Quantcast
Channel: All SRX Services Gateway posts
Viewing all articles
Browse latest Browse all 17645

cisco asa to juniper srx vpn site to site not working !!!!

$
0
0

good eveninig 

 

i need some help in setting up vpn tunnel between srx and asa ike in juniper wont came up at all and give me this log message 



[Jan 22 20:56:15]10.10.10.38:500 (Initiator) <-> 40.40.219.2:500 { 96603848 9e448113 - 01d26445 ef56e0b7 [-1] / 0x00000000 } IP; MESSAGE: Phase 1 version = 1.0, auth_method = Pre shared keys, cipher = 3des-cbc, hash = sha1, prf = hmac-sh
[Jan 22 20:56:15]ike_send_notify: Connected, SA = { 96603848 9e448113 - 01d26445 ef56e0b7}, nego = -1
[Jan 22 20:56:15]iked_pm_ike_sa_done: local:10.10.10.38, remote:40.40.219.2 IKEv1
[Jan 22 20:56:15]IKE negotiation done for local:10.10.10.38, remote:40.40.219.2 IKEv1 with status: Error ok
[Jan 22 20:56:15]ssh_ike_connect_ipsec: Start, remote_name = :500, flags = 00000000
[Jan 22 20:56:15]ssh_ike_connect_ipsec: SA = { 96603848 9e448113 - 01d26445 ef56e0b7}, nego = 0
[Jan 22 20:56:15]ike_st_o_qm_hash_1: Start
[Jan 22 20:56:15]ike_st_o_qm_sa_proposals: Start
[Jan 22 20:56:15]ike_st_o_qm_nonce: Start
[Jan 22 20:56:15]ike_policy_reply_qm_nonce_data_len: Start
[Jan 22 20:56:15]ike_st_o_qm_optional_ke: Start
[Jan 22 20:56:15]ike_st_o_qm_optional_ids: Start
[Jan 22 20:56:15]ike_st_qm_optional_id: Start
[Jan 22 20:56:15]ike_st_qm_optional_id: Start
[Jan 22 20:56:15]ike_st_o_private: Start
[Jan 22 20:56:15]Construction NHTB payload for local:10.10.10.38, remote:40.40.219.2 IKEv1 P1 SA index 7584821 sa-cfg GT-ncb-ipsec-vpn_t10
[Jan 22 20:56:15]Peer router vendor is not Juniper. Not sending NHTB payload for sa-cfg GT-ncb-ipsec-vpn_t10, p1_sa=7584821
[Jan 22 20:56:15]ike_policy_reply_private_payload_out: Start
[Jan 22 20:56:15]ike_st_o_encrypt: Marking encryption for packet
[Jan 22 20:56:15]ike_finalize_qm_hash_1: Hash[0..20] = aa0aa4fd b125ac6f ...
[Jan 22 20:56:15]ike_send_packet: <-------- sending SA = { 96603848 9e448113 - 01d26445 ef56e0b7}, len = 156, nego = 0, local ip= 10.10.10.38, dst = 40.40.219.2:500, routing table id = 0
[Jan 22 20:56:16]---------> Received from 40.40.219.2:500 to 10.10.10.38:0, VR 0, length 196 on IF
[Jan 22 20:56:16]---------> Received from 40.40.219.2:500 to 10.10.10.38:0, VR 0, length 84 on IF
[Jan 22 20:56:16]ike_sa_find: Found SA = { 96603848 9e448113 - 01d26445 ef56e0b7 }
