How To Establish IPSec VPN connection between Cyberoam and Mikrotik router Applicable Version: 10.00 onwards Scenario Establish IPSec VPN connection between Cyberoam and Mikrotik router using Preshared Key authentication. Microtik Configuration Administrator access required to add or modify configuration in Mikrotik. Step 1: Configure IPSec Proposal Go to IP > IPSec > Proposal and click Add New to create an IPSec proposal for the VPN tunnel as shown below. Parameters Enabled Name Auth. Algorithms Encr. Algorithms Value proposal1 sha1 3des Lifetime 00:30:00 PFS Group modp1024
Click Apply and then OK to create the IPSec Proposal. Step 2: Configure Peer Navigate to IP > IPSec > Peer and click Add New to configure Peer/ Remote Device (here, Cyberoam) as shown in the image.
Parameters Enabled Value Address 1.1.1.1 Port Auth. Method sha1 pre shared key
Secret Policy Group Exchange Mode Send Initial Contact Proposal Check Hash Algorithm Encryption Algorithm DH Group Generate Policy cyberoam default main Obey sha1 3des modp1024 no Lifetime 04:00:00 DPD Interval disable DPD DPD Maximum Failures 5 Step 3: Configure IPSec Policy Navigate to IP > IPSec > Policy and click Add New to create IPSec policy as shown in the table below. Parameters Enabled Value Src. Address 172.16.1.0/24 Dst. Address 192.168.110.0/24 Protocol Action Level IPSec protocols Tunnel 255(All) encrypt require esp SA Src. Address 2.2.2.2 SA Dst. Address 1.1.1.1 Proposal proposal1 Priority 0
Step 4: Configure NAT policy Navigate to Firewall > NAT and click Add New to create NAT policy. Specify the following parameters: Parameters Source Address Destination Address Action Value 172.16.1.0 (Mikrotik s LAN IP Address) 192.168.110.0/24 (Cyberoam s LAN IP Address) Accept Click Apply and OK to save. The following screen will be displayed.
Cyberoam Configuration You must be logged on to the Web Admin Console as an administrator with Read-Write permission for relevant feature(s). To configure IPSec Connection in Cyberoam, follow the steps given below. Step 1: Configure IPSec Connection Go to VPN > IPSec > Connection and click Add to create a new connection using parameters given below. Parameter Value Description Name IPSec_CR_Mikrotik Name to identify the IPSec Connection Connection Type Site to Site Select Type of connection. Available Options: Remote Access Site to Site Host to Host Policy DefaultBranchOffice Select policy to be used for connection Select the action for the connection. Action on VPN Restart Authentication details Initiate Authentication Type Preshared Key Available options: Respond Only Initiate Disable Select Authentication Type. Authentication of user depends on the connection type. Preshared Key Cyberoam Specify the Preshared Key Endpoints Details Local PortB-1.1.1.1 Select local port which acts as end-point to the tunnel
Remote 2.2.2.2 Specify Gateway IP Address assigned to Cradle Point router. Local Network Details Local Subnet 192.168.1.0/24 Select Local LAN Address. Add and Remove LAN Address using Add Button and Remove Button Remote Network Details Remote LAN Network 172.16.1.0.0/24 Select/specify IP address of Cradle Point local network. Click OK to create the connection.
Step 3: Activate IPSec Connection Go to VPN > IPSec > Connection and click under Active and Connection heads against IPSec_CR_Mikrotik connection, created in Step 1 Under the Active status indicates that the connection is successfully activated. Under the Connection status indicates that the connection is successfully established. Document Version 1.0 03 November, 2014