[j-nsp] SRX IPSEC VPN dynamic-to-static
Mauritz Lewies
mauritz at three6five.com
Fri Feb 18 05:12:59 EST 2011
Thanks
I followed that as well and no luck....
Can you see anything glaringly wrong?
----------------------Head Office--------------------------
ike {
traceoptions {
file IKE-TEST-2;
flag all;
}
proposal ONEPLAN {
authentication-method pre-shared-keys;
dh-group group5;
authentication-algorithm md5;
encryption-algorithm des-cbc;
}
policy ONEPLAN {
mode aggressive;
proposal ONEPLAN;
pre-shared-key ascii-text "$9$y0/K87ZGifT3jHqfTQ9CuO1hlM8Lx"; ## SECRET-DATA
}
gateway ONEPLAN {
ike-policy ONEPLAN;
dynamic hostname openplan-srx-1.oneplan.co.za;
dead-peer-detection;
nat-keepalive 10;
external-interface ge-0/0/0.0;
}
}
ipsec {
proposal ONEPLAN {
protocol esp;
authentication-algorithm hmac-md5-96;
}
policy ONEPLAN {
perfect-forward-secrecy {
keys group5;
}
proposals ONEPLAN;
}
vpn ONEPLAN {
ike {
gateway ONEPLAN;
proxy-identity {
local 192.168.16.0/24;
remote 192.168.1.0/24;
}
ipsec-policy ONEPLAN;
}
establish-tunnels on-traffic;
}
}
-----------------------------------------------------------------
------------------Remote Site-----------------------------
ike {
traceoptions {
file ike-test;
flag all;
}
proposal ipsec-ctn-jhb {
description oneplan-jhb;
authentication-method pre-shared-keys;
dh-group group5;
authentication-algorithm md5;
encryption-algorithm des-cbc;
lifetime-seconds 1800;
}
policy ipsec-ctn-jhb {
mode aggressive;
description ipsec-ctn-jhb;
proposal ipsec-ctn-jhb;
pre-shared-key ascii-text "$9$l0yMX-UDkTz6HqmTzFAtO1RSK8XxN"; ## SECRET-DATA
}
gateway ipsec-ctn-jhb {
ike-policy ipsec-ctn-jhb;
address zzz.zzz.zzz.zzz;
dead-peer-detection;
nat-keepalive 10;
local-identity hostname openplan-srx-1.oneplan.co.za;
external-interface pp0.1;
}
}
ipsec {
proposal ipsec-ctn-jhb {
description ipsec-ctn-jhb;
protocol esp;
authentication-algorithm hmac-md5-96;
lifetime-kilobytes 1500;
}
policy ipsec-ctn-jhb {
perfect-forward-secrecy {
keys group5;
}
proposals ipsec-ctn-jhb;
}
vpn ipsec-ctn-jhb {
bind-interface st0.0;
ike {
gateway ipsec-ctn-jhb;
proxy-identity {
local 192.168.1.0/24;
remote 192.168.16.0/24;
}
ipsec-policy ipsec-ctn-jhb;
}
establish-tunnels immediately;
}
}
-----------------------------------------------------------------
The error in the Head Office logs:
----------------------------------------------------------------
Feb 18 12:05:44 Not doing MM check since initiator=FALSE and exch_type=4
Feb 18 12:05:44 Unable to find ike gateway as remote peer:196.215.zzz.zzz is not recognized.
Feb 18 12:05:44 KMD_PM_P1_POLICY_LOOKUP_FAILURE: Policy lookup for Phase-1 [responder] failed for p1_local=ipv4(any:0,[0..3]=10.0.0.10) p1_remote=fqdn(udp:500,[0..27]=openplan-srx-1.oneplan.co.za)
Feb 18 12:05:44 KMD_PM_P1_POLICY_LOOKUP_FAILURE: Policy lookup for Phase-1 [responder] failed for p1_local=ipv4(any:0,[0..3]=10.0.0.10) p1_remote=fqdn(udp:500,[0..27]=openplan-srx-1.oneplan.co.za)
Feb 18 12:05:44 ike_isakmp_sa_reply: Start
Feb 18 12:05:44 ike_st_i_nonce: Start, nonce[0..64] = 0ecbc9f8 fc1d422a ...
Feb 18 12:05:44 ike_st_i_cert: Start
Feb 18 12:05:44 ike_st_i_hash_key: Start, no key_hash
Feb 18 12:05:44 ike_st_i_ke: Ke[0..128] = 51ad806d 497efe51 ...
Feb 18 12:05:44 ike_st_i_cr: Start
Feb 18 12:05:44 ike_st_i_private: Start
Feb 18 12:05:44 ike_st_o_sa_values: Start
Feb 18 12:05:44 10.0.0.10:500 (Responder) <-> 196.215.zzz.zzz:500 { 4b6d2059 bf8ccb39 - 0bf91a18 ab9c5e4c [-1] / 0x00000000 } Aggr; Error = No proposal chosen (14)
------------------------------------------------------------
On 17 Feb 2011, at 4:41 PM, Kevin Vuong wrote:
> This should get you going in the right direction:
>
> http://forums.juniper.net/t5/SRX-Services-Gateway/Site-to-Site-Tunnel-Dynamic-Peer/td-p/33613
>
> -Kevin
>
>
>
> On Feb 17, 2011, at 8:28 AM, Mauritz Lewies wrote:
>
>> Hi
>>
>> For what ever reason I can't find documentation on this anywhere. (I'm just hoping my google-foo is lacking and that it's not an unsupported feature)
>>
>> I have 2 x SRX-210's, one with a static public IP and another behind a dynamic ADSL account.
>> I'm trying to get an IPSEC session established from the dynamic site to the static site.
>>
>> But I can't get a combination of config options to work.
>>
>> Does anyone know how to get this done or point me in the right direction?
>>
>> Kind Regards,
>>
>> Mauritz
>> _______________________________________________
>> juniper-nsp mailing list juniper-nsp at puck.nether.net
>> https://puck.nether.net/mailman/listinfo/juniper-nsp
>
Mauritz Lewies
email: mo at three6five.com
mobile: +27 83 647 4901
Skype Phone: +27 11 08 365 02
three6five network solutions
www.three6five.com
More information about the juniper-nsp
mailing list