{"id":359,"date":"2026-04-27T09:37:26","date_gmt":"2026-04-27T02:37:26","guid":{"rendered":"https:\/\/altai22.ru\/?p=359"},"modified":"2026-04-27T09:39:11","modified_gmt":"2026-04-27T02:39:11","slug":"ipsec-%d0%bd%d0%b0-mikrotik-site-to-site-%d1%82%d1%83%d0%bd%d0%bd%d0%b5%d0%bb%d1%8c-%d1%81-ikev2","status":"publish","type":"post","link":"https:\/\/altai22.ru\/?p=359","title":{"rendered":"IPsec \u043d\u0430 MikroTik \u2014 site-to-site \u0442\u0443\u043d\u043d\u0435\u043b\u044c \u0441 IKEv2"},"content":{"rendered":"\n<p>IPsec (Internet Protocol Security) \u2014 \u043d\u0430\u0431\u043e\u0440 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u043e\u0432 \u0434\u043b\u044f \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u0438 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u0442\u0440\u0430\u0444\u0438\u043a\u0430 \u043d\u0430 \u0441\u0435\u0442\u0435\u0432\u043e\u043c \u0443\u0440\u043e\u0432\u043d\u0435. \u0412 \u043e\u0442\u043b\u0438\u0447\u0438\u0435 \u043e\u0442 \u0441\u0432\u044f\u0437\u043a\u0438 L2TP\/IPsec, \u0433\u0434\u0435 IPsec \u043b\u0438\u0448\u044c \u043e\u0431\u043e\u0440\u0430\u0447\u0438\u0432\u0430\u0435\u0442 L2TP-\u0442\u0443\u043d\u043d\u0435\u043b\u044c, \u0447\u0438\u0441\u0442\u044b\u0439 IPsec \u0440\u0430\u0431\u043e\u0442\u0430\u0435\u0442 \u0431\u0435\u0437 \u043f\u0440\u043e\u043c\u0435\u0436\u0443\u0442\u043e\u0447\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0430 \u2014 \u043c\u0435\u043d\u044c\u0448\u0435 overhead, \u0432\u044b\u0448\u0435 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0441\u0442\u044c, \u043f\u0440\u043e\u0449\u0435 \u043e\u0442\u043b\u0430\u0434\u043a\u0430. \u0412 \u044d\u0442\u043e\u043c \u0440\u0443\u043a\u043e\u0432\u043e\u0434\u0441\u0442\u0432\u0435 \u043c\u044b \u043d\u0430\u0441\u0442\u0440\u043e\u0438\u043c site-to-site \u0442\u0443\u043d\u043d\u0435\u043b\u044c \u043c\u0435\u0436\u0434\u0443 \u0434\u0432\u0443\u043c\u044f \u043e\u0444\u0438\u0441\u0430\u043c\u0438 \u043d\u0430 MikroTik RouterOS 7.20+ \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c IKEv2, \u0440\u0430\u0437\u0431\u0435\u0440\u0451\u043c \u043a\u0430\u0436\u0434\u044b\u0439 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442 \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u0438, \u0432\u043a\u043b\u044e\u0447\u0438\u043c \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0435 \u0443\u0441\u043a\u043e\u0440\u0435\u043d\u0438\u0435 \u0438 \u0440\u0430\u0441\u0441\u043c\u043e\u0442\u0440\u0438\u043c \u0442\u0438\u043f\u0438\u0447\u043d\u044b\u0435 \u043e\u0448\u0438\u0431\u043a\u0438<\/p>\n\n\n\n<!--more-->\n\n\n\n<h2 class=\"wp-block-heading\">\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">\u041f\u043e\u0447\u0435\u043c\u0443 \u0447\u0438\u0441\u0442\u044b\u0439 IPsec, \u0430 \u043d\u0435 L2TP\/IPsec<\/h3>\n\n\n\n<p>L2TP\/IPsec \u0443\u0434\u043e\u0431\u0435\u043d \u0434\u043b\u044f \u043f\u043e\u0434\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u044f \u043c\u043e\u0431\u0438\u043b\u044c\u043d\u044b\u0445 \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432 \u2014 Windows, macOS \u0438 iOS \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u044e\u0442 \u0435\u0433\u043e \u00ab\u0438\u0437 \u043a\u043e\u0440\u043e\u0431\u043a\u0438\u00bb. \u041d\u043e \u0434\u043b\u044f \u0441\u043e\u0435\u0434\u0438\u043d\u0435\u043d\u0438\u044f \u0434\u0432\u0443\u0445 \u043c\u0430\u0440\u0448\u0440\u0443\u0442\u0438\u0437\u0430\u0442\u043e\u0440\u043e\u0432 (site-to-site) L2TP \u0434\u043e\u0431\u0430\u0432\u043b\u044f\u0435\u0442 \u043d\u0435\u043d\u0443\u0436\u043d\u044b\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u0438\u043d\u043a\u0430\u043f\u0441\u0443\u043b\u044f\u0446\u0438\u0438:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th class=\"has-text-align-left\" data-align=\"left\">\u041f\u0430\u0440\u0430\u043c\u0435\u0442\u0440<\/th><th class=\"has-text-align-left\" data-align=\"left\">\u0427\u0438\u0441\u0442\u044b\u0439 IPsec<\/th><th class=\"has-text-align-left\" data-align=\"left\">L2TP\/IPsec<\/th><\/tr><\/thead><tbody><tr><td>\u0418\u043d\u043a\u0430\u043f\u0441\u0443\u043b\u044f\u0446\u0438\u044f<\/td><td>IP \u2192 ESP \u2192 IP<\/td><td>IP \u2192 ESP \u2192 UDP \u2192 L2TP \u2192 PPP \u2192 IP<\/td><\/tr><tr><td>Overhead \u043d\u0430 \u043f\u0430\u043a\u0435\u0442<\/td><td>50\u201370 \u0431\u0430\u0439\u0442<\/td><td>90\u2013120 \u0431\u0430\u0439\u0442<\/td><\/tr><tr><td>MTU \u044d\u0444\u0444\u0435\u043a\u0442\u0438\u0432\u043d\u044b\u0439<\/td><td>~1400 \u0431\u0430\u0439\u0442<\/td><td>~1360 \u0431\u0430\u0439\u0442<\/td><\/tr><tr><td>\u0421\u043a\u043e\u0440\u043e\u0441\u0442\u044c (RB5009)<\/td><td>500\u2013900 \u041c\u0431\u0438\u0442\/\u0441<\/td><td>200\u2013400 \u041c\u0431\u0438\u0442\/\u0441<\/td><\/tr><tr><td>\u041d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0430 PPP<\/td><td>\u041d\u0435 \u043d\u0443\u0436\u043d\u0430<\/td><td>\u041d\u0443\u0436\u043d\u0430 (\u043f\u0440\u043e\u0444\u0438\u043b\u044c, \u043f\u0443\u043b, \u0441\u0435\u043a\u0440\u0435\u0442\u044b)<\/td><\/tr><tr><td>\u041c\u0430\u0440\u0448\u0440\u0443\u0442\u0438\u0437\u0430\u0446\u0438\u044f \u043f\u043e\u0434\u0441\u0435\u0442\u0435\u0439<\/td><td>\u0427\u0435\u0440\u0435\u0437 policy<\/td><td>\u0427\u0435\u0440\u0435\u0437 PPP + routes<\/td><\/tr><tr><td>\u0421\u0446\u0435\u043d\u0430\u0440\u0438\u0439 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f<\/td><td>Site-to-site<\/td><td>Remote access \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>\u0414\u043b\u044f site-to-site \u0441\u0446\u0435\u043d\u0430\u0440\u0438\u044f \u0447\u0438\u0441\u0442\u044b\u0439 IPsec \u2014 \u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u044b\u0439 \u0432\u044b\u0431\u043e\u0440: \u043c\u0435\u043d\u044c\u0448\u0435 \u0442\u043e\u0447\u0435\u043a \u043e\u0442\u043a\u0430\u0437\u0430, \u0432\u044b\u0448\u0435 \u043f\u0440\u043e\u043f\u0443\u0441\u043a\u043d\u0430\u044f \u0441\u043f\u043e\u0441\u043e\u0431\u043d\u043e\u0441\u0442\u044c, \u043f\u0440\u043e\u0449\u0435 \u0434\u0438\u0430\u0433\u043d\u043e\u0441\u0442\u0438\u043a\u0430.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">IKEv1 vs IKEv2<\/h3>\n\n\n\n<p>IKE (Internet Key Exchange) \u2014 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b \u0441\u043e\u0433\u043b\u0430\u0441\u043e\u0432\u0430\u043d\u0438\u044f \u043f\u0430\u0440\u0430\u043c\u0435\u0442\u0440\u043e\u0432 \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u0438 \u043e\u0431\u043c\u0435\u043d\u0430 \u043a\u043b\u044e\u0447\u0430\u043c\u0438. RouterOS \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0435\u0442 \u043e\u0431\u0435 \u0432\u0435\u0440\u0441\u0438\u0438:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th class=\"has-text-align-left\" data-align=\"left\">\u041a\u0440\u0438\u0442\u0435\u0440\u0438\u0439<\/th><th class=\"has-text-align-left\" data-align=\"left\">IKEv1<\/th><th class=\"has-text-align-left\" data-align=\"left\">IKEv2<\/th><\/tr><\/thead><tbody><tr><td>\u041a\u043e\u043b\u0438\u0447\u0435\u0441\u0442\u0432\u043e \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u0439 \u0434\u043b\u044f \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0438<\/td><td>6 (Main Mode) \u0438\u043b\u0438 3 (Aggressive)<\/td><td>4<\/td><\/tr><tr><td>MOBIKE (\u0441\u043c\u0435\u043d\u0430 IP \u0431\u0435\u0437 \u0440\u0430\u0437\u0440\u044b\u0432\u0430)<\/td><td>\u041d\u0435\u0442<\/td><td>\u0414\u0430<\/td><\/tr><tr><td>\u0412\u0441\u0442\u0440\u043e\u0435\u043d\u043d\u0430\u044f \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0430 NAT-T<\/td><td>\u041e\u043f\u0446\u0438\u043e\u043d\u0430\u043b\u044c\u043d\u043e<\/td><td>\u041e\u0431\u044f\u0437\u0430\u0442\u0435\u043b\u044c\u043d\u043e \u0432 \u0441\u0442\u0430\u043d\u0434\u0430\u0440\u0442\u0435<\/td><\/tr><tr><td>EAP \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u044f<\/td><td>\u041d\u0435\u0442<\/td><td>\u0414\u0430<\/td><\/tr><tr><td>\u0423\u0441\u0442\u043e\u0439\u0447\u0438\u0432\u043e\u0441\u0442\u044c \u043a DDoS<\/td><td>\u041d\u0438\u0437\u043a\u0430\u044f<\/td><td>\u0412\u044b\u0448\u0435 (cookie challenge)<\/td><\/tr><tr><td>\u041f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0430 \u0432 RouterOS<\/td><td>\u0414\u0430<\/td><td>\u0414\u0430 (\u0441 RouterOS 6.38)<\/td><\/tr><tr><td>\u0421\u043e\u0432\u043c\u0435\u0441\u0442\u0438\u043c\u043e\u0441\u0442\u044c \u0441\u043e \u0441\u0442\u0430\u0440\u044b\u043c \u043e\u0431\u043e\u0440\u0443\u0434\u043e\u0432\u0430\u043d\u0438\u0435\u043c<\/td><td>\u0412\u044b\u0448\u0435<\/td><td>\u041d\u0438\u0436\u0435<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>\u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u044f: \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0439\u0442\u0435 IKEv2 \u0434\u043b\u044f \u0432\u0441\u0435\u0445 \u043d\u043e\u0432\u044b\u0445 \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u0439. IKEv1 \u043e\u043f\u0440\u0430\u0432\u0434\u0430\u043d \u0442\u043e\u043b\u044c\u043a\u043e \u043f\u0440\u0438 \u043f\u043e\u0434\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u0438 \u043a \u043e\u0431\u043e\u0440\u0443\u0434\u043e\u0432\u0430\u043d\u0438\u044e, \u043d\u0435 \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u044e\u0449\u0435\u043c\u0443 IKEv2 (\u0441\u0442\u0430\u0440\u044b\u0435 Cisco ASA, Juniper ScreenOS).<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">\u041a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u044b IPsec \u0432 RouterOS<\/h3>\n\n\n\n<p>\u041a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u044f IPsec \u0432 RouterOS 7 \u0441\u043e\u0441\u0442\u043e\u0438\u0442 \u0438\u0437 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u0438\u0445 \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u044b\u0445 \u0441\u0443\u0449\u043d\u043e\u0441\u0442\u0435\u0439:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">code\u041a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u0442\u044c<code>Profile (Phase 1)     \u2014 \u043f\u0430\u0440\u0430\u043c\u0435\u0442\u0440\u044b IKE-\u0441\u043e\u0433\u043b\u0430\u0441\u043e\u0432\u0430\u043d\u0438\u044f\n    \u2193\nProposal (Phase 2)    \u2014 \u043f\u0430\u0440\u0430\u043c\u0435\u0442\u0440\u044b \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u0434\u0430\u043d\u043d\u044b\u0445 (ESP\/AH)\n    \u2193\nPeer                  \u2014 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u0430\u044f \u0441\u0442\u043e\u0440\u043e\u043d\u0430 (IP-\u0430\u0434\u0440\u0435\u0441, \u043f\u0440\u043e\u0444\u0438\u043b\u044c)\n    \u2193\nIdentity              \u2014 \u0441\u043f\u043e\u0441\u043e\u0431 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 (PSK, \u0441\u0435\u0440\u0442\u0438\u0444\u0438\u043a\u0430\u0442)\n    \u2193\nPolicy                \u2014 \u043a\u0430\u043a\u043e\u0439 \u0442\u0440\u0430\u0444\u0438\u043a \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u0442\u044c (src\/dst \u043f\u043e\u0434\u0441\u0435\u0442\u0438)<\/code><\/pre>\n\n\n\n<p><strong>Profile<\/strong>&nbsp;(Phase 1 \/ IKE SA) \u043e\u043f\u0440\u0435\u0434\u0435\u043b\u044f\u0435\u0442:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>DH group \u2014 \u0433\u0440\u0443\u043f\u043f\u0430 \u0414\u0438\u0444\u0444\u0438-\u0425\u0435\u043b\u043b\u043c\u0430\u043d\u0430 \u0434\u043b\u044f \u043e\u0431\u043c\u0435\u043d\u0430 \u043a\u043b\u044e\u0447\u0430\u043c\u0438 (modp2048, modp3072, ecp256)<\/li>\n\n\n\n<li>Encryption algorithm \u2014 \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u0438\u0435 IKE-\u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u0439 (aes-256, aes-128)<\/li>\n\n\n\n<li>Hash algorithm \u2014 \u0430\u043b\u0433\u043e\u0440\u0438\u0442\u043c \u0445\u0435\u0448\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f (sha256, sha512)<\/li>\n\n\n\n<li>Lifetime \u2014 \u0432\u0440\u0435\u043c\u044f \u0436\u0438\u0437\u043d\u0438 IKE SA (\u043f\u043e \u0443\u043c\u043e\u043b\u0447\u0430\u043d\u0438\u044e 1 \u0434\u0435\u043d\u044c)<\/li>\n<\/ul>\n\n\n\n<p><strong>Proposal<\/strong>&nbsp;(Phase 2 \/ IPsec SA) \u043e\u043f\u0440\u0435\u0434\u0435\u043b\u044f\u0435\u0442:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Enc-algorithms \u2014 \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0434\u0430\u043d\u043d\u044b\u0445 (aes-256-cbc, aes-256-gcm)<\/li>\n\n\n\n<li>Auth-algorithms \u2014 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u044f \u0434\u0430\u043d\u043d\u044b\u0445 (sha256, sha512; \u043d\u0435 \u043d\u0443\u0436\u043d\u043e \u0434\u043b\u044f GCM)<\/li>\n\n\n\n<li>PFS group \u2014 Perfect Forward Secrecy (\u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f modp2048 \u0438\u043b\u0438 ecp256)<\/li>\n\n\n\n<li>Lifetime \u2014 \u0432\u0440\u0435\u043c\u044f \u0436\u0438\u0437\u043d\u0438 IPsec SA (\u043f\u043e \u0443\u043c\u043e\u043b\u0447\u0430\u043d\u0438\u044e 30 \u043c\u0438\u043d\u0443\u0442)<\/li>\n<\/ul>\n\n\n\n<p><strong>Peer<\/strong>&nbsp;\u2014 \u043e\u043f\u0440\u0435\u0434\u0435\u043b\u044f\u0435\u0442 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u0443\u044e \u0441\u0442\u043e\u0440\u043e\u043d\u0443: IP-\u0430\u0434\u0440\u0435\u0441 \u0438\u043b\u0438 DNS-\u0438\u043c\u044f, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u044b\u0439 Profile, \u043f\u043e\u0440\u0442 (500\/4500).<\/p>\n\n\n\n<p><strong>Identity<\/strong>&nbsp;\u2014 \u043f\u0440\u0438\u0432\u044f\u0437\u044b\u0432\u0430\u0435\u0442 \u0441\u043f\u043e\u0441\u043e\u0431 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u043a Peer: pre-shared key (PSK), \u0441\u0435\u0440\u0442\u0438\u0444\u0438\u043a\u0430\u0442 \u0438\u043b\u0438 EAP.<\/p>\n\n\n\n<p><strong>Policy<\/strong>&nbsp;\u2014 \u0437\u0430\u0434\u0430\u0451\u0442, \u043a\u0430\u043a\u043e\u0439 \u0442\u0440\u0430\u0444\u0438\u043a \u043d\u0430\u043f\u0440\u0430\u0432\u043b\u044f\u0442\u044c \u0432 \u0442\u0443\u043d\u043d\u0435\u043b\u044c: \u0438\u0441\u0445\u043e\u0434\u043d\u0430\u044f \u043f\u043e\u0434\u0441\u0435\u0442\u044c (src-address), \u0446\u0435\u043b\u0435\u0432\u0430\u044f \u043f\u043e\u0434\u0441\u0435\u0442\u044c (dst-address), \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b, \u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0435 (encrypt).<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">\u0412\u044b\u0431\u043e\u0440 \u0430\u043b\u0433\u043e\u0440\u0438\u0442\u043c\u043e\u0432 \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u0438\u044f<\/h3>\n\n\n\n<p>\u041f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u044b\u0439 \u0432\u044b\u0431\u043e\u0440 \u0430\u043b\u0433\u043e\u0440\u0438\u0442\u043c\u043e\u0432 \u2014 \u0431\u0430\u043b\u0430\u043d\u0441 \u043c\u0435\u0436\u0434\u0443 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c\u044e \u0438 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0441\u0442\u044c\u044e. RouterOS 7.20 \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0435\u0442 \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u0435 \u043a\u043e\u043c\u0431\u0438\u043d\u0430\u0446\u0438\u0438:<\/p>\n\n\n\n<p><strong>\u0428\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u0438\u0435 (enc-algorithms):<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th class=\"has-text-align-left\" data-align=\"left\">\u0410\u043b\u0433\u043e\u0440\u0438\u0442\u043c<\/th><th class=\"has-text-align-left\" data-align=\"left\">\u0414\u043b\u0438\u043d\u0430 \u043a\u043b\u044e\u0447\u0430<\/th><th class=\"has-text-align-left\" data-align=\"left\">\u0420\u0435\u0436\u0438\u043c<\/th><th class=\"has-text-align-left\" data-align=\"left\">\u0421\u043a\u043e\u0440\u043e\u0441\u0442\u044c (RB5009)<\/th><th class=\"has-text-align-left\" data-align=\"left\">\u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u044f<\/th><\/tr><\/thead><tbody><tr><td><code>aes-128-cbc<\/code><\/td><td>128 \u0431\u0438\u0442<\/td><td>CBC<\/td><td>~400 \u041c\u0431\u0438\u0442\/\u0441<\/td><td>\u041f\u0440\u0438\u0435\u043c\u043b\u0435\u043c\u043e, \u043d\u043e \u0443\u0441\u0442\u0430\u0440\u0435\u0432\u0430\u0435\u0442<\/td><\/tr><tr><td><code>aes-256-cbc<\/code><\/td><td>256 \u0431\u0438\u0442<\/td><td>CBC<\/td><td>~350 \u041c\u0431\u0438\u0442\/\u0441<\/td><td>\u0411\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e, \u043d\u043e \u043c\u0435\u0434\u043b\u0435\u043d\u043d\u0435\u0435 GCM<\/td><\/tr><tr><td><code>aes-128-gcm<\/code><\/td><td>128 \u0431\u0438\u0442<\/td><td>GCM<\/td><td>~700 \u041c\u0431\u0438\u0442\/\u0441<\/td><td>\u0425\u043e\u0440\u043e\u0448\u0438\u0439 \u0432\u044b\u0431\u043e\u0440<\/td><\/tr><tr><td><code>aes-256-gcm<\/code><\/td><td>256 \u0431\u0438\u0442<\/td><td>GCM<\/td><td>~600 \u041c\u0431\u0438\u0442\/\u0441<\/td><td>\u041b\u0443\u0447\u0448\u0438\u0439 \u0432\u044b\u0431\u043e\u0440 \u0434\u043b\u044f \u043d\u043e\u0432\u044b\u0445 \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u0439<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>GCM (Galois\/Counter Mode) \u2014 \u043f\u0440\u0435\u0434\u043f\u043e\u0447\u0442\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0439 \u0440\u0435\u0436\u0438\u043c. \u041e\u043d \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0435\u0442 \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0438 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u044e \u0437\u0430 \u043e\u0434\u043d\u0443 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u044e (AEAD), \u0447\u0442\u043e \u0431\u044b\u0441\u0442\u0440\u0435\u0435 \u0440\u0430\u0437\u0434\u0435\u043b\u044c\u043d\u044b\u0445 CBC + HMAC. \u041a\u0440\u043e\u043c\u0435 \u0442\u043e\u0433\u043e, GCM \u043b\u0443\u0447\u0448\u0435 \u043f\u0430\u0440\u0430\u043b\u043b\u0435\u043b\u0438\u0437\u0443\u0435\u0442\u0441\u044f \u043d\u0430 \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u044b\u0445 \u0443\u0441\u043a\u043e\u0440\u0438\u0442\u0435\u043b\u044f\u0445.<\/p>\n\n\n\n<p>\u041f\u0440\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0438 CBC \u043e\u0431\u044f\u0437\u0430\u0442\u0435\u043b\u044c\u043d\u043e \u0443\u043a\u0430\u0437\u044b\u0432\u0430\u0439\u0442\u0435&nbsp;<code>auth-algorithms<\/code>&nbsp;(sha256 \u0438\u043b\u0438 sha512). \u041f\u0440\u0438 GCM \u2014&nbsp;<code>auth-algorithms<\/code>&nbsp;\u043d\u0435 \u043d\u0443\u0436\u0435\u043d (\u0432\u0441\u0442\u0440\u043e\u0435\u043d\u043d\u0430\u044f \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u044f).<\/p>\n\n\n\n<p><strong>\u0413\u0440\u0443\u043f\u043f\u044b \u0414\u0438\u0444\u0444\u0438-\u0425\u0435\u043b\u043b\u043c\u0430\u043d\u0430 (DH group):<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th class=\"has-text-align-left\" data-align=\"left\">\u0413\u0440\u0443\u043f\u043f\u0430<\/th><th class=\"has-text-align-left\" data-align=\"left\">\u0422\u0438\u043f<\/th><th class=\"has-text-align-left\" data-align=\"left\">\u042d\u043a\u0432\u0438\u0432\u0430\u043b\u0435\u043d\u0442 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438<\/th><th class=\"has-text-align-left\" data-align=\"left\">\u0421\u043a\u043e\u0440\u043e\u0441\u0442\u044c \u0441\u043e\u0433\u043b\u0430\u0441\u043e\u0432\u0430\u043d\u0438\u044f<\/th><\/tr><\/thead><tbody><tr><td><code>modp1024<\/code><\/td><td>MODP<\/td><td>~80 \u0431\u0438\u0442<\/td><td>\u0411\u044b\u0441\u0442\u0440\u043e, \u043d\u043e \u043d\u0435\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e<\/td><\/tr><tr><td><code>modp2048<\/code><\/td><td>MODP<\/td><td>~112 \u0431\u0438\u0442<\/td><td>\u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u043c\u044b\u0439 \u043c\u0438\u043d\u0438\u043c\u0443\u043c<\/td><\/tr><tr><td><code>modp3072<\/code><\/td><td>MODP<\/td><td>~128 \u0431\u0438\u0442<\/td><td>\u0425\u043e\u0440\u043e\u0448\u043e<\/td><\/tr><tr><td><code>modp4096<\/code><\/td><td>MODP<\/td><td>~152 \u0431\u0438\u0442<\/td><td>\u041d\u0430\u0434\u0451\u0436\u043d\u043e, \u043d\u043e \u043c\u0435\u0434\u043b\u0435\u043d\u043d\u043e<\/td><\/tr><tr><td><code>ecp256<\/code><\/td><td>ECDH<\/td><td>~128 \u0431\u0438\u0442<\/td><td>\u0411\u044b\u0441\u0442\u0440\u043e \u0438 \u043d\u0430\u0434\u0451\u0436\u043d\u043e<\/td><\/tr><tr><td><code>ecp384<\/code><\/td><td>ECDH<\/td><td>~192 \u0431\u0438\u0442<\/td><td>\u041d\u0430\u0434\u0451\u0436\u043d\u043e<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>\u042d\u043b\u043b\u0438\u043f\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u043a\u0440\u0438\u0432\u044b\u0435 (<code>ecp256<\/code>,&nbsp;<code>ecp384<\/code>) \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0438\u0432\u0430\u044e\u0442 \u0442\u0443 \u0436\u0435 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c \u043f\u0440\u0438 \u0437\u043d\u0430\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e \u043c\u0435\u043d\u044c\u0448\u0435\u0439 \u0434\u043b\u0438\u043d\u0435 \u043a\u043b\u044e\u0447\u0430, \u0447\u0442\u043e \u0443\u0441\u043a\u043e\u0440\u044f\u0435\u0442 \u0441\u043e\u0433\u043b\u0430\u0441\u043e\u0432\u0430\u043d\u0438\u0435. \u0414\u043b\u044f \u043d\u043e\u0432\u044b\u0445 \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u0439 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f&nbsp;<code>ecp256<\/code>&nbsp;\u0438\u043b\u0438&nbsp;<code>modp2048<\/code>&nbsp;\u043a\u0430\u043a \u043c\u0438\u043d\u0438\u043c\u0443\u043c. \u0413\u0440\u0443\u043f\u043f\u0430&nbsp;<code>modp1024<\/code>&nbsp;\u0441\u0447\u0438\u0442\u0430\u0435\u0442\u0441\u044f \u043d\u0435\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0439 \u0438 \u043d\u0435 \u0434\u043e\u043b\u0436\u043d\u0430 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c\u0441\u044f.