Upgraded CCR1036 v6.48.6 to v7.2.3 , ipsec tunnel was established, but incoming packets were not matching against DST_NAT rule. So the traffic was not able to pass the tunnel.
Rolled back to v6 and all is good.
Is it going to be fixed in next v7 release ?
So something with IPSec and dstnat works for you in v6 and not in v7. You didn’t share any details beyond that, so nobody can really know what’s happening. And you’d like to know if it’s going it change. I don’t think we can tell you without knowing what exactly it is.
I have shared enough details to see, that problem is in v7. DST-NAT stops working as soon as upgraded to v7, when back to v6, it works fine with ipsec.
If you need something else, please ask
No, you didn’t share any details. You just wrote that some dstnat rule supposedly broke in v7 and it’s probably somehow related to IPSec tunnel, because you mentioned it. That’s all. You didn’t share the dstnat rule, didn’t explain how it’s related to IPSec tunnel, nothing.
As far as I can tell, dstnat in v7 works just fine, exactly the same way it worked in v6. So if you were unlucky to discover some corner case where it doesn’t, and you want some help with that, you should provide some actual details. For example, posting exported config and explaining important parts often leads to great success.
Dst-nat rule contains ipsec tunnel far-end server address as src and ipsec tunnel peer ip address as dat address, then it makes dst-nat to my interneal host.
As soon as I upgrade to v7, matching to that rule dissapears, no matter I set incoming interface or not.
is simple rule that definitely works in v7. If yours doesn’t, then it’s probably caused by something else in your config, but since nobody else has any idea what you might have there…
simple ipsec with 3des, which is established and this dst-nat rule. that’s all.
I saw another post where the same v7 problem is described [ somehow related to nat ]
just imagine, something works good on v6 for years and after upgrade rule stops matching, back and that’s good. exactly the same thing other users are reporting
That sure is a strange setup, probably not many users have that.
But probably it should work…
Anyway, it would be better to study and understand the concept of a tunnel. Then you do not need the NAT.
I know the purpose of the tunnels.
This tunnel is peering a bank, which needs public Ip on my side as a service dest., that’s why dst nat is needed as intrernal server of the company sits in private pool.
It worked fine for 8 years till v7 and it’s very usual practice in such scenarios. Hope it’s clear now
Sorry, I don’t have any. I tried CHR and it works as expected, no problem. But if it should happen only with one architecture, and if you have spare device, then try to reproduce it with minimal config, just tunnel and one dstnat rule. If you succeed (and it won’t work), you can report it to MikroTik and they should be able to reproduce it too and fix it. If it will work, then you’ll have to find what difference between real and this minimal testing config is responsible for it.
This is too general, it may depend on how you have configured the device.
There have been many changes from 6.x to 7.x, especially in BGP and Routing,
which probably make the configuration incompatible with what you expect.
If you do not provide an export before the update, an export after, and you do not create a supout
and do not send everything to support@mikrotik.com accompanied by an adequate description, it is perfectly useless, it could also be fake, and it could also be a very trivial configuration error.
After upgrading routerboard2 from ROS 6.48.6 lts to ROS 7.5 stable - clients behind routerboard3 lost access to server. If i switch from l2tp/ipsec to simple pptp it works fine. Or i have to downgrade routerboard2 back to ROS6 to make it work again.