Hi,
I changed the firewall filter rules, and while I still don't like them much, the ikev2 now should work.
They appear to be based on a very old routeros version.
The ipsec policy rules have to go above the fasttrack rule. (They seem to work below it when pinging things,
but fail when actually trying to make connections)
You should reenable the input drop from !mactel rule...
@anav is good at holistic views of firewalls/routers.
/ip firewall filter
add action=accept chain=input comment="allow established/related" connection-state=established,related
add action=accept chain=input comment="Accept ICMP" protocol=icmp
add action=accept chain=input comment="allow IPsec NAT & IKE" dst-port=500,1701,4500 port="" protocol=udp
add action=accept chain=input protocol=ipsec-esp
add action=accept chain=input comment="allow pptp" dst-port=1723 in-interface-list=WAN protocol=tcp
add action=accept chain=input comment="allow pptp" in-interface-list=WAN protocol=gre
add action=accept chain=input comment="IPTV: accept IGMP" protocol=igmp
add action=accept chain=input comment="allow sstp" disabled=yes dst-port=443 protocol=tcp
add action=drop chain=input disabled=yes in-interface-list=!mactel
add action=accept chain=forward comment="defconf: accept in ipsec policy" ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy" ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment="allow established/related" connection-state=\
established,related
add action=accept chain=forward comment="default configuration allow established/related" connection-state=\
established,related
add action=accept chain=forward comment="IPTV: accept UDP forward" protocol=udp
add action=drop chain=forward comment="default configuration" connection-state=invalid
add action=drop chain=forward comment="default configuration" connection-nat-state=!dstnat connection-state=new \
in-interface=ether1-gateway