Skip to content

GRE and IPsec

GRE and IPsec provide tunnel behaviour for overlay and VPN labs. netverdict models tunnel reachability, GRE encapsulation, IPsec/IKEv2 configuration, SA selection, and ESP-style protected forwarding at the behaviour level.

AreaLevelNotes
GRE tunnelsSupportedTunnel source/destination and encapsulated IPv4 forwarding.
IPsec tunnel modeBehaviour modelProtected traffic selectors and SA-based forwarding.
IKEv2 configBehaviour modelProfiles, proposals, policies, keyrings, and PSK-style authentication.
ESP forwardingSupportedESP packet path is represented.
Crypto negotiationNot modelledNo byte-level IKE exchange or real encryption.
StandardCoverageNotes
RFC 2784Behaviour modelGRE encapsulation over IPv4.
RFC 4303Behaviour modelESP-protected forwarding semantics.
RFC 7296Behaviour modelIKEv2 configuration concepts, not packet negotiation.
FeatureStatusNotes
Tunnel interfaceSupportedLogical interface participates in routing.
Tunnel source/destinationSupportedUnderlay reachability required.
GRE encapsulationSupportedPacket path through tunnel.
Crypto ACL / selectorSupportedDefines interesting traffic.
IKEv2 proposal/policyConfig modelStored and used by solver where relevant.
IPsec profile/transformSupportedAssociates protection with tunnel or crypto map.
PSK identityBehaviour modelMatching peer config required in supported scenarios.
NAT-TNot modelledOut of scope today.
CommandIOS-styleJunos-styleVyOS-styleNotes
interface Tunnel0SupportedPartialPartialTunnel interface.
tunnel source GigabitEthernet0/0SupportedPartialPartialGRE source.
tunnel destination 203.0.113.2SupportedPartialPartialGRE peer.
tunnel mode gre ipSupportedPartialPartialGRE mode.
crypto ikev2 proposalSupportedn/aPartialIKEv2 config surface.
crypto ipsec profileSupportedn/aPartialTunnel protection.
show crypto ikev2 saSupportedn/aPartialModelled SA view.

The VPN solver answers: do the peers agree enough to form a protected path, and does selected traffic use that path? It deliberately avoids pretending to be a real cryptographic endpoint.

Canonical example
configure terminal
interface Tunnel0
ip address 10.255.0.1 255.255.255.252
tunnel source GigabitEthernet0/0
tunnel destination 203.0.113.2
tunnel mode gre ip
tunnel protection ipsec profile SITE-VPN
end
show interface Tunnel0
show crypto ikev2 sa

Vendor styles

IOS-style
interface Tunnel0
tunnel source GigabitEthernet0/0
tunnel destination 203.0.113.2
tunnel mode gre ip
tunnel protection ipsec profile SITE-VPN
Junos-style
set interfaces gr-0/0/0 unit 0 tunnel source 203.0.113.1
set interfaces gr-0/0/0 unit 0 tunnel destination 203.0.113.2
set security ike gateway PEER address 203.0.113.2
set security ipsec vpn SITE bind-interface st0.0
VyOS-style
set interfaces tunnel tun0 encapsulation gre
set interfaces tunnel tun0 source-address 203.0.113.1
set interfaces tunnel tun0 remote 203.0.113.2
set vpn ipsec site-to-site peer 203.0.113.2 authentication mode pre-shared-secret

Real encryption, IKE packet negotiation, NAT-T, certificate validation, DPD timing, rekey races, and platform-specific crypto map order are not modelled.