diff --git a/data/templates/accel-ppp/l2tp.config.j2 b/data/templates/accel-ppp/l2tp.config.j2
index 5914fd375..a2f9c9fc7 100644
--- a/data/templates/accel-ppp/l2tp.config.j2
+++ b/data/templates/accel-ppp/l2tp.config.j2
@@ -1,164 +1,167 @@
 ### generated by accel_l2tp.py ###
 [modules]
 log_syslog
 l2tp
 chap-secrets
 {% for proto in auth_proto %}
 {{ proto }}
 {% endfor %}
 
 {% if auth_mode == 'radius' %}
 radius
 {% endif %}
 
 ippool
 shaper
 ipv6pool
 ipv6_nd
 ipv6_dhcp
 
 [core]
 thread-count={{ thread_cnt }}
 
 [log]
 syslog=accel-l2tp,daemon
 copy=1
 level=5
 
 {% if dnsv4 %}
 [dns]
 {%     for dns in dnsv4 %}
 dns{{ loop.index }}={{ dns }}
 {%     endfor %}
 {% endif %}
 
 {% if dnsv6 %}
 [ipv6-dns]
 {%     for dns in dnsv6 %}
 {{ dns }}
 {%     endfor %}
 {% endif %}
 
 {% if wins %}
 [wins]
 {%     for server in wins %}
 wins{{ loop.index }}={{ server }}
 {%     endfor %}
 {% endif %}
 
 [l2tp]
 verbose=1
 ifname=l2tp%d
 ppp-max-mtu={{ mtu }}
 mppe={{ ppp_mppe }}
 {% if outside_addr %}
 bind={{ outside_addr }}
 {% endif %}
 {% if lns_shared_secret %}
 secret={{ lns_shared_secret }}
 {% endif %}
 {% if lns_host_name %}
 host-name={{ lns_host_name }}
 {% endif %}
 
 [client-ip-range]
 0.0.0.0/0
 
 {% if client_ip_pool or client_ip_subnets %}
 [ip-pool]
 {%     if client_ip_pool %}
 {{ client_ip_pool }}
 {%     endif %}
 {%     if client_ip_subnets %}
 {%         for sn in client_ip_subnets %}
 {{ sn }}
 {%         endfor %}
 {%     endif %}
 {% endif %}
 {% if gateway_address %}
 gw-ip-address={{ gateway_address }}
 {% endif %}
 
 {% if auth_mode == 'local' %}
 [chap-secrets]
 chap-secrets={{ chap_secrets_file }}
 {% elif auth_mode == 'radius' %}
 [radius]
 verbose=1
 {%     for r in radius_server %}
 server={{ r.server }},{{ r.key }},auth-port={{ r.port }},acct-port={{ r.acct_port }},req-limit=0,fail-time={{ r.fail_time }}
 {%     endfor %}
 {%     if radius_dynamic_author.server is vyos_defined %}
 dae-server={{ radius_dynamic_author.server }}:{{ radius_dynamic_author.port }},{{ radius_dynamic_author.key }}
 {%     endif %}
+{%     if radius_acct_interim_interval is vyos_defined %}
+acct-interim-interval={{ radius_acct_interim_interval }}
+{%     endif %}
 {%     if radius_acct_inter_jitter %}
 acct-interim-jitter={{ radius_acct_inter_jitter }}
 {%     endif %}
 acct-timeout={{ radius_acct_tmo }}
 timeout={{ radius_timeout }}
 max-try={{ radius_max_try }}
 {%     if radius_nas_id %}
 nas-identifier={{ radius_nas_id }}
 {%     endif %}
 {%     if radius_nas_ip %}
 nas-ip-address={{ radius_nas_ip }}
 {%     endif %}
 {%     if radius_source_address %}
 bind={{ radius_source_address }}
 {%     endif %}
 {% endif %}
 {% if gateway_address %}
 gw-ip-address={{ gateway_address }}
 {% endif %}
 
