S
S
Sr_Fill2015-11-15 18:52:34
Mikrotik
Sr_Fill, 2015-11-15 18:52:34

PPTP client on MikroTik?

I understand that the question is extremely "stupid". But how to set up a pptp client on Mikrotik at home?
Further only the provider.
Acted according to this instruction.
There was a connection, I picked up dns. But at the same time, there was still no access to the Internet? What could be the problem? Thank you.

Answer the question

In order to leave comments, you need to log in

4 answer(s)
L
LESHIY_ODESSA, 2015-11-15
@LESHIY_ODESSA

The author of the instructions is an idiot!!!

Open the "IP" tab and select "Firewall" and "NAT".
In "Chain", select "srcnat", check the "Enabled" checkbox.
In "Out. Interface", select the PPTP VPN connection name you created and check the checkbox.

The checkbox [!] means "except". That is, make NAT for everyone except the "PPTP" interface. Enchanting.
Then why label the packages. "Dial On Demand" - connect on demand, this is not a reconnect. In short, the author of the instruction is an IDIOT !!!
Idiot instructions. Lots of extras and specials. Reset everything that is configured and everything is new.
Here are the more sane ones:
Mikrotik setup practice for dummies .
Mikrotik- Quick Start - Mikrotik RouterOS - Quick Set
In short, create 1) PPTP client, DON'T TOUCH ANYTHING, everything is by default. Just check the box "Add Default Route". Type in a) vpn server b) login c) password.
2. IP -> FIREWALL -> NAT tab -> PRESS THE PLUS -> chain=srcnat Out interface=pptp-out1 -> Action tab select masquerade

R
Ruslan Fedoseev, 2015-11-15
@martin74ua

configure pptp connection, configure NAT.

B
bely87, 2015-11-17
@bely87

/ip route>
add disabled=no distance=1 dst-address=8.8.8.8/32 gateway=192.168.100.1
The easiest thing to do is this. 192.168.100.1 - tunnel ip or connection name.
Or, in the client connection settings, set the add default route checkbox so that all traffic goes to the tunnel

D
dBat, 2018-10-11
@dBat

Kind time
Help with advice, otherwise I got lost with setting access to no
initial
PPTP data
ip: 10.0.10.10
mask: 255.255.255.0
default gateway: 10.0.10.1
DNS1: 30.30.30.30
DNS2: 20.20.20.20
name: 99.99.99.99
password : MyPass
vpn: 10.0.0.1
Local 192.168.1.1/24
To avoid problems, we drive in the old mas with which it used to work
, that's what we drive in
/interface ethernet set [find default-name=ether1] name=eth1-wan
/interface ethernet set [ find default-name=ether2] name=eth2-lan
/interface ethernet set [find default-name=ether3] name=eth3-lan
/interface ethernet set [find default-name=ether4] name=eth4-lan
/interface ethernet set [find default-name=ether5] name=eth5-lan
/interface ethernet set eth1-wan mac-address=00:00:00 :00:00:00
/ip address add address=10.0.10.10/255.255.255.0 interface=eth1-wan
/ip route add dst-address=0.0.0.0/0 gateway=10.0.10.1 check-gateway=ping distance=1
/ip dns set servers=30.30.30.30,20.20.20.20
/interface pptp-client add name=tun1-wan disabled=no connect-to=10.0.0.1 user=99.99.99.99
password=MyPass add-default-route=yes default -route-distance=1 profile=default
/interface bridge
add name=br1-lan
/interface bridge port
add bridge=br1-lan interface=eth2-lan hw=yes
add bridge=br1-lan interface=eth3-lan hw=yes
add bridge=br1-lan interface=eth4-lan hw=yes
add bridge=br1-lan interface=eth5-lan hw=yes
add bridge=br1-lan interface= wlan1
add bridge=br1-lan interface=wlan2
/interface wireless security-profiles add name=wpa2-protect mode=dynamic-keys authentication-
types=wpa-psk,wpa2-psk unicast-ciphers=aes-ccm group-ciphers=aes -ccm wpa-pre-shared-key=WPass
wpa2-pre-shared-key=WPass
/interface wireless set wlan1 disabled=no ssid=Mi2 mode=ap-bridge band=2ghz-b/g/n frequency=2412
bridge- mode=enabled wireless-protocol=802.11 security-profile=wpa2-protect default-authentication=yes
default-forwarding=yes hide-ssid=no
/interface wireless nstreme set wlan1 enable-nstreme=no enable-polling=no disable-csma=no
/ip address add address=192.168.1.1/24 interface=br1-lan
/ip pool add name=dhcp-pc ranges:192.168. 1.2-192.168.1.254
/ip dhcp-server add name=dhcp-pc interface=br1-lan lease-time=08:00:00 address-pool=dhcp-pc
/ip dhcp-server network add address=192.168.1.0/ 24 dns-server=192.168.1.1 gateway=192.168.1.1
netmask=24
/ip dns set allow-remote-requests=yes
/ip firewall filter
add chain=input protocol=icmp
add chain=input connection-state=new dst-port =80,8291,22 in-interface=br1-lan protocol=tcp src-
address=192.168.1.0/24
add chain=input connection-mark=allow_in connection-state=new dst-port=80 in-interface=tun1-wan
protocol=tcp
add chain=input connection-state=new dst-port=53,123 protocol=udp src-address= 192.168.1.0/24
add chain=input connection-state=established,related
add chain=output connection-state=!invalid
add chain=forward connection-state=established,new in-interface=br1-lan out-interface=tun1- wan src-
address=192.168.1.0/24
add chain=forward connection-state=established,related in-interface=tun1-wan out-interface=br1-lan
add action=drop chain=input
add action=drop chain=output
add action=drop chain=forward
/ip firewall nat
add action=masquerade chain=srcnat out-interface=tun1-wan src-address=192.168.1.0/24
add action=redirect chain=dstnat dst-port=9999 protocol=tcp to-ports=80
/ip firewall mangle
add action= mark-connection chain=prerouting dst-port=9999 new-connection-mark=allow_in protocol=tcp
connection-state=new

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question