SlideShare a Scribd company logo
vpn router Mikrotik
vpn router Mikrotik
Welcome to this Workshop!
First, some basic concepts about encryption …..
• As you know, to unlock or even lock anything like a door you need a key.
• This applies to computer networks, too.
• There are two encryption methods in computer networks.
 Symmetric Encryption
 Asymmetric Encryption
One of the most common Asymmetric Encryption methods is using computer
certificates.
In this method, we need to provide a certificate from a well-known Certificate
Authority (CA) and import it to our "Local Computer Personal Certificate
Store”.
After importing, we can use it to encrypt and sign our data.
*Note: you should have your CA, public key certificate in your “Trusted
Certificate Authority” list.
How certificates work and help us to encrypt our data in “HTTPS-(SSL)”
communications…
vpn router Mikrotik
Let`s go to implementing SSTP & OVPN on our MikroTik RouterBoard as a
Server and Microsoft Windows as a Client ……
Imagine that our Network Topology is:
• First, basic configurations are set, including IP address, MikroTik identity
(Name), admin password, ….
• Then, as a first step of implementation, we should configure SNTP and
MikroTik Clock, because validity time is very important in issuing and
using a certificate.
(See next slide)
Configuring MikroTik Clock & SNTP Settings
• Now as a second step, we need to create a CA Certificate and issue a
certificate for our SSTP and OVPN Server and finally sign it with our
CA Certificate.
• After that we should export CA Public Key to import it to our client’s
“Trusted Root Certification Authorities” List.
(See next slides)
Providing CA & Server Certificates
Signing Certificates
Exporting CA Public Key
Importing CA Public Key to Client Local Certificate Store
(Trusted Root Certification Authorities List)
• Now as a third step, we should create an IP Pool, a PPP Profile and PPP Secret
which should be used with Server Certificate in Configurations after enabling
SSTP and OVPN.
• Finally, in Server Configurations, we should enable “ARP Proxy” on our
MikroTik Router “Local Network” Interface.
• It’s required to remotely access Local Network.
(See next slides)
Providing Same “IP Pool” for SSTP & OVPN Clients
Creating “PPP Profile” for SSTP & OVPN Connections
Creating “PPP Secret” for SSTP & OVPN Connections
Enabling & Configuring SSTP Server
Enabling & Configuring OVPN Server
Enabling “ARP Proxy” on Local Interface
• After all server configurations are completed, we should configure the client side.
• To configure a Microsoft Windows operating system as a SSTP Client, a VPN
connection should first be created and “VPN type” should be changed to “SSTP”.
• To configure a Microsoft Windows operating system as an “OVPN Client”, some
OVPN client applications such as “OPEN VPN GUI” should be installed and then
provide a Config File that includes client configurations and finally use it to
connect to your OVPN server.
*Tip: (You can use Sample Configuration file that is located in "sample-config"
folder and modify it according to your server configurations.
(See next slides)
Configuring SSTP Client on Microsoft Windows
Connecting to the MikroTik SSTP Server
Connecting to the MikroTik OVPN Server
vpn router Mikrotik
Thank You!
Powered by: Pooria Taabbodi
ptaabodi@hotmail.com

More Related Content

PPTX
Demystifying Software Defined Networking (SDN)
PDF
Python for the Network Nerd
PPT
Calico and juju
PPTX
Sqlviking
PPTX
Linux routing and firewall for beginners
PDF
y3dips hacking priv8 network
PDF
MQTT - REST Bridge using the Smart Object API
PPTX
Part 03: Azure Virtual Networks – Understanding and Creating Point-to-Site VP...
Demystifying Software Defined Networking (SDN)
Python for the Network Nerd
Calico and juju
Sqlviking
Linux routing and firewall for beginners
y3dips hacking priv8 network
MQTT - REST Bridge using the Smart Object API
Part 03: Azure Virtual Networks – Understanding and Creating Point-to-Site VP...

