☁️Easy IPSEC Site-To-Site VPN Guide, MikroTik ROSv7☁️

Поделиться
HTML-код
  • Опубликовано: 28 дек 2024

Комментарии • 164

  • @bastian9945
    @bastian9945 Год назад +4

    "Just some Random guy covering Mikrotik Configurations ....." Top 2% of Informational Videos on YT. You're not just covering but also explaining everything man GG.

    • @Anavllama
      @Anavllama 2 месяца назад

      Nothing random about Johnny, he's been providing excellent Mikrotik lessons for quite some time. My only angst, is that its Lab based and thus not always easily translatable to real life situations such as, dynamic public IPs, CGNAT, starlink type connectivity............ But MT is not about hand holding, if you want that, buy netgear, tplink LOL.

  • @GodAboveAll777
    @GodAboveAll777 Год назад +3

    Thankyou very much! I've never used Mikrotik before and have a site to site IPSEC project coming up. You made this very simple to understand! Thanks again

  • @todornikolov2063
    @todornikolov2063 7 месяцев назад +2

    Thanks for all great lessons :) You can add subscription $5 or $10, because now jumps from $1.99 to 20$ and nothing between. Cheers and keep up the excellent work!

  • @Chris2wick
    @Chris2wick 2 года назад +6

    This is by far the best ipsec guide for Mikrotik on RUclips! I have had Mikrotik for years and never got the ipsec settings and firewall rules quite right. I learned alot! Thank you!

  • @mikkio5371
    @mikkio5371 Год назад +1

    6 months ago . I was very confueed being a new bee back then. But today i revisted . And i noticed you did a very beautifule job to this . Now i understood everything clearly . Check within ,you will see my previous comment when i eas a newbee . Thanks .

  • @netrionio1
    @netrionio1 2 года назад +8

    You officially are my IT professor! Amazing video , amazing content. Thank you that you are doing it for free.

  • @ivanmolecular
    @ivanmolecular 9 месяцев назад +1

    Amazing video, easy to understand, your ipsec guide is perfect. Thanks so much.

  • @9lay_music
    @9lay_music 3 месяца назад

    Great IPSEC guide, thank you!

  • @ivanganchev8066
    @ivanganchev8066 2 года назад +3

    Just perfect. Exact what you need for site-to-site tunnel, no bull$hits. Just exlcellent! Thank you bro!

  • @tamasiferenc9033
    @tamasiferenc9033 Год назад +1

    Hy. Your explanations are nice to hear, easy to understand. Made my day.

    • @TheNetworkBerg
      @TheNetworkBerg  Год назад

      I am happy if my video has made things a bit easier for you. Thanks for letting me know :)!

  • @tamaspeter3599
    @tamaspeter3599 Год назад +2

    Thank You! Easy to understand!

  • @m-electronics5977
    @m-electronics5977 Месяц назад

    0:56 Where you get these nice animation background from?

  • @nicedreams726
    @nicedreams726 Год назад

    This helped me out so much for understanding everything. With a little more research I was able to make a script with variables and couple more options for lots of remote sites.

  • @geoffvandermerwe6220
    @geoffvandermerwe6220 2 года назад +1

    Sweet man! Thank you so much for this video!!!! You rock dude !

  • @shamindanishan1
    @shamindanishan1 2 года назад +1

    Awesome..!! great content as always.!

  • @I9Chris6I
    @I9Chris6I 2 года назад +1

    Thank you! Worked first try!

  • @atifalisanwal9347
    @atifalisanwal9347 Год назад

    Nice demonstration
    one question is in my mind, is there we need to add any firewall rule in mikrotik top get ipsec goal ???
    or in my case if A side is mikrotik and B side is Fortinet then???

  • @MiDiCur
    @MiDiCur 2 года назад

    I Agree with Chris Wick it is the best ipsec guide I’have seen. Unfortuneatly it only shows when all goes well. In my case I got an error no proposal chosen in the log file. I checked and double checked and are problably overlooking someting. Some feed back on possible thinks that can go wrong would be appriciated. Thanks Michael

    • @TheNetworkBerg
      @TheNetworkBerg  2 года назад

      Just remember IPSEC is VERY sensitive and it takes TWO TO TANGO, even if all your configuration is correct on your side if the other end does not match correctly then the tunnel will also not come up. Your error does sound more like an issue with how the proposals were configured. I would suggest reviewing the proposals or posting your config with sensitive information hashed out on the MT forums or Reddit for further help.

