Ah. My /system/logging entry for sstp or ppp was sstp,ppp (which I just learned means sstp AND ppp), so I disabled that entry and added two separated entries, one each for sstp and for ppp.
Log entries since then now also include sstp,packet which tells me a little more about what’s going on in the stably-open connections, and a bit of detail when I cause the connection to drop and re-establish, but does not shed any more light on these occasional batches of apparently-unrelated close/down packets which caused me to post the question.
A bit more detail:
On MikroTik3 (one of my two SSTP VPN clients), the SSTP client interface detail:
/interface print detail
...
8 R ;;; Pegged-up VPN route to Barcelona network
name="sstp-out1" type="sstp-out" mtu=1500 actual-mtu=1500 last-link-down-time=mar/01/2026 05:40:20 last-link-up-time=mar/01/2026 05:40:21 link-downs=2
n.b. The last-link times are from After a test I just did to generate detailed log entries from dropping and re-establishing the connection. When I began the testing this morning, that client link had been up for over a day.
Before I dropped and re-established the connection, after I had fixed the /system logging configuration, here are the log entries for sstp OR ppp, on MikroTik4 (the SSTP VPN server):
2026-03-01 11:10:20 sstp,packet <sstp-mikrotik3.local> recv control packet type: echo request
2026-03-01 11:10:20 sstp,packet <sstp-mikrotik3.local> sent control packet type: echo response
2026-03-01 11:10:20 sstp,packet <sstp-mikrotik3.local> sent control packet type: echo request
2026-03-01 11:10:21 sstp,packet <sstp-mikrotik3.local> recv control packet type: echo response
2026-03-01 11:11:20 sstp,packet <sstp-mikrotik3.local> recv control packet type: echo request
2026-03-01 11:11:20 sstp,packet <sstp-mikrotik3.local> sent control packet type: echo response
2026-03-01 11:11:20 sstp,packet <sstp-mikrotik3.local> sent control packet type: echo request
2026-03-01 11:11:20 sstp,packet <sstp-mikrotik3.local> recv control packet type: echo response
2026-03-01 11:12:20 sstp,packet <sstp-mikrotik3.local> recv control packet type: echo request
2026-03-01 11:12:20 sstp,packet <sstp-mikrotik3.local> sent control packet type: echo response
2026-03-01 11:12:20 sstp,packet <sstp-mikrotik3.local> sent control packet type: echo request
2026-03-01 11:12:20 sstp,packet <sstp-mikrotik3.local> recv control packet type: echo response
2026-03-01 11:13:20 sstp,packet <sstp-mikrotik3.local> recv control packet type: echo request
2026-03-01 11:13:20 sstp,packet <sstp-mikrotik3.local> sent control packet type: echo response
2026-03-01 11:13:20 sstp,packet <sstp-mikrotik3.local> sent control packet type: echo request
2026-03-01 11:13:20 sstp,packet <sstp-mikrotik3.local> recv control packet type: echo response
2026-03-01 11:14:20 sstp,packet <sstp-mikrotik3.local> recv control packet type: echo request
2026-03-01 11:14:20 sstp,packet <sstp-mikrotik3.local> sent control packet type: echo response
2026-03-01 11:14:20 sstp,packet <sstp-mikrotik3.local> sent control packet type: echo request
2026-03-01 11:14:20 sstp,packet <sstp-mikrotik3.local> recv control packet type: echo response
2026-03-01 11:15:20 sstp,packet <sstp-mikrotik3.local> recv control packet type: echo request
2026-03-01 11:15:20 sstp,packet <sstp-mikrotik3.local> sent control packet type: echo response
2026-03-01 11:15:20 sstp,packet <sstp-mikrotik3.local> sent control packet type: echo request
2026-03-01 11:15:20 sstp,packet <sstp-mikrotik3.local> recv control packet type: echo response
2026-03-01 11:16:20 sstp,packet <sstp-mikrotik3.local> recv control packet type: echo request
2026-03-01 11:16:20 sstp,packet <sstp-mikrotik3.local> sent control packet type: echo response
