This is an internal network with CHR’s, so forgive the ip addressing scheme. This setup is working, and speedy with the proper hardware. If you are on the road you can reach the server. No problems there. But if I need to acces the client computer it is a one way trip. With this setup I can’t reach the road warrior. I have tried different setups, but no luck there.
172.17.19.0 can reach 172.17.18.0
172.17.18.0 can’t reach 172.17.19.0
By the way. The Office has a fixed ip. The road warrior is DHCP.

Office
/ip ipsec policy group
add name=IPSecGroup
/ip ipsec profile
add dh-group=modp2048,modp1536,modp1024 enc-algorithm=aes-256,aes-192,aes-128 hash-algorithm=sha256 name=IPSecProfile
/ip ipsec peer
add exchange-mode=ike2 name=IPSecPeer passive=yes profile=IPSecProfile
/ip ipsec proposal
add auth-algorithms=sha256 name=IPSecProposal pfs-group=none
/ip pool
add name=IPSecPool ranges=192.168.77.2-192.168.77.254
/ip ipsec mode-config
add address-pool=IPSecPool address-prefix-length=32 name=IPSecModeConfig split-include=172.17.18.0/24
/ip ipsec identity
add auth-method=digital-signature certificate=VPN.Doom.Inc generate-policy=port-strict mode-config=IPSecModeConfig peer=IPSecPeer policy-template-group=IPSecGroup
/ip ipsec policy
add dst-address=192.168.77.0/24 group=IPSecGroup proposal=IPSecProposal src-address=0.0.0.0/0 template=yes
Road warrior
/ip ipsec mode-config
add name=IPSecModeConfig responder=no src-address-list=Local
/ip ipsec policy group
add name=IPSecGroup
/ip ipsec profile
add dh-group=modp2048,modp1536,modp1024 enc-algorithm=aes-256,aes-192,aes-128 hash-algorithm=sha256 name=IPSecProfile
/ip ipsec peer
add address=192.168.60.20/32 exchange-mode=ike2 name=IPSecPeer profile=IPSecProfile
/ip ipsec proposal
add auth-algorithms=sha256 name=IPSecProposal pfs-group=none
/ip ipsec identity
add auth-method=digital-signature certificate=C1@VPN.Doom.Inc.crt_0 generate-policy=port-strict mode-config=IPSecModeConfig peer=IPSecPeer policy-template-group=IPSecGroup remote-certificate=VPN.Doom.Inc.crt_0
/ip ipsec policy
add group=IPSecGroup proposal=IPSecProposal template=yes
/ip firewall address-list
add address=172.17.19.0/24 list=Local