​do meu lado (pfsense) eu liberei tudo na regra do tunel da openvpn.

criei uma regra na LAN, para permitir tudo para a lan do cliente.​
e criei outra regra na WAN permitindo a entrada do IP WAN do cliente. nao
falta mais nada certo ? vou enviar o email para ele.




<https://mailtrack.io/> Enviado com Mailtrack
<https://mailtrack.io?utm_source=gmail&utm_medium=signature&utm_campaign=signaturevirality&;>

Att,

*Marcel Laino*
Vivo: (11) 95287-5837
[email protected]
facebook.com/marcellaino <http://Facebook.com/marcellaino>
youtube.com/marcellaino
br.linkedin.com/in/marcellaino
google.com/+MarcelLaino

On Thu, Mar 15, 2018 at 12:42 PM, Victor Franca <[email protected]
> wrote:

> pela descrição, se não se falam é regra de firewall.  Se do seu lado está
> OK, sim ele terá que fazer as regras de Iptables lá.
>
> 2018-03-15 11:58 GMT-03:00 Marcel Laino <[email protected]>:
>
> > ​Bom dia.
> >
> > Para funcionar no mikrotik, no server da openvpn *não *pode ter:
> > — Compressão Lzo (eu estava usando o padrao: no preference )
> > — Porta UDP ( configurei para rodar TCP apenas ipv4)​
> >
> > Vou converter as chaves pelo shell do pfsense e enviar para o tecnico do
> > mikrotik importar. pois a vpn conectou, mas nao pinga e nem acessa o \\.
> > agora precisa fazer todas aquelas configuracoes de iptables mesmo do lado
> > do mikrotik ? apenas preciso que as lans se falem via ip para acessar o
> \\
> > na outra ponta.
> > fazendo os acertos do certificado as redes nao vao se falar ainda ?
> >
> >
> >
> >
> >
> >
> > ‌
> >
> > Att,
> >
> > *Marcel Laino*
> > Vivo: (11) 95287-5837
> > [email protected]
> > facebook.com/marcellaino <http://Facebook.com/marcellaino>
> > youtube.com/marcellaino
> > br.linkedin.com/in/marcellaino
> > google.com/+MarcelLaino
> >
> > On Thu, Mar 15, 2018 at 10:27 AM, Ulisses Féres - Abratel Telecom <
> > [email protected]> wrote:
> >
> > > Amigo, vou tentar listar um passo a passo para seguir:
> > >
> > >
> > > Para funcionar no mikrotik, no server da openvpn *não *pode ter:
> > > — Compressão Lzo
> > > — Porta UDP
> > >
> > > Alguns ajustes são necessários. Ainda no linux, converter as chaves
> para
> > > RSA:
> > >
> > >
> > > openssl rsa -in ca.key -text > ca.rsa
> > > openssl rsa -in client2.key -text > client2.rsa
> > >
> > > *NO MIKROTIK*
> > >
> > > Importar do linux esses 4 arquivos abaixo e arrasta-los para dentro do
> > > mikrotik.
> > > Depois no terminal do mesmo executar
> > > 1
> > > 2
> > > 3
> > > 4
> > > /certificate import file-name=ca.crt (pressione enter até concluir)
> > > /certificate import file-name=ca.rsa (pressione enter até concluir)
> > > /certificate import file-name=client4.crt (pressione enter até
> concluir)
> > > /certificate import file-name=client4.rsa (pressione enter até
> concluir)
> > >
> > > No MIKROTIK:
> > >
> > > *INTERFACES –> ADD –> OPENVPN CLIENT*
> > > 1
> > > 2
> > > 3
> > > 4
> > > 5
> > > 6
> > > 7
> > > 8
> > > 9
> > > Dialup: A.B.C.D (ip do servidor openvpn)
> > > porta: 1195
> > > mode: ip
> > > user: cliente4 (nome da chave)
> > > pass: vazia
> > > profile: default-encryptation
> > > Certificate: client4.crt_0
> > > Auth: sha1
> > > Cipher: blowfish 128
> > >
> > > Após conexão, em *IP –> ROUTE*  observe se automaticamente criou a rota
> > > para o rede destino/rede_destino saindo pelo openvpn client.
> > >
> > > Criei um masquerad no firewall com:
> > > 1
> > > 2
> > > 3
> > > SOURCE: rede LAN mikrotik
> > > OutInterface: openvpncliete criada
> > > Aba Action: Masquerad
> > >
> > > *Step 4 — Routing – SOMENTE SE NECESSITAR ACESSAR A REDE INTERNA LAN
> > ONDE O
> > > SERVIDOR VPN ASTERISK ENCONTRA-SE*
> > >
> > > To keep things simple we’re going to do our routing directly with
> > iptables
> > > rather than the new firewalld.
