网络专家!请帮助理解为什么没有通过 ipsec vpn(这里是基于路由的)从源地址到目标地址的 ping。
我有这样的架构:

IPSec 的 Phase1 和 Phase2 已启动。
思科1811:
Router#show crypto session
Crypto session current status
Interface: Tunnel0
Session status: UP-ACTIVE
Peer: 1.1.1.2 port 500
IKEv1 SA: local 1.1.1.1/500 remote 1.1.1.2/500 Active
IPSEC FLOW: permit ip 0.0.0.0/0.0.0.0 0.0.0.0/0.0.0.0
Active SAs: 2, origin: crypto map
SRX210:
[edit]
root# run show security ike security-associations
Index State Initiator cookie Responder cookie Mode Remote Address
507742 UP e4ce17853e784b75 686afe9bad0c6831 Main 1.1.1.1
[edit]
root# run show security ipsec security-associations
Total active tunnels: 1
ID Algorithm SPI Life:sec/kb Mon lsys Port Gateway
<131073 ESP:3des/sha1 f7797ad5 3409/ 4608000 - root 500 1.1.1.1
>131073 ESP:3des/sha1 f4f78f65 3409/ 4608000 - root 500 1.1.1.1
但是从 cisco loopback 10.10.10.1 到 srx fe-0/0/4 dest 20.20.20.1 没有连接。ping 失败。在我看来,所有路由和安全区域、策略都配置正确。
但 ping 失败。(从隧道 0 到 st0.1 的 Ping 也失败了)。
输出 cisco1811:
version 15.1
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname Router
!
boot-start-marker
boot-end-marker
!
!
no aaa new-model
!
memory-size iomem 20
!
!
dot11 syslog
ip source-route
!
!
ip cef
no ipv6 cef
!
multilink bundle-name authenticated
!
!
!
license udi pid CISCO1811W-AG-A/K9 sn FHK0930507W
!
!
!
!
crypto isakmp policy 1
encr 3des
authentication pre-share
group 2
lifetime 28800
crypto isakmp key regata577 address 1.1.1.2
!
!
crypto ipsec transform-set TS esp-3des esp-sha-hmac
!
crypto ipsec profile VPN_P2
set transform-set TS
!
!
interface Loopback10
ip address 10.10.10.1 255.255.255.0
!
interface Tunnel0
ip address 172.16.0.1 255.255.255.252
ip mtu 1400
tunnel source 1.1.1.1
tunnel mode ipsec ipv4
tunnel destination 1.1.1.2
tunnel protection ipsec profile VPN_P2
!
interface FastEthernet0
ip address 1.1.1.1 255.255.255.0
duplex auto
speed auto
!
interface FastEthernet1
ip vrf forwarding vrf1
ip address 5.5.5.1 255.255.255.0
duplex auto
speed auto
interface Vlan1
no ip address
!
interface Async1
no ip address
encapsulation slip
!
!
ip forward-protocol nd
no ip http server
no ip http secure-server
!
!
ip route 0.0.0.0 0.0.0.0 1.1.1.2
ip route 20.20.20.0 255.255.255.0 Tunnel0
输出 srx210:
version 12.1X44-D35.5;
system {
root-authentication {
encrypted-password "$1$APbBS19g$N1umrpu1sUcdWCb7RUyLa1"; ## SECRET-DATA
}
services {
ssh;
}
syslog {
file kmd-logs {
daemon info;
match KMD;
}
}
}
interfaces {
fe-0/0/4 {
unit 0 {
family inet {
address 20.20.20.1/24;
}
}
}
fe-0/0/5 {
unit 0 {
family inet {
address 1.1.1.2/24;
}
}
}
st0 {
unit 1 {
family inet {
mtu 1400;
address 172.16.0.2/30;
}
}
}
}
routing-options {
static {
route 0.0.0.0/0 next-hop 1.1.1.1;
route 10.10.10.0/24 next-hop st0.1;
}
}
security {
ike {
policy ike_policy {
mode main;
proposal-set compatible;
pre-shared-key ascii-text "$9$.fF/u0IleWTzSevMN-.Pfz9AIEc"; ## SECRET-DATA
}
gateway ike_gate {
ike-policy ike_policy;
address 1.1.1.1;
external-interface fe-0/0/5;
}
}
ipsec {
policy ipsec_policy {
proposal-set standard;
}
vpn My_VPN {
bind-interface st0.1;
ike {
gateway ike_gate;
ipsec-policy ipsec_policy;
}
establish-tunnels immediately;
}
}
flow {
tcp-mss {
ipsec-vpn {
mss 1350;
}
}
}
policies {
from-zone Untrust to-zone Trust {
policy 100 {
match {
source-address any;
destination-address any;
application any;
}
then {
permit;
}
}
}
from-zone Trust to-zone Untrust {
policy 101 {
match {
source-address any;
destination-address any;
application any;
}
then {
permit;
}
}
}
}
zones {
security-zone Untrust {
address-book {
address MOSCOW 10.10.10.0/24;
}
host-inbound-traffic {
system-services {
all;
}
protocols {
all;
}
}
interfaces {
fe-0/0/5.0;
st0.1;
}
}
security-zone Trust {
address-book {
address KRASNODAR 20.20.20.0/24;
}
host-inbound-traffic {
system-services {
all;
}
protocols {
all;
}
}
interfaces {
fe-0/0/4.0;
}
}
}
}
