Community discussions

MikroTik App
 
KDmitrii
just joined
Topic Author
Posts: 16
Joined: Wed Dec 09, 2015 8:32 am
Location: Kyrgyzstan

IPSec. IP Tunnel int.

Tue Aug 22, 2017 6:35 am

Hi guys,
I have a question about IP tunnel interface. I have IPSec tunnel between Mikrotik and Cisco ASA, all work finely. But in the "Interfeces" - "IP Tunnel", my virtual interface have colums "Tx"\"Rx"\"TX Packet"\"RX Paket" etc. = 0. Why?
I tried to creat new firewall rule that logging all traffic from virtual IP Tunnel, but I not see lines in the "Log". Why?

Best Regards
Dmitrii.
 
pe1chl
Forum Guru
Forum Guru
Posts: 10234
Joined: Mon Jun 08, 2015 12:09 pm

Re: IPSec. IP Tunnel int.

Tue Aug 22, 2017 12:10 pm

What do you have, an IPsec tunnel or an IPIP tunnel?
Please show your configuration.
 
KDmitrii
just joined
Topic Author
Posts: 16
Joined: Wed Dec 09, 2015 8:32 am
Location: Kyrgyzstan

Re: IPSec. IP Tunnel int.

Tue Aug 22, 2017 2:30 pm

/ip ipsec proposal
add enc-algorithms=aes-256-cbc,aes-256-ctr name=RB
/ip ipsec peer
add address=X.X.X.X/32 dh-group=modp1024 enc-algorithm=aes-256 nat-traversal=no secret=XYZ
/ip ipsec policy
add dst-address=192.168.1.1/32 proposal=RB sa-dst-address=X.X.X.X sa-src-address=Y.Y.Y.Y src-address=10.10.10.10/32 tunnel=yes


/interface ipip
add !keepalive local-address=Y.Y.Y.Y mtu=1452 name=ipip-RB remote-address=X.X.X.X

/ip route
add distance=1 dst-address=192.168.1.1/32 gateway=ipip-RB

/ip firewall nat
add action=accept chain=srcnat comment="For IPIP RB" dst-address=192.168.1.1 log=yes src-address=10.10.10.10

PS. Also I found such a thing. When I do "disable IP-IP interface" relationship between networks remains, that is, the pings don't stop.
I have a feeling that virtual interface and the ipsec live separately.
You do not have the required permissions to view the files attached to this post.
 
pe1chl
Forum Guru
Forum Guru
Posts: 10234
Joined: Mon Jun 08, 2015 12:09 pm

Re: IPSec. IP Tunnel int.

Tue Aug 22, 2017 3:22 pm

That is correct, you have made two tunnels that are completely independent and have no relation, and traffic is flowing over the IPsec tunnel.
You can delete the IPIP tunnel, it is not required for this configuration.
 
User avatar
acruhl
Member
Member
Posts: 371
Joined: Fri Jul 03, 2015 7:22 pm

Re: IPSec. IP Tunnel int.

Tue Aug 22, 2017 3:30 pm

Well, unless this person wants to use the tunnel interface. I find using transport mode ipsec between wan IPs is easier, then you can use whatever tunnels you want and they will be encrypted.

tunnel=no
proposal src-address=Y.Y.Y.Y
Consider using a GRE tunnel as well, although not sure if that matters.

If you want tunneling inside the IPIP (or GRE) interface, then there's no need to tunnel "again" in ipsec.

Set up your routing to use the tunnel interface, not the ipsec.

This might break your ipsec until you set it up right on both sides though, be careful if you don't have out of band management.

When you get done, turn on the sniffer on your outbound physical interface, then ping the WAN interface on the other side (Cisco) from the MIkroTik. Also, send some traffic over the IPIP tunnel. In Wireshark, the packets between the 2 WAN IPs should be encrypted (ESP). You should only see ESP packets between the 2 IPs. That's how you know it's working.
 
pe1chl
Forum Guru
Forum Guru
Posts: 10234
Joined: Mon Jun 08, 2015 12:09 pm

Re: IPSec. IP Tunnel int.

Tue Aug 22, 2017 4:59 pm

I agree with that, but I have seen the reply from several people that it is not so easy with the Cisco ASA.
(I have no experience at all with the Cisco ASA, only with Cisco IOS)
 
KDmitrii
just joined
Topic Author
Posts: 16
Joined: Wed Dec 09, 2015 8:32 am
Location: Kyrgyzstan

Re: IPSec. IP Tunnel int.

Wed Aug 23, 2017 6:37 am

Thank You all so much! I now realized my mistake.
PS. It is a pity that Mikrotik not have such detailed manuals like Cisco.

Who is online

Users browsing this forum: Google [Bot], strods and 100 guests