It is extremely unusual to block anything on the output chain of any router, these rules may be related to your issue.add action=accept chain=output comment="allow only non-invalid connections" connection-state=!invalid
add action=drop chain=output comment="drop everything else"
add action=accept chain=output comment="allow only non-invalid connections" connection-state=!invalid disabled=yes
add action=drop chain=output comment="drop everything else" disabled=yes
TrueIt is extremely unusual to block anything on the output chain of any router,
False, because the L2TP transport (which is the only traffic relevant to the issue to be handled by chain=output) is working, otherwise the traffic between L2TP clients and the LAN would not get through. So these rules could only affect communication between a client and the Mikrotik itself but not between two clients, and they don't as connection-state=!invalid is not a very restrictive condition.these rules may be related to your issue.
add change-tcp-mss=yes comment="Remote VPN clients-to-site with complete lan access" dns-server=192.168.10.1 local-address=192.168.10.100 name="L2TP C2S" remote-address=dhcp-vpn wins-server=192.168.10.1
Flags: X - disabled, A - active, D - dynamic, C - connect, S - static, r - rip, b - bgp, o - ospf, m - mme, B - blackhole, U - unreachable, P - prohibit
# DST-ADDRESS PREF-SRC GATEWAY DISTANCE
0 A S 0.0.0.0/0 37.214.235.80 37.214.235.1 1
1 ADC 37.214.235.0/24 37.214.235.80 combo 0
2 ADC 192.168.10.0/24 192.168.10.1 br1-lan 0
3 ADC 192.168.10.194/32 192.168.10.100 <l2tp-xx@xxxx> 0
4 ADC 192.168.10.198/32 192.168.10.100 <l2tp-zz@zzzz> 0
Not really - his only non-invalid drop rule on the forward chain was disabled, according to the export above.So it is actually quite surprising that at least something works already now.
add change-tcp-mss=yes comment="Remote VPN clients-to-site with complete lan access" dns-server=192.168.10.1 local-address=192.168.10.1 name="L2TP C2S" remote-address=dhcp-vpn wins-server=192.168.10.1
Flags: D - dynamic, X - disabled, R - running, S - slave
# NAME TYPE ACTUAL-MTU L2MTU MAX-L2MTU MAC-ADDRESS
0 R ;;; WAN port
combo ether 1500 1580 10222 B2:64:F4:09:59:9D
1 RS eth1 ether 1500 1580 10222 B2:64:F4:09:59:9E
2 S eth2 ether 1500 1580 10222 B2:64:F4:09:59:9F
3 S eth3 ether 1500 1580 10222 B2:64:F4:09:59:A0
4 S eth4 ether 1500 1580 10222 B2:64:F4:09:59:A1
5 RS eth5 ether 1500 1580 10222 B2:64:F4:09:59:A2
6 eth6 ether 1500 1580 10222 B2:64:F4:09:59:A3
7 R eth7 ether 1500 1580 10222 B2:64:F4:09:59:A4
8 sfpplus ether 1500 1580 10222 B2:64:F4:09:59:9C
9 DR <aaa@aa> l2tp-in 1400
10 DR <bbb@bb> l2tp-in 1400
11 DR <ccc@cc> l2tp-in 1400
12 R br1-lan bridge 1500 1580 B2:64:F4:09:59:9E
Flags: X - disabled, A - active, D - dynamic, C - connect, S - static, r - rip, b - bgp, o - ospf, m - mme, B - blackhole, U - unreachable, P - prohibit
# DST-ADDRESS PREF-SRC GATEWAY DISTANCE
0 A S 0.0.0.0/0 27.214.245.14 27.214.245.1 1
1 ADC 27.214.245.0/24 27.214.245.14 combo 0
2 ADC 192.168.10.0/24 192.168.10.1 br1-lan 0
3 ADC 192.168.10.197/32 192.168.10.1 <aaa@aa> 0
4 ADC 192.168.10.198/32 192.168.10.1 <bbb@bb> 0
5 ADC 192.168.10.199/32 192.168.10.1 <ccc@cc> 0
Not exactly true, this address may be any address that the router has in any subnet, because each connected user is on their own /32 network, and the gateway itself can be a /32 as well. It does act as a 'gateway' of sorts but not in the traditional sense (due to point-to-point addressing), so any IP that is actually bound to the router will work, but before you were using an address that was not bound to the router. I have seen this work before in some cases, but it is better to do it properly and use an actual IP bound to the router.and this address may be any in 192.168.10.0/24 subnet because of dynamicaly created l2tp interfaces and dynamic routes.
