TarekH
January 2, 2025, 9:56am
1
hello
I have an IPsec tunnel set between a Sophos XG and a mikrotik
connection is established but no data is passing
Both devices have public ips
firewall rules set on both devices but still nothing
Sophos engineers checked their side - all is good
what am i missing ?
/interface bridge
add name=bridge-LAN port-cost-mode=short
/interface ethernet
set [ find default-name=ether1 ] mac-address=74:4D:28:A6:86:06 name=ether1-WAN-MAIN-DSL-MODEM
set [ find default-name=ether2 ] mac-address=74:4D:28:A6:86:07
set [ find default-name=ether3 ] mac-address=74:4D:28:A6:86:08
set [ find default-name=ether4 ] mac-address=74:4D:28:A6:86:09
set [ find default-name=ether5 ] advertise=100M-baseT-half,100M-baseT-full,1G-baseT-half,1G-baseT-full mac-address=74:4D:28:A6:86:0A
set [ find default-name=ether10 ] mac-address=74:4D:28:A6:86:0B name=ether6
set [ find default-name=ether9 ] mac-address=74:4D:28:A6:86:0C name=ether7
set [ find default-name=ether8 ] mac-address=74:4D:28:A6:86:0D
set [ find default-name=ether7 ] mac-address=74:4D:28:A6:86:0E name=ether9
set [ find default-name=ether6 ] mac-address=74:4D:28:A6:86:0F name=ether10
/interface wireguard
add listen-port=13231 mtu=1380 name=Mikrotik-Leb
/interface ethernet switch port
set 5 default-vlan-id=0
set 6 default-vlan-id=0
set 7 default-vlan-id=0
set 8 default-vlan-id=0
set 9 default-vlan-id=0
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
/interface lte apn
set [ find default=yes ] ip-type=ipv4 use-network-apn=no
/ip ipsec profile
set [ find default=yes ] dpd-interval=2m dpd-maximum-failures=5
add dh-group=modp2048 enc-algorithm=aes-256 hash-algorithm=sha256 name=socitrans nat-traversal=no
/ip ipsec peer
add address=xxx.xxx.xxx.78/32 exchange-mode=ike2 name=socitrans-peer profile=socitrans
/ip ipsec proposal
add auth-algorithms=sha512,sha256 enc-algorithms=aes-256-cbc,aes-256-ctr,aes-256-gcm name=socitrans-proposal pfs-group=modp2048
/ip pool
add name=dhcp_pool0 ranges=192.168.1.112-192.168.1.199
add name=dhcp_poolVPN ranges=192.168.251.2-192.168.251.254
/ip dhcp-server
add address-pool=dhcp_pool0 interface=bridge-LAN name=dhcp1
/ip smb users
set [ find default=yes ] disabled=yes
/port
set 0 name=serial0
/ppp profile
set *0 only-one=no
add dns-server=192.168.1.1 local-address=dhcp_pool0 name=profile1 only-one=no remote-address=dhcp_poolVPN
/routing bgp template
set default disabled=no output.network=bgp-networks
/routing ospf instance
add disabled=no name=default-v2
/routing ospf area
add disabled=yes instance=default-v2 name=backbone-v2
/system logging action
set 0 memory-lines=1111
set 1 disk-lines-per-file=11111
/interface bridge port
add bridge=bridge-LAN interface=ether2
add bridge=bridge-LAN interface=ether3
add bridge=bridge-LAN interface=ether4
add bridge=bridge-LAN interface=ether5
add bridge=bridge-LAN interface=ether6
add bridge=bridge-LAN interface=ether7
add bridge=bridge-LAN interface=ether8
add bridge=bridge-LAN interface=ether9
add bridge=bridge-LAN interface=ether10
add bridge=bridge-LAN interface=ether11
add bridge=bridge-LAN interface=ether12
add bridge=bridge-LAN interface=ether13
/ip firewall connection tracking
set udp-timeout=10s
/ip neighbor discovery-settings
set discover-interface-list=all
/ip settings
set max-neighbor-entries=8192
/ipv6 settings
set forward=no max-neighbor-entries=8192
/interface l2tp-server server
set default-profile=profile1 enabled=yes keepalive-timeout=60 max-mru=1400 max-mtu=1400 mrru=1600 use-ipsec=yes
/interface list member
add comment=defconf interface=bridge-LAN list=LAN
