My ipsec and gre is working... traffic is routed via GRE. But ... all traffic to paloalto comes from 10.0.0.2(Mikrotik GRE adress 10.0.0.2/30). How can i fix it ? i need to see clients LAN ip adress.
Rule #2 is not disabled. And I have a feeling it might be interfering because as it’s shown it masquerades just every traffic passing its routing engine (and that includes IPsec traffic).
You have to make the masquerade rule less greedy. It might be simply the matter of setting out-interface property to only masquerade traffic flowing through your WAN interface. If MT’s WAN Interface is used as breakout to internet. If clients are supposed to break out to internet via palo alto, then it’s probably palo alto who should be doing the SRC-NAT for clients on MT side.
Thete are many ways to build (secure) VPN over internet. If the other end ¶ only supports said combination, zhen other possibilities are out of the game obviously.
As soon as you configure GRE with IP address, it becomes a normal network interface from IP point of view and same principles apply as for usual interfaces (e.g. ethernet interface used as WAN interface or PPPoE interface).
And the above is true for both sides of the tunnel. PA has to know about MT’s LAN subnet so it can route traffic towards it via tunnel. Etc.
To be clear, PALO can terminate traffic with a policy-based VPN solution (you need to configure a proxy ID for traffic selectors in PALO). GRE is not only one option for MT ↔ PALO IPsec, but only one possible if you want build a route-based VPN solution with other vendors (because MikroTik still does not support VTI interfaces: /)
Actually this is only valid for IKE v1. If you use IKE v2, the tunnel is up without entering the proxy id…
In my tests;
IKE v1 : Must have proxy id on both sides.. MT ipsec policy src and dst address must same with PA Proxy ID
IKE v2: Even if proxy id is empty in PA, tunnel is up
With this rule i don’t need gre anymore;
/ip ipsec policy
add action=none dst-address=10.10.5.0/24 src-address=10.10.5.0/24
add dst-address=0.0.0.0/0 level=unique peer=ipsecpeer proposal=IPSec_Crypto
src-address=10.10.5.0/24 tunnel=yes