Does Mikrotik IPSec implementation sucks or am I missing something?
Posted: Tue Oct 19, 2021 11:38 pm
Hi pros,
i have the following situation:
I want to route all the 10.0.0.0/8 traffic trough IPSec from a branch location. There is a star topology, every office having one of the 10.x.y.0/24 subnets, there are many offices, it's not reasonable to do a mesh or introduce like zilion phase 2 policies.
We usualy use Fortigate devices, Fortigate is also a router at the central location that concentrates all those IPSec tunnels. This works really nice with Fortinets.
So I wanted to save some bucks and tried to connect one office with mikrotik. Let's say this office has a subnet of 10.0.0.0/24.
As soon as I connect phase 2 of a tunnel (tunnel is confiured like 10.0.0.0/24 local, 10.0.0.0/8 remote), local traffic dies on mikrotik. I can not even ping Mikrotik any more.
Of course I can connect to mikrotik using mac-telnet, but that is not helping a lot. If I disconect ipsec, everything works as before.
Naturaly, mikrotik does not show IPSec routes in the routing table - who would need that? - so I can not check if this route got some strange weight - should be negative, if it's stronger then connected and more specific..
Should not make much of a differnce, but I state just in case: 10.0.0.0/24 is actually a vlan, I keep default vlan for active network equipment like switches and AP.
If somebody has a solution to this, I gladly take him for a lunch or beer at the first MUM in Europe.
i have the following situation:
I want to route all the 10.0.0.0/8 traffic trough IPSec from a branch location. There is a star topology, every office having one of the 10.x.y.0/24 subnets, there are many offices, it's not reasonable to do a mesh or introduce like zilion phase 2 policies.
We usualy use Fortigate devices, Fortigate is also a router at the central location that concentrates all those IPSec tunnels. This works really nice with Fortinets.
So I wanted to save some bucks and tried to connect one office with mikrotik. Let's say this office has a subnet of 10.0.0.0/24.
As soon as I connect phase 2 of a tunnel (tunnel is confiured like 10.0.0.0/24 local, 10.0.0.0/8 remote), local traffic dies on mikrotik. I can not even ping Mikrotik any more.
Of course I can connect to mikrotik using mac-telnet, but that is not helping a lot. If I disconect ipsec, everything works as before.
Naturaly, mikrotik does not show IPSec routes in the routing table - who would need that? - so I can not check if this route got some strange weight - should be negative, if it's stronger then connected and more specific..
Should not make much of a differnce, but I state just in case: 10.0.0.0/24 is actually a vlan, I keep default vlan for active network equipment like switches and AP.
If somebody has a solution to this, I gladly take him for a lunch or beer at the first MUM in Europe.