Comrades,
I'm running an RB-1200 with version 6.30 and attempting to selectively forward traffic using IPSEC to a cloud service (Zscaler). My IKE negotiation is successful and a tunnel is created when I hit the policy. However, no traffic is ever forwarded.
The client is an RFC-1918 subnet behind an IP masquerade. Ideally, I want to forward all internet-bound traffic from the selected hosts over IPSEC (to Zscaler), but I can't even get very specific policies to forward correctly. The router simply NATs the traffic and sends it through the internet link as if the IPSEC configuration was not there, although it does not establish the Phase 2 connection until it sees traffic that matches the policy (which in the below case is just a specific web site I'm using for testing).
What am I doing wrong?
[admin@MikroTik] /ip ipsec peer> print
Flags: X - disabled, D - dynamic
0 ;;; Unsafe configuration, suggestion to use certificates address=199.168.151.112/32 local-address=x.x.x.x passive=no port=500 auth-method=pre-shared-key secret="mysecret" generate-policy=no
policy-template-group=default exchange-mode=aggressive send-initial-contact=yes nat-traversal=yes my-id=user-fqdn:gozer@zuul.com
proposal-check=obey hash-algorithm=sha1 enc-algorithm=3des,aes-128 dh-group=modp1024 lifetime=1d lifebytes=0 dpd-interval=5s dpd-maximum-failures=5
[admin@MikroTik] /ip ipsec peer> .. policy
[admin@MikroTik] /ip ipsec policy> print
Flags: T - template, X - disabled, D - dynamic, I - inactive, * - default
0 src-address=192.168.1.0/24 src-port=any dst-address=162.144.87.85/32 dst-port=80 protocol=all action=encrypt level=require ipsec-protocols=esp
tunnel=yes sa-src-address=x.x.x.x sa-dst-address=199.168.151.112 proposal=zscaler priority=300
1 T * group=default src-address=::/0 dst-address=::/0 protocol=all proposal=default template=yes
[admin@MikroTik] /ip ipsec policy> .. proposal
[admin@MikroTik] /ip ipsec proposal> print
Flags: X - disabled, * - default
0 * name="default" auth-algorithms=sha1 enc-algorithms=3des lifetime=30m pfs-group=modp1024
1 name="zscaler" auth-algorithms=md5,sha1,sha256,sha512,null enc-algorithms=null lifetime=4h pfs-group=modp1024
[admin@MikroTik] /ip ipsec proposal> .. policy print stats
0 ph2-state=established
1
[admin@MikroTik] /ip ipsec proposal> .. installed-sa print
Flags: A - AH, E - ESP
0 E spi=0xDFFA18E src-address=199.168.151.112 dst-address=x.x.x.x state=mature auth-algorithm=md5 enc-algorithm=null
auth-key="1facfb6128b08a7371f583ba3acd6529" enc-key="" add-lifetime=3h12m/4h replay=128
1 E spi=0x8BB4521 src-address=x.x.x.x dst-address=199.168.151.112 state=mature auth-algorithm=md5 enc-algorithm=null
auth-key="532a766b5cae9e391c2ccac6cac536cb" enc-key="" add-lifetime=3h12m/4h replay=128
[admin@MikroTik] /ip ipsec proposal>
[admin@MikroTik] /ip ipsec proposal> .. remote-peers print
0 local-address=x.x.x.x remote-address=199.168.151.112 state=established side=initiator established=6h3m32s
[admin@MikroTik] /ip ipsec proposal>
~
~
~