IPSec/L2TP vpn connection starts but won't complete
Posted: Tue Sep 04, 2012 4:24 am
I am trying to get a L2TP/IPSEC vpn tunnel up and running between a Windows 7 laptop (client, dynamic public IP) and a RB450g (server, static public IP). I have followed the wiki and the VPN tunnel starts but then fails. In particular, once the laptop initiates the tunnel, I see it appear as a remote peer in IPSEC (so I assume Phase 1 works), but then it gets stuck.
During the connection attempt I see the following in the log:
21:18:19 l2tp,info first L2TP UDP packet received from 184.151.63.211
21:18:45 l2tp,info first L2TP UDP packet received from 184.151.63.211
While the tunnel connection is being attempted, I see a policy, remote peer, etc. Here are some details:
[admin@MikroTik] /ip ipsec> peer print
Flags: X - disabled
0 address=0.0.0.0/0 port=500 auth-method=pre-shared-key secret="12345" generate-policy=yes exchange-mode=main-l2tp
send-initial-contact=yes nat-traversal=no my-id-user-fqdn="" hash-algorithm=sha1 enc-algorithm=3des dh-group=modp1024
lifetime=1d dpd-interval=2m dpd-maximum-failures=5
[admin@MikroTik] /ip ipsec> policy print
Flags: X - disabled, D - dynamic, I - inactive
0 D src-address=192.168.1.157/32 src-port=any dst-address=173.239.164.xx/32 dst-port=any protocol=udp action=encrypt level=require
ipsec-protocols=esp tunnel=no sa-src-address=192.168.1.157 sa-dst-address=173.239.164.xx proposal=default priority=2
[admin@MikroTik] /ip ipsec> remote-peers print
0 local-address=173.239.164.xx remote-address=184.151.63.211 state=established side=responder established=6s
[admin@MikroTik] /ip ipsec> proposal print
Flags: X - disabled, * - default
0 * name="default" auth-algorithms=sha1 enc-algorithms=3des lifetime=30m pfs-group=modp1024
[admin@MikroTik] /ip ipsec> installed-sa print
Flags: A - AH, E - ESP, P - pfs
0 E spi=0xBEF7E4F src-address=184.151.63.211 dst-address=173.239.164.xx auth-algorithm=sha1 enc-algorithm=3des replay=4
state=mature auth-key="10fa676d99e335dfcb1f45a817db1b2863efbf07" enc-key="f7435e12fca33db5834eb514d69f8f81dc22aa2353938f9b"
addtime=sep/03/2012 21:18:19 add-lifetime=48m/1h usetime=sep/03/2012 21:18:19 use-lifetime=0s/0s current-bytes=452
lifebytes=0/0
1 E spi=0xF40C98ED src-address=173.239.164.xx dst-address=184.151.63.211 auth-algorithm=sha1 enc-algorithm=3des replay=4
state=mature auth-key="9ba02fc82b873cf98ccca877c599541eaf9612c4" enc-key="21909e56c1c37d6f354971de379ec4aa670020ba5fa618b0"
add-lifetime=48m/1h use-lifetime=0s/0s lifebytes=0/0
(Not sure if it's an issue, but stats show packets coming in protocol 50/ESP, but none leaving protocol 50/ESP).
Can someone tell me how to make this tunnel work?
Thanks,
Michelle
During the connection attempt I see the following in the log:
21:18:19 l2tp,info first L2TP UDP packet received from 184.151.63.211
21:18:45 l2tp,info first L2TP UDP packet received from 184.151.63.211
While the tunnel connection is being attempted, I see a policy, remote peer, etc. Here are some details:
[admin@MikroTik] /ip ipsec> peer print
Flags: X - disabled
0 address=0.0.0.0/0 port=500 auth-method=pre-shared-key secret="12345" generate-policy=yes exchange-mode=main-l2tp
send-initial-contact=yes nat-traversal=no my-id-user-fqdn="" hash-algorithm=sha1 enc-algorithm=3des dh-group=modp1024
lifetime=1d dpd-interval=2m dpd-maximum-failures=5
[admin@MikroTik] /ip ipsec> policy print
Flags: X - disabled, D - dynamic, I - inactive
0 D src-address=192.168.1.157/32 src-port=any dst-address=173.239.164.xx/32 dst-port=any protocol=udp action=encrypt level=require
ipsec-protocols=esp tunnel=no sa-src-address=192.168.1.157 sa-dst-address=173.239.164.xx proposal=default priority=2
[admin@MikroTik] /ip ipsec> remote-peers print
0 local-address=173.239.164.xx remote-address=184.151.63.211 state=established side=responder established=6s
[admin@MikroTik] /ip ipsec> proposal print
Flags: X - disabled, * - default
0 * name="default" auth-algorithms=sha1 enc-algorithms=3des lifetime=30m pfs-group=modp1024
[admin@MikroTik] /ip ipsec> installed-sa print
Flags: A - AH, E - ESP, P - pfs
0 E spi=0xBEF7E4F src-address=184.151.63.211 dst-address=173.239.164.xx auth-algorithm=sha1 enc-algorithm=3des replay=4
state=mature auth-key="10fa676d99e335dfcb1f45a817db1b2863efbf07" enc-key="f7435e12fca33db5834eb514d69f8f81dc22aa2353938f9b"
addtime=sep/03/2012 21:18:19 add-lifetime=48m/1h usetime=sep/03/2012 21:18:19 use-lifetime=0s/0s current-bytes=452
lifebytes=0/0
1 E spi=0xF40C98ED src-address=173.239.164.xx dst-address=184.151.63.211 auth-algorithm=sha1 enc-algorithm=3des replay=4
state=mature auth-key="9ba02fc82b873cf98ccca877c599541eaf9612c4" enc-key="21909e56c1c37d6f354971de379ec4aa670020ba5fa618b0"
add-lifetime=48m/1h use-lifetime=0s/0s lifebytes=0/0
(Not sure if it's an issue, but stats show packets coming in protocol 50/ESP, but none leaving protocol 50/ESP).
Can someone tell me how to make this tunnel work?
Thanks,
Michelle