    • @MiDiCur
      @MiDiCur 2 года назад

      @@TheNetworkBerg The tunnel is up . I can not access any hosts on either side of the tunnel. All ping’s to either the local address of each router or any host times out. I went over your execelent video 4 time made screen prints from the configurations of both routers. Compaired all the settings for correctness. Can’t find anyting on the web that would clearify or solve the the ping/ connection issue. I could send you a dropbox link with the configurtion of both routers.

    • @Bidon47
      @Bidon47 11 месяцев назад

      @@MiDiCur did you found any solution?

  • @bojanaranelovic2937
    @bojanaranelovic2937 7 месяцев назад

    Excellent guide, thank you! Question: Can 2 devices that are on the same LAN (same IP) connect on the same L2TP/IPsec vpn server at the same time?

  • @mazubamwanamoonga5741
    @mazubamwanamoonga5741 11 месяцев назад +1

    Great Tutorial

  • @ika9
    @ika9 Год назад

    hi ur videos are great help to us .thank you for ur sharing and time . i have a small question in my ipsec address to other destination B i don't have a static ip i can use cloud ddns in mikrotik as address ? thank u

  • @UsmanAli-jc5ww
    @UsmanAli-jc5ww Год назад +1

    Very nice video

  • @kamranitsolution4u
    @kamranitsolution4u 2 года назад +1

    Thanks for such a nice and informative video, I am new to microtik but watching your videos taught me a lot thanks again

  • @CHC-e8q
    @CHC-e8q Год назад

    Top stuff. Thank you TNB for upload!

  • @ronaldquishpe6606
    @ronaldquishpe6606 2 года назад +2

    Great video! Could be this be done if one of the routers don't have an ip reachable from the another router? Let's say Mikrotik A have a public IP on the wan interface and Mikrotik B just have a private IP on the wan interface.

    • @TheNetworkBerg
      @TheNetworkBerg  2 года назад +1

      Yes it can be done in this manner as long as NAT-T is running you should be able to create a type of "dialup" VPN.

    • @douglashammes995
      @douglashammes995 2 года назад

      ​@@TheNetworkBerg
      WONDERFUL, this was also a question of mine. Can you explain better, how to make this configuration without the reachable ip on both sides?

  • @hyankh2365
    @hyankh2365 10 месяцев назад

    Thank you, your language accent are very clear, GG

  • @mrb2843
    @mrb2843 2 года назад +1

    Any chance of doing a vid of multiple nat ipsec tunnels ? i.e. multiple offices connecting to a central office where each mikrotik sits behind a standard isp broadband router

  • @jeffburnham8322
    @jeffburnham8322 Год назад +1

    Great video... *subscribed ... ;)

  • @gunchag
    @gunchag 2 года назад

    IKEv2/IPSec server guide would be really good! :)

  • @ibrahimarif6966
    @ibrahimarif6966 2 года назад

    thanks for videos. do we need to do any port forwarding in modem

  • @the-imge
    @the-imge Год назад

    You are Amazing. Your video is helped me. Than you so much

  • @gwcloete1072
    @gwcloete1072 2 года назад +1

    Awsome video, Thanks

  • @constantin286
    @constantin286 2 года назад +1

    Thank you for your series, they are amazing. I would love to see a similar IPSEC S2S tutorial with dynamic DNS endpoints on both sides.

    • @TheNetworkBerg
      @TheNetworkBerg  2 года назад +1

      Thanks for the idea! Will see what we can play around with using some scripting

    • @constantin286
      @constantin286 2 года назад

      @@TheNetworkBerg Weird, looks like my earlier comment was deleted - did I post something inappropriate? I previously (and with a lot of pain) set up a IPSEC S2S with DDNS on edgerouter and I don't recommend that to anyone who values their hair or time. A lot of undocumented stuff that has to be found and implemented. However, I would love to see a DDNS VPN setup in IPSEC, Wireguard, or VPN of your choice to link two home networks together, using Mikrotik routers as the primary gateway in both sites. Think vacation home, road warrior with a dynamic home IP, etc. Thank you!

