A
A
AVXNWNK2016-07-28 13:53:33
VPN
AVXNWNK, 2016-07-28 13:53:33

Why doesn't Mikrotik let traffic into its network through the GRE tunnel?

Hello. I have a configured GRE tunnel with IPSec encryption between Mikrotik RB750 and Cisco 881. It is fully operational and encrypts data, but here's the problem: from the server (it is tied to the cisco network), and from any device on the cisco, pings, data and all traffic to the Mikrotik network, just a packet timeout, while the Mikrotik gateway is pinged. In total, I have 4 subnets in Mikrotik, the static route on the cisco is written as one: ip route 10.37.1.0 255.255.255.0 Tunnel20. There is one subnet in the cisco and it is seen calmly from the mikrotik, both the server and the rest of the equipment connected to the cisco. What can block traffic on Mikrotik? I added rules to the firewall to open port 80 to access the web-face of the IP phone, but it didn’t work and still doesn’t work. Before that, I tried it on an IPIP tunnel, it also didn’t work, I thought the problem was in the tunnel, but no. On GRE, this definitely should not be. What could be the reason for blocking? Thanks in advance.
Mikrotik config:

abe1b7ae0b88434d8f7d8d31210a575e.pnga60c2254e0f24181a1e1c7da210e09fc.png4c93098c14a443c5907d5ffb19016adb.pngfd60ba90e4db48d4bc3c679fc43ac232.png682400d447c840949faa5638928242f9.pngba730da0b62d4e45ab46e093542250cd.png2a9a80ef2169490eb9b13d21faec677f.png97393fba5451412e83be0b55eee2ada2.png72026014e37d47adabe1639b8bd855b1.pngf4f61d92a4974ce6bdfb67341ccf7767.png

