Не работает L2TP-подключение

Обсуждение ПО и его настройки
Ответить
vkapas
Сообщения: 1
Зарегистрирован: 15 авг 2022, 18:25

Есть Микротик на стандартной конфигурации, немного изменённой под свои нужны с настроенным L2TP-сервером (по популярной инструкции).

Я настраивал с десяток подобных и только здесь столкнулся с проблемой подключения, которую не могу побороть. При попытке подключиться к VPN с любой машины (Windows, Linux, Android из разных сетей) на этапе авторизации в логе появляется
May/25/2024 16:52:32 l2tp,ppp,debug l2tp: <10.11.12.13>: LCP lowerdown
May/25/2024 16:52:32 l2tp,ppp,debug l2tp: <10.11.12.13>: LCP closed
May/25/2024 16:52:32 l2tp,ppp,debug l2tp: <10.11.12.13>: CCP close
May/25/2024 16:52:32 l2tp,ppp,debug l2tp: <10.11.12.13>: BCP close
May/25/2024 16:52:32 l2tp,ppp,debug l2tp: <10.11.12.13>: IPCP close
May/25/2024 16:52:32 l2tp,ppp,debug l2tp: <10.11.12.13>: IPV6CP close
May/25/2024 16:52:32 l2tp,ppp,debug l2tp: <10.11.12.13>: MPLSCP close
May/25/2024 16:52:32 l2tp,ppp,debug l2tp: <10.11.12.13>: LCP lowerdown
May/25/2024 16:52:32 l2tp,ppp,debug l2tp: <10.11.12.13>: LCP down event in starting state
После чего происходит обрыв подключения. В Windows это выглядит как ошибка 718, в Ubuntu и Android — «unsuccessful connection» или «attempt connection timed out» без подробностей.

Экспериментировал с MTU, настройками шифрования, длительностью таймаута, отключал IPsec, пересоздавал конфигурацию IPsec-L2TP — всё бестолку.

Подскажите, пожалуйста, в чём может быть проблема.

Полный лог подключения:

Код: Выделить всё

May/25/2024 22:01:39 ipsec,debug ipsec: proposal #0: 3 transform
May/25/2024 22:01:39 l2tp,debug,packet l2tp: rcvd control message from 55.66.77.88:43384 to 11.22.33.44:1701
May/25/2024 22:01:39 l2tp,debug,packet l2tp:     tunnel-id=3, session-id=1, ns=3, nr=2
May/25/2024 22:01:39 l2tp,debug,packet l2tp:     (M) Message-Type=ICCN
May/25/2024 22:01:39 l2tp,debug,packet l2tp:     (M) Tx-Connect-Speed-BPS=100000000
May/25/2024 22:01:39 l2tp,debug,packet l2tp:     (M) Framing-Type=0x1
May/25/2024 22:01:39 l2tp,debug,packet l2tp:     Rx-Connect-Speed=100000000
May/25/2024 22:01:39 l2tp,debug l2tp: session 1 entering state: established
May/25/2024 22:01:39 l2tp,debug,packet l2tp: sent control message (ack) to 55.66.77.88:43384 from 11.22.33.44:1701
May/25/2024 22:01:39 l2tp,debug,packet l2tp:     tunnel-id=42941, session-id=0, ns=2, nr=4
May/25/2024 22:01:39 ipsec,debug ipsec: got the local address from ID payload 11.22.33.44[1701] prefixlen=32 ul_proto=17
May/25/2024 22:01:39 ipsec,debug ipsec: got the peer address from ID payload 192.168.88.155[0] prefixlen=32 ul_proto=255
May/25/2024 22:01:39 ipsec,debug ipsec: updating policy address because of NAT in transport mode
May/25/2024 22:01:39 ipsec,debug ipsec: new peer address 55.66.77.88[0]
May/25/2024 22:01:39 ipsec ipsec: searching for policy for selector: 11.22.33.44:1701 <=> 55.66.77.88
May/25/2024 22:01:39 ipsec ipsec: generating policy
May/25/2024 22:01:39 ipsec,debug ipsec:  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=UDP-Transport reqid=6:6)
May/25/2024 22:01:39 ipsec,debug ipsec:   (trns_id=AES-CBC encklen=256 authtype=hmac-sha1)
May/25/2024 22:01:39 ipsec,debug ipsec:   (trns_id=AES-CTR encklen=256 authtype=hmac-sha1)
May/25/2024 22:01:39 ipsec,debug ipsec:   (trns_id=AES-CTR encklen=288 authtype=hmac-sha1)
May/25/2024 22:01:39 ipsec,debug ipsec:   (trns_id=3DES encklen=0 authtype=hmac-sha1)
May/25/2024 22:01:39 ipsec,debug ipsec: begin compare proposals.
May/25/2024 22:01:39 ipsec,debug ipsec: pair[0]: 0x4ac198
May/25/2024 22:01:39 ipsec,debug ipsec:  0x4ac198: next=(nil) tnext=0x4ac528
May/25/2024 22:01:39 ipsec,debug ipsec:   0x4ac528: next=(nil) tnext=0x4a9f10
May/25/2024 22:01:39 ipsec,debug ipsec:    0x4a9f10: next=(nil) tnext=(nil)
May/25/2024 22:01:39 ipsec,debug ipsec: prop#=0 prot-id=ESP spi-size=4 #trns=3 trns#=1 trns-id=AES-CBC
May/25/2024 22:01:39 ipsec,debug ipsec: type=Key Length, flag=0x8000, lorv=256
May/25/2024 22:01:39 ipsec,debug ipsec: type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
May/25/2024 22:01:39 ipsec,debug ipsec: type=Encryption Mode, flag=0x8000, lorv=UDP-Transport
May/25/2024 22:01:39 ipsec,debug ipsec: type=SA Life Type, flag=0x8000, lorv=seconds
May/25/2024 22:01:39 ipsec,debug ipsec: type=SA Life Duration, flag=0x8000, lorv=3600
May/25/2024 22:01:39 ipsec,debug ipsec: prop#=0 prot-id=ESP spi-size=4 #trns=3 trns#=2 trns-id=AES-CBC
May/25/2024 22:01:39 ipsec,debug ipsec: type=Key Length, flag=0x8000, lorv=128
May/25/2024 22:01:39 ipsec,debug ipsec: type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
May/25/2024 22:01:39 ipsec,debug ipsec: type=Encryption Mode, flag=0x8000, lorv=UDP-Transport
May/25/2024 22:01:39 ipsec,debug ipsec: type=SA Life Type, flag=0x8000, lorv=seconds
May/25/2024 22:01:39 ipsec,debug ipsec: type=SA Life Duration, flag=0x8000, lorv=3600
May/25/2024 22:01:39 ipsec,debug ipsec: prop#=0 prot-id=ESP spi-size=4 #trns=3 trns#=3 trns-id=3DES
May/25/2024 22:01:39 ipsec,debug ipsec: type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
May/25/2024 22:01:39 ipsec,debug ipsec: type=Encryption Mode, flag=0x8000, lorv=UDP-Transport
May/25/2024 22:01:39 ipsec,debug ipsec: type=SA Life Type, flag=0x8000, lorv=seconds
May/25/2024 22:01:39 ipsec,debug ipsec: type=SA Life Duration, flag=0x8000, lorv=3600
May/25/2024 22:01:39 ipsec,debug ipsec: peer's single bundle:
May/25/2024 22:01:39 ipsec,debug ipsec:  (proto_id=ESP spisize=4 spi=c0e24297 spi_p=00000000 encmode=UDP-Transport reqid=0:0)
May/25/2024 22:01:39 ipsec,debug ipsec:   (trns_id=AES-CBC encklen=256 authtype=hmac-sha1)
