M2M Cellular Gateway
Internet traffic from GRE client site is handled.
Parameter Setup Example
For Network‐B at Branch Office
Following 2 tables list the parameter configuration for above example diagram of GRE
VPN server in Network‐B.
Use default value for those parameters that are not mentioned in these tables.
Configuration Path
GRE
Configuration Path
Tunnel Name
Interface
Operation Mode
Tunnel IP
Remote IP
Key
TTL
Default Gateway/Remote Subnet
Tunnel
Scenario Operation Procedure
In above diagram, Network‐A is in the headquarters, and the subnet of its Intranet is
10.0.76.0/24. The security gateway for Network‐A has the IP address of 10.0.76.2 for
LAN interface and 203.95.80.22 for WAN interface. It serves as a GRE server.
However, Network‐B is in the branch office and the subnet of its Intranet is
10.0.75.0/24. The security gateway for Network‐B has the IP address of 10.0.75.2 for
LAN interface and 118.18.81.33 for WAN interface. It serves as a GRE client.
The GRE client in the Security Gateway 2 establishes a GRE VPN tunnel with the GRE
server in the Security Gateway 1. So both Intranets of 10.0.75.0/24 and 10.0.76.0/24
can communicate each other.
Finally, the client hosts in the Intranet of Network‐B at branch office can access the
server or database resources in the Intranet of Network‐A at HQ in a tunnel.
However, if the "Default Gateway/Remote Subnet" parameter in the Security Gateway
2 is configured to "Default Gateway", the Internet accessing of GRE Client peer also go
through the established GRE VPN tunnel, and the Security Gateway 1 can control the
accessing as same as the HQ resource accessing.
Index skipping is used to reserve slots for new function insertion, when required.
[GRE]‐[Configuration]
■ Enable
[GRE]‐[GRE Rule Configuration]
GRE BO
WAN 1
Always on
118.18.81.33
203.95.80.22
1234
255
Default Gateway
■ Enable
231