 [ppp]
 verbose=1
 check-ip=1
 single-session=replace
 lcp-echo-timeout={{ ppp_echo_timeout }}
 lcp-echo-interval={{ ppp_echo_interval }}
 lcp-echo-failure={{ ppp_echo_failure }}
 {% if ccp_disable %}
 ccp=0
 {% endif %}
 {% if ppp_ipv6 is vyos_defined %}
 ipv6={{ ppp_ipv6 }}
 {% else %}
 {{ 'ipv6=allow' if client_ipv6_pool_configured else '' }}
 {% endif %}
 {% if ppp_ipv6_intf_id is vyos_defined %}
 ipv6-intf-id={{ ppp_ipv6_intf_id }}
 {% endif %}
 {% if ppp_ipv6_peer_intf_id is vyos_defined %}
 ipv6-peer-intf-id={{ ppp_ipv6_peer_intf_id }}
 {% endif %}
 ipv6-accept-peer-intf-id={{ "1" if ppp_ipv6_accept_peer_intf_id else "0" }}
 
 {% if client_ipv6_pool %}
 [ipv6-pool]
 {%     for p in client_ipv6_pool %}
 {{ p.prefix }},{{ p.mask }}
 {%     endfor %}
 {%     for p in client_ipv6_delegate_prefix %}
 delegate={{ p.prefix }},{{ p.mask }}
 {%     endfor %}
 {% endif %}
 
 {% if client_ipv6_delegate_prefix %}
 [ipv6-dhcp]
 verbose=1
 {% endif %}
 
 {% if radius_shaper_attr %}
 [shaper]
 verbose=1
 attr={{ radius_shaper_attr }}
 {%     if radius_shaper_vendor %}
 vendor={{ radius_shaper_vendor }}
 {%     endif %}
 {% endif %}
 
 [cli]
 tcp=127.0.0.1:2004
 sessions-columns=ifname,username,calling-sid,ip,{{ ip6_column | join(',') }}{{ ',' if ip6_column }}rate-limit,type,comp,state,rx-bytes,tx-bytes,uptime
 