May/25/2024 22:01:39 ipsec,debug ipsec:   (trns_id=AES-CBC encklen=128 authtype=hmac-sha1)
May/25/2024 22:01:39 ipsec,debug ipsec:   (trns_id=3DES encklen=0 authtype=hmac-sha1)
May/25/2024 22:01:39 ipsec,debug ipsec: my single bundle:
May/25/2024 22:01:39 l2tp,ppp,debug l2tp: <55.66.77.88>: LCP lowerup
May/25/2024 22:01:39 l2tp,ppp,debug l2tp: <55.66.77.88>: LCP open
May/25/2024 22:01:39 l2tp,ppp,debug,packet l2tp:  <55.66.77.88>: rcvd LCP ConfReq id=0x1
May/25/2024 22:01:39 l2tp,ppp,debug,packet l2tp:    <mru 1420>
May/25/2024 22:01:39 l2tp,ppp,debug,packet l2tp:    <asyncmap 0x0>
May/25/2024 22:01:39 l2tp,ppp,debug,packet l2tp:    <magic 0xb1bbfec8>
May/25/2024 22:01:39 l2tp,ppp,debug,packet l2tp:  <55.66.77.88>: sent LCP ConfReq id=0x1
May/25/2024 22:01:39 l2tp,ppp,debug,packet l2tp:    <mru 1450>
May/25/2024 22:01:39 l2tp,ppp,debug,packet l2tp:    <magic 0x6e348d13>
May/25/2024 22:01:39 l2tp,ppp,debug,packet l2tp:    <auth  mschap2>
May/25/2024 22:01:39 l2tp,ppp,debug,packet l2tp:  <55.66.77.88>: sent LCP ConfRej id=0x1
May/25/2024 22:01:39 l2tp,ppp,debug,packet l2tp:    <asyncmap 0x0>
May/25/2024 22:01:39 l2tp,ppp,debug,packet l2tp:  <55.66.77.88>: rcvd LCP ConfAck id=0x1
May/25/2024 22:01:39 l2tp,ppp,debug,packet l2tp:    <mru 1450>
May/25/2024 22:01:39 l2tp,ppp,debug,packet l2tp:    <magic 0x6e348d13>
May/25/2024 22:01:39 l2tp,ppp,debug,packet l2tp:    <auth  mschap2>
May/25/2024 22:01:39 l2tp,ppp,debug,packet l2tp:  <55.66.77.88>: rcvd LCP ConfReq id=0x2
May/25/2024 22:01:39 l2tp,ppp,debug,packet l2tp:    <mru 1420>
May/25/2024 22:01:39 l2tp,ppp,debug,packet l2tp:    <magic 0xb1bbfec8>
May/25/2024 22:01:39 l2tp,ppp,debug,packet l2tp:  <55.66.77.88>: sent LCP ConfAck id=0x2
May/25/2024 22:01:39 l2tp,ppp,debug,packet l2tp:    <mru 1420>
May/25/2024 22:01:39 l2tp,ppp,debug,packet l2tp:    <magic 0xb1bbfec8>
May/25/2024 22:01:39 l2tp,ppp,debug l2tp: <55.66.77.88>: LCP opened
May/25/2024 22:01:39 l2tp,ppp,debug,packet l2tp:  <55.66.77.88>: sent CHAP Challenge id=0x1
May/25/2024 22:01:39 l2tp,ppp,debug,packet l2tp:     <challenge len=16>
May/25/2024 22:01:39 l2tp,ppp,debug,packet l2tp:     <name mikrotik_master>
May/25/2024 22:01:39 l2tp,ppp,debug,packet l2tp:  <55.66.77.88>: rcvd LCP EchoReq id=0x0
May/25/2024 22:01:39 l2tp,ppp,debug,packet l2tp:     <magic 0xb1bbfec8>
May/25/2024 22:01:39 l2tp,ppp,debug,packet l2tp:  <55.66.77.88>: sent LCP EchoRep id=0x0
May/25/2024 22:01:39 l2tp,ppp,debug,packet l2tp:     <magic 0x6e348d13>
May/25/2024 22:01:39 l2tp,ppp,debug,packet l2tp:  <55.66.77.88>: rcvd CHAP Response id=0x1
May/25/2024 22:01:39 l2tp,ppp,debug,packet l2tp:     <response len=49>
May/25/2024 22:01:39 l2tp,ppp,debug,packet l2tp:     <name v.kapas>
May/25/2024 22:01:39 l2tp,ppp,debug l2tp: <55.66.77.88>: LCP lowerdown
May/25/2024 22:01:39 l2tp,ppp,debug l2tp: <55.66.77.88>: LCP closed
May/25/2024 22:01:39 l2tp,ppp,debug l2tp: <55.66.77.88>: CCP close
May/25/2024 22:01:39 l2tp,ppp,debug l2tp: <55.66.77.88>: BCP close
May/25/2024 22:01:39 l2tp,ppp,debug l2tp: <55.66.77.88>: IPCP close
May/25/2024 22:01:39 l2tp,ppp,debug l2tp: <55.66.77.88>: IPV6CP close
May/25/2024 22:01:39 l2tp,ppp,debug l2tp: <55.66.77.88>: MPLSCP close
May/25/2024 22:01:39 l2tp,ppp,debug l2tp: <55.66.77.88>: LCP lowerdown
May/25/2024 22:01:39 l2tp,ppp,debug l2tp: <55.66.77.88>: LCP down event in starting state
May/25/2024 22:01:39 ipsec,debug ipsec:  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=UDP-Transport reqid=6:6)
May/25/2024 22:01:39 ipsec,debug ipsec:   (trns_id=AES-CBC encklen=256 authtype=hmac-sha1)
May/25/2024 22:01:39 ipsec,debug ipsec:   (trns_id=AES-CTR encklen=256 authtype=hmac-sha1)
May/25/2024 22:01:39 ipsec,debug ipsec:   (trns_id=AES-CTR encklen=288 authtype=hmac-sha1)
May/25/2024 22:01:39 ipsec,debug ipsec:   (trns_id=3DES encklen=0 authtype=hmac-sha1)
May/25/2024 22:01:39 ipsec ipsec: Adjusting my encmode UDP-Transport->Transport
May/25/2024 22:01:39 ipsec ipsec: Adjusting peer's encmode UDP-Transport(4)->Transport(2)
May/25/2024 22:01:39 ipsec,debug ipsec: matched
May/25/2024 22:01:39 ipsec,debug ipsec: ===
May/25/2024 22:01:39 ipsec,debug ipsec: call pfkey_send_getspi 10
May/25/2024 22:01:39 ipsec,debug ipsec: pfkey GETSPI sent: ESP/Transport 55.66.77.88[4500]->11.22.33.44[4500] 
May/25/2024 22:01:39 ipsec,debug ipsec: pfkey getspi sent.
May/25/2024 22:01:39 ipsec,debug ipsec: total SA len=48
May/25/2024 22:01:39 ipsec,debug ipsec: 00000001 00000001 00000028 00030401 00000000 0000001c 010c0000 80060100
May/25/2024 22:01:39 ipsec,debug ipsec: 80050002 80040004 80010001 80020e10
May/25/2024 22:01:39 ipsec,debug ipsec: begin.
May/25/2024 22:01:39 ipsec,debug ipsec: seen nptype=2(prop) len=40
May/25/2024 22:01:39 ipsec,debug ipsec: succeed.
May/25/2024 22:01:39 ipsec,debug ipsec: proposal #0 len=40
May/25/2024 22:01:39 ipsec,debug ipsec: begin.
May/25/2024 22:01:39 ipsec,debug ipsec: seen nptype=3(trns) len=28
May/25/2024 22:01:39 ipsec,debug ipsec: succeed.
May/25/2024 22:01:39 ipsec,debug ipsec: transform #1 len=28
May/25/2024 22:01:39 ipsec,debug ipsec: type=Key Length, flag=0x8000, lorv=256
May/25/2024 22:01:39 ipsec,debug ipsec: type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
May/25/2024 22:01:39 ipsec,debug ipsec: type=Encryption Mode, flag=0x8000, lorv=UDP-Transport
May/25/2024 22:01:39 ipsec,debug ipsec: UDP encapsulation requested
May/25/2024 22:01:39 ipsec,debug ipsec: type=SA Life Type, flag=0x8000, lorv=seconds
May/25/2024 22:01:39 ipsec,debug ipsec: type=SA Life Duration, flag=0x8000, lorv=3600
May/25/2024 22:01:39 ipsec,debug ipsec: life duration was in TLV.
