I gathered many information in huge GCP documentation about setting IPsec using IKEv2 with BGP.
What I found is that , and this is important
Important: When using IKEv2, your peer VPN gateway must accept all of the CIDRs in each traffic selector using a single Child SA. Not all VPN gateways support this. VPN gateways that create a unique Child SA per CIDR are not compatible with Cloud VPN. See traffic selector strategies for additional details.
https://cloud.google.com/vpn/docs/concepts/choosing-networks-routing#ts-ip-ranges
and also I was struggling with a issue which occurs no ping to remote networks. More about that was described here
http://forum.mikrotik.com/t/ipsec-ikev2-gcp-ping-timeout/129598/8
I was speaking with GCP support for past few days and they notice I receive constantly
{
insertId: "1hkfx2ag100glgy"
labels: {…}
logName: "projects/casino-front/logs/cloud.googleapis.com%2Fipsec_events"
receiveTimestamp: "2020-06-02T16:56:32.894395202Z"
resource: {…}
severity: "NOTICE"
textPayload: "Warning: Remote traffic selectors narrowed for Child SA: vpn_94.237.xx.xx. Configured TS: [0.0.0.0/0 ], negotiated TS:[172.16.18.0/24 ]. Please verify configuration on the remote side."
timestamp: "2020-06-02T16:56:32.831941608Z"
}
So problem is that first of all I can’t use level-unique because GCP requires single Child for SA negotiation. So I changed it to use but also it is required to set 0.0.0.0 src and dst in IPsec policy. When I do that I loose connectivity
Could someone advise me how to proceed ?
