I've configure IPSEC VPN in my head office to brance office router. After complete configuration I cant access head office to branch office & branch office to head office. There are shows PH2 state is ready to sent. I can't understand why it is not work. Branch office router model is (RB951G-2HnD) & head office router model (RB450G).
Hear office router IP: 118.179.161.242(WAN IP) & 192.168.2.1/24 (LAN IP)
Branch office router IP: 118.179.47.56 (WAN IP) & 192.168.88.1/24 (LAN IP)
Configuration(Head office)
---------------------------------------
ip ipsec peer print
Flags: X - disabled, D - dynamic, R - responder
0 address=118.179.47.56/32 local-address=118.179.161.242
auth-method=pre-shared-key secret="1234" generate-policy=no
policy-template-group=default exchange-mode=main
send-initial-contact=yes nat-traversal=yes proposal-check=obey
hash-algorithm=sha1 enc-algorithm=3des dh-group=modp1024 lifetime=1d
dpd-interval=2m dpd-maximum-failures=5
ip ipsec proposal print
Flags: X - disabled, * - default
0 * name="default" auth-algorithms=sha1
enc-algorithms=aes-256-cbc,aes-192-cbc,aes-128-cbc lifetime=30m
pfs-group=modp1024
1 name="proposal1" auth-algorithms=sha1 enc-algorithms=3des lifetime=30m
pfs-group=none
ip ipsec policy print
Flags: T - template, X - disabled, D - dynamic, I - invalid, A - active,
* - default
0 TX* group=default src-address=::/0 dst-address=::/0 protocol=all
proposal=default template=yes
1 src-address=192.168.2.0/24 src-port=any dst-address=192.168.88.0/24
dst-port=any protocol=all action=encrypt level=require
ipsec-protocols=esp tunnel=yes sa-src-address=118.179.161.242
sa-dst-address=118.179.47.56 proposal=proposal1 ph2-count=0
ip firewall nat print
Flags: X - disabled, I - invalid, D - dynamic
0 chain=srcnat action=masquerade out-interface=WAN log=no log-prefix=""
1 X chain=dstnat action=dst-nat to-addresses=118.179.223.10 to-ports=53
protocol=udp dst-port=53 log=no log-prefix=""
2 ;;; Dinning Room AP
chain=dstnat action=dst-nat to-addresses=192.168.2.3 to-ports=80
protocol=tcp dst-port=881 log=yes log-prefix=""
3 ;;; Balcony AP
chain=dstnat action=dst-nat to-addresses=192.168.2.2 to-ports=80
protocol=tcp in-interface=WAN dst-port=880 log=yes log-prefix=""
4 ;;; GYM AP
chain=dstnat action=dst-nat to-addresses=192.168.2.4 to-ports=80
protocol=tcp in-interface=WAN dst-port=882 log=yes log-prefix=""
5 ;;; DVR
chain=dstnat action=dst-nat to-addresses=192.168.2.5 to-ports=80
protocol=tcp in-interface=WAN dst-port=883 log=yes log-prefix=""
6 chain=srcnat action=accept src-address=192.168.2.0/24
dst-address=192.168.88.0/24 log=no log-prefix=""
Configuration (Branch office)
-------------------------------------------
ip ipsec peer print
Flags: X - disabled, D - dynamic, R - responder
0 address=118.179.161.242/32 local-address=118.179.47.56
auth-method=pre-shared-key secret="1234" generate-policy=no
policy-template-group=default exchange-mode=main
send-initial-contact=yes nat-traversal=yes proposal-check=obey
hash-algorithm=sha1 enc-algorithm=3des dh-group=modp1024 lifetime=1d
dpd-interval=2m dpd-maximum-failures=5
ip ipsec proposal print
Flags: X - disabled, * - default
0 * name="default" auth-algorithms=sha1
enc-algorithms=aes-256-cbc,aes-192-cbc,aes-128-cbc lifetime=30m
pfs-group=modp1024
1 name="proposal1" auth-algorithms=sha1 enc-algorithms=3des lifetime=30m
pfs-group=none
ip ipsec policy print
Flags: T - template, X - disabled, D - dynamic, I - invalid, A - active,
* - default
0 T * group=default src-address=::/0 dst-address=::/0 protocol=all
proposal=default template=yes
1 A src-address=192.168.88.0/24 src-port=any dst-address=192.168.2.0/24
dst-port=any protocol=all action=encrypt level=require
ipsec-protocols=esp tunnel=yes sa-src-address=118.179.47.56
sa-dst-address=118.179.161.242 proposal=proposal1 ph2-count=1
ip firewall nat print
Flags: X - disabled, I - invalid, D - dynamic
0 chain=srcnat action=masquerade out-interface=ether1 log=no log-prefix=""
1 chain=srcnat action=accept src-address=192.168.88.0/24
dst-address=192.168.2.0/24 log=no log-prefix=""