Skip to content Skip to sidebar Skip to footer

Step-by-Step Guide Configuring Site-to-Site VPN On MikroTik Routers

Are you looking to create a secure connection between your on-premise Mikrotik router and a cloud-hosted Mikrotik router on AWS? Look no further, as we have a step-by-step guide to help you achieve just that.

Mikrotik Routers

Before we begin, let's first understand what a Site-to-Site VPN connection means. It's a secure connection established between two networks over the internet, allowing the two networks to communicate with each other as though they were in the same location.

Now let's get started with the steps:

Step 1: Create an Amazon Web Services Account

The first step is to create an AWS account if you don't already have one. Head over to the official AWS website to get started. Once you are signed in, click on the EC2 service.

Step 2: Launch an Instance for the Mikrotik Router

Under the EC2 Dashboard, click on the "Launch Instance" button and choose the Mikrotik Cloud Hosted Router image from the AWS Marketplace. Configure the instance, select your preferred instance type, and give your instance a name.

Once done, you can launch the instance and wait for it to be ready.

Step 3: Configure Your On-Premise Mikrotik Router

Log in to your on-premise Mikrotik router and configure the Tunnel Settings under the IPSec menu. Fill in the required details according to the information from your AWS instance configuration. This includes, but is not limited to, the remote peer address and the pre-shared key.

It's important to note that the configuration should be identical on both the cloud-hosted and on-premise routers.

Step 4: Create a Security Group

Go back to your AWS Dashboard and create a new security group for the instance. Allow inbound traffic on port 1723 (PPTP) and 1701 (L2TP) in the security group settings.

Step 5: Configure Your Cloud-Hosted Mikrotik Router

Once you have configured your on-premise Mikrotik router, head over to your AWS Dashboard and locate your newly-launched instance. Connect to it via SSH and configure the necessary settings to connect to your on-premise router, following the steps exactly as you did for the on-premise router configuration.

Step 6: Establish the VPN Connection

Once both your on-premise and cloud-hosted Mikrotik routers have been properly configured according to the steps above, you may proceed to establish the Site-to-Site VPN connection.

From the on-premise router, you can test the connection by pinging an IP address from the AWS instance. If all goes well, you should receive a response from the ping.

In conclusion, creating a Site-to-Site VPN connection between a on-premise Mikrotik router and a cloud-hosted Mikrotik router on AWS is a relatively simple process that can be achieved in just a few steps. By following the steps outlined above, you'll be able to establish a secure connection between the two routers in no time!

Happy VPN connecting!

MikroTik Site to Site EoIP Tunnel with IPsec - System Zone
ipsec openvpn mikrotik vpn eoip ipip routeros gre routers ikev2 configure client nordvpn howto konfiguracja navigazione anonima systemzone elektroda blogamico


Fig: MikrotikRouter Site-to-site IPSec VPN Tunnel Configuration has One
vpn ipsec mikrotik router site tunnel dhcp address configuration side ip fig gif


MIKROTIK : SITE-TO-SITE PPTP | Catatan IBe'
pptp l2tp site vpn mikrotik connect wiki interface example manual ip tunneling protocol over internet setup tunnel two point office


How To Create A Site To Site VPN Connection Between A On-Premise
mikrotik connection router aws chr premise vpn



Post a Comment for "Step-by-Step Guide Configuring Site-to-Site VPN On MikroTik Routers"