User's Manual
Advanced Configuration
Figure 5-89 An Example: Tunnel Configuration
Lets say that the Computer with an IP address: 10.0.0.1 wants to communicate with the Computer with an IP address:
192.168.9.101. Since there is no native routing path between these two computers, the communication can happen via the tunnel.
The SU1device with wireless IP address: 20.0.0.132 and SU2 device with wireless IP address: 30.0.0.132 are the end points of the
tunnel, respectively.
With IP tunneling, the tunnel entry point (SU1) encapsulates the tunnel end points IP addresses (20.0.0.132 + 30.0.0.132) with
the sender IP addresses (10.0.0.1 + 192.168.9.101) before sending the data through the tunnel. When the tunnel exit point (SU2)
receives traffic, it removes the outer IP header before forwarding the packet to the recipient.
IP Packet
Sender Source IP (10.0.0.1) Recipient IP (192.168.9.101)
Tunneled IP Packet
(Inner IP Header) (Outer IP Header)
Sender Source IP Recipient IP Tunnel Entry Point IP Tunnel Exit Point IP
(10.0.0.1) (192.168.9.101) (20.0.0.132) (30.0.0.132)
: IP tunnel establishment does not involve any protocol message exchange. To setup an IP tunnel, the device has to be
configured properly on both the ends.
By following the steps below, the tunnel is automatically established.
1. Create a tunnel (Refer to Create a Tunnel)
To create a tunnel as given in Figure 5-89, do the following: SU1
Configuration
— Virtual IP Address = 50.0.0.1
— Local IP Address = 20.0.0.132
Tsunami® 8100 Series - Software Management Guide 143