[Jan 22 20:56:16]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[Jan 22 20:56:16]ike_get_sa: Start, SA = { 96603848 9e448113 - 01d26445 ef56e0b7 } / c3f5e9b9, remote = 40.40.219.2:500
[Jan 22 20:56:16]ike_sa_find: Found SA = { 96603848 9e448113 - 01d26445 ef56e0b7 }
[Jan 22 20:56:16]ike_st_o_done: ISAKMP SA negotiation done
[Jan 22 20:56:16]ike_send_notify: Connected, SA = { 96603848 9e448113 - 01d26445 ef56e0b7}, nego = -1
[Jan 22 20:56:16]ike_st_i_encrypt: Check that packet was encrypted succeeded
[Jan 22 20:56:16]ike_st_i_gen_hash: Start, hash[0..20] = 7f2926e2 5db829c8 ...
[Jan 22 20:56:16]ike_st_i_n: Start, doi = 1, protocol = 3, code = Invalid ID information (18), spi[0..4] = 00000000 00000000 ..., data[0..128] = 01000018 aa0aa4fd ...
[Jan 22 20:56:16]Authenticated Phase-2 notification `Invalid ID information' (18) (size 128 bytes) from 40.40.219.2 for protocol ESP spi[0...4]=00 00 00 00 causes IKE SA deletion and QM abort
[Jan 22 20:56:16]ike_st_i_private: Start
[Jan 22 20:56:16]ike_send_notify: Connected, SA = { 96603848 9e448113 - 01d26445 ef56e0b7}, nego = 1
[Jan 22 20:56:16]ikev2_packet_st_input_v1_get_sa: Checking if unauthenticated IKEv1 notify is for an IKEv2 SA
[Jan 22 20:56:16]ikev2_packet_st_input_v1_create_sa: [113e800/0] No IKE SA for packet; requesting permission to create one.
[Jan 22 20:56:16]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[Jan 22 20:56:16]ike_get_sa: Start, SA = { 96603848 9e448113 - 01d26445 ef56e0b7 } / 7bc1b92a, remote = 40.40.219.2:500
[Jan 22 20:56:16]ike_sa_find_half: Not found half SA = { 96603848 9e448113 - 00000000 00000000 }
[Jan 22 20:56:16]ike_get_sa: Invalid cookie, no sa found, SA = { 96603848 9e448113 - 01d26445 ef56e0b7 } / 7bc1b92a, remote = 40.40.219.2:500
[Jan 22 20:56:16]unknown (unknown) <-> unknown { unknown [unknown] / unknown } unknown; Packet to unknown Isakmp SA, ip = 40.40.219.2:500
[Jan 22 20:56:16]ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
[Jan 22 20:56:16]ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
[Jan 22 20:56:16]ike_sa_delete: Start, SA = { 96603848 9e448113 - 01d26445 ef56e0b7 }
[Jan 22 20:56:16]IKE SA delete called for p1 sa 7584821 (ref cnt 2) local:10.10.10.38, remote:40.40.219.2, IKEv1
[Jan 22 20:56:16]P1 SA 7584821 reference count is not zero (1). Delaying deletion of SA
[Jan 22 20:56:16]iked_pm_p1_sa_destroy: p1 sa 7584821 (ref cnt 0), waiting_for_del 0x10b1420
[Jan 22 20:56:16]iked_deferred_free_inactive_peer_entry: Free 1 peer_entry(s)

