Guest User

Untitled

a guest
Nov 16th, 2019
312
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.58 KB | None | 0 0
  1. /ip ipsec profile
  2. add dh-group=modp2048 dpd-interval=disable-dpd enc-algorithm=aes-256 hash-algorithm=sha256 name="Phase 1"
  3. /ip ipsec peer
  4. add address=yyy.yyy.yyy.yyy/32 local-address=xxx.xxx.xxx.xxx name="IPSec chr1 -> Main" profile="Phase 1"
  5. /ip ipsec proposal
  6. add auth-algorithms=sha256 enc-algorithms=aes-256-cbc lifetime=1h name="Phase 2" pfs-group=modp2048
  7. /ip ipsec identity
  8. add peer="IPSec chr1 -> Main" secret="psk"
  9. /ip ipsec policy
  10. add dst-address=192.168.0.0/24 level=unique peer="IPSec chr1 -> Main" proposal="Phase 2" sa-dst-address=yyy.yyy.yyy.yyy sa-src-address=xxx.xxx.xxx.xxx src-address=10.1.1.0/26 tunnel=yes
  11.  
  12. /ip firewall filter
  13. add action=accept chain=input comment="Accept Established/Related" connection-state=established,related log-prefix=accept
  14. add action=accept chain=forward comment="Accept Established/Related" connection-state=established,related
  15. add action=drop chain=input comment="Drop Invalid" connection-state=invalid
  16. add action=drop chain=forward comment="Drop Invalid" connection-state=invalid
  17. add action=accept chain=input comment="Accept IPSec" dst-port=500,4500 in-interface-list=WAN protocol=udp
  18. add action=accept chain=input comment="Accept IPSec" in-interface-list=WAN protocol=ipsec-esp
  19. add action=accept chain=input comment="Accept IPSec" in-interface-list=WAN protocol=ipsec-ah
  20. add action=drop chain=input comment="Drop all" in-interface-list=WAN log-prefix=drop_all
  21.  
  22. /ip firewall nat
  23. add action=accept chain=srcnat dst-address=192.168.0.0/24 src-address=10.1.1.0/26
  24. add action=accept chain=srcnat dst-address=10.1.1.0/26 src-address=192.168.0.0/24
Advertisement
Add Comment
Please, Sign In to add comment