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">\u0421\u0445\u0435\u043c\u0430 \u0441\u0435\u0442\u0438<\/h3>\n\n\n\n<p>\u0412 \u043d\u0430\u0448\u0435\u043c \u043f\u0440\u0438\u043c\u0435\u0440\u0435 \u043c\u044b \u0441\u043e\u0435\u0434\u0438\u043d\u044f\u0435\u043c \u0434\u0432\u0430 \u043e\u0444\u0438\u0441\u0430:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>\u041e\u0444\u0438\u0441 A (HQ)<\/strong>: WAN 203.0.113.10, LAN 192.168.10.0\/24, \u0440\u043e\u0443\u0442\u0435\u0440 RB5009<\/li>\n\n\n\n<li><strong>\u041e\u0444\u0438\u0441 B (Branch)<\/strong>: WAN 198.51.100.20, LAN 192.168.20.0\/24, \u0440\u043e\u0443\u0442\u0435\u0440 hAP ax3<\/li>\n\n\n\n<li><strong>\u041f\u0440\u043e\u0442\u043e\u043a\u043e\u043b<\/strong>: IKEv2, PSK-\u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u044f, AES-256-GCM<\/li>\n<\/ul>\n\n\n\n<pre class=\"wp-block-preformatted\">code\u041a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u0442\u044c<code>  \u041e\u0444\u0438\u0441 A (HQ)                        \u041e\u0444\u0438\u0441 B (Branch)\n\u250c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2510                    \u250c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2510\n\u2502 192.168.10.0\/24 \u2502\u2500\u2500\u2500 IPsec \u2500\u2500\u2500\u2502 192.168.20.0\/24 \u2502\n\u2502 WAN: 203.0.113.10 \u2502  tunnel   \u2502 WAN: 198.51.100.20 \u2502\n\u2514\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2518                    \u2514\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2518<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\">\u041d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0430<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">\u0428\u0430\u0433 1. Profile (Phase 1)<\/h3>\n\n\n\n<p>\u0421\u043e\u0437\u0434\u0430\u0451\u043c \u043e\u0434\u0438\u043d\u0430\u043a\u043e\u0432\u044b\u0439 \u043f\u0440\u043e\u0444\u0438\u043b\u044c \u043d\u0430 \u043e\u0431\u043e\u0438\u0445 \u0440\u043e\u0443\u0442\u0435\u0440\u0430\u0445. \u0418\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c \u0441\u043e\u0432\u0440\u0435\u043c\u0435\u043d\u043d\u044b\u0435 \u0430\u043b\u0433\u043e\u0440\u0438\u0442\u043c\u044b:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">[admin@MikroTik] &gt;\u041a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u0442\u044c<code>\/ip\/ipsec\/profile\/add \\\n  name=ike2-profile \\\n  hash-algorithm=sha256 \\\n  enc-algorithm=aes-256 \\\n  dh-group=modp2048 \\\n  lifetime=1d \\\n  proposal-check=obey \\\n  nat-traversal=yes \\\n  dpd-interval=30s \\\n  dpd-maximum-failures=5<\/code><\/pre>\n\n\n\n<p>\u041f\u0430\u0440\u0430\u043c\u0435\u0442\u0440\u044b:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>dh-group=modp2048<\/code>&nbsp;\u2014 2048-\u0431\u0438\u0442\u043d\u0430\u044f \u0433\u0440\u0443\u043f\u043f\u0430 \u0414\u0438\u0444\u0444\u0438-\u0425\u0435\u043b\u043b\u043c\u0430\u043d\u0430, \u0431\u0430\u043b\u0430\u043d\u0441 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0438 \u0441\u043a\u043e\u0440\u043e\u0441\u0442\u0438. \u0414\u043b\u044f \u043c\u0430\u043a\u0441\u0438\u043c\u0430\u043b\u044c\u043d\u043e\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0439\u0442\u0435&nbsp;<code>ecp256<\/code>&nbsp;(\u044d\u043b\u043b\u0438\u043f\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u043a\u0440\u0438\u0432\u044b\u0435)<\/li>\n\n\n\n<li><code>nat-traversal=yes<\/code>&nbsp;\u2014 \u0432\u043a\u043b\u044e\u0447\u0430\u0435\u043c NAT-T \u043d\u0430 \u0441\u043b\u0443\u0447\u0430\u0439, \u0435\u0441\u043b\u0438 \u043e\u0434\u043d\u0430 \u0438\u0437 \u0441\u0442\u043e\u0440\u043e\u043d \u043e\u043a\u0430\u0436\u0435\u0442\u0441\u044f \u0437\u0430 NAT<\/li>\n\n\n\n<li><code>dpd-interval=30s<\/code>&nbsp;\u2014 Dead Peer Detection, \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0430 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u043e\u0441\u0442\u0438 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e\u0439 \u0441\u0442\u043e\u0440\u043e\u043d\u044b \u043a\u0430\u0436\u0434\u044b\u0435 30 \u0441\u0435\u043a\u0443\u043d\u0434<\/li>\n\n\n\n<li><code>dpd-maximum-failures=5<\/code>&nbsp;\u2014 \u043f\u043e\u0441\u043b\u0435 5 \u043d\u0435\u0443\u0434\u0430\u0447\u043d\u044b\u0445 DPD (2.5 \u043c\u0438\u043d\u0443\u0442\u044b) \u0442\u0443\u043d\u043d\u0435\u043b\u044c \u0431\u0443\u0434\u0435\u0442 \u043f\u0435\u0440\u0435\u0441\u043e\u0433\u043b\u0430\u0441\u043e\u0432\u0430\u043d<\/li>\n\n\n\n<li><code>proposal-check=obey<\/code>&nbsp;\u2014 \u043f\u0440\u0438\u043d\u0438\u043c\u0430\u0442\u044c \u043f\u0430\u0440\u0430\u043c\u0435\u0442\u0440\u044b \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e\u0439 \u0441\u0442\u043e\u0440\u043e\u043d\u044b, \u0435\u0441\u043b\u0438 \u043e\u043d\u0438 \u043d\u0435 \u0441\u043b\u0430\u0431\u0435\u0435 \u043d\u0430\u0448\u0438\u0445<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">\u0428\u0430\u0433 2. Proposal (Phase 2)<\/h3>\n\n\n\n<pre class=\"wp-block-preformatted\">[admin@MikroTik] &gt;\u041a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u0442\u044c<code>\/ip\/ipsec\/proposal\/add \\\n  name=ike2-proposal \\\n  enc-algorithms=aes-256-gcm \\\n  lifetime=30m \\\n  pfs-group=modp2048<\/code><\/pre>\n\n\n\n<p>\u041f\u0430\u0440\u0430\u043c\u0435\u0442\u0440\u044b:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>enc-algorithms=aes-256-gcm<\/code>&nbsp;\u2014 AES-256 \u0432 \u0440\u0435\u0436\u0438\u043c\u0435 GCM (Galois\/Counter Mode). GCM \u043e\u0434\u043d\u043e\u0432\u0440\u0435\u043c\u0435\u043d\u043d\u043e \u0448\u0438\u0444\u0440\u0443\u0435\u0442 \u0438 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u0443\u0435\u0442 \u0434\u0430\u043d\u043d\u044b\u0435, \u043f\u043e\u044d\u0442\u043e\u043c\u0443 \u043e\u0442\u0434\u0435\u043b\u044c\u043d\u044b\u0439&nbsp;<code>auth-algorithms<\/code>&nbsp;\u043d\u0435 \u043d\u0443\u0436\u0435\u043d. \u0415\u0441\u043b\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0435 CBC \u2014 \u0443\u043a\u0430\u0436\u0438\u0442\u0435&nbsp;<code>auth-algorithms=sha256<\/code><\/li>\n\n\n\n<li><code>pfs-group=modp2048<\/code>&nbsp;\u2014 Perfect Forward Secrecy. \u041f\u0440\u0438 \u043a\u0430\u0436\u0434\u043e\u043c \u043f\u0435\u0440\u0435\u0441\u043e\u0433\u043b\u0430\u0441\u043e\u0432\u0430\u043d\u0438\u0438 Phase 2 \u0433\u0435\u043d\u0435\u0440\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u043d\u043e\u0432\u044b\u0439 \u043a\u043b\u044e\u0447 \u0447\u0435\u0440\u0435\u0437 DH. \u041a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0430\u0446\u0438\u044f \u043e\u0434\u043d\u043e\u0433\u043e \u043a\u043b\u044e\u0447\u0430 \u043d\u0435 \u0440\u0430\u0441\u043a\u0440\u044b\u0432\u0430\u0435\u0442 \u043f\u0440\u0435\u0434\u044b\u0434\u0443\u0449\u0438\u0439 \u0442\u0440\u0430\u0444\u0438\u043a<\/li>\n\n\n\n<li><code>lifetime=30m<\/code>&nbsp;\u2014 \u043f\u0435\u0440\u0435\u0441\u043e\u0433\u043b\u0430\u0441\u043e\u0432\u0430\u043d\u0438\u0435 \u043a\u0430\u0436\u0434\u044b\u0435 30 \u043c\u0438\u043d\u0443\u0442. \u0414\u043b\u044f GCM \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043d\u0435 \u0431\u043e\u043b\u044c\u0448\u0435 1 \u0447\u0430\u0441\u0430<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">\u0428\u0430\u0433 3. Peer<\/h3>\n\n\n\n<p><strong>\u041d\u0430 \u0440\u043e\u0443\u0442\u0435\u0440\u0435 \u041e\u0444\u0438\u0441\u0430 A (HQ):<\/strong><\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">[admin@MikroTik] &gt;\u041a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u0442\u044c<code>\/ip\/ipsec\/peer\/add \\\n  name=peer-branch \\\n  address=198.51.100.20\/32 \\\n  profile=ike2-profile \\\n  exchange-mode=ike2<\/code><\/pre>\n\n\n\n<p><strong>\u041d\u0430 \u0440\u043e\u0443\u0442\u0435\u0440\u0435 \u041e\u0444\u0438\u0441\u0430 B (Branch):<\/strong><\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">[admin@MikroTik] &gt;\u041a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u0442\u044c<code>\/ip\/ipsec\/peer\/add \\\n  name=peer-hq \\\n  address=203.0.113.10\/32 \\\n  profile=ike2-profile \\\n  exchange-mode=ike2<\/code><\/pre>\n\n\n\n<p>\u041f\u0430\u0440\u0430\u043c\u0435\u0442\u0440&nbsp;<code>exchange-mode=ike2<\/code>&nbsp;\u044f\u0432\u043d\u043e \u0443\u043a\u0430\u0437\u044b\u0432\u0430\u0435\u0442 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c IKEv2. \u041f\u043e \u0443\u043c\u043e\u043b\u0447\u0430\u043d\u0438\u044e RouterOS \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442 IKEv1 main mode.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">\u0428\u0430\u0433 4. Identity (\u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u044f)<\/h3>\n\n\n\n<p>\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c pre-shared key. \u041a\u043b\u044e\u0447 \u0434\u043e\u043b\u0436\u0435\u043d \u0431\u044b\u0442\u044c \u043e\u0434\u0438\u043d\u0430\u043a\u043e\u0432\u044b\u043c \u043d\u0430 \u043e\u0431\u0435\u0438\u0445 \u0441\u0442\u043e\u0440\u043e\u043d\u0430\u0445. \u0421\u0433\u0435\u043d\u0435\u0440\u0438\u0440\u0443\u0439\u0442\u0435 \u043d\u0430\u0434\u0451\u0436\u043d\u044b\u0439 \u043a\u043b\u044e\u0447 \u0434\u043b\u0438\u043d\u043e\u0439 \u043d\u0435 \u043c\u0435\u043d\u0435\u0435 32 \u0441\u0438\u043c\u0432\u043e\u043b\u043e\u0432:<\/p>\n\n\n\n<p><strong>\u041d\u0430 \u0440\u043e\u0443\u0442\u0435\u0440\u0435 \u041e\u0444\u0438\u0441\u0430 A (HQ):<\/strong><\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">[admin@MikroTik] &gt;\u041a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u0442\u044c<code>\/ip\/ipsec\/identity\/add \\\n  peer=peer-branch \\\n  auth-method=pre-shared-key \\\n  secret=\"Jx9#mK2$vL5nQ8@wR3pT7yB0hF6dA1cE\"<\/code><\/pre>\n\n\n\n<p><strong>\u041d\u0430 \u0440\u043e\u0443\u0442\u0435\u0440\u0435 \u041e\u0444\u0438\u0441\u0430 B (Branch):<\/strong><\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">[admin@MikroTik] &gt;\u041a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u0442\u044c<code>\/ip\/ipsec\/identity\/add \\\n  peer=peer-hq \\\n  auth-method=pre-shared-key \\\n  secret=\"Jx9#mK2$vL5nQ8@wR3pT7yB0hF6dA1cE\"<\/code><\/pre>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><strong>\u0412\u043d\u0438\u043c\u0430\u043d\u0438\u0435:<\/strong>&nbsp;\u0432 \u043f\u0440\u043e\u0434\u0430\u043a\u0448\u0435\u043d\u0435 \u0432\u043c\u0435\u0441\u0442\u043e PSK \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u0441\u0435\u0440\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u044b. PSK \u043e\u0434\u0438\u043d\u0430\u043a\u043e\u0432\u044b\u0439 \u043d\u0430 \u043e\u0431\u0435\u0438\u0445 \u0441\u0442\u043e\u0440\u043e\u043d\u0430\u0445 \u2014 \u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0430\u0446\u0438\u044f \u043e\u0434\u043d\u043e\u0433\u043e \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 \u0440\u0430\u0441\u043a\u0440\u044b\u0432\u0430\u0435\u0442 \u043a\u043b\u044e\u0447 \u0434\u043b\u044f \u043e\u0431\u043e\u0438\u0445.<\/p>\n<\/blockquote>\n\n\n\n<h3 class=\"wp-block-heading\">\u0428\u0430\u0433 5. Policy (\u043a\u0430\u043a\u043e\u0439 \u0442\u0440\u0430\u0444\u0438\u043a \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u0442\u044c)<\/h3>\n\n\n\n<p>Policy \u043e\u043f\u0440\u0435\u0434\u0435\u043b\u044f\u0435\u0442, \u043a\u0430\u043a\u0438\u0435 \u043f\u043e\u0434\u0441\u0435\u0442\u0438 \u0431\u0443\u0434\u0443\u0442 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b \u0447\u0435\u0440\u0435\u0437 \u0442\u0443\u043d\u043d\u0435\u043b\u044c.