Yep, we mentioned that above. I went ahead and removed the PPPoE info from my defunct Virgin Mobile services. They've been deactivated for some time now. I went back to B[H]ell Fibe, got a plan for less money and upped my speed by 5x (and now it's symmetric).@hahnhell
The export is really Sympatic oh...
you forgot to Hide Something while Export...
No Problem, as a Thank you just send us a nice bowl of Poutine !Thanks for the lesson!
@hahnhell
The export is really Sympatic oh...
you forgot to Hide Something while Export...
/interface list
add name=WAN
/interface list member
add interface=wlan1 list=WAN
add interface=ether1 list=WAN
VLANs are Layer2, IPsec is Layer 3. You can route all your home traffic through one tunnel and then separate it into VLANs again in the cottage's router.For now, 2 VLANS need to get shoved through a VPN to my cottage somehow.
Will it take more than 1 VPN? perhaps 1 VPN per VLAN? I'm just trying to conceptualise this.
/certificate
add common-name=IPSEC-CA name=IPSEC-CA days-valid=3650
/certificate
sign IPSEC-CA
/certificate
add common-name=xxxxxxxxxx.sn.mynetname.net subject-alt-name=DNS:xxxxxxxxxx.sn.mynetname.net days-valid=3650 key-usage=tls-server name=IPSec-Server
/certificate
sign IPSec-Server ca=IPSEC-CA
/certificate
add common-name=IPSec-Client1 name=IPSec-Client1 days-valid=3650 key-usage=tls-client
/certificate
sign IPSec-Client1 ca=IPSEC-CA
/certificate
export-certificate IPSEC-CA type=pem file-name=IPSEC-CA
/certificate
export-certificate IPSec-Client1 export-passphrase=xxxxxxxxxx type=pkcs12 file-name=IPSec-Client1
/ip ipsec mode-config
add address=192.168.77.100 address-prefix-length=32 name=IPSec-ModeConfig system-dns=no
/ip ipsec policy group
add name=IPSec-Policies
/ip ipsec profile
add enc-algorithm=aes-256,aes-192,aes-128 name=IPSec-Profile
/ip ipsec peer
add exchange-mode=ike2 name=IPSec-Peer1 passive=yes profile=IPSec-Profile
/ip ipsec proposal
add auth-algorithms=sha512,sha256,sha1 name=IPSec-Proposal pfs-group=none
/ip ipsec identity
add auth-method=digital-signature certificate=IPSec-Server generate-policy=port-strict mode-config=IPSec-ModeConfig peer=IPSec-Peer1 policy-template-group=IPSec-Policies remote-certificate=IPSec-Client1
/ip ipsec policy
add disabled=no dst-address=192.168.77.0/24 group=IPSec-Policies proposal=IPSec-Proposal src-address=0.0.0.0/0 template=yes
/interface bridge
add name=IPSec-Counterpart
/ip address
add address=192.168.77.200 interface=IPSec-Counterpart network=192.168.77.200
/ip firewall filter
add action=accept chain=input comment="Accept: IPSec UDP (Internet -> Router)" connection-state=established,related,new dst-port=500,4500 in-interface-list=WAN protocol=udp
add action=accept chain=input comment="Accept: IPSec-Traffic (Cottage --> Router)" dst-address=192.168.77.200 in-interface-list=WAN ipsec-policy=in,ipsec src-address=192.168.77.100
/interface eoip
add comment="EOIP iD111 Home-Network" local-address=192.168.77.200 name=eoip-tunnel1 remote-address=192.168.77.100 tunnel-id=111
add comment="EOIP iD222 IOT-Network" local-address=192.168.77.200 name=eoip-tunnel2 remote-address=192.168.77.100 tunnel-id=222
/interface bridge port
add bridge=Home_Bridge interface=eoip-tunnel1 pvid=15
add bridge=Home_Bridge interface=eoip-tunnel2 pvid=50
/interface bridge vlan
add bridge=Home_Bridge tagged=Home_Bridge,10-cAP_AC untagged="Home_WiFi_2GHz,3-Server,7-Synology,4-Work_PC,8-Printer,Home_WiFi_5GHz,5-Upstairs,eoip-tunnel1" vlan-ids=15
add bridge=Home_Bridge tagged=Home_Bridge,10-cAP_AC untagged="IoT_WiFi,eoip-tunnel2" vlan-ids=50
