Hello,
I have used the guide located here to create a mikrotik to mikrotik tunnel: http://wiki.mikrotik.com/wiki/IPsec#Site_to_Site_IpSec_Tunnel. The tunnel was up and working for a couple of days and then suddenly stopped working without any config change. Here’s my config. I’ve changed public IP and key to mask identity.
Site 1:
routerboard: yes
model: CCR1016-12G
serial-number: 3F68021E4032
current-firmware: 3.03
upgrade-firmware: 3.04
0 address=1.1.1.1/32 port=500 auth-method=pre-shared-key secret=“key”
generate-policy=no exchange-mode=main send-initial-contact=yes nat-traversal=yes
my-id-user-fqdn=“” proposal-check=obey hash-algorithm=sha1 enc-algorithm=3des
dh-group=modp1024 lifetime=1d lifebytes=0 dpd-interval=2m dpd-maximum-failures=5
0 src-address=10.33.33.0/24 src-port=any dst-address=192.168.15.0/24 dst-port=any
protocol=all action=encrypt level=require ipsec-protocols=esp tunnel=yes
sa-src-address=2.2.2.2 sa-dst-address=1.1.1.1 proposal=default priority=0
0 * name=“default” auth-algorithms=sha1 enc-algorithms=3des lifetime=30m
pfs-group=modp1024Site 2:
routerboard: yes
model: 2011UAS-2HnD
serial-number: 402702E4E616
current-firmware: 3.04
upgrade-firmware: 3.08
0 address=2.2.2.2/32 port=500 auth-method=pre-shared-key secret=“key”
generate-policy=no exchange-mode=main send-initial-contact=yes nat-traversal=yes
my-id-user-fqdn=“” proposal-check=obey hash-algorithm=sha1 enc-algorithm=3des
dh-group=modp1024 lifetime=1d lifebytes=0 dpd-interval=2m dpd-maximum-failures=5
0 src-address=192.168.15.0/24 src-port=any dst-address=10.33.33.0/24 dst-port=any
protocol=all action=encrypt level=require ipsec-protocols=esp tunnel=yes
sa-src-address=1.1.1.1 sa-dst-address=2.2.2.2 proposal=default priority=0
0 * name=“default” auth-algorithms=sha1 enc-algorithms=3des lifetime=30m
pfs-group=modp1024Also have NAT exemption on both sides. As noted, the tunnel worked for a period of time and then stopped working. Previously both LANs were able to ping each other. Phase 1 failing. Here’s the log from site 1 during a continuous ping from an inside host.
11:36:06 ipsec,debug suitable outbound SP found: 10.33.33.0/24[0] 192.168.15.0/24[0] proto=any dir=out
11:36:06 ipsec,debug suitable inbound SP found: 192.168.15.0/24[0] 10.33.33.0/24[0] proto=any dir=in
11:36:06 ipsec,debug new acquire 10.33.33.0/24[0] 192.168.15.0/24[0] proto=any dir=out
11:36:06 ipsec,debug,packet (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=0:0)
11:36:06 ipsec,debug,packet (trns_id=3DES encklen=0 authtype=hmac-sha)
11:36:06 ipsec,debug request for establishing IPsec-SA was queued due to no phase1 found.