Describe what you mean by "no result" - the main network still cannot ping the connected users? is the firewall on the connected systems blocking it? And the users cannot ping each other? If the problem remains (but all users can ping the 192.168.10.1 IP itself) this strongly suggests that the firewalls on the connected users' systems are blocking the traffic. If IPsec were failing you should not even be able to ping 192.168.10.1 from the connected systems.I try to set 192.168.10.1 and restart router but with no result... and even disable bottom drop rule in firewall inpit chain (in forward and output chains all filters are already disabled)
Glad you got your issue sorted, but do not only thank me -- it looks like @sindy also correctly pointed out the possible issue (although I didn't notice when I was responding to your post at first):Thank you a lot, mducharme !
But don't forget that the embedded Windows firewall is very strict so by default the devices don't even respond to pings, so make sure that response to pings is permitted and/or that the RDP server is allowed to listen on the L2TP interface before testing.
This is legacy back from times whe Microsoft implemented their own networking stack for windows for workgroups and didn't use IP with supporting services (such as DNS). When they started to support IP, they did it in a backward compatible way. And things are still done this way. Part of file services is do called NetBIOS name resolution, so one can use windows machines names to use certain services. However: windows services normally work only inside same network because broadcasts are used for discovery of servers and other workgroup members. This can change if there's domain controller / active directory server present.2. We don't have a dedicated DNS server in our local networks but host can be accessible by domain name like \\mediaserver inside lan. But remote clients can access to local resource only by ip address, why it happens?
You shouldn't have to use NAT, you also don't really need to use 192.168.8.1 as a vpn-gateway. You can put all remote clients in 192.168.8.0/24 and use 192.168.10.1 as the local-address for the VPN. I realize that may seem strange, but remember the VPN gateway address is entirely independent of the endpoint addresses, it is not like a traditional gateway. The reason is that the VPN network is not a traditional network, but is instead a collection of individual /32 single-ip networks. VPN clients can get addresses from 192.168.8.0-192.168.8.255 inclusive, since it is not a regular network but instead a collection of /32's, there is no reserved network address/broadcast address. The router itself does not need to have an address in the 192.168.8.0/24 range. Do not bother to give the router an ip address in the 192.168.8.0/24 range and instead use 192.168.10.1 as the local-address.1. When as mducharme advised I put all remote clients in 192.168.8.0/24 network with 192.168.8.1 vpn-gateway and all local clients in 192.168.10.0/24 network with 192.168.10.1 gateway in br1-lan interface - all work fine but remote clients can't see local network resources when adressing by ip. How I can make ip adresses from local network availlable to remote clients, only by using NAT or may by some more elegant way?
To clarify and echo mkx's comment, it is because inside the LAN it uses broadcasts for name resolution, and those broadcasts will not work for VPN clients due to the fact that they are on different individual /32 networks. You need DNS or WINS for netbios name resolution on a different network.2. We don't have a dedicated DNS server in our local networks but host can be accessible by domain name like \\mediaserver inside lan. But remote clients can access to local resource only by ip address, why it happens?
1 ;;; Remote VPN clients-to-site with complete lan access
name="L2TP C2S" local-address=192.168.10.1 remote-address=dhcp-vpn use-mpls=yes use-compression=default use-encryption=yes only-one=default
change-tcp-mss=yes use-upnp=default address-list="" dns-server=192.168.10.1 on-up="" on-down=""
# NAME RANGES
0 ;;; local clients
dhcp-lan 192.168.10.50-192.168.10.199
1 ;;; remote clients
dhcp-vpn 192.168.8.50-192.168.8.255
1 ;;; Remote VPN clients-to-site with complete lan access
name="L2TP C2S" local-address=192.168.10.1 remote-address=dhcp-vpn use-mpls=yes use-compression=default use-encryption=yes only-one=default
change-tcp-mss=yes use-upnp=default address-list="" dns-server=192.168.10.1 on-up="" on-down=""
# NAME RANGES
0 ;;; local clients
dhcp-lan 192.168.10.50-192.168.10.199
1 ;;; remote clients
dhcp-vpn 192.168.8.50-192.168.8.255
With this configuration you don't need proxy-arp. Proxy arp is like having a guy on the "ship" redirecting people who think you are actually on the "ship", letting them know that they can send through them as a proxy to get to you.As I understand independent /32 boats by rope come to 192.168.10.1. This is a bridge with proxy-arp so packets must be forwarded to hosts in 192.168.10.0/24. Right?
add action=masquerade chain=srcnat dst-address=!192.168.10.0/24 out-interface=combo
add distance=1 dst-address=192.168.20.0/24 gateway=192.168.20.1 pref-src=192.168.10.1
add distance=1 dst-address=192.168.10.0/24 gateway=br1-lan pref-src=192.168.20.1
Yes, the packets will get routed with no additional actions without arp proxy.192.168.10.0/24 - local users and servers with local gateway: 192.168.10.1
192.168.8.0/24 - C2S (clients-to-site) remote l2tp sessions with 192.168.10.1 as local address
192.168.20.0/24 and so on - S2S (site-to-site) l2tp connections with 192.168.10.1 as vpn gateway
192.168.30.0/24 and so on - networks for IP-CCTV with 192.168.30.1 as local gateway
192.168.40.0/24 and so on - networks for technological lines such as CNC machines, 3D printers etc. with 192.168.40.1 as local gateway
I correctly understand that all packets from 192.168.8.0/24 with 192.168.10.1 local address must come into 192.168.10.0/24 networks wih no arp-proxy all other additional actions?
