Template:Networking rutxxx configuration examples l2tp pover ipsec windows

From Teltonika Networks Wiki

Introduction

The information in this page is updated in accordance with the [[Media:{{{fw_version}}}_WEBUI.bin|{{{fw_version}}}]] firmware version.

Because of the lack of confidentiality inherent in the Layer 2 Networking Protocol (L2TP) protocol, Internet Protocol Security (IPsec) is often used to secure L2TP packets by providing confidentiality, authentication and integrity. The combination of these two protocols is generally known as L2TP over IPsec (or simply L2TP/IPsec).

This article provides a guide on how to configure L2TP/IPsec on RUTxxx routers and how to connect them with a Windows 10 client.

It should also be noted that this guide is aimed at more advanced users and, therefore, skips some of the more self-explanatory steps in order to preserve the overall coherence of the article. For example, instead of showing how to add new instances step by step, it is only mentioned in a short sentence. If you feel this lack of information impedes your ability to configure the setup, we suggest you check out our separate configuration guides on IPsec and L2TP for reference.

Configuration overview and prerequisites

Before we begin, let's overview the configuration that we are attempting to achieve and the prerequisites that make it possible.

Prerequisites:

  • One RUTxxx routers of any type (excluding RUT850)
  • A Public Static or Public Dynamic IP addresses
  • At least one end device with Windows 10


Configuration scheme:

[[File:{{{file_scheme}}}|border|class=tlt-border]]

The figure above depicts the L2TP/IPsec scheme. - The router with the Public IP address (RUT1) acts as the L2TP/IPsec server and the Windows 10 device acts as client. L2TP connects the networks of RUT1 and Windows 10 client and IPsec provides the encryption for the L2TP tunnel.

When the scheme is realized, L2TP packets between the endpoints are encapsulated by IPsec. Since the L2TP packet itself is wrapped and hidden within the IPsec packet, the original source and destination IP address is encrypted within the packet.

Router configuration

If you have familiarized yourself with the configuration scheme and have all of the devices in order, we can start configuring the routers using instructions provided in this section. To summarize, we'll be configuring an L2TP server and an IPsec Transport instance (server) on RUT1; an a Windows 10 VPN connection (client).

L2TP Server (RUT1)


  • Login to the router's WebUI and navigate to the Services → VPN → L2TP page and do the following:
    1. Select Role: Server.
    2. Enter a custom configuration name.
    3. Click the 'Add New' button.
    4. Click the 'Edit' button next to the newly created L2TP instance.
  • [[File:{{{file_l2tp_add}}}|border|class=tlt-border]]
  • Adhere to the configurations presented in the figure below:
    1. Enable the L2TP instance.
    2. Enter a User name and Password for authentication for the client.
    3. Optionaly, set a fixed IP for this client (if left empty, client will receive first free IP from the IP range).
    4. Don't forget to Save the changes.
    [[File:{{{file_l2tp_config}}}|border|class=tlt-border]]

IPsec


You must configure a working IPsec Transport connection. This subsection contains instructions on how to do just that. Other used parameters will be defaults; You can find explanations for those parameters in the VPN manual page, IPsec section.

  • Go to Services --> VPN --> IPsec. Enter a name for your IPsec instance and click ADD.

  • Your instance will appear like in the example and then press Edit.

    • 1. Enable instance.
      2. Select Type (Transport).
      3. Leave other settings as default and press Save.


  • Then go back to the IPsec overview window.
      1. Press Add Pre-shared Keys (it should appear like in the example).
      2. Create Pre-shared Key.
      3. Write Secret’s ID selector (%any or users public IP address).
      4. Press Save
  • color=black

    Windows 10 client Configuration

  • Write VPN in the search bar and then open VPN settings.
  • Then press Add VPN connection
    • 1. Create Connection name.
      2. Write server’s IP address.
      3. Select VPN type (L2TP/IPsec with pre-shared key).
      4. Write Pre-shared key (write the password you created in the IPsec settings).
      5. Select Type of sign-in info (User name and password).
      6. Write Username (write the username you created in the L2TP settings).
      7. Write Password (write the password you created in the L2TP settings).
      8. Press Save.

  • Try connecting VPN server.
  • It should show Connected.
  • From computer, try to ping remote VPN endpoint by using CMD and ping command.
  • See also

    [[Category:{{{name}}} Configuration Examples]]