Answer the question
In order to leave comments, you need to log in
PPTP client on MikroTik?
I understand that the question is extremely "stupid". But how to set up a pptp client on Mikrotik at home?
Further only the provider.
Acted according to this instruction.
There was a connection, I picked up dns. But at the same time, there was still no access to the Internet? What could be the problem? Thank you.
Answer the question
In order to leave comments, you need to log in
The author of the instructions is an idiot!!!
Open the "IP" tab and select "Firewall" and "NAT".
In "Chain", select "srcnat", check the "Enabled" checkbox.
In "Out. Interface", select the PPTP VPN connection name you created and check the checkbox.
/ip route>
add disabled=no distance=1 dst-address=8.8.8.8/32 gateway=192.168.100.1
The easiest thing to do is this. 192.168.100.1 - tunnel ip or connection name.
Or, in the client connection settings, set the add default route checkbox so that all traffic goes to the tunnel
Kind time
Help with advice, otherwise I got lost with setting access to no
initial
PPTP data
ip: 10.0.10.10
mask: 255.255.255.0
default gateway: 10.0.10.1
DNS1: 30.30.30.30
DNS2: 20.20.20.20
name: 99.99.99.99
password : MyPass
vpn: 10.0.0.1
Local 192.168.1.1/24
To avoid problems, we drive in the old mas with which it used to work
, that's what we drive in
/interface ethernet set [find default-name=ether1] name=eth1-wan
/interface ethernet set [ find default-name=ether2] name=eth2-lan
/interface ethernet set [find default-name=ether3] name=eth3-lan
/interface ethernet set [find default-name=ether4] name=eth4-lan
/interface ethernet set [find default-name=ether5] name=eth5-lan
/interface ethernet set eth1-wan mac-address=00:00:00 :00:00:00
/ip address add address=10.0.10.10/255.255.255.0 interface=eth1-wan
/ip route add dst-address=0.0.0.0/0 gateway=10.0.10.1 check-gateway=ping distance=1
/ip dns set servers=30.30.30.30,20.20.20.20
/interface pptp-client add name=tun1-wan disabled=no connect-to=10.0.0.1 user=99.99.99.99
password=MyPass add-default-route=yes default -route-distance=1 profile=default
/interface bridge
add name=br1-lan
/interface bridge port
add bridge=br1-lan interface=eth2-lan hw=yes
add bridge=br1-lan interface=eth3-lan hw=yes
add bridge=br1-lan interface=eth4-lan hw=yes
add bridge=br1-lan interface=eth5-lan hw=yes
add bridge=br1-lan interface= wlan1
add bridge=br1-lan interface=wlan2
/interface wireless security-profiles add name=wpa2-protect mode=dynamic-keys authentication-
types=wpa-psk,wpa2-psk unicast-ciphers=aes-ccm group-ciphers=aes -ccm wpa-pre-shared-key=WPass
wpa2-pre-shared-key=WPass
/interface wireless set wlan1 disabled=no ssid=Mi2 mode=ap-bridge band=2ghz-b/g/n frequency=2412
bridge- mode=enabled wireless-protocol=802.11 security-profile=wpa2-protect default-authentication=yes
default-forwarding=yes hide-ssid=no
/interface wireless nstreme set wlan1 enable-nstreme=no enable-polling=no disable-csma=no
/ip address add address=192.168.1.1/24 interface=br1-lan
/ip pool add name=dhcp-pc ranges:192.168. 1.2-192.168.1.254
/ip dhcp-server add name=dhcp-pc interface=br1-lan lease-time=08:00:00 address-pool=dhcp-pc
/ip dhcp-server network add address=192.168.1.0/ 24 dns-server=192.168.1.1 gateway=192.168.1.1
netmask=24
/ip dns set allow-remote-requests=yes
/ip firewall filter
add chain=input protocol=icmp
add chain=input connection-state=new dst-port =80,8291,22 in-interface=br1-lan protocol=tcp src-
address=192.168.1.0/24
add chain=input connection-mark=allow_in connection-state=new dst-port=80 in-interface=tun1-wan
protocol=tcp
add chain=input connection-state=new dst-port=53,123 protocol=udp src-address= 192.168.1.0/24
add chain=input connection-state=established,related
add chain=output connection-state=!invalid
add chain=forward connection-state=established,new in-interface=br1-lan out-interface=tun1- wan src-
address=192.168.1.0/24
add chain=forward connection-state=established,related in-interface=tun1-wan out-interface=br1-lan
add action=drop chain=input
add action=drop chain=output
add action=drop chain=forward
/ip firewall nat
add action=masquerade chain=srcnat out-interface=tun1-wan src-address=192.168.1.0/24
add action=redirect chain=dstnat dst-port=9999 protocol=tcp to-ports=80
/ip firewall mangle
add action= mark-connection chain=prerouting dst-port=9999 new-connection-mark=allow_in protocol=tcp
connection-state=new
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question