Godinich Consulting. VPN's Between Mikrotik and 3rd Party Devices



Similar documents
Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example

Cisco 1841 MyDigitalShield BYOG Integration Guide

Application Notes SL1000/SL500 VPN with Cisco PIX 501

SDM: Site to Site IPsec VPN Between ASA/PIX and an IOS Router Configuration Example

Packet Tracer Configuring VPNs (Optional)

Most Common DMVPN Troubleshooting Solutions

Lab Configure a PIX Firewall VPN

Deploying IPSec VPN in the Enterprise

Cisco to Juniper point-to-multipoint IPsec solution - spoke devices migration.

iguring an IPSec Tunnel Cisco Secure PIX Firewall to Checkp

How To Monitor Cisco Secure Pix Firewall Using Ipsec And Snmp Through A Pix Tunnel

Chapter 8 Lab A: Configuring a Site-to-Site VPN Using Cisco IOS and SDM

Lab 6.5.9b Configure a Secure VPN Using IPSec between a PIX and a VPN Client using CLI

Chapter 8 Lab A: Configuring a Site-to-Site VPN Using Cisco IOS and CCP

iementor CCIE Service Provider Workbook v1.0 Lab13 Solutions: Layer 2 VPN II

How To Establish IPSec VPN connection between Cyberoam and Mikrotik router

Chapter 8 Lab A: Configuring a Site-to-Site VPN Using Cisco IOS and CCP


How to configure VPN function on TP-LINK Routers

How to configure VPN function on TP-LINK Routers

Table of Contents. Cisco Configuring IPSec Cisco Secure VPN Client to Central Router Controlling Access

GregSowell.com. Mikrotik VPN

Use Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W

VPN. VPN For BIPAC 741/743GE

Configuration Guide. How to establish IPsec VPN Tunnel between D-Link DSR Router and iphone ios. Overview

IPsec VPN Application Guide REV:

Configuring IPsec VPN with a FortiGate and a Cisco ASA

Using IPsec VPN to provide communication between offices

Building scalable IPSec infrastructure with MikroTik. IPSec, L2TP/IPSec, OSPF

Virtual Private Network and Remote Access Setup

Understanding the Cisco VPN Client

ASA and Native L2TP IPSec Android Client Configuration Example

Dynamic routing protocols over IPSec tunnels between Palo Alto Networks and Cisco routers

Lab 4.4.8a Configure a Cisco GRE over IPSec Tunnel using SDM

Vodafone MachineLink 3G. IPSec VPN Configuration Guide

Deploying the Barracuda Link Balancer with Cisco ASA VPN Tunnels

How To Industrial Networking

Creating a Gateway to Client VPN between Sidewinder G2 and a Mac OS X Client

IPsec Troubleshooting: Understanding and Using debug Commands

IP Office Technical Tip

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Configuring TheGreenBow VPN Client with a TP-LINK VPN Router

Configure IPSec VPN Tunnels With the Wizard

IPSEC VPN CISCO DRAYTEK ADSL Kurulum Dökümanı

Apliware firewall. TheGreenBow IPSec VPN Client. Configuration Guide.

Cisco Site-to-Site VPN Lab 3 / GRE over IPSec VPNs by Michael T. Durham

ISG50 Application Note Version 1.0 June, 2011

VPN Wizard Default Settings and General Information

Remote Access VPN Business Scenarios

Lab a Configure Remote Access Using Cisco Easy VPN

Using Opensource VPN Clients with Firetunnel

Cisco Which VPN Solution is Right for You?

Configuring L2TP over IPSec

Shrew Soft VPN Client Configuration for GTA Firewalls

Configuring a Site-to-Site VPN Tunnel Between Cisco RV320 Gigabit Dual WAN VPN Router and Cisco (1900/2900/3900) Series Integrated Services Router

This topic discusses Cisco Easy VPN, its two components, and its modes of operation. Cisco VPN Client > 3.x

How To Configure L2TP VPN Connection for MAC OS X client

Interconnection between the Windows Azure

Chapter 5 Virtual Private Networking Using IPsec

Create a VPN on your ipad, iphone or ipod Touch and SonicWALL NSA UTM firewall - Part 1: SonicWALL NSA Appliance

SingTel VPN as a Service. Quick Start Guide

Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Fortinet Firewall. Overview

IPsec VPN Security between Aruba Remote Access Points and Mobility Controllers

7.1. Remote Access Connection

Configuring Tunnel Default Gateway on Cisco IOS EasyVPN/DMVPN Server to Route Tunneled Traffic

IP Office Technical Tip

Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Sonicwall Firewall.