diff --git a/interface-definitions/include/accel-ppp/radius-accounting-interim-interval.xml.i b/interface-definitions/include/accel-ppp/radius-accounting-interim-interval.xml.i
new file mode 100644
index 000000000..311ef969c
--- /dev/null
+++ b/interface-definitions/include/accel-ppp/radius-accounting-interim-interval.xml.i
@@ -0,0 +1,15 @@
+<!-- include start from accel-ppp/radius-accounting-interim-interval.xml.i -->
+<leafNode name="accounting-interim-interval">
+  <properties>
+    <help>Interval in seconds to send accounting information</help>
+    <valueHelp>
+      <format>u32:1-3600</format>
+      <description>Interval in seconds to send accounting information</description>
+    </valueHelp>
+    <constraint>
+      <validator name="numeric" argument="--range 1-3600"/>
+    </constraint>
+    <constraintErrorMessage>Interval value must be between 1 and 3600 seconds</constraintErrorMessage>
+  </properties>
+</leafNode>
+<!-- include end -->
diff --git a/interface-definitions/vpn-l2tp.xml.in b/interface-definitions/vpn-l2tp.xml.in
index 6b64c5f5d..ec186cd23 100644
--- a/interface-definitions/vpn-l2tp.xml.in
+++ b/interface-definitions/vpn-l2tp.xml.in
@@ -1,259 +1,260 @@
 <?xml version="1.0"?>
 <interfaceDefinition>
   <node name="vpn">
     <children>
       <node name="l2tp" owner="${vyos_conf_scripts_dir}/vpn_l2tp.py">
         <properties>
           <help>L2TP Virtual Private Network (VPN)</help>
           <priority>902</priority>
         </properties>
         <children>
           <node name="remote-access">
             <properties>
               <help>Remote access L2TP VPN</help>
             </properties>
             <children>
               #include <include/accel-ppp/mtu-128-16384.xml.i>
               <leafNode name="outside-address">
                 <properties>
                   <help>External IP address to which VPN clients will connect</help>
                   <constraint>
                     <validator name="ipv4-address"/>
                   </constraint>
                 </properties>
               </leafNode>
               #include <include/accel-ppp/gateway-address.xml.i>
               #include <include/name-server-ipv4-ipv6.xml.i>
               <node name="lns">
                 <properties>
                   <help>L2TP Network Server (LNS)</help>
                 </properties>
                 <children>
                   <leafNode name="shared-secret">
                     <properties>
                       <help>Tunnel password used to authenticate the client (LAC)</help>
                     </properties>
                   </leafNode>
                   <leafNode name="host-name">
                     <properties>
                       <help>Sent to the client (LAC) in the Host-Name attribute</help>
                       <constraint>
                         <regex>[A-Za-z0-9][-.A-Za-z0-9]*[A-Za-z0-9]</regex>
                       </constraint>
                     </properties>
                   </leafNode>
                 </children>
               </node>
               <leafNode name="ccp-disable">
                 <properties>
                   <help>Disable Compression Control Protocol (CCP)</help>
                   <valueless />
                 </properties>
               </leafNode>
               <node name="ipsec-settings">
                 <properties>
                   <help>Internet Protocol Security (IPsec) for remote access L2TP VPN</help>
                 </properties>
                 <children>
                   <node name="authentication">
                     <properties>
                       <help>IPsec authentication settings</help>
                     </properties>
                     <children>
                       <leafNode name="mode">
                         <properties>
                           <help>Authentication mode for IPsec</help>
                           <valueHelp>
                             <format>pre-shared-secret</format>
                             <description>Use pre-shared secret for IPsec authentication</description>
                           </valueHelp>
                           <valueHelp>
                             <format>x509</format>
                             <description>Use X.509 certificate for IPsec authentication</description>
                           </valueHelp>
                           <constraint>
                             <regex>(pre-shared-secret|x509)</regex>
                           </constraint>
                           <completionHelp>
                             <list>pre-shared-secret x509</list>
                           </completionHelp>
                         </properties>
                       </leafNode>
                       #include <include/ipsec/authentication-pre-shared-secret.xml.i>
                       #include <include/ipsec/authentication-x509.xml.i>
                     </children>
                   </node>
                   <leafNode name="ike-lifetime">
                     <properties>
                       <help>IKE lifetime</help>
                       <valueHelp>
                         <format>u32:30-86400</format>
                         <description>IKE lifetime in seconds</description>
                       </valueHelp>
                       <constraint>
                         <validator name="numeric" argument="--range 30-86400"/>
                       </constraint>
                     </properties>
                     <defaultValue>3600</defaultValue>
                   </leafNode>
                    <leafNode name="lifetime">
                     <properties>
                       <help>ESP lifetime</help>
                       <valueHelp>
                         <format>u32:30-86400</format>
                         <description>IKE lifetime in seconds</description>
                       </valueHelp>
                       <constraint>
                         <validator name="numeric" argument="--range 30-86400"/>
                       </constraint>
                     </properties>
                     <defaultValue>3600</defaultValue>
                   </leafNode>
                   #include <include/ipsec/esp-group.xml.i>
                   #include <include/ipsec/ike-group.xml.i>
                 </children>
               </node>
               #include <include/accel-ppp/wins-server.xml.i>
               <node name="client-ip-pool">
                 <properties>
                   <help>Pool of client IP addresses (must be within a /24)</help>
                 </properties>
                 <children>
                   #include <include/accel-ppp/client-ip-pool-start-stop.xml.i>
                   #include <include/accel-ppp/client-ip-pool-subnet.xml.i>
                 </children>
               </node>
               #include <include/accel-ppp/client-ipv6-pool.xml.i>
               #include <include/generic-description.xml.i>
               #include <include/dhcp-interface.xml.i>
               <leafNode name="idle">
                 <properties>
                   <help>PPP idle timeout</help>
                   <valueHelp>
                     <format>u32:30-86400</format>
                     <description>PPP idle timeout in seconds</description>
                   </valueHelp>
                     <constraint>