    • @TheNetworkBerg
      @TheNetworkBerg  2 года назад +1

      @@constantin286 the only comment I have seen from you is the one that I replied to. RUclips does sometimes tend to mark comments as inappropriate the moment you use stuff like hostnames or IP addresses. Probably as a means of combating spam/phishing attacks.

  • @eroloner7765
    @eroloner7765 10 месяцев назад

    Thanks for all these great MT videos. Can we do a site-to-site between to hAP ax3 over ZeroTier? That could be a nice new video! 🙂

  • @igorigorr1019
    @igorigorr1019 2 года назад +1

    Connection established, firewall rules up but no ping between routers!
    Only when I add new route on MK ping start

  • @BuenoSport
    @BuenoSport Год назад +1

    Hi Man
    Thank you for the video. We did the same configuration on two of Mikrotik routers, step by step mentioned in this video. The tunnel is established but traffic is not being passed through the tunnel. The PC connected to each router can also not able to ping the other PC, connected with the 2nd router. And nor ping the LAN interface on other side routers.
    Please help me if I am missing something. Some configurations need to be done on the interfaces or in the routes before this IPsec configuration.
    Regards

  • @mikkio5371
    @mikkio5371 2 года назад

    at the CLI for the peer @17:11 .he knew he was going to f..ked us up . and said dont worry guys ,it really not going to be that bad . and it went bad for newbies. 😂😂😂😂...nice job though my mentor 👍👍👍👍

  • @blonn
    @blonn 6 месяцев назад

    Great explanation, thank you so much 🙏🏼

  • @salvadorelvira2187
    @salvadorelvira2187 2 года назад +1

    very best, your a nice profesor

  • @pedregossa
    @pedregossa 2 года назад +1

    Extremely good!!! Thank you!

  • @tersiuswhitehead5648
    @tersiuswhitehead5648 Год назад

    Hey Berg, works good for me thanks, just wondering if i add 5 sites, all need to connect back to my main site and maybe still see each other, do i just add profiles on the main RB for each of them, and just add main site to them all once?

    • @TheNetworkBerg
      @TheNetworkBerg  Год назад

      It should just be a case of updating the P2 proposals and IPSEC policies to get that done via a "Hub" this is typically referred to as a hub and spoke topology. So in theory yes you can have all remote sites communicate via the main site with some tweaking to your IPSEC

  • @lekoalili2227
    @lekoalili2227 Год назад +1

    Hello The Network Berg, thanks for your amazing tutorials.
    I have a questions though, i have the same configuration like yours but the thing is that I have multiple IPSec tunnels HQ, site-a, site-b, site-c, i defined each site separately to HQ but i cannot ping site-a from b or c. Is there any suggestion you may give me? Thank you very much.

    • @TheNetworkBerg
      @TheNetworkBerg  Год назад

      Most likely your issue is your IPSEC policies and what traffic gets encrypted. To run the setup as a hub and spoke you will have to update the IPSEC policies to encrypt all traffic between all site subnets per tunnel.
      Alternative would be to create a meshed setup where you run tunnels between the branches and just set encryption there.

  • @lekalili
    @lekalili Год назад

    Hello TheNetworkBerg, thanks for your amazing videos. I have a question related to this configuration, is it safe enough to setup something like this on production?

  • @junjun22able
    @junjun22able 2 года назад

    Hello, this really help me a lot! Thank you! But i have a problem or question, why I can't map a network drive? even though i can ping the NAS device?

  • @NevaranUniverse
    @NevaranUniverse Год назад

    Which site is the host and which is the client , technically? And could you do a video where it is a Site-to-client?

  • @christopheoudin3625
    @christopheoudin3625 2 года назад

    How can I use DDns to configure the remote site public adresse? Did you have some exemple? Tank you. Great vidéo!

    • @martinmcnamee4362
      @martinmcnamee4362 2 года назад

      Great question....
      I know there must be a way to use a name...

