Eoip + IPsec одна сеть

Тема в разделе "Вопросы и решение проблем", создана пользователем Nipster, 22 апр 2025.

  1. Nipster

    Nipster New Member

    Регистрация:
    22 апр 2025
    Сообщения:
    14
    Симпатии:
    1
    Баллы:
    1
    Пол:
    Мужской
    Понял,
    Понял, буду грызть.... Скорее всего еще напишу сегодня, БЛАГОДАРЮ!
     
  2. Nipster

    Nipster New Member

    Регистрация:
    22 апр 2025
    Сообщения:
    14
    Симпатии:
    1
    Баллы:
    1
    Пол:
    Мужской
    Добрый день!
    Вот что то наваялось, хотел проконсультироваться, все ли верно, дырки, очередность правил и т.п. На втором тоже самое, только без проброса портов...
    # 2025-03-10 15:07:40 by RouterOS 7.18.2
    # software id = TFFU-1USB
    #
    # model = RBD52G-5HacD2HnD
    # serial number =
    /interface bridge
    add admin-mac=D4:01:C3:3A:AF:85 auto-mac=no comment=defconf name=bridge
    /interface eoip
    add allow-fast-path=no comment=Office local-address=192.168.100.1 \
    mac-address=02:85:BA:E3:87:69 name=eoip-tunnel1 remote-address=\
    192.168.100.2 tunnel-id=5
    /interface list
    add comment=defconf name=WAN
    add comment=defconf name=LAN
    /ip hotspot profile
    set [ find default=yes ] html-directory=hotspot
    /ip pool
    add name=dhcp ranges=192.168.1.100-192.168.1.120
    /ip dhcp-server
    add address-pool=dhcp interface=bridge name=defconf
    /disk settings
    set auto-media-interface=bridge auto-media-sharing=yes auto-smb-sharing=yes
    /interface bridge port
    add bridge=bridge comment=defconf interface=ether2
    add bridge=bridge comment=defconf interface=ether3
    add bridge=bridge comment=defconf interface=ether4
    add bridge=bridge comment=defconf interface=ether5
    add bridge=bridge interface=eoip-tunnel1
    /ip neighbor discovery-settings
    set discover-interface-list=LAN
    /interface list member
    add comment=defconf interface=bridge list=LAN
    add comment=defconf interface=ether1 list=WAN
    add comment=EOIP interface=eoip-tunnel1 list=LAN
    /ip address
    add address=192.168.1.1/24 comment=defconf interface=bridge network=\
    192.168.1.0
    add address=192.168.100.1/24 interface=ether1 network=192.168.100.0
    /ip dhcp-client
    add comment=defconf disabled=yes interface=ether1
    /ip dhcp-server network
    add address=192.168.1.0/24 comment=defconf dns-server=192.168.1.1 gateway=\
    192.168.1.1 netmask=24
    /ip dns
    set allow-remote-requests=yes
    /ip dns static
    add address=192.168.1.1 comment=defconf name=router.lan type=A
    /ip firewall filter
    add action=accept chain=input comment="Management Access" dst-port=8291,22 \
    in-interface=bridge protocol=tcp
    add action=accept chain=input comment="IPsec ESP" protocol=ipsec-esp
    add action=accept chain=input comment="IPsec AH" protocol=ipsec-ah
    add action=accept chain=input comment="IPsec IKE" dst-port=500,4500 protocol=\
    udp
    add action=accept chain=input comment="accept input matching IPsec policy" \
    ipsec-policy=in,ipsec
    add action=accept chain=input comment="accept EoIP" protocol=gre
    add action=accept chain=input comment="Allow ICMP" protocol=icmp
    add action=accept chain=forward comment="Port Forwarding" dst-port=8000,443 \
    in-interface=ether1 out-interface=bridge protocol=tcp
    add action=drop chain=input comment="defconf: drop all not coming from LAN" \
    in-interface-list=!LAN
    add action=drop chain=input comment="Block All Input"
    add action=accept chain=forward comment="Bridge Traffic" in-interface=bridge \
    out-interface=bridge
    add action=accept chain=forward comment="Allow Established" connection-state=\
    established,related
    add action=drop chain=forward comment="Block All Forward"
    /ip firewall nat
    add action=masquerade chain=srcnat comment="defconf: masquerade" \
    ipsec-policy=out,none out-interface-list=WAN
    add action=dst-nat chain=dstnat comment="Video Surveillance Port 8000" \
    dst-port=8000 in-interface=ether1 protocol=tcp to-addresses=192.168.1.121 \
    to-ports=8000
    add action=dst-nat chain=dstnat comment="HTTPS Port 443" dst-port=443 \
    in-interface=ether1 protocol=tcp to-addresses=192.168.1.90
    /ip service