2026-03-01 11:16:20 sstp,packet <sstp-mikrotik3.local> sent control packet type: echo request
2026-03-01 11:16:20 sstp,packet <sstp-mikrotik3.local> recv control packet type: echo response
2026-03-01 11:17:20 sstp,packet <sstp-mikrotik3.local> sent control packet type: echo request
2026-03-01 11:17:20 sstp,packet <sstp-mikrotik3.local> recv control packet type: echo request
2026-03-01 11:17:20 sstp,packet <sstp-mikrotik3.local> sent control packet type: echo response
2026-03-01 11:17:20 sstp,packet <sstp-mikrotik3.local> recv control packet type: echo response
2026-03-01 11:18:20 sstp,packet <sstp-mikrotik3.local> recv control packet type: echo request
2026-03-01 11:18:20 sstp,packet <sstp-mikrotik3.local> sent control packet type: echo response
2026-03-01 11:18:20 sstp,packet <sstp-mikrotik3.local> sent control packet type: echo request
2026-03-01 11:18:20 sstp,packet <sstp-mikrotik3.local> recv control packet type: echo response
2026-03-01 11:19:20 sstp,packet <sstp-mikrotik3.local> sent control packet type: echo request
2026-03-01 11:19:20 sstp,packet <sstp-mikrotik3.local> recv control packet type: echo request
2026-03-01 11:19:20 sstp,packet <sstp-mikrotik3.local> sent control packet type: echo response
2026-03-01 11:19:20 sstp,packet <sstp-mikrotik3.local> recv control packet type: echo response
2026-03-01 11:20:20 sstp,packet <sstp-mikrotik3.local> recv control packet type: echo request
2026-03-01 11:20:20 sstp,packet <sstp-mikrotik3.local> sent control packet type: echo response
2026-03-01 11:20:20 sstp,packet <sstp-mikrotik3.local> sent control packet type: echo request
2026-03-01 11:20:20 sstp,packet <sstp-mikrotik3.local> recv control packet type: echo response
2026-03-01 11:21:20 sstp,packet <sstp-mikrotik3.local> recv control packet type: echo request
2026-03-01 11:21:20 sstp,packet <sstp-mikrotik3.local> sent control packet type: echo response
2026-03-01 11:21:20 sstp,packet <sstp-mikrotik3.local> sent control packet type: echo request
2026-03-01 11:21:20 sstp,packet <sstp-mikrotik3.local> recv control packet type: echo response
2026-03-01 11:22:20 sstp,packet <sstp-mikrotik3.local> recv control packet type: echo request
2026-03-01 11:22:20 sstp,packet <sstp-mikrotik3.local> sent control packet type: echo response
2026-03-01 11:22:20 sstp,packet <sstp-mikrotik3.local> sent control packet type: echo request
2026-03-01 11:22:20 sstp,packet <sstp-mikrotik3.local> recv control packet type: echo response
2026-03-01 11:23:20 sstp,packet <sstp-mikrotik3.local> recv control packet type: echo request
2026-03-01 11:23:20 sstp,packet <sstp-mikrotik3.local> sent control packet type: echo response
2026-03-01 11:23:20 sstp,packet <sstp-mikrotik3.local> sent control packet type: echo request
2026-03-01 11:23:20 sstp,packet <sstp-mikrotik3.local> recv control packet type: echo response
2026-03-01 11:23:50 sstp,ppp,debug : CCP close
2026-03-01 11:23:50 sstp,ppp,debug : BCP close
2026-03-01 11:23:50 sstp,ppp,debug : IPCP close
2026-03-01 11:23:50 sstp,ppp,debug : IPV6CP close
2026-03-01 11:23:50 sstp,ppp,debug : MPLSCP close
2026-03-01 11:23:50 sstp,ppp,debug : LCP lowerdown
2026-03-01 11:23:50 sstp,ppp,debug : LCP down event in initial state
2026-03-01 11:23:50 sstp,ppp,debug : CCP close
2026-03-01 11:23:50 sstp,ppp,debug : BCP close
2026-03-01 11:23:50 sstp,ppp,debug : IPCP close
2026-03-01 11:23:50 sstp,ppp,debug : IPV6CP close
2026-03-01 11:23:50 sstp,ppp,debug : MPLSCP close
2026-03-01 11:23:50 sstp,ppp,debug : LCP lowerdown
2026-03-01 11:23:50 sstp,ppp,debug : LCP down event in initial state
2026-03-01 11:23:51 sstp,ppp,debug : CCP close
2026-03-01 11:23:51 sstp,ppp,debug : BCP close
2026-03-01 11:23:51 sstp,ppp,debug : IPCP close
