{"id":2031,"date":"2025-04-05T18:12:47","date_gmt":"2025-04-05T15:12:47","guid":{"rendered":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-secure-gre-tunnels-on-linux-servers\/"},"modified":"2025-04-05T18:12:47","modified_gmt":"2025-04-05T15:12:47","slug":"configuring-secure-gre-tunnels-on-linux-servers","status":"publish","type":"post","link":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-secure-gre-tunnels-on-linux-servers\/","title":{"rendered":"Configuring Secure GRE Tunnels on Linux Servers"},"content":{"rendered":"<p><br \/>\n<\/p>\n<p>In the realm of networking, establishing secure connections between different locations is vital, especially for businesses that require seamless internal communication. One popular method for creating such connections is through Generic Routing Encapsulation (GRE) tunnels. However, GRE alone doesn&#8217;t provide encryption, which makes it susceptible to eavesdropping. In this article, we will guide you through the process of configuring secure GRE tunnels on Linux servers using IPsec for encryption.<\/p>\n<p><\/p>\n<h2>Understanding GRE Tunnels<\/h2>\n<p><\/p>\n<p>GRE (Generic Routing Encapsulation) is a tunneling protocol that encapsulates various network layer protocols in point-to-point links. It is typically used to create a virtual point-to-point connection between remote sites over the Internet or a private network.<\/p>\n<p><\/p>\n<p>However, GRE tunnels do not encrypt the encapsulated data, which poses a security risk. To enhance the security of a GRE tunnel, we can use IPsec (Internet Protocol Security) for encryption and secure key exchange.<\/p>\n<p><\/p>\n<h2>Prerequisites<\/h2>\n<p><\/p>\n<p>Before starting the configuration, ensure you have:<\/p>\n<p><\/p>\n<ol><\/p>\n<li>Two Linux servers running a supported distribution (CentOS, Ubuntu, etc.).<\/li>\n<p><\/p>\n<li>Root access to both servers.<\/li>\n<p><\/p>\n<li>Sufficient network connectivity between the two servers.<\/li>\n<p><\/p>\n<li>Installed necessary packages (e.g., <code>iproute2<\/code>, <code>strongSwan<\/code> for Ubuntu, or <code>libreswan<\/code> for CentOS).<\/li>\n<p>\n<\/ol>\n<p><\/p>\n<h2>Step 1: Install Required Packages<\/h2>\n<p><\/p>\n<h3>On Ubuntu:<\/h3>\n<p><\/p>\n<pre><code class=\"language-bash\">sudo apt update<br \/>\nsudo apt install strongswan iproute2<\/code><\/pre>\n<p><\/p>\n<h3>On CentOS:<\/h3>\n<p><\/p>\n<pre><code class=\"language-bash\">sudo yum install libreswan iproute<\/code><\/pre>\n<p><\/p>\n<h2>Step 2: Configure the IPsec (StrongSwan or Libreswan)<\/h2>\n<p><\/p>\n<h3>Server 1 Configuration (e.g., 192.168.1.1)<\/h3>\n<p><\/p>\n<p>Edit the IPsec configuration file:<\/p>\n<p><\/p>\n<pre><code class=\"language-bash\">sudo nano \/etc\/ipsec.conf<\/code><\/pre>\n<p><\/p>\n<p>Add the following configuration (replace with your IP addresses and credentials):<\/p>\n<p><\/p>\n<pre><code class=\"language-text\">config setup<br \/>\n    charonstart=yes<br \/>\n    plutostart=no<br \/>\n<br \/>\nconn gre-tunnel<br \/>\n    authby=secret<br \/>\n    pfs=no<br \/>\n    auto=start<br \/>\n    keyexchange=ikev2<br \/>\n    ike=aes128-sha256-modp2048!<br \/>\n    esp=aes128-sha256-modp2048!<br \/>\n    left=192.168.1.1<br \/>\n    leftsubnet=0.0.0.0\/0<br \/>\n    right=192.168.2.1<br \/>\n    rightsubnet=0.0.0.0\/0<\/code><\/pre>\n<p><\/p>\n<h3>Server 2 Configuration (e.g., 192.168.2.1)<\/h3>\n<p><\/p>\n<p>Similarly, on Server 2, edit the IPsec configuration:<\/p>\n<p><\/p>\n<pre><code class=\"language-bash\">sudo nano \/etc\/ipsec.conf<\/code><\/pre>\n<p><\/p>\n<p>Add the corresponding settings:<\/p>\n<p><\/p>\n<pre><code class=\"language-text\">config setup<br \/>\n    charonstart=yes<br \/>\n    plutostart=no<br \/>\n<br \/>\nconn gre-tunnel<br \/>\n    authby=secret<br \/>\n    pfs=no<br \/>\n    auto=start<br \/>\n    keyexchange=ikev2<br \/>\n    ike=aes128-sha256-modp2048!<br \/>\n    esp=aes128-sha256-modp2048!