Community discussions

MikroTik App
 
chrisccs
just joined
Topic Author
Posts: 2
Joined: Fri Mar 16, 2012 3:58 pm

VPN

Fri Mar 16, 2012 6:39 pm

Hi,
I have RB750GL and I wanted to enable VPN so we can connect remotely to office lan.
it is working when we try to connect from computer (Windows XP pptp client) that is in LAN, but from outside, it does not work.
Windows with Connecting to <IP address> stays for about 10 seconds and then I got Error 678:The remote computer did not respond.
I test the connection whit ping and it´s fine, but when I test port 1723 whit telnet the connection fails.
I´ve configure the firewall:

/ip firewall filter
add action=accept chain=input comment="PPTP" \
disabled=no dst-port=1723 in-interface=wan protocol=tcp

and place the rule at the bottom of the list and still not working
What could be the cause of this problem? Any Ideas?
 
reverged
Member Candidate
Member Candidate
Posts: 270
Joined: Thu Nov 12, 2009 8:30 am

Re: VPN

Fri Mar 16, 2012 9:06 pm

It probably doesn't want to be at the bottom of the list.
Try putting the rule before the "drop" rule.

Rules are processed top to bottom in each chain.
 
User avatar
docmarius
Forum Guru
Forum Guru
Posts: 1222
Joined: Sat Nov 06, 2010 12:04 pm
Location: Timisoara, Romania
Contact:

Re: VPN

Fri Mar 16, 2012 10:38 pm

You have to also accept protocol 47(gre)...
 
chrisccs
just joined
Topic Author
Posts: 2
Joined: Fri Mar 16, 2012 3:58 pm

Re: VPN

Sat Mar 17, 2012 12:08 am

HI.
I put it on the top, but still not working.
Any other ideia?
 
ditonet
Forum Veteran
Forum Veteran
Posts: 835
Joined: Mon Oct 19, 2009 12:52 am
Location: Europe/Poland/Konstancin-Jeziorna
Contact:

Re: VPN

Sat Mar 17, 2012 12:54 am

You should also allow GRE protocol:
/ip firewall filte
add action=accept chain=input comment=PPTP disabled=no protocol=gre
HTH,
 
reverged
Member Candidate
Member Candidate
Posts: 270
Joined: Thu Nov 12, 2009 8:30 am

Re: VPN

Sat Mar 17, 2012 2:30 am

You should also allow GRE protocol:
/ip firewall filte
add action=accept chain=input comment=PPTP disabled=no protocol=gre
HTH,
/ip firewall filter
add chain=input action=accept connection-state=established 
add chain=input action=accept connection-state=related
....
....
add chain=input action=accept protocol=tcp in-interface=<optional port> dst-port=1723 src-address-list=<optional Address List>
...
....
add chain=input action=log
# the next rule can be disabled to prevent locking yourself out of the router.  Use safe mode.
add chain=input action=drop disabled=yes  
Rule 1 simply makes processing faster as once established, connection data will be accepted.
Rule 2 takes care of GRE if the pptp helper is enabled in /ip firewall service-port
If you are getting to your router from the outside then you will either see the rule for 1723 increment or the log will show what is wrong.
If either of those 2 does not happen, then there is something else wrong, possibly outside your network.
There are rules in the middle that let you manage the router, I can't presume those.
Disable or remove the drop rule and use safe mode while you are testing, to be safe.
Run torch on the gateway interface to see the inbound port 1723 traffic.

Who is online

Users browsing this forum: Bing [Bot] and 196 guests