Hi!
I’m trying to setup a VPN in the CCR1009-7G-1C-1S+ of my company, but facing strange problems. I’m using the latest stable version 6.47.1 in all devices.
I’ve been following Mikrotik’s Wiki tutorial (https://wiki.mikrotik.com/wiki/Manual:IP/IPsec#Road_Warrior_setup_using_IKEv2_with_RSA_authentication) and managed to setup a road-warrior setup that’s working ok with ubuntu 20.04 and Windows10.
In my home i have a Mikrotik RB750 which i use to connect to Internet, and i’ve tried to use it for a site-to-site VPN with my work’s router.
The IPSec tunnel is established correctly, but I can’t ping the other side addresses from none of the routers.
Thinking it was something in the routing rules of my company’s router I’ve tried to reproduce the scenario in GNS3, adding some vlans, as I have in the real setup, and the same behaviour happens.
This is the GNS3 setup:

I’ve followed the steps in Nikita Tarikin presentation (https://mum.mikrotik.com/presentations/ID19/presentation_7168_1572420263.pdf) but after establishing the connectivity I can’t ping the other side network.
I’ve tried to add remote networks in mode-config (split Include) but without success.
Server configuration:
/ip ipsec policy group
add name=ike2-group
/ip ipsec profile
add dh-group=modp2048,modp1536,modp1024 enc-algorithm=aes-256,aes-192,aes-128 hash-algorithm=sha256 name=ike2
/ip ipsec peer
add exchange-mode=ike2 name=ike2 passive=yes profile=ike2
/ip ipsec proposal
add auth-algorithms=sha512,sha256,sha1 enc-algorithms="aes-256-cbc,aes-256-ctr\
,aes-256-gcm,aes-192-ctr,aes-192-gcm,aes-128-cbc,aes-128-ctr,aes-128-gcm" \
lifetime=8h name=ike2 pfs-group=none
/ip ipsec mode-config
add address-pool=ike2-pool address-prefix-length=32 name=ike2 split-include=\
10.20.0.0/24,10.30.0.0/24 system-dns=no
/ip ipsec identity
add auth-method=digital-signature certificate=iesebre.com generate-policy=\
port-strict match-by=certificate mode-config=ike2 my-id=fqdn:iesebre.com \
peer=ike2 policy-template-group=ike2-group remote-certificate=\
jaumeramos@iesebre.com remote-id=user-fqdn:jaumeramos@iesebre.com
/ip ipsec policy
add dst-address=10.10.0.0/24 group=ike2-group proposal=ike2 src-address=\
0.0.0.0/0 template=yes
Client configuration:
/ip ipsec policy group
add name=ike2-group
/ip ipsec profile
add dh-group=modp2048,modp1536,modp1024 enc-algorithm=aes-256,aes-128 \
hash-algorithm=sha256 name=ike2
/ip ipsec peer
add address=iesebre.com exchange-mode=ike2 name=ike2 profile=ike2
/ip ipsec proposal
add auth-algorithms=sha512,sha256,sha1 enc-algorithms="aes-256-cbc,aes-256-ctr\
,aes-256-gcm,aes-192-ctr,aes-192-gcm,aes-128-cbc,aes-128-ctr,aes-128-gcm" \
lifetime=8h name=ike2 pfs-group=none
/ip ipsec identity
add auth-method=digital-signature certificate=jaumeramos@iesebre.com \
generate-policy=port-strict mode-config=request-only my-id=\
user-fqdn:jaumeramos@iesebre.com peer=ike2 policy-template-group=\
ike2-group remote-id=fqdn:iesebre.com
/ip ipsec policy
add dst-address=0.0.0.0/0 group=ike2-group proposal=ike2 src-address=\
10.10.0.0/24 template=yes
There’s no error in the log of both sides, but can’t ping the addresses of the router in any other side.
client side:

Server side:

Probably I’m missing something, but can’t find what it is.
Sorry for the long post.