  • @ajgeldenhuys1621
    @ajgeldenhuys1621 9 месяцев назад

    Hi There, you forgot the show the part of inputting the default routes pointing to each site, good video, thanks

  • @jeytis72
    @jeytis72 Год назад

    AWESOME! Thanks

  • @wyoung1179
    @wyoung1179 2 года назад

    Good video! Thanks - Question: what's the best way to turn off this created IPSEC tunnel, if you don't want it running all the time? Like an on/off switch.

    • @TheNetworkBerg
      @TheNetworkBerg  2 года назад +1

      You could just go to the "Peer" tab and disable a peer that you do not want active, to re-activate it you simply need to enable the peer again. "On/Off Switch" ;)

    • @wyoung1179
      @wyoung1179 2 года назад

      @@TheNetworkBerg OK - Thanks

  • @call-me-potato.
    @call-me-potato. Год назад

    nice man , welldone.

  • @dubterraneosistemadesom6502
    @dubterraneosistemadesom6502 Год назад +1

    tks. save my life man!

  • @DavidWilliams-tc4ev
    @DavidWilliams-tc4ev 23 дня назад +1

    Thanks!!!!!!!!!!

  • @Codename_47
    @Codename_47 2 года назад

    Hello from Bulgaria, very good video, thanks Network Berg.
    I have a question, is it possible for a mobile device to connect to one of these two devices A or B and the condition is to freely reach the local networks of both devices A and B?

    • @TheNetworkBerg
      @TheNetworkBerg  2 года назад +1

      Yes, although I think I might have a better solution with Wireguard. Video on that will be live later today :)

    • @Codename_47
      @Codename_47 2 года назад

      @@TheNetworkBerg I look forward to the video ! There is no adequate video on this topic in RUclips.
      I managed to connect my android phone with router A on IKEv2, but unfortunately I can't tell him to reach the hosts connected to router B.
      With wireguard I achieve the same result, I see only the hosts in router A. :( Thanks a lot for the quick response !

  • @palwindersingh9678
    @palwindersingh9678 2 года назад

    Hey, Network Berg, can you make tutorial on road warrior setup for IPSec as well. Just like you did with WireGuard. Thanks

  • @kajalpatle3925
    @kajalpatle3925 2 года назад +1

    Hello, did you ever tried to make two IPSEC connection between the Mikrotik devices for redundancy. I searched about this allot but didn't got the correct response as I wanted to make the setup between the Site A and Site B, my IPSEC tunnel is working fine but on the Site A there are two Mikrotik routers for redundancy, according to the requirement when one router goes down from Site A I need to achieve the connectivity via failover between two IPSEC tunnel. It will be great if you suggest something.

  • @bostjanfras8530
    @bostjanfras8530 2 года назад

    Hi, great videos. I created an IPSEC tunel via two HAP AC2 based on your video, everything works (ping, Win shares...), except Winbox over VPN tunnel. ROS 7.6 Any ideas? :) Thanks.

  • @LeonardoOliveira-vb7ds
    @LeonardoOliveira-vb7ds Год назад

    Excellent explanation Master, thanks for the valuable tips, I applied it on an OCI server and managed to work correctly, but I have a problem, I have a vpn on RB1, when connecting via OpenVPN client I can't communicate with the Lan IP on the other side of the tunnel , I put VPN dhcp in policies sending it to my remote network, but I have no communication, do you have any idea how I could solve this?

  • @JaZzDeOliveira
    @JaZzDeOliveira 2 года назад

    Great video, thank you

  • @Coffetek
    @Coffetek Год назад

    Hi! At first very big thanks for the guide!
    Anyway... I made all like you, but my ping don't go throug... I checked my NAT rule and everything looks fine. Any idea?

  • @robertoa26
    @robertoa26 2 года назад

    Thank you so much for this video. Question: My tunnel says it's established, I added the Firewall rule you suggested. But I can't ping the other end LAN without adding a static route. That's not right is it?

    • @robertoa26
      @robertoa26 2 года назад

      I am using ether6 for my tunnel. I'm not using ether1 the WAN port. I guess that's what's messing me up?

