![]() ![]() Step 10) Click “Reboot”, then “Yes, I’m sure”: Leaving the default password will make it vulnerable. The EdgeRouter will be accessible to others on the mesh network. Step 8) Enter your password, confirm password, then click “Apply”. Step 7) Choose from one of the below options and fill out the “Switch Ports” section accordingly:ġ) Devices on eth1 to eth4 will receive an IP address from Mesh Node A on eth0.Ģ) The EdgeRouter X will receive an IP address from Mesh Node A to access configuration settings.ġ) Devices will receive an IP address from Mesh Node B on eth1.Ģ) The EdgeRouter X will receive an IP address from Mesh Node B to access configuration settings.ġ) Devices will receive an IP address from Mesh Node C on eth2.Ģ) The EdgeRouter X will receive an IP address from Mesh Node C to access configuration settings.ġ) Devices will receive an IP address from Mesh Node A on eth1.ġ) Devices will receive an IP address from Mesh Node B on eth2. ![]() Step 6) Select “Switch” in the left column, then:Ī) check the box “Use non-default VLAN for management”Ĭ) check “Enabled” in the “VLAN Aware” section Step 5) The User Interface prompts to use the Setup Wizard. Login with default user = “ubnt” and password = “ubnt”. Be very patient, it can take up to 3 minutes after power is applied to (or a reboot of) the EdgeRouter before responding. Step 3) Plug network cable between laptop and EdgeRouter X “eth0” port. Step 2) Setup laptop with static address: If unsure of the EdgeRouter’s state, press and hold the reset button until the “eth4” light cycles through: blinking, solid, off. Step 1) The EdgeRouter is assumed to be at factory default state. You can get this switch from Amazon by clicking this link Ubiquiti Edgerouter X - Router - Desktop - Black (ER-X) Follow the 13 steps below to configure a Ubiquiti EdgeRouter X. Send all traffic through the VPN connection.Configuring an EdgeRouter X for use with AREDN networks System Preferences > Network > VPN L2TP > Authentication Settings User Authentication: Ĥ. System Preferences > Network > VPN L2TP Configuration: Default Adjust the newly created L2TP over IPsec interface. System Preferences > Network > "+" Interface: VPNĢ. Add a VPN connection in the network settings. In this section, we are using an Apple macOS computer as the L2TP client.ġ. Settings > Network & Internet > Status > Change Adapter Options > L2TP Adapter properties Security > Allow these protocols > Microsoft CHAP Version 2 (MS-CHAP v2) macOS L2TP VPN Client Navigate to the Windows 10 Network connections to change the allowed security protocols. Type of sign-in info: User name and passwordĢ. Settings > Network & Internet > VPN > Add a VPN connection VPN Provider: Windows (built-in) In this section, we are using a Windows 10 machine as the L2TP client. Make sure to match the credentials on the client and server (EdgeRouter). The next step is to configure the L2TP VPN settings on the client(s). Set vpn l2tp remote-access outside-address Set vpn l2tp remote-access dns-servers server-2 Set vpn l2tp remote-access dns-servers server-1 Set vpn l2tp remote-access client-ip-pool stop 192.168.100.249 Set vpn l2tp remote-access client-ip-pool start 192.168.100.240 Set vpn l2tp remote-access authentication local-users username password Set vpn l2tp remote-access authentication mode local Set vpn l2tp remote-access ipsec-settings authentication pre-shared-secret Set vpn l2tp remote-access ipsec-settings authentication mode pre-shared-secret Set vpn ipsec ipsec-interfaces interface Set firewall name WAN_LOCAL rule 30 action accept NOTE:The show vpn remote-access and show vpn ipsec sa commands can be used to verify the VPN client sessions. Set firewall name WAN_LOCAL rule 60 protocol udp Set firewall name WAN_LOCAL rule 60 log disable Set firewall name WAN_LOCAL rule 60 ipsec match-ipsec Set firewall name WAN_LOCAL rule 60 destination port 1701 Set firewall name WAN_LOCAL rule 60 description l2tp Set firewall name WAN_LOCAL rule 60 action accept Set firewall name WAN_LOCAL rule 50 protocol udp Set firewall name WAN_LOCAL rule 50 log disable Set firewall name WAN_LOCAL rule 50 destination port 4500 Set firewall name WAN_LOCAL rule 50 description nat-t Set firewall name WAN_LOCAL rule 50 action accept Set firewall name WAN_LOCAL rule 40 protocol esp Set firewall name WAN_LOCAL rule 40 log disable Set firewall name WAN_LOCAL rule 40 description esp Set firewall name WAN_LOCAL rule 40 action accept Set firewall name WAN_LOCAL rule 30 protocol udp Set firewall name WAN_LOCAL rule 30 log disable ![]() Set firewall name WAN_LOCAL rule 30 destination port 500 Set firewall name WAN_LOCAL rule 30 description ike set firewall name WAN_LOCAL rule 30 action accept Add firewall rules for the L2TP traffic to the local firewall policy. You can do this using the CLI button in the Web UI or by using a program such as PuTTY.Ģ. ![]()
0 Comments
Leave a Reply. |