Hunting for the rogue host

A couple weeks ago, I received a phone call from one customer. They reported that they can’t work from the offices nor they can use VPN. On top of that, my Dude server started to flooding my inbox with messages that their router is down and up again.

That was really strange, as they usually don’t have any large network traffic. Therefore, I (somehow) connected to their router and started my investigation. Something happened there and my connection was painfully slow. Continue reading

The MikroTik SSTP client failed to connect

A few weeks ago, I faced a very strange problem with one of my routers. The Dude alarmed that that one router is down. I had previous problems with the link on that location and I didn’t checked it immediately. Nonetheless, when the router didn’t recovered, I logged on it and found that the VPN client can’t connect anymore. Continue reading

MikroTik Site to Site IPSec with RSA certificates

Today, I will guide you through the configuration process of a Site to Site IPSec tunnel between two MikroTik routers while using RSA certificates instead commonly used Pre-Shared Keys (PSK).

The advantage is clear – even a weakest certificate is stronger than many PSKs used around. The seed value used for all other computations and crypto-keys is longer and consequently the whole communication is more secure. In addition, when it come to the PSK generation process, many people lost their creativity. Continue reading

How to protect an IP-IP tunnel with IPSec

In this part of the MikroTik IPSec series, I will discuss about how to use IPSec to protect any other MikroTik tunnel without built-in encryption. I will use in this example an IP-IP tunnel as the reference, but you can apply this method to any other type. I already covered L2TP/IPSec PSK tunnels, as they are different in their nature.

Let’s begin! Continue reading