GRE Tunnel Overview (2024)

GRE Tunnel Overview

Updated on

Jul 1, 2024

Focus

Updated on

Jul 1, 2024

Focus

Table of Contents

A Generic Routing Encapsulation (GRE) tunnel connectstwo endpoints in a point-to-point, logical link.

A Generic Routing Encapsulation (GRE)tunnel connects two endpoints (a firewall and another appliance)in a point-to-point, logical link. The firewall can terminate GREtunnels; you can route or forward packets to a GRE tunnel. GRE tunnelsare simple to use and often the tunneling protocol of choice forpoint-to-point connectivity, especially to services in the cloudor to partner networks.

Create a GRE tunnel whenyou want to direct packets that are destined for an IP address totake a certain point-to-point path, for example to a cloud-basedproxy or to a partner network. The packets travel through the GREtunnel (over a transit network such as the internet) to the cloudservice while on their way to the destination address. This enablesthe cloud service to enforce its services or policies on the packets.

The following figure is an example of a GRE tunnel connectingthe firewall across the internet to a cloud service.

GRE Tunnel Overview (1)

For better performance and to avoid single points of failure,split multiple connections to the firewall among multiple GRE tunnelsrather than use a single tunnel. Each GRE tunnel needs a tunnelinterface.

When the firewall allows a packet to pass (based on a policymatch) and the packet egresses to a GRE tunnel interface, the firewalladds GRE encapsulation; it doesn’t generate a session. The firewalldoes not perform a Security policy rule lookup for the GRE-encapsulatedtraffic, so you don’t need a Security policy rule for the GRE traffic thatthe firewall encapsulates. However, when the firewall receives GREtraffic, it generates a session and applies all policies to theGRE IP header in addition to the encapsulated traffic. The firewalltreats the received GRE packet like any other packet. Therefore:

  • If the firewall receives the GRE packet on an interfacethat has the same zone as the tunnel interface associated with theGRE tunnel (for example, tunnel.1), the source zone is the sameas the destination zone. By default, traffic is allowed within azone (intrazone traffic), so the ingress GRE traffic is allowedby default.

  • However, if you configured your own intrazone Security policyrule to deny such traffic, you must explicitly allow GRE traffic.

  • Likewise, if the zone of the tunnel interface associated withthe GRE tunnel (for example, tunnel.1) is a different zone fromthat of the ingress interface, you must configure a Security policyrule to allow the GRE traffic.

Because the firewall encapsulates the tunneled packet in a GREpacket, the additional 24 bytes of GRE header automatically resultin a smaller Maximum Segment Size (MSS) in themaximum transmission unit (MTU). If you don’t change the IPv4 MSSAdjustment Size for the interface, the firewall reduces the MTU by64 bytes by default (40 bytes of IP header + 24 bytes of GRE header).This means if the default MTU is 1,500 bytes, the MSS will be 1,436bytes (1,500 - 40 - 24 = 1,436). If you configure an MSS AdjustmentSize of 300 bytes, for example, the MSS will be only 1,176 bytes(1,500 - 300 - 24 = 1,176).

The firewall does not support routing a GRE or IPSec tunnel toa GRE tunnel, but you can route a GRE tunnel to an IPSec tunnel.Additionally:

If you need to connect to another vendor’s network, werecommend you set up an IPSec tunnel,not a GRE tunnel; you should use a GRE tunnel only if that is theonly point-to-point tunnel mechanism that the vendor supports. Youcan also enable GRE over IPSec if the remote endpoint requires that (

AddGRE Encapsulation

). Add GRE encapsulation in cases wherethe remote endpoint requires traffic to be encapsulated within aGRE tunnel before IPSec encrypts the traffic. For example, someimplementations require multicast traffic to be encapsulated beforeIPSec encrypts it. If this is a requirement for your environmentand the GRE tunnel and IPSec tunnel share the same IP address,

AddGRE Encapsulation

when you set up the IPSec tunnel.

If you aren’t planning to terminate a GREtunnel on the firewall, but you want the ability to inspect andcontrol traffic passing through the firewall inside a GRE tunnel,don’t create a GRE tunnel. Instead, perform Tunnel Content Inspection of GREtraffic. With tunnel content inspection, you are inspecting and enforcingpolicy on GRE traffic passing through the firewall, not creatinga point-to-point, logical link for the purpose of directing traffic.

