Good day! I just started linux the other day (noob). It seems that I can't connect to the L2TP VPN provided by my company, but in windows built-in l2tp its working fine.
Here's the log from sudo journalctl -u NetworkManager -f
I replaced the acutal server adress by [SERVER_ADDRESS].
Here's the log from sudo journalctl -u NetworkManager -f
Code:
Oct 22 10:52:47 jobus NetworkManager[1317]: <info> [1729565567.4091] audit: op="statistics" interface="wlo1" ifindex=3 args="2000" pid=2337 uid=1000 result="success"
Oct 22 10:52:50 jobus NetworkManager[1317]: <info> [1729565570.3348] vpn[0x559e56d3e3a0,3b6cd445-7c9e-465a-81f7-8ac278c7af63,"New vpn connection"]: starting l2tp
Oct 22 10:52:50 jobus NetworkManager[1317]: <info> [1729565570.3357] audit: op="connection-activate" uuid="3b6cd445-7c9e-465a-81f7-8ac278c7af63" name="New vpn connection" pid=2337 uid=1000 result="success"
Oct 22 10:52:50 jobus nm-l2tp-service[21328]: Check port 1701
Oct 22 10:52:50 jobus NetworkManager[21345]: Stopping strongSwan IPsec failed: starter is not running
Oct 22 10:52:52 jobus NetworkManager[21342]: Starting strongSwan 5.9.8 IPsec [starter]...
Oct 22 10:52:52 jobus NetworkManager[21342]: Loading config setup
Oct 22 10:52:52 jobus NetworkManager[21342]: Loading conn '3b6cd445-7c9e-465a-81f7-8ac278c7af63'
Oct 22 10:52:52 jobus ipsec_starter[21342]: Starting strongSwan 5.9.8 IPsec [starter]...
Oct 22 10:52:52 jobus ipsec_starter[21342]: Loading config setup
Oct 22 10:52:52 jobus ipsec_starter[21342]: Loading conn '3b6cd445-7c9e-465a-81f7-8ac278c7af63'
Oct 22 10:52:52 jobus ipsec_starter[21355]: Attempting to start charon...
Oct 22 10:52:52 jobus charon[21356]: 00[DMN] Starting IKE charon daemon (strongSwan 5.9.8, Linux 6.1.0-26-amd64, x86_64)
Oct 22 10:52:52 jobus charon[21356]: 00[CFG] PKCS11 module '<name>' lacks library path
Oct 22 10:52:52 jobus charon[21356]: 00[LIB] providers loaded by OpenSSL: legacy default
Oct 22 10:52:52 jobus charon[21356]: 00[CFG] loading ca certificates from '/etc/ipsec.d/cacerts'
Oct 22 10:52:52 jobus charon[21356]: 00[CFG] loading aa certificates from '/etc/ipsec.d/aacerts'
Oct 22 10:52:52 jobus charon[21356]: 00[CFG] loading ocsp signer certificates from '/etc/ipsec.d/ocspcerts'
Oct 22 10:52:52 jobus charon[21356]: 00[CFG] loading attribute certificates from '/etc/ipsec.d/acerts'
Oct 22 10:52:52 jobus charon[21356]: 00[CFG] loading crls from '/etc/ipsec.d/crls'
Oct 22 10:52:52 jobus charon[21356]: 00[CFG] loading secrets from '/etc/ipsec.secrets'
Oct 22 10:52:52 jobus charon[21356]: 00[CFG] loading secrets from '/etc/ipsec.d/ipsec.nm-l2tp.secrets'
Oct 22 10:52:52 jobus charon[21356]: 00[CFG] loaded IKE secret for %any
Oct 22 10:52:52 jobus charon[21356]: 00[CFG] loaded IKE secret for %any