<br \/>\n    left=192.168.2.1<br \/>\n    leftsubnet=0.0.0.0\/0<br \/>\n    right=192.168.1.1<br \/>\n    rightsubnet=0.0.0.0\/0<\/code><\/pre>\n<p><\/p>\n<h3>Step 3: Configure IPsec Secrets<\/h3>\n<p><\/p>\n<p>On <strong>both servers<\/strong>, edit the IPsec secrets file:<\/p>\n<p><\/p>\n<pre><code class=\"language-bash\">sudo nano \/etc\/ipsec.secrets<\/code><\/pre>\n<p><\/p>\n<p>Add the following line (replace &quot;your_secret&quot; with a secure shared secret):<\/p>\n<p><\/p>\n<pre><code class=\"language-text\">192.168.1.1 192.168.2.1 : PSK \"your_secret\"<\/code><\/pre>\n<p><\/p>\n<h2>Step 4: Create the GRE Tunnel<\/h2>\n<p><\/p>\n<h3>On Server 1<\/h3>\n<p><\/p>\n<p>Execute the following commands to create the GRE tunnel:<\/p>\n<p><\/p>\n<pre><code class=\"language-bash\">sudo ip tunnel add gre1 mode gre remote 192.168.2.1 local 192.168.1.1 ttl 255<br \/>\nsudo ip addr add 10.0.0.1\/30 dev gre1<br \/>\nsudo ip link set gre1 up<\/code><\/pre>\n<p><\/p>\n<h3>On Server 2<\/h3>\n<p><\/p>\n<p>Run similar commands to create the GRE tunnel:<\/p>\n<p><\/p>\n<pre><code class=\"language-bash\">sudo ip tunnel add gre1 mode gre remote 192.168.1.1 local 192.168.2.1 ttl 255<br \/>\nsudo ip addr add 10.0.0.2\/30 dev gre1<br \/>\nsudo ip link set gre1 up<\/code><\/pre>\n<p><\/p>\n<h2>Step 5: Enable IP Forwarding<\/h2>\n<p><\/p>\n<p>To allow the servers to forward traffic, enable IP forwarding on both servers by modifying the <code>sysctl<\/code> settings:<\/p>\n<p><\/p>\n<pre><code class=\"language-bash\">echo \"net.ipv4.ip_forward = 1\" | sudo tee -a \/etc\/sysctl.conf<br \/>\nsudo sysctl -p<\/code><\/pre>\n<p><\/p>\n<h2>Step 6: Start IPsec<\/h2>\n<p><\/p>\n<p>On both servers, start the IPsec service:<\/p>\n<p><\/p>\n<h3>On Ubuntu:<\/h3>\n<p><\/p>\n<pre><code class=\"language-bash\">sudo systemctl restart strongswan<\/code><\/pre>\n<p><\/p>\n<h3>On CentOS:<\/h3>\n<p><\/p>\n<pre><code class=\"language-bash\">sudo systemctl restart ipsec<\/code><\/pre>\n<p><\/p>\n<h2>Step 7: Verify the Connection<\/h2>\n<p><\/p>\n<p>To check if the GRE tunnel is up and running, use the following command:<\/p>\n<p><\/p>\n<pre><code class=\"language-bash\">ip a show gre1<\/code><\/pre>\n<p><\/p>\n<p>You can also check the IPsec status:<\/p>\n<p><\/p>\n<h3>On Ubuntu:<\/h3>\n<p><\/p>\n<pre><code class=\"language-bash\">sudo ipsec statusall<\/code><\/pre>\n<p><\/p>\n<h3>On CentOS:<\/h3>\n<p><\/p>\n<pre><code class=\"language-bash\">sudo ipsec verify<\/code><\/pre>\n<p><\/p>\n<h2>Conclusion<\/h2>\n<p><\/p>\n<p>You have successfully configured a secure GRE tunnel between two Linux servers using IPsec for encryption. By wrapping GRE in IPsec, we have ensured that the data traversing this tunnel is encrypted and secure from potential threats.<\/p>\n<p><\/p>\n<p>Utilizing secure GRE tunnels is essential for organizations that handle sensitive information across remote sites. Always remember to regularly review your security policies, keys, and configurations to ensure your network remains secure.<\/p>\n<p><\/p>\n<p>For further inquiries or assistance, feel free to reach out to WafaTech or consult the documentation of your respective Linux distribution. Happy tunneling!<\/p>\n\n","protected":false},"excerpt":{"rendered":"<p>In the realm of networking, establishing secure connections between different locations is vital, especially for businesses that require seamless internal communication. One popular method for creating such connections is through Generic Routing Encapsulation (GRE) tunnels. However, GRE alone doesn&#8217;t provide encryption, which makes it susceptible to eavesdropping. In this article, we will guide you through [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":2032,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[22],"tags":[391,1250,265,447,302,788],"class_list":["post-2031","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-linux-security","tag-configuring","tag-gre","tag-linux","tag-secure","tag-servers","tag-tunnels","et-has-post-format-content","et_post_format-et-post-format-standard"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.5 