Community discussions

MikroTik App
 
vanikcz
newbie
Topic Author
Posts: 36
Joined: Wed Oct 14, 2015 11:06 pm

L2TP/IPSec VPN problem on 6.48.1 and 6.48.2

Tue Apr 20, 2021 10:21 am

Hi there,
I have a router (RB1100AHx4) that is configured with multiple IPSec tunnels. Each tunnel is having its own proposal like this:
/ip ipsec proposal
set [ find default=yes ] enc-algorithms="aes-256-cbc,aes-256-ctr,aes-256-gcm,a\
    es-128-cbc,aes-128-ctr,aes-128-gcm,3des" lifetime=1h
add auth-algorithms=sha256 enc-algorithms=aes-256-cbc lifetime=1h name=PEER1 \
    pfs-group=modp2048
add enc-algorithms=aes-128-cbc lifetime=1h name=PEER2 pfs-group=modp2048
add enc-algorithms=3des lifetime=1h name=L2TP
It was working in 6.48. Sometimes it is working in 6.48.2, but sometimes not. I tried to repair it for three hours, after that I tried to disable L2TP server in /PPP and enable it again and voila - it start working instantneously. But now it is not working at all. Here is the log:
08:55:15 ipsec,info respond new phase 1 (Identity Protection): peer.one.ip[500]<=>peer.two.ip[500] 
08:55:15 ipsec received MS NT5 ISAKMPOAKLEY ID version: 9 
08:55:15 ipsec received Vendor ID: RFC 3947 
08:55:15 ipsec received Vendor ID: draft-ietf-ipsec-nat-t-ike-02\n 
08:55:15 ipsec received Vendor ID: FRAGMENTATION 
08:55:15 ipsec Fragmentation enabled 
08:55:15 ipsec peer.two.ip Selected NAT-T version: RFC 3947 
08:55:15 ipsec rejected hashtype: DB(prop#1:trns#1):Peer(prop#1:trns#1) = 4:SHA 
08:55:15 ipsec rejected dh_group: DB(prop#1:trns#1):Peer(prop#1:trns#1) = 2048-bit MODP group:384-bit random ECP group 
08:55:15 ipsec rejected hashtype: DB(prop#1:trns#1):Peer(prop#1:trns#2) = 4:SHA 
08:55:15 ipsec rejected dh_group: DB(prop#1:trns#1):Peer(prop#1:trns#2) = 2048-bit MODP group:256-bit random ECP group 
08:55:15 ipsec rejected hashtype: DB(prop#1:trns#1):Peer(prop#1:trns#3) = 4:SHA 
08:55:15 ipsec rejected enctype: DB(prop#1:trns#1):Peer(prop#1:trns#4) = AES-CBC:3DES-CBC 
08:55:15 ipsec rejected hashtype: DB(prop#1:trns#1):Peer(prop#1:trns#4) = 4:SHA 
08:55:15 ipsec rejected enctype: DB(prop#1:trns#1):Peer(prop#1:trns#5) = AES-CBC:3DES-CBC 
08:55:15 ipsec rejected hashtype: DB(prop#1:trns#1):Peer(prop#1:trns#5) = 4:SHA 
08:55:15 ipsec rejected dh_group: DB(prop#1:trns#1):Peer(prop#1:trns#5) = 2048-bit MODP group:1024-bit MODP group 
08:55:15 ipsec,error no suitable proposal found. 
08:55:15 ipsec,error peer.two.ip failed to get valid proposal. 
08:55:15 ipsec,error peer.two.ip failed to pre-process ph1 packet (side: 1, status 1). 
08:55:15 ipsec,error peer.two.ip phase1 negotiation failed. 
So it is look like that L2TP server is not getting the right proposal because from the log is obvious that it is using the PEER1 proposal instead of L2TP one.

I think Im doing something wrong there, because on other installations it is working, this installation is variing in the count of tunnels and the type of PEER1 tunnel. It is only SHA256 tunnel I'm running.
Can you point me where I should look to resolve it?

Best Regards,
Jan
 
sindy
Forum Guru
Forum Guru
Posts: 10206
Joined: Mon Dec 04, 2017 9:19 pm

Re: L2TP/IPSec VPN problem on 6.48.1 and 6.48.2

Sat Apr 24, 2021 10:08 pm

What you describe sounds like you've got multiple peers with same values of local-address, address, and exchange-mode, where one of them is dynamically generated by the L2TP setting use-ipsec=yes.

What does /ip ipsec peer print detail show while the L2TP server is enabled?

Who is online

Users browsing this forum: Benzebub, carcuevas, GoogleOther [Bot] and 87 guests