Mikrotik IPSec Tunnels not working after RouterOS upgradeOpenSwan IPSec phase #2 complicationspfSense IPsec VPN setup (Log error: racoon: INFO: unsupported PF_KEY message REGISTER)Pfsense 2.02 unstable ipsec vpn.Tunnels will come up upon restarting racconSonicOS Enhanced 5.8.1.2 L2TP VPN Authentication FailedHow can I connect to a Cisco ASA5540 from Windows Server 2012 over IPSEC?Windows 10 built in VPNSite to Site IPSec between pfSense and Cisco ASAConfiguring L2TP/IPSec on Cisco Router 2911L2TP over IPsec VPN between ZyWALL USG 100 and iPhone NO_PROPOSAL_CHOSENHow to configure strongswan peer-to-peer vpn tunnel using public IP as encryption domain?

Why is unzipped directory exactly 4.0K (much smaller than zipped file)?

What could be my risk mitigation strategies if my client wants to contract UAT?

Paired t-test means that the variances of the 2 samples are the same?

Why is the Eisenstein ideal paper so great?

Could a rotating ring space station have a bolo-like extension?

Why does the painters tape have to be blue?

Merge pdfs sequentially

Is it safe to redirect stdout and stderr to the same file without file descriptor copies?

What is Orcus doing with Mind Flayers in the art on the last page of Volo's Guide to Monsters?

Ribbon Cable Cross Talk - Is there a fix after the fact?

EU rights when flight delayed so much that return is missed

Have any humans orbited the Earth in anything other than a prograde orbit?

Split into three!

ifconfig shows UP while ip link shows DOWN

Is superuser the same as root?

Testing using real data of the customer

What is the limit to a Glyph of Warding's trigger?

Piping the output of comand columns

Why was this character made Grand Maester?

How did the Allies achieve air superiority on Sicily?

Are cells guaranteed to get at least one mitochondrion when they divide?

How to teach an undergraduate course without having taken that course formally before?

Can attacking players use activated abilities after blockers have been declared?

Toxic, harassing lab environment



Mikrotik IPSec Tunnels not working after RouterOS upgrade


OpenSwan IPSec phase #2 complicationspfSense IPsec VPN setup (Log error: racoon: INFO: unsupported PF_KEY message REGISTER)Pfsense 2.02 unstable ipsec vpn.Tunnels will come up upon restarting racconSonicOS Enhanced 5.8.1.2 L2TP VPN Authentication FailedHow can I connect to a Cisco ASA5540 from Windows Server 2012 over IPSEC?Windows 10 built in VPNSite to Site IPSec between pfSense and Cisco ASAConfiguring L2TP/IPSec on Cisco Router 2911L2TP over IPsec VPN between ZyWALL USG 100 and iPhone NO_PROPOSAL_CHOSENHow to configure strongswan peer-to-peer vpn tunnel using public IP as encryption domain?






.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty height:90px;width:728px;box-sizing:border-box;








0















We upgraded our RB1100AH2x yesterday from 6.19 to 6.22 and lost our L2TP / IPSec tunnels in the process. The logs are now littered with IPSec errors stating



failed to pre-process ph2 packet.


In the change log for 6.21 I notice that you can no longer employ a blank value for the Policy Group in the Peer policy. We had originally configured our tunnel this way and I suspect that this is the cause of the errors.



Can anyone point me in the right direction on how to resolve this issue?



