MikroTik
This guide will show you how to connect your MikroTik device to the GoodAccess Gateway via a site-to-site connection using the IPSec protocol.
Last updated
Was this helpful?
This guide will show you how to connect your MikroTik device to the GoodAccess Gateway via a site-to-site connection using the IPSec protocol.
Last updated
Was this helpful?
Does not require on-premise public static IP
IKEv2 configuration allows you to use MikroTik as the main router (which is connected to internet) or place it locally in your LAN behind the main router
Click + Add new, enter the Branch name and subnet, and select Gateway.
Choose IKEv2 Protocol, and click Save.
Click the Edit button of your Branch, and navigate to the Configuration Guide.
Save your Credentials and Download setup files.
Download a script for MikroTik:
Log in to your MikroTik device, and go to Files.
Please note: Deploying the script on a already configured device could disrupt your existing setup. Please review the script thoroughly and ensure compatibility with your current configuration before deployment.
Go to Terminal and run the following script:
VPN username
VPN password
Gateway address
Gateway subnet
What is your local network - Cloud/Branch subnet
What is CA certificate name - Name of the CA Certificate file stored in your MikroTik files
Connection is established when the message "Script file loaded and executed successfully" appears.
You have now successfully connected your device to GoodAccess.
Firewall rules
Make sure that your device allows incoming connections from your GoodAccess Gateway private subnet on the following ports:
UDP 500
UDP 4500
Upload the script and setup files from (extract the files first).
Enter the credentials from GoodAccess :