Okay, this is what I did:
/ip ipsec identity
remove 1
/ip ipsec peer
remove 1
/interface l2tp-server server
set ipsec-secret "*********************"
The current config looks like this:
/ip ipsec export
/ip ipsec proposal
set [ find default=yes ] auth-algorithms=sha512,sha256,sha1 enc-algorithms=aes-256-cbc,aes-128-cbc \
pfs-group=modp2048
/ip ipsec policy
set 0 dst-address=0.0.0.0/0 src-address=0.0.0.0/0
/interface l2tp-server export
/interface l2tp-server server
set authentication=mschap2 default-profile=ipsec_vpn enabled=yes ipsec-secret="*****************" \
use-ipsec=required
I still can’t connect. I’m going to paste the end of the logs (sorry it is long):
22:41:15 ipsec,debug ===== received 76 bytes from clients.public.ip.1[4500] to 192.168.15.100[4500]
22:41:15 ipsec,debug,packet ae861cf8 44271e69 db8d8af5 8e1bdc50 08100501 6571f704 0000004c ceaf6a5b
22:41:15 ipsec,debug,packet 4b0771c1 f0a9e034 20d81885 2401233f 41e4bb9e 8a72ef61 c611f531 357138d3
22:41:15 ipsec,debug,packet 87be3efb bea37601 a95015e1
22:41:15 ipsec,debug receive Information.
22:41:15 ipsec,debug,packet compute IV for phase2
22:41:15 ipsec,debug,packet phase1 last IV:
22:41:15 ipsec,debug,packet 28c85a80 9b463f57 6571f704
22:41:15 ipsec,debug hash(sha1)
22:41:15 ipsec,debug,packet encryption(3des)
22:41:15 ipsec,debug,packet phase2 IV computed:
22:41:15 ipsec,debug,packet fa29e352 f68f9e68
22:41:15 ipsec,debug,packet encryption(3des)
22:41:15 ipsec,debug,packet IV was saved for next processing:
22:41:15 ipsec,debug,packet bea37601 a95015e1
22:41:15 ipsec,debug,packet encryption(3des)
22:41:15 ipsec,debug,packet with key:
22:41:15 ipsec,debug,packet 1431294b d2894202 cc7ce354 5b926592 b0a86720 640f4522
22:41:15 ipsec,debug,packet decrypted payload by IV:
22:41:15 ipsec,debug,packet fa29e352 f68f9e68
22:41:15 ipsec,debug,packet decrypted payload, but not trimed.
22:41:15 ipsec,debug,packet 0c000018 69cdd981 310435e0 85ee1422 3ea9fd14 3d16b8be 00000010 00000001
22:41:15 ipsec,debug,packet 03040001 54a481fa 00000000 00000000
22:41:15 ipsec,debug,packet padding len=1
22:41:15 ipsec,debug,packet skip to trim padding.
22:41:15 ipsec,debug,packet decrypted.
22:41:15 ipsec,debug,packet ae861cf8 44271e69 db8d8af5 8e1bdc50 08100501 6571f704 0000004c 0c000018
22:41:15 ipsec,debug,packet 69cdd981 310435e0 85ee1422 3ea9fd14 3d16b8be 00000010 00000001 03040001
22:41:15 ipsec,debug,packet 54a481fa 00000000 00000000
22:41:15 ipsec,debug,packet HASH with:
22:41:15 ipsec,debug,packet 6571f704 00000010 00000001 03040001 54a481fa
22:41:15 ipsec,debug,packet hmac(hmac_sha1)
22:41:15 ipsec,debug,packet HASH computed:
22:41:15 ipsec,debug,packet 69cdd981 310435e0 85ee1422 3ea9fd14 3d16b8be
22:41:15 ipsec,debug hash validated.
22:41:15 ipsec,debug begin.
22:41:15 ipsec,debug seen nptype=8(hash) len=24
22:41:15 ipsec,debug seen nptype=12(delete) len=16
22:41:15 ipsec,debug succeed.
22:41:15 ipsec,debug clients.public.ip.1 delete payload for protocol ESP
22:41:15 ipsec purged IPsec-SA proto_id=ESP spi=0x54a481fa
22:41:15 ipsec purged IPsec-SA proto_id=ESP spi=0xd424959
22:41:15 ipsec removing generated policy
22:41:15 ipsec,debug purged SAs.
22:41:15 ipsec,debug ===== received 84 bytes from clients.public.ip.1[4500] to 192.168.15.100[4500]
22:41:15 ipsec,debug,packet ae861cf8 44271e69 db8d8af5 8e1bdc50 08100501 6cf8d595 00000054 f3230e4f
22:41:15 ipsec,debug,packet fdfca03f 1d51048f 2604eb51 a7333c9f f75421d5 ad389912 439bb708 1a907990
22:41:15 ipsec,debug,packet 33fa87f5 1a0e4507 93805d1d 4c91c6fa 2a30e206
22:41:15 ipsec,debug receive Information.
