Hi there,
Recently I started to configure my Mikrotik hAP ac as a L2TP/IPSEC server to be able to access my local samba file-server from outside. I’ve found a lot of standard tutorials out there, and basically everything is working OK, but a couple of questions still need to be clarified for me.
- The tutorials recommend to add the following two rules to my firewall input chain:
/ip firewall filter
add chain=input action=accept protocol=udp port=1701,500,4500
add chain=input action=accept protocol=ipsec-esp
While the first rule is absolutely clear, the second raises the questions: what is it for, and why is not triggered at all (counters show zeroes), while the IPSEC tunnel is established and working? Can it be removed, or it is necessary for some specific cases?
- Some tutorials say, that there may be troubles with IPSEC and FastTrack, and recommend to arrange IPSEC packets marking in order to exclude IPSEC from FastTrack. I have FastTrack enabled in my Mikrotik, and see no problems with L2TP/IPSEC at all, the clients are able to connect and exchange data with the server. Should I nevertheless take care about this, or let it as it is?
Thanks in advance for your help