IPSEC Tunnel Configuration on MikroTik RouterOS v7

Поделиться
HTML-код
  • Опубликовано: 6 сен 2024
  • Get the full course MikroTik IPSEC course here: mynetworktrain...
    In this video, I will show you how to configure IPSEC on MikroTik RouterOS v7
    #mikrotik #ipsec

Комментарии • 18

  • @peterst.8473
    @peterst.8473 Год назад +2

    Thanks again for your videos, you deserve more subscribers and likes since you are a real network engineer and professional.

    • @MAICT
      @MAICT  Год назад

      Thank you, maybe one day :)

  • @MohamedAhmed-vw5bc
    @MohamedAhmed-vw5bc Год назад +1

    Thanks , you are the best in explaining Mikrotik

    • @MAICT
      @MAICT  Год назад

      Thank you for the compliment

  • @controltech1
    @controltech1 Месяц назад

    how to config router default over ipsec ?

  • @muhammaduzair136
    @muhammaduzair136 6 месяцев назад

    For internet access for example from either routers to facebook do we need to configure simple Nat also like we do by applying masquerade in action and chain as source nat ?

  • @sammourad4757
    @sammourad4757 Год назад +1

    Thank you Maher.

    • @MAICT
      @MAICT  Год назад

      You're most welcome

  • @federicogomez3708
    @federicogomez3708 Год назад +1

    Excelent video mate!, i do all what you explain on video but dont get ping, shows timeout... can help me please?

  • @antoniomax3163
    @antoniomax3163 Год назад +1

    Android 12/13,mobile internet (nat) ipv4. How connect to mikrotik? Ipsek, ikev support?

  • @yvindgravklev6139
    @yvindgravklev6139 9 месяцев назад

    Hello sir. I`ve set up quite a few routers with Ipsec Tunnel. In RoS 6v i also used to set up a route in the main routing table (dst-addresse: x.x.x.x Gateway : bridge). This i did for the dude having a routing table to fetch its routes. However this is failing bigtime in RoS 7v. Instead of doing src-nat as a routing i`ve set up 2 "Raw" Prerouting rules with no track chain, 1 for each way. That also work as a charm. What you think about using Raw rules as Prerouting?

  • @flntori
    @flntori Год назад +1

    THX:)

  • @jpcapobianco1979
    @jpcapobianco1979 10 месяцев назад

    very interesting video, i've replicated in GNS. i've bought the course about vpn on the My Network Training, but IPSEC is little bit different, it'a a policy based vpn. we don't need routes but a security association in the first phase and a second proposal phase where we set the tunnel, and we don't have a specific tunnel address different from the local subnet that comunicates like the route based vpn.. i understand now why nat-t is important, becuse AH protocol duplicates the ip header in a new AH ip header. so nat creates a security problem. the only thing that i dont understand is the fact that before you se the nat masquered you need another rule for accept the traffic. maybe nat does not work this type of duplicated fields ?? i dont know... inyway i'm thinking to buy the entire course to study better.

  • @Nitishvns
    @Nitishvns 9 месяцев назад

    Both router need public static IP ?

    • @baranellogio
      @baranellogio Месяц назад

      hola, buen dia, por lo menos uno de los puntos en cuestión necesita tener la ip privada con dmz, (ip privada nateada). La otra no hace falta, es una maravilla.

  • @forex-chart-analysis-daily
    @forex-chart-analysis-daily Год назад

    Sir if public ip change then we should be again and again configuration??

    • @jpcapobianco1979
      @jpcapobianco1979 10 месяцев назад +1

      i think you have a problem if public ip change, in this type of vpn you need two pubblic ip, of for R1 one for R2. the important to uderstand for me is the fact that this is a policy based vpn, not a route based vpn, so the local subnet are the same as the address in the tunnel. i've tried in gns and work, the only thing if the you have the problem with phase one, you need to repeat the steps from the beginning.

    • @forex-chart-analysis-daily
      @forex-chart-analysis-daily 10 месяцев назад

      @@jpcapobianco1979 thanks