<div>Hi Martin, Hi All,</div>
<div> </div>
<div>I configured strongswan with following items and tried to interoperate with Juniper SSG 550M, but I found no inner IP can be allocated from Juniper SSG 550M and the link always indicated as "down" while the SA status was "Active". </div>
<div> </div>
<div>THE CONFIGURATION of STRONGSWAN is:</div>
<div> </div>
<div>1) IPSEC.CONF </div>
<div>config setup<br> strictcrlpolicy=no<br> plutostart=no<br>conn %default<br> ike=3des-sha1-modp1024!<br> esp=3des-sha1!<br> ikelifetime=1440m<br> keylife=24m<br> rekeymargin=3m<br> keyingtries=%forever<br> reauth=no<br>
keyexchange=ikev2<br> pfs=yes<br> authby=secret<br>conn FAP0<br> left=172.19.2.169<br> <a href="mailto:leftid=pbr@juniper.com">leftid=pbr@juniper.com</a><br> leftfirewall=yes<br> right=172.19.2.199<br> rightsubnet=<a href="http://0.0.0.0/0">0.0.0.0/0</a><br>
auto=add</div>
<div> </div>
<div>2) ipsec.secrets</div>
<div># /etc/ipsec.secrets - strongswan IPsec secrets file<br><a href="mailto:pbr@juniper.com">pbr@juniper.com</a> : PSK PBRVPN0 </div>
<div> </div>
<div>IN JUNIPER SSG 550</div>
<div>1) I create one dailup user and configure the gateway and IKE with authenticate as PSK and IKEv2 used. and then I configure one policy for it.</div>
<div> </div>
<div>2) configuration of Juniper SSG 550 listed as followed:</div>
<div> </div>
<div>set clock timezone 0<br>set vrouter trust-vr sharable<br>set vrouter "untrust-vr"<br>exit<br>set vrouter "trust-vr"<br>unset auto-route-export<br>exit<br>set alg appleichat enable<br>unset alg appleichat re-assembly enable<br>
set alg sctp enable<br>set auth-server "Local" id 0<br>set auth-server "Local" server-name "Local"<br>set auth default auth server "Local"<br>set auth radius accounting port 1646<br>
set admin name "netscreen"<br>set admin password "nKVUM2rwMUzPcrkG5sWIHdCtqkAibn"<br>set admin auth web timeout 10<br>set admin auth server "Local"<br>set admin format dos<br>set zone "Trust" vrouter "trust-vr"<br>
set zone "Untrust" vrouter "trust-vr"<br>set zone "DMZ" vrouter "trust-vr"<br>set zone "VLAN" vrouter "trust-vr"<br>set zone "Untrust-Tun" vrouter "trust-vr"<br>
set zone "Trust" tcp-rst <br>set zone "Untrust" block <br>unset zone "Untrust" tcp-rst <br>set zone "MGT" block <br>set zone "DMZ" tcp-rst <br>set zone "VLAN" block <br>
unset zone "VLAN" tcp-rst <br>set zone "Untrust" screen tear-drop<br>set zone "Untrust" screen syn-flood<br>set zone "Untrust" screen ping-death<br>set zone "Untrust" screen ip-filter-src<br>
set zone "Untrust" screen land<br>set zone "V1-Untrust" screen tear-drop<br>set zone "V1-Untrust" screen syn-flood<br>set zone "V1-Untrust" screen ping-death<br>set zone "V1-Untrust" screen ip-filter-src<br>
set zone "V1-Untrust" screen land<br>set interface "ethernet0/0" zone "Trust"<br>set interface "ethernet0/1" zone "Trust"<br>set interface "ethernet0/2" zone "Untrust"<br>
set interface "ethernet0/3" zone "Trust"<br>set interface "tunnel.1" zone "Trust"<br>set interface ethernet0/0 ip <a href="http://192.168.1.1/24">192.168.1.1/24</a><br>set interface ethernet0/0 route<br>
unset interface vlan1 ip<br>set interface ethernet0/1 ip <a href="http://192.168.52.253/24">192.168.52.253/24</a><br>set interface ethernet0/1 nat<br>set interface ethernet0/2 ip <a href="http://172.19.2.199/24">172.19.2.199/24</a><br>
set interface ethernet0/2 route<br>set interface ethernet0/3 ip <a href="http://192.168.54.253/24">192.168.54.253/24</a><br>set interface ethernet0/3 nat<br>set interface tunnel.1 ip unnumbered interface ethernet0/2<br>set interface ethernet0/2 bandwidth egress mbw 5000 ingress mbw 5000<br>
set interface tunnel.1 mtu 1500<br>set interface "ethernet0/1" pmtu ipv4<br>unset interface vlan1 bypass-others-ipsec<br>unset interface vlan1 bypass-non-ip<br>set interface ethernet0/0 ip manageable<br>set interface ethernet0/1 ip manageable<br>
set interface ethernet0/2 ip manageable<br>set interface ethernet0/3 ip manageable<br>set interface ethernet0/1 manage ident-reset<br>set interface ethernet0/2 manage ping<br>set interface ethernet0/2 manage snmp<br>set interface ethernet0/2 manage ssl<br>
set interface ethernet0/2 manage web<br>unset interface ethernet0/3 manage ssh<br>unset interface ethernet0/3 manage telnet<br>unset interface ethernet0/3 manage snmp<br>unset interface ethernet0/3 manage ssl<br>unset interface ethernet0/3 manage web<br>