2026-03-01 11:23:51 sstp,ppp,debug : IPV6CP close
2026-03-01 11:23:51 sstp,ppp,debug : MPLSCP close
2026-03-01 11:23:51 sstp,ppp,debug : LCP lowerdown
2026-03-01 11:23:51 sstp,ppp,debug : LCP down event in initial state
2026-03-01 11:23:51 sstp,ppp,debug : CCP close
2026-03-01 11:23:51 sstp,ppp,debug : BCP close
2026-03-01 11:23:51 sstp,ppp,debug : IPCP close
2026-03-01 11:23:51 sstp,ppp,debug : IPV6CP close
2026-03-01 11:23:51 sstp,ppp,debug : MPLSCP close
2026-03-01 11:23:51 sstp,ppp,debug : LCP lowerdown
2026-03-01 11:23:51 sstp,ppp,debug : LCP down event in initial state
2026-03-01 11:23:51 sstp,ppp,debug : CCP close
2026-03-01 11:23:51 sstp,ppp,debug : BCP close
2026-03-01 11:23:51 sstp,ppp,debug : IPCP close
2026-03-01 11:23:51 sstp,ppp,debug : IPV6CP close
2026-03-01 11:23:51 sstp,ppp,debug : MPLSCP close
2026-03-01 11:23:51 sstp,ppp,debug : LCP lowerdown
2026-03-01 11:23:51 sstp,ppp,debug : LCP down event in initial state
2026-03-01 11:23:51 sstp,ppp,debug : CCP close
2026-03-01 11:23:51 sstp,ppp,debug : BCP close
2026-03-01 11:23:51 sstp,ppp,debug : IPCP close
2026-03-01 11:23:51 sstp,ppp,debug : IPV6CP close
2026-03-01 11:23:51 sstp,ppp,debug : MPLSCP close
2026-03-01 11:23:51 sstp,ppp,debug : LCP lowerdown
2026-03-01 11:23:51 sstp,ppp,debug : LCP down event in initial state
2026-03-01 11:23:51 sstp,ppp,debug : CCP close
2026-03-01 11:23:51 sstp,ppp,debug : BCP close
2026-03-01 11:23:51 sstp,ppp,debug : IPCP close
2026-03-01 11:23:51 sstp,ppp,debug : IPV6CP close
2026-03-01 11:23:51 sstp,ppp,debug : MPLSCP close
2026-03-01 11:23:51 sstp,ppp,debug : LCP lowerdown
2026-03-01 11:23:51 sstp,ppp,debug : LCP down event in initial state
2026-03-01 11:23:52 sstp,ppp,debug : CCP close
2026-03-01 11:23:52 sstp,ppp,debug : BCP close
2026-03-01 11:23:52 sstp,ppp,debug : IPCP close
2026-03-01 11:23:52 sstp,ppp,debug : IPV6CP close
2026-03-01 11:23:52 sstp,ppp,debug : MPLSCP close
2026-03-01 11:23:52 sstp,ppp,debug : LCP lowerdown
2026-03-01 11:23:52 sstp,ppp,debug : LCP down event in initial state
2026-03-01 11:23:52 sstp,ppp,debug : CCP close
2026-03-01 11:23:52 sstp,ppp,debug : BCP close
2026-03-01 11:23:52 sstp,ppp,debug : IPCP close
2026-03-01 11:23:52 sstp,ppp,debug : IPV6CP close
2026-03-01 11:23:52 sstp,ppp,debug : MPLSCP close
2026-03-01 11:23:52 sstp,ppp,debug : LCP lowerdown
2026-03-01 11:23:52 sstp,ppp,debug : LCP down event in initial state
2026-03-01 11:23:52 sstp,ppp,debug : CCP close
2026-03-01 11:23:52 sstp,ppp,debug : BCP close
2026-03-01 11:23:52 sstp,ppp,debug : IPCP close
2026-03-01 11:23:52 sstp,ppp,debug : IPV6CP close
2026-03-01 11:23:52 sstp,ppp,debug : MPLSCP close
2026-03-01 11:23:52 sstp,ppp,debug : LCP lowerdown
2026-03-01 11:23:52 sstp,ppp,debug : LCP down event in initial state
2026-03-01 11:23:52 sstp,ppp,debug : CCP close
2026-03-01 11:23:52 sstp,ppp,debug : BCP close
2026-03-01 11:23:52 sstp,ppp,debug : IPCP close
2026-03-01 11:23:52 sstp,ppp,debug : IPV6CP close
2026-03-01 11:23:52 sstp,ppp,debug : MPLSCP close
2026-03-01 11:23:52 sstp,ppp,debug : LCP lowerdown
2026-03-01 11:23:52 sstp,ppp,debug : LCP down event in initial state
2026-03-01 11:24:20 sstp,packet <sstp-mikrotik3.local> recv control packet type: echo request
2026-03-01 11:24:20 sstp,packet <sstp-mikrotik3.local> sent control packet type: echo response
2026-03-01 11:24:20 sstp,packet <sstp-mikrotik3.local> sent control packet type: echo request
2026-03-01 11:24:20 sstp,packet <sstp-mikrotik3.local> recv control packet type: echo response
We see the expected keep-alive packets every 60 seconds. (I’ve cleaned the logs before posting here; the keep-alive packets for the other SSTP VPN client, MikroTik2, also appear, identically).