add comment=defconf interface=ether1-WAN-MAIN-DSL-MODEM list=WAN
/interface ovpn-server server
set auth=sha1,md5
/interface wireguard peers
add allowed-address=192.168.120.0/24,10.125.100.0/24,192.168.1.0/24,192.168.130.0/24 comment=DRC endpoint-address=xxx.xxx.xxx.186 endpoint-port=13231 interface=Mikrotik-Leb is-responder=yes name=peer1 persistent-keepalive=10s public-key=\
/ip address
add address=192.168.1.111/24 interface=bridge-LAN network=192.168.1.0
add address=yyy.yyy.yyy174/29 interface=ether1-WAN-MAIN-DSL-MODEM network=yyy.yyy.yyy168
add address=10.125.100.101/24 interface=Mikrotik-Leb network=10.125.100.0
/ip arp
add address=192.168.1.112 interface=bridge-LAN mac-address=00:45:E2:F6:AB:D7
/ip dhcp-client
add disabled=yes interface=bridge-LAN
/ip dhcp-server network
add address=192.168.1.0/24 dns-server=192.168.1.1 gateway=192.168.1.111
/ip dns
set allow-remote-requests=yes servers=xxxxxxxx
/ip dns static
add address=192.168.88.1 name=router.lan type=A
/ip firefirewall filter
add action=accept chain=forward dst-address=192.168.1.0/24 src-address=192.168.120.0/24
add action=accept chain=forward dst-address=192.168.1.0/24 src-address=192.168.140.0/24
add action=accept chain=forward dst-address=192.168.120.0/24 src-address=192.168.1.0/24
add action=accept chain=forward dst-address=192.168.140.0/24 src-address=192.168.1.0/24
add action=drop chain=forward comment="drop NVR " disabled=yes dst-address=192.168.1.10
add action=accept chain=input protocol=ipsec-esp
add action=accept chain=input protocol=udp src-port=4500
/ip firewall nat
add action=src-nat chain=srcnat out-interface=ether1-WAN-MAIN-DSL-MODEM to-addresses=yyy.yyy.yyy174
add action=accept chain=srcnat disabled=yes dst-address=192.168.140.0/24 log=yes src-address=192.168.1.0/24 to-addresses=yyy.yyy.yyy174
/ip ipsec identity
add peer=socitrans-peer
/ip ipsec policy
add dst-address=192.168.140.0/24 peer=socitrans-peer proposal=socitrans-proposal src-address=192.168.1.0/24 tunnel=yes
/ip route
add disabled=no dst-address=0.0.0.0/0 gateway=yyy.yyy.yyy169
add disabled=no dst-address=192.168.120.0/24 gateway=Mikrotik-Leb routing-table=main suppress-hw-offload=no
Maybe it’s the first NAT rule that is src-natting before a packet gets encrypted, after which it cannot be encrypted because the src-address mismatches that of the policy:
/ip firewall nat
add action=src-nat chain=srcnat out-interface=ether1-WAN-MAIN-DSL-MODEM ipsec-policy=out,none to-addresses=yyy.yyy.yyy.174
TarekH
January 2, 2025, 10:40am
3
i removed everything from NAT and used only your command
same issue no ping whatsoever
Perhaps also a policy template is advisable alongside the tunnel one you’ve created which would be added to the identity:
/ip ipsec policy group
add name=socitrans-policy-group
/ip ipsec policy
add group=socitrans-policy-group proposal=socitrans-proposal template=yes
/ip ipsec identity
set policy-template-group=socitrans-policy-group
Hello. The problem is on the Mikrotik side, because the correct traffic flow is not defined. There is no correct Input and Forward section. You only have forward rules defined, there is no initial stage Input chain. Traffic will work incorrectly. Rules are executed from top to bottom and the order also matters. And all this also affects the security of the router.
INPUT CHAIN → To the Router or to Router Services. Directional flow is WAN to Router, and LAN to Router.
FORWARD CHAIN → Through the Router. Direction flow is LAN to LAN, LAN to WAN, WAN to LAN.
OUTPUT CHAIN → From the Router. Directional flow is Router to WAN.
