здесь
1.1.1.1 - Фортик, 2,2,2,2 - Микротик
/ip ipsec export verbose
# jun/30/2020 16:07:42 by RouterOS 6.46.4
# software id = Q9RL-ZLT3
#
# model = RB952Ui-5ac2nD
# serial number = 71AF0A2FCF47
/ip ipsec mode-config
set [ find default=yes ] name=request-only responder=no
/ip ipsec policy group
set [ find default=yes ] name=default
/ip ipsec profile
set [ find default=yes ] dh-group=modp2048,modp1536,modp1024 dpd-interval=2m \
dpd-maximum-failures=5 enc-algorithm=aes-128,3des hash-algorithm=sha1 \
lifetime=1d name=default nat-traversal=yes proposal-check=obey
add dh-group=modp2048,modp1536,modp1024 dpd-interval=2m dpd-maximum-failures=5 \
enc-algorithm=aes-128,3des hash-algorithm=sha256 lifetime=1d name=ipsec-ph1 \
nat-traversal=yes proposal-check=obey
/ip ipsec peer
add address=
1.1.1.1/32 disabled=no exchange-mode=ike2 local-address=\
2.2.2.2 name=ipsec-peer1 passive=yes profile=ipsec-ph1 \
send-initial-contact=yes
/ip ipsec proposal
set [ find default=yes ] auth-algorithms=sha1 disabled=no enc-algorithms=\
aes-256-cbc,aes-192-cbc,aes-128-cbc lifetime=12h name=default pfs-group=\
modp1536
add auth-algorithms=sha256,sha1 disabled=no enc-algorithms=\
aes-128-cbc,aes-128-ctr,aes-128-gcm,camellia-128 lifetime=12h name=\
ipsec-ph2 pfs-group=modp1536
/ip ipsec identity
add auth-method=pre-shared-key disabled=no generate-policy=port-override peer=\
ipsec-peer1 secret=123456Qq
/ip ipsec policy
set 0 disabled=no dst-address=::/0 group=default proposal=default protocol=all \
src-address=::/0 template=yes
add action=encrypt disabled=no dst-address=
0.0.0.0/0 dst-port=any \
ipsec-protocols=esp level=unique peer=ipsec-peer1 proposal=ipsec-ph2 \
protocol=all sa-dst-address=
1.1.1.1 sa-src-address=
2.2.2.2 \
src-address=
10.255.10.2/32 src-port=any tunnel=yes
/ip ipsec settings
set accounting=yes interim-update=0s xauth-use-radius=no