in the manual I found an example road warrior setup using IKEv2 and certificates that I could use with `auth-method=pre-shared-key-xauth` on version 6.43. With `ip ipsec user ...`I was able to predetermine the address that the VPN clients got from the pool.
Now that 6.44 is the long term version I'm struggling with the configuration for this version.
So far I got it working with certificates, the client gets a configuration with an address from the pool.
But I didn't manage to predetermine the address that the client gets when it's connecting.
Can anyone help me out here?
The server configuration from my test setup (in GNS3, no license) looks like this:
Code: Select all
> ip ex
# dec/19/2019 19:12:34 by RouterOS 6.44.5
/ip ipsec policy group
add name=ike2-policies
/ip ipsec profile
add dh-group=ecp256 enc-algorithm=aes-256 hash-algorithm=sha256 name=ike2-profile
/ip ipsec peer
add exchange-mode=ike2 name=ike2 passive=yes profile=ike2-profile
/ip ipsec proposal
add auth-algorithms=sha256 enc-algorithms=aes-256-cbc name=ike2-proposal pfs-group=ecp256
/ip pool
add name=ike2-pool ranges=10.107.252.3-10.107.252.254
/ip ipsec mode-config
add address-pool=ike2-pool name=ike2-conf split-include=10.107.252.2/32
/ip address
add address=192.168.1.1/24 interface=ether1 network=192.168.1.0
add address=10.107.252.2 interface=loopback network=10.107.252.2
/ip ipsec identity
add auth-method=rsa-signature certificate=mpg-rz3-vpn05 generate-policy=port-strict mode-config=ike2-conf peer=ike2 policy-template-group=ike2-policies
/ip ipsec policy
add dst-address=10.107.252.0/24 group=ike2-policies proposal=ike2-proposal src-address=10.107.252.2/32 template=yes
/ip route
add distance=1 dst-address=10.107.252.0/24 gateway=192.168.1.2
Code: Select all
> ip ex
# dec/19/2019 19:12:14 by RouterOS 6.44.5
/ip ipsec mode-config
add name=ike2-conf responder=no
/ip ipsec policy group
add name=ike2-policy
/ip ipsec profile
add dh-group=ecp256 enc-algorithm=aes-256 hash-algorithm=sha256 name=ike2-profile
/ip ipsec peer
add address=192.168.1.1/32 exchange-mode=ike2 name=mpg-rz3-vpn05 profile=ike2-profile
/ip ipsec proposal
add auth-algorithms=sha256 enc-algorithms=aes-256-cbc name=ike2-proposal pfs-group=ecp256
/ip address
add address=192.168.1.2/24 interface=ether1 network=192.168.1.0
add address=10.107.252.249 disabled=yes interface=loopback network=10.107.252.249
/ip ipsec identity
add auth-method=rsa-signature certificate=mpg-de-ess-vpn01.crt_0 generate-policy=port-strict mode-config=ike2-conf peer=mpg-rz3-vpn05 policy-template-group=ike2-policy
/ip ipsec policy
add group=ike2-policy proposal=ike2-proposal template=yes
Any help is appreciated.
Thanks,
Mathias