I just got the RB400 and am most disappointed that I’ve been unable, after many hours of trying, to set up the router as a VPN client to a Cisco VPN concentrator. I am able to do this from Linux via ‘vpnc’ and/or “Strongswan” and on OS X on my Macbook Pro which supports connecting to our corporate VPN flawlessly. IPSec as it currently is on RouterOS is useless to me when connecting to our corporate VPN - and before you even suggest it, no, most of us cannot modify VPN rules on the server side to suit RouterOS’ IPSEC VPN client.
Please provide a native solution for RouterOS that supports Cisco VPN/IPSec in the same vein as “vpnc”, “StrongSwan” or OS X - this is a must and I am quite surprised this hasn’t been done so far. Running MetaRouters and such is a kludge and I’d like to use RouterOS and not flash the RB400 with OpenWRT, if possible.
IPSec as Cisco implements it. I use a username/password (XAuth), shared key and a group name to connect w/StrongSwan (Linux) and “Cisco IPSec VPN” in Network Preferences via OS X.
The “feature” is the ability for your existing IPSec client to connect to my Cisco VPN concentrator. It will not. Everything else I use does. I can provide a Strongswan config file if it’s going to be of any help to you. Or you can see what “vpnc” does. I have not been able to configure the IPSec client on the RB400 to connect… and I tried, believe me.
conn “ezvpn”
keyexchange=ikev1
ikelifetime=1440m
keylife=60m
ike=3des-sha1-modp1024
aggressive=yes
xauth=client #Xauth client mode
left=%defaultroute #local IP used to connect to IOS
leftid=IPSECRemoteUser #IKEID (group name) used for IOS
leftsourceip=%config #apply received IP
leftauth=psk
rightauth=psk
leftauth2=xauth #use PSK for group RA and Xauth for user cisco
right=70.168.54.2 #gateway (IOS) IP
rightsubnet=172.16.0.0/16
xauth_identity=martin #identity for Xauth, password in ipsec.secrets
auto=add
I have the exact same problem, so exact same request.
The main problem I’ve found so far is the lack of possibilities for the “My ID” parameter in the IPSEC configuration.
For “Cisco IPSEC”, we should be able to enter it as a “Key Identifier” (for ISAKMP packet, “Identification Payload”, ID type should be " KEY_ID" ) - “KEY_ID”, which is not possible for now (only “auto”, “fqdn” & “user_fqdn” proposed so far).
Hello there!
I’m suppose feature request is to add KEY-ID in Mikrotik Ipsec Peer config, to use Mikrotik as client to ASA.
It was not request to use “EasyVPN Cisco client” as client with Mikrotik.
ASA allow create different psk groups, not default only.
While mikrotik try to establish connection to ASA it din’t provide an group name, and ASA use default group, this is not applicable. Usually default group used as template, not as working one.
So I’m next in such feature, two hands raised for it. =)
Thank you!
Well, as explained by drkop, “compatibility-options=skip-peer-id-validation” parameter is not the appropriate solution here.
Testing my setup with this one, the result is still the same.
The detailed demand has been well explained by Circuitsoft : the ID_TYPE for Group ID needs to be completed, “KEY_ID” is the one expected but I guess all the other missing may be added at the same time too.