{"id":5095,"date":"2021-04-27T19:01:06","date_gmt":"2021-04-27T22:01:06","guid":{"rendered":"https:\/\/blog.clusterweb.com.br\/?p=5095"},"modified":"2021-04-27T19:01:07","modified_gmt":"2021-04-27T22:01:07","slug":"como-estabelecer-vpn-site-a-site-com-roteadores-mikrotik","status":"publish","type":"post","link":"https:\/\/blog.clusterweb.com.br\/?p=5095","title":{"rendered":"Como estabelecer VPN site a site com roteadores Mikrotik"},"content":{"rendered":"<p><span>Aqui est\u00e1 um r\u00e1pido tutorial sobre como criar t\u00fanel VPN IPSec Site To Site com Mikrotik RB RouterOS 6.46.1 em ambos os lados.<\/span><\/p>\n<p><span>Antes de come\u00e7armos, aqui est\u00e3o algumas coisas que voc\u00ea deve ter em mente:<\/span><\/p>\n<p><span>Esta \u00e9 a configura\u00e7\u00e3o que estou usando apenas em ambientes de teste, n\u00e3o em produ\u00e7\u00e3o.\u00a0Eu recomendaria criar t\u00faneis IPSec baseados em certificado para produ\u00e7\u00e3o, n\u00e3o aqueles com chave pr\u00e9-compartilhada (este tutorial \u00e9 com chave pr\u00e9-compartilhada).\u00a0<\/span><\/p>\n<p><span>Certifique-se de ter roteamento funcional e redes configuradas antes de tentar isso.\u00a0Voc\u00ea precisa ser capaz de se comunicar normalmente (ping se habilitado no firewall) todos os pontos p\u00fablicos no futuro t\u00fanel IPSec.\u00a0<\/span><\/p>\n<p><span>Esta configura\u00e7\u00e3o \u00e9 uma configura\u00e7\u00e3o limpa, n\u00e3o h\u00e1 configura\u00e7\u00e3o Mikrotik padr\u00e3o pr\u00e9-carregada nos roteadores em que estou fazendo isso.<\/span><\/p>\n<p><span>Portanto, n\u00e3o tenho pontes ou firewalls pr\u00e9-carregados e apenas tenho rotas predefinidas criadas.\u00a0Certifique-se de configurar seu roteador seguro e protegido para ambiente de produ\u00e7\u00e3o, esta configura\u00e7\u00e3o \u00e9 apenas para mostrar em que estado o IPSec Site a Site pode funcionar.<\/span><\/p>\n<p><!--more--><\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-5480\" src=\"https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite.png\" sizes=\"auto, (max-width: 747px) 100vw, 747px\" srcset=\"https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite.png 747w, https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite-300x161.png 300w\" alt=\"\" width=\"747\" height=\"400\" \/><\/figure>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-5481\" src=\"https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite1.png\" sizes=\"auto, (max-width: 366px) 100vw, 366px\" srcset=\"https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite1.png 366w, https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite1-300x217.png 300w\" alt=\"\" width=\"366\" height=\"265\" \/><\/figure>\n<p><span>Existe apenas uma regra criada em Firewall |\u00a0NAT &#8211; na cadeia srcnat com a\u00e7\u00e3o mascarada.<\/span><\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-5482\" src=\"https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite2.png\" sizes=\"auto, (max-width: 620px) 100vw, 620px\" srcset=\"https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite2.png 620w, https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite2-300x132.png 300w\" alt=\"\" width=\"620\" height=\"272\" \/><\/figure>\n<p><span>Configura\u00e7\u00e3o para este LAB.<\/span><\/p>\n<p><span>Escrit\u00f3rio 1:<\/span><\/p>\n<p><span>Roteador 1:<\/span><\/p>\n<p><span>IP WAN: 192.168.155.131\/24<\/span><\/p>\n<p><span>Gateway padr\u00e3o: 192.168.155.2\/24<\/span><\/p>\n<p><span>Rede local: 10.50.50.0\/24<\/span><\/p>\n<p><span>PC1: 10.50.50.2\/24<\/span><\/p>\n<p><span>Escrit\u00f3rio 2:<\/span><\/p>\n<p><span>Roteador 25:<\/span><\/p>\n<p><span>IP WAN: 192.168.155.130\/24<\/span><\/p>\n<p><span>Gateway padr\u00e3o: 192.168.155.2\/24<\/span><\/p>\n<p><span>Rede local: 192.168.11.0\/24<\/span><\/p>\n<p><span>PC2: 192.168.11.2\/24<\/span><\/p>\n<p><span>Portanto, tentarei conectar sub-redes locais do Office 1 (192.168.11.0\/24) com a sub-rede local do Office 2 (10.50.50.0\/24) por meio do t\u00fanel IPSec Site to Site.<\/span><\/p>\n<p><span>Vou mostrar a configura\u00e7\u00e3o do Office 1 e voc\u00ea deve repetir essas etapas em ambos os lados.\u00a0Tamb\u00e9m mencionarei como devem ser as configura\u00e7\u00f5es do Office 2 para cada etapa realizada durante o tutorial.