<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>arp &#8211; Uroš Vovk</title>
	<atom:link href="https://www.urosvovk.com/tag/arp/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.urosvovk.com</link>
	<description>Uroš Vovk home page</description>
	<lastBuildDate>Mon, 23 Jun 2014 12:58:20 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>
	<item>
		<title>Step by Step: How to configure a PPTP VPN Server on Mikrotik RouterOS</title>
		<link>https://www.urosvovk.com/step-by-step-how-to-configure-a-pptp-vpn-server-on-mikrotik-routeros/</link>
					<comments>https://www.urosvovk.com/step-by-step-how-to-configure-a-pptp-vpn-server-on-mikrotik-routeros/#comments</comments>
		
		<dc:creator><![CDATA[Uroš]]></dc:creator>
		<pubDate>Sun, 22 Jun 2014 17:12:14 +0000</pubDate>
				<category><![CDATA[Network Stuff]]></category>
		<category><![CDATA[arp]]></category>
		<category><![CDATA[bridge]]></category>
		<category><![CDATA[configuration]]></category>
		<category><![CDATA[mikrotik]]></category>
		<category><![CDATA[network]]></category>
		<category><![CDATA[pool]]></category>
		<category><![CDATA[PPTP]]></category>
		<category><![CDATA[profile]]></category>
		<category><![CDATA[RouterOS]]></category>
		<category><![CDATA[secrets]]></category>
		<category><![CDATA[step by step]]></category>
		<category><![CDATA[tutorial]]></category>
		<category><![CDATA[VPN server]]></category>
		<guid isPermaLink="false">http://www.urosvovk.com/?p=681</guid>

