show security group-vpn member ipsec security-associations
Syntax
show security group-vpn member ipsec security-associations [brief | detail] [index sa-index]
Description
Display group VPN security associations (SAs) for a group member. Group VPNv2 is supported on SRX300, SRX320, SRX340, SRX345, SRX550HM, SRX1500, SRX4100, SRX4200, and SRX4600 Series Firewalls and vSRX Virtual Firewall instances.
Options
none—Display information about all group VPN SAs for the group member.
brief
—(Optional) Display summary output.detail
—(Optional) Display detailed output.index
sa-index—(Optional) Display detailed information about the specified SA identified by index number. To obtain a list of all SAs that includes their index numbers, use the command with no options.
Required Privilege Level
view
Output Fields
Table 1 lists the output fields for the show security group-vpn
member ipsec security-associations
command. Output fields are
listed in the approximate order in which they appear.
Field Name |
Field Description |
---|---|
|
Total number of active IPsec tunnels. |
|
Index number of the SA. You can use this number to get additional information about the SA. |
|
IP address of the group server (remote gateway). |
|
If Network Address Translation-Traversal (NAT-T) is used, this value is 4500. Otherwise it is the standard IKE port, 500. |
|
Cryptography used to secure exchanges between peers during the IKE Phase 2 negotiations includes
|
|
Security parameter index (SPI) identifier. An SA is uniquely identified by an SPI. |
|
The lifetime of the SA, after which it expires, expressed either in seconds or kilobytes. |
|
Group identifier. |
|
The root system. |
|
Gateway address of the local system. |
|
IP address of the group server. |
|
Identity of the local peer so that its partner destination gateway can communicate with it. The value is specified as an IPv4 address, fully qualified domain name, e-mail address, or distinguished name. |
|
IPv4 address of the destination peer gateway. |
|
State of the don't fragment bit: set or cleared. |
Forward-policy-mismatch |
Enable the support for forwarding policy-mismatched packets |
|
Name of the applicable policy. |
|
Direction of the security association; it can be inbound or outbound. |
|
Value of the auxiliary security parameter index.
|
|
The hard lifetime specifies the lifetime of the SA.
|
|
The lifesize remaining specifies the usage limits in kilobytes. If there is no lifesize specified, it shows unlimited.
|
|
The soft lifetime informs the IPsec key management system that the SA is about to expire. Each lifetime of a security association has two display options, hard and soft, one of which must be present for a dynamic security association. This allows the key management system to negotiate a new SA before the hard lifetime expires.
|
|
Mode of the security association:
|
|
Protocol supported. Transport mode supports Encapsulation Security Protocol (ESP). |
|
State of the service that prevents packets from being
replayed. It can be |
Sample Output
show security group-vpn member ipsec security-associations
user@host> show security group-vpn member ipsec security-associations Total active tunnels: 2 ID Server Port Algorithm SPI Life:sec/kb GId lsys <>49157 192.168.1.53 848 ESP:3des/sha1 c0792f86 114/ unlim 2000 root <>49156 192.168.1.53 848 ESP:aes-256/md5 7def169d 18/ unlim 2000 root <>49156 192.168.1.53 848 ESP:aes-256/md5 86c48448 146/ unlim 2000 root
Sample Output
show security group-vpn member ipsec security-associations detail
user@host> show security group-vpn member ipsec security-associations detail Virtual-system: root Group VPN Name: group2000 Local Gateway: 192.168.1.70, GDOI Server: 192.168.1.53 Group Id: 2000 Routing Instance: vr1 Recovery Probe: Enabled DF-bit: clear Forward-policy-mismatch:Enabled Stats: Pull Succeeded : 3 Pull Failed : 0 Pull Timeout : 6 Pull Aborted : 0 Push Succeeded : 1773 Push Failed : 0 Server Failover : 0 Delete Received : 0 Exceed Maximum Keys(4) : 0 Exceed Maximum Policies(10): 0 Unsupported Algo : 0 Flags: Rekey Needed: no List of policies received from server: Tunnel-id: 49157 Source IP: ipv4_subnet(any:900,[0..7]=192.168.1.0/24) Destination IP: ipv4_subnet(any:901,[0..7]=192.168.1.0/24) Direction: bi-directional, SPI: c0792f86 Protocol: ESP, Authentication: sha1, Encryption: 3des Hard lifetime: Expires in 81 seconds, Activated Lifesize Remaining: Unlimited Soft lifetime: Expired Mode: Tunnel, Type: Group VPN, State: installed Anti-replay service: D3P enabled, Window size: 3000 milliseconds Direction: bi-directional, SPI: a645b381 Protocol: ESP, Authentication: sha1, Encryption: 3des Hard lifetime: Expires in 207 seconds, Activated in 51 seconds Lifesize Remaining: Unlimited Soft lifetime: Expires in 117 seconds Mode: Tunnel, Type: Group VPN, State: installed Anti-replay service: D3P enabled, Window size: 3000 milliseconds
Release Information
Command introduced in Junos OS Release 10.2.
Command introduced in Junos OS Release 18.2R1 for MX-series.