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Configuring Secure GRE Tunnels on Linux Servers - WafaTech Blogs<\/title>\n<meta name=\"description\" content=\"Configuring Secure GRE Tunnels on Linux Servers %\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-secure-gre-tunnels-on-linux-servers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Configuring Secure GRE Tunnels on Linux Servers\" \/>\n<meta property=\"og:description\" content=\"Configuring Secure GRE Tunnels on Linux Servers %\" \/>\n<meta property=\"og:url\" content=\"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-secure-gre-tunnels-on-linux-servers\/\" \/>\n<meta property=\"og:site_name\" content=\"WafaTech Blogs\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/people\/WafaTech\/61560546351289\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-04-05T15:12:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/06\/logo_big.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"2221\" \/>\n\t<meta property=\"og:image:height\" content=\"482\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"WafaTech SA\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@wafatech_sa\" \/>\n<meta name=\"twitter:site\" content=\"@wafatech_sa\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"WafaTech SA\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/configuring-secure-gre-tunnels-on-linux-servers\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/configuring-secure-gre-tunnels-on-linux-servers\\\/\"},\"author\":{\"name\":\"WafaTech SA\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#\\\/schema\\\/person\\\/1a5761fc0feb63ab59d295d7c2648f06\"},\"headline\":\"Configuring Secure GRE Tunnels on Linux Servers\",\"datePublished\":\"2025-04-05T15:12:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/configuring-secure-gre-tunnels-on-linux-servers\\\/\"},\"wordCount\":453,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/configuring-secure-gre-tunnels-on-linux-servers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Configuring-Secure-GRE-Tunnels-on-Linux-Servers.png\",\"keywords\":[\"Configuring\",\"GRE\",\"Linux\",\"Secure\",\"Servers\",\"Tunnels\"],\"articleSection\":[\"Linux Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/configuring-secure-gre-tunnels-on-linux-servers\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/configuring-secure-gre-tunnels-on-linux-servers\\\/\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/configuring-secure-gre-tunnels-on-linux-servers\\\/\",\"name\":\"Configuring Secure GRE Tunnels on Linux Servers - WafaTech Blogs\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/configuring-secure-gre-tunnels-on-linux-servers\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/configuring-secure-gre-tunnels-on-linux-servers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Configuring-Secure-GRE-Tunnels-on-Linux-Servers.png\",\"datePublished\":\"2025-04-05T15:12:47+00:00\",\"description\":\"Configuring Secure GRE Tunnels on Linux Servers %\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/configuring-secure-gre-tunnels-on-linux-servers\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/configuring-secure-gre-tunnels-on-linux-servers\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/configuring-secure-gre-tunnels-on-linux-servers\\\/#primaryimage\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Configuring-Secure-GRE-Tunnels-on-Linux-Servers.png\",\"contentUrl\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Configuring-Secure-GRE-Tunnels-on-Linux-Servers.png\",\"width\":1024,\"height\":1024,\"caption\":\"linux server setting up secure GRE tunnels\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/configuring-secure-gre-tunnels-on-linux-servers\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Configuring Secure GRE Tunnels on Linux Servers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/\",\"name\":\"WafaTech Blogs\",\"description\":\"Smart