May/25/2024 22:01:39 ipsec,debug ipsec: pair 0:
May/25/2024 22:01:39 ipsec,debug ipsec:  0x4ac198: next=(nil) tnext=(nil)
May/25/2024 22:01:39 ipsec,debug ipsec: proposal #0: 1 transform
May/25/2024 22:01:39 ipsec,debug ipsec: NAT-OAi:
May/25/2024 22:01:39 ipsec,debug ipsec: 01000000 051016d1
May/25/2024 22:01:39 ipsec,debug ipsec: NAT-OAr:
May/25/2024 22:01:39 ipsec,debug ipsec: 01000000 5049caed
May/25/2024 22:01:39 ipsec,debug ipsec: add payload of len 48, next type 10
May/25/2024 22:01:39 ipsec,debug ipsec: add payload of len 24, next type 5
May/25/2024 22:01:39 ipsec,debug ipsec: add payload of len 8, next type 5
May/25/2024 22:01:39 ipsec,debug ipsec: add payload of len 8, next type 21
May/25/2024 22:01:39 ipsec,debug ipsec: add payload of len 8, next type 21
May/25/2024 22:01:39 ipsec,debug ipsec: add payload of len 8, next type 0
May/25/2024 22:01:39 ipsec,debug,packet ipsec: HASH with:
May/25/2024 22:01:39 ipsec,debug,packet ipsec: 3406f23e fa478dfa b824124e 86ef5837 e0340b1d db44e659 42af7aac 50ec4014
May/25/2024 22:01:39 ipsec,debug,packet ipsec: 29ad0a13 0a000034 00000001 00000001 00000028 00030401 08473c08 0000001c
May/25/2024 22:01:39 ipsec,debug,packet ipsec: 010c0000 80060100 80050002 80040004 80010001 80020e10 0500001c bb80162b
May/25/2024 22:01:39 ipsec,debug,packet ipsec: 875a7fd8 5105a202 0711d413 fd23acfb d8d1ec31 0500000c 01000000 c0a8589b
May/25/2024 22:01:39 ipsec,debug,packet ipsec: 1500000c 011106a5 5049caed 1500000c 01000000 051016d1 0000000c 01000000
May/25/2024 22:01:39 ipsec,debug,packet ipsec: 5049caed
May/25/2024 22:01:39 ipsec,debug,packet ipsec: hmac(hmac_sha1)
May/25/2024 22:01:39 ipsec,debug,packet ipsec: HASH computed:
May/25/2024 22:01:39 ipsec,debug,packet ipsec: 4b8ceb7f 3ba0544b e59da0f2 69705358 a9eac6ff
May/25/2024 22:01:39 ipsec,debug ipsec: add payload of len 20, next type 1
May/25/2024 22:01:39 ipsec,debug,packet ipsec: begin encryption.
May/25/2024 22:01:39 ipsec,debug,packet ipsec: encryption(aes)
May/25/2024 22:01:39 ipsec,debug,packet ipsec: pad length = 8
May/25/2024 22:01:39 ipsec,debug,packet ipsec: 01000018 4b8ceb7f 3ba0544b e59da0f2 69705358 a9eac6ff 0a000034 00000001
May/25/2024 22:01:39 ipsec,debug,packet ipsec: 00000001 00000028 00030401 08473c08 0000001c 010c0000 80060100 80050002
May/25/2024 22:01:39 ipsec,debug,packet ipsec: 80040004 80010001 80020e10 0500001c bb80162b 875a7fd8 5105a202 0711d413
May/25/2024 22:01:39 ipsec,debug,packet ipsec: fd23acfb d8d1ec31 0500000c 01000000 c0a8589b 1500000c 011106a5 5049caed
May/25/2024 22:01:39 ipsec,debug,packet ipsec: 1500000c 01000000 051016d1 0000000c 01000000 5049caed 2a6f17a1 82058507
May/25/2024 22:01:39 ipsec,debug,packet ipsec: encryption(aes)
May/25/2024 22:01:39 ipsec,debug,packet ipsec: with key:
May/25/2024 22:01:39 ipsec,debug,packet ipsec: 8b41405c 9410cc31 af1d81fb efef6b38
May/25/2024 22:01:39 ipsec,debug,packet ipsec: encrypted payload by IV:
May/25/2024 22:01:39 ipsec,debug,packet ipsec: cfea63aa 28ddc3fe 0848b47f f60a1088
May/25/2024 22:01:39 ipsec,debug,packet ipsec: save IV for next:
May/25/2024 22:01:39 ipsec,debug,packet ipsec: 7a6295bf 94c957aa 211690bd 6befdd8d
May/25/2024 22:01:39 ipsec,debug,packet ipsec: encrypted.
May/25/2024 22:01:39 ipsec,debug ipsec: 188 bytes from 11.22.33.44[4500] to 55.66.77.88[4500]
May/25/2024 22:01:39 ipsec,debug ipsec: 1 times of 192 bytes message will be sent to 55.66.77.88[4500]
May/25/2024 22:01:39 ipsec,debug,packet ipsec: 0994977a 1786c9c7 5ccdcc88 64efbbee 08102001 3406f23e 000000bc a6cc199e
May/25/2024 22:01:39 ipsec,debug,packet ipsec: 6ddd6081 8376ab98 584ba337 cb408605 6e1a0849 55f41be0 ce856721 641922ee
May/25/2024 22:01:39 ipsec,debug,packet ipsec: 9f56b4fc 85cec45f 1ee60d18 336e7d3a 761861d9 7e1f03e3 182c9066 203919d7
May/25/2024 22:01:39 ipsec,debug,packet ipsec: cb65bcb7 f1b9a14c 4eacd01a 0bcb5984 cae10fbc fa790281 2f9a8ab8 251cafed
May/25/2024 22:01:39 ipsec,debug,packet ipsec: cf234e9b e0365a6a eaf98111 86d539b7 660ea9f4 1f1b954b 965e5549 ba69cb8f
May/25/2024 22:01:39 ipsec,debug,packet ipsec: 3f83d90f 21675f8e c0f1a2ee 7a6295bf 94c957aa 211690bd 6befdd8d
May/25/2024 22:01:39 ipsec ipsec: sent phase2 packet 11.22.33.44[4500]<=>55.66.77.88[4500] 0994977a1786c9c7:5ccdcc8864efbbee:3406f23e
May/25/2024 22:01:39 ipsec,debug ipsec: ===== received 60 bytes from 55.66.77.88[4500] to 11.22.33.44[4500]
May/25/2024 22:01:39 ipsec,debug,packet ipsec: 0994977a 1786c9c7 5ccdcc88 64efbbee 08102001 3406f23e 0000003c d7502db7
May/25/2024 22:01:39 ipsec,debug,packet ipsec: 9f07ba16 ff4a01bc a4a5ea03 f638323c cc7fd9ea 922d7453 2414fa51
May/25/2024 22:01:39 ipsec,debug,packet ipsec: encryption(aes)
May/25/2024 22:01:39 ipsec,debug,packet ipsec: IV was saved for next processing:
May/25/2024 22:01:39 ipsec,debug,packet ipsec: f638323c cc7fd9ea 922d7453 2414fa51
May/25/2024 22:01:39 ipsec,debug,packet ipsec: encryption(aes)
May/25/2024 22:01:39 ipsec,debug,packet ipsec: with key:
May/25/2024 22:01:39 ipsec,debug,packet ipsec: 8b41405c 9410cc31 af1d81fb efef6b38
May/25/2024 22:01:39 ipsec,debug,packet ipsec: decrypted payload by IV:
May/25/2024 22:01:39 ipsec,debug,packet ipsec: 7a6295bf 94c957aa 211690bd 6befdd8d
May/25/2024 22:01:39 ipsec,debug,packet ipsec: decrypted payload, but not trimed.