VPN L2TP Application. Installation Guide

Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Cisco Firewall. Overview

Configuring an IPsec VPN to provide ios devices with secure, remote access to the network

Enable VPN PPTP Server Function

Matrix Technical Support Mailer 167 NAVAN CNX200 PPTP VPN with Windows Client

Application Notes. How to Configure UTM with Apple OSX and ios Devices for IPsec VPN

Viewing VPN Status, page 335. Configuring a Site-to-Site VPN, page 340. Configuring IPsec Remote Access, page 355

Chapter 4 Virtual Private Networking

How to Setup PPTP VPN Between a Windows PPTP Client and the DIR-130.

7. Configuring IPSec VPNs

Virtual Private Network and Remote Access

Netopia TheGreenBow IPSec VPN Client. Configuration Guide.

Table of Contents. Cisco Cisco VPN Client FAQ

Internet. SonicWALL IP SEV IP IP IP Network Mask

Ingate Firewall. TheGreenBow IPSec VPN Client Configuration Guide.

Module 6 Configure Remote Access VPN

PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions

Industrial Classed H685 H820 Cellular Router User Manual for VPN setting

ZyXEL ZyWALL P1 firmware V3.64

Planet CS TheGreenBow IPSec VPN Client. Configuration Guide.

Application Note: Onsight Device VPN Configuration V1.1

VPN Solutions. Lesson 10. etoken Certification Course. April 2004

VPN PPTP Application. Installation Guide

Most Common L2L and Remote Access IPSec VPN Troubleshooting Solutions

Symantec Firewall/VPN 200

TheGreenBow IPsec VPN Client. Configuration Guide Cisco RV325 v1. Website: Contact:

Troubleshooting IPSec Design and Implementation

How To Configure Apple ipad for Cyberoam L2TP

Cisco Easy VPN on Cisco IOS Software-Based Routers

Cisco SA 500 Series Security Appliance

OvisLink 8000VPN VPN Guide WL/IP-8000VPN. Version 0.6

Cisco RV 120W Wireless-N VPN Firewall

Transcription:

Godinich Consulting VPN's Between Mikrotik and 3rd Party Devices

Vince Godinich experience

TOPICS PPTP Mikrotik Client to Cisco Server IPSEC Shrew Client To Mikrotik router IPSEC Mikrotik router to Cisco IOS router

PPTP Mikrotik Client to Cisco Server Configure a Mikrotik router to act as a PPTP client connecting to a Cisco PPTP server to connect remote lans Allows replacement of a Cisco branch router with a MikroTik router without changing or replacing existing Cisco main router

PPTP Mikrotik Client to Cisco Server Ether 2 192.168.1.1/24 Mikrotik Router Ether 1 10.0.0.2/24 internet Ether 1 10.0.0.1/24 Cisco Router Ether 2 192.168.0.1/24 Site A PC 192.168.1.79/24 Site B Server 192.168.0.2/24

PPTP Mikrotik Client to Cisco Server Ether 2 192.168.1.1/24 Mikrotik Router Ether 1 10.0.0.2/24 PPTP TUNNEL Ether 1 10.0.0.1/24 Cisco Router Ether 2 192.168.0.1/24 internet Site A PC 192.168.1.79/24 Site B Server 192.168.0.2/24

PPTP Mikrotik Client to Cisco Server Mikrotik Router Ether 2 192.168.1.1/24 pptp out 1 192.168.79.2 PPTP TUNNEL Virtual Template 1 192.168.79.1 Cisco Router Ether 2 192.168.0.1/24 internet Site A PC 192.168.1.79/24 Site B Server 192.168.0.2/24

PPTP Mikrotik Client to Cisco Server

PPTP Mikrotik Client to Cisco Server

PPTP Mikrotik Client to Cisco Server

PPTP Mikrotik Client to Cisco Server

PPTP Mikrotik Client to Cisco Server

PPTP Mikrotik Client to Cisco Server

PPTP Mikrotik Client to Cisco Server

PPTP Mikrotik Client to Cisco Server

PPTP Mikrotik Client to Cisco Server aaa new model aaa authentication ppp default local vpdn enable vpdn group 1 accept dialin protocol pptp virtual template 1 l2tp tunnel timeout no session 15 username pptp_branch password 0 1234

PPTP Mikrotik Client to Cisco Server interface Virtual Template1 ip address 192.168.79.1 255.255.255.0 peer default ip address pool PPTP_POOL no keepalive ppp encrypt mppe 128 required ppp authentication ms chap v2 ip local pool PPTP_POOL 192.168.79.2

PPTP Mikrotik Client to Cisco Server ip nat inside source list nonat interface FastEthernet0/0 overload ip route 192.168.1.0 255.255.255.0 192.168.79.2 ip access list extended nonat deny ip 192.168.1.0 0.0.0.255 192.168.0.0 0.0.0.255 permit ip 192.168.1.0 0.0.0.255 any

