Hi guys,
I’ve been google’ing for 2 days now, and I’m loosing hope… If anyone can point me in the right direction, I’d be extremely grateful!
I used this guide to setup the tunnel between 2 sites: http://forum.mikrotik.com/t/mikrotik-behind-nat-to-mikrotik-ipsec-ike2-with-certs-tunnel-eoip/144952/1
It works, I managed to get the tunnel up, and I can ping Mikrotik on site A can ping the LAN IP of site B, and vice versa.
However, I can’t get the LAN on either site to ping the other side.
Routes (site A):
0 A S 0.0.0.0/0 <public_ip_gw> 1
1 ADC 10.22.22.0/24 10.22.22.1 loopback 0
2 ADC <public_net> <public_ip> ether1 0
3 A S 192.168.1.0/24 192.168.3.1 loopback 1
4 ADC 192.168.3.0/24 192.168.3.1 bridge 0
Routes (site B):
# DST-ADDRESS PREF-SRC GATEWAY DISTANCE
0 ADS 0.0.0.0/0 <public_ip_gw> 1
1 ADC 10.22.22.0/24 10.22.22.2 ether1 0
2 ADC <public_net>/24 <public_ip> ether1 0
3 ADC 192.168.1.0/24 192.168.1.1 bridge 0
4 A S 192.168.3.0/24 192.168.1.1 ether1 1
Addresses (Site A):
# ADDRESS NETWORK INTERFACE
0 ;;; defconf
192.168.3.1/24 192.168.3.0 bridge
1 <public> <public> ether1
2 10.22.22.1/24 10.22.22.0 loopback
Addresses (Site B):
# ADDRESS NETWORK INTERFACE
0 ;;; defconf
192.168.1.1/24 192.168.1.0 bridge
1 D <public> <public> ether1
2 D 10.22.22.2/24 10.22.22.0 ether1
Firewall Rules (Site A):
(FILTER - excluding the defaults…)
1 chain=forward action=accept src-address=192.168.1.0/24 dst-address=192.168.3.0/24 log=no log-prefix=""
2 chain=forward action=accept src-address=192.168.3.0/24 dst-address=192.168.1.0/24 log=no log-prefix=""
3 ;;; IPSec
chain=input action=accept protocol=udp dst-port=500,4500 log=no log-prefix=""
NAT
0 chain=srcnat action=src-nat to-addresses=10.22.22.1 dst-address=10.22.22.2
1 chain=srcnat action=accept src-address=192.168.3.0/24 dst-address=192.168.1.0/24 log=no log-prefix=""
2 ;;; defconf: masquerade
chain=srcnat action=masquerade out-interface-list=WAN ipsec-policy=out,none
RAW
0 chain=prerouting action=notrack log=no log-prefix="" src-address=192.168.3.0/24 dst-address=192.168.1.0/24
1 chain=prerouting action=notrack log=no log-prefix="" src-address=192.168.1.0/24 dst-address=192.168.3.0/24
2 D ;;; special dummy rule to show fasttrack counters
chain=prerouting action=passthrough
Firewall Rules (Site B):
FILTER
1 chain=forward action=accept src-address=192.168.1.0/24 dst-address=192.168.3.0/24 log=no log-prefix=""
2 chain=forward action=accept src-address=192.168.3.0/24 dst-address=192.168.1.0/24 log=no log-prefix=""
NAT
0 ;;; Tunnel specific rule
chain=srcnat action=src-nat to-addresses=10.22.22.2 dst-address=10.22.22.1 log=no log-prefix=""
1 chain=srcnat action=accept src-address=192.168.1.0/24 dst-address=192.168.3.0/24 log=no log-prefix=""
2 ;;; defconf: masquerade
chain=srcnat action=masquerade out-interface-list=WAN ipsec-policy=out,none
RAW
0 chain=prerouting action=notrack log=no log-prefix="" src-address=192.168.1.0/24 dst-address=192.168.3.0/24
1 chain=prerouting action=notrack log=no log-prefix="" src-address=192.168.3.0/24 dst-address=192.168.1.0/24
2 D ;;; special dummy rule to show fasttrack counters
chain=prerouting action=passthrough