/ppp active print detail
Flags: R - radius
0 name="victor" service=l2tp caller-id="---.---.126.90" address=0.0.0.0 uptime=2d10h48m15s encoding="cbc(aes) + hmac(sha256)" session-id=0x81200026 limit-bytes-in=0 limit-bytes-out=0
1 name="alfandega2" service=l2tp caller-id="---.---.8.65" address=0.0.0.0 uptime=21h50m45s encoding="cbc(aes) + hmac(sha256)" session-id=0x81200032 limit-bytes-in=0 limit-bytes-out=0
2 name="alfandega1" service=l2tp caller-id="---.---.166.68" address=0.0.0.0 uptime=14h49m54s encoding="cbc(aes) + hmac(sha256)" session-id=0x81200039 limit-bytes-in=0 limit-bytes-out=0
11:22:22 ipsec,debug Compared: Local:Peer
11:22:22 ipsec,debug (lifetime = 86400:28800)
11:22:22 ipsec,debug (lifebyte = 0:0)
11:22:22 ipsec,debug enctype = AES-CBC:AES-CBC
11:22:22 ipsec,debug (encklen = 256:256)
11:22:22 ipsec,debug hashtype = SHA:SHA
11:22:22 ipsec,debug authmethod = pre-shared key:pre-shared key
11:22:22 ipsec,debug dh_group = 2048-bit MODP group:2048-bit MODP group
11:22:22 ipsec,debug an acceptable proposal found.
18:57:21 ipsec,debug KA: 192.168.10.88[4500]->10.0.0.5[4500]
18:57:21 ipsec,debug 1 times of 1 bytes message will be sent to 10.0.0.5[4500]
18:57:21 ipsec,debug,packet ff
18:57:29 l2tp,debug,packet sent control message to 10.0.0.5:1701 from 192.168.10.88:1701
18:57:29 l2tp,debug,packet tunnel-id=5, session-id=0, ns=456, nr=4
18:57:29 l2tp,debug,packet (M) Message-Type=HELLO
18:57:29 l2tp,debug,packet rcvd control message (ack) from 10.0.0.5:1701 to 192.168.10.88:1701
18:57:29 l2tp,debug,packet tunnel-id=1263, session-id=0, ns=4, nr=457
18:57:41 ipsec,debug KA: 192.168.10.88[4500]->10.0.0.5[4500]
18:57:41 ipsec,debug 1 times of 1 bytes message will be sent to 10.0.0.5[4500]
18:57:41 ipsec,debug,packet ff
18:58:01 ipsec,debug KA: 192.168.10.88[4500]->10.0.0.5[4500]
18:58:01 ipsec,debug 1 times of 1 bytes message will be sent to 10.0.0.5[4500]
18:58:01 ipsec,debug,packet ff
18:58:21 ipsec,debug KA: 192.168.10.88[4500]->10.0.0.5[4500]
18:58:21 ipsec,debug 1 times of 1 bytes message will be sent to 10.0.0.5[4500]
18:58:21 ipsec,debug,packet ff
18:58:24 ipsec,debug ===== received 92 bytes from 10.0.0.5[4500] to 192.168.10.88[4500]
18:58:24 ipsec,debug,packet 2a859f74 83bfff84 66b1ac17 dc1967e4 08100501 227b959d 0000005c 35e16fc6
18:58:24 ipsec,debug,packet 227f11e3 5d1d573e 97169e66 7d53809e 1c2cf21d e2a39f2d 55a276b0 2f09b4b2
18:58:24 ipsec,debug,packet b9ccda68 403e04f4 d4f31281 4ab50866 ce73f92a 25b48241 04fba3be
18:58:24 ipsec,debug receive Information.
