I have read lots of info and tried few setups, some king of them works half way but not fully (netmap). Does client needs to do any changes too to this work ? Or can this be done only on my side ? Also do i need to have this client's given subnet set up on any my interface or i can just use it ? Again needs help on this:
What i have:
My side (Mikrotik CCR1036):
10.0.0.0/24 - overlapping subnet, from this network I need to get connect to clients given IP 10.14.30.100/24 through IPSEC tunnel.
10.168.10.0/24 - client gave me this subnet to use in IPSEC policy, to avoid overlapping subnet
Client side (Fortigate FW)
10.14.0.0/16 - particular one IP I need access from this 10.14.30.100/24
Exports:
Code: Select all
/ip ipsec profile
add dh-group=modp1024 enc-algorithm=3des name=profile_1
add dh-group=modp1024 enc-algorithm=3des name=profile_2
add dh-group=modp1536 enc-algorithm=aes-256 lifetime=2h10m name=Client1 Profile nat-traversal=no
/ip ipsec peer
add address=111.121.121.111/32 local-address=222.111.111.222 name=Client1 profile=Client1Profile send-initial-contact=no
add disabled=yes name=peer2 passive=yes profile=profile_2
add disabled=yes name=peer1 passive=yes profile=profile_1
/ip ipsec proposal
set [ find default=yes ] disabled=yes enc-algorithms=3des pfs-group=none
add enc-algorithms=aes-256-cbc lifetime=1h name=ClientProps pfs-group=modp1536
/ip ipsec identity
# Suggestion to use stronger pre-shared key or different authentication method
add generate-policy=port-override peer=peer1 remote-id=ignore
add generate-policy=port-override peer=peer2 remote-id=ignore
add peer=Client1
/ip ipsec policy
set 0 disabled=yes
add dst-address=10.14.0.0/16 peer=Client1 proposal=ClientProps src-address=10.168.10.0/24 tunnel=yes
Also question: do i need to have this client givent subnet set up on any interface ???
/ip address
add address=10.168.10.1/24 comment="Overlaping Client1" interface=ether6 network=10.168.10.0