On Thu, Feb 9, 2012 at 10:48 PM, Pandu Poluan <pa...@poluan.info> wrote:
> Scenario: I have a server in the cloud that needs to connect to an internal
> server in the office. There are 2 incoming connections into my office, ISP
> "A" and ISP "B". The primary connection is A, but if A goes down, we can use
> B. The app running on the cloud server has no automatic failover ability
> (i.e., if A goes down, someone must change the app's conf to point to B).
>
> My thought: If I can make a tunnel from the server to the FortiGate firewall
> currently guarding the HQ, the cloud app can simply be configured to connect
> to the internal IP address of the internal server. No need to manually
> change the app's conf.
>
> The need: a VPN client that:
> + can selectively send packets fulfilling a criteria (in this case, dest= IP
> address of internal server)*
> + has automatic failover and failback ability
>
> *solutions involving iptables and iproute2 are also acceptable
>
> Can anyone point me to the right direction re: what package and the relevant
> howto?
>
> Thanks in advance.
>
> Rgds,

Not exactly what you're looking for, but this might help:

http://www.ntop.org/products/n2n/

That would set up reliable visibility on layer 2. You probably want to
employ something like 802.1x on top of it.
-- 
:wq

Reply via email to