Hello,
I have situation where I can pass phase 1 but I stuck on phase 2.
Here is what they need at Cisco (don’t know a model) side .
IKE policy:
encryption algorithm: 3DES
hash algorithm: SHA
authentication method: Pre-Shared Key
Diffie-Hellman group: #2
lifetime: 86400 seconds, no volume limit
preshared-key: *********
IPSec policy:
IP adresa peer-a: 97.152.258.18
encryption algorithm: 3DES
hash algorithm: SHA
mode: tunnel
local network (adresa servera): 160.30.60.20/30
lifetime: 4608000 kilobytes/3600 seconds
Destination IP address: 160.30.60.20;160.30.60.21; 160.30.60.22; 160.30.60.23
Destination IP port: 80, 443
Protocol: tcp
Config on Cisco:
Crypto Map “Parlay” 110 ipsec-isakmp
Peer = 222.144.122.218
Extended IP access list IPSEC_MM
access-list IPSEC_MM permit ip 160.30.60.20 0.0.0.3 host 10.10.10.254
Current peer: 222.144.122.218
Security association lifetime: 4608000 kilobytes/3600 seconds
PFS (Y/N): N
Transform sets={ 3DES_SHA, }
Here is Mikrotik side:
Mikrotik configuration (ver. 2.9.51):
Address list:
Address: 10.10.10.254/26 Network: 10.10.10.192 Broadcast: 10.10.10.255 Interface: DMZ
Address: 192.168.2.1/24 Network: 192.168.2.255 Broadcast: 192.168.2.255 LAN
Address: 222.144.122.218/29 Nerwork: 222.144.122.216 Broadcast: 222.144.122.213 WAN
ip ipsec policy> print
Flags: X - disabled, D - dynamic, I - invalid
0 src-address=10.10.10.254/32:any dst-address=160.30.60.20/30:any protocol=all action=encrypt
level=require ipsec-protocols=esp tunnel=yes sa-src-address=222.144.122.218
sa-dst-address=97.152.258.18 proposal=Tm manual-sa=none dont-fragment=clear
ip ipsec> peer print
Flags: X - disabled
0 address=97.152.258.18/32:500 secret=“********” generate-policy=yes
exchange-mode=main send-initial-contact=yes proposal-check=obey hash-algorithm=sha1
enc-algorithm=3des dh-group=modp1024 lifetime=1d lifebytes=4608000
1 X address=97.152.258.18/32:500 secret=“” generate-policy=no exchange-mode=main
send-initial-contact=yes proposal-check=obey hash-algorithm=md5 enc-algorithm=3des
dh-group=modp1024 lifetime=1d lifebytes=0
ip ipsec> proposal print
Flags: X - disabled
0 name=“Tm” auth-algorithms=sha1 enc-algorithms=3des lifetime=1h lifebytes=460800
pfs-group=modp1024
1 X name=“default” auth-algorithms=md5 enc-algorithms=3des lifetime=0s lifebytes=0
pfs-group=none
installed-sa print
Flags: A - AH, E - ESP, P - pfs, M - manual
Any idea why I can’t pass phase2 and connect to their server?
Thank you
Regards
Samples