> > >
> > > First, make sure the iptables service is installed and enabled.
> > >
> > > yum install iptables-services -y
> > > systemctl mask firewalld
> > > systemctl enable iptables
> > > systemctl stop firewalld
> > > systemctl start iptables
> > > iptables –flush
> > > Next we’ll add a rule to iptables to forward our routing to our OpenVPN
> > > subnet, and save this rule.
> > >
> > > iptables -t nat -A POSTROUTING -s 10.8.0.0/24 -o eth0 -j MASQUERADE
> > > iptables-save > /etc/sysconfig/iptables
> > > Then we must enable IP forwarding in sysctl. Open sysctl.conf for
> > editing.
> > > 1
> > > 2
> > > 3
> > > 4
> > > vi /etc/sysctl.conf
> > > Add the following line at the top of the file:
> > >
> > > net.ipv4.ip_forward = 1
> > >
> > > Then restart the network service so the IP forwarding will take effect.
> > > 1
> > > systemctl restart network.service
> > >
> > > *Step 5 — Starting OpenVPN*
> > >
> > > Now we’re ready to run our OpenVPN service. So lets add it to
> systemctl:
> > > 1
> > > 2
> > > systemctl -f enable [email protected]
> > > systemctl start [email protected]
> > >
> > > *No mk crie uma regra de mascaramento:*
> > > NAT –> ADD
> > > Chain: srcnat
> > > Src. Address: rede lan (exemplo: 192.168.88.0/24)
> > > Dst. Address: rede lan da vpn do outro lado (192.168.218.0/24)
> > > Out Interface: nome-da-open-vpn-interface
> > > Action: Masquerade
> > >
> > > *Em MANGLE:*
> > > ADD
> > > Chain: Prerouting
> > > Src. Address: rede lan (exemplo: 192.168.88.0/24)
> > > Dst. Address: rede lan da vpn do outro lado (192.168.218.0/24)
> > > Action: Mark routing
> > > New Routing Mark: OpenVpn-NOME
> > > *Desmarcar Passthrough*
> > >
> > >
> > > * IP –> ROUTES*
> > > ADD
> > > Dst. Address: 192.168.218.0/24 (lan do outro lado)
> > > Geteway: openvpn-gw-criado-automaticamente
> > > Routinha Mark: OpenVpn-NOME (dado a regra acima de Mangle)
> > >
> > > Boa sorte.
> > >
> > >
> > >
> > > Ulisses Féres Cerqueira
> > > Infraestrutura e Projeto
> > > 55 32 3722-4004 ramal 928
> > > 55 32 98489-6455
> > > [email protected]
> > > www.abratel.com.br
> > >
> > >  [image: http://www.digavoip.com.br/assinatura/logo.png]
> > >
> > >
> > >
> > >
> > > 2018-03-14 15:38 GMT-03:00 Marcel Laino <[email protected]>:
> > >
> > > > a vpn esta conectada, porem nao pinga e nao acessa nada. nos logs
> > aparece
> > > > isso.
> > > >
> > > > openVPN_mikrotik_BAHIA / wan mikrotik: 32852 Byte de cabeçalho de
> > > > descompressão do stub de compressão incorreta: 42
> > > >
> > > >
> > > >
> > > > ‌
> > > > <https://mailtrack.io/> Enviado com Mailtrack
> > > > <https://mailtrack.io?utm_source=gmail&utm_medium=
> > > signature&utm_campaign=
> > > > signaturevirality&>
> > > >
> > > > Att,
> > > >
> > > > *Marcel Laino*
> > > > Vivo: (11) 95287-5837
> > > > [email protected]
> > > > facebook.com/marcellaino <http://Facebook.com/marcellaino>
> > > > youtube.com/marcellaino
> > > > br.linkedin.com/in/marcellaino
> > > > google.com/+MarcelLaino
> > > >
> > > > On Wed, Mar 14, 2018 at 3:36 PM, Marcel Laino <[email protected]
> >
> > > > wrote:
> > > >
> > > > > Alguem pode ajudar com essa configuracao. a vpn esta conectada,
> porem
> > > as
> > > > > redes nao se falam de jeito nenhum.
> > > > >
> > > > > segui esse cenario, porem nao vai. tentei ipsec e tb n conecta.
> tinha
> > > > > ipsec conectado com esse mikrotik na versao 2.1.5 porem atualizei o
> > > > pfsense
> > > > > e nao conectou mais.
> > > > >
> > > > > *pfSense:*
> > > > >
> > > > > 1. System -> Cert Manager -> CAs
> > > > > Create new CA (*vpn-tunnel-ca*). Export "CA cert" file (my-ca.crt).
> > > > >
> > > > > 2. System -> Cert Manager -> Certificates
> > > > > Create two certificates (use CA created above) - one for the VPN
> > Server