    set telnet disabled=yes
    set ftp disabled=yes
    set www disabled=yes
    set ssh disabled=yes
    set api disabled=yes
    set api-ssl disabled=yes
    /ipv6 firewall address-list
    add address=::/128 comment="defconf: unspecified address" list=bad_ipv6
    add address=::1/128 comment="defconf: lo" list=bad_ipv6
    add address=fec0::/10 comment="defconf: site-local" list=bad_ipv6
    add address=::ffff:0.0.0.0/96 comment="defconf: ipv4-mapped" list=bad_ipv6
    add address=::/96 comment="defconf: ipv4 compat" list=bad_ipv6
    add address=100::/64 comment="defconf: discard only " list=bad_ipv6
    add address=2001:db8::/32 comment="defconf: documentation" list=bad_ipv6
    add address=2001:10::/28 comment="defconf: ORCHID" list=bad_ipv6
    add address=3ffe::/16 comment="defconf: 6bone" list=bad_ipv6
    /ipv6 firewall filter
    add action=accept chain=input comment=\
    "defconf: accept established,related,untracked" connection-state=\
    established,related,untracked
    add action=drop chain=input comment="defconf: drop invalid" connection-state=\
    invalid
    add action=accept chain=input comment="defconf: accept ICMPv6" protocol=\
    icmpv6
    add action=accept chain=input comment="defconf: accept UDP traceroute" \
    dst-port=33434-33534 protocol=udp
    add action=accept chain=input comment=\
    "defconf: accept DHCPv6-Client prefix delegation." dst-port=546 protocol=\
    udp src-address=fe80::/10
    add action=accept chain=input comment="defconf: accept IKE" dst-port=500,4500 \
    protocol=udp
    add action=accept chain=input comment="defconf: accept ipsec AH" protocol=\
    ipsec-ah
    add action=accept chain=input comment="defconf: accept ipsec ESP" protocol=\
    ipsec-esp
    add action=accept chain=input comment=\
    "defconf: accept all that matches ipsec policy" ipsec-policy=in,ipsec
    add action=drop chain=input comment=\
    "defconf: drop everything else not coming from LAN" in-interface-list=\
    !LAN
    add action=fasttrack-connection chain=forward comment="defconf: fasttrack6" \
    connection-state=established,related
    add action=accept chain=forward comment=\
    "defconf: accept established,related,untracked" connection-state=\
    established,related,untracked
    add action=drop chain=forward comment="defconf: drop invalid" \
    connection-state=invalid
    add action=drop chain=forward comment=\
    "defconf: drop packets with bad src ipv6" src-address-list=bad_ipv6
    add action=drop chain=forward comment=\
    "defconf: drop packets with bad dst ipv6" dst-address-list=bad_ipv6
    add action=drop chain=forward comment="defconf: rfc4890 drop hop-limit=1" \
    hop-limit=equal:1 protocol=icmpv6
    add action=accept chain=forward comment="defconf: accept ICMPv6" protocol=\
    icmpv6
    add action=accept chain=forward comment="defconf: accept HIP" protocol=139
    add action=accept chain=forward comment="defconf: accept IKE" dst-port=\
    500,4500 protocol=udp
    add action=accept chain=forward comment="defconf: accept ipsec AH" protocol=\
    ipsec-ah
    add action=accept chain=forward comment="defconf: accept ipsec ESP" protocol=\
    ipsec-esp
    add action=accept chain=forward comment=\
    "defconf: accept all that matches ipsec policy" ipsec-policy=in,ipsec
    add action=drop chain=forward comment=\
    "defconf: drop everything else not coming from LAN" in-interface-list=\
    !LAN
    /system note
    set show-at-login=no
    /tool mac-server
    set allowed-interface-list=LAN
    /tool mac-server mac-winbox
    set allowed-interface-list=LAN
     
  3. Nipster

    Nipster New Member

    Регистрация:
    22 апр 2025
    Сообщения:
    14
    Симпатии:
    1
    Баллы:
    1
    Пол:
    Мужской
    Вообщем туннель заработал, несколько дней не удавалось, потом выяснилось что билайн, не любит микротики, или наоборот :) Вообщем пока не взял настройки правильные у провайдера, ничего не заработало. Сейчас работает,, но проблема в DNS, видимо теряются... когда без тунеля, все хорошо... тунель поднимаешь и все.. при чем не на всех компах.. Хотя у всех стоит статический адрес, в качестве шлюза первый роутер 192.168.1.1 DNS 8.8.8.8 и все равно затыки.
     
    fAntom нравится это.

Поделиться этой страницей

Share