  • @teoupenieksbracco885
    @teoupenieksbracco885 2 года назад +1

    good hack, good job man

  • @alesuarez731
    @alesuarez731 Месяц назад

    Hi, I need to forward the default traffic through the tunnel ipsec, but I dont see an interface tunnel to point the net 0.0.0.0, how is the procedure in this case? I do the same with cisco device routing de 0.0.0.0 to the int tunnel. thanks

  • @muhammadasjad6686
    @muhammadasjad6686 2 года назад

    In ipsec peer section do we need static ip addresses??
    Like you entered 172....

  • @vacbed
    @vacbed Год назад

    Great tutorial. I got the site to site VPN running by following your guide. However, I dont understand why is it recomended to use NAT instead of FW rule to accept the traffic from other site? Instead of NAT i made a basic input FW rule and it does the same thing as much as I understand. There isnt a need for network address translation, or maybe I'm missing something?

  • @ezatalhamody9334
    @ezatalhamody9334 2 года назад

    Thanks for this great explanation,
    I have established an IPsec tunnel to my AWS using v6.47.7 and it worked ok, but using v7.5 it didn't.
    is there any reason why?

  • @saintarniel4697
    @saintarniel4697 2 года назад

    Hello. Can I use ddns at the cloud section as the destination address?

  • @lakromani8172
    @lakromani8172 2 года назад

    Thanks for a new nice video. At 19:40 you say that you can not see the password and you need to set a new if you forget it. Not true. You can see the password with "export show-sensitive". You should also show the "public" ip at the design drawing at the beginning of the video. Also why use L2TP/IPSec, when it seems that you can do all with IPSec?

    • @TheNetworkBerg
      @TheNetworkBerg  2 года назад +1

      Thanks for the tips, yeah another viewer pointed out the show-sensitive command 😀 L2TP is still very useful for adding remote sites into a vrf as a virtual interface is added on the router for it, whereas IPSEC works on a logical level. They just have different practical uses. Though if you want to bring remote sites in via IPSEC that is definitely still an option.

  • @miltonobonyo2357
    @miltonobonyo2357 2 года назад

    Hi good work, I have followed these steps on a newly reset mikrotiks, But I am not able to ping the other side of the tunnel. The tunnel is established but no data through. Are there other firewall rules to be added?

    • @Bidon47
      @Bidon47 11 месяцев назад

      Did You found a solution for that?

  • @TheNetworkBerg
    @TheNetworkBerg  2 года назад +4

    Hey there, here's some of the reference material. Feel free to use it with the video to either get a better understanding of IPSEC or the different types of setups you can use this for :)
    As some people pointed out in the comments, you can view the IPSEC secret by exporting the configuration with the show-sensitive command. I have had never had to extract a key from a MikroTik so was not aware of it either. Thanks guys!
    What is IPSEC:
    www.cloudflare.com/learning/network-layer/what-is-ipsec/
    MikroTik IPSEC Wiki:
    help.mikrotik.com/docs/display/ROS/IPsec
    Wiki Docs:
    en.wikipedia.org/wiki/IPsec#:~:text=In%20computing%2C%20Internet%20Protocol%20Security,virtual%20private%20networks%20(VPNs).
    en.wikipedia.org/wiki/Internet_Security_Association_and_Key_Management_Protocol
    en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange

    • @jeytis72
      @jeytis72 2 года назад

      In which cases is worth using IPSEC over Wireguard...and the other way round? Thanks

    • @mikkio5371
      @mikkio5371 Год назад

      ​@jeytis72 I think wiregauard has a preferred throughput. Over ipsec .he did a video on different vpn. But both are very secure .

  • @gaming-craig
    @gaming-craig 5 месяцев назад

    i had to add a firewall filter rule to make phase 2 establish: accept, input, Protocol 17 udp, destination port 4500. idk why.

  • @abdullahahmed8624
    @abdullahahmed8624 2 года назад

    Great explanation This will be my favorite channel This is what I was looking for You are a beloved teacher Is it possible that the destination address is a virtual server (VPS)
    Is it possible to have the router ROS in a virtual server(vps) and the destination address in another virtual server(vps) ?

