[ Contents] [ Prev] [ Next] [ Index] [ Report an Error]

show security ipsec security-associations

Syntax

show security ipsec security-associations
<brief | detail>
<fpc slot-number>
<index SA-index-number>
<kmd-instance (all | kmd-instance-name)>
<pic slot-number>

Release Information

Command introduced in Release 8.5 of JUNOS software; fpc, pic, and kmd-instance options added in Release 9.3 of JUNOS software.

Description

Display information about the IPSec security associations (SAs).

This command is supported on J-series and SRX-series devices.

Options

none—Display information about all SAs.

brief | detail—(Optional) Display the specified level of output.

fpc slot-number—Specific to SRX-series services gateway. Display information about existing IPsec SAs in this particular Flexible PIC Concentrator (FPC) slot. This option is used to filter the output.

index SA-index-number—(Optional) Display detailed information about the specified security association identified by index number. To obtain a list of all SAs that includes their index numbers, use the command with no options.

kmd-instance—Specific to SRX-series services gateway. Display information about existing IPsec SAs in the key management process (daemon) (KMD) identified by the FPC slot-number and PIC slot-number. This option is used to filter the output.

pic slot-number—Specific to SRX-series services gateway. Display information about existing IPsec SAs in this particular PIC slot. This option is used to filter the output.

Required Privilege Level

view

Related Topics

clear security ipsec security-associations

List of Sample Output

show security ipsec security-associations
show security ipsec security-associations index
show security ipsec security-associations brief
show security ipsec security-associations detail
show security ipsec security-associations detail (SRX-series devices)
show security ipsec security-associations fpc 6 pic 1 kmd-instance all (SRX-series devices

Output Fields

Table 68 lists the output fields for the show security ipsec security-associations command. Output fields are listed in the approximate order in which they appear.

Table 68: show security ipsec security-associations

Field Name

Field Description

Total active tunnels

Total number of active IPsec tunnels.

ID

Index number of the SA. You can use this number to get additional information about the SA.

Gateway

IP address of the remote gateway.

Port

If Network Address Translation (NAT-T) is used, this value is 4500. Otherwise it is the standard IKE port, 500.

Algorithm

Cryptography used to secure exchanges between peers during the IKE Phase 2 negotiations includes

  • An authentication algorithm used to authenticate exchanges between the peers. Options are hmac-md5-95, hmac-sha1-96, or ESP.
  • An encryption algorithm used to encrypt data traffic. Options are 3des-cbc, aes-128-cbc, aes-192-cbc, aes-256-cbc, or des-cbc.

SPI

Security parameter index (SPI) identifier. An SA is uniquely identified by an SPI. Each entry includes the name of the VPN, the remote gateway address, the SPIs for each direction, the encryption and authentication algorithms, and keys. The peer gateways each have two SAs, one resulting from each of the two phases of negotiation: Phase 1 and Phase 2.

Life: sec/kb

The lifetime of the SA, after which it expires, expressed either in seconds or kilobytes.

Sta

State has two options, Installed and Not Installed.

  • Installed—The security association is installed in the security association database.
  • Not Installed—The security association is not installed in the security association database.

    For transport mode, the value of State is always Installed.

Mon

The Mon refers to VPN monitoring status. If VPN monitoring is enabled, then this will show U (up) or D (down). A hyphen (-) means VPN monitoring is not enabled for this SA.

vsys or Virtual-system

The root system.

Tunnel index

Numeric identifier of the specific IPsec tunnel for the SA.

Local gateway

Gateway address of the local system.

Remote gateway

Gateway address of the remote system.

Local identity

Identity of the local peer so that its partner destination gateway can communicate with it. The value is specified as an IPv4 address, fully qualified domain name, e-mail address, or distinguished name.

Remote identity

IPv4 address of the destination peer gateway.

DF-bit

State of the don't fragment bit: set or cleared.

Policy-name

Name of the applicable policy.

Location

FPC—Flexible PIC Concentrator (FPC) slot number.

PIC—PIC slot number.

