M2M Cellular Gateway
GRE Tunneling is similar to IPSec Tunneling, client requesting the tunnel establishment
with the server. Both the client and the server must have a Static IP or a FQDN.
Any peer gateway can be worked as either a client or a server, even using the same set
of configuration rule.
GRE Tunneling protocol is used for establishing an GRE VPN tunnel.
Parameter Setup Example
For Network‐A at HQ
Following 2 tables list the parameter configuration for above example diagram of GRE
VPN server in Network‐A.
Use default value for those parameters that are not mentioned in these tables.
Configuration Path
GRE
Configuration Path
Tunnel Name
Interface
Operation Mode
Tunnel IP
Remote IP
Key
TTL
Default Gateway/Remote Subnet
Tunnel
Scenario Operation Procedure
In above diagram, Network‐A is in the headquarters, and the subnet of its Intranet is
10.0.76.0/24. The security gateway for Network‐A has the IP address of 10.0.76.2 for
LAN interface and 203.95.80.22 for WAN interface. It serves as a GRE server.
However, Network‐B is in the mobile office and the subnet of its Intranet is
10.0.75.0/24. The security gateway for Network‐B has the IP address of 10.0.75.2 for
LAN interface and 118.18.81.33 for WAN interface. It serves as a GRE client.
Establish a GRE VPN tunnel by starting from the GRE client site. So both Intranets of
10.0.75.0/24 and 10.0.76.0/24 can communicate each other.
Finally, the client hosts in the Intranet of Network‐B at mobile office can access the
server or database resources in the Intranet of Network‐A at HQ in a tunnel.
GRE Tunnel at Branch Office
Index skipping is used to reserve slots for new function insertion, when required.
[GRE]‐[Configuration]
■ Enable
[GRE]‐[GRE Rule Configuration]
GRE HQ
WAN 1
Always on
203.95.80.22
118.18.81.33
1234
255
Remote Subnet 10.0.75.0/24
■ Enable
229