Solved

Cisco - Can GRE Tunnel support policy based routing?

Posted on 2003-11-28
2
1,280 Views
Last Modified: 2012-06-27
hi,

Can I apply a policy based routing on a GRE Tunnel in a Cisco IOS environment??? Please advise...
Thanks
0
Comment
Question by:Haho
2 Comments
 
LVL 7

Expert Comment

by:Robing66066
ID: 9837702
If I understand what you are asking, the answer would be yes.  Set up IAS for Windows 2000/2003 and have your Cisco device perform authentication through that device as a RADIUS server.  

You will end up adding something like this to your config:

aaa-server TACACS+ protocol tacacs+

aaa-server TACACS+ (inside) host 10.1.0.100 <key> timeout 5

aaa-server RADIUS protocol radius

aaa-server authinbound protocol tacacs+

aaa-server authinbound (inside) host 10.1.0.100 <key> timeout

At the 10.1.0.100, you'll have your IAS (RADIUS) server set up with the policies you want.

Good luck!
0
 
LVL 79

Accepted Solution

by:
lrmoore earned 125 total points
ID: 9838097
Yes. A Tunnel interface is just like any "real" interface in that you can apply access-list, policies, encryption, etc...
0

Featured Post

Control application downtime with dependency maps

Visualize the interdependencies between application components better with Applications Manager's automated application discovery and dependency mapping feature. Resolve performance issues faster by quickly isolating problematic components.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Squid Connection Pools 3 45
SCCM 2012 - PXE WinPE - Boot Resolution Low 10 27
Tracking Down IP in VMware 41 96
IP Calculator 10 55
This is an article about my experiences with remote access to my clients (so that I may serve them) and eventually to my home office system via Radmin Remote Control. I have been using remote access for over 10 years and have been improving my metho…
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Viewers will learn how to properly install and use Secure Shell (SSH) to work on projects or homework remotely. Download Secure Shell: Follow basic installation instructions: Open Secure Shell and use "Quick Connect" to enter credentials includi…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

912 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now