Working Config:
root@SRX-TEST-540> show configuration | display set
set version 15.1X49-D50.3
set system host-name SRX-TEST-540
set system root-authentication encrypted-password "$5$HDGwCjBc$VQ8o0QVroyItSzkZpNoeMeMd7Y8skFE5d7ETHxTQAyA"
set system syslog user * any emergency
set system syslog file messages any info
set system syslog file messages authorization info
set system syslog file interactive-commands interactive-commands any
set system license autoupdate url https://ae1.juniper.net/junos/key_retrieval
set security idp security-package url https://services.netscreen.com/cgi-bin/index.cgi
set security ike traceoptions flag all
set security ike proposal ike-phase1-proposal authentication-method pre-shared-keys
set security ike proposal ike-phase1-proposal dh-group group19
set security ike proposal ike-phase1-proposal authentication-algorithm sha-256
set security ike proposal ike-phase1-proposal encryption-algorithm aes-128-cbc
set security ike proposal ike-phase1-proposal lifetime-seconds 86400
set security ike policy ike-phase1-policy mode main
set security ike policy ike-phase1-policy proposals ike-phase1-proposal
set security ike policy ike-phase1-policy pre-shared-key ascii-text "$9$FJHK3A0Ehrv87yl"
set security ike gateway ike-gw ike-policy ike-phase1-policy
set security ike gateway ike-gw address 10.0.1.1
set security ike gateway ike-gw external-interface xe-2/2/0
set security ipsec traceoptions flag all
set security ipsec proposal ipsec-phase2-proposal protocol esp
set security ipsec proposal ipsec-phase2-proposal authentication-algorithm hmac-sha1-96
set security ipsec proposal ipsec-phase2-proposal encryption-algorithm aes-128-cbc
set security ipsec policy vpn-policy1 perfect-forward-secrecy keys group2
set security ipsec policy vpn-policy1 proposals ipsec-phase2-proposal
set security ipsec vpn ike-vpn bind-interface st0.0
set security ipsec vpn ike-vpn ike gateway ike-gw
set security ipsec vpn ike-vpn ike ipsec-policy vpn-policy1
set security ipsec vpn ike-vpn establish-tunnels immediately
set security policies from-zone trust to-zone trust policy All match source-address any
set security policies from-zone trust to-zone trust policy All match destination-address any
set security policies from-zone trust to-zone trust policy All match application any
set security policies from-zone trust to-zone trust policy All then permit
set security zones security-zone trust host-inbound-traffic system-services all
set security zones security-zone trust host-inbound-traffic protocols all
set security zones security-zone trust interfaces xe-2/2/0.0
set security zones security-zone trust interfaces lo0.2
set security zones security-zone trust interfaces st0.0
set interfaces xe-2/2/0 unit 0 family inet filter input icmp-filter
set interfaces xe-2/2/0 unit 0 family inet filter output icmp-filter
set interfaces xe-2/2/0 unit 0 family inet address 10.0.1.2/30
set interfaces lo0 unit 2 family inet address 2.2.2.2/32
set interfaces st0 unit 0 family inet
set routing-options static route 1.1.1.1/32 next-hop 10.0.1.1
set firewall family inet filter icmp-filter term 1 from protocol icmp
set firewall family inet filter icmp-filter term 1 then count icmp-counter
set firewall family inet filter icmp-filter term 1 then accept
set firewall family inet filter icmp-filter term default then accept
MX
root@TEST-WAN-Router> show configuration | display set
set version 16.1R4-S2.2
set system host-name TEST-WAN-Router
set system root-authentication encrypted-password "$5$QDMikHYN$AOnqaqXAGGHo9JQUTtY7X/C7o4IMrtPPDX05316X3mB"
set system syslog user * any emergency
set system syslog file messages any notice
set system syslog file messages authorization info
set system syslog file interactive-commands interactive-commands any
set chassis aggregated-devices ethernet device-count 4
set services service-set ipsec_ss_ms_0_2_0 next-hop-service inside-service-interface ms-0/2/0.1
set services service-set ipsec_ss_ms_0_2_0 next-hop-service outside-service-interface ms-0/2/0.2