                       <validator name="numeric" argument="--range 30-86400"/>
                     </constraint>
                 </properties>
               </leafNode>
               <node name="authentication">
                 <properties>
                   <help>Authentication for remote access L2TP VPN</help>
                 </properties>
                 <children>
                   <leafNode name="require">
                     <properties>
                       <help>Authentication protocol for remote access peer L2TP VPN</help>
                       <valueHelp>
                         <format>pap</format>
                         <description>Require the peer to authenticate itself using PAP [Password Authentication Protocol].</description>
                       </valueHelp>
                       <valueHelp>
                         <format>chap</format>
                         <description>Require the peer to authenticate itself using CHAP [Challenge Handshake Authentication Protocol].</description>
                       </valueHelp>
                       <valueHelp>
                         <format>mschap</format>
                         <description>Require the peer to authenticate itself using CHAP [Challenge Handshake Authentication Protocol].</description>
                       </valueHelp>
                       <valueHelp>
                         <format>mschap-v2</format>
                         <description>Require the peer to authenticate itself using MS-CHAPv2 [Microsoft Challenge Handshake Authentication Protocol, Version 2].</description>
                       </valueHelp>
                       <constraint>
                         <regex>(pap|chap|mschap|mschap-v2)</regex>
                       </constraint>
                       <completionHelp>
                         <list>pap chap mschap mschap-v2</list>
                       </completionHelp>
                       <multi />
                     </properties>
                   </leafNode>
                   #include <include/accel-ppp/ppp-mppe.xml.i>
                   #include <include/accel-ppp/auth-mode.xml.i>
                   #include <include/accel-ppp/auth-local-users.xml.i>
                   #include <include/radius-auth-server-ipv4.xml.i>
                   <node name="radius">
                     <children>
+                      #include <include/accel-ppp/radius-accounting-interim-interval.xml.i>
                       <tagNode name="server">
                         <children>
                           #include <include/accel-ppp/radius-additions-disable-accounting.xml.i>
                           <leafNode name="fail-time">
                             <properties>
                               <help>Mark server unavailable for N seconds on failure</help>
                               <valueHelp>
                                 <format>u32:0-600</format>
                                 <description>Fail time penalty</description>
                               </valueHelp>
                               <constraint>
                                 <validator name="numeric" argument="--range 0-600"/>
                               </constraint>
                               <constraintErrorMessage>Fail time must be between 0 and 600 seconds</constraintErrorMessage>
                             </properties>
                           </leafNode>
                         </children>
                       </tagNode>
                       <leafNode name="timeout">
                         <properties>
                           <help>Timeout to wait response from server (seconds)</help>
                         </properties>
                       </leafNode>
                       <leafNode name="acct-timeout">
                         <properties>
                           <help>Timeout to wait reply for Interim-Update packets</help>
                         </properties>
                       </leafNode>
                       <leafNode name="max-try">
                         <properties>
                           <help>Maximum number of tries to send Access-Request/Accounting-Request queries</help>
                         </properties>
                       </leafNode>
                       #include <include/radius-nas-identifier.xml.i>
                       #include <include/radius-nas-ip-address.xml.i>
                       <node name="dae-server">
                         <properties>
                           <help>IPv4 address and port to bind Dynamic Authorization Extension server (DM/CoA)</help>
                         </properties>
                         <children>
                           <leafNode name="ip-address">
                             <properties>
                               <help>IP address for Dynamic Authorization Extension server (DM/CoA)</help>
                             </properties>
                           </leafNode>
                           <leafNode name="port">
                             <properties>
                               <help>Port for Dynamic Authorization Extension server (DM/CoA)</help>
                             </properties>
                             <defaultValue>1700</defaultValue>
                           </leafNode>
                           <leafNode name="secret">
                             <properties>
                               <help>Secret for Dynamic Authorization Extension server (DM/CoA)</help>
                             </properties>
                           </leafNode>
                         </children>
                       </node>
                       #include <include/accel-ppp/radius-additions-rate-limit.xml.i>
                     </children>
                   </node>
                 </children>
               </node>
               <node name="ppp-options">
                 <properties>
                   <help>Advanced protocol options</help>
                 </properties>
                 <children>
                   #include <include/accel-ppp/lcp-echo-interval-failure.xml.i>
                   #include <include/accel-ppp/ppp-options-ipv6.xml.i>
                   #include <include/accel-ppp/ppp-options-ipv6-interface-id.xml.i>
                 </children>
               </node>
             </children>
           </node>
         </children>
       </node>
     </children>
   </node>
 </interfaceDefinition>
diff --git a/src/conf_mode/vpn_l2tp.py b/src/conf_mode/vpn_l2tp.py
index 65623c2b1..ffac3b023 100755
--- a/src/conf_mode/vpn_l2tp.py
+++ b/src/conf_mode/vpn_l2tp.py
@@ -1,426 +1,430 @@
 #!/usr/bin/env python3
 #
-# Copyright (C) 2019-2020 VyOS maintainers and contributors
+# Copyright (C) 2019-2023 VyOS maintainers and contributors
 #
 # This program is free software; you can redistribute it and/or modify
 # it under the terms of the GNU General Public License version 2 or later as
 # published by the Free Software Foundation.
 #
 # This program is distributed in the hope that it will be useful,
 # but WITHOUT ANY WARRANTY; without even the implied warranty of
 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
 # GNU General Public License for more details.
 #
 # You should have received a copy of the GNU General Public License
 # along with this program.  If not, see <http://www.gnu.org/licenses/>.
 