/certificate import file-name=IPSEC-CA.crt passphrase=""
/certificate import file-name=IPSec-Client1.p12 passphrase=xxxxxxxxxx
/ip ipsec mode-config
add connection-mark=IPSec name=IPSec-ModeConfig responder=no use-responder-dns=no
/ip ipsec policy group
add name=IPSec-Group
/ip ipsec profile
add enc-algorithm=aes-256,aes-192,aes-128 name=IPSec-Profile
/ip ipsec peer
add address=xxxxxxxxxx.sn.mynetname.net exchange-mode=ike2 name=IPSec-Peer1 profile=IPSec-Profile
/ip ipsec proposal
add auth-algorithms=sha512,sha256,sha1 name=IPSec-Proposal pfs-group=none
/ip ipsec identity
add auth-method=digital-signature certificate=IPSec-Client1 generate-policy=port-strict mode-config=IPSec-ModeConfig peer=IPSec-Peer1 policy-template-group=IPSec-Group
/ip ipsec policy
add disabled=no dst-address=0.0.0.0/0 group=IPSec-Group proposal=IPSec-Proposal src-address=0.0.0.0/0 template=yes
add group=IPSec-Group proposal=IPSec-Proposal template=yes
/ip firewall mangle
add action=mark-connection chain=output dst-address=192.168.77.0/24 new-connection-mark=IPSec passthrough=yes
/ip firewall filter
add action=accept chain=input comment="Accept: IPSec-Traffic (Home --> Router)" dst-address=192.168.77.200 in-interface-list=WAN ipsec-policy=in,ipsec src-address=192.168.77.100
/interface eoip
add comment="EOIP iD111 Home-Network" local-address=192.168.77.100 name=eoip-tunnel1 remote-address=192.168.77.200 tunnel-id=111
add comment="EOIP iD222 IOT-Network" local-address=192.168.77.100 name=eoip-tunnel2 remote-address=192.168.77.200 tunnel-id=222
/interface bridge port
add bridge=bridge2 interface=eoip-tunnel1
add bridge=bridge3 interface=eoip-tunnel2
/ip dhcp-client
add disabled=no interface=bridge1
add disabled=no interface=bridge2
/ip dhcp-client print
I'm assuming you meant my HOME device.Replace xxxxxxxxxx.sn.mynetname.net with own DNS-Name
Yes , use your home-Router xxxxxxxxxx.sn.mynetname.netWhen you wroteI'm assuming you meant my HOME device.Replace xxxxxxxxxx.sn.mynetname.net with own DNS-Name
Thats not a mistake in the config, thats lack of understanding of the fact that order in rules is critical.Found a mistake on your Home-Router
The Firewall-Rules for IPSec
-> add action=accept chain=input comment="Accept: IPSec UDP (Internet -> Router)" ......
-> add action=accept chain=input comment="Accept: IPSec-Traffic (Cottage -> Router)" .....
Need to be BEFORE
-> add action=drop chain=input comment="Drop All Else"
**You can use Winbox to "Drag&Drop"
/ip dhcp-client print
/certificate remove IPSec-Server
/interface bridge port
add bridge=Home_Bridge interface=eoip-tunnel1 pvid=15
add bridge=Home_Bridge interface=eoip-tunnel2 pvid=50
/ip address print
/ip firewall filter
add action=accept chain=input comment="Accept: SSH (!WAN --> Router)" dst-port=22 in-interface-list=!WAN protocol=tcp place-before=5
/interface bridge port set [find where interface=ether8] bridge=bridge1
Yes, and as soon as I connect the laptop to ether8, I cannot connect to the cottageRB4011 nor get a valid IP (unidentified network).Cottage-Network
To do the Quick-Test :
Code: Select all/interface bridge port set [find where interface=ether8] bridge=bridge1
/ip firewall filter
add action=drop chain=input comment="Drop: Everything else (WAN --> Router)" in-interface-list=WAN
Yes please !Do you want me to remove the drop all not coming from LAN and replace it with Drop: Everything Else(same spot)?
I'm soon gonna call the folks at the NCR helpdesk, haha. Though they don't know squat about Mikrotik, maybe I can just do some DVPNI magic.Above my head.
It doesnt look right to me at all............