<\/span><\/p>\n<p><span>Vou mostrar como configurar o roteador Office 1, as mesmas etapas devem ser executadas no roteador Office 2.<\/span><\/p>\n<p><span>Escrit\u00f3rio 1:<\/span><\/p>\n<p><span>Roteador 1:<\/span><\/p>\n<p><span>IP WAN: 192.168.155.131\/24<\/span><\/p>\n<p><span>Gateway padr\u00e3o: 192.168.155.2\/24<\/span><\/p>\n<p><span>Rede local: 10.50.50.0\/24<\/span><\/p>\n<p><span>PC1: 10.50.50.2\/24<\/span><\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-5483\" src=\"https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite3.png\" sizes=\"auto, (max-width: 607px) 100vw, 607px\" srcset=\"https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite3.png 607w, https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite3-222x300.png 222w\" alt=\"\" width=\"607\" height=\"821\" \/><\/figure>\n<p><span>PARES<\/span><\/p>\n<p><span>Primeiro, definiremos nosso Par.\u00a0O par ser\u00e1 o roteador do Office 2 e seu endere\u00e7o IP p\u00fablico (192.168.155.130).<\/span><\/p>\n<p><span>IP |\u00a0IPSec |\u00a0guia Peers |\u00a0clique no sinal de mais (+)<\/span><\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-5484\" src=\"https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite4.png\" sizes=\"auto, (max-width: 592px) 100vw, 592px\" srcset=\"https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite4.png 592w, https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite4-300x102.png 300w\" alt=\"\" width=\"592\" height=\"202\" \/><\/figure>\n<p><span>Para um nome, irei inserir o Roteador 2 (voc\u00ea deve inserir o que melhor descreve sua situa\u00e7\u00e3o) e no campo Endere\u00e7o irei inserir o endere\u00e7o IP WAN de um Roteador 2 no Escrit\u00f3rio 2 (192.168.155.130).\u00a0Tamb\u00e9m alterarei o Modo de troca: para IKE2.<\/span><\/p>\n<p><span>O resto ficar\u00e1 como est\u00e1.\u00a0Aplicar OK.<\/span><\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-5485\" src=\"https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite5.png\" sizes=\"auto, (max-width: 384px) 100vw, 384px\" srcset=\"https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite5.png 384w, https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite5-300x193.png 300w\" alt=\"\" width=\"384\" height=\"247\" \/><\/figure>\n<p><span>(Office2 &#8211; para Office2 esta configura\u00e7\u00e3o ser\u00e1 &#8211; Router1, 192.168.155.131, IKE2)<\/span><\/p>\n<p><span>IDENTIDADES<\/span><\/p>\n<p><span>A pr\u00f3xima parada \u00e9 a guia Identidades\u00a0<\/span><\/p>\n<p><span>IP |\u00a0IPSec |\u00a0guia Identidades |\u00a0clique no sinal de mais (+)<\/span><\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-5486\" src=\"https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite6.png\" sizes=\"auto, (max-width: 723px) 100vw, 723px\" srcset=\"https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite6.png 723w, https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite6-300x141.png 300w\" alt=\"\" width=\"723\" height=\"339\" \/><\/figure>\n<p><span>O par ser\u00e1 o Roteador 2, M\u00e9todo de autentica\u00e7\u00e3o &#8211; chave pr\u00e9-compartilhada e no campo Segredo voc\u00ea digitar\u00e1 a senha.\u00a0Lembre-se dessa senha, pois ela \u00e9 necess\u00e1ria em ambos os lados do t\u00fanel.\u00a0<\/span><\/p>\n<p><span>Al\u00e9m disso, se voc\u00ea estiver usando uma chave pr\u00e9-compartilhada em seu ambiente de produ\u00e7\u00e3o IPSec, certifique-se de que ela tenha mais de 20 sinais (letras, n\u00fameros, caracteres especiais).<\/span><\/p>\n<p><span>Deixe o resto como padr\u00e3o.<\/span><\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-5487\" src=\"https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite7.png\" sizes=\"auto, (max-width: 349px) 100vw, 349px\" srcset=\"https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite7.png 349w, https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite7-211x300.png 211w\" alt=\"\" width=\"349\" height=\"497\" \/><\/figure>\n<p><span>(Escrit\u00f3rio2 &#8211; para Escrit\u00f3rio2 esta configura\u00e7\u00e3o ser\u00e1 &#8211; Roteador1, mesmo segredo inserido no Escrit\u00f3rio 1 no Roteador 1)<\/span><\/p>\n<p><span>Propostas<\/span><\/p>\n<p><span>Agora vou configurar as propostas.