
Step 1—Configuring the Tunnel
Cisco 7100 Series VPN Configuration Guide
3-4
Table 3-1 Physical Elements
Step 1—Configuring the Tunnel
Tunneling provides a way to encapsulate packets inside of a transport protocol. Tunneling
is implemented as a virtual interface to provide a simple interface for configuration. The
tunnel interface is not tied to specific “passenger” or “transport” protocols, but rather, it is
an architecture that is designed to provide the services necessary to implement anystandard
point-to-point encapsulation scheme. Because tunnels are point-to-point links, you must
configure a separate tunnel for each link.
Tunneling has the following three primary components:
• Passenger protocol, which is the protocol you are encapsulating (AppleTalk, Banyan
VINES, Connectionless Network Service [CLNS], DECnet, IP, or Internetwork Packet
Exchange [IPX])
• Carrier protocol, such as the generic routing encapsulation (GRE) protocol
• Transport protocol, such as IP, which is the protocol used to carry the encapsulated
protocol
Figure 3-3 illustrates IP tunneling terminology and concepts.
Headquarters Network Remote Office Network
Site
Hardware
WAN IP
Address
Ethernet IP
Address
Site
Hardware
WAN IP
Address
Ethernet IP
Address
hq-sanjose Serial interface 1/0:
172.17.2.4
255.255.255.0
Tunnel interface 0:
172.17.3.3
255.255.255.0
Fast Ethernet
Interface 0/0:
10.1.3.3
255.255.255.0
Fast Ethernet
Interface 0/1:
10.1.6.4
255.255.255.0
ro-rtp Serial interface 1/0:
172.17.2.5
255.255.255.0
Tunnel interface 1:
172.17.3.6
255.255.255.0
Fast Ethernet
Interface 0/0:
10.1.4.2
255.255.255.0
Corporate
server
– 10.1.3.6 PC A – 10.1.4.3
Web server – 10.1.6.5
Comentarios a estos manuales