And, eventually, the curious set of down/close packets do appear, right near the end of the log excerpt above; (I stopped the /log print follow as soon as those packets had appeared, and, thereafter, a next set of keep-alive packets had appeared, to make sure that the close/down packets were NOT indicative of this SSTP connection failing. During that whole time, I also had an SSH session open, through this SSTP VPN, to the MikroTik3 SSTP client, and the connection did in fact stay up the whole time).
I then restarted the MikroTik3 router (SSTP client), to generate system logs on MikroTik4 (SSTP server) which happen if the connection actually goes down and comes back up:
2026-03-01 11:45:43 sstp,ppp,debug,packet <sstp-mikrotik3.local>: rcvd LCP TermReq id=0x5
2026-03-01 11:45:43 sstp,ppp,debug,packet system is going to shutdown
2026-03-01 11:45:43 sstp,ppp,debug <sstp-mikrotik3.local>: LCP closed
2026-03-01 11:45:43 sstp,ppp,debug <sstp-mikrotik3.local>: CCP lowerdown
2026-03-01 11:45:43 sstp,ppp,debug <sstp-mikrotik3.local>: BCP lowerdown
2026-03-01 11:45:43 sstp,ppp,debug <sstp-mikrotik3.local>: BCP down event in starting state
2026-03-01 11:45:43 sstp,ppp,debug <sstp-mikrotik3.local>: IPCP lowerdown
2026-03-01 11:45:43 sstp,ppp,debug <sstp-mikrotik3.local>: IPCP closed
2026-03-01 11:45:43 sstp,ppp,debug <sstp-mikrotik3.local>: IPV6CP lowerdown
2026-03-01 11:45:43 sstp,ppp,debug <sstp-mikrotik3.local>: IPV6CP down event in starting state
2026-03-01 11:45:43 sstp,ppp,debug <sstp-mikrotik3.local>: MPLSCP lowerdown
2026-03-01 11:45:43 sstp,ppp,debug <sstp-mikrotik3.local>: MPLSCP closed
2026-03-01 11:45:43 sstp,ppp,debug,packet <sstp-mikrotik3.local>: sent LCP TermAck id=0x5
2026-03-01 11:45:43 sstp,ppp,debug <sstp-mikrotik3.local>: LCP lowerdown
2026-03-01 11:45:43 sstp,ppp,debug <sstp-mikrotik3.local>: CCP close
2026-03-01 11:45:43 sstp,ppp,debug <sstp-mikrotik3.local>: BCP close
2026-03-01 11:45:43 sstp,ppp,debug <sstp-mikrotik3.local>: IPCP close
2026-03-01 11:45:43 sstp,ppp,debug <sstp-mikrotik3.local>: IPV6CP close
2026-03-01 11:45:43 sstp,ppp,debug <sstp-mikrotik3.local>: MPLSCP close
2026-03-01 11:45:43 sstp,ppp,info <sstp-mikrotik3.local>: terminating...
