I try to establish a successful IPSec tunnel between a RB4011 and my laptop with the Shrew IPSec client.
Everything seems well, Shrew says that the tunnel is established, but I can’t ping the router.
So I looked at the log, and had a phase 2 failure, due to the missing of a matching policy, so I checked, and there was obviously a problem because no dynamic policy was created, even if there was an active peer.
I cannot see anything wrong in your configuration (except that I’ve read somewhere that aggressive mode is not considered secure any more, but I’m no crypto expert, and it’s off-topic anyway), so the only issue I can imagine is a bug associated to IKE(v1)'s policy negotiation (or specifically to aggressive mode), or a mismatch between the proposed list of transforms for phase 2 (/ip ipsec proposal).
Mikrotik’s log should show you enough info if you:
terminate the Shrew connection
set /system logging add topics=ipsec,!packet
run /log print follow-only file=ipsec-start where topics~“ipsec”
start the Shrew connection and wait until it reaches a stable state (which takes less than a second if I remember well)
break the /log print …
download the file ipsec-start.txt and start studying it.
Do you have any specific reason to use Shrew rather than the Windows’ embedded VPN client in IKEv2 mode?
So I tried with IKEv2 embedded client, but, correct me if I’m wrong, it need either a certificate or a login/password.
In ROS I use a PSK (and don’t want to use certificates), so it can’t work…