This will happen automatically as well. When you add new networks to the MikroTik it automatically adds connected routes, so you have connectivity between the networks without having to do anything, unless there are firewall rules blocking the traffic.And in case of other networks that we can do for make accessible 192.168.10.0/24 resources for hosts in that networks? I'm completely confused with this...
Traffic from your VPN users on 192.168.8.0/24 to the 192.168.10.0/24 network resources will hit the forward chain, not the input chain. If this is being blocked in the forward chain, it will not work.with 192.168.8.0/24 I try today, check router input-chain and hosts firewall adding by hand 192.168.8.0/24 networks to ICMP v.4 and RDP rules on windows firewall but with no result. I can ping only 192.168.10.1 no further... Tommorow I will try to completely turn off windows firewall on hosts and file server too
No, because you have specified out-interface=combo, packets from the 192.168.8.0/24 to 192.168.10.0/24 are not going out combo and therefore they will not be natted.And one more question I have single srcnat ruleMay packets from 192.168.8.0/24 be nated and so on lost for lan ?Code: Select alladd action=masquerade chain=srcnat dst-address=!192.168.10.0/24 out-interface=combo
You do not need to add any routes like the above. I do not know what you are trying to do. As soon as you add the IP addresses for the two networks onto the router, you will have routing between the two networks automatically, because the connected routes are automatically installed in the routing table. Adding connected routes manually doesn't make any sense at all because you already have them.I probably did not see an elementary way on the second question
and this set of static rules will work for merging 10.0/24 and 20.0/24 networks is not it ?
Code: Select alladd distance=1 dst-address=192.168.20.0/24 gateway=192.168.20.1 pref-src=192.168.10.1 add distance=1 dst-address=192.168.10.0/24 gateway=br1-lan pref-src=192.168.20.1
/tool torch <l2tp-aaa@aaa> src-address=0.0.0.0/0 dst-address=0.0.0.0/0 ip-protocol=icmp
/tool torch <l2tp-aaa@aaa> src-address=0.0.0.0/0 dst-address=0.0.0.0/0 ip-protocol=icmp
2 ADC 192.168.10.0/24 192.168.10.1 br1-lan 0
3 ADC 192.168.10.101/32 192.168.10.1 <aaa@aa... 0
Show the firewall rules that you are using for logging of the pings. You should have a log rule for both the forward chain and the input chain, to log the packets in both directions.But in torch and log - nothing ! Even when pings to 192.168.10.1 are passed. In firewall log I see only interaction between file server and NTP server.
192.168.8.0 255.255.255.0 192.168.10.1 192.168.8.101 21
192.168.8.101 255.255.255.255 On-link 192.168.8.101 276
192.168.10.0 255.255.255.0 192.168.10.1 192.168.8.101 41
route add 192.168.8.0 MASK 255.255.255.0 192.168.10.1 METRIC 21 IF 25 -p
Correct, proxy-arp is not necessary anymore. It was only needed before (when you were using 192.168.10.x IPs for L2TP) because the other hosts on 192.168.10.0/24 mistakenly assumed that your one-person l2tp "lifeboats" were still on the "ship" with them (due to the fact that they seemed to fit in the 192.168.10.0/24 network), and the proxy-arp was like a person explaining that they actually weren't on the "ship" (network) even though it looked like they were, and how to actually reach them. Now that your clients are on 192.168.8.x, the local systems on 192.168.10.x can tell that the 192.168.8.x clients are not on the same "ship" (network) without needing the proxy to inform them, and will correctly send the packets to the router, so they can get to their destination without proxy-arp. I would switch it back to arp=enabled instead of arp=proxy-arp, it is better, places less load on the router.One more addition - I try to separate hosts in different networks, routing in Microtik work predictable now,
but on remote l2tp clients static routes for communication with different networks must be added like this
And I'm really happy with result - because have an abulity to control communication between networks now !!!Code: Select allroute add 192.168.8.0 MASK 255.255.255.0 192.168.10.1 METRIC 21 IF 25 -p
And about arp on local bride interface br1-lan it seems to work in arp=enabled and arp=proxy-arp, I have right understanding that proxy-arp in this scenario is not really neccessary?