22:41:15 ipsec,debug,packet compute IV for phase2
22:41:15 ipsec,debug,packet phase1 last IV:
22:41:15 ipsec,debug,packet 28c85a80 9b463f57 6cf8d595
22:41:15 ipsec,debug hash(sha1)
22:41:15 ipsec,debug,packet encryption(3des)
22:41:15 ipsec,debug,packet phase2 IV computed:
22:41:15 ipsec,debug,packet ce53c5bb ddb6d061
22:41:15 ipsec,debug,packet encryption(3des)
22:41:15 ipsec,debug,packet IV was saved for next processing:
22:41:15 ipsec,debug,packet 4c91c6fa 2a30e206
22:41:15 ipsec,debug,packet encryption(3des)
22:41:15 ipsec,debug,packet with key:
22:41:15 ipsec,debug,packet 1431294b d2894202 cc7ce354 5b926592 b0a86720 640f4522
22:41:15 ipsec,debug,packet decrypted payload by IV:
22:41:15 ipsec,debug,packet ce53c5bb ddb6d061
22:41:15 ipsec,debug,packet decrypted payload, but not trimed.
22:41:15 ipsec,debug,packet 0c000018 db44e87e c7d24916 f4989586 6b29d036 dc1fb42a 0000001c 00000001
22:41:15 ipsec,debug,packet 01100001 ae861cf8 44271e69 db8d8af5 8e1bdc50 00000000
22:41:15 ipsec,debug,packet padding len=1
22:41:15 ipsec,debug,packet skip to trim padding.
22:41:15 ipsec,debug,packet decrypted.
22:41:15 ipsec,debug,packet ae861cf8 44271e69 db8d8af5 8e1bdc50 08100501 6cf8d595 00000054 0c000018
22:41:15 ipsec,debug,packet db44e87e c7d24916 f4989586 6b29d036 dc1fb42a 0000001c 00000001 01100001
22:41:15 ipsec,debug,packet ae861cf8 44271e69 db8d8af5 8e1bdc50 00000000
22:41:15 ipsec,debug,packet HASH with:
22:41:15 ipsec,debug,packet 6cf8d595 0000001c 00000001 01100001 ae861cf8 44271e69 db8d8af5 8e1bdc50
22:41:15 ipsec,debug,packet hmac(hmac_sha1)
22:41:15 ipsec,debug,packet HASH computed:
22:41:15 ipsec,debug,packet db44e87e c7d24916 f4989586 6b29d036 dc1fb42a
22:41:15 ipsec,debug hash validated.
22:41:15 ipsec,debug begin.
22:41:15 ipsec,debug seen nptype=8(hash) len=24
22:41:15 ipsec,debug seen nptype=12(delete) len=28
22:41:15 ipsec,debug succeed.
22:41:15 ipsec,debug clients.public.ip.1 delete payload for protocol ISAKMP
22:41:15 ipsec,info purging ISAKMP-SA 192.168.15.100[4500]<=>clients.public.ip.1[4500] spi=ae861cf844271e69:db8d8af58e1bdc50.
22:41:15 ipsec purged ISAKMP-SA 192.168.15.100[4500]<=>clients.public.ip.1[4500] spi=ae861cf844271e69:db8d8af58e1bdc50.
22:41:15 ipsec,debug purged SAs.
22:41:15 ipsec,info ISAKMP-SA deleted 192.168.15.100[4500]-clients.public.ip.1[4500] spi:ae861cf844271e69:db8d8af58e1bdc50 rekey:1
22:41:15 ipsec KA remove: 192.168.15.100[4500]->clients.public.ip.1[4500]
22:41:15 ipsec,debug KA tree dump: 192.168.15.100[4500]->clients.public.ip.1[4500] (in_use=1)
22:41:15 ipsec,debug KA removing this one...
-- Ctrl-C to quit. Space prints separator. New entries will appear at bottom.
This IP address 192.168.15.100 appears multiple times in the logs. The actual topology looks like this:
client computer -----> internet -----> ADSL modem/router with NAT ----> [192.168.15.1] ---- DMZ ----> [192.168.15.100] —> l2tp-server —> 192.168.5.0/24 (remote LAN to be connected to)
I’m not sure if having an additional NAT (with DMZ set to the MikroTik router) is a problem or not. Unfortunately, I cannot change that, because the ISP does not want to give me direct access to the public IP, and there is no alternative at this site. And by the way, I was wrong. The modem with the DMZ is also new, it was changed recently, just before the routeros upgrade. So the problem might not be with the OS upgrade.
I don’t see any particular error message in the logs, but it won’t connect. 