Hi Nellikka,
i have done the changes that you have mentioned below , but still it is not working . Please find below results
set security ipsec vpn vpn01-DUB-Three establish-tunnels immediately---------------Configured
set security ipsec vpn vpn01-DUB-Three ike proxy-identity local 2.2.2.2/32----------Configured
set security ipsec vpn vpn01-DUB-Three ike proxy-identity remote 1.1.1.1/32--------------Configured
root> show security ike security-associations
Index State Initiator cookie Responder cookie Mode Remote Address
2089264 DOWN b6f334ca1da64432 0000000000000000 IKEv2 192.168.86.4
root>
root> show security ipsec security-associations
Total active tunnels: 0
root>
root> show security ipsec security-associations detail
root>
Please find below latest IPSEC COnfiguration and IKE traces
set system root-authentication encrypted-password "$1$CBYD0bv7$aJZtFlHQHZcjMDDi5F9ab1"
set system services ssh
set system services web-management http interface ge-0/0/0.0
set system services web-management http interface ge-0/0/1.0
set system services web-management https pki-local-certificate 12345
set system services web-management https interface ge-0/0/1.0
set system syslog user * any emergency
set system syslog file messages any any
set system syslog file messages authorization info
set system syslog file interactive-commands interactive-commands any
set system license autoupdate url https://ae1.juniper.net/junos/key_retrieval
set interfaces ge-0/0/0 unit 0
set interfaces ge-0/0/1 description TO_FORTINET
set interfaces ge-0/0/1 unit 0 family inet address 192.168.86.3/24
set interfaces ge-0/0/2 description TO_R4
set interfaces ge-0/0/2 unit 0 family inet address 23.0.0.1/24
set interfaces st0 unit 0 family inet
set routing-options static route 2.2.2.2/32 next-hop 23.0.0.2
set security ike traceoptions file IKE
set security ike traceoptions file size 10k
set security ike traceoptions file files 2
set security ike traceoptions flag all
set security ike proposal AES256-SHA256-DH2 authentication-method pre-shared-keys
set security ike proposal AES256-SHA256-DH2 dh-group group2
set security ike proposal AES256-SHA256-DH2 authentication-algorithm sha-256
set security ike proposal AES256-SHA256-DH2 encryption-algorithm des-cbc
set security ike proposal AES256-SHA256-DH2 lifetime-seconds 28800
set security ike policy ike01-DUB-Three proposals AES256-SHA256-DH2
set security ike policy ike01-DUB-Three pre-shared-key ascii-text "$9$b9soJUjHm5QDjp01RSyoJZGqm69At0B"
set security ike gateway ike01-DUB-Three ike-policy ike01-DUB-Three
set security ike gateway ike01-DUB-Three address 192.168.86.4
set security ike gateway ike01-DUB-Three local-identity inet 192.168.86.3
set security ike gateway ike01-DUB-Three external-interface ge-0/0/1.0
set security ike gateway ike01-DUB-Three version v2-only
set security ipsec proposal AES256-SHA256-PFS protocol esp
set security ipsec proposal AES256-SHA256-PFS authentication-algorithm hmac-sha1-96
set security ipsec proposal AES256-SHA256-PFS encryption-algorithm des-cbc
set security ipsec proposal AES256-SHA256-PFS lifetime-seconds 3600
set security ipsec policy ipsec01-DUB-Three proposals AES256-SHA256-PFS
set security ipsec vpn vpn01-DUB-Three bind-interface st0.0
set security ipsec vpn vpn01-DUB-Three df-bit clear
set security ipsec vpn vpn01-DUB-Three ike gateway ike01-DUB-Three
set security ipsec vpn vpn01-DUB-Three ike proxy-identity local 1.1.1.1/32
set security ipsec vpn vpn01-DUB-Three ike proxy-identity remote 2.2.2.2/32
set security ipsec vpn vpn01-DUB-Three ike proxy-identity service any
set security ipsec vpn vpn01-DUB-Three ike ipsec-policy ipsec01-DUB-Three
