06-12-2018 01:56 AM - edited 03-12-2019 05:21 AM
Hi everyone;
very urgent
I have a problem. ISR4331 and Juniper SRX establish IPSec VPN.
This IPSEC VPN can be established, but ISR4331 sees a lot of QM_IDLE, as follows:
rz1#show cryp isa sa
IPv4 Crypto ISAKMP SA
dst src state conn-id status
221.239.208.237 101.95.106.10 QM_IDLE 1516 ACTIVE
221.239.208.237 101.95.106.10 QM_IDLE 1515 ACTIVE
221.239.208.237 101.95.106.10 QM_IDLE 1514 ACTIVE
221.239.208.237 101.95.106.10 QM_IDLE 1513 ACTIVE
221.239.208.237 101.95.106.10 QM_IDLE 1512 ACTIVE
221.239.208.237 101.95.106.10 QM_IDLE 1511 ACTIVE
221.239.208.237 101.95.106.10 QM_IDLE 1510 ACTIVE
221.239.208.237 101.95.106.10 QM_IDLE 1509 ACTIVE
221.239.208.237 101.95.106.10 QM_IDLE 1508 ACTIVE
221.239.208.237 101.95.106.10 QM_IDLE 1507 ACTIVE
221.239.208.237 101.95.106.10 QM_IDLE 1506 ACTIVE
221.239.208.237 101.95.106.10 QM_IDLE 1505 ACTIVE
221.239.208.237 101.95.106.10 QM_IDLE 1504 ACTIVE
221.239.208.237 101.95.106.10 QM_IDLE 1503 ACTIVE
221.239.208.237 101.95.106.10 QM_IDLE 1502 ACTIVE
221.239.208.237 101.95.106.10 QM_IDLE 1501 ACTIVE
221.239.208.237 101.95.106.10 QM_IDLE 1500 ACTIVE
221.239.208.237 101.95.106.10 QM_IDLE 1499 ACTIVE
221.239.208.237 101.95.106.10 QM_IDLE 1498 ACTIVE
221.239.208.237 101.95.106.10 QM_IDLE 1497 ACTIVE
221.239.208.237 101.95.106.10 QM_IDLE 1496 ACTIVE
221.239.208.237 101.95.106.10 QM_IDLE 1495 ACTIVE
221.239.208.237 101.95.106.10 QM_IDLE 1494 ACTIVE
221.239.208.237 101.95.106.10 QM_IDLE 1493 ACTIVE
221.239.208.237 101.95.106.10 QM_IDLE 1492 ACTIVE
221.239.208.237 101.95.106.10 QM_IDLE 1491 ACTIVE
221.239.208.237 101.95.106.10 QM_IDLE 1490 ACTIVE
221.239.208.237 101.95.106.10 QM_IDLE 1489 ACTIVE
221.239.208.237 101.95.106.10 QM_IDLE 1488 ACTIVE
221.239.208.237 101.95.106.10 QM_IDLE 1487 ACTIVE
221.239.208.237 101.95.106.10 QM_IDLE 1486 ACTIVE
221.239.208.237 101.95.106.10 QM_IDLE 1485 ACTIVE
221.239.208.237 101.95.106.10 QM_IDLE 1484 ACTIVE
221.239.208.237 101.95.106.10 QM_IDLE 1483 ACTIVE
I don't know what this means,please help me to explain it,thanks very much.
Attached is config files and some log.
06-12-2018 04:02 AM
Hi, The logs indicate IKE Phase 1 completed ok.
I notice that the IPSec Transform set is different on the Cisco Router and the Juniper Firewall, you should ensure the hashing algorithm is the same, change the value on one of the devices then try again.
Cisco Router
crypto ipsec transform-set yfnsshjq esp-3des esp-sha256-hmac
mode transport
Juniper
proposal Jiqiang_proposal {
protocol esp;
authentication-algorithm hmac-sha1-96;
encryption-algorithm 3des-cbc;
lifetime-seconds 3600;
HTH
06-12-2018 04:10 AM
06-12-2018 04:30 AM
06-12-2018 04:35 AM
06-12-2018 05:18 AM
06-12-2018 06:33 AM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide