good eveninig
i need some help in setting up vpn tunnel between srx and asa ike in juniper wont came up at all and give me this log message
[Jan 22 20:56:15]10.10.10.38:500 (Initiator) <-> 40.40.219.2:500 { 96603848 9e448113 - 01d26445 ef56e0b7 [-1] / 0x00000000 } IP; MESSAGE: Phase 1 version = 1.0, auth_method = Pre shared keys, cipher = 3des-cbc, hash = sha1, prf = hmac-sh
[Jan 22 20:56:15]ike_send_notify: Connected, SA = { 96603848 9e448113 - 01d26445 ef56e0b7}, nego = -1
[Jan 22 20:56:15]iked_pm_ike_sa_done: local:10.10.10.38, remote:40.40.219.2 IKEv1
[Jan 22 20:56:15]IKE negotiation done for local:10.10.10.38, remote:40.40.219.2 IKEv1 with status: Error ok
[Jan 22 20:56:15]ssh_ike_connect_ipsec: Start, remote_name = :500, flags = 00000000
[Jan 22 20:56:15]ssh_ike_connect_ipsec: SA = { 96603848 9e448113 - 01d26445 ef56e0b7}, nego = 0
[Jan 22 20:56:15]ike_st_o_qm_hash_1: Start
[Jan 22 20:56:15]ike_st_o_qm_sa_proposals: Start
[Jan 22 20:56:15]ike_st_o_qm_nonce: Start
[Jan 22 20:56:15]ike_policy_reply_qm_nonce_data_len: Start
[Jan 22 20:56:15]ike_st_o_qm_optional_ke: Start
[Jan 22 20:56:15]ike_st_o_qm_optional_ids: Start
[Jan 22 20:56:15]ike_st_qm_optional_id: Start
[Jan 22 20:56:15]ike_st_qm_optional_id: Start
[Jan 22 20:56:15]ike_st_o_private: Start
[Jan 22 20:56:15]Construction NHTB payload for local:10.10.10.38, remote:40.40.219.2 IKEv1 P1 SA index 7584821 sa-cfg GT-ncb-ipsec-vpn_t10
[Jan 22 20:56:15]Peer router vendor is not Juniper. Not sending NHTB payload for sa-cfg GT-ncb-ipsec-vpn_t10, p1_sa=7584821
[Jan 22 20:56:15]ike_policy_reply_private_payload_out: Start
[Jan 22 20:56:15]ike_st_o_encrypt: Marking encryption for packet
[Jan 22 20:56:15]ike_finalize_qm_hash_1: Hash[0..20] = aa0aa4fd b125ac6f ...
[Jan 22 20:56:15]ike_send_packet: <-------- sending SA = { 96603848 9e448113 - 01d26445 ef56e0b7}, len = 156, nego = 0, local ip= 10.10.10.38, dst = 40.40.219.2:500, routing table id = 0
[Jan 22 20:56:16]---------> Received from 40.40.219.2:500 to 10.10.10.38:0, VR 0, length 196 on IF
[Jan 22 20:56:16]---------> Received from 40.40.219.2:500 to 10.10.10.38:0, VR 0, length 84 on IF
[Jan 22 20:56:16]ike_sa_find: Found SA = { 96603848 9e448113 - 01d26445 ef56e0b7 }
[Jan 22 20:56:16]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[Jan 22 20:56:16]ike_get_sa: Start, SA = { 96603848 9e448113 - 01d26445 ef56e0b7 } / c3f5e9b9, remote = 40.40.219.2:500
[Jan 22 20:56:16]ike_sa_find: Found SA = { 96603848 9e448113 - 01d26445 ef56e0b7 }
[Jan 22 20:56:16]ike_st_o_done: ISAKMP SA negotiation done
[Jan 22 20:56:16]ike_send_notify: Connected, SA = { 96603848 9e448113 - 01d26445 ef56e0b7}, nego = -1
[Jan 22 20:56:16]ike_st_i_encrypt: Check that packet was encrypted succeeded
[Jan 22 20:56:16]ike_st_i_gen_hash: Start, hash[0..20] = 7f2926e2 5db829c8 ...
[Jan 22 20:56:16]ike_st_i_n: Start, doi = 1, protocol = 3, code = Invalid ID information (18), spi[0..4] = 00000000 00000000 ..., data[0..128] = 01000018 aa0aa4fd ...
[Jan 22 20:56:16]Authenticated Phase-2 notification `Invalid ID information' (18) (size 128 bytes) from 40.40.219.2 for protocol ESP spi[0...4]=00 00 00 00 causes IKE SA deletion and QM abort
[Jan 22 20:56:16]ike_st_i_private: Start
[Jan 22 20:56:16]ike_send_notify: Connected, SA = { 96603848 9e448113 - 01d26445 ef56e0b7}, nego = 1
[Jan 22 20:56:16]ikev2_packet_st_input_v1_get_sa: Checking if unauthenticated IKEv1 notify is for an IKEv2 SA
[Jan 22 20:56:16]ikev2_packet_st_input_v1_create_sa: [113e800/0] No IKE SA for packet; requesting permission to create one.
