Mikrotik IPSec Tunnels not working after RouterOS upgradeOpenSwan IPSec phase #2 complicationspfSense IPsec VPN setup (Log error: racoon: INFO: unsupported PF_KEY message REGISTER)Pfsense 2.02 unstable ipsec vpn.Tunnels will come up upon restarting racconSonicOS Enhanced 5.8.1.2 L2TP VPN Authentication FailedHow can I connect to a Cisco ASA5540 from Windows Server 2012 over IPSEC?Windows 10 built in VPNSite to Site IPSec between pfSense and Cisco ASAConfiguring L2TP/IPSec on Cisco Router 2911L2TP over IPsec VPN between ZyWALL USG 100 and iPhone NO_PROPOSAL_CHOSENHow to configure strongswan peer-to-peer vpn tunnel using public IP as encryption domain?

Why is unzipped directory exactly 4.0K (much smaller than zipped file)?

What could be my risk mitigation strategies if my client wants to contract UAT?

Paired t-test means that the variances of the 2 samples are the same?

Why is the Eisenstein ideal paper so great?

Could a rotating ring space station have a bolo-like extension?

Why does the painters tape have to be blue?

Merge pdfs sequentially

Is it safe to redirect stdout and stderr to the same file without file descriptor copies?

What is Orcus doing with Mind Flayers in the art on the last page of Volo's Guide to Monsters?

Ribbon Cable Cross Talk - Is there a fix after the fact?

EU rights when flight delayed so much that return is missed

Have any humans orbited the Earth in anything other than a prograde orbit?

Split into three!

ifconfig shows UP while ip link shows DOWN

Is superuser the same as root?

Testing using real data of the customer

What is the limit to a Glyph of Warding's trigger?

Piping the output of comand columns

Why was this character made Grand Maester?

How did the Allies achieve air superiority on Sicily?

Are cells guaranteed to get at least one mitochondrion when they divide?

How to teach an undergraduate course without having taken that course formally before?

Can attacking players use activated abilities after blockers have been declared?

Toxic, harassing lab environment



Mikrotik IPSec Tunnels not working after RouterOS upgrade


OpenSwan IPSec phase #2 complicationspfSense IPsec VPN setup (Log error: racoon: INFO: unsupported PF_KEY message REGISTER)Pfsense 2.02 unstable ipsec vpn.Tunnels will come up upon restarting racconSonicOS Enhanced 5.8.1.2 L2TP VPN Authentication FailedHow can I connect to a Cisco ASA5540 from Windows Server 2012 over IPSEC?Windows 10 built in VPNSite to Site IPSec between pfSense and Cisco ASAConfiguring L2TP/IPSec on Cisco Router 2911L2TP over IPsec VPN between ZyWALL USG 100 and iPhone NO_PROPOSAL_CHOSENHow to configure strongswan peer-to-peer vpn tunnel using public IP as encryption domain?






.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty height:90px;width:728px;box-sizing:border-box;








0















We upgraded our RB1100AH2x yesterday from 6.19 to 6.22 and lost our L2TP / IPSec tunnels in the process. The logs are now littered with IPSec errors stating



failed to pre-process ph2 packet.


In the change log for 6.21 I notice that you can no longer employ a blank value for the Policy Group in the Peer policy. We had originally configured our tunnel this way and I suspect that this is the cause of the errors.



Can anyone point me in the right direction on how to resolve this issue?



