Hi,

>>>
>>> Let's go super simple.
>>> Existing setup:
>>> ISP#1------A------ISP#2
>>> A has a /30 on each side
>>> A has a /29 routed to it from ISP#1
>>>
>>> Desired setup:
>>> ISP#1--A--ISP#2---------MyISP---B
>>> ALL traffic to A via ISP#1 is to go to B
>>> ALL replies to return via A
>>> B will handle A's /29
>>> A should just be a "lump in the pipe"
>>> Translation of addresses en route is fine as long as connections from
>>> the cloud intended for A get to B and responses get back looking like
>>> the real thing.
> So I setup a gre tunnel a la the manpage example.
> But how does the traffic coming from ISP#1 get to be treated properly
> at B?
> And replied to without the sender seeing that it's from a foreign
> destination?
> And will the /29 arrive at B ready to route to local hosts?

If i really understood it, what you want/need is.

- create a vpn between A and B
- A must have a route that says that <Behind B network> should go thru VPN
- A must have a NAT rule that says that <IP to /29> should be
translated to <Behind B network IP> [1]
- B must have a default route that route packets from <Behind B
network IP> thru VPN

I have done this with, err.. other OS. Anyway should be even easier
with openbsd. Not really sure about this but from the perspective of a
external viewer the only difference should be the TTL from packets
coming from A and B, but even that could be masked.

[1] not really necessary... if you are going to use /29 behind B. In
this case <behind B network> = A /29
-- 
Christian Lyra
PoP-PR/RNP

Reply via email to