[Jan 22 20:56:16]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[Jan 22 20:56:16]ike_get_sa: Start, SA = { 96603848 9e448113 - 01d26445 ef56e0b7 } / 7bc1b92a, remote = 40.40.219.2:500
[Jan 22 20:56:16]ike_sa_find_half: Not found half SA = { 96603848 9e448113 - 00000000 00000000 }
[Jan 22 20:56:16]ike_get_sa: Invalid cookie, no sa found, SA = { 96603848 9e448113 - 01d26445 ef56e0b7 } / 7bc1b92a, remote = 40.40.219.2:500
[Jan 22 20:56:16]unknown (unknown) <-> unknown { unknown [unknown] / unknown } unknown; Packet to unknown Isakmp SA, ip = 40.40.219.2:500
[Jan 22 20:56:16]ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
[Jan 22 20:56:16]ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
[Jan 22 20:56:16]ike_sa_delete: Start, SA = { 96603848 9e448113 - 01d26445 ef56e0b7 }
[Jan 22 20:56:16]IKE SA delete called for p1 sa 7584821 (ref cnt 2) local:10.10.10.38, remote:40.40.219.2, IKEv1
[Jan 22 20:56:16]P1 SA 7584821 reference count is not zero (1). Delaying deletion of SA
[Jan 22 20:56:16]iked_pm_p1_sa_destroy: p1 sa 7584821 (ref cnt 0), waiting_for_del 0x10b1420
[Jan 22 20:56:16]iked_deferred_free_inactive_peer_entry: Free 1 peer_entry(s)
and this is juniper configuration
root@bbb-dahra-ly# show |display set |no-more set version 12.3X48-D35.7 set system host-name bbb-dahra-ly set system root-authentication encrypted-password "$1$1tBoYfRI$ZdOtY2ggiMhZFmaZnDro301" set system name-server 8.8.8.8 set system name-server 8.8.4.4 set system login class ssh idle-timeout 60 set system services ssh set system services web-management https system-generated-certificate set system syslog file kmd-logs daemon info set chassis alarm ethernet link-down ignore set security ike traceoptions file vpnloog set security ike traceoptions file size 10m set security ike traceoptions file files 2 set security ike traceoptions file world-readable set security ike traceoptions flag all set security ike proposal bbb-visa authentication-method pre-shared-keys set security ike proposal bbb-visa dh-group group2 set security ike proposal bbb-visa authentication-algorithm sha1 set security ike proposal bbb-visa encryption-algorithm 3des-cbc set security ike proposal bbb-visa lifetime-seconds 86400 set security ike policy bbb-visa-policy mode main set security ike policy bbb-visa-policy proposals bbb-visa set security ike policy bbb-visa-policy pre-shared-key ascii-text "$9$DrHm5F3/At0zF1EhSleWLdxdVYaZD.mTN-qf" set security ike gateway bbb-visa-gw ike-policy bbb-visa-policy set security ike gateway bbb-visa-gw address 40.40.219.2 set security ike gateway bbb-visa-gw dead-peer-detection interval 10 set security ike gateway bbb-visa-gw dead-peer-detection threshold 5 set security ike gateway bbb-visa-gw external-interface ge-0/0/0 set security ike gateway bbb-visa-gw general-ikeid set security ipsec traceoptions flag all set security ipsec proposal bbb-ipsec-prop protocol esp set security ipsec proposal bbb-ipsec-prop authentication-algorithm hmac-sha1-96 set security ipsec proposal bbb-ipsec-prop encryption-algorithm 3des-cbc set security ipsec proposal bbb-ipsec-prop lifetime-seconds 86400 set security ipsec policy bbb-ipsec-pol proposals bbb-ipsec-prop set security ipsec vpn bbb-ipsec-vpn bind-interface st0.0 set security ipsec vpn bbb-ipsec-vpn ike gateway bbb-visa-gw set security ipsec vpn bbb-ipsec-vpn ike ipsec-policy bbb-ipsec-pol set security ipsec vpn bbb-ipsec-vpn traffic-selector t1 local-ip 30.30.30.0/24 set security ipsec vpn bbb-ipsec-vpn traffic-selector t1 remote-ip 20.20.20.206/32 set security ipsec vpn bbb-ipsec-vpn traffic-selector t3 local-ip 30.30.30.0/24 set security ipsec vpn bbb-ipsec-vpn traffic-selector t3 remote-ip 20.20.20.207/32 set security ipsec vpn bbb-ipsec-vpn traffic-selector t4 local-ip 30.30.30.0/24 set security ipsec vpn bbb-ipsec-vpn traffic-selector t4 remote-ip 20.20.20.214/32 set security ipsec vpn bbb-ipsec-vpn traffic-selector t5 local-ip 30.30.30.0/24 set security ipsec vpn bbb-ipsec-vpn traffic-selector t5 remote-ip 20.20.20.201/32 set security ipsec vpn bbb-ipsec-vpn traffic-selector t6 local-ip 30.30.30.0/24 set security ipsec vpn bbb-ipsec-vpn traffic-selector t6 remote-ip 20.20.20.202/32 set security ipsec vpn bbb-ipsec-vpn traffic-selector t7 local-ip 30.30.30.0/24 set security ipsec vpn bbb-ipsec-vpn traffic-selector t7 remote-ip 20.20.20.210/32 set security ipsec vpn bbb-ipsec-vpn traffic-selector t8 local-ip 30.30.30.0/24 set security ipsec vpn bbb-ipsec-vpn traffic-selector t8 remote-ip 20.20.20.211/32 set security ipsec vpn bbb-ipsec-vpn traffic-selector t9 local-ip 30.30.30.0/24 set security ipsec vpn bbb-ipsec-vpn traffic-selector t9 remote-ip 40.40.219.5/32 set security ipsec vpn bbb-ipsec-vpn traffic-selector