See relevant config below (note that the first entry in the ipsec peer is note relevant - entry "1" is the one I am most concerned about



/ip ipsec peer> print
Flags: X - disabled, D - dynamic
0 X address=xx.xx.xx.xx/32 local-address=0.0.0.0 passive=no
port=500 auth-method=pre-shared-key secret="redacted"
generate-policy=no policy-template-group=*FFFFFFFF
exchange-mode=main send-initial-contact=yes
nat-traversal=no proposal-check=obey hash-algorithm=md5
enc-algorithm=3des dh-group=modp1024 lifetime=1d
lifebytes=0 dpd-interval=disable-dpd dpd-maximum-failures=1

1 D address=0.0.0.0/0 local-address=0.0.0.0 passive=yes port=500
auth-method=pre-shared-key secret="redacted"
generate-policy=port-strict policy-template-group=default
exchange-mode=main-l2tp send-initial-contact=yes
nat-traversal=yes hash-algorithm=sha1
enc-algorithm=3des,aes-128,aes-192,aes-256
dh-group=modp1024 lifetime=1d dpd-interval=2m
dpd-maximum-failures=5


/ip ipsec proposal> print
Flags: X - disabled, * - default
0 * name="default" auth-algorithms=sha1
enc-algorithms=3des,aes-256-cbc lifetime=30m
pfs-group=modp1024









share|improve this question




























    0















    We upgraded our RB1100AH2x yesterday from 6.19 to 6.22 and lost our L2TP / IPSec tunnels in the process. The logs are now littered with IPSec errors stating



    failed to pre-process ph2 packet.


    In the change log for 6.21 I notice that you can no longer employ a blank value for the Policy Group in the Peer policy. We had originally configured our tunnel this way and I suspect that this is the cause of the errors.



    Can anyone point me in the right direction on how to resolve this issue?



    See relevant config below (note that the first entry in the ipsec peer is note relevant - entry "1" is the one I am most concerned about



    /ip ipsec peer> print
    Flags: X - disabled, D - dynamic
    0 X address=xx.xx.xx.xx/32 local-address=0.0.0.0 passive=no
    port=500 auth-method=pre-shared-key secret="redacted"
    generate-policy=no policy-template-group=*FFFFFFFF
    exchange-mode=main send-initial-contact=yes
    nat-traversal=no proposal-check=obey hash-algorithm=md5
    enc-algorithm=3des dh-group=modp1024 lifetime=1d
    lifebytes=0 dpd-interval=disable-dpd dpd-maximum-failures=1

    1 D address=0.0.0.0/0 local-address=0.0.0.0 passive=yes port=500
    auth-method=pre-shared-key secret="redacted"
    generate-policy=port-strict policy-template-group=default
    exchange-mode=main-l2tp send-initial-contact=yes
    nat-traversal=yes hash-algorithm=sha1
    enc-algorithm=3des,aes-128,aes-192,aes-256
    dh-group=modp1024 lifetime=1d dpd-interval=2m
    dpd-maximum-failures=5


    /ip ipsec proposal> print
    Flags: X - disabled, * - default
    0 * name="default" auth-algorithms=sha1
    enc-algorithms=3des,aes-256-cbc lifetime=30m
    pfs-group=modp1024









    share|improve this question
























      0












      0








      0








      We upgraded our RB1100AH2x yesterday from 6.19 to 6.22 and lost our L2TP / IPSec tunnels in the process. The logs are now littered with IPSec errors stating



      failed to pre-process ph2 packet.


      In the change log for 6.21 I notice that you can no longer employ a blank value for the Policy Group in the Peer policy. We had originally configured our tunnel this way and I suspect that this is the cause of the errors.



      Can anyone point me in the right direction on how to resolve this issue?



      See relevant config below (note that the first entry in the ipsec peer is note relevant - entry "1" is the one I am most concerned about



      /ip ipsec peer> print
      Flags: X - disabled, D - dynamic
      0 X address=xx.xx.xx.xx/32 local-address=0.0.0.0 passive=no
      port=500 auth-method=pre-shared-key secret="redacted"
      generate-policy=no policy-template-group=*FFFFFFFF
      exchange-mode=main send-initial-contact=yes
      nat-traversal=no proposal-check=obey hash-algorithm=md5
      enc-algorithm=3des dh-group=modp1024 lifetime=1d
      lifebytes=0 dpd-interval=disable-dpd dpd-maximum-failures=1

