Ha ha.Thanks, I must have a bad memory, I had even posted in that thread!
They are adding VTI is my understanding. I think the issue probably is if they add it now, while RouterOS v6 is still being updated, it is much more work for them to manage both code bases because the RouterOS v7 ipsec code will diverge from the RouterOS v6 ipsec code making it a lot harder to keep the code bases in sync with the same fixes. So they are likely waiting until RouterOS v7 stable comes out before they add this, as at that point, they will no longer need to make updates to RouterOS v6 as frequently.Not to mention that this would allow interop with many other router vendors IPSEC VTI based tunneling solutions.
Ehm, I could be wrong here but my understanding is that VTIs are purely a local thing, the tunnel or other end does not know about if VTI is used or not at the opposite end. VTI should allow you to add a virtual interface in a hw/L2 like manner but will still only pass L3 traffic. Just as the policies. Policies vs VTI/routing is just cosmetic, both will do the same but in different configuration ways.Not to mention that this would allow interop with many other router vendors IPSEC VTI based tunneling solutions.
yes and no. it has to support also multicast transport (for OSPF to work) which is not possible with policies.VTI should allow you to add a virtual interface in a hw/L2 like manner but will still only pass L3 traffic.Not to mention that this would allow interop with many other router vendors IPSEC VTI based tunneling solutions.
yes but VTI is not "everything". it is how ipsec has been done by most of the major vendors for about a decade. rather first keep up on the ipsec implementation before heading over to new-fangled rubbish wankery crap like wireguard or zeroconf.It's natural, new things are invented, they are useful, competitors have them, people see it there and want them too, it will never end. It's not possible to add everything, but once something evolves into "everyone else has it", you can't ignore it forever.
Are you sure that when VTI is implemented, you will not come back with "VTI is nice, now we need to have NHRP"?the lack of VTI support is a major showstopper and we would have the opportunity for hundreds of customers buying mikrotik, but now they have to go to cisco or fortinet.
yes, because I don't need NHRP (although it would be nice). But do you know what would be even nicer? ADVPN: https://community.fortinet.com/t5/Forti ... a-p/195698Are you sure that when VTI is implemented, you will not come back with "VTI is nice, now we need to have NHRP"?the lack of VTI support is a major showstopper and we would have the opportunity for hundreds of customers buying mikrotik, but now they have to go to cisco or fortinet.
well, they are on Cisco and Fortinet (and others), but obviously every now and then you gotta re-evaluate and every now and then you have the opportunity to switch vendors. Now, that RouterOS, after the community asking for that features for years, still doesn't support VTI, MikroTiks are out of scope immediately.Of course these hundreds of customers must be on networks where there already is Cisco or Fortinet, or else they could setup their network in a way
that MikroTik already supports (e.g. GRE/IPsec). So I find it hard to believe that you will not need another specific protocol once you have VTI, and
likely that is NHRP.
ADVPN is the marketing name for a VPN network based on VTI and NHRP. At least at Cisco it is. probably Fortinet is the same.yes, because I don't need NHRP (although it would be nice). But do you know what would be even nicer? ADVPN: https://community.fortinet.com/t5/Forti ... a-p/195698
I recommend you with any vendor to only look at what they offer TODAY and not at what is being demanded in the forums or even what is being promised by the vendor.well, they are on Cisco and Fortinet (and others), but obviously every now and then you gotta re-evaluate and every now and then you have the opportunity to switch vendors. Now, that RouterOS, after the community asking for that features for years, still doesn't support VTI, MikroTiks are out of scope immediately.
That's what I'm doing.I recommend you with any vendor to only look at what they offer TODAY and not at what is being demanded in the forums or even what is being promised by the vendor.
It does not matter what is being asked for, there is always something else on demand.
You are mixing things up here. IPSEC has been used for ages in the industry. OpenVPN not so much, at least in enterprises. Neither has Wireguard.MikroTik have paid attention to those that demanded Wireguard and (to a lesser extent) OpenVPN improvements.
Probably the average customer of MikroTik is very happy with that and does not care so much about VTI or NHRP.
But you know what: go to Cisco and Fortinet and ask them to support OpenVPN or Wireguard and see how quickly THEY have added it to their routers!
2y latter.. please provide ipsec vti support, regardsI think ros7 must go to GA and everything on the current roadmap for it is stable, but I really hope Mikrotik will not forget about VTI in some point ...
It is exotic in the market for MikroTik devices. Ok, maybe not so much now as it was a couple of years ago, but still most MikroTik users demand OpenVPN or Wireguard, not IPsec.true, but dude, please don't refer to VTI as "every type of VPN" like it is some exotic thing.
Well, just like you judge the demand for VTI by the number of forum threads about it, I judge the demand for OpenVPN and Wireguard by their respective threads on the forum. Those numbers are way higher than for VTI.so, if IPSEC is that exotic, please tell me why there is so many threads about it and why is mikrotik working hard on supporting hw-acceleration for IPSEC wherever possible and why is mikrotik improving their ipsec implementation all the time?
how do you know, what types of vpn are being requested by mikrotik users? do you have access to usage statistics, have you spoken to mikrotik employees who know the stats?
i think you may be captured in your perspective a bit.
When you think that VTI just means "standard IPsec tunnel but with virtual interfaces instead of policies on existing interfaces": that is not really true, read back above to e.g. explanation by "doneware".regarding the other protocols you mentioned, like NHRP, I can't tell, I just want interfaces
Well, apologies, OpenWRT again :It is exotic in the market for MikroTik devices. Ok, maybe not so much now as it was a couple of years ago, but still most MikroTik users demand OpenVPN or Wireguard, not IPsec.
euryeah well, I've just switched back to a Fortigate 60F from my RB5009 and I'm not looking back.
Hello,
Thank you for contacting MikroTik Support.
At the moment there are no plans to change IPSEC functionality, thanks for your request we will consider such implementation.
Best regards,
Oskars K.
Yeah mine too, but they are GRE/IPsec which provides the same functionality. With MikroTik routers that works well. It is only the cross-manufacturer support that is a problem.Agreed.. IPsec without VTI is terrible.
I really don't understand why it is not available yet. _ALL_ VPN's I use and manage are route based.
Thanks for updating this post pe1chl. I've come across posts several times that you helped the community and me.Well, I tried again using a support desk request, but the status still is "At the moment, there is no plan to add this functionality,., but we will see if it can be supported in the future."
Yes, they told me it is not planned.Any new information/feedback from mikrotik regarding this?