Community discussions

MikroTik App
 
User avatar
BlackRat
Member Candidate
Member Candidate
Topic Author
Posts: 105
Joined: Sat Jul 21, 2012 8:37 am

nailed up IPSec tunnel

Thu Nov 22, 2012 4:04 pm

I have ZyXEL ZyWALL 2 Plus from one side and MikroTik 751G-2HnD from another side. In the ZyXEL there is an option "nailed up connection". How I can create nailed up connection from MikroTik's side?
 
CelticComms
Forum Guru
Forum Guru
Posts: 1765
Joined: Wed May 02, 2012 5:48 am

Re: nailed up IPSec tunnel

Thu Nov 22, 2012 6:42 pm

On RouterOS the IKE daemon tries to maintain valid SAs for the link. If for any reason all SAs become invalid then the appearance of traffic for the link would again cause the IKE daemon to initiate generation of a valid SA.

In practice you may find that the above arrangement meets your needs. If not, you could always use Netwatch to ensure that there is some traffic trying to use the link therefore causing IKE to generate a valid SA.
 
mexanizm
just joined
Posts: 1
Joined: Wed Apr 13, 2016 4:04 pm

Re: nailed up IPSec tunnel

Wed Apr 13, 2016 4:14 pm

On RouterOS the IKE daemon tries to maintain valid SAs for the link. If for any reason all SAs become invalid then the appearance of traffic for the link would again cause the IKE daemon to initiate generation of a valid SA.

In practice you may find that the above arrangement meets your needs. If not, you could always use Netwatch to ensure that there is some traffic trying to use the link therefore causing IKE to generate a valid SA.

Can you give an example of a script?
 
User avatar
mrz
MikroTik Support
MikroTik Support
Posts: 7198
Joined: Wed Feb 07, 2007 12:45 pm
Location: Latvia
Contact:

Re: nailed up IPSec tunnel

Wed Apr 13, 2016 4:20 pm

If I understood correctly this feature, it tries to make and keep SAs even if there is not traffic.
Such feature will be implemented in ROS v7.
Currently you can force to generate SAs with a script (as mentioned in post above)
/ping x.x.x.x src-address=y.y.y.y
Where x.x.x.x and y.y.y.y matching addresses of ipsec policy.