 

and this is juniper configuration

root@bbb-dahra-ly# show |display set |no-more
set version 12.3X48-D35.7
set system host-name bbb-dahra-ly
set system root-authentication encrypted-password "$1$1tBoYfRI$ZdOtY2ggiMhZFmaZnDro301"
set system name-server 8.8.8.8
set system name-server 8.8.4.4
set system login class ssh idle-timeout 60
set system services ssh
set system services web-management https system-generated-certificate
set system syslog file kmd-logs daemon info
set chassis alarm ethernet link-down ignore
set security ike traceoptions file vpnloog
set security ike traceoptions file size 10m
set security ike traceoptions file files 2
set security ike traceoptions file world-readable
set security ike traceoptions flag all
set security ike proposal bbb-visa authentication-method pre-shared-keys
set security ike proposal bbb-visa dh-group group2
set security ike proposal bbb-visa authentication-algorithm sha1
set security ike proposal bbb-visa encryption-algorithm 3des-cbc
set security ike proposal bbb-visa lifetime-seconds 86400
set security ike policy bbb-visa-policy mode main
set security ike policy bbb-visa-policy proposals bbb-visa
set security ike policy bbb-visa-policy pre-shared-key ascii-text "$9$DrHm5F3/At0zF1EhSleWLdxdVYaZD.mTN-qf"
set security ike gateway bbb-visa-gw ike-policy bbb-visa-policy
set security ike gateway bbb-visa-gw address 40.40.219.2
set security ike gateway bbb-visa-gw dead-peer-detection interval 10
set security ike gateway bbb-visa-gw dead-peer-detection threshold 5
set security ike gateway bbb-visa-gw external-interface ge-0/0/0
set security ike gateway bbb-visa-gw general-ikeid
set security ipsec traceoptions flag all
set security ipsec proposal bbb-ipsec-prop protocol esp
set security ipsec proposal bbb-ipsec-prop authentication-algorithm hmac-sha1-96
set security ipsec proposal bbb-ipsec-prop encryption-algorithm 3des-cbc
set security ipsec proposal bbb-ipsec-prop lifetime-seconds 86400
set security ipsec policy bbb-ipsec-pol proposals bbb-ipsec-prop
set security ipsec vpn bbb-ipsec-vpn bind-interface st0.0
set security ipsec vpn bbb-ipsec-vpn ike gateway bbb-visa-gw
set security ipsec vpn bbb-ipsec-vpn ike ipsec-policy bbb-ipsec-pol
set security ipsec vpn bbb-ipsec-vpn traffic-selector t1 local-ip 30.30.30.0/24
set security ipsec vpn bbb-ipsec-vpn traffic-selector t1 remote-ip 20.20.20.206/32
set security ipsec vpn bbb-ipsec-vpn traffic-selector t3 local-ip 30.30.30.0/24
set security ipsec vpn bbb-ipsec-vpn traffic-selector t3 remote-ip 20.20.20.207/32
set security ipsec vpn bbb-ipsec-vpn traffic-selector t4 local-ip 30.30.30.0/24
set security ipsec vpn bbb-ipsec-vpn traffic-selector t4 remote-ip 20.20.20.214/32
set security ipsec vpn bbb-ipsec-vpn traffic-selector t5 local-ip 30.30.30.0/24
set security ipsec vpn bbb-ipsec-vpn traffic-selector t5 remote-ip 20.20.20.201/32
set security ipsec vpn bbb-ipsec-vpn traffic-selector t6 local-ip 30.30.30.0/24
set security ipsec vpn bbb-ipsec-vpn traffic-selector t6 remote-ip 20.20.20.202/32
set security ipsec vpn bbb-ipsec-vpn traffic-selector t7 local-ip 30.30.30.0/24
set security ipsec vpn bbb-ipsec-vpn traffic-selector t7 remote-ip 20.20.20.210/32
set security ipsec vpn bbb-ipsec-vpn traffic-selector t8 local-ip 30.30.30.0/24
set security ipsec vpn bbb-ipsec-vpn traffic-selector t8 remote-ip 20.20.20.211/32
set security ipsec vpn bbb-ipsec-vpn traffic-selector t9 local-ip 30.30.30.0/24
set security ipsec vpn bbb-ipsec-vpn traffic-selector t9 remote-ip 40.40.219.5/32
set security ipsec vpn bbb-ipsec-vpn traffic-selector t10 local-ip 30.30.30.0/24
set security ipsec vpn bbb-ipsec-vpn traffic-selector t10 remote-ip 40.40.219.20/32
set security ipsec vpn bbb-ipsec-vpn establish-tunnels immediately
set security address-book local address lan-1 30.30.30.0/24
set security address-book local attach zone trust
set security address-book remote address eyg-visa 20.20.20.0/24
set security address-book remote address visa-214 20.20.20.214/32
set security address-book remote address visa-211 20.20.20.211/32
set security address-book remote address visa-210 20.20.20.210/32
set security address-book remote address visa-202 20.20.20.202/32
