a vpn esta conectada, porem nao pinga e nao acessa nada. nos logs aparece isso.
openVPN_mikrotik_BAHIA / wan mikrotik: 32852 Byte de cabeçalho de descompressão do stub de compressão incorreta: 42 <https://mailtrack.io/> Enviado com Mailtrack <https://mailtrack.io?utm_source=gmail&utm_medium=signature&utm_campaign=signaturevirality&> Att, *Marcel Laino* Vivo: (11) 95287-5837 [email protected] facebook.com/marcellaino <http://Facebook.com/marcellaino> youtube.com/marcellaino br.linkedin.com/in/marcellaino google.com/+MarcelLaino On Wed, Mar 14, 2018 at 3:36 PM, Marcel Laino <[email protected]> wrote: > Alguem pode ajudar com essa configuracao. a vpn esta conectada, porem as > redes nao se falam de jeito nenhum. > > segui esse cenario, porem nao vai. tentei ipsec e tb n conecta. tinha > ipsec conectado com esse mikrotik na versao 2.1.5 porem atualizei o pfsense > e nao conectou mais. > > *pfSense:* > > 1. System -> Cert Manager -> CAs > Create new CA (*vpn-tunnel-ca*). Export "CA cert" file (my-ca.crt). > > 2. System -> Cert Manager -> Certificates > Create two certificates (use CA created above) - one for the VPN Server > (vpn-tunnel) and one for the MikroTik client (mik-vpn). Export cert and key > files for client certificate (mik-vpn.crt and mik-vpn.key). > > 3. VPN -> OpenVPN -> Server > Create new VPN server: > > Server Mode: Peer to Peer (SSL/TLS) > Protocol: TCP > Device Mode: tun > Interface: ITD > Local port: 1195 > TLS Authentication: (clear checkbox, MikroTik doesn't support shared TLS > key) > Peer Certificate Authority: vpn-tunnel-ca > Server Certificate: vpn-tunnel > Encryption algorithm: BF-CBC (128-bit) > Auth Digest Algorithm: SHA1 (160-bit) > IPv4 Tunnel Network: x <http://172.20.20.0/30>.x.x.x/30 > IPv4 Local Network/s: l <http://192.168.0.0/24>an > IPv4 Remote Network/s: lan client <http://10.10.2.0/26> > Compression: No Preference > Advanced: client-to-client > > 4. VPN -> OpenVPN -> Client Specific Overrides > Create new override: > > Common name: mik-vpn > Advanced: iroute (lan client) mask > > > *MikroTik:* > > 1. Copy two certificate files and the key file to Files. Import all of > them from System/Certificates. > > 2. PPP -> Interface - create new OVPN Client: > Name: ovpn-office > Connect To: wan pfsense > Port: 1195 > Mode: ip > User: any > Certificate: mik-vpn.crt_0 > Auth: sha 1 > Cipher: blowfish 128 > Add Default Route: (do not check this) > > It works as expected - I can ping workstations from both sides of the > tunnel. > > Att, > > *Marcel Laino* > Vivo: (11) 95287-5837 > [email protected] > facebook.com/marcellaino <http://Facebook.com/marcellaino> > youtube.com/marcellaino > br.linkedin.com/in/marcellaino > google.com/+MarcelLaino > > > > > <https://mailtrack.io/> Enviado com Mailtrack > <https://mailtrack.io?utm_source=gmail&utm_medium=signature&utm_campaign=signaturevirality&> > _______________________________________________ Pfsense-pt mailing list [email protected] http://lists.pfsense.org/mailman/listinfo/pfsense-pt