PPTP Mikrotik Client to Cisco Server Ether 2 192.168.1.1/24 Mikrotik Router Ether 1 10.0.0.2/24 internet Ether 1 10.0.0.1/24 Cisco Router Ether 2 192.168.0.1/24 Ping Site A PC 192.168.1.79/24 Site B Server 192.168.0.2/24

PPTP Mikrotik Client to Cisco Server

PPTP Mikrotik Client to Cisco Server

PPTP Mikrotik Client to Cisco Server

PPTP Mikrotik Client to Cisco Server

PPTP Mikrotik Client to Cisco Server /interface pptp client add allow=mschap2 connect to=10.0.0.1 disabled=no mrru=1600 name=pptp out1 \ password=1234 user=pptp_branch /ppp profile set 1 use encryption=required /ip firewall nat add chain=srcnat dst address=192.168.0.0/24 out interface=ether2

IPSEC Shrew Client To Mikrotik Configure a Shrew client on remote PC to connect to a Mikrotik router and access internal lan network Eliminates need for Microsoft VPN client Enables one client to be used for remote access to Mikrotik and Cisco devices eliminating need for a Cisco VPN Client Easy to import existing Cisco VPN profiles into Shrew client Allows for ease of migration from Cisco devices to Mikrotik routers

IPSEC Shrew Client To Mikrotik Remote PC 10.0.0.2/24 internet Ether 1 10.0.0.1/24 Mikrotik Router Ether 2 10.10.0.2/22 Site AServer 10.10.0.2

IPSEC Shrew Client To Mikrotik www.shrew.net/download/vpn

IPSEC Shrew Client To Mikrotik

IPSEC Shrew Client To Mikrotik

IPSEC Shrew Client To Mikrotik

IPSEC Shrew Client To Mikrotik

IPSEC Shrew Client To Mikrotik

IPSEC Shrew Client To Mikrotik

IPSEC Shrew Client To Mikrotik

IPSEC Shrew Client To Mikrotik

IPSEC Shrew Client To Mikrotik

IPSEC Shrew Client To Mikrotik

IPSEC Shrew Client To Mikrotik

IPSEC Shrew Client To Mikrotik

IPSEC Shrew Client To Mikrotik

IPSEC Shrew Client To Mikrotik

IPSEC Shrew Client To Mikrotik n:version:4 n:network ike port:500 n:network mtu size:1380 n:client addr auto:1 n:network natt port:4500 n:network natt rate:15 n:network frag size:540 n:network dpd enable:0 n:client banner enable:0 n:network notify enable:0 n:client dns used:0 n:client dns auto:0 n:client dns suffix auto:0 n:client splitdns used:0 n:client splitdns auto:0n:client wins used:0 n:client wins auto:1n:phase1 dhgroup:2 n:phase1 life secs:86400 n:phase1 life kbytes:0 n:vendor chkpt enable:0 n:phase2 life secs:3600 n:phase2 life kbytes:0 n:policy nailed:0 n:policy list auto:0 n:phase1 keylen:128 n:phase2 keylen:128s:networkhost:10.10.0.1 s:client auto mode:pull s:client iface:virtual s:network natt mode:disable s:network frag mode:disable s:auth method:mutual psk s:ident client type:address s:ident server type:address b:auth mutual psk:y3rinjux s:phase1 exchange:main s:phase1 cipher:aes s:phase1 hash:sha1 s:phase2 transform:esp aes s:phase2 hmac:sha1 s:ipcomp transform:disabled n:phase2 pfsgroup:2 s:policy level:require s:policy list include:10.10.0.0 / 255.255.252.0

IPSEC Shrew Client To Mikrotik

IPSEC Shrew Client To Mikrotik

IPSEC Shrew Client To Mikrotik Remote PC 10.0.0.2/24 internet Ether 1 10.0.0.1/24 Mikrotik Router Ether 2 10.10.0.2/22 Site AServer 10.10.0.2

IPSEC Shrew Client To Mikrotik Remote PC 10.0.0.2/24 internet Ether 1 10.0.0.1/24 Mikrotik Router Ether 2 10.10.0.2/22 PING Site AServer 10.10.0.2

IPSEC Shrew Client To Mikrotik

IPSEC Cisco IOS or ASA To Mikrotik Configure an IPSEC VPN between a Cisco IOS router or ASA and a Mikrotik router Allows replacement of a Cisco branch router or ASA with a MikroTik router without changing or replacing existing Cisco main router

IPSEC Cisco IOS To Mikrotik Ether 2 192.168.1.1/24 Mikrotik router Ether 1 10.0.0.1/24 internet Ether 0/0 10.0.0.2/24 Cisco router Ether 0/1 192.168.0.1/24 Site A PC 192.168.1.2/24 Site B Server 192.168.0.2/24