May/25/2024 22:01:39 ipsec,debug,packet ipsec: 00000018 d65bbfd5 9d4860f6 c3ec2868 a75c024c cdc66017 00000000 00000000
May/25/2024 22:01:39 ipsec,debug,packet ipsec: padding len=1
May/25/2024 22:01:39 ipsec,debug,packet ipsec: skip to trim padding.
May/25/2024 22:01:39 ipsec,debug,packet ipsec: decrypted.
May/25/2024 22:01:39 ipsec,debug,packet ipsec: 0994977a 1786c9c7 5ccdcc88 64efbbee 08102001 3406f23e 0000003c 00000018
May/25/2024 22:01:39 ipsec,debug,packet ipsec: d65bbfd5 9d4860f6 c3ec2868 a75c024c cdc66017 00000000 00000000
May/25/2024 22:01:39 ipsec,debug ipsec: begin.
May/25/2024 22:01:39 ipsec,debug ipsec: seen nptype=8(hash) len=24
May/25/2024 22:01:39 ipsec,debug ipsec: succeed.
May/25/2024 22:01:39 ipsec,debug ipsec: HASH(3) validate:
May/25/2024 22:01:39 ipsec,debug ipsec: d65bbfd5 9d4860f6 c3ec2868 a75c024c cdc66017
May/25/2024 22:01:39 ipsec,debug,packet ipsec: HASH with: 
May/25/2024 22:01:39 ipsec,debug,packet ipsec: 003406f2 3efa478d fab82412 4e86ef58 37e0340b 1ddb44e6 5942af7a ac50ec40
May/25/2024 22:01:39 ipsec,debug,packet ipsec: 1429ad0a 13bb8016 2b875a7f d85105a2 020711d4 13fd23ac fbd8d1ec 31
May/25/2024 22:01:39 ipsec,debug,packet ipsec: hmac(hmac_sha1)
May/25/2024 22:01:39 ipsec,debug,packet ipsec: HASH computed:
May/25/2024 22:01:39 ipsec,debug,packet ipsec: d65bbfd5 9d4860f6 c3ec2868 a75c024c cdc66017
May/25/2024 22:01:39 ipsec,debug ipsec: ===
May/25/2024 22:01:39 ipsec,debug,packet ipsec: KEYMAT compute with
May/25/2024 22:01:39 ipsec,debug,packet ipsec: 0308473c 08fa478d fab82412 4e86ef58 37e0340b 1ddb44e6 5942af7a ac50ec40
May/25/2024 22:01:39 ipsec,debug,packet ipsec: 1429ad0a 13bb8016 2b875a7f d85105a2 020711d4 13fd23ac fbd8d1ec 31
May/25/2024 22:01:39 ipsec,debug,packet ipsec: hmac(hmac_sha1)
May/25/2024 22:01:39 ipsec,debug ipsec: encryption(aes-cbc)
May/25/2024 22:01:39 ipsec,debug ipsec: hmac(sha1)
May/25/2024 22:01:39 ipsec,debug ipsec: encklen=256 authklen=160
May/25/2024 22:01:39 ipsec,debug ipsec: generating 640 bits of key (dupkeymat=4)
May/25/2024 22:01:39 ipsec,debug ipsec: generating K1...K4 for KEYMAT.
May/25/2024 22:01:39 ipsec,debug,packet ipsec: hmac(hmac_sha1)
May/25/2024 22:01:39 ipsec,debug,packet ipsec: hmac(hmac_sha1)
May/25/2024 22:01:39 ipsec,debug,packet ipsec: hmac(hmac_sha1)
May/25/2024 22:01:39 ipsec,debug ipsec: a6dbe3a4 c25a6e6e d220bf89 f3217b85 078aefcf 81df650a b06c4cd9 fc044d90
May/25/2024 22:01:39 ipsec,debug ipsec: 015bc0c9 7720483d ac2f5113 218784b8 5baa0804 0b8575a2 42499f39 168b134f
May/25/2024 22:01:39 ipsec,debug ipsec: 29d4f77f 6c8d3fb6 252aa6b4 e70cd7b2
May/25/2024 22:01:39 ipsec,debug,packet ipsec: KEYMAT compute with
May/25/2024 22:01:39 ipsec,debug,packet ipsec: 03c0e242 97fa478d fab82412 4e86ef58 37e0340b 1ddb44e6 5942af7a ac50ec40
May/25/2024 22:01:39 ipsec,debug,packet ipsec: 1429ad0a 13bb8016 2b875a7f d85105a2 020711d4 13fd23ac fbd8d1ec 31
May/25/2024 22:01:39 ipsec,debug,packet ipsec: hmac(hmac_sha1)
May/25/2024 22:01:39 ipsec,debug ipsec: encryption(aes-cbc)
May/25/2024 22:01:39 ipsec,debug ipsec: hmac(sha1)
May/25/2024 22:01:39 ipsec,debug ipsec: encklen=256 authklen=160
May/25/2024 22:01:39 ipsec,debug ipsec: generating 640 bits of key (dupkeymat=4)
May/25/2024 22:01:39 ipsec,debug ipsec: generating K1...K4 for KEYMAT.
May/25/2024 22:01:39 ipsec,debug,packet ipsec: hmac(hmac_sha1)
May/25/2024 22:01:39 ipsec,debug,packet ipsec: hmac(hmac_sha1)
May/25/2024 22:01:39 ipsec,debug,packet ipsec: hmac(hmac_sha1)
May/25/2024 22:01:39 ipsec,debug ipsec: 1506086f 9efc3942 01a8d0f2 f016f5ab 8c8ef1c8 04bc6a4d cde4c9f6 67cae176
May/25/2024 22:01:39 ipsec,debug ipsec: ff349d4a eb697858 39c4f3f8 fb7a7882 06ade3d4 06b66b69 4c6315fd a52ebb52
May/25/2024 22:01:39 ipsec,debug ipsec: a7bda173 4b943eed 05c18064 7d867aa9
May/25/2024 22:01:39 ipsec,debug ipsec: KEYMAT computed.
May/25/2024 22:01:39 ipsec,debug ipsec: call pk_sendupdate
May/25/2024 22:01:39 ipsec,debug ipsec: encryption(aes-cbc)
May/25/2024 22:01:39 ipsec,debug ipsec: hmac(sha1)
May/25/2024 22:01:39 ipsec,debug ipsec: call pfkey_send_update_nat
May/25/2024 22:01:39 ipsec ipsec: IPsec-SA established: ESP/Transport 55.66.77.88[4500]->11.22.33.44[4500] spi=0x8473c08
May/25/2024 22:01:39 ipsec,debug ipsec: pfkey update sent.
May/25/2024 22:01:39 ipsec,debug ipsec: encryption(aes-cbc)
May/25/2024 22:01:39 ipsec,debug ipsec: hmac(sha1)
May/25/2024 22:01:39 ipsec,debug ipsec: call pfkey_send_add_nat
May/25/2024 22:01:39 ipsec ipsec: IPsec-SA established: ESP/Transport 11.22.33.44[4500]->55.66.77.88[4500] spi=0xc0e24297
May/25/2024 22:01:39 ipsec,debug ipsec: pfkey add sent.