"); adBlockNotification.append($( "Thanks for visiting https://docs.paloaltonetworks.com. To improve your experience when accessing content across our site, please add the domain to the allow list on your ad blocker application." )); let adBlockNotificationClose = $("x"); adBlockNotification.prepend(adBlockNotificationClose) $('body').append(adBlockNotification); setTimeout(function (e) { adBlockNotification.addClass('open'); }, 10); adBlockNotificationClose.on('click', function (e) { adBlockNotification.removeClass('open'); }) } }, 5000)

Recommended For You

{{ if(( raw.pantechdoctype != "techdocsAuthoredContentPage" && raw.objecttype != "Knowledge" && raw.pancommonsourcename != "TD pan.dev Docs")) { }} {{ if (raw.panbooktype) { }} {{ if (raw.panbooktype.indexOf('PANW Yellow Theme') != -1){ }}

{{ } else if (raw.panbooktype.indexOf('PANW Green Theme') != -1){ }}

{{ } else if (raw.panbooktype.indexOf('PANW Blue Theme') != -1){ }}

{{ } else { }}

{{ } }} {{ } else { }}

{{ } }} {{ } else { }} {{ if (raw.pantechdoctype == "pdf"){ }}

{{ } else if (raw.objecttype == "Knowledge") { }}

{{ } else if (raw.pancommonsourcename == "TD pan.dev Docs") { }}

{{ } else if (raw.pancommonsourcename == "LIVEcommunity Public") { }}

{{ } else { }}

{{ } }} {{ } }}

{{ if (raw.pancommonsourcename == "LIVEcommunity Public") { }}

{{ if (raw.pantechdoctype == "pdf"){ }}

{{ } }}

{{ } else { }}

{{ if (raw.pantechdoctype == "pdf"){ }}

{{ } }}

{{ } }}

{{ if (raw.pancommonsourcename != "TD pan.dev Docs"){ }} {{ if (raw.pandevdocsosversion){ }} {{ } else { }} {{ if ((_.size(raw.panosversion)>0) && !(_.isNull(raw.panconversationid )) && (!(_.isEmpty(raw.panconversationid ))) && !(_.isNull(raw.otherversions ))) { }} (See other versions) {{ } }} {{ } }} {{ } }}

{{ } }}{{ if (raw.pantechdoctype == "bookDetailPage"){ }}

{{ } }}{{ if (raw.pantechdoctype == "bookLandingPage"){ }}

{{ } }}{{ if (raw.pantechdoctype == "productLanding"){ }}

{{ } }}{{ if (raw.pantechdoctype == "techdocsAuthoredContentPage"){ }}

{{ } }}{{ if (raw.pantechdoctype == "pdf"){ }}

{{ } }}

GRE Tunnel Overview (2)

© 2024 Palo Alto Networks, Inc. All rights reserved.

GRE Tunnel Overview (2024)

FAQs

What is a disadvantage of a GRE tunnel? ›

The chief disadvantage of GRE is that it is not considered a secure protocol because it doesn't use encryption like the IP Security (IPsec) Encapsulating Security Payload, defined by RFC 2406. As a result, GRE tunnels can be used to launch DDoS attacks.

Is GRE tunnel layer 2 or layer 3? ›

GRE is an IP encapsulation protocol that is used to transport packets over a network. tunnels are in IPv4 Layer-3 mode. IPv6 encapsulated in IPv4 and IPv4 encapsulated in IPv6 are not supported.

What is the difference between VPN tunnel and GRE tunnel? ›

Multicast traffic forwarding – GRE tunnels can be used to forward multicast traffic, whereas a VPN cannot. Because of this, multicast traffic such as advertisem*nts sent by routing protocols can be easily transferred between remote sites when using a GRE tunnel.

How secure is a GRE tunnel? ›

GRE tunnels do not provide any authentication, confidentiality, or integrity protection for the encapsulated traffic. This means that anyone who can intercept the GRE packets can see the original network layer protocol and its payload, and potentially modify or spoof it.

What is the most common cause of tunnel failure? ›

In tunnels excavated in jointed rock masses at relatively shallow depth, the most common types of failure are those involving wedges falling from the roof or sliding out of the sidewalls of the openings.

What are some of the benefits of leveraging GRE tunnels? ›

Top 5 Benefits of Using GRE Tunnels in Enterprise Networks
  • Enhanced Security and Isolation.
  • Protocol Agnosticism.
  • Cost-Effective Network Expansion. Increased Compatibility with Existing Infrastructure. Improved Performance and Reliability. ...
  • Simplifying Complex Network Designs.
  • Support for Multicast Traffic.
Aug 31, 2024

What is the recommended MTU size for GRE tunnel? ›

If you experience issues performing the tasks above, Zscaler recommends that you use a tunnel MTU of 1400.

What is the difference between VTI tunnel and GRE tunnel? ›

VTI is tunnel where ESP encapsulates your data payload directly without need for another transport header; VTI is similar to GRE encap but overhead is smaller 24 bytes then GRE. VTI supports only IPv4 and no other no-IP payloads are supported.

What is the difference between IP IP tunnel and GRE tunnel? ›

Basically it's that IPIP can handle only IPv4 unicast, no multicast traffic and only one tunnel for unique tunnel endpoints pair. GRE is more generic, with up to 64k tunnels between two unique endpoints plus multicast traffic which is important when tunneling routing protocols.

Why use GRE instead of IPsec? ›

IT teams should use IPsec when they require secure IP tunneling. They should use GRE when they require tunneling without privacy and when they need to tunnel multiple protocols or multicast. Teams can combine GRE on top of IPsec when they need GRE's multiprotocol functionality combined with IPsec's data protection.