IPSEC Cisco IOS To Mikrotik IPSEC

IPSEC Cisco IOS To Mikrotik Local lan subnet Remote lan subnet

IPSEC Cisco IOS To Mikrotik Local wan address Remote wan address

IPSEC Cisco IOS To Mikrotik Remote wan address PRE SHARED PASSWORD

IPSEC Cisco IOS To Mikrotik

IPSEC Cisco IOS To Mikrotik Local lan subnet Remote lan subnet

IPSEC Cisco IOS To Mikrotik

IPSEC Cisco IOS To Mikrotik crypto isakmp policy 1 encr aes authentication pre share group 2 crypto isakmp key 1234 address 10.0.0.2 no xauth!! crypto ipsec transform set remote esp aes esp sha hmac! crypto map remote 5 ipsec isakmp set peer 10.0.0.2 set transform set remote set pfs group2 match address remote! interface FastEthernet0/0 ip address 10.0.0.1 255.255.255.0 ip nat outside duplex auto speed auto crypto map remote! ip nat inside source list nonat interface FastEthernet0/0 overload ip access list extended nonat deny ip 192.168.0.0 0.0.0.255 192.168.1.0 0.0.0.255 permit ip 192.168.0.0 0.0.0.255 any! ip access list extended remote permit ip 192.168.0.0 0.0.0.255 192.168.1.0 0.0.0.255!

IPSEC Cisco IOS To Mikrotik vince_1841#sh crypto isakmp sa IPv4 Crypto ISAKMP SA dst src state conn id status 10.0.0.1 10.0.0.2 QM_IDLE 1003 ACTIVE

IPSEC Cisco IOS To Mikrotik vince_1841#sh crypto ipsec sa interface: FastEthernet0/0 Crypto map tag: remote, local addr 10.0.0.1 protected vrf: (none) local ident (addr/mask/prot/port): (192.168.0.0/255.255.255.0/0/0) remote ident (addr/mask/prot/port): (192.168.1.0/255.255.255.0/0/0) current_peer 10.0.0.2 port 500 PERMIT, flags={origin_is_acl,} #pkts encaps: 121, #pkts encrypt: 121, #pkts digest: 121 #pkts decaps: 124, #pkts decrypt: 124, #pkts verify: 124 #pkts compressed: 0, #pkts decompressed: 0 #pkts not compressed: 0, #pkts compr. failed: 0 #pkts not decompressed: 0, #pkts decompress failed: 0 #send errors 0, #recv errors 0

IPSEC Cisco IOS To Mikrotik local crypto endpt.: 10.0.0.1, remote crypto endpt.: 10.0.0.2 path mtu 1500, ip mtu 1500, ip mtu idb FastEthernet0/0 current outbound spi: 0x23D508(2348296) PFS (Y/N): Y, DH group: group2 inbound esp sas: spi: 0x89A2A46B(2309137515) transform: esp aes esp sha hmac, in use settings ={Tunnel, } conn id: 2003, flow_id: FPGA:3, sibling_flags 80000046, crypto map: remote sa timing: remaining key lifetime (k/sec): (4533419/2928) IV size: 16 bytes replay detection support: Y Status: ACTIVE

IPSEC Cisco IOS To Mikrotik vince_1841#sh crypto isakmp sa IPv4 Crypto ISAKMP SA dst src state conn id status 10.0.0.1 10.0.0.2 QM_IDLE 1003 ACTIVE

IPSEC Cisco ASA To Mikrotik Ether 2 192.168.0.1/24 Mikrotik router Ether 1 10.0.0.2/24 internet Outside 10.0.0.1/24 Cisco ASA Inside 192.168.1.1/24 Site A PC 192.168.0.2/24 Site B Server 192.168.1.79/24

IPSEC Cisco ASA To Mikrotik

IPSEC Cisco ASA To Mikrotik Local lan subnet Remote lan subnet

IPSEC Cisco ASA To Mikrotik Source Wan Address Remote Wan Address

IPSEC Cisco ASA To Mikrotik Remote Wan Address

IPSEC Cisco ASA To Mikrotik

IPSEC Cisco ASA To Mikrotik Local lan subnet Srcnat Remote lan subnet

IPSEC Cisco ASA To Mikrotik

IPSEC Cisco ASA To Mikrotik

IPSEC Cisco ASA To Mikrotik

IPSEC Cisco ASA To Mikrotik

IPSEC Cisco ASA To Mikrotik

IPSEC Cisco ASA To Mikrotik

IPSEC Cisco ASA To Mikrotik

IPSEC Cisco ASA To Mikrotik

IPSEC Cisco ASA To Mikrotik

IPSEC Cisco ASA To Mikrotik

IPSEC Cisco ASA To Mikrotik

IPSEC Cisco ASA To Mikrotik

IPSEC Cisco ASA To Mikrotik

IPSEC Cisco ASA To Mikrotik

IPSEC Cisco ASA To Mikrotik