See relevant config below (note that the first entry in the ipsec peer is note relevant - entry "1" is the one I am most concerned about



/ip ipsec peer> print
Flags: X - disabled, D - dynamic
0 X address=xx.xx.xx.xx/32 local-address=0.0.0.0 passive=no
port=500 auth-method=pre-shared-key secret="redacted"
generate-policy=no policy-template-group=*FFFFFFFF
exchange-mode=main send-initial-contact=yes
nat-traversal=no proposal-check=obey hash-algorithm=md5
enc-algorithm=3des dh-group=modp1024 lifetime=1d
lifebytes=0 dpd-interval=disable-dpd dpd-maximum-failures=1

1 D address=0.0.0.0/0 local-address=0.0.0.0 passive=yes port=500
auth-method=pre-shared-key secret="redacted"
generate-policy=port-strict policy-template-group=default
exchange-mode=main-l2tp send-initial-contact=yes
nat-traversal=yes hash-algorithm=sha1
enc-algorithm=3des,aes-128,aes-192,aes-256
dh-group=modp1024 lifetime=1d dpd-interval=2m
dpd-maximum-failures=5


/ip ipsec proposal> print
Flags: X - disabled, * - default
0 * name="default" auth-algorithms=sha1
enc-algorithms=3des,aes-256-cbc lifetime=30m
pfs-group=modp1024









share|improve this question




























    0















    We upgraded our RB1100AH2x yesterday from 6.19 to 6.22 and lost our L2TP / IPSec tunnels in the process. The logs are now littered with IPSec errors stating



    failed to pre-process ph2 packet.


    In the change log for 6.21 I notice that you can no longer employ a blank value for the Policy Group in the Peer policy. We had originally configured our tunnel this way and I suspect that this is the cause of the errors.



    Can anyone point me in the right direction on how to resolve this issue?



    See relevant config below (note that the first entry in the ipsec peer is note relevant - entry "1" is the one I am most concerned about



    /ip ipsec peer> print
    Flags: X - disabled, D - dynamic
    0 X address=xx.xx.xx.xx/32 local-address=0.0.0.0 passive=no
    port=500 auth-method=pre-shared-key secret="redacted"
    generate-policy=no policy-template-group=*FFFFFFFF
    exchange-mode=main send-initial-contact=yes
    nat-traversal=no proposal-check=obey hash-algorithm=md5
    enc-algorithm=3des dh-group=modp1024 lifetime=1d
    lifebytes=0 dpd-interval=disable-dpd dpd-maximum-failures=1

    1 D address=0.0.0.0/0 local-address=0.0.0.0 passive=yes port=500
    auth-method=pre-shared-key secret="redacted"
    generate-policy=port-strict policy-template-group=default
    exchange-mode=main-l2tp send-initial-contact=yes
    nat-traversal=yes hash-algorithm=sha1
    enc-algorithm=3des,aes-128,aes-192,aes-256
    dh-group=modp1024 lifetime=1d dpd-interval=2m
    dpd-maximum-failures=5


    /ip ipsec proposal> print
    Flags: X - disabled, * - default
    0 * name="default" auth-algorithms=sha1
    enc-algorithms=3des,aes-256-cbc lifetime=30m
    pfs-group=modp1024









    share|improve this question
























      0












      0








      0








      We upgraded our RB1100AH2x yesterday from 6.19 to 6.22 and lost our L2TP / IPSec tunnels in the process. The logs are now littered with IPSec errors stating



      failed to pre-process ph2 packet.


      In the change log for 6.21 I notice that you can no longer employ a blank value for the Policy Group in the Peer policy. We had originally configured our tunnel this way and I suspect that this is the cause of the errors.



      Can anyone point me in the right direction on how to resolve this issue?



      See relevant config below (note that the first entry in the ipsec peer is note relevant - entry "1" is the one I am most concerned about



      /ip ipsec peer> print
      Flags: X - disabled, D - dynamic
      0 X address=xx.xx.xx.xx/32 local-address=0.0.0.0 passive=no
      port=500 auth-method=pre-shared-key secret="redacted"
      generate-policy=no policy-template-group=*FFFFFFFF
      exchange-mode=main send-initial-contact=yes
      nat-traversal=no proposal-check=obey hash-algorithm=md5
      enc-algorithm=3des dh-group=modp1024 lifetime=1d
      lifebytes=0 dpd-interval=disable-dpd dpd-maximum-failures=1

