This link would probably help ;)

http://www.isi.edu/div7/presentation_files/dynamic_routing.pdf

On 4/8/07, Chris Jones <[EMAIL PROTECTED]> wrote:
>
> I may have been mistaken. I just pulled this information from this
> document which Gregory Lebovitz from Netscreen co-authored back in 2003. On
> page 46 he talks about using GRE to create a virtual routing interfaces AKA
> tunnel interface. I have configure route-based VPNs between a Netscreen and
> FortiGate which interop just fine, which leads me to believe that they are
> using the same approach to tunnel interfaces.
>
> I have yet to get this to work between an OpenBSD box and a
> FortiGate/Netscreen. I will look into the gif option to see if this will
> work.
>
> -Chris
>
> On 4/7/07, Stephen J. Bevan <[EMAIL PROTECTED]> wrote:
> >
> > Chris Jones writes:
> > > .... Fortigates and Netscreens both use GRE interaces as
> > > "tunnel interfaces" when creating route-based VPN tunnels.
> >
> > FortiGates do not use GRE interface when creating route-based VPN
> > tunnels.
> > The route-based VPN on a FortiGate creates packets that are identical
> > to IPsec tunnel mode i.e. IP|ESP|IP.  As far as I'm aware, Netscreen do
> > the same.  Are you sure you don't have any Cisco's in your network?
> > They use GRE for IPsec unless you've got a farily recent version of
> > IOS that supports the virtual interface approach.
> >
> >
> > > Right now I have a hub-and-spoke VPN network using static routes to
> > route
> > > traffic across the VPN. Each spoke endpoint has a static destination
> > route
> > > of 10.1.0.0/16 which is sent over GRE interface. The only exception to
> > the
> > > hub-and-spoke VPN is my OpenBSD firewall which I have to create VPN
> > tunnels
> > > to every spoke network I need access to (quite painfull). On my
> > OpenBSD box
> > > I would like to be able to use a single static destination route of
> > > 10.1.0.0/16 to send this traffic over a GRE interface to get to the
> > rest of
> > > the VPN network.
> >
> > Since the FortiGate doesn't use GRE for IPsec (unless you configured
> > it for some reason) then there is no need to use GRE on OpenBSD.  Just
> > define a normal tunnel based IPsec connection (as if the other end was
> > another OpenBSD box).  If you really want an interface so that you can
> > route over it, then you'd have better luck with a gif interface.  In
> > that case if you can get the tunnel to come up you could run
> > RIP/OSPF/iBGP on the OpenBSD gif interface and on the FortiGate IPsec
> > interface and not use static routing at all.

Reply via email to