Overall it looks like this -
/ip firewall filter
add action=accept chain=input comment="Allow Established,Related" \
connection-state=established,related,untracked
add action=drop chain=input comment="drop invalid packets" connection-state=\
invalid
add action=accept chain=input comment="ICMP"
add action=accept chain=input comment="Allow DNS to local" dst-port=53 \
in-interface-list=LAN protocol=udp
add action=accept chain=input comment="Allow DNS to local" dst-port=53 \
in-interface-list=LAN protocol=tcp
add action=accept chain=input comment=L2TP dst-port=500,1701,4500 protocol=udp
add action=accept chain=input comment="IKE IPSec" protocol=ipsec-esp
add action=accept chain=input in-interface-list=LAN
add action=drop chain=input comment="Drop all else"
add action=accept chain=forward comment="defconf: accept in ipsec policy" \
ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy" \
ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment=Fatsttrack \
connection-state=established,related hw-offload=yes
add action=accept chain=forward comment="Allow Established,Related" \
connection-state=established,related,untracked
add action=drop chain=forward comment="Drop Invalid Connections" \
connection-state=invalid
add action=accept chain=forward comment="Access Internet From LAN" \
in-interface-list=LAN out-interface-list=WAN
add action=accept chain=forward comment=VPN dst-address-list=Local-LAN \
src-address-list=VPN
add action=accept chain=forward comment="allow port forwarding" \
connection-nat-state=dstnat
add action=drop chain=forward comment="Drop everything else"
"example address.."
/ip firewall address-list
add address=192.168.88.0/24 list=Local-LAN
add address=192.168.99.0/24 list=VPN
TarekH
January 2, 2025, 11:22am
6
Perhaps also a policy template is advisable alongside the tunnel one you’ve created which would be added to the identity:
/ip ipsec policy group
add name=socitrans-policy-group
/ip ipsec policy
add group=socitrans-policy-group proposal=socitrans-proposal template=yes
/ip ipsec identity
set policy-template-group=socitrans-policy-group
this was already done before and is crucial for the ipsec tunnel connection success
my problem is not ipsec , it is either firewall or routing
sindy
January 2, 2025, 11:49am
7
If you had to set up a template (which is missing in your original configuration export, so how was @TheCat supposed to know that), it means that either your own static policy that was present in the export is incompatible with the settings on the Sophos side (the traffic selector, the proposal, or both) or that the Sophos expects your end to only behave as a responder.
So:
post the current configuration export
start pinging some address in 192.168.140.0/24, specifying src-address=192.168.1.111 in order to make the packets match the traffic selector of the policy (without specifying the source address, the router uses the one of the out-interface through which the gateway is reachable, i.e. the WAN one in your case)
post the output of /ip ipsec policy print detail
post the output of /ip ipsec installed-sa print detail while the ping is still running
No need to obfuscate the keys, they are short-lived, but of course don’t forget to obfuscate the public addresses, just do it systematically so that each unique public address looks the same at all places and remains unique.
Besides, you should take seriously what @johnson73 wrote - as the default action in firewall, which is taken if the packet did not match any rule, is accept , your firewall rules as they look in the original export are useless - what they do not accept gets accepted anyway by default.
At this stage, such a conclusion is premature.
TarekH
January 2, 2025, 11:53am
8
Hello. The problem is on the Mikrotik side, because the correct traffic flow is not defined. There is no correct Input and Forward section. You only have forward rules defined, there is no initial stage Input chain. Traffic will work incorrectly. Rules are executed from top to bottom and the order also matters. And all this also affects the security of the router.
INPUT CHAIN → To the Router or to Router Services. Directional flow is WAN to Router, and LAN to Router.
FORWARD CHAIN → Through the Router. Direction flow is LAN to LAN, LAN to WAN, WAN to LAN.
OUTPUT CHAIN → From the Router. Directional flow is Router to WAN.
Overall it looks like this -
/ip firewall filter
add action=accept chain=input comment="Allow Established,Related" \
connection-state=established,related,untracked
add action=drop chain=input comment="drop invalid packets" connection-state=\
invalid
add action=accept chain=input comment="ICMP"
add action=accept chain=input comment="Allow DNS to local" dst-port=53 \
in-interface-list=LAN protocol=udp
add action=accept chain=input comment="Allow DNS to local" dst-port=53 \
in-interface-list=LAN protocol=tcp
add action=accept chain=input comment=L2TP dst-port=500,1701,4500 protocol=udp
add action=accept chain=input comment="IKE IPSec" protocol=ipsec-esp
add action=accept chain=input in-interface-list=LAN
add action=drop chain=input comment="Drop all else"
add action=accept chain=forward comment="defconf: accept in ipsec policy" \
ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy" \
ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment=Fatsttrack \
connection-state=established,related hw-offload=yes
add action=accept chain=forward comment="Allow Established,Related" \
connection-state=established,related,untracked
add action=drop chain=forward comment="Drop Invalid Connections" \
connection-state=invalid
add action=accept chain=forward comment="Access Internet From LAN" \
in-interface-list=LAN out-interface-list=WAN
add action=accept chain=forward comment=VPN dst-address-list=Local-LAN \
src-address-list=VPN
add action=accept chain=forward comment="allow port forwarding" \
connection-nat-state=dstnat
add action=drop chain=forward comment="Drop everything else"
"example address.."
