Hi!
I have two Mikrotik routers, connected via L2TP with IPSec (1st is RouterOS CHR as server with public IP, 2nd is Hap AC2 as client)
The problem is that routers see each other, tunnel is working, but I can’t get access to any device in the client’s subnet.
L2TP server config:
/interface bridge
add arp=proxy-arp disabled=yes name=bridge1
/interface ethernet
set [ find default-name=ether1 ] arp=proxy-arp
/interface l2tp-server
add name=l2tp-in-iphone-se user=iphone_se
add name=l2tp-in-macbook user=macbook
add name=l2tp-in-mikrotik user=mikrotik
/interface list
add name=WAN
add name=LAN
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/ppp profile
add change-tcp-mss=yes name=vpn only-one=no use-compression=yes use-encryption=yes use-mpls=no
/user group
set full policy=local,telnet,ssh,ftp,reboot,read,write,policy,test,winbox,password,web,sniff,sensitive,api,romon,dude,tikapp
/ip neighbor discovery-settings
set discover-interface-list=!dynamic
/interface l2tp-server server
set default-profile=vpn enabled=yes use-ipsec=yes
/interface list member
add interface=ether1 list=WAN
add list=LAN
/ip address
add address=192.168.87.1/24 interface=ether1 network=192.168.87.0
/ip dhcp-client
add !dhcp-options disabled=no interface=ether1
/ip firewall filter
add action=accept chain=input dst-port=1701,500,4500 protocol=udp src-port=“”
add action=accept chain=input in-interface-list=WAN protocol=ipsec-esp
add action=accept chain=input in-interface-list=WAN protocol=ipsec-ah
/ip firewall nat
add action=masquerade chain=srcnat out-interface=ether1
/ip route
add distance=1 dst-address=192.168.88.0/24 gateway=10.50.0.11 pref-src=10.50.0.10
/ppp secret
add local-address=10.50.0.10 name=macbook profile=vpn remote-address=10.50.0.12 service=l2tp
add local-address=10.50.0.10 name=iphone_se profile=vpn remote-address=10.50.0.13 service=l2tp
add local-address=10.50.0.10 name=mikrotik profile=vpn remote-address=10.50.0.11 service=l2tp
/system identity
set name=somenetname
L2TP client config:
/interface bridge
add admin-mac=B8:69:F4:80:1B:9A arp=proxy-arp auto-mac=no comment=defconf name=bridge
/interface ethernet
set [ find default-name=ether1 ] arp=proxy-arp
/interface l2tp-client
add allow-fast-path=yes connect-to=serverPublicIP disabled=no name=l2tp-aws use-ipsec=yes user=mikrotik
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
/ip pool
add name=dhcp ranges=192.168.88.10-192.168.88.254
/ip dhcp-server
add address-pool=dhcp disabled=no interface=bridge name=defconf
/interface bridge port
add bridge=bridge comment=defconf interface=ether2
add bridge=bridge comment=defconf interface=ether3
add bridge=bridge comment=defconf interface=ether4
add bridge=bridge comment=defconf interface=ether5
add bridge=bridge comment=defconf interface=wlan1
add bridge=bridge comment=defconf interface=wlan2
/ip neighbor discovery-settings
set discover-interface-list=LAN
/interface list member
add comment=defconf interface=bridge list=LAN
add comment=defconf interface=ether1 list=WAN
/ip address
add address=192.168.88.1/24 comment=defconf interface=ether2 network=192.168.88.0
/ip dhcp-client
add comment=defconf disabled=no interface=ether1
/ip dhcp-server network
add address=192.168.88.0/24 comment=defconf gateway=192.168.88.1
/ip dns
set allow-remote-requests=yes
/ip dns static
add address=192.168.88.1 comment=defconf name=router.lan
/ip firewall filter
add action=accept chain=forward comment=“defconf: accept in ipsec policy” disabled=yes ipsec-policy=in,ipsec
add action=accept chain=forward comment=“defconf: accept out ipsec policy” disabled=yes ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment=“defconf: fasttrack” connection-state=established,related disabled=yes
add action=accept chain=forward comment=“defconf: accept established,related, untracked” connection-state=established,related,untracked disabled=yes
add action=drop chain=forward comment=“defconf: drop invalid” connection-state=invalid disabled=yes
add action=drop chain=forward comment=“defconf: drop all from WAN not DSTNATed” connection-nat-state=!dstnat connection-state=new disabled=yes
in-interface-list=WAN
add action=accept chain=input disabled=yes protocol=icmp
add action=accept chain=input connection-state=established disabled=yes
add action=accept chain=input connection-state=related disabled=yes
add action=drop chain=input disabled=yes in-interface-list=!LAN
/ip firewall nat
add action=masquerade chain=srcnat comment=“defconf: masquerade” ipsec-policy=out,none out-interface-list=WAN
add action=masquerade chain=srcnat out-interface=l2tp-aws
/ip route
add distance=1 dst-address=192.168.87.0/24 gateway=10.50.0.10 pref-src=10.50.0.11
I can ping any device in the client subnet from L2TP server. From client terminal I can only ping 10.50.0.10 (L2TP server) and self.
From laptop I get no ping from 10.50.0.11 (client router).
I’ve switched off firewall on the client side, nothing seems to change.
Please help me!