<\/p>\n\n\n\n<p><strong>\u041d\u0430 \u0440\u043e\u0443\u0442\u0435\u0440\u0435 \u041e\u0444\u0438\u0441\u0430 A (HQ):<\/strong><\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">[admin@MikroTik] &gt;\u041a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u0442\u044c<code>\/ip\/ipsec\/policy\/add \\\n  peer=peer-branch \\\n  src-address=192.168.10.0\/24 \\\n  dst-address=192.168.20.0\/24 \\\n  tunnel=yes \\\n  sa-src-address=203.0.113.10 \\\n  sa-dst-address=198.51.100.20 \\\n  proposal=ike2-proposal \\\n  action=encrypt \\\n  level=require<\/code><\/pre>\n\n\n\n<p><strong>\u041d\u0430 \u0440\u043e\u0443\u0442\u0435\u0440\u0435 \u041e\u0444\u0438\u0441\u0430 B (Branch):<\/strong><\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">[admin@MikroTik] &gt;\u041a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u0442\u044c<code>\/ip\/ipsec\/policy\/add \\\n  peer=peer-hq \\\n  src-address=192.168.20.0\/24 \\\n  dst-address=192.168.10.0\/24 \\\n  tunnel=yes \\\n  sa-src-address=198.51.100.20 \\\n  sa-dst-address=203.0.113.10 \\\n  proposal=ike2-proposal \\\n  action=encrypt \\\n  level=require<\/code><\/pre>\n\n\n\n<p>\u041e\u0431\u0440\u0430\u0442\u0438\u0442\u0435 \u0432\u043d\u0438\u043c\u0430\u043d\u0438\u0435:&nbsp;<code>src-address<\/code>&nbsp;\u0438&nbsp;<code>dst-address<\/code>&nbsp;\u0437\u0435\u0440\u043a\u0430\u043b\u044c\u043d\u043e \u043e\u0442\u0440\u0430\u0436\u0435\u043d\u044b \u043d\u0430 \u0434\u0432\u0443\u0445 \u0440\u043e\u0443\u0442\u0435\u0440\u0430\u0445.&nbsp;<code>sa-src-address<\/code>&nbsp;\u0438&nbsp;<code>sa-dst-address<\/code>&nbsp;\u2014 \u044d\u0442\u043e WAN-\u0430\u0434\u0440\u0435\u0441\u0430 \u0440\u043e\u0443\u0442\u0435\u0440\u043e\u0432 (\u0432\u043d\u0435\u0448\u043d\u0438\u0435 \u0442\u043e\u0447\u043a\u0438 \u0442\u0443\u043d\u043d\u0435\u043b\u044f).<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">\u0428\u0430\u0433 6. Firewall \u0438 NAT bypass<\/h3>\n\n\n\n<p>IPsec-\u0442\u0440\u0430\u0444\u0438\u043a \u043c\u0435\u0436\u0434\u0443 \u043f\u043e\u0434\u0441\u0435\u0442\u044f\u043c\u0438 \u043d\u0435 \u0434\u043e\u043b\u0436\u0435\u043d \u043f\u043e\u043f\u0430\u0434\u0430\u0442\u044c \u043f\u043e\u0434 masquerade (NAT). \u0411\u0435\u0437 \u044d\u0442\u043e\u0433\u043e \u043f\u0440\u0430\u0432\u0438\u043b\u0430 \u043f\u0430\u043a\u0435\u0442\u044b \u0438\u0437 LAN \u0431\u0443\u0434\u0443\u0442 \u043d\u0430\u0442\u0438\u0442\u044c\u0441\u044f \u043d\u0430 WAN-\u0430\u0434\u0440\u0435\u0441 \u043f\u0440\u0435\u0436\u0434\u0435, \u0447\u0435\u043c \u043f\u043e\u043f\u0430\u0434\u0443\u0442 \u0432 IPsec-policy, \u0438 \u0442\u0443\u043d\u043d\u0435\u043b\u044c \u043d\u0435 \u0437\u0430\u0440\u0430\u0431\u043e\u0442\u0430\u0435\u0442.<\/p>\n\n\n\n<p><strong>\u041d\u0430 \u0440\u043e\u0443\u0442\u0435\u0440\u0435 \u041e\u0444\u0438\u0441\u0430 A (HQ):<\/strong><\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">[admin@MikroTik] &gt;\u041a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u0442\u044c<code># NAT bypass \u2014 \u0442\u0440\u0430\u0444\u0438\u043a \u043c\u0435\u0436\u0434\u0443 \u043e\u0444\u0438\u0441\u0430\u043c\u0438 \u043d\u0435 \u043d\u0430\u0442\u0438\u0442\u0441\u044f\n\/ip\/firewall\/nat\/add \\\n  chain=srcnat \\\n  src-address=192.168.10.0\/24 \\\n  dst-address=192.168.20.0\/24 \\\n  action=accept \\\n  comment=\"IPsec: no NAT to Branch\" \\\n  place-before=0<\/code><\/pre>\n\n\n\n<p><strong>\u041d\u0430 \u0440\u043e\u0443\u0442\u0435\u0440\u0435 \u041e\u0444\u0438\u0441\u0430 B (Branch):<\/strong><\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">[admin@MikroTik] &gt;\u041a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u0442\u044c<code>\/ip\/firewall\/nat\/add \\\n  chain=srcnat \\\n  src-address=192.168.20.0\/24 \\\n  dst-address=192.168.10.0\/24 \\\n  action=accept \\\n  comment=\"IPsec: no NAT to HQ\" \\\n  place-before=0<\/code><\/pre>\n\n\n\n<p><code>place-before=0<\/code>&nbsp;\u2014 \u0440\u0430\u0437\u043c\u0435\u0449\u0430\u0435\u043c \u043f\u0440\u0430\u0432\u0438\u043b\u043e \u043f\u0435\u0440\u0435\u0434 masquerade, \u0447\u0442\u043e\u0431\u044b \u043e\u043d\u043e \u0441\u0440\u0430\u0431\u0430\u0442\u044b\u0432\u0430\u043b\u043e \u043f\u0435\u0440\u0432\u044b\u043c.<\/p>\n\n\n\n<p>\u0422\u0430\u043a\u0436\u0435 \u043d\u0443\u0436\u043d\u043e \u0440\u0430\u0437\u0440\u0435\u0448\u0438\u0442\u044c IPsec-\u0442\u0440\u0430\u0444\u0438\u043a \u0432 input chain (\u0435\u0441\u043b\u0438 \u0443 \u0432\u0430\u0441 \u0441\u0442\u0440\u043e\u0433\u0438\u0439 firewall):<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">[admin@MikroTik] &gt;\u041a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u0442\u044c<code>\/ip\/firewall\/filter\/add \\\n  chain=input \\\n  protocol=udp \\\n  dst-port=500,4500 \\\n  action=accept \\\n  comment=\"Allow IKE and NAT-T\" \\\n  place-before=0\n\n\/ip\/firewall\/filter\/add \\\n  chain=input \\\n  protocol=ipsec-esp \\\n  action=accept \\\n  comment=\"Allow IPsec ESP\" \\\n  place-before=0<\/code><\/pre>\n\n\n\n<p>\u0414\u043b\u044f forward chain \u0440\u0430\u0437\u0440\u0435\u0448\u0438\u0442\u0435 \u0442\u0440\u0430\u0444\u0438\u043a \u043c\u0435\u0436\u0434\u0443 \u043f\u043e\u0434\u0441\u0435\u0442\u044f\u043c\u0438:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">[admin@MikroTik] &gt;\u041a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u0442\u044c<code>\/ip\/firewall\/filter\/add \\\n  chain=forward \\\n  src-address=192.168.10.0\/24 \\\n  dst-address=192.168.20.0\/24 \\\n  ipsec-policy=in,ipsec \\\n  action=accept \\\n  comment=\"Allow IPsec forward from HQ to Branch\"\n\n\/ip\/firewall\/filter\/add \\\n  chain=forward \\\n  src-address=192.168.20.0\/24 \\\n  dst-address=192.168.10.0\/24 \\\n  ipsec-policy=in,ipsec \\\n  action=accept \\\n  comment=\"Allow IPsec forward from Branch to HQ\"<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\">NAT-T (NAT Traversal)<\/h2>\n\n\n\n<p>\u0415\u0441\u043b\u0438 \u043e\u0434\u043d\u0430 \u0438\u0437 \u0441\u0442\u043e\u0440\u043e\u043d IPsec-\u0442\u0443\u043d\u043d\u0435\u043b\u044f \u043d\u0430\u0445\u043e\u0434\u0438\u0442\u0441\u044f \u0437\u0430 NAT (\u043d\u0430\u043f\u0440\u0438\u043c\u0435\u0440, \u043f\u0440\u043e\u0432\u0430\u0439\u0434\u0435\u0440 \u0432\u044b\u0434\u0430\u0451\u0442 \u0441\u0435\u0440\u044b\u0439 IP), \u0441\u0442\u0430\u043d\u0434\u0430\u0440\u0442\u043d\u044b\u0439 IPsec (ESP, IP protocol 50) \u0440\u0430\u0431\u043e\u0442\u0430\u0442\u044c \u043d\u0435 \u0431\u0443\u0434\u0435\u0442 \u2014 NAT \u043d\u0435 \u0443\u043c\u0435\u0435\u0442 \u0442\u0440\u0430\u043d\u0441\u043b\u0438\u0440\u043e\u0432\u0430\u0442\u044c ESP-\u043f\u0430\u043a\u0435\u0442\u044b.<\/p>\n\n\n\n<p>NAT-T \u0440\u0435\u0448\u0430\u0435\u0442 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0443, \u043e\u0431\u043e\u0440\u0430\u0447\u0438\u0432\u0430\u044f ESP-\u043f\u0430\u043a\u0435\u0442\u044b \u0432 UDP \u043f\u043e\u0440\u0442 4500:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">code\u041a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u0442\u044c<code>\u0411\u0435\u0437 NAT-T:  IP \u2192 ESP (protocol 50)          \u2014 \u043d\u0435 \u043f\u0440\u043e\u0445\u043e\u0434\u0438\u0442 NAT\n\u0421 NAT-T:    IP \u2192 UDP:4500 \u2192 ESP             \u2014 \u043f\u0440\u043e\u0445\u043e\u0434\u0438\u0442 NAT<\/code><\/pre>\n\n\n\n<p>\u0412 \u043d\u0430\u0448\u0435\u0439 \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u0438 NAT-T \u0443\u0436\u0435 \u0432\u043a\u043b\u044e\u0447\u0451\u043d \u0432 \u043f\u0440\u043e\u0444\u0438\u043b\u0435 (<code>nat-traversal=yes<\/code>). RouterOS \u0430\u0432\u0442\u043e\u043c\u0430\u0442\u0438\u0447\u0435\u0441\u043a\u0438 \u043e\u043f\u0440\u0435\u0434\u0435\u043b\u0438\u0442 \u043d\u0430\u043b\u0438\u0447\u0438\u0435 NAT \u0438 \u043f\u0435\u0440\u0435\u043a\u043b\u044e\u0447\u0438\u0442\u0441\u044f \u043d\u0430 UDP 4500.<\/p>\n\n\n\n<p>\u0415\u0441\u043b\u0438 \u043e\u0431\u0435 \u0441\u0442\u043e\u0440\u043e\u043d\u044b \u0438\u043c\u0435\u044e\u0442 \u0431\u0435\u043b\u044b\u0439 IP \u2014 NAT-T \u043d\u0435 \u0430\u043a\u0442\u0438\u0432\u0438\u0440\u0443\u0435\u0442\u0441\u044f, \u0442\u0440\u0430\u0444\u0438\u043a \u0438\u0434\u0451\u0442 \u0447\u0435\u0440\u0435\u0437 ESP (protocol 50), \u0447\u0442\u043e \u044d\u0444\u0444\u0435\u043a\u0442\u0438\u0432\u043d\u0435\u0435.<\/p>\n\n\n\n<p>\u041f\u0440\u043e\u0432\u0435\u0440\u0438\u0442\u044c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 NAT-T:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">[admin@MikroTik] &gt;\u041a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u0442\u044c<code>\/ip\/ipsec\/active-peers\/print detail<\/code><\/pre>\n\n\n\n<p>\u041f\u043e\u043b\u0435&nbsp;<code>natt-peer<\/code>&nbsp;\u043f\u043e\u043a\u0430\u0436\u0435\u0442&nbsp;<code>yes<\/code>, \u0435\u0441\u043b\u0438 NAT-T \u0430\u043a\u0442\u0438\u0432\u0435\u043d.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">\u0410\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0435 \u0443\u0441\u043a\u043e\u0440\u0435\u043d\u0438\u0435 (Hardware Acceleration)<\/h2>\n\n\n\n<p>\u041d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043c\u043e\u0434\u0435\u043b\u0438 MikroTik \u0438\u043c\u0435\u044e\u0442 \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u044b\u0435 \u043a\u0440\u0438\u043f\u0442\u043e\u0443\u0441\u043a\u043e\u0440\u0438\u0442\u0435\u043b\u0438:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th class=\"has-text-align-left\" data-align=\"left\">\u041c\u043e\u0434\u0435\u043b\u044c<\/th><th class=\"has-text-align-left\" data-align=\"left\">\u0423\u0441\u043a\u043e\u0440\u0438\u0442\u0435\u043b\u044c<\/th><th class=\"has-text-align-left\" data-align=\"left\">AES-256-GCM \u0441\u043a\u043e\u0440\u043e\u0441\u0442\u044c<\/th><\/tr><\/thead><tbody><tr><td>RB5009UG+S+IN<\/td><td>\u0414\u0430 (Marvell Armada)<\/td><td>500\u2013900 \u041c\u0431\u0438\u0442\/\u0441<\/td><\/tr><tr><td>CCR2004-1G-12S+2XS<\/td><td>\u0414\u0430 (Annapurna Labs)<\/td><td>1\u20132 \u0413\u0431\u0438\u0442\/\u0441<\/td><\/tr><tr><td>CCR2116-12G-4S+<\/td><td>\u0414\u0430 (Amazon Graviton)<\/td><td>2\u20134 \u0413\u0431\u0438\u0442\/\u0441<\/td><\/tr><tr><td>hAP ax2 (C52iG-5HaxD2HaxD)<\/td><td>\u041d\u0435\u0442 (IPQ-5018)<\/td><td>100\u2013200 \u041c\u0431\u0438\u0442\/\u0441 (CPU)<\/td><\/tr><tr><td>hAP ax3 (C53UiG+5HPaxD2HPaxD)<\/td><td>\u0427\u0430\u0441\u0442\u0438\u0447\u043d\u043e (MediaTek)<\/td><td>200\u2013400 \u041c\u0431\u0438\u0442\/\u0441<\/td><\/tr><tr><td>hEX S (RB760iGS)<\/td><td>\u041d\u0435\u0442<\/td><td>50\u2013100 \u041c\u0431\u0438\u0442\/\u0441 (CPU)<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>\u041f\u0440\u043e\u0432\u0435\u0440\u0438\u0442\u044c \u043d\u0430\u043b\u0438\u0447\u0438\u0435 \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0443\u0441\u043a\u043e\u0440\u0435\u043d\u0438\u044f:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">[admin@MikroTik] &gt;\u041a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u0442\u044c<code>\/system\/resource\/print<\/code><\/pre>\n\n\n\n<p>\u0412 \u043f\u043e\u043b\u0435&nbsp;<code>board-name<\/code>&nbsp;\u0443\u043a\u0430\u0437\u0430\u043d\u0430 \u043c\u043e\u0434\u0435\u043b\u044c. \u0422\u0430\u043a\u0436\u0435 \u043c\u043e\u0436\u043d\u043e \u043f\u0440\u043e\u0432\u0435\u0440\u0438\u0442\u044c \u0437\u0430\u0433\u0440\u0443\u0437\u043a\u0443 CPU \u043f\u0440\u0438 \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u043c \u0442\u0443\u043d\u043d\u0435\u043b\u0435 \u2014 \u0435\u0441\u043b\u0438 CPU \u0437\u0430\u0433\u0440\u0443\u0436\u0435\u043d \u043d\u0430 100% \u043f\u0440\u0438 \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u0438\u0438, \u0443\u0441\u043a\u043e\u0440\u0438\u0442\u0435\u043b\u044f \u043d\u0435\u0442.