Wed May 14, 2008 2:47 pm
Hi Hippo, I did a lot of research last night and came the the same conclusion.
IPSec in routeros is over-complicated and uses a lot of terms that are not used by other firewalls, e.g. instead of using "DH-Group 2" like everything else under the sun they use "modp 1024", it is also lacking a few features like PFS options and clear labeling of Phase1 and Phase2 options, instead calling Phase2 "Policies", and Phase1 "Peers"
Also, almost everything supports IPSec route based vpn's e.g. Watchguard, Netscreen/Juniper SSG, Fortigate's, Cisco it is a shame that Mikrotik do not, as we use IPSec this way at thousands of customer sites.
It would be fantastic to be able to either:
- Create a tunnel interface under "interfaces" then bind it to the Phase1 object
or
- Tick a box in the Phase1 object and have a tunnel interface automatically created
Regards,
Andrew