Ch 16: Overlay Tunnels Flashcards
(100 cards)
What is an overlay network?
An overlay network is a logical or virtual network built over a physical transport network referred to as an underlay network. Overlay networks are used to overcome shortcomings of traditional networks by enabling network virtualization, segmentation, and security to make traditional networks more manageable, flexible, secure (by means of encryption), and scalable
The following are examples of overlay tunneling technologies. What are these?
- GRE
- IPsec
- LISP
- VXLAN
- MPLS
Examples of overlay tunneling technologies include the following:
- Generic Routing Encapsulation (GRE)
- IP Security (IPsec)
- Locator ID/Separation Protocol (LISP)
- Virtual Extensible LAN (VXLAN)
- Multiprotocol Label Switching (MPLS)
T/F: An overlay tunnel can be built over another overlay tunnel.
True.
MPLS tunneling is not supported across the Internet unless it is tunneled within another tunneling protocol, such as GRE, which can then be encrypted with IPsec (MPLS over GRE over IPsec). A key takeaway from this is that an overlay tunnel can be built over another overlay tunnel.
Fact: Different combinations of overlay tunneling and encryption technologies opened the door to next-generation overlay fabric networks such as the following acronyms. What are these?
- SD-WAN
- SD-Access
- ACI
- VTS
Different combinations of overlay tunneling and encryption technologies opened the door to next-generation overlay fabric networks such as:
- Software-Defined WAN (SD-WAN)
- Software-Defined Access (SD-Access)
- Application Centric Infrastructure (ACI)
- Cisco Virtual Topology System (VTS)
Which of the following commands are optional for GRE configuration? (Choose two.)
- tunnel source {ip-address | interface-id}
- tunnel destination ip-address
- tunnel mode gre {ip | ipv6}
- keepalive
3 and 4.
When configuring a tunnel interface, the default mode is GRE, so there is no need to specify the tunnel mode with the command tunnel mode gre {ip | ipv6}. The command is useful when the tunnel mode is changed to another type (such as IPsec) and there is a need to change the tunnel mode back to GRE.
The keepalive command is also optional. It is used to make sure the other end of the tunnel is operational. This command does not need to be configured on both ends of the tunnel in order to work.
T/F: GRE was originally created to provide transport for non-routable legacy protocols.
True.
GRE was originally created to provide transport for non-routable legacy protocols such as Internetwork Packet Exchange (IPX) across an IP network, and it is now more commonly used as an overlay for IPv4 and IPv6.
Which of the following should not be dynamically advertised via an IGP into a GRE tunnel?
- Loopback interfaces
- The GRE tunnel source interface or source IP address
- Connected interfaces
- The GRE tunnel IP address
2.
The tunnel source interface or source IP address should not be advertised into a GRE tunnel because it would cause recursive routing issues. This is the outside, routable interface.
Which of the following are modes of packet transport supported by IPsec? (Choose two.)
- Tunnel mode
- Transparent mode
- Transport mode
- Crypto mode
1 and 3.
Traditional IPsec provides two modes of packet transport: tunnel mode and transport mode.
Which of the following are encryption protocols that should be avoided? (Choose two.)
a. DES
b. 3DES
c. AES
d. GCM
e. GMAC
1 and 2.
DES and 3DES are weak encryption protocols that are no longer recommended for use.
Which of the following is the message exchange mode used to establish an IKEv1 IPsec SA?
- Main mode
- Aggressive mode
- Quick mode
- CREATE_CHILD_SA
3.
The message exchange method used to establish an IPsec SA for IKEv1 is known as quick mode or QM. Main mode and aggressive mode are IKEv1 methods used to establish IKE SAs. For IKEv2, IKE_Auth creates an IPsec SA. If additional IPsec SAs are needed, a CREATE_CHILD_SA exchange is used to establish them.
LISP separates IP addresses into which of the following? (Choose two.)
- RLOCs
- LISP entities
- Subnets and hosts
- EIDs
1 and 4.
LISP separates IP addresses into endpoint identifiers (EIDs) and routing locators (RLOCs).
What is the destination UDP port used by the LISP data plane?
a. 4341
b. 4143
c. 4342
d. 4142
A.
The destination UDP port used by the LISP data plane is 4341. UDP port 4342 is used for LISP’s control plane messages.
T/F: ETRs are the only devices responsible for responding to map requests originated by ITRs.
False.
An ETR (Egress Tunnel Router) may also request that the MS(Mapping Server) answer map requests on its behalf by setting the proxy map reply flag (P-bit) in the map register message.
ITR (Ingress Tunnel Router): An ITR is responsible for finding EID-to-RLOC mappings for all traffic destined for LISP-capable sites.
Which of the following UDP ports is the UDP port officially assigned by the IANA for VXLAN?
a. 8947
b. 4789
c. 8472
d. 4987
B.
The IANA’s assigned VXLAN UDP destination port is 4789, while for Linux it is port 8472. The reason for this discrepancy is that when VXLAN was first implemented in Linux, the VXLAN UDP destination port had not yet been officially assigned, and Linux decided to use port 8472 because many vendors at the time were using that value.
T/F: The VXLAN specification defines a data plane and a control plane for VXLAN.
False.