May/25/2024 22:01:51 ipsec,debug ipsec: KA: 11.22.33.44[4500]->55.66.77.88[4500]
May/25/2024 22:01:51 ipsec,debug ipsec: 1 times of 1 bytes message will be sent to 55.66.77.88[4500]
May/25/2024 22:01:51 ipsec,debug,packet ipsec: ff
May/25/2024 22:02:11 ipsec,debug ipsec: KA: 11.22.33.44[4500]->55.66.77.88[4500]
May/25/2024 22:02:11 ipsec,debug ipsec: 1 times of 1 bytes message will be sent to 55.66.77.88[4500]
May/25/2024 22:02:11 ipsec,debug,packet ipsec: ff
May/25/2024 22:02:31 ipsec,debug ipsec: KA: 11.22.33.44[4500]->55.66.77.88[4500]
May/25/2024 22:02:31 ipsec,debug ipsec: 1 times of 1 bytes message will be sent to 55.66.77.88[4500]
May/25/2024 22:02:31 ipsec,debug,packet ipsec: ff
May/25/2024 22:02:39 l2tp,debug,packet l2tp: rcvd control message from 55.66.77.88:43384 to 11.22.33.44:1701
May/25/2024 22:02:39 l2tp,debug,packet l2tp:     tunnel-id=3, session-id=0, ns=4, nr=2
May/25/2024 22:02:39 l2tp,debug,packet l2tp:     (M) Message-Type=StopCCN
May/25/2024 22:02:39 l2tp,debug,packet l2tp:     (M) Assigned-Tunnel-ID=42941
May/25/2024 22:02:39 l2tp,debug,packet l2tp:     (M) Result-Code=1
May/25/2024 22:02:39 l2tp,debug,packet l2tp:         Error-Code=0
May/25/2024 22:02:39 l2tp,debug,packet l2tp:         Error-Message="Server closing"
May/25/2024 22:02:39 l2tp,debug,packet l2tp: sent control message (ack) to 55.66.77.88:43384 from 11.22.33.44:1701
May/25/2024 22:02:39 l2tp,debug,packet l2tp:     tunnel-id=42941, session-id=0, ns=2, nr=5
May/25/2024 22:02:39 ipsec,debug ipsec: ===== received 76 bytes from 55.66.77.88[4500] to 11.22.33.44[4500]
May/25/2024 22:02:39 ipsec,debug,packet ipsec: 0994977a 1786c9c7 5ccdcc88 64efbbee 08100501 7b1bba36 0000004c c24bc19b
May/25/2024 22:02:39 ipsec,debug,packet ipsec: ed6810fe 34dc7dd5 7341dfd2 08e23f2f d30fa8ab 1baeded7 df245b71 79f57486
May/25/2024 22:02:39 ipsec,debug,packet ipsec: 39c50e45 fd7a6d1f dbaf5e19
May/25/2024 22:02:39 ipsec,debug ipsec: receive Information.
May/25/2024 22:02:39 ipsec,debug,packet ipsec: compute IV for phase2
May/25/2024 22:02:39 ipsec,debug,packet ipsec: phase1 last IV:
May/25/2024 22:02:39 ipsec,debug,packet ipsec: c7cb3e97 9a569513 ae379f9f 46da8638 7b1bba36
May/25/2024 22:02:39 ipsec,debug ipsec: hash(sha1)
May/25/2024 22:02:39 ipsec,debug,packet ipsec: encryption(aes)
May/25/2024 22:02:39 ipsec,debug,packet ipsec: phase2 IV computed:
May/25/2024 22:02:39 ipsec,debug,packet ipsec: d7129fbc 587058c0 9d1ba7f6 076822cb
May/25/2024 22:02:39 ipsec,debug,packet ipsec: encryption(aes)
May/25/2024 22:02:39 ipsec,debug,packet ipsec: IV was saved for next processing:
May/25/2024 22:02:39 ipsec,debug,packet ipsec: 79f57486 39c50e45 fd7a6d1f dbaf5e19
May/25/2024 22:02:39 ipsec,debug,packet ipsec: encryption(aes)
May/25/2024 22:02:39 ipsec,debug,packet ipsec: with key:
May/25/2024 22:02:39 ipsec,debug,packet ipsec: 8b41405c 9410cc31 af1d81fb efef6b38
May/25/2024 22:02:39 ipsec,debug,packet ipsec: decrypted payload by IV:
May/25/2024 22:02:39 ipsec,debug,packet ipsec: d7129fbc 587058c0 9d1ba7f6 076822cb
May/25/2024 22:02:39 ipsec,debug,packet ipsec: decrypted payload, but not trimed.
May/25/2024 22:02:39 ipsec,debug,packet ipsec: 0c000018 fc62a5bc 1a52e9df a7bd6ca6 b51dc373 9af05e4d 00000010 00000001
May/25/2024 22:02:39 ipsec,debug,packet ipsec: 03040001 c0e24297 00000000 00000000
May/25/2024 22:02:39 ipsec,debug,packet ipsec: padding len=1
May/25/2024 22:02:39 ipsec,debug,packet ipsec: skip to trim padding.
May/25/2024 22:02:39 ipsec,debug,packet ipsec: decrypted.
May/25/2024 22:02:39 ipsec,debug,packet ipsec: 0994977a 1786c9c7 5ccdcc88 64efbbee 08100501 7b1bba36 0000004c 0c000018
May/25/2024 22:02:39 ipsec,debug,packet ipsec: fc62a5bc 1a52e9df a7bd6ca6 b51dc373 9af05e4d 00000010 00000001 03040001
May/25/2024 22:02:39 ipsec,debug,packet ipsec: c0e24297 00000000 00000000
May/25/2024 22:02:39 ipsec,debug,packet ipsec: HASH with:
May/25/2024 22:02:39 ipsec,debug,packet ipsec: 7b1bba36 00000010 00000001 03040001 c0e24297
May/25/2024 22:02:39 ipsec,debug,packet ipsec: hmac(hmac_sha1)
May/25/2024 22:02:39 ipsec,debug,packet ipsec: HASH computed:
May/25/2024 22:02:39 ipsec,debug,packet ipsec: fc62a5bc 1a52e9df a7bd6ca6 b51dc373 9af05e4d
May/25/2024 22:02:39 ipsec,debug ipsec: hash validated.
May/25/2024 22:02:39 ipsec,debug ipsec: begin.
May/25/2024 22:02:39 ipsec,debug ipsec: seen nptype=8(hash) len=24
May/25/2024 22:02:39 ipsec,debug ipsec: seen nptype=12(delete) len=16
May/25/2024 22:02:39 ipsec,debug ipsec: succeed.
May/25/2024 22:02:39 ipsec,debug ipsec: 55.66.77.88 delete payload for protocol ESP
May/25/2024 22:02:39 ipsec ipsec: purged IPsec-SA proto_id=ESP spi=0xc0e24297
May/25/2024 22:02:39 ipsec ipsec: purged IPsec-SA proto_id=ESP spi=0x8473c08
May/25/2024 22:02:39 ipsec ipsec: removing generated policy
May/25/2024 22:02:39 ipsec,debug ipsec: purged SAs.
May/25/2024 22:02:39 ipsec,debug ipsec: ===== received 92 bytes from 55.66.77.88[4500] to 11.22.33.44[4500]
May/25/2024 22:02:39 ipsec,debug,packet ipsec: 0994977a 1786c9c7 5ccdcc88 64efbbee 08100501 2acaab81 0000005c 9cae0ba7
May/25/2024 22:02:39 ipsec,debug,packet ipsec: 998bb243 e7f8b70c 30deb637 73ab4aa8 f58cddba af80211d 8b923e33 bce9c516
May/25/2024 22:02:39 ipsec,debug,packet ipsec: 75274d83 031fcbec 4679bc0c 302f579a 771bb148 d7d8e76c e9b34939
May/25/2024 22:02:39 ipsec,debug ipsec: receive Information.
May/25/2024 22:02:39 ipsec,debug,packet ipsec: compute IV for phase2
May/25/2024 22:02:39 ipsec,debug,packet ipsec: phase1 last IV:
May/25/2024 22:02:39 ipsec,debug,packet ipsec: c7cb3e97 9a569513 ae379f9f 46da8638 2acaab81
May/25/2024 22:02:39 ipsec,debug ipsec: hash(sha1)
May/25/2024 22:02:39 ipsec,debug,packet ipsec: encryption(aes)
May/25/2024 22:02:39 ipsec,debug,packet ipsec: phase2 IV computed:
May/25/2024 22:02:39 ipsec,debug,packet ipsec: 3d9e35b4 3c741570 bda47d28 11262224
May/25/2024 22:02:39 ipsec,debug,packet ipsec: encryption(aes)
May/25/2024 22:02:39 ipsec,debug,packet ipsec: IV was saved for next processing:
May/25/2024 22:02:39 ipsec,debug,packet ipsec: 302f579a 771bb148 d7d8e76c e9b34939
May/25/2024 22:02:39 ipsec,debug,packet ipsec: encryption(aes)
May/25/2024 22:02:39 ipsec,debug,packet ipsec: with key:
May/25/2024 22:02:39 ipsec,debug,packet ipsec: 8b41405c 9410cc31 af1d81fb efef6b38
May/25/2024 22:02:39 ipsec,debug,packet ipsec: decrypted payload by IV:
May/25/2024 22:02:39 ipsec,debug,packet ipsec: 3d9e35b4 3c741570 bda47d28 11262224
May/25/2024 22:02:39 ipsec,debug,packet ipsec: decrypted payload, but not trimed.