 import os
 import re
 
 from copy import deepcopy
 from stat import S_IRUSR, S_IWUSR, S_IRGRP
 from sys import exit
 
 from ipaddress import ip_network
 
 from vyos.config import Config
 from vyos.template import is_ipv4
 from vyos.template import render
 from vyos.util import call
 from vyos.util import get_half_cpus
 from vyos.util import check_port_availability
 from vyos.util import is_listen_port_bind_service
 from vyos import ConfigError
 
 from vyos import airbag
 airbag.enable()
 
 l2tp_conf = '/run/accel-pppd/l2tp.conf'
 l2tp_chap_secrets = '/run/accel-pppd/l2tp.chap-secrets'
 
 default_config_data = {
     'auth_mode': 'local',
     'auth_ppp_mppe': 'prefer',
     'auth_proto': ['auth_mschap_v2'],
     'chap_secrets_file': l2tp_chap_secrets, # used in Jinja2 template
     'client_ip_pool': None,
     'client_ip_subnets': [],
     'client_ipv6_pool': [],
     'client_ipv6_pool_configured': False,
     'client_ipv6_delegate_prefix': [],
     'dnsv4': [],
     'dnsv6': [],
     'gateway_address': '10.255.255.0',
     'local_users' : [],
     'mtu': '1436',
     'outside_addr': '',
     'ppp_mppe': 'prefer',
     'ppp_echo_failure' : '3',
     'ppp_echo_interval' : '30',
     'ppp_echo_timeout': '0',
     'ppp_ipv6_accept_peer_intf_id': False,
     'ppp_ipv6_intf_id': None,
     'ppp_ipv6_peer_intf_id': None,
     'radius_server': [],
     'radius_acct_inter_jitter': '',
+    'radius_acct_interim_interval': None,
     'radius_acct_tmo': '3',
     'radius_max_try': '3',
     'radius_timeout': '3',
     'radius_nas_id': '',
     'radius_nas_ip': '',
     'radius_source_address': '',
     'radius_shaper_attr': '',
     'radius_shaper_vendor': '',
     'radius_dynamic_author': {},
     'wins': [],
     'ip6_column': [],
     'thread_cnt': get_half_cpus()
 }
 
 def get_config(config=None):
     if config:
         conf = config
     else:
         conf = Config()
     base_path = ['vpn', 'l2tp', 'remote-access']
     if not conf.exists(base_path):
         return None
 
     conf.set_level(base_path)
     l2tp = deepcopy(default_config_data)
 
     ### general options ###
     if conf.exists(['name-server']):
         for name_server in conf.return_values(['name-server']):
             if is_ipv4(name_server):
                 l2tp['dnsv4'].append(name_server)
             else:
                 l2tp['dnsv6'].append(name_server)
 
     if conf.exists(['wins-server']):
         l2tp['wins'] = conf.return_values(['wins-server'])
 
     if conf.exists('outside-address'):
         l2tp['outside_addr'] = conf.return_value('outside-address')
 
     if conf.exists(['authentication', 'mode']):
         l2tp['auth_mode'] = conf.return_value(['authentication', 'mode'])
 
     if conf.exists(['authentication', 'require']):
         l2tp['auth_proto'] = []
         auth_mods = {
             'pap': 'auth_pap',
             'chap': 'auth_chap_md5',
             'mschap': 'auth_mschap_v1',
             'mschap-v2': 'auth_mschap_v2'
         }
 
         for proto in conf.return_values(['authentication', 'require']):
             l2tp['auth_proto'].append(auth_mods[proto])
 
     if conf.exists(['authentication', 'mppe']):
         l2tp['auth_ppp_mppe'] = conf.return_value(['authentication', 'mppe'])
 
