/ip ipsec peer add name=some-peer exchange-mode=main address=<IP Address>
/ip ipsec identity add peer=some-peer my-id=key-id:<GroupName> mode-config=request-only generate-policy=port-strict auth-method=pre-shared-key-xauth secret=<Secret> xauth-login=<UName> xauth-password=<PW>
But you'll probably have to spend some time on /ip ipsec profile and /ip ipsec proposal to match those supported by the Cisco responder.
Yes, i've connected!
I have these generated policies and what i have to do now? I can't ping any host, traceroute does not work.
2 T 0.0.0.0/0 0.0.0.0/0 all
3 DA Flashels yes 172.27.0.122/32 172.16.0.0/12 all encrypt unique 2
4 DA Flashels yes 172.27.0.122/32 10.7.0.0/16 all encrypt unique 1
5 DA Flashels yes 172.27.0.122/32 10.8.0.0/16 all encrypt unique 1
6 DA Flashels yes 172.27.0.122/32 all encrypt unique 1
7 DA Flashels yes 172.27.0.122/32 all encrypt unique 1
8 DA Flashels yes 172.27.0.122/32 all encrypt unique 1
9 DA Flashels yes 172.27.0.122/32 all encrypt unique 1
10 DA Flashels yes 172.27.0.122/32 10.10.222.0/24 all encrypt unique 1
11 DA Flashels yes 172.27.0.122/32 all encrypt unique 1
12 DA Flashels yes 172.27.0.122/32 all encrypt unique 1
13 DA Flashels yes 172.27.0.122/32 all encrypt unique 1
14 DA Flashels yes 172.27.0.122/32 all encrypt unique 1
15 DA Flashels yes 172.27.0.122/32 all encrypt unique 1
16 DA Flashels yes 172.27.0.122/32 all encrypt unique 1
17 DA Flashels yes 172.27.0.122/32 all encrypt unique 1
18 DA Flashels yes 172.27.0.122/32 all encrypt unique 1
19 DA Flashels yes 172.27.0.122/32 all encrypt unique 1
20 DA Flashels yes 172.27.0.122/32 all encrypt unique 1
21 DA Flashels yes 172.27.0.122/32 all encrypt unique 1
22 DA Flashels yes 172.27.0.122/32 all encrypt unique 1
23 DA Flashels yes 172.27.0.122/32 all encrypt unique 1