Wow cool.
On 10/19/2015 1:37 PM, Mathew Howard wrote:
Here we go - from the .30 changelog:
*) tunnels - eoip, eoipv6, gre,gre6, ipip, ipipv6, 6to4 tunnels
have new property - ipsec-secret - for easy setup of ipsec
encryption and authentication;
On Mon, Oct 19, 2015 at 12:34 PM, Mathew Howard <[email protected]
<mailto:[email protected]>> wrote:
I'm pretty sure you can use encryption with EoIP these days...
it's a fairly recent addition, if I remember right.
On Mon, Oct 19, 2015 at 12:29 PM, That One Guy /sarcasm
<[email protected] <mailto:[email protected]>> wrote:
So what is this doing?
*ipsec-secret* (/string/; Default: ) When secret is
specified, router adds dynamic ipsec peer to remote-address
with pre-shared key and policy with default values (by default
phase2 uses sha1/aes128cbc). Both local-address and
remote-address of the tunnel must be specified for router to
create valid ipsec policy.
On Mon, Oct 19, 2015 at 12:04 PM, Adam Moffett
<[email protected] <mailto:[email protected]>> wrote:
100% less secure. There's no encryption at all in EoIP.
On 10/19/2015 11:44 AM, That One Guy /sarcasm wrote:
in the mikrotik implementation with ipsec, how much less
"secure" than something like an ipsec VPN tunnel? For the
most part, since its all routed traffic anyway, security
isnt all that great a concern, other than maybe some snmp
strings I cant think of much that would matter
We do have an instance, Im assuming MPLS will be what
would be best, the customer has a 10mb ptp fiber
connection from another provider terminated in our NOC as
a backup to their DIA with us over our wireless
infrastructure, but I dont know, its all new to me
On Mon, Oct 19, 2015 at 8:54 AM, Adam Moffett
<[email protected] <mailto:[email protected]>> wrote:
EoIP is non-standard, and while multiple platforms
have it, they are probably not compatible.
The main reason to do EoIP is if you need the entire
layer2 header. I use it now and then to default a
device, then bridge it's port with an EOIP tunnel
back to my office so that I can access it from my
laptop on it's default IP.
You can also carry a full size 1500 byte packet on
the EoIP tunnel....it will be fragmented on the outer
layer so there's an efficiency penalty in doing so,
so if everything works with a shorter MTU then use a
shorter MTU. I switched a VPN to an EOIP tunnel for
a library whose SonicWall broke PMTUD and thus there
was packet loss on the tunneled traffic until I
switched them to EoIP.
The other reason to do EoIP is that it's stupid simple.
Downsides: EoIP is insecure. Supposedly it's more
cpu intensive than other types of tunnels, but in
practice I haven't noticed.
On 10/19/2015 2:28 AM, That One Guy /sarcasm wrote:
More interested in eoip comments, but when are
these two bad ideas, eoip with the ipsec in
particular.
I have two scenarios where eoip will be necessary
to maintain upstream static routing between
providers, one tunnel over the interwebs and one
tunnel over our network since our providers are
geographically isolated.
I'm having a hard time figuring out if eoip is up
and coming or dying, everything I read says its
new but the documents are old, mikrotik documents
indicate it's proprietary but Cisco docs mention it.
--
If you only see yourself as part of the team but
you don't see your team as part of yourself you
have already failed as part of the team.
--
If you only see yourself as part of the team but you don't see
your team as part of yourself you have already failed as part
of the team.