Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    L2TP Site to Site between PFsense and Mikrotik

    Scheduled Pinned Locked Moved General pfSense Questions
    13 Posts 2 Posters 2.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • F
      felipefonsecabh
      last edited by

      Hi!
      I'm trying to setup a site to site VPN using L2TP between PFSense and Mikrotik. My network topology is:

      2021-11-22_13-20-39.png

      I'm trying with L2TP because i because I couldn't set up an ipsec tunnel. So i'm trying use l2tp without IPSec.

      I configured a L2TP server in PFSense, a L2TP user and created firewall rules to release traffic and 1701 port.

      In mikrotik i created the l2tp Dial UP, but not works. I checked on the pfsense firewall there are packets between the points:

      2021-11-22_13-25-54.png

      Bellow my both sides configuration:
      PFSense:
      2021-11-22_13-36-29.png

      Mikrotik:
      2021-11-22_13-36-38.png

      Any ideas? Thanks a lot!

      1 Reply Last reply Reply Quote 0
      • stephenw10S
        stephenw10 Netgate Administrator
        last edited by stephenw10

        Use IPSec. L2TP without it is unencrypted you realise?

        But, really, forget just solve the issues with IPSec. How was that failing?

        Steve

        F 1 Reply Last reply Reply Quote 0
        • F
          felipefonsecabh @stephenw10
          last edited by

          @stephenw10 well, when i tried to use IPSec, in mikrotik side appears the error:
          "error got critical error: AUTHENTICATION_FAILED".

          The ISP has already created the rules for redirecting ports 500 and 4500 to my IP, but the above error keeps happening.

          1 Reply Last reply Reply Quote 0
          • stephenw10S
            stephenw10 Netgate Administrator
            last edited by

            No errors on the pfSense side? Does it try to establish both ways?

            That error looks like a pretty basic mismatch though. Can you show us the setting used at each end that generated it?

            Steve

            F 1 Reply Last reply Reply Quote 0
            • F
              felipefonsecabh @stephenw10
              last edited by

              @stephenw10
              PFsense Config:
              2021-11-22_15-10-56.png

              Mikrotik config:
              2021-11-22_15-10-39.png

              Pfsense log:
              2021-11-22_15-07-44.png

              Mikrotik log:
              2021-11-22_15-11-44.png

              The autentication method is Mutual PSK and I've already checked all the settings and apparently everything is correct.

              stephenw10S 1 Reply Last reply Reply Quote 0
              • stephenw10S
                stephenw10 Netgate Administrator @felipefonsecabh
                last edited by

                Ok, the pSense log shows the Mikrotik is using the wrong hash value at P1 when it's initiating for some reason. The settings look correct on it though so maybe something is not applied?

                You can see it's proposing SHA1. pfSense rejects it because it's set to SHA256.

                The other thing that could be an issue is the identifier. You said you had the ISP forward ports to you? Does that mean you are behind NAT? If the identifier in pfSense would have to be set to match the external IP. We can't see that in the above screenshot.

                Steve

                F 1 Reply Last reply Reply Quote 0
                • F
                  felipefonsecabh @stephenw10
                  last edited by

                  @stephenw10 yes the mikrotik is behind nat (in the first post there is an image with the network topology rsrs).

                  Basically this is the origin of everything (the existence of NAT). I need to be able to implement this VPN with this NAT enabled, the provider cannot give me a fixed IP

                  F 1 Reply Last reply Reply Quote 0
                  • F
                    felipefonsecabh @felipefonsecabh
                    last edited by

                    @felipefonsecabh i try to change the encryption and hash algorithms in pfsense to sha1 and 3des (to test the functioning), and the error changes:

                    2021-11-22_22-08-16.png

                    1 Reply Last reply Reply Quote 0
                    • stephenw10S
                      stephenw10 Netgate Administrator
                      last edited by

                      Aha, OK now the proposal matches but the identifier is mismatched. The Mikcrotik is sending it's internal private IP as the identifier [192.168.188.10] and pfSense is expecting the external public IP.
                      You can change that so it matches at either end but I've no idea how to do it in RouterOS. So edit the Phase 1 config in pfSense and change the 'Peer Identifier' from 'Peer IP Address' to 'IP Address' then set it to 192.168.188.10.

                      It will then match when the Mikrotik tries to establish. There may be other errors after that 😉

                      Steve

                      F 1 Reply Last reply Reply Quote 1
                      • F
                        felipefonsecabh @stephenw10
                        last edited by

                        @stephenw10 after change "Peer Identifier" as you suggested, works!
                        In mikrotik, i have to disable passive:

                        2021-11-23_09-11-23.png

                        The strange thing is that the mikrotik does not send the proposal as configured, but works! Thanks a lot!

                        F 1 Reply Last reply Reply Quote 1
                        • F
                          felipefonsecabh @felipefonsecabh
                          last edited by

                          @felipefonsecabh the connection was estabilished but devices between sites doesn't ping. I created all firewall rules necessary.

                          F 1 Reply Last reply Reply Quote 0
                          • F
                            felipefonsecabh @felipefonsecabh
                            last edited by

                            @felipefonsecabh I restared my pfsense and all works. Thanks a lot!

                            1 Reply Last reply Reply Quote 0
                            • stephenw10S
                              stephenw10 Netgate Administrator
                              last edited by

                              Nice! Good result. Pure IPSec is waay better than trying to use L2TP over it.

                              Steve

                              1 Reply Last reply Reply Quote 0
                              • First post
                                Last post
                              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.