/ip firewall address-list
add address=192.168.88.0/24 list=Local-LAN
add address=192.168.99.0/24 list=VPN
did not work - a tracert shows the ping arrives from a pc to the router (mikrotik) and then nothing
this is my current firewall
/ip firewall address-list
add address=192.168.1.0/24 list=LAN
add address=192.168.140.0/24 list=VPN
/ip firewall connection tracking
set udp-timeout=10s
/ip firewall filter
add action=accept chain=forward dst-address=192.168.1.0/24 src-address=192.168.120.0/24
add action=accept chain=forward dst-address=192.168.120.0/24 src-address=192.168.1.0/24
add action=accept chain=input comment="Allow Established,Related" connection-state=established,related,untracked
add action=drop chain=input comment="drop invalid packets" connection-state=invalid
add action=accept chain=input comment=ICMP
add action=accept chain=input comment="Allow DNS to local" dst-port=53 in-interface-list=LAN protocol=udp
add action=accept chain=input comment="Allow DNS to local" dst-port=53 in-interface-list=LAN protocol=tcp
add action=accept chain=input comment=L2TP dst-port=500,1701,4500 protocol=udp
add action=accept chain=input comment="IKE IPSec" protocol=ipsec-esp
add action=accept chain=input in-interface-list=LAN
add action=accept chain=forward comment="defconf: accept in ipsec policy" ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy" ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment=Fatsttrack connection-state=established,related hw-offload=yes
add action=accept chain=forward comment="Allow Established,Related" connection-state=established,related,untracked
add action=drop chain=forward comment="Drop Invalid Connections" connection-state=invalid
add action=accept chain=forward comment=VPN dst-address-list=LAN src-address-list=VPN
add action=accept chain=forward comment=VPN dst-address-list=VPN src-address-list=LAN
add action=accept chain=forward comment="allow port forwarding" connection-nat-state=dstnat
/ip firewall nat
add action=src-nat chain=srcnat ipsec-policy=out,none out-interface=ether1-WAN-MAIN-DSL-MODEM to-addresses=yyy.yyy.yyy.174
TarekH
January 2, 2025, 12:00pm
9
If you had to set up a template (which is missing in your original configuration export, so how was @TheCat supposed to know that), it means that either your own static policy that was present in the export is incompatible with the settings on the Sophos side (the traffic selector, the proposal, or both) or that the Sophos expects your end to only behave as a responder.
So:
post the current configuration export
start pinging some address in 192.168.140.0/24, specifying src-address=192.168.1.111 in order to make the packets match the traffic selector of the policy (without specifying the source address, the router uses the one of the out-interface through which the gateway is reachable, i.e. the WAN one in your case)
post the output of /ip ipsec policy print detail
post the output of /ip ipsec installed-sa print detail while the ping is still running
No need to obfuscate the keys, they are short-lived, but of course don’t forget to obfuscate the public addresses, just do it systematically so that each unique public address looks the same at all places and remains unique.
Besides, you should take seriously what @johnson73 wrote - as the default action in firewall, which is taken if the packet did not match any rule, is accept , your firewall rules as they look in the original export are useless - what they do not accept gets accepted anyway by default.
At this stage, such a conclusion is premature.
it is the current config - i reposted the IPSEC section for better clarity
ipsec is active, maybe i need to route something ?!
/ip ipsec policy group
add name=socitrans
/ip ipsec profile
set [ find default=yes ] dpd-interval=2m dpd-maximum-failures=5
add dh-group=modp2048 enc-algorithm=aes-256 hash-algorithm=sha256 name=socitrans nat-traversal=no
/ip ipsec peer
add address=xxx.xxx.xxx.78/32 exchange-mode=ike2 name=socitrans-peer profile=socitrans
/ip ipsec proposal
add auth-algorithms=sha512,sha256 enc-algorithms=aes-256-cbc,aes-256-ctr,aes-256-gcm name=socitrans-proposal pfs-group=modp2048
/ip ipsec identity
add peer=socitrans-peer
/ip ipsec policy
add dst-address=192.168.140.0/24 peer=socitrans-peer proposal=socitrans-proposal src-address=192.168.1.0/24 tunnel=yes
Where did you get the last rule in the forward section that drops everything? Drop?? And also input? That’s not correct.