<\/span><\/p>\n<p><span>IP |\u00a0IPSec |\u00a0guia Propostas |\u00a0clique em * configura\u00e7\u00e3o padr\u00e3o para edit\u00e1-la<\/span><\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-5488\" src=\"https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite8.png\" sizes=\"auto, (max-width: 852px) 100vw, 852px\" srcset=\"https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite8.png 852w, https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite8-300x152.png 300w, https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite8-768x389.png 768w\" alt=\"\" width=\"852\" height=\"432\" \/><\/figure>\n<p><span>Vou apenas modificar a regra padr\u00e3o para este tutorial.\u00a0Esta guia \u00e9 totalmente sua, sobre como voc\u00ea deseja configur\u00e1-la.\u00a0Como Auth.\u00a0Algoritmos Selecionarei sha256, para Encr.Alghorithms aes-256 cbc, a vida \u00fatil ser\u00e1 de 30 minutos e o grupo PFS modp2048.<\/span><\/p>\n<p><span>Geralmente, quanto mais seguros os alghoritms, melhor.\u00a0Eu n\u00e3o recomendaria mais o md5 ou o sha1, mas terei que decidir por si mesmo.\u00a0A seguran\u00e7a deve ser prioridade na comunica\u00e7\u00e3o de rede nos dias de hoje.<\/span><\/p>\n<p><span>Certifique-se de ter a mesma configura\u00e7\u00e3o de proposta em ambos os lados.<\/span><\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-5490\" src=\"https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite9.png\" sizes=\"auto, (max-width: 347px) 100vw, 347px\" srcset=\"https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite9.png 347w, https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite9-300x295.png 300w\" alt=\"\" width=\"347\" height=\"341\" \/><\/figure>\n<p><span>\u00a0(Office2 &#8211; para Office2 esta configura\u00e7\u00e3o deve ser igual \u00e0 do Office 1 no Roteador 1)<\/span><\/p>\n<p><span>Perfis<\/span><\/p>\n<p><span>Novamente, para este tutorial, irei apenas editar o Perfil padr\u00e3o criado.<\/span><\/p>\n<p><span>IP |\u00a0IPSec |\u00a0guia Perfis |\u00a0clique em * configura\u00e7\u00e3o padr\u00e3o para edit\u00e1-la<\/span><\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-5491\" src=\"https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite10.png\" sizes=\"auto, (max-width: 849px) 100vw, 849px\" srcset=\"https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite10.png 849w, https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite10-300x155.png 300w, https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite10-768x398.png 768w\" alt=\"\" width=\"849\" height=\"440\" \/><\/figure>\n<p><span>Novamente, a mesma regra da guia Prioridades.\u00a0Selecione o que achar mais adequado, evite algoritmos fracos.\u00a0<\/span><\/p>\n<p><span>Algoritmos de hash: sha256, Algoritmo de criptografia: aes-256, Grupo DH: modp2048, Verifica\u00e7\u00e3o de proposta: obedecer, dura\u00e7\u00e3o &#8211; 1 dia, NAT Traversal &#8211; verificado, Falha m\u00e1xima DPD 5. Aplicar &#8211; OK.<\/span><\/p>\n<p><span>Certifique-se de ter as mesmas configura\u00e7\u00f5es em ambos os lados.<\/span><\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-5494\" src=\"https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite12.png\" sizes=\"auto, (max-width: 374px) 100vw, 374px\" srcset=\"https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite12.png 374w, https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite12-235x300.png 235w\" alt=\"\" width=\"374\" height=\"478\" \/><\/figure>\n<p><span>(Office2 &#8211; para Office2 esta configura\u00e7\u00e3o deve ser igual \u00e0 do Office 1 no Roteador 1)<\/span><\/p>\n<p><span>Pol\u00edticas<\/span><\/p>\n<p><span>IP |\u00a0IPSec |\u00a0guia Pol\u00edticas |\u00a0clique no sinal de mais (+)<\/span><\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-5496\" src=\"https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite13.png\" sizes=\"auto, (max-width: 742px) 100vw, 742px\" srcset=\"https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite13.png 742w, https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite13-300x113.png 300w\" alt=\"\" width=\"742\" height=\"280\" \/><\/figure>\n<p><span>Na Aba Geral da Nova Pol\u00edtica IPSec, em Peer I selecionarei o Peer &#8211; Router2 criado.