Hi Muhammad

I do consider the ipsec implementation on mikrotik to be broken.

Most other firewalls do implement ipsec on interface level. So all
traffic out that specific interface you define is being encrypted.

Not so Mikrotik. There ipsec is defined on routing level. This
works fine as long as you have one site to site ipsec connection with
one defined route.

But it breaks your local routing, if you want to be able to use a
default route via ipsec.

Here is an example:

Mtik 1:
192.168.1.1/24 Lan1
192.168.2.1/24 Lan2
default route via ipsec Lan5 (also matches 192.168.3.0/24)

Packets to be encrypted match policy routes:
192.168.3.0/24 (obsoleted by route below)
0.0.0.0/0

Mtik 2:
193.168.3.1/24 Lan1
Internet: NAT via Lan5

Packets to be encrypted match policy routes:
192.168.1.1/24
192.168.2.1/24

Now the problem is on the Mikrotik 1:

A Packet from 192.168.1.27 to 192.168.2.54 matches the ipsec policy
route 0.0.0.0/0. It is being ipsec encrypted and sent out he interface
Lan2, where the destination is unable to decrypt as this is an
unencrypted lan.

192.168.3.77 on the other hand, can reach any of your local lan
segments. Only local routing is broken and you don't want to route your
two local lan's via that slow ipsec link remotely.

I have asked the Mikrotik Support for a solution. The only solution
would be to not use a default route, but specify hundreds of specific
routes omitting the routes to your local lan networks.

Now this starts getting a real pain if you use this setup with a dozend
VLAN networks or so (VoIP, IpTV, various DMZ Ranges etc.).

If the packet encryption engine would be bound to Lan5 instead of the
route, this would not be any problem at all.

-Benoit-
_______________________________________________
Mikrotik mailing list
Mikrotik@mail.butchevans.com
http://mail.butchevans.com/mailman/listinfo/mikrotik

Visit http://blog.butchevans.com/ for tutorials related to Mikrotik RouterOS

Reply via email to