Уже вторые сутки бьюсь с микротиком и все никак, нужна ваша помощь
Есть Филиал с RB750GL (192.168.50.0/24)
Есть ЦО с x86 Микротиком (192.168.0.0/24)
Шлюз с интернетом в ЦО 192.168.0.4
Филиал с ЦО соединены через ipsec в туннельном режиме. Все прекрасно работает, никаких проблем нет.
Появилась задача на филиале получать интернет через офис и здесь возникла проблема, какие бы маршруты и правила не писал, интернета нет.
Что я делаю не так?
#
DST-ADDRESS PREF-SRC GATEWAY DISTANCE
0 A S 0.0.0.0/0 192.168.0.4 1
1 ADC 10.5.5.0/24 10.5.5.2 WAN 0
2 ADC 192.168.0.0/24 192.168.0.220 LAN 0
3 A S 192.168.50.0/24 WAN 1
/ip firewall filter> print
Flags: X - disabled, I - invalid, D - dynamic
0 chain=input action=accept
1 chain=forward action=accept
2 chain=output action=accept
[admin@MikroTik] /ip firewall nat> print
Flags: X - disabled, I - invalid, D - dynamic
0 chain=srcnat action=accept src-address=192.168.0.0/24 dst-address=192.168.50.0/24
[admin@MikroTik] > ip ipsec policy print
Flags: X - disabled, D - dynamic, I - inactive
0 src-address=192.168.0.0/24 src-port=any dst-address=192.168.50.0/24 dst-port=any protocol=all actio
sa-src-address=10.5.5.2 sa-dst-address=10.5.5.3 proposal=default priority=0
[admin@MikroTik] > ip ipsec peer print
Flags: X - disabled
0 address=10.5.5.3/32 port=500 auth-method=pre-shared-key secret="1327" generate-policy=no exchange-m
my-id-user-fqdn="" proposal-check=obey hash-algorithm=md5 enc-algorithm=3des dh-group=modp1024 life
dpd-maximum-failures=5
DST-ADDRESS PREF-SRC GATEWAY DISTANCE
0 A S 0.0.0.0/0 192.168.0.4 1
1 ADC 10.5.5.0/24 10.5.5.2 WAN 0
2 ADC 192.168.0.0/24 192.168.0.220 LAN 0
3 A S 192.168.50.0/24 WAN 1
/ip firewall filter> print
Flags: X - disabled, I - invalid, D - dynamic
0 chain=input action=accept
1 chain=forward action=accept
2 chain=output action=accept
[admin@MikroTik] /ip firewall nat> print
Flags: X - disabled, I - invalid, D - dynamic
0 chain=srcnat action=accept src-address=192.168.0.0/24 dst-address=192.168.50.0/24
[admin@MikroTik] > ip ipsec policy print
Flags: X - disabled, D - dynamic, I - inactive
0 src-address=192.168.0.0/24 src-port=any dst-address=192.168.50.0/24 dst-port=any protocol=all actio
sa-src-address=10.5.5.2 sa-dst-address=10.5.5.3 proposal=default priority=0
[admin@MikroTik] > ip ipsec peer print
Flags: X - disabled
0 address=10.5.5.3/32 port=500 auth-method=pre-shared-key secret="1327" generate-policy=no exchange-m
my-id-user-fqdn="" proposal-check=obey hash-algorithm=md5 enc-algorithm=3des dh-group=modp1024 life
dpd-maximum-failures=5
[admin@MikroTik] > ip route print
Flags: X - disabled, A - active, D - dynamic,
C - connect, S - static, r - rip, b - bgp, o - ospf, m - mme,
B - blackhole, U - unreachable, P - prohibit
# DST-ADDRESS PREF-SRC GATEWAY DISTANCE
0 A S 0.0.0.0/0 10.5.5.2 1
1 ADC 10.5.5.0/24 10.5.5.3 WAN 0
2 A S 192.168.0.0/24 WAN 1
3 ADC 192.168.50.0/24 192.168.50.1 LAN 0
[admin@MikroTik] > ip firewall filter print
Flags: X - disabled, I - invalid, D - dynamic
0 chain=input action=accept
1 chain=forward action=accept
2 chain=output action=accept
[admin@MikroTik] > ip firewall nat print
Flags: X - disabled, I - invalid, D - dynamic
0 chain=srcnat action=accept src-address=192.168.50.0/24
dst-address=192.168.0.0/24
[admin@MikroTik] > ip ipsec policy print
Flags: X - disabled, D - dynamic, I - inactive
0 src-address=192.168.50.0/24 src-port=any dst-address=192.168.0.0/24 dst-port=any proto
action=encrypt level=require ipsec-protocols=esp tunnel=yes sa-src-address=10.5.5.3
sa-dst-address=10.5.5.2 proposal=default priority=0
[admin@MikroTik] > ip ipsec peer print
Flags: X - disabled
0 address=10.5.5.2/32 port=500 auth-method=pre-shared-key secret="1327" generate-policy=
exchange-mode=main send-initial-contact=yes nat-traversal=no my-id-user-fqdn=""
proposal-check=obey hash-algorithm=md5 enc-algorithm=3des dh-group=modp1024 lifetime=1
lifebytes=0 dpd-interval=2m dpd-maximum-failures=5
Flags: X - disabled, A - active, D - dynamic,
C - connect, S - static, r - rip, b - bgp, o - ospf, m - mme,
B - blackhole, U - unreachable, P - prohibit
# DST-ADDRESS PREF-SRC GATEWAY DISTANCE
0 A S 0.0.0.0/0 10.5.5.2 1
1 ADC 10.5.5.0/24 10.5.5.3 WAN 0
2 A S 192.168.0.0/24 WAN 1
3 ADC 192.168.50.0/24 192.168.50.1 LAN 0
[admin@MikroTik] > ip firewall filter print
Flags: X - disabled, I - invalid, D - dynamic
0 chain=input action=accept
1 chain=forward action=accept
2 chain=output action=accept
[admin@MikroTik] > ip firewall nat print
Flags: X - disabled, I - invalid, D - dynamic
0 chain=srcnat action=accept src-address=192.168.50.0/24
dst-address=192.168.0.0/24
[admin@MikroTik] > ip ipsec policy print
Flags: X - disabled, D - dynamic, I - inactive
0 src-address=192.168.50.0/24 src-port=any dst-address=192.168.0.0/24 dst-port=any proto
action=encrypt level=require ipsec-protocols=esp tunnel=yes sa-src-address=10.5.5.3
sa-dst-address=10.5.5.2 proposal=default priority=0
[admin@MikroTik] > ip ipsec peer print
Flags: X - disabled
0 address=10.5.5.2/32 port=500 auth-method=pre-shared-key secret="1327" generate-policy=
exchange-mode=main send-initial-contact=yes nat-traversal=no my-id-user-fqdn=""
proposal-check=obey hash-algorithm=md5 enc-algorithm=3des dh-group=modp1024 lifetime=1
lifebytes=0 dpd-interval=2m dpd-maximum-failures=5
