Mikrotik Tutorial no. 39 - Site to Site IPSec VPN Tunnel Configuration between Cisco and Mikrotik

Video Statistics and Information

Video
Captions Word Cloud
Reddit Comments
Captions
hello everyone welcome back to another tutorial from land mikrotik configurations risk to this topic is about side-to-side IPSec VPN between Cisco and micro D the last video I've shown side-to-side IPSec between between two micro decoders okay today I will show you how you can configure IPSec tape in between Cisco and micro D IPSec Internet Protocol security is a protocol suite defined by the IETF internet engineering task force to secure IP communication over unprotected IP networks such as internet or live line this suite is an open standard so it works on cross-platform security so you can have it connection from mikrotik to Cisco or juniper or other IPSec router or firewall that's why we are going to configure IPSec VPN between micro Nick and a different mentor like Cisco so we will configure in the Cisco part first then we will configure to them my credit card let me show you an illustration so you will get some idea here this is messy scrubber in head office and this is the branch office route on them this is the microgravity both are connected to internet and we will create a piece a tunnel between these two so we configure Cisco device first and then we will configure my cookie okay so in Cisco we go to the console so in Cisco IP SEC they have two steps we have to follow first we will configure isakmp phase one and then we will configure IPSec IC can be faced to a CL and crypto map I already configured the IP address here the IP addresses you can see from the illustration probably people sustained one six eight one six two to 182 and look like they're just 192 168 1 1/24 public I paid this on first attended 0 with the room private it's faster to lose the one good list all the time we'll configure phase one isakmp will type trip to a policy encryption alias hash authentication we share group two lifetimes page six just one day now we will create a be sick time will pass word anymore Crowder one at this okay now we will configure IPSec so in the face to will have to create extended I feel IPSec trust form crypto map and then I play keep the map to the public interface we start off with creating extended ACL standard Lane remote site clinic resist 172 one six now we will create IPC transform a keep to this response at a given name yes yes authentication now we'll create the kicked amount to keep any name Sapir Paris we will go to one address cluster we call the trust one set here goes from set name is extended ACL a map has been created we go to the interface and then like it to map to that particular interface so we know that our public interface is faster than 0 0 map name patience done in Cisco part so now we will go to the mikrotik router this router okay this is City and will configure the same parameters in microwave to establish a IPSec tunnel already configured the IP address here only the basic configuration check if I have the routes yeah if I can reach the other end of the router one increase I'm getting getting pain response from other end of the round for reigning VPN configuration first condition is to check the visibility from site a to site B in my public IP second and it looks different but the basic is same in all devices actually so we'll go to the IP and then I'd be sick micro you start off with creating phase one profile and then face to proposal so the profile tab double click on it create a new one if you want just keep the default you just change the parameters to match with the cisco devices encryption is a is to select is 128 group 2 which is end of 1 0 to 4 and lifetime I have select here this is for devices a6 4.0 which is one day okay Hatcher weather is chairman now we'll put the proposals don't click on it insta fall division algorithm shall one fiction of the Dom 128 ABS 128 cbc lifetime is one day okay this parameters must match between the sides of the list the connection will not establish so now we will go to the pier step let's find out yes we give a name and press is removed and one address which is 10.16 t82 whose final grip files/default keep any profile this is a the next is creating identities last time to act here is Paris with him - appreciate King I will give us word for IPSec town which we have given in our Cisco router dynamics the default plan okay must we create policy which controls traffic encryption all the things last source address is in an address which is 172 which we want to pretend quit just cannot resist and man this damn national son clip week we're sick bottle ESP we have slept tunnel s so solution as a destination address si is actually security Association this is basically one IP address of rapper that created IP addresses we've got a rubber monitors if you complete up to this part the tower must come up let me see you can see face to stay established if we go stomp that is you can see establish it as well so we have got we've got our tunnel now we'll test if we can ping across the tunnel from side to our site to face this [Laughter] yeah camping now from the back of his head of his you can see we can't be too and Leonard with there is a reason for them because all the traffic from land being needed from the rubber so we'll have to bypass the net so let's go back to the rubber with the IP in them Farrell you see we have already can't reenact we have to bypass and snapped last time chainsaw snap so surfaces 172 six ball and block and destination addresses can accept drag the road to the top by Dalton act up Jake again you can see we we can in to our random just now that's it we have completed side to side between configuration between Cisco and micro Rick now we can paint from the crunch of his lamp to you ahead of slam it no problem same to subscribe this channel for more videos on might be clever see in the next video thanks
Info
Channel: techie LAB
Views: 3,001
Rating: undefined out of 5
Keywords: mikrotik, ipsec, ipsec between cisco and mikrotik, ipsec vpn configuration, ipsec vpn explained, ipsec vpn tunnel, mikrotik ipsec site to site vpn configuration, mikrotik ipsec, mikrotik ipsec vpn, ipsec step by step process, vpn configuration, ipsec tunnel configuration mikrotik, ipsec tunnel configuration cisco router, ipsec tunnel configuration, tutorial, ipsec tutor, ipsec tutorial, ipsec tutorial for beginners, mikrotik bangla tutorial, mikrotik bangladesh
Id: ZqO34RDszCI
Channel Id: undefined
Length: 16min 1sec (961 seconds)
Published: Sat Dec 28 2019
Related Videos
Note
Please note that this website is currently a work in progress! Lots of interesting data and statistics to come.