gre tunnel explained
Most Relevant Content
MikroTik Site to Site GRE Tunnel Configuration with IPsec
VPN (Virtual Private Network) is a technology that provides a secure tunnel across a public network. A private network user can send and receive data to any remote private network using VPN Tunnel as if his/her network device was directly connected to that private network. MikroTik provides GRE (Generic Routing Encapsulation) tunnel that is used to create a site to site VPN tunnel. GRE tunneling protocol which can encapsulate a wide variety of protocols creating a virtual point-to-point link was originally developed by Cisco. GRE is a stateless tunnel like EoIP and IPIP. That means if the remote end of the tunnel goes down, all traffic that was routed over the tunnels will get blackholed. To solve this problem, RouterOS have added ‘keepalive’ feature for GRE tunnels. By default keepalive is set to 10 seconds and 10 retries. GRE adds an outer header mentioning the entry point of the tunnel (SourceIP) and the exit point of the tunnel (DestinationIP) but the inner packet is kept unmodified. GRE tunnel only encapsulates IP packets but does not provide authentication and encryption. GRE tunnel with IPsec ensures IP packet encapsulation as well as authentication and encryption. IPsec usage makes your packets secure but [...]
- »
Download YouTube Video with Firefox Add-ons | August 26, 2015
YouTube is the most popular video sharing website. Statistics shows that YouTube is the second popular website of the world. So, it is nothing to say that you are a YouTube fan like me. As a YouTube fan, sometimes you may need to download YouTube videos which you like. Although, you often get an extra bandwidth for YouTube video streaming from your ISP now a days so that you can watch your favorite YouTube video without any buffering. But it [...]
- »
How to Assign VMware ESXi License Key | December 4, 2021
No doubt VMware is the pioneer in virtualization world. VMware can be used either premium or free based on licensing. In the previous article, I discussed how to install VMware ESXi on a physical server or machine and then I also discussed how to get VMware ESXi free license from VMware website. Getting VMware ESXi license key either premium or free, we may sometimes get confused how to assign the license key in VMware ESXi host. So, in this article [...]
- »
MikroTik Send Browsing Log to Remote Syslog Server | August 18, 2019
MikroTik RouterOS is capable of logging various system events as well as user browsing information. Logs can be saved in router’s memory (RAM), disk, file, sent by email or even sent to remote syslog server. Sometimes it may require saving user browsing log by the law. So, a syslog server is an essential part to any network. In this article, I will discuss how to configure MikroTik Router to keep user browsing log and send that log to remote syslog [...]
- »
How to Buy a Good WiFi Router for Home or Office | October 12, 2021
You are here because you want to buy a WiFi Router and want to know how to buy a good WiFi Router for your home or office or business. A lot of wireless routers are nowadays available in the market. But before buying a WiFi Router, you should know which one is a good WiFi Router for your need based on some features and specifications of the router. We will now see some key points those should have well understand [...]
- »
Install MikroTik RouterOS on PC | June 13, 2016
MikroTik is a popular and mostly used router worldwide because of having a lot of networking functionalities and its cheap price. If we buy a MikroTik Routerboard (like MikroTik Routerboard 450G, MikroTik Routerboard 1100 AH etc.), we will find a machine where MikroTik RouterOS is prebuilt but the machine contains limited processing resources such as limited RAM and limited processor core. So, our network could be slow if you use a MikroTik RouterBoard for maintaining a large network. On the [...]
- »
MikroTik Site to Site VPN Configuration with IPsec | March 8, 2018
VPN (Virtual Private Network) is a technology that provides a secure and encrypted tunnel across a public network. A private network user can send and receive data to any remote private network using this VPN Tunnel as if his/her network device was directly connected to that private network. Site to Site VPN technique establishes a secure tunnel between two routers across public network and local networks of these routers can send and receive data through this VPN tunnel. MikroTik RouterOS [...]
- »
How to Block NetShare Changing MikroTik TTL | April 19, 2024
Internet user can easily share their net connection to others using their smart phone or Laptop creating Hotspot. Smart phone users especially Android users by default get a net sharing app named Mobile Hotspot to share his net connection to others. Besides Mobile Hotspot, there are many Android Apps like NetShare those can be used to share net connection to others. Sharing net connection to others or friends is a good feature in Smart phone but sometimes users misuse this [...]
- »
Computer Network Topology Outline | September 12, 2017
The first thing that has to study about a network is its physical shape or design layout. It will be extremely important when a wiring scheme and design are selected for a new network installation. Actually Network Topology refers to physical shape or design layout of a network. Network topology determines how different nodes in a network are connected and how these nodes communicate to each other. Types of Computer Network Topology Network really has two shapes or two types [...]
- »
Turn Computer into Wi-Fi Hotspot | September 17, 2015
Internet Connection Sharing is an awesome feature in windows operating system. Using this feature, you can turn your computer which has wireless network card integrated into Wi-Fi hotspot and share your internet connection with your friends or family members. Generally, each laptop has a wireless network card integrated by default. So, if you are a laptop user, you can turn your laptop into Wi-Fi hotspot so easily. If you are a Desktop user, you can also turn your desktop as [...]
You May Also Like