					<description><![CDATA[Intro Before I started to wrote this post, I thought that would be nice to say some word about PPTP VPN and Mikrotik RouterOS, but then I realized that if you are reading this, there is no need to explain what is PPTP VPN server or Mikrotik RouterOS. Here is a simple step by step tutorial with images and &#8230; <a href="https://www.urosvovk.com/step-by-step-how-to-configure-a-pptp-vpn-server-on-mikrotik-routeros/" class="more-link">Continue reading <span class="screen-reader-text">Step by Step: How to configure a PPTP VPN Server on Mikrotik RouterOS</span></a>]]></description>
										<content:encoded><![CDATA[<h3>Intro</h3>
<p>Before I started to wrote this post, I thought that would be nice to say some word about PPTP VPN and Mikrotik RouterOS, but then I realized that if you are reading this, there is no need to explain what is PPTP VPN server or Mikrotik RouterOS.</p>
<p>Here is a simple step by step tutorial with images and all information that you need to get a fully working PPTP VPN server&#8230;<span id="more-681"></span></p>
<h3>Step 1: create VPN pool</h3>
<p>IP pools are used to define range of IP addresses that will be used for your PPTP VPN server</p>
<pre>[admin@MikroTik] &gt; /ip pool print
 NAME      RANGES
 VPN-pool  192.168.1.101-192.168.1.110</pre>
<p><a href="http://www.urosvovk.com/wp-content/uploads/2014/06/VPN-pool.png"><img fetchpriority="high" decoding="async" class="aligncenter size-full wp-image-685" src="http://www.urosvovk.com/wp-content/uploads/2014/06/VPN-pool.png" alt="VPN pool" width="909" height="531" srcset="https://www.urosvovk.com/wp-content/uploads/2014/06/VPN-pool.png 909w, https://www.urosvovk.com/wp-content/uploads/2014/06/VPN-pool-300x175.png 300w" sizes="(max-width: 909px) 100vw, 909px" /></a></p>
<h3>Step 2: create a VPN user</h3>
<p>In this step you will create a user that can connect to your VPN Server. In this example only one user is created, but you can add as many user as you need&#8230;</p>
<pre>[admin@MikroTik] &gt; /ppp secret print
 # NAME SERVICE CALLER-ID PASSWORD PROFILE     REMOTE-ADDRESS
 0 ppp1 pptp    ppp1      ****     VPN-profile</pre>
<p><a href="http://www.urosvovk.com/wp-content/uploads/2014/06/VPN-secrets.png"><img decoding="async" class="aligncenter size-full wp-image-687" src="http://www.urosvovk.com/wp-content/uploads/2014/06/VPN-secrets.png" alt="VPN secrets" width="506" height="513" srcset="https://www.urosvovk.com/wp-content/uploads/2014/06/VPN-secrets.png 506w, https://www.urosvovk.com/wp-content/uploads/2014/06/VPN-secrets-295x300.png 295w, https://www.urosvovk.com/wp-content/uploads/2014/06/VPN-secrets-60x60.png 60w" sizes="(max-width: 506px) 100vw, 506px" /></a></p>
<h3>Step 3: create a VPN profile</h3>
<p>From <a title="PPP" href="http://wiki.mikrotik.com/wiki/Manual:PPP_AAA#User_Profiles" target="_blank">wiki.mikrotik.com</a></p>
<blockquote><p>PPP profiles are used to define default values for user access records stored under /ppp secret submenu. Settings in /ppp secret User Database override corresponding /ppp profile settings except that single IP addresses always take precedence over IP pools when specified as local-address or remote-address parameters.</p></blockquote>
<pre>[admin@MikroTik] &gt; /ppp profile print
 1    name="VPN-profile" local-address=192.168.1.1 remote-address=VPN-pool bridge=br1 use-mpls=default
      use-compression=default use-vj-compression=default use-encryption=yes only-one=default
      change-tcp-mss=yes address-list="" dns-server=8.8.8.8,8.8.4.4</pre>
<p><a href="http://www.urosvovk.com/wp-content/uploads/2014/06/VPN-Profile.png"><img decoding="async" class="aligncenter size-full wp-image-686" src="http://www.urosvovk.com/wp-content/uploads/2014/06/VPN-Profile.png" alt="VPN Profile" width="674" height="617" srcset="https://www.urosvovk.com/wp-content/uploads/2014/06/VPN-Profile.png 674w, https://www.urosvovk.com/wp-content/uploads/2014/06/VPN-Profile-300x274.png 300w" sizes="(max-width: 674px) 100vw, 674px" /></a></p>
<h3>Step 4: Create PPTP Server Binding (Optional)</h3>
<p>This step is optional, because your VPN server will work even if you skip this.</p>
<p>In this step you bind user <strong>ppp1</strong> to interface <strong>pptp-in1</strong>. This is very useful if you need to create firewall rules for a specific user.</p>
<p><a href="http://www.urosvovk.com/wp-content/uploads/2014/06/VPN-interface.png"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-684" src="http://www.urosvovk.com/wp-content/uploads/2014/06/VPN-interface.png" alt="VPN interface" width="942" height="891" srcset="https://www.urosvovk.com/wp-content/uploads/2014/06/VPN-interface.png 942w, https://www.urosvovk.com/wp-content/uploads/2014/06/VPN-interface-300x283.png 300w" sizes="auto, (max-width: 942px) 100vw, 942px" /></a></p>
<h3>Step 5: Enable VPN Server</h3>
<p>In this step we just need to enable our PPTP server and set default profile&#8230;</p>
<pre>[admin@MikroTik] &gt; /interface pptp-server server print
           enabled: yes
           max-mtu: 1450
           max-mru: 1450
              mrru: 1600
    authentication: mschap1,mschap2
 keepalive-timeout: 30
   default-profile: VPN-profile</pre>
<p><a href="http://www.urosvovk.com/wp-content/uploads/2014/06/VPN-enable-PPTP1.png"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-688" src="http://www.urosvovk.com/wp-content/uploads/2014/06/VPN-enable-PPTP1.png" alt="VPN enable PPTP" width="929" height="409" srcset="https://www.urosvovk.com/wp-content/uploads/2014/06/VPN-enable-PPTP1.png 929w, https://www.urosvovk.com/wp-content/uploads/2014/06/VPN-enable-PPTP1-300x132.png 300w" sizes="auto, (max-width: 929px) 100vw, 929px" /></a></p>
<h3>Step 6: Configure bridge (Optional)</h3>
<p>Like step 4, even this step is optional. This step is the main reason that I&#8217;m writing this tutorial, so it deserves a few word :)</p>
<p>If you skip this step, you will be able to connect to your VPN server, you will have the same public IP as your VPN server, but you will not see any other devices connected on this subnet. If this is OK for you, you don&#8217;t need to do anything else.</p>
<p>If you want to see other devices in your subnet, you must change ARP mode for your Bridge. For more details about ARP modes go to <a title="mikrotik documentation" href="https://www.mikrotik.com/documentation/manual_2.5/IP/Address.html#ip_address_proxy-arp" target="_blank">mikrotik documentation</a></p>
<p>&nbsp;</p>
<pre>[admin@MikroTik] &gt; /interface bridge print
Flags: X - disabled, R - running
  0    R name="br1" mtu=1500 l2mtu=1598 arp=proxy-arp mac-address=4C:5E:0C:21:A4:85 protocol-mode=rstp
         priority=0x8000 auto-mac=no admin-mac=4C:5E:0C:21:A4:85 max-message-age=20s forward-delay=15s
         transmit-hold-count=6 ageing-time=5m</pre>
<p><a href="http://www.urosvovk.com/wp-content/uploads/2014/06/VPN-bridge-configuration.png"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-682" src="http://www.urosvovk.com/wp-content/uploads/2014/06/VPN-bridge-configuration.png" alt="VPN bridge configuration" width="812" height="651" srcset="https://www.urosvovk.com/wp-content/uploads/2014/06/VPN-bridge-configuration.png 812w, https://www.urosvovk.com/wp-content/uploads/2014/06/VPN-bridge-configuration-300x240.png 300w" sizes="auto, (max-width: 812px) 100vw, 812px" /></a></p>
<h3>Step 7: Finish</h3>
<p>If you did all right, you now have a working PPTP VPN server.</p>
<p><strong>Important</strong>: Don&#8217;t forget to open port 1723 (tcp) in your firewall settings:</p>
<pre>/ip firewall filter add chain=input comment="PPTP VPN" dst-port=1723 protocol=tcp</pre>
<p>If you need any help or I did something wrong, leave a comment and I will try to do my best to help you.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.urosvovk.com/step-by-step-how-to-configure-a-pptp-vpn-server-on-mikrotik-routeros/feed/</wfw:commentRss>
			<slash:comments>31</slash:comments>
		
		
			</item>
	</channel>
</rss>
