Hi,
We have a configuration where L2TP IPsec is being used to allow PPP VPN connections into the office LAN. The LAN subnet is 192.168.172.0/23.
Config is as follows:
/ip ipsec proposal
set [ find default=yes ] enc-algorithms=aes-256-cbc,aes-128-cbc,aes-128-ctr,3des,blowfish pfs-group=none
add enc-algorithms=aes-256-cbc,3des name=L2TP-Proposal pfs-group=none
/ip pool
add name=vpn-client-pool ranges=192.168.172.224/29
/interface l2tp-server server
set default-profile=geo-proxy-nat enabled=yes ipsec-secret="LLLLLLLLLLLLLLLLL" keepalive-timeout=60 max-mru=1400 max-mtu=1400 use-ipsec=yes
/ip address
add address=X.X.X.X/29 comment="WAN" interface=sfp1-wan network=X.X.X.X
add address=192.168.172.200/23 comment="LAN" interface=ether1-lan network=192.168.172.0
/ip firewall nat
add action=masquerade chain=srcnat comment="NAT for 192.168.172.172/23" out-interface=sfp1-wan src-address=192.168.172.0/23
/ip ipsec policy
set 0 dst-address=0.0.0.0/0 src-address=0.0.0.0/0
/ppp profile
add change-tcp-mss=yes comment="NAT Routing Proxy for VPN Clients" local-address=X.X.X.X name=geo-proxy-nat remote-address=vpn-client-pool
/ppp secret
add name=user1 password=aaabbbbbbbbbbbbbbbbbbb
We have a problem with Mac clients using the built-in OSX L2TP VPN client. They are able to connect fine, but we see that they only appear to have a route to 192.168.172.0/24 so cannot access devices on the second half of the /23. I have tried adding a static route on the client for 192.168.173.0/24 via the PPP connection which appears to force this traffic down the tunnel, but I can’t understand why this is necessary.
I would appreciate any help with understanding this problem. Thanks in advance.