Answer the question
In order to leave comments, you need to log in
What needs to be configured to pass traffic from ipsec to mikrotik?
I configure ipsec Mikritik-DFL260e.
The grid behind the DFL is visible from the side of the grid behind the microtome, but the grid behind the microtome is not visible (except for the microtome itself).
I understand that the matter is somewhere in the marshutization on the microtab "buried", but it does not reach where exactly.
Comrades experts, tell me please.
Answer the question
In order to leave comments, you need to log in
The firewall rule on the clients is to blame for everything, blocking the connection from the second network.
If the question concerns "pure" IPSec, then:
- there is no routing in it, as such. All information is stored in SAD and SPD. SPD is the Policies tab in the IPSec window, SAD is the Installed SAs tab, it is generated dynamically.
The thing to remember here is that
IPSec goes through the firewall twice . For a clear understanding of how it all turns out, I always recommend this picture.
Let's look at the example of my home router (RB450G), where 1.1.1.1 is my external IP, 2.2.2.2 is the external IP of the remote network. My subnet is 10.54.2.0/24, the remote one is 10.54.1.0/24
The very first thing is the policy setting. It is the policy that decides whether this packet should be encrypted or not?
/ip ipsec proposal
add auth-algorithms="" enc-algorithms=aes-256-gcm lifetime=1h name=proposal1
/ip ipsec policy
add comment="To Cat's Home main VPN" dst-address=10.54.1.0/24 proposal=proposal1 sa-dst-address=\
2.2.2.2 sa-src-address=1.1.1.1 src-address=10.54.2.0/24 tunnel=yes
/ip ipsec peer
add address=2.2.2.2/32 auth-method=rsa-signature certificate=\
"RB2011 cert (SHA256) with key" comment="To Cat's Home main VPN" dpd-interval=\
disable-dpd enc-algorithm=aes-256 hash-algorithm=sha256 lifetime=2h nat-traversal=no \
proposal-check=strict remote-certificate="RB450G cert (SHA256)"
/ip firewall nat
add action=src-nat chain=srcnat out-interface=ether6 to-addresses=1.1.1.1
add chain=srcnat comment="Does not touch IPSec ESP packets to avoid break packets checksum" \
ipsec-policy=out,ipsec log-prefix="NAT avoid" out-interface=ether6
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question