Debug log here:
`nm-l2tp[31930] starting ipsec
Stopping strongSwan IPsec failed: starter is not running
Starting strongSwan 5.5.1 IPsec [starter]...
Loading config setup
Loading conn '5bda4c85-380c-4d5e-90da-e004398f2860'
found netkey IPsec stack
nm-l2tp[31930] Spawned ipsec up script with PID 32006.
initiating Main Mode IKE_SA 5bda4c85-380c-4d5e-90da-e004398f2860[1] to 37.17.31.92
generating ID_PROT request 0 [ SA V V V V V ]
sending packet: from MYIP[500] to SERVERIP[500] (236 bytes)
received packet: from SERVERIP[500] to MYIP[500] (156 bytes)
parsed ID_PROT response 0 [ SA V V V V ]
received NAT-T (RFC 3947) vendor ID
received XAuth vendor ID
received DPD vendor ID
received FRAGMENTATION vendor ID
generating ID_PROT request 0 [ KE No NAT-D NAT-D ]
sending packet: from MYIP[500] to SERVERIP[500] (244 bytes)
received packet: from SERVERIP[500] to MYIP[500] (236 bytes)
parsed ID_PROT response 0 [ KE No NAT-D NAT-D ]
generating ID_PROT request 0 [ ID HASH ]
sending packet: from MYIP[500] to SERVERIP[500] (68 bytes)
sending retransmit 1 of request message ID 0, seq 3
sending packet: from MYIP[500] to SERVERIP[500] (68 bytes)
nm-l2tp[31930] Timeout trying to establish IPsec connection
nm-l2tp[31930] Terminating ipsec script with PID 32006.
Stopping strongSwan IPsec...
destroying IKE_SA in state CONNECTING without notification
establishing connection '5bda4c85-380c-4d5e-90da-e004398f2860' failed
nm-l2tp[31930] Could not establish IPsec tunnel.
On server side message(mikrotik router): ipsec, error x.x.x.x parsing packet failed, possible cause: wrong password
It is possibly because wrong "Pre-shared key", but I rechecked it and password too.
On other devices(for example Win or Android) connection can be established.
Before latest update all works normally.
Debug log here: `nm-l2tp[31930] starting ipsec
Stopping strongSwan IPsec failed: starter is not running
Starting strongSwan 5.5.1 IPsec [starter]...
Loading config setup
Loading conn '5bda4c85-380c-4d5e-90da-e004398f2860'
found netkey IPsec stack
nm-l2tp[31930] Spawned ipsec up script with PID 32006.
initiating Main Mode IKE_SA 5bda4c85-380c-4d5e-90da-e004398f2860[1] to 37.17.31.92
generating ID_PROT request 0 [ SA V V V V V ]
sending packet: from MYIP[500] to SERVERIP[500] (236 bytes)
received packet: from SERVERIP[500] to MYIP[500] (156 bytes)
parsed ID_PROT response 0 [ SA V V V V ]
received NAT-T (RFC 3947) vendor ID
received XAuth vendor ID
received DPD vendor ID
received FRAGMENTATION vendor ID
generating ID_PROT request 0 [ KE No NAT-D NAT-D ]
sending packet: from MYIP[500] to SERVERIP[500] (244 bytes)
received packet: from SERVERIP[500] to MYIP[500] (236 bytes)
parsed ID_PROT response 0 [ KE No NAT-D NAT-D ]
generating ID_PROT request 0 [ ID HASH ]
sending packet: from MYIP[500] to SERVERIP[500] (68 bytes)
sending retransmit 1 of request message ID 0, seq 3
sending packet: from MYIP[500] to SERVERIP[500] (68 bytes)
nm-l2tp[31930] Timeout trying to establish IPsec connection
nm-l2tp[31930] Terminating ipsec script with PID 32006.
Stopping strongSwan IPsec...
destroying IKE_SA in state CONNECTING without notification
establishing connection '5bda4c85-380c-4d5e-90da-e004398f2860' failed
nm-l2tp[31930] Could not establish IPsec tunnel.
(nm-l2tp-service:31930): GLib-GIO-CRITICAL **: g_dbus_method_invocation_take_error: assertion 'error != NULL' failed`
On server side message(mikrotik router): ipsec, error x.x.x.x parsing packet failed, possible cause: wrong password It is possibly because wrong "Pre-shared key", but I rechecked it and password too. On other devices(for example Win or Android) connection can be established.