Technologies\",\"publisher\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#organization\"},\"alternateName\":\"WafaTech\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#organization\",\"name\":\"WafaTech Blogs\",\"alternateName\":\"WafaTech\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/logo_big.webp\",\"contentUrl\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/logo_big.webp\",\"width\":2221,\"height\":482,\"caption\":\"WafaTech Blogs\"},\"image\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/people\\\/WafaTech\\\/61560546351289\\\/\",\"https:\\\/\\\/x.com\\\/wafatech_sa\",\"https:\\\/\\\/www.youtube.com\\\/@wafatech-sa\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/wafatech\\\/\"],\"description\":\"WafaTech, a leading Saudi IT services provider, specializes in cloud solutions, connectivity, and ICT services. Offering secure cloud infrastructure, high-speed internet, and ICT solutions like hosting, backup, and disaster recovery, WafaTech operates a Tier 3 data center at KAUST with ISO certifications. Regulated by CST, the company is committed to innovation, security, and customer satisfaction, empowering businesses in the digital age.\",\"email\":\"sales@wafatech.sa\",\"legalName\":\"Al-Wafa Al-Dhakia For Information Technology LLC\",\"foundingDate\":\"2013-01-08\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"11\",\"maxValue\":\"50\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#\\\/schema\\\/person\\\/1a5761fc0feb63ab59d295d7c2648f06\",\"name\":\"WafaTech SA\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g\",\"caption\":\"WafaTech SA\"},\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/author\\\/omer-yaseen\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Configuring Secure GRE Tunnels on Linux Servers - WafaTech Blogs","description":"Configuring Secure GRE Tunnels on Linux Servers %","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-secure-gre-tunnels-on-linux-servers\/","og_locale":"en_US","og_type":"article","og_title":"Configuring Secure GRE Tunnels on Linux Servers","og_description":"Configuring Secure GRE Tunnels on Linux Servers %","og_url":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-secure-gre-tunnels-on-linux-servers\/","og_site_name":"WafaTech Blogs","article_publisher":"https:\/\/www.facebook.com\/people\/WafaTech\/61560546351289\/","article_published_time":"2025-04-05T15:12:47+00:00","og_image":[{"width":2221,"height":482,"url":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/06\/logo_big.webp","type":"image\/webp"}],"author":"WafaTech SA","twitter_card":"summary_large_image","twitter_creator":"@wafatech_sa","twitter_site":"@wafatech_sa","twitter_misc":{"Written by":"WafaTech SA","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-secure-gre-tunnels-on-linux-servers\/#article","isPartOf":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-secure-gre-tunnels-on-linux-servers\/"},"author":{"name":"WafaTech SA","@id":"https:\/\/wafatech.sa\/blog\/#\/schema\/person\/1a5761fc0feb63ab59d295d7c2648f06"},"headline":"Configuring Secure GRE Tunnels on Linux Servers","datePublished":"2025-04-05T15:12:47+00:00","mainEntityOfPage":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-secure-gre-tunnels-on-linux-servers\/"},"wordCount":453,"commentCount":0,"publisher":{"@id":"https:\/\/wafatech.sa\/blog\/#organization"},"image":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-secure-gre-tunnels-on-linux-servers\/#primaryimage"},"thumbnailUrl":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2025\/04\/Configuring-Secure-GRE-Tunnels-on-Linux-Servers.png","keywords":["Configuring","GRE","Linux","Secure","Servers","Tunnels"],"articleSection":["Linux Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-secure-gre-tunnels-on-linux-servers\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-secure-gre-tunnels-on-linux-servers\/","url":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-secure-gre-tunnels-on-linux-servers\/","name":"Configuring Secure GRE Tunnels on Linux Servers - WafaTech