18:58:24 ipsec,debug compute IV for phase2
18:58:24 ipsec,debug phase1 last IV:
18:58:24 ipsec,debug 108b0de7 933fdadc c36cb287 3ee353ad 227b959d
18:58:24 ipsec,debug hash(sha1)
18:58:24 ipsec,debug encryption(aes)
18:58:24 ipsec,debug phase2 IV computed:
18:58:24 ipsec,debug c625865e d69af68e d7672100 66f32a20
18:58:24 ipsec,debug encryption(aes)
18:58:24 ipsec,debug IV was saved for next processing:
18:58:24 ipsec,debug 4ab50866 ce73f92a 25b48241 04fba3be
18:58:24 ipsec,debug encryption(aes)
18:58:24 ipsec,debug with key:
18:58:24 ipsec,debug 180cc989 150aa766 f2f526af bb0819cd c17f8f66 6632fc13 2eba948d c143a772
18:58:24 ipsec,debug decrypted payload by IV:
18:58:24 ipsec,debug c625865e d69af68e d7672100 66f32a20
18:58:24 ipsec,debug decrypted payload, but not trimed.
18:58:24 ipsec,debug 0c000018 7badbada 4bd6bb2c 2aaf50c0 56d9c747 d2b78da3 0000001c 00000001
18:58:24 ipsec,debug 01100001 2a859f74 83bfff84 66b1ac17 dc1967e4 00000000 00000000 00000000
18:58:24 ipsec,debug padding len=1
18:58:24 ipsec,debug skip to trim padding.
18:58:24 ipsec,debug decrypted.
18:58:24 ipsec,debug 2a859f74 83bfff84 66b1ac17 dc1967e4 08100501 227b959d 0000005c 0c000018
18:58:24 ipsec,debug 7badbada 4bd6bb2c 2aaf50c0 56d9c747 d2b78da3 0000001c 00000001 01100001
18:58:24 ipsec,debug 2a859f74 83bfff84 66b1ac17 dc1967e4 00000000 00000000 00000000
18:58:24 ipsec,debug HASH with:
18:58:24 ipsec,debug 227b959d 0000001c 00000001 01100001 2a859f74 83bfff84 66b1ac17 dc1967e4
18:58:24 ipsec,debug hmac(hmac_sha1)
18:58:24 ipsec,debug HASH computed:
18:58:24 ipsec,debug 7badbada 4bd6bb2c 2aaf50c0 56d9c747 d2b78da3
18:58:24 ipsec,debug hash validated.
18:58:24 ipsec,debug begin.
18:58:24 ipsec,debug seen nptype=8(hash) len=24
18:58:24 ipsec,debug seen nptype=12(delete) len=28
18:58:24 ipsec,debug succeed.
18:58:24 ipsec,debug 10.0.0.5 delete payload for protocol ISAKMP
18:58:24 ipsec,info purging ISAKMP-SA 192.168.10.88[4500]<=>10.0.0.5[4500] spi=2a859f7483bfff84:66b1ac17dc1967e4.
18:58:24 ipsec purged IPsec-SA proto_id=ESP spi=0xeb151c6
18:58:24 ipsec purged IPsec-SA proto_id=ESP spi=0x7670525
18:58:24 ipsec,debug an undead schedule has been deleted.
18:58:24 ipsec removing generated policy
18:58:24 ipsec purged ISAKMP-SA 192.168.10.88[4500]<=>10.0.0.5[4500] spi=2a859f7483bfff84:66b1ac17dc1967e4.
18:58:24 ipsec,debug purged SAs.
18:58:24 ipsec,info ISAKMP-SA deleted 192.168.10.88[4500]-10.0.0.5[4500] spi:2a859f7483bfff84:66b1ac17dc1967e4 rekey:1
18:58:24 ipsec KA remove: 192.168.10.88[4500]->10.0.0.5[4500]
18:58:24 ipsec,debug KA tree dump: 192.168.10.88[4500]->10.0.0.5[4500] (in_use=1)
18:58:24 ipsec,debug KA removing this one...
