Do you plan to add support for UDP over (in) OVPN
and add the ability to automatically create certificates for client and server in the new version ROS 6 or 5.16 or higher ?
I have had HORRIBLE stability issues with SSTP. I really wish SSTP worked better, but I (and other people on this forum) have problems with losing connection, etc.
As those two options seem to be the two most requested options on your forums for quite some time it is realy hard for me, as an experienced programer and developer, to understand why does it take so much time for your developers to implement this. You have a working openvpn implementation which needs only to add compression (this realy should not be such a problem) and UDP support.
Can you please explain in a few words to us why mikrotik team does not wish to implement those features nevertheless they are requested by so many users on this forum for quite some time.
Certificate generation on local comp is not a problem… not being able to connect my router to existing openvpn infrastructure is.
Absolutly agree with JanezFord… Nobody understand what a problem to add UDP and LZO support… but more than that I can’t understand why Mikrotik developers keep silence about the reasons of such fail… maybe it’s government request (NSA, CIA etc.)? I think it’s time for petition! Let’s vote!
I think if there is demand for OpenVPN from so many customers, it is necessary to reckon with it… OpenVPN is recognised the best and most secure VPN solution at the moment and it’s just stupid to drop it as is… in real business there are no words like “we will not make our customers happy just because we don’t like it”, it’s not a kindergarten really…
I will, again, add a vote for OpenVPN UDP support in RouterOS. It’s caused me no end of problems. I switched to Mikrotik to gain access to a steady supply of low cost VPN routers, and lack of proper OpenVPN support is the only real problem I have (Other than weird sector write issues and now a freeze in a previously working script after upgrades on some, not all, routers).
I like Mikrotik routers now, I must have close to a hundred from the 1100Ah through 411AR’s, 450’s, OmniTik’s, and lots of 750’s, with the 750UP being my new favourite, as I’m planning on using them to remotely bridge in phones for auto provisioning and power.
OPENVPN UDP is a highly wanted feature. I do PPTP over IPSEC because it’s the only stable site-to-site VPN tech on mikrotik. SSTP is extremely unstable for me on all versions of routeros I have tested. Slow dialup times, frequent drops for no apparent reason.
SSTP is in theory really great. Fix the stability issue so we can use it in the real world please.
AGREE! SSTP would be PERFECT for site-to-site… but it is VERY UNSTABLE. I have found that if you don’t use public keys (which I think disables ecryption, then it works better… but that’s not a good idea)
This is many times more stable now. No drops since I brought up the tunnel. I was getting drops every 10-15 minutes before. Will continue testing but this is looking better now.
In my opinion, MikroTik team should take VPN issues more seriously. What’s the point of manufacturing hardware like RB1100AHx2 with encryption acceleration, when you can’t use it in real life scenarios. I mean, you have an option to use it, but then you are faced with all those issues people are talking about on this forum.