Hello all,
I have followed tutorial from MUM meeting on how to set up IPSec IKEv2 road warrior configuration.
I want to setup server for our company to get rid of OpenVPN.
We use 192.168.0.0/24 network, and we have VPN with our business partner, and they are in 10.0.0.0/8 and 94.242.41.0/24 (not important range at the moment). We use NAT to connect to their network.
I have created certificates for each employee, and windows/Android clients connect without any issue. I have disabled default route because I don’t want internet traffic to go through VPN.
Problem is that i can ping any host on our/partner network, company DNS works, even SSH works (although with occasional reconnect), but HTTP does not work.
RDC also does not work, it disconnects after few seconds.
Our main WAN IP is 78.134.209.170, IP pool for VPN is 192.168.43.0/24. I have tried with 10.x.x.x and 172.16.x.x, without success.
Where did I do wrong? I’m trying to make it work for 2 days now, trying almost every setting on ipsec and firewall.
# oct/16/2020 15:30:37 by RouterOS 6.46.7
# software id = M0DN-WZ2Z
#
# model = 2011UiAS-2HnD
# serial number = 467304D2829E
/interface bridge
add admin-mac=4C:5E:0C:00:00:01 arp=proxy-arp auto-mac=no comment=3 \
fast-forward=no name=LAN-WIFI
add name=VPN
/ip address
add address=192.168.43.1/24 interface=VPN network=192.168.43.0
add address=192.168.0.91/24 interface=LAN-WIFI network=192.168.0.0
add address=78.134.209.170/29 interface=ETH1-METRONET network=78.134.209.168
add address=10.124.10.100/16 interface=ETH3-PARTNER network=10.124.0.0
/ip route
add distance=1 gateway=78.134.209.169 routing-mark=METRONET
add distance=1 gateway="T-COM PPPoE" routing-mark=T-COM
add comment="PARTNER mreza" distance=1 dst-address=10.0.0.0/8 gateway=10.124.1.100
add comment="PARTNER mreza" distance=1 dst-address=194.242.41.0/24 gateway=10.124.1.100
/ip ipsec policy group
add name="group vpn.company.hr"
/ip ipsec profile
add dh-group=modp2048,modp1536,modp1024 enc-algorithm=\
aes-256,aes-192,aes-128,3des hash-algorithm=sha256 name=\
"profile vpn.company.hr"
/ip ipsec peer
add exchange-mode=ike2 local-address=78.134.209.170 name=peer passive=yes \
profile="profile vpn.company.hr" send-initial-contact=no
/ip ipsec proposal
set [ find default=yes ] enc-algorithms=3des
add auth-algorithms=sha512,sha256,sha1 enc-algorithms="aes-256-cbc,aes-256-ctr\
,aes-256-gcm,aes-192-ctr,aes-192-gcm,aes-128-cbc,aes-128-ctr,aes-128-gcm" \
lifetime=8h name="proposal vpn.company.hr" pfs-group=none
/ip pool
add name=vpn_ipsec-pool ranges=192.168.43.10-192.168.43.254
/ip ipsec mode-config
add address-pool=vpn_ipsec-pool address-prefix-length=32 name=\
"modeconf vpn.company.hr" split-include=192.168.0.0/24,10.0.0.0/8 \
static-dns=192.168.0.10 system-dns=no
/ip firewall filter
add action=accept chain=forward connection-nat-state=dstnat
add action=accept chain=input comment=\
"accept related and established connections" connection-state=\
established,related,untracked
add action=drop chain=input comment="drop Invalid connections" \
connection-state=invalid log-prefix=DROP_INVALID
add action=accept chain=input comment="accept IPSec ports" dst-address=\
78.134.209.170 dst-port=500,4500 protocol=udp
add action=accept chain=input comment="accept IPSec ESP procotol" \
dst-address=78.134.209.170 protocol=ipsec-esp
add action=accept chain=input comment="Allow VPN traffic to this router" \
ipsec-policy=in,ipsec src-address=192.168.43.0/24
add action=fasttrack-connection chain=forward connection-mark=!ipsec \
connection-state=established,related
add action=accept chain=forward comment=\
"accept related and established connections" connection-state=\
established,related,untracked
add action=accept chain=forward comment="DEFAULT: Accept In IPsec policy." \
ipsec-policy=in,ipsec
add action=accept chain=forward comment="DEFAULT: Accept Out IPsec policy." \
