Accessing a l2tp VPN

Hello Community,

I switched to Manjaro Linux several month ago and I’m really happy. I found already many helpful posts in the forum. But right now I face a problem I can’t figure out a solution.

I need to connect to my Universities VPN. They have a good support but use Ubuntu and have no ideas any more. Their network is using a Sophos UTM and the connection is a L2TP/IPsec. With Windows I have no problems.

I am running KDE/Plasma and want to use the GUI settings tool (plasma-nm). So I installed the following packages: strongswan, networkmanager-strongswan, and networkmanager-l2tp.

Configuring the connection is no problem. Before starting the setup of the new connection I made sure the strongswan service is active and running. But in the end I can’t connect (clicking the ‘Connect’ button in the networks list…).

The IT support hints to use older ciper suites in case there is no connection. But using older or newer ones doesn’t change anything.

I read through thiri’s post but couldn’t figure out whether this is related to my problem or not. Network is not a topic I’m very familiar with. My output of journalctl -b -u NetworkManager.service is:

Dez 15 17:24:10 stjerne-v110 NetworkManager[538]: <info>  [1608049450.2238] audit: op="statistics" arg="refresh-rate-ms" pid=1101 uid=1000 result="success"
Dez 15 17:24:11 stjerne-v110 NetworkManager[538]: <info>  [1608049451.8606] audit: op="statistics" arg="refresh-rate-ms" pid=1101 uid=1000 result="success"
Dez 15 17:24:15 stjerne-v110 NetworkManager[538]: <info>  [1608049455.9152] audit: op="statistics" arg="refresh-rate-ms" pid=1101 uid=1000 result="success"
Dez 15 17:24:21 stjerne-v110 NetworkManager[538]: <info>  [1608049461.4021] audit: op="connection-activate" uuid="07fb7f59-fdc5-49f4-88ab-a0a76f0e34a1" name="VPN Uni TR" pid=1101 uid=1000 result="success"
Dez 15 17:24:21 stjerne-v110 NetworkManager[538]: <info>  [1608049461.5316] vpn-connection[0x55f1738f6140,07fb7f59-fdc5-49f4-88ab-a0a76f0e34a1,"VPN Uni TR",0]: Started the VPN service, PID 18264
Dez 15 17:24:22 stjerne-v110 NetworkManager[538]: <info>  [1608049462.0176] vpn-connection[0x55f1738f6140,07fb7f59-fdc5-49f4-88ab-a0a76f0e34a1,"VPN Uni TR",0]: Saw the service appear; activating connection
Dez 15 17:24:22 stjerne-v110 nm-l2tp-service[18264]: Check port 1701
Dez 15 17:24:22 stjerne-v110 NetworkManager[18281]: Stopping strongSwan IPsec failed: starter is not running
Dez 15 17:24:24 stjerne-v110 NetworkManager[18278]: Starting strongSwan 5.9.1 IPsec [starter]...
Dez 15 17:24:24 stjerne-v110 NetworkManager[18278]: Loading config setup
Dez 15 17:24:24 stjerne-v110 NetworkManager[18278]: Loading conn '07fb7f59-fdc5-49f4-88ab-a0a76f0e34a1'
Dez 15 17:24:24 stjerne-v110 ipsec_starter[18278]: Starting strongSwan 5.9.1 IPsec [starter]...
Dez 15 17:24:24 stjerne-v110 ipsec_starter[18278]: Loading config setup