\u00a0Tamb\u00e9m verificarei o T\u00fanel, em Src.Address entrarei na sub-rede LAN do Office1 local &#8211; 10.50.50.0\/24.\u00a0Em Dst.Address, entrarei na sub-rede LAN remota do Office2 remoto &#8211; 192.168.11.0\/24 e deixarei todo o resto como padr\u00e3o.<\/span><\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-5498\" src=\"https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite14.png\" sizes=\"auto, (max-width: 352px) 100vw, 352px\" srcset=\"https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite14.png 352w, https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite14-300x264.png 300w\" alt=\"\" width=\"352\" height=\"310\" \/><\/figure>\n<p><span>(Office2 &#8211; para Office2 esta configura\u00e7\u00e3o com endere\u00e7os em ordem diferente &#8211; Roteador1, T\u00fanel verificado, Endere\u00e7o Src: 192.168.11.0\/24, Endere\u00e7o Dst 10.50.50.0\/24)<\/span><\/p>\n<p><span>Em seguida, na guia A\u00e7\u00e3o, deixarei tudo padr\u00e3o.<\/span><\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-5499\" src=\"https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite15.png\" sizes=\"auto, (max-width: 352px) 100vw, 352px\" srcset=\"https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite15.png 352w, https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite15-300x263.png 300w\" alt=\"\" width=\"352\" height=\"309\" \/><\/figure>\n<p><span>(Office2 &#8211; para Office2 esta configura\u00e7\u00e3o \u00e9 a mesma)<\/span><\/p>\n<p><span>Aba Status &#8211; n\u00e3o h\u00e1 nada a mudar, \u00e9 apenas o status da conex\u00e3o com IPs p\u00fablicos do Peer.<\/span><\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-5501\" src=\"https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite16.png\" sizes=\"auto, (max-width: 352px) 100vw, 352px\" srcset=\"https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite16.png 352w, https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite16-300x261.png 300w\" alt=\"\" width=\"352\" height=\"306\" \/><\/figure>\n<p><span>(Office2 &#8211; para Office2 esta configura\u00e7\u00e3o \u00e9 a mesma)<\/span><\/p>\n<p><span>Agora, quando voc\u00ea terminar esta mesma configura\u00e7\u00e3o no Office2 (\u00e9 claro com diferen\u00e7as nas configura\u00e7\u00f5es de IP, conforme mencionado durante o tutorial), quando voc\u00ea terminar de criar a pol\u00edtica, dever\u00e1 ver isso na tela Pol\u00edtica.<\/span><\/p>\n<p><span>Sob o estado PH2, deve haver um estado estabelecido.<\/span><\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-5502\" src=\"https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite17.png\" sizes=\"auto, (max-width: 767px) 100vw, 767px\" srcset=\"https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite17.png 767w, https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite17-300x71.png 300w\" alt=\"\" width=\"767\" height=\"182\" \/><\/figure>\n<p><span>Sob os pares ativos, a situa\u00e7\u00e3o deve ser semelhante a esta<\/span><\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-5504\" src=\"https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite18.png\" sizes=\"auto, (max-width: 1023px) 100vw, 1023px\" srcset=\"https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite18.png 1023w, https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite18-300x60.png 300w, https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite18-768x154.png 768w, https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite18-920x184.png 920w\" alt=\"\" width=\"1023\" height=\"205\" \/><\/figure>\n<p><span>E SAs instalados tamb\u00e9m devem ser criados.<\/span><\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-5505\" src=\"https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite19.png\" sizes=\"auto, (max-width: 603px) 100vw, 603px\" srcset=\"https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite19.png 603w, https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite19-300x96.png 300w\" alt=\"\" width=\"603\" height=\"193\" \/><\/figure>\n<p><span>\u00c9 assim que se parece o canal estabelecido.