gre tunnel explained
Most Relevant Content
MikroTik Site to Site GRE Tunnel Configuration with IPsec
VPN (Virtual Private Network) is a technology that provides a secure tunnel across a public network. A private network user can send and receive data to any remote private network using VPN Tunnel as if his/her network device was directly connected to that private network. MikroTik provides GRE (Generic Routing Encapsulation) tunnel that is used to create a site to site VPN tunnel. GRE tunneling protocol which can encapsulate a wide variety of protocols creating a virtual point-to-point link was originally developed by Cisco. GRE is a stateless tunnel like EoIP and IPIP. That means if the remote end of the tunnel goes down, all traffic that was routed over the tunnels will get blackholed. To solve this problem, RouterOS have added ‘keepalive’ feature for GRE tunnels. By default keepalive is set to 10 seconds and 10 retries. GRE adds an outer header mentioning the entry point of the tunnel (SourceIP) and the exit point of the tunnel (DestinationIP) but the inner packet is kept unmodified. GRE tunnel only encapsulates IP packets but does not provide authentication and encryption. GRE tunnel with IPsec ensures IP packet encapsulation as well as authentication and encryption. IPsec usage makes your packets secure but [...]
- »
How to Install VMware ESXi VMvisor on VMware Workstation | December 28, 2020
There is no doubt that VMware vSphere is the pioneer in virtualization world. Day by day IT infrastructure is converting to virtualization where VMware vSphere is providing more features than any other virtualization software. VMware ESXi is the foundation of VMware vSphere. VMware ESXi is a bare metal hypervisor. So, a physical server is required to install VMware ESXi. Physical servers are usually costly and beginners or researchers cannot always arrange such a high priced physical server to install ESXi [...]
- »
MikroTik HotSpot One to One NAT/Universal HotSpot NAT | September 27, 2020
MikroTik Hotspot is an awesome service that can be customized widely. When MikroTik Hotspot is enabled on an interface, it adds dynamic destination NAT rules which will redirect all HTTP and HTTPS requests from unauthorized users to the Hotspot authentication proxy. So, no user can get internet access in Hotspot network without authentication. MikroTik Hotspot also uses one to one NAT providing an IP address from selected IP Pool and this IP address handles user’s data and limitation. Sometimes we [...]
- »
MikroTik Port Forwarding using Winbox | July 23, 2018
MikroTik Port Forwarding or Port Mapping is a NAT application that is used to redirect a request from MikroTik IP address and port number combination to a local IP address and port number. For example, if you have a Web Server or FTP Server in your private/local area and want to access this local server from outside of your local area (from internet/public), you can apply MikroTik port forwarding or port mapping and can easily access your Web Server or [...]
- »
How to Block WiFi Access although Password is Known | April 23, 2024
We usually get internet connection from any ISP and buy any WiFi Router and then configure wireless/AP with password and configure DHCP Server to get connection from own WiFi devices. We use these WiFi Routers/APs at home, office, workspace or any other public places. Usually, we get connected to our WiFi using our provided WiFi password. Initially there will be no problem to keep your network safe using password authentication. But day by day your password will be known by [...]
- »
How to Properly Downgrade MikroTik RouterOS and Firmware | October 2, 2019
MikroTik RouterOS is in constant development and new features or bug fixes are frequently available, sometimes even monthly. So, it is always recommend upgrading MikroTik RouterOS to a latest and stable version before beginning any configuration. But sometimes you may face that the upgraded version is not working properly according to your demand or you may upgrade to a new version that you don’t want. In this case, you should come back to your workable RouterOS version and firmware. Upgrading RouterOS [...]
- »
Hardening MikroTik RouterOS by Limiting Login Services | February 6, 2021
MikroTik RouterOS is usually used as a bridge between WAN and LAN network. WAN network is always an insecure network because attackers always try to hack your RouterOS so that they can compromise it for their own benefit. As a network administrator of MikroTik RouterOS, we should always take anti hacking steps to secure our MikroTik RouterOS. There are a lot of security tasks those we should take care to secure our MikroTik RouterOS. Among these security tasks, we will [...]
- »
Port Based Apache Virtual Hosting on RHEL 7 | July 26, 2019
Virtual Hosting is a method of hosting multiple domains on single web server. If you have multiple domains (such as domain1.com, domain2.com and so on) and want to host on single web server, Virtual Hosting is your right choice. Apache web server provides an easy way to manage Virtual Hosting. Virtual Hosting can be Name Based, IP Based or Port Based. In Name Based Virtual Hosting, multiple domains can be hosted on single Server and single IP address. On the [...]
- »
Create System Restore Point in Windows OS | August 27, 2015
System Restore utility in windows operating system helps a windows user to take one or more snapshots of his/her windows system when windows operating system is working well. If any system crash occurs in future due to virus attack or critical system update or any unwanted program, the system can be reverted to its previous snapshot when windows OS was working well. So, System Restore utility in windows operating system is a very helpful service for windows users to protect [...]
- »
How to Block Tor Browser with MikroTik Router | June 12, 2019
Tor Browser is an alternative to VPN and Web Proxy that breaks blocking firewall rule. If any user installs and uses Tor Browser, he/she can hide the public IP address of router and can unblock blocked websites applied on a network. So, administrators should block Tor Nodes along with other blocking firewall rule. In my previous article, I discussed how to block VPN and Proxy access with MikroTik Router and in this article I will discuss how to block Tor [...]
You May Also Like