<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>MikroTik Archive - MEB-IT | Blog</title>
	<atom:link href="https://blog.meb-it.de/en/categories/mikrotik/feed/" rel="self" type="application/rss+xml" />
	<link>https://blog.meb-it.de/en/categories/mikrotik/</link>
	<description>Networking &#124; Security &#124; Cloud</description>
	<lastBuildDate>Sat, 21 Oct 2023 10:41:35 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.2</generator>
	<item>
		<title>IKEv2 VPN with routerOS and Windows 10/11: IKE authentication credentials are unacceptable</title>
		<link>https://blog.meb-it.de/en/ikev2-vpn-with-routeros-and-windows-10-11-ike-authentication-credentials-are-unacceptable/</link>
					<comments>https://blog.meb-it.de/en/ikev2-vpn-with-routeros-and-windows-10-11-ike-authentication-credentials-are-unacceptable/#respond</comments>
		
		<dc:creator><![CDATA[Marcel]]></dc:creator>
		<pubDate>Tue, 17 Oct 2023 11:50:44 +0000</pubDate>
				<category><![CDATA[Allgemein]]></category>
		<category><![CDATA[MikroTik]]></category>
		<category><![CDATA[Powershell]]></category>
		<guid isPermaLink="false">https://blog.meb-it.de/?p=166</guid>

					<description><![CDATA[<p>If you have encountered a problem with a IKEv2 connection with Windows 10 or Windows 11 and the error message states: The error looks a little bit different from our routers side: There might be multiple certificates installed to your machine and Windows is unable to select the proper certificate for authentication (If you didn&#8217;t [&#8230;]</p>
<p>Der Beitrag <a href="https://blog.meb-it.de/en/ikev2-vpn-with-routeros-and-windows-10-11-ike-authentication-credentials-are-unacceptable/">IKEv2 VPN with routerOS and Windows 10/11: IKE authentication credentials are unacceptable</a> erschien zuerst auf <a href="https://blog.meb-it.de/en">MEB-IT | Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>If you have encountered a problem with a IKEv2 connection with Windows 10 or Windows 11 and the error message states:</p>



<pre class="wp-block-code"><code>IKE authentication credentials are unacceptable</code></pre>



<p>The error looks a little bit different from our routers side:</p>



<pre class="wp-block-code"><code>oct/16 10:50:55 ipsec,error identity not found for peer: DER DN: CN=1114XXXXX,C=,ST=,L=,O=,OU=,SN=1114XXXXX
</code></pre>



<p>There might be multiple certificates installed to your machine and Windows is unable to select the proper certificate for authentication (If you didn&#8217;t install any certificates in your computer the above error is most likely not related to this article. Please follow the original setup of your VPN tutorial to complete this step). But don&#8217;t worry this is easy to fix. We can pin a certificate authority (CA) that has signed a certificate to a specific VPN connection.</p>



<p>First we need to have the CA certificate as a file on the clients machine. You can either export the CA-certificate from the computers certificate store (certmgr.exe) or you can download the file from your router or the location you have created the CA-Certificate, server-certificates and user-certificates.</p>



<p>Second step is to pin the CA-certificate to our VPN connection. Open PowerShell (do not open as &#8220;Administrator&#8221; since we want to set the certificate pinning in user context) and type in the following (please make sure you replace the VPN name and path to CA-certificate):</p>



<pre class="wp-block-code"><code>Set-VpnConnection -Name "My VPN" -MachineCertificateIssuerFilter 'C:\CA-files\my-ca.cer'</code></pre>



<p>After you have completed the above steps your VPN should start working.</p>
<p>Der Beitrag <a href="https://blog.meb-it.de/en/ikev2-vpn-with-routeros-and-windows-10-11-ike-authentication-credentials-are-unacceptable/">IKEv2 VPN with routerOS and Windows 10/11: IKE authentication credentials are unacceptable</a> erschien zuerst auf <a href="https://blog.meb-it.de/en">MEB-IT | Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.meb-it.de/en/ikev2-vpn-with-routeros-and-windows-10-11-ike-authentication-credentials-are-unacceptable/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Configuration: MikroTik routerOS 7 wifiwave2 and CAPsMan</title>
		<link>https://blog.meb-it.de/en/configuration-mikrotik-routeros-7-wifiwave2-and-capsman/</link>
					<comments>https://blog.meb-it.de/en/configuration-mikrotik-routeros-7-wifiwave2-and-capsman/#respond</comments>
		
		<dc:creator><![CDATA[Marcel]]></dc:creator>
		<pubDate>Thu, 16 Feb 2023 13:33:06 +0000</pubDate>
				<category><![CDATA[MikroTik]]></category>
		<category><![CDATA[capsman]]></category>
		<category><![CDATA[capsman-forwarding]]></category>
		<category><![CDATA[local-forwarding]]></category>
		<category><![CDATA[routeros]]></category>
		<category><![CDATA[routeros 7]]></category>
		<category><![CDATA[vlan]]></category>
		<category><![CDATA[wifiwave2]]></category>
		<guid isPermaLink="false">https://blog.meb-it.de/?p=127</guid>