set security ipsec vpn vpn01-DUB-Three establish-tunnels immediately
set security screen ids-option untrust-screen icmp ping-death
set security screen ids-option untrust-screen ip source-route-option
set security screen ids-option untrust-screen ip tear-drop
set security screen ids-option untrust-screen tcp syn-flood alarm-threshold 1024
set security screen ids-option untrust-screen tcp syn-flood attack-threshold 200
set security screen ids-option untrust-screen tcp syn-flood source-threshold 1024
set security screen ids-option untrust-screen tcp syn-flood destination-threshold 2048
set security screen ids-option untrust-screen tcp syn-flood queue-size 2000
set security screen ids-option untrust-screen tcp syn-flood timeout 20
set security screen ids-option untrust-screen tcp land
set security policies from-zone trust to-zone trust policy default-permit match source-address any
set security policies from-zone trust to-zone trust policy default-permit match destination-address any
set security policies from-zone trust to-zone trust policy default-permit match application any
set security policies from-zone trust to-zone trust policy default-permit then permit
set security zones security-zone trust tcp-rst
set security zones security-zone trust interfaces ge-0/0/2.0 host-inbound-traffic system-services ping
set security zones security-zone untrust screen untrust-screen
set security zones security-zone untrust interfaces ge-0/0/0.0 host-inbound-traffic system-services http
set security zones security-zone untrust interfaces ge-0/0/0.0 host-inbound-traffic system-services https
set security zones security-zone untrust interfaces ge-0/0/0.0 host-inbound-traffic system-services ssh
set security zones security-zone untrust interfaces ge-0/0/0.0 host-inbound-traffic system-services telnet
set security zones security-zone untrust interfaces ge-0/0/0.0 host-inbound-traffic system-services dhcp
set security zones security-zone untrust interfaces ge-0/0/1.0 host-inbound-traffic system-services ping
set security zones security-zone untrust interfaces ge-0/0/1.0 host-inbound-traffic system-services http
set security zones security-zone untrust interfaces ge-0/0/1.0 host-inbound-traffic system-services https
set security zones security-zone untrust interfaces ge-0/0/1.0 host-inbound-traffic system-services snmp
set security zones security-zone untrust interfaces ge-0/0/1.0 host-inbound-traffic system-services ike
set security zones security-zone untrust interfaces st0.0 host-inbound-traffic system-services all
root> show log IKE
[May 4 19:57:44]Config download time: 0 secs
[May 4 19:57:44]iked_ts_config_template_clean_up_all_gt_gi Failed to find sa_cfg vpn01-DUB-Three
[May 4 19:57:44]Creating PM instance for service_set: root
[May 4 19:57:44]ssh_ike_init: Start
[May 4 19:57:44]ssh_ike_init: params->ignore_cr_payloads = FALSE
[May 4 19:57:44]ssh_ike_init: params->no_key_hash_payload = FALSE
[May 4 19:57:44]ssh_ike_init: params->no_cr_payloads = FALSE
[May 4 19:57:44]ssh_ike_init: params->do_not_send_crls = FALSE
[May 4 19:57:44]ssh_ike_init: params->send_full_chains = FALSE
[May 4 19:57:44]ssh_ike_init: params->trust_icmp_messages = FALSE
[May 4 19:57:44]ssh_ike_init: params->spi_size = 0
[May 4 19:57:44]ssh_ike_init: params->zero_spi = TRUE
[May 4 19:57:44]ssh_ike_init: params->max_key_length = 512
[May 4 19:57:44]ssh_ike_init: params->max_isakmp_sa_count = 8192
[May 4 19:57:44]Obsolete parameter length_of_local_secret is not set to zero in ssh_ike_init
[May 4 19:57:44]Obsolete parameter token_hash_type is not set to zero in ssh_ike_init
[May 4 19:57:44]ssh_ike_create_system: params->randomizers_default_cnt = 1
