-
show security ipsec security-associations
- <brief | detail>
- <fpc slot-number>
- <index SA-index-number>
- <kmd-instance (all | kmd-instance-name)>
- <pic slot-number>
Command introduced in Release 8.5 of JUNOS software; fpc, pic, and kmd-instance options added in Release 9.3 of JUNOS software.
Display information about the IPSec security associations (SAs).
This command is supported on J-series and SRX-series devices.
none—Display information about all SAs.
brief | detail—(Optional) Display the specified level of output.
fpc slot-number—Specific to SRX-series services gateway. Display information about existing IPsec SAs in this particular Flexible PIC Concentrator (FPC) slot. This option is used to filter the output.
index SA-index-number—(Optional) Display detailed information about the specified security association identified by index number. To obtain a list of all SAs that includes their index numbers, use the command with no options.
kmd-instance—Specific to SRX-series services gateway. Display information about existing IPsec SAs in the key management process (daemon) (KMD) identified by the FPC slot-number and PIC slot-number. This option is used to filter the output.
pic slot-number—Specific to SRX-series services gateway. Display information about existing IPsec SAs in this particular PIC slot. This option is used to filter the output.
view
clear security ipsec security-associations
Table 68 lists the output fields for the show security ipsec security-associations command. Output fields are listed in the approximate order in which they appear.
Table 68: show security ipsec security-associations
user@host> show security ipsec security-associations
Total active tunnels: 1 ID Gateway Port Algorithm SPI Life:sec/kb Sta vsys 5 5.5.5.4 500 esp:3des/sha1 edOcec21 expir unlim I/I 0 5 5.5.5.4 500 esp:3des/sha1
user@host> show security ipsec security-associations
index 5
Virtual-system: Root Local gateway: 1.1.1.1, Remote gateway: 1.1.1.2 Local identity: ipv4_subnet(any:0,[0..7]=0.0.0.0/0) Remote identity: ipv4_subnet(any:0,[0...7]=0.0.0.0/0) DF-bit: clear Policy-name: my-policy Direction: inbound, SPI: 494001027, AUX-SPI: 0 Mode: tunnel, Type: dynamic, State: Installed Protocol: ESP, Authentication: hmac-sha1-96, Encryption: 3des-cbc Soft lifetime: Expired Hard lifetime: Expired in 130 seconds Lifesize Remaining: Unlimited Anti-replay service: Enabled, Replay window size: 64 Direction: inbound, SPI: 1498711950, AUX-SPI: 0 Mode: tunnel, Type: dynamic, State: Installed Protocol: ESP, Authentication: hmac-sha1-96, Encryption: 3des-cbc Soft lifetime: Expires in 40 seconds Hard lifetime: Expires in 175 seconds Lifesize Remaining: Unlimited Anti-replay service: Enabled, Replay window size: 64 Direction: outbound, SPI: 4038397695, AUX-SPI: 0 Mode: tunnel, Type: dynamic, State: Installed Protocol: ESP, Authentication: hmac-sha1-96, Encryption: 3des-cbc Soft lifetime: Expires in 40 seconds Hard lifetime: Expires in 175 seconds Lifesize Remaining: Unlimited Anti-replay service: Enabled, Replay window size: 64
user@host> show security ipsec security-associations
brief
Total active tunnels: 2 ID Gateway Port Algorithm SPI Life:sec/kb Mon vsys <16384 1.1.1.1 500 ESP:3des/sha1 af88baa 28795/unlim D 0 >16384 1.1.1.1 500 ESP:3des/sha1 f4e3e5f4 28795/unlim D 0
user@host> show security ipsec security-associations
detail
Virtual-system: Root Local Gateway: 1.1.1.2, Remote Gateway: 1.1.1.1 Local Identity: ipv4_subnet(any:0,[0..7]=0.0.0.0/0) Remote Identity: ipv4_subnet(any:0,[0..7]=0.0.0.0/0) DF-bit: clear Direction: inbound, SPI: 184060842, AUX-SPI: 0 Hard lifetime: Expires in 28785 seconds Lifesize Remaining: Unlimited Soft lifetime: Expired Mode: tunnel, Type: dynamic, State: installed, VPN Monitoring: DOWN Protocol: ESP, Authentication: hmac-sha1-96, Encryption: 3des-cbc Anti-replay service: enabled, Replay window size: 32 Direction: outbound, SPI: 4108576244, AUX-SPI: 0 Hard lifetime: Expires in 28785 seconds Lifesize Remaining: Unlimited Soft lifetime: Expired Mode: tunnel, Type: dynamic, State: installed, VPN Monitoring: DOWN Protocol: ESP, Authentication: hmac-sha1-96, Encryption: 3des-cbc Anti-replay service: enabled, Replay window size: 32
user@host> show security ipsec security-associations
detail
Virtual-system: Root Local Gateway: 20.0.0.4, Remote Gateway: 30.0.0.2 Local Identity: ipv4_subnet(any:0,[0..7]=0.0.0.0/0) Remote Identity: ipv4(any:0,[0..3]=20.0.0.4) DF-bit: clear Policy-name: p1 Location: FPC 1, PIC 2, KMD-Instance 3 Direction: inbound, SPI: 3727011331, AUX-SPI: 0 Hard lifetime: Expires in 3570 seconds Lifesize Remaining: Unlimited Soft lifetime: Expires in 3525 seconds Mode: tunnel, Type: dynamic, State: installed, VPN Monitoring: - Protocol: ESP, Authentication: hmac-sha1-96, Encryption: aes-cbc (128 bits) Anti-replay service: enabled, Replay window size: 32 Location: FPC 1, PIC 2, KMD-Instance 3 Direction: outbound, SPI: 4212479378, AUX-SPI: 0 Hard lifetime: Expires in 3570 seconds Lifesize Remaining: Unlimited Soft lifetime: Expires in 3525 seconds Mode: tunnel, Type: dynamic, State: installed, VPN Monitoring: - Protocol: ESP, Authentication: hmac-sha1-96, Encryption: aes-cbc (128 bits) Anti-replay service: enabled, Replay window size: 32
user@host> show security ipsec security-associations
fpc 6 pic 1 kmd-instance all
Total active tunnels: 1 ID Gateway Port Algorithm SPI Life:sec/kb Mon vsys <2 1.1.1.2 500 ESP:3des/sha1 67a7d25d 28280/unlim - 0 >2 1.1.1.2 500 ESP:3des/sha1 a23cbcdc 28280/unlim - 0