Hi,
i have a stupid issue with my MT HEX gr3.
I have IPSec tunnel between MT and FortiGate. Tunnel works fine (peer is active, all policies are estabilished), but there is no traffic through that.
I have some rules in Firewall/NAT/RAW, see below.
/ip firewall filter
21 ;;; FROM L2TP Clients
chain=forward action=accept dst-address-list=My_VPN_ADDRESS_LIST
in-interface-list=My_L2TP_INTERFACES log=no log-prefix="SSA"
22 ;;; From LOCAL LAN
chain=forward action=accept src-address-list=VPN_ACCESS_LIST
dst-address-list=My_VPN_ADDRESS_LIST log=no log-prefix=""
23 ;;; Drop unauthorized
chain=forward action=reject reject-with=icmp-network-unreachable
dst-address-list=My_VPN_ADDRESS_LIST log=no log-prefix=""
/ip firewall nat
0 ;;; Accept traffic to tunnel tunnel
chain=srcnat action=accept src-address-list=Local_LAN_Networks
dst-address-list=My_VPN_ADDRESS_LIST
1 ;;; Accept traffic from Atman tunnel
chain=srcnat action=accept src-address-list=My_VPN_ADDRESS_LIST
dst-address-list=Local_LAN_Networks
/ip firewall raw
1 ;;; Bypass IPSec traffic to Remote
chain=prerouting action=notrack
src-address-list=Local_LAN_Networks dst-address-list=My_VPN_ADDRESS_LIST
2 ;;; Bypass IPSec traffic from Remote
chain=prerouting action=notrack
src-address-list=My_VPN_ADDRESS_LISTdst-address-list=Local_LAN_Networks
BUT! When i change Connection Tracking to off, traffic will go through Tunnel without any problem.
Any idea why that isn’t working properly?