<\/p>\n\n\n\n<p>\u0414\u043b\u044f \u043c\u0430\u043a\u0441\u0438\u043c\u0430\u043b\u044c\u043d\u043e\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0441\u0442\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0439\u0442\u0435:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>aes-256-gcm<\/code>&nbsp;\u0432\u043c\u0435\u0441\u0442\u043e&nbsp;<code>aes-256-cbc<\/code>&nbsp;\u2014 GCM \u043e\u043f\u0442\u0438\u043c\u0438\u0437\u0438\u0440\u043e\u0432\u0430\u043d \u0434\u043b\u044f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0443\u0441\u043a\u043e\u0440\u0435\u043d\u0438\u044f<\/li>\n\n\n\n<li><code>ecp256<\/code>&nbsp;\u0432\u043c\u0435\u0441\u0442\u043e&nbsp;<code>modp2048<\/code>&nbsp;\u0434\u043b\u044f DH group \u2014 \u044d\u043b\u043b\u0438\u043f\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u043a\u0440\u0438\u0432\u044b\u0435 \u0431\u044b\u0441\u0442\u0440\u0435\u0435 \u043f\u0440\u0438 \u0442\u043e\u043c \u0436\u0435 \u0443\u0440\u043e\u0432\u043d\u0435 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438<\/li>\n\n\n\n<li><code>lifetime=1h<\/code>&nbsp;\u0434\u043b\u044f Phase 2 \u2014 \u0440\u0435\u0436\u0435 \u043f\u0435\u0440\u0435\u0441\u043e\u0433\u043b\u0430\u0441\u043e\u0432\u0430\u043d\u0438\u0435, \u043d\u043e \u043d\u0435 \u0431\u043e\u043b\u044c\u0448\u0435 1 \u0447\u0430\u0441\u0430 \u0434\u043b\u044f GCM<\/li>\n<\/ul>\n\n\n\n<p>\u041e\u043f\u0442\u0438\u043c\u0438\u0437\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u0430\u044f \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u044f \u0434\u043b\u044f RB5009\/CCR:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">[admin@MikroTik] &gt;\u041a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u0442\u044c<code>\/ip\/ipsec\/profile\/set ike2-profile \\\n  dh-group=ecp256 \\\n  enc-algorithm=aes-256 \\\n  hash-algorithm=sha256\n\n\/ip\/ipsec\/proposal\/set ike2-proposal \\\n  enc-algorithms=aes-256-gcm \\\n  pfs-group=ecp256 \\\n  lifetime=1h<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\">\u041f\u0440\u043e\u0432\u0435\u0440\u043a\u0430<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">\u0421\u0442\u0430\u0442\u0443\u0441 \u043f\u043e\u0434\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u044f<\/h3>\n\n\n\n<p>\u041f\u043e\u0441\u043b\u0435 \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0438 \u043e\u0431\u0435\u0438\u0445 \u0441\u0442\u043e\u0440\u043e\u043d \u0442\u0443\u043d\u043d\u0435\u043b\u044c \u0434\u043e\u043b\u0436\u0435\u043d \u043f\u043e\u0434\u043d\u044f\u0442\u044c\u0441\u044f \u0430\u0432\u0442\u043e\u043c\u0430\u0442\u0438\u0447\u0435\u0441\u043a\u0438 \u043f\u0440\u0438 \u043f\u043e\u044f\u0432\u043b\u0435\u043d\u0438\u0438 \u0442\u0440\u0430\u0444\u0438\u043a\u0430, \u0441\u043e\u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u0433\u043e policy. \u0414\u043b\u044f \u043f\u0440\u0438\u043d\u0443\u0434\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0439 \u0438\u043d\u0438\u0446\u0438\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u2014 \u043e\u0442\u043f\u0440\u0430\u0432\u044c\u0442\u0435 ping \u0438\u0437 \u043e\u0434\u043d\u043e\u0439 \u043f\u043e\u0434\u0441\u0435\u0442\u0438 \u0432 \u0434\u0440\u0443\u0433\u0443\u044e:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">[admin@MikroTik] &gt;\u041a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u0442\u044c<code># \u0421 \u0440\u043e\u0443\u0442\u0435\u0440\u0430 \u041e\u0444\u0438\u0441\u0430 A \u2014 \u043f\u0438\u043d\u0433 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 \u0432 \u041e\u0444\u0438\u0441\u0435 B\n\/ping 192.168.20.1 src-address=192.168.10.1 count=5<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\">\u041f\u0440\u043e\u0432\u0435\u0440\u043a\u0430 Phase 1 (IKE SA)<\/h3>\n\n\n\n<pre class=\"wp-block-preformatted\">[admin@MikroTik] &gt;\u041a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u0442\u044c<code>\/ip\/ipsec\/active-peers\/print detail<\/code><\/pre>\n\n\n\n<p>\u041e\u0436\u0438\u0434\u0430\u0435\u043c\u044b\u0439 \u0432\u044b\u0432\u043e\u0434:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">code\u041a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u0442\u044c<code> 0   peer=peer-branch state=established\n     local-address=203.0.113.10 remote-address=198.51.100.20\n     side=initiator uptime=2h15m30s\n     ph2-total=1 natt-peer=no\n     established=mar\/15\/2026 10:30:15<\/code><\/pre>\n\n\n\n<p>\u041a\u043b\u044e\u0447\u0435\u0432\u044b\u0435 \u043f\u043e\u043b\u044f:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>state=established<\/code>&nbsp;\u2014 Phase 1 \u0443\u0441\u043f\u0435\u0448\u043d\u043e \u0441\u043e\u0433\u043b\u0430\u0441\u043e\u0432\u0430\u043d\u0430<\/li>\n\n\n\n<li><code>side=initiator<\/code>&nbsp;\u0438\u043b\u0438&nbsp;<code>responder<\/code>&nbsp;\u2014 \u043a\u0442\u043e \u0438\u043d\u0438\u0446\u0438\u0438\u0440\u043e\u0432\u0430\u043b \u043f\u043e\u0434\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u0435<\/li>\n\n\n\n<li><code>ph2-total=1<\/code>&nbsp;\u2014 \u043a\u043e\u043b\u0438\u0447\u0435\u0441\u0442\u0432\u043e \u0430\u043a\u0442\u0438\u0432\u043d\u044b\u0445 Phase 2 SA<\/li>\n\n\n\n<li><code>natt-peer=no<\/code>&nbsp;\u2014 NAT-T \u043d\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f (\u043e\u0431\u0435 \u0441\u0442\u043e\u0440\u043e\u043d\u044b \u0441 \u0431\u0435\u043b\u044b\u043c IP)<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">\u041f\u0440\u043e\u0432\u0435\u0440\u043a\u0430 Phase 2 (IPsec SA)<\/h3>\n\n\n\n<pre class=\"wp-block-preformatted\">[admin@MikroTik] &gt;\u041a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u0442\u044c<code>\/ip\/ipsec\/installed-sa\/print detail<\/code><\/pre>\n\n\n\n<p>\u041e\u0436\u0438\u0434\u0430\u0435\u043c\u044b\u0439 \u0432\u044b\u0432\u043e\u0434:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">code\u041a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u0442\u044c<code> 0   peer=peer-branch direction=in\n     src-address=198.51.100.20 dst-address=203.0.113.10\n     auth-algorithm=none enc-algorithm=aes-256-gcm\n     current-bytes=15234567 current-packets=10234\n     add-lifetime=30m\/25m12s replay-size=64\n     state=mature hw-aead=yes\n\n 1   peer=peer-branch direction=out\n     src-address=203.0.113.10 dst-address=198.51.100.20\n     auth-algorithm=none enc-algorithm=aes-256-gcm\n     current-bytes=12345678 current-packets=8765\n     add-lifetime=30m\/25m12s replay-size=64\n     state=mature hw-aead=yes<\/code><\/pre>\n\n\n\n<p>\u041a\u043b\u044e\u0447\u0435\u0432\u044b\u0435 \u043f\u043e\u043b\u044f:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>state=mature<\/code>&nbsp;\u2014 SA \u0430\u043a\u0442\u0438\u0432\u043d\u0430 \u0438 \u0440\u0430\u0431\u043e\u0442\u0430\u0435\u0442<\/li>\n\n\n\n<li><code>hw-aead=yes<\/code>&nbsp;\u2014 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0435 \u0443\u0441\u043a\u043e\u0440\u0435\u043d\u0438\u0435<\/li>\n\n\n\n<li><code>current-bytes<\/code>&nbsp;\/&nbsp;<code>current-packets<\/code>&nbsp;\u2014 \u0441\u0447\u0451\u0442\u0447\u0438\u043a\u0438 \u0442\u0440\u0430\u0444\u0438\u043a\u0430 (\u0434\u043e\u043b\u0436\u043d\u044b \u0440\u0430\u0441\u0442\u0438 \u043f\u0440\u0438 \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u043c \u043e\u0431\u043c\u0435\u043d\u0435)<\/li>\n\n\n\n<li><code>enc-algorithm=aes-256-gcm<\/code>&nbsp;\u2014 \u043f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0438\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u043e\u0433\u043e \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u0438\u044f<\/li>\n\n\n\n<li>\u0414\u043e\u043b\u0436\u043d\u043e \u0431\u044b\u0442\u044c \u0434\u0432\u0435 SA \u2014 \u043e\u0434\u043d\u0430&nbsp;<code>direction=in<\/code>, \u0432\u0442\u043e\u0440\u0430\u044f&nbsp;<code>direction=out<\/code><\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">\u041f\u0440\u043e\u0432\u0435\u0440\u043a\u0430 policy<\/h3>\n\n\n\n<pre class=\"wp-block-preformatted\">[admin@MikroTik] &gt;\u041a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u0442\u044c<code>\/ip\/ipsec\/policy\/print stats<\/code><\/pre>\n\n\n\n<p>\u0421\u0442\u043e\u043b\u0431\u0446\u044b&nbsp;<code>ph2-count<\/code>&nbsp;\u0438&nbsp;<code>ph2-state<\/code>&nbsp;\u043f\u043e\u043a\u0430\u0436\u0443\u0442 \u0441\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435.&nbsp;<code>ph2-state=established<\/code>&nbsp;\u043e\u0437\u043d\u0430\u0447\u0430\u0435\u0442, \u0447\u0442\u043e policy \u0430\u043a\u0442\u0438\u0432\u043d\u0430 \u0438 \u0442\u0440\u0430\u0444\u0438\u043a \u0448\u0438\u0444\u0440\u0443\u0435\u0442\u0441\u044f.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">\u041c\u043e\u043d\u0438\u0442\u043e\u0440\u0438\u043d\u0433 \u0442\u0440\u0430\u0444\u0438\u043a\u0430<\/h3>\n\n\n\n<pre class=\"wp-block-preformatted\">[admin@MikroTik] &gt;\u041a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u0442\u044c<code># \u0421\u0447\u0451\u0442\u0447\u0438\u043a\u0438 \u043d\u0430 policy\n\/ip\/ipsec\/policy\/print stats\n\n# \u0422\u0440\u0430\u0444\u0438\u043a \u0447\u0435\u0440\u0435\u0437 \u0442\u0443\u043d\u043d\u0435\u043b\u044c \u0432 \u0440\u0435\u0430\u043b\u044c\u043d\u043e\u043c \u0432\u0440\u0435\u043c\u0435\u043d\u0438\n\/tool\/torch interface=ether1 src-address=192.168.10.0\/24 dst-address=192.168.20.0\/24<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\">\u041b\u043e\u0433\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 IPsec<\/h3>\n\n\n\n<p>\u0414\u043b\u044f \u0434\u0435\u0442\u0430\u043b\u044c\u043d\u043e\u0439 \u043e\u0442\u043b\u0430\u0434\u043a\u0438 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435 \u043b\u043e\u0433\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">[admin@MikroTik] &gt;\u041a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u0442\u044c<code>\/system\/logging\/add topics=ipsec action=memory<\/code><\/pre>\n\n\n\n<p>\u041f\u0440\u043e\u0441\u043c\u043e\u0442\u0440 \u043b\u043e\u0433\u043e\u0432:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">[admin@MikroTik] &gt;\u041a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u0442\u044c<code>\/log\/print where topics~\"ipsec\"<\/code><\/pre>\n\n\n\n<p>\u041f\u043e\u0441\u043b\u0435 \u0437\u0430\u0432\u0435\u0440\u0448\u0435\u043d\u0438\u044f \u043e\u0442\u043b\u0430\u0434\u043a\u0438 \u043e\u0442\u043a\u043b\u044e\u0447\u0438\u0442\u0435 \u2014 IPsec \u0433\u0435\u043d\u0435\u0440\u0438\u0440\u0443\u0435\u0442 \u043c\u043d\u043e\u0433\u043e \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u0439:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">[admin@MikroTik] &gt;\u041a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u0442\u044c<code>\/system\/logging\/remove [find where topics~\"ipsec\"]<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\">\u0414\u043e\u0431\u0430\u0432\u043b\u0435\u043d\u0438\u0435 \u0442\u0440\u0435\u0442\u044c\u0435\u0433\u043e \u043e\u0444\u0438\u0441\u0430<\/h2>\n\n\n\n<p>\u0414\u043b\u044f \u043f\u043e\u0434\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u044f \u0435\u0449\u0451 \u043e\u0434\u043d\u043e\u0433\u043e \u043e\u0444\u0438\u0441\u0430 (\u043d\u0430\u043f\u0440\u0438\u043c\u0435\u0440, 192.168.30.0\/24 \u043d\u0430 WAN 192.0.2.50) \u043f\u043e\u0432\u0442\u043e\u0440\u0438\u0442\u0435 \u0448\u0430\u0433\u0438 3\u20136 \u0434\u043b\u044f \u043a\u0430\u0436\u0434\u043e\u0439 \u043f\u0430\u0440\u044b \u0440\u043e\u0443\u0442\u0435\u0440\u043e\u0432. Profile \u0438 Proposal \u043c\u043e\u0436\u043d\u043e \u043f\u0435\u0440\u0435\u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c:<\/p>\n\n\n\n<p><strong>\u041d\u0430 \u0440\u043e\u0443\u0442\u0435\u0440\u0435 \u041e\u0444\u0438\u0441\u0430 A (HQ) \u2014 \u0434\u043e\u0431\u0430\u0432\u043b\u044f\u0435\u043c peer \u0434\u043b\u044f \u041e\u0444\u0438\u0441\u0430 C:<\/strong><\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">[admin@MikroTik] &gt;\u041a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u0442\u044c<code>\/ip\/ipsec\/peer\/add \\\n  name=peer-office-c \\\n  address=192.0.2.50\/32 \\\n  profile=ike2-profile \\\n  exchange-mode=ike2\n\n\/ip\/ipsec\/identity\/add \\\n  peer=peer-office-c \\\n  auth-method=pre-shared-key \\\n  secret=\"aB3@kL9#mN5$pQ7&amp;rT1!vX4%yZ8wF2h\"\n\n\/ip\/ipsec\/policy\/add \\\n  peer=peer-office-c \\\n  src-address=192.168.10.0\/24 \\\n  dst-address=192.168.30.0\/24 \\\n  tunnel=yes \\\n  sa-src-address=203.0.113.10 \\\n  sa-dst-address=192.0.2.50 \\\n  proposal=ike2-proposal \\\n  action=encrypt \\\n  level=require\n\n\/ip\/firewall\/nat\/add \\\n  chain=srcnat \\\n  src-address=192.168.10.0\/24 \\\n  dst-address=192.168.30.0\/24 \\\n  action=accept \\\n  comment=\"IPsec: no NAT to Office C\" \\\n  place-before=0<\/code><\/pre>\n\n\n\n<p>\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0439\u0442\u0435 \u0440\u0430\u0437\u043d\u044b\u0435 PSK \u0434\u043b\u044f \u043a\u0430\u0436\u0434\u043e\u0439 \u043f\u0430\u0440\u044b. \u041d\u0435 \u043a\u043e\u043f\u0438\u0440\u0443\u0439\u0442\u0435 \u043e\u0434\u0438\u043d \u043a\u043b\u044e\u0447 \u043d\u0430 \u0432\u0441\u0435 \u0442\u0443\u043d\u043d\u0435\u043b\u0438 \u2014 \u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0430\u0446\u0438\u044f \u043e\u0434\u043d\u043e\u0433\u043e \u043a\u043b\u044e\u0447\u0430 \u043d\u0435 \u0434\u043e\u043b\u0436\u043d\u0430 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0442\u044c \u0434\u0440\u0443\u0433\u0438\u0435.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">\u0410\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u044f \u0447\u0435\u0440\u0435\u0437 \u0441\u0435\u0440\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u044b<\/h2>\n\n\n\n<p>\u0414\u043b\u044f \u043f\u0440\u043e\u0434\u0430\u043a\u0448\u043d-\u0441\u0440\u0435\u0434\u044b \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u0441\u0435\u0440\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u044b \u0432\u043c\u0435\u0441\u0442\u043e PSK. \u0421\u043e\u0437\u0434\u0430\u0451\u043c CA \u0438 \u0441\u0435\u0440\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u044b \u043d\u0430 \u043e\u0434\u043d\u043e\u043c \u0438\u0437 \u0440\u043e\u0443\u0442\u0435\u0440\u043e\u0432 \u0438 \u044d\u043a\u0441\u043f\u043e\u0440\u0442\u0438\u0440\u0443\u0435\u043c \u043d\u0430 \u0434\u0440\u0443\u0433\u043e\u0439:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">[admin@MikroTik] &gt;\u041a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u0442\u044c<code># \u0421\u043e\u0437\u0434\u0430\u0451\u043c CA\n\/certificate\/add name=ipsec-ca common-name=\"IPsec CA\" \\\n  key-size=2048 days-valid=3650 key-usage=key-cert-sign,crl-sign\n\/certificate\/sign ipsec-ca\n\n# \u0421\u0435\u0440\u0442\u0438\u0444\u0438\u043a\u0430\u0442 \u0434\u043b\u044f \u041e\u0444\u0438\u0441\u0430 A\n\/certificate\/add name=cert-hq common-name=\"HQ-Router\" \\\n  key-size=2048 days-valid=1825 \\\n  key-usage=digital-signature,key-encipherment,tls-client\n\/certificate\/sign cert-hq ca=ipsec-ca\n\n# \u0421\u0435\u0440\u0442\u0438\u0444\u0438\u043a\u0430\u0442 \u0434\u043b\u044f \u041e\u0444\u0438\u0441\u0430 B\n\/certificate\/add name=cert-branch common-name=\"Branch-Router\" \\\n  key-size=2048 days-valid=1825 \\\n  key-usage=digital-signature,key-encipherment,tls-client\n\/certificate\/sign cert-branch ca=ipsec-ca<\/code><\/pre>\n\n\n\n<p>\u042d\u043a\u0441\u043f\u043e\u0440\u0442\u0438\u0440\u0443\u0435\u043c \u0441\u0435\u0440\u0442\u0438\u0444\u0438\u043a\u0430\u0442 \u0438 \u043a\u043b\u044e\u0447 \u0434\u043b\u044f \u041e\u0444\u0438\u0441\u0430 B:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">[admin@MikroTik] &gt;\u041a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u0442\u044c<code>\/certificate\/export-certificate cert-branch export-passphrase=\"ExportPass123\"\n\/certificate\/export-certificate ipsec-ca<\/code><\/pre>\n\n\n\n<p>\u0424\u0430\u0439\u043b\u044b \u043f\u043e\u044f\u0432\u044f\u0442\u0441\u044f \u0432&nbsp;<code>\/file<\/code>&nbsp;\u2014 \u043f\u0435\u0440\u0435\u043d\u0435\u0441\u0438\u0442\u0435 \u0438\u0445 \u043d\u0430 \u0440\u043e\u0443\u0442\u0435\u0440 \u041e\u0444\u0438\u0441\u0430 B \u0447\u0435\u0440\u0435\u0437 Winbox \u0438\u043b\u0438 SCP. \u041d\u0430 \u0440\u043e\u0443\u0442\u0435\u0440\u0435 \u041e\u0444\u0438\u0441\u0430 B \u0438\u043c\u043f\u043e\u0440\u0442\u0438\u0440\u0443\u0435\u043c:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">[admin@MikroTik] &gt;\u041a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u0442\u044c<code>\/certificate\/import file-name=ipsec-ca.crt\n\/certificate\/import file-name=cert-branch.crt passphrase=\"ExportPass123\"\n\/certificate\/import file-name=cert-branch.key passphrase=\"ExportPass123\"<\/code><\/pre>\n\n\n\n<p>\u0417\u0430\u0442\u0435\u043c \u043c\u0435\u043d\u044f\u0435\u043c Identity \u043d\u0430 \u043e\u0431\u043e\u0438\u0445 \u0440\u043e\u0443\u0442\u0435\u0440\u0430\u0445:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">[admin@MikroTik] &gt;\u041a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u0442\u044c<code># \u041e\u0444\u0438\u0441 A\n\/ip\/ipsec\/identity\/set [find peer=peer-branch] \\\n  auth-method=digital-signature \\\n  certificate=cert-hq \\\n  remote-certificate=cert-branch\n\n# \u041e\u0444\u0438\u0441 B\n\/ip\/ipsec\/identity\/set [find peer=peer-hq] \\\n  auth-method=digital-signature \\\n  certificate=cert-branch \\\n  remote-certificate=cert-hq<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\">\u0422\u0438\u043f\u0438\u0447\u043d\u044b\u0435 \u043e\u0448\u0438\u0431\u043a\u0438<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">1. Phase 1 \u043d\u0435 \u043f\u043e\u0434\u043d\u0438\u043c\u0430\u0435\u0442\u0441\u044f \u2014 \u00abno phase2 proposal chosen\u00bb<\/h3>\n\n\n\n<p>\u0421\u0430\u043c\u0430\u044f \u0447\u0430\u0441\u0442\u0430\u044f \u043e\u0448\u0438\u0431\u043a\u0430 \u2014 \u043d\u0435\u0441\u043e\u0432\u043f\u0430\u0434\u0435\u043d\u0438\u0435 \u043f\u0430\u0440\u0430\u043c\u0435\u0442\u0440\u043e\u0432 Profile \u0438\u043b\u0438 Proposal \u043d\u0430 \u0434\u0432\u0443\u0445 \u0441\u0442\u043e\u0440\u043e\u043d\u0430\u0445. \u041f\u0440\u043e\u0432\u0435\u0440\u044c\u0442\u0435 \u0447\u0442\u043e \u043d\u0430 \u043e\u0431\u043e\u0438\u0445 \u0440\u043e\u0443\u0442\u0435\u0440\u0430\u0445 \u043e\u0434\u0438\u043d\u0430\u043a\u043e\u0432\u044b\u0435:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">[admin@MikroTik] &gt;\u041a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u0442\u044c<code># \u0421\u0440\u0430\u0432\u043d\u0438\u0442\u0435 \u0432\u044b\u0432\u043e\u0434 \u043d\u0430 \u043e\u0431\u043e\u0438\u0445 \u0440\u043e\u0443\u0442\u0435\u0440\u0430\u0445\n\/ip\/ipsec\/profile\/print detail where name=ike2-profile\n\/ip\/ipsec\/proposal\/print detail where name=ike2-proposal<\/code><\/pre>\n\n\n\n<p>\u041f\u0430\u0440\u0430\u043c\u0435\u0442\u0440\u044b, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0434\u043e\u043b\u0436\u043d\u044b \u0441\u043e\u0432\u043f\u0430\u0434\u0430\u0442\u044c:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Profile<\/strong>:&nbsp;<code>hash-algorithm<\/code>,&nbsp;<code>enc-algorithm<\/code>,&nbsp;<code>dh-group<\/code><\/li>\n\n\n\n<li><strong>Proposal<\/strong>:&nbsp;<code>enc-algorithms<\/code>,&nbsp;<code>auth-algorithms<\/code>,&nbsp;<code>pfs-group<\/code><\/li>\n<\/ul>\n\n\n\n<p>\u0427\u0430\u0441\u0442\u0430\u044f \u043b\u043e\u0432\u0443\u0448\u043a\u0430: \u043d\u0430 \u043e\u0434\u043d\u043e\u0439 \u0441\u0442\u043e\u0440\u043e\u043d\u0435&nbsp;<code>aes-256-gcm<\/code>, \u043d\u0430 \u0434\u0440\u0443\u0433\u043e\u0439&nbsp;<code>aes-256-cbc<\/code>&nbsp;+&nbsp;<code>sha256<\/code>. \u042d\u0442\u043e \u0440\u0430\u0437\u043d\u044b\u0435 \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u0438, Phase 2 \u043d\u0435 \u0441\u043e\u0433\u043b\u0430\u0441\u0443\u0435\u0442\u0441\u044f.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. \u0422\u0443\u043d\u043d\u0435\u043b\u044c \u043f\u043e\u0434\u043d\u044f\u043b\u0441\u044f, \u043d\u043e \u0442\u0440\u0430\u0444\u0438\u043a \u043d\u0435 \u0438\u0434\u0451\u0442<\/h3>\n\n\n\n<p>\u041f\u0440\u043e\u0432\u0435\u0440\u044c\u0442\u0435 NAT bypass. \u0415\u0441\u043b\u0438 \u0442\u0440\u0430\u0444\u0438\u043a \u043c\u0435\u0436\u0434\u0443 \u043f\u043e\u0434\u0441\u0435\u0442\u044f\u043c\u0438 \u043f\u043e\u043f\u0430\u0434\u0430\u0435\u0442 \u043f\u043e\u0434 masquerade, \u0438\u0441\u0445\u043e\u0434\u043d\u044b\u0439 IP \u0437\u0430\u043c\u0435\u043d\u044f\u0435\u0442\u0441\u044f \u043d\u0430 WAN-\u0430\u0434\u0440\u0435\u0441, \u0438 \u043f\u0430\u043a\u0435\u0442 \u043d\u0435 \u0441\u043e\u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0443\u0435\u0442 IPsec policy:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">[admin@MikroTik] &gt;\u041a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u0442\u044c<code># \u041f\u0440\u043e\u0432\u0435\u0440\u044c\u0442\u0435 \u043f\u043e\u0440\u044f\u0434\u043e\u043a NAT-\u043f\u0440\u0430\u0432\u0438\u043b\n\/ip\/firewall\/nat\/print\n\n# \u041f\u0440\u0430\u0432\u0438\u043b\u043e accept \u0434\u043b\u044f IPsec-\u043f\u043e\u0434\u0441\u0435\u0442\u0435\u0439 \u0434\u043e\u043b\u0436\u043d\u043e \u0431\u044b\u0442\u044c \u041f\u0415\u0420\u0415\u0414 masquerade<\/code><\/pre>\n\n\n\n<p>\u0422\u0430\u043a\u0436\u0435 \u043f\u0440\u043e\u0432\u0435\u0440\u044c\u0442\u0435, \u0447\u0442\u043e policy \u043d\u0435 \u043a\u043e\u043d\u0444\u043b\u0438\u043a\u0442\u0443\u0435\u0442 \u0441 \u0434\u0440\u0443\u0433\u0438\u043c\u0438 policy:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">[admin@MikroTik] &gt;\u041a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u0442\u044c<code>\/ip\/ipsec\/policy\/print<\/code><\/pre>\n\n\n\n<p>\u041f\u0440\u0430\u0432\u0438\u043b\u043e \u0441&nbsp;<code>src-address=0.0.0.0\/0 dst-address=0.0.0.0\/0<\/code>&nbsp;(default policy) \u043c\u043e\u0436\u0435\u0442 \u043f\u0435\u0440\u0435\u0445\u0432\u0430\u0442\u044b\u0432\u0430\u0442\u044c \u0442\u0440\u0430\u0444\u0438\u043a \u0440\u0430\u043d\u044c\u0448\u0435 \u0432\u0430\u0448\u0435\u0433\u043e \u043f\u0440\u0430\u0432\u0438\u043b\u0430.