Hi,
Yesterday I did upgrade from V5.20 to v6.18. HW is RouterBoard RB450G. Previously (on ver5.20) I have succesfully established L2TP/IPSEC with my WIndows 7/Android. After upgrade L2TP/IPSEC is not working anymore.
Here is the log from RB:
22:56:26 ipsec,error failed to pre-process ph2 packet.
22:56:29 ipsec,error failed to begin ipsec sa negotiation.
22:56:29 ipsec,error failed to pre-process ph2 packet.
22:56:32 ipsec,error failed to pre-process ph2 packet.
22:56:35 ipsec,error failed to pre-process ph2 packet.
22:56:38 ipsec,error failed to pre-process ph2 packet.
22:56:41 ipsec,error failed to pre-process ph2 packet.
22:56:45 ipsec,error failed to pre-process ph2 packet.
22:56:47 ipsec,error failed to pre-process ph2 packet.
22:56:50 ipsec,error failed to pre-process ph2 packet.
22:56:53 ipsec,error failed to pre-process ph2 packet.
22:56:56 l2tp,info first L2TP UDP packet received from 7x.1x5.35.1x4
22:57:24 system,info ipsec policy changed by admin
22:57:29 ipsec,error failed to begin ipsec sa negotiation.
22:58:29 ipsec,error failed to begin ipsec sa negotiation.
22:59:24 system,info ipsec policy changed by admin
22:59:29 ipsec,error failed to begin ipsec sa negotiation.
23:00:29 ipsec,error failed to begin ipsec sa negotiation.
23:01:24 system,info ipsec policy changed by admin
23:01:29 ipsec,error failed to begin ipsec sa negotiation.
23:02:29 ipsec,error failed to begin ipsec sa negotiation.
Problem was that inside IPSEC Peer definition there was Policy Group: default. I’m not sure if this value was present in v5.20 setup, or maybe it was set up by default after upgrade to v6.18. However removing the value for Policy Group (no value at all - NULL), solved the problem.
I hope this will help to anyone who have simmilar problem..
I had the same problem after upgrading from 6.11 to 6.18.
I’ve tried at various times on 6.x to get any policy using a policy group to work. It never has. It may be a failure on my part to understand how to use policy groups.
The log is being flooded with errors regarding ph2 pre-process just after I’ve added the 3rd node (37…) which is an Cisco ASA.
The VPN is working correctly [all 3 of them].
I setup a new router and IPSEC was not working, giving me all the time
ipsec,error failed to pre-process ph2 packet
I had compared all the settings from the working one and noticed that it is impossible to create a peer from the GUI with having policy-template-group=*FFFFFFFF . Also if you just change anything inside the Peer than you lost the ***** and it only stands there policy-template-group=FFFFFFFF with the result that IPSEC is not working.
If you take a look to an export config than policy-template-group=*FFFFFFFF is missing in the peer
Michel,
policy-template should be default not *FFFFF, perhaps you upgraded from the version, where was issuse with it.
Add new peer, it should has correct settings.
Today I also went through the same problem. I am using Shrew client for a Client-to-Site VPN. Just IPSec, no L2tp.
In fact I am using PSK and XAUTH and I started using a Policy template Roadwarrior as the configuration example stated and after I removed it and add the *FFFFFFFF it inmediately came up.
This is the entire config:
First define the pool for the remote users (roadwarriors)
/ip pool
add name=ipsec-RW ranges=192.168.50.2-192.168.50.254
/ip ipsec user
add name=johndow password=gladiator
Im adding to peers (one without NAT-T and the other with the NAT-T so I can cover both situations)
/ip ipsec peer
add auth-method=pre-shared-key-xauth generate-policy=port-strict hash-algorithm=md5 mode-config=RW-cfg nat-traversal=no passive=yes secret=mysecret policy-template-group=*FFFFFFFF
add auth-method=pre-shared-key-xauth generate-policy=port-strict hash-algorithm=md5 mode-config=RW-cfg passive=yes secret=mysecret policy-template-group=*FFFFFFFF
Then you need to add the Firewall filters so you allow IPSec traffic (UDP=500) and NAT-T (UDP=4500).
Be sure to insert them in the corresponding position.
I can add that I’ve been using the same example for setting
ip ipsec peer set 0 policy-template-group=*FFFFFFFF
failure: can not change dynamic peer
But Like you all see I got failure with message above. Reason for this was obvious. In new MikroTik (mine is RB750Gr2 / hEX) when adding L2TP you can choose to select “Use IPsec” and the secret password and you have section ip ipsec configured too. But, it’s dynamic and you can add those *FFFF in the policy template in ip ipsec peer so I remove it and added my static peer in ipsec. But I made one thing. I didn’t set the *FFFF.. thing. Why? Because it’s a link to Policies section. And there I found a default template which has to be enabled.
/ip ipsec policy> pr
Flags: T - template, X - disabled, D - dynamic, I - inactive, * - default
0 T * group=default src-address=::/0 dst-address=::/0 protocol=all proposal=default template=yes
So I enabled it. And then in peer configuration like this
ip ipsec peer> pr
Flags: X - disabled, D - dynamic
0 address=0.0.0.0/0 local-address=:: passive=yes port=500 auth-method=pre-shared-key secret="********"
generate-policy=port-override policy-template-group=default exchange-mode=main-l2tp send-initial-contact=yes nat-traversal=yes
hash-algorithm=sha1 enc-algorithm=3des,aes-128,aes-256 dh-group=modp1024 lifetime=1d dpd-interval=2m dpd-maximum-failures=5
everything works fine. When I disabled the Policies and set the *FFFFFF… it works too. But the reason for my was that I had Policies disabled.
And remember set the generate-policy=port-override
port-override – generate policies and force policy to use any port (old behavior)
I ran into this problem after a hardware reset when I lost the ability to get some websites to load.
L2TP was working under 6.33 and up to 6.34.2 via quickset upgrades.
After the reset I added L2TP but got the pre-process error.
While using the terminal to fix this I found a bug in winbox 2.2.18, it won’t show DPD interval settings or port override, my screen stops after the DH group list.
jaytcsd, you should create a new topic for your similar symptom but completely unrelated question. This topic is about upgrades from anything before 6.18 to 6.18 or later. 6.33 to 6.34.2 did not change the behavior of the IPsec stack in the way that 6.17 to 6.18 did. Therefore, you have a new and interesting issue which needs it’s own thread.
Winbox 2 is not likely to work with the current release of RouterOS. I believe that is mentioned in the release notes of RouterOS but have not gone back to re-read them to verify for you. Get Winbox 3.4 or above. If you still have issue, please create a new topic.
I would not mind seeing another new topic on the “I lost the ability to get some websites to load” issue you mention.