show security group-vpn member ike security-associations
Syntax
show security group-vpn member ike security-associations [brief | detail] [index sa-index] [peer-ipaddress]
Description
Display IKE security associations (SAs) for group members. Group VPNv2 is supported on SRX300, SRX320, SRX340, SRX345, SRX550HM, SRX1500, SRX4100, SRX4200, and SRX4600 Series Firewalls and vSRX Virtual Firewall instances.
Options
none—Display summary information about all IKE SAs for the group members.
brief
—(Optional) Display summary output.detail
—(Optional) Display detailed output.index
sa-index—(Optional) Display detailed information about the specified SA identified by index number. To obtain a list of all SAs that includes their index numbers, use the command with no options.peer-ipaddress—(Optional) Display information about the SA with the specified peer.
Required Privilege Level
view
Output Fields
Table 1 lists the output fields for the show security group-vpn member ike security-associations
command. Output fields are listed in the approximate order in which they appear.
Field Name |
Field Description |
---|---|
|
Index number of an SA. This number is an internally generated number you can use to display information about a single SA. |
|
State of the IKE security associations:
|
|
Random number, called a cookie, which is sent to the remote node when the IKE negotiation is triggered. |
|
Random number generated by the remote node and sent back to the initiator as a verification that the packets were received. A cookie is aimed at protecting the computing resources from attack without spending excessive CPU resources to determine the cookie's authenticity. |
|
Negotiation method agreed on by the two IPsec endpoints, or peers, used to exchange information between themselves. Each exchange type determines the number of messages and the payload types that are contained in each message. The modes, or exchange types, are
|
|
IP address of the destination peer with which the local peer communicates. |
|
IP address of the destination peer with which the local peer communicates. |
|
Negotiation method agreed on by the two IPsec endpoints, or peers, used to exchange information between themselves. Each exchange type determines the number of messages and the payload types that are contained in each message. The modes, or exchange types, are
|
|
Method the server uses to authenticate the source of IKE messages:
|
|
Address of the local peer. |
|
Number of seconds remaining until the IKE SA expires. |
|
Internet Key Exchange (IKE) algorithms used to encrypt and secure exchanges between the peers during the IPsec Phase 2 process:
|
|
|
Sample Output
show security group-vpn member ike security-associations
user@host> show security group-vpn member ike security-associations Index State Initiator cookie Responder cookie Mode Remote Address 4736345 UP 70611c65603d53da 6e0888777ad10f8d Main 192.0.2.3
Sample Output
show security group-vpn member ike security-associations detail
user@host> show security group-vpn member ike security-associations detail IKE peer 192.0.2.5, Index 5824842, Gateway Name: group1_2 Role: Initiator, State: UP Initiator cookie: fc866556b8afe4cd, Responder cookie: 1238de6b8a89de44 Exchange type: Main, Authentication method: Pre-shared-keys Local: 192.0.2.7:848, Remote: 192.0.2.5:848 Lifetime: Expires in 2 seconds Peer ike-id: 192.0.2.5 Xauth user-name: not available Xauth assigned IP: 0.0.0.0 Algorithms: Authentication : hmac-sha1-96 Encryption : 3des-cbc Pseudo random function: hmac-sha1 Diffie-Hellman group : DH-group-2 Traffic statistics: Input bytes : 2044 Output bytes : 900 Input packets: 7 Output packets: 7 Flags: IKE SA is created
Release Information
Command introduced in Junos OS Release 10.2.