> > > > > (vpn-tunnel) and one for the MikroTik client (mik-vpn). Export cert
> > and
> > > > key
> > > > > files for client certificate (mik-vpn.crt and mik-vpn.key).
> > > > >
> > > > > 3. VPN -> OpenVPN -> Server
> > > > > Create new VPN server:
> > > > >
> > > > > Server Mode: Peer to Peer (SSL/TLS)
> > > > > Protocol: TCP
> > > > > Device Mode: tun
> > > > > Interface: ITD
> > > > > Local port: 1195
> > > > > TLS Authentication: (clear checkbox, MikroTik doesn't support
> shared
> > > TLS
> > > > > key)
> > > > > Peer Certificate Authority: vpn-tunnel-ca
> > > > > Server Certificate: vpn-tunnel
> > > > > Encryption algorithm: BF-CBC (128-bit)
> > > > > Auth Digest Algorithm: SHA1 (160-bit)
> > > > > IPv4 Tunnel Network: x <http://172.20.20.0/30>.x.x.x/30
> > > > > IPv4 Local Network/s: l <http://192.168.0.0/24>an
> > > > > IPv4 Remote Network/s: lan client <http://10.10.2.0/26>
> > > > > Compression: No Preference
> > > > > Advanced: client-to-client
> > > > >
> > > > > 4. VPN -> OpenVPN -> Client Specific Overrides
> > > > > Create new override:
> > > > >
> > > > > Common name: mik-vpn
> > > > > Advanced: iroute (lan client) mask
> > > > >
> > > > >
> > > > > *MikroTik:*
> > > > >
> > > > > 1. Copy two certificate files and the key file to Files. Import all
> > of
> > > > > them from System/Certificates.
> > > > >
> > > > > 2. PPP -> Interface - create new OVPN Client:
> > > > > Name: ovpn-office
> > > > > Connect To: wan pfsense
> > > > > Port: 1195
> > > > > Mode: ip
> > > > > User: any
> > > > > Certificate: mik-vpn.crt_0
> > > > > Auth: sha 1
> > > > > Cipher: blowfish 128
> > > > > Add Default Route: (do not check this)
> > > > >
> > > > > It works as expected - I can ping workstations from both sides of
> the
> > > > > tunnel.
> > > > >
> > > > > Att,
> > > > >
> > > > > *Marcel Laino*
> > > > > Vivo: (11) 95287-5837
> > > > > [email protected]
> > > > > facebook.com/marcellaino <http://Facebook.com/marcellaino>
> > > > > youtube.com/marcellaino
> > > > > br.linkedin.com/in/marcellaino
> > > > > google.com/+MarcelLaino
> > > > >
> > > > >
> > > > >
> > > > > ‌
> > > > > <https://mailtrack.io/> Enviado com Mailtrack
> > > > > <https://mailtrack.io?utm_source=gmail&utm_medium=
> > > > signature&utm_campaign=signaturevirality&>
> > > > >
> > > > _______________________________________________
> > > > Pfsense-pt mailing list
> > > > [email protected]
> > > > http://lists.pfsense.org/mailman/listinfo/pfsense-pt
> > > >
> > > _______________________________________________
> > > Pfsense-pt mailing list
> > > [email protected]
> > > http://lists.pfsense.org/mailman/listinfo/pfsense-pt
> >
> >
> > <https://mailtrack.io/> Enviado com Mailtrack
> > <https://mailtrack.io?utm_source=gmail&utm_medium=
> signature&utm_campaign=
> > signaturevirality&>
> > _______________________________________________
> > Pfsense-pt mailing list
> > [email protected]
> > http://lists.pfsense.org/mailman/listinfo/pfsense-pt
> >
>
>
>
> --
> ..................................................................
> Atenciosamente
>
>
> Victor França
>
> Analista de Suporte
>
> EW Informática
>
> Rua Uruguaiana nº 10, Sala 309 - Rio de Janeiro, Centro.
>
> +55 21 3203 - 0368 (Opção 5)
> +55 21 99519 - 5342 (VIVO)
>
> e-mail: [email protected]
> GTalk: [email protected]
> Telegram: https://t.me/victorfmaraujo
>
> Acesse nosso site http://ewinfo.com.br e solicite seu atendimento pelo
> nosso chat on-line
> _______________________________________________
> Pfsense-pt mailing list
> [email protected]
> http://lists.pfsense.org/mailman/listinfo/pfsense-pt
>
_______________________________________________
Pfsense-pt mailing list
[email protected]
http://lists.pfsense.org/mailman/listinfo/pfsense-pt

Responder a