I have an RB1000U running RouterOS 4.0 (3.30 did the same thing) trying to setup an IPSEC tunnel between this unit and a Cisco at another company. They have configured their end and provided the ipsec details for me to finish the connection.
Private Network on my side is 192.168.80.0/24
Private Network on their side is 10.48.239.0/24
Installed-sa shows the ipsec tunnel is established, but I cannot get any packets to go from our Mikrotik (97.65.x.x) to their Cisco (12.39.x.x). Packets from their network are making it to us (Current Bytes is 6540), but Packets from our network to them is (0) according to Installed-SAs print. I’ve tried to ping multiple ips in the 10.48.239.x network and just get a request timed out. I’ve done this from the Mikrotik as well as from servers on my network behind the Mikrotik RB1000 Router. Servers behind the router use the default gateway ip of 192.168.80.1 which is bound to the Mikrotik Ether2.
Anyone have an idea on what might be configured incorrectly? It seems to be on my end since I’m showing 0 bytes for the Installed SA that has our 97.65.x.x ip as the source address and 12.39.x.x as the destination address.
[admin@mikrotik] > ip ipsec installed-sa print
1 E spi=0x6AE6B9A src-address=12.39.xx.xx dst-address=97.65.xx.xx
auth-algorithm=sha1 enc-algorithm=3des replay=4 state=mature
auth-key=“4bb065e7514xxxxxxxx”
enc-key=“0988987a7fc89xxxxxxxx”
addtime=oct/26/2009 20:06:05 add-lifetime=6h24m/8h
usetime=oct/26/2009 20:11:26 use-lifetime=0s/0s current-bytes=6540
lifebytes=0/0
5 E spi=0x26E68167 src-address=97.65.xx.xx dst-address=12.39.xx.xx auth-algorithm=sha1 enc-algorithm=3des
replay=4 state=mature auth-key=“5918aa9d2928dxxxxxxxxxxxxxxxxxxx”
enc-key=“37bcf49ad1xxxxxxxxxxxxxxxxxxxxxx” add-lifetime=6h24m/8h use-lifetime=0s/0s
lifebytes=0/0
[admin@mikrotik] /ip ipsec policy> print
1 src-address=192.168.80.0/24:any dst-address=10.48.239.0/24:any protocol=all action=encrypt level=require
ipsec-protocols=esp tunnel=yes sa-src-address=97.65.xx.xx sa-dst-address=12.39.xx.xx proposal=labcorp
priority=0
[admin@mikrotik] /ip ipsec peer> print
1 address=12.39.xx.xx/32:500 auth-method=pre-shared-key secret=“changedxxxchanged” generate-policy=no
exchange-mode=main send-initial-contact=yes nat-traversal=no proposal-check=obey hash-algorithm=sha1
enc-algorithm=3des dh-group=modp1024 lifetime=8h lifebytes=0 dpd-interval=disable-dpd
dpd-maximum-failures=1
[admin@mikrotik] /ip ipsec remote-peers> print
1 local-address=97.65.xx.xx remote-address=12.39.xx.xx state=established side=responder established=8h24m51s
[admin@mikrotik] /ip ipsec proposal> print
1 name=“othercorp” auth-algorithms=sha1 enc-algorithms=3des lifetime=8h pfs-group=modp1024