KMD-Instance—The name of the kmd-instance running on the SPU, identified by the FPC slot-number and PIC slot-number. Currently, 4 kmd-instances running on each SPU and any particular IPsec negotiation is carried out by a single kmd-instance.

Direction

Direction of the security association; it can be inbound or outbound.

AUX-SPI

Value of the auxiliary security parameter index.

  • When the value is AH or ESP, AUX-SPI is always 0.
  • When the value is AH+ESP, AUX-SPI is always a positive integer.

Mode

Mode of the security association:

  • transport—Protects host-to-host connections.
  • tunnel—Protects connections between security gateways.

Type

Type of the security association:

  • manual—Security parameters require no negotiation. They are static and are configured by the user.
  • dynamic—Security parameters are negotiated by the IKE protocol. Dynamic security associations are not supported in transport mode.

State

State of the security association:

  • Installed—The security association is installed in the security association database.
  • Not Installed—The security association is not installed in the security association database.

    For transport mode, the value of State is always Installed.

Protocol

Protocol supported.

  • Transport mode supports Encapsulation Security Protocol (ESP) and Authentication Header (AH).
  • Tunnel mode supports ESP and AH
    • Authentication—Type of authentication used.
    • Encryption—Type of encryption used.

Soft lifetime

The soft lifetime informs the IPsec key management system that the SA is about to expire.

Each lifetime of a security association has two display options, hard and soft, one of which must be present for a dynamic security association. This allows the key management system to negotiate a new SA before the hard lifetime expires.

  • Expires in seconds—Number of seconds left until the SA expires.

Hard lifetime

The hard lifetime specifies the lifetime of the SA.

  • Expires in seconds—Number of seconds left until the SA expires.

Lifesize Remaining

The lifesize remaining specifies the usage limits in kilobytes. If there is no lifesize specified, it shows unlimited.

  • Expires in kilobytes—Number of kilobytes left until the SA expires.

Anti-replay service

State of the service that prevents packets from being replayed. It can be Enabled or Disabled.

Replay window size

Configured size of the antireplay service window. It can be 32 or 64 packets. If the replay window size is 0, the antireplay service is disabled.

The antireplay window size protects the receiver against replay attacks by rejecting old or duplicate packets.

show security ipsec security-associations

user@host> show security ipsec security-associations
Total active tunnels: 1
ID	Gateway			Port		Algorithm				SPI			Life:sec/kb Sta vsys
5	5.5.5.4			500		esp:3des/sha1				edOcec21			expir unlim I/I 				 0
5	5.5.5.4			500		esp:3des/sha1		  

show security ipsec security-associations index

user@host> show security ipsec security-associations index 5
Virtual-system: Root
Local gateway: 1.1.1.1, Remote gateway: 1.1.1.2
Local identity: ipv4_subnet(any:0,[0..7]=0.0.0.0/0)
Remote identity: ipv4_subnet(any:0,[0...7]=0.0.0.0/0)
DF-bit: clear
Policy-name: my-policy

Direction: inbound, SPI: 494001027, AUX-SPI: 0
Mode: tunnel, Type: dynamic, State: Installed
Protocol: ESP, Authentication: hmac-sha1-96, Encryption: 3des-cbc
Soft lifetime: Expired
Hard lifetime: Expired in 130 seconds
Lifesize Remaining: Unlimited
Anti-replay service: Enabled, Replay window size: 64

Direction: inbound, SPI: 1498711950, AUX-SPI: 0
Mode: tunnel, Type: dynamic, State: Installed
Protocol: ESP, Authentication: hmac-sha1-96, Encryption: 3des-cbc
Soft lifetime: Expires in 40 seconds
Hard lifetime: Expires in 175 seconds
Lifesize Remaining: Unlimited
Anti-replay service: Enabled, Replay window size: 64

