Advertisement
Guest User

IPSec IKEv1/ISAKMP Cisco(VTI)-to-Mikrotik(Policy)

a guest
Feb 20th, 2019
270
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.22 KB | None | 0 0
  1. ! Cisco
  2.  
  3. crypto isakmp policy 1
  4. encr aes 256
  5. hash sha256
  6. authentication pre-share
  7. group 14
  8. crypto isakmp key key.MYSUPERKEY address 0.0.0.0
  9. crypto isakmp keepalive 10
  10. !
  11. !
  12. crypto ipsec transform-set ipsec.MYTSET esp-aes 256 esp-sha256-hmac
  13. mode tunnel
  14. !
  15. !
  16. crypto ipsec profile ipspr.MYPROFILE
  17. set transform-set ipsec.MYTSET
  18. !
  19. !
  20. interface Tunnel0
  21. ip address 172.16.10.1 255.255.255.252
  22. tunnel source 198.51.100.10
  23. tunnel destination 203.0.113.113
  24. tunnel protection ipsec profile ipspr.MYPROFILE
  25.  
  26. # Mikrotik
  27.  
  28. /ip ipsec peer profile
  29. set [ find default=yes ] dh-group=modp2048 enc-algorithm=aes-256 hash-algorithm=sha256
  30. /ip ipsec proposal
  31. set [ find default=yes ] auth-algorithms=sha256 disabled=yes enc-algorithms=aes-256-cbc pfs-group=modp2048
  32. /ip ipsec peer
  33. add address=198.51.100.10/32 secret=key.MYSUPERKEY
  34. /ip ipsec policy
  35. add dst-address=198.51.100.10/32 proposal=prop.STRONG sa-dst-address=198.51.100.10 sa-src-address=203.0.113.113 src-address=203.0.113.113/32 tunnel=yes
  36.  
  37. /interface gre
  38. add allow-fast-path=no !keepalive local-address=203.0.113.113 name=gre.ipsec.MYTUNNEL0 remote-address=198.51.100.10
  39.  
  40. /ip address
  41. add address=172.16.10.2/30 interface=gre.ipsec.MYTUNNEL0 network=172.16.10.0
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement