This is my first post here so i'll do my best to follow the forum etiquette outlined on signup. I realize IPSec from UT to Juniper is not supported and I have been doing a lot of searching of the forums and a lot of reading and I just havent seem to find the answer yet and I am starting to run low on time and could use any pointers please.

My company is mid migration to new internet services and we have two locations in separate states. The end goal is to have two Untangle units setup with a openvpn tunnel. However my location in texas got turned on this week while our other location they are still putting fiber in the ground.

Texas has an Untangle box setup however Idaho, has a ISP managed Juniper SSG 5. I referenced the examples in the IPSec FAQ here (that i cant link to since this is post #1) and working with my ISP we configured the tunnel to work. Well to connect and say it is active. However ping doesnt work nor RDP however my other remote support tool does work through its port 8040.

I have found posts with similar symptoms but I am still looking for a solution.

Here is a sample of the log that shows the "initiate on demand" with the service that does work. Also my ISP says they can see traffic leaving the juniper through the vpn I just dont seem to get it out the UT box.

Thank you in advance.

Jul 11 15:45:14 GWNXEA pluto[10350]: "UT0_Boise-VPN" #1: transition from state STATE_MAIN_I3 to state STATE_MAIN_I4
Jul 11 15:45:14 GWNXEA pluto[10350]: "UT0_Boise-VPN" #1: STATE_MAIN_I4: ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1024}
Jul 11 15:45:14 GWNXEA pluto[10350]: "UT0_Boise-VPN" #2: initiating Quick Mode PSK+ENCRYPT+TUNNEL+PFS+UP+IKEv2ALLOW {using isakmp#1 msgid:6f8a2282 proposal=defaults pfsgroup=OAKLEY_GROUP_MODP1024}
Jul 11 15:45:14 GWNXEA pluto[10350]: initiate on demand from 192.168.10.100:61730 to 192.168.1.211:8040 proto=6 state: fos_start because: acquire
Jul 11 15:45:14 GWNXEA pluto[10350]: "UT0_Boise-VPN" #3: initiating Quick Mode PSK+ENCRYPT+TUNNEL+PFS+UP+IKEv2ALLOW {using isakmp#1 msgid:bddeb2dc proposal=defaults pfsgroup=OAKLEY_GROUP_MODP1024}
Jul 11 15:45:14 GWNXEA pluto[10350]: "UT0_Boise-VPN" #2: ignoring informational payload, type IPSEC_RESPONDER_LIFETIME msgid=6f8a2282
Jul 11 15:45:14 GWNXEA pluto[10350]: "UT0_Boise-VPN" #2: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2
Jul 11 15:45:14 GWNXEA pluto[10350]: "UT0_Boise-VPN" #2: STATE_QUICK_I2: sent QI2, IPsec SA established tunnel mode {ESP=>0xa43455b2 <0x7eb51e7c xfrm=AES_128-HMAC_SHA1 NATOA=none NATD=none DPD=none}
Jul 11 15:45:14 GWNXEA pluto[10350]: "UT0_Boise-VPN" #3: ignoring informational payload, type IPSEC_RESPONDER_LIFETIME msgid=bddeb2dc
Jul 11 15:45:14 GWNXEA pluto[10350]: "UT0_Boise-VPN" #3: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2
Jul 11 15:45:14 GWNXEA pluto[10350]: "UT0_Boise-VPN" #3: STATE_QUICK_I2: sent QI2, IPsec SA established tunnel mode {ESP=>0xa43455b3 <0x774ab2f9 xfrm=AES_128-HMAC_SHA1 NATOA=none NATD=none DPD=none}
Jul 11 15:45:14 GWNXEA pluto[10350]: "UT0_Boise-VPN" #1: received 1 malformed payload notifies