Template:Networking rutos configuration example l2tp over ipsec android: Difference between revisions
| Line 69: | Line 69: | ||
===IPsec=== | ===IPsec=== | ||
---- | |||
<table class="nd-othertables_2"> | |||
<tr> | |||
<th width=355; style="border-bottom: 1px solid white;></th> | |||
<th width=790; style="border-bottom: 1px solid white;" rowspan=2> | |||
[[File:Networking_rutos_configuration_example_l2tp_over_ipsec_android_3_v1.png|770px|right]]</th> | |||
</tr> | |||
<tr> | |||
<td style="border-bottom: 1px solid white> | |||
Go to the '''Services → VPN → IPsec''' page and do the following: | |||
<ol> | |||
<li>Enter a custom '''Name''' for the IPsec instance.</li> | |||
<li>Click the '''Add''' button.</li> | |||
<li>Click the '''Edit''' button next to the newly created instance.</li> | |||
</ol> | |||
</td> | |||
</tr> | |||
</table> | |||
---- | |||
<table class="nd-othertables_2"> | |||
<tr> | |||
<th width=355; style="border-bottom: 1px solid white;></th> | |||
<th width=790; style="border-bottom: 1px solid white;" rowspan=2> | |||
[[File:Networking_rutos_configuration_example_l2tp_over_ipsec_android_4_v1.png|770px|right]]</th> | |||
</tr> | |||
<tr> | |||
<td style="border-bottom: 1px solid white> | |||
In the '''IPsec Configuration''' page, do the following (and leave the rest as defaults, unless your specific configuration requires otherwise): | |||
<ol> | |||
<li>'''Enable''' the instance.</li> | |||
<li>Enter your '''Pre-shared key'''.</li> | |||
<li>Select '''Type: Transport'''.</li> | |||
<li>Set '''DH group''' to '''MODP1024'''.</li> | |||
<li>Go to '''Phase 2''' settings and also set '''DH group''' to '''MODP1024'''.</li> | |||
<li>'''Save''' changes.</li> | |||
</ol> | |||
</td> | |||
</tr> | |||
</table> | |||
===Firewall=== | |||
---- | ---- | ||
Revision as of 09:55, 26 May 2020
|
|
|
|---|---|
|
|
Configuration overview and prerequisites
Prerequisites:
- One RUTX router of any type
- A Public Static or Public Dynamic IP address
- At least one Android device
The topology above depicts the L2TP/IPsec scheme. - The router with the Public IP address (RUTX11) acts as the L2TP/IPsec server and the Android device acts as client. L2TP connects the networks of RUTX11 and Android client, IPsec provides the encryption for the L2TP tunnel. Created VPN tunnel will allow Android device to reach home network behind the RUTX11 router, but the rest of Android device network traffic will not be redirected through VPN. This way the VPN tunnel will not be under a huge load and will provide greater speeds.
When the scheme is realized, you will be able to reach your home internal network with all internal systems, cameras, or other IOT devices globally.
Configuring home router (RUTX)
L2TP
IPsec
|
|
|
|---|---|
|
Go to the Services → VPN → IPsec page and do the following:
|
Firewall
|
|
|
|---|---|
|
Go to the Services → VPN → IPsec page and do the following:
|
Android phone
|
|
|
|---|---|
|
Go to your Android device VPN settings and create a new VPN network: |
|
|
|
|---|---|
|
|
|
|
|---|---|
|
Now open your newly created VPN instance and connect to it:
|
|
|
|
|---|---|
|
If you applied the configuration correctly, after a moment it should indicate Connected: |
Results
Disclaimer:
This configuration example was created by using Android version 10. The IPsec Phase 1 and Phase 2 settings, which were used in this configuration example, might not work with other Android versions and might require adjustment.