18:58:29 l2tp,debug,packet sent control message to 10.0.0.5:1701 from 192.168.10.88:1701
18:58:29 l2tp,debug,packet tunnel-id=5, session-id=0, ns=457, nr=4
18:58:29 l2tp,debug,packet (M) Message-Type=HELLO
18:58:30 l2tp,debug,packet sent control message to 10.0.0.5:1701 from 192.168.10.88:1701
18:58:30 l2tp,debug,packet tunnel-id=5, session-id=0, ns=457, nr=4
18:58:30 l2tp,debug,packet (M) Message-Type=HELLO
18:58:31 l2tp,debug,packet sent control message to 10.0.0.5:1701 from 192.168.10.88:1701
18:58:31 l2tp,debug,packet tunnel-id=5, session-id=0, ns=457, nr=4
18:58:31 l2tp,debug,packet (M) Message-Type=HELLO
18:58:33 l2tp,debug,packet sent control message to 10.0.0.5:1701 from 192.168.10.88:1701
18:58:33 l2tp,debug,packet tunnel-id=5, session-id=0, ns=457, nr=4
18:58:33 l2tp,debug,packet (M) Message-Type=HELLO
18:58:37 l2tp,debug,packet sent control message to 10.0.0.5:1701 from 192.168.10.88:1701
18:58:37 l2tp,debug,packet tunnel-id=5, session-id=0, ns=457, nr=4
18:58:37 l2tp,debug,packet (M) Message-Type=HELLO
18:58:45 l2tp,debug,packet sent control message to 10.0.0.5:1701 from 192.168.10.88:1701
18:58:45 l2tp,debug,packet tunnel-id=5, session-id=0, ns=457, nr=4
18:58:45 l2tp,debug,packet (M) Message-Type=HELLO
18:58:53 l2tp,debug tunnel 1263 received no replies, disconnecting
ack
18:58:53 l2tp,debug tunnel 1263 entering state: dead
18:58:53 l2tp,debug session 1 entering state: dead
18:58:53 l2tp,ppp,debug <10.0.0.5>: LCP lowerdown
18:58:53 l2tp,ppp,debug <10.0.0.5>: LCP closed
18:58:53 l2tp,ppp,debug <10.0.0.5>: CCP lowerdown
18:58:53 l2tp,ppp,debug <10.0.0.5>: BCP lowerdown
18:58:53 l2tp,ppp,debug <10.0.0.5>: BCP down event in starting state
18:58:53 l2tp,ppp,debug <10.0.0.5>: IPCP lowerdown
18:58:53 l2tp,ppp,debug <10.0.0.5>: IPCP closed
18:58:53 l2tp,ppp,debug <10.0.0.5>: IPV6CP lowerdown
18:58:53 l2tp,ppp,debug <10.0.0.5>: IPV6CP down event in starting state
18:58:53 l2tp,ppp,debug <10.0.0.5>: MPLSCP lowerdown
18:58:53 l2tp,ppp,debug <10.0.0.5>: CCP close
18:58:53 l2tp,ppp,debug <10.0.0.5>: BCP close
18:58:53 l2tp,ppp,debug <10.0.0.5>: IPCP close
18:58:53 l2tp,ppp,debug <10.0.0.5>: IPV6CP close
18:58:53 l2tp,ppp,debug <10.0.0.5>: MPLSCP close
18:58:53 l2tp,ppp,info l2tp-server-dedecek: terminating... - hungup
18:58:53 l2tp,ppp,debug <10.0.0.5>: LCP lowerdown
18:58:53 l2tp,ppp,debug <10.0.0.5>: LCP down event in starting state
18:58:53 l2tp,ppp,info,account dedecek logged out, 27387 24129137 55951331 123213 106836
18:58:53 l2tp,ppp,info l2tp-server-dedecek: disconnected
18:58:53 ipsec,debug unbind ::ffff:192.168.99.1
18:58:56 ipsec,debug ===== received 408 bytes from 10.0.0.5[4500] to 192.168.10.88[4500]
18:58:56 ipsec,debug,packet 42b08e69 f8f6c26e 00000000 00000000 01100200 00000000 00000198 0d0000d4
18:58:56 ipsec,debug,packet 00000001 00000001 000000c8 01010005 03000028 01010000 80010007 800e0100
18:58:56 ipsec,debug,packet 80020002 80040014 80030001 800b0001 000c0004 00007080 03000028 02010000
18:58:56 ipsec,debug,packet 80010007 800e0080 80020002 80040013 80030001 800b0001 000c0004 00007080
18:58:56 ipsec,debug,packet 03000028 03010000 80010007 800e0100 80020002 8004000e 80030001 800b0001
18:58:56 ipsec,debug,packet 000c0004 00007080 03000024 04010000 80010005 80020002 8004000e 80030001