<\/span><\/p>\n<p><span>Agora, se voc\u00ea n\u00e3o conseguir estabelecer o t\u00fanel IPSec, h\u00e1 uma s\u00e9rie de problemas que podem ser a raz\u00e3o para isso &#8211; primeiro, verifique todas as suas configura\u00e7\u00f5es de IPSec (Peer, Propostas, Segredo, Perfil, Pol\u00edtica &#8230;)<\/span><\/p>\n<p><span>Verifique as configura\u00e7\u00f5es de roteamento, gateway, NAT e firewall (em alguns casos, as portas 500, 4500, 50 e mais alguns precisam ser executados).<\/span><\/p>\n<p><span>Tive muitos problemas com o IPSec no passado e os motivos dos problemas eram diferentes e, \u00e0s vezes, muito dif\u00edceis de identificar.<\/span><\/p>\n<p><span>Agora, em PCs locais, tanto no Office1 quanto no Office2, iniciei o comando ping, mas sem sorte<\/span><\/p>\n<p><span>Comecei a executar ping em Office1 PC1 10.50.50.2 no Office 2 PC2 192.168.11.1<\/span><\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-5507\" src=\"https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite20.png\" sizes=\"auto, (max-width: 393px) 100vw, 393px\" srcset=\"https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite20.png 393w, https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite20-300x269.png 300w\" alt=\"\" width=\"393\" height=\"352\" \/><\/figure>\n<p><span>e vice versa<\/span><\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-5508\" src=\"https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite21.png\" alt=\"\" width=\"263\" height=\"238\" \/><\/figure>\n<p><span>Mas sem sorte.<\/span><\/p>\n<p><span>Ok, permiti ping (ICMP) de firewalls em ambas as m\u00e1quinas, mas sem sorte.\u00a0O t\u00fanel est\u00e1 estabelecido, mas n\u00e3o h\u00e1 tr\u00e1fego por ele.<\/span><\/p>\n<p><span>Ok, ent\u00e3o precisamos mexer um pouco mais com os roteadores em ambos os escrit\u00f3rios.<\/span><\/p>\n<p><span>Novamente, vou mostrar como configurar o Office 1 e as etapas devem ser repetidas no segundo lado do t\u00fanel.<\/span><\/p>\n<p><span>IP |\u00a0Firewall<\/span><\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-5510\" src=\"https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite22.png\" sizes=\"auto, (max-width: 271px) 100vw, 271px\" srcset=\"https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite22.png 271w, https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite22-107x300.png 107w\" alt=\"\" width=\"271\" height=\"762\" \/><\/figure>\n<p><span>No Firewall, selecione a guia NAT e clique no sinal de mais (+)<\/span><\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-5511\" src=\"https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite23.png\" sizes=\"auto, (max-width: 751px) 100vw, 751px\" srcset=\"https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite23.png 751w, https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite23-300x189.png 300w\" alt=\"\" width=\"751\" height=\"472\" \/><\/figure>\n<p><span>Em Nova regra NAT em Cadeia, selecione srcnat, em Src.\u00a0Endere\u00e7o, insira a sub-rede local do Escrit\u00f3rio 1 &#8211; 10.50.50.0\/24 e em Dst.Address a sub-rede remota do Escrit\u00f3rio 2 &#8211; 192.168.11.0\/24<\/span><\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-5513\" src=\"https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite24.png\" sizes=\"auto, (max-width: 369px) 100vw, 369px\" srcset=\"https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite24.png 369w, https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite24-147x300.png 147w\" alt=\"\" width=\"369\" height=\"753\" \/><\/figure>\n<p><span>(Office 2 &#8211; na cadeia do Office 2 tamb\u00e9m \u00e9 srcnat, Src.Address \u00e9 192.168.11.0\/24 e Dst.Address \u00e9 10.50.50.0\/24)<\/span><\/p>\n<p><span>Guia A\u00e7\u00e3o &#8211; em A\u00e7\u00e3o, selecione Aceitar.\u00a0Confirme com Aplicar &#8211; OK<\/span><\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-5515\" src=\"https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite25.png\" sizes=\"auto, (max-width: 367px) 100vw, 367px\" srcset=\"https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite25.png 367w, https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite25-145x300.png 145w\" alt=\"\" width=\"367\" height=\"758\" \/><\/figure>\n<p><span>(Escrit\u00f3rio 2 &#8211; mesma configura\u00e7\u00e3o &#8211; aceitar)<\/span><\/p>\n<p><span>Depois que a regra for criada, certifique-se de que ela resida no ponto superior da guia NAT &#8211; \u00e9 muito importante que esta seja a primeira regra !!