I am trying to set up an IPSec VPN to a Fortigate 100A, in preparation to eventually replace our routers with Mikrotik routers, but I cannot seem to get the VPN to work right.
The problem I am experiencing now is that I see the SAs installed on the Mikrotik, I see the tunnel is up on the Fortigate, but I cannot pass traffic through the Mikrotik.
10.202.208.0/24 <—> 10.202.208.1 (Fortigate) 1.1.1.1 <—> Internet <—> 2.2.2.2 (Mikrotik) 10.200.7.1 <—> 10.200.7.0/24
When I ping from 10.202.208.2 to 10.200.7.2, the packets do not make it to 10.200.7.2. I do see them coming through the Mikrotik, passing through the following:
- Mangle Prerouting ESP
- Mangle Input ESP
- Firewall Input ESP
- Mangle Prerouting ICMP
- NAT Dstnat ICMP
and that is it – just to be clear, it does NOT go through Mangle or Filter Forward tables.
When I ping from 10.202.208.2 to 10.200.7.1 (the Mikrotik itself), it does work, and the packets go through:
- Mangle Prerouting ESP
- Mangle Input ESP
- Firewall Input ESP
- Mangle Prerouting ICMP
- Mangle Input ICMP
- Firewall Input ICMP
- And similarly for the outbound reply
Any ideas? I’ve been banging my head against the wall on this one!
Here is my ipsec configuration: (Let me know if something else is needed)
/ip ipsec proposal
set [ find default=yes ] enc-algorithms=3des
add auth-algorithms=md5 enc-algorithms=3des name=MD5-3DES-DH5-30min pfs-group=modp1536
add enc-algorithms=aes-256-cbc name=SHA1-AES256-DH5-30min pfs-group=modp1536
/ip ipsec peer
add address=89.167.208.4/32 dh-group=modp1536 enc-algorithm=aes-256 lifetime=
8h local-address=71.81.149.75 policy-group=default secret=“testing123”
/ip ipsec policy
add dst-address=10.202.208.0/24 proposal=SHA1-AES256-DH5-30min
sa-dst-address=1.1.1.1 sa-src-address=2.2.2.2 src-address=
10.200.7.0/24 tunnel=yes
add dst-address=10.200.7.0/24 proposal=SHA1-AES256-DH5-30min sa-dst-address=
2.2.2.2 sa-src-address=1.1.1.1 src-address=10.202.208.0/24
tunnel=yes
Any ideas? I’ve been banging my head against this for a long time!