It is so weird how perfectly timed these videos are coming out to my studying. When I was looking into learning VRF's you released an excellent video series on VRF's. Now when I want to brush up on VPN's you release this video at the perfect time. Keep up the awesome work! Hopefully the next series will be MPLS.
@NetworkDirection6 жыл бұрын
That is uncanny! I have been thinking about basic MPLS as a series. Won’t be next, but hopefully soon
@GamjaField6 жыл бұрын
LOL same 😂
@NetworkDirection6 жыл бұрын
Nice!
@namratatiwari15884 жыл бұрын
Best video on GRE ! Surfed over 5-6 videos before landing to this.
@NetworkDirection6 жыл бұрын
Read more here: networkdirection.net/GRE+Tunnels Try the lab here: networkdirection.net/labsandquizzes/labs/lab-gre-tunnels/
@teamstandyteamstandy98304 жыл бұрын
Very simple, high level overview of what a GRE tunnel is/does. Well done. Thank you!
@NetworkDirection4 жыл бұрын
You're welcome!
@DileepKumarMB Жыл бұрын
Overlay network using GRE Tunnel- nicely explained, Thanks
@varunkashyap56444 жыл бұрын
thanks buddy for creating this series. i read a lot but could not get through before , but today atlast i got. keep making such videos
@NetworkDirection4 жыл бұрын
It's so good to hear that these videos are helping you
@Alex-gf4iu2 ай бұрын
What a great video. Really useful the commands were at the bottom and you explained the difference between source and destination
@markusscott66964 жыл бұрын
It is a nice explanation of packet encapsulation (starts from 6 min), but i dont understand where is the role of a tunnel - 192.168.1.0 network???
@Jderama1006 жыл бұрын
Thank you, very clear and easy to understand. Please continue to make videos like this - highly appreciate it.
@NetworkDirection6 жыл бұрын
You're welcome! I'm currently working on extending this with DMVPN
@TheLithGH5 жыл бұрын
Thanks for creating and sharing with us!! Perfect explanation for us that are new to GRE!!! Cheers!
@slamtoo114 жыл бұрын
Just saw this video after I had a question in CCNA about GRE. This is amazing. Thank you for putting this together.
@Neon-nv4oy5 ай бұрын
May I ask what you're doing in life now with a bit over 4 years in the field ? (if you stuck to the field ofc) I just wanna get an idea
@amitkala63822 жыл бұрын
The way you demonstrated is simply amazing.... Would you mind to share low level stuff on ikev1 &2..... Thanks again.
@NetworkDirection2 жыл бұрын
Thank you! I might revisit IKE. I'll add it to my list, thanks again
@PR-cn5bb6 жыл бұрын
Finally some quality tutorials, great work!
@NetworkDirection6 жыл бұрын
I appreciate the feedback Pawel, thanks!
@noelgriffiths75614 жыл бұрын
I am currently learning CCNP Enterprise Encor and found this video series on 'GRE' along with the 'VXLan' and 'VRF' videos very informative with clear explanations. Thank you for posting these videos, will you be posting any others that will be helpful with the CCNP Enterprise course?
@DillyDogSays2 жыл бұрын
Does GRE tunnels work with Virtual Networks also? So two virtual networks could communicate on a SD-WAN via GRE Tunneling?
@NetworkDirection2 жыл бұрын
SD-WAN uses a lot of technologies 'under the hood', including tunnels (possibly GRE), MPLS, VXLAN, and thinkg like these. Each provider implements it differently though
@p4pryk6 жыл бұрын
There is a mistake with address on topology and set for tunnel src/dst addr. 20.20.20.20 and 10.20.20.20. Anyway, great series :) thx for that.
@NetworkDirection6 жыл бұрын
You're absolutely right! Sorry everyone, the topology says 20.20.20.20 when it should say 10.20.20.20 Thanks for noticing this
@jnev90465 жыл бұрын
@@NetworkDirection would this type of mis-configuration show a tunnel up/down or a reset/up? BTW, Great Explanation!
@NetworkDirection5 жыл бұрын
@@jnev9046 Do you mean if we put in the wrong destination IP? I think this would mark the tunnel as up, but it wouldn't work
@ithereos95544 жыл бұрын
@@NetworkDirection But, if the router did have reachability to 20.20.20.20 (and 20.20.20.20 was the correct destination IP), the GRE tunnel will go up without issues no?
