Русский flag Русский

All Posts

Routing traffic from a local subnet through a remote server (IPIP + Policy Routing)

2025-10-29

This guide will show how to configure two Linux servers so that all the Internet traffic from a specific local subnet (for example, 10.100.10.0/24) is routed not via its default gateway but through an IPIP tunnel to a remote server, which will then put that traffic onto the Internet.

This is useful if you need services in one subnet to go out to the world with the IP address of another server — for example, to bypass restrictions, centralize NAT, or hide the source.

🌐 "Virtual address" between two MikroTik routers: when L2 connectivity is needed and how to do it correctly

2025-10-17

In today’s world of networking technologies, combining two remote offices into a single entity is a fairly routine task. Usually, L3 tunnels are used for this (for example, IPIP or IPsec). However, there are situations when simple routing is not enough and full L2 connectivity is required, as if remote devices were connected to the same switch.

Let’s figure out when this is necessary and how to configure such connectivity correctly so that it is not only working but also fault-tolerant.

curl for beginners: your first step into the world of HTTP requests

2025-09-08

Hello! If you’re even a little interested in the web, you’ve probably heard of curl. It’s a powerful and versatile command-line tool for interacting with web servers. It is used to send and receive data over various protocols: HTTP, FTP, SFTP, as well as mail protocols.

This guide is your first step. We’ll focus on the basics to help you understand how curl works and how to use it for everyday tasks.

VPNCloud: Building Your Private Network in the Cloud

2025-06-25

VPNCloud: Building Your Private Network in the Cloud

In a world where more and more services are moving to the cloud and remote work has become the norm, secure and private access to your resources is more important than ever. Traditional VPN services, while solving some problems, are often centralized and may not be the most flexible solution for creating your own secure network between multiple servers, devices, or even offices.