
Hi, I have this setup, 2 mikrotik routers and i can’t make the vpn between work at 100%
I can make the vpn start but only ping the router not the network.
From Casapai
[admin@MikroTik] > ping 172.10.9.200
SEQ HOST SIZE TTL TIME STATUS
0 172.10.9.200 56 64 1ms
1 172.10.9.200 56 64 1ms
2 172.10.9.200 56 64 3ms
sent=3 received=3 packet-loss=0% min-rtt=1ms avg-rtt=1ms max-rtt=3ms
[admin@MikroTik] > ping 172.30.7.254
SEQ HOST SIZE TTL TIME STATUS
0 172.30.7.254 timeout
1 172.30.7.254 timeout
2 172.30.7.254 timeout
sent=3 received=0 packet-loss=100%
From balves
[admin@MikroTik] > ping 172.10.9.254
SEQ HOST SIZE TTL TIME STATUS
0 172.10.9.254 56 64 17ms
1 172.10.9.254 56 64 12ms
sent=2 received=2 packet-loss=0% min-rtt=12ms avg-rtt=14ms max-rtt=17ms[admin@MikroTik] > ping 172.10.9.200
SEQ HOST SIZE TTL TIME STATUS
0 172.10.9.200 timeout
1 172.10.9.200 timeout
sent=2 received=0 packet-loss=100%
This is my setup!
Mikrotik balves
[admin@MikroTik] /ip ipsec> peer print
Flags: X - disabled, D - dynamic, R - responder
0 ;;; Unsafe configuration, suggestion to use certificates
address=213.***.***.150/32 auth-method=pre-shared-key secret="***********" generate-policy=no policy-template-group=default exchange-mode=aggressive
send-initial-contact=yes nat-traversal=yes my-id=user-fqdn proposal-check=obey hash-algorithm=sha1 enc-algorithm=aes-128,3des dh-group=modp1024 lifetime=1d
dpd-interval=2m dpd-maximum-failures=5
[admin@MikroTik] /ip ipsec> proposal print
Flags: X - disabled, * - default
0 * name="default" auth-algorithms=sha1 enc-algorithms=3des lifetime=30m pfs-group=modp1024
[admin@MikroTik] /ip ipsec> policy print
Flags: T - template, X - disabled, D - dynamic, I - invalid, A - active, * - default
0 T * group=default src-address=::/0 dst-address=::/0 protocol=all proposal=default template=yes
1 IA src-address=172.30.7.0/24 src-port=any dst-address=172.10.9.0/24 dst-port=any protocol=all action=encrypt level=require ipsec-protocols=esp tunnel=yes sa-src-address=0.0.0.0
sa-dst-address=213.***.***.150 proposal=default priority=0 ph2-count=1
[admin@MikroTik] /ip firewall> nat print
Flags: X - disabled, I - invalid, D - dynamic
0 chain=srcnat action=accept src-address=172.30.7.0/24 dst-address=172.10.9.0/24 log=no log-prefix=""
1 chain=srcnat action=masquerade src-address=172.30.7.0/24 log=no log-prefix=""
2 XI chain=srcnat action=src-nat to-addresses=172.30.7.254 src-address=172.30.7.0/24 dst-address=172.10.9.0/24 log=no log-prefix=""
3 chain=srcnat action=src-nat to-addresses=172.30.7.254 src-address=192.168.7.222 dst-address=172.10.9.254 log=no log-prefix=""
Mikrotik casapai
[admin@MikroTik] /ip ipsec> peer print
Flags: X - disabled, D - dynamic, R - responder
0 ;;; Unsafe configuration, suggestion to use certificates
address=89.***.***.146/32 auth-method=pre-shared-key secret="**********" generate-policy=no policy-template-group=default exchange-mode=aggressive
send-initial-contact=yes nat-traversal=yes my-id=user-fqdn proposal-check=obey hash-algorithm=sha1 enc-algorithm=aes-128,3des dh-group=modp1024 lifetime=1d
dpd-interval=2m dpd-maximum-failures=5
[admin@MikroTik] /ip ipsec> proposal print
Flags: X - disabled, * - default
0 * name="default" auth-algorithms=sha1 enc-algorithms=3des lifetime=30m pfs-group=modp1024
[admin@MikroTik] /ip ipsec> policy print
Flags: T - template, X - disabled, D - dynamic, I - invalid, A - active, * - default
0 T * group=default src-address=::/0 dst-address=::/0 protocol=all proposal=default template=yes
1 A src-address=172.10.9.0/24 src-port=any dst-address=172.30.7.0/24 dst-port=any protocol=all action=encrypt level=require ipsec-protocols=esp tunnel=yes
sa-src-address=0.0.0.0 sa-dst-address=89.***.***.146 proposal=default priority=0 ph2-count=1
[admin@MikroTik] /ip firewall> nat print
Flags: X - disabled, I - invalid, D - dynamic
0 chain=srcnat action=accept src-address=172.10.9.0/24 dst-address=172.30.7.0/24 log=no log-prefix=""
1 chain=srcnat action=masquerade src-address=172.10.9.0/24 log=no log-prefix=""
2 XI chain=srcnat action=src-nat to-addresses=172.10.9.254 src-address=172.10.9.0/24 dst-address=172.30.7.0/24 log=no log-prefix=""
3 chain=srcnat action=src-nat to-addresses=172.10.9.254 src-address=192.168.1.250 dst-address=172.10.9.0/24 log=no log-prefix=""
4 ;;; defconf: masquerade
chain=srcnat action=masquerade out-interface=ether1 log=no log-prefix=""
5 ;;; masq. vpn traffic
chain=srcnat action=masquerade src-address=192.168.89.0/24 log=no log-prefix=""
[admin@MikroTik] /ip firewall>
What I’m doing wrong? Can any one help me?
Thanks in advance!