show services ipsec-vpn ike security-associations
Syntax
show services ipsec-vpn ike security-associations <brief | detail> <peer-address>
Description
(Adaptive services interface only) Display information for Internet Key Exchange (IKE) security associations. If no security association is specified, the information for all security associations is displayed.
Options
none | (same as brief) Display standard information for all IPsec security associations. |
brief | detail | (Optional) Display the specified level of output. |
peer-address | (Optional) Display information about a particular security association address. |
Required Privilege Level
view
Output Fields
Table 1 lists the output fields for the show services ipsec-vpn ike
security-associations
command. Output fields are listed in the
approximate order in which they appear.
Field Name |
Field Description |
Level of Output |
---|---|---|
IKE peer |
Remote end of the IKE negotiation. |
detail |
Role |
Part played in the IKE session. The router triggering the IKE negotiation is the initiator, and the router accepting the first IKE exchange packets is the responder. |
detail |
Remote Address |
Responder's address. |
none specified |
State |
State of the IKE security association:
|
none specified |
Initiator cookie |
When the IKE negotiation is triggered, a random number is sent to the remote node. |
All levels |
Responder cookie |
The remote node generates its own random number and sends it back to the initiator as a verification that the packets were received. Of the numerous security services available, protection against denial of service (DoS) is one of the most difficult to address. A “cookie” or anticlogging token (ACT) is aimed at protecting the computing resources from attack without spending excessive CPU resources to determine the cookie's authenticity. An exchange prior to CPU-intensive public key operations can thwart some DoS attempts (such as simple flooding with invalid IP source addresses). |
All levels |
Exchange type |
Specifies the number of messages in an IKE exchange, and the payload types that are contained in each message. Each exchange type provides a particular set of security services, such as anonymity of the participants, perfect forward secrecy of the keying material, and authentication of the participants. Junos OS supports two types of exchanges:
|
All levels |
PIC |
The services PIC for which the IKE security associations are displayed. |
All levels |
Authentication method |
Authentication method that determines which payloads are exchanged and when they are exchanged. Value can be ECDSA-signatures (256 bit key), ECDSA-signatures (384 bit key), Pre-shared-keys, or RSA-signatures. Note:
In Junos FIPS mode, ECDSA is not supported in Junos OS Release 17.3R1. Starting in Junos OS Release 17.4R1, ECDSA is supported in Junos FIPS mode. |
detail |
Local |
Prefix and port number of the local end. |
detail |
Remote |
Prefix and port number of the remote end. |
detail |
Lifetime |
Number of seconds remaining until the IKE security association expires. |
detail |
Algorithms |
Header for the IKE algorithms output.
|
detail |
Traffic statistics |
Number of bytes and packets received and transmitted on the IKE security association.
|
detail |
Flags |
Notification to the key management process of the status of the IKE negotiation:
|
detail |
IPsec security associates |
Number of IPsec security associations created and deleted with this IKE security association. |
detail |
Phase 2 negotiations in progress |
Number of phase 2 negotiations in progress and status information:
|
detail |
Sample Output
- show services ipsec-vpn ike security-associations
- show services ipsec-vpn ike security-associations detail
- show services ipsec-vpn ike security-associations (on ACX500 Routers)
show services ipsec-vpn ike security-associations
user@host> show services ipsec-vpn ike security-associations Remote Address State Initiator cookie Responder cookie Exchange type 192.0.2.1 Matured 062d291d21275fc7 82ef00e3d1f1c981 Main 192.0.2.2 Matured cd6d581d7bb1664d 88a707779f3ad8d1 Main 192.0.2.3 Matured 86621051e3e78360 6bc5cc83fd67baa4 IKEv2 PIC: sp-0/3/0 192.0.2.7 Matured 565e2813075e6fdb 67886757a74edcd6 IKEv2
show services ipsec-vpn ike security-associations detail
user@host> show services ipsec-vpn ike security-associations detail IKE peer 198.51.100.2 Role: Responder, State: Matured Initiator cookie: d91c9f20f78e1d4e, Responder cookie: 727a04ed8d5021a1 Exchange type: IKEv2, Authentication method: Pre-shared-keys Local: 2013.0.113.2:500, Remote: 198.51.100:500 Lifetime: Expires in 1357 seconds Algorithms: Authentication : sha1 Encryption : 3des-cbc Pseudo random function: hmac-sha1 Traffic statistics: Input bytes : 22244 Output bytes : 22236 Input packets: 263 Output packets: 263 Flags: Caller notification sent IPSec security associations: 0 created, 0 deleted Phase 2 negotiations in progress: 0 IKE peer 192.0.2.4 Role: Initiator, State: Matured Initiator cookie: cf22bd81a7000001, Responder cookie: fe83795c2800002e Exchange type: Main, Authentication method: Pre-shared-keys Local: 192.0.2.5:500, Remote: 192.0.2.4:500 Lifetime: Expires in 187 seconds Algorithms: Authentication : md5 Encryption : 3des-cbc Pseudo random function: hmac-md5 Traffic statistics: Input bytes : 1000 Output bytes : 1280 Input packets: 5 Output packets: 9 Flags: Caller notification sent IPsec security associations: 2 created, 0 deleted Phase 2 negotiations in progress: 1 Negotiation type: Quick mode, Role: Initiator, Message ID: 3582889153 Local: 192.0.2.5:500, Remote: 192.0.2.4:500 Local identity: ipv4_subnet(tcp:80,[0..7]=10.1.1.0/24) Remote identity: ipv4_subnet(tcp:100,[0..7]=10.1.2.0/24) Flags: Caller notification sent, Waiting for done
show services ipsec-vpn ike security-associations (on ACX500 Routers)
user@host> show services ipsec-vpn ike security-associations Remote Address State Initiator cookie Responder cookie Exchange type 192.168.10.130 Matured 90864887dfecb178 9a2ee2ab786f960d Main 192.168.20.130 Matured 1dd17732a8c9b13a b06e5072ac7362bf Main 192.0.2.7 Matured 565e2813075e6fdb 67886757a74edcd6 IKEv2
Release Information
Command introduced before Junos OS Release 7.4.
Statistics for Internet Key Exchange (IKE) security associations for each services PIC introduced in Junos OS Release 12.1.