Solved

IP Tunnel (Advanced - mikrotik)

Posted on 2014-12-11
3
112 Views
Last Modified: 2015-04-07
we have a network topology as seen on the image.

we need to use zz.zz.zz.252 ip address on B side location but zz.zz.zz.0/24 added on A side


how should we do this ?

note : huaweii device is not under our control but ex4500 is ours
ex.png
0
Comment
Question by:Cahit Eyigunlu
  • 2
3 Comments
 
LVL 6

Accepted Solution

by:
Nuttycomputer earned 500 total points
ID: 40494332
Your options are pretty limited, you can:

1. Re-IP the device that uses zz.zz.zz.252

2. Subnet the zz.zz.zz.0/24 range.

3. Hide the zz.zz.zz.0/24 behind a NAT so to the juniper ex 4500 it looks like aa.aa.aa.0/24

Is there a compelling reason that the zz.zz.zz.252 must have that address?
0
 

Author Comment

by:Cahit Eyigunlu
ID: 40494356
yes we have to do it because A location has 300Gbit ddos and B location has 300 Gbit ddos protection and on a server we are streaming sth. special which cannot be done failover or load balanced so it will use one ip from A and one ip from B


but how , now looking for a solution with EOIP
0
 

Author Closing Comment

by:Cahit Eyigunlu
ID: 40710811
Thank you
0

Featured Post

Portable, direct connect server access

The ATEN CV211 connects a laptop directly to any server allowing you instant access to perform data maintenance and local operations, for quick troubleshooting, updating, service and repair.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Microservice architecture adoption brings many advantages, but can add intricacy. Selecting the right orchestration tool is most important for business specific needs.
Shadow IT is coming out of the shadows as more businesses are choosing cloud-based applications. It is now a multi-cloud world for most organizations. Simultaneously, most businesses have yet to consolidate with one cloud provider or define an offic…
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

808 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question