Oct 22 10:52:52 jobus charon[21356]: 00[LIB] loaded plugins: charon test-vectors ldap pkcs11 tpm aesni aes rc2 sha2 sha1 md5 mgf1 rdrand random nonce x509 revocation constraints pubkey pkcs1 pkcs7 pkcs12 pgp dnskey sshkey pem openssl gcrypt pkcs8 af-alg fips-prf gmp curve25519 agent chapoly xcbc cmac hmac kdf ctr ccm gcm drbg curl attr kernel-netlink resolve socket-default connmark stroke vici updown eap-mschapv2 xauth-generic counters
Oct 22 10:52:52 jobus charon[21356]: 00[LIB] dropped capabilities, running as uid 0, gid 0
Oct 22 10:52:52 jobus charon[21356]: 00[JOB] spawning 16 worker threads
Oct 22 10:52:52 jobus ipsec_starter[21355]: charon (21356) started after 40 ms
Oct 22 10:52:52 jobus charon[21356]: 05[CFG] received stroke: add connection '3b6cd445-7c9e-465a-81f7-8ac278c7af63'
Oct 22 10:52:52 jobus charon[21356]: 05[CFG] added configuration '3b6cd445-7c9e-465a-81f7-8ac278c7af63'
Oct 22 10:52:53 jobus charon[21356]: 07[CFG] rereading secrets
Oct 22 10:52:53 jobus charon[21356]: 07[CFG] loading secrets from '/etc/ipsec.secrets'
Oct 22 10:52:53 jobus charon[21356]: 07[CFG] loading secrets from '/etc/ipsec.d/ipsec.nm-l2tp.secrets'
Oct 22 10:52:53 jobus charon[21356]: 07[CFG] loaded IKE secret for %any
Oct 22 10:52:53 jobus charon[21356]: 07[CFG] loaded IKE secret for %any
Oct 22 10:52:53 jobus charon[21356]: 10[CFG] received stroke: initiate '3b6cd445-7c9e-465a-81f7-8ac278c7af63'
Oct 22 10:52:53 jobus charon[21356]: 11[IKE] initiating Main Mode IKE_SA 3b6cd445-7c9e-465a-81f7-8ac278c7af63[1] to [SERVER_ADDRESS]
Oct 22 10:52:53 jobus charon[21356]: 11[IKE] initiating Main Mode IKE_SA 3b6cd445-7c9e-465a-81f7-8ac278c7af63[1] to [SERVER_ADDRESS]
Oct 22 10:52:53 jobus charon[21356]: 11[ENC] generating ID_PROT request 0 [ SA V V V V V ]
Oct 22 10:52:53 jobus charon[21356]: 11[NET] sending packet: from 192.168.68.122[500] to [SERVER_ADDRESS][500] (532 bytes)
Oct 22 10:52:53 jobus charon[21356]: 12[NET] received packet: from [SERVER_ADDRESS][500] to 192.168.68.122[500] (200 bytes)
Oct 22 10:52:53 jobus charon[21356]: 12[ENC] parsed ID_PROT response 0 [ SA V V V V ]
Oct 22 10:52:53 jobus charon[21356]: 12[IKE] received XAuth vendor ID
Oct 22 10:52:53 jobus charon[21356]: 12[IKE] received draft-ietf-ipsec-nat-t-ike-02\n vendor ID
Oct 22 10:52:53 jobus charon[21356]: 12[IKE] received DPD vendor ID
Oct 22 10:52:53 jobus charon[21356]: 12[ENC] received unknown vendor ID: bf:c2:2e:98:56:ba:99:36:11:c1:1e:48:a6:d2:08:07:a9:5b:ed:b3:93:02:6a:49:e6:0f:ac:32:7b:b9:60:1b:56:6b:34:39:4d:54:49:75:4d:54:41:75:4d:79:42:43:54:6a:30:32:4f:54:51:35:4f:54:51:3d
Oct 22 10:52:53 jobus charon[21356]: 12[CFG] selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048
Oct 22 10:52:53 jobus charon[21356]: 12[ENC] generating ID_PROT request 0 [ KE No NAT-D NAT-D ]
Oct 22 10:52:53 jobus charon[21356]: 12[NET] sending packet: from 192.168.68.122[500] to [SERVER_ADDRESS][500] (396 bytes)
Oct 22 10:52:53 jobus charon[21356]: 13[NET] received packet: from [SERVER_ADDRESS][500] to 192.168.68.122[500] (372 bytes)
