Skip to content

Application Note - IPFiber_L3

1. Introduction

The eSIX unique VPN tunneling technology can provide more efficient and reliable tunnels than legacy IPSec with up to 30% higher performance under the same eSIX hardware environment. The most beneficial is network and protocol agnostic and easy to build up.

Look into Figure 2, the devices are located at different networks and even regions. An end point could be created anywhere in the control center or deployed on cloud, the connected clients could be the TAP devices, VETH devices, and physical devices. Through wired or wireless networks like 4G/5G, the IPfiber tunnel is established as a virtual local LAN to bridge these devices in just milliseconds.

The tunnel is supported to build in Layer 3 and Layer 2, and is capable of package retransmission. For capacity and performance optimization, there could be multiple tunnels in Layer 3 for load balancing, in Layer 2 for local breakout, that are built for high availability redundancy as well as optimize the network resources. And all these professional setups could be done by the eSIX GUI by finger taps that IT free.

2. Configuration steps

Example topology

preparation in advance

This topology requires that the Client needs to communicate directly with the WAN port or WWAN port (cellular network port) of the server

Layer3

Create a tunnel listening port

Server:

Go to 'IPfiber > Settings > Properties ' on the left menu bar

Click 'ADD' under the 'service port' page to enter the port ADD page, enter the port number and click save

Tunnel configuration

Server:

Create Tunnel user:

Go to 'IPfiber > user' click 'ADD' to go to the tunnel user creation page

Select the local terminal node at' 1' in the figure, where a tunnel corresponds to a terminal node

Fill in the user name at' 2' in the figure for tunnel setup

Set the password in' 3'

After the completion of the settings click on the lower right corner to save

Client:

Build a tunnel:

Try pinging the Wan Port Ip on the Server side first on the Client side. Once you have ensured that the IP is accessible, you can follow the following steps to build the tunnel

Go to 'IPfiber > connection' and click 'ADD' to go to the tunnel creation page

Fill in the tunnel name at' 4' in the figure

Select the local terminal node at' 5' in the figure

Fill in the WAN port address on the server side at' 6' in the figure

In Figure 7, enter the server listening port

Fill in the terminal node on the server side and the corresponding user name at' 8' and' 9' in the figure

In figure 10, enter the password for the server user name

Once you have completed all of this, click save to see the tunnel already built, and the tunnel is in (open/online) state

If the server IP is accessible, the port is confirmed to be open, and the tunnel state is still not online, then go into 'network > Firewall' on the server side and Client side respectively to try to open the firewall wan zone inbound data

Server & Client:

On the 'IPfiber > Settings > interface binding' page, you can see that the system has preset 16 terminal nodes and their virtual interfaces

Note: The virtual interface for this page corresponds to a network device with the name“Tap” in the 'network > interface > devices' page, as shown below

A bridge device named IPF00X is a virtual bridge containing a network device named TAP, not a virtual interface

In the service configuration, the user only needs to put the physical interface which has the service traffic into the corresponding network bridge device, and then the service traffic can be introduced into the tunnel.