iPhone VPN AT&T

AT&T block PPTP so In understand, so I was going to try and get L2TP or IPSEC working but haven’t got very far. With L2TP I am getting “Cant Find Configuration” on the log but no further clues as to why it doesnt work.

Does anyone know how to set this up?

Without more information there’s not much we can do to help. Try reading the Wiki for these VPNs, there is also some user examples floating around in the Wiki I believe as well.

http://wiki.mikrotik.com/wiki/Manual:IP/IPsec
http://wiki.mikrotik.com/wiki/Manual:Interface/L2TP

The question is has anyone connected an iPhone to the Mikrotik VPN? If so how did you do it.

On the iPhone for L2TP the options that need filling out are:

Account
Password
Secret

The rest of the fields are obvious like the server ip etc.

On the MTK I went to PPP and set up a Secret (Name and Password)

On IPSec I set up a peer with 0.0.0.0/0 as we do not know the IP of the iPhone and it changes.

ATT doesnt block pptp.. I use it in my iphone over 3g/edge.

Weird Odd! It works great for me on WiFi but does nothing on the network. I get no traffic at all on the router from the iPhone, let alone VPN traffic. Did you buy the enterprise data plan?

PPTP with my iPhone works for me as well over AT&T. I am unable to get L2TP to function at all. I don’t think the packets are even entering my network.

That could be it. I have like 8 phones on my business account, 6 of which are on the enterprise data plan. That is probably one of the benefits. You get to use something that is already there… God I hate cell companies.

I Also am able to connect using my ATT Iphone with PPTP and have no prob Edge or 3G Edge is SLOW as all get out but I can do what I need to..

When I have AT&T’s Iphone, I was using VPN for downloading torrents on my phone, I configure my phone from this guide: https://www.bestvpnprovider.com/how-to-download-torrents-on-iphone/ (Without Jail Break). Please do reply back if its help.

Thanks

I have an iPhone with AT&T and have L2TP setup for VPN access to my Mikrotik. AT&T does not block VPN service.


Couple of Code snippets:

/Firewall

21    ;;; Permit L2TP VPN
chain=input action=accept protocol=udp in-interface=ether5 dst-port=500 log=no log-prefix="" 
chain=input action=accept protocol=udp in-interface=ether5 dst-port=4500 log=no log-prefix="" 
chain=input action=accept protocol=udp in-interface=ether5 dst-port=1701 log=no log-prefix="" 
chain=input action=accept protocol=ipsec-esp in-interface=ether5 log=no log-prefix=""

/Pool used for VPN Clients

/ip pool> print
 # NAME                                                                                     RANGES                          
 3 l2tp_pool                                                                                192.168.100.5-192.168.100.20



/ppp> profile print 
Flags: * - default 
 0 * name="default" use-mpls=default use-compression=default use-encryption=default only-one=default change-tcp-mss=yes 
     use-upnp=default address-list="" on-up="" on-down="" 

 1 * name="default-encryption" local-address=192.168.100.1 remote-address=l2tp_pool use-mpls=default 
     use-compression=default use-encryption=required only-one=default change-tcp-mss=yes use-upnp=no address-list="" 
     dns-server=192.168.100.1 on-up="" on-down=""



/ip ipsec> policy print      
Flags: T - template, X - disabled, D - dynamic, I - inactive, * - default 
 0 T * group=default src-address=::/0 dst-address=::/0 protocol=all proposal=default template=yes



/ip ipsec> proposal print
Flags: X - disabled, * - default 
 0  * name="default" auth-algorithms=sha256,sha1 enc-algorithms=aes-256-cbc,aes-256-ctr lifetime=30m pfs-group=modp1024



/ip ipsec> peer print
Flags: X - disabled, D - dynamic 
 0    address=0.0.0.0/0 local-address=:: passive=no port=500 auth-method=pre-shared-key secret="SharedSecretGoesHere" 
      generate-policy=port-override policy-template-group=default exchange-mode=main-l2tp send-initial-contact=yes 
      nat-traversal=yes hash-algorithm=sha1 enc-algorithm=aes-256 dh-group=modp1024 lifetime=1d dpd-interval=2m 
      dpd-maximum-failures=5



/ip ipsec> mode-config print
Flags: * - default 
 0 * name="request-only" send-dns=yes

This is a 6 year old topic. I’m sure the issue was resolved 6 years ago.