Hello everyone. Using the MikroTik Wiki plus other online sources, I setup a PPTP VPN connection that includes a pool of VPN IPs. I am able to connect to the tunnel but can only access the MikroTik itself. I found an older thread with similar issues but don't quite understand the fix he posted.
I don't do much in the Terminal so I posted my personal notes then printed the output. Any help would be greatly appreciated.
MikroTik LAN IP: 192.168.25.1
LAN DHCP: 192.168.25.100-200
1. IP > Pool > Add New
Name: PPTP-pool
Addresses: 192.168.25.90-192.168.25.99
/ip pool print
# NAME RANGES
0 default-dhcp 192.168.25.100-192.168.25.200
1 PPTP-pool 192.168.25.90-192.168.25.99
2. PPP > Profiles > Add New
Name: PPTP-profile
Local Address: 192.168.25.1
Remote Address: PPTP-pool
Use IPv6: No
Use Encryption: Yes
/ppp profile print detail
0 * name="default" remote-ipv6-prefix-pool=none use-ipv6=yes use-mpls=default
use-compression=default use-vj-compression=default use-encryption=default
only-one=default change-tcp-mss=yes address-list=""
1 name="PPTP-profile" local-address=192.168.25.1 remote-address=PPTP-pool
remote-ipv6-prefix-pool=*0 use-ipv6=no use-mpls=default
use-compression=default use-vj-compression=default use-encryption=yes
only-one=default change-tcp-mss=default address-list=""
2 * name="default-encryption" remote-ipv6-prefix-pool=none use-ipv6=yes
use-mpls=default use-compression=default use-vj-compression=default
use-encryption=yes only-one=default change-tcp-mss=yes address-list=""
3. PPP > Secrets > Add New
Name: username
Password: password
Service: pptp
Profile: PPTP-profile
/ppp secret print detail
0 name="username" service=pptp caller-id="" password="password"
profile=PPTP-profile routes="" limit-bytes-in=0 limit-bytes-out=0
4. PPP > Interface > PPTP Server
Enabled: Yes
Max MTU: 1460
Max MRU: 1460
Default Profile: PPTP-profile
Only check mschap2
/interface pptp-server server print
enabled: yes
max-mtu: 1460
max-mru: 1460
mrru: disabled
authentication: mschap2
keepalive-timeout: 30
default-profile: PPTP-profile
5. Firewall > Filter Rules > Add New
Chain: input
Protocol: 6 (tcp)
Dst. Port: 1723
Comment: PPTP configuration
Drag the new config to the top of the list (under the Protocol: 1 (icmp) rule)
6. Firewall > Filter Rules > Add New
Chain: input
Protocol: gre
Drag under the Port 1723 rule
/ip firewall filter print detail
0 ;;; default configuration
chain=input action=accept protocol=icmp in-interface=!ether1-gateway
log=no log-prefix=""
1 ;;; PPTP configuration
chain=input action=accept protocol=tcp dst-port=1723 log=no log-prefix=""
2 chain=input action=accept protocol=gre log=no log-prefix=""
3 ;;; default configuration
chain=input action=accept connection-state=established log=no
log-prefix=""
4 ;;; default configuration
chain=input action=accept connection-state=related log=no log-prefix=""
5 ;;; default configuration
chain=input action=drop in-interface=sfp1-gateway log=no log-prefix=""
6 ;;; default configuration
chain=input action=drop in-interface=ether1-gateway log=no log-prefix=""
7. Interfaces > ether2
ARP: proxy-arp
/interface ethernet print
# NAME MTU MAC-ADDRESS ARP MASTER-PORT SWITCH
0 R ether1-g... 1500 D4:CA:6D:1C:85:F8 enabled none switch1
1 RS ether2 1500 D4:CA:6D:1C:85:F9 proxy-arp none switch1
2 S ether3 1500 D4:CA:6D:1C:85:FA enabled none switch1
3 S ether4 1500 D4:CA:6D:1C:85:FB enabled none switch1
4 S ether5 1500 D4:CA:6D:1C:85:FC enabled none switch1
5 S ether6-m... 1500 D4:CA:6D:1C:85:FD enabled none switch2
6 S ether7-s... 1500 D4:CA:6D:1C:85:FE enabled ether6-master... switch2
7 S ether8-s... 1500 D4:CA:6D:1C:85:FF enabled ether6-master... switch2
8 S ether9-s... 1500 D4:CA:6D:1C:86:00 enabled ether6-master... switch2
9 S ether10-... 1500 D4:CA:6D:1C:86:01 enabled ether6-master... switch2
10 sfp1-gat... 1500 D4:CA:6D:1C:85:F7 enabled none switch1
8. The IP settings of my workstation after connecting:
IP: 192.168.25.98
SUB: 255.255.255.255
DNS1: 192.168.25.1
DNS2: 97.64.183.164 (My ISP)