i decided to upgrade an old Linksys/Cisco router and i now a have Mikrotik
Problem is that i had a VPN Gateway to Gatwey with another Lynksys router, i setup the Mikrotik but it doesn't pass phase 2 of authentification it conects phase 1 for 30s but that's it.
The Linksys router config:
Local security: Ip only
Remote security: Ip only
Keying Mode: Ike with preshared key
Phase1 DH Group: Group 1
Phase1 Encryption: 3DES
Phase1 Authentication: SHA1
Phase1 SA Life Time: 28800 seconds
Perfect Forward Secrecy: Yes
Phase2 DH Group: Group 1
Phase2 SA Life Time: 3600 seconds
Preshared key: secret
and on the Mikrotik i have this config:
Code: Select all
# nov/29/2019 20:16:41 by RouterOS 6.43.16
# software id = GLDH-AY03
#
# model = RB1100Dx4
# serial number = blabla
/interface bridge
add admin-mac=bla.bla auto-mac=no name=bridge-local
/interface ethernet
set [ find default-name=ether1 ] comment=isp1 name=ether1-wan
/interface ethernet switch port
set 0 default-vlan-id=0
set 1 default-vlan-id=0
set 2 default-vlan-id=0
set 3 default-vlan-id=0
set 4 default-vlan-id=0
set 5 default-vlan-id=0
set 6 default-vlan-id=0
set 7 default-vlan-id=0
set 8 default-vlan-id=0
set 9 default-vlan-id=0
set 10 default-vlan-id=0
set 11 default-vlan-id=0
set 12 default-vlan-id=0
set 13 default-vlan-id=0
set 14 default-vlan-id=0
set 15 default-vlan-id=0
/interface list
add comment="WAN ports" name=WAN
add comment="LAN ports" name=LAN
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/ip ipsec peer profile
set [ find default=yes ] dh-group=\
modp8192,modp6144,modp4096,modp3072,modp2048,modp1536,modp1024,modp768 \
enc-algorithm=aes-256,aes-192,aes-128,3des,des
/ip ipsec proposal
set [ find default=yes ] auth-algorithms=sha512,sha256,sha1,md5,null \
enc-algorithms="aes-256-cbc,aes-256-ctr,aes-256-gcm,camellia-256,aes-192-c\
bc,aes-192-ctr,aes-192-gcm,camellia-192,aes-128-cbc,aes-128-ctr,aes-128-gc\
m,camellia-128,3des,blowfish,twofish,des,null" pfs-group=modp768
/ip pool
add name=pool-lan ranges=192.168.1.100-192.168.1.190
/ip dhcp-server
add address-pool=pool-lan disabled=no interface=bridge-local name=dhcp-lan
/interface bridge port
add bridge=bridge-local interface=ether2
add bridge=bridge-local interface=ether3
add bridge=bridge-local interface=ether4
add bridge=bridge-local interface=ether5
add bridge=bridge-local interface=ether6
add bridge=bridge-local interface=ether7
add bridge=bridge-local interface=ether8
add bridge=bridge-local interface=ether9
add bridge=bridge-local interface=ether10
add bridge=bridge-local interface=ether11
add bridge=bridge-local interface=ether12
add bridge=bridge-local interface=ether13
/ip neighbor discovery-settings
set discover-interface-list=LAN
/interface list member
add interface=ether2 list=LAN
add interface=ether3 list=LAN
add interface=ether4 list=LAN
add interface=ether5 list=LAN
add interface=ether6 list=LAN
add interface=ether7 list=LAN
add interface=ether8 list=LAN
add interface=ether9 list=LAN
add interface=ether10 list=LAN
add interface=ether11 list=LAN
add interface=ether12 list=LAN
add interface=ether13 list=LAN
add interface=ether1-wan list=WAN
/ip address
add address=192.168.1.199/24 interface=bridge-local network=192.168.1.0
add address=192.77.63.18 interface=ether1-wan network=192.77.63.1
/ip cloud
set ddns-enabled=yes
/ip dhcp-server network
add address=192.168.1.0/24 dns-server=192.168.1.199 gateway=192.168.1.199
/ip dns
set allow-remote-requests=yes servers=8.8.8.8
/ip dns static
add address=192.168.1.199 name=router
/ip firewall address-list
add address=192.168.1.0/24 list=Internet
/ip firewall filter
add action=accept chain=input comment="Accept established,related,untracked" \
connection-state=established,related,untracked
add action=drop chain=input comment="Drop invalid" connection-state=invalid
add action=accept chain=input comment="Accept ICMP" protocol=icmp
add action=accept chain=input comment="Accept all from bridge-local" \
in-interface=bridge-local
add action=accept chain=input comment="Accept access for ManageIP group" \
src-address-list=ManageIP
add action=drop chain=input comment="Drop all other"
add action=fasttrack-connection chain=forward comment=fasttrack \
connection-state=established,related disabled=yes
add action=accept chain=forward comment=\
"accept established,related,untracked" connection-state=\
established,related,untracked
add action=drop chain=forward comment="Drop invalid" connection-state=invalid
add action=accept chain=forward comment=\
"Accept Internet via ISP1 for Internet group" connection-state=new \
in-interface=bridge-local out-interface=ether1-wan src-address-list=\
Internet
add action=drop chain=forward comment="Drop all other"
/ip firewall nat
add action=accept chain=srcnat dst-address=192.168.2.0/24 src-address=\
192.168.1.0/24
add action=masquerade chain=srcnat comment=masquerade ipsec-policy=out,none \
out-interface-list=WAN
/ip ipsec peer
add address=25.2.198.15/32 comment=Office secret=secret
/ip ipsec policy
add comment=Office dst-address=192.168.2.0/24 sa-dst-address=25.2.198.15 \
sa-src-address=192.77.63.18 src-address=192.168.1.0/24 tunnel=yes
/ip route
add distance=1 gateway=192.77.63.1
/system clock
set time-zone-name=RO/RO
/system identity
set name=MyRouter
/tool mac-server
set allowed-interface-list=LAN
/tool mac-server mac-winbox
set allowed-interface-list=LAN
Thank you for all the help.