Hello!
I need some help with IPSEC tunnel beetween two RB951G-2HND devices.
Routeros mipsbe 6.40.4
Schematics:
(PC1)192.168.44.10 ----- 192.168.44.1 (Mikrotik) 10.1.1.20-----10.1.1.10 (Mikrotik) 192.168.22.1 ----- 192.168.22.10 (PC2)
Problem:
Tunnel succesfuly established, but no traffic comming throught it. Counters=0
What did i missed ?
10.1.1.10 CFG
/ip ipsec proposal
set [ find default=yes ] disabled=yes
add auth-algorithms=md5 enc-algorithms=des name=proposal1 pfs-group=none
/ip address
add address=10.1.1.10/24 interface=ether1 network=10.1.1.0
add address=192.168.22.1/24 interface=ether2 network=192.168.22.0
/ip firewall filter
add action=accept chain=input comment=“Allow IKE” dst-address=192.168.44.0/24
dst-port=500 in-interface=ether1 protocol=udp
add action=accept chain=input comment=“Allow IPSec-esp” dst-address=
192.168.44.0/24 in-interface=ether1 protocol=ipsec-esp
add action=accept chain=input comment=“Allow IPSec-ah” dst-address=
192.168.44.0/24 in-interface=ether1 protocol=ipsec-ah
/ip firewall nat
add action=accept chain=srcnat dst-address=192.168.44.0/24 src-address=
192.168.22.0/24
add action=masquerade chain=srcnat disabled=yes
/ip ipsec peer
add address=10.1.1.20/32 dh-group=modp1024 dpd-interval=5s enc-algorithm=
aes-256 hash-algorithm=md5 lifetime=8h nat-traversal=no secret=mega2015
/ip ipsec policy
set 0 disabled=yes
add dst-address=192.168.44.0/24 proposal=proposal1 protocol=ipsec-esp
sa-dst-address=10.1.1.20 sa-src-address=10.1.1.10 src-address=
192.168.22.0/24 tunnel=yes
/system clock
set time-zone-autodetect=no time-zone-name=Europe/Moscow
/system logging
add topics=ipsec
10.1.1.20 CFG
/ip ipsec proposal
set [ find default=yes ] disabled=yes
add auth-algorithms=md5 enc-algorithms=des name=proposal1 pfs-group=none
/ip address
add address=10.1.1.20/24 interface=ether1 network=10.1.1.0
add address=192.168.44.1/24 interface=ether2 network=192.168.44.0
/ip firewall filter
add action=accept chain=input comment=“Allow IKE” dst-address=192.168.22.0/24
dst-port=500 in-interface=ether1 protocol=udp
add action=accept chain=input comment=“Allow IPSec-esp” dst-address=
192.168.22.0/24 in-interface=ether1 protocol=ipsec-esp
add action=accept chain=input comment=“Allow IPSec-ah” dst-address=
192.168.22.0/24 in-interface=ether1 protocol=ipsec-ah
/ip firewall nat
add action=accept chain=srcnat dst-address=192.168.22.0/24 src-address=
192.168.44.0/24
add action=masquerade chain=srcnat disabled=yes
/ip ipsec peer
add address=10.1.1.10/32 dh-group=modp1024 dpd-interval=5s enc-algorithm=
aes-256,aes-128 hash-algorithm=md5 lifetime=8h nat-traversal=no secret=
mega2015
/ip ipsec policy
add dst-address=192.168.22.0/24 proposal=proposal1 protocol=ipsec-esp
sa-dst-address=10.1.1.10 sa-src-address=10.1.1.20 src-address=
192.168.44.0/24 tunnel=yes
set 1 disabled=yes
/system clock
set time-zone-autodetect=no time-zone-name=Europe/Moscow
/system logging
add topics=ipsec