      1 D address=0.0.0.0/0 local-address=0.0.0.0 passive=yes port=500
      auth-method=pre-shared-key secret="redacted"
      generate-policy=port-strict policy-template-group=default
      exchange-mode=main-l2tp send-initial-contact=yes
      nat-traversal=yes hash-algorithm=sha1
      enc-algorithm=3des,aes-128,aes-192,aes-256
      dh-group=modp1024 lifetime=1d dpd-interval=2m
      dpd-maximum-failures=5


      /ip ipsec proposal> print
      Flags: X - disabled, * - default
      0 * name="default" auth-algorithms=sha1
      enc-algorithms=3des,aes-256-cbc lifetime=30m
      pfs-group=modp1024









      share|improve this question














      We upgraded our RB1100AH2x yesterday from 6.19 to 6.22 and lost our L2TP / IPSec tunnels in the process. The logs are now littered with IPSec errors stating



      failed to pre-process ph2 packet.


      In the change log for 6.21 I notice that you can no longer employ a blank value for the Policy Group in the Peer policy. We had originally configured our tunnel this way and I suspect that this is the cause of the errors.



      Can anyone point me in the right direction on how to resolve this issue?



      See relevant config below (note that the first entry in the ipsec peer is note relevant - entry "1" is the one I am most concerned about



      /ip ipsec peer> print
      Flags: X - disabled, D - dynamic
      0 X address=xx.xx.xx.xx/32 local-address=0.0.0.0 passive=no
      port=500 auth-method=pre-shared-key secret="redacted"
      generate-policy=no policy-template-group=*FFFFFFFF
      exchange-mode=main send-initial-contact=yes
      nat-traversal=no proposal-check=obey hash-algorithm=md5
      enc-algorithm=3des dh-group=modp1024 lifetime=1d
      lifebytes=0 dpd-interval=disable-dpd dpd-maximum-failures=1

      1 D address=0.0.0.0/0 local-address=0.0.0.0 passive=yes port=500
      auth-method=pre-shared-key secret="redacted"
      generate-policy=port-strict policy-template-group=default
      exchange-mode=main-l2tp send-initial-contact=yes
      nat-traversal=yes hash-algorithm=sha1
      enc-algorithm=3des,aes-128,aes-192,aes-256
      dh-group=modp1024 lifetime=1d dpd-interval=2m
      dpd-maximum-failures=5


      /ip ipsec proposal> print
      Flags: X - disabled, * - default
      0 * name="default" auth-algorithms=sha1
      enc-algorithms=3des,aes-256-cbc lifetime=30m
      pfs-group=modp1024






      ipsec l2tp mikrotik routeros






      share|improve this question













      share|improve this question











      share|improve this question




      share|improve this question










      asked Nov 23 '14 at 16:01









      DKNUCKLESDKNUCKLES

      3,42333858




      3,42333858




















          1 Answer
          1






          active

          oldest

          votes


















          0














          You have to delete the group, which is in the IP/ipsec groups.



          Then it will say unknown in the peer tab. After that, it should work.






          share|improve this answer

























            Your Answer








            StackExchange.ready(function()
            var channelOptions =
            tags: "".split(" "),
            id: "2"
            ;
            initTagRenderer("".split(" "), "".split(" "), channelOptions);

            StackExchange.using("externalEditor", function()
            // Have to fire editor after snippets, if snippets enabled
            if (StackExchange.settings.snippets.snippetsEnabled)
            StackExchange.using("snippets", function()
            createEditor();
            );

            else
            createEditor();

            );

            function createEditor()
            StackExchange.prepareEditor(
            heartbeatType: 'answer',
            autoActivateHeartbeat: false,
            convertImagesToLinks: true,
            noModals: true,
            showLowRepImageUploadWarning: true,
            reputationToPostImages: 10,
            bindNavPrevention: true,
            postfix: "",
            imageUploader:
            brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
            contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
            allowUrls: true
            ,
            onDemand: true,
            discardSelector: ".discard-answer"
            ,immediatelyShowMarkdownHelp:true
            );



