Action is always: encrypt / require / esp / proposal as stated above.
Try changing the level of all policies to
unique. It should work with
require but I've had cases where it didn't.
Also, if there is an active
action=fasttrack-connection rule in your firewall? Depending on the overall configuration, it may interfere with operation of these additional policies. So if there is, post the complete anonymized export (see my automatic signature below).
You wrote that there is a need to add two additional policies for 0.0.0.0/1 and 128.0.0.0/1 as dst-address. I tried it in different ways but it did not work.
Maybe I've used wrong wording - the idea was that
instead of each policy with a
0.0.0.0/0 <=> x.x.x.x/y traffic selector, you would use two, with traffic selectors
0.0.0.0/1 <=> x.x.x.x/y and
128.0.0.0/1 <=> x.x.x.x/y. But it is normally only necessary if
0.0.0.0/0 is the
dst-address in the policies at responder side, which seems not to be your case.
A consecutive requirement now is how to direct outgoing SMTP traffic (connections initiated by Exchange server to dst port 25 i.e. mails by internal users the Exchange server has to deliver to recipient servers) via Router A. Currently default gateway on Exchange server is Router A. Is it possible to accomplish routing via router B only by using Mikrotik settings, i.e. not changing the default gateway within Exchange virtual machine?
I am afraid you got lost in what Router A and Router B are, so let me suppose that the default gateway of the Exchange server is Router B (172.21.79.x), and you want that the SMTP sessions initiated by the Exchange would be sent to the internet destinations from the public IP of router A.
How would you implement this?
...
Again using IPsec policies?
Yes, again using IPsec policies, and they would look the same except you'd swap the roles of
dst-port and
src-port.
The current policies say "handle whatever comes from any port of any address in the internet to port 25 (465, 587) of the Exchange" (and the mirror of this), and you'd add ones saying "handle whatever comes from port 25 (465, 587) of any address in the internet to any port of the Exchange" (and the mirror of this). The former ones handle TCP connections where the Exchange acts as a TCP server listening at port 25, the latter ones handle TCP connections where the Exchange acts as a TCP client connecting to servers in the internet listening at port 25.
But you can also switch over from bare IPsec with policies to an IPsec-protected IPIP tunnel, but you'd still need to add a routing table and mangle rules at Router B to make sure that the outgoing SMTP traffic (or maybe just all traffic to other than private destinations) of the Exchange would use the tunnel to Router A rather than the local WAN of router B.