Community discussions

MikroTik App
 
knowledgemonster
just joined
Topic Author
Posts: 24
Joined: Fri Dec 04, 2015 3:47 pm
Location: Ontario Canada
Contact:

EdgeMAX vpn to Mikrotik lan device cannot ping

Fri Sep 02, 2022 6:19 pm

Hi,

I have an EdgeRouter X v2.0.6 and it is the L2TP+IPSec server.
I have Mikrotik RB951Ui-2HnD with v7.5 on it as the client.

VPN connection is established between the 2 routers

From the mikrotik i can ping the lan device on the EdgeRouter.
From the lan on the mikrotik side i cannot ping the lan device on the EdgeRouter.

Mikrotik lan is 192.168.88.0/24
Edge lan is 192.168.0.0/24
VPN ip assigned to client is 192.168.100.230

Where do i start looking?

Here is the script for mt:
# sep/02/2022 11:31:22 by RouterOS 7.5
# software id = E7I4-E2AN
#
# model = 951Ui-2HnD
# serial number = 5582050204DB
/interface bridge
add admin-mac=E4:8D:8C:83:3A:4B auto-mac=no comment=defconf name=bridge
/interface wireless
set [ find default-name=wlan1 ] band=2ghz-b/g/n channel-width=20/40mhz-XX \
    disabled=no distance=indoors frequency=auto installation=indoor mode=\
    ap-bridge ssid=MikroTik-833A4F wireless-protocol=802.11
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
/interface lte apn
set [ find default=yes ] ip-type=ipv4 use-network-apn=no
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/ip pool
add name=default-dhcp ranges=192.168.88.10-192.168.88.254
/ip dhcp-server
add address-pool=default-dhcp interface=bridge name=defconf
/interface l2tp-client
add connect-to=10.0.0.34 name=l2tp-wt profile=default use-ipsec=yes \
    user=someuser
/interface bridge port
add bridge=bridge comment=defconf ingress-filtering=no interface=ether2
add bridge=bridge comment=defconf ingress-filtering=no interface=ether3
add bridge=bridge comment=defconf ingress-filtering=no interface=ether4
add bridge=bridge comment=defconf ingress-filtering=no interface=ether5
add bridge=bridge comment=defconf ingress-filtering=no interface=wlan1
/ip neighbor discovery-settings
set discover-interface-list=LAN
/ip settings
set max-neighbor-entries=8192
/ipv6 settings
set disable-ipv6=yes max-neighbor-entries=8192
/interface list member
add comment=defconf interface=bridge list=LAN
add comment=defconf interface=ether1 list=WAN
/interface ovpn-server server
set auth=sha1,md5
/ip address
add address=192.168.88.1/24 comment=defconf interface=bridge network=\
    192.168.88.0
/ip dhcp-client
add comment=defconf interface=ether1
/ip dhcp-server network
add address=192.168.88.0/24 comment=defconf dns-server=192.168.88.1 gateway=\
    192.168.88.1
/ip dns
set allow-remote-requests=yes
/ip dns static
add address=192.168.88.1 comment=defconf name=router.lan
/ip firewall filter
add action=accept chain=input comment=\
    "defconf: accept established,related,untracked" connection-state=\
    established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=\
    invalid
add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
add action=accept chain=input comment=\
    "defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1
add action=drop chain=input comment="defconf: drop all not coming from LAN" \
    in-interface-list=!LAN
add action=accept chain=forward comment="defconf: accept in ipsec policy" \
    ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy" \
    ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" \
    connection-state=established,related hw-offload=yes
add action=accept chain=forward comment=\
    "defconf: accept established,related, untracked" connection-state=\
    established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" \
    connection-state=invalid
add action=drop chain=forward comment=\
    "defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat \
    connection-state=new in-interface-list=WAN
/ip firewall nat
add action=masquerade chain=srcnat comment="defconf: masquerade" \
    ipsec-policy=out,none out-interface-list=WAN
/ip route
add disabled=no dst-address=192.168.0.1/24 gateway=l2tp-wt routing-table=\
    main suppress-hw-offload=no
/system clock
set time-zone-name=America/Toronto
/tool mac-server
set allowed-interface-list=LAN
/tool mac-server mac-winbox
set allowed-interface-list=LAN
If i setup the vpn on the windows 10 computer then i can access lan device edgerouter no problem.

Thanks
 
knowledgemonster
just joined
Topic Author
Posts: 24
Joined: Fri Dec 04, 2015 3:47 pm
Location: Ontario Canada
Contact:

Re: EdgeMAX vpn to Mikrotik lan device cannot ping

Wed Sep 07, 2022 2:39 pm

Maybe someone can throw me a bone here:

Mikrotik side lan device can ping edge side lan device with this masquerade in the mikrotik:

masquerade
chain=srcnat action=masquerade src-address=192.168.88.0/24 log=no
log-prefix="" ipsec-policy=out,none

But it does not work with the default masquerade:
masquerade
chain=srcnat action=masquerade out-interface-list=WAN log=no
log-prefix="" ipsec-policy=out,none

Who is online

Users browsing this forum: andreo, Bing [Bot], jhbarrantes, sebus46 and 76 guests