show services ipsec-vpn ipsec security-associations
Syntax
show services ipsec-vpn ipsec security-associations <brief | detail | extensive> <service-set service-set-name>
Description
(Adaptive services interface only) Display IPsec security associations for the specified service set. If no service set is specified, the security associations for all service sets are displayed.
Options
none | Display standard information about IPsec security associations for all service sets. |
brief | detail | extensive | (Optional) Display the specified level of output. |
service-set service-set-name | (Optional) Display information about a particular service set. |
Required Privilege Level
view
Output Fields
Table 1 lists the output fields for the show services ipsec-vpn
ipsec security-associations
command. Output fields are listed
in the approximate order in which they appear.
Field Name |
Field Description |
Level of Output |
---|---|---|
|
Name of the service set for which the IPsec security associations are defined. If appropriate, includes the outside service interface VRF name. |
All levels |
|
Name of the rule set applied to the security association. |
|
|
Name of the IPsec term applied to the security association. |
|
|
Numeric identifier of the specific IPsec tunnel for the security association. |
|
|
Gateway address of the local system. |
All levels |
|
Gateway address of the remote system. |
All levels |
|
Name of the logical interface hosting the IPsec tunnels. |
All levels |
|
MTU of the IPsec tunnel. |
All levels |
|
Total amount of time that an IPsec tunnel has been up across security association rekeys. |
|
|
Protocol, address or prefix, and port number of the local entity
of the IPsec association. The format is
The value of the |
All levels |
|
Protocol, address or prefix, and port number of the remote entity
of the IPsec association. The format is
The value of the |
All levels |
|
IP address of the configured primary remote peer. |
All levels |
|
IP address of the configured backup remote peer. |
All levels |
|
State of the primary or backup
interface: |
All levels |
|
Number of times a PIC switched between primary and backup interfaces, or the number of times the tunnel switched between the primary and remote peers since the software has been activated. |
All levels |
|
Direction of the security association: |
All levels |
|
Value of the security parameter index. |
All levels |
|
Value of the auxiliary security parameter index.
|
All levels |
|
Mode of the security association:
|
|
|
Type of security association:
|
|
|
Status of the security association:
|
|
|
Protocol supported:
|
All levels |
|
Type of authentication used: |
|
|
Type of encryption algorithm used:
can be Note:
In Junos FIPS mode, AES-GCM is not supported in Junos OS Release 17.3R1. Starting in Junos OS Release 17.4R1, AES-GCM is supported in Junos FIPS mode. |
|
|
Each lifetime of a security association has two display options, hard and soft, one of which must be present for a dynamic security association. The hard lifetime specifies the lifetime of the SA. The soft lifetime, which is derived from the hard lifetime, informs the IPsec key management system that the SA is about to expire. This information allows the key management system to negotiate a new SA before the hard lifetime expires.
