Quantcast
Channel: MikroTik
Viewing all articles
Browse latest Browse all 22231

General • No traffic through IPSec tunnel (if opnSense side initiate)

$
0
0
Hi
We struggling with IPSec tunnels where we have between opnSense FW's and a Mikrotik CCR1009-7G-1C-1S+

opnSense:
local net: 10.0.172.0/24
WAN Endpoint: 11.33.55.77
Config:
Code:
connections {    ec2943b5-7b5a-453e-87ad-b5a1287d2d9c {        proposals = aes256-sha512-modp2048,aes256-sha512-ecp521        unique = no        aggressive = no        version = 2        mobike = no        local_addrs = 11.33.55.77        remote_addrs = 22.44.66.88        encap = no        dpd_delay = 120        send_certreq = yes        local-e50a4a28-5a6c-4691-a390-79fa40745218 {            round = 0            auth = psk            id = 11.33.55.77        }        remote-5c0f8aa5-ff3b-4ae9-b425-4acf1f617671 {            round = 0            auth = psk            id = 22.44.66.88        }        children {            d4ac59ed-59b6-4b7d-943f-4cfcb0a04b80 {                esp_proposals = aes256-sha256-modp2048,aes256-sha512-modp2048,aes256-sha256-ecp521,aes256-sha512-ecp521                sha256_96 = no                start_action = start                close_action = none                dpd_action = clear                mode = tunnel                policies = yes                local_ts = 10.0.172.0/24                remote_ts = 10.0.10.0/24                rekey_time = 3600                updown = /usr/local/opnsense/scripts/ipsec/updown_event.py --connection_child d4ac59ed-59b6-4b7d-943f-4cfcb0a04b80            }        }    }}pools {}secrets {    ike-5906a6a1-2ffa-45d6-8ff7-da66cdfe79ea {        id-0 = 11.33.55.77        id-1 = 22.44.66.88        secret = xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx    }}

Mikrotik:
local net: 10.0.10.0/24
WAN Endpoint: 22.44.66.88
Config:
Code:
/ip ipsec profile set [ find default=yes ] dpd-interval=2m dpd-maximum-failures=5/ip ipsec profile add dh-group=ecp521 dpd-interval=2m dpd-maximum-failures=5 enc-algorithm=aes-256 hash-algorithm=sha512 name=myProf_1 nat-traversal=no/ip ipsec peer add address=11.33.55.77/32 exchange-mode=ike2 local-address=22.44.66.88 name=myEndpoint_1 profile=myProf_1/ip ipsec proposal set [ find default=yes ] disabled=yes/ip ipsec proposal add auth-algorithms=sha512 enc-algorithms=aes-256-cbc name=myProposal_1 pfs-group=ecp521/ip ipsec identity add my-id=address:22.44.66.88 peer=myEndpoint_1 remote-id=address:11.33.55.77 secret="xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx"/ip ipsec policy set 0 disabled=yes/ip ipsec policy add dst-address=10.0.172.0/24 level=unique peer=myEndpoint_1 proposal=myProposal_1 src-address=10.0.10.0/24 tunnel=yes

If we ping, try ssh or whatever from the net behind the opnSense, we didn't get any response, but we can see the incoming ipsec packets on the Mikrotik side, but no packets from or to any internal IP's, only WAN IP's:
Code:
Columns: INTERFACE, TIME, NUM, DIR, SRC-MAC, DST-MAC, SRC-ADDRESS, DST-ADDRESS, PROTOCOL, SIZE, CPUINTERFACE     TIME   NUM  DIR  SRC-MAC            DST-MAC            SRC-ADDRESS     DST-ADDRESS     PROTOCOL      SIZE  CPUWAN 2 ether6  0.354    1  <-   10:5A:xx:xx:xx:xx  18:FD:xx:xx:xx:xx  11.33.55.77  22.44.66.88  ip:ipsec-esp   186    5WAN 2 ether6  0.45     2  <-   10:5A:xx:xx:xx:xx  18:FD:xx:xx:xx:xx  11.33.55.77  22.44.66.88  ip:ipsec-esp   186    5WAN 2 ether6  0.578    3  <-   10:5A:xx:xx:xx:xx  18:FD:xx:xx:xx:xx  11.33.55.77  22.44.66.88  ip:ipsec-esp   186    5WAN 2 ether6  0.578    4  <-   10:5A:xx:xx:xx:xx  18:FD:xx:xx:xx:xx  11.33.55.77  22.44.66.88  ip:ipsec-esp   186    5WAN 2 ether6  0.578    5  <-   10:5A:xx:xx:xx:xx  18:FD:xx:xx:xx:xx  11.33.55.77  22.44.66.88  ip:ipsec-esp   186    5WAN 2 ether6  1.042    6  <-   10:5A:xx:xx:xx:xx  18:FD:xx:xx:xx:xx  11.33.55.77  22.44.66.88  ip:ipsec-esp   186    5

Without reinitiating the tunnel or doing something else, if we ping from a local net behind the Mikrotik environment to a host behind the opnSense, we got a response and from this moment, the traffic is working from both side, so also from the hosts behind the opnSense can ssh or ping hosts behind the Mikrotik net.
This works for some hours and then we have to "initiate" the connection again from a host behind the Mikrotik net.

We have two IPSec tunnels to different opnSense, both with the same problem and three other IPSec tunnels to Mikrotik endpoints, where works fine.

Any idea where we have to start to looking for to solve this?

Thanks a lot
Ivo

Statistics: Posted by Iv0 — Tue Mar 25, 2025 11:04 am



Viewing all articles
Browse latest Browse all 22231

Trending Articles