set services service-set ipsec_ss_ms_0_2_0 ipsec-vpn-options local-gateway 10.0.1.1
set services service-set ipsec_ss_ms_0_2_0 ipsec-vpn-rules vpn_rule_ms_0_2_0_01
set services ipsec-vpn rule vpn_rule_ms_0_2_0_01 term term1 from source-address 1.1.1.1/32
set services ipsec-vpn rule vpn_rule_ms_0_2_0_01 term term1 from destination-address 2.2.2.2/32
set services ipsec-vpn rule vpn_rule_ms_0_2_0_01 term term1 then remote-gateway 10.0.1.2
set services ipsec-vpn rule vpn_rule_ms_0_2_0_01 term term1 then dynamic ike-policy ike_policy_ms_0_2_0
set services ipsec-vpn rule vpn_rule_ms_0_2_0_01 term term1 then dynamic ipsec-policy ipsec_policy_ms_0_2_0
set services ipsec-vpn rule vpn_rule_ms_0_2_0_01 term term1 then anti-replay-window-size 4096
set services ipsec-vpn rule vpn_rule_ms_0_2_0_01 match-direction input
set services ipsec-vpn ipsec proposal ipsec_proposal_ms_0_2_0 protocol esp
set services ipsec-vpn ipsec proposal ipsec_proposal_ms_0_2_0 authentication-algorithm hmac-sha1-96
set services ipsec-vpn ipsec proposal ipsec_proposal_ms_0_2_0 encryption-algorithm aes-128-cbc
set services ipsec-vpn ipsec policy ipsec_policy_ms_0_2_0 perfect-forward-secrecy keys group2
set services ipsec-vpn ipsec policy ipsec_policy_ms_0_2_0 proposals ipsec_proposal_ms_0_2_0
set services ipsec-vpn ike proposal ike_proposal_ms_0_2_0 authentication-method pre-shared-keys
set services ipsec-vpn ike proposal ike_proposal_ms_0_2_0 dh-group group19
set services ipsec-vpn ike proposal ike_proposal_ms_0_2_0 authentication-algorithm sha-256
set services ipsec-vpn ike proposal ike_proposal_ms_0_2_0 encryption-algorithm aes-128-cbc
set services ipsec-vpn ike proposal ike_proposal_ms_0_2_0 lifetime-seconds 86400
set services ipsec-vpn ike policy ike_policy_ms_0_2_0 proposals ike_proposal_ms_0_2_0
set services ipsec-vpn ike policy ike_policy_ms_0_2_0 pre-shared-key ascii-text "$9$f5nCOBEyeWRh"
set services ipsec-vpn traceoptions file all
set services ipsec-vpn traceoptions flag all
set services ipsec-vpn traceoptions flag ike
set interfaces xe-0/0/0 gigether-options 802.3ad ae0
set interfaces xe-0/0/1 gigether-options 802.3ad ae1
set interfaces ms-0/2/0 unit 0 family inet
set interfaces ms-0/2/0 unit 1 family inet
set interfaces ms-0/2/0 unit 1 family inet6
set interfaces ms-0/2/0 unit 1 service-domain inside
set interfaces ms-0/2/0 unit 2 family inet
set interfaces ms-0/2/0 unit 2 family inet6
set interfaces ms-0/2/0 unit 2 service-domain outside
set interfaces xe-2/0/0 description IPSEC
set interfaces xe-2/0/0 unit 0 family inet filter output TEST
set interfaces xe-2/0/0 unit 0 family inet address 10.0.1.1/30
set interfaces xe-2/0/1 gigether-options 802.3ad ae1
set interfaces xe-2/0/2 vlan-tagging
set interfaces xe-2/0/2 encapsulation extended-vlan-bridge
set interfaces xe-2/0/2 unit 0 vlan-id 3
set interfaces ae0 vlan-tagging
set interfaces ae0 aggregated-ether-options lacp active
set interfaces ae1 vlan-tagging
set interfaces ae1 aggregated-ether-options lacp active
set interfaces irb unit 0
set interfaces lo0 unit 2 family inet address 1.1.1.1/32
set routing-options static route 2.2.2.2/32 next-hop 10.0.1.2
set firewall filter TEST term 1 then count COUNTER
set firewall filter TEST term 1 then accept
set bridge-domains vlan-3 vlan-id 3
set bridge-domains vlan-3 interface xe-2/0/2.0
set bridge-domains vlan-3 routing-interface irb.0
root@TEST-WAN-Router> show services ipsec-vpn ike security-associations
Remote Address State Initiator cookie Responder cookie Exchange type
10.0.1.2 Matured 0bdf2e0e741c0c7e 502a3b49dd71da28 Main
root@TEST-WAN-Router> show services ipsec-vpn ipsec security-associations
Service set: ipsec_ss_ms_0_2_0, IKE Routing-instance: default
Rule: vpn_rule_ms_0_2_0_01, Term: term1, Tunnel index: 2
Local gateway: 10.0.1.1, Remote gateway: 10.0.1.2
IPSec inside interface: ms-0/2/0.1, Tunnel MTU: 1500
UDP encapsulate: Disabled, UDP Destination port: 0
Direction SPI AUX-SPI Mode Type Protocol
inbound 1565990929 0 tunnel dynamic ESP
outbound 2175502731 0 tunnel dynamic ESP