I am trying to establish a baseline site to site policy that can be deployed to the upcoming routerboards we’re going to give to users for home use, so they can have IP phones and no need for client software to connect. I should note that this means the routerboards will be sitting behind their existing router.
For reference, x is the remote IP & Y is my public IP
Here is my IPSEC policy:
/ip ipsec mode-config
set [ find default=yes ] src-address-list=local-wfh
/ip firewall address-list print
Flags: X - disabled, D - dynamic
# LIST ADDRESS CREATION-TIME
TIMEOUT
0 local-wfh 192.168.100.0/24 apr/08/2020 18:33:22
/ip ipsec peer
add address=xxx.xxx.xxx.xxx/32 local-address=yyy.yyy.yyy.yyy name=peer1
/ip ipsec profile
set [ find default=yes ] dh-group=modp1536 enc-algorithm=aes-256 name=phase1
/ip ipsec proposal
set [ find default=yes ] enc-algorithms=aes-256-ctr lifetime=1d pfs-group=modp1536
/ip ipsec identity
add peer=peer1
/ip ipsec policy
add dst-address=10.4.0.0/16 peer=peer1 sa-dst-address=xxx.xxx.xxx.xxx sa-src-address=yyy.yyy.yyy.yyy src-address=192.168.100.0
tunnel=yes
Firewall Policy: (note rules are disabled for testing)
/ip firewall address-list
add address=192.168.100.0/24 list=local-wfh
/ip firewall address-list
add address=192.168.100.0/24 list=local-wfh
/ip firewall filter
add action=accept chain=input comment="defconf: accept established,related,untracked" connection-state=\
established,related,untracked
add action=accept chain=forward ipsec-policy=in,ipsec
add action=accept chain=forward protocol=ipsec-esp
add action=accept chain=forward dst-address=yyy.yyy.yyy.yyy protocol=ipsec-ah src-address=xxx.xxx.xxx.xxx
add action=accept chain=forward dst-address=yyy.yyy.yyy.yyy protocol=udp src-address=xxx.xxx.xxx.xxx src-port=4500
add action=accept chain=forward dst-address=yyy.yyy.yyy.yyy protocol=udp src-address=xxx.xxx.xxx.xxx src-port=500
add action=drop chain=forward connection-state=invalid ipsec-policy=in,none tcp-flags=""
add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
add action=drop chain=input comment="defconf: drop all not coming from LAN" in-interface-list=!LAN
add action=accept chain=forward comment="defconf: accept in ipsec policy" ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy" ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" connection-state=established,related
add action=accept chain=forward comment="defconf: accept established,related, untracked" connection-state=\
established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" connection-state=invalid
add action=drop chain=forward comment="defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat connection-state=\
new in-interface-list=WAN
/ip firewall nat
add action=masquerade chain=srcnat comment="defconf: masquerade" ipsec-policy=out,none out-interface-list=WAN
Info ASA side:
object network Mikrotik_24
subnet 192.168.100.0 255.255.255.0
access-list outside_cryptomap_31 extended permit ip 10.4.0.0 255.255.0.0 object Mikrotik_24
I also confirmed through packet-tracer that the route is allowed.
From the Mikrotik side- the error message I’m getting is:
phase1 negatiation failed due to time up. *myip*[500]<=>*remoteip*[500]
Any hints on where to go from here would be amazing.
Thank you.