Answer the question
In order to leave comments, you need to log in
Why is a one-way GRE over IPSec connection established between Mikrotik and PaloAlto?
After many experiments, we managed to somehow make friends between the two pieces of iron, by means of a GRE tunnel over IPSec. However, if you look from the side of PaloAlto, then all phases are successful, and traffic goes into the tunnel. But from the Mikrotik side, it is clear that the correct SAs are set only from the paloalto side, and traffic is visible in it, and the reverse SA is empty (correct algorithms but no traffic).
At the same time, if you initiate the raising of the tunnel from the Mikrotik side, then it is clear that SA is one-sided (from Mikrotik towards paloalto) and incorrect (wrong algorithms, empty) and a response SA is not created.
That is, it seems that some packets do not reach the Mikrotik side.
I tried several types of encryption and authentication - the results are the same.
/ip ipsec proposal
set [ find default=yes ] auth-algorithms=sha1,md5 enc-algorithms=aes-256-cbc,aes-128-cbc,3des lifetime=8h
add auth-algorithms=sha1,null enc-algorithms=null lifetime=8h name=Palto
add enc-algorithms=aes-128-cbc lifetime=1h name=PALTO-RT
/ip ipsec peer
add address=M.M.M.90/32 enc-algorithm=aes-256 hash-algorithm=sha256 lifetime=8h local-address=P.P.P.50 \
secret=****
/ip ipsec policy
add dst-address=172.20.255.5/32 proposal=PALTO-RT sa-dst-address=P.P.P.90 sa-src-address=M.M.M.50 \
src-address=172.20.255.6/32 tunnel=yes
/interface gre
add !keepalive local-address=172.20.255.6 name=gre-Palto remote-address=172.20.255.5
Answer the question
In order to leave comments, you need to log in
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question