Hello community,
Long story short, I bought some Hex S for business use, in order to connect our IP Phones and computers to our HQ and be able to accept and make phone calls. Although the IP phones are working perfectly, I can’t pass traffic through the VPN. I followed this guide https://www.watchguard.com/help/docs/help-center/en-US/Content/Integration-Guides/General/Mikrotik%20VPN_firebox.html in order to make the VPN. I have firmware 6.46.6
Both Phase 1 and 2 are working, I can ping servers in HQ, and when I try to RDP them but I get a black screen and a “Reconnecting” screen. Then the Reconnecting screen dissappear, still blackscreen, and then again the Reconnecting screen re-appear.
I want the 192.168.40.0/24 site to have full access with mine (192.168.36.0/24) and I don’t know how to do it.
Some note. As you will see from my configuration, I use PPPoE to connect, while the other Hex S just get internet from the provider Modem. But everyone has issues passing traffic.
VPN-wise, if i connect a Watchguard, everything work as they should and the speed is quite fast. Once I remove it and replace it with Mikrotik, same issues again.
Thank you for your time.
/interface bridge
add admin-mac=C4:AD:34:D7:15:C2 auto-mac=no comment=defconf name=bridge
/interface pppoe-client
add add-default-route=yes disabled=no interface=ether1 name=pppoe-out1 use-peer-dns=yes user=v42049471
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/ip hotspot profile
set [ find default=yes ] html-directory=flash/hotspot
/ip ipsec peer
add address=83.235.23.9/32 exchange-mode=ike2 local-address=192.168.36.1 name=peer1
/ip ipsec profile
set [ find default=yes ] dh-group=modp2048 enc-algorithm=aes-256 hash-algorithm=sha256
/ip ipsec proposal
set [ find default=yes ] auth-algorithms=sha256 enc-algorithms=aes-256-cbc,aes-128-cbc pfs-group=modp2048
/ip pool
add name=dhcp ranges=192.168.36.10-192.168.36.254
/ip dhcp-server
add address-pool=dhcp disabled=no interface=bridge name=defconf
/interface bridge port
add bridge=bridge comment=defconf interface=ether2
add bridge=bridge comment=defconf interface=ether3
add bridge=bridge comment=defconf interface=ether4
add bridge=bridge comment=defconf interface=ether5
add bridge=bridge comment=defconf interface=sfp1
/ip neighbor discovery-settings
set discover-interface-list=LAN
/interface list member
add comment=defconf interface=bridge list=LAN
add comment=defconf interface=ether1 list=WAN
add interface=pppoe-out1 list=WAN
/ip address
add address=192.168.36.1/24 comment=defconf interface=ether2 network=192.168.36.0
/ip dhcp-client
add comment=defconf interface=ether1
/ip dhcp-server lease
add address=192.168.36.4 mac-address=0C:2F:B0:9D:DA:18 server=defconf
add address=192.168.36.3 mac-address=E8:D0:FC:EF:04:1D server=defconf
add address=192.168.36.222 mac-address=00:11:32:BE:E1:CA server=defconf
add address=192.168.36.221 mac-address=54:E4:BD:48:FC:F1 server=defconf
/ip dhcp-server network
add address=192.168.36.0/24 comment=defconf gateway=192.168.36.1 netmask=24
/ip dns
set allow-remote-requests=yes
/ip dns static
add address=192.168.36.1 comment=defconf name=router.lan
/ip firewall filter
add action=accept chain=input comment="defconf: accept established,related,untracked" connection-state=established,related,untracked
add action=accept chain=input comment="WinBox WAN Administration" dst-port=8291 protocol=tcp src-address=192.168.40.5
add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
add action=accept chain=input comment="defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1
add action=accept chain=forward comment="defconf: accept in ipsec policy" ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy" ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" connection-state=established,related
add action=accept chain=forward comment="defconf: accept established,related, untracked" connection-state=established,related,untracked
add action=drop chain=input comment="defconf: drop all not coming from LAN" in-interface-list=!LAN
add action=drop chain=input comment="defconf: drop invalid" connection-state=invalid
add action=drop chain=forward comment="defconf: drop invalid" connection-state=invalid
add action=drop chain=forward comment="defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat connection-state=new in-interface-list=WAN
/ip firewall nat
add action=masquerade chain=srcnat comment="defconf: masquerade" ipsec-policy=out,none out-interface-list=WAN
add action=accept chain=srcnat dst-address=192.168.40.0/24 out-interface=ether1 src-address=192.168.36.0/24
add action=dst-nat chain=dstnat dst-port=5000-5001 protocol=tcp to-addresses=192.168.36.222 to-ports=5000-5001
/ip ipsec identity
add peer=peer1
/ip ipsec policy
add dst-address=192.168.40.0/24 level=unique peer=peer1 sa-dst-address=83.235.23.9 sa-src-address=192.168.36.1 src-address=192.168.36.0/24 tunnel=yes
add dst-address=192.168.42.0/24 level=unique peer=peer1 sa-dst-address=83.235.23.9 sa-src-address=192.168.36.1 src-address=192.168.36.0/24 tunnel=yes
add dst-address=192.168.43.0/24 level=unique peer=peer1 sa-dst-address=83.235.23.9 sa-src-address=192.168.36.1 src-address=192.168.36.0/24 tunnel=yes
add dst-address=192.168.44.0/24 level=unique peer=peer1 sa-dst-address=83.235.23.9 sa-src-address=192.168.36.1 src-address=192.168.36.0/24 tunnel=yes
/system clock
set time-zone-name=Europe/Moscow
/system identity
set name=MikroTik_36
/tool mac-server
set allowed-interface-list=LAN
/tool mac-server mac-winbox
set allowed-interface-list=LAN