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. \u0422\u0443\u043d\u043d\u0435\u043b\u044c \u043f\u0430\u0434\u0430\u0435\u0442 \u0437\u0430 NAT<\/h3>\n\n\n\n<p>\u0415\u0441\u043b\u0438 \u043e\u0434\u043d\u0430 \u0438\u0437 \u0441\u0442\u043e\u0440\u043e\u043d \u0437\u0430 NAT, \u043f\u0440\u043e\u0432\u0435\u0440\u044c\u0442\u0435:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>nat-traversal=yes<\/code>&nbsp;\u0432 Profile<\/li>\n\n\n\n<li>UDP \u043f\u043e\u0440\u0442\u044b 500 \u0438 4500 \u043f\u0440\u043e\u0431\u0440\u043e\u0448\u0435\u043d\u044b \u043d\u0430 \u0432\u043d\u0435\u0448\u043d\u0435\u043c NAT-\u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0435<\/li>\n\n\n\n<li>\u041d\u0435\u0442 \u0434\u0432\u043e\u0439\u043d\u043e\u0433\u043e NAT (\u0440\u043e\u0443\u0442\u0435\u0440 \u0437\u0430 \u0440\u043e\u0443\u0442\u0435\u0440\u043e\u043c)<\/li>\n\n\n\n<li>DPD \u043d\u0430\u0441\u0442\u0440\u043e\u0435\u043d (<code>dpd-interval=30s<\/code>) \u2014 \u0431\u0435\u0437 DPD \u0442\u0443\u043d\u043d\u0435\u043b\u044c \u0437\u0430 NAT \u043c\u043e\u0436\u0435\u0442 \u00ab\u0437\u0430\u0432\u0438\u0441\u0430\u0442\u044c\u00bb \u043f\u0440\u0438 \u0441\u043c\u0435\u043d\u0435 NAT-\u043c\u0430\u043f\u043f\u0438\u043d\u0433\u0430<\/li>\n<\/ul>\n\n\n\n<pre class=\"wp-block-preformatted\">[admin@MikroTik] &gt;\u041a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u0442\u044c<code># \u041f\u0440\u043e\u0432\u0435\u0440\u043a\u0430 NAT-T\n\/ip\/ipsec\/active-peers\/print\n# \u0415\u0441\u043b\u0438 natt-peer=yes \u2014 NAT-T \u0430\u043a\u0442\u0438\u0432\u0435\u043d, \u0437\u043d\u0430\u0447\u0438\u0442 NAT \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\">4. \u041e\u0448\u0438\u0431\u043a\u0430 \u00abpeer not found for 198.51.100.20\u00bb<\/h3>\n\n\n\n<p>Peer \u043d\u0430\u0441\u0442\u0440\u043e\u0435\u043d \u0441 \u043a\u043e\u043d\u043a\u0440\u0435\u0442\u043d\u044b\u043c \u0430\u0434\u0440\u0435\u0441\u043e\u043c, \u043d\u043e \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u0430\u044f \u0441\u0442\u043e\u0440\u043e\u043d\u0430 \u043f\u043e\u0434\u043a\u043b\u044e\u0447\u0430\u0435\u0442\u0441\u044f \u0441 \u0434\u0440\u0443\u0433\u043e\u0433\u043e IP (\u0434\u0438\u043d\u0430\u043c\u0438\u0447\u0435\u0441\u043a\u0438\u0439 IP, NAT). \u0420\u0435\u0448\u0435\u043d\u0438\u0435 \u2014 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0439\u0442\u0435&nbsp;<code>address=0.0.0.0\/0<\/code>&nbsp;\u0432 peer \u0438 \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u044c\u0442\u0435 \u0434\u043e\u0441\u0442\u0443\u043f \u0447\u0435\u0440\u0435\u0437 Identity:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">[admin@MikroTik] &gt;\u041a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u0442\u044c<code>\/ip\/ipsec\/peer\/set peer-branch address=0.0.0.0\/0<\/code><\/pre>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u042d\u0442\u043e \u0441\u043d\u0438\u0436\u0430\u0435\u0442 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c \u2014 \u043b\u044e\u0431\u043e\u0439 IP \u0441\u043c\u043e\u0436\u0435\u0442 \u0438\u043d\u0438\u0446\u0438\u0438\u0440\u043e\u0432\u0430\u0442\u044c IKE-\u043f\u043e\u0434\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u0435. \u0418\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0439\u0442\u0435 \u043d\u0430\u0434\u0451\u0436\u043d\u044b\u0439 PSK \u0438\u043b\u0438 \u0441\u0435\u0440\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u044b.<\/p>\n<\/blockquote>\n\n\n\n<h3 class=\"wp-block-heading\">5. \u041d\u0438\u0437\u043a\u0430\u044f \u0441\u043a\u043e\u0440\u043e\u0441\u0442\u044c \u2014 CPU 100%<\/h3>\n\n\n\n<p>\u0415\u0441\u043b\u0438 CPU \u0437\u0430\u0433\u0440\u0443\u0436\u0435\u043d \u043d\u0430 100% \u043f\u0440\u0438 \u043f\u0435\u0440\u0435\u0434\u0430\u0447\u0435 \u0447\u0435\u0440\u0435\u0437 IPsec \u2014 \u043d\u0435\u0442 \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0443\u0441\u043a\u043e\u0440\u0435\u043d\u0438\u044f. \u0412\u0430\u0440\u0438\u0430\u043d\u0442\u044b:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\u041f\u0435\u0440\u0435\u0439\u0442\u0438 \u043d\u0430 \u043c\u043e\u0434\u0435\u043b\u044c \u0441 \u043a\u0440\u0438\u043f\u0442\u043e\u0443\u0441\u043a\u043e\u0440\u0438\u0442\u0435\u043b\u0435\u043c (RB5009, CCR2004, CCR2116)<\/li>\n\n\n\n<li>\u041f\u043e\u043d\u0438\u0437\u0438\u0442\u044c \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u0438\u0435:&nbsp;<code>aes-128-gcm<\/code>&nbsp;\u0432\u043c\u0435\u0441\u0442\u043e&nbsp;<code>aes-256-gcm<\/code>&nbsp;(\u0431\u044b\u0441\u0442\u0440\u0435\u0435 \u043d\u0430 ~30%, \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c \u0432\u0441\u0451 \u0435\u0449\u0451 \u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u0430)<\/li>\n\n\n\n<li>\u0423\u043c\u0435\u043d\u044c\u0448\u0438\u0442\u044c DH group:&nbsp;<code>ecp256<\/code>&nbsp;\u0432\u043c\u0435\u0441\u0442\u043e&nbsp;<code>modp4096<\/code><\/li>\n\n\n\n<li>\u0423\u0432\u0435\u043b\u0438\u0447\u0438\u0442\u044c&nbsp;<code>lifetime<\/code>&nbsp;\u0432 Proposal \u0447\u0442\u043e\u0431\u044b \u0440\u0435\u0436\u0435 \u043f\u0435\u0440\u0435\u0441\u043e\u0433\u043b\u0430\u0441\u043e\u0432\u044b\u0432\u0430\u0442\u044c<\/li>\n<\/ul>\n\n\n\n<pre class=\"wp-block-preformatted\">[admin@MikroTik] &gt;\u041a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u0442\u044c<code># \u041f\u0440\u043e\u0432\u0435\u0440\u043a\u0430 \u0437\u0430\u0433\u0440\u0443\u0437\u043a\u0438 CPU\n\/system\/resource\/print\n# \u041f\u043e\u0441\u043c\u043e\u0442\u0440\u0438\u0442\u0435 cpu-load \u0432 \u043f\u0440\u043e\u0446\u0435\u043d\u0442\u0430\u0445<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\">6. Policy conflict \u2014 \u0442\u0440\u0430\u0444\u0438\u043a \u043d\u0435 \u043f\u043e\u043f\u0430\u0434\u0430\u0435\u0442 \u0432 \u0442\u0443\u043d\u043d\u0435\u043b\u044c<\/h3>\n\n\n\n<p>\u0415\u0441\u043b\u0438 \u0435\u0441\u0442\u044c \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u043e IPsec policy (\u043d\u0430\u043f\u0440\u0438\u043c\u0435\u0440, \u0434\u043b\u044f L2TP\/IPsec \u0438 \u0434\u043b\u044f site-to-site), \u043f\u043e\u0440\u044f\u0434\u043e\u043a \u0438\u043c\u0435\u0435\u0442 \u0437\u043d\u0430\u0447\u0435\u043d\u0438\u0435. \u0411\u043e\u043b\u0435\u0435 \u0441\u043f\u0435\u0446\u0438\u0444\u0438\u0447\u043d\u0430\u044f policy \u0434\u043e\u043b\u0436\u043d\u0430 \u0431\u044b\u0442\u044c \u0432\u044b\u0448\u0435:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">[admin@MikroTik] &gt;\u041a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u0442\u044c<code># \u041f\u0435\u0440\u0435\u043c\u0435\u0441\u0442\u0438\u0442\u0435 policy \u0432\u0432\u0435\u0440\u0445\n\/ip\/ipsec\/policy\/move [find where dst-address=192.168.20.0\/24] 0<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\">7. \u041f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u0441 MTU \/ \u0444\u0440\u0430\u0433\u043c\u0435\u043d\u0442\u0430\u0446\u0438\u044f<\/h3>\n\n\n\n<p>IPsec \u0434\u043e\u0431\u0430\u0432\u043b\u044f\u0435\u0442 overhead \u043a \u043a\u0430\u0436\u0434\u043e\u043c\u0443 \u043f\u0430\u043a\u0435\u0442\u0443. \u0415\u0441\u043b\u0438 MTU \u043d\u0430 WAN = 1500, \u0430 ESP-\u0437\u0430\u0433\u043e\u043b\u043e\u0432\u043e\u043a \u0437\u0430\u043d\u0438\u043c\u0430\u0435\u0442 50\u201370 \u0431\u0430\u0439\u0442, \u043f\u043e\u043b\u0435\u0437\u043d\u0430\u044f \u043d\u0430\u0433\u0440\u0443\u0437\u043a\u0430 \u0443\u043c\u0435\u043d\u044c\u0448\u0430\u0435\u0442\u0441\u044f. \u0421\u0438\u043c\u043f\u0442\u043e\u043c\u044b: ping \u0440\u0430\u0431\u043e\u0442\u0430\u0435\u0442, \u043d\u043e HTTP\/SSH \u0437\u0430\u0432\u0438\u0441\u0430\u044e\u0442 (\u0431\u043e\u043b\u044c\u0448\u0438\u0435 \u043f\u0430\u043a\u0435\u0442\u044b \u043d\u0435 \u043f\u0440\u043e\u0445\u043e\u0434\u044f\u0442).<\/p>\n\n\n\n<p>\u0420\u0435\u0448\u0435\u043d\u0438\u0435 \u2014 \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u0442\u0435 MSS clamping:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">[admin@MikroTik] &gt;\u041a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u0442\u044c<code>\/ip\/firewall\/mangle\/add \\\n  chain=forward \\\n  protocol=tcp \\\n  tcp-flags=syn \\\n  ipsec-policy=in,ipsec \\\n  action=change-mss \\\n  new-mss=1360 \\\n  passthrough=yes \\\n  comment=\"IPsec: clamp MSS\"<\/code><\/pre>\n\n\n\n<p>\u042d\u0442\u043e \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0438\u0442 \u0440\u0430\u0437\u043c\u0435\u0440 TCP-\u0441\u0435\u0433\u043c\u0435\u043d\u0442\u043e\u0432, \u043f\u0440\u043e\u0445\u043e\u0434\u044f\u0449\u0438\u0445 \u0447\u0435\u0440\u0435\u0437 IPsec-\u0442\u0443\u043d\u043d\u0435\u043b\u044c, \u043f\u0440\u0435\u0434\u043e\u0442\u0432\u0440\u0430\u0449\u0430\u044f \u0444\u0440\u0430\u0433\u043c\u0435\u043d\u0442\u0430\u0446\u0438\u044e.<\/p>\n\n\n\n<p>[admin@MikroTik] &gt;<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">Profile (Phase 1)     \u2014 \u043f\u0430\u0440\u0430\u043c\u0435\u0442\u0440\u044b IKE-\u0441\u043e\u0433\u043b\u0430\u0441\u043e\u0432\u0430\u043d\u0438\u044f\n    \u2193\nProposal (Phase 2)    \u2014 \u043f\u0430\u0440\u0430\u043c\u0435\u0442\u0440\u044b \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u0434\u0430\u043d\u043d\u044b\u0445 (ESP\/AH)\n    \u2193\nPeer                  \u2014 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u0430\u044f \u0441\u0442\u043e\u0440\u043e\u043d\u0430 (IP-\u0430\u0434\u0440\u0435\u0441, \u043f\u0440\u043e\u0444\u0438\u043b\u044c)\n    \u2193\nIdentity              \u2014 \u0441\u043f\u043e\u0441\u043e\u0431 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 (PSK, \u0441\u0435\u0440\u0442\u0438\u0444\u0438\u043a\u0430\u0442)\n    \u2193\nPolicy                \u2014 \u043a\u0430\u043a\u043e\u0439 \u0442\u0440\u0430\u0444\u0438\u043a \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u0442\u044c (src\/dst \u043f\u043e\u0434\u0441\u0435\u0442\u0438)\n\u041e\u0444\u0438\u0441 A (HQ)                        \u041e\u0444\u0438\u0441 B (Branch)\n\u250c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2510                    \u250c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2510\n\u2502 192.168.10.0\/24 \u2502\u2500\u2500\u2500 IPsec \u2500\u2500\u2500\u2502 192.168.20.0\/24 \u2502\n\u2502 WAN: 203.0.113.10 \u2502  tunnel   \u2502 WAN: 198.51.100.20 \u2502\n\u2514\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2518                    \u2514\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2518\n\/ip\/ipsec\/profile\/add \\\n  name=ike2-profile \\\n  hash-algorithm=sha256 \\\n  enc-algorithm=aes-256 \\\n  dh-group=modp2048 \\\n  lifetime=1d \\\n  proposal-check=obey \\\n  nat-traversal=yes \\\n  dpd-interval=30s \\\n  dpd-maximum-failures=5\n\/ip\/ipsec\/proposal\/add \\\n  name=ike2-proposal \\\n  enc-algorithms=aes-256-gcm \\\n  lifetime=30m \\\n  pfs-group=modp2048\n\/ip\/ipsec\/peer\/add \\\n  name=peer-branch \\\n  address=198.51.100.20\/32 \\\n  profile=ike2-profile \\\n  exchange-mode=ike2\n\/ip\/ipsec\/peer\/add \\\n  name=peer-hq \\\n  address=203.0.113.10\/32 \\\n  profile=ike2-profile \\\n  exchange-mode=ike2\n\/ip\/ipsec\/identity\/add \\\n  peer=peer-branch \\\n  auth-method=pre-shared-key \\\n  secret=\"Jx9#mK2$vL5nQ8@wR3pT7yB0hF6dA1cE\"\n\/ip\/ipsec\/identity\/add \\\n  peer=peer-hq \\\n  auth-method=pre-shared-key \\\n  secret=\"Jx9#mK2$vL5nQ8@wR3pT7yB0hF6dA1cE\"\n\/ip\/ipsec\/policy\/add \\\n  peer=peer-branch \\\n  src-address=192.168.10.0\/24 \\\n  dst-address=192.168.20.0\/24 \\\n  tunnel=yes \\\n  sa-src-address=203.0.113.10 \\\n  sa-dst-address=198.51.100.20 \\\n  proposal=ike2-proposal \\\n  action=encrypt \\\n  level=require\n\/ip\/ipsec\/policy\/add \\\n  peer=peer-hq \\\n  src-address=192.168.20.0\/24 \\\n  dst-address=192.168.10.0\/24 \\\n  tunnel=yes \\\n  sa-src-address=198.51.100.20 \\\n  sa-dst-address=203.0.113.10 \\\n  proposal=ike2-proposal \\\n  action=encrypt \\\n  level=require\n# NAT bypass \u2014 \u0442\u0440\u0430\u0444\u0438\u043a \u043c\u0435\u0436\u0434\u0443 \u043e\u0444\u0438\u0441\u0430\u043c\u0438 \u043d\u0435 \u043d\u0430\u0442\u0438\u0442\u0441\u044f\n\/ip\/firewall\/nat\/add \\\n  chain=srcnat \\\n  src-address=192.168.10.0\/24 \\\n  dst-address=192.168.20.0\/24 \\\n  action=accept \\\n  comment=\"IPsec: no NAT to Branch\" \\\n  place-before=0\n\/ip\/firewall\/nat\/add \\\n  chain=srcnat \\\n  src-address=192.168.20.0\/24 \\\n  dst-address=192.168.10.0\/24 \\\n  action=accept \\\n  comment=\"IPsec: no NAT to HQ\" \\\n  place-before=0\n\/ip\/firewall\/filter\/add \\\n  chain=input \\\n  protocol=udp \\\n  dst-port=500,4500 \\\n  action=accept \\\n  comment=\"Allow IKE and NAT-T\" \\\n  place-before=0\n\n\/ip\/firewall\/filter\/add \\\n  chain=input \\\n  protocol=ipsec-esp \\\n  action=accept \\\n  comment=\"Allow IPsec ESP\" \\\n  place-before=0\n\/ip\/firewall\/filter\/add \\\n  chain=forward \\\n  src-address=192.168.10.0\/24 \\\n  dst-address=192.168.20.0\/24 \\\n  ipsec-policy=in,ipsec \\\n  action=accept \\\n  comment=\"Allow IPsec forward from HQ to Branch\"\n\n\/ip\/firewall\/filter\/add \\\n  chain=forward \\\n  src-address=192.168.20.0\/24 \\\n  dst-address=192.168.10.0\/24 \\\n  ipsec-policy=in,ipsec \\\n  action=accept \\\n  comment=\"Allow IPsec forward from Branch to HQ\"\n\u0411\u0435\u0437 NAT-T:  IP \u2192 ESP (protocol 50)          \u2014 \u043d\u0435 \u043f\u0440\u043e\u0445\u043e\u0434\u0438\u0442 NAT\n\u0421 NAT-T:    IP \u2192 UDP:4500 \u2192 ESP             \u2014 \u043f\u0440\u043e\u0445\u043e\u0434\u0438\u0442 NAT\n\/ip\/ipsec\/active-peers\/print detail\n\/system\/resource\/print\n\/ip\/ipsec\/profile\/set ike2-profile \\\n  dh-group=ecp256 \\\n  enc-algorithm=aes-256 \\\n  hash-algorithm=sha256\n\n\/ip\/ipsec\/proposal\/set ike2-proposal \\\n  enc-algorithms=aes-256-gcm \\\n  pfs-group=ecp256 \\\n  lifetime=1h\n# \u0421 \u0440\u043e\u0443\u0442\u0435\u0440\u0430 \u041e\u0444\u0438\u0441\u0430 A \u2014 \u043f\u0438\u043d\u0433 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 \u0432 \u041e\u0444\u0438\u0441\u0435 B\n\/ping 192.168.20.1 src-address=192.168.10.1 count=5\n\/ip\/ipsec\/active-peers\/print detail\n0   peer=peer-branch state=established\n     local-address=203.0.113.10 remote-address=198.51.100.20\n     side=initiator uptime=2h15m30s\n     ph2-total=1 natt-peer=no\n     established=mar\/15\/2026 10:30:15\n\/ip\/ipsec\/installed-sa\/print detail\n0   peer=peer-branch direction=in\n     src-address=198.51.100.20 dst-address=203.0.113.10\n     auth-algorithm=none enc-algorithm=aes-256-gcm\n     current-bytes=15234567 current-packets=10234\n     add-lifetime=30m\/25m12s replay-size=64\n     state=mature hw-aead=yes\n\n 1   peer=peer-branch direction=out\n     src-address=203.0.113.10 dst-address=198.51.100.20\n     auth-algorithm=none enc-algorithm=aes-256-gcm\n     current-bytes=12345678 current-packets=8765\n     add-lifetime=30m\/25m12s replay-size=64\n     state=mature hw-aead=yes\n\/ip\/ipsec\/policy\/print stats\n# \u0421\u0447\u0451\u0442\u0447\u0438\u043a\u0438 \u043d\u0430 policy\n\/ip\/ipsec\/policy\/print stats\n\n# \u0422\u0440\u0430\u0444\u0438\u043a \u0447\u0435\u0440\u0435\u0437 \u0442\u0443\u043d\u043d\u0435\u043b\u044c \u0432 \u0440\u0435\u0430\u043b\u044c\u043d\u043e\u043c \u0432\u0440\u0435\u043c\u0435\u043d\u0438\n\/tool\/torch interface=ether1 src-address=192.168.10.0\/24 dst-address=192.168.20.0\/24\n\/system\/logging\/add topics=ipsec action=memory\n\/log\/print where topics~\"ipsec\"\n\/system\/logging\/remove [find where topics~\"ipsec\"]\n\/ip\/ipsec\/peer\/add \\\n  name=peer-office-c \\\n  address=192.0.2.50\/32 \\\n  profile=ike2-profile \\\n  exchange-mode=ike2\n\n\/ip\/ipsec\/identity\/add \\\n  peer=peer-office-c \\\n  auth-method=pre-shared-key \\\n  secret=\"aB3@kL9#mN5$pQ7&amp;rT1!vX4%yZ8wF2h\"\n\n\/ip\/ipsec\/policy\/add \\\n  peer=peer-office-c \\\n  src-address=192.168.10.0\/24 \\\n  dst-address=192.168.30.0\/24 \\\n  tunnel=yes \\\n  sa-src-address=203.0.113.10 \\\n  sa-dst-address=192.0.2.50 \\\n  proposal=ike2-proposal \\\n  action=encrypt \\\n  level=require\n\n\/ip\/firewall\/nat\/add \\\n  chain=srcnat \\\n  src-address=192.168.10.0\/24 \\\n  dst-address=192.168.30.0\/24 \\\n  action=accept \\\n  comment=\"IPsec: no NAT to Office C\" \\\n  place-before=0\n# \u0421\u043e\u0437\u0434\u0430\u0451\u043c CA\n\/certificate\/add name=ipsec-ca common-name=\"IPsec CA\" \\\n  key-size=2048 days-valid=3650 key-usage=key-cert-sign,crl-sign\n\/certificate\/sign ipsec-ca\n\n# \u0421\u0435\u0440\u0442\u0438\u0444\u0438\u043a\u0430\u0442 \u0434\u043b\u044f \u041e\u0444\u0438\u0441\u0430 A\n\/certificate\/add name=cert-hq common-name=\"HQ-Router\" \\\n  key-size=2048 days-valid=1825 \\\n  key-usage=digital-signature,key-encipherment,tls-client\n\/certificate\/sign cert-hq ca=ipsec-ca\n\n# \u0421\u0435\u0440\u0442\u0438\u0444\u0438\u043a\u0430\u0442 \u0434\u043b\u044f \u041e\u0444\u0438\u0441\u0430 B\n\/certificate\/add name=cert-branch common-name=\"Branch-Router\" \\\n  key-size=2048 days-valid=1825 \\\n  key-usage=digital-signature,key-encipherment,tls-client\n\/certificate\/sign cert-branch ca=ipsec-ca\n\/certificate\/export-certificate cert-branch export-passphrase=\"ExportPass123\"\n\/certificate\/export-certificate ipsec-ca\n\/certificate\/import file-name=ipsec-ca.crt\n\/certificate\/import file-name=cert-branch.crt passphrase=\"ExportPass123\"\n\/certificate\/import file-name=cert-branch.key passphrase=\"ExportPass123\"\n# \u041e\u0444\u0438\u0441 A\n\/ip\/ipsec\/identity\/set [find peer=peer-branch] \\\n  auth-method=digital-signature \\\n  certificate=cert-hq \\\n  remote-certificate=cert-branch\n\n# \u041e\u0444\u0438\u0441 B\n\/ip\/ipsec\/identity\/set [find peer=peer-hq] \\\n  auth-method=digital-signature \\\n  certificate=cert-branch \\\n  remote-certificate=cert-hq\n# \u0421\u0440\u0430\u0432\u043d\u0438\u0442\u0435 \u0432\u044b\u0432\u043e\u0434 \u043d\u0430 \u043e\u0431\u043e\u0438\u0445 \u0440\u043e\u0443\u0442\u0435\u0440\u0430\u0445\n\/ip\/ipsec\/profile\/print detail where name=ike2-profile\n\/ip\/ipsec\/proposal\/print detail where name=ike2-proposal\n# \u041f\u0440\u043e\u0432\u0435\u0440\u044c\u0442\u0435 \u043f\u043e\u0440\u044f\u0434\u043e\u043a NAT-\u043f\u0440\u0430\u0432\u0438\u043b\n\/ip\/firewall\/nat\/print\n\n# \u041f\u0440\u0430\u0432\u0438\u043b\u043e accept \u0434\u043b\u044f IPsec-\u043f\u043e\u0434\u0441\u0435\u0442\u0435\u0439 \u0434\u043e\u043b\u0436\u043d\u043e \u0431\u044b\u0442\u044c \u041f\u0415\u0420\u0415\u0414 masquerade\n\/ip\/ipsec\/policy\/print\n# \u041f\u0440\u043e\u0432\u0435\u0440\u043a\u0430 NAT-T\n\/ip\/ipsec\/active-peers\/print\n# \u0415\u0441\u043b\u0438 natt-peer=yes \u2014 NAT-T \u0430\u043a\u0442\u0438\u0432\u0435\u043d, \u0437\u043d\u0430\u0447\u0438\u0442 NAT \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\n\/ip\/ipsec\/peer\/set peer-branch address=0.0.0.0\/0\n# \u041f\u0440\u043e\u0432\u0435\u0440\u043a\u0430 \u0437\u0430\u0433\u0440\u0443\u0437\u043a\u0438 CPU\n\/system\/resource\/print\n# \u041f\u043e\u0441\u043c\u043e\u0442\u0440\u0438\u0442\u0435 cpu-load \u0432 \u043f\u0440\u043e\u0446\u0435\u043d\u0442\u0430\u0445\n# \u041f\u0435\u0440\u0435\u043c\u0435\u0441\u0442\u0438\u0442\u0435 policy \u0432\u0432\u0435\u0440\u0445\n\/ip\/ipsec\/policy\/move [find where dst-address=192.168.20.0\/24] 0\n\/ip\/firewall\/mangle\/add \\\n  chain=forward \\\n  protocol=tcp \\\n  tcp-flags=syn \\\n  ipsec-policy=in,ipsec \\\n  action=change-mss \\\n  new-mss=1360 \\\n  passthrough=yes \\\n  comment=\"IPsec: clamp MSS\"<\/pre>\n\n\n\n<p>\u041f\u043e\u0434\u0441\u043c\u043e\u0442\u0440\u0435\u043d\u043e <a href=\"https:\/\/mikrotik-wiki.ru\/article\/ipsec\">\u0437\u0434\u0435\u0441\u044c<\/a><\/p>\n\n\n\n\n","protected":false},"excerpt":{"rendered":"<p>IPsec (Internet Protocol Security) \u2014 \u043d\u0430\u0431\u043e\u0440 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u043e\u0432 \u0434\u043b\u044f \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u0438 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u0442\u0440\u0430\u0444\u0438\u043a\u0430 \u043d\u0430 \u0441\u0435\u0442\u0435\u0432\u043e\u043c \u0443\u0440\u043e\u0432\u043d\u0435. \u0412 \u043e\u0442\u043b\u0438\u0447\u0438\u0435 \u043e\u0442 \u0441\u0432\u044f\u0437\u043a\u0438 L2TP\/IPsec, \u0433\u0434\u0435 IPsec \u043b\u0438\u0448\u044c \u043e\u0431\u043e\u0440\u0430\u0447\u0438\u0432\u0430\u0435\u0442 L2TP-\u0442\u0443\u043d\u043d\u0435\u043b\u044c, \u0447\u0438\u0441\u0442\u044b\u0439 IPsec \u0440\u0430\u0431\u043e\u0442\u0430\u0435\u0442 \u0431\u0435\u0437 \u043f\u0440\u043e\u043c\u0435\u0436\u0443\u0442\u043e\u0447\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0430 \u2014 \u043c\u0435\u043d\u044c\u0448\u0435 overhead, \u0432\u044b\u0448\u0435 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0441\u0442\u044c, \u043f\u0440\u043e\u0449\u0435 \u043e\u0442\u043b\u0430\u0434\u043a\u0430. \u0412 \u044d\u0442\u043e\u043c \u0440\u0443\u043a\u043e\u0432\u043e\u0434\u0441\u0442\u0432\u0435 \u043c\u044b \u043d\u0430\u0441\u0442\u0440\u043e\u0438\u043c site-to-site \u0442\u0443\u043d\u043d\u0435\u043b\u044c \u043c\u0435\u0436\u0434\u0443 \u0434\u0432\u0443\u043c\u044f \u043e\u0444\u0438\u0441\u0430\u043c\u0438 \u043d\u0430 MikroTik RouterOS 7.20+ \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c IKEv2, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[9],"tags":[],"class_list":["post-359","post","type-post","status-publish","format-standard","hentry","category-mikrotik"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p7ekzS-5N","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/altai22.ru\/index.php?rest_route=\/wp\/v2\/posts\/359","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/altai22.ru\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/altai22.ru\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/altai22.ru\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/altai22.ru\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=359"}],"version-history":[{"count":2,"href":"https:\/\/altai22.ru\/index.php?rest_route=\/wp\/v2\/posts\/359\/revisions"}],"predecessor-version":[{"id":361,"href":"https:\/\/altai22.ru\/index.php?rest_route=\/wp\/v2\/posts\/359\/revisions\/361"}],"wp:attachment":[{"href":"https:\/\/altai22.ru\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=359"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/altai22.ru\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=359"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/altai22.ru\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=359"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}