May/25/2024 22:02:39 ipsec,debug,packet ipsec: 0c000018 7a86a30c 206ddbb2 3884145e 7f30d503 c2857e75 0000001c 00000001
May/25/2024 22:02:39 ipsec,debug,packet ipsec: 01100001 0994977a 1786c9c7 5ccdcc88 64efbbee 00000000 00000000 00000000
May/25/2024 22:02:39 ipsec,debug,packet ipsec: padding len=1
May/25/2024 22:02:39 ipsec,debug,packet ipsec: skip to trim padding.
May/25/2024 22:02:39 ipsec,debug,packet ipsec: decrypted.
May/25/2024 22:02:39 ipsec,debug,packet ipsec: 0994977a 1786c9c7 5ccdcc88 64efbbee 08100501 2acaab81 0000005c 0c000018
May/25/2024 22:02:39 ipsec,debug,packet ipsec: 7a86a30c 206ddbb2 3884145e 7f30d503 c2857e75 0000001c 00000001 01100001
May/25/2024 22:02:39 ipsec,debug,packet ipsec: 0994977a 1786c9c7 5ccdcc88 64efbbee 00000000 00000000 00000000
May/25/2024 22:02:39 ipsec,debug,packet ipsec: HASH with:
May/25/2024 22:02:39 ipsec,debug,packet ipsec: 2acaab81 0000001c 00000001 01100001 0994977a 1786c9c7 5ccdcc88 64efbbee
May/25/2024 22:02:39 ipsec,debug,packet ipsec: hmac(hmac_sha1)
May/25/2024 22:02:39 ipsec,debug,packet ipsec: HASH computed:
May/25/2024 22:02:39 ipsec,debug,packet ipsec: 7a86a30c 206ddbb2 3884145e 7f30d503 c2857e75
May/25/2024 22:02:39 ipsec,debug ipsec: hash validated.
May/25/2024 22:02:39 ipsec,debug ipsec: begin.
May/25/2024 22:02:39 ipsec,debug ipsec: seen nptype=8(hash) len=24
May/25/2024 22:02:39 ipsec,debug ipsec: seen nptype=12(delete) len=28
May/25/2024 22:02:39 ipsec,debug ipsec: succeed.
May/25/2024 22:02:39 ipsec,debug ipsec: 55.66.77.88 delete payload for protocol ISAKMP
May/25/2024 22:02:39 ipsec,info ipsec: purging ISAKMP-SA 11.22.33.44[4500]<=>55.66.77.88[4500] spi=0994977a1786c9c7:5ccdcc8864efbbee.
May/25/2024 22:02:39 ipsec ipsec: purged ISAKMP-SA 11.22.33.44[4500]<=>55.66.77.88[4500] spi=0994977a1786c9c7:5ccdcc8864efbbee.
May/25/2024 22:02:39 ipsec,debug ipsec: purged SAs.
May/25/2024 22:02:39 ipsec,info ipsec: ISAKMP-SA deleted 11.22.33.44[4500]-55.66.77.88[4500] spi:0994977a1786c9c7:5ccdcc8864efbbee rekey:1
May/25/2024 22:02:39 ipsec ipsec: KA remove: 11.22.33.44[4500]->55.66.77.88[4500]
May/25/2024 22:02:39 ipsec,debug ipsec: KA tree dump: 11.22.33.44[4500]->55.66.77.88[4500] (in_use=1)
May/25/2024 22:02:39 ipsec,debug ipsec: KA removing this one...
May/25/2024 22:02:54 l2tp,debug,packet l2tp: rcvd control message from 205.210.31.41:54912 to 11.22.33.44:1701
May/25/2024 22:02:54 l2tp,debug,packet l2tp:     tunnel-id=0, session-id=0, ns=0, nr=0
May/25/2024 22:02:54 l2tp,debug,packet l2tp:     (M) Message-Type=SCCRQ
May/25/2024 22:02:54 l2tp,debug,packet l2tp:     Protocol-Version=0x01:00
May/25/2024 22:02:54 l2tp,debug,packet l2tp:     (M) Framing-Capabilities=0x3
May/25/2024 22:02:54 l2tp,debug,packet l2tp:     (M) Host-Name="Xpanse"
May/25/2024 22:02:54 l2tp,debug,packet l2tp:     (M) Assigned-Tunnel-ID=1
May/25/2024 22:02:54 l2tp,info l2tp: first L2TP UDP packet received from 205.210.31.41
May/25/2024 22:02:54 l2tp,debug l2tp: tunnel 1 entering state: wait-ctl-conn
May/25/2024 22:02:54 l2tp,debug,packet l2tp: sent control message to 205.210.31.41:54912 from 11.22.33.44:1701
May/25/2024 22:02:54 l2tp,debug,packet l2tp:     tunnel-id=1, session-id=0, ns=0, nr=1
May/25/2024 22:02:54 l2tp,debug,packet l2tp:     (M) Message-Type=SCCRP
May/25/2024 22:02:54 l2tp,debug,packet l2tp:     (M) Protocol-Version=0x01:00
May/25/2024 22:02:54 l2tp,debug,packet l2tp:     (M) Framing-Capabilities=0x1
May/25/2024 22:02:54 l2tp,debug,packet l2tp:     (M) Bearer-Capabilities=0x0
May/25/2024 22:02:54 l2tp,debug,packet l2tp:     Firmware-Revision=0x1
May/25/2024 22:02:54 l2tp,debug,packet l2tp:     (M) Host-Name="mikrotik_master"
May/25/2024 22:02:54 l2tp,debug,packet l2tp:     Vendor-Name="MikroTik"
May/25/2024 22:02:54 l2tp,debug,packet l2tp:     (M) Assigned-Tunnel-ID=1
May/25/2024 22:02:54 l2tp,debug,packet l2tp:     (M) Receive-Window-Size=4
May/25/2024 22:02:55 l2tp,debug,packet l2tp: sent control message to 205.210.31.41:54912 from 11.22.33.44:1701
May/25/2024 22:02:55 l2tp,debug,packet l2tp:     tunnel-id=1, session-id=0, ns=0, nr=1
May/25/2024 22:02:55 l2tp,debug,packet l2tp:     (M) Message-Type=SCCRP
May/25/2024 22:02:55 l2tp,debug,packet l2tp:     (M) Protocol-Version=0x01:00
May/25/2024 22:02:55 l2tp,debug,packet l2tp:     (M) Framing-Capabilities=0x1
May/25/2024 22:02:55 l2tp,debug,packet l2tp:     (M) Bearer-Capabilities=0x0
May/25/2024 22:02:55 l2tp,debug,packet l2tp:     Firmware-Revision=0x1
May/25/2024 22:02:55 l2tp,debug,packet l2tp:     (M) Host-Name="mikrotik_master"
May/25/2024 22:02:55 l2tp,debug,packet l2tp:     Vendor-Name="MikroTik"
May/25/2024 22:02:55 l2tp,debug,packet l2tp:     (M) Assigned-Tunnel-ID=1
May/25/2024 22:02:55 l2tp,debug,packet l2tp:     (M) Receive-Window-Size=4
May/25/2024 22:02:56 l2tp,debug,packet l2tp: sent control message to 205.210.31.41:54912 from 11.22.33.44:1701
May/25/2024 22:02:56 l2tp,debug,packet l2tp:     tunnel-id=1, session-id=0, ns=0, nr=1
May/25/2024 22:02:56 l2tp,debug,packet l2tp:     (M) Message-Type=SCCRP
May/25/2024 22:02:56 l2tp,debug,packet l2tp:     (M) Protocol-Version=0x01:00
May/25/2024 22:02:56 l2tp,debug,packet l2tp:     (M) Framing-Capabilities=0x1
May/25/2024 22:02:56 l2tp,debug,packet l2tp:     (M) Bearer-Capabilities=0x0
May/25/2024 22:02:56 l2tp,debug,packet l2tp:     Firmware-Revision=0x1
May/25/2024 22:02:56 l2tp,debug,packet l2tp:     (M) Host-Name="mikrotik_master"
May/25/2024 22:02:56 l2tp,debug,packet l2tp:     Vendor-Name="MikroTik"
May/25/2024 22:02:56 l2tp,debug,packet l2tp:     (M) Assigned-Tunnel-ID=1
May/25/2024 22:02:56 l2tp,debug,packet l2tp:     (M) Receive-Window-Size=4
May/25/2024 22:02:58 l2tp,debug,packet l2tp: sent control message to 205.210.31.41:54912 from 11.22.33.44:1701
May/25/2024 22:02:58 l2tp,debug,packet l2tp:     tunnel-id=1, session-id=0, ns=0, nr=1
May/25/2024 22:02:58 l2tp,debug,packet l2tp:     (M) Message-Type=SCCRP
May/25/2024 22:02:58 l2tp,debug,packet l2tp:     (M) Protocol-Version=0x01:00
May/25/2024 22:02:58 l2tp,debug,packet l2tp:     (M) Framing-Capabilities=0x1
May/25/2024 22:02:58 l2tp,debug,packet l2tp:     (M) Bearer-Capabilities=0x0
May/25/2024 22:02:58 l2tp,debug,packet l2tp:     Firmware-Revision=0x1