2026-03-01 11:45:43 sstp,ppp,debug <sstp-mikrotik3.local>: LCP lowerdown
2026-03-01 11:45:43 sstp,ppp,debug <sstp-mikrotik3.local>: LCP down event in starting state
2026-03-01 11:45:43 sstp,ppp,info,account mikrotik3.local logged out, 322 77208 49040 819 924 from 73.80.148.50
2026-03-01 11:45:43 sstp,ppp,info <sstp-mikrotik3.local>: disconnected
And, a minute and a half or so later, after MikroTik3 had rebooted, and its SSTP VPN client automatically began re-connecting to the SSTP VPN server on MikroTik4:
2026-03-01 11:46:23 sstp,packet recv
2026-03-01 11:46:23 sstp,packet SSTP_DUPLEX_POST /sra_{BA195980-CD49-458b-9E23-C84EE0ADCD75}/ HTTP/1.1\r
2026-03-01 11:46:23 sstp,packet Content-Length: 18446744073709551615\r
2026-03-01 11:46:23 sstp,packet Host: 0.0.0.0\r
2026-03-01 11:46:23 sstp,packet \r
2026-03-01 11:46:23 sstp,packet
2026-03-01 11:46:23 sstp,packet sending
2026-03-01 11:46:23 sstp,packet HTTP/1.1 200\r
2026-03-01 11:46:23 sstp,packet Content-Length: 18446744073709551615\r
2026-03-01 11:46:23 sstp,packet Server: MikroTik-SSTP\r
2026-03-01 11:46:23 sstp,packet Date: Sun, 01 Mar 2026 10:46:23 GMT\r
2026-03-01 11:46:23 sstp,packet \r
2026-03-01 11:46:23 sstp,packet
2026-03-01 11:46:23 sstp,packet recv control packet type: connect request
2026-03-01 11:46:23 sstp,packet sent control packet type: connect ack
2026-03-01 11:46:23 sstp,ppp,debug : LCP lowerup
2026-03-01 11:46:23 sstp,ppp,debug : LCP open
2026-03-01 11:46:23 sstp,ppp,debug,packet : sent LCP ConfReq id=0x1
2026-03-01 11:46:23 sstp,ppp,debug,packet <mru 1500>
2026-03-01 11:46:23 sstp,ppp,debug,packet
2026-03-01 11:46:23 sstp,ppp,debug,packet : rcvd LCP ConfReq id=0x1
2026-03-01 11:46:23 sstp,ppp,debug,packet : sent LCP ConfAck id=0x1
2026-03-01 11:46:23 sstp,ppp,debug,packet : rcvd LCP ConfAck id=0x1
2026-03-01 11:46:23 sstp,ppp,debug,packet <mru 1500>
2026-03-01 11:46:23 sstp,ppp,debug,packet
2026-03-01 11:46:23 sstp,ppp,debug : LCP opened
2026-03-01 11:46:23 sstp,ppp,debug,packet : sent CHAP Challenge id=0x1
2026-03-01 11:46:23 sstp,ppp,debug,packet
2026-03-01 11:46:23 sstp,ppp,debug,packet
2026-03-01 11:46:23 sstp,ppp,debug,packet : rcvd CHAP Response id=0x1
2026-03-01 11:46:23 sstp,ppp,debug,packet
2026-03-01 11:46:23 sstp,ppp,debug,packet
2026-03-01 11:46:23 sstp,ppp,info,account mikrotik3.local logged in, 192.168.255.55 from 73.80.148.50
2026-03-01 11:46:23 sstp,ppp,debug,packet <sstp-mikrotik3.local>: sent CHAP Success id=0x1
2026-03-01 11:46:23 sstp,ppp,info <sstp-mikrotik3.local>: authenticated
2026-03-01 11:46:23 sstp,ppp,debug <sstp-mikrotik3.local>: IPCP lowerup
2026-03-01 11:46:23 sstp,ppp,debug <sstp-mikrotik3.local>: IPCP open
2026-03-01 11:46:23 sstp,ppp,debug,packet <sstp-mikrotik3.local>: sent IPCP ConfReq id=0x1
2026-03-01 11:46:23 sstp,ppp,debug,packet <addr 192.168.255.54>
2026-03-01 11:46:23 sstp,ppp,debug <sstp-mikrotik3.local>: IPV6CP open
2026-03-01 11:46:23 sstp,ppp,debug <sstp-mikrotik3.local>: MPLSCP lowerup
2026-03-01 11:46:23 sstp,ppp,debug <sstp-mikrotik3.local>: MPLSCP open
