how to bridge private two lans with eoip

Most Relevant Content

  • MikroTik EoIP Tunnel for Bridging LANs over the Internet

    VPN (Virtual Private Network) is a technology that provides a secure tunnel across a public network. A private network user can send and receive data to any remote private network using VPN Tunnel as if his/her network device was directly connected to that private network. MikroTik provides EoIP (Ethernet over IP) that is used to create a site to site VPN tunnel. EoIP tunneling is a MikroTik RouterOS protocol that creates an Ethernet tunnel between two MikroTik Routers on top of an IP connection. So, EoIP Tunnel can be used to communicate with remote LANs across public network using static routing configuration. EoIP Tunnel can also be used to bridge LANs over the Internet that means LAN IP can be assigned to a remote area network using EOIP Tunnel. The goal of this article is to design an EoIP VPN tunnel that will be used to bridge LANs over the internet. So, in this article I will show how to create an EoIP VPN tunnel between two MikroTik Routers and how to use this VPN tunnel to bridge LANs for keeping in the same layer2 broadcast domain over the internet. Network Diagram To configure a site to site EoIP VPN [...]

    READ MORE »

  • You May Also Like

  • »

    MikroTik Site to Site GRE Tunnel Configuration with IPsec |   March 26, 2018

    VPN (Virtual Private Network) is a technology that provides a secure tunnel across a public network. A private network user can send and receive data to any remote private network using VPN Tunnel as if his/her network device was directly connected to that private network. MikroTik provides GRE (Generic Routing Encapsulation) tunnel that is used to create a site to site VPN tunnel. GRE tunneling protocol which can encapsulate a wide variety of protocols creating a virtual point-to-point link was [...]

    READ MORE »

  • »

    User Management in Linux (Red Hat/CentOS) |   September 28, 2017

    User management is an important part of Linux (especially Red Hat Enterprise Linux) system administration. Linux users can be administrated using user or group administration GUI (Graphical User Interface) tool as well as through Red Hat/CentOS Linux command prompt. But I will always suggest you to do command line user administration as much as possible because in production GUI will not be provided always. Many people who are learning Linux administration do not know all features of user administration command [...]

    READ MORE »

  • »

    MikroTik Hotspot Auto Login by MAC Address |   July 1, 2020

    Hotspot is an awesome service in MikroTik Router. MikroTik Hotspot is popularly used in ISP, Hotel, Airport, Coffee Shop, Enterprise office and many other organizations. By default MikroTik Hotspot uses HTTP CHAP login method where user must provide username and password to get internet service. Sometimes we may face that some users are not eager to provide username and password to get internet service or we cannot ask some users to put username and password to get internet due to [...]

    READ MORE »

  • »

    MikroTik Block Website (Facebook, YouTube and Other Sites) |   October 12, 2017

    MikroTik Firewall is a powerful security tool that can be used to block unwanted websites. If you are a network administrator, sometimes it may be your requirement to block any website like Facebook, YouTube, Pornographic site and so on. To block these types of websites, you just need to create Firewall Rules that will drop any connection to these websites through your MikroTik Router. MikroTik Firewall basic concept such as what is MikroTik Firewall, what is MikroTik Firewall Rule, how [...]

    READ MORE »

  • »

    How to Block VPN Access with MikroTik Router |   May 14, 2019

    Sometimes system administrators create firewall rule to block unwanted websites. But VPN apps break these firewall rules and allow access to unwanted websites. For example, if Facebook is blocked with MikroTik Firewall and any expert user installs and enables VPN apps (such as OpenVPN, Hotspot Shield, ProtonVPN, NordVPN, PureVPN etc.), he can easily get access to Facebook. So, system administrators should also block popular VPN apps so that user cannot use those VPN servers. Blocking VPN apps is not so [...]

    READ MORE »

  • »

    MikroTik Radius Configuration with FreeRADIUS |   December 7, 2018

    FreeRADIUS is a high performance RADIUS suite that provides authentication, authorization and accounting facility for a large number of network devices including MikroTik Router. Although MikroTik has user manager RADIUS service to provide authentication, authorization and accounting facility but it is not free for customization and not suitable for medium to large organization. On the other hand, freeRADIUS is free for customization according to your organization requirements. But freeRADIUS has to be customized by you. In my previous article, I [...]

    READ MORE »

  • »

    What Are the 7 Layers of OSI Model and How Do They Work |   October 5, 2021

    The OSI Model stands for Open Systems Interconnection Model, a conceptualized framework used to describe the seven layers of a telecommunication system or network. It was established as an international standard in the year 1984 by the International Organization for Standardization. This model helps visualize how networks operate and is still used today to figure out and solve network problems, such as by a web development company. In this article, we will talk about the 7 layers of the OSI [...]

    READ MORE »

  • »

    MikroTik Hardware Redundancy with VRRP |   October 8, 2018

    MikroTik VRRP (Virtual Router Redundancy Protocol) ensures high availability internet network. If any organization requires uninterrupted internet connection, MikroTik VRRP implementation will be a vital solution for them. MikroTik VRRP creates a virtual router accumulating two or more physical routers and ensures uninterrupted internet connection keeping activate one physical router always. That means, if any physical router fails to operate due to any hardware failure, MikroTik VRRP uses another backup router for internet gateway until the running router comes back [...]

    READ MORE »

  • »

    MikroTik Unequal Dual WAN Load Balancing with Failover using ECMP |   September 15, 2019

    MikroTik Router is capable of doing Load Balancing with Failover over multiple gateways. Policy Based Routing, ECMP, PCC and NTH Load Balancing are the popular load balancing methods in MikroTik Router. Among these methods, ECMP is so easy to configure and provides almost 100% load balancing and link redundancy solution. In my previous article, I discussed how to configure Load Balancing and Link Redundancy using ECMP over two equal bandwidth gateways. ECMP method is also capable of doing load balancing [...]

    READ MORE »