Cisco configuration:
Current configuration : 4626 bytes
!
! Last configuration change at 09:44:34 UTC Thu Jul 28 2016 by admin
! NVRAM config last updated at 09:34:00 UTC Thu Jul 28 2016 by admin
! NVRAM config last updated at 09:34:00 UTC Thu Jul 28 2016 by admin
version 15.1
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname TELEFON
!
boot-start-marker
boot-end-marker
!
!
enable secret 4 X4ZqtPJ///KxuEWxHSsJrv3beQVnz2ise/xj8fF6eFU
enable password 7 094D4A04100B59435322013D7270
!
aaa new-model
!
!
aaa authentication login default local
aaa authentication ppp default local
aaa authorization exec default local
!
!
!
!
!
aaa session-id common
!
memory-size iomem 10
crypto pki token default removal timeout 0
!
!
ip source-route
!
!
!
ip dhcp excluded-address 10.0.0.2
ip dhcp excluded-address 10.0.0.3
ip dhcp excluded-address 10.0.0.1
ip dhcp excluded-address 10.0.2.1
!
ip dhcp pool ARM
 network 10.0.2.0 255.255.255.0
 default-router 10.0.2.1
 dns-server 10.0.0.2 78.8.8.8
!
!
ip cef
no ipv6 cef
!
!
multilink bundle-name authenticated
vpdn enable
!
vpdn-group L2TP
 ! Default L2TP VPDN group
 accept-dialin
  protocol l2tp
  virtual-template 10
 no l2tp tunnel authentication
!
license udi pid CISCO881-PCI-K9 sn FCZ1628C0JX
!
!
username логин password 7 106F0D140C195C5A542A2F3C7D7C
username логин privilege 0 password 0 пароль
!
!
!
!
!
!
crypto isakmp policy 10
 encr 3des
 authentication pre-share
 group 2
 lifetime 3600
!
crypto isakmp policy 20
 encr aes 256
 authentication pre-share
 group 2
crypto isakmp key ключ address 109.xxx.xxx.xxx
crypto isakmp key ключ address 0.0.0.0 0.0.0.0 no-xauth
crypto isakmp keepalive 3600
!
!
crypto ipsec transform-set L2TP-TS esp-3des esp-sha-hmac
 mode transport
crypto ipsec transform-set MK-TS esp-aes 256 esp-sha-hmac
 mode transport
!
crypto ipsec profile MK-TS-profile
 set transform-set MK-TS
 set pfs group2
!
!
crypto dynamic-map L2TP-DM 10
 set nat demux
 set transform-set L2TP-TS
!
!
!
!
!
!
!
!
crypto map L2TP-SM 10 ipsec-isakmp dynamic L2TP-DM
!
!
!
!
!
!
!
interface Tunnel20
 description Tunnel_interface_to_Mikrotik
 ip address 10.37.255.129 255.255.255.252
 keepalive 10 3
 tunnel source 37.xxx.xxx.xxx
 tunnel destination 109.xxx.xxx.xxx
 tunnel protection ipsec profile MK-TS-profile
!
interface FastEthernet0
 description ATS
 no ip address
!
interface FastEthernet1
 description RDC-01
 no ip address
!
interface FastEthernet2
 description RDC-02
 no ip address
!
interface FastEthernet3
 description ARM-UPR
 switchport access vlan 20
 no ip address
!
interface FastEthernet4
 description PROVIDER
 ip address 37.xxx.xxx.xxx 255.255.255.0
 ip nat outside
 ip virtual-reassembly in
 duplex auto
 speed auto
 no keepalive
!
interface Virtual-Template10
 ip unnumbered FastEthernet4
 peer default ip address pool IPVPN
 ppp encrypt mppe 40
 ppp authentication ms-chap ms-chap-v2
!
interface Vlan1
 ip address 10.0.0.1 255.255.255.0
 ip nat inside
 ip virtual-reassembly in
!
interface Vlan20
 ip address 10.0.2.1 255.255.255.0
!
ip local pool IPVPN 10.0.0.200 10.0.0.254
ip forward-protocol nd
ip http server
no ip http secure-server
!
!
ip nat inside source list CST interface FastEthernet4 overload
ip nat inside source static tcp 10.0.0.10 80 37.xxx.xxx.xxx 80 extendable
ip nat inside source static tcp 10.0.0.2 3389 37.xxx.xxx.xxx 3389 extendable
ip nat inside source static tcp 10.0.0.10 5060 37.xxx.xxx.xxx 5060 extendable
ip nat inside source static udp 10.0.0.10 5060 37.xxx.xxx.xxx 5060 extendable
ip nat inside source static udp 10.0.0.10 6000 37.xxx.xxx.xxx 6000 extendable
ip route 0.0.0.0 0.0.0.0 37.xxx.xxx.1
ip route 10.37.1.0 255.255.255.0 Tunnel20
!
ip access-list extended CST
 permit ip 10.0.0.0 0.0.0.255 any
 permit tcp 10.0.0.0 0.0.0.255 any
 permit udp 10.0.0.0 0.0.0.255 any
 permit tcp any eq 5060 10.0.0.0 0.0.0.255 eq 5060
 permit udp any eq 5060 10.0.0.0 0.0.0.255 eq 5060
 permit udp 10.0.0.0 0.0.0.255 eq 5060 any eq 5060
 permit tcp 10.0.0.0 0.0.0.255 eq 5060 any eq 5060
!
access-list 109 permit gre host 37.xxx.xxx.xxx host 109.xxx.xxx.xxx
dialer-list 1 protocol ip permit
!
!
!
!
tftp-server flash:SEP44D3CA257670.cnf.xml
tftp-server flash:SEPC44D3CA257605.cnf.xml
tftp-server flash:SEP44D3CA25778F.cnf.xml
tftp-server flash:BOOT69xx.0-0-0-14.zz.sgn 1
tftp-server flash:DSP69xx.12-4-122-02-121029.zz.sgn 1
tftp-server flash:SIP69xx.9-4-1-3.loads 1
tftp-server flash:SIP69xx.9-4-1-3.zz.sgn 1
tftp-server flash:SEPC89C1D6E3E82.cnf.xml
tftp-server flash:SEP44D3CA257605.cnf.xml
!
!
!
control-plane
!
!
line con 0
line aux 0
line vty 0 4
 transport input telnet ssh
!
end

Answer the question

In order to leave comments, you need to log in

1 answer(s)
C
Cool Admin, 2016-07-28
@ifaustrue

Show configs

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question