2026-03-01 11:46:23 sstp,ppp,debug,packet <sstp-mikrotik3.local>: sent MPLSCP ConfReq id=0x1
2026-03-01 11:46:23 sstp,ppp,debug <sstp-mikrotik3.local>: BCP open
2026-03-01 11:46:23 sstp,ppp,debug <sstp-mikrotik3.local>: CCP lowerup
2026-03-01 11:46:23 sstp,ppp,debug <sstp-mikrotik3.local>: CCP open
2026-03-01 11:46:24 sstp,packet <sstp-mikrotik3.local> recv control packet type: connected
2026-03-01 11:46:24 sstp,ppp,debug,packet <sstp-mikrotik3.local>: rcvd IPCP ConfReq id=0x1
2026-03-01 11:46:24 sstp,ppp,debug,packet <addr 192.168.253.3>
2026-03-01 11:46:24 sstp,ppp,debug,packet <sstp-mikrotik3.local>: sent IPCP ConfNak id=0x1
2026-03-01 11:46:24 sstp,ppp,debug,packet <addr 192.168.255.55>
2026-03-01 11:46:24 sstp,ppp,debug,packet <sstp-mikrotik3.local>: rcvd MPLSCP ConfReq id=0x1
2026-03-01 11:46:24 sstp,ppp,debug,packet <sstp-mikrotik3.local>: sent MPLSCP ConfAck id=0x1
2026-03-01 11:46:24 sstp,ppp,debug,packet <sstp-mikrotik3.local>: rcvd IPCP ConfAck id=0x1
2026-03-01 11:46:24 sstp,ppp,debug,packet <addr 192.168.255.54>
2026-03-01 11:46:24 sstp,ppp,debug,packet <sstp-mikrotik3.local>: rcvd MPLSCP ConfAck id=0x1
2026-03-01 11:46:24 sstp,ppp,debug <sstp-mikrotik3.local>: MPLSCP opened
2026-03-01 11:46:24 sstp,ppp,info <sstp-mikrotik3.local>: connected
2026-03-01 11:46:24 sstp,ppp,debug,packet <sstp-mikrotik3.local>: rcvd IPCP ConfReq id=0x2
2026-03-01 11:46:24 sstp,ppp,debug,packet <addr 192.168.253.3>
2026-03-01 11:46:24 sstp,ppp,debug,packet <sstp-mikrotik3.local>: sent IPCP ConfNak id=0x2
2026-03-01 11:46:24 sstp,ppp,debug,packet <addr 192.168.255.55>
2026-03-01 11:46:24 sstp,ppp,debug,packet <sstp-mikrotik3.local>: rcvd IPCP ConfReq id=0x3
2026-03-01 11:46:24 sstp,ppp,debug,packet <addr 192.168.253.3>
2026-03-01 11:46:24 sstp,ppp,debug,packet <sstp-mikrotik3.local>: sent IPCP ConfNak id=0x3
2026-03-01 11:46:24 sstp,ppp,debug,packet <addr 192.168.255.55>
2026-03-01 11:46:24 sstp,ppp,debug,packet <sstp-mikrotik3.local>: rcvd IPCP ConfReq id=0x4
2026-03-01 11:46:24 sstp,ppp,debug,packet <addr 192.168.253.3>
2026-03-01 11:46:24 sstp,ppp,debug,packet <sstp-mikrotik3.local>: sent IPCP ConfNak id=0x4
2026-03-01 11:46:24 sstp,ppp,debug,packet <addr 192.168.255.55>
2026-03-01 11:46:24 sstp,ppp,debug,packet <sstp-mikrotik3.local>: rcvd IPCP ConfReq id=0x5
2026-03-01 11:46:24 sstp,ppp,debug,packet <addr 192.168.253.3>
2026-03-01 11:46:24 sstp,ppp,debug,packet <sstp-mikrotik3.local>: sent IPCP ConfNak id=0x5
2026-03-01 11:46:24 sstp,ppp,debug,packet <addr 192.168.255.55>
2026-03-01 11:46:24 sstp,ppp,debug,packet <sstp-mikrotik3.local>: rcvd IPCP ConfReq id=0x6
2026-03-01 11:46:24 sstp,ppp,debug,packet <addr 192.168.253.3>
2026-03-01 11:46:24 sstp,ppp,debug,packet <sstp-mikrotik3.local>: sent IPCP ConfRej id=0x6
2026-03-01 11:46:24 sstp,ppp,debug,packet <addr 192.168.253.3>
2026-03-01 11:46:24 sstp,ppp,debug <sstp-mikrotik3.local>: IPCP timer
2026-03-01 11:46:24 sstp,ppp,debug,packet <sstp-mikrotik3.local>: sent IPCP ConfReq id=0x2
2026-03-01 11:46:24 sstp,ppp,debug,packet <addr 192.168.255.54>