  • @smartpona
    @smartpona 2 месяца назад

    Thanks for great tutorial. I am looking ipsec site to client vpn tutorial pls

  • @survivingnetworkingandit2084
    @survivingnetworkingandit2084 2 года назад +1

    The only thing I dislike about MikroTik IPSec tunnels, is that they don’t create a interface in which to easily create static or dynamic routes over. Currently have to use L2TP/IPsec tunnels or GRE/IPsec tunnels.

    • @TheNetworkBerg
      @TheNetworkBerg  2 года назад

      Yeah that is definitely a drawback, and another reason why so many people are prefering something like Wireguard on Mikrotik. It is strange because other vendors do tend to add a tunnel interface. It also makes understanding how traffic routes a bit more difficult since traffic being encrypted over the IPSEC tunnel does not show up in the routing table.

  • @uyiogankpolor4502
    @uyiogankpolor4502 2 года назад

    How do I build a virtual lab like yours. please do a video tutorial

  • @tashriqpandy3752
    @tashriqpandy3752 2 года назад

    Can layer 2 vpn be performed using ipsec? if so can there be a part two to this video?

    • @TheNetworkBerg
      @TheNetworkBerg  2 года назад

      IPSEC itself cannot do L2VPN, however, you could use another protocol inside of an IPSEC tunnel to do that like VxLAN, though be forewarned that the overhead may be a bit much.

  • @jjrs.programas
    @jjrs.programas 2 года назад

    Muchas gracias funciona perfectamente.

  • @hit-757
    @hit-757 2 года назад

    I switched to wireguard but it's always nice to see your videos. Thx for the content.
    BTW, It is possible to export the secret with /ip ipsec/identity/export show-sensitive.
    Unfortunately we can't export system users' password this way.

    • @TheNetworkBerg
      @TheNetworkBerg  2 года назад +1

      Yeah wireguard is also a favorite of mine for MT to MT :D, though IPSEC is still pretty handy when connecting to another vendor, especially to firewalls like a FortiGate or Palo Alto. Thanks for the tip about show-sensitive, didn't even consider doing that while making the video.

    • @kresimirpecar4925
      @kresimirpecar4925 2 года назад

      Excellent video as always, you never let us down :D I don't know how is in other countries, but i have big trouble getting mikrotik devices... Switches, APs...

    • @TheNetworkBerg
      @TheNetworkBerg  2 года назад

      @@kresimirpecar4925 I think the chip shortages affects all vendors. Some networking gears are on backorder for months+. These are pretty crazy times we are living in.

    • @kresimirpecar4925
      @kresimirpecar4925 2 года назад

      @@TheNetworkBerg Yeah... Bad times indeed... On one site i have mikrotik router, ubiquiti switch and tp link AP... (Temporary setup, as eta on mikrotik gear is unknown...)

  • @chasmai8423
    @chasmai8423 Год назад

    subscribed

  • @bakaaa754
    @bakaaa754 2 года назад

    Do we need static public address for peers on both sides??
    Router is establishing peer with it self not with that of other router I'm confused 😭

    • @wettmarley
      @wettmarley 2 года назад +1

      public ip is needed to establish site to site. dynamic ips always hv issues with NATTING

  • @heinrichzemo3766
    @heinrichzemo3766 2 года назад

    can we use the same setting for road warrior vpn? if not can you make a video about setting mikrotik as road warrior ipsec vpn server?

    • @TheNetworkBerg
      @TheNetworkBerg  2 года назад +1

      Sort of, though there are some tweaks so I definitely will create another video on a Road Warrior setups

  • @SehaDiriyah
    @SehaDiriyah 6 месяцев назад

    do we need static public ip for this lab?

  • @DCA_Strategy
    @DCA_Strategy 2 года назад

    Support Mikrotik route based ipsec tunnel?

  • @muhammadzeeshanshafi5412
    @muhammadzeeshanshafi5412 Год назад

    Dear i have a problem on one router i have configured vlans and ipsec tunnel not passing the traffic to vlans how to achive that can you please help me out?