First we need to have correct traffic rolls and then we can look further at the route and the rest. Was there a restart after the FW rule changes?
TarekH
January 2, 2025, 12:09pm
11
rule 15 is drop invalid connection
i removed the last drop rule as i am working remotely , couldnt risk being disconnected too
i dont think drop will affect the ipsec connection no ?
sindy
January 2, 2025, 12:15pm
12
The configuration in the original post does not configure the policy template you declare to be present in response to the suggestion of @TheCat12 . So one of those must be wrong - either you actually did not add the template and misunderstood @TheCat12 ’s suggestion to add a template for a plain static policy you already had, or the export in the OP is not the current one.
If you came here for assistance, you have to cooperate - I gave you diagnostic step to perform.
If you came to quarrel, I’m fine with that too, but I won’t participate.
of course if you make changes, you will need to restart, there will be a disconnect.
Firewall entries must be correct for everything to work stably. If you modify the entries, then it will affect the operation.
For incoming traffic that is in the ‘‘Input’’ chain, the last entry will always be ‘‘drop all’’ and the ‘‘forward’’ chain the last entry will also be ‘‘drop-all’’. This means that all defined rules are executed and everything else that is not defined is ‘‘dropped’’. That is correct.
If after all this it does not work for you, then you need to check whether you have defined the address-list entries correctly. Then the ipsec entries..
TarekH
January 2, 2025, 12:45pm
14
The configuration in the original post does not configure the policy template you declare to be present in response to the suggestion of @TheCat12 . So one of those must be wrong - either you actually did not add the template and misunderstood @TheCat12 ’s suggestion to add a template for a plain static policy you already had, or the export in the OP is not the current one.
If you came here for assistance, you have to cooperate - I gave you diagnostic step to perform.
If you came to quarrel, I’m fine with that too, but I won’t participate.
Happy new year , you seem to be in a bad mood
i reposted the ipsec config - are these what u r talking about ? or am i still missing something else ?
sindy
January 2, 2025, 12:55pm
15
That’s the state of my mind most of the time, nothing to worry about.
I gave you an itemized list of the steps aimed to check what is actually going on here . More may be needed depending on the outcome. export shows the manually created configuration, print shows the actual outcome, including dynamically created objects that export cannot show by design.
The export of IPsec you have added into the post above confirms that you did not actually use a template as @TheCat12 suggested - it may not be wrong as such, it just indicates you need to slow down and concentrate
TarekH
January 2, 2025, 1:01pm
16
of course if you make changes, you will need to restart, there will be a disconnect.
Firewall entries must be correct for everything to work stably. If you modify the entries, then it will affect the operation.
For incoming traffic that is in the ‘‘Input’’ chain, the last entry will always be ‘‘drop all’’ and the ‘‘forward’’ chain the last entry will also be ‘‘drop-all’’. This means that all defined rules are executed and everything else that is not defined is ‘‘dropped’’. That is correct.
If after all this it does not work for you, then you need to check whether you have defined the address-list entries correctly. Then the ipsec entries..
i rebooted everything - still same thing .. according to the KB i just have to forward the lan subnets from remote to local and from local to remote
TarekH
January 2, 2025, 1:08pm
17
If you had to set up a template (which is missing in your original configuration export, so how was @TheCat supposed to know that), it means that either your own static policy that was present in the export is incompatible with the settings on the Sophos side (the traffic selector, the proposal, or both) or that the Sophos expects your end to only behave as a responder.
So:
post the current configuration export
start pinging some address in 192.168.140.0/24, specifying src-address=192.168.1.111 in order to make the packets match the traffic selector of the policy (without specifying the source address, the router uses the one of the out-interface through which the gateway is reachable, i.e. the WAN one in your case)
post the output of /ip ipsec policy print detail
post the output of /ip ipsec installed-sa print detail while the ping is still running
No need to obfuscate the keys, they are short-lived, but of course don’t forget to obfuscate the public addresses, just do it systematically so that each unique public address looks the same at all places and remains unique.
Besides, you should take seriously what @johnson73 wrote - as the default action in firewall, which is taken if the packet did not match any rule, is accept , your firewall rules as they look in the original export are useless - what they do not accept gets accepted anyway by default.