Dez 15 17:24:24 stjerne-v110 ipsec_starter[18278]: Loading conn '07fb7f59-fdc5-49f4-88ab-a0a76f0e34a1'
Dez 15 17:24:24 stjerne-v110 ipsec_starter[18291]: Attempting to start charon...
Dez 15 17:24:25 stjerne-v110 charon[18292]: 00[DMN] Starting IKE charon daemon (strongSwan 5.9.1, Linux 5.9.11-3-MANJARO, x86_64)
Dez 15 17:24:25 stjerne-v110 charon[18292]: 00[CFG] PKCS11 module '<name>' lacks library path
Dez 15 17:24:25 stjerne-v110 charon[18292]: 00[KNL] unable to create IPv4 routing table rule
Dez 15 17:24:25 stjerne-v110 charon[18292]: 00[KNL] unable to create IPv6 routing table rule
Dez 15 17:24:25 stjerne-v110 charon[18292]: 00[CFG] attr-sql plugin: database URI not set
Dez 15 17:24:25 stjerne-v110 charon[18292]: 00[NET] using forecast interface wlp2s0
Dez 15 17:24:25 stjerne-v110 charon[18292]: 00[CFG] joining forecast multicast groups: 224.0.0.1,224.0.0.22,224.0.0.251,224.0.0.252,239.255.255.250
Dez 15 17:24:25 stjerne-v110 charon[18292]: 00[CFG] loading ca certificates from '/etc/ipsec.d/cacerts'
Dez 15 17:24:25 stjerne-v110 charon[18292]: 00[CFG] loading aa certificates from '/etc/ipsec.d/aacerts'
Dez 15 17:24:25 stjerne-v110 charon[18292]: 00[CFG] loading ocsp signer certificates from '/etc/ipsec.d/ocspcerts'
Dez 15 17:24:25 stjerne-v110 charon[18292]: 00[CFG] loading attribute certificates from '/etc/ipsec.d/acerts'
Dez 15 17:24:25 stjerne-v110 charon[18292]: 00[CFG] loading crls from '/etc/ipsec.d/crls'
Dez 15 17:24:25 stjerne-v110 charon[18292]: 00[CFG] loading secrets from '/etc/ipsec.secrets'
Dez 15 17:24:25 stjerne-v110 charon[18292]: 00[CFG] loading secrets from '/etc/ipsec.d/ipsec.nm-l2tp.secrets'
Dez 15 17:24:25 stjerne-v110 charon[18292]: 00[CFG]   loaded IKE secret for %any
Dez 15 17:24:25 stjerne-v110 charon[18292]: 00[CFG] sql plugin: database URI not set
Dez 15 17:24:25 stjerne-v110 charon[18292]: 00[CFG] opening triplet file /etc/ipsec.d/triplets.dat failed: No such file or directory
Dez 15 17:24:25 stjerne-v110 charon[18292]: 00[CFG] loaded 0 RADIUS server configurations
Dez 15 17:24:25 stjerne-v110 charon[18292]: 00[CFG] HA config misses local/remote address
Dez 15 17:24:25 stjerne-v110 charon[18292]: 00[CFG] no script for ext-auth script defined, disabled
Dez 15 17:24:25 stjerne-v110 charon[18292]: 00[LIB] loaded plugins: charon ldap pkcs11 aesni aes des rc2 sha2 sha3 sha1 md5 mgf1 random nonce x509 revocation constraints pubkey pkcs1 pkcs7 pkcs8 pkcs12 pgp dnskey sshkey pem openssl fips-prf gmp curve25519 agent chapoly xcbc cmac hmac ntru drbg newhope bliss curl mysql sqlite attr kernel-netlink resolve socket-default bypass-lan connmark forecast farp stroke vici updown eap-identity eap-sim eap-aka eap-aka-3gpp2 eap-simaka-pseudonym eap-simaka-reauth eap-md5 eap-gtc eap-mschapv2 eap-dynamic eap-radius eap-tls eap-ttls eap-peap xauth-generic xauth-eap xauth-pam xauth-noauth dhcp radattr unity counters