            );













            draft saved

            draft discarded


















            StackExchange.ready(
            function ()
            StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fserverfault.com%2fquestions%2f646466%2fmikrotik-ipsec-tunnels-not-working-after-routeros-upgrade%23new-answer', 'question_page');

            );

            Post as a guest















            Required, but never shown

























            1 Answer
            1






            active

            oldest

            votes








            1 Answer
            1






            active

            oldest

            votes









            active

            oldest

            votes






            active

            oldest

            votes









            0














            You have to delete the group, which is in the IP/ipsec groups.



            Then it will say unknown in the peer tab. After that, it should work.






            share|improve this answer





























              0














              You have to delete the group, which is in the IP/ipsec groups.



              Then it will say unknown in the peer tab. After that, it should work.






              share|improve this answer



























                0












                0








                0







                You have to delete the group, which is in the IP/ipsec groups.



                Then it will say unknown in the peer tab. After that, it should work.






                share|improve this answer















                You have to delete the group, which is in the IP/ipsec groups.



                Then it will say unknown in the peer tab. After that, it should work.







                share|improve this answer














                share|improve this answer



                share|improve this answer








                edited May 9 '15 at 8:08









                peterh

                4,41492442




                4,41492442










                answered May 9 '15 at 3:42









                RobRob

                1




                1



























                    draft saved

                    draft discarded
















































                    Thanks for contributing an answer to Server Fault!


                    • Please be sure to answer the question. Provide details and share your research!

                    But avoid


                    • Asking for help, clarification, or responding to other answers.

                    • Making statements based on opinion; back them up with references or personal experience.

                    To learn more, see our tips on writing great answers.




                    draft saved


                    draft discarded














                    StackExchange.ready(
                    function ()
                    StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fserverfault.com%2fquestions%2f646466%2fmikrotik-ipsec-tunnels-not-working-after-routeros-upgrade%23new-answer', 'question_page');

                    );

                    Post as a guest















                    Required, but never shown





















































                    Required, but never shown














                    Required, but never shown












                    Required, but never shown







                    Required, but never shown

































                    Required, but never shown














                    Required, but never shown












                    Required, but never shown







                    Required, but never shown







                    Popular posts from this blog

                    Wikipedia:Vital articles Мазмуну Biography - Өмүр баян Philosophy and psychology - Философия жана психология Religion - Дин Social sciences - Коомдук илимдер Language and literature - Тил жана адабият Science - Илим Technology - Технология Arts and recreation - Искусство жана эс алуу History and geography - Тарых жана география Навигация менюсу

                    Bruxelas-Capital Índice Historia | Composición | Situación lingüística | Clima | Cidades irmandadas | Notas | Véxase tamén | Menú de navegacióneO uso das linguas en Bruxelas e a situación do neerlandés"Rexión de Bruxelas Capital"o orixinalSitio da rexiónPáxina de Bruselas no sitio da Oficina de Promoción Turística de Valonia e BruxelasMapa Interactivo da Rexión de Bruxelas-CapitaleeWorldCat332144929079854441105155190212ID28008674080552-90000 0001 0666 3698n94104302ID540940339365017018237

                    What should I write in an apology letter, since I have decided not to join a company after accepting an offer letterShould I keep looking after accepting a job offer?What should I do when I've been verbally told I would get an offer letter, but still haven't gotten one after 4 weeks?Do I accept an offer from a company that I am not likely to join?New job hasn't confirmed starting date and I want to give current employer as much notice as possibleHow should I address my manager in my resignation letter?HR delayed background verification, now jobless as resignedNo email communication after accepting a formal written offer. How should I phrase the call?What should I do if after receiving a verbal offer letter I am informed that my written job offer is put on hold due to some internal issues?Should I inform the current employer that I am about to resign within 1-2 weeks since I have signed the offer letter and waiting for visa?What company will do, if I send their offer letter to another company