A few weeks ago, I faced a very strange problem with one of my routers. The Dude alarmed that that one router is down. I had previous problems with the link on that location and I didn’t checked it immediately. Nonetheless, when the router didn’t recovered, I logged on it and found that the VPN client can’t connect anymore. Continue reading
PPP
Mikrotik PPP services
How to setup MikroTik as the SSTP VPN client
In this article, I will guide you through the setup process of the SSTP client in MikroTik RouterOS 5.26 and 6.xx. The client side setup does not depends on the type of VPN server.
How to use MikroTik as the SSTP VPN server
The Microsoft Secure Socket Tunneling Protocol (SSTP) is the VPN technology based on the Point-to-Point Protocol (PPP) over Secured Socket Layer (SSL). As this protocol is based on the same mechanism as the Secured Web (HTTPS) protocol, it will pass virtually through every firewall or proxy server.
Using PPTP VPN on the Mikrotik router
The PPTP protocol was developed by a group of vendors during the late 1990s. It’s still very popular, although it contains many security issues. The part of its popularity lays in the simplicity of the implementation and the built-in support in virtually every operating system.
The specification for PPTP was published in RFC2637. This type of VPN is well known for implementing on the Microsoft Windows platforms. Additionally, many other vendors implemented (at the very least) the client version and the server part is implemented in Mikrotik RouterOS, too.
Mikrotik device as a L2TP/IPSec client
In the previous post we have shown a Mikrotik router as a L2TP/IPSec server. In this scenario, we are using either Windows clients or mobile devices based on Android or Apple iOS operating systems. Here is a new scenario – we may have a need to use another Mikrotik device as the VPN client.
The most common scenario is that you want to connect a remote network with a main network. Using the L2TP/IPSec VPN connection, you will have in the same time the routable tunnel and the full power of IPSec encryption.