GRE Tunnel Overview (2024)

GRE Tunnel Overview

Updated on

Aug 21, 2024

Focus

Updated on

Aug 21, 2024

Focus

Table of Contents

End-of-Life (EoL)

A Generic Routing Encapsulation (GRE) tunnel connectstwo endpoints in a point-to-point, logical link.

A Generic Routing Encapsulation (GRE) tunnelconnects two endpoints (a firewall and another appliance) in a point-to-point,logical link. The firewall can terminate GRE tunnels; you can routeor forward packets to a GRE tunnel. GRE tunnels are simple to useand often the tunneling protocol of choice for point-to-point connectivity, especiallyto services in the cloud or to partner networks.

Create a GRE tunnel whenyou want to direct packets that are destined for an IP address totake a certain point-to-point path, for example to a cloud-basedproxy or to a partner network. The packets travel through the GREtunnel (over a transit network such as the internet) to the cloudservice while on their way to the destination address. This enablesthe cloud service to enforce its services or policies on the packets.

The following figure is an example of a GRE tunnel connectingthe firewall across the internet to a cloud service.

GRE Tunnel Overview (1)

For better performance and to avoid single points of failure,split multiple connections to the firewall among multiple GRE tunnelsrather than use a single tunnel. Each GRE tunnel needs a tunnelinterface.

When the firewall allows a packet to pass (based on a policymatch) and the packet egresses to a GRE tunnel interface, the firewalladds GRE encapsulation; it doesn’t generate a session. The firewalldoes not perform a Security policy rule lookup for the GRE-encapsulatedtraffic, so you don’t need a Security policy rule for the GRE traffic that the firewallencapsulates. However, when the firewall receives GRE traffic, itgenerates a session and applies all policies to the GRE IP headerin addition to the encapsulated traffic. The firewall treats thereceived GRE packet like any other packet. Therefore:

  • If the firewall receives the GRE packet on an interfacethat has the same zone as the tunnel interface associated with theGRE tunnel (for example, tunnel.1), the source zone is the sameas the destination zone. By default, traffic is allowed within azone (intrazone traffic), so the ingress GRE traffic is allowedby default.

  • However, if you configured your own intrazone Security policyrule to deny such traffic, you must explicitly allow GRE traffic.

  • Likewise, if the zone of the tunnel interface associated withthe GRE tunnel (for example, tunnel.1) is a different zone fromthat of the ingress interface, you must configure a Security policyrule to allow the GRE traffic.

Because the firewall encapsulates the tunneled packet in a GREpacket, the additional 24 bytes of GRE header automatically resultin a smaller Maximum Segment Size (MSS) in themaximum transmission unit (MTU). If you don’t change the IPv4 MSSAdjustment Size for the interface, the firewall reduces the MTUby 64 bytes by default (40 bytes of IP header + 24 bytes of GREheader). This means if the default MTU is 1,500 bytes, the MSS willbe 1,436 bytes (1,500 - 40 - 24 = 1,436). If you configure an MSSAdjustment Size of 300 bytes, for example, the MSS will be only 1,176bytes (1,500 - 300 - 24 = 1,176).

The firewall does not support routing a GRE or IPSec tunnel toa GRE tunnel, but you can route a GRE tunnel to an IPSec tunnel.Additionally:

  • A GRE tunnel does not support QoS.

  • The firewall does not support a single interface acting asboth a GRE tunnel endpoint and a decryption broker.

  • GRE tunneling does not support NAT between GRE tunnel endpoints.

If you need to connect to another vendor’s network, werecommend you Set Up an IPSec Tunnel, not a GREtunnel; you should use a GRE tunnel only if that is the only point-to-pointtunnel mechanism that the vendor supports. You can also enable GREover IPSec if the remote endpoint requires that (

Add GREEncapsulation

). Add GRE encapsulation in cases wherethe remote endpoint requires traffic to be encapsulated within aGRE tunnel before IPSec encrypts the traffic. For example, someimplementations require multicast traffic to be encapsulated beforeIPSec encrypts it. If this is a requirement for your environmentand the GRE tunnel and IPSec tunnel share the same IP address,

AddGRE Encapsulation

when you set up the IPSec tunnel.

If you aren’t planning to terminate a GREtunnel on the firewall, but you want the ability to inspect andcontrol traffic passing through the firewall inside a GRE tunnel,don’t create a GRE tunnel. Instead, perform Tunnel Content Inspection of GREtraffic. With tunnel content inspection, you are inspecting and enforcingpolicy on GRE traffic passing through the firewall, not creatinga point-to-point, logical link for the purpose of directing traffic.