     #
     # local auth
     if conf.exists(['authentication', 'local-users']):
         for username in conf.list_nodes(['authentication', 'local-users', 'username']):
             user = {
                 'name' : username,
                 'password' : '',
                 'state' : 'enabled',
                 'ip' : '*',
                 'upload' : None,
                 'download' : None
             }
 
             conf.set_level(base_path + ['authentication', 'local-users', 'username', username])
 
             if conf.exists(['password']):
                 user['password'] = conf.return_value(['password'])
 
             if conf.exists(['disable']):
                 user['state'] = 'disable'
 
             if conf.exists(['static-ip']):
                 user['ip'] = conf.return_value(['static-ip'])
 
             if conf.exists(['rate-limit', 'download']):
                 user['download'] = conf.return_value(['rate-limit', 'download'])
 
             if conf.exists(['rate-limit', 'upload']):
                 user['upload'] = conf.return_value(['rate-limit', 'upload'])
 
             l2tp['local_users'].append(user)
 
     #
     # RADIUS auth and settings
     conf.set_level(base_path + ['authentication', 'radius'])
     if conf.exists(['server']):
         for server in conf.list_nodes(['server']):
             radius = {
                 'server' : server,
                 'key' : '',
                 'fail_time' : 0,
                 'port' : '1812',
                 'acct_port' : '1813'
             }
 
             conf.set_level(base_path + ['authentication', 'radius', 'server', server])
 
             if conf.exists(['disable-accounting']):
                 radius['acct_port'] = '0'
 
             if conf.exists(['fail-time']):
                 radius['fail_time'] = conf.return_value(['fail-time'])
 
             if conf.exists(['port']):
                 radius['port'] = conf.return_value(['port'])
 
             if conf.exists(['acct-port']):
                 radius['acct_port'] = conf.return_value(['acct-port'])
 
             if conf.exists(['key']):
                 radius['key'] = conf.return_value(['key'])
 
             if not conf.exists(['disable']):
                 l2tp['radius_server'].append(radius)
 
         #
         # advanced radius-setting
         conf.set_level(base_path + ['authentication', 'radius'])
 
+        if conf.exists(['accounting-interim-interval']):
+            l2tp['radius_acct_interim_interval'] = conf.return_value(['accounting-interim-interval'])
+
         if conf.exists(['acct-interim-jitter']):
             l2tp['radius_acct_inter_jitter'] = conf.return_value(['acct-interim-jitter'])
 
         if conf.exists(['acct-timeout']):
             l2tp['radius_acct_tmo'] = conf.return_value(['acct-timeout'])
 
         if conf.exists(['max-try']):
             l2tp['radius_max_try'] = conf.return_value(['max-try'])
 
         if conf.exists(['timeout']):
             l2tp['radius_timeout'] = conf.return_value(['timeout'])
 
         if conf.exists(['nas-identifier']):
             l2tp['radius_nas_id'] = conf.return_value(['nas-identifier'])
 
         if conf.exists(['nas-ip-address']):
             l2tp['radius_nas_ip'] = conf.return_value(['nas-ip-address'])
 
         if conf.exists(['source-address']):
             l2tp['radius_source_address'] = conf.return_value(['source-address'])
 
         # Dynamic Authorization Extensions (DOA)/Change Of Authentication (COA)
         if conf.exists(['dae-server']):
             dae = {
                 'port' : '',
                 'server' : '',
                 'key' : ''
             }
 
             if conf.exists(['dae-server', 'ip-address']):
                 dae['server'] = conf.return_value(['dae-server', 'ip-address'])
 
             if conf.exists(['dae-server', 'port']):
                 dae['port'] = conf.return_value(['dae-server', 'port'])
 
             if conf.exists(['dae-server', 'secret']):
                 dae['key'] = conf.return_value(['dae-server', 'secret'])
 