      1 D address=0.0.0.0/0 local-address=0.0.0.0 passive=yes port=500
      auth-method=pre-shared-key secret="redacted"
      generate-policy=port-strict policy-template-group=default
      exchange-mode=main-l2tp send-initial-contact=yes
      nat-traversal=yes hash-algorithm=sha1
      enc-algorithm=3des,aes-128,aes-192,aes-256
      dh-group=modp1024 lifetime=1d dpd-interval=2m
      dpd-maximum-failures=5


      /ip ipsec proposal> print
      Flags: X - disabled, * - default
      0 * name="default" auth-algorithms=sha1
      enc-algorithms=3des,aes-256-cbc lifetime=30m
      pfs-group=modp1024









      share|improve this question














      We upgraded our RB1100AH2x yesterday from 6.19 to 6.22 and lost our L2TP / IPSec tunnels in the process. The logs are now littered with IPSec errors stating



      failed to pre-process ph2 packet.


      In the change log for 6.21 I notice that you can no longer employ a blank value for the Policy Group in the Peer policy. We had originally configured our tunnel this way and I suspect that this is the cause of the errors.



      Can anyone point me in the right direction on how to resolve this issue?



      See relevant config below (note that the first entry in the ipsec peer is note relevant - entry "1" is the one I am most concerned about



      /ip ipsec peer> print
      Flags: X - disabled, D - dynamic
      0 X address=xx.xx.xx.xx/32 local-address=0.0.0.0 passive=no
      port=500 auth-method=pre-shared-key secret="redacted"
      generate-policy=no policy-template-group=*FFFFFFFF
      exchange-mode=main send-initial-contact=yes
      nat-traversal=no proposal-check=obey hash-algorithm=md5
      enc-algorithm=3des dh-group=modp1024 lifetime=1d
      lifebytes=0 dpd-interval=disable-dpd dpd-maximum-failures=1

      1 D address=0.0.0.0/0 local-address=0.0.0.0 passive=yes port=500
      auth-method=pre-shared-key secret="redacted"
      generate-policy=port-strict policy-template-group=default
      exchange-mode=main-l2tp send-initial-contact=yes
      nat-traversal=yes hash-algorithm=sha1
      enc-algorithm=3des,aes-128,aes-192,aes-256
      dh-group=modp1024 lifetime=1d dpd-interval=2m
      dpd-maximum-failures=5


      /ip ipsec proposal> print
      Flags: X - disabled, * - default
      0 * name="default" auth-algorithms=sha1
      enc-algorithms=3des,aes-256-cbc lifetime=30m
      pfs-group=modp1024






      ipsec l2tp mikrotik routeros






      share|improve this question













      share|improve this question











      share|improve this question




      share|improve this question










      asked Nov 23 '14 at 16:01









      DKNUCKLESDKNUCKLES

      3,42333858




      3,42333858




















          1 Answer
          1






          active

          oldest

          votes


















          0














          You have to delete the group, which is in the IP/ipsec groups.



          Then it will say unknown in the peer tab. After that, it should work.






          share|improve this answer

























            Your Answer








            StackExchange.ready(function()
            var channelOptions =
            tags: "".split(" "),
            id: "2"
            ;
            initTagRenderer("".split(" "), "".split(" "), channelOptions);

            StackExchange.using("externalEditor", function()
            // Have to fire editor after snippets, if snippets enabled
            if (StackExchange.settings.snippets.snippetsEnabled)
            StackExchange.using("snippets", function()
            createEditor();
            );

            else
            createEditor();

            );

            function createEditor()
            StackExchange.prepareEditor(
            heartbeatType: 'answer',
            autoActivateHeartbeat: false,
            convertImagesToLinks: true,
            noModals: true,
            showLowRepImageUploadWarning: true,
            reputationToPostImages: 10,
            bindNavPrevention: true,
            postfix: "",
            imageUploader:
            brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
            contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
            allowUrls: true
            ,
            onDemand: true,
            discardSelector: ".discard-answer"
            ,immediatelyShowMarkdownHelp:true
            );



