Here we go - from the .30 changelog:

*) tunnels - eoip, eoipv6, gre,gre6, ipip, ipipv6, 6to4 tunnels
   have new property - ipsec-secret - for easy setup of ipsec
   encryption and authentication;

On Mon, Oct 19, 2015 at 12:34 PM, Mathew Howard <mhoward...@gmail.com>
wrote:

> I'm pretty sure you can use encryption with EoIP these days... it's a
> fairly recent addition, if I remember right.
>
> On Mon, Oct 19, 2015 at 12:29 PM, That One Guy /sarcasm <
> thatoneguyst...@gmail.com> wrote:
>
>> So what is this doing?
>>
>> *ipsec-secret* (*string*; Default: )When secret is specified, router
>> adds dynamic ipsec peer to remote-address with pre-shared key and policy
>> with default values (by default phase2 uses sha1/aes128cbc). Both
>> local-address and remote-address of the tunnel must be specified for router
>> to create valid ipsec policy.
>>
>> On Mon, Oct 19, 2015 at 12:04 PM, Adam Moffett <dmmoff...@gmail.com>
>> wrote:
>>
>>> 100% less secure.  There's no encryption at all in EoIP.
>>>
>>>
>>> On 10/19/2015 11:44 AM, That One Guy /sarcasm wrote:
>>>
>>> in the mikrotik implementation with ipsec, how much less "secure" than
>>> something like an ipsec VPN tunnel? For the most part, since its all routed
>>> traffic anyway, security isnt all that great a concern, other than maybe
>>> some snmp strings I cant think of much that would matter
>>>
>>> We do have an instance, Im assuming MPLS will be what would be best, the
>>> customer has a 10mb ptp fiber connection from another provider terminated
>>> in our NOC as a backup to their DIA with us over our wireless
>>> infrastructure, but I dont know, its all new to me
>>>
>>> On Mon, Oct 19, 2015 at 8:54 AM, Adam Moffett <dmmoff...@gmail.com>
>>> wrote:
>>>
>>>> EoIP is non-standard, and while multiple platforms have it, they are
>>>> probably not compatible.
>>>>
>>>> The main reason to do EoIP is if you need the entire layer2 header. I
>>>> use it now and then to default a device, then bridge it's port with an EOIP
>>>> tunnel back to my office so that I can access it from my laptop on it's
>>>> default IP.
>>>>
>>>> You can also carry a full size 1500 byte packet on the EoIP
>>>> tunnel....it will be fragmented on the outer layer so there's an efficiency
>>>> penalty in doing so, so if everything works with a shorter MTU then use a
>>>> shorter MTU.  I switched a VPN to an EOIP tunnel for a library whose
>>>> SonicWall broke PMTUD and thus there was packet loss on the tunneled
>>>> traffic until I switched them to EoIP.
>>>>
>>>> The other reason to do EoIP is that it's stupid simple.
>>>>
>>>> Downsides: EoIP is insecure.  Supposedly it's more cpu intensive than
>>>> other types of tunnels, but in practice I haven't noticed.
>>>>
>>>>
>>>>
>>>> On 10/19/2015 2:28 AM, That One Guy /sarcasm wrote:
>>>>
>>>>>
>>>>> More interested in eoip comments, but when are these two bad ideas,
>>>>> eoip with the ipsec in particular.
>>>>> I have two scenarios where eoip will be necessary to maintain upstream
>>>>> static routing between providers, one tunnel over the interwebs and one
>>>>> tunnel over our network since our providers are geographically isolated.
>>>>> I'm having a hard time figuring out if eoip is up and coming or dying,
>>>>> everything I read says its new but the documents are old, mikrotik
>>>>> documents indicate it's proprietary but Cisco docs mention it.
>>>>>
>>>>>
>>>>
>>>
>>>
>>> --
>>> If you only see yourself as part of the team but you don't see your team
>>> as part of yourself you have already failed as part of the team.
>>>
>>>
>>>
>>
>>
>> --
>> If you only see yourself as part of the team but you don't see your team
>> as part of yourself you have already failed as part of the team.
>>
>
>

Reply via email to