At this stage, such a conclusion is premature.
while pinging as you advised
[admin@RB1100-Tradium] > /ip ipsec policy print detail
Flags: T - template; B - backup; X - disabled, D - dynamic, I - invalid, A - active; * - default
0 A peer=socitrans-peer tunnel=yes src-address=192.168.1.0/24 src-port=any dst-address=192.168.140.0/24 dst-port=any protocol=all action=encrypt level=require ipsec-protocols=esp sa-src-address=yyy.yyy.yyy.174 sa-dst-address=xxx.xxx.xxx.78
proposal=socitrans-proposal ph2-count=1 ph2-state=established
1 T * group=default src-address=::/0 dst-address=::/0 protocol=all proposal=default template=yes
[admin@RB1100-Tradium] > /ip ipsec installed-sa print detail
Flags: S - seen-traffic; H - hw-aead; A - AH, E - ESP
0 HE spi=0xAE15DFC src-address=xxx.xxx.xxx.78 dst-address=yyy.yyy.yyy.174 state=mature auth-algorithm=sha512 enc-algorithm=aes-cbc enc-key-size=256
auth-key="593b6e816fc6049db7b8d2c19d974de71078cada165aa34086b837da46f404abbf35febce66210d6585e667b46811cdcc4297a0aeb3471e4a7f8bdcd8c5afae5" enc-key="d5a740114d7022467b7200deb59c9c561c08a3e150cc892d608253cf40dbddd6" add-lifetime=24m22s/30m28s
replay=128
1 SHE spi=0xC32C2CC7 src-address=yyy.yyy.yyy.174 dst-address=xxx.xxx.xxx.78 state=mature auth-algorithm=sha512 enc-algorithm=aes-cbc enc-key-size=256
auth-key="7c2d5a5535238e9933fea2a243247c9fb90f3609463ef046054e16cfc872caf60e4fe62329ede5be1605a3e4b96ae4e1a87ad5ff7dec453e83f3b7f1701d9efb" enc-key="45ae398837a52cc4d74631ef3f159d3e72f2f04a6bcc6788e4e85027c6c1e32e" addtime=2025-01-02 14:55:43
expires-in=19m50s add-lifetime=24m22s/30m28s current-bytes=12176 current-packets=161 replay=128
[admin@RB1100-Tradium] >
sindy
January 2, 2025, 1:34pm
18
OK. According to your configuration export, xxx.xxx.xxx.78 is the Sophos and yyy.yyy.yyy.174 is your Tik. The /ip ipsec installed-sa print detail shows that the security association from the Tik to the Sophos does carry traffic (there is the S indicator in the leftmost column, and there are the current-bytes=12176 and current-packets=161 values), whereas the one in the opposite direction is totally silent. So the device you ping at the Sophos side may not be responding (Windows devices by default ignore ping requests that do not come from the local subnet), or the Sophos may even not accept the incoming encrypted pings, or the routing of the responses is wrong.
So it may be a routing issue or a firewall one, but not on the Mikrotik side.
The firewall needs to be sorted out as well - I understand your concerns regarding losing remote access, but leaving the management of the device accessible from the whole internet is not the way to go.
TarekH
January 2, 2025, 2:07pm
19
OK. According to your configuration export, xxx.xxx.xxx.78 is the Sophos and yyy.yyy.yyy.174 is your Tik. The /ip ipsec installed-sa print detail shows that the security association from the Tik to the Sophos does carry traffic (there is the S indicator in the leftmost column, and there are the current-bytes=12176 and current-packets=161 values), whereas the one in the opposite direction is totally silent. So the device you ping at the Sophos side may not be responding (Windows devices by default ignore ping requests that do not come from the local subnet), or the Sophos may even not accept the incoming encrypted pings, or the routing of the responses is wrong.
So it may be a routing issue or a firewall one, but not on the Mikrotik side.
The firewall needs to be sorted out as well - I understand your concerns regarding losing remote access, but leaving the management of the device accessible from the whole internet is not the way to go.
i understand , time to recheck with sophos then
the thing is i can ping from sophos to mikrotik
TarekH
January 2, 2025, 2:24pm
20
so i dont know what happened
i am now able to ping the sophos from behind the mikrotik and from the sophos itself to the mikrotik but not behind the sophos
i think i need a route on the sophos end or another firewalll rule
you guys are awesome