Solved

Cent Os IP Tunnel

Posted on 2014-12-10
6
138 Views
Last Modified: 2014-12-13
We have one real datacenter which we anounce our ip blocks and AS number in izmir and we have a virtual datacenter in istanbul which other datacenter anounce our ip addresses    (2 x /24 class)

for some reason we want to use the some ip addresses (for ex 185.xx.xx.2 and 185.xx.xx.5) in izmir (which is actually anounced by the datacenter in istanbul)

we decide to install 2 cent os and create an ip tunnel but could not figure it out how to do it.

should some body help us ?

note : we do not have any layer 3 equiqment in istanbul
0
Comment
Question by:Cahit Eyigunlu
  • 3
  • 2
6 Comments
 
LVL 62

Expert Comment

by:gheist
ID: 40493691
stunnel
openvpn
IPSEC known as LibreSWAN in centos
0
 

Author Comment

by:Cahit Eyigunlu
ID: 40494065
we are not looking for a vpn software we want to create a direct tunnel between two locations which other servers can conenct directly while trying to get ip address
0
 
LVL 62

Expert Comment

by:gheist
ID: 40494385
It is still VPN
If servers have fixed IPs - IPSEC
If not - OpenVPN
0
Back Up Your Microsoft Windows Server®

Back up all your Microsoft Windows Server – on-premises, in remote locations, in private and hybrid clouds. Your entire Windows Server will be backed up in one easy step with patented, block-level disk imaging. We achieve RTOs (recovery time objectives) as low as 15 seconds.

 
LVL 40

Expert Comment

by:noci
ID: 40497889
GRE is another possibility.
But why the resentment against IPSEC / OpenVPN.
In the current era it should be considered irresponsible  not to encrypt data in transit.
0
 

Author Comment

by:Cahit Eyigunlu
ID: 40498036
What about eoip
0
 
LVL 62

Accepted Solution

by:
gheist earned 500 total points
ID: 40498192
EOIP is microtik's name for GRE VPN - old unencrypted style.
Normal processor core of today will do couple of gigagbits AES256. There is no sane reason to prefer dinosaur droppings to modern protocol with integrated security.
0

Featured Post

3 Use Cases for Connected Systems

Our Dev teams are like yours. They’re continually cranking out code for new features/bugs fixes, testing, deploying, testing some more, responding to production monitoring events and more. It’s complex. So, we thought you’d like to see what’s working for us.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
How VPC help preventing STP Loops 4 101
AWS - HAProxy- KeepAlived 5 43
linux(debian) mouse poor performance 4 42
Linux mount of Windows Shared Now Fails 8 40
The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
Shadow IT is coming out of the shadows as more businesses are choosing cloud-based applications. It is now a multi-cloud world for most organizations. Simultaneously, most businesses have yet to consolidate with one cloud provider or define an offic…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

809 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question