"); adBlockNotification.append($( "Thanks for visiting https://docs.paloaltonetworks.com. To improve your experience when accessing content across our site, please add the domain to the allow list on your ad blocker application." )); let adBlockNotificationClose = $("x"); adBlockNotification.prepend(adBlockNotificationClose) $('body').append(adBlockNotification); setTimeout(function (e) { adBlockNotification.addClass('open'); }, 10); adBlockNotificationClose.on('click', function (e) { adBlockNotification.removeClass('open'); }) } }, 5000)

Recommended For You

{{ if(( raw.pantechdoctype != "techdocsAuthoredContentPage" && raw.objecttype != "Knowledge" && raw.pancommonsourcename != "TD pan.dev Docs")) { }} {{ if (raw.panbooktype) { }} {{ if (raw.panbooktype.indexOf('PANW Yellow Theme') != -1){ }}

{{ } else if (raw.panbooktype.indexOf('PANW Green Theme') != -1){ }}

{{ } else if (raw.panbooktype.indexOf('PANW Blue Theme') != -1){ }}

{{ } else { }}

{{ } }} {{ } else { }}

{{ } }} {{ } else { }} {{ if (raw.pantechdoctype == "pdf"){ }}

{{ } else if (raw.objecttype == "Knowledge") { }}

{{ } else if (raw.pancommonsourcename == "TD pan.dev Docs") { }}

{{ } else if (raw.pancommonsourcename == "LIVEcommunity Public") { }}

{{ } else { }}

{{ } }} {{ } }}

{{ if (raw.pancommonsourcename == "LIVEcommunity Public") { }}

{{ if (raw.pantechdoctype == "pdf"){ }}

{{ } }}

{{ } else { }}

{{ if (raw.pantechdoctype == "pdf"){ }}

{{ } }}

{{ } }}

{{ if (raw.pancommonsourcename != "TD pan.dev Docs"){ }} {{ if (raw.pandevdocsosversion){ }} {{ } else { }} {{ if ((_.size(raw.panosversion)>0) && !(_.isNull(raw.panconversationid )) && (!(_.isEmpty(raw.panconversationid ))) && !(_.isNull(raw.otherversions ))) { }} (See other versions) {{ } }} {{ } }} {{ } }}

{{ } }}{{ if (raw.pantechdoctype == "bookDetailPage"){ }}

{{ } }}{{ if (raw.pantechdoctype == "bookLandingPage"){ }}

{{ } }}{{ if (raw.pantechdoctype == "productLanding"){ }}

{{ } }}{{ if (raw.pantechdoctype == "techdocsAuthoredContentPage"){ }}

{{ } }}{{ if (raw.pantechdoctype == "pdf"){ }}

{{ } }}

GRE Tunnel Overview (2)

© 2024 Palo Alto Networks, Inc. All rights reserved.

GRE Tunnel Overview (2024)
Top Articles
What Is MOHELA? | Bankrate
Spending While You’re Abroad – All You Need To Know
Public Opinion Obituaries Chambersburg Pa
55Th And Kedzie Elite Staffing
Sound Of Freedom Showtimes Near Governor's Crossing Stadium 14
Visitor Information | Medical Center
Pga Scores Cbs
Top Scorers Transfermarkt
Rek Funerals
Dee Dee Blanchard Crime Scene Photos
Achivr Visb Verizon
Lichtsignale | Spur H0 | Sortiment | Viessmann Modelltechnik GmbH
4156303136
Vichatter Gifs
Ivegore Machete Mutolation
Funny Marco Birth Chart
Otterbrook Goldens
Jackson Stevens Global
What is Rumba and How to Dance the Rumba Basic — Duet Dance Studio Chicago | Ballroom Dance in Chicago
Troy Bilt Mower Carburetor Diagram
Red Devil 9664D Snowblower Manual
Hennens Chattanooga Dress Code
Craigslist Prescott Az Free Stuff
Att.com/Myatt.
Mail.zsthost Change Password
Allybearloves
15 Primewire Alternatives for Viewing Free Streams (2024)
Amerisourcebergen Thoughtspot 2023
Ultra Ball Pixelmon
Lilpeachbutt69 Stephanie Chavez
Happy Shuttle Cancun Review
Darknet Opsec Bible 2022
Elijah Streams Videos
Otis Inmate Locator
NIST Special Publication (SP) 800-37 Rev. 2 (Withdrawn), Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy
Gerber Federal Credit
Peter Vigilante Biography, Net Worth, Age, Height, Family, Girlfriend
Ishow Speed Dick Leak
Philadelphia Inquirer Obituaries This Week
Fetus Munchers 1 & 2
Invalleerkracht [Gratis] voorbeelden van sollicitatiebrieven & expert tips
Rhode Island High School Sports News & Headlines| Providence Journal
Andrew Lee Torres
Author's Purpose And Viewpoint In The Dark Game Part 3
Seven Rotten Tomatoes
Mathews Vertix Mod Chart
Catchvideo Chrome Extension
Gli italiani buttano sempre più cibo, quasi 7 etti a settimana (a testa)
How to Install JDownloader 2 on Your Synology NAS
Go Nutrients Intestinal Edge Reviews
Puss In Boots: The Last Wish Showtimes Near Valdosta Cinemas
Latest Posts
Article information

Author: Roderick King

Last Updated:

Views: 5892

Rating: 4 / 5 (51 voted)

Reviews: 82% of readers found this page helpful

Author information

Name: Roderick King

Birthday: 1997-10-09

Address: 3782 Madge Knoll, East Dudley, MA 63913

Phone: +2521695290067

Job: Customer Sales Coordinator

Hobby: Gunsmithing, Embroidery, Parkour, Kitesurfing, Rock climbing, Sand art, Beekeeping

Introduction: My name is Roderick King, I am a cute, splendid, excited, perfect, gentle, funny, vivacious person who loves writing and wants to share my knowledge and understanding with you.