Community discussions

MikroTik App
 
stef123
just joined
Topic Author
Posts: 12
Joined: Sun Jul 10, 2016 10:49 pm

IPsec vpn Site-to-Site

Thu Jul 28, 2016 11:48 pm

Hi !

I'm struggling to get site-to-site IPsec configured between two sites. Both the RB2011UiAS's are behind WAN routers (TP-Link(ADSL) and Ubiquity (WIFI)) in a DMZ configuration. 

I followed the Mikrotik Manual, including the NAT'ing parts. It seems that the both the RBs are communicating and I can see the remote peer connections, but not getting any pings from either local networks through.  
I'm not sure about the gateway config in the manual, it's points to publicIP.254. I assume that the below should be ok? 

#      DST-ADDRESS        PREF-SRC        GATEWAY            DISTANCE
 0 A S     0.0.0.0/0                                        192.168.1.1               2.............(WAN router)
 1 ADC  192.168.1.0/24     192.168.1.2       ether1-gateway          0
 2 ADC  192.168.88.0/24    192.168.88.1    bridge-local                0

Would appreciate any thoughts.
S
 
Revelation
Member
Member
Posts: 336
Joined: Fri Dec 25, 2015 5:59 am

Re: IPsec vpn Site-to-Site

Fri Jul 29, 2016 1:23 am

Hi !

I'm struggling to get site-to-site IPsec configured between two sites. Both the RB2011UiAS's are behind WAN routers (TP-Link(ADSL) and Ubiquity (WIFI)) in a DMZ configuration. 

I followed the Mikrotik Manual, including the NAT'ing parts. It seems that the both the RBs are communicating and I can see the remote peer connections, but not getting any pings from either local networks through.  
I'm not sure about the gateway config in the manual, it's points to publicIP.254. I assume that the below should be ok? 

#      DST-ADDRESS        PREF-SRC        GATEWAY            DISTANCE
 0 A S     0.0.0.0/0                                        192.168.1.1               2.............(WAN router)
 1 ADC  192.168.1.0/24     192.168.1.2       ether1-gateway          0
 2 ADC  192.168.88.0/24    192.168.88.1    bridge-local                0

Would appreciate any thoughts.
S
I'm not sure what thoughts you are looking to receive... You have not provided any information thus far that can help in determining your problem and a solution. I'm not going to start guessing at what your problem could be, maybe someone else will be more willing to play that game.
If you want to provide more information on your configuration then we can help...
 
stef123
just joined
Topic Author
Posts: 12
Joined: Sun Jul 10, 2016 10:49 pm

Re: IPsec vpn Site-to-Site

Fri Jul 29, 2016 10:40 pm

I'm not sure what thoughts you are looking to receive... You have not provided any information thus far that can help in determining your problem and a solution. I'm not going to start guessing at what your problem could be, maybe someone else will be more willing to play that game.
If you want to provide more information on your configuration then we can help...
You have a point :)
Was hoping that I made an obvious mistake with the gateway.
On both routers two remote peers are established - initiator and responder.
OFFICE 1
========
RouterOS 6.35.4
public=999.999.999.999

/ip address
add address=192.168.77.1/24 interface=br-office network=192.168.77.0
add address=192.168.1.2/24 interface=ether1-gw network=192.168.1.0

/ip route
#adsl WAN router
add distance=2 gateway=192.168.1.1

ip ipsec peer
add address=888.888.888.888/32 secret=secret

/ip ipsec policy
add dst-address=192.168.88.0/24 sa-dst-address=888.888.888.888 sa-src-address=999.999.999.999 src-address=192.168.77.0/24 \
    tunnel=yes

/ip firewall nat
add chain=srcnat dst-address=192.168.88.0/24 src-address=192.168.77.0/24
add action=masquerade chain=srcnat out-interface=ether1-gw

/ip firewall filter
add chain=forward connection-state=established,related dst-address=192.168.77.0/24 src-address=192.168.88.0/24
add chain=forward connection-state=established,related dst-address=192.168.88.0/24 src-address=192.168.77.0/24


OFFICE 2
========
RouterOS 6.35.4
public=888.888.888.888

/ip address
add address=192.168.88.1/24 comment="default configuration" interface=wlan1 network=192.168.88.0
add address=192.168.1.2/24 interface=ether1-gateway network=192.168.1.0

/ip route
#wifi WAN router
add distance=2 gateway=192.168.1.1

/ip ipsec peer
add address=999.999.999.999/32 secret=secret

/ip ipsec policy
add dst-address=192.168.77.0/24 sa-dst-address=999.999.999.999 sa-src-address=888.888.888.888 src-address=192.168.88.0/24 \
    tunnel=yes

/ip firewall nat
add chain=srcnat dst-address=192.168.77.0/24 src-address=192.168.88.0/24
add action=masquerade chain=srcnat out-interface=ether1-gateway src-address=192.168.88.0/24

/ip firewall filter
add chain=forward connection-state=established,related dst-address=192.168.77.0/24 src-address=192.168.88.0/24
add chain=forward connection-state=established,related dst-address=192.168.88.0/24 src-address=192.168.77.0/24
Would appreciate any assistance.
S
 
pe1chl
Forum Guru
Forum Guru
Posts: 10534
Joined: Mon Jun 08, 2015 12:09 pm

Re: IPsec vpn Site-to-Site

Fri Jul 29, 2016 11:26 pm

Why do you allow only established,related traffic to be forwarded?
When you have that rule, you also need one or more rules for new traffic that you want to allow, below those, or else nothing will go through!
 
stef123
just joined
Topic Author
Posts: 12
Joined: Sun Jul 10, 2016 10:49 pm

Re: IPsec vpn Site-to-Site

Sun Jul 31, 2016 2:13 pm

Why do you allow only established,related traffic to be forwarded?
When you have that rule, you also need one or more rules for new traffic that you want to allow, below those, or else nothing will go through!
It is in the manual, if fasttrack is enabled, and I'm not sure if it is enabled. So I tried it with and without these rules ... no luck with either. I removed it again.