?
Solved

Redundant Internet connection

Posted on 2013-11-18
3
Medium Priority
?
155 Views
Last Modified: 2014-02-17
We have a company that has 2 sites that have an Ethernet connection between them that is independent of the Internet connection. Each site has a separate internet connection and we want to provide redundancy that if one sites internet failed it will automatically go across the Ethernet connection and use the other sites internet instead of their own. They have draytek 2830 router at each site They are both on the same LAN subnet

 Is this possible to setup?
0
Comment
Question by:Mitch P
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 37

Expert Comment

by:Mahesh
ID: 39656266
Do not know how your client gets internet, through router gateway or proxy server ?

Normally if you have two proxy servers at two locations having ethernet (WAN) connectivity, then you can write .dat or .pac file and distribute it through DNS or DHCP.
In 'pac \ .dat file you can write code so that clients will get another proxy server if one got failed at there location.

Check below links
http://www.sophos.com/en-us/support/knowledgebase/38783.aspx
http://www.aspfree.com/c/a/braindump/controlling-internet-access-using-a-pac-file/
http://technet.microsoft.com/en-us/library/cc985352.aspx

Thanks
0
 

Author Comment

by:Mitch P
ID: 39656271
Thanks for the reply... interesting, but they are using a router gateway
0
 
LVL 37

Accepted Solution

by:
Mahesh earned 750 total points
ID: 39656284
In that case it is not possible.
because you cannot chnage IP configuration across sites.

Thanks
0

Featured Post

Free Tool: Site Down Detector

Helpful to verify reports of your own downtime, or to double check a downed website you are trying to access.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Quality of Service (QoS) options are nearly endless when it comes to networks today. This article is merely one example of how it can be handled in a hub-n-spoke design using a 3-tier configuration.
The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question