[May 4 19:57:44]ssh_ike_create_system: params->randomizers_default_max_cnt = 64
[May 4 19:57:44]ssh_ike_create_system: params->randomizers_default_retry = 2
[May 4 19:57:44]ssh_ike_create_system: params->randomizers_private_cnt = 1
[May 4 19:57:44]ssh_ike_create_system: params->randomizers_private_max_cnt = 16
[May 4 19:57:44]ssh_ike_create_system: params->randomizers_private_retry = 2
[May 4 19:57:44]ssh_ike_attach_audit_context: Attaching a new audit context
[May 4 19:57:44]ssh_ike_init: params->base_retry_limit = 5
[May 4 19:57:44]ssh_ike_init: params->base_retry_timer = 10.000000
[May 4 19:57:44]ssh_ike_init: params->base_retry_timer_max = 150.000000
[May 4 19:57:44]ssh_ike_init: params->base_expire_timer = 180.000000
[May 4 19:57:44]ssh_ike_init: params->extended_retry_limit = 5
[May 4 19:57:44]ssh_ike_init: params->extended_retry_timer = 5.000000
[May 4 19:57:44]ssh_ike_init: params->extended_retry_timer_max = 300.000000
[May 4 19:57:44]ssh_ike_init: params->extended_expire_timer = 240.000000
[May 4 19:57:44]ssh_ikev2_fallback_create: FB; v1 policy manager 8c33900 started
[May 4 19:57:44]ssh_ikev2_fallback_attach: FB; v1 policy manager 8c33900 attached to server 8ced500
[May 4 19:57:44]iked_config_process_config_list, configuration diff complete
[May 4 19:57:44]IKED-PKID-IPC
[May 4 19:57:44]kmd_rpd_init
[May 4 19:57:44]rpd session connected
[May 4 19:57:44]iked_spu_ha_ipc_get_server_addr, server tnp addr (standalone): 0x1, ISSU pending=no
[May 4 19:57:45]KMD_INTERNAL_ERROR: iked_ifstate_eoc_handler: EOC msg received
[May 4 19:57:45]kmd_rpd_cb_session_connect
[May 4 19:57:45]kmd_rpd_cb_session_connect: rpd session established
[May 4 19:57:45]kmd_rpd_db_read
[May 4 19:57:45]kmd_rpd_db_read: gw handle 39
[May 4 19:57:45]kmd_rpd_cb_protocol_register gw handle 3216496872 return code 1
[May 4 19:57:45]kmd_rpd_cb_protocol_register:Failed to register with rpd rc 1
[May 4 19:57:45]kmd_rpd_db_write
[May 4 19:57:45]kmd_rpd_shutdown_session
[May 4 19:57:50]kmd_rpd_init
[May 4 19:57:50]rpd session connected
[May 4 19:57:50]kmd_rpd_cb_session_connect
[May 4 19:57:50]kmd_rpd_cb_session_connect: rpd session established
[May 4 19:57:50]kmd_rpd_db_write
[May 4 19:57:50]kmd_rpd_cb_protocol_register gw handle 39 return code 0
[May 4 19:57:50]kmd_rpd_db_write
[May 4 19:57:50]kmd_rpd_refresh_routes
[May 4 19:57:54]Couldn't get the zone information for interface ge-0/0/1, error No such file or directory
[May 4 19:58:23]iked_process_ifl_ext_add: ifl tunnel-id lookup failed for ifl ge-0/0/0.0
[May 4 19:58:23]In iked_sa_config_install Adding GENCFG msg with key; Tunnel = 131073, SPI-In = 0x0
[May 4 19:58:23]Successfully added SA Config
[May 4 19:58:23]iked_process_ifl_ext_add: ifl tunnel-id lookup failed for ifl ge-0/0/2.0
[May 4 20:06:07]kmd_iked_cfgbuf_addrec: 535: ** Allocated recptr is 0, reclen = 143028240 **
[May 4 20:06:07]kmd_iked_cfgbuf_addrec: 535: ** Allocated recptr is c, reclen = 143028240 **
[May 4 20:06:07]kmd_iked_cfgbuf_addrec: 432: record IPSEC_SA_TYPE, reclen = 380
[May 4 20:06:07]kmd_iked_cfgbuf_addrec: 535: ** Allocated recptr is 17c, reclen = -1876615264 **
[May 4 20:06:07]kmd_iked_cfgbuf_addrec: 440: record TRAFFIC_SELECTOR, reclen = 168
[May 4 20:06:07]kmd_iked_cfgbuf_addrec: 535: ** Allocated recptr is a8, reclen = 32 **
[May 4 20:06:07]kmd_iked_cfgbuf_addrec: 535: ** Allocated recptr is cc, reclen = 0 **
[May 4 20:06:07]Deleting existing ipsec trace cfg with key: 16777216
[May 4 20:06:07]iked_ipsec_trace_flag_update: Successfully added ipsec trace config with key 0x1
[May 4 20:06:07]kmd_iked_cfgbuf_addrec: 535: ** Allocated recptr is 0, reclen = -1078471800 **
[May 4 20:06:07]No SPUs are operational, returning.