Oct 22 10:52:53 jobus charon[21356]: 13[ENC] parsed ID_PROT response 0 [ KE No NAT-D NAT-D ]
Oct 22 10:52:53 jobus charon[21356]: 13[IKE] local host is behind NAT, sending keep alives
Oct 22 10:52:53 jobus charon[21356]: 13[ENC] generating ID_PROT request 0 [ ID HASH ]
Oct 22 10:52:53 jobus charon[21356]: 13[NET] sending packet: from 192.168.68.122[4500] to [SERVER_ADDRESS][4500] (92 bytes)
Oct 22 10:52:57 jobus charon[21356]: 06[IKE] sending retransmit 1 of request message ID 0, seq 3
Oct 22 10:52:57 jobus charon[21356]: 06[NET] sending packet: from 192.168.68.122[4500] to [SERVER_ADDRESS][4500] (92 bytes)
Oct 22 10:52:57 jobus charon[21356]: 05[NET] received packet: from [SERVER_ADDRESS][4500] to 192.168.68.122[4500] (372 bytes)
Oct 22 10:52:57 jobus charon[21356]: 05[IKE] received retransmit of response with ID 0, but next request already sent
Oct 22 10:53:00 jobus NetworkManager[1317]: <warn> [1729565580.4007] vpn[0x559e56d3e3a0,3b6cd445-7c9e-465a-81f7-8ac278c7af63,"New vpn connection"]: failed to connect: 'Timeout was reached'
Oct 22 10:53:01 jobus charon[21356]: 08[NET] received packet: from [SERVER_ADDRESS][4500] to 192.168.68.122[4500] (372 bytes)
Oct 22 10:53:01 jobus charon[21356]: 08[IKE] received retransmit of response with ID 0, but next request already sent
Oct 22 10:53:04 jobus charon[21356]: 09[IKE] sending retransmit 2 of request message ID 0, seq 3
Oct 22 10:53:04 jobus charon[21356]: 09[NET] sending packet: from 192.168.68.122[4500] to [SERVER_ADDRESS][4500] (92 bytes)
Oct 22 10:53:05 jobus charon[21356]: 11[NET] received packet: from [SERVER_ADDRESS][4500] to 192.168.68.122[4500] (372 bytes)
Oct 22 10:53:05 jobus charon[21356]: 11[IKE] received retransmit of response with ID 0, but next request already sent
Oct 22 10:53:09 jobus NetworkManager[21411]: Stopping strongSwan IPsec...
Oct 22 10:53:09 jobus charon[21356]: 00[DMN] SIGINT received, shutting down
Oct 22 10:53:09 jobus charon[21356]: 00[IKE] destroying IKE_SA in state CONNECTING without notification
Oct 22 10:53:09 jobus NetworkManager[21386]: initiating Main Mode IKE_SA 3b6cd445-7c9e-465a-81f7-8ac278c7af63[1] to [SERVER_ADDRESS]
Oct 22 10:53:09 jobus NetworkManager[21386]: generating ID_PROT request 0 [ SA V V V V V ]
Oct 22 10:53:09 jobus NetworkManager[21386]: sending packet: from 192.168.68.122[500] to [SERVER_ADDRESS][500] (532 bytes)
Oct 22 10:53:09 jobus NetworkManager[21386]: received packet: from [SERVER_ADDRESS][500] to 192.168.68.122[500] (200 bytes)
Oct 22 10:53:09 jobus NetworkManager[21386]: parsed ID_PROT response 0 [ SA V V V V ]
Oct 22 10:53:09 jobus NetworkManager[21386]: received XAuth vendor ID
Oct 22 10:53:09 jobus NetworkManager[21386]: received draft-ietf-ipsec-nat-t-ike-02\n vendor ID
Oct 22 10:53:09 jobus NetworkManager[21386]: received DPD vendor ID
