Changes

no edit summary
Line 19: Line 19:  
Connect to MikroTik by using '''WinBox''' application and press '''New Terminal'''.
 
Connect to MikroTik by using '''WinBox''' application and press '''New Terminal'''.
   −
[[File:]]
+
[[File:Networking_rutxxx_configuration_example_l2tp_ipsec_mikrotik_1_v1.jpg|border|class=tlt-border|center]]
    
The first step is to create a PPP Profile on the MikroTik. Use a 192.168.102.1 for the local address (the VPN Gateway), assuming this is not already in use. You will also need to add a DNS Server. Use this command:
 
The first step is to create a PPP Profile on the MikroTik. Use a 192.168.102.1 for the local address (the VPN Gateway), assuming this is not already in use. You will also need to add a DNS Server. Use this command:
Line 53: Line 53:  
Now go to '''IP > Firewall''' and change positions of the 2 Firewall rules you just created (drag it to the top like in the example) in order to move them, press '''#''' sign.
 
Now go to '''IP > Firewall''' and change positions of the 2 Firewall rules you just created (drag it to the top like in the example) in order to move them, press '''#''' sign.
   −
[[File:]]
+
[[File:Networking_rutxxx_configuration_example_l2tp_ipsec_mikrotik_2_v1.jpg|border|class=tlt-border|center]]
    
==RUT configuration==
 
==RUT configuration==
Line 59: Line 59:  
Access RUTxxx WebUI and go to '''Services > VPN > L2TP'''. There create a new configuration by selecting role '''Client'', writing '''New configuration name''' (anything you want) and pressing '''Add New''' button. It should appear after a few seconds. Then press '''Edit'''.
 
Access RUTxxx WebUI and go to '''Services > VPN > L2TP'''. There create a new configuration by selecting role '''Client'', writing '''New configuration name''' (anything you want) and pressing '''Add New''' button. It should appear after a few seconds. Then press '''Edit'''.
   −
[[File:]]
+
[[File:|border|class=tlt-border]]
    
Then apply the following configuration.
 
Then apply the following configuration.
   −
[[File:]]
+
[[File:|border|class=tlt-border]]
    
# '''Enable''' instance.
 
# '''Enable''' instance.
Line 74: Line 74:  
Now go to '''Services > VPN > IPsec'''.
 
Now go to '''Services > VPN > IPsec'''.
   −
[[File:]]
+
[[File:|border|class=tlt-border]]
    
# Write '''Pre-shared key''' (write the password which you created with this command /ip ipsec identity add generate-policy=port-override auth-method=pre-shared-key secret="password" peer=l2tpserver ).
 
# Write '''Pre-shared key''' (write the password which you created with this command /ip ipsec identity add generate-policy=port-override auth-method=pre-shared-key secret="password" peer=l2tpserver ).
Line 81: Line 81:  
# When the interface appears like in the example, press '''Edit'''.
 
# When the interface appears like in the example, press '''Edit'''.
   −
[[File:]]
+
[[File:|border|class=tlt-border]]
    
# '''Enable''' instance.
 
# '''Enable''' instance.
Line 94: Line 94:  
Go to '''Status > Routes''' and in the '''Active IP Routes''' table you should see this new route:
 
Go to '''Status > Routes''' and in the '''Active IP Routes''' table you should see this new route:
   −
[[File:]]
+
[[File:|border|class=tlt-border]]
    
Also, you can check whether '''IPsec''' is working by writing this command to CLI:
 
Also, you can check whether '''IPsec''' is working by writing this command to CLI:
Line 104: Line 104:  
  Security Associations (1 up, 0 connecting)
 
  Security Associations (1 up, 0 connecting)
   −
[[File:]]
+
[[File:|border|class=tlt-border]]
0

edits

Navigation menu