Good evening, i have an Edge router lite, and i am following this guide https://help.ubnt.com/hc/en-us/articles/204950294-EdgeRouter-L2TP-IPsec-VPN-Server
To set up a vnp, however when i connect from windows 10 i get the following
"The network connection between your computer and the VPN server could not be established becasue the remote server is not responding, this could be because one of the network devices between your computer and the remote server is not configutred to allow vpn connection."
Any ideas? configs / logs below
Fiewall settings
all-ping enable broadcast-ping disable group { } ipv6-receive-redirects disable ipv6-src-route disable ip-src-route disable log-martians enable name WAN_IN { default-action accept description "WAN to internal" rule 10 { action accept description "Allow established/related" state { established enable related enable } } rule 30 { action accept description "Drop invalid state" log disable state { invalid enable } } } name WAN_LOCAL { default-action accept description "WAN to router" rule 10 { action accept description "Allow established/related" state { established enable related enable } } rule 30 { action accept description IKE destination { port 500 } log disable protocol udp state { invalid enable } } rule 40 { action accept description ESP log disable protocol esp } rule 50 { action accept description NAT-T destination { port 4500 } log disable protocol udp } rule 60 { action accept description L2TP destination { port 1701 } ipsec { match-ipsec } log disable protocol udp } } options { mss-clamp { mss 1412 } } receive-redirects disable send-redirects enable source-validation disable syn-cookies enable
Result of Sudo swanctl --log whilsttrying to connect to vpn
sudo swanctl --log 01[NET] received packet: from 82.20.171.210[500] to 192.168.0.254[500] (408 bytes) 01[ENC] parsed ID_PROT request 0 [ SA V V V V V V V V ] 01[ENC] received unknown vendor ID: 01:52:8b:bb:c0:06:96:12:18:49:ab:9a:1c:5b:2a:51:00:00:00:01 01[IKE] received MS NT5 ISAKMPOAKLEY vendor ID 01[IKE] received NAT-T (RFC 3947) vendor ID 01[IKE] received draft-ietf-ipsec-nat-t-ike-02\n vendor ID 01[IKE] received FRAGMENTATION vendor ID 01[ENC] received unknown vendor ID: fb:1d:e3:cd:f3:41:b7:ea:16:b7:e5:be:08:55:f1:20 01[ENC] received unknown vendor ID: 26:24:4d:38:ed:db:61:b3:17:2a:36:e3:d0:cf:b8:19 01[ENC] received unknown vendor ID: e3:a5:96:6a:76:37:9f:e7:07:22:82:31:e5:ce:86:52 01[IKE] 82.20.171.210 is initiating a Main Mode IKE_SA 01[ENC] generating ID_PROT response 0 [ SA V V V ] 01[NET] sending packet: from 192.168.0.254[500] to 82.20.171.210[500] (136 bytes) 10[NET] received packet: from 82.20.171.210[500] to 192.168.0.254[500] (228 bytes) 10[ENC] parsed ID_PROT request 0 [ KE No NAT-D NAT-D ] 10[IKE] local host is behind NAT, sending keep alives 10[IKE] remote host is behind NAT 10[ENC] generating ID_PROT response 0 [ KE No NAT-D NAT-D ] 10[NET] sending packet: from 192.168.0.254[500] to 82.20.171.210[500] (212 bytes) 01[NET] received packet: from 82.20.171.210[4500] to 192.168.0.254[4500] (76 bytes) 01[ENC] parsed ID_PROT request 0 [ ID HASH ] 01[CFG] looking for pre-shared key peer configs matching 192.168.0.254...82.20.171.210[192.168.0.18] 01[CFG] selected peer config "remote-access" 01[IKE] IKE_SA remote-access[99] established between 192.168.0.254[192.168.0.254]...82.20.171.210[192.168.0.18] 01[IKE] DPD not supported by peer, disabled 01[ENC] generating ID_PROT response 0 [ ID HASH ] 01[NET] sending packet: from 192.168.0.254[4500] to 82.20.171.210[4500] (76 bytes) 12[NET] received packet: from 82.20.171.210[4500] to 192.168.0.254[4500] (444 bytes) 12[ENC] parsed QUICK_MODE request 1 [ HASH SA No ID ID NAT-OA NAT-OA ] 12[IKE] received 3600s lifetime, configured 0s 12[IKE] received 250000000 lifebytes, configured 0 12[ENC] generating