May/25/2024 22:02:58 l2tp,debug,packet l2tp:     (M) Host-Name="mikrotik_master"
May/25/2024 22:02:58 l2tp,debug,packet l2tp:     Vendor-Name="MikroTik"
May/25/2024 22:02:58 l2tp,debug,packet l2tp:     (M) Assigned-Tunnel-ID=1
May/25/2024 22:02:58 l2tp,debug,packet l2tp:     (M) Receive-Window-Size=4
May/25/2024 22:03:02 l2tp,debug,packet l2tp: sent control message to 205.210.31.41:54912 from 11.22.33.44:1701
May/25/2024 22:03:02 l2tp,debug,packet l2tp:     tunnel-id=1, session-id=0, ns=0, nr=1
May/25/2024 22:03:02 l2tp,debug,packet l2tp:     (M) Message-Type=SCCRP
May/25/2024 22:03:02 l2tp,debug,packet l2tp:     (M) Protocol-Version=0x01:00
May/25/2024 22:03:02 l2tp,debug,packet l2tp:     (M) Framing-Capabilities=0x1
May/25/2024 22:03:02 l2tp,debug,packet l2tp:     (M) Bearer-Capabilities=0x0
May/25/2024 22:03:02 l2tp,debug,packet l2tp:     Firmware-Revision=0x1
May/25/2024 22:03:02 l2tp,debug,packet l2tp:     (M) Host-Name="mikrotik_master"
May/25/2024 22:03:02 l2tp,debug,packet l2tp:     Vendor-Name="MikroTik"
May/25/2024 22:03:02 l2tp,debug,packet l2tp:     (M) Assigned-Tunnel-ID=1
May/25/2024 22:03:02 l2tp,debug,packet l2tp:     (M) Receive-Window-Size=4
May/25/2024 22:03:10 l2tp,debug,packet l2tp: sent control message to 205.210.31.41:54912 from 11.22.33.44:1701
May/25/2024 22:03:10 l2tp,debug,packet l2tp:     tunnel-id=1, session-id=0, ns=0, nr=1
May/25/2024 22:03:10 l2tp,debug,packet l2tp:     (M) Message-Type=SCCRP
May/25/2024 22:03:10 l2tp,debug,packet l2tp:     (M) Protocol-Version=0x01:00
May/25/2024 22:03:10 l2tp,debug,packet l2tp:     (M) Framing-Capabilities=0x1
May/25/2024 22:03:10 l2tp,debug,packet l2tp:     (M) Bearer-Capabilities=0x0
May/25/2024 22:03:10 l2tp,debug,packet l2tp:     Firmware-Revision=0x1
May/25/2024 22:03:10 l2tp,debug,packet l2tp:     (M) Host-Name="mikrotik_master"
May/25/2024 22:03:10 l2tp,debug,packet l2tp:     Vendor-Name="MikroTik"
May/25/2024 22:03:10 l2tp,debug,packet l2tp:     (M) Assigned-Tunnel-ID=1
May/25/2024 22:03:10 l2tp,debug,packet l2tp:     (M) Receive-Window-Size=4
May/25/2024 22:03:18 l2tp,debug l2tp: tunnel 1 received no replies, disconnecting
May/25/2024 22:03:18 l2tp,debug l2tp: tunnel 1 entering state: dead
Конфигурация роутера:
 config.rsc
# may/25/2024 21:48:08 by RouterOS 6.49.13
# software id = 1BMD-VECR
#
# model = RB951G-2HnD
# serial number = 96500C378E10
/interface wireless set [ find default-name=wlan1 ] band=2ghz-onlyn channel-width=20/40mhz-XX country=russia disabled=no distance=indoors frequency=auto installation=indoor mode=ap-bridge ssid=pes_lab station-roaming=enabled wireless-protocol=802.11
/interface bridge add admin-mac=48:8F:5A:36:DB:10 auto-mac=no comment=defconf name=bridge
/interface bridge add name=guests
/interface list add comment=defconf name=WAN
/interface list add comment=defconf name=LAN
/interface wireless security-profiles set [ find default=yes ] authentication-types=wpa2-psk mode=dynamic-keys supplicant-identity=MikroTik
/interface wireless security-profiles add authentication-types=wpa2-psk mode=dynamic-keys name=guests supplicant-identity=MikroTik
/interface wireless add mac-address=4A:8F:5A:36:DB:14 master-interface=wlan1 name=wlan2 security-profile=guests ssid=pes_guests wds-default-bridge=bridge wps-mode=disabled
/ip ipsec proposal set [ find default=yes ] enc-algorithms=aes-256-cbc,aes-128-cbc
/ip ipsec proposal add enc-algorithms=aes-256-cbc,aes-256-ctr,3des name=l2tp_proposal
/ip pool add name=dhcp ranges=192.168.10.150-192.168.10.254
/ip pool add name=guests ranges=10.1.1.2-10.1.1.20
/ip pool add name=vpn-pool ranges=172.17.2.0-172.17.2.100
/ip dhcp-server add address-pool=dhcp disabled=no interface=bridge name=defconf
/ip dhcp-server add address-pool=guests disabled=no interface=guests name=guests
/ppp profile add bridge=bridge change-tcp-mss=yes dns-server=192.168.10.1 local-address=vpn-pool name=l2tp-profile remote-address=vpn-pool
/user group set full policy=local,telnet,ssh,ftp,reboot,read,write,policy,test,winbox,password,web,sniff,sensitive,api,romon,dude,tikapp
/interface bridge port add bridge=bridge comment=defconf interface=ether2
/interface bridge port add bridge=bridge comment=defconf interface=ether3
/interface bridge port add bridge=bridge comment=defconf interface=ether4
/interface bridge port add bridge=bridge comment=defconf interface=ether5
/interface bridge port add bridge=bridge comment=defconf interface=wlan1
/interface bridge port add bridge=guests interface=wlan2
/ip neighbor discovery-settings set discover-interface-list=LAN
/ip settings set tcp-syncookies=yes
/interface l2tp-server server set authentication=mschap2 default-profile=l2tp-profile enabled=yes
/interface list member add comment=defconf interface=bridge list=LAN
/interface list member add comment=defconf interface=ether1 list=WAN
/ip address add address=192.168.10.1/24 comment=defconf interface=ether2 network=192.168.10.0
/ip address add address=11.22.33.44/24 interface=ether1 network=11.22.33.44
/ip address add address=10.1.1.1/24 interface=wlan2 network=10.1.1.0
/ip dhcp-client add comment=defconf interface=ether1
/ip dhcp-server network add address=10.1.1.0/24 dns-server=10.1.1.1,8.8.8.8 gateway=10.1.1.1 netmask=24
/ip dhcp-server network add address=192.168.10.0/24 comment=defconf dns-server=192.168.10.1 domain=WORKGROUP gateway=192.168.10.1 netmask=24
/ip dns set allow-remote-requests=yes servers=217.119.16.67,217.119.16.75
/ip dns static add address=192.168.10.1 comment=defconf name=router.lan
/ip firewall address-list add address=55.66.77.88 list=Allow-admin
/ip firewall filter add action=accept chain=input dst-port=25 protocol=tcp
/ip firewall filter add action=accept chain=input dst-port=143 protocol=tcp
/ip firewall filter add action=accept chain=input dst-port=465 protocol=tcp
/ip firewall filter add action=accept chain=input dst-port=587 protocol=tcp
/ip firewall filter add action=accept chain=input dst-port=993 protocol=tcp
/ip firewall filter add action=accept chain=input dst-port=8291 in-interface=ether1 protocol=tcp src-address-list=Allow-admin
/ip firewall filter add action=accept chain=input dst-port=9980 in-interface=ether1 protocol=tcp src-address-list=Allow-admin