					<description><![CDATA[<p>This short blog post shows the configuration needed to use wifiwave2 CAPsManager with multiple APs and multiple networks. MikroTik removed &#8220;capsman forwarding&#8221; in wifiwave2 package thus the only option to seperate multiple networks from each other is using VLANs and local forwarding. CAPsManager configuration: CAP configuration (hap ax²): The most important part is to configure [&#8230;]</p>
<p>Der Beitrag <a href="https://blog.meb-it.de/en/configuration-mikrotik-routeros-7-wifiwave2-and-capsman/">Configuration: MikroTik routerOS 7 wifiwave2 and CAPsMan</a> erschien zuerst auf <a href="https://blog.meb-it.de/en">MEB-IT | Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>This short blog post shows the configuration needed to use wifiwave2 CAPsManager with multiple APs and multiple networks.</p>



<p>MikroTik removed &#8220;capsman forwarding&#8221; in wifiwave2 package thus the only option to seperate multiple networks from each other is using VLANs and local forwarding.</p>



<p><strong>CAPsManager configuration:</strong></p>



<pre class="wp-block-code"><code>/interface wifiwave2 configuration
add channel.band=2ghz-ax country=Germany datapath.client-isolation=no name=cap-master-2ghz security.authentication-types=wpa2-psk,wpa3-psk  .passphrase="1234567890" ssid=SSID-TEST
    
    
add channel.band=5ghz-ax country=Germany datapath.client-isolation=no name=cap-master-5ghz security.authentication-types=wpa2-psk,wpa3-psk  .passphrase="1234567890" ssid=SSID-TEST
    
    
add datapath.client-isolation=yes .vlan-id=99 name=cap-slave-guest security.authentication-types=wpa2-psk,wpa3-psk .passphrase="0987654321" ssid=SSID-TEST-GUEST
    
    
/interface wifiwave2
add configuration=cap-master-5ghz disabled=no name=cap-wifi1
add configuration=cap-master-2ghz disabled=no name=cap-wifi2
add configuration=cap-slave-guest disabled=no mac-address=4A:A9:8A:5C:B7:88 master-interface=cap-wifi1 name=cap-wifi3
add configuration=cap-slave-guest disabled=no mac-address=4A:A9:8A:5C:B7:89 master-interface=cap-wifi2 name=cap-wifi4


/interface wifiwave2 capsman
set enabled=yes interfaces=switch


/interface wifiwave2 provisioning
add action=create-enabled comment="hap ax2 01 2ghz" master-configuration=cap-master-2ghz radio-mac=48:A9:8A:5C:B7:89 slave-configurations=cap-slave-guest
add action=create-enabled comment="hap ax2 01 5ghz" master-configuration=cap-master-5ghz radio-mac=48:A9:8A:5C:B7:88 slave-configurations=cap-slave-guest
add action=create-disabled comment="create default disabled"
</code></pre>



<p>CAP configuration (hap ax²):</p>



<pre class="wp-block-code"><code>/interface wifiwave2
# managed by CAPsMAN
# mode: AP, SSID: SSID-TEST, channel: 5500/ax/Ceee
set &#91; find default-name=wifi1 ] configuration.manager=capsman datapath.bridge=switch disabled=no
# managed by CAPsMAN
# mode: AP, SSID: SSID-TEST, channel: 2462/ax/eC
set &#91; find default-name=wifi2 ] configuration.manager=capsman datapath.bridge=switch disabled=no
/interface wifiwave2 cap
set caps-man-addresses=172.16.254.254 certificate=request enabled=yes slaves-datapath=datapath-slave slaves-static=no
/interface wifiwave2 datapath
add bridge=switch name=datapath-slave
</code></pre>



<p>The most important part is to configure the CAP to use the bridge for default wifi (via &#8216;/interface wifiwave2 set 0,1 datapath.bridge=switch&#8217;) and CAPsManager config (via &#8216;/interface wifiwave2 set 0,1 configuration.manager=capsman&#8217;). </p>



<p>If you need additional wifi networks, e.g. for guests you also need to specify the datapath bridge (&#8216;/interface wifiwave2 datapath add bridge=switch name=datapath-slave&#8217;) and add this datapath to your cap config (&#8216;/interface wifiwave2 cap set caps-man-addresses=172.16.254.254 certificate=request enabled=yes slaves-datapath=datapath-slave slaves-static=no&#8217;). The vlan-id will be not visible on the CAP (at time of writing: routerOS 7.7) but is taken from CAPsManager configuration for the slave network(s).</p>



<p></p>



<p>A more detailed blog post is following soon!</p>
<p>Der Beitrag <a href="https://blog.meb-it.de/en/configuration-mikrotik-routeros-7-wifiwave2-and-capsman/">Configuration: MikroTik routerOS 7 wifiwave2 and CAPsMan</a> erschien zuerst auf <a href="https://blog.meb-it.de/en">MEB-IT | Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.meb-it.de/en/configuration-mikrotik-routeros-7-wifiwave2-and-capsman/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
