I have an IPSec setup between two sites and I can ping the router from both sides. However I cannot ping or get any traffic to pass through the IPSec other than to the routers from the remote sides. I assumed I needed to add something to my Routes to get it working but I am shooting blanks. Any suggestions? If needed I can do an export of my config. I am running the latest stable build.
Classic (policy-based) IPsec does not take routing into account at all.
Please post your current configuration alone with some further clarification of what traffic is expected to be tunneled.
OK, this rule seems to be causing the issue over IPSec.
/ip firewall filter
add action=drop chain=forward comment=“defconf: drop all from WAN not DSTNATed” connection-nat-state=!dstnat connection-state=new disabled=yes in-interface=ether1
More information would really be helpful. I am aware the firewall needs some tweaks. Here is my config
/ip firewall filter
add chain=input dst-port=500,4500 protocol=udp src-address=2.2.2.2
add chain=input protocol=ipsec-esp src-address=2.2.2.2
add chain=output protocol=ipsec-esp src-address=2.2.2.2
add chain=input dst-port=8291 protocol=tcp src-address-list=ALLOW
add chain=input comment=“defconf: accept ICMP” protocol=icmp src-address-list=ALLOW
add action=drop chain=input protocol=icmp
add chain=input comment=“defconf: accept establieshed,related” connection-state=established,related
add action=drop chain=input comment=“defconf: drop all from WAN” in-interface=ether1
add chain=forward comment=“defconf: accept established,related” connection-state=established,related
add action=drop chain=forward comment=“defconf: drop invalid” connection-state=invalid
add action=drop chain=forward comment=“defconf: drop all from WAN not DSTNATed” connection-nat-state=!dstnat connection-state=new disabled=yes in-interface=ether1
How do I make sure my IPSec doesn’t get caught in the last line?
Check the are action accept or masquerade?
Insert before
/ip firewall filter add action=drop chain=forward comment="defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat connection-state=new disabled=yes in-interface=ether1
rules for remote LAN forward accept
add chain=forward comment="From DC to DC" dst-address=DC1.addr src-address=DC2.addr action=accept