Hello,
I hope I’m in the right section; I couldn’t find a more suitable one.
At one location, there is an hEX S / RB760iGS set up to establish an IPsec connection with the central office (for RDP access to the location).
Access to the hEX S from the central office (via Winbox) also works.
After upgrading from 7.17.2 to 7.18 (also tested with 7.18.2), the IPsec tunnels still establish, but access is no longer working.
Access to Winbox on the MikroTik via IPsec:
Windows Client (10.67.23.66) > MikroTik (10.75.31.2)
Is there an explanation for this, or is it a bug?
Here is the configuration:
\
2025-03-12 15:43:45 by RouterOS 7.17.2
software id = 0H5E-J9HA
model = RB750Gr3
serial number = HEX09CQREZS
/interface bridge
add name=bridge1
/ip ipsec profile
add dh-group=ecp521 dpd-interval=30s dpd-maximum-failures=5 enc-algorithm=
aes-256 hash-algorithm=sha512 lifetime=18h name=profile.GIGG
proposal-check=exact
add dh-group=ecp521 dpd-interval=30s dpd-maximum-failures=5 enc-algorithm=
aes-256 hash-algorithm=sha512 lifetime=18h name=profile.ALGM
proposal-check=exact
add dh-group=ecp521 dpd-interval=30s dpd-maximum-failures=5 enc-algorithm=
aes-256 hash-algorithm=sha512 lifetime=18h name=profile.ALGV
proposal-check=exact
/ip ipsec peer
add address=212.23.xx/32 exchange-mode=ike2 name=peer.GIGG profile=
profile.GIGG
add address=80.151.xx/32 exchange-mode=ike2 name=peer.ALGV profile=
profile.ALGV
add address=80.147.xx/32 exchange-mode=ike2 name=peer.ALGM profile=
profile.ALGM
/ip ipsec proposal
set [ find default=yes ] disabled=yes
add auth-algorithms=“” enc-algorithms=aes-128-gcm lifetime=8h name=
proposal.GIGG pfs-group=ecp256
add auth-algorithms=“” enc-algorithms=aes-128-gcm lifetime=8h name=
proposal.ALGM pfs-group=ecp256
add auth-algorithms=“” enc-algorithms=aes-128-gcm lifetime=8h name=
proposal.ALGV pfs-group=ecp256
/ip pool
add name=pool1 ranges=10.75.31.11-10.75.31.19
/interface bridge port
add bridge=bridge1 interface=ether1
add bridge=bridge1 interface=ether2
add bridge=bridge1 interface=ether3
add bridge=bridge1 interface=ether4
/ip neighbor discovery-settings
set discover-interface-list=!dynamic
/ipv6 settings
set disable-ipv6=yes
/ip address
add address=10.0.1.1/24 interface=ether5 network=10.0.1.0
add address=10.75.31.2/24 interface=ether5 network=10.75.31.0
add address=192.168.0.53/24 interface=bridge1 network=192.168.0.0
/ip dhcp-client
add disabled=yes interface=bridge1
/ip dns
set servers=192.168.0.234
/ip firewall filter
add action=accept chain=forward comment=
“accept established,related, untracked” connection-state=
established,related,untracked disabled=yes
add action=accept chain=input comment=“accept established,related,untracked”
connection-state=established,related,untracked disabled=yes
add action=accept chain=output comment=“accept established,related,untracked”
connection-state=established,related,untracked disabled=yes
add action=accept chain=input disabled=yes log=yes
add action=accept chain=output disabled=yes log=yes
add action=accept chain=forward disabled=yes log=yes
add action=accept chain=input comment=“accept established,related,untracked”
connection-state=established,related,untracked
add action=drop chain=input comment=“drop invalid” connection-state=invalid
log=yes log-prefix=“drop invalid”
add action=accept chain=input comment=“accept ICMP” log=yes log-prefix=
“accept ICMP” protocol=icmp
add action=fasttrack-connection chain=forward comment=fasttrack
connection-state=established,related disabled=yes hw-offload=yes
add action=accept chain=forward comment=
“accept established,related, untracked” connection-state=
established,related,untracked
add action=drop chain=forward comment=“drop invalid” connection-state=invalid
log-prefix=“drop invalid”
add action=accept chain=input comment=“WinBox Port5” dst-port=8291
in-interface=ether5 log=yes log-prefix=“WinBox Port5” protocol=tcp
add action=accept chain=input comment=“WinBox IPsec ALGM” dst-port=8291
ipsec-policy=in,ipsec log=yes log-prefix=“WinBox IPsec ALGM” protocol=tcp
src-address=10.66.0.0/24
add action=accept chain=input comment=“WinBox IPsec ALGV” dst-port=8291
ipsec-policy=in,ipsec log=yes log-prefix=“WinBox IPsec ALGV” protocol=tcp
src-address=10.67.23.0/24
add action=accept chain=input comment=“WinBox IPsec GIGG” dst-port=8291
ipsec-policy=in,ipsec log=yes log-prefix=“WinBox IPsec GIGG” protocol=tcp