2026-03-01 11:46:25 sstp,ppp,debug,packet <sstp-mikrotik3.local>: rcvd IPCP ConfReq id=0x7
2026-03-01 11:46:25 sstp,ppp,debug,packet <sstp-mikrotik3.local>: sent IPCP ConfAck id=0x7
2026-03-01 11:46:25 sstp,ppp,debug,packet <sstp-mikrotik3.local>: rcvd IPCP ConfAck id=0x2
2026-03-01 11:46:25 sstp,ppp,debug,packet <addr 192.168.255.54>
2026-03-01 11:46:25 sstp,ppp,debug <sstp-mikrotik3.local>: IPCP opened
2026-03-01 11:47:24 sstp,packet <sstp-mikrotik3.local> recv control packet type: echo request
2026-03-01 11:47:24 sstp,packet <sstp-mikrotik3.local> sent control packet type: echo response
2026-03-01 11:47:24 sstp,packet <sstp-mikrotik3.local> sent control packet type: echo request
2026-03-01 11:47:24 sstp,packet <sstp-mikrotik3.local> recv control packet type: echo response
So, the specific packets that appear when the SSTP client connection from MikroTik3 to the SSTP server on MikroTik4, in this last log excerpt, are different from the suspicious packets that I’m trying to debug.
Which seems to confirm my theory that the suspicious packets are NOT related to the legitimate, stably-up connections from MikroTik2 and MikroTik3 to MikroTik4. (Recall, I couldn’t capture anything in /tool sniffer while the suspicious packets were logged).
Hm. When I did the sniff, I had only looked at my SSTP VPN server port (8443).
Are there other ports on which I should monitor, or a different sniffer capture filter that I could apply, that would capture the packets that produce those various close/down sstp,ppp,debug log entries, which AREN’T on the SSTP service port 8443? (The SSTP VPN server on MikroTik4 is behind a basic ISP router/gateway firewall, which only forwards a few ports in to MikroTik4:
- the SSTP server port 8443 as described above
- two others ports to allow direct SSH and web admin connections to remotely manage the MikroTik BUT only after a successful two-phase knock with packets on two other ports
Hm, well, obviously, capture also on these four other ports.
Lessee…
/tool/sniffer print
[admin@MikroTik4.felines.org] /tool/sniffer> print
only-headers: no
memory-limit: 100KiB
memory-scroll: yes
file-name:
file-limit: 1000KiB
streaming-enabled: no
streaming-server: 0.0.0.0:37008
max-packet-size: 2048
filter-stream: no
filter-interface:
filter-mac-address:
filter-src-mac-address:
filter-dst-mac-address:
filter-mac-protocol:
filter-ip-address: !83.41.117.253/32
!73.80.148.50/32
filter-src-ip-address:
filter-dst-ip-address:
filter-ipv6-address:
filter-src-ipv6-address:
filter-dst-ipv6-address:
filter-ip-protocol:
filter-port: 1111
2222
3333
4444
filter-src-port:
filter-dst-port:
filter-vlan:
filter-cpu:
filter-size:
filter-direction: any
filter-operator-between-entries: or
quick-rows: 20
quick-show-frame: no
running: no
(So, sniffing for any IP address that is not either of the two currently-connected other SSTP MikroTiks, on any of the four open ports {changed for privacy}).
The suspicious close/down entries did appear again in the system log, but the packet filter caught nothing.
All of which still leaves me scratching my head…
Any ideas?
thanks,