show security group-vpn member kek security-associations
Syntax
show security group-vpn member kek security-associations [brief | detail | display xml] [index sa-index] [peer-ipaddress]
Description
Display Group VPNv2 security associations (SAs) for a group member. Group VPNv2 is supported on SRX300, SRX320, SRX340, SRX345, SRX550HM, SRX1500, SRX4100, SRX4200, and SRX4600 Series Firewalls and vSRX Virtual Firewall instances.
Group VPNv2 is the name of the Group VPN technology on MX5, MX10, MX40, MX80, MX240, MX480, and MX960 routers. Group VPNv2 is different from the Group VPN technology implemented on SRX Security Gateways.
For more information about Group VPN on SRX Security Gateway devices, see Group VPNv2 Overview.
Options
none—Display information about all Group VPNv2 SAs for the group member.
brief
—(Optional) Display summary output.detail
—(Optional) Display detailed output.display xml
—(Optional) Display xml.index
sa-index—(Optional) Display detailed information about the specified SA identified by index number. To obtain a list of all SAs that includes their index numbers, use the command with no options.peer-ipaddress—(Optional) Display information about the SA with the specified peer.
Required Privilege Level
view
Output Fields
Table 1 lists the output fields for the show security group-vpn
member kek security-associations
command. Output fields are
listed in the approximate order in which they appear.
Field Name |
Field Description |
---|---|
|
Index number of an SA. This number is an internally generated number you can use to display information about a single SA. |
|
IP address of the destination peer with which the local peer communicates. |
|
State of the KEK security associations:
|
|
Random number, called a cookie, which is sent to the remote node when the IKE negotiation is triggered. |
|
Random number generated by the remote node and sent back to the initiator as a verification that the packets were received. |
|
Security parameter index (SPI) identifier. An SA is uniquely identified by an SPI. |
|
Group identifier. |
|
IP address of the destination peer with which the local peer communicates. |
|
For the member, it is always responder. |
|
State of the KEK security associations, which is always up. |
|
RSA is the supported authentication method. |
|
Address of the local peer. |
|
Address of the remote peer. |
|
Number of seconds remaining until the IKE SA expires. |
|
Internet Key Exchange (IKE) algorithms used to encrypt and secure exchanges between the peers during the IPsec Phase 2 process:
|
|
|
|
Identify the latest set of information maintained in the server. |
|
Interval in seconds at which the server sends heartbeats to group members. |
|
The heartbeat threshold configured on the group member for the IPsec VPN. If this number of heartbeats is missed on the member, the member reregisters with the server. |
|
Number of heartbeats until the heartbeat threshold is reached, at which time the member reregisters with the server. When this number reaches 0, reregistration happens within 60 seconds. |
|
Number of seconds before a group member can use a new key when the member reregisters with the server. |
|
Multicast IP address to which the server sends rekey messages. |
|
Antireplay time window value in milliseconds. 0 means antireplay is disabled. |
|
Sequence number of the KEK SA groupkey-push message. This number is incremented with every groupkey-push message. |
Sample Output
show security group-vpn member kek security-associations
user@host> show security group-vpn member kek security-associations Index Server Address Life:sec Initiator cookie Responder cookie GroupId 5824843 192.168.2.53 166 46871e26227f08f3 f0a463a4d5c3737b 1
Sample Output
- show security group-vpn member kek security-associations detail
- show security group-vpn member kek security-associations detail | display xml
show security group-vpn member kek security-associations detail
user@host> show security group-vpn member kek security-associations detail Index 5824843, Group Id: 1 Group VPN Name: group1_2 Local Gateway: 192.168.2.170, GDOI Server: 192.168.2.53 Initiator cookie: 46871e26227f08f3, Responder cookie: f0a463a4d5c3737b Lifetime: Expires in 155 seconds Group Key Push Sequence number: 0 Algorithms: Sig-hash : hmac-md5-96 Encryption : 3des-cbc Traffic statistics: Input bytes : 0 Output bytes : 0 Input packets: 0 Output packets: 0 Stats: Push received : 0 Delete received : 0
show security group-vpn member kek security-associations detail | display xml
user@host> show security group-vpn member kek security-associations detail | display xml <rpc-reply xmlns:junos="http://xml.example.net/junos/15.1/junos"> <gvpn-kek-security-associations-information junos:style="detail"> <kek-security-associations-block> <security-association-index>2987691</security-association-index> <group-id>400</group-id> <group-vpn-name>gvpn400</group-vpn-name> <local-address>192.168.1.100</local-address> <server-address>192.168.1.1</server-address> <initiator-cookie>510f854307a03675</initiator-cookie> <responder-cookie>690e5f121fba6de7</responder-cookie> <lifetime-remaining>Expires in 23729 seconds</lifetime-remaining> <push-sequence-number>364</push-sequence-number> <ike-security-associations> <ike-sa-algorithms> <ike-sa-authentication-algorithm>hmac-sha1-96</ike-sa-authentication-algorithm> <ike-sa-sig-key-length>2048</ike-sa-sig-key-length> <ike-sa-encryption-algorithm>aes128-cbc</ike-sa-encryption-algorithm> </ike-sa-algorithms> <ike-sa-traffic-statistics> <ike-sa-input-bytes>3012</ike-sa-input-bytes> <ike-sa-output-bytes>252</ike-sa-output-bytes> <ike-sa-input-packets>3</ike-sa-input-packets> <ike-sa-output-packets>3</ike-sa-output-packets> </ike-sa-traffic-statistics> </ike-security-associations> <gvpn-kek-security-association-statistics> <kek-security-association-statistics> Push received : 3</kek-security-association-statistics> <kek-security-association-statistics> Delete received : 0</kek-security-association-statistics> </gvpn-kek-security-association-statistics> </kek-security-associations-block> </gvpn-kek-security-associations-information> <cli> <banner></banner> </cli> </rpc-reply>
Release Information
Command introduced in Junos OS Release 10.2.