ipsec-policy=out,ipsec
add action=accept chain=forward comment="Allow VPN traffic to LAN network" \
dst-address=192.168.0.0/24 ipsec-policy=in,ipsec src-address=\
192.168.43.0/24
add action=accept chain=forward comment="Allow VPN traffic to PARTNER network" \
dst-address=10.0.0.0/8 ipsec-policy=in,ipsec src-address=192.168.43.0/24
add action=drop chain=forward comment="Allow VPN traffic to this router" \
ipsec-policy=in,ipsec src-address=192.168.43.0/24
add action=drop chain=forward comment="drop invalid connections" \
/ip firewall mangle
add action=mark-connection chain=forward comment="Mark IPsec" ipsec-policy=\
out,ipsec new-connection-mark=ipsec
add action=mark-connection chain=forward comment="Mark IPsec" ipsec-policy=\
in,ipsec new-connection-mark=ipsec
add action=change-mss chain=forward ipsec-policy=in,ipsec new-mss=1350 \
passthrough=yes protocol=tcp src-address=192.168.43.0/24 tcp-flags=syn \
tcp-mss=!0-1350
add action=change-mss chain=forward dst-address=192.168.43.0/24 ipsec-policy=\
out,ipsec new-mss=1350 passthrough=yes protocol=tcp tcp-flags=syn \
tcp-mss=!0-1350
/ip firewall nat
add action=masquerade chain=srcnat comment="NAT kroz Metronet" out-interface=\
ETH1-METRONET
add action=masquerade chain=srcnat comment="NAT kroz T-com" out-interface=\
"T-COM PPPoE"4
add action=masquerade chain=srcnat comment="NAT PARTNER" out-interface=ETH3-PARTNER
/ip ipsec identity
add auth-method=digital-signature certificate=vpn.company.hr \
generate-policy=port-strict match-by=certificate mode-config=\
"modeconf vpn.company.hr" peer=peer policy-template-group=\
"group vpn.company.hr" remote-certificate=\
firstname.lastname@company.hr remote-id=\
user-fqdn:firstname.lastname@company.hr
/ip ipsec policy
set 0 group="group vpn.company.hr" proposal="proposal vpn.company.hr"
add dst-address=192.168.43.0/24 group="group vpn.company.hr" proposal=\
"proposal vpn.company.hr" src-address=0.0.0.0/0 template=yes
route print on my PC is fine.
IPv4 Route Table
===========================================================================
Active Routes:
Network Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.10.2 192.168.10.100 55
10.0.0.0 255.0.0.0 On-link 192.168.43.254 46
10.255.255.255 255.255.255.255 On-link 192.168.43.254 301
78.134.209.170 255.255.255.255 192.168.10.2 192.168.10.100 56
127.0.0.0 255.0.0.0 On-link 127.0.0.1 331
127.0.0.1 255.255.255.255 On-link 127.0.0.1 331
127.255.255.255 255.255.255.255 On-link 127.0.0.1 331
192.168.0.0 255.255.255.0 On-link 192.168.43.254 46
192.168.0.255 255.255.255.255 On-link 192.168.43.254 301
192.168.10.0 255.255.255.0 On-link 192.168.10.100 311
192.168.10.100 255.255.255.255 On-link 192.168.10.100 311
192.168.10.255 255.255.255.255 On-link 192.168.10.100 311
192.168.15.0 255.255.255.0 On-link 192.168.15.1 291
192.168.15.1 255.255.255.255 On-link 192.168.15.1 291
192.168.15.255 255.255.255.255 On-link 192.168.15.1 291
192.168.43.0 255.255.255.0 On-link 192.168.43.254 46
192.168.43.254 255.255.255.255 On-link 192.168.43.254 301
192.168.43.255 255.255.255.255 On-link 192.168.43.254 301
192.168.56.0 255.255.255.0 On-link 192.168.56.1 291
192.168.56.1 255.255.255.255 On-link 192.168.56.1 291
192.168.56.255 255.255.255.255 On-link 192.168.56.1 291
224.0.0.0 240.0.0.0 On-link 127.0.0.1 331
224.0.0.0 240.0.0.0 On-link 192.168.10.100 311
224.0.0.0 240.0.0.0 On-link 192.168.56.1 291
224.0.0.0 240.0.0.0 On-link 192.168.15.1 291
224.0.0.0 240.0.0.0 On-link 192.168.43.254 301
255.255.255.255 255.255.255.255 On-link 127.0.0.1 331
255.255.255.255 255.255.255.255 On-link 192.168.10.100 311
255.255.255.255 255.255.255.255 On-link 192.168.56.1 291
255.255.255.255 255.255.255.255 On-link 192.168.15.1 291
255.255.255.255 255.255.255.255 On-link 192.168.43.254 301
===========================================================================