Blogs","isPartOf":{"@id":"https:\/\/wafatech.sa\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-secure-gre-tunnels-on-linux-servers\/#primaryimage"},"image":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-secure-gre-tunnels-on-linux-servers\/#primaryimage"},"thumbnailUrl":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2025\/04\/Configuring-Secure-GRE-Tunnels-on-Linux-Servers.png","datePublished":"2025-04-05T15:12:47+00:00","description":"Configuring Secure GRE Tunnels on Linux Servers %","breadcrumb":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-secure-gre-tunnels-on-linux-servers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-secure-gre-tunnels-on-linux-servers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-secure-gre-tunnels-on-linux-servers\/#primaryimage","url":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2025\/04\/Configuring-Secure-GRE-Tunnels-on-Linux-Servers.png","contentUrl":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2025\/04\/Configuring-Secure-GRE-Tunnels-on-Linux-Servers.png","width":1024,"height":1024,"caption":"linux server setting up secure GRE tunnels"},{"@type":"BreadcrumbList","@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-secure-gre-tunnels-on-linux-servers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/wafatech.sa\/blog\/"},{"@type":"ListItem","position":2,"name":"Configuring Secure GRE Tunnels on Linux Servers"}]},{"@type":"WebSite","@id":"https:\/\/wafatech.sa\/blog\/#website","url":"https:\/\/wafatech.sa\/blog\/","name":"WafaTech Blogs","description":"Smart Technologies","publisher":{"@id":"https:\/\/wafatech.sa\/blog\/#organization"},"alternateName":"WafaTech","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/wafatech.sa\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/wafatech.sa\/blog\/#organization","name":"WafaTech Blogs","alternateName":"WafaTech","url":"https:\/\/wafatech.sa\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/wafatech.sa\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/06\/logo_big.webp","contentUrl":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/06\/logo_big.webp","width":2221,"height":482,"caption":"WafaTech Blogs"},"image":{"@id":"https:\/\/wafatech.sa\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/people\/WafaTech\/61560546351289\/","https:\/\/x.com\/wafatech_sa","https:\/\/www.youtube.com\/@wafatech-sa","https:\/\/www.linkedin.com\/company\/wafatech\/"],"description":"WafaTech, a leading Saudi IT services provider, specializes in cloud solutions, connectivity, and ICT services. Offering secure cloud infrastructure, high-speed internet, and ICT solutions like hosting, backup, and disaster recovery, WafaTech operates a Tier 3 data center at KAUST with ISO certifications. Regulated by CST, the company is committed to innovation, security, and customer satisfaction, empowering businesses in the digital age.","email":"sales@wafatech.sa","legalName":"Al-Wafa Al-Dhakia For Information Technology LLC","foundingDate":"2013-01-08","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"11","maxValue":"50"}},{"@type":"Person","@id":"https:\/\/wafatech.sa\/blog\/#\/schema\/person\/1a5761fc0feb63ab59d295d7c2648f06","name":"WafaTech SA","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g","caption":"WafaTech SA"},"url":"https:\/\/wafatech.sa\/blog\/author\/omer-yaseen\/"}]}},"jetpack_featured_media_url":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2025\/04\/Configuring-Secure-GRE-Tunnels-on-Linux-Servers.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/posts\/2031","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/comments?post=2031"}],"version-history":[{"count":0,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/posts\/2031\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/media\/2032"}],"wp:attachment":[{"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/media?parent=2031"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/categories?post=2031"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/tags?post=2031"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}