Yes your understanding of the routing is correct. Also I agree with Sindy above when it comes to this issue.I make 192.168.100.0/24 with 192.168.100.1 local-address for l2tp clients, and 192.168.101.0/24 with 192.168.101.1 local address for sstp clients
with "route add 192.168.10.0 MASK 255.255.255.0 192.168.10.1 METRIC 21 IF 14 -p" added in windows routing tables.
But one thing I can't understand is why when I try to connect via sstp with remote 192.168.101.249 I can't ping l2tp connected clients 192.168.100.16
when I add "route add 192.168.100.0 MASK 255.255.255.0 192.168.100.1 METRIC 21 IF 14" to sstp client windows table In tracert and torch on 192.168.101.249 I see icmp packets destinated to 192.168.10.16 but afrer 192.168.101.1 all packets are droped. On br1-lan arp=enabled.
If I correctly understand the way packets being routed inside microtik - all packets in this example coming from 192.168.101.1 and destinated to 92.168.100.16 are routed across 192.168.100.1 and only packets that are not designated to any of registered on microtik interfaces ip's are nated to wan. Thats right ?
192.168.10.0 255.255.255.0 192.168.10.1 192.168.101.249 41
192.168.100.0 255.255.255.0 192.168.10.1 192.168.101.249 41
192.168.101.0 255.255.255.0 192.168.10.1 192.168.101.249 21
Static route:
192.168.10.0 255.255.255.0 192.168.10.1 21
C:\Users\i_van>tracert 192.168.100.16
Tracing route to 192.168.100.16 with max jumps 30
1 75 ms 80 ms 111 ms 192.168.10.1
2 * * * Packet interval timeout.
3 * * * Packet interval timeout.
4 * * * Packet interval timeout.
5 * * * Packet interval timeout.
6 * * * Packet interval timeout.
7 * * * Packet interval timeout.
8 * * * Packet interval timeout.
9 * * * Packet interval timeout.
10 * * * Packet interval timeout.
ip route print
Flags: X - disabled, A - active, D - dynamic, C - connect, S - static, r - rip, b - bgp, o - ospf, m - mme, B - blackhole, U - unreachable, P - prohibit
# DST-ADDRESS PREF-SRC GATEWAY DISTANCE
2 ADC 192.168.10.0/24 192.168.10.1 br1-lan 0
3 ADC 192.168.100.16/32 192.168.10.1 <aaa@aa> 0
4 ADC 192.168.101.249/32 192.168.10.1 <bbb@bb> 0
/tool torch <aaa@aa> src-address=0.0.0.0/0 dst-address=0.0.0.0/0 ip-protocol=icmp
ip icmp 192.168.100.16 192.168.101.249 480bps 0bps 1
MAC-PROTOCOL IP-PROTOCOL SRC-ADDRESS DST-ADDRESS TX RX TX-PACKETS RX-PACKETS
The 192.168.10.1 is only used on the client PCs, and only if it is specified there as a gateway for some route, to identify the tunnel (=point-to-point) interface through which the packet should be sent.So packet come from my SSTP host 192.168.101.249 to 192.168.10.1 - received by 192.168.100.16 and sended back, as I understand, to 192.168.10.1 and then droped although I have an dynamic route to 192.168.101.249...
Add-VpnConnectionRoute -ConnectionName "VPN Name" -DestinationPrefix "192.168.8.0/24"
every time I connect.Code: Select allroute add 192.168.8.0 MASK 255.255.255.0 192.168.10.1 METRIC 21 IF 25 -p
The -p parameter makes that route a persistent one, so it survives a reboot, hence I cannot see why one method should be better than the other. Except that I usually set the gateway address to 0.0.0.0, as it is the interface number, not the gateway address, what matters in case of a tunnel interface like L2TP and/or SSTP.therefore I don't need to use:every time I connect.Code: Select allroute add 192.168.8.0 MASK 255.255.255.0 192.168.10.1 METRIC 21 IF 25 -p
First of all, there is no difference whether the client address fits into the LAN subnet or not, because even if it does, you still have to add a route at the client (if you tell Windows not to add automatically a default route or a class-based route, both of which are usually too wide). The address assigned to the client is a /32 one, so there is no subnet mask associated to it, nor can the client use ARP to determine a MAC address associated to a destination IP as a MAC address is not used at all on L3 tunnels.Anyway, I am still interested in using VPN clients IP addresses in the same "subnet" as the LAN device so maybe:
https://wiki.mikrotik.com/wiki/Manual:I ... _Proxy_Arp
is a solution here? I want to make VPN configuration at client's side as simplest as possible that is why I still search for an answer...
But where to set it up to be most usable? On bridge interface it will "forward" all L2 traffic via router's interface. Could someone explain, please?