On Fri, Feb 10, 2012 at 12:29 PM, Pandu Poluan <pa...@poluan.info> wrote:
>
> On Feb 11, 2012 12:16 AM, "Michael Orlitzky" <mich...@orlitzky.com> wrote:
>>
>> On 02/10/12 11:46, Pandu Poluan wrote:
>> >
>> > On Feb 10, 2012 10:08 PM, "Mick" <michaelkintz...@gmail.com
>> > <mailto:michaelkintz...@gmail.com>> wrote:
>> >>
>> >> > >
>> >> > > The need: a VPN client that:
>> >> > > + can selectively send packets fulfilling a criteria (in this
>> > case, dest=
>> >> > > IP address of internal server)*
>> >>
>> >> As far as I know typical VPNs require the IP address (or FQDN) of the
>> >> VPN
>> >> gateway.  If yours changes because ISP A goes down then the tunnel
>> > will fail
>> >> and be torn down.
>>
>> I must have missed the original message. OpenVPN can do this. Just
>> specify multiple "remote vpn.example.com" lines in your client configs,
>> one for each VPN server.
>>
>> It also handles updating the routing table for you. Rather than match
>> "IP address of internal server," it will match "IP address on internal
>> network" and route through the VPN automatically.
>>
>
> I'm still torn between OpenVPN and HAproxy. The former works with both TCP
> and UDP, while the latter is lighter and simpler but works with TCP only*.
>
> *The traffic will be pure TCP, but who knows I might need a UDP tunnel in
> the future.
>
> Any experience with either?
>
> Do note that I don't actually need a strong security (e.g. IPsec); I just
> need automatic failover *and* fallback.

We're not using multiple internet connections to the same network
where I work, but we do use UDP-based OpenVPN to connect a few
networks.

TCP OpenVPN connections are very, very bad, IMO. With a TCP VPN, you
easily break systems' TCP stacks' link bandwidth estimation. I once
had a 30s ping time, because the pipe was hogged and backlogged from a
mail client synchronizing.

-- 
:wq

Reply via email to