Community discussions

MikroTik App
 
bgonev
just joined
Topic Author
Posts: 14
Joined: Sat Nov 24, 2012 10:32 pm

SOLVED - L2TP IPSEC stoped working after Upgrade to 6.18

Wed Aug 13, 2014 12:03 am

Hi,
Yesterday I did upgrade from V5.20 to v6.18. HW is RouterBoard RB450G. Previously (on ver5.20) I have succesfully established L2TP/IPSEC with my WIndows 7/Android. After upgrade L2TP/IPSEC is not working anymore.

Here is the log from RB:
22:56:26 ipsec,error failed to pre-process ph2 packet.
22:56:29 ipsec,error failed to begin ipsec sa negotiation.
22:56:29 ipsec,error failed to pre-process ph2 packet.
22:56:32 ipsec,error failed to pre-process ph2 packet.
22:56:35 ipsec,error failed to pre-process ph2 packet.
22:56:38 ipsec,error failed to pre-process ph2 packet.
22:56:41 ipsec,error failed to pre-process ph2 packet.
22:56:45 ipsec,error failed to pre-process ph2 packet.
22:56:47 ipsec,error failed to pre-process ph2 packet.
22:56:50 ipsec,error failed to pre-process ph2 packet.
22:56:53 ipsec,error failed to pre-process ph2 packet.
22:56:56 l2tp,info first L2TP UDP packet received from 7x.1x5.35.1x4
22:57:24 system,info ipsec policy changed by admin
22:57:29 ipsec,error failed to begin ipsec sa negotiation.
22:58:29 ipsec,error failed to begin ipsec sa negotiation.
22:59:24 system,info ipsec policy changed by admin
22:59:29 ipsec,error failed to begin ipsec sa negotiation.
23:00:29 ipsec,error failed to begin ipsec sa negotiation.
23:01:24 system,info ipsec policy changed by admin
23:01:29 ipsec,error failed to begin ipsec sa negotiation.
23:02:29 ipsec,error failed to begin ipsec sa negotiation.
Any help ?

BR
Boris
Last edited by bgonev on Wed Aug 13, 2014 1:24 pm, edited 1 time in total.
 
bgonev
just joined
Topic Author
Posts: 14
Joined: Sat Nov 24, 2012 10:32 pm

Re: L2TP IPSEC stoped working after Upgrade to 6.18

Wed Aug 13, 2014 10:54 am

Anyone ? :shock:
 
bgonev
just joined
Topic Author
Posts: 14
Joined: Sat Nov 24, 2012 10:32 pm

Re: L2TP IPSEC stoped working after Upgrade to 6.18

Wed Aug 13, 2014 12:36 pm

SOLVED

Problem was that inside IPSEC Peer definition there was Policy Group: default. I'm not sure if this value was present in v5.20 setup, or maybe it was set up by default after upgrade to v6.18. However removing the value for Policy Group (no value at all - NULL), solved the problem.
I hope this will help to anyone who have simmilar problem..

BR
Boris
 
User avatar
allansud
just joined
Posts: 14
Joined: Mon Jun 09, 2014 10:57 pm

Re: SOLVED - L2TP IPSEC stoped working after Upgrade to 6.18

Tue Aug 19, 2014 4:21 am

Hi There!

Can you post your config please??!
 
bgonev
just joined
Topic Author
Posts: 14
Joined: Sat Nov 24, 2012 10:32 pm

Re: SOLVED - L2TP IPSEC stoped working after Upgrade to 6.18

Tue Aug 19, 2014 7:07 pm

Hi There!

Can you post your config please??!
Here it is:

/ip ipsec peer > print
/ip ipsec peer > print
 address=0.0.0.0/0 local-address=0.0.0.0 passive=no port=500
 auth-method=pre-shared-key secret="Password"
 generate-policy=port-override exchange-mode=main-l2tp
 send-initial-contact=yes nat-traversal=yes hash-algorithm=sha1
 enc-algorithm=3des dh-group=modp1024 lifetime=1d dpd-interval=2m
 dpd-maximum-failures=5
/ip ipsec proposal> print
 0  * name="default" auth-algorithms=sha1 enc-algorithms=3des lifetime=5m
      pfs-group=modp1024
This is working configuration.
 
lambert
Long time Member
Long time Member
Posts: 548
Joined: Fri Jul 23, 2010 1:09 am

Re: L2TP IPSEC stoped working after Upgrade to 6.18

Fri Aug 22, 2014 11:13 pm

removing the value for Policy Group (no value at all - NULL), solved the problem.
I had the same problem after upgrading from 6.11 to 6.18.

