oh, I guess this email never made it...

[EMAIL PROTECTED] > /ip ipsec export
# jun/19/2008 16:25:06 by RouterOS 3.10
# software id = D302-LTT
#
/ip ipsec proposal
set default auth-algorithms=sha1 disabled=no enc-algorithms=3des lifetime=30m name=default pfs-group=modp1024
/ip ipsec peer
add address=65.182.0.0/32:500 auth-method=pre-shared-key dh-group=modp1024 disabled=no dpd-interval=disable-dpd dpd-maximum-failures=5 enc-algorithm=3des exchange-mode=main generate-policy=no hash-algorithm=\ sha1 lifebytes=0 lifetime=1d nat-traversal=no proposal-check=obey secret=0DC6F9434775ADB16D0C7353C0BAB75ED6A397CEB814D2A36A9CAD8FB003CEC5 send-initial-contact=yes
/ip ipsec policy
add action=encrypt disabled=no dst-address=192.168.1.0/24:any ipsec-protocols=ah,esp level=require manual-sa=none priority=0 proposal=default protocol=all sa-dst-address=65.182.0.0 sa-src-address=68.60.0.0 \
   src-address=192.168.2.0/24:any tunnel=yes
[EMAIL PROTECTED] > /ip firewall nat export
# jun/19/2008 16:25:25 by RouterOS 3.10
# software id = D302-LTT
#
/ip firewall nat
add action=accept chain=srcnat comment="" disabled=no dst-address=192.168.1.0/24 src-address=192.168.2.0/24 add action=masquerade chain=srcnat comment="" disabled=no out-interface=ether1


[EMAIL PROTECTED] > /ip ipsec export
# jun/19/2008 16:42:13 by RouterOS 3.10
# software id = 2ZXT-3TT
#
/ip ipsec proposal
set default auth-algorithms=sha1 disabled=no enc-algorithms=3des lifetime=30m name=default pfs-group=modp1024
/ip ipsec peer
add address=68.60.0.0/32:500 auth-method=pre-shared-key dh-group=modp1024 disabled=no dpd-interval=20s dpd-maximum-failures=1 enc-algorithm=3des exchange-mode=main generate-policy=no hash-algorithm=sha1 \ lifebytes=0 lifetime=1d nat-traversal=no proposal-check=obey secret=0DC6F9434775ADB16D0C7353C0BAB75ED6A397CEB814D2A36A9CAD8FB003CEC5 send-initial-contact=yes
/ip ipsec policy
add action=encrypt disabled=no dst-address=192.168.2.0/24:any ipsec-protocols=ah,esp level=require manual-sa=none priority=0 proposal=default protocol=all sa-dst-address=68.60.0.0 sa-src-address=65.182.0.0 \
   src-address=192.168.1.0/24:any tunnel=yes
[EMAIL PROTECTED] > /ip firewall nat export
# jun/19/2008 16:42:15 by RouterOS 3.10
# software id = 2ZXT-3TT
#
/ip firewall nat
add action=accept chain=srcnat comment="" disabled=no dst-address=192.168.2.0/24 src-address=192.168.1.0/24 add action=masquerade chain=srcnat comment="" disabled=no out-interface="ICS PPPoE" add action=dst-nat chain=dstnat comment="" disabled=no dst-port=80 in-interface="ICS PPPoE" protocol=tcp to-addresses=192.168.1.4 to-ports=80 add action=dst-nat chain=dstnat comment="" disabled=no dst-port=1600 in-interface="ICS PPPoE" protocol=tcp to-addresses=192.168.1.4 to-ports=1600 add action=dst-nat chain=dstnat comment="" disabled=no dst-port=554-557 in-interface="ICS PPPoE" protocol=tcp to-addresses=192.168.1.4 to-ports=554-557




----------
Mike Hammett
Intelligent Computing Solutions
http://www.ics-il.com


----- Original Message ----- From: "Butch Evans" <[EMAIL PROTECTED]>
To: "Mikrotik discussions" <[email protected]>
Sent: Saturday, June 14, 2008 7:07 PM
Subject: Re: [Mikrotik] IPSec


On Thu, 12 Jun 2008, Mike Hammett wrote:

we're working with.  The NIF wireless and everything behind it
cannot communicate with anything across the IPSec link, though
everything else including and behind NIF router does.  Everything
including and behind NIF router can talk to everyone else on that
side of the network as well as the Internet.

Post the following information:

/ip ipsec export
/ip firewall nat export

If I understand correctly, the "wireless client" cannot communicate
over the tunnel, but the "security DVR" can?  Also, the workstation
and server at the NIF side can communicate over the tunnel.  What
kind of router is the NIF Wireless device?  If it is, also, a
Mikrotik router, please explain a bit about it's configuration.

--
********************************************************************
*Butch Evans *Professional Network Consultation *
*Network Engineering *MikroTik RouterOS    *
*573-276-2879 *ImageStream                       *
*http://www.butchevans.com/ *StarOS and MORE                   *
*Mikrotik Certified Consultant *Wired or Wireless Networks        *
********************************************************************
_______________________________________________
Mikrotik mailing list
[email protected]
http://www.butchevans.com/mailman/listinfo/mikrotik


Reply via email to