Hello Guys
I have been setup and working okey configuration of IKEv2 with certificate and shared key as well ipsec with correct policy,
ROAD WARRIOR PURE IPSEC,SSTP,l2TP,OVPN and IKEv2 working okey on IOS,MAC,ANDROID 100% ok,have not tried win7 maybe it should work also,
Also i did import certificate in mine WIN10 trusted local store crt and pk12 cert with passphrase ,made powershell instruction to use CA from mine routeros
power command Set-VpnConnection -Name “IKEv2” -MachineCertificateIssuerFilter ‘C:\Users\isoko\Desktop\cert_export_IKEv2.crt’
So when try to use and make connection this is what i get attach made sure everything is okey since i use same ceritficate verified in StrongSwan and IOS and MACOS
I think is bug or something else IPSEC export i think is okey here is mine export
/ip ipsec policy group
set [ find default=yes ] name=“Osnoven IPSEC”
add name=“IKEV2 RSA certificate”
add name=L2TP/IPSEC
add name=“IKEV2 group preshared key”
add name=MIKROTIK-TO-MIKROTIK
add name=IPSEC
/ip ipsec profile
add enc-algorithm=aes-256,aes-192,aes-128,3des,des lifetime=6h name=profile_1
add enc-algorithm=aes-256,aes-192,aes-128,3des name=profile_2
add enc-algorithm=aes-256,aes-192,aes-128,3des name=profile_3
add enc-algorithm=aes-256,aes-192,aes-128 name=profile_4
add enc-algorithm=aes-256 name=profile_5
/ip ipsec peer
add comment=“IKEv2 RSA signature Site-to-Site” exchange-mode=ike2 name=peer01 passive=yes profile=profile_3
add comment=vpn01 name=peer18 passive=yes profile=profile_3
/ip ipsec proposal
set [ find default=yes ] enc-algorithms=aes-256-cbc,aes-192-cbc,aes-128-cbc,3des,des lifetime=4h30m pfs-group=
modp2048
add auth-algorithms=sha1,null enc-algorithms=aes-256-cbc,aes-128-cbc,3des,des lifetime=5h30m name=“IKEV1 IPSEC”
pfs-group=modp2048
add enc-algorithms=aes-256-cbc,aes-192-cbc,aes-128-cbc,3des,des lifetime=6h30m name=“IKEV2 PRESHARED KEY”
pfs-group=none
add auth-algorithms=sha256 enc-algorithms=aes-256-cbc,aes-192-cbc,aes-128-cbc,3des,des lifetime=0s name=“IKEV2 RSA”
pfs-group=none
/ip ipsec identity
add auth-method=digital-signature certificate=ikev2client comment=“MOBILEN IKEV2 ANDROID&IOS” generate-policy=
port-strict match-by=certificate mode-config=“ikev2-rsa signature” my-id=fqdn:mine sn.mynetname
peer=peer01 policy-template-group=“IKEV2 RSA certificate” remote-certificate=ikev2client remote-id=
fqdn:.sn.mynetname.net
add auth-method=digital-signature certificate=WIN10CERT comment=“WINDOWS IKEV2” generate-policy=port-strict
match-by=certificate mode-config=“ikev2-rsa signature” peer=peer01 policy-template-group=
“IKEV2 RSA certificate” remote-certificate=WIN10CERT
add generate-policy=port-strict mode-config=“ikev2-preshared key” peer=peer01 policy-template-group=
“IKEV2 group preshared key” secret=
add auth-method=pre-shared-key-xauth generate-policy=port-strict mode-config=“sfc pure ipsec” password=sfc peer=
peer18 secret=7 username=
add generate-policy=port-strict mode-config=“sfc pure ipsec” peer=peer18 policy-template-group=L2TP/IPSEC secret=\
/ip ipsec policy
set 0 dst-address=0.0.0.0/0 src-address=0.0.0.0/0
add comment=“IPSEC IKEV1” dst-address=0.0.0.0/0 group=L2TP/IPSEC proposal=“IKEV1 IPSEC” src-address=0.0.0.0/0
template=yes
add comment=“IPSEC IKEV1” dst-address=0.0.0.0/0 group=L2TP/IPSEC proposal=“IKEV1 IPSEC” src-address=0.0.0.0/0
template=yes
add comment=“IKEV2 PRESHARED KEY POLICY” dst-address=192.168.111.0/24 group=“IKEV2 group preshared key” proposal=
“IKEV2 PRESHARED KEY” src-address=0.0.0.0/0 template=yes
add comment=“IKEV2 RSA” dst-address=192.168.111.0/24 group=“IKEV2 RSA certificate” proposal=“IKEV2 RSA”
src-address=0.0.0.0/0 template=yes
So is there some bug in router OS 6.46 or some trick do make it work
Thanks for adding EAP MSCHAP and RADIUS SERVER integration on IKEV2
I hope OPENVPN will have UDP SUPPORT common Ubiquity has this feature so you can implement as well
Thanks for support
Regards