Dez 15 17:24:25 stjerne-v110 charon[18292]: 00[LIB] dropped capabilities, running as uid 0, gid 0
Dez 15 17:24:25 stjerne-v110 charon[18292]: 00[JOB] spawning 16 worker threads
Dez 15 17:24:25 stjerne-v110 charon[18292]: 05[KNL] policy already exists, try to update it
Dez 15 17:24:25 stjerne-v110 charon[18292]: 05[KNL] policy already exists, try to update it
Dez 15 17:24:25 stjerne-v110 charon[18292]: 05[KNL] policy already exists, try to update it
Dez 15 17:24:25 stjerne-v110 charon[18292]: 05[IKE] installed bypass policy for 192.168.178.0/24
Dez 15 17:24:25 stjerne-v110 charon[18292]: 05[KNL] policy already exists, try to update it
Dez 15 17:24:25 stjerne-v110 charon[18292]: 05[KNL] policy already exists, try to update it
Dez 15 17:24:25 stjerne-v110 charon[18292]: 05[KNL] policy already exists, try to update it
Dez 15 17:24:25 stjerne-v110 charon[18292]: 05[IKE] installed bypass policy for ::1/128
Dez 15 17:24:25 stjerne-v110 charon[18292]: 05[KNL] policy already exists, try to update it
Dez 15 17:24:25 stjerne-v110 charon[18292]: 05[KNL] policy already exists, try to update it
Dez 15 17:24:25 stjerne-v110 charon[18292]: 05[KNL] policy already exists, try to update it
Dez 15 17:24:25 stjerne-v110 charon[18292]: 05[IKE] installed bypass policy for fe80::/64
Dez 15 17:24:25 stjerne-v110 ipsec_starter[18291]: charon (18292) started after 400 ms
Dez 15 17:24:25 stjerne-v110 charon[18292]: 08[CFG] received stroke: add connection '07fb7f59-fdc5-49f4-88ab-a0a76f0e34a1'
Dez 15 17:24:25 stjerne-v110 charon[18292]: 08[CFG] added configuration '07fb7f59-fdc5-49f4-88ab-a0a76f0e34a1'
Dez 15 17:24:25 stjerne-v110 charon[18292]: 10[CFG] rereading secrets
Dez 15 17:24:25 stjerne-v110 charon[18292]: 10[CFG] loading secrets from '/etc/ipsec.secrets'
Dez 15 17:24:25 stjerne-v110 charon[18292]: 10[CFG] loading secrets from '/etc/ipsec.d/ipsec.nm-l2tp.secrets'
Dez 15 17:24:25 stjerne-v110 charon[18292]: 10[CFG]   loaded IKE secret for %any
Dez 15 17:24:25 stjerne-v110 charon[18292]: 14[CFG] received stroke: initiate '07fb7f59-fdc5-49f4-88ab-a0a76f0e34a1'
Dez 15 17:24:25 stjerne-v110 charon[18292]: 12[IKE] initiating Main Mode IKE_SA 07fb7f59-fdc5-49f4-88ab-a0a76f0e34a1[1] to 136.199.224.10
Dez 15 17:24:25 stjerne-v110 charon[18292]: 12[IKE] initiating Main Mode IKE_SA 07fb7f59-fdc5-49f4-88ab-a0a76f0e34a1[1] to 136.199.224.10
Dez 15 17:24:25 stjerne-v110 charon[18292]: 12[ENC] generating ID_PROT request 0 [ SA V V V V V ]
Dez 15 17:24:25 stjerne-v110 charon[18292]: 12[NET] sending packet: from 192.168.178.44[500] to 136.199.224.10[500] (176 bytes)
Dez 15 17:24:26 stjerne-v110 charon[18292]: 01[NET] received packet: from 136.199.224.10[500] to 192.168.178.44[500] (172 bytes)
Dez 15 17:24:26 stjerne-v110 charon[18292]: 01[ENC] parsed ID_PROT response 0 [ SA V V V V V ]
Dez 15 17:24:26 stjerne-v110 charon[18292]: 01[IKE] received strongSwan vendor ID
