Tunnel interfaces are virtual Layer 3 interfaces that encapsulate and route traffic through VPN tunnels, creating secure connections between networks or to remote users. They are fundamental to IPsec VPNs, GRE tunnels, and GlobalProtect deployments, making them a critical topic for the PCNSE exam.
tunnel.N
, where N is a number from 1 to 9999.
IPsec VPNs heavily rely on tunnel interfaces. They provide the logical endpoint for the secure tunnel and allow the firewall to apply security policies to the decrypted traffic.
IPsec Tunnel Establishment and Traffic Flow using Tunnel Interfaces
For policy-based VPNs (where only specific traffic is encrypted based on source/destination networks), Proxy IDs are crucial. These define the interesting traffic for IKE Phase 2 negotiations. Proxy IDs must match on both ends of the tunnel.
> show vpn tunnel ipsec tunnel-name
Use the above command to view Proxy ID and IPsec tunnel configuration details.
Proxy ID Configuration Example
GRE tunnels encapsulate Layer 3 protocols within a new IP header, enabling routing across networks. They are often used for point-to-point connectivity and can be combined with IPsec for encryption (GRE over IPsec).
Basic GRE Tunnel Topology
This configuration provides encryption and allows for routing protocols or multicast traffic across the tunnel.
GRE over IPsec using Loopback Interfaces
GlobalProtect uses tunnel interfaces to establish secure connections between remote users and the corporate network. When in tunnel mode, a dedicated tunnel interface on the firewall serves as the endpoint for the VPN connection.
Split tunneling allows specific traffic to bypass the VPN tunnel and go directly to the internet, improving performance and reducing VPN load.
GlobalProtect Split Tunneling Traffic Flow