Solved

IP Tunnel (Advanced - mikrotik)

Posted on 2014-12-11
3
130 Views
Last Modified: 2015-04-07
we have a network topology as seen on the image.

we need to use zz.zz.zz.252 ip address on B side location but zz.zz.zz.0/24 added on A side


how should we do this ?

note : huaweii device is not under our control but ex4500 is ours
ex.png
0
Comment
Question by:Cahit Eyigunlu
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 6

Accepted Solution

by:
Nuttycomputer earned 500 total points
ID: 40494332
Your options are pretty limited, you can:

1. Re-IP the device that uses zz.zz.zz.252

2. Subnet the zz.zz.zz.0/24 range.

3. Hide the zz.zz.zz.0/24 behind a NAT so to the juniper ex 4500 it looks like aa.aa.aa.0/24

Is there a compelling reason that the zz.zz.zz.252 must have that address?
0
 

Author Comment

by:Cahit Eyigunlu
ID: 40494356
yes we have to do it because A location has 300Gbit ddos and B location has 300 Gbit ddos protection and on a server we are streaming sth. special which cannot be done failover or load balanced so it will use one ip from A and one ip from B


but how , now looking for a solution with EOIP
0
 

Author Closing Comment

by:Cahit Eyigunlu
ID: 40710811
Thank you
0

Featured Post

Get your Disaster Recovery as a Service basics

Disaster Recovery as a Service is one go-to solution that revolutionizes DR planning. Implementing DRaaS could be an efficient process, easily accessible to non-DR experts. Learn about monitoring, testing, executing failovers and failbacks to ensure a "healthy" DR environment.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

PRTG Network Monitor lets you monitor your bandwidth usage, so you know who is using up your bandwidth, and what they're using it for.
Make the most of your online learning experience.
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
Michael from AdRem Software outlines event notifications and Automatic Corrective Actions in network monitoring. Automatic Corrective Actions are scripts, which can automatically run upon discovery of a certain undesirable condition in your network.…

635 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question