[May 4 20:06:07]iked_spu_sync_config_add this is SEC ASSOC on RE/complete, add it to the list
[May 4 20:06:07]Config download: Processed 1 - 2 messages
[May 4 20:06:07]Config download time: 0 secs
[May 4 20:06:07]ikev2_packet_allocate: Allocated packet 8c24800 from freelist
[May 4 20:06:07]iked_config_process_config_list, configuration diff complete
[May 4 20:06:37]P1 SA 2089251 timer expiry. ref cnt 2, timer reason Force delete timer expired (1), flags 0x0.
[May 4 20:06:37]IKE SA delete called for p1 sa 2089251 (ref cnt 3) local:192.168.86.3, remote:192.168.86.4, IKEv2
[May 4 20:06:37]Freeing all P2 SAs for IKEv2 p1 SA 2089251
[May 4 20:06:37]P1 SA 2089251 reference count is not zero (1). Delaying deletion of SA
[May 4 20:06:37]iked_pm_p1_sa_destroy: p1 sa 2089251 (ref cnt 0), waiting_for_del 0x8c809a0
[May 4 20:06:37]iked_pm_ike_sa_delete_done_cb: For null p1 sa, status: Error ok
[May 4 20:06:37]iked_deferred_free_inactive_peer_entry: Free 1 peer_entry(s)
[May 4 20:07:34]ikev2_packet_allocate: Allocated packet 8c24c00 from freelist
[May 4 20:08:04]P1 SA 2089252 timer expiry. ref cnt 2, timer reason Force delete timer expired (1), flags 0x0.
[May 4 20:08:04]IKE SA delete called for p1 sa 2089252 (ref cnt 3) local:192.168.86.3, remote:192.168.86.4, IKEv2
[May 4 20:08:04]Freeing all P2 SAs for IKEv2 p1 SA 2089252
[May 4 20:08:04]P1 SA 2089252 reference count is not zero (1). Delaying deletion of SA
[May 4 20:08:04]iked_pm_p1_sa_destroy: p1 sa 2089252 (ref cnt 0), waiting_for_del 0x8c80a00
[May 4 20:08:04]iked_pm_ike_sa_delete_done_cb: For null p1 sa, status: Error ok
[May 4 20:08:04]iked_deferred_free_inactive_peer_entry: Free 1 peer_entry(s)
[May 4 20:08:34]ikev2_packet_allocate: Allocated packet 8c39000 from freelist
[May 4 20:13:34]ikev2_packet_allocate: Allocated packet 8c3a400 from freelist
[May 4 20:14:04]P1 SA 2089258 timer expiry. ref cnt 2, timer reason Force delete timer expired (1), flags 0x0.
[May 4 20:14:04]IKE SA delete called for p1 sa 2089258 (ref cnt 3) local:192.168.86.3, remote:192.168.86.4, IKEv2
[May 4 20:14:04]Freeing all P2 SAs for IKEv2 p1 SA 2089258
[May 4 20:14:04]P1 SA 2089258 reference count is not zero (1). Delaying deletion of SA
[May 4 20:14:04]iked_pm_p1_sa_destroy: p1 sa 2089258 (ref cnt 0), waiting_for_del 0x8c80a00
[May 4 20:14:04]iked_pm_ike_sa_delete_done_cb: For null p1 sa, status: Error ok
[May 4 20:14:04]iked_deferred_free_inactive_peer_entry: Free 1 peer_entry(s)
[May 4 20:14:34]ikev2_packet_allocate: Allocated packet 8c3a800 from freelist
[May 4 20:15:04]P1 SA 2089259 timer expiry. ref cnt 2, timer reason Force delete timer expired (1), flags 0x0.
[May 4 20:15:04]IKE SA delete called for p1 sa 2089259 (ref cnt 3) local:192.168.86.3, remote:192.168.86.4, IKEv2
[May 4 20:15:04]Freeing all P2 SAs for IKEv2 p1 SA 2089259
[May 4 20:15:04]P1 SA 2089259 reference count is not zero (1). Delaying deletion of SA
[May 4 20:15:04]iked_pm_p1_sa_destroy: p1 sa 2089259 (ref cnt 0), waiting_for_del 0x8c80a00
[May 4 20:15:04]iked_pm_ike_sa_delete_done_cb: For null p1 sa, status: Error ok
[May 4 20:15:04]iked_deferred_free_inactive_peer_entry: Free 1 peer_entry(s)
[May 4 20:15:34]ikev2_packet_allocate: Allocated packet 8c3ac00 from freelist
[May 4 20:16:04]P1 SA 2089260 timer expiry. ref cnt 2, timer reason Force delete timer expired (1), flags 0x0.
