Quantcast
Channel: All SRX Services Gateway posts
Viewing all articles
Browse latest Browse all 17645

SRX650: IPsec VPN phase 1 down,and no-nat-traversal

$
0
0

Hi everyone :

 

Today, SRX650[12.1X46-D40.2] firewall configuration Qos and limit bandwidth for vpn. commit configuration, find,all vpn gateway state is down.rollback configuration, Main mode, vpn up.aggressive mode,vpn down.Configuration command "no-nat-traversal",aggressive mode,VPN returned to normal, but the business address is not. delete "no-nat-t",vpn down。

 

Qos configuration:

 

root@srx-01# show interfaces reth1 | display set 
set interfaces reth1 per-unit-scheduler
set interfaces reth1 unit 100 family inet filter output TRE
set interfaces reth1 unit 100 family inet address 100.100.100.1/24

set class-of-service virtual-channels TR-100m
set class-of-service virtual-channels IN-10m
set class-of-service virtual-channel-groups TRE TR-100m scheduler-map TR-100m
set class-of-service virtual-channel-groups TRE TR-100m shaping-rate 100m
set class-of-service virtual-channel-groups TRE IN-10m scheduler-map IN-10m
set class-of-service virtual-channel-groups TRE IN-10m shaping-rate 10m
set class-of-service virtual-channel-groups TRE IN-10m default
set class-of-service interfaces reth1 unit 100 virtual-channel-group TRE
set class-of-service interfaces reth1 unit 100 rewrite-rules inet-precedence default
set class-of-service scheduler-maps TR-100m forwarding-class expedited-forwarding scheduler TR-100m
set class-of-service scheduler-maps IN-10m forwarding-class assured-forwarding scheduler IN-10m
set class-of-service schedulers TR-100m shaping-rate 100m
set class-of-service schedulers IN-10m shaping-rate 10m

set firewall family inet filter TRE term 1 from destination-address 100.100.100.2/32
set firewall family inet filter TRE term 1 from protocol esp
set firewall family inet filter TRE term 1 then virtual-channel TR-100m
set firewall family inet filter TRE term 1 then accept
set firewall family inet filter TRE term 2 then virtual-channel IN-10m
set firewall family inet filter TRE term 2 then accept

 

 

    So far,VPN is normal, but the business address can not be normal communication,delete NAT-T.VPN will be interrupted, the tunnel interface down.Why ?

 

 

    show security flow session: In a session that is sent out, there is no incoming conversation.

    @EHK39C2D({35SN$5W6598C.png

 

.1. What is the connection between the aggressive mode and the NAT traversal?

 2. Qos affected the establishment of VPN? [Another site is normal, the same configuration]

 

When the NAT configuration is removed, the log is shown below:

 

 

  ike_st_o_private: Start
  Construction NHTB payload for  local:X.X.X.X, remote:X.X.X.X IKEv1 P1 SA index 11282220 sa-cfg VPN-Bank_GZNongShang
  Peer router vendor is not Juniper. Not sending NHTB payload for sa-cfg VPN-Bank_GZNongShang, p1_sa=11282220
  ike_policy_reply_private_payload_out: Start
  ike_st_o_encrypt: Marking encryption for packet
  ike_encode_packet: Start, SA = { 0x88d97030 3e707be3 - 34381a74 90e4160c } / 7e5ba586, nego = 0
  ike_finalize_qm_hash_1: Hash[0..20] = 3d16970e ee814f27 ...
  ike_send_packet: Start, send SA = { 88d97030 3e707be3 - 34381a74 90e4160c}, nego = 0, dst = X.X.X.X:4500,  routing table id = 0
  ike_retransmit_callback: Start, retransmit SA = { 88d97030 3e707be3 - 34381a74 90e4160c}, nego = 0
  ike_send_packet: Start, retransmit previous packet SA = { 88d97030 3e707be3 - 34381a74 90e4160c}, nego = 0, dst = X.X.X.X:4500 routing table id = 0
  ike_retransmit_callback: Start, retransmit SA = { 88d97030 3e707be3 - 34381a74 90e4160c}, nego = 0
  ike_send_packet: Start, retransmit previous packet SA = { 88d97030 3e707be3 - 34381a74 90e4160c}, nego = 0, dst = X.X.X.X:4500 routing table id = 0
  ike_retransmit_callback: Start, retransmit SA = { 88d97030 3e707be3 - 34381a74 90e4160c}, nego = 0
  ike_send_packet: Start, retransmit previous packet SA = { 88d97030 3e707be3 - 34381a74 90e4160c}, nego = 0, dst = X.X.X.X:4500 routing table id = 0
  ike_retransmit_callback: Start, retransmit SA = { 88d97030 3e707be3 - 34381a74 90e4160c}, nego = 0
  ike_send_packet: Start, retransmit previous packet SA = { 88d97030 3e707be3 - 34381a74 90e4160c}, nego = 0, dst = X.X.X.X:4500 routing table id = 0
  ike_retransmit_callback: Start, retransmit SA = { 88d97030 3e707be3 - 34381a74 90e4160c}, nego = 0
  ike_send_packet: Start, retransmit previous packet SA = { 88d97030 3e707be3 - 34381a74 90e4160c}, nego = 0, dst = X.X.X.X:4500 routing table id = 0
  ike_retransmit_callback: Start, retransmit SA = { 88d97030 3e707be3 - 34381a74 90e4160c}, nego = 0
  ike_retransmit_callback: Isakmp query retry limit reached, deleting<none>:500 (Initiator) <-> X.X.X.X:4500 { 88d97030 3e707be3 - 34381a74 90e4160c [0] / 0x7e5ba586 } QM; Error = Timeout (8197)
  ike_send_notify: Private notification, do not send notification
  ike_delete_negotiation: Start, SA = { 88d97030 3e707be3 - 34381a74 90e4160c}, nego = 0
  ike_free_negotiation_qm: Start, nego = 0
  ike_free_negotiation: Start, nego = 0
  ike_free_id_payload: Start, id type = 4
  ike_free_id_payload: Start, id type = 1
  IPSec negotiation failed for SA-CFG VPN-Bank_GZNongShang for local:X.X.X.X, remote:X.X.X.X IKEv1. status: Timed out
     P2 ed info: flags 0x8c2, P2 error: Error ok
  iked_pm_check_p2_failure_num: Phase2 failed 1/3 times for P1 SA 11282220
    IKEv1 Error : Timeout
  ssh_ike_connect: Start, remote_name = X.X.X.X:500, xchg = 4, flags = 00040000
  ike_sa_allocate: Start, SA = { ff57fda1 10f2c29c - 00000000 00000000 }
  ike_init_isakmp_sa: Start, remote = X.X.X.X:500, initiator = 1
  ssh_ike_connect: SA = { ff57fda1 10f2c29c - 00000000 00000000}, nego = -1

   thanks very much !

 


Viewing all articles
Browse latest Browse all 17645

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>