2025-10-16
The EoIP (Ethernet over IP) protocol from MikroTik is used to create an L2 tunnel over an IP network, allowing you to combine two remote local networks into a single broadcast domain.
If your EoIP tunnel does not …
Read more2025-09-16
Introduction Up to this point, we’ve used simple utilities for specific tasks:
ping checked connectivity, traceroute showed the path, ipconfig and arp helped with the local network, telnet and nc tested ports. That’s …
Read more2025-09-15
Introduction A server’s IP address is like the postal address of an apartment building. But to reach the right apartment, you need the door number. In networking, these doors are ports.
HTTP runs on port 80. HTTPS — on …
Read more2025-09-14
Introduction You’ve gone through all the checks from the previous articles:
The computer has the correct IP address (ipconfig). The router responds (ping 192.168.1.1). Ping to a public address (ping 8.8.8.8) works. Looks …
Read more2025-09-13
Introduction In the previous article, we learned how to reach out to remote servers using ping and trace the path of packets with traceroute. But what if ping google.com doesn’t work, and traceroute stops right at the …
Read more2025-08-27
The Problem with Certificates at Scale In previous articles, we discussed that OpenVPN uses certificates for authentication. This method is reliable but has significant drawbacks:
Inconvenience for users: Each user must …
Read more2025-08-26
VPN: Not Just an “On” Button For many users, a VPN is simply an “On” button. However, when it comes to building your own secure tunnel, it’s important to understand its architecture. OpenVPN is …
Read more2025-08-25
OpenVPN: A Time-Tested Standard Introduction In a world where the speed and simplicity of WireGuard have become the new standard, OpenVPN remains one of the most reliable and flexible VPN protocols. It works both on …
Read more2025-08-23
When Control Matters Most Services like Tailscale and NetBird are convenient, but they rely on a third-party control server responsible for authentication, key distribution, and route exchange. For those who, for …
Read more2025-08-22
When Zero-config VPN Means More Than Just Tailscale Although Tailscale has become the benchmark for simplicity, it’s not the only player in the Zero-config VPN field. ZeroTier and NetBird offer similar functionality but …
Read more