This seems to be a horrible complexe topic, with
much sensible information behind - the exact algorithm
seems to be much of a secret.
[…]
Am I completely wrong and there is much more magic
behind? Has somebody here an deep insight and might
share it with us?
It depends on a platform. For
Hey there.
Having a bunch of grief with site to site VPN on SRX220. This box connects
out on a GRE tunnel carrying voice traffic to one location along with a
couple of IPSec tunnels to other remote offices (2 at the moment).
Sometimes it works and sometimes it doesn't . I know that's a
On 21/01/12 03:48, Pavel Lunin wrote:
It depends on a platform. For M/MX/T the hashing algorithm is considered
to be a kind of business secret (said to be patented, etc). For EX it's
Just to make an important point, it's either a secret *or* it's
patented, part of the point of a patent is that
Hi Paul -
In my experience, I have used a looback interface address of the SRX as the
destination of the GRE tunnel on both sides then just send the /32 route of the
loopback at the other end to the st0.0 address. I've always used OSPF to carry
the routes over the tunnel. The only other
4 matches
Mail list logo