ough routing on a linux
box,
> but cannot recall where I last read about it.
>
>
> > > Can anyone point me to the right direction re: what package and the
> > > relevant howto?
> > >
> > > Thanks in advance.
> >
> > I have been doing some research, an
ess of internal server)*
> + has automatic failover and failback ability
>
> *solutions involving iptables and iproute2 are also acceptable
>
> Can anyone point me to the right direction re: what package and the relevant
> howto?
>
> Thanks in advance.
>
I have been doing some researc
d iproute2 are also acceptable
I am convinced that you can do that by clever enough routing on a linux box,
but cannot recall where I last read about it.
> > Can anyone point me to the right direction re: what package and the
> > relevant howto?
> >
> > Thanks in advance
oxy daemon like net-misc/stone or net-proxy/haproxy.
--
Mike Kazantsev // fraggod.net
signature.asc
Description: PGP signature
gt; >> and be torn down.
>> >>
>> >> I must have missed the original message. OpenVPN can do this. Just
>> >> specify multiple "remote vpn.example.com" lines in your client configs,
>> >> one for each VPN server.
>> >>
>&g
teway. If yours changes because ISP A goes down then the tunnel
> >> > will fail
> >> >> and be torn down.
> >>
> >> I must have missed the original message. OpenVPN can do this. Just
> >> specify multiple "remote vpn.example.com" l
On 02/10/12 13:05, Pandu Poluan wrote:
>
> No, no, no. What I meant was running TCP and UDP *on top of* OpenVPN
> (which uses UDP).
>
> HAproxy seems to be able to perform its magic with TCP connections.
>
I was about to say that we use it over UDP, but... we don't. We
ome in, the water is, well, very wet and wild!
[1] https://github.com/AnsibleShipyard/ansible-mesos
https://github.com/mhamrah/ansible-mesos-playbook
http://blog.michaelhamrah.com/2014/06/setting-up-a-multi-node-mesos-cluster-running-docker-haproxy-and-marathon-with-ansible/
http://ops-school.rea
for each VPN server.
>
> It also handles updating the routing table for you. Rather than match
> "IP address of internal server," it will match "IP address on internal
> network" and route through the VPN automatically.
>
I'm still torn between OpenVPN and
should
work just out of the box with a trivial configutation efforts). Thus it's
important use some subsets of 127.0.0.0/8 network for that.
I have just been advised to look at net-misc/stone or net-proxy/haproxy (thanks
to has been adviced), but I'm not sure that this will work like DNAT.
s/topgit-0.9
net-analyzer/nagios-check_ipmi_sensor-3.1
net-analyzer/nagios-check_ipmi_sensor-3.2
net-analyzer/nagstamon-1.0.1
net-dns/bind-9.10.3_p2
net-dns/bind-9.10.3_p4
net-dns/bind-tools-9.10.1_p1
net-dns/bind-tools-9.10.3_p2
net-dns/bind-tools-9.10.3_p4
net-misc/cfengine-2.2.10-r4
net-misc/
s route push if you dont need complex dynamic routing - this works
better than ospf on bad links anyway.
BillK
On 11/02/2012, at 2:36, Michael Orlitzky wrote:
> On 02/10/12 13:05, Pandu Poluan wrote:
>>
>> No, no, no. What I meant was running TCP and UDP *on top of* OpenVPN
>&
nd) by the same apache.
http://httpd.apache.org/docs/2.2/mod/mod_rewrite.html
Also I think it's worth mentioning that apache isn't well suited for
such a tasks if both local and remote targets get similar load - lite
frontend server or reverse proxy (like nginx, lighttpd, squid, haproxy
etc) s
have missed the original message. OpenVPN can do this. Just
>> specify multiple "remote vpn.example.com" lines in your client configs,
>> one for each VPN server.
>>
>> It also handles updating the routing table for you. Rather than match
>> "IP address of
14 matches
Mail list logo