Dez 15 17:24:26 stjerne-v110 charon[18292]: 01[IKE] received Cisco Unity vendor ID
Dez 15 17:24:26 stjerne-v110 charon[18292]: 01[IKE] received XAuth vendor ID
Dez 15 17:24:26 stjerne-v110 charon[18292]: 01[IKE] received DPD vendor ID
Dez 15 17:24:26 stjerne-v110 charon[18292]: 01[IKE] received NAT-T (RFC 3947) vendor ID
Dez 15 17:24:26 stjerne-v110 charon[18292]: 01[CFG] selected proposal: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
Dez 15 17:24:26 stjerne-v110 charon[18292]: 01[ENC] generating ID_PROT request 0 [ KE No NAT-D NAT-D ]
Dez 15 17:24:26 stjerne-v110 charon[18292]: 01[NET] sending packet: from 192.168.178.44[500] to 136.199.224.10[500] (244 bytes)
Dez 15 17:24:26 stjerne-v110 charon[18292]: 16[NET] received packet: from 136.199.224.10[500] to 192.168.178.44[500] (228 bytes)
Dez 15 17:24:26 stjerne-v110 charon[18292]: 16[ENC] parsed ID_PROT response 0 [ KE No NAT-D NAT-D ]
Dez 15 17:24:26 stjerne-v110 charon[18292]: 16[IKE] local host is behind NAT, sending keep alives
Dez 15 17:24:26 stjerne-v110 charon[18292]: 16[ENC] generating ID_PROT request 0 [ ID HASH ]
Dez 15 17:24:26 stjerne-v110 charon[18292]: 16[NET] sending packet: from 192.168.178.44[4500] to 136.199.224.10[4500] (68 bytes)
Dez 15 17:24:26 stjerne-v110 charon[18292]: 06[NET] received packet: from 136.199.224.10[4500] to 192.168.178.44[4500] (68 bytes)
Dez 15 17:24:26 stjerne-v110 charon[18292]: 06[ENC] parsed ID_PROT response 0 [ ID HASH ]
Dez 15 17:24:26 stjerne-v110 charon[18292]: 06[IKE] IKE_SA 07fb7f59-fdc5-49f4-88ab-a0a76f0e34a1[1] established between 192.168.178.44[192.168.178.44]...136.199.224.10[136.199.224.10]
Dez 15 17:24:26 stjerne-v110 charon[18292]: 06[IKE] IKE_SA 07fb7f59-fdc5-49f4-88ab-a0a76f0e34a1[1] established between 192.168.178.44[192.168.178.44]...136.199.224.10[136.199.224.10]
Dez 15 17:24:26 stjerne-v110 charon[18292]: 06[IKE] scheduling reauthentication in 10174s
Dez 15 17:24:26 stjerne-v110 charon[18292]: 06[IKE] maximum IKE_SA lifetime 10714s
Dez 15 17:24:26 stjerne-v110 charon[18292]: 06[ENC] generating QUICK_MODE request 3509527302 [ HASH SA No ID ID NAT-OA NAT-OA ]
Dez 15 17:24:26 stjerne-v110 charon[18292]: 06[NET] sending packet: from 192.168.178.44[4500] to 136.199.224.10[4500] (188 bytes)
Dez 15 17:24:26 stjerne-v110 charon[18292]: 07[NET] received packet: from 136.199.224.10[4500] to 192.168.178.44[4500] (148 bytes)
Dez 15 17:24:26 stjerne-v110 charon[18292]: 07[ENC] parsed QUICK_MODE response 3509527302 [ HASH SA No ID ID ]
Dez 15 17:24:26 stjerne-v110 charon[18292]: 07[CFG] selected proposal: ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ
Dez 15 17:24:26 stjerne-v110 charon[18292]: 07[IKE] no acceptable traffic selectors found
Dez 15 17:24:26 stjerne-v110 charon[18292]: 07[ENC] generating INFORMATIONAL_V1 request 1329429204 [ HASH N(NO_PROP) ]
Dez 15 17:24:26 stjerne-v110 charon[18292]: 07[NET] sending packet: from 192.168.178.44[4500] to 136.199.224.10[4500] (76 bytes)
Dez 15 17:24:26 stjerne-v110 NetworkManager[18323]: initiating Main Mode IKE_SA 07fb7f59-fdc5-49f4-88ab-a0a76f0e34a1[1] to 136.199.224.10
Dez 15 17:24:26 stjerne-v110 NetworkManager[18323]: generating ID_PROT request 0 [ SA V V V V V ]
Dez 15 17:24:26 stjerne-v110 NetworkManager[18323]: sending packet: from 192.168.178.44[500] to 136.199.224.10[500] (176 bytes)
Dez 15 17:24:26 stjerne-v110 NetworkManager[18323]: received packet: from 136.199.224.10[500] to 192.168.178.44[500] (172 bytes)
Dez 15 17:24:26 stjerne-v110 NetworkManager[18323]: parsed ID_PROT response 0 [ SA V V V V V ]
Dez 15 17:24:26 stjerne-v110 NetworkManager[18323]: received strongSwan vendor ID
Dez 15 17:24:26 stjerne-v110 NetworkManager[18323]: received Cisco Unity vendor ID
Dez 15 17:24:26 stjerne-v110 NetworkManager[18323]: received XAuth vendor ID
Dez 15 17:24:26 stjerne-v110 NetworkManager[18323]: received DPD vendor ID
Dez 15 17:24:26 stjerne-v110 NetworkManager[18323]: received NAT-T (RFC 3947) vendor ID
Dez 15 17:24:26 stjerne-v110 NetworkManager[18323]: selected proposal: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
Dez 15 17:24:26 stjerne-v110 NetworkManager[18323]: generating ID_PROT request 0 [ KE No NAT-D NAT-D ]
Dez 15 17:24:26 stjerne-v110 NetworkManager[18323]: sending packet: from 192.168.178.44[500] to 136.199.224.10[500] (244 bytes)
Dez 15 17:24:26 stjerne-v110 NetworkManager[18323]: received packet: from 136.199.224.10[500] to 192.168.178.44[500] (228 bytes)
Dez 15 17:24:26 stjerne-v110 NetworkManager[18323]: parsed ID_PROT response 0 [ KE No NAT-D NAT-D ]
Dez 15 17:24:26 stjerne-v110 NetworkManager[18323]: local host is behind NAT, sending keep alives
Dez 15 17:24:26 stjerne-v110 NetworkManager[18323]: generating ID_PROT request 0 [ ID HASH ]
Dez 15 17:24:26 stjerne-v110 NetworkManager[18323]: sending packet: from 192.168.178.44[4500] to 136.199.224.10[4500] (68 bytes)
Dez 15 17:24:26 stjerne-v110 NetworkManager[18323]: received packet: from 136.199.224.10[4500] to 192.168.178.44[4500] (68 bytes)
Dez 15 17:24:26 stjerne-v110 NetworkManager[18323]: parsed ID_PROT response 0 [ ID HASH ]
Dez 15 17:24:26 stjerne-v110 NetworkManager[18323]: IKE_SA 07fb7f59-fdc5-49f4-88ab-a0a76f0e34a1[1] established between 192.168.178.44[192.168.178.44]...136.199.224.10[136.199.224.10]
Dez 15 17:24:26 stjerne-v110 NetworkManager[18323]: scheduling reauthentication in 10174s
Dez 15 17:24:26 stjerne-v110 NetworkManager[18323]: maximum IKE_SA lifetime 10714s
Dez 15 17:24:26 stjerne-v110 NetworkManager[18323]: generating QUICK_MODE request 3509527302 [ HASH SA No ID ID NAT-OA NAT-OA ]
Dez 15 17:24:26 stjerne-v110 NetworkManager[18323]: sending packet: from 192.168.178.44[4500] to 136.199.224.10[4500] (188 bytes)
Dez 15 17:24:26 stjerne-v110 NetworkManager[18323]: received packet: from 136.199.224.10[4500] to 192.168.178.44[4500] (148 bytes)
