show ike security-associations
Syntax
show ike security-associations <brief | detail> <peer-address>
Description
(Encryption interface on M Series and T Series routers only) Display information about Internet Key Exchange (IKE) security associations.
Options
none | Display standard information about all IKE security associations. |
brief | detail | (Optional) Display the specified level of output. |
peer-address | (Optional) Display IKE security associations for the specified peer address. |
Required Privilege Level
view
Output Fields
Table 1 lists the output fields for the show ike security-associations
command. Output fields are listed in the approximate order in which
they appear.
Field Name |
Field Description |
Level of Output |
---|---|---|
IKE peer |
Remote end of the IKE negotiation. |
detail |
Role |
Part played in the IKE session. The router triggering the IKE negotiation is the initiator, and the router accepting the first IKE exchange packets is the responder. |
detail |
Remote Address |
Responder's address. |
none specified |
State |
State of the IKE security association:
|
none specified |
Initiator cookie |
When the IKE negotiation is triggered, a random number is sent to the remote node. |
All levels |
Responder cookie |
The remote node generates its own random number and sends it back to the initiator as a verification that the packets were received. Of the numerous security services available, protection against denial of service (DoS) is one of the most difficult to address. A “cookie” or anticlogging token (ACT) is aimed at protecting the computing resources from attack without spending excessive CPU resources to determine the cookie's authenticity. An exchange prior to CPU-intensive public key operations can thwart some DoS attempts (such as simple flooding with invalid IP source addresses). |
All levels |
Exchange type |
Specifies the number of messages in an IKE exchange, and the payload types that are contained in each message. Each exchange type provides a particular set of security services, such as anonymity of the participants, perfect forward secrecy of the keying material, and authentication of the participants. Junos OS supports two types of exchanges:
|
All Levels |
Authentication method |
Type of authentication determines which payloads are exchanged and when they are exchanged. The Junos OS supports only pre-shared keys. |
detail |
Local |
Prefix and port number of the local end. |
detail |
Remote |
Prefix and port number of the remote end. |
detail |
Lifetime |
Number of seconds remaining until the IKE security association expires. |
detail |
Algorithms |
Header for the IKE algorithms output.
|
detail |
Traffic statistics |
Number of bytes and packets received and transmitted on the IKE security association.
|
detail |
Flags |
Notification to the key management process of the status of the IKE negotiation:
|
detail |
IPsec security associates |
Number of IPsec security associations created and deleted with this IKE security association. |
detail |
Phase 2 negotiations in progress |
Number of phase 2 IKE negotiations in progress and status information:
|
detail |
Sample Output
show ike security-associations
user@host> show ike security-associations Remote Address State Initiator cookie Responder cookie Exchange type 192.0.2.4 Matured 93870456fa000011 723a20713700003e Main
show ike security-associations detail
user@host> show ike security-associations detail IKE peer 192.0.2.4 Role: Initiator, State: Matured Initiator cookie: cf22bd81a7000001, Responder cookie: fe83795c2800002e Exchange type: Main, Authentication method: Pre-shared-keys Local: 192.0.2.5:500, Remote: 192.0.2.4:500 Lifetime: Expires in 187 seconds Algorithms: Authentication : md5 Encryption : 3des-cbc Pseudo random function: hmac-md5 Traffic statistics: Input bytes : 1000 Output bytes : 1280 Input packets: 5 Output packets: 9 Flags: Caller notification sent IPsec security associations: 2 created, 0 deleted Phase 2 negotiations in progress: 1 Negotiation type: Quick mode, Role: Initiator, Message ID: 3582889153 Local: 192.0.2.5:500, Remote: 192.0.2.4:500 Local identity: ipv4_subnet(tcp:80,[0..7]=10.1.1.0/24) Remote identity: ipv4_subnet(tcp:100,[0..7]=10.1.2.0/24) Flags: Caller notification sent, Waiting for done
Release Information
Command introduced before Junos OS Release 7.4.