Why do we need a GRE tunnel? ›

Benefits of Using GRE Tunnel

It provides the following benefits: Supports internet traffic. Supports failover if the primary ZIA Public Service Edge becomes unavailable. Requires minimal overhead.

What is the bandwidth limit for the GRE tunnel? ›

Supported Bandwidth for GRE Tunnels

Zscaler supports a maximum bandwidth of 1 Gbps for each GRE tunnel if its internal IP addresses aren't behind NAT.

Does GRE use TCP or UDP? ›

The network connection is done via the GRE protocol (IP protocol number 47. For more information, refer to Wikipedia: List of IP protocol numbers. Since GRE is an IP protocol, it is not based on either TCP or UDP and has no concept of ports. It is an IP protocol by itself.

Under what conditions a GRE tunnel is used? ›

Connecting Disparate Networks

Organizations often need to connect networks running different protocols like IP, IPX, AppleTalk, etc. GRE tunnels allow encapsulating and routing these different protocols over a common IP network, providing connectivity between disparate network types.

How do I check my GRE tunnel status? ›

You can go to Analytics > Tunnel Insights to see data, as well as monitor the health and status of your configured GRE tunnels.

What are the disadvantages of tunnels? ›

  • The initial cost of tunnel construction is more.
  • Tunnel construction requires skilled labour and technical supervision of high order.
  • The construction duration of tunnels is more than bridges or open cuts.
  • The construction of tunnels requires advanced and specialized equipment.
May 16, 2018

What are the disadvantages of tunnel mode? ›

The major disadvantages of tunnel mode are additional overhead from encapsulation, an inability to defend against attacks on weak integrity protocols, and that transport mode may be more compatible with some firewalls.

What are the disadvantages of the GRE? ›

One of the main problems with the GRE is its ability to predict graduate school performance, particularly the first-year grades. Several critics have cited that its predictive validity is actually weak. Also, the GRE fails to cover areas like a student's intellect, creativity, and perseverance to finish a program.

Top Articles
What is the difference between active and passive traders?
Free Investment Advice That Costs You A Fortune
Drury Inn & Suites Bowling Green
Stretchmark Camouflage Highland Park
Greedfall Console Commands
T Mobile Rival Crossword Clue
Santa Clara College Confidential
Craigslist Pet Phoenix
Words From Cactusi
Clafi Arab
Mivf Mdcalc
Regular Clear vs Low Iron Glass for Shower Doors
What Is A Good Estimate For 380 Of 60
Johnston v. State, 2023 MT 20
Lax Arrivals Volaris
24 Hour Walmart Detroit Mi
Music Go Round Music Store
Brazos Valley Busted Newspaper
Bjerrum difference plots - Big Chemical Encyclopedia
Boston Dynamics’ new humanoid moves like no robot you’ve ever seen
Wkow Weather Radar
Tuw Academic Calendar
Top 20 scariest Roblox games
Play It Again Sports Forsyth Photos
Mastering Serpentine Belt Replacement: A Step-by-Step Guide | The Motor Guy
Publix Coral Way And 147
Mark Ronchetti Daughters
+18886727547
UPS Drop Off Location Finder
Plato's Closet Mansfield Ohio
Garrison Blacksmith's Bench
Mp4Mania.net1
Heavenly Delusion Gif
The Complete Guide To The Infamous "imskirby Incident"
Elgin Il Building Department
Jewish Federation Of Greater Rochester
The Thing About ‘Dateline’
The All-New MyUMobile App - Support | U Mobile
Vons Credit Union Routing Number
Achieving and Maintaining 10% Body Fat
2132815089
Deepwoken: How To Unlock All Fighting Styles Guide - Item Level Gaming
Sour OG is a chill recreational strain -- just have healthy snacks nearby (cannabis review)
My Eschedule Greatpeople Me
Page 5747 – Christianity Today
Automatic Vehicle Accident Detection and Messageing System – IJERT
Hy-Vee, Inc. hiring Market Grille Express Assistant Department Manager in New Hope, MN | LinkedIn
How Did Natalie Earnheart Lose Weight
Adams County 911 Live Incident
What Responsibilities Are Listed In Duties 2 3 And 4
Latest Posts
Article information

Author: Tuan Roob DDS

Last Updated:

Views: 6568

Rating: 4.1 / 5 (42 voted)

Reviews: 81% of readers found this page helpful

Author information

Name: Tuan Roob DDS

Birthday: 1999-11-20

Address: Suite 592 642 Pfannerstill Island, South Keila, LA 74970-3076

Phone: +9617721773649

Job: Marketing Producer

Hobby: Skydiving, Flag Football, Knitting, Running, Lego building, Hunting, Juggling

Introduction: My name is Tuan Roob DDS, I am a friendly, good, energetic, faithful, fantastic, gentle, enchanting person who loves writing and wants to share my knowledge and understanding with you.