[j-nsp] Tunnel failing at "No propsal chosen" but works when target is another device
Mattias Gyllenvarg
mattias at gyllenvarg.se
Mon Nov 25 05:53:28 EST 2013
Hi All
This is my first post to j-nsp, since this is my first encounter with
anything "advanced" on a juniper platform.
JTAC is working on this as well, but I am hoping for a snappy response from
the community.
The issue is a IPsec tunnel that will not establish with one device as the
HUB but works with a different device.
Spoke is SRX210 cluster
Hub is SRX240 cluster
Replacement Hub is a stand-alone SRX210
Junos is 12.1X44-D20.3 across the board.
Relevant config for HUB240
ike {
proposal <cleaned>-IKE-Proposal {
authentication-method rsa-signatures;
dh-group group2;
authentication-algorithm sha1;
encryption-algorithm aes-128-cbc;
}
policy <cleaned>-IKE-Policy {
mode aggressive;
proposals <cleaned>-IKE-Proposal;
certificate {
local-certificate XXXX-HUB;
}
}
gateway Euro-Hub {
ike-policy <cleaned>-IKE-Policy;
dynamic {
distinguished-name {
wildcard "O=<cleaned>";
}
}
dead-peer-detection {
always-send;
interval 10;
threshold 3;
}
local-identity distinguished-name;
external-interface reth1;
}
}
ipsec {
proposal <cleaned>-IPsec-Proposal {
protocol esp;
authentication-algorithm hmac-md5-96;
encryption-algorithm des-cbc;
}
policy <cleaned>-VPN-Policy {
perfect-forward-secrecy {
keys group14;
}
proposals <cleaned>-IPsec-Proposal;
}
vpn hub-to-spoke-vpn {
bind-interface st0.0;
ike {
gateway Euro-Hub;
ipsec-policy <cleaned>-VPN-Policy;
}
}
}
int reth1
unit 0 {
family inet {
address x.x.x.71/24;
address x.x.x.11/24;
security-zone untrust {
screen untrust-screen;
host-inbound-traffic {
system-services {
ike;
ping;
traceroute;
ssh;
}
}
interfaces {
reth1.0 {
host-inbound-traffic {
system-services {
ike;
ping;
traceroute;
ssh;
nat
static {
rule-set XXXX-DMZ {
from zone untrust;
rule to-dmz {
match {
destination-address <cleaned>.71/32;
}
then {
static-nat {
prefix {
10.<cleaned>.71/32;
Difference in config from working sollution is.
No cluster, so no reth.
No secondary IP on tunnel externel interface. (removed this with no effect)
A static nat for the secondary address.
Proposals have been verified several times. Deleted and re-added,
240cluster has been rebooted.
Is there any known issue that with this kind of setup for the SRX240? I
have found none.
>From what I can tell in the kmd debug-log the work setup validates with DN
when the "Address based phase 1 SA-CFG lookup failed" fails. The 240 does
not seem to try to validate DN.
Snippet from log where it fails.
iked_pm_phase1_sa_cfg_lookup_by_addr: Address based phase 1 SA-CFG lookup
failed for local:x.x.x.11, remote:y.y.y.y. IKEv1
iked_pm_ike_spd_select_ike_sa failed. rc 1, error_code: No proposal chosen
ikev2_fb_spd_select_sa_cb: IKEv2 SA select failed with error No proposal
chosen (neg de5800)
ike_isakmp_sa_reply: Start
--
*Best Regards*
*Mattias Gyllenvarg*
More information about the juniper-nsp
mailing list