IP → Firewall
ADD NEW
Chain → input
Protocol → GRE (Protocol 47)
APPLY and OK (no port or anything else needed)
Same rule with Chain → output with GRE
APPLY and OK
And now add the last rule
CHAIN → input
Protocol → TCP
Destination Port (Dst. Port) → 1723
For all needs I would add following ports to your firewall too.
Input - UDP - Dst. Port 500
Input - IPSEC-ESP - (no port)
Input - TCP - Dst. Port 80 and 8291
the first 2 are for ipsec and the last tcp ports are for webinterface and winbox via WAN.
There are of course some more rules if you want to use another vpn like IPIP or whatever.
For your needs it should work like this.
Try this. I hope your default route (IP → Routes) is set right, too.
What kind is your uplink? PPoE, Static LAN IP? Static Public IP?
If you are behind another router and dont have a public IP (or PPoE Uplink) the main router will need some ports and protocoll forwardings, too. (like GRE and TCP)
Maybe in routes (IP → Routes) you will need one manual entry, too.
P.S.: ALMOST FORGOT IT!
You have to move the firewall rules to the TOP over the DROP.
CLICK and HOLD the rule in the overview and move it up over the last DROP action.
Well there are ways how you should sort it, that a packet dont have to run again and again rules which are not needed often. In your case start like this first.
Sorting your firewall rules will be a part later if you have more, and more … and too much rules
Would I need to modify firewall rules, for outgoing VPN? Again to clarify, I’m not connecting to a Mikrotik router. I’m setting one up as a VPN client. The VPN server is already set up and tested, working fine.