SiteB is “central one/Headquarters” with latest stable MikroTik RouterOS.
Each Site has one local LAN subnet. IPSec tunnel from SiteA to SiteB (Tunnel1) is configured and working (over public Internet). Also between SiteB and SiteC (Tunnel2).
All IP>Routes are configured.
I need help to configure RouterOS on SiteB (HQ) to allow devices from SiteA to communicate to SiteC. So this packages (ICMP, TCP) should go through both IPSec Tunnels.
How to achieve this? How to configure IPSec>Policies in that case?
Also, if possible to have without implementation of NAT
If it’s plain IPSec (no tunnel inside like IPIP, GRE, …), just add additional policies. Between site A and B you need policies for .1 ↔ .2 (you already have this) and .1 ↔ .3 (new one). Between B and C it needs to be .2 ↔ .3 (existing) and .1 ↔ .3 (new). Also change level option from require to unique. That’s the start, then just make sure it’s not blocked by firewall somewhere.
Yeah, so creating new IPSec Policy, with .1 <> .3 , but which peer and proposal to choose? (tunnel1 and tunnel2 are different ipsec settings) etc. ?
Firewall is currently allowed all, just for test.
Everything else should be the same as the already existing policy has. That’s if you want it routed through SiteB. Now you have it configured for one remote subnet and you just need to add another. So everything else stays the same, peer, encryption, …
If you watch packets in firewall (in different chains), you’ll see that traffic from to is routed to internet. In postrouting, it will be going out via WAN interface. It looks completely wrong, right?
Thank you, this is clear, however I am not clear about usage of “peer” and “proposial” for this particular policy SiteC>SiteA, over SiteC .., for what is peer / proposial used then here and how or this info is irelevantan. (but it is mandatory parameter in ipsec policy) …
Right, what I described was in older RouterOS and it’s still in ‘long term’ channel. Newer versions don’t require to put addresses of local and remote router in policy, but you select peer instead and addresses are taken from there. So on site A, if you want traffic for C sent to B, you select peer B for that policy.