QUICK_MODE response 1 [ HASH SA No ID ID NAT-OA NAT-OA ] 12[NET] sending packet: from 192.168.0.254[4500] to 82.20.171.210[4500] (204 bytes) 03[NET] received packet: from 82.20.171.210[4500] to 192.168.0.254[4500] (60 bytes) 03[ENC] parsed QUICK_MODE request 1 [ HASH ] 03[IKE] CHILD_SA remote-access{41} established with SPIs c4859ad1_i a56ca6f6_o and TS 192.168.0.254/32[udp/l2f] === 82.20.171.210/32[udp/l2f] 06[NET] received packet: from 82.20.171.210[4500] to 192.168.0.254[4500] (444 bytes) 06[ENC] parsed QUICK_MODE request 2 [ HASH SA No ID ID NAT-OA NAT-OA ] 06[IKE] received 3600s lifetime, configured 0s 06[IKE] received 250000000 lifebytes, configured 0 06[IKE] detected rekeying of CHILD_SA remote-access{41} 06[ENC] generating QUICK_MODE response 2 [ HASH SA No ID ID NAT-OA NAT-OA ] 06[NET] sending packet: from 192.168.0.254[4500] to 82.20.171.210[4500] (204 bytes) 14[NET] received packet: from 82.20.171.210[4500] to 192.168.0.254[4500] (60 bytes) 14[ENC] parsed QUICK_MODE request 2 [ HASH ] 14[IKE] CHILD_SA remote-access{41} established with SPIs c8e66420_i 320340b0_o and TS 192.168.0.254/32[udp/l2f] === 82.20.171.210/32[udp/l2f] 05[NET] received packet: from 82.20.171.210[4500] to 192.168.0.254[4500] (76 bytes) 05[ENC] parsed INFORMATIONAL_V1 request 4216048040 [ HASH D ] 05[IKE] received DELETE for ESP CHILD_SA with SPI a56ca6f6 05[IKE] closing CHILD_SA remote-access{41} with SPIs c4859ad1_i (0 bytes) a56ca6f6_o (0 bytes) and TS 192.168.0.254/32[udp/l2f] === 82.20.171.210/32[udp/l2f] 06[NET] received packet: from 82.20.171.210[4500] to 192.168.0.254[4500] (444 bytes) 06[ENC] parsed QUICK_MODE request 3 [ HASH SA No ID ID NAT-OA NAT-OA ] 06[IKE] received 3600s lifetime, configured 0s 06[IKE] received 250000000 lifebytes, configured 0 06[IKE] detected rekeying of CHILD_SA remote-access{41} 06[ENC] generating QUICK_MODE response 3 [ HASH SA No ID ID NAT-OA NAT-OA ] 06[NET] sending packet: from 192.168.0.254[4500] to 82.20.171.210[4500] (204 bytes) 14[NET] received packet: from 82.20.171.210[4500] to 192.168.0.254[4500] (76 bytes) 14[ENC] parsed INFORMATIONAL_V1 request 2677374342 [ HASH D ] 14[IKE] received DELETE for ESP CHILD_SA with SPI 320340b0 14[IKE] closing CHILD_SA remote-access{41} with SPIs c8e66420_i (0 bytes) 320340b0_o (0 bytes) and TS 192.168.0.254/32[udp/l2f] === 82.20.171.210/32[udp/l2f] 12[NET] received packet: from 82.20.171.210[4500] to 192.168.0.254[4500] (60 bytes) 12[ENC] parsed QUICK_MODE request 3 [ HASH ] 12[IKE] CHILD_SA remote-access{41} established with SPIs c3e7331f_i 66aa53f2_o and TS 192.168.0.254/32[udp/l2f] === 82.20.171.210/32[udp/l2f] 16[NET] received packet: from 82.20.171.210[4500] to 192.168.0.254[4500] (444 bytes) 16[ENC] parsed QUICK_MODE request 4 [ HASH SA No ID ID NAT-OA NAT-OA ] 16[IKE] received 3600s lifetime, configured 0s 16[IKE] received 250000000 lifebytes, configured 0 16[IKE] detected rekeying of CHILD_SA remote-access{41} 16[ENC] generating QUICK_MODE response 4 [ HASH SA No ID ID NAT-OA NAT-OA ] 16[NET] sending packet: from 192.168.0.254[4500] to 82.20.171.210[4500] (204 bytes) 12[NET] received packet: from 82.20.171.210[4500] to 192.168.0.254[4500] (60 bytes) 12[ENC] parsed QUICK_MODE request 4 [ HASH ] 12[IKE] CHILD_SA remote-access{41} established with SPIs c21fc119_i ba54abee_o and TS 192.168.0.254/32[udp/l2f] === 82.20.171.210/32[udp/l2f] 10[NET] received packet: from 82.20.171.210[4500] to 192.168.0.254[4500] (76 bytes) 10[ENC] parsed INFORMATIONAL_V1 request 205215436 [ HASH D ] 10[IKE] received DELETE for ESP CHILD_SA with SPI 66aa53f2 10[IKE] closing CHILD_SA remote-access{41} with SPIs c3e7331f_i (0 bytes) 66aa53f2_o (0 bytes) and TS 192.168.0.254/32[udp/l2f] === 82.20.171.210/32[udp/l2f] 14[NET] received packet: from 82.20.171.210[4500] to 192.168.0.254[4500] (444 bytes) 14[ENC] parsed