L2TP module problem

Post your questions about SoftEther VPN software here. Please answer questions if you can afford.
Post Reply
Sypher
Posts: 1
Joined: Fri Oct 05, 2018 2:37 am

L2TP module problem

Post by Sypher » Fri Oct 05, 2018 3:06 am

Hi,
I had created a VPN server in Windows 2016 Base.
When I using my Windows 10 computer built-in VPN tool to connected it, it faild and error message is L2TP Connection fail, error code is 789.
And I go to see some logs, the logs show:

2018-10-04 23:04:43.475 IPsec Client 100 (118.115.36.203:500 -> 10.100.1.126:500): A new IPsec client is created.
2018-10-04 23:04:43.475 IPsec IKE Session (IKE SA) 74 (Client: 100) (118.115.36.203:500 -> 10.100.1.126:500): A new IKE SA (Main Mode) is created. Initiator Cookie: 0xE89B2255D9EA95AD, Responder Cookie: 0x76F3446AE9FE86C6, DH Group: MODP 2048 (Group 14), Hash Algorithm: SHA-2-256, Cipher Algorithm: AES-CBC, Cipher Key Size: 256 bits, Lifetime: 4294967295 Kbytes or 3600 seconds
2018-10-04 23:04:44.037 IPsec Client 100 (118.115.36.203:4500 -> 10.100.1.126:4500): The port number information of this client is updated.
2018-10-04 23:04:44.053 IPsec Client 100 (118.115.36.203:4500 -> 10.100.1.126:4500):
2018-10-04 23:04:44.053 IPsec IKE Session (IKE SA) 74 (Client: 100) (118.115.36.203:4500 -> 10.100.1.126:4500): This IKE SA is established between the server and the client.
2018-10-04 23:04:44.397 IPsec IKE Session (IKE SA) 74 (Client: 100) (118.115.36.203:4500 -> 10.100.1.126:4500): The client initiates a QuickMode negotiation.
2018-10-04 23:04:44.397 IPsec ESP Session (IPsec SA) 104 (Client: 100) (118.115.36.203:4500 -> 10.100.1.126:4500): A new IPsec SA (Direction: Client -> Server) is created. SPI: 0xE4564B67, DH Group: (null), Hash Algorithm: SHA-1, Cipher Algorithm: AES-CBC, Cipher Key Size: 256 bits, Lifetime: 4294967295 Kbytes or 3600 seconds
2018-10-04 23:04:44.412 IPsec ESP Session (IPsec SA) 104 (Client: 100) (118.115.36.203:4500 -> 10.100.1.126:4500): A new IPsec SA (Direction: Server -> Client) is created. SPI: 0x484A3B8, DH Group: (null), Hash Algorithm: SHA-1, Cipher Algorithm: AES-CBC, Cipher Key Size: 256 bits, Lifetime: 4294967295 Kbytes or 3600 seconds
2018-10-04 23:04:44.584 IPsec ESP Session (IPsec SA) 104 (Client: 100) (118.115.36.203:4500 -> 10.100.1.126:4500): This IPsec SA is established between the server and the client.
2018-10-04 23:04:44.584 IPsec Client 100 (118.115.36.203:4500 -> 10.100.1.126:4500): The L2TP Server Module is started.
2018-10-04 23:05:04.693 IPsec ESP Session (IPsec SA) 104 (Client: 100) (118.115.36.203:4500 -> 10.100.1.126:4500): This IPsec SA is deleted.
2018-10-04 23:05:04.693 IPsec IKE Session (IKE SA) 74 (Client: 100) (118.115.36.203:4500 -> 10.100.1.126:4500): This IKE SA is deleted.
2018-10-04 23:05:04.693 IPsec ESP Session (IPsec SA) 104 (Client: 100) (118.115.36.203:4500 -> 10.100.1.126:4500): This IPsec SA is deleted.

It seems like L2TP module didn't work properly.
Please help me to clarify what going on?

Axl
Posts: 4
Joined: Thu Sep 13, 2018 6:59 am

Re: L2TP module problem

Post by Axl » Fri Oct 05, 2018 9:17 am

If your Windows client behind the NAT use this guide: https://github.com/hwdsl2/setup-ipsec-v ... -error-809

P.S. Or just use attached reg-file (remove .txt extension at the end).
You do not have the required permissions to view the files attached to this post.

jhonyvarela
Posts: 1
Joined: Thu Aug 30, 2018 3:08 pm
Contact:

Re: L2TP module problem

Post by jhonyvarela » Sat Oct 06, 2018 2:52 am

Axl wrote:
Fri Oct 05, 2018 9:17 am
If your Windows client behind the NAT use this guide: https://github.com/hwdsl2/setup-ipsec-v ... -error-809

P.S. Or just use attached reg-file (remove .txt extension at the end).
Thanks!!

Post Reply