I'm following your http://wiki.mikrotik.com/wiki/Manual:In ... pSec_setup tutorial, however I'm getting stuck on error. I followed exactly steps as showed on that example. Any clues???
I started receiving:
Code: Select all
16:25:29 ipsec,error failed to pre-process ph2 packet.
Code: Select all
16:33:07 ipsec,debug,packet 80050001 03000018 05030000 80010001 80020e10 80040002 80050002 00000018
16:33:07 ipsec,debug,packet 06030000 80010001 80020e10 80040002 80050001
16:33:07 ipsec,debug,packet begin.
16:33:07 ipsec,debug,packet seen nptype=2(prop)
16:33:07 ipsec,debug,packet succeed.
16:33:07 ipsec,debug,packet proposal #1 len=172
16:33:07 ipsec,debug,packet begin.
16:33:07 ipsec,debug,packet seen nptype=3(trns)
16:33:07 ipsec,debug,packet seen nptype=3(trns)
16:33:07 ipsec,debug,packet seen nptype=3(trns)
16:33:07 ipsec,debug,packet seen nptype=3(trns)
16:33:07 ipsec,debug,packet seen nptype=3(trns)
16:33:07 ipsec,debug,packet seen nptype=3(trns)
16:33:07 ipsec,debug,packet succeed.
16:33:07 ipsec,debug,packet transform #1 len=28
16:33:07 ipsec,debug,packet type=SA Life Type, flag=0x8000, lorv=seconds
16:33:07 ipsec,debug,packet type=SA Life Duration, flag=0x8000, lorv=3600
16:33:07 ipsec,debug,packet life duration was in TLV.
16:33:07 ipsec,debug,packet type=Encryption Mode, flag=0x8000, lorv=Transport
16:33:07 ipsec,debug,packet type=Key Length, flag=0x8000, lorv=256
16:33:07 ipsec,debug,packet type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
16:33:07 ipsec,debug,packet transform #2 len=28
16:33:07 ipsec,debug,packet type=SA Life Type, flag=0x8000, lorv=seconds
16:33:07 ipsec,debug,packet type=SA Life Duration, flag=0x8000, lorv=3600
16:33:07 ipsec,debug,packet life duration was in TLV.
16:33:07 ipsec,debug,packet type=Encryption Mode, flag=0x8000, lorv=Transport
16:33:07 ipsec,debug,packet type=Key Length, flag=0x8000, lorv=256
16:33:07 ipsec,debug,packet type=Authentication Algorithm, flag=0x8000, lorv=hmac-md5
16:33:07 ipsec,debug,packet transform #3 len=28
16:33:07 ipsec,debug,packet type=SA Life Type, flag=0x8000, lorv=seconds
16:33:07 ipsec,debug,packet type=SA Life Duration, flag=0x8000, lorv=3600
16:33:07 ipsec,debug,packet life duration was in TLV.
16:33:07 ipsec,debug,packet type=Encryption Mode, flag=0x8000, lorv=Transport
16:33:07 ipsec,debug,packet type=Key Length, flag=0x8000, lorv=128
16:33:07 ipsec,debug,packet type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
16:33:07 ipsec,debug,packet transform #4 len=28
16:33:07 ipsec,debug,packet type=SA Life Type, flag=0x8000, lorv=seconds
16:33:07 ipsec,debug,packet type=SA Life Duration, flag=0x8000, lorv=3600
16:33:07 ipsec,debug,packet life duration was in TLV.
16:33:07 ipsec,debug,packet type=Encryption Mode, flag=0x8000, lorv=Transport
16:33:07 ipsec,debug,packet type=Key Length, flag=0x8000, lorv=128
16:33:07 ipsec,debug,packet type=Authentication Algorithm, flag=0x8000, lorv=hmac-md5
16:33:07 ipsec,debug,packet transform #5 len=24
16:33:07 ipsec,debug,packet type=SA Life Type, flag=0x8000, lorv=seconds
16:33:07 ipsec,debug,packet type=SA Life Duration, flag=0x8000, lorv=3600
16:33:07 ipsec,debug,packet life duration was in TLV.
16:33:07 ipsec,debug,packet type=Encryption Mode, flag=0x8000, lorv=Transport
16:33:07 ipsec,debug,packet type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
16:33:07 ipsec,debug,packet transform #6 len=24
16:33:07 ipsec,debug,packet type=SA Life Type, flag=0x8000, lorv=seconds
16:33:07 ipsec,debug,packet type=SA Life Duration, flag=0x8000, lorv=3600
16:33:07 ipsec,debug,packet life duration was in TLV.
16:33:07 ipsec,debug,packet type=Encryption Mode, flag=0x8000, lorv=Transport
16:33:07 ipsec,debug,packet type=Authentication Algorithm, flag=0x8000, lorv=hmac-md5
16:33:07 ipsec,debug,packet pair 1:
16:33:07 ipsec,debug,packet 0x479ee8: next=(nil) tnext=0x47a670
16:33:07 ipsec,debug,packet 0x47a670: next=(nil) tnext=0x47a688
16:33:07 ipsec,debug,packet 0x47a688: next=(nil) tnext=0x47c268
16:33:07 ipsec,debug,packet 0x47c268: next=(nil) tnext=0x47c280
16:33:07 ipsec,debug,packet 0x47c280: next=(nil) tnext=0x47c298
16:33:07 ipsec,debug,packet 0x47c298: next=(nil) tnext=(nil)
16:33:07 ipsec,debug,packet proposal #1: 6 transform
16:33:07 ipsec,debug no policy template matching!
16:33:07 ipsec,error failed to pre-process ph2 packet.
Code: Select all
[admin@trunetroutersp01] > /interface l2tp-server server print
enabled: yes
max-mtu: 1450
max-mru: 1450
mrru: disabled
authentication: pap,chap,mschap1,mschap2
keepalive-timeout: 30
default-profile: default-vpn
use-ipsec: yes
ipsec-secret: ***MASKED***
Code: Select all
[admin@trunetroutersp01] > /ip ipsec peer print
Flags: X - disabled, D - dynamic
0 D address=0.0.0.0/0 local-address=0.0.0.0 passive=yes port=500 auth-method=pre-shared-key secret="***MASKED***" generate-policy=port-strict policy-group=default exchange-mode=main-l2tp send-initial-contact=yes nat-traversal=yes hash-algorithm=sha1 enc-algorithm=3des,aes-128,aes-192,aes-256 dh-group=modp1024 lifetime=1d dpd-interval=2m dpd-maximum-failures=5