I’m struggling to get a site-to-site IPSec VPN working. Packets that I expect to run over the IPSec tunnel session just cause the in-template-mismatches statistics counter to increase.
Anyone know what that statistics counter means? Or what is an in-template?
Likely the src/dst address of your packets don’t match with your policy dst-address=192.168.1.30/32 src-address=10.10.0.0/24
I recommend using a tunnel interface (GRE or IPIP) over IPsec transport instead of using an IPsec tunnel.
That’s what I thought as well. However, they do match, at least /tool sniffer confirms as much.
Good idea, especially since IPSec traffic to/from the MikroTik itself does work. It’s just forwarded traffic that gets dropped. I’m not sure I’ll be able to convince the other side of the IPSec session to change their config though, so I welcome any other suggestions, please.
Which was added to match packets inbound from the peer. It’s fairly standard for an IPSec policy to be bi-directional on other platforms. It seems whacky that on RouterOS a policy rule that can only match inbound packets ends up preventing outbound packets from matching the outbound rule??
I know some IPsec software requires separate policies for IN and OUT (and even FORWARD although that normally is a no-op) but
in RouterOS those 2 policy rules are generated from a single policy statement. That is of course part of the effort of RouterOS
to make it easier to manage the underlying Linux software. You can remove the other line.