IPSEC/L2TP - Windows client

I’m receiving this error on the client: “The L2TP connection attempt failed because the security layer encountered a processing error during initial negotiations with the remote computer”

Am I missing something? There are 3 tunnels active (site-to-site) that work fine. But this client will not connect. Scratching my head at this point.


Thanks in advance for any help!

Here’s a bit of the log from the client connecting.

[admin@fjsi-rt-sb] /ip ipsec peer> 
  (224 messages discarded)
11:45:16 echo: ipsec,debug,packet Adding NON-ESP marker
11:45:16 echo: ipsec,debug,packet 72 bytes from firewall_IP_address[4500] to client_IP_address[4500]
11:45:16 echo: ipsec,debug,packet sockname firewall_IP_address[4500]
11:45:16 echo: ipsec,debug,packet send packet from firewall_IP_address[4500]
11:45:16 echo: ipsec,debug,packet send packet to client_IP_address[4500]
11:45:16 echo: ipsec,debug,packet src4 firewall_IP_address[4500]
11:45:16 echo: ipsec,debug,packet dst4 client_IP_address[4500]
11:45:16 echo: ipsec,debug,packet 1 times of 72 bytes message will be sent to client_IP_address[4500]
11:45:16 echo: ipsec,debug,packet 00000000 ab5e019d c4e392df ce7f65ff 8b0ce27a 08100501 f3aed47e 00000044
11:45:16 echo: ipsec,debug,packet 6b04549f 84cdc086 e2b085e9 ca96f1ab a933a7e8 09299805 cc25c69c ae6f8f0a
11:45:16 echo: ipsec,debug,packet 8afd430e 3eb65d5f
11:45:16 echo: ipsec,debug,packet sendto Information notify.
[admin@fjsi-rt-sb] /ip ipsec peer> 
  (224 messages discarded)
11:45:31 echo: ipsec,debug,packet Adding NON-ESP marker
11:45:31 echo: ipsec,debug,packet 72 bytes from firewall_IP_address[4500] to client_IP_address[4500]
11:45:31 echo: ipsec,debug,packet sockname firewall_IP_address[4500]
11:45:31 echo: ipsec,debug,packet send packet from firewall_IP_address[4500]
11:45:31 echo: ipsec,debug,packet send packet to client_IP_address[4500]
11:45:31 echo: ipsec,debug,packet src4 firewall_IP_address[4500]
11:45:31 echo: ipsec,debug,packet dst4 client_IP_address[4500]
11:45:31 echo: ipsec,debug,packet 1 times of 72 bytes message will be sent to client_IP_address[4500]
11:45:31 echo: ipsec,debug,packet 00000000 ab5e019d c4e392df ce7f65ff 8b0ce27a 08100501 a2accffc 00000044
11:45:31 echo: ipsec,debug,packet 4b124441 a39f46eb b1fe5d11 5be6b7c8 ea4e2691 242f4fcc 0b20d56c 308f27a1
11:45:31 echo: ipsec,debug,packet 4aed4137 eb01cd89
11:45:31 echo: ipsec,debug,packet sendto Information notify.
[admin@fjsi-rt-sb] /ip ipsec peer> 
11:45:35 echo: ipsec,debug,packet KA: firewall_IP_address[4500]->client_IP_address[4500]
11:45:35 echo: ipsec,debug,packet sockname firewall_IP_address[4500]
11:45:35 echo: ipsec,debug,packet send packet from firewall_IP_address[4500]
11:45:35 echo: ipsec,debug,packet send packet to client_IP_address[4500]
11:45:35 echo: ipsec,debug,packet src4 firewall_IP_address[4500]
11:45:35 echo: ipsec,debug,packet dst4 client_IP_address[4500]
11:45:35 echo: ipsec,debug,packet 1 times of 1 bytes message will be sent to client_IP_address[4500]
11:45:35 echo: ipsec,debug,packet ff
[admin@fjsi-rt-sb] /ip ipsec peer> 
  (291 messages discarded)
11:45:46 echo: ipsec,debug,packet sockname firewall_IP_address[500]
11:45:46 echo: ipsec,debug,packet send packet from firewall_IP_address[500]
11:45:46 echo: ipsec,debug,packet send packet to client_IP_address[500]
11:45:46 echo: ipsec,debug,packet src4 firewall_IP_address[500]
11:45:46 echo: ipsec,debug,packet dst4 client_IP_address[500]
11:45:46 echo: ipsec,debug,packet 1 times of 148 bytes message will be sent to client_IP_address[500]
11:45:46 echo: ipsec,debug,packet ad0c3dea d6ee01cf b11d73f6 a1255aa9 01100200 00000000 00000094 0d000038
11:45:46 echo: ipsec,debug,packet 00000001 00000001 0000002c 01010001 00000024 05010000 80010005 80020002
11:45:46 echo: ipsec,debug,packet 80040002 80030001 800b0001 000c0004 00007080 0d000014 4a131c81 07035845
11:45:46 echo: ipsec,debug,packet 5c5728f2 0e95452f 0d000014 afcad713 68a1f1c9 6b8696fc 77570100 00000018
11:45:46 echo: ipsec,debug,packet 4048b7d5 6ebce885 25e7de7f 00d6c2d3 80000000
11:45:46 echo: ipsec,debug sent phase1 packet firewall_IP_address[500]<=>client_IP_address[500] ad0c3dead6ee01cf:b11d73f6a1255aa9
[admin@fjsi-rt-sb] /ip ipsec peer> 
11:45:47 echo: ipsec,debug ISAKMP-SA deleted firewall_IP_address[4500]-client_IP_address[4500] spi:ab5e019dc4e392df:ce7f65ff8b0ce27a rekey:1
11:45:47 echo: ipsec,debug KA remove: firewall_IP_address[4500]->client_IP_address[4500]
11:45:47 echo: ipsec,debug,packet KA tree dump: firewall_IP_address[4500]->client_IP_address[4500] (in_use=1)
11:45:47 echo: ipsec,debug,packet KA removing this one...
[admin@fjsi-rt-sb] /ip ipsec peer>