技术文章 Network Ovpn Over Mikrotik Windows
Skip TOC

文章索引

  1. Ovpn Over Mikrotik Windows current position
  2. Certfacates and key generation from Linux
  3. Mikrotik OpenVPN Server Configuration:

Ovpn Over Mikrotik Windows

Introduction

In this post, I’ll describe the step by step procedure to setup Mikrotik RouterOS as OpenVPN server. I’ll use the Ubuntu Server in order to create CA, server and client(s) certificates. It inludes certificates generation, Mikrotik RouterOs setting up, Windows client setting up.

openvpn

Please remember a few things about Mikrotik OpenVPN server implementation:

  •  UDP mode is not supported, only supports TCP mode.
  • Username/password is must even though client certificates are being used for authentication.
  • Data compression is not supported.

Certfacates and key generation from Linux

 

Certfacates and key generation from Linux

Install the openvpn package on Ubuntu Server using the following command:

sudo apt-get install openvpn easy-rsa

Linux-1

Make an easy-rsa directory inside /etc/openvpn:

cd /etc/openvpn/ sudo mkdir easy-rsa

Linux-2

Use the following command to copy the default easy-rsa into /etc/openvpn/easy-rsa for setting up Certificate Authority (CA), certificates and keys generation for OpenVPN server and clients:

cp -r /usr/share/easy-rsa/* /etc/openvpn/easy-rsa/

Linux-3

Edit /etc/openvpn/easy-rsa/vars:

cd /etc/openvpn/easy-rsa/ vi vars

Linux-4

Edit these parameters according to your need:

export KEY_COUNTRY="US" export KEY_PROVINCE="NC" export KEY_CITY="Winston-Salem" export KEY_ORG="Example Company" export KEY_EMAIL="
 该E-mail地址已受到防止垃圾邮件机器人的保护,您必须启用浏览器的Java Script才能看到。
 "

Linux-5

Run the clean-all command:

source vars ./clean-all

Linux-6

Now, generate the CA certificate:

./build-ca

Linux-7

Next, generate a server certificate and private key:

./build-key-server mikrotik

Linux-8

Move to the keys directory (/etc/openvpn/easy-rsa/keys):

cd /etc/openvpn/easy-rsa/keys/

Linux-9

Copy the ca certificate, server certificate and key to the mikrotik router:

ncftpput -u admin 10.10.10.1 / ca.crt mikrotik.crt mikrotik.key

Linux-10

VPN client also need a certificate to authenticate itself to the server. Move to the /etc/openvpn/easy-rsa/directory and create the different certificate for each client:

cd /etc/openvpn/easy-rsa/ source vars ./build-key arbabpc

Linux-11

Mikrotik OpenVPN Server Configuration

 

Mikrotik OpenVPN Server Configuration: 

Import the ovpn root ca, server certificate and key.

  •  Connect to the Mikrotik using Winbox. Goto the Files,there you will find all the files, that you have copied from Linux server:

Server-1

 

  • Then goto the System —> Certificates:

Server-2

  • Click on Import Button, then select the ca certificate file (in my case, it is ca.crt) and press Import:

Server-3

Double click on the imported certificate and change its name (This step is optional):

Server-4

Once again,click on Import Button, then select the server certificate file (in my case, it is mikrotik.crt) and pressImport:

Server-5

Next, import the server key using the above step:

Server-6

Double click on the imported server certificate and change its name (This step is optional):

Server-7

Once you have imported the private key, the server certificate will get the “KR” written in-front of it:

K: Decrypted-Private-Key R: RSA

Server-8

Create the IP Pool for the openvpn client.

  •  Goto the IP—->Pool:

Server-9

 

  • Create each pool of /30 subnet:

(Reason to create the /30 subnet is that, I am getting the below mentioned error on Windows machine, and that trick work for me)

There is a problem in your selection of --ifconfig endpoints [local=172.25.10.2, remote=172.25.10.1]. The local and remote VPN endpoints must exist within the same 255.255.255.252 subnet. This is a limitation of --dev tun when used with the TAP-WIN32 driver. Try 'openvpn --show-valid-subnets' option for more info.

Server-10

Create as many pool as you have openvpn clients:

Server-11

Give in the name of the immediately next pool name in the “Next Pool” field:

Server-12

Create the profile for openvpn clients

  • Selecting “Profiles” tab and click on + button:

Server-13

Create user for openvpn client

  • Move over to the Secrets tab and click on the + button to create user for openvpn client:

Server-14

Enable OpenVpn service

  • Enable OpenVPN Service and Select Valid Certificate by moving to the Interface take and click on “OVPN Server“:

Server-15

Windows as OpenVPN Client installation & Configuration:

Download free OpenVPN client for windows from here, and install it. Once it’s installed, move to the openvpn directory(C:\Program Files\OpenVPN\config):

Windows-1

Download the sample configuration file from here. Modify it as per your requirement:

Windows-2

Create the auth.cfg file inside the C:\Program Files\OpenVPN\config folder, with the openvpn username and password that you have created on mikrotik server:

Windows-3

Run the OpenVPN client with Administrator privileges:

Windows-4

Right click on the openvpn icon at System Tray and click on “Connect“:

Windows-5

Once, it will be connected, will show you the similar detail:

Windows-6

Check the Routing Table:

route PTINT -4

Windows-7

Ping to the internal host:

Windows-8

Success :-)

Hope this will help you!

Please Remember me in your prayers!

 
scroll back to top
Top