![]() ![]() ![]() There is only one rule created under Firewall | NAT – on the srcnat chain with masquerade action. Make sure you configure your router safe and secure for production environment, this configuration is just to show in what state can IPSec Site to Site work. So, I don’t have bridges, or firewalls preloaded, and I only have predefined routes created. This configuration is clean configuration, there is no default Mikrotik config preloaded on the routers I’m doing this on. You need to be able to communicate normally (ping if enabled on firewall) all public points on future IPSec tunnel. Make sure you have functional routing and configured networks before trying this. I would recommend creating certificate based IPSec tunnels for production, not ones with pre-shared key (this tutorial is with pre-shared key). This is the configuration I’m only using in testing environments, not in production. Here is a quick tutorial on how to create IPSec Site To Site VPN tunnel with Mikrotik RB RouterOS 6.46.1 on both sides.īefore we start, here are a few things to have in mind:
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |