First time setting up VPN with MikroTik. session is established, phase 2 completes and states session established. I cannot pass traffic from either side.
Hardware: both sides hAp Mini
Default config is WISP AP
went through Mikrotik wiki on how to setup ipsec VPN. Session established on first try.
Here is configs from each side:
Router 1:
/ip ipsec proposal
set [ find default=yes ] enc-algorithms=aes-256-cbc pfs-group=modp4096
/ip ipsec peer
add address=1.1.1.1/32 comment="IPSec VPN " dh-group=modp1024
dpd-interval=disable-dpd enc-algorithm=3des nat-traversal=no secret=
mysecret
/ip ipsec policy
add comment=“IPSec VPN” dst-address=192.168.88.0/24 sa-dst-address=
1.1.1.1 sa-src-address=2.2.2.2 src-address=192.168.89.0/24
tunnel=yes
Router 2
/ip ipsec proposal
set [ find default=yes ] enc-algorithms=aes-256-cbc pfs-group=modp4096
/ip ipsec peer
add address=2.2.2.2 comment="IPSec VPN " dh-group=modp1024
dpd-interval=disable-dpd enc-algorithm=3des nat-traversal=no secret=
mysecret
/ip ipsec policy
add comment=“IPSec VPN ToLovington” dst-address=192.168.89.0/24 sa-dst-address=
2.2.2.2 sa-src-address=1.1.1.1 src-address=192.168.88.0/24
tunnel=yes
Routes:
Router 1:
/ip route
add distance=1 dst-address=192.168.89.0/24 gateway=192.168.89.1
Router 2:
/ip route
add distance=1 dst-address=192.168.88.0/24 gateway=192.168.88.1
Firewall:
Router 1":
/ip firewall filter
add action=accept chain=input comment=“defconf: accept ICMP” protocol=icmp
add action=accept chain=forward dst-port=8291 protocol=tcp src-address=
3.3.3.3/27
add action=accept chain=input comment=“defconf: accept established,related”
connection-state=established,related
add action=drop chain=input comment=“defconf: drop all from WAN” in-interface=
ether1
add action=fasttrack-connection chain=forward comment=“defconf: fasttrack”
connection-state=established,related
add action=accept chain=forward comment=“defconf: accept established,related”
connection-state=established,related
add action=drop chain=forward comment=“defconf: drop invalid” connection-state=
invalid
add action=drop chain=forward comment=
“defconf: drop all from WAN not DSTNATed” connection-nat-state=!dstnat
connection-state=new in-interface=ether1
add action=fasttrack-connection chain=forward comment=FastTrack
connection-mark=!ipsec connection-state=established,related
/ip firewall mangle
add action=mark-connection chain=forward comment=“Mark IPsec connections”
ipsec-policy=out,ipsec new-connection-mark=ipsec
add action=mark-connection chain=forward ipsec-policy=in,ipsec
new-connection-mark=ipsec
/ip firewall nat
add action=accept chain=srcnat comment=“IPSec VPN ToLovington” dst-address=
192.168.89.0/24 dst-address-list=192.168.89.0/24 src-address=
192.168.88.0/24 src-address-list=192.168.88.0/24
add action=masquerade chain=srcnat comment=“defconf: masquerade” out-interface=
ether1
Router2:
/ip firewall filter
add action=accept chain=input comment=
“defconf: accept established,related,untracked” connection-state=
established,related,untracked
add action=accept chain=input dst-port=8291 protocol=tcp src-address=
3.3.3.3/27
add action=accept chain=input src-address=2.2.2.2
add action=accept chain=forward comment=“defconf: accept in ipsec policy”
ipsec-policy=in,ipsec
add action=accept chain=forward comment=“defconf: accept out ipsec policy”
ipsec-policy=out,ipsec
add action=drop chain=input comment=“defconf: drop invalid” connection-state=
invalid
add action=accept chain=input comment=“defconf: accept ICMP” protocol=icmp
add action=drop chain=input comment=“defconf: drop all not coming from LAN”
in-interface-list=!LAN
add action=fasttrack-connection chain=forward comment=“defconf: fasttrack”
connection-state=established,related
add action=accept chain=forward comment=
“defconf: accept established,related, untracked” connection-state=
established,related,untracked
add action=drop chain=forward comment=“defconf: drop invalid” connection-state=
invalid
add action=drop chain=forward comment=
“defconf: drop all from WAN not DSTNATed” connection-nat-state=!dstnat
connection-state=new in-interface-list=WAN
add action=fasttrack-connection chain=forward comment=FastTrack
connection-mark=!ipsec connection-state=established,related
/ip firewall mangle
add action=mark-connection chain=forward comment=“Mark IPsec connections”
ipsec-policy=out,ipsec new-connection-mark=ipsec
add action=mark-connection chain=forward ipsec-policy=in,ipsec
new-connection-mark=ipsec
/ip firewall nat
add action=accept chain=srcnat comment=“IPSec VPN”
dst-address=192.168.88.0/24 src-address=192.168.89.0/24
add action=masquerade chain=srcnat comment=“defconf: masquerade” ipsec-policy=
out,none out-interface-list=WAN
add action=dst-nat chain=dstnat dst-address=1.1.1.1 dst-port=443
protocol=tcp to-addresses=192.168.98.20 to-ports=443
add action=masquerade chain=srcnat dst-address=192.168.89.20 dst-port=443
out-interface=bridge protocol=tcp src-address=192.168.89.0/24
I have read many forum posts and have tried everything i can think of. I am not sure what i am missing on this. If someone can help point me in the right direction it would be greatly appreciated!!