I compared three of the various ways to set up an IPsec connection and have a little difficulty to see the details:
1. Build a GRE tunnel (interface), then define GRE traffic as interesting in the CryptoACL, build the according CryptoMap.
2. Build a GRE tunnel (interface) and apply a CryptoProfile. Tunnel Mode is GRE.
3. Build a tunnel (interface) and set the mode the ipsec. Apply an CryptoProfile.
Are these just different versions to do the same thing ? If not, what are the little differences ?
Thanks in advance,
There are many differences, please check this document:
Specially check pg 43 of 56 (Table 3).