@ivanarteaga3282 Жыл бұрын
pin this comment! :P
@AeroAngle Жыл бұрын
enabling jumbo frames help with GRE and why or why not?
@TheMaro57 Жыл бұрын
I have no idea what you're talking about but you're better than a college professor definitely...
@samsonv93322 жыл бұрын
Awesome explanation, thanks!
@NetworkDirection2 жыл бұрын
Glad you enjoyed it!
@steveshawcross11 ай бұрын
Good and simple explanation !!
@exmundi3 жыл бұрын
Those virtual interfaces build an ARP cache? If yes, how do they seem?
@NetworkDirection3 жыл бұрын
The ARP cache will build for anything with L2 adjacency
@YeshwanthSimhadri6 жыл бұрын
very nice explanation - may be a LAB would have been an icing on the cake
@NetworkDirection5 жыл бұрын
Thanks, that's a good suggestion. I'm working on a couple of GRE labs now
@NetworkDirection5 жыл бұрын
Here's the lab: networkdirection.net/labsandquizzes/labs/lab-gre-tunnels/
@mahendrakumarsahu43954 жыл бұрын
Awesome !!! I like very much the animated explanation ♥️ Thank you Sir
@sarvesh81s4 жыл бұрын
Thanks for Very good Explanation , how did you put IP address in tunnel source command ?? it should be interface
@NetworkDirection4 жыл бұрын
You can use either, but using the IP allows the router to choose the best interface based on the address. In some cases this will improve stability (covered in the following videos)
@peterruppert78562 жыл бұрын
Thank you so much!!! Great video!!
@NetworkDirection2 жыл бұрын
You're welcome!
@alexandercullum66322 жыл бұрын
super helpful video, thank you!
@NetworkDirection2 жыл бұрын
Good to hear, thanks!
@weaselfeet6 жыл бұрын
This was fantastic, looking forward the the encryption component,
@NetworkDirection6 жыл бұрын
I aim to please 😁
@EpisonicProject6 ай бұрын
Amazing video I understand gre now
@Amsj11665 жыл бұрын
Wow very nicely explained
@user-qo8js3qk5z3 жыл бұрын
Excellent video thank you so much for the breakdown.
@NetworkDirection2 жыл бұрын
Glad to help!
@Null-Null16 жыл бұрын
Another great explaination!
@NetworkDirection6 жыл бұрын
Thanks Daniel! So happy that it makes sense. Looking forward to seeing GRE tunnels with IPSec?
@Null-Null16 жыл бұрын
@@NetworkDirection Definitely! Always enjoy your well presented and explained videos
@mdsameer27744 ай бұрын
very good. Keep going,
@GamjaField6 жыл бұрын
Thank you. Great explanation as always. Will you cover the IPSec tunnel in this series?
@NetworkDirection6 жыл бұрын
Absolutely! Give me two weeks, and you’ll have a video on adding IPSec to the GRE tunnel, including the basics of how IPSec works
@GamjaField6 жыл бұрын
Network Direction Awesome! :)
@Mike-ci5io2 жыл бұрын
How does lowering mtu avoid fragmentation infact it will increase it so you want highest mtu interface can support
@pin-fatsh95535 жыл бұрын
Thanks for this well-explained nuggets :)
@NetworkDirection5 жыл бұрын
You're very welcome!
@babakvelamkon6 жыл бұрын
Thanks. Plz emphasis more on vpn vs gre application, similarity and differences
@NetworkDirection6 жыл бұрын
I'm not sure I understand correct... GRE is a type of VPN. It's different to the app that you install on your computer to connect into the office from home. GRE is different, as you're not connecting a single device to the network virtually. Instead, you're creating a virtual link between entire networks. Does that help?
@babakvelamkon6 жыл бұрын
Network Direction Thanks. The confusion I have is why to go for site-2-site Vpn and not gre/ipsec. Is there any reason that most people deploy the vpn and not secure gre?
@NetworkDirection6 жыл бұрын
Ah, I understand now. Not everything supports GRE. GRE is kind of a routing technology. So, you'll commonly find it on routers. An IPSec VPN was developed from the security point of view, so it is mor common on firewalls. ASA's for example, support IPSec VPN's, not GRE + IPSec. As to why vendors decide to support one technology but not another... I'm not sure.
@babakvelamkon6 жыл бұрын
Network Direction Thanks alot
@NetworkDirection6 жыл бұрын
You’re welcome
@yusefskaff474 жыл бұрын
Excellent explanation!! I appreciate that 👍🏼
@NetworkDirection4 жыл бұрын
Glad it was helpful!
