Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    wan -- pfsense -- Juniper SRX ipsec not working.

    Scheduled Pinned Locked Moved NAT
    19 Posts 4 Posters 1.7k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • V
      virtualliquid
      last edited by

      No one?

      1 Reply Last reply Reply Quote 0
      • chpalmerC
        chpalmer
        last edited by chpalmer

        Make port 4500 for your particular device (10.1.4.10) static NAT.

        See if that works.

        Triggering snowflakes one by one..
        Intel(R) Core(TM) i5-4590T CPU @ 2.00GHz on an M400 WG box.

        1 Reply Last reply Reply Quote 0
        • DerelictD
          Derelict LAYER 8 Netgate
          last edited by Derelict

          To establish IPsec you also need UDP/500 for IKE. After that is established, you will use either ESP or UDP/4500 (NAT-T) for the actual data transfers. There is obviously NAT so NAT-T will be chosen so it will probably work fine without ESP forwarded. And you only need AH if you are doing that sort of tunnel which is not encrypted so almost nobody uses that.

          And all of this should work if the SRX always originates. You only need the port forward if the SRX needs to respond.

          You also need to make sure the identifiers match. You might need to tell the SRX to specifically use your outside IP address as the identifier.

          Chattanooga, Tennessee, USA
          A comprehensive network diagram is worth 10,000 words and 15 conference calls.
          DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
          Do Not Chat For Help! NO_WAN_EGRESS(TM)

          1 Reply Last reply Reply Quote 0
          • V
            virtualliquid
            last edited by

            Thank you both for your reply's.

            I have a NAT setup for port 4500, esp and ah. I created the NAT under firewall > NAT > Port Forward and also did the auto create the rule option.

            Not sure what you mean by static nat, I think that is what I did?

            As for port 500, I will test that as I thought I tried that at one point but I am not sure now.

            1 Reply Last reply Reply Quote 0
            • V
              virtualliquid
              last edited by

              Not sure if I am doing something wrong or this is bugged.

              I have tried all these suggestions to no avail.

              Created a 1:1 nat with the outside IP and internal device IP.
              Also created port forward rules for 4500, 500, ah and esp to be sure I am completely covered. Still no luck. I do however see port 4500 continuously hitting my firewall block logs as if it does not have a rule telling it where to go, but I have one setup for it.
              firewall log below. It is coming from my remote work off and going to my external WAN IP in the below picture.. Edited out for obvious reasons.

              alt text

              K 1 Reply Last reply Reply Quote 0
              • DerelictD
                Derelict LAYER 8 Netgate
                last edited by

                Post your port forwards and rules. That traffic is obviously not being passed by a firewall rule or a state.

                Your NAT rule posted up there had source port 4500. You don't want that. The source port is random.

                Chattanooga, Tennessee, USA
                A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                Do Not Chat For Help! NO_WAN_EGRESS(TM)

                1 Reply Last reply Reply Quote 0
                • V
                  virtualliquid
                  last edited by virtualliquid

                  I had to re-do the rules since I wiped everything to start fresh. I currently have ESP and AH disabled in the screenshots.

                  but here is what I got.

                  NAT Rules
                  4500

                  alt text

                  alt text
                  and the associated firewall rule.
                  alt text

                  Nat rule for port 500
                  alt text

                  Associated rule for 500
                  alt text

                  1 Reply Last reply Reply Quote 0
                  • K
                    Konstanti @virtualliquid
                    last edited by

                    @virtualliquid
                    Hey
                    and what device is trying to connect to Juniper ?
                    Very strange, src port = 4500 / dst port random (or missing)

                    1 Reply Last reply Reply Quote 0
                    • V
                      virtualliquid
                      last edited by

                      I am not certain of the device on the other end it is one of our large data centers that host multiple vpn concentrators. I would imagine it is just another juniper on the other end as well.

                      K 1 Reply Last reply Reply Quote 0
                      • K
                        Konstanti @virtualliquid
                        last edited by

                        @virtualliquid

                        Who initiated the connection ?
                        Little Juniper or big ?
                        It feels like PF is blocking traffic for the little Juniper that is going back

                        V 1 Reply Last reply Reply Quote 0
                        • V
                          virtualliquid
                          last edited by virtualliquid

                          took a new capture, same results. just filtered the source ip (office)
                          Every other one is the source of 4500 going to destination 39727 or some other random port.

                          alt text

                          1 Reply Last reply Reply Quote 0
                          • V
                            virtualliquid @Konstanti
                            last edited by

                            @konstanti Little Juniper I believe initiates the connection. Since I keep restarting it (Power cycle)

                            K 1 Reply Last reply Reply Quote 0
                            • K
                              Konstanti @virtualliquid
                              last edited by Konstanti

                              @virtualliquid
                              Try so
                              /diagnostics/command prompt/ cat /tmp/rules.debug | grep LAN
                              and check.
                              is there a keep state when outputting
                              for example,

                              pass in quick on $LAN inet from YOUR__LAN_NET to any tracker 0100000101 keep state label "USER_RULE: Default allow LAN to any rule"

                              1 Reply Last reply Reply Quote 0
                              • V
                                virtualliquid
                                last edited by virtualliquid

                                there is a lot of keep states, might need to filter more.

                                Perhaps this rule ?

                                pass in quick on $WAN reply-to ( em0 xxx.xxx.xxx.1 ) inet proto { tcp udp } from any to 10.1.4.10 port 4500 tracker 1549481406 keep state label "USER_RULE: NAT Juniper SRX"

                                K 2 Replies Last reply Reply Quote 0
                                • K
                                  Konstanti @virtualliquid
                                  last edited by

                                  @virtualliquid

                                  1. Are there floating rules ?
                                  2. For a small Juniper is there a separate rule on the Lan interface ?
                                    If yes , show it
                                    If not , show the rules of the LAN nterface
                                  1 Reply Last reply Reply Quote 0
                                  • K
                                    Konstanti @virtualliquid
                                    last edited by Konstanti

                                    @virtualliquid

                                    cat /tmp/rules.debug | grep LAN
                                    not WAN !!!
                                    pass in quick on $LAN inet from YOUR__LAN_NET to any tracker 0100000101 keep state
                                    or
                                    pfctl -sr | grep em1
                                    for example,
                                    pass in quick on em1 inet from LAN_NET_IP to any flags S/SA keep state label "USER_RULE: Default allow LAN to any rule"

                                    1 Reply Last reply Reply Quote 0
                                    • V
                                      virtualliquid
                                      last edited by

                                      Trying to post the output, but it keeps telling me its spam.

                                      1 Reply Last reply Reply Quote 0
                                      • V
                                        virtualliquid
                                        last edited by

                                        Best I can do is a picture of the output.

                                        alt text

                                        1 Reply Last reply Reply Quote 0
                                        • First post
                                          Last post
                                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.