Dez 15 17:24:26 stjerne-v110 NetworkManager[18323]: parsed QUICK_MODE response 3509527302 [ HASH SA No ID ID ]
Dez 15 17:24:26 stjerne-v110 NetworkManager[18323]: selected proposal: ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ
Dez 15 17:24:26 stjerne-v110 NetworkManager[18323]: no acceptable traffic selectors found
Dez 15 17:24:26 stjerne-v110 NetworkManager[18323]: establishing connection '07fb7f59-fdc5-49f4-88ab-a0a76f0e34a1' failed
Dez 15 17:24:26 stjerne-v110 nm-l2tp-service[18264]: xl2tpd started with pid 18329
Dez 15 17:24:26 stjerne-v110 NetworkManager[18329]: xl2tpd[18329]: Not looking for kernel SAref support.
Dez 15 17:24:26 stjerne-v110 NetworkManager[538]: <info>  [1608049466.2611] vpn-connection[0x55f1738f6140,07fb7f59-fdc5-49f4-88ab-a0a76f0e34a1,"VPN Uni TR",0]: VPN plugin: state changed: starting (3)
Dez 15 17:24:26 stjerne-v110 NetworkManager[18329]: xl2tpd[18329]: Using l2tp kernel support.
Dez 15 17:24:26 stjerne-v110 NetworkManager[18329]: xl2tpd[18329]: xl2tpd version xl2tpd-1.3.16 started on stjerne-v110 PID:18329
Dez 15 17:24:26 stjerne-v110 NetworkManager[18329]: xl2tpd[18329]: Written by Mark Spencer, Copyright (C) 1998, Adtran, Inc.
Dez 15 17:24:26 stjerne-v110 NetworkManager[18329]: xl2tpd[18329]: Forked by Scott Balmos and David Stipp, (C) 2001
Dez 15 17:24:26 stjerne-v110 NetworkManager[18329]: xl2tpd[18329]: Inherited by Jeff McAdams, (C) 2002
Dez 15 17:24:26 stjerne-v110 NetworkManager[18329]: xl2tpd[18329]: Forked again by Xelerance (www.xelerance.com) (C) 2006-2016
Dez 15 17:24:26 stjerne-v110 NetworkManager[18329]: xl2tpd[18329]: Listening on IP address 0.0.0.0, port 1701
Dez 15 17:24:26 stjerne-v110 NetworkManager[18329]: xl2tpd[18329]: Connecting to host 136.199.224.10, port 1701
Dez 15 17:24:35 stjerne-v110 charon[18292]: 12[NET] received packet: from 136.199.224.10[4500] to 192.168.178.44[4500] (148 bytes)
Dez 15 17:24:35 stjerne-v110 charon[18292]: 12[IKE] received retransmit of response with ID 3509527302, but next request already sent
Dez 15 17:24:40 stjerne-v110 NetworkManager[18329]: xl2tpd[18329]: death_handler: Fatal signal 15 received
Dez 15 17:24:40 stjerne-v110 NetworkManager[18329]: xl2tpd[18329]: Connection 0 closed to 136.199.224.10, port 1701 (Server closing)
Dez 15 17:24:40 stjerne-v110 NetworkManager[538]: <warn>  [1608049480.2742] vpn-connection[0x55f1738f6140,07fb7f59-fdc5-49f4-88ab-a0a76f0e34a1,"VPN Uni TR",0]: VPN plugin: failed: connect-failed (1)
Dez 15 17:24:40 stjerne-v110 charon[18292]: 00[DMN] SIGINT received, shutting down
Dez 15 17:24:40 stjerne-v110 NetworkManager[18357]: Stopping strongSwan IPsec...
Dez 15 17:24:40 stjerne-v110 NetworkManager[538]: <warn>  [1608049480.2743] vpn-connection[0x55f1738f6140,07fb7f59-fdc5-49f4-88ab-a0a76f0e34a1,"VPN Uni TR",0]: VPN plugin: failed: connect-failed (1)