@TheVillageShow6 ай бұрын
Very beautiful. Thankyou so much 🎉🎉
@MohanKumar-wp8kc2 жыл бұрын
good series
@NetworkDirection2 жыл бұрын
Thank you!
@tommclaughlin71794 жыл бұрын
Thank you for simplifying gre!
@NetworkDirection2 жыл бұрын
My pleasure!
@ahmedareem95993 жыл бұрын
man, that's a fantastic video!
@NetworkDirection3 жыл бұрын
Thanks!
@jaronprovidence94845 жыл бұрын
Awesome video, thanks!
@jordantaylor3788 Жыл бұрын
Is this still true? I didn't think you could advertise OSPF over GRE as the interfaces would be flapping when trying to send ospf packets to the endpoint?
@NetworkDirection Жыл бұрын
Hi Jordan Thanks for your comment! What you are describing is route recursion. This can happen if you do it wrong, but OSPF over GRE is just fine if you do it right. I believe the next video in this series discusses this further. 😃 Have a great day!
@narendrajayram13175 жыл бұрын
great explanation!
@NetworkDirection5 жыл бұрын
Thanks!
@raadhoque16 күн бұрын
very good😇
@allien53295 жыл бұрын
best explained !!!
@NetworkDirection2 жыл бұрын
Thank you!
@Zbenesch5 жыл бұрын
Nicely done!
@Robertorossell4 жыл бұрын
Thanks great material
@daveycrockett94472 жыл бұрын
only problem with this description - is you have a RFC 1911 on the left that will NOT route across the Internet. Would have been nice if the example was more realistic in such a way that it would work in a real world scenario.
@NetworkDirection2 жыл бұрын
Do you mean RFC1918?
@muhammadsiddique58925 жыл бұрын
Great Explanation.. Thanks.
@jairusan3 жыл бұрын
I appreciate the effort and time spent to make this video, however, there are just too many mistakes in the content for this specific demonstration, which is dangerous and frustrating for those who really took the time to understand the configuration and even emulate the exercise. I think there are mistakes in the destination IP address: 20.20.20.20/24 > 10.20.20.20/24. In the explanation of how the packets travel through the OVERLAY VTI's or GRE tunnel, NOT UNDERLAY as you mentioned in the video, and also I am not sure if you meant 172.16.1.1 and 172.16.1.2 and forgot to specify the CIDR here...as well. Again, not trying to troll or anything but I think this video should be removed, corrected, and re-posted for the sake of all members subscribed. There are a lot of people commenting on things like, great work, awesome video, great explanation, and we know that they definitely didn't understand what they just watched. Thank you for all you do, as I am subscribed and love some of the other videos you have put together, but, unfortunately, after checking this GRE one very carefully, I will have to be very careful going forward when following the videos you post. Hope this feedback is helpful.
@mmobini1803 Жыл бұрын
Thank you!
@jahedbenbarka90085 жыл бұрын
Thank u man.....
@eksadiss5 жыл бұрын
5:28 you said 1436 when I think you meant to say 1476
@digiground76133 жыл бұрын
nice...
@NetworkDirection3 жыл бұрын
Thanks!
@arunrkrishnan98333 жыл бұрын
perfect
@NetworkDirection2 жыл бұрын
Thank you!
@ahmed786tutu3 жыл бұрын
i think you missed the static route explanation thats needed here
@NetworkDirection3 жыл бұрын
Do you mean explaining what static routes are, or how they're used for this application?
@ahmed786tutu3 жыл бұрын
@@NetworkDirection yeah i meant for this application, ie how do the two edges know how to get to each other and how do we force traffic over the tunnel. also how not to cause recursive routing issues. but the video was information nonetheless.
@leonelsimoes26162 жыл бұрын
Destination address should be 192.168.2.1 instead of 192.168.1.2
@NetworkDirection2 жыл бұрын
Thank you! Unfortunately, I can't go back and change it
@rohanofelvenpower55664 жыл бұрын
aha so very very simple. Basically it adds what is called "Outer IP" header which has the ISPs routers IPs which are PUBLIC IPs so the routers over the Internet (/WAN) KNOW where they are. And there is also the small gre header that says what the original IP version is being used by the private hosts with private, non-routable IP addresses. So you stick public IPs on top of the packet and route it as normal. By the time it arrives at the destination and it is de-encapsulated the private host will see it's private ip (non-routable) that it knows. So easy it's a joke haha