             l2tp['radius_dynamic_author'] = dae
 
         if conf.exists(['rate-limit', 'enable']):
             l2tp['radius_shaper_attr'] = 'Filter-Id'
             c_attr = ['rate-limit', 'enable', 'attribute']
             if conf.exists(c_attr):
                 l2tp['radius_shaper_attr'] = conf.return_value(c_attr)
 
             c_vendor = ['rate-limit', 'enable', 'vendor']
             if conf.exists(c_vendor):
                 l2tp['radius_shaper_vendor'] = conf.return_value(c_vendor)
 
     conf.set_level(base_path)
     if conf.exists(['client-ip-pool']):
         if conf.exists(['client-ip-pool', 'start']) and conf.exists(['client-ip-pool', 'stop']):
             start = conf.return_value(['client-ip-pool', 'start'])
             stop  = conf.return_value(['client-ip-pool', 'stop'])
             l2tp['client_ip_pool'] = start + '-' + re.search('[0-9]+$', stop).group(0)
 
     if conf.exists(['client-ip-pool', 'subnet']):
         l2tp['client_ip_subnets'] = conf.return_values(['client-ip-pool', 'subnet'])
 
     if conf.exists(['client-ipv6-pool', 'prefix']):
         l2tp['client_ipv6_pool_configured'] = True
         l2tp['ip6_column'].append('ip6')
         for prefix in conf.list_nodes(['client-ipv6-pool', 'prefix']):
             tmp = {
                 'prefix': prefix,
                 'mask': '64'
             }
 
             if conf.exists(['client-ipv6-pool', 'prefix', prefix, 'mask']):
                 tmp['mask'] = conf.return_value(['client-ipv6-pool', 'prefix', prefix, 'mask'])
 
             l2tp['client_ipv6_pool'].append(tmp)
 
     if conf.exists(['client-ipv6-pool', 'delegate']):
         l2tp['ip6_column'].append('ip6-db')
         for prefix in conf.list_nodes(['client-ipv6-pool', 'delegate']):
             tmp = {
                 'prefix': prefix,
                 'mask': ''
             }
 
             if conf.exists(['client-ipv6-pool', 'delegate', prefix, 'delegation-prefix']):
                 tmp['mask'] = conf.return_value(['client-ipv6-pool', 'delegate', prefix, 'delegation-prefix'])
 
             l2tp['client_ipv6_delegate_prefix'].append(tmp)
 
     if conf.exists(['mtu']):
         l2tp['mtu'] = conf.return_value(['mtu'])
 
     # gateway address
     if conf.exists(['gateway-address']):
         l2tp['gateway_address'] = conf.return_value(['gateway-address'])
     else:
         # calculate gw-ip-address
         if conf.exists(['client-ip-pool', 'start']):
             # use start ip as gw-ip-address
             l2tp['gateway_address'] = conf.return_value(['client-ip-pool', 'start'])
 
         elif conf.exists(['client-ip-pool', 'subnet']):
             # use first ip address from first defined pool
             subnet = conf.return_values(['client-ip-pool', 'subnet'])[0]
             subnet = ip_network(subnet)
             l2tp['gateway_address'] = str(list(subnet.hosts())[0])
 
     # LNS secret
     if conf.exists(['lns', 'shared-secret']):
         l2tp['lns_shared_secret'] = conf.return_value(['lns', 'shared-secret'])
     if conf.exists(['lns', 'host-name']):
         l2tp['lns_host_name'] = conf.return_value(['lns', 'host-name'])
 
     if conf.exists(['ccp-disable']):
         l2tp['ccp_disable'] = True
 
     # PPP options
     if conf.exists(['idle']):
         l2tp['ppp_echo_timeout'] = conf.return_value(['idle'])
 
     if conf.exists(['ppp-options', 'lcp-echo-failure']):
         l2tp['ppp_echo_failure'] = conf.return_value(['ppp-options', 'lcp-echo-failure'])
 
     if conf.exists(['ppp-options', 'lcp-echo-interval']):
         l2tp['ppp_echo_interval'] = conf.return_value(['ppp-options', 'lcp-echo-interval'])
 
     if conf.exists(['ppp-options', 'ipv6']):
         l2tp['ppp_ipv6'] = conf.return_value(['ppp-options', 'ipv6'])
 