<\/span><\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-5516\" src=\"https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite26.png\" sizes=\"auto, (max-width: 564px) 100vw, 564px\" srcset=\"https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite26.png 564w, https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite26-300x115.png 300w\" alt=\"\" width=\"564\" height=\"216\" \/><\/figure>\n<p><span>Repita o processo do outro lado e reinicie os dois roteadores.<\/span><\/p>\n<p><span>Ap\u00f3s reiniciar, o ping deve come\u00e7ar\u00a0<\/span><\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-5518\" src=\"https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite27.png\" sizes=\"auto, (max-width: 475px) 100vw, 475px\" srcset=\"https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite27.png 475w, https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite27-291x300.png 291w\" alt=\"\" width=\"475\" height=\"489\" \/><\/figure>\n<p><span>O tr\u00e1fego tamb\u00e9m pode ser visto atrav\u00e9s da regra de NAT criada.<\/span><\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-5520\" src=\"https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite28.png\" sizes=\"auto, (max-width: 1022px) 100vw, 1022px\" srcset=\"https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite28.png 1022w, https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite28-300x45.png 300w, https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite28-768x115.png 768w, https:\/\/www.informaticar.net\/wp-content\/uploads\/2020\/09\/MikrotikIPSecSiteToSite28-920x138.png 920w\" alt=\"\" width=\"1022\" height=\"153\" \/><\/figure>\n<p><span>\u00c9 isso, eu tenho um t\u00fanel IPSec Site a Site funcionando.<\/span><\/p>\n<p><span>Este \u00e9 um cen\u00e1rio simples e eu fiz isso na VM.\u00a0Ao implantar isso no ambiente de teste, certifique-se de ter IPs p\u00fablicos e rotas funcionando para que os roteadores possam ver uns aos outros.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Aqui est\u00e1 um r\u00e1pido tutorial sobre como criar t\u00fanel VPN IPSec Site To Site com Mikrotik RB RouterOS 6.46.1 em ambos os lados. Antes de come\u00e7armos, aqui est\u00e3o algumas coisas que voc\u00ea deve ter em mente: Esta \u00e9 a configura\u00e7\u00e3o que estou usando apenas em ambientes de teste, n\u00e3o em produ\u00e7\u00e3o.\u00a0Eu recomendaria criar t\u00faneis IPSec [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[1,730,79,42,415,495,68,271],"tags":[773,349,378,1532,297,1533,856,164],"class_list":["post-5095","post","type-post","status-publish","format-standard","hentry","category-viazap","category-clusterweb","category-firewall","category-leitura-recomendada","category-mikrotik-2","category-profissional-de-ti","category-redes-2","category-seguranca-2","tag-a","tag-com","tag-como","tag-estabelecer","tag-mikrotik","tag-roteadores","tag-site","tag-vpn"],"_links":{"self":[{"href":"https:\/\/blog.clusterweb.com.br\/index.php?rest_route=\/wp\/v2\/posts\/5095","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.clusterweb.com.br\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.clusterweb.com.br\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.clusterweb.com.br\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.clusterweb.com.br\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5095"}],"version-history":[{"count":1,"href":"https:\/\/blog.clusterweb.com.br\/index.php?rest_route=\/wp\/v2\/posts\/5095\/revisions"}],"predecessor-version":[{"id":5096,"href":"https:\/\/blog.clusterweb.com.br\/index.php?rest_route=\/wp\/v2\/posts\/5095\/revisions\/5096"}],"wp:attachment":[{"href":"https:\/\/blog.clusterweb.com.br\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5095"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.clusterweb.com.br\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=5095"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.clusterweb.com.br\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=5095"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}