• In the previous lesson, you built a GRE tunnel between the New York headquarters and the San Francisco branch office.
    The tunnel works, R1 and R2 can exchange traffic through the overlay network.

    Enterprise site-to-site IPsec topology between New York and San Francisco

    Figure 1 – Enterprise sites network topology

    But there is a problem.

    GRE provides zero encryption. Every packet traveling through the tunnel is in cleartext.
    Anyone capturing traffic between the two ISP routers can read your data.

    GRE tunnel overlay across untrusted internet network

    Figure 2 – GRE tunnel overlay concept

    IPsec solves this.

    It wraps every packet in an encrypted envelope before sending it across the untrusted network.
    Only the two IPsec peers hold the keys to decrypt the content.

    IPsec encrypted tunnel protecting traffic between sites

    Figure 3 – IPsec encrypted tunnel concept

    IPsec is not a single protocol. It is a framework that combines several components. Let's go through each one:

    • IKE (Internet Key Exchange): Negotiates encryption parameters and exchanges keys between peers.

    • ESP (Encapsulating Security Payload): Encrypts and authenticates the data payload.

    • AH (Authentication Header): Provides authentication and integrity without encryption. Rarely used in modern deployments because ESP can do both.

    • SA (Security Association): A one-way agreement between two peers that defines the encryption algorithm, keys, and lifetime for a specific traffic flow.

    In real-world deployments, the combination you will see most often is IKE + ESP.

    Answer the question below

    What does IPsec provide that GRE alone does not?