I have l2tp/ipsec server successfully configured on my Mikrotik RB to work with Win client that use IPsec pre shared key configuration.
Googling around I have found very interesting tutorial http://www.jacco2.dds.nl/networking/openswan-l2tp.html#Firewallwarning regarding l2tp/ipsec server setup on linux and one important recommendation is additional secure of l2tp.
I have MTik firewall filter configured only to allow UDP port 500, IP protocol 50 (ESP) and UDP port 1701 (L2TP). Everything works, but I am always willing to learn and I would like to make it even more secure, especially in terms of more securing L2TP as it is mentioned in the tutorial.
Can someone more experienced than me provide securing tips/suggestions for MTik server side, that I missed.
I especially wanted to achieve that L2TP tunnel can ONLY work with IPsec - I would like to achieve that only IPsec authenticated clients are able to access the L2TP interface/daemon
In the tutorial the ipsec interface is mentioned and I do not understand that - I think that only L2TP is an interface and not ipsec? Am I missing something?? Any help is very very appreciated! Thanks in advance!
sorry for self-bump but I can not achieve that only ipsec secured traffic is allowed thru l2tp interface.
Is there any way to achieve that, some suggestions?
Can I, maybe, mark all ipsec traffic on public interface and only allow those marked packets to go thru 1701 udp?? Think that this is not going to work but I do not know? Any help is very welcome!
Is there any any kind of way to allow only ipsec traffic to go into l2tp interface?
I really need this because it seems that someone constantly probing my l2tp interface (udp 1701) and udp 500 as well?
I want to stop that. Many thanks!
Apologies for second bump. This is going to be the last one if I do not get any help.
I am also interested in this situation. Recently i started to experiment with l2tp/ipsec and found that any can easily login on mtk only with user/pass for l2tp (brute force for example). Ipsec is only there to additionally encrypt your traffic. I think that we need to connect only if there is l2tp in combination with ipsec, and to refuse if there is no ipsec in l2tp connection. C’mon wise guys, share your experience with us l2tp/ipsec rookies
It seems that nobody else is motivated to join the discussion. Hope that somebody except blue and myself will find it interesting enough to participate
Maybe this is better than nothing to prevent brute force attackers on L2TP interface
this is the concept that peđa published in this link: http://pedja.supurovic.net/kako-onemoguciti-ssh-napade-na-mikrotik (serbian language)
I tried to implement our l2tp problem in it and it works, but this is still not the ultimate good solution, just better than nothing
I use a port knocker app from play store and app store. the knocking then adds the clients to the secure list which is part of the requirements for the connection. Without the knock the port is closed for that device. For windows i just googled a port knocker. Will post the link tomorrow when im in front of my pc
Thank you for the quick answer. No need to search links and software, I understood the main idea of your schema. The problem was I didn’t know about port-knocking software for Android and IOS)