I've tried at various times on 6.x to get any policy using a policy group to work. It never has. It may be a failure on my part to understand how to use policy groups.
 
jaytcsd
Member
Member
Posts: 332
Joined: Wed Dec 29, 2004 9:50 am
Location: Pittsboro IN
Contact:

Re: SOLVED - L2TP IPSEC stoped working after Upgrade to 6.18

Sun Aug 24, 2014 3:06 am

this works from win 8 but not from 8.1, I think I have a firewall issue on 8.1.



/ip ipsec peer> pr
Flags: X - disabled, D - dynamic
0 address=0.0.0.0/0 local-address=0.0.0.0 passive=no port=500
auth-method=pre-shared-key secret="monkee"
generate-policy=port-override exchange-mode=main-l2tp
send-initial-contact=yes nat-traversal=yes hash-algorithm=sha1
enc-algorithm=3des dh-group=modp1024 lifetime=1d
dpd-interval=disable-dpd dpd-maximum-failures=1

/ip ipsec proposal> pr
Flags: X - disabled, * - default
0 * name="default" auth-algorithms=sha1 enc-algorithms=3des lifetime=30m
pfs-group=modp1024
 
chemp86
just joined
Posts: 8
Joined: Wed Nov 19, 2014 9:10 am

Re: SOLVED - L2TP IPSEC stoped working after Upgrade to 6.18

Sat Nov 22, 2014 8:36 am

Confirmed words of comrade Boris. If config is:
address=0.0.0.0/0 local-address=0.0.0.0 passive=no port=500 auth-method=pre-shared-key secret="password" generate-policy=port-override policy-template-group=*FFFFFFFF exchange-mode=main
 send-initial-contact=yes nat-traversal=yes proposal-check=obey hash-algorithm=sha1 enc-algorithm=3des dh-group=modp1024 lifetime=1d lifebytes=0 dpd-interval=disable-dpd dpd-maximum-failures=5
It is works. I deleted it manually form "Groups" section.
RouterOS 6.22
 
garther
just joined
Posts: 2
Joined: Sat Nov 27, 2010 1:43 pm

Re: SOLVED - L2TP IPSEC stoped working after Upgrade to 6.18

Tue Jan 20, 2015 4:22 pm

Hi
I've got a smilar problem with s2s VPN

Here is the config:
/ip ipsec proposal
add enc-algorithms=3des,aes-128-cbc name=proposal1 pfs-group=modp1536
add enc-algorithms=3des,aes-128-cbc name=proposal2 pfs-group=modp1536
add enc-algorithms=3des,aes-128-cbc name=proposal3 pfs-group=modp1536

/ip ipsec peer
add address=213.165.0.0/32 dh-group=modp1536 lifetime=8h nat-traversal=no proposal-check=strict secret=0
add address=92.222.0.0/32  dh-group=modp1536 lifetime=8h nat-traversal=no proposal-check=strict secret=0
add address=37.114.0.0/32 dh-group=modp1536 lifetime=8h nat-traversal=no proposal-check=strict secret=0
The log is being flooded with errors regarding ph2 pre-process just after I've added the 3rd node (37...) which is an Cisco ASA.
The VPN is working correctly [all 3 of them].

Anyone has got similar problems?
 
Michel
just joined
Posts: 23
Joined: Mon Aug 16, 2010 12:50 pm

Re: SOLVED - L2TP IPSEC stoped working after Upgrade to 6.18

Wed Feb 04, 2015 3:10 pm

I setup a new router and IPSEC was not working, giving me all the time

ipsec,error failed to pre-process ph2 packet

I had compared all the settings from the working one and noticed that it is impossible to create a peer from the GUI with having policy-template-group=*FFFFFFFF . Also if you just change anything inside the Peer than you lost the * and it only stands there policy-template-group=FFFFFFFF with the result that IPSEC is not working.

If you take a look to an export config than policy-template-group=*FFFFFFFF is missing in the peer

At all, you must add a new Peer with this
/ip ipsec peer

add address=0.0.0.0/0 local-address=0.0.0.0 passive=no port=500 auth-method=pre-shared-key secret="test" generate-policy=port-override policy-template-group=*FFFFFFFF exchange-mode=main-l2tp\ send-initial-contact=yes nat-traversal=yes proposal-check=obey hash-algorithm=sha1 enc-algorithm=3des dh-group=modp1024 lifetime=1d lifebytes=0 dpd-interval=disable-dpd dpd-maximum-failures=5
If you changed later the password over the GUI or anyhting else than you lost the *FFFFFFFF and IPSEC no longer works.

