Wow... so many acronyms in that title...
Anyway, been going over GRP IPSec VPN configs for some fun and have a few questions.
I have this config;
crypto isakmp policy 10
authentication pre-share
crypto isakmp key cisco address 192.168.128.9 no-xauth
!
crypto ipsec transform-set VPN esp-3des esp-sha-hmac
mode transport
!
crypto map VPN 10 ipsec-isakmp
set peer 192.168.128.9
set transform-set VPN
match address VPN_TRAFFIC
!
interface Tunnel0
ip address 203.1.1.1 255.255.255.0
tunnel source 10.2.2.1
tunnel destination 192.168.128.9
crypto map VPN
!
ip access-list extended VPN_TRAFFIC
permit ip 192.168.200.0 0.0.0.255 192.168.240.0 0.0.0.255
deny ip any any
I have a similar confg on the other end of the VPN and everything works fine. But my questions are;
1) - Where is the reccomended place to put the crypto map statement? Tunnel interface or physical interface?
2) - for the ACL, i seem to remember needed to permit gre in the ACL. So something like
permit gre 192.168.200.0 0.0.0.255 192.168.240.0 0.0.0.255.
But my VPN works with the ACL i have defined... So when do you need to define gre in the ACL?
Cheers.