Open abitrolly opened 4 years ago
Oops. L2TP needs to be wrapped into IPSec for security.
https://mum.mikrotik.com/presentations/HR13/kirnak.pdf
/system logging add topics=ipsec
/system logging print
...
6 ipsec memory
...
Checking the logs should probably be done with.
/log print follow where topic~"ipsec"
IKEv2 is the protocol on UDP port 500 that is used for IPSec handshake. IPSec proposal
is used to set algorithms for encrypting traffic.
Make sense to configure for protocols that are supported by hardware.
/ip ipsec proposal
set [ find default=yes ] auth-algorithms=sha256 enc-algorithms=aes-256-cbc pfs-group=modp2048
Done. Modified default
proposal.
print
Flags: X - disabled, * - default
0 * name="default" auth-algorithms=sha256 enc-algorithms=aes-256-cbc
lifetime=30m pfs-group=modp2048
This checks the state of L2TP server.
This enables it.
The final status.
Using any L2TP client try to connect to malino.mhs.by and watch the response with
Wireshark
. If there is no response, them MikroTik firewall needs to be configured to allow L2TP UDP port 1701 to pass.https://wiki.mikrotik.com/wiki/Manual:Interface/L2TP#Basic_L2TP.2FIpSec_setup