  • @alexhawes6690
    @alexhawes6690 Год назад

    i've added the NAT rules so the 2 netwroks connected by IPsec can communicate, even with this i get "no phase 2" unless i disable "drop all not coming from LAN" in the firewall, as far as i'm aware this is a big no-no but i cannot get IPsec to work without disabling this rule

    • @alexhawes6690
      @alexhawes6690 Год назад

      I created a firewall rule to allow from my public IP but still stuck on no phase 2

    • @alexhawes6690
      @alexhawes6690 Год назад

      For anyone with the same issue i fixed this by creating a firewall rule, accept input (src.address as remote lan) (dst. address as local lan) then i moved "drop all not coming from lan" to the bottom of the firewall list

  • @ibompotsaris
    @ibompotsaris Год назад

    Hello! Is there a way to setup the VPN with only one peer having a static IP?

    • @TheNetworkBerg
      @TheNetworkBerg  Год назад

      Yes, this can be done by using the NAT-Traversal option between peers. This will allow something like a NATTED connection to establish an IPSEC tunnel and based off of that session create the tunnel.

  • @s0ulkiller
    @s0ulkiller Год назад

    I don't get it why you don't create any IPIP tunnel first or GRE etc? Is it necessary?

  • @edekedkowski5952
    @edekedkowski5952 8 месяцев назад

    If I add an input accept rule, UDP protocol, all ports to FW Filter Rules, and under this rule I add an input drop rule, then pinging from network A to network B does not work. Do I then need to add a rule allowing pinging...?

  • @limon2108
    @limon2108 2 года назад

    pls show how to setup mikrotik to edgerouter ipsec

  • @φωχνφκζ
    @φωχνφκζ Год назад

    can i use internet from site "b" ?

  • @gytis156
    @gytis156 Месяц назад

    Not working for me at all, connection establishes, I can see SA's and active peers on both sides but there's no traffic whatsoever and I can't ping the other router. Any idea why? I did add NAT rules.

  • @dustojnikhummer
    @dustojnikhummer 2 года назад

    Maybe I missed it, but is it possible to do this when only one side has a public IP address? For example, I want tunnel between my network and my parents, without them having to pay (and expose their network) for a public IP

  • @makoloherbert7705
    @makoloherbert7705 2 года назад

    Hello Sir, Does these settings work on two mikrotik routers in different geographical locations? Because mine have failed to connect

    • @TheNetworkBerg
      @TheNetworkBerg  2 года назад

      Yes these settings will work even in different geographies. Unless either ISP is blocking the tunneling protocol.

  • @AminDayekh
    @AminDayekh 4 месяца назад

    Hi Berg, i set a vpn to be able to Transfer backup files, the speed is only 1MbPS it takes forever to send my backup, any advise?

    • @TheNetworkBerg
      @TheNetworkBerg  4 месяца назад

      @AminDayekh are you using a CHR? Is it licensed? If not the speed is capped at 1Mbps.

  • @networkwarriors4499
    @networkwarriors4499 Год назад

    Thanks

  • @chrisvermeulen2033
    @chrisvermeulen2033 Год назад

    Hi as jy weer terug van verlog is kan jy asb help ek het tunnel configure en hy se established maar ek sien geen data flow nie

  • @jpcapobianco1979
    @jpcapobianco1979 Год назад

    very interesting video. i've tried in gns and works. the only dubt for my is this: ipsec is a policy based vpn, so you have the local subnets which are the same as the tunnel. in the route base like wireguard you need addresses for the tunnel and then the routes for the local subnet that you want to connect. my question is this: why you need the second rule for the nat ? AH and ESP duplicates the ip header in their format, i uderstand that nat creates a security problem so we need nat t to delete the outer header, but why do we need a rule for ACCEPT the traffic ? its the same nat t problem ? for the duplicated addresses ? its a problem caused by nat with this header format ? can you explain this concept ? thanks

  • @ifthenelse2461
    @ifthenelse2461 10 месяцев назад

    the problem, from lan under mikrotik 2 , i can ping to lan under mikrotik 1, but from lan mikrotik 1 i can't ping to lan from mikrotik 2.

  • @cristanboj25
    @cristanboj25 2 года назад

    hi sir. does this work lets say my VPN Server has Static WAN . but the 20 branches has dynamic WAN ip addresses?

  • @marjoni
    @marjoni 2 года назад

    good job

  • @smurfejus
    @smurfejus 2 года назад

    Ping and speed test don't work between routers!!! What firewall rule enables Microtik router ping and speed test after this setup?