VPN Tunnel connection

here is what I am trying to do. I want to have two mikrotik routers set up one at my office the other at a remote location. I want to be able to connect the two routers through some type of tunnel connection. I want all internet traffic at the remote site to go out the remote isp address. The only thing I want to be able to do over the vpn is configure the remote mikrotik router. Is this possible? I got a PPTP connect established but unsure of the next step or what routes to add into the mikrotiks?

Thanks

Sure. Post /interface print detail /ip address print detail /ip route print detail /ip firewall export

I actually got it working sort of. If i have both mikrotiks on the same network. IE my test network. They connect to each other and everything looks good.

As soon as I try to move it out to my production envirnment it all fails.
The setup is as follows. I have my PPTP mikrotik server on its own external static IP address. I then have my PPTP client mikrotik sitting behind a dlink router pulling dhcp address. At this point they no longer connect to one another. My first question is there a port Ineed to forward on the dlink? I went as far as dmzing the mikrotik and still no connection. Below are the files you asked for thanks for anyhelp

PPTP Server on own static ip


[admin@MikroTik] > interface print detail
Flags: D - dynamic, X - disabled, R - running, S - slave
0 R name=“ether1” type=“ether” mtu=1500 l2mtu=1524 max-l2mtu=1524

1 name=“ether2” type=“ether” mtu=1500 l2mtu=1524 max-l2mtu=1524

2 name=“ether3” type=“ether” mtu=1500 l2mtu=1524 max-l2mtu=1524

3 name=“ether4” type=“ether” mtu=1500 l2mtu=1524 max-l2mtu=1524

4 name=“ether5” type=“ether” mtu=1500 l2mtu=1524 max-l2mtu=1524

5 R name=“bridge1” type=“bridge” mtu=1500 l2mtu=65535


[admin@MikroTik] > ip address print detail
Flags: X - disabled, I - invalid, D - dynamic
0 address=24.227.116.187/29 network=24.227.116.184 interface=ether1
actual-interface=ether1

1 address=10.150.2.1/24 network=10.150.2.0 interface=bridge1
actual-interface=bridge1

[admin@MikroTik] > ip route print detail
Flags: X - disabled, A - active, D - dynamic,
C - connect, S - static, r - rip, b - bgp, o - ospf, m - mme,
B - blackhole, U - unreachable, P - prohibit
0 S dst-address=0.0.0.0/0 gateway=192.168.0.1
gateway-status=192.168.0.1 unreachable distance=1 scope=30
target-scope=10

1 A S dst-address=0.0.0.0/0 gateway=24.227.116.185
gateway-status=24.227.116.185 reachable ether1 distance=1 scope=30
target-scope=10

2 S dst-address=10.150.1.0/24 gateway=10.0.103.2
gateway-status=10.0.103.2 unreachable distance=1 scope=30
target-scope=10

3 ADC dst-address=10.150.2.0/24 pref-src=10.150.2.1 gateway=bridge1
gateway-status=bridge1 reachable distance=0 scope=10

4 ADC dst-address=24.227.116.184/29 pref-src=24.227.116.187 gateway=ether1
gateway-status=ether1 reachable distance=0 scope=10


[admin@MikroTik] > ip firewall export

jan/02/1970 00:23:37 by RouterOS 5.6

software id = W8Q7-668Y

/ip firewall connection tracking
set enabled=yes generic-timeout=10m icmp-timeout=10s tcp-close-timeout=10s
tcp-close-wait-timeout=10s tcp-established-timeout=1d
tcp-fin-wait-timeout=10s tcp-last-ack-timeout=10s
tcp-syn-received-timeout=5s tcp-syn-sent-timeout=5s tcp-syncookie=no
tcp-time-wait-timeout=10s udp-stream-timeout=3m udp-timeout=10s
/ip firewall filter
add action=accept chain=input disabled=no protocol=gre
add action=accept chain=input disabled=no dst-port=1723 protocol=tcp
/ip firewall nat
add action=masquerade chain=srcnat disabled=no src-address=10.0.0.0/24
/ip firewall service-port
set ftp disabled=no ports=21
set tftp disabled=no ports=69
set irc disabled=no ports=6667
set h323 disabled=no
set sip disabled=no ports=5060,5061 sip-direct-media=yes
set pptp disabled=no



