Wed Mar 12, 2025 4:50 pm
Hello,
I hope I'm in the right section; I couldn't find a more suitable one.
At one location, there is an hEX S / RB760iGS set up to establish an IPsec connection with the central office (for RDP access to the location).
Access to the hEX S from the central office (via Winbox) also works.
After upgrading from 7.17.2 to 7.18 (also tested with 7.18.2), the IPsec tunnels still establish, but access is no longer working.
Access to Winbox on the MikroTik via IPsec:
Windows Client (10.67.23.66) > MikroTik (10.75.31.2)
Is there an explanation for this, or is it a bug?
Here is the configuration:
# 2025-03-12 15:43:45 by RouterOS 7.17.2
# software id = 0H5E-J9HA
#
# model = RB750Gr3
# serial number = HEX09CQREZS
/interface bridge
add name=bridge1
/ip ipsec profile
add dh-group=ecp521 dpd-interval=30s dpd-maximum-failures=5 enc-algorithm=\
aes-256 hash-algorithm=sha512 lifetime=18h name=profile.GIGG \
proposal-check=exact
add dh-group=ecp521 dpd-interval=30s dpd-maximum-failures=5 enc-algorithm=\
aes-256 hash-algorithm=sha512 lifetime=18h name=profile.ALGM \
proposal-check=exact
add dh-group=ecp521 dpd-interval=30s dpd-maximum-failures=5 enc-algorithm=\
aes-256 hash-algorithm=sha512 lifetime=18h name=profile.ALGV \
proposal-check=exact
/ip ipsec peer
add address=212.23.xx/32 exchange-mode=ike2 name=peer.GIGG profile=\
profile.GIGG
add address=80.151.xx/32 exchange-mode=ike2 name=peer.ALGV profile=\
profile.ALGV
add address=80.147.xx/32 exchange-mode=ike2 name=peer.ALGM profile=\
profile.ALGM
/ip ipsec proposal
set [ find default=yes ] disabled=yes
add auth-algorithms="" enc-algorithms=aes-128-gcm lifetime=8h name=\
proposal.GIGG pfs-group=ecp256
add auth-algorithms="" enc-algorithms=aes-128-gcm lifetime=8h name=\
proposal.ALGM pfs-group=ecp256
add auth-algorithms="" enc-algorithms=aes-128-gcm lifetime=8h name=\
proposal.ALGV pfs-group=ecp256
/ip pool
add name=pool1 ranges=10.75.31.11-10.75.31.19
/interface bridge port
add bridge=bridge1 interface=ether1
add bridge=bridge1 interface=ether2
add bridge=bridge1 interface=ether3
add bridge=bridge1 interface=ether4
/ip neighbor discovery-settings
set discover-interface-list=!dynamic
/ipv6 settings
set disable-ipv6=yes
/ip address
add address=10.0.1.1/24 interface=ether5 network=10.0.1.0
add address=10.75.31.2/24 interface=ether5 network=10.75.31.0
add address=192.168.0.53/24 interface=bridge1 network=192.168.0.0
/ip dhcp-client
add disabled=yes interface=bridge1
/ip dns
set servers=192.168.0.234
/ip firewall filter
add action=accept chain=forward comment=\
"accept established,related, untracked" connection-state=\
established,related,untracked disabled=yes
add action=accept chain=input comment="accept established,related,untracked" \
connection-state=established,related,untracked disabled=yes
add action=accept chain=output comment="accept established,related,untracked" \
connection-state=established,related,untracked disabled=yes
add action=accept chain=input disabled=yes log=yes
add action=accept chain=output disabled=yes log=yes
add action=accept chain=forward disabled=yes log=yes
add action=accept chain=input comment="accept established,related,untracked" \
connection-state=established,related,untracked
add action=drop chain=input comment="drop invalid" connection-state=invalid \
log=yes log-prefix="drop invalid"
add action=accept chain=input comment="accept ICMP" log=yes log-prefix=\
"accept ICMP" protocol=icmp
add action=fasttrack-connection chain=forward comment=fasttrack \
connection-state=established,related disabled=yes hw-offload=yes
add action=accept chain=forward comment=\
"accept established,related, untracked" connection-state=\
established,related,untracked
add action=drop chain=forward comment="drop invalid" connection-state=invalid \
log-prefix="drop invalid"
add action=accept chain=input comment="WinBox Port5" dst-port=8291 \
in-interface=ether5 log=yes log-prefix="WinBox Port5" protocol=tcp
add action=accept chain=input comment="WinBox IPsec ALGM" dst-port=8291 \
ipsec-policy=in,ipsec log=yes log-prefix="WinBox IPsec ALGM" protocol=tcp \
src-address=10.66.0.0/24
add action=accept chain=input comment="WinBox IPsec ALGV" dst-port=8291 \
ipsec-policy=in,ipsec log=yes log-prefix="WinBox IPsec ALGV" protocol=tcp \
src-address=10.67.23.0/24
add action=accept chain=input comment="WinBox IPsec GIGG" dst-port=8291 \
ipsec-policy=in,ipsec log=yes log-prefix="WinBox IPsec GIGG" protocol=tcp \