set interface ethernet0/0 dhcp server service<br>set interface ethernet0/0 dhcp server enable<br>set interface ethernet0/0 dhcp server option lease 1440000 <br>set interface ethernet0/0 dhcp server ip 192.168.1.200 to 192.168.1.250 <br>
set interface ethernet0/0 dhcp server config next-server-ip<br>unset interface ethernet0/0 dhcp server config updatable<br>unset flow no-tcp-seq-check<br>set flow tcp-syn-check<br>unset flow tcp-syn-bit-check<br>set flow reverse-route clear-text prefer<br>
set flow reverse-route tunnel always<br>set domain <a href="http://zte.com.cn">zte.com.cn</a><br>set pki authority default cert-status revocation-check none<br>set pki authority default scep mode "auto"<br>set pki x509 default cert-path partial<br>
set pki x509 dn country-name "CN"<br>set pki x509 dn local-name "SZ"<br>set pki x509 dn org-name "JUNIPER lmt"<br>set pki x509 dn org-unit-name "OMS"<br>set pki x509 dn name "ssg550m"<br>
set pki x509 dn email <a href="mailto:ssg550m@juniper.com">ssg550m@juniper.com</a><br>set pki x509 dn ip 172.19.2.199<br>set pki x509 default send-to "<a href="mailto:david.morris@juniper.com">david.morris@juniper.com</a>"<br>
set pki x509 default crl-refresh "daily"<br>set pki x509 cert-fqdn <a href="http://ssg550m.juniper.com.cn">ssg550m.juniper.com.cn</a><br>set dns host dns1 172.19.2.189 src-interface ethernet0/2<br>set dns host dns2 0.0.0.0<br>
set dns host dns3 0.0.0.0<br>set address "Trust" "<a href="http://10.1.0.0/16">10.1.0.0/16</a>" 10.1.0.0 255.255.0.0<br>set address "Trust" "<a href="http://10.10.1.0/24">10.10.1.0/24</a>" 10.10.1.0 255.255.255.0<br>
set address "Trust" "<a href="http://192.168.52.0/24">192.168.52.0/24</a>" 192.168.52.0 255.255.255.0<br>set address "Trust" "PBR-NB-intranet" 192.168.1.0 255.255.255.0<br>set address "Untrust" "<a href="http://0.0.0.0/0">0.0.0.0/0</a>" 0.0.0.0 0.0.0.0<br>
set address "Untrust" "<a href="http://192.168.52.250/24">192.168.52.250/24</a>" 192.168.52.250 255.255.255.0<br>set user "PBR-USR00" uid 4<br>set user "PBR-USR00" ike-id u-fqdn <a href="mailto:pbr@juniper.com">pbr@juniper.com</a> share-limit 1<br>
set user "PBR-USR00" type ike<br>set user "PBR-USR00" "enable"<br>set ike gateway ikev2 "PBR-seGW00" dialup "PBR-USR00" outgoing-interface "ethernet0/2" preshare "D2hjHzq+NQYEm8sqF4CL8G1aOznYgJ+iHQ==" proposal "pre-g2-3des-sha"<br>
unset ike gateway ikev2 "PBR-seGW00" nat-traversal<br>set ike respond-bad-spi 1<br>set ike gateway ikev2 "PBR-seGW00" auth-method self preshare peer preshare<br>set ike ikev2 ike-sa-soft-lifetime 60<br>
unset ike ikeid-enumeration<br>unset ike dos-protection<br>unset ipsec access-session enable<br>set ipsec access-session maximum 5000<br>set ipsec access-session upper-threshold 0<br>set ipsec access-session lower-threshold 0<br>
set ipsec access-session dead-p2-sa-timeout 0<br>unset ipsec access-session log-error<br>unset ipsec access-session info-exch-connected<br>unset ipsec access-session use-error-log<br>set vpn "PBR-IKE00" gateway "PBR-seGW00" no-replay tunnel idletime 0 proposal "nopfs-esp-3des-sha" <br>
set vpn "PBR-IKE00" monitor<br>set vrouter "untrust-vr"<br>exit<br>set vrouter "trust-vr"<br>exit<br>set url protocol websense<br>exit<br>set vpn "PBR-IKE00" proxy-id local-ip <a href="http://192.168.1.0/24">192.168.1.0/24</a> remote-ip <a href="http://255.255.255.255/32">255.255.255.255/32</a> "ANY" <br>
set policy id 1 from "Untrust" to "Trust" "Dial-Up VPN" "PBR-NB-intranet" "ANY" nat src tunnel vpn "PBR-IKE00" id 0x1 log <br>set policy id 1<br>exit<br>set policy id 2 from "Trust" to "Untrust" "PBR-NB-intranet" "Any" "ANY" permit <br>
set policy id 2<br>exit<br>set nsmgmt bulkcli reboot-timeout 60<br>set ssh version v2<br>set config lock timeout 5<br>unset license-key auto-update<br>set snmp port listen 161<br>set snmp port trap 162<br>set vrouter "untrust-vr"<br>
set router-id 192.168.1.9<br>exit<br>set vrouter "trust-vr"<br>set router-id 192.168.1.1<br>unset add-default-route<br>set route <a href="http://172.19.2.0/24">172.19.2.0/24</a> interface tunnel.1<br>set action-group name VR2<br>
exit<br>set vrouter "untrust-vr"<br>exit<br>set vrouter "trust-vr"<br>exit</div>
<div> </div>
<div>please help me check the root cause of this issue. thanks.</div>
<div> </div>
<div>Best Regards,</div>
<div>David.morris<br></div>