18:58:56 ipsec,debug,packet 800b0001 000c0004 00007080 00000024 05010000 80010005 80020002 80040002
18:58:56 ipsec,debug,packet 80030001 800b0001 000c0004 00007080 0d000018 01528bbb c0069612 1849ab9a
18:58:56 ipsec,debug,packet 1c5b2a51 00000001 0d000018 1e2b5169 05991c7d 7c96fcbf b587e461 00000009
18:58:56 ipsec,debug,packet 0d000014 4a131c81 07035845 5c5728f2 0e95452f 0d000014 90cb8091 3ebb696e
18:58:56 ipsec,debug,packet 086381b5 ec427b1f 0d000014 4048b7d5 6ebce885 25e7de7f 00d6c2d3 0d000014
18:58:56 ipsec,debug,packet fb1de3cd f341b7ea 16b7e5be 0855f120 0d000014 26244d38 eddb61b3 172a36e3
18:58:56 ipsec,debug,packet d0cfb819 00000014 e3a5966a 76379fe7 07228231 e5ce8652
18:58:56 ipsec,debug Marking ports as changed
18:58:56 ipsec,debug Marking ports as changed
18:58:56 ipsec,debug ===
18:58:56 ipsec,info respond new phase 1 (Identity Protection): 192.168.10.88[4500]<=>10.0.0.5[4500]
...
18:58:58 ipsec,debug call pk_sendupdate
18:58:58 ipsec,debug encryption(aes-cbc)
18:58:58 ipsec,debug hmac(sha1)
18:58:58 ipsec,debug call pfkey_send_update_nat
18:58:58 ipsec IPsec-SA established: ESP/Transport 10.0.0.5[4500]->192.168.10.88[4500] spi=0x1f67a4
18:58:58 ipsec,debug pfkey update sent.
18:58:58 ipsec,debug encryption(aes-cbc)
18:58:58 ipsec,debug hmac(sha1)
18:58:58 ipsec,debug call pfkey_send_add_nat
18:58:58 ipsec IPsec-SA established: ESP/Transport 192.168.10.88[4500]->10.0.0.5[4500] spi=0xf1a4f34
18:58:58 ipsec,debug pfkey add sent.
18:58:58 ipsec,debug ===== received 76 bytes from 10.0.0.5[4500] to 192.168.10.88[4500]
18:58:58 ipsec,debug,packet 2a859f74 83bfff84 66b1ac17 dc1967e4 08100501 db32ba58 0000004c f1e52518
18:58:58 ipsec,debug,packet baeb8459 5c9cdab5 29193055 b74da572 854a337a be9c47ed 70ba26e1 0004899f
18:58:58 ipsec,debug,packet e0e045e9 bfbb4850 fb354c32
18:58:58 ipsec 10.0.0.5 unknown Informational exchange received.
ns
nr
18:59:06 l2tp,debug,packet rcvd control message from 10.0.0.5:1701 to 192.168.10.88:1701
18:59:06 l2tp,debug,packet tunnel-id=1263, session-id=0, ns=4, nr=457
18:59:06 l2tp,debug,packet (M) Message-Type=HELLO
18:59:16 l2tp,debug,packet rcvd control message from 10.0.0.5:1701 to 192.168.10.88:1701
18:59:16 l2tp,debug,packet tunnel-id=1263, session-id=0, ns=4, nr=457
18:59:16 l2tp,debug,packet (M) Message-Type=HELLO
18:59:26 l2tp,debug,packet rcvd control message from 10.0.0.5:1701 to 192.168.10.88:1701
18:59:26 l2tp,debug,packet tunnel-id=1263, session-id=0, ns=4, nr=457
18:59:26 l2tp,debug,packet (M) Message-Type=HELLO
Nothing strange about Mikrotik not hanging up - it simply renegotiates continuation of the IPsec session when it is about to expire. What is strange is that the Windows client starts the renegotiation attempt but so late that the l2tp session times out, so it seems someone at Microsoft did realize that it was a problem and started addressing it but failed to do so efficiently. With Windows updates coming almost every other day, I would expect to see a difference 4 months later but probably no one has reported the issue to Redmond in the meantimeOther Mikrotik router don't hangup
Strange
i have the same problemWhat is your ipsec configuration? Especially proposal part?
