Hi. Could someone help me please. I want to try a side-to-side connection between a RB760iGS with 7.3.1 and a Lancom router. The tunnel is created but no traffic.
Both sides have a public dynamic ip which is resolvable via dns.
The main parts of the config are:
/ip ipsec profile
add dh-group=modp2048 dpd-interval=1m enc-algorithm=aes-256 hash-algorithm=sha256 lifetime=5h name=BINTEC_PROFILE prf-algorithm=sha256
/ip ipsec peer
add address=DNS_HOST1 exchange-mode=ike2 name=TO_BER profile=BINTEC_PROFILE send-initial-contact=yes
/ip ipsec proposal
add auth-algorithms=sha256 enc-algorithms=aes-256-cbc lifetime=7h name=BINTEC_PROPOSAL pfs-group=modp2048
/ip ipsec identity
add auth-method=pre-shared-key disabled=no generate-policy=no my-id=user-fqdn:HOST1@DNS_HOST2 peer=TO_BER remote-id=user-fqdn:HOST2@DNS_HOST1
/ip ipsec policy
add action=encrypt disabled=no dst-address=172.16.10.64/26 dst-port=any ipsec-protocols=esp level=require peer=TO_BER proposal=BINTEC_PROPOSAL protocol=all sa-dst-address=xxx.xxx.xxx.xxx \
sa-src-address=yyy.yyy.yyy.yyy src-address=172.16.5.0/26 src-port=any tunnel=yes
The entries of the firewall are:
/ip firewall filter
add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
add action=accept chain=input comment="defconf: accept established,related,untracked" connection-state=established,related,untracked
add action=accept chain=input dst-port=500,4500 protocol=udp
add action=accept chain=input protocol=ipsec-esp
add action=accept chain=input comment="REMOTE SSH" dst-port=8686 protocol=tcp
add action=drop chain=input comment="defconf: drop all not coming from LAN" in-interface-list=!LAN log=yes
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" connection-state=established,related hw-offload=yes
add action=accept chain=forward comment="defconf: accept established,related, untracked" connection-state=established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" connection-state=invalid log-prefix="Drop Invalid :"
add action=drop chain=forward comment="defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat connection-state=new in-interface=pppoe-out1 log-prefix="Drop Wan : "
/ip firewall raw
add action=notrack chain=prerouting dst-address=172.16.5.0/26 src-address=172.16.10.64/26
add action=notrack chain=prerouting dst-address=172.16.10.64/26 src-address=172.16.5.0/26
/ip firewall nat
add action=accept chain=srcnat dst-address=172.16.10.64/26 src-address=172.16.5.0/26
add action=accept chain=srcnat comment="defconf: accept all that matches IPSec policy" ipsec-policy=out,ipsec
add action=masquerade chain=srcnat ipsec-policy=out,none log-prefix=ppoe out-interface=pppoe-out1
add action=masquerade chain=srcnat ipsec-policy=out,none out-interface=WAN-sfp1.3_VOIP
If I ping the local address of the MikroTik or vis-verse, the counter in-state-mismatches: increments.
In the log file I always see
17:07:11 ipsec IPSEC: : <- ike2 request, exchange: INFORMATIONAL:30 xxx.xxx.xxx.xxx[4500] 91a62b14d12bbcd6:b7d13cdb6c855ea8
17:07:11 ipsec,debug IPSEC: : ===== sending 112 bytes from yyy.yyy.yyy.yyy[4500] to xxx.xxx.xxx.xxx[4500]
17:07:11 ipsec,debug IPSEC: : 1 times of 116 bytes message will be sent to xxx.xxx.xxx.xxx[4500]
17:07:11 ipsec,debug IPSEC: : ===== received 80 bytes from xxx.xxx.xxx.xxx[4500] to yyy.yyy.yyy.yyy[4500]
17:07:11 ipsec IPSEC: : -> ike2 reply, exchange: INFORMATIONAL:30 xxx.xxx.xxx.xxx[4500] 91a62b14d12bbcd6:b7d13cdb6c855ea8
17:07:11 ipsec IPSEC: : payload seen: ENC (52 bytes)
17:07:11 ipsec IPSEC: : processing payload: ENC
17:07:11 ipsec,debug IPSEC: : => iv (size 0x10)
17:07:11 ipsec,debug IPSEC: : 677d5ff3 7f43c984 c18da4a3 79e0dbdc
17:07:11 ipsec,debug IPSEC: : decrypted packet
17:07:11 ipsec IPSEC: : respond: info
17:07:11 ipsec,debug IPSEC: : reply ignored
Is there any problem with my config?
Thanks for help
Andre