Puhhh.......this problem cost me 3 days of my nervs.
 
User avatar
sergejs
MikroTik Support
MikroTik Support
Posts: 6695
Joined: Thu Mar 31, 2005 3:33 pm
Location: Riga, Latvia
Contact:

Re: SOLVED - L2TP IPSEC stoped working after Upgrade to 6.18

Wed Feb 04, 2015 4:20 pm

Michel,
policy-template should be default not *FFFFF, perhaps you upgraded from the version, where was issuse with it.
Add new peer, it should has correct settings.
 
cmurrayis
Member Candidate
Member Candidate
Posts: 106
Joined: Fri May 15, 2009 4:31 am

Re: SOLVED - L2TP IPSEC stoped working after Upgrade to 6.18

Mon May 11, 2015 4:21 am

I've just had the axact same issue with setting up 6.27 to AWS.

Changed this policy value to *FFFFFFFF and the tunnel came up instantly.
 
jgraue
just joined
Posts: 5
Joined: Wed Jun 03, 2015 3:34 am

Re: SOLVED - L2TP IPSEC stoped working after Upgrade to 6.18

Wed Jun 03, 2015 3:54 am

I've just had the axact same issue with setting up 6.27 to AWS.

Changed this policy value to *FFFFFFFF and the tunnel came up instantly.
Today I also went through the same problem. I am using Shrew client for a Client-to-Site VPN. Just IPSec, no L2tp.
In fact I am using PSK and XAUTH and I started using a Policy template Roadwarrior as the configuration example stated and after I removed it and add the *FFFFFFFF it inmediately came up.

This is the entire config:

First define the pool for the remote users (roadwarriors)
/ip pool
add name=ipsec-RW ranges=192.168.50.2-192.168.50.254

/ip ipsec mode-config
add address-pool=ipsec-RW name=RW-cfg split-include=192.168.88.0/24

Although I have it here I then override this group
/ip ipsec policy group
add name=RoadWarrior


/ip ipsec policy
add dst-address=192.168.50.0/24 group=RoadWarrior src-address=192.168.88.0/24 template=yes
add dst-address=192.168.88.0/24 group=RoadWarrior src-address=192.168.50.0/24 template=yes

/ip ipsec user
add name=johndow password=gladiator

Im adding to peers (one without NAT-T and the other with the NAT-T so I can cover both situations)
/ip ipsec peer
add auth-method=pre-shared-key-xauth generate-policy=port-strict hash-algorithm=md5 mode-config=RW-cfg nat-traversal=no passive=yes secret=mysecret policy-template-group=*FFFFFFFF
add auth-method=pre-shared-key-xauth generate-policy=port-strict hash-algorithm=md5 mode-config=RW-cfg passive=yes secret=mysecret policy-template-group=*FFFFFFFF

Then you need to add the Firewall filters so you allow IPSec traffic (UDP=500) and NAT-T (UDP=4500).
Be sure to insert them in the corresponding position.

/ip firewall filter
add chain=input comment=IPsec dst-port=500 protocol=udp
add chain=input protocol=ipsec-esp
add chain=input dst-port=4500 protocol=udp

/ip firewall mangle
add action=mark-packet chain=input dst-port=4500 new-packet-mark=vpn protocol=udp
add action=mark-packet chain=input new-packet-mark=vpn protocol=ipsec-esp

Hope this help other ones, I spent more than 3 entire days...
 
wcrisman
just joined
Posts: 1
Joined: Sat Nov 07, 2015 6:55 am

Re: SOLVED - L2TP IPSEC stoped working after Upgrade to 6.18

Sat Nov 07, 2015 6:57 am

Thank you all so much for these posts.. Saved my bacon today.

Couldn't use webfig to change the remote one since the console doesn't work right for the editor.
 