t10 local-ip 30.30.30.0/24 set security ipsec vpn bbb-ipsec-vpn traffic-selector t10 remote-ip 40.40.219.20/32 set security ipsec vpn bbb-ipsec-vpn establish-tunnels immediately set security address-book local address lan-1 30.30.30.0/24 set security address-book local attach zone trust set security address-book remote address eyg-visa 20.20.20.0/24 set security address-book remote address visa-214 20.20.20.214/32 set security address-book remote address visa-211 20.20.20.211/32 set security address-book remote address visa-210 20.20.20.210/32 set security address-book remote address visa-202 20.20.20.202/32 set security address-book remote address visa-206 20.20.20.206/32 set security address-book remote address visa-207 20.20.20.207/32 set security address-book remote address visa-201 20.20.20.201/32 set security address-book remote address-set egypt-visa address visa-201 set security address-book remote address-set egypt-visa address visa-202 set security address-book remote address-set egypt-visa address visa-206 set security address-book remote address-set egypt-visa address visa-207 set security address-book remote address-set egypt-visa address visa-210 set security address-book remote address-set egypt-visa address visa-211 set security address-book remote address-set egypt-visa address visa-214 set security address-book remote attach zone untrust set security flow traceoptions file trace-vpn set security flow traceoptions file size 5m set security flow traceoptions file files 20 set security flow traceoptions file world-readable set security flow traceoptions flag basic-datapath set security flow traceoptions flag all set security flow traceoptions packet-filter to source-prefix 30.30.30.2/32 set security flow traceoptions packet-filter to destination-prefix 20.20.20.207/32 set security flow traceoptions packet-filter to destination-port 22 set security flow traceoptions packet-filter from source-prefix 20.20.20.206/32 set security flow traceoptions packet-filter from destination-prefix 30.30.30.2/32 set security flow traceoptions packet-filter from source-port 22 set security policies from-zone trust to-zone untrust policy local-to-remote match source-address lan-1 set security policies from-zone trust to-zone untrust policy local-to-remote match destination-address egypt-visa set security policies from-zone trust to-zone untrust policy local-to-remote match application any set security policies from-zone trust to-zone untrust policy local-to-remote then permit set security policies from-zone untrust to-zone trust policy remote-to-local match source-address egypt-visa set security policies from-zone untrust to-zone trust policy remote-to-local match destination-address lan-1 set security policies from-zone untrust to-zone trust policy remote-to-local match application any set security policies from-zone untrust to-zone trust policy remote-to-local then permit set security traceoptions file vpnloog set security traceoptions file size 10m set security traceoptions file files 2 set security traceoptions file world-readable set security traceoptions flag all set security zones security-zone trust host-inbound-traffic system-services all set security zones security-zone trust host-inbound-traffic protocols all set security zones security-zone trust interfaces ge-0/0/1.0 set security zones security-zone trust interfaces lo0.0 set security zones security-zone untrust host-inbound-traffic system-services all set security zones security-zone untrust host-inbound-traffic protocols all set security zones security-zone untrust interfaces ge-0/0/0.0 set security zones security-zone untrust interfaces st0.0 set interfaces ge-0/0/0 unit 0 family inet address 10.10.10.38/29 set interfaces ge-0/0/1 unit 0 family inet address 30.30.30.1/24 set interfaces ge-0/0/15 unit 0 family inet address 192.168.4.1/24 set interfaces lo0 unit 0 family inet address 30.30.30.2/24 set interfaces st0 description vpn-tunnel set interfaces st0 unit 0 family inet mtu 1500 set routing-options static route 0.0.0.0/0 next-hop 10.10.10.1 set routing-options static route 20.20.20.206/32 next-hop st0.0 set routing-options static route 20.20.20.201/32 next-hop st0.0 set routing-options static route 20.20.20.202/32 next-hop st0.0 set routing-options static route 20.20.20.207/32 next-hop st0.0 set routing-options static route 20.20.20.210/32 next-hop st0.0 set routing-options static route 20.20.20.211/32 next-hop st0.0 set routing-options static route 20.20.20.214/32 next-hop st0.0 set routing-options static route 20.20.20.221/32 next-hop st0.0 set routing-options static route 40.40.219.5/32 next-hop st0.0 set routing-options static route 40.40.219.20/32 next-hop st0.0