/ip firewall filter
add action=accept chain=input comment="Accept: IPSec UDP (Internet -> Router)" connection-state=established,related,new dst-port=500,4500 in-interface-list=WAN protocol=udp
add action=accept chain=input comment="Accept: IPSec-Traffic (Cottage --> Router)" dst-address=192.168.77.200 in-interface-list=WAN ipsec-policy=in,ipsec src-address=192.168.77.100
To extend a LAN from one site to another while the connected devices at both sites feel like being on the same switch, you do need an L2 tunneling protocol. On the current RouterOS version (6.x), you can choose only between EoIP and L2TP with BCP. What kind of encryption protocol you use to cipher the transport packets of the tunneling protocol (IPsec, Wireguard) is a separate decision. Again, in RouterOS 6.x, the only choice that makes sense is IPsec.since VLAN over tunnels (be it EoIP, L2TP, Wireguard, or otherwise) I'm going to perhaps simplify things a bit until the services become a bit more widespread. If @anav is any indication, Wireguard ought to be able to do this in a more simplified manner, I just have to wait until that is in a stable release of RouterOS.
The MTU issue needs to be addressed no matter whether you finally opt to use L2 tunneling or L3 tunneling. As you say you want to work from cottage the same way as if you were at home, it is not enough to prevent EoIP from breaking the SSH and HTTP(S) access from home, you need that there is no MTU trouble also when working from the cottage.So, I prefer not to take the MTU modifying 'tweak' and rather that my network run as smoothly as I can without hiccups.
The real simplification would be to use an L3 (routed) VPN rather than an L2 (bridged) one. So repeating the question, what is the reason why VLAN 15 from home should be extended via an L2 tunnel to the cottage? Do you need that Apple devices can autodiscover each other, or something similar?If I remove one of the VLANs from this equation, will that simplify things a whole lot more? The most important part of the network that I want to get pushed through the tunnel is VLAN15. If I can get all devices at Cottage to have full access to what my devices on VLAN15(home) do, I'd be happy with that until Wireguard is up and ready.
I could not find any "under the hood" info regarding what this means in terms of protocols, but since Plex allows sending the media over the internet, there is no reason why it should require L2 transparency, i.e. an L3 (routed) VPN should be sufficient.- Watch movies, play music through my Home Plex server;
Also here, a Synology NAS can be accesses using L3 VPN, you manually configure the IP address of the NAS on the client device and that is enough to connect there directly, i.e. not via cloud.- Access file storage on my Synology NAS (as a local device not through synology cloud access);
A network printer can normally be accessed via L3 as well; some devices don't ask you for its IP address if it can be found using autodiscovery, which in turn requires L2 transparency between the printer and the device trying to auto-discover it. So if your software allows you to manually specify the address of the printer, you again don't need L2 tunneling.- Local network printer at Cottage (no anav, i don't need to print to cottage from home);
Soo.... what then?If not for the PMTUD issues, I'd choose bare IPsec or Wireguard.
PMTUD = Path MTU Discovery, a process using which the endpoints discover the smallest MTU on the path through the network between them (and subsequently adjust the size of packets they send to each other so that they wouldn't exceed that MTU).There are a lot of big acronyms now being thrown around that have now went over my knowledge base.
As you've stated that you don't want to use experimental software (which is an approach I fully second for normal production purposes), it's IPsec to be used for encryption, as it is the only encryption protocol using UDP as transport that is available in ROS 6.x (since the encryption of bare L2TP without IPsec is not considered strong enough any more).Soo.... what then?If not for the PMTUD issues, I'd choose bare IPsec or Wireguard.
Yeah I had a read through I would wait until rc5 comes out too many notes of RB4011s crashing.
Well not to death but certainly I like avoiding complications...........Read the corresponding thread regarding issues related to your hardware models. But normally the experimental software is used by people who want to actively test it and provide qualified feedback to the developers. In your case, the only reason would be to use wireguard, which I don't consider important enough for systems I use in production. But I'm not scared to death by IPsec configuration complexity like @anav, so your preferences may differ.
Since the attempt with EoIP has highlighted the MTU issue, bare IPsec would not be sufficient. One way is to circumvent the failing PMTUD using mangle rules, which. would either affect all connections or be a never-ending iterative process of adding destinations to an address list, the other one is to use L2TP with MLPPP, which I prefer.I think that ipsec without EOIP at the same time will be far more palatable.