So, here's the situation:
I have two locations, my parent's home where I use ADSL connection and I don't have a static public IP address. Then, there's my home where I have a public IP address assigned to my router. So to tell a long story short - I would like to establish an IPsec connection in order to be able to access both networks without the need for an openVPN client or something like that. That's the plan.
Browsing the documentation for possible solutions I found maybe what I was looking for:
in the section Road Warrior setup with Mode Conf I think it's exactly what I was looking for, but apparently... something is missing from my config, as it does not work as I expect it to..
A little bit more details about my setup:
- The router connected to the ADSL connection... It does not have a public IP address as I've already mentioned, so we can consider that every time I switch it on or off the public IP address will be different. It has only one LAN network configured - 192.168.88.0/24
- The router at my home has a public IP address, which is statically configured on the outbound interface. It also has only one LAN configured - 192.168.99.0/24.
The set up looks quite straight forward so I've modified the configuration from the above mentioned link, this is how it looks like on both devices:
Server Side Configuration
[admin@MikroTik_main] > /ip ipsec export
dec/26/2013 17:07:58 by RouterOS 6.7
software id = 2DWW-HXRL
/ip ipsec mode-cfg
add address-pool=dhcp name=ipsec-cfg split-include=192.168.99.0/24
/ip ipsec policy group
add name=ipsec-group
/ip ipsec proposal
set [ find default=yes ] enc-algorithms=3des
/ip ipsec peer
add auth-method=pre-shared-key-xauth generate-policy=port-strict mode-cfg=
ipsec-cfg passive=yes policy-group=ipsec-group secret=123
/ip ipsec policy
add dst-address=192.168.99.0/24 group=ipsec-group src-address=192.168.99.0/24
template=yes
[admin@MikroTik_main] > /ip ipsec user print
NAME PASSWORD
0 MikrotikDz sample-password
[admin@MikroTik_main] > /ip pool print
NAME RANGES
0 dhcp 192.168.99.10-192.168.99.50
Client Side Configuration
[admin@MikroTik] > /ip ipsec export
dec/26/2013 17:10:20 by RouterOS 6.7
software id = AJE8-F43C
/ip ipsec proposal
set [ find default=yes ] enc-algorithms=3des
/ip ipsec peer
add address=77.[admin@MikroTik_Dupnitza] > /ip ipsec export
dec/26/2013 17:10:20 by RouterOS 6.7
software id = AJE8-F43C
/ip ipsec proposal
set [ find default=yes ] enc-algorithms=3des
/ip ipsec peer
add address=77.70.67.28/32 auth-method=pre-shared-key-xauth generate-policy=port-strict secret=123 xauth-login=
MikrotikDz xauth-password=sample-password=70.67.28/32 auth-method=pre-shared-key-xauth generate-policy=port-strict secret=123 xauth-login=
MikrotikDz xauth-password=sample-password
The end result is:
[admin@MikroTik_main] > /ip ipsec remote-peers print
[admin@MikroTik_Dupnitza] > /ip ipsec remote-peers print
0 local-address=192.168.1.2 remote-address=77.70.67.28 state=message-1-sent side=initiator
Empty! Which to me means I don't have IPsec conncetion established... What I am missing here? And the issue is, I haven't yet figured out how to troubleshoot this... In the document mentioned above the author recommends to use /ip ipsec policy dump-kernel-policies to troubleshoot IPsec connection establishment but.. when I try it on my routers, the command does not seem to be supported:
[admin@MikroTik] > /ip ipsec policy dump-kernel-policies
bad command name dump-kernel-policies (line 1 column 18)
What do you think guys? I'm a bit stuck on this...