Hi,Without seeing more details, it looks like you need to ensure that you have a route back across the tunnel for the return traffic.
Hi,I had the same problem, switched to EOIP tunnels and made both sites the same IP range, working fine now.
Bedankt!Да, это неплохой вариант.
Hi,I have never tried a tunnel from a Mikrotik to any other router.
Greg Sowell has examples of IPsec and IPIP tunnels from Mikrotik to Cisco on his site.
http://gregsowell.com/?p=1290
Hi Ekobravo,Hi,
Did you find the solution?
I have the same problem. I've configured an IPsec Site 2 site VPN connection between HQ and remote office. I’m using RB2011iL-IN in both offices. PING only works in one direction. I'm able to ping from my on HQ to remote office. Not just that I'm able to connect to any pc from the HQ to remote office. From remote office I can not ping or connect to for example MainServer.
Thanks in advance.
I'm using version 6.34.1
I can ping from HQ router everything but from remote office I can ping only HQ router.
I did try to add ipip with ipsec but it is doing the same thing. I think we are missing some routing here but I'm not sure what. I can also ping in both directions but only routers IP nothing else.
I'm at the point that I will probably get cisco routers and finish the job. I can not understand why Mikrotik is not helping. Forum should be the place that we are helping one to another. But if there is no right answer or solution Mikrotik should jump in. They should help. We are buying their product. We are using their product.
Where is the logic (read future) here?????
I just had a word with Mirotik Support and they were really helpfull:I have this
/ip firewall nat
add chain=srcnat comment="VPN Tunnel" dst-address=192.168.17.0/24 log=no \
src-address=172.16.20.0/24
add action=masquerade chain=srcnat comment="default configuration" \
out-interface=WAN
I got help from Mirotik after a mail to support@mikrotik.com (Maris B.) he was really helpfullFor me still not working:
This is what I put:
/ip firewall filter
add chain=forward comment="" dst-address=192.168.17.0/24 \
src-address=172.16.20.0/24
add chain=forward comment="" dst-address=172.16.20.0/24 \
src-address=192.168.17.0/24
it is place-before=0
/ip firewall nat
add chain=srcnat comment="VPN Tunnel" dst-address=192.168.17.0/24 log=no \
src-address=172.16.20.0/24
add action=masquerade chain=srcnat comment="default configuration" \
out-interface=WAN
Is it possible that "fasttrack dummy rule" makes mess in firewall,what do you think? I have on one router but not on another one.
Thank you scampbell for your useful tip to temporary disable firewall rules. I disabled them one by one and found out the following rule from the default configuration was blocking my ping from Microsoft Azure to on premise network:I got help from Mirotik after a mail to support@mikrotik.com (Maris B.) he was really helpfull
And how can I do this? If I try yo move firewall rule before fast-track rule I'm getting this error message:Not only that, but also fast-track rule affects ipsec traffic. So for tunnel mode to work properly you need to allow tunnelled traffic before fast-track or rule with connection-nat-state=!dstnat.
This is done by the place-before=0 optionNot sure what exactly you are trying to move, but none of my mentioned rules are built in. They are created either by default configuration or by user.
This is done by the place-before=0 optionNot sure what exactly you are trying to move, but none of my mentioned rules are built in. They are created either by default configuration or by user.
This is what works for me:
/ip firewall filter
add chain=forward comment="Allow from Azure" dst-address=10.200.0.0/16 \
src-address=192.168.1.0/24 place-before=0
/add chain=forward dst-address=192.168.1.0/24 src-address=10.200.0.0/16 \
place-before=0
I just had a word with Mirotik Support and they were really helpfull:I have this
/ip firewall nat
add chain=srcnat comment="VPN Tunnel" dst-address=192.168.17.0/24 log=no \
src-address=172.16.20.0/24
add action=masquerade chain=srcnat comment="default configuration" \
out-interface=WAN
What I needed to do is:
/ip ipsec peer
add address=140.13.104.73/32 dpd-interval=disable-dpd enc-algorithm=aes-256 \
lifetime=1h secret=VeryDeepSeCret!
/ip ipsec policy
add dst-address=10.200.0.0/16 sa-dst-address=140.113.104.73 sa-src-address=\
81.3.30.135 src-address=192.168.1.0/24 tunnel=yes
/ip firewall filter
add chain=forward comment="Allow from Azure" dst-address=10.200.0.0/16 \
src-address=192.168.1.0/24 place-before=0
/add chain=forward dst-address=192.168.1.0/24 src-address=10.200.0.0/16 \
place-before=0
/add chain=input comment="Allow from Azure" log=yes protocol=ipsec-esp \
src-address=140.113.104.73
/ip firewall nat
add chain=srcnat comment="Azure VPN Tunnel" dst-address=10.200.0.0/16 log=yes \
src-address=192.168.1.0/24 place-before=0
Now everything works fine