CLIENT PPTP BEHIND DLINK ROUTER

[admin@MikroTik] /interface> print detail
Flags: D - dynamic, X - disabled, R - running, S - slave
0 R name=“ether1” type=“ether” mtu=1500 l2mtu=1520 max-l2mtu=1520

1 name=“ether2” type=“ether” mtu=1500 l2mtu=1520 max-l2mtu=1520

2 name=“ether3” type=“ether” mtu=1500 l2mtu=1520 max-l2mtu=1520

3 name=“ether4” type=“ether” mtu=1500 l2mtu=1520 max-l2mtu=1520

4 name=“ether5” type=“ether” mtu=1500 l2mtu=1520 max-l2mtu=1520

5 R name=“bridge1” type=“bridge” mtu=1500 l2mtu=65535

[admin@MikroTik] /ip address> print detail
Flags: X - disabled, I - invalid, D - dynamic
0 address=10.150.1.1/24 network=10.150.1.0 interface=bridge1
actual-interface=bridge1

1 X address=192.168.0.26/24 network=192.168.0.0 interface=ether1
actual-interface=ether1

2 D address=192.168.0.57/24 network=192.168.0.0 interface=ether1
actual-interface=ether1

[admin@MikroTik] /ip route> print detail
Flags: X - disabled, A - active, D - dynamic,
C - connect, S - static, r - rip, b - bgp, o - ospf, m - mme,
B - blackhole, U - unreachable, P - prohibit
0 ADS dst-address=0.0.0.0/0 gateway=192.168.0.1
gateway-status=192.168.0.1 reachable ether1 distance=1 scope=30
target-scope=10 vrf-interface=ether1

1 X S dst-address=0.0.0.0/0 gateway=192.168.0.1
gateway-status=192.168.0.1 inactive distance=1 scope=30
target-scope=10

2 ADC dst-address=10.150.1.0/24 pref-src=10.150.1.1 gateway=bridge1
gateway-status=bridge1 reachable distance=0 scope=10

3 S dst-address=10.150.2.0/24 gateway=10.0.103.1
gateway-status=10.0.103.1 unreachable distance=1 scope=30
target-scope=10

4 ADC dst-address=192.168.0.0/24 pref-src=192.168.0.57 gateway=ether1
gateway-status=ether1 reachable distance=0 scope=10

[admin@MikroTik] /ip firewall> export

jan/02/1970 00:20:24 by RouterOS 5.8

software id = 3MUC-NWVG

/ip firewall connection tracking
set enabled=yes generic-timeout=10m icmp-timeout=10s tcp-close-timeout=10s
tcp-close-wait-timeout=10s tcp-established-timeout=1d
tcp-fin-wait-timeout=10s tcp-last-ack-timeout=10s
tcp-syn-received-timeout=5s tcp-syn-sent-timeout=5s tcp-syncookie=no
tcp-time-wait-timeout=10s udp-stream-timeout=3m udp-timeout=10s
/ip firewall filter
add action=accept chain=input disabled=no protocol=gre
add action=accept chain=input disabled=no dst-port=1723 protocol=tcp
/ip firewall nat
add action=masquerade chain=srcnat disabled=no src-address=10.150.1.0/24
/ip firewall service-port
set ftp disabled=no ports=21
set tftp disabled=no ports=69
set irc disabled=no ports=6667
set h323 disabled=no
set sip disabled=no ports=5060,5061 sip-direct-media=yes
set pptp disabled=no

Does the PPTP establish when it is behind your dlink? Have you enabled vpn passthrough on your dlink?