| 本帖最後由 gfx86674 於 2015-3-3 11:07 編輯 
 
  Mikrotik官網提這是Road Warrior服務,直白一點其實是手機的IPSec Xauth PSK.
 RouterOS v6.12開始支援手機,但用的人似乎不多...
 
 多一種VPN選擇,有興趣的參考看看.
 
 若原先已在主機設定L2TP over IPSec Server,得先關閉其下的IPSec ,
 透過UDP Port:500 連進RouterOS ,主機才不會分不清封包是IPSec Xauth 或L2TP over IPSec.
 
 另外sha1 /aes-128 cbc 加密需啟用才行.
 
  
 接下來無需繁雜的設定,直接匯入即可.
 172.19.15.0/24 是您個人的VPN網域  ,secret=abc1234則是您的個人預先共用金鑰 ,可自訂:複製代碼/ip pool
add name=IPSec_Xauth ranges=172.19.15.0/24
/ip ipsec mode-config
add address-pool=IPSec_Xauth address-prefix-length=24 \
name="IPSec_Xauth (Android)" split-include=0.0.0.0/0
/ip ipsec policy group
add name="IPSec_Xauth (Android)"
/ip ipsec policy
add comment="IPSec_Xauth (Android)" dst-address=0.0.0.0/0 \
group="IPSec_Xauth (Android)" src-address=172.19.15.0/24 template=yes
/ip ipsec peer
add auth-method=pre-shared-key-xauth comment="IPSec_Xauth (Android)" \
enc-algorithm=aes-128 generate-policy=port-strict \
mode-config="IPSec_Xauth (Android)" \
passive=yes policy-template-group="IPSec_Xauth (Android)" secret=abc1234
/ip firewall mangle
add action=change-mss chain=forward dst-address=172.19.15.0/30 new-mss=\
    clamp-to-pmtu passthrough=no protocol=tcp tcp-flags=syn
add action=change-mss chain=forward new-mss=clamp-to-pmtu passthrough=no \
    protocol=tcp src-address=172.19.15.0/30 tcp-flags=syn
 至於用戶 帳號/密碼,則可在這新增:
 
  
 Android手機:
 
    |