first of all i never do this before. I want to create ipsec tunnel with mikrotik and cisco. Here is my network and configuration ;
Location 1
WAN IP : 4.4.4.4
NAT : 172.24.60.20
Local : 10.60.0.0 /21
Location 2
Wan IP : 5.5.5.5
Nat : 192.168.1.254 ( mikrotik )
Local : 192.168.100.0/24
Location 1 configuration (cisco),
IKE Session ( Faz 1 )
Encryption Algorithm AES-128
Hashing Algorithm MD5/HMAC-128
Diffie-Hellman Group Group 2 (1024-bit)
Authentication Mode Pre-Shared Keys
IKE Negotiation Mode Main
Rekey Time Interval 86400 seconds
IPSec Session ( Faz 2 )
Encryption Algorithm AES-128
Hashing Algorithm ESP/MD5/HMAC-128
Encapsulation Mode Tunnel
Rekey Time Interval 28800 seconds
Location 2 (Mikrotik 4.5 ) ,
Policy
Flags: X - disabled, D - dynamic, I - inactive
0 src-address=192.168.100.0/24:any dst-address=10.60.0.0/21:any protocol=all
action=encrypt level=require ipsec-protocols=esp tunnel=yes
sa-src-address=192.168.1.254 sa-dst-address=4.4.4.4 proposal=default
priority=0
Equivalent configuration is necessary on the Cisco, how to do that depends on how you NAT there.
Also, it’s a bad idea to blindly masquerade, you should at least qualify with ‘out-interface=WAN-interface-name’.
Now that you’ve changed SA source and destination IP addresses, do you see remote peers and policies being established? What do the logs say when you turn on debugging?