Line 19: |
Line 19: |
| Connect to MikroTik by using '''WinBox''' application and press '''New Terminal'''. | | Connect to MikroTik by using '''WinBox''' application and press '''New Terminal'''. |
| | | |
− | [[File:]] | + | [[File:Networking_rutxxx_configuration_example_l2tp_ipsec_mikrotik_1_v1.jpg|border|class=tlt-border|center]] |
| | | |
| The first step is to create a PPP Profile on the MikroTik. Use a 192.168.102.1 for the local address (the VPN Gateway), assuming this is not already in use. You will also need to add a DNS Server. Use this command: | | The first step is to create a PPP Profile on the MikroTik. Use a 192.168.102.1 for the local address (the VPN Gateway), assuming this is not already in use. You will also need to add a DNS Server. Use this command: |
Line 53: |
Line 53: |
| Now go to '''IP > Firewall''' and change positions of the 2 Firewall rules you just created (drag it to the top like in the example) in order to move them, press '''#''' sign. | | Now go to '''IP > Firewall''' and change positions of the 2 Firewall rules you just created (drag it to the top like in the example) in order to move them, press '''#''' sign. |
| | | |
− | [[File:]] | + | [[File:Networking_rutxxx_configuration_example_l2tp_ipsec_mikrotik_2_v1.jpg|border|class=tlt-border|center]] |
| | | |
| ==RUT configuration== | | ==RUT configuration== |
Line 59: |
Line 59: |
| Access RUTxxx WebUI and go to '''Services > VPN > L2TP'''. There create a new configuration by selecting role '''Client'', writing '''New configuration name''' (anything you want) and pressing '''Add New''' button. It should appear after a few seconds. Then press '''Edit'''. | | Access RUTxxx WebUI and go to '''Services > VPN > L2TP'''. There create a new configuration by selecting role '''Client'', writing '''New configuration name''' (anything you want) and pressing '''Add New''' button. It should appear after a few seconds. Then press '''Edit'''. |
| | | |
− | [[File:]] | + | [[File:|border|class=tlt-border]] |
| | | |
| Then apply the following configuration. | | Then apply the following configuration. |
| | | |
− | [[File:]] | + | [[File:|border|class=tlt-border]] |
| | | |
| # '''Enable''' instance. | | # '''Enable''' instance. |
Line 74: |
Line 74: |
| Now go to '''Services > VPN > IPsec'''. | | Now go to '''Services > VPN > IPsec'''. |
| | | |
− | [[File:]] | + | [[File:|border|class=tlt-border]] |
| | | |
| # Write '''Pre-shared key''' (write the password which you created with this command /ip ipsec identity add generate-policy=port-override auth-method=pre-shared-key secret="password" peer=l2tpserver ). | | # Write '''Pre-shared key''' (write the password which you created with this command /ip ipsec identity add generate-policy=port-override auth-method=pre-shared-key secret="password" peer=l2tpserver ). |
Line 81: |
Line 81: |
| # When the interface appears like in the example, press '''Edit'''. | | # When the interface appears like in the example, press '''Edit'''. |
| | | |
− | [[File:]] | + | [[File:|border|class=tlt-border]] |
| | | |
| # '''Enable''' instance. | | # '''Enable''' instance. |
Line 94: |
Line 94: |
| Go to '''Status > Routes''' and in the '''Active IP Routes''' table you should see this new route: | | Go to '''Status > Routes''' and in the '''Active IP Routes''' table you should see this new route: |
| | | |
− | [[File:]] | + | [[File:|border|class=tlt-border]] |
| | | |
| Also, you can check whether '''IPsec''' is working by writing this command to CLI: | | Also, you can check whether '''IPsec''' is working by writing this command to CLI: |
Line 104: |
Line 104: |
| Security Associations (1 up, 0 connecting) | | Security Associations (1 up, 0 connecting) |
| | | |
− | [[File:]] | + | [[File:|border|class=tlt-border]] |