Windows require specific algorithms selected for rekey to work properly.
Code: Select all
/ip ipsec peer
add address=0.0.0.0/0 dh-group=modp1024 enc-algorithm=aes-256,aes-192,aes-128,3des exchange-mode=main-l2tp generate-policy=port-override passive=yes \
send-initial-contact=no
Do you want to say it works right now (with the current version of the Windows client) with 6.20 or that you remember it worked back when you were running 6.20 in the past? I mean, unless you confirm that a contemporary Windows client works with 6.20 but doesn't with 6.42.7, the actual reason may be a change on Windows client side.on old firmware aka ~6.20 it works
workaround is to use cisco/fortigate/WinSrv as IPSec/L2TP server or downgrade mikrotik to ~6.20. I don't know exact version where it stops working - probably 6.25-6.30. ofc downgrading mikrotik is v. insecure.Hi guys,
I'm dealing with the same problem here, that the windows client always got disconnected around 7.5 hours (L2TP over IPSec), and it took ~10min for it to recover. From the server side (mikrotik) ipsec debug logs, it shows almost the same as @sindy posted in #18. I'm wondering if anyone here had found a workaround or even a fix already?
Could you tell us how you did this exactly ?As for the workaround, since my application is relatively easy and simple, so at the beginning we just set the server to terminate the connection on every 7hrs (after the tunnel is established), and set the Windows client to automatically re-connect the L2TP/IPSec once again. At least the re-connection takes just seconds instead of the original ~minutes if we leave it there till 7.5hrs.
When I needed to make sure that a VPN type interface stays on and re-connects even if there is a network outage between the client and the server, I had to use a powershell script whose key element was rasdial vpn-interface-name, started at boot and running forever. One thing is L2TP's self-sufficient disconnection after 7.5 hours, another thing is network outages, so even with IKEv2 which seems not to suffer from the same 7.5 hour illness, you need the powershell script if the VPN should recover from the network outages automatically.What about Windows ? How to dial again automatically ?
I'm using Windows 10 and searched about it, but no clue.
/ppp profile set VPN session-timeout=7h
<?xml version="1.0" encoding="UTF-16"?>
<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">
<RegistrationInfo>
<URI>\VPN Reconnect</URI>
</RegistrationInfo>
<Triggers>
<EventTrigger>
<Enabled>true</Enabled>
<Subscription><QueryList><Query Id="0" Path="Application"><Select Path="Application">*[System[Provider[@Name='RasClient'] and EventID=20226]]</Select></Query></QueryList></Subscription>
<Delay>PT1S</Delay>
</EventTrigger>
</Triggers>
<Principals>
<Principal id="Author">
<RunLevel>HighestAvailable</RunLevel>
</Principal>
</Principals>
<Settings>
<MultipleInstancesPolicy>IgnoreNew</MultipleInstancesPolicy>
<DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>
<StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>
<AllowHardTerminate>true</AllowHardTerminate>
<StartWhenAvailable>false</StartWhenAvailable>
<RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>
<IdleSettings>
<StopOnIdleEnd>false</StopOnIdleEnd>
<RestartOnIdle>false</RestartOnIdle>
</IdleSettings>
<AllowStartOnDemand>true</AllowStartOnDemand>
<Enabled>true</Enabled>
<Hidden>false</Hidden>
<RunOnlyIfIdle>false</RunOnlyIfIdle>
<WakeToRun>false</WakeToRun>
<ExecutionTimeLimit>PT72H</ExecutionTimeLimit>
<Priority>7</Priority>
</Settings>
<Actions>
<Exec>
<Command>C:\Windows\System32\rasdial.exe</Command>
<Arguments>VPN-NAME VPN-USER VPN-PASSWORD</Arguments>
</Exec>
</Actions>
</Task>
Hi
I am facing similar issue . my l2tp client get disconnected after every 1 minute 14 sec. I have tried to check keepalive time and session time but could get success. can you guide me what could be the issue .