What's hot (17)

PPTX
Puppet for Networking - Junos
PPTX
Vital Aspects of SSL Support in MySQL
PPTX
Managing enterprise client deployment with p2
PPTX
How to: node js & micro-services
PPTX
Software for the Internet of Things
PPTX
BAUG Meetup #1 2022: Публикация ресурсов в Интернет в Microsoft Azure. Обзор ...
PPTX
WebAccess\NMS v3.0
PDF
Realtime Web Apps: WebSockets & WebRTC
PPTX
Lets Encrypt!
PPTX
Bastion Host : Amazon Web Services
PPTX
Virtual Private Networks
PDF
Getting started on IoT with AWS and NodeMCU for less than 5€
PDF
GÉANT TURN pilot
PDF
FIWARE Tech Summit - Building Your Own IoT Agent
PDF
Building Open Source IoT Cloud
PPTX
Introduction to SSL and How to Exploit & Secure
PPTX
Upcoming Products, Services and Features - Workshop by Praveen Umanath
Puppet for Networking - Junos
Vital Aspects of SSL Support in MySQL
Managing enterprise client deployment with p2
How to: node js & micro-services
Software for the Internet of Things
BAUG Meetup #1 2022: Публикация ресурсов в Интернет в Microsoft Azure. Обзор ...
WebAccess\NMS v3.0
Realtime Web Apps: WebSockets & WebRTC
Lets Encrypt!
Bastion Host : Amazon Web Services
Virtual Private Networks
Getting started on IoT with AWS and NodeMCU for less than 5€
GÉANT TURN pilot
FIWARE Tech Summit - Building Your Own IoT Agent
Building Open Source IoT Cloud
Introduction to SSL and How to Exploit & Secure
Upcoming Products, Services and Features - Workshop by Praveen Umanath
Ad

Similar to vpn router Mikrotik (20)

PDF
Shameful secrets of proprietary network protocols
PPTX
point to point tunneling protocol(PPTP).pptx
PPT
Chapter 8 overview
PPTX
Nginx-deploy on linux server with 80 and 442
PPTX
Fiware cloud developers week brussels
PDF
Cisco iso based CA (certificate authority)
PPTX
PPTX
CONFidence 2014: Jakub Kałużny: Shameful secrets of proprietary protocols
PPTX
Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014
PPT
Chapter 3 overview
PPTX
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 10
PPTX
Chapter 4--converted.pptx
PDF
Dell PowerEdge Zero Touch Provisioning
PPTX
Identity service keystone ppt
PPTX
6421 b Module-09
PDF
Ch8 - Implementing Virtual Private Networks
PPT
Ciscorouterasavpnserver 100218045815-phpapp01
PPTX
EMEA Airheads- Manage Devices at Branch Office (BOC)
PDF
PPTX
Introduction to Networking Commands & Software
Shameful secrets of proprietary network protocols
point to point tunneling protocol(PPTP).pptx
Chapter 8 overview
Nginx-deploy on linux server with 80 and 442
Fiware cloud developers week brussels
Cisco iso based CA (certificate authority)
CONFidence 2014: Jakub Kałużny: Shameful secrets of proprietary protocols
Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014
Chapter 3 overview
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 10
Chapter 4--converted.pptx
Dell PowerEdge Zero Touch Provisioning
Identity service keystone ppt
6421 b Module-09
Ch8 - Implementing Virtual Private Networks
Ciscorouterasavpnserver 100218045815-phpapp01
EMEA Airheads- Manage Devices at Branch Office (BOC)
Introduction to Networking Commands & Software
Ad

Recently uploaded (20)

PPT
FABRICATION OF MOS FET BJT DEVICES IN NANOMETER
PDF
Dynamic Checkweighers and Automatic Weighing Machine Solutions
PPTX
Wireless and Mobile Backhaul Market.pptx
PPTX
Presentation 1.pptxnshshdhhdhdhdhdhhdhdhdhd
PPTX
unit1d-communitypharmacy-240815170017-d032dce8.pptx
PPTX
A Clear View_ Interpreting Scope Numbers and Features
PDF
Tcl Scripting for EDA.pdf
PPTX
Prograce_Present.....ggation_Simple.pptx
PPTX
Presentacion compuuuuuuuuuuuuuuuuuuuuuuu
PDF
-DIGITAL-INDIA.pdf one of the most prominent
PPTX
Lecture-3-Computer-programming for BS InfoTech
PPTX
5. MEASURE OF INTERIOR AND EXTERIOR- MATATAG CURRICULUM.pptx
DOCX
fsdffdghjjgfxfdghjvhjvgfdfcbchghgghgcbjghf
PDF
ICT grade for 8. MATATAG curriculum .P2.pdf
PDF
Dozuki_Solution-hardware minimalization.
PPTX
PLC ANALOGUE DONE BY KISMEC KULIM TD 5 .0
PPTX
Embeded System for Artificial intelligence 2.pptx
PPTX
1.pptxsadafqefeqfeqfeffeqfqeqfeqefqfeqfqeffqe
PPTX
02fdgfhfhfhghghhhhhhhhhhhhhhhhhhhhh.pptx
PPTX
New professional education PROF-ED-7_103359.pptx
FABRICATION OF MOS FET BJT DEVICES IN NANOMETER
Dynamic Checkweighers and Automatic Weighing Machine Solutions
Wireless and Mobile Backhaul Market.pptx
Presentation 1.pptxnshshdhhdhdhdhdhhdhdhdhd
unit1d-communitypharmacy-240815170017-d032dce8.pptx
A Clear View_ Interpreting Scope Numbers and Features
Tcl Scripting for EDA.pdf
Prograce_Present.....ggation_Simple.pptx
Presentacion compuuuuuuuuuuuuuuuuuuuuuuu
-DIGITAL-INDIA.pdf one of the most prominent
Lecture-3-Computer-programming for BS InfoTech
5. MEASURE OF INTERIOR AND EXTERIOR- MATATAG CURRICULUM.pptx
fsdffdghjjgfxfdghjvhjvgfdfcbchghgghgcbjghf
ICT grade for 8. MATATAG curriculum .P2.pdf
Dozuki_Solution-hardware minimalization.
PLC ANALOGUE DONE BY KISMEC KULIM TD 5 .0
Embeded System for Artificial intelligence 2.pptx
1.pptxsadafqefeqfeqfeffeqfqeqfeqefqfeqfqeffqe
02fdgfhfhfhghghhhhhhhhhhhhhhhhhhhhh.pptx
New professional education PROF-ED-7_103359.pptx