11:36:07 ipsec,debug,packet 324 bytes from 2.2.2.2[500] to 1.1.1.1[500]
11:36:07 ipsec,debug,packet sockname 2.2.2.2[500]
11:36:07 ipsec,debug,packet send packet from 2.2.2.2[500]
11:36:07 ipsec,debug,packet send packet to 1.1.1.1[500]
11:36:07 ipsec,debug,packet src4 2.2.2.2[500]
11:36:07 ipsec,debug,packet dst4 1.1.1.1[500]
11:36:07 ipsec,debug,packet 1 times of 324 bytes message will be sent to 1.1.1.1[500]
11:36:07 ipsec,debug,packet 47ed3aae c9cdbf94 00000000 00000000 01100200 00000000 00000144 0d000038
11:36:07 ipsec,debug,packet 00000001 00000001 0000002c 01010001 00000024 01010000 800b0001 000c0004
11:36:07 ipsec,debug,packet 00015180 80010005 80030001 80020002 80040002 0d000014 4a131c81 07035845
11:36:07 ipsec,debug,packet 5c5728f2 0e95452f 0d000014 8f8d8382 6d246b6f c7a8a6a4 28c11de8 0d000014
11:36:07 ipsec,debug,packet 439b59f8 ba676c4c 7737ae22 eab8f582 0d000014 4d1e0e13 6deafa34 c4f3ea9f
11:36:07 ipsec,debug,packet 02ec7285 0d000014 80d0bb3d ef54565e e84645d4 c85ce3ee 0d000014 9909b64e
11:36:07 ipsec,debug,packet ed937c65 73de52ac e952fa6b 0d000014 7d9419a6 5310ca6f 2c179d92 15529d56
11:36:07 ipsec,debug,packet 0d000014 cd604643 35df21f8 7cfdb2fc 68b6a448 0d000014 90cb8091 3ebb696e
11:36:07 ipsec,debug,packet 086381b5 ec427b1f 0d000014 16f6ca16 e4a4066d 83821a0f 0aeaa862 0d000014
11:36:07 ipsec,debug,packet 4485152d 18b6bbcd 0be8a846 9579ddcc 00000014 afcad713 68a1f1c9 6b8696fc
11:36:07 ipsec,debug,packet 77570100
11:36:07 ipsec,debug,packet resend phase1 packet 47ed3aaec9cdbf94:0000000000000000
11:36:17 ipsec,debug,packet 324 bytes from 2.2.2.2[500] to 1.1.1.1[500]
11:36:17 ipsec,debug,packet sockname 2.2.2.2[500]
11:36:17 ipsec,debug,packet send packet from 2.2.2.2[500]
11:36:17 ipsec,debug,packet send packet to 1.1.1.1[500]
11:36:17 ipsec,debug,packet src4 2.2.2.2[500]
11:36:17 ipsec,debug,packet dst4 1.1.1.1[500]
11:36:17 ipsec,debug,packet 1 times of 324 bytes message will be sent to 1.1.1.1[500]
11:36:17 ipsec,debug,packet 47ed3aae c9cdbf94 00000000 00000000 01100200 00000000 00000144 0d000038
11:36:17 ipsec,debug,packet 00000001 00000001 0000002c 01010001 00000024 01010000 800b0001 000c0004
11:36:17 ipsec,debug,packet 00015180 80010005 80030001 80020002 80040002 0d000014 4a131c81 07035845
11:36:17 ipsec,debug,packet 5c5728f2 0e95452f 0d000014 8f8d8382 6d246b6f c7a8a6a4 28c11de8 0d000014
11:36:17 ipsec,debug,packet 439b59f8 ba676c4c 7737ae22 eab8f582 0d000014 4d1e0e13 6deafa34 c4f3ea9f
11:36:17 ipsec,debug,packet 02ec7285 0d000014 80d0bb3d ef54565e e84645d4 c85ce3ee 0d000014 9909b64e
11:36:17 ipsec,debug,packet ed937c65 73de52ac e952fa6b 0d000014 7d9419a6 5310ca6f 2c179d92 15529d56
11:36:17 ipsec,debug,packet 0d000014 cd604643 35df21f8 7cfdb2fc 68b6a448 0d000014 90cb8091 3ebb696e
11:36:17 ipsec,debug,packet 086381b5 ec427b1f 0d000014 16f6ca16 e4a4066d 83821a0f 0aeaa862 0d000014
11:36:17 ipsec,debug,packet 4485152d 18b6bbcd 0be8a846 9579ddcc 00000014 afcad713 68a1f1c9 6b8696fc
11:36:17 ipsec,debug,packet 77570100
11:36:17 ipsec,debug,packet resend phase1 packet 47ed3aaec9cdbf94:0000000000000000
Thanks.