Oct 22 10:53:09 jobus NetworkManager[21386]: received unknown vendor ID: bf:c2:2e:98:56:ba:99:36:11:c1:1e:48:a6:d2:08:07:a9:5b:ed:b3:93:02:6a:49:e6:0f:ac:32:7b:b9:60:1b:56:6b:34:39:4d:54:49:75:4d:54:41:75:4d:79:42:43:54:6a:30:32:4f:54:51:35:4f:54:51:3d
Oct 22 10:53:09 jobus NetworkManager[21386]: selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048
Oct 22 10:53:09 jobus NetworkManager[21386]: generating ID_PROT request 0 [ KE No NAT-D NAT-D ]
Oct 22 10:53:09 jobus NetworkManager[21386]: sending packet: from 192.168.68.122[500] to [SERVER_ADDRESS][500] (396 bytes)
Oct 22 10:53:09 jobus NetworkManager[21386]: received packet: from [SERVER_ADDRESS][500] to 192.168.68.122[500] (372 bytes)
Oct 22 10:53:09 jobus NetworkManager[21386]: parsed ID_PROT response 0 [ KE No NAT-D NAT-D ]
Oct 22 10:53:09 jobus NetworkManager[21386]: local host is behind NAT, sending keep alives
Oct 22 10:53:09 jobus NetworkManager[21386]: generating ID_PROT request 0 [ ID HASH ]
Oct 22 10:53:09 jobus NetworkManager[21386]: sending packet: from 192.168.68.122[4500] to [SERVER_ADDRESS][4500] (92 bytes)
Oct 22 10:53:09 jobus NetworkManager[21386]: sending retransmit 1 of request message ID 0, seq 3
Oct 22 10:53:09 jobus NetworkManager[21386]: sending packet: from 192.168.68.122[4500] to [SERVER_ADDRESS][4500] (92 bytes)
Oct 22 10:53:09 jobus NetworkManager[21386]: received packet: from [SERVER_ADDRESS][4500] to 192.168.68.122[4500] (372 bytes)
Oct 22 10:53:09 jobus NetworkManager[21386]: received retransmit of response with ID 0, but next request already sent
Oct 22 10:53:09 jobus NetworkManager[21386]: received packet: from [SERVER_ADDRESS][4500] to 192.168.68.122[4500] (372 bytes)
Oct 22 10:53:09 jobus NetworkManager[21386]: received retransmit of response with ID 0, but next request already sent
Oct 22 10:53:09 jobus NetworkManager[21386]: sending retransmit 2 of request message ID 0, seq 3
Oct 22 10:53:09 jobus NetworkManager[21386]: sending packet: from 192.168.68.122[4500] to [SERVER_ADDRESS][4500] (92 bytes)
Oct 22 10:53:09 jobus NetworkManager[21386]: received packet: from [SERVER_ADDRESS][4500] to 192.168.68.122[4500] (372 bytes)
Oct 22 10:53:09 jobus NetworkManager[21386]: received retransmit of response with ID 0, but next request already sent
Oct 22 10:53:09 jobus NetworkManager[21386]: destroying IKE_SA in state CONNECTING without notification
Oct 22 10:53:09 jobus NetworkManager[21386]: establishing connection '3b6cd445-7c9e-465a-81f7-8ac278c7af63' failed
Oct 22 10:53:09 jobus ipsec_starter[21355]: child 21356 (charon) has quit (exit code 0)
Oct 22 10:53:09 jobus ipsec_starter[21355]:
Oct 22 10:53:09 jobus ipsec_starter[21355]: charon stopped after 200 ms
Oct 22 10:53:09 jobus ipsec_starter[21355]: ipsec starter stopped
Oct 22 10:53:09 jobus nm-l2tp-service[21328]: Could not establish IPsec connection.
Oct 22 10:53:09 jobus nm-l2tp-service[21328]: g_dbus_method_invocation_take_error: assertion 'error != NULL' failed
I replaced the acutal server adress by [SERVER_ADDRESS].
Last edited: