show security group-vpn server ike security-associations
Syntax
show security group-vpn server ike security-associations [brief | detail] [group group-name | group-id group-id] [index sa-index]
Description
Display IKE security associations (SAs). Group VPNv2 is supported on SRX300, SRX320, SRX340, SRX345, SRX550HM, SRX1500, SRX4100, SRX4200, and SRX4600 Series Firewalls and vSRX Virtual Firewall instances.
Options
none—Display all IKE SAs for all groups.
brief—(Optional) Display summary output.
detail
—(Optional) Display detailed level of output.group
—(Optional) Display IKE SAs for the specified group.group-id
—(Optional) Display IKE SAs for the specified group.An IKE SA can be used by a group member to register to multiple groups. When you specify the
group
orgroup-id
options to list the IKE SAs for a specified group, all existing IKE SAs that could be used to register to the group are displayed.index
—(Optional) Display information for a particular SA based on the index number of the SA. To obtain the index number for a particular SA, display the list of existing SAs by using the command with no options.
Required Privilege Level
view
Output Fields
Table 1 lists the output fields for the show security group-vpn
server ike security-associations
command. Output fields are
listed in the approximate order in which they appear.
Field Name |
Field Description |
---|---|
|
Index number of an SA. This number is an internally generated number you can use to display information about a single SA. |
|
IP address of the destination peer with which the local peer communicates. |
|
State of the IKE security associations:
|
|
Random number, called a cookie, which is sent to the remote node when the IKE negotiation is triggered. |
|
Random number generated by the remote node and sent back to the initiator as a verification that the packets were received. A cookie is aimed at protecting the computing resources from attack without spending excessive CPU resources to determine the cookie's authenticity. |
|
Negotiation method agreed on by the two IPsec endpoints, or peers, used to exchange information between themselves. Each exchange type determines the number of messages and the payload types that are contained in each message. The modes, or exchange types, are
|
|
IP address of the destination peer with which the local peer communicates. |
|
Negotiation method agreed on by the two IPsec endpoints, or peers, used to exchange information between themselves. Each exchange type determines the number of messages and the payload types that are contained in each message. The modes, or exchange types, are
|
|
Method the server uses to authenticate the source of IKE messages:
|
|
Address of the local peer. |
|
Address of the remote peer. |
|
Number of seconds remaining until the IKE SA expires. |
|
Internet Key Exchange (IKE) algorithms used to encrypt and secure exchanges between the peers during the IPsec Phase 2 process:
|
|
|
|
|
|
Number of Phase 2 IKE negotiations in progress and status information:
|
Sample Output
show security group-vpn server ike security-associations
user@host> show security group-vpn server ike security-associations Index State Initiator cookie Responder cookie Mode Remote Address 738879 UP 0fa7c5fdcb74669f 8c21f5d1b533010c Aggressive 192.168.1.120
Sample Output
show security group-vpn server ike security-associations detail
user@host> show security group-vpn server ike security-associations detail IKE peer 192.168.1.120, Index 738879, Gateway Name: gvpn Role: Responder, State: UP Initiator cookie: 0fa7c5fdcb74669f, Responder cookie: 8c21f5d1b533010c Exchange type: Aggressive, Authentication method: Pre-shared-keys Local: 192.168.1.50:848, Remote: 192.168.1.120:848 Lifetime: Expires in 3541 seconds Peer ike-id: test Xauth user-name: not available Xauth assigned IP: 0.0.0.0 Algorithms: Authentication : hmac-sha-256-128 Encryption : aes-256-cbc Pseudo random function: hmac-sha-256 Diffie-Hellman group : DH-group-14 Traffic statistics: Input bytes : 600 Output bytes : 932 Input packets: 4 Output packets: 3 Flags: IKE SA is created IPSec security associations: 0 created, 0 deleted Phase 2 negotiations in progress: 0 Flags: IKE SA is created
Release Information
Command introduced in Junos OS Release 10.2.