Hi,
I have already lost a few weeks searching for solutions, but I can not find any. I hope that somebody can help me. Before I used an old router to connect to Cisco router. Everything worked perfectly until one day the old router decided not to work anymore and I had to replace it and chose Mikrotik.
I now am able to establish IPSec connection between Mikrotik and Cisco and I can say that this IPSec connection in fact works. I can ping from the local network on Cisco to the local network on Mikrotik and vice versa. The problem occurs that this IPSec connection suddenly fails down. And stays down. The IPSec does not establish connection again. It only helps if I manualy disable Polices and Peers on the Mikrotik and then enable them again.
I would appreciate any help or suggestions on this, thanks.
Version on MikroTik: 6.32.2
Configuration on MikroTik
ip firewall filter add chain=input proto=ipsec-ah action=accept place-before=0
ip firewall filter add chain=input proto=ipsec-esp action=accept place-before=0
ip firewall filter add chain=input proto=udp port=500 action accept place-before=0
ip firewall filter add chain=input proto=udp port=4500 action accept place-before=0
ip firewall nat add chain=srcnat src-address=192.168.0.0/24 dst-address=10.111.10.0/24 action=accept place-before=0
ip ipsec proposal add name=IPSec auth-algorithms=sha1 enc-algorithms=3des lifetime=32800
ip ipsec policy add src-address=192.168.0.0/24 dst-address=10.11.10.0/24 protocol=all action=encrypt level=require ipsec-protocols=esp tunnel=yes sa-src-address=PublicIP1 sa-dst-address=PublicIP2 proposal=IPSec
ip ipsec peer add address=PublicIP2 port=500 auth-method=pre-shared-key secret=********** exchange-mode=main send-initial-contact=yes nat-traversal=yes proposal-check=obey hash-algorithm=sha1 enc-algorithm=aes-256,3des dh-group=modp1024 generate-policy=no lifetime=32800 dpd-interval=120 dpd-maximum-failures=5
/system scheduler
add disabled=no interval=30s name=“Ping remote” on-event=
“ping 10.11.10.1 src-address=192.168.0.1 count=1” policy=
ftp,reboot,read,write,policy,test,winbox,password,sniff,sensitive,api
start-date=nov/25/2011 start-time=00:00:00
Configuration on Cisco
crypto isakmp policy 30
encr 3des
authentication pre-share
group 2
crypto isakmp key ********** address PublicIP1
crypto isakmp keepalive 60
crypto isakmp nat keepalive 20
crypto ipsec transform-set STRONG esp-3des esp-sha-hmac
crypto map CISCO 30 ipsec-isakmp
set peer PublicIP1
set transform-set STRONG
match address 110
Add to: interface FastEthernet0/0
crypto map CISCO
ip access-list extended IPSec
permit ip 10.11.10.0 0.0.0.255 192.168.0.0 0.0.0.255