Всем добрый вечер. Хочу настроить соединение Windows Server-Mikrotik client.
Сервер все работает с Windows клиент подключается. А вот с Mikrotik выходит такой лог
Mon Jan 27 18:35:24 2020 us=698736 178.176.166.217:42205 Re-using SSL/TLS context
Mon Jan 27 18:35:24 2020 us=698736 178.176.166.217:42205 LZO compression initializing
Mon Jan 27 18:35:24 2020 us=698736 178.176.166.217:42205 Control Channel MTU parms [ L:1622 D:1212 EF:38 EB:0 ET:0 EL:3 ]
Mon Jan 27 18:35:24 2020 us=698736 178.176.166.217:42205 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
Mon Jan 27 18:35:24 2020 us=698736 178.176.166.217:42205 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher DES-CBC,auth SHA1,keysize 64,key-method 2,tls-server'
Mon Jan 27 18:35:24 2020 us=698736 178.176.166.217:42205 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher DES-CBC,auth SHA1,keysize 64,key-method 2,tls-client'
Mon Jan 27 18:35:24 2020 us=698736 178.176.166.217:42205 TLS: Initial packet from [AF_INET6]::ffff:178.176.166.217:42205, sid=a51d79f7 e16f297a
Mon Jan 27 18:35:25 2020 us=587746 178.176.166.217:42205 VERIFY OK: depth=1, C=RU, ST=Sankt-Petersburg, L=Sankt-Petersburg, O=Organization, OU=DMOSK, CN=DMOSK, name=WIN-OOJVAP63PG8, emailAddress=admin@dssupport.ru
Mon Jan 27 18:35:25 2020 us=587746 178.176.166.217:42205 VERIFY OK: depth=0, C=RU, ST=Sankt-Petersburg, L=Sankt-Petersburg, O=Organization, OU=DMOSK, CN=client1, name=WIN-OOJVAP63PG8, emailAddress=admin@dssupport.ru
Mon Jan 27 18:35:25 2020 us=737788 178.176.166.217:42205 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1542', remote='link-mtu 1557'
Mon Jan 27 18:35:25 2020 us=737788 178.176.166.217:42205 WARNING: 'comp-lzo' is present in local config but missing in remote config, local='comp-lzo'
Mon Jan 27 18:35:25 2020 us=737788 178.176.166.217:42205 WARNING: 'cipher' is used inconsistently, local='cipher DES-CBC', remote='cipher AES-256-CBC'
Mon Jan 27 18:35:25 2020 us=737788 178.176.166.217:42205 WARNING: 'keysize' is used inconsistently, local='keysize 64', remote='keysize 256'
Mon Jan 27 18:35:25 2020 us=897815 178.176.166.217:42205 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
Mon Jan 27 18:35:25 2020 us=897815 178.176.166.217:42205 [client1] Peer Connection Initiated with [AF_INET6]::ffff:178.176.166.217:42205
Mon Jan 27 18:35:25 2020 us=897815 MULTI: new connection by client 'client1' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.
Mon Jan 27 18:35:25 2020 us=897815 MULTI_sva: pool returned IPv4=172.16.10.6, IPv6=(Not enabled)
Mon Jan 27 18:35:25 2020 us=897815 MULTI: Learn: 172.16.10.6 -> client1/178.176.166.217:42205
Mon Jan 27 18:35:25 2020 us=897815 MULTI: primary virtual IP for client1/178.176.166.217:42205: 172.16.10.6
Mon Jan 27 18:35:35 2020 us=901376 MULTI: multi_create_instance called