2020-03-27 21:51:40 +01:00
Update GRE configuration with dynamic addresses
===============================================
2024-03-06 14:30:19 +01:00
[](https://github.com/eworm-de/routeros-scripts/stargazers)
[](https://github.com/eworm-de/routeros-scripts/network)
[](https://github.com/eworm-de/routeros-scripts/watchers)
2025-02-07 17:39:48 +01:00
[](https://mikrotik.com/download/changelogs/)
2024-03-06 14:30:19 +01:00
[](https://t.me/routeros_scripts)
[](https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick& hosted_button_id=A4ZXBD6YS2W8J)
2023-01-10 14:45:27 +01:00
[⬅️ Go back to main README ](../README.md )
2020-03-27 21:51:40 +01:00
2022-02-12 13:05:56 +01:00
> ℹ ️ **Info**: This script can not be used on its own but requires the base
2022-02-11 23:34:39 +01:00
> installation. See [main README](../README.md) for details.
2021-05-03 15:07:50 +02:00
2020-03-27 21:51:40 +01:00
Description
-----------
Running a GRE tunnel over IPSec with IKEv2 is a common scenario. This is
easy to configure on client, but has an issue on server side: client IP
addresses are assigned dynamically via mode-config and have to be updated
for GRE interface.
This script handles the address updates and disables the interface if the
client is disconnected.
Requirements and installation
-----------------------------
Just install the script:
$ScriptInstallUpdate update-gre-address;
... and add a scheduler to run the script periodically:
2022-05-11 10:31:03 +02:00
/system/scheduler/add interval=30s name=update-gre-address on-event="/system/script/run update-gre-address;" start-time=startup;
2020-03-27 21:51:40 +01:00
Configuration
-------------
The configuration goes to interface's comment. Add the client's IKEv2
certificate CN into the comment:
2022-05-11 10:31:03 +02:00
/interface/gre/set comment="ikev2-client1" gre-client1;
2020-03-27 21:51:40 +01:00
---
2023-01-10 14:45:27 +01:00
[⬅️ Go back to main README ](../README.md )
[⬆️ Go back to top ](#top )