I get following log on l2tp client
disconnected
initializing
connecting.....
terminationg...---sesion closed
disconnected
....
Hello. Can u tell us about this specific algorithms?What is your ipsec configuration? Especially proposal part?
Windows require specific algorithms selected for rekey to work properly.
Hello. Can u tell us about this specific algorithms? I have same problem and i also try to set lifetime on MT lower than 8 hrs, but i don't get positive result. (after change lifetime on MT, in logs i see that really lifetime value remains the same (8hrs))What is your ipsec configuration? Especially proposal part?
Windows require specific algorithms selected for rekey to work properly.
2020-02-19,06:20:59,Notice,192.168.1.1,user,ipsec,info,ISAKMP-SA deleted 192.168.1.1[500]-192.168.1.3[500] spi:10ad5ea117d92fde:ce8a60fbab317f14 rekey:1
2020-02-19,06:20:59,Notice,192.168.1.1,user,ipsec,purged ISAKMP-SA 192.168.1.1[500]<=>192.168.1.3[500] spi=10ad5ea117d92fde:ce8a60fbab317f14.
2020-02-19,06:20:59,Notice,192.168.1.1,user,ipsec,removing generated policy
2020-02-19,06:20:59,Notice,192.168.1.1,user,ipsec,purged IPsec-SA proto_id=ESP spi=0x6daf242
2020-02-19,06:20:59,Notice,192.168.1.1,user,ipsec,purged IPsec-SA proto_id=ESP spi=0xb6458873
2020-02-19,06:20:59,Notice,192.168.1.1,user,ipsec,info,purging ISAKMP-SA 192.168.1.1[500]<=>192.168.1.3[500] spi=10ad5ea117d92fde:ce8a60fbab317f14.
2020-02-19,06:21:25,Notice,192.168.1.1,user,l2tp,ppp,info,<l2tp-ppp1>: disconnected
2020-02-19,06:21:25,Notice,192.168.1.1,user,l2tp,ppp,info,account,""ppp1 logged out, 24583 45876 46034 822 825"""
2020-02-19,06:21:25,Notice,192.168.1.1,user,l2tp,ppp,debug,<192.168.1.3>: LCP down event in starting state
2020-02-19,06:21:25,Notice,192.168.1.1,user,l2tp,ppp,debug,<192.168.1.3>: LCP lowerdown
2020-02-19,06:21:25,Notice,192.168.1.1,user,l2tp,ppp,info,<l2tp-ppp1>: terminating... - peer is not responding
2020-02-19,06:21:25,Notice,192.168.1.1,user,l2tp,ppp,debug,<192.168.1.3>: MPLSCP close
2020-02-19,06:21:25,Notice,192.168.1.1,user,l2tp,ppp,debug,<192.168.1.3>: IPV6CP close
2020-02-19,06:21:25,Notice,192.168.1.1,user,l2tp,ppp,debug,<192.168.1.3>: IPCP close
2020-02-19,06:21:25,Notice,192.168.1.1,user,l2tp,ppp,debug,<192.168.1.3>: BCP close
2020-02-19,06:21:25,Notice,192.168.1.1,user,l2tp,ppp,debug,<192.168.1.3>: CCP close
2020-02-19,06:21:25,Notice,192.168.1.1,user,l2tp,ppp,debug,<192.168.1.3>: MPLSCP lowerdown
2020-02-19,06:21:25,Notice,192.168.1.1,user,l2tp,ppp,debug,<192.168.1.3>: IPV6CP down event in starting state
2020-02-19,06:21:25,Notice,192.168.1.1,user,l2tp,ppp,debug,<192.168.1.3>: IPV6CP lowerdown
2020-02-19,06:21:25,Notice,192.168.1.1,user,l2tp,ppp,debug,<192.168.1.3>: IPCP closed
2020-02-19,06:21:25,Notice,192.168.1.1,user,l2tp,ppp,debug,<192.168.1.3>: IPCP lowerdown