|
|
|
State of the service that prevents
packets from being replayed: |
|
|
Configured hard lifetime (total lifetime), in seconds, for the security association. |
|
|
Configured size, in packets, of the antireplay
service window: |
|
|
Configure to disable NAT-T functionality. By default the NAT-T is enabled. |
All levels. |
|
Specify the interval at which NAT keepalive packets can be sent so that NAT translation continues. |
All levels. |
Sample Output
- show services ipsec-vpn ipsec security associations extensive
- show services ipsec-vpn ipsec security associations detail
- show services ipsec-vpn ipsec security associations (on ACX500 Routers)
show services ipsec-vpn ipsec security associations extensive
user@host> show services ipsec-vpn ipsec security-associations extensive Service set: service-set-1 Rule: _junos_, Term: term-1, Tunnel index: 1 Local gateway: 192.0.2.2, Remote gateway: 198.51.100.4 IPSec inside interface: sp-2/0/0.1 Local identity: ipv4_subnet(any:0,[0..7]=0.0.0.0/0) Remote identity: ipv4_subnet(any:0,[0..7]=0.0.0.0/0) Primary remote gateway: 192.0.2.1, State: Standby Backup remote gateway: 198.51.100.4, State: Active Failover counter: 1 Direction: inbound, SPI: 3743521590, AUX-SPI: 0 Mode: tunnel, Type: dynamic, State: Installed Protocol: ESP, Authentication: hmac-sha1-96, Encryption: 3des-cbc Soft lifetime: Expires in 23043 seconds Hard lifetime: Expires in 23178 seconds Anti-replay service: Enabled, Replay window size: 64 Direction: outbound, SPI: 2551045240, AUX-SPI: 0 Mode: tunnel, Type: dynamic, State: Installed Protocol: ESP, Authentication: hmac-sha1-96, Encryption: 3des-cbc Soft lifetime: Expires in 23043 seconds Hard lifetime: Expires in 23178 seconds Anti-replay service: Enabled, Replay window size: 64 disable-natt: No, nat-keepalive: 10
show services ipsec-vpn ipsec security associations detail
user@host> show services ipsec-vpn ipsec security-associations detail Service set: ipsec-sset-0, IKE Routing-instance: default Rule: ipsec-rule-0, Term: term0, Tunnel index: 1 Local gateway: 192.0.2.1, Remote gateway: 192.0.2.2 IPSec inside interface: ms-3/0/0.1, Tunnel MTU: 1500 UDP encapsulate: Disabled, UDP Destination port: 0 Local identity: ipv4_subnet(any:0,[0..7]=198.51.100.0/16) Remote identity: ipv4_subnet(any:0,[0..7]=203.0.113.0/16) NATT Detection: Not Detected, NATT keepalive interval: 0 Total uptime: 0 days 0 hrs 1 mins 4 secs Direction: inbound, SPI: 4004530393, AUX-SPI: 0 Mode: tunnel, Type: dynamic, State: Installed Protocol: ESP, Authentication: hmac-sha1-96, Encryption: aes-cbc (128 bits) Soft lifetime: Expires in 27885 seconds Hard lifetime: Expires in 28736 seconds Anti-replay service: Enabled, Replay window size: 4096 Copy ToS: Enabled Copy TTL: Disabled, TTL value: 64 SA lifetime: 28800 seconds Direction: outbound, SPI: 1323638473, AUX-SPI: 0 Mode: tunnel, Type: dynamic, State: Installed Protocol: ESP, Authentication: hmac-sha1-96, Encryption: aes-cbc (128 bits) Soft lifetime: Expires in 27885 seconds Hard lifetime: Expires in 28736 seconds Anti-replay service: Enabled, Replay window size: 4096 Copy ToS: Enabled Copy TTL: Disabled, TTL value: 64 SA lifetime: 28800 seconds
show services ipsec-vpn ipsec security associations (on ACX500 Routers)
user@host> show services ipsec-vpn ipsec security-associations Service set: SS_1, IKE Routing-instance: Customer-1 Rule: rule_1, Term: 1, Tunnel index: 2 Local gateway: 192.168.1.11, Remote gateway: 192.168.10.130 IPSec inside interface: ms-0/2/0.8, Tunnel MTU: 1300 UDP encapsulate: Disabled, UDP Destination port: 0 Direction SPI AUX-SPI Mode Type Protocol inbound 2204677182 0 tunnel dynamic ESP outbound 3015420439 0 tunnel dynamic ESP Service set: SS_2, IKE Routing-instance: Customer-1 Rule: Customer-1_rule_1, Term: 1, Tunnel index: 1 Local gateway: 192.168.1.12, Remote gateway: 192.168.20.130 IPSec inside interface: ms-0/2/0.7, Tunnel MTU: 1300 UDP encapsulate: Disabled, UDP Destination port: 0 Direction SPI AUX-SPI Mode Type Protocol inbound 2093089828 0 tunnel dynamic ESP outbound 2160146627 0 tunnel dynamic ESP
Release Information
Command introduced before Junos OS Release 7.4.