Cleight, the only virus I've gotten in over ten years was when I clicked on an infected picture file here in the User BB six years ago. [:O] The best way to attach pictures here is to click on [Go Advanced].
Based on your description, I would use Static Routing, Uplink Balancing with Multipathing, Uplink Monitoring and an IPsec VPN.
For example, in the Primary site:
Except for the last two steps, do the complementary config on the other side. Note that there are thus three different VPN tunnels created; one lets Primary get to the world via the Secondary's WAN connection, another lets Secondary get to the world via the Primary's WAN connection and the third allows the two sites to communicate with each other if the PTP is down. Any luck with that?
Cheers - Bob
Cleight, the only virus I've gotten in over ten years was when I clicked on an infected picture file here in the User BB six years ago. [:O] The best way to attach pictures here is to click on [Go Advanced].
Based on your description, I would use Static Routing, Uplink Balancing with Multipathing, Uplink Monitoring and an IPsec VPN.
For example, in the Primary site:
Except for the last two steps, do the complementary config on the other side. Note that there are thus three different VPN tunnels created; one lets Primary get to the world via the Secondary's WAN connection, another lets Secondary get to the world via the Primary's WAN connection and the third allows the two sites to communicate with each other if the PTP is down. Any luck with that?
Cheers - Bob
Cleight, the only virus I've gotten in over ten years was when I clicked on an infected picture file here in the User BB six years ago. [:O] The best way to attach pictures here is to click on [Go Advanced].
Based on your description, I would use Static Routing, Uplink Balancing with Multipathing, Uplink Monitoring and an IPsec VPN.
For example, in the Primary site:Gateway Route {192.168.1.0/24} -> 10.10.10.3
- Firewall rule: Allow : {192.168.0.0/22} -> Any -> Any
- Activate Uplink Balancing with PTP WAN and External WAN
- Add 10.10.10.3 as Default gateway to the PTP WAN interface
- Create a Multipath Rule: {192.168.2.0/24} -> Any -> Internet : Bind to External WAN interface
- Create an IPsec VPN : 192.168.2.0/24=10.10.10.110.10.10.3=Internet and do not enable it
- Set Uplink Monitoring to enable the VPN if the ISP is down
Do the complementary config on the other side. Note that there are thus two different VPN tunnels created; one lets Primary get to the world via the Secondary's WAN connection and the other lets Secondary get to the world via the Primary's WAN connection. Any luck with that?
Cheers - Bob