Dez 15 17:24:40 stjerne-v110 charon[18292]: 00[IKE] deleting IKE_SA 07fb7f59-fdc5-49f4-88ab-a0a76f0e34a1[1] between 192.168.178.44[192.168.178.44]...136.199.224.10[136.199.224.10]
Dez 15 17:24:40 stjerne-v110 NetworkManager[538]: <info>  [1608049480.2744] vpn-connection[0x55f1738f6140,07fb7f59-fdc5-49f4-88ab-a0a76f0e34a1,"VPN Uni TR",0]: VPN plugin: state changed: stopping (5)
Dez 15 17:24:40 stjerne-v110 charon[18292]: 00[IKE] deleting IKE_SA 07fb7f59-fdc5-49f4-88ab-a0a76f0e34a1[1] between 192.168.178.44[192.168.178.44]...136.199.224.10[136.199.224.10]
Dez 15 17:24:40 stjerne-v110 charon[18292]: 00[IKE] sending DELETE for IKE_SA 07fb7f59-fdc5-49f4-88ab-a0a76f0e34a1[1]
Dez 15 17:24:40 stjerne-v110 charon[18292]: 00[ENC] generating INFORMATIONAL_V1 request 2680840131 [ HASH D ]
Dez 15 17:24:40 stjerne-v110 charon[18292]: 00[NET] sending packet: from 192.168.178.44[4500] to 136.199.224.10[4500] (84 bytes)
Dez 15 17:24:40 stjerne-v110 charon[18292]: 00[IKE] uninstalling bypass policy for 192.168.178.0/24
Dez 15 17:24:40 stjerne-v110 charon[18292]: 00[IKE] uninstalling bypass policy for ::1/128
Dez 15 17:24:40 stjerne-v110 charon[18292]: 00[IKE] uninstalling bypass policy for fe80::/64
Dez 15 17:24:40 stjerne-v110 nm-l2tp-service[18264]: ipsec shut down
Dez 15 17:24:40 stjerne-v110 NetworkManager[538]: <info>  [1608049480.5060] vpn-connection[0x55f1738f6140,07fb7f59-fdc5-49f4-88ab-a0a76f0e34a1,"VPN Uni TR",0]: VPN plugin: state changed: stopped (6)
Dez 15 17:24:40 stjerne-v110 NetworkManager[538]: <info>  [1608049480.5626] vpn-connection[0x55f1738f6140,07fb7f59-fdc5-49f4-88ab-a0a76f0e34a1,"VPN Uni TR",0]: VPN service disappeared
Dez 15 17:24:46 stjerne-v110 NetworkManager[538]: <info>  [1608049486.6875] audit: op="statistics" arg="refresh-rate-ms" pid=1101 uid=1000 result="success"

Many thanks in advance for hints and ideas :slight_smile:
:milky_way:

I have the same issue I am trying to resolve for a friend. As it seems from the log also from the same Uni.
I have tried to establish the connection from Manjare KDE and XFCE with the same result that no connection could be made.
I was able to access the VPN via mac, so I know the credentials are sound.

Hi deruji,

thank you for your reply.

It’s good to hear that on another unix based system things work. I can check it only with Windows 10, and - unfortunately - that’s the only solution I have so far. I would really like to solve this problem because I have to keep a Windows system running only for this task.

Regarding the above ‘no acceptable traffic selectors found’ error, see the following for a workaround :

The configuration should be very easy to adapt.
Packages that need to be present/installed are named similarly.
If they know how and what to do on Ubuntu, they should be able to describe the process.
They probably have a guide.
Do they?

From there it should be easy to figure things out.