            );













            draft saved

            draft discarded


















            StackExchange.ready(
            function ()
            StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fserverfault.com%2fquestions%2f646466%2fmikrotik-ipsec-tunnels-not-working-after-routeros-upgrade%23new-answer', 'question_page');

            );

            Post as a guest















            Required, but never shown

























            1 Answer
            1






            active

            oldest

            votes








            1 Answer
            1






            active

            oldest

            votes









            active

            oldest

            votes






            active

            oldest

            votes









            0














            You have to delete the group, which is in the IP/ipsec groups.



            Then it will say unknown in the peer tab. After that, it should work.






            share|improve this answer





























              0














              You have to delete the group, which is in the IP/ipsec groups.



              Then it will say unknown in the peer tab. After that, it should work.






              share|improve this answer



























                0












                0








                0







                You have to delete the group, which is in the IP/ipsec groups.



                Then it will say unknown in the peer tab. After that, it should work.






                share|improve this answer















                You have to delete the group, which is in the IP/ipsec groups.



                Then it will say unknown in the peer tab. After that, it should work.







                share|improve this answer














                share|improve this answer



                share|improve this answer








                edited May 9 '15 at 8:08









                peterh

                4,41492442




                4,41492442










                answered May 9 '15 at 3:42









                RobRob

                1




                1



























                    draft saved

                    draft discarded
















































                    Thanks for contributing an answer to Server Fault!


                    • Please be sure to answer the question. Provide details and share your research!

                    But avoid


                    • Asking for help, clarification, or responding to other answers.

                    • Making statements based on opinion; back them up with references or personal experience.

                    To learn more, see our tips on writing great answers.




                    draft saved


                    draft discarded














                    StackExchange.ready(
                    function ()
                    StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fserverfault.com%2fquestions%2f646466%2fmikrotik-ipsec-tunnels-not-working-after-routeros-upgrade%23new-answer', 'question_page');

                    );

                    Post as a guest















                    Required, but never shown





















































                    Required, but never shown














                    Required, but never shown












                    Required, but never shown







                    Required, but never shown

































                    Required, but never shown














                    Required, but never shown












                    Required, but never shown







                    Required, but never shown







                    Popular posts from this blog

                    RemoteApp sporadic failureWindows 2008 RemoteAPP client disconnects within a matter of minutesWhat is the minimum version of RDP supported by Server 2012 RDS?How to configure a Remoteapp server to increase stabilityMicrosoft RemoteApp Active SessionRDWeb TS connection broken for some users post RemoteApp certificate changeRemote Desktop Licensing, RemoteAPPRDS 2012 R2 some users are not able to logon after changed date and time on Connection BrokersWhat happens during Remote Desktop logon, and is there any logging?After installing RDS on WinServer 2016 I still can only connect with two users?RD Connection via RDGW to Session host is not connecting

                    How to write a 12-bar blues melodyI-IV-V blues progressionHow to play the bridges in a standard blues progressionHow does Gdim7 fit in C# minor?question on a certain chord progressionMusicology of Melody12 bar blues, spread rhythm: alternative to 6th chord to avoid finger stretchChord progressions/ Root key/ MelodiesHow to put chords (POP-EDM) under a given lead vocal melody (starting from a good knowledge in music theory)Are there “rules” for improvising with the minor pentatonic scale over 12-bar shuffle?Confusion about blues scale and chords

                    Esgonzo ibérico Índice Descrición Distribución Hábitat Ameazas Notas Véxase tamén "Acerca dos nomes dos anfibios e réptiles galegos""Chalcides bedriagai"Chalcides bedriagai en Carrascal, L. M. Salvador, A. (Eds). Enciclopedia virtual de los vertebrados españoles. Museo Nacional de Ciencias Naturales, Madrid. España.Fotos