auth-method=pre-shared-key
But than this is not Xauth (mode Confg) ...or am I wrong?
I did some tests on windows10 and Ipad (Ios 10.x) and IkeV2 proposal are:
Windows10:
IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024,
IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024,
IKE:3DES_CBC/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024,
IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024,
IKE:3DES_CBC/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024,
IKE:AES_CBC_256/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024
Ipad:
IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048,
IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256,
IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1536,
IKE:AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024,
IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
If you have both clients (Windows and Apple) connecting to IKEv2 Server only valid IPSEC settings are:
IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
I just upgraded to ROS 6.38.1 and cleaned out the whole IPSEC conf and recreated this one:
/ip ipsec proposal
set [ find default=yes ] enc-algorithms=aes-256-cbc,aes-128-cbc,3des lifetime=\
8h pfs-group=none
/ip ipsec peer
add address=0.0.0.0/0 exchange-mode=ike2 generate-policy=port-override passive=\
yes secret=12341234
/ip ipsec user
add name=nojoe password=test2016
I tried Windows10 IKEv2 VPN (native) and no joy.
IKEv2 SA is beeing Established. It seems that windows wants Certificate and I cannot specify that in IKE2 mode on Mikrotik Server. Win10 Client does not allow to specify group secret (specified in ip ipsec peer).
What about ipsec policy. Must I specify them or will they you automaticly added? I only have default template..