src-address=192.168.91.0/24
add action=accept chain=input comment="WinBox LAN" dst-port=8291 \
in-interface=bridge1 log=yes log-prefix="WinBox LAN" protocol=tcp \
src-address=192.168.0.0/24
add action=accept chain=input comment="WinBox All" disabled=yes dst-port=8291 \
log=yes log-prefix="WinBox All" protocol=tcp
add action=accept chain=forward comment="accept ICMP" protocol=icmp
add action=accept chain=forward comment="SMB Out" dst-address=192.168.91.205 \
dst-port=445 log=yes log-prefix="SMB Out" protocol=tcp src-address=\
192.168.0.0/24
add action=accept chain=forward comment="RDP TCP In" dst-address=\
192.168.0.0/24 dst-port=3389 ipsec-policy=in,ipsec log=yes log-prefix=\
"RDP TCP In" protocol=tcp
add action=accept chain=forward comment="RDP UDP In" dst-address=\
192.168.0.0/24 dst-port=3389 ipsec-policy=in,ipsec log=yes log-prefix=\
"RDP UDP In" protocol=udp
add action=accept chain=forward comment="IPSec Policy In" disabled=yes \
ipsec-policy=in,ipsec log=yes log-prefix="IPSec Policy In"
add action=accept chain=forward comment="IPSec Policy Out" disabled=yes \
ipsec-policy=out,ipsec log=yes log-prefix="IPSec Policy Out"
add action=drop chain=input
add action=drop chain=forward
/ip firewall nat
add action=netmap chain=dstnat dst-address=10.75.0.0/24 src-address=\
192.168.91.0/24 to-addresses=192.168.0.0/24
add action=netmap chain=srcnat dst-address=192.168.91.0/24 src-address=\
192.168.0.0/24 to-addresses=10.75.0.0/24
add action=netmap chain=dstnat dst-address=10.75.0.0/24 src-address=\
10.66.0.0/24 to-addresses=192.168.0.0/24
add action=netmap chain=srcnat dst-address=10.66.0.0/24 src-address=\
192.168.0.0/24 to-addresses=10.75.0.0/24
add action=netmap chain=dstnat dst-address=10.75.0.0/24 src-address=\
10.79.28.0/24 to-addresses=192.168.0.0/24
add action=netmap chain=srcnat dst-address=10.79.28.0/24 src-address=\
192.168.0.0/24 to-addresses=10.75.0.0/24
add action=netmap chain=dstnat dst-address=10.75.0.0/24 log-prefix=xxx \
src-address=10.70.28.0/24 to-addresses=192.168.0.0/24
add action=netmap chain=srcnat dst-address=10.70.28.0/24 log-prefix=yyy \
src-address=192.168.0.0/24 to-addresses=10.75.0.0/24
add action=netmap chain=dstnat dst-address=10.75.0.0/24 src-address=\
10.70.31.0/24 to-addresses=192.168.0.0/24
add action=netmap chain=srcnat dst-address=10.70.31.0/24 src-address=\
192.168.0.0/24 to-addresses=10.75.0.0/24
add action=netmap chain=dstnat dst-address=10.75.0.0/24 log=yes log-prefix=\
test src-address=10.67.23.0/24 to-addresses=192.168.0.0/24
add action=netmap chain=srcnat dst-address=10.67.23.0/24 src-address=\
192.168.0.0/24 to-addresses=10.75.0.0/24
/ip hotspot profile
set [ find default=yes ] html-directory=hotspot
/ip ipsec identity
add my-id=address:10.75.31.2 peer=peer.GIGG
add my-id=address:10.75.31.2 peer=peer.ALGM
add my-id=address:10.75.31.2 peer=peer.ALGV
/ip ipsec policy
set 0 disabled=yes
add dst-address=192.168.91.0/24 level=unique peer=peer.GIGG proposal=\
proposal.GIGG src-address=10.75.0.0/24 tunnel=yes
add dst-address=10.79.28.0/24 level=unique peer=peer.GIGG proposal=\
proposal.GIGG src-address=10.75.0.0/24 tunnel=yes
add dst-address=10.66.0.0/24 level=unique peer=peer.ALGM proposal=\
proposal.ALGM src-address=10.75.0.0/24 tunnel=yes
add dst-address=192.168.91.0/24 level=unique peer=peer.GIGG proposal=\
proposal.GIGG src-address=10.75.31.0/24 tunnel=yes
add dst-address=10.66.0.0/24 level=unique peer=peer.ALGM proposal=\
proposal.ALGM src-address=10.75.31.0/24 tunnel=yes
add dst-address=10.70.31.0/24 level=unique peer=peer.ALGV proposal=\
proposal.ALGV src-address=10.75.0.0/24 tunnel=yes
add dst-address=10.70.31.0/24 level=unique peer=peer.ALGV proposal=\
proposal.ALGV src-address=10.75.31.0/24 tunnel=yes
add dst-address=10.67.23.0/24 level=unique peer=peer.ALGV proposal=\
proposal.ALGV src-address=10.75.31.0/24 tunnel=yes
add dst-address=10.67.23.0/24 level=unique peer=peer.ALGV proposal=\
proposal.ALGV src-address=10.75.0.0/24 tunnel=yes
add dst-address=10.70.28.0/24 peer=peer.ALGV proposal=proposal.ALGV \
src-address=10.75.0.0/24 tunnel=yes
/ip route
add disabled=no distance=3 dst-address=0.0.0.0/0 gateway=192.168.0.254 \
routing-table=main scope=30 suppress-hw-offload=no target-scope=10 \
vrf-interface=bridge1
/system clock
set time-zone-autodetect=no time-zone-name=Europe/Berlin
/system note
set note=WUSM show-at-cli-login=yes
/system ntp client
set enabled=yes
/system ntp client servers
add address=pool.ntp.org