Hello. I am trying to do ikev2 roadwarrior vpn from my android phone to Mikrotik.
Mikrotik has pppoe wan interface, so IKE is listening on this pppoe.
I can connect, have access to LAN behind mikrotik, but can not use mikrotik’s internet connection, and other resources, where I should do src-nat to access.
I have pool for IKE clients 192.168.177.0/24
Have ipsec policy src=0.0.0.0/0 dst=192.168.177.0/24 act=encrypt, split-included 0.0.0.0/0
/ip route add dst-address=0.0.0.0/0 gateway=pppoe-inet
/ip route add dst-address=192.168.177.0/24 gateway=pppoe-inet
/ip route add dst-address=10.10.10.0/24 gateway=another-tunnel
/ip firewall nat add action=masquerade chain=srcnat src-address=192.168.177.0/24 out-interface=another-tunnel
/ip firewall nat add action=masquerade chain=srcnat src-address=192.168.177.0/24 out-interface=pppoe-inet, but those nat rules counters show zeroes.
(config simplified)
I have fast-track on this pppoe-inet, tried to disable it, but situation did not change, packets are forwarded to pppoe-inet and another-tunnel without source-nating.
How to masquerade decrypted vpn-client traffic?
UPDATE:
Ok, I found. It was because
"What’s new in 6.40rc15 (2017-May-30 08:52):
!) ipsec - added support for dynamic “action=notrack” RAW rules for policies;"
When I remove those rules from raw table everything works.
How can I disable this behavior?
How to use the “add-notrack” option to give vpn clients internet access with split-included 0.0.0.0/0?
I am able to ping and traceroute public hosts but am unable to browse.
VPN clients browsing the local network of de Mikrotik works as expected.
VPN IPSec IKEv2 with Windows 10, Clients behind router not pingable
I create a VPN-Tunnel with IPSec and IKEv2 between Windows 10 (1709) and Mikrotik rb 3011 UiAS-RM (v6.41).
The configuration is made like https://wiki.mikrotik.com/wiki/Manual:I … rver_Setup.
Certificates are created and imported on the windows client. The client is connected and get a IP from the Mikrotik-Router:
Ping from VPN-Client to VPN-Router is available.
I can’t ping from VPN-Client to clients behind router client.
If I use PPTP or L2TP/IPSEC + PSK I can ping clients behind router
[admin@Router] /ip ipsec policy> print
Flags: T - template, X - disabled, D - dynamic, I - invalid, A - active,
default
0 T * group=default src-address=0.0.0.0/0 dst-address=192.168.88.0/24
protocol=all proposal=default template=yes