@hunter : those are exactly the sections i used to get started with it, but i cant get it working yet.
I have read the MFA authenticator/user-manager/radius but since i already have to much troubles i will leave that for later.
https://help.mikrotik.com/docs/spaces/ROS/pages/2555940/User+Manager#UserManager-MFAauthenticationforRouterOSuserlogin
@sindy : i tried many, the own-ca way.
0 K A T local-cert local-cert
1 K A T webfig 10.0.x.xxx
2 KLA T ca ca
3 K I TesTikDE 10.0.x.xxx IP:10.0.x.xxx
4 K I TestFlap TestFlap
5 K R TesTikDE_outside 80.aaa.bbb.cc IP:80.aaa.bbb.cc
6 K R TesTikDE_dns myname.ourdomain.de
7 KLA T ca_outside ca_outside
8 KLA T ca_dns ca_dns
9 K I TesTikDE_outside2 80.aaa.bbb.cc IP:80.aaa.bbb.cc
10 K I TesTikDE_dns2 myname.ourdomain.de
I did not try lets-encrypt yet, i will try that, it might solve problems with windows-importing (used the automatic-which-store…) i’m a little confused there.
Regarding the cyphers: No, i do not know exactly what i’m doing
too many options…
Interested in what u mean by the behind-NAT-trick. I’m using 500/4500 nat-traversal now.
Logging: had topcis=ipsec,packet and tried topcis=ipsec also.
Changed it to ipsec,!packet See if thats better Thanx.
Export: (might be a mess, i tried too may things, need to clear it and start over i think)
# 2025-02-05 19:23:02 by RouterOS 7.16.2
# software id = GKW7-GIGP
# model = RB760iGS
/ip ipsec mode-config
add address-pool=TSDE_vpnpool address-prefix-length=32 name=ike2-conf
/ip ipsec policy group
add name=ike2-policies
/ip ipsec profile
set [ find default=yes ] dh-group=x25519,ecp384,ecp521 dpd-interval=2m dpd-maximum-failures=5 enc-algorithm=aes-256 hash-algorithm=sha512 prf-algorithm=sha512 proposal-check=strict
add dh-group=x25519,ecp256,ecp384,ecp521,modp8192,modp6144,modp4096,modp3072,modp2048 enc-algorithm=aes-256,aes-192,aes-128 hash-algorithm=sha256 name=TStest_IKEv2_ph1
/ip ipsec peer
add exchange-mode=ike2 name=peer1 passive=yes profile=TStest_IKEv2_ph1
/ip ipsec proposal
set [ find default=yes ] auth-algorithms=sha512,sha256 disabled=yes enc-algorithms=chacha20poly1305,aes-256-cbc,aes-256-gcm pfs-group=ecp521
add auth-algorithms=sha512,sha256 enc-algorithms=chacha20poly1305,aes-256-cbc,aes-256-ctr,aes-256-gcm,aes-192-cbc,aes-192-ctr,aes-192-gcm,aes-128-cbc,aes-128-gcm name=TStest_IKEv2_ph2 pfs-group=none
/ip ipsec identity
add auth-method=digital-signature certificate=TesTikDE_dns generate-policy=port-strict match-by=certificate mode-config=ike2-conf peer=peer1 policy-template-group=ike2-policies remote-certificate=TestFlap remote-id=ignore
/ip ipsec policy
set 0 disabled=yes
add dst-address=10.0.x.0/24 group=ike2-policies proposal=TStest_IKEv2_ph2 src-address=0.0.0.0/0 template=yes
Yes, it is a mess now.. Sorry.
The server authentication is not very important, it is a situation where a handfull of capable staff need remote access to the companies servers &| network.
I had in mind to start with PSK-only but that didnt turn out to be so easy…
Question:
Keeping in mind that i want the radius-method later for MFA/Authenticator, which auth-method should i choose now (w/o radius) on both sides, to start with ?
A simple config (to start with) would be great. I need less options too choose from…