QUICK_MODE request 5 [ HASH SA No ID ID NAT-OA NAT-OA ] 14[IKE] received 3600s lifetime, configured 0s 14[IKE] received 250000000 lifebytes, configured 0 14[IKE] detected rekeying of CHILD_SA remote-access{41} 14[ENC] generating QUICK_MODE response 5 [ HASH SA No ID ID NAT-OA NAT-OA ] 14[NET] sending packet: from 192.168.0.254[4500] to 82.20.171.210[4500] (204 bytes) 02[NET] received packet: from 82.20.171.210[4500] to 192.168.0.254[4500] (60 bytes) 02[ENC] parsed QUICK_MODE request 5 [ HASH ] 02[IKE] CHILD_SA remote-access{41} established with SPIs cff9d9d7_i da65ea62_o and TS 192.168.0.254/32[udp/l2f] === 82.20.171.210/32[udp/l2f] 03[NET] received packet: from 82.20.171.210[4500] to 192.168.0.254[4500] (76 bytes) 03[ENC] parsed INFORMATIONAL_V1 request 4288422591 [ HASH D ] 03[IKE] received DELETE for ESP CHILD_SA with SPI ba54abee 03[IKE] closing CHILD_SA remote-access{41} with SPIs c21fc119_i (0 bytes) ba54abee_o (0 bytes) and TS 192.168.0.254/32[udp/l2f] === 82.20.171.210/32[udp/l2f] 02[NET] received packet: from 82.20.171.210[4500] to 192.168.0.254[4500] (444 bytes) 02[ENC] parsed QUICK_MODE request 6 [ HASH SA No ID ID NAT-OA NAT-OA ] 02[IKE] received 3600s lifetime, configured 0s 02[IKE] received 250000000 lifebytes, configured 0 02[IKE] detected rekeying of CHILD_SA remote-access{41} 02[ENC] generating QUICK_MODE response 6 [ HASH SA No ID ID NAT-OA NAT-OA ] 02[NET] sending packet: from 192.168.0.254[4500] to 82.20.171.210[4500] (204 bytes) 12[NET] received packet: from 82.20.171.210[4500] to 192.168.0.254[4500] (60 bytes) 12[ENC] parsed QUICK_MODE request 6 [ HASH ] 12[IKE] CHILD_SA remote-access{41} established with SPIs c25474ff_i 5a9dfb5e_o and TS 192.168.0.254/32[udp/l2f] === 82.20.171.210/32[udp/l2f] 12[NET] received packet: from 82.20.171.210[4500] to 192.168.0.254[4500] (76 bytes) 12[ENC] parsed INFORMATIONAL_V1 request 1487839218 [ HASH D ] 12[IKE] received DELETE for ESP CHILD_SA with SPI da65ea62 12[IKE] closing CHILD_SA remote-access{41} with SPIs cff9d9d7_i (0 bytes) da65ea62_o (0 bytes) and TS 192.168.0.254/32[udp/l2f] === 82.20.171.210/32[udp/l2f] 14[NET] received packet: from 82.20.171.210[4500] to 192.168.0.254[4500] (76 bytes) 14[ENC] parsed INFORMATIONAL_V1 request 975110675 [ HASH D ] 14[IKE] received DELETE for ESP CHILD_SA with SPI 5a9dfb5e 14[IKE] closing CHILD_SA remote-access{41} with SPIs c25474ff_i (0 bytes) 5a9dfb5e_o (0 bytes) and TS 192.168.0.254/32[udp/l2f] === 82.20.171.210/32[udp/l2f] 01[NET] received packet: from 82.20.171.210[4500] to 192.168.0.254[4500] (92 bytes) 01[ENC] parsed INFORMATIONAL_V1 request 533339283 [ HASH D ] 01[IKE] received DELETE for IKE_SA remote-access[99] 01[IKE] deleting IKE_SA remote-access[99] between 192.168.0.254[192.168.0.254]...82.20.171.210[192.168.0.18]
VPN config
ipsec { ipsec-interfaces { interface eth0 } } l2tp { remote-access { authentication { local-users { username user1 { password mypassword } username test { password test } } mode local require chap } client-ip-pool { start 192.168.0.20 stop 192.168.0.30 } dns-servers { server-1 192.168.0.2 server-2 8.8.8.8 } ipsec-settings { authentication { mode pre-shared-secret pre-shared-secret PennineManufacturing2000 } } outside-address 0.0.0.0 } }
Interface settings
bridge br0 { address 192.168.0.254/24 aging 300 bridged-conntrack disable description "Local Bridge" hello-time 2 max-age 20 priority 32768 promiscuous enable stp false } ethernet eth0 { address dhcp description "Internet (PPPoE)" duplex auto pppoe 0 { default-route auto firewall { in { } local { name WAN_LOCAL } } mtu 1492 name-server auto password user-id } speed auto } ethernet eth1 { bridge-group { bridge br0 } description "Local Bridge" duplex auto speed auto } ethernet eth2 { bridge-group { bridge br0 } description "Local Bridge" duplex auto speed auto } loopback lo { }