Cisco uBR10012 router.
Information About Generic Routing Encapsulation
To configure the Generic Routing Encapsulation feature, you should understand the following concepts:
•
Generic Routing Encapsulation Overview
Tunneling
Tunneling (also known as port forwarding) is a technique that enables remote access users to connect to a variety of network resources through a public data network. The tunnels established through the public network are usually point-to-point, though a multipoint tunnel is possible, and is use to link a remote user to a resource at the far end of the tunnel. Major tunneling protocols encapsulate Layer 2 traffic from the remote user and send it across the public network to the far end of the tunnel, where it is de-encapsulated and sent to its destination.
Tunneling requires three different protocols:
•
Passenger protocol—The original data (IPX, NetBeui, IP) being carried.
•
Encapsulating protocol—The protocol (GRE, IPSec, L2F, PPTP, and L2TP) that is wrapped around the original data.
•
Carrier protocol—The protocol used by the network over which the information is traveling.
The original packet (Passenger protocol) is encapsulated inside the encapsulating protocol, which is then put inside the carrier protocol's header (usually IP) for transmission over the public network. Note that the encapsulating protocol also quite often carries out the encryption of the data. As you can see, protocols such as IPX and NetBeui, which would normally not be transferred across the Internet, can safely and securely be transmitted.
For site-to-site virtual private networks (VPNs), the encapsulating protocol is usually IPSec or Generic Routing Encapsulation (GRE). GRE includes information on what type of packet you are encapsulating and information about the connection between the client and server.
For remote-access VPNs, tunneling normally takes place using Point-to-Point Protocol (PPP). Part of the TCP/IP stack, PPP is the carrier for other IP protocols when communicating over the network between the host computer and a remote system. PPP tunneling will use one of PPTP, L2TP or Cisco's Layer 2 Forwarding (L2F).
The most significant benefit of Tunneling is that it allows for the creation of VPNs over public data networks to provide cost savings for both end users, who do not have to create dedicated networks, and for Service Providers, who can leverage their network investments across many VPN customers.
Generic Routing Encapsulation Overview
GRE Tunneling is a protocol for transporting an arbitrary network layer protocol (the payload) over another arbitrary network layer protocol (the delivery). This is achieved by encapsulating the payload packet in a delivery packet, along with a GRE header. By having both protocols encapsulate IP packets within an additional outer IP header, this enables the transport of IP multicast IP packets across a unicast-only backbone.
The following are some of the advantages of GRE tunnels:
•
GRE tunnels provide multi-protocol local networks over a single-protocol backbone.
•
GRE tunnels provide workarounds for networks that contain protocols with limited hop counts.
•
GRE tunnels connect discontinuous sub-networks.
•
GRE tunnels allow VPNs across WANs.
How to Configure Generic Routing Encapsulation
Use the following procedures to configure the GRE feature.
Before configuring the GRE feature:
•
Please read the following topics:
–
Prerequisites for Generic Routing Encapsulation
–
Important Notes about Configuring GRE
•
If workflow mode is enabled, make sure that you are working within the context of an open activity.
Step 1
Select Configuration > Settings
Step 2
Select General VPN> Failover and Routing in the TOC. The Failover and Routing page appears. Table 1 describes the elements in the Failover and Routing page.
Step 3
Select GRE in the Policy Type list box.The page refreshes to display only the fields that are relevant for GRE configuration.
Step 4
Enter information in the displayed GRE fields, as required. Click Advanced to display additional GRE fields (optional). See Table 1 for a description of each field.
Step 5
Click Apply.
Additional References
The following sections provide references related to the GRE feature.
•
MIBs
•
RFCs
Related Documents
Related Topic Document TitleCMTS Command Reference
Cisco Broadband Cable Command Reference Guide, at the following URL:
http://www.cisco.com/en/US/docs/ios/cable/command/reference/cbl_book.htmlCisco IOS Release 12.2 Command Reference
Cisco IOS Release 12.2 Configuration Guides and Command References, at the following URL:
http://www.cisco.com/en/US/products/sw/iosswrel/ps1835/products_installation_and_configuration_guides_list.htmlConfiguring GRE Tunnel over Cable
Configuring GRE Tunnel over Cable, at the following URL:
http://www.cisco.com/en/US/tech/tk86/tk89/technologies_configuration_example09186a008011520d.shtm
Standards
Standard TitleData-over-Cable Service Interface Specifications Radio Frequency Interface Specification, version 1.1 (http://www.cablelabs.com/cablemodem/)
MIBs
RFCs
Technical Assistance
Command Reference
This feature uses no new or modified commands.
Glossary
EIGRP—Enhanced Interior Gateway Routing Protocol. An interior gateway protocol suited for many different topologies and media.
GRE—Generic Routing Encapsulation. A protocol for transporting an arbitrary network layer protocol (the payload) over another arbitrary network layer protocol (the delivery)
HA—High Availability.
IGP—Interior Gateway Protocol. A protocol for exchanging routing information between gateways in an autonomous network.
L2F—Layer 2 Forwarding. A Layer 2 tunneling protocol that establishes a secure tunnel across a public infrastructure (such as the Internet) that connects an ISP POP to a enterprise home gateway. This tunnel creates a virtual point-to-point connection between the user and the enterprise customer's network. L2F is the most established and stable Layer 2 tunneling protocol.
mGRE—multipoint GRE. A mGRE allows a single GRE interface to support multiple IPSec tunnels and simplifies the size and complexity of the configuration.
NBMA—Non Broadcast Multiple Access. A multiaccess network that either does not support broadcasting (such as X.25) or in which broadcasting is not feasible (for example, an SMDS broadcast group or an extended Ethernet that is too large).
NHRP—Next Hop Resolution Protocol. A protocol employed by routers on a nonbroadcast multiaccess (NBMA) network to dynamically locate MAC addresses of various hosts and routers. Systems using NHRP are able to communicate directly without requiring an intermediate hop, increasing performance in ATM, Frame Relay, X.25, and SMDS systems.
OSPF—Open Shortest Path First. A link-state, hierarchical IGP routing algorithm that includes features such as load balancing, least-cost routing, and multipath routing.
PPP—Point-to-Point Protocol. The successor to SLIP, PPP provides router-to-router and host-to-network connections over both synchronous and asynchronous circuits.
RP—rendezvous point. A single common root placed at a chosen point of a shared distribution tree. When PIM is configured in sparse mode, you must choose one or more routers to operate as an RP.
VPNs—virtual private networks. Enables IP traffic to use tunneling to travel securely over a public TCP/IP network.
![]()
Note
See Internetworking Terms and Acronyms for terms not included in this glossary.
![]()
© 2006 Cisco Systems, Inc. All rights reserved.