3 thoughts on “What is the "GRE" protocol?”

  1. GRE (GENERIC ROUTING) general -purpose packaging package is encapsulated to some network layer protocols (such as: IP, IPX, Apple Talk, etc.), so that these packaged databases can be agreed on another network layer protocol (such as IP) Middle transmission.
    gre can realize the multi -protocol local network through the service of the backbone network transmission of a single protocol to expand the scope of the network, including which route gateway is limited. ), And in a Tunnel connection, it looks like only one router connects some non -continuous subnets.
    gre protocol is actually a carrier agreement. It provides a mechanism that encapsulates one agreement in another protocol message, so that the packet can transmit in the heterogeneous network, and the heterogeneous packet transmission can be transmitted. The channel is called Tunnel.
    IP protocol can be used as a transmission protocol or a load protocol. In the TCP/IP network, the IP protocol is generally used as a message of the transmission protocol, encapsulation and transmission of other protocols.
    tunnel is a virtual point -to -point connection. It provides a pathway to enable the packaging datagram to be transmitted in this path, and packaged and unblocked the datagram at both ends of a Tunnel.
    In the simplest case, the system receives a database that needs to be encapsulated and routed, which is called a load message. This valid message was first encapsulated by GRE, which was called GRE message. This message was then packaged in the IP protocol, and then the IP layer was responsible for the forwarding of this message.

  2. GRE technology specifies how to encapsulate another network protocol with one network protocol. The GRE tunnel is defined by the source IP address and destination IP address at both ends. It allows users to use IP packages to package IP, Internet package exchange protocol (IPX) such as Appletalk package and support various route protocols, such as Routing Information Protocol Version 2 (RIP2) , Open the shortest path priority protocol (OSPF), etc. Although the GRE protocol is relatively mature, the number of IP tunnels that need to be processed here is amazing, and it must be completed by manual scheduling. Each tunnel must be filed with a pair of IP addresses. question. When a network fails, the IP route agreement needs to spend at least a few seconds to converge the network. To this end, IETF defines the link state of the link management protocol (LMP) to monitor the underlying link and provide fast fault detection. Although the number of tunnels of the core network can be defined by defining a layered IP VPN so that the network can be scalable, this will cause the primitive Ether frame to be packaged to two IP Baotou (used for the connection between the point -to -point and interconnected connectivity, respectively. ) Reduce bandwidth utilization.

  3. GRE GRE (General Routing Agreement) was submitted to IETF by companies such as CISCO and Net-Smiths in 1994 and labeled RFC1701 and RFC1702. At present, most manufacturers' network devices support the GRE tunnel agreement. GRE stipulates how to encapsulate another network protocol with one network protocol. GRE's tunnel is defined by the source IP address and destination IP address at both ends, allowing users to use IP packages to package IP, IPX, Appletalk package, and support all routing protocols (such as RIP2, OSPF, etc.). Through GRE, users can use the public IP network to connect IPX networks, Appletalk networks, and can also use the reserved address for network interconnection, or the IP address of the public network hidden corporate network. There are two main uses of the GRE protocol: the internal agreement of the enterprise and the private address packaging. In China, because the corporate network uses almost all the TCP/IP protocol, there is no market demand for the internal agreement of the enterprise when establishing a tunnel in China. The only reason for enterprises to use GRE should be the packaging of internal addresses. The possibility of address conflict when operators provide this method of VPN services to multiple users.

Leave a Comment