/ip firewall filter add action=accept chain=input comment=vpn dst-port=1701,500,4500 protocol=udp
/ip firewall filter add action=accept chain=input comment="vpn ipsec" protocol=ipsec-esp
/ip firewall filter add action=accept chain=forward comment=vpn in-interface=!ether1 out-interface=bridge src-address=172.17.2.0/24
/ip firewall filter add action=accept chain=input src-address=172.17.2.0/24
/ip firewall filter add action=accept chain=input comment="defconf: accept established,related,untracked" connection-state=established,related,untracked
/ip firewall filter add action=drop chain=input comment="defconf: drop invalid" connection-state=invalid
/ip firewall filter add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
/ip firewall filter add action=accept chain=input comment="defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1
/ip firewall filter add action=drop chain=input comment="defconf: drop all not coming from LAN" in-interface-list=!LAN
/ip firewall filter add action=accept chain=forward comment="defconf: accept in ipsec policy" ipsec-policy=in,ipsec
/ip firewall filter add action=accept chain=forward comment="defconf: accept out ipsec policy" ipsec-policy=out,ipsec
/ip firewall filter add action=fasttrack-connection chain=forward comment="defconf: fasttrack" connection-state=established,related
/ip firewall filter add action=accept chain=forward comment="defconf: accept established,related, untracked" connection-state=established,related,untracked
/ip firewall filter add action=drop chain=forward comment="defconf: drop invalid" connection-state=invalid
/ip firewall filter add action=drop chain=forward comment="defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat connection-state=new in-interface-list=WAN
/ip firewall nat add action=masquerade chain=srcnat comment="defconf: masquerade" ipsec-policy=out,none out-interface=ether1
/ip firewall nat add action=netmap chain=dstnat dst-port=9443 protocol=tcp to-addresses=192.168.10.12 to-ports=443
/ip firewall nat add action=src-nat chain=srcnat dst-address=192.168.10.12 dst-port=9433 protocol=tcp src-address=192.168.10.0/24 to-addresses=192.168.10.1
/ip firewall nat add action=src-nat chain=srcnat dst-address=192.168.10.12 dst-port=443 protocol=tcp src-address=192.168.10.0/24 to-addresses=192.168.10.1
/ip firewall nat add action=dst-nat chain=dstnat dst-port=25 in-interface=ether1 protocol=tcp to-addresses=192.168.10.14
/ip firewall nat add action=dst-nat chain=dstnat dst-port=143 in-interface=ether1 protocol=tcp to-addresses=192.168.10.14
/ip firewall nat add action=dst-nat chain=dstnat dst-port=465 in-interface=ether1 protocol=tcp to-addresses=192.168.10.14
/ip firewall nat add action=dst-nat chain=dstnat dst-port=587 in-interface=ether1 protocol=tcp to-addresses=192.168.10.14
/ip firewall nat add action=dst-nat chain=dstnat dst-port=993 in-interface=ether1 protocol=tcp to-addresses=192.168.10.14
/ip firewall nat add action=netmap chain=dstnat dst-port=80 protocol=tcp src-address=!192.168.10.0/24 to-addresses=192.168.10.17
/ip firewall nat add action=netmap chain=dstnat dst-port=443 protocol=tcp src-address=!192.168.10.0/24 to-addresses=192.168.10.17
/ip firewall nat add action=src-nat chain=srcnat dst-address=192.168.10.17 dst-port=80 protocol=tcp src-address=192.168.10.0/24 to-addresses=192.168.10.1
/ip firewall nat add action=netmap chain=dstnat dst-port=8090 protocol=tcp to-addresses=192.168.10.17
/ip firewall nat add action=netmap chain=dstnat dst-port=8081 protocol=tcp to-addresses=192.168.10.16
/ip firewall nat add action=netmap chain=dstnat dst-port=9912 protocol=tcp src-address-list=Allow-admin to-addresses=192.168.10.12 to-ports=3389
/ip firewall nat add action=netmap chain=dstnat dst-port=9913 protocol=tcp src-address-list=Allow-admin to-addresses=192.168.10.13 to-ports=3389
/ip firewall nat add action=netmap chain=dstnat dst-port=9914 protocol=tcp src-address-list=Allow-admin to-addresses=192.168.10.14 to-ports=22
/ip firewall nat add action=netmap chain=dstnat dst-port=9915 protocol=tcp src-address-list=Allow-admin to-addresses=192.168.10.15 to-ports=22
/ip firewall nat add action=netmap chain=dstnat dst-port=9916 protocol=tcp src-address-list=Allow-admin to-addresses=192.168.10.16 to-ports=22
/ip firewall nat add action=netmap chain=dstnat dst-port=9917 protocol=tcp src-address-list=Allow-admin to-addresses=192.168.10.17 to-ports=22
/ip firewall nat add action=netmap chain=dstnat dst-port=9918 protocol=tcp src-address-list=Allow-admin to-addresses=192.168.10.18 to-ports=22
/ip firewall nat add action=netmap chain=dstnat dst-port=9922 protocol=tcp src-address-list=Allow-admin to-addresses=192.168.10.11 to-ports=22
/ip firewall nat add action=netmap chain=dstnat dst-port=9943 protocol=tcp src-address-list=Allow-admin to-addresses=192.168.10.14 to-ports=443
/ip firewall nat add action=netmap chain=dstnat dst-port=9986 protocol=tcp src-address-list=Allow-admin to-addresses=192.168.10.11 to-ports=8006
/ip firewall nat add action=netmap chain=dstnat dst-port=9998 protocol=tcp src-address-list=Allow-admin to-addresses=192.168.10.18 to-ports=9081
/ip firewall nat add action=netmap chain=dstnat dst-port=59099 protocol=tcp to-addresses=192.168.10.100 to-ports=3389
/ip ipsec policy set 0 proposal=l2tp_proposal
/ip route add distance=1 gateway=80.73.202.238
/ip service set telnet disabled=yes
/ip service set ftp disabled=yes
/ip service set www port=9980
/ip service set ssh disabled=yes
/ip service set api disabled=yes
/ip service set api-ssl disabled=yes
/ppp secret add name=i.petrov profile=l2tp-profile service=l2tp
/ppp secret add name=v.kapas profile=l2tp-profile service=l2tp
/system clock set time-zone-name=Europe/Moscow
/system identity set name=mikrotik_master
/system logging add action=disk disabled=yes prefix=l2tp topics=l2tp
/system logging add action=disk disabled=yes prefix=ipsec topics=ipsec
/system logging add topics=l2tp
/system package update set channel=long-term
/tool graphing interface add allow-address=192.168.1.0/24
/tool mac-server set allowed-interface-list=LAN
/tool mac-server mac-winbox set allowed-interface-list=LAN


Ответить