The chain of mismatches ends by a match, so it is not relevant. Also the FRAGMENTATION mentioned in the log means that fragmentation of the IKE negotiation packets is supported, i.e. it is not a complaint about existence of fragmented packets.
The log shows that both Phase 1 and Phase 2 have completed successfully:
09:18:40 ipsec IPsec-SA established: ESP/Transport **MikRouter**[4500]->****Phone***[51233] spi=0xd6631ba
Next, the IPsec stack sends keepalive (KA) packets every 20 seconds:
09:18:41 ipsec,debug KA: **MikRouter**[4500]->****Phone***[51233]
09:18:41 ipsec,debug 1 times of 1 bytes message will be sent to ****Phone***[51233]
09:19:01 ipsec,debug KA: **MikRouter**[4500]->****Phone***[51233]
09:19:01 ipsec,debug 1 times of 1 bytes message will be sent to ****Phone***[51233]
09:19:21 ipsec,debug KA: **MikRouter**[4500]->****Phone***[51233]
09:19:21 ipsec,debug 1 times of 1 bytes message will be sent to ****Phone***[51233]
It is normal that no response comes for these, and it has no consequences.
Then, the phone actively terminates the IKE session:
09:19:38 ipsec,debug ===== received 108 bytes from ****Phone***[51233] to **MikRouter**[4500]
09:19:38 ipsec,debug receive Information.
09:19:38 ipsec,debug hash(sha2_256)
09:19:38 ipsec,debug hash validated.
09:19:38 ipsec,debug begin.
09:19:38 ipsec,debug seen nptype=8(hash) len=36
09:19:38 ipsec,debug seen nptype=12(delete) len=16
09:19:38 ipsec,debug succeed.
09:19:38 ipsec,debug ****Phone*** delete payload for protocol ESP
So
- run /system logging add topics=l2tp
- open two more terminals (cli windows)
- in one cli window, run /tool sniffer quick port=4500
- in another cli window, run the /log print follow-only ... and repeat the connection attempt
- 20-40 seconds after starting the connection attempt, run /ip ipsec policy print detail in the third window
- after the connection attempt fails, stop the /log print ... and /tool sniffer quick ...
- run /tool sniffer packet print within a minute after stopping the /tool sniffer quick ...
- download the log file, anonymize it, and post it here together with the output of the /ip ipsec policy print and /tool sniffer packet print
A problem at L2TP level seems unlikely as it works from LAN, but I want to see what's going on there. What is more likely is that the mobile operator's firewall closes the pinhole too fast so part of the packets from the Mikrotik do not make it to the phone. And what is also unlikely but possible is that the Mikrotik doesn't actually send them - that's why I ask for the
/tool sniffer packet print.