Remove default gateways
/ip dhcp-client
set [find] add-default-route=no
Remove LAN DHCP client
/ip dhcp-client
remove <ITEM # OF ether1 CLIENT>
Remove NAT rules
/ip firewall nat
remove [find]
Configure static IP for the modem on your LAN
/ip address
add address=<MODEM LAN ADDRESS>/<LAN MASK> interface=ether1
Generate a private key and a Certificate Signing Request (CSR)
# Be sure to protect the private key with a password when prompted to do so!
openssl genrsa -des3 -out <CALLSIGN>-key.pem 4096
# Be sure to use CN=<CALLSIGN> in your CSR
openssl req -new -key <CALLSIGN>-key.pem -out <CALLSIGN>.csr
This is how the Certificate Authority operator will sign your request and generate your certificate
openssl x509 -req -days 365 -in <CALLSIGN>.csr -CA cacert.pem -CAkey private/cakey.pem -out <CALLSIGN>-cert.pem -CAserial serial
Import the certificates and your private key IN THIS ORDER
/certificate
import file-name=K7WAN-cert.pem
# Just hit enter when prompted for password.
set 0 name=HamWAN
import file-name=<CALLSIGN>-cert.pem
# Just hit enter when prompted for password.
set 1 name=<CALLSIGN>
import file-name=<CALLSIGN>-key.pem
# Provide your private key encryption password here for the modem to decrypt it.
Configure a static route for the IPIP tunnel
/ip route
add comment=Corvallis-ER1 distance=1 dst-address=198.178.136.80/32 gateway=<LAN DEFAULT GATEWAY>
Create an IPIP interface for the tunnel
/interface ipip
add comment="<CALLSIGN> - Corvallis. MTU set for ESP+NAT-T." local-address=<MODEM LAN ADDRESS> mtu=1418 name=ipip1 remote-address=198.178.136.80
Define the ESP-only IPsec proposal
/ip ipsec proposal
add auth-algorithms=null enc-algorithms=aes-128 name=vpn-esp
Define the Corvallis-ER1 IPsec peer
/ip ipsec peer
add address=198.178.136.80/32 auth-method=rsa-signature certificate=<CALLSIGN> enc-algorithm=aes-128 nat-traversal=yes remote-certificate=K7WAN
Define the Corvallis-ER1 IPsec policy
/ip ipsec policy
add dst-address=198.178.136.80/32 proposal=vpn-esp protocol=ip-encap \
sa-dst-address=198.178.136.80 sa-src-address=<MODEM LAN ADDRESS> src-address=<MODEM LAN ADDRESS>/32 tunnel=yes
Configure the addresses on your IPIP tunnel
/ip address
add address=<HIGHER IP FROM PTP PAIR>/32 network=<LOWER IP FROM PTP PAIR> interface=ipip1
Initiate the IPsec association
/ping <LOWER IP FROM PTP PAIR>
# Initial ping may timeout, but subsequent pings should work
Verify the tunnel is being used
/tool traceroute <LOWER IP FROM PTP PAIR>
# Should display only one hop
Check for mature security associations
/ip ipsec installed-sa print
# Should display state=mature
Verify MTUs are working OK
/ping <LOWER IP FROM PTP PAIR> size=1418 do-not-fragment
# Should result in clean pings with no error messages
Define HamWAN routing filters
/routing filter
add action=accept chain=HamWAN-default prefix=44.24.240.0/20 prefix-length=20-32
add action=accept chain=HamWAN-default prefix=0.0.0.0/0
add action=reject chain=HamWAN-default
add action=accept chain=Ham-default prefix=44.0.0.0/8 prefix-length=8-32
add action=accept chain=Ham-default prefix=0.0.0.0/0
add action=reject chain=Ham-default
Configure OSPF instance
/routing ospf instance
set [ find default=yes ] distribute-default=if-installed-as-type-1 in-filter=Ham-default out-filter=Ham-default redistribute-bgp=as-type-1 \
redistribute-connected=as-type-1 redistribute-other-ospf=as-type-1 router-id=<HIGHER IP FROM PTP PAIR>
Configure OSPF interface
/routing ospf interface
add authentication=md5 authentication-key=<OSPF PASSWORD> interface=ipip1 network-type=point-to-point
Configure OSPF network
/routing ospf network
add area=backbone network=<LOWER IP FROM PTP PAIR>/32
Verify you are receiving routes from Corvallis-ER1
/ip route print interval=1
# You should see hundreds of new routes in your routing table
Advertise your uplink gateway to the microwave network
/routing ospf interface
add authentication=md5 authentication-key=<OSPF PASSWORD> interface=wlan1 network-type=broadcast
/routing ospf network
add area=backbone network=<WLAN1 NETWORK ADDRESS AND MASK, NOT THE IP ASSIGNED TO WLAN1>
# For example, 44.24.240.1/24 wlan1 IP means a 44.24.240.0/24 network address
Verify two OSPF neighbors are active
/routing ospf neighbor print
# Make sure state="Full" on both neighbor lines
Integrate your home network (assumed on RFC1918 space) into HamWAN routing
Define an RFC1918 address list
/ip firewall address-list
add address=10.0.0.0/8 list=RFC1918
add address=172.16.0.0/12 list=RFC1918
add address=192.168.0.0/16 list=RFC1918
Perform NAT on traffic coming into HamWAN from RFC1918 space
/ip firewall nat
add action=masquerade chain=srcnat src-address-list=RFC1918
On your main LAN router, add HamWAN + AMPR routes
/ip route
add comment="HamWAN + AMPR" disabled=no distance=1 dst-address=44.0.0.0/8 gateway=<MODEM IP ADDRESS> scope=30 target-scope=10