beautypg.com

Operation of a p2mp gre tunnel – H3C Technologies H3C SecPath F1000-E User Manual

Page 18

background image

2

traditional P2P GRE tunnel mode. Then, a GRE tunnel will be established dynamically between the

headquarters and each branch.

Operation of a P2MP GRE Tunnel

The encapsulation and de-encapsulation of P2MP GRE tunnel packets are the same as those of P2P GRE

tunnel packets. For more information, see

Introduction to GRE

.

Figure 12 Learning tunnel destination addresses dynamically

10.2.1.2/24

10.1.1.2/24

Tunnel0
10.3.1.1/24

11.1.1.1/24

11.1.1.2/24

IPv4 network

GRE tunnel

Tunnel0

10.3.1.2/24

Device A

Device B

Host A

Host B

Headquarters

Branch

10.1.1.2

GRE

11.1.1.2

Tun Dest

11.1.1.2

Dest

10.1.1.0/24


Different from a P2P GRE tunnel, a P2MP GRE tunnel does not require manual configuration of the tunnel

destination addresses but learns them from GRE tunnel packets received from peers. As shown in

Figure

12

, Device A resides at the headquarters and has a P2MP GRE tunnel interface configured, while Device

B resides at a branch and has a P2P GRE tunnel interface configured. After Device A receives a GRE

packet from Device B, it establishes a tunnel entry, taking the source address in the transport protocol

(IPv4) header as the tunnel destination address and the source address in the passenger protocol (IPv4)

header (that is, the private network address of the branch) as the packet destination address.
When forwarding a packet through a P2MP GRE tunnel, the device searches the tunnel entries for the
tunnel destination address according to the packet’s destination address, and then encapsulates the

packet with GRE and then with IPv4, using the tunnel destination address as the destination address in

the transport protocol header.

NOTE:

The mask length of the packet destination address in a tunnel entry is configurable. After you configure a
mask length for a packet destination address, the node at the headquarters establishes only one tunnel

entry for private IP addresses in the same network segment, thus reducing the number of tunnel entries on
the node at the headquarters and allowing branches to initiate establishment of tunnels by sending

emulated data to the node at the headquarters.