IPSec Tunnel - add new network at remote end
Posted: Mon Mar 03, 2014 3:49 pm
Hello all,
I have several RB2011 devices connected to a central office using IPSec in tunnel mode.
Each remote site has a 192.168.x.0/24 network. The existing IPSec policy has src-address=192.168.x.0/24 and dst-address=192.168.0.0/16. Using this setup each remote site can communicate through the central office. This is all working fine.
Now I want to add a new subnet (172.16.0.0/12) at the central office. I want the local (at the remote site) network 192.168.x.0/24 to send traffic to 172.16.0.0/12 over the IPSec tunnel.
So far, I have added a new IPSec policy with src-address=192.168.x.0/24 and dst-address=172.16.0.0/12. It uses the same sa-src-address/sa-dst-address as the working tunnel. I also added the new network into the central office tunnel configuration.
If I try to ping through the tunnel (from remote to central office), I get a response from the remote location ISP of "admin prohibited." This is expected if the packet is not being encapsulated in the tunnel.
I tried adding a static route for the 172.16.0.0/12 network with the gateway of the central office public IP. This did not seem to change anything.
The remote end is RouterOS 5.x device. The central office is a WatchGuard device.
Can someone show me what I am missing?
Thank you,
James
I have several RB2011 devices connected to a central office using IPSec in tunnel mode.
Each remote site has a 192.168.x.0/24 network. The existing IPSec policy has src-address=192.168.x.0/24 and dst-address=192.168.0.0/16. Using this setup each remote site can communicate through the central office. This is all working fine.
Now I want to add a new subnet (172.16.0.0/12) at the central office. I want the local (at the remote site) network 192.168.x.0/24 to send traffic to 172.16.0.0/12 over the IPSec tunnel.
So far, I have added a new IPSec policy with src-address=192.168.x.0/24 and dst-address=172.16.0.0/12. It uses the same sa-src-address/sa-dst-address as the working tunnel. I also added the new network into the central office tunnel configuration.
If I try to ping through the tunnel (from remote to central office), I get a response from the remote location ISP of "admin prohibited." This is expected if the packet is not being encapsulated in the tunnel.
I tried adding a static route for the 172.16.0.0/12 network with the gateway of the central office public IP. This did not seem to change anything.
The remote end is RouterOS 5.x device. The central office is a WatchGuard device.
Can someone show me what I am missing?
Thank you,
James