Solved

IP Tunnel (Advanced - mikrotik)

Posted on 2014-12-11
3
102 Views
Last Modified: 2015-04-07
we have a network topology as seen on the image.

we need to use zz.zz.zz.252 ip address on B side location but zz.zz.zz.0/24 added on A side


how should we do this ?

note : huaweii device is not under our control but ex4500 is ours
ex.png
0
Comment
Question by:Cahit Eyigunlu
  • 2
3 Comments
 
LVL 6

Accepted Solution

by:
Nuttycomputer earned 500 total points
ID: 40494332
Your options are pretty limited, you can:

1. Re-IP the device that uses zz.zz.zz.252

2. Subnet the zz.zz.zz.0/24 range.

3. Hide the zz.zz.zz.0/24 behind a NAT so to the juniper ex 4500 it looks like aa.aa.aa.0/24

Is there a compelling reason that the zz.zz.zz.252 must have that address?
0
 

Author Comment

by:Cahit Eyigunlu
ID: 40494356
yes we have to do it because A location has 300Gbit ddos and B location has 300 Gbit ddos protection and on a server we are streaming sth. special which cannot be done failover or load balanced so it will use one ip from A and one ip from B


but how , now looking for a solution with EOIP
0
 

Author Closing Comment

by:Cahit Eyigunlu
ID: 40710811
Thank you
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

How to set-up an On Demand, IPSec, Site to SIte, VPN from a Draytek Vigor Router to a Cyberoam UTM Appliance. A concise guide to the settings required on both devices
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

919 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now