vpn router Mikrotik

  • 3. Welcome to this Workshop! First, some basic concepts about encryption …..
  • 4. • As you know, to unlock or even lock anything like a door you need a key. • This applies to computer networks, too. • There are two encryption methods in computer networks.  Symmetric Encryption  Asymmetric Encryption
  • 5. One of the most common Asymmetric Encryption methods is using computer certificates. In this method, we need to provide a certificate from a well-known Certificate Authority (CA) and import it to our "Local Computer Personal Certificate Store”. After importing, we can use it to encrypt and sign our data. *Note: you should have your CA, public key certificate in your “Trusted Certificate Authority” list.
  • 6. How certificates work and help us to encrypt our data in “HTTPS-(SSL)” communications…
  • 8. Let`s go to implementing SSTP & OVPN on our MikroTik RouterBoard as a Server and Microsoft Windows as a Client ……
  • 9. Imagine that our Network Topology is:
  • 10. • First, basic configurations are set, including IP address, MikroTik identity (Name), admin password, …. • Then, as a first step of implementation, we should configure SNTP and MikroTik Clock, because validity time is very important in issuing and using a certificate. (See next slide)
  • 11. Configuring MikroTik Clock & SNTP Settings
  • 12. • Now as a second step, we need to create a CA Certificate and issue a certificate for our SSTP and OVPN Server and finally sign it with our CA Certificate. • After that we should export CA Public Key to import it to our client’s “Trusted Root Certification Authorities” List. (See next slides)
  • 13. Providing CA & Server Certificates
  • 16. Importing CA Public Key to Client Local Certificate Store (Trusted Root Certification Authorities List)
  • 17. • Now as a third step, we should create an IP Pool, a PPP Profile and PPP Secret which should be used with Server Certificate in Configurations after enabling SSTP and OVPN. • Finally, in Server Configurations, we should enable “ARP Proxy” on our MikroTik Router “Local Network” Interface. • It’s required to remotely access Local Network. (See next slides)
  • 18. Providing Same “IP Pool” for SSTP & OVPN Clients
  • 19. Creating “PPP Profile” for SSTP & OVPN Connections
  • 20. Creating “PPP Secret” for SSTP & OVPN Connections
  • 21. Enabling & Configuring SSTP Server
  • 22. Enabling & Configuring OVPN Server
  • 23. Enabling “ARP Proxy” on Local Interface
  • 24. • After all server configurations are completed, we should configure the client side. • To configure a Microsoft Windows operating system as a SSTP Client, a VPN connection should first be created and “VPN type” should be changed to “SSTP”. • To configure a Microsoft Windows operating system as an “OVPN Client”, some OVPN client applications such as “OPEN VPN GUI” should be installed and then provide a Config File that includes client configurations and finally use it to connect to your OVPN server. *Tip: (You can use Sample Configuration file that is located in "sample-config" folder and modify it according to your server configurations. (See next slides)
  • 25. Configuring SSTP Client on Microsoft Windows
  • 26. Connecting to the MikroTik SSTP Server
  • 27. Connecting to the MikroTik OVPN Server
  • 29. Thank You! Powered by: Pooria Taabbodi ptaabodi@hotmail.com