[May 4 20:16:04]IKE SA delete called for p1 sa 2089260 (ref cnt 3) local:192.168.86.3, remote:192.168.86.4, IKEv2
[May 4 20:16:04]Freeing all P2 SAs for IKEv2 p1 SA 2089260
[May 4 20:16:04]P1 SA 2089260 reference count is not zero (1). Delaying deletion of SA
[May 4 20:16:04]iked_pm_p1_sa_destroy: p1 sa 2089260 (ref cnt 0), waiting_for_del 0x8c80a00
[May 4 20:16:04]iked_pm_ike_sa_delete_done_cb: For null p1 sa, status: Error ok
[May 4 20:16:04]iked_deferred_free_inactive_peer_entry: Free 1 peer_entry(s)
[May 4 20:16:34]ikev2_packet_allocate: Allocated packet 8c3b000 from freelist
[May 4 20:17:04]P1 SA 2089261 timer expiry. ref cnt 2, timer reason Force delete timer expired (1), flags 0x0.
[May 4 20:17:04]IKE SA delete called for p1 sa 2089261 (ref cnt 3) local:192.168.86.3, remote:192.168.86.4, IKEv2
[May 4 20:17:04]Freeing all P2 SAs for IKEv2 p1 SA 2089261
[May 4 20:17:04]P1 SA 2089261 reference count is not zero (1). Delaying deletion of SA
[May 4 20:17:04]iked_pm_p1_sa_destroy: p1 sa 2089261 (ref cnt 0), waiting_for_del 0x8c80a00
[May 4 20:17:04]iked_pm_ike_sa_delete_done_cb: For null p1 sa, status: Error ok
[May 4 20:17:04]iked_deferred_free_inactive_peer_entry: Free 1 peer_entry(s)
[May 4 20:17:34]ikev2_packet_allocate: Allocated packet 8c3b400 from freelist
[May 4 20:18:04]P1 SA 2089262 timer expiry. ref cnt 2, timer reason Force delete timer expired (1), flags 0x0.
[May 4 20:18:04]IKE SA delete called for p1 sa 2089262 (ref cnt 3) local:192.168.86.3, remote:192.168.86.4, IKEv2
[May 4 20:18:04]Freeing all P2 SAs for IKEv2 p1 SA 2089262
[May 4 20:18:04]P1 SA 2089262 reference count is not zero (1). Delaying deletion of SA
[May 4 20:18:04]iked_pm_p1_sa_destroy: p1 sa 2089262 (ref cnt 0), waiting_for_del 0x8c80a60
[May 4 20:18:04]iked_pm_ike_sa_delete_done_cb: For null p1 sa, status: Error ok
[May 4 20:18:04]iked_deferred_free_inactive_peer_entry: Free 1 peer_entry(s)
[May 4 20:18:34]ikev2_packet_allocate: Allocated packet 8c3b800 from freelist
[May 4 20:19:04]P1 SA 2089263 timer expiry. ref cnt 2, timer reason Force delete timer expired (1), flags 0x0.
[May 4 20:19:04]IKE SA delete called for p1 sa 2089263 (ref cnt 3) local:192.168.86.3, remote:192.168.86.4, IKEv2
[May 4 20:19:04]Freeing all P2 SAs for IKEv2 p1 SA 2089263
[May 4 20:19:04]P1 SA 2089263 reference count is not zero (1). Delaying deletion of SA
[May 4 20:19:04]iked_pm_p1_sa_destroy: p1 sa 2089263 (ref cnt 0), waiting_for_del 0x8c80a60
[May 4 20:19:04]iked_pm_ike_sa_delete_done_cb: For null p1 sa, status: Error ok
[May 4 20:19:04]iked_deferred_free_inactive_peer_entry: Free 1 peer_entry(s)
[May 4 20:19:34]ikev2_packet_allocate: Allocated packet 8c3bc00 from freelist
#JNCIE#security#ospf#ike#IPSec