User avatar
cross
just joined
Posts: 18
Joined: Tue Jul 28, 2015 3:41 pm

Re: SOLVED - L2TP IPSEC stoped working after Upgrade to 6.18

Tue Nov 17, 2015 4:29 pm

I can add that I've been using the same example for setting
ip ipsec peer set 0 policy-template-group=*FFFFFFFF 
failure: can not change dynamic peer
But Like you all see I got failure with message above. Reason for this was obvious. In new MikroTik (mine is RB750Gr2 / hEX) when adding L2TP you can choose to select "Use IPsec" and the secret password and you have section ip ipsec configured too. But, it's dynamic and you can add those *FFFF in the policy template in ip ipsec peer so I remove it and added my static peer in ipsec. But I made one thing. I didn't set the *FFFF.. thing. Why? Because it's a link to Policies section. And there I found a default template which has to be enabled.
/ip ipsec policy> pr
Flags: T - template, X - disabled, D - dynamic, I - inactive, * - default 
 0 T * group=default src-address=::/0 dst-address=::/0 protocol=all proposal=default template=yes 
So I enabled it. And then in peer configuration like this
ip ipsec peer> pr                                                                             
Flags: X - disabled, D - dynamic 
 0    address=0.0.0.0/0 local-address=:: passive=yes port=500 auth-method=pre-shared-key secret="********" 
      generate-policy=port-override policy-template-group=default exchange-mode=main-l2tp send-initial-contact=yes nat-traversal=yes 
      hash-algorithm=sha1 enc-algorithm=3des,aes-128,aes-256 dh-group=modp1024 lifetime=1d dpd-interval=2m dpd-maximum-failures=5
everything works fine. When I disabled the Policies and set the *FFFFFF... it works too. But the reason for my was that I had Policies disabled.

And remember set the generate-policy=port-override
port-override -- generate policies and force policy to use any port (old behavior)
 
StefanM
newbie
Posts: 49
Joined: Sun Dec 13, 2015 1:49 am

Re: SOLVED - L2TP IPSEC stoped working after Upgrade to 6.18

Sun Apr 03, 2016 2:52 am

Thanks for solution.
 
jaytcsd
Member
Member
Posts: 332
Joined: Wed Dec 29, 2004 9:50 am
Location: Pittsboro IN
Contact:

Re: SOLVED - L2TP IPSEC stoped working after Upgrade to 6.18

Thu Apr 07, 2016 10:47 am

I ran into this problem after a hardware reset when I lost the ability to get some websites to load.
L2TP was working under 6.33 and up to 6.34.2 via quickset upgrades.

After the reset I added L2TP but got the pre-process error.

While using the terminal to fix this I found a bug in winbox 2.2.18, it won't show DPD interval settings or port override, my screen stops after the DH group list.
 
lambert
Long time Member
Long time Member
Posts: 548
Joined: Fri Jul 23, 2010 1:09 am

Re: SOLVED - L2TP IPSEC stoped working after Upgrade to 6.18

Thu Apr 07, 2016 6:53 pm

jaytcsd, you should create a new topic for your similar symptom but completely unrelated question. This topic is about upgrades from anything before 6.18 to 6.18 or later. 6.33 to 6.34.2 did not change the behavior of the IPsec stack in the way that 6.17 to 6.18 did. Therefore, you have a new and interesting issue which needs it's own thread.

Winbox 2 is not likely to work with the current release of RouterOS. I believe that is mentioned in the release notes of RouterOS but have not gone back to re-read them to verify for you. Get Winbox 3.4 or above. If you still have issue, please create a new topic.

I would not mind seeing another new topic on the "I lost the ability to get some websites to load" issue you mention.
 
lfduarte91
just joined
Posts: 1
Joined: Thu Oct 20, 2016 10:06 pm

Re: SOLVED - L2TP IPSEC stoped working after Upgrade to 6.18

Thu Oct 20, 2016 10:12 pm

i change the proposal check to "obey", it´s workinh ok.
 
manelfl
newbie
Posts: 30
Joined: Mon May 18, 2015 12:55 pm

Re: SOLVED - L2TP IPSEC stoped working after Upgrade to 6.18

Tue Feb 26, 2019 3:45 pm


But Like you all see I got failure with message above. Reason for this was obvious. In new MikroTik (mine is RB750Gr2 / hEX) when adding L2TP you can choose to select "Use IPsec" and the secret password and you have section ip ipsec configured too. But, it's dynamic and you can add those *FFFF in the policy template in ip ipsec peer so I remove it and added my static peer in ipsec. But I made one thing. I didn't set the *FFFF.. thing. Why? Because it's a link to Policies section. And there I found a default template which has to be enabled.

Same for me.

So I enabled it. And then in peer configuration like this

I have done the same.

everything works fine. When I disabled the Policies and set the *FFFFFF... it works too. But the reason for my was that I had Policies disabled.

Woks for me too.

And remember set the generate-policy=port-override

I have generate-policy=port-strict and it works.

Who is online

Users browsing this forum: Ahrefs [Bot], Amazon [Bot], Bing [Bot], Nospam, syslog and 105 guests