IPSec transport mode configuration issue

Hi,
Yesterday I setup an IPSec tunnel successfully, but I found out that if the remote peer would go offline for some reason the tunnel did not re-establish by itself. I kept receiving some errors in the remote router’s log saying the “IPSec could not start the quick mode” … So, I decided to try l2tp and ipsec as transport, but for some reason the IPSec does not start … the tunnel establishes fine, but no sign of IPSec … no installed sa …
Can someone please check my configs and tell me what I am doing wrong ? Thanks …

Router 1
WAN (Static IP) - 187.XXX.XXX.30
LAN - 192.168.1.0/24

Router 2
WAN - DHCP
LAN - 192.168.2.0/24

Router 1

[admin@cmi-branch.bra] /ppp secret> print detail
Flags: X - disabled
 1   name="soho" service=l2tp caller-id="" password="123456" profile=default-encryption
     local-address=172.1.1.1 remote-address=172.1.1.2 routes="192.168.2.0/24 172.1.1.2 1" limit-bytes-in=0
     limit-bytes-out=0

[admin@cmi-branch.bra] /interface l2tp-server server> print
          enabled: yes
          max-mtu: 1460
          max-mru: 1460
             mrru: disabled
   authentication: pap,chap,mschap1,mschap2
  default-profile: default-encryption

[admin@cmi-branch.bra] /ip ipsec peer> print
Flags: X - disabled
 1   address=172.1.1.2/32:500 auth-method=pre-shared-key secret="soho_ipsec" generate-policy=yes
     exchange-mode=main send-initial-contact=yes nat-traversal=no proposal-check=obey hash-algorithm=md5
     enc-algorithm=3des dh-group=modp1024 lifetime=1d lifebytes=0 dpd-interval=disable-dpd dpd-maximum-failures=5

Router 2

[admin@soho] /interface l2tp-client> print
Flags: X - disabled, R - running
 0  R name="l2tp-cmi" max-mtu=1460 max-mru=1460 mrru=disabled connect-to=187.XXX.XXX.30 user="soho"
      password="123456" profile=default-encryption add-default-route=no dial-on-demand=no allow=pap,chap,mschap1,mschap2

[admin@soho] /ip ipsec peer> print
Flags: X - disabled
 1   address=172.1.1.1/32:500 auth-method=pre-shared-key secret="soho_ipsec" generate-policy=no
     exchange-mode=main send-initial-contact=yes nat-traversal=no proposal-check=obey hash-algorithm=md5
     enc-algorithm=3des dh-group=modp1024 lifetime=1d lifebytes=0 dpd-interval=disable-dpd dpd-maximum-failures=5

[admin@soho] /ip ipsec peer> .. policy print
Flags: X - disabled, D - dynamic, I - inactive
 0   src-address=172.1.1.2/32:any dst-address=172.1.1.1/32:any protocol=all action=encrypt level=require ipsec-protocols=esp
     tunnel=no sa-src-address=172.1.1.2 sa-dst-address=172.1.1.1 proposal=default priority=0

So, the l2tp tunnel connects fine, traffic flows in both directions but there is no IPSec SA and no IPSec activity in the logs …