Direction: outbound, SPI: 4038397695, AUX-SPI: 0
Mode: tunnel, Type: dynamic, State: Installed
Protocol: ESP, Authentication: hmac-sha1-96, Encryption: 3des-cbc
Soft lifetime: Expires in 40 seconds
Hard lifetime: Expires in 175 seconds
Lifesize Remaining: Unlimited
Anti-replay service: Enabled, Replay window size: 64      

show security ipsec security-associations brief

user@host> show security ipsec security-associations brief
Total active tunnels: 2
ID Gateway Port Algorithm SPI Life:sec/kb Mon vsys
<16384 1.1.1.1 500 ESP:3des/sha1 af88baa 28795/unlim D 0 
>16384 1.1.1.1 500 ESP:3des/sha1 f4e3e5f4 28795/unlim D 0

show security ipsec security-associations detail

user@host> show security ipsec security-associations detail
Virtual-system: Root
Local Gateway: 1.1.1.2, Remote Gateway: 1.1.1.1
Local Identity: ipv4_subnet(any:0,[0..7]=0.0.0.0/0)
Remote Identity: ipv4_subnet(any:0,[0..7]=0.0.0.0/0)
DF-bit: clear

Direction: inbound, SPI: 184060842, AUX-SPI: 0
Hard lifetime: Expires in 28785 seconds
Lifesize Remaining: Unlimited
Soft lifetime: Expired
Mode: tunnel, Type: dynamic, State: installed, VPN Monitoring: DOWN
Protocol: ESP, Authentication: hmac-sha1-96, Encryption: 3des-cbc
Anti-replay service: enabled, Replay window size: 32

Direction: outbound, SPI: 4108576244, AUX-SPI: 0
Hard lifetime: Expires in 28785 seconds
Lifesize Remaining: Unlimited
Soft lifetime: Expired
Mode: tunnel, Type: dynamic, State: installed, VPN Monitoring: DOWN
Protocol: ESP, Authentication: hmac-sha1-96, Encryption: 3des-cbc
Anti-replay service: enabled, Replay window size: 32

show security ipsec security-associations detail (SRX-series devices)

user@host> show security ipsec security-associations detail
  Virtual-system: Root
  Local Gateway: 20.0.0.4, Remote Gateway: 30.0.0.2
  Local Identity: ipv4_subnet(any:0,[0..7]=0.0.0.0/0)
  Remote Identity: ipv4(any:0,[0..3]=20.0.0.4)
    DF-bit: clear
    Policy-name: p1

    Location: FPC 1, PIC 2, KMD-Instance 3
    Direction: inbound, SPI: 3727011331, AUX-SPI: 0
    Hard lifetime: Expires in 3570 seconds
    Lifesize Remaining:  Unlimited
    Soft lifetime: Expires in 3525 seconds
    Mode: tunnel, Type: dynamic, State: installed, VPN Monitoring: -
    Protocol: ESP, Authentication: hmac-sha1-96, Encryption: aes-cbc (128 bits)
    Anti-replay service: enabled, Replay window size: 32

    Location: FPC 1, PIC 2, KMD-Instance 3
    Direction: outbound, SPI: 4212479378, AUX-SPI: 0
    Hard lifetime: Expires in 3570 seconds
    Lifesize Remaining:  Unlimited
    Soft lifetime: Expires in 3525 seconds
    Mode: tunnel, Type: dynamic, State: installed, VPN Monitoring: -
    Protocol: ESP, Authentication: hmac-sha1-96, Encryption: aes-cbc (128 bits)
    Anti-replay service: enabled, Replay window size: 32

show security ipsec security-associations fpc 6 pic 1 kmd-instance all (SRX-series devices

user@host> show security ipsec security-associations fpc 6 pic 1 kmd-instance all
  Total active tunnels: 1

ID    Gateway          Port  Algorithm       SPI      Life:sec/kb  Mon vsys

<2    1.1.1.2          500   ESP:3des/sha1   67a7d25d 28280/unlim   -   0

>2    1.1.1.2          500   ESP:3des/sha1   a23cbcdc 28280/unlim   -   0

[ Contents] [ Prev] [ Next] [ Index] [ Report an Error]