Hello,
Apologies. Yes, main mode would also work. Here is a config from the lab and is validated to be working fine.
Setup: SRX1 (1.1.1.1) ---- SRX2 --- (2.2.2.2) SRX3 (NAT) --- SRX4 (with priv IP)
SRX4 config - policy based (in your case the SRX):
===================================================
set security ike policy SRX1Ike mode main
set security ike policy SRX1Ike proposal-set compatible
set security ike policy SRX1Ike pre-shared-key ascii-text "pre-shared-key"
set security ike gateway SRX1_gateway ike-policy SRX1Ike
set security ike gateway SRX1_gateway address 1.1.1.1
set security ike gateway SRX1_gateway local-identity inet 2.2.2.2
set security ike gateway SRX1_gateway external-interface ge-0/0/0.0
set security ipsec policy SRX1Ipsec proposal-set compatible
set security ipsec vpn SRX1_vpn ike gateway SRX1_gateway
set security ipsec vpn SRX1_vpn ike proxy-identity local 192.168.10.0/24
set security ipsec vpn SRX1_vpn ike proxy-identity remote 192.168.20.0/24
set security ipsec vpn SRX1_vpn ike ipsec-policy SRX1Ipsec
set security ipsec vpn SRX1_vpn establish-tunnels immediately
set security policies from-zone trust to-zone untrust policy permit-trust-to-untrust match source-address 192.168.10.0/24
set security policies from-zone trust to-zone untrust policy permit-trust-to-untrust match destination-address 192.168.20.0/24
set security policies from-zone trust to-zone untrust policy permit-trust-to-untrust match application any
set security policies from-zone trust to-zone untrust policy permit-trust-to-untrust then permit tunnel ipsec-vpn SRX1_vpn
SRX1 config - route based (in your case the ASA):
====================================================
set security ike policy SRX4Ike mode main
set security ike policy SRX4Ike proposal-set compatible
set security ike policy SRX4Ike pre-shared-key ascii-text "pre-shared-key"
set security ike gateway SRX4_gateway ike-policy SRX4Ike
set security ike gateway SRX4_gateway address 2.2.2.2
set security ike gateway SRX4_gateway external-interface lo0.27
set security ipsec policy SRX4Ipsec proposal-set compatible
set security ipsec vpn SRX4_vpn bind-interface st0.103
set security ipsec vpn SRX4_vpn ike gateway SRX4_gateway
set security ipsec vpn SRX4_vpn ike ipsec-policy SRX4Ipsec
set security ipsec vpn SRX4_vpn establish-tunnels immediately
set security zones security-zone SRX4_Internet screen standard-screens
set security zones security-zone SRX4_Internet host-inbound-traffic system-services ping
set security zones security-zone SRX4_Internet host-inbound-traffic system-services traceroute
set security zones security-zone SRX4_Internet host-inbound-traffic system-services ike
set security zones security-zone SRX4_Internet interfaces reth0.0
set security zones security-zone SRX4_Internet interfaces lo0.27 host-inbound-traffic system-services ping
set security zones security-zone SRX4_Internet interfaces lo0.27 host-inbound-traffic system-services traceroute
set security zones security-zone SRX4_Internet interfaces lo0.27 host-inbound-traffic system-services ike
set security zones security-zone SRX4_vpn interfaces st0.103
set security policies from-zone SRX4_Internet to-zone SRX4_Internet policy permit-all match source-address any
set security policies from-zone SRX4_Internet to-zone SRX4_Internet policy permit-all match destination-address any
set security policies from-zone SRX4_Internet to-zone SRX4_Internet policy permit-all match application junos-ike
set security policies from-zone SRX4_Internet to-zone SRX4_Internet policy permit-all match application junos-ike-nat
set security policies from-zone SRX4_Internet to-zone SRX4_Internet policy permit-all match application esp
set security policies from-zone SRX4_Internet to-zone SRX4_Internet policy permit-all then permit
I hope this helps. Regards,
Vikas
CFTS-Security