Hi All,
I set up a VPN server using IPsec IKEv2.
As I have multiple certificates, I used the following command to select the correct certificate for authentication:
Set-VpnConnection -Name "IKEV2" -MachineCertificateIssuerFilter 'C:\temp\Mikrotik-CA.crt'
On Client side I see I got a “Policy mismatch error“ In Event viewer :
XXXX dialed a connection named IKEV2 which has failed. The error code returned on failure is 13868.
Mikrotik Config:
/interface bridge
add admin-mac=16:C5:39:E5:FC:8D auto-mac=no name=LAN
add name=VPN
/interface ethernet
set [ find default-name=ether1 ] name=WAN
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/ip ipsec policy group
add name=Group-ikev2
/ip ipsec profile
add enc-algorithm=aes-256 hash-algorithm=sha256 name=Profile-ikev2
/ip ipsec peer
add exchange-mode=ike2 name=peer-ikev2 passive=yes profile=Profile-ikev2
/ip ipsec proposal
set [ find default=yes ] disabled=yes
add auth-algorithms=sha256 enc-algorithms=aes-256-cbc name=proposal-ikev2 pfs-group=none
/ip pool
add name=VPN-IP-Pool ranges=192.168.77.1-192.168.77.200
add name=dhcp_pool1 ranges=192.168.76.10-192.168.76.200
/ip ipsec mode-config
add address-pool=VPN-IP-Pool address-prefix-length=32 name=cfg-ikev2 split-include=0.0.0.0/0
/interface bridge port
add bridge=LAN interface=ether2
add bridge=LAN interface=ether3
add bridge=LAN interface=ether4
add bridge=LAN interface=ether5
/ipv6 settings
set disable-ipv6=yes
/ip address
add address=192.168.76.254/24 interface=LAN network=192.168.76.0
add address=192.168.77.254/24 interface=VPN network=192.168.77.0
/ip dhcp-client
add default-route-tables=main interface=WAN
/ip dhcp-server
add address-pool=dhcp_pool1 interface=LAN name=dhcp1
/ip dhcp-server network
add address=192.168.76.0/24 dns-server=1.1.1.1,8.8.8.8 gateway=192.168.76.254
/ip ipsec identity
add auth-method=digital-signature certificate=Mikrotik-CA generate-policy=port-strict match-by=certificate mode-config=cfg-ikev2 peer=peer-ikev2 policy-template-group=Group-ikev2 remote-certificate=Client1@mikrotik.local remote-id=\
fqdn:Client1@mikrotik.local
/ip ipsec policy
set 0 disabled=yes dst-address=0.0.0.0/0 proposal=*2 src-address=0.0.0.0/0
add dst-address=192.168.77.0/24 group=Group-ikev2 proposal=proposal-ikev2 src-address=0.0.0.0/0 template=yes
/system clock
set time-zone-autodetect=no time-zone-name=Europe/Budapest
/system ntp client
set enabled=yes
/system ntp client servers
add address=0.hu.pool.ntp.org
add address=1.hu.pool.ntp.org
In the Mikrotik log I see it is connected for a while.
2026-02-02 15:37:22 ipsec,info new ike2 SA (R): peer-ikev2 XXXX
2026-02-02 15:37:22 ipsec,info,account peer authorized: peer-ikev2 XXXXX
2026-02-02 15:37:22 ipsec,info acquired 192.168.77.198 address for XXXXX CN=Client1@mikrotik.local
2026-02-02 15:37:22 ipsec,error no proposal chosen
2026-02-02 15:37:22 ipsec,info releasing address 192.168.77.198
I am sure there is a small mistake, but I do not find it at all.
All cert is in the right place under machine