2020-02-19,06:21:25,Notice,192.168.1.1,user,l2tp,ppp,debug,<192.168.1.3>: BCP down event in starting state
2020-02-19,06:21:25,Notice,192.168.1.1,user,l2tp,ppp,debug,<192.168.1.3>: BCP lowerdown
2020-02-19,06:21:25,Notice,192.168.1.1,user,l2tp,ppp,debug,<192.168.1.3>: CCP lowerdown
2020-02-19,06:21:25,Notice,192.168.1.1,user,l2tp,ppp,debug,<192.168.1.3>: LCP closed
2020-02-19,06:21:25,Notice,192.168.1.1,user,l2tp,ppp,debug,<192.168.1.3>: LCP lowerdown
2020-02-19,06:21:25,Notice,192.168.1.1,user,l2tp,ppp,debug,<192.168.1.3>: LCP missed echo reply
2020-02-19,06:21:24,Notice,192.168.1.1,user,l2tp,ppp,debug,packet, <magic 0x6c2c4102>
2020-02-19,06:21:24,Notice,192.168.1.1,user,l2tp,ppp,debug,packet, <192.168.1.3>: sent LCP EchoReq id=0x4
2020-02-19,06:21:24,Notice,192.168.1.1,user,l2tp,ppp,debug,<192.168.1.3>: LCP missed echo reply
2020-02-19,06:21:23,Notice,192.168.1.1,user,l2tp,ppp,debug,packet, <magic 0x6c2c4102>
2020-02-19,06:21:23,Notice,192.168.1.1,user,l2tp,ppp,debug,packet, <192.168.1.3>: sent LCP EchoReq id=0x3
2020-02-19,06:21:23,Notice,192.168.1.1,user,l2tp,ppp,debug,<192.168.1.3>: LCP missed echo reply
2020-02-19,06:21:22,Notice,192.168.1.1,user,l2tp,ppp,debug,packet, <magic 0x6c2c4102>
2020-02-19,06:21:22,Notice,192.168.1.1,user,l2tp,ppp,debug,packet, <192.168.1.3>: sent LCP EchoReq id=0x2
2020-02-19,06:21:22,Notice,192.168.1.1,user,l2tp,ppp,debug,<192.168.1.3>: LCP missed echo reply
2020-02-19,06:21:21,Notice,192.168.1.1,user,l2tp,ppp,debug,packet, <magic 0x6c2c4102>
2020-02-19,06:21:21,Notice,192.168.1.1,user,l2tp,ppp,debug,packet, <192.168.1.3>: sent LCP EchoReq id=0x1
2020-02-19,06:21:21,Notice,192.168.1.1,user,l2tp,ppp,debug,<192.168.1.3>: LCP missed echo reply
2020-02-19,06:21:20,Notice,192.168.1.1,user,l2tp,ppp,debug,packet, <magic 0x6c2c4102>
2020-02-19,06:21:20,Notice,192.168.1.1,user,l2tp,ppp,debug,packet, <192.168.1.3>: sent LCP EchoReq id=0x0
/ppp profile
add change-tcp-mss=yes comment="DEFAULT PROFILE" dns-server=8.8.8.8 local-address=192.168.2.1 name=l2tp_ipsec only-one=yes remote-address=vpn_pool use-encryption=no
/ppp secret
add comment="remote client 1" name=name1 profile=l2tp_ipsec remote-address=192.168.2.2 service=l2tp
add comment="Office NAS" local-address=192.168.2.1 name=name2 profile=l2tp_ipsec remote-address=192.168.2.2 service=l2tp
/interface l2tp-server server
set authentication=mschap2 default-profile=l2tp_ipsec enabled=yes ipsec-secret=secret max-sessions=30 use-ipsec=required
My suggestion for much more than a workaround is in post #38. Since the writing of that post, the delivery of the routing table to the Windows client via DHCPINFORM has made it at least to the "stable" version, if not to the "long-term" one.Currently looking for a fix or workaround.