set security address-book remote address visa-206 20.20.20.206/32
set security address-book remote address visa-207 20.20.20.207/32
set security address-book remote address visa-201 20.20.20.201/32
set security address-book remote address-set egypt-visa address visa-201
set security address-book remote address-set egypt-visa address visa-202
set security address-book remote address-set egypt-visa address visa-206
set security address-book remote address-set egypt-visa address visa-207
set security address-book remote address-set egypt-visa address visa-210
set security address-book remote address-set egypt-visa address visa-211
set security address-book remote address-set egypt-visa address visa-214
set security address-book remote attach zone untrust
set security flow traceoptions file trace-vpn
set security flow traceoptions file size 5m
set security flow traceoptions file files 20
set security flow traceoptions file world-readable
set security flow traceoptions flag basic-datapath
set security flow traceoptions flag all
set security flow traceoptions packet-filter to source-prefix 30.30.30.2/32
set security flow traceoptions packet-filter to destination-prefix 20.20.20.207/32
set security flow traceoptions packet-filter to destination-port 22
set security flow traceoptions packet-filter from source-prefix 20.20.20.206/32
set security flow traceoptions packet-filter from destination-prefix 30.30.30.2/32
set security flow traceoptions packet-filter from source-port 22
set security policies from-zone trust to-zone untrust policy local-to-remote match source-address lan-1
set security policies from-zone trust to-zone untrust policy local-to-remote match destination-address egypt-visa
set security policies from-zone trust to-zone untrust policy local-to-remote match application any
set security policies from-zone trust to-zone untrust policy local-to-remote then permit
set security policies from-zone untrust to-zone trust policy remote-to-local match source-address egypt-visa
set security policies from-zone untrust to-zone trust policy remote-to-local match destination-address lan-1
set security policies from-zone untrust to-zone trust policy remote-to-local match application any
set security policies from-zone untrust to-zone trust policy remote-to-local then permit
set security traceoptions file vpnloog
set security traceoptions file size 10m
set security traceoptions file files 2
set security traceoptions file world-readable
set security traceoptions flag all
set security zones security-zone trust host-inbound-traffic system-services all
set security zones security-zone trust host-inbound-traffic protocols all
set security zones security-zone trust interfaces ge-0/0/1.0
set security zones security-zone trust interfaces lo0.0
set security zones security-zone untrust host-inbound-traffic system-services all
set security zones security-zone untrust host-inbound-traffic protocols all
set security zones security-zone untrust interfaces ge-0/0/0.0
set security zones security-zone untrust interfaces st0.0
set interfaces ge-0/0/0 unit 0 family inet address 10.10.10.38/29
set interfaces ge-0/0/1 unit 0 family inet address 30.30.30.1/24
set interfaces ge-0/0/15 unit 0 family inet address 192.168.4.1/24
set interfaces lo0 unit 0 family inet address 30.30.30.2/24
set interfaces st0 description vpn-tunnel
set interfaces st0 unit 0 family inet mtu 1500
set routing-options static route 0.0.0.0/0 next-hop 10.10.10.1
set routing-options static route 20.20.20.206/32 next-hop st0.0
set routing-options static route 20.20.20.201/32 next-hop st0.0
set routing-options static route 20.20.20.202/32 next-hop st0.0
set routing-options static route 20.20.20.207/32 next-hop st0.0
set routing-options static route 20.20.20.210/32 next-hop st0.0
set routing-options static route 20.20.20.211/32 next-hop st0.0
set routing-options static route 20.20.20.214/32 next-hop st0.0
set routing-options static route 20.20.20.221/32 next-hop st0.0
set routing-options static route 40.40.219.5/32 next-hop st0.0
set routing-options static route 40.40.219.20/32 next-hop st0.0

 


Viewing all articles
Browse latest Browse all 17645

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>