src-address=192.168.91.0/24
add action=accept chain=input comment=“WinBox LAN” dst-port=8291
in-interface=bridge1 log=yes log-prefix=“WinBox LAN” protocol=tcp
src-address=192.168.0.0/24
add action=accept chain=input comment=“WinBox All” disabled=yes dst-port=8291
log=yes log-prefix=“WinBox All” protocol=tcp
add action=accept chain=forward comment=“accept ICMP” protocol=icmp
add action=accept chain=forward comment=“SMB Out” dst-address=192.168.91.205
dst-port=445 log=yes log-prefix=“SMB Out” protocol=tcp src-address=
192.168.0.0/24
add action=accept chain=forward comment=“RDP TCP In” dst-address=
192.168.0.0/24 dst-port=3389 ipsec-policy=in,ipsec log=yes log-prefix=
“RDP TCP In” protocol=tcp
add action=accept chain=forward comment=“RDP UDP In” dst-address=
192.168.0.0/24 dst-port=3389 ipsec-policy=in,ipsec log=yes log-prefix=
“RDP UDP In” protocol=udp
add action=accept chain=forward comment=“IPSec Policy In” disabled=yes
ipsec-policy=in,ipsec log=yes log-prefix=“IPSec Policy In”
add action=accept chain=forward comment=“IPSec Policy Out” disabled=yes
ipsec-policy=out,ipsec log=yes log-prefix=“IPSec Policy Out”
add action=drop chain=input
add action=drop chain=forward
/ip firewall nat
add action=netmap chain=dstnat dst-address=10.75.0.0/24 src-address=
192.168.91.0/24 to-addresses=192.168.0.0/24
add action=netmap chain=srcnat dst-address=192.168.91.0/24 src-address=
192.168.0.0/24 to-addresses=10.75.0.0/24
add action=netmap chain=dstnat dst-address=10.75.0.0/24 src-address=
10.66.0.0/24 to-addresses=192.168.0.0/24
add action=netmap chain=srcnat dst-address=10.66.0.0/24 src-address=
192.168.0.0/24 to-addresses=10.75.0.0/24
add action=netmap chain=dstnat dst-address=10.75.0.0/24 src-address=
10.79.28.0/24 to-addresses=192.168.0.0/24
add action=netmap chain=srcnat dst-address=10.79.28.0/24 src-address=
192.168.0.0/24 to-addresses=10.75.0.0/24
add action=netmap chain=dstnat dst-address=10.75.0.0/24 log-prefix=xxx
src-address=10.70.28.0/24 to-addresses=192.168.0.0/24
add action=netmap chain=srcnat dst-address=10.70.28.0/24 log-prefix=yyy
src-address=192.168.0.0/24 to-addresses=10.75.0.0/24
add action=netmap chain=dstnat dst-address=10.75.0.0/24 src-address=
10.70.31.0/24 to-addresses=192.168.0.0/24
add action=netmap chain=srcnat dst-address=10.70.31.0/24 src-address=
192.168.0.0/24 to-addresses=10.75.0.0/24
add action=netmap chain=dstnat dst-address=10.75.0.0/24 log=yes log-prefix=
test src-address=10.67.23.0/24 to-addresses=192.168.0.0/24
add action=netmap chain=srcnat dst-address=10.67.23.0/24 src-address=
192.168.0.0/24 to-addresses=10.75.0.0/24
/ip hotspot profile
set [ find default=yes ] html-directory=hotspot
/ip ipsec identity
add my-id=address:10.75.31.2 peer=peer.GIGG
add my-id=address:10.75.31.2 peer=peer.ALGM
add my-id=address:10.75.31.2 peer=peer.ALGV
/ip ipsec policy
set 0 disabled=yes
add dst-address=192.168.91.0/24 level=unique peer=peer.GIGG proposal=
proposal.GIGG src-address=10.75.0.0/24 tunnel=yes
add dst-address=10.79.28.0/24 level=unique peer=peer.GIGG proposal=
proposal.GIGG src-address=10.75.0.0/24 tunnel=yes
add dst-address=10.66.0.0/24 level=unique peer=peer.ALGM proposal=
proposal.ALGM src-address=10.75.0.0/24 tunnel=yes
add dst-address=192.168.91.0/24 level=unique peer=peer.GIGG proposal=
proposal.GIGG src-address=10.75.31.0/24 tunnel=yes
add dst-address=10.66.0.0/24 level=unique peer=peer.ALGM proposal=
proposal.ALGM src-address=10.75.31.0/24 tunnel=yes
add dst-address=10.70.31.0/24 level=unique peer=peer.ALGV proposal=
proposal.ALGV src-address=10.75.0.0/24 tunnel=yes
add dst-address=10.70.31.0/24 level=unique peer=peer.ALGV proposal=
proposal.ALGV src-address=10.75.31.0/24 tunnel=yes
add dst-address=10.67.23.0/24 level=unique peer=peer.ALGV proposal=
proposal.ALGV src-address=10.75.31.0/24 tunnel=yes
add dst-address=10.67.23.0/24 level=unique peer=peer.ALGV proposal=
proposal.ALGV src-address=10.75.0.0/24 tunnel=yes
add dst-address=10.70.28.0/24 peer=peer.ALGV proposal=proposal.ALGV
src-address=10.75.0.0/24 tunnel=yes
/ip route
add disabled=no distance=3 dst-address=0.0.0.0/0 gateway=192.168.0.254
routing-table=main scope=30 suppress-hw-offload=no target-scope=10
vrf-interface=bridge1
/system clock
set time-zone-autodetect=no time-zone-name=Europe/Berlin
/system note
set note=WUSM show-at-cli-login=yes
/system ntp client
set enabled=yes
/system ntp client servers
add address=pool.ntp.org