Solved

Cisco SRP527W to MikroTik GRE Tunnel

Posted on 2013-11-10
5
1,059 Views
Last Modified: 2014-02-15
I'm trying to set up a GRE Tunnel from a Cisco SRP527W Router to a Mikrotik RouterBoard.
The Cisco end is head office, whereas the Mikrotik is at a remote site.
The Mikrotik sits behind the ADSL router at the office with all ports for VPN forwarded to it.

As the Cisco SRP has no CLI it's harder to set up than traditional methods.

Cisco:
Tunnel No: 1
Checksum: none
Sequence: None
Key: None
Wan interface: ADSL
Destination I.P: Remote Site WAN
Remote IP Address/Sbunet Mask: 172.20.10.1/29

Mikrotik:
Local address: 172.20.10.2/29
Remote Address: Head Office WAN I.P

The Mikrotik has the I.P address also assigned in the I.P > Addresses list and is assigned to the GRE tunnel interface.
On the Mikrotik I have created a NAT Masquerade rule to point the Head Office Subnet.

From the Mikrotik, pinging the 172.20.10.1 only shows a timeout...

Any ideas where I may have missed something???
0
Comment
Question by:kiwistag
  • 4
5 Comments
 
LVL 3

Expert Comment

by:vyaradaikin
ID: 39722177
Is it still actual?
0
 
LVL 6

Author Comment

by:kiwistag
ID: 39722258
No luck as of yet...
0
 
LVL 6

Author Comment

by:kiwistag
ID: 39802587
The issue between sites is at one end the Netcomm NBPlus6Wn ADSL router is somehow blocking/interfering with the GRE tunnel. I am looking into why this may be as all NAT rules are in that should be..
0
 
LVL 6

Accepted Solution

by:
kiwistag earned 0 total points
ID: 39848518
After contacting Netcomm they suggested just switching the Router to Bridge Mode. Am yet to try but it seems like the only option.
0
 
LVL 6

Author Closing Comment

by:kiwistag
ID: 39861163
An option to resolve was offered by one of the routers manufacturers after they checked it with their engineers.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Data center, now-a-days, is referred as the home of all the advanced technologies. In-fact, most of the businesses are now establishing their entire organizational structure around the IT capabilities.
If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

864 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now