Hi all
This may be a very basic question. However I’ve searched through this forum without succeed.
I have replaced a linksys router in one our offices with a RB450 (RouterOS 4.14). Since then connections to a remote vpn got dropped immediately or just after some seconds. As far as I know the VPN is just a Windows server VPN service in the remote end. I’m trying to figure out what is causing this behaviour but my mikrotik experience is quite short.
Our mikrotik has a very simple configuration:
# GW interface and LAN Switch
/interface ethernet set ether1 name ether1-gateway
/interface ethernet set ether2 name ether2-local-master
/interface ethernet set ether3 name ether3-local-slave
/interface ethernet set ether4 name ether4-local-slave
/interface ethernet set ether5 name ether5-local-slave
/interface ethernet set ether3-local-slave master-port=ether2-local-master
/interface ethernet set ether4-local-slave master-port=ether2-local-master
/interface ethernet set ether5-local-slave master-port=ether2-local-master
# LAN config
/ip address add address=192.168.1.1/24 interface=ether2-local-master comment "lan default gateway"
# WAN config (dhcpclient from de DSL)
/ip dhcp-client add interface=ether1-gateway disabled=no
/ip firewall nat add chain=srcnat action=masquerade out-interface=ether1-gateway
# DNS and clock settings
/ip dns set servers=8.8.8.8,8.8.4.4
/system ntp client set mode=unicast enabled=yes primary-ntp=128.2.201.216
# LAN DHCP server
/ip pool add name=dhcp-lan-pool ranges=192.168.1.30-192.168.1.199
/ip dhcp-server add name=dhcp-lan address-pool=dhcp-lan-pool interface=ether2-local-master lease-time=72h
/ip dhcp-server network add address=192.168.1.0/24 gateway=192.168.1.1 dns-server=8.8.8.8,8.8.4.4
/ip dhcp-server enable dhcp-lan
# QoS for our VoIP devices
/ip firewall mangle add action=mark-packet chain=forward comment=VoIP disabled=no new-packet-mark=VoIP passthrough=no src-address=192.168.1.130-192.168.1.148
/ip firewall mangle add action=mark-packet chain=forward comment=VoIP disabled=no dst-address=192.168.1.130-192.168.1.148 new-packet-mark=VoIP passthrough=no
/queue tree add burst-limit=0 burst-threshold=0 burst-time=0s disabled=no limit-at=0 max-limit=0 name=ether1_gw_voip packet-mark=VoIP parent=ether1-gateway priority=2 queue=default
/queue tree add burst-limit=0 burst-threshold=0 burst-time=0s disabled=no limit-at=0 max-limit=0 name=ether2_lan_voip packet-mark=VoIP parent=ether2-local-master priority=2 queue=default
As you see there is no special firewall settings.
However I’ve tried to avoid the droppings of the remote VPN with the following rules but it seems that it hasn’t helped:
/ip firewall filter add chain=forward connection-state=established action=accept
/ip firewall filter add chain=forward connection-state=related action=accept
/ip firewall filter add chain=input connection-state=established action=accept
/ip firewall filter add chain=input connection-state=related action=accept
Any help or hints would be appreciated.
[EDIT] Here are the firewall settings as per the export command:
[admin@MikroTik] > /ip firewall export
# sep/20/2011 16:13:55 by RouterOS 4.14
#
/ip firewall connection tracking
set enabled=yes generic-timeout=10m icmp-timeout=10s tcp-close-timeout=10s tcp-close-wait-timeout=10s tcp-established-timeout=1d tcp-fin-wait-timeout=10s tcp-last-ack-timeout=10s tcp-syn-received-timeout=\
5s tcp-syn-sent-timeout=5s tcp-syncookie=no tcp-time-wait-timeout=10s udp-stream-timeout=3m udp-timeout=10s
/ip firewall filter
add action=accept chain=forward comment="permitir conexiones previamente establecidas" connection-state=established disabled=no
add action=accept chain=forward comment="permitir conexiones relativas" connection-state=related disabled=no
add action=accept chain=input comment="permitir conexiones previamente establecidas" connection-state=established disabled=no
add action=accept chain=input comment="permitir conexiones relacionadas" connection-state=related disabled=no
/ip firewall mangle
add action=mark-packet chain=forward comment=VoIP disabled=no new-packet-mark=VoIP passthrough=no src-address=192.168.1.130-192.168.1.148
add action=mark-packet chain=forward comment=VoIP disabled=no dst-address=192.168.1.130-192.168.1.148 new-packet-mark=VoIP passthrough=no
/ip firewall nat
add action=masquerade chain=srcnat comment="" disabled=no out-interface=ether1-gateway
/ip firewall service-port
set ftp disabled=no ports=21
set tftp disabled=no ports=69
set irc disabled=no ports=6667
set h323 disabled=no
set sip disabled=no ports=5060,5061
set pptp disabled=no
[admin@MikroTik] > ip service export
# sep/20/2011 16:14:01 by RouterOS 4.14
#
/ip service
set telnet address=0.0.0.0/0 disabled=yes port=23
set ftp address=0.0.0.0/0 disabled=yes port=21
set www address=192.168.1.0/32 disabled=no port=80
set ssh address=0.0.0.0/0 disabled=no port=9999
set www-ssl address=0.0.0.0/0 certificate=none disabled=yes port=443
set api address=0.0.0.0/0 disabled=yes port=8728
set winbox address=192.168.1.0/32 disabled=no port=8291