Hi everybody,
I need your help.
I try to configure IPSec sito to site VPN between Juniper SRX-240 and Mikrotik RB-951. Juniper SRX has static IP and Mikrotik has dynamic IP.
When I use IP addresses as peer ID no problem. But if I try to use FQDN as peer ID for Mikrotik (It has dynamic IP) tunnel not established.
Juniper SRX with Juniper SRX and Juniper SRX with D-Link DSR-150N work good.
Config SRX:
set security ike policy ike-policy-dhcp mode aggressive
set security ike policy ike-policy-dhcp proposal-set standard
set security ike policy ike-policy-dhcp pre-shared-key ascii-text "Secret_key"
set security ike gateway cpe-gate-cfgr ike-policy ike-policy-dhcp
set security ike gateway cpe-gate-cfgr dynamic hostname cpe.oscon.ua
set security ike gateway cpe-gate-cfgr external-interface vlan.300
set security ipsec policy ipsec-policy-dhcp perfect-forward-secrecy keys group2
set security ipsec policy ipsec-policy-dhcp proposal-set standard
set security ipsec vpn ipsec-vpn-srx bind-interface st0.0
set security ipsec vpn ipsec-vpn-srx ike gateway cpe-gate-cfgr
set security ipsec vpn ipsec-vpn-srx ike ipsec-policy ipsec-policy-dhcp
set security ipsec vpn ipsec-vpn-srx establish-tunnels immediately
Mikrotik config:
/ip firewall nat
add chain=srcnat dst-address=192.168.110.0/24 src-address=192.168.88.0/24
add action=masquerade chain=srcnat comment="default configuration" \
out-interface=ether1-gateway
/ip ipsec peer
# Unsafe configuration, suggestion to use certificates
add address=194.187.108.110/32 dpd-interval=disable-dpd exchange-mode=\
aggressive my-id-user-fqdn=cpe.oscon.ua nat-traversal=no secret=Secret_key
/ip ipsec policy
add dst-address=192.168.110.0/24 level=unique sa-dst-address=194.187.108.110 \
sa-src-address=194.187.108.107 src-address=192.168.88.0/24 tunnel=yes