The VXLAN specification defines VXLAN as a data plane protocol, but it does not define a VXLAN control plane, which was left open to be used with any control plane.
T/F: A GRE tunnel has many uses but they cannot be used to tunnel traffic through a firewall or an ACL.
False.
Yes they can be used to tunnel traffic through a firewall or an ACL or to connect discontiguous networks, and they can even be used as networking duct tape for bad routing designs. Their most important application is that they can be used to create VPNs.
T/F: In a GRE encapsulated packet, the new IP header information allows the packet to be routed between the two tunnel endpoints without inspection of the packet’s payload.
True.
When a router encapsulates a packet for a GRE tunnel, it adds new header information to the packet, which contains the remote endpoint IP address as the destination.
The new IP header information allows the packet to be routed between the two tunnel endpoints without inspection of the packet’s payload.
After the packet reaches the remote endpoint, the GRE headers are removed, and the original packet is forwarded out the remote router.
Figure 16-1 illustrates an IP packet before and after GRE encapsulation.

Here are the commands to configure a GRE tunnel. Put them in order.
- ip mtu mtu (optional)
- interface tunnel tunnel-number
- keepalive [seconds [retries]] (optional)
- ip address ip-address subnet-mask
- tunnel source {ip-address | interface-id}
- bandwidth [1-10000000] (optional)
- tunnel destination ip-address
The proper order is: 2, 5, 7, 4, 6, 3, 1.
The 6 steps for configuring GRE tunnels are as follows:
- Create the tunnel interface by using the global configuration command interface tunnel tunnel-number.
- Identify the local source of the tunnel by using the interface parameter command tunnel source {ip-address | interface-id}. The tunnel source interface indicates the interface that will be used for encapsulation and de-encapsulation of the GRE tunnel. The tunnel source can be a physical interface or a loopback interface. A loopback interface can provide reachability if one of the transport interfaces fails.
- Identify the remote destination IP address by using the interface parameter command tunnel destination ip-address. The tunnel destination is the remote router’s underlay IP address toward which the local router sends GRE packets.
- Allocate an IP address to the tunnel interface to the interface by using the command ip address ip-address subnet-mask.
- (Optional) Define the tunnel bandwidth. Virtual interfaces do not have the concept of latency and need to have a reference bandwidth configured so that routing protocols that use bandwidth for best path calculation can make an intelligent decision. Bandwidth is also used for quality of service (QoS) configuration on the interface. Bandwidth is defined with the interface parameter command bandwidth [1-10000000], which is measured in kilobits per second.
- (Optional) Specify a GRE tunnel keepalive. Tunnel interfaces are GRE point-to-point (P2P) by default, and the line protocol enters an up state when the router detects that a route to the tunnel destination exists in the routing table. If the tunnel destination is not in the routing table, the tunnel interface (line protocol) enters a down state.
- Tunnel keepalives ensure that bidirectional communication exists between tunnel endpoints to keep the line protocol up. Otherwise, the router must rely on routing protocol timers to detect a dead remote endpoint.
- Keepalives are configured with the interface parameter command keepalive [seconds [retries]]. The default timer is 10 seconds, with three retries.
- (Optional) Define the IP maximum transmission unit (MTU) for the tunnel interface. The GRE tunnel adds a minimum of 24 bytes to the packet size to accommodate the headers that are added to the packet. Specifying the IP MTU on the tunnel interface has the router perform the fragmentation in advance of the host having to detect and specify the packet MTU. IP MTU is configured with the interface parameter command ip mtu mtu.
T/F: Virtual interfaces have no concept of bandwidth.
True.
Virtual interfaces do not have the concept of latency and need to have a reference bandwidth configured so that routing protocols that use bandwidth for best-path calculation can make an intelligent decision. Bandwidth is also used for quality of service (QoS) configuration on the interface.
T/F: A GRE tunnel source must be a physical interface.
False.
The tunnel source interface indicates the interface that will be used for encapsulation and de-encapsulation of the GRE tunnel. The tunnel source can be a physical interface or a loopback interface. A loopback interface can provide reachability if one of the transport interfaces fails.
T/F: The tunnel destination is the remote router’s overlay IP address toward which the local router sends GRE packets.
False.
The tunnel destination is the remote router’s underlay IP address toward which the local router sends GRE packets. The underlay tunnel is the physical infrastructure.
Fact: GRE tunnels need to have a working route in the route table in order to be in an up state. Why is this?
Tunnel interfaces are GRE point-to- point (P2P) by default, and the line protocol enters an up state when the router detects that a route to the tunnel destination exists in the routing table.
If the tunnel destination is not in the routing table, the tunnel interface (line protocol) enters a down state.
Keepalives are a solution to this problem. Tunnel keepalives ensure that bidirectional communication exists between tunnel endpoints to keep the line protocol up. Otherwise, the router must rely on routing protocol timers to detect a dead remote endpoint.
What is the minimum number of bytes that a GRE encapsulation will add to a packet?
The GRE tunnel adds a minimum of 24 bytes to the packet size to accommodate the headers that are added to the packet.
How much overhead is introduced to a packet with GRE encapsulation and using AES + SHA1 for security?
See attached figure.


















