I am trying to setup another GRE over IPSEC tunnel, but run into the issue that the policy I want to create immediately gets the status ‘Invalid’:
[admin@router] /ip ipsec policy> print detail
Flags: T - template, B - backup, X - disabled, D - dynamic, I - invalid, A - active, * - default
0 T X* group=default src-address=::/0 dst-address=::/0 protocol=all proposal=default template=yes
1 I peer=gre1 tunnel=yes src-address=10.0.0.9/32 src-port=any dst-address=10.0.0.10/32 dst-port=any protocol=all action=encrypt level=require ipsec-protocols=esp sa-src-address=:: sa-dst-address=::
proposal=vpn-s2s ph2-count=0
I did configure the sa-src-address and sa-dst-address but probably due to the invalid status these are not accepted. Even adding the policy by only specifying the peer and the name of the policy (‘/ip ipsec policy add name=“gre1” peer=gre1’) will result in an invalid status.
The peer configuration:
[admin@router] /ip ipsec peer> print
0 R ;;; GRE Tunnel
name="gre1" address=2.2.2.2/32 local-address=1.1.1.1 passive=yes profile=vpn-s2s exchange-mode=main send-initial-contact=no
The profile:
[admin@router] /ip ipsec profile> print
Flags: * - default
0 * name="default" hash-algorithm=sha1 enc-algorithm=aes-128,3des dh-group=modp2048,modp1024 lifetime=1d proposal-check=obey nat-traversal=yes dpd-interval=2m dpd-maximum-failures=5
1 name="vpn-s2s" hash-algorithm=sha1 enc-algorithm=aes-128 dh-group=modp1024 lifetime=1d proposal-check=obey nat-traversal=no dpd-interval=30s dpd-maximum-failures=3
Rebooting the router does not help, the issue remains.
Anyone have a clue what could be happening here?