     if conf.exists(['ppp-options', 'ipv6-accept-peer-intf-id']):
         l2tp['ppp_ipv6_accept_peer_intf_id'] = True
 
     if conf.exists(['ppp-options', 'ipv6-intf-id']):
         l2tp['ppp_ipv6_intf_id'] = conf.return_value(['ppp-options', 'ipv6-intf-id'])
 
     if conf.exists(['ppp-options', 'ipv6-peer-intf-id']):
         l2tp['ppp_ipv6_peer_intf_id'] = conf.return_value(['ppp-options', 'ipv6-peer-intf-id'])
 
     return l2tp
 
 
 def verify(l2tp):
     if not l2tp:
         return None
 
     if l2tp['auth_mode'] == 'local':
         if not l2tp['local_users']:
             raise ConfigError('L2TP local auth mode requires local users to be configured!')
 
         for user in l2tp['local_users']:
             if not user['password']:
                 raise ConfigError(f"Password required for user {user['name']}")
 
     elif l2tp['auth_mode'] == 'radius':
         if len(l2tp['radius_server']) == 0:
             raise ConfigError("RADIUS authentication requires at least one server")
 
         for radius in l2tp['radius_server']:
             if not radius['key']:
                 raise ConfigError(f"Missing RADIUS secret for server { radius['key'] }")
 
         if l2tp['radius_dynamic_author']:
             if not l2tp['radius_dynamic_author']['server']:
                 raise ConfigError("Missing ip-address for dae-server")
             if not l2tp['radius_dynamic_author']['key']:
                 raise ConfigError("Missing secret for dae-server")
             address = l2tp['radius_dynamic_author']['server']
             port = l2tp['radius_dynamic_author']['port']
             proto = 'tcp'
             # check if dae listen port is not used by another service
             if check_port_availability(address, int(port), proto) is not True and \
                 not is_listen_port_bind_service(int(port), 'accel-pppd'):
                 raise ConfigError(f'"{proto}" port "{port}" is used by another service')
 
     # check for the existence of a client ip pool
     if not (l2tp['client_ip_pool'] or l2tp['client_ip_subnets']):
         raise ConfigError(
             "set vpn l2tp remote-access client-ip-pool requires subnet or start/stop IP pool")
 
     # check ipv6
     if l2tp['client_ipv6_delegate_prefix'] and not l2tp['client_ipv6_pool']:
         raise ConfigError('IPv6 prefix delegation requires client-ipv6-pool prefix')
 
     for prefix in l2tp['client_ipv6_delegate_prefix']:
         if not prefix['mask']:
             raise ConfigError('Delegation-prefix required for individual delegated networks')
 
     if len(l2tp['wins']) > 2:
         raise ConfigError('Not more then two IPv4 WINS name-servers can be configured')
 
     if len(l2tp['dnsv4']) > 2:
         raise ConfigError('Not more then two IPv4 DNS name-servers can be configured')
 
     if len(l2tp['dnsv6']) > 3:
         raise ConfigError('Not more then three IPv6 DNS name-servers can be configured')
 
     return None
 
 
 def generate(l2tp):
     if not l2tp:
         return None
 
     render(l2tp_conf, 'accel-ppp/l2tp.config.j2', l2tp)
 
     if l2tp['auth_mode'] == 'local':
         render(l2tp_chap_secrets, 'accel-ppp/chap-secrets.j2', l2tp)
         os.chmod(l2tp_chap_secrets, S_IRUSR | S_IWUSR | S_IRGRP)
 
     else:
         if os.path.exists(l2tp_chap_secrets):
              os.unlink(l2tp_chap_secrets)
 
     return None
 
 
 def apply(l2tp):
     if not l2tp:
         call('systemctl stop accel-ppp@l2tp.service')
         for file in [l2tp_chap_secrets, l2tp_conf]:
             if os.path.exists(file):
                 os.unlink(file)
 
         return None
 
     call('systemctl restart accel-ppp@l2tp.service')
 
 if __name__ == '__main__':
     try:
         c = get_config()
         verify(c)
         generate(c)
         apply(c)
     except ConfigError as e:
         print(e)
         exit(1)