Monitoring DVMRP/IPSec, GRE/IPSec, and L2TP/IPSec Tunnels
This section contains information about troubleshooting and monitoring DVMRP/IPSec, GRE/IPSec, and L2TP/IPSec tunnels.
System Event Logs
To troubleshoot and monitor DVMRP/IPSec, GRE/IPSec, and L2TP/IPSec tunnels, use the following system event log:
For more information about using event logs, see the JUNOSe System Event Logging Reference Guide.
show Commands
To display profile and connection information for DVMRP/IPSec, GRE/IPSec, and L2TP/IPSec tunnels, use the following show commands.
show dvmrp tunnel
- Use to display information about DVMRP or GRE tunnels.
- If the tunnel is protected by IPSec, the show dvmrp tunnel detail and show gre tunnel detail commands include a line indicating the IPSec transport interface. The line is not shown for unsecured tunnels. The following is a partial display. See Monitoring IP Tunnels in Chapter 10, Configuring IP Tunnels for full descriptions of the commands.
- Example
host1#show gre tunnel detailTunnel operational configurationTunnel name is 'vr1'Tunnel mtu is '10240'Tunnel source address is '10.0.0.2'Tunnel destination address is '10.0.0.1'Tunnel transport virtual router is vr1Tunnel checksum option is disabledTunnel up/down trap is enabledTunnel server location is 4/0Tunnel secured by ipsec transport interface 1Tunnel administrative state is up. . .show ipsec ike-sa
NOTE: The show ipsec ike-sa command replaces the show ike sa command, which may be removed completely in a future release.
- Use to display IKE phase 1 SAs running on the router.
- When NAT-T is enabled on both the client PC and the E-series router, and the router has negotiated NAT-T as part of the IKE SA, the local UDP port number displayed in the Local:Port column is typically 4500. When NAT-T is disabled or not supported on one or both sides of the IKE SA negotiation, the local UDP port number is 500. (See the Example for more information.)
- Field descriptions
- Local:PortLocal IP address and UDP port number of phase 1 negotiation
- Remote:PortRemote IP address and UDP port number of phase 1 negotiation
- Time(Sec)Time remaining in phase 1 lifetime, in seconds
- StateCurrent state of the phase 1 negotiation. Corresponds to the messaging state in the main mode and aggressive mode negotiations. Possible states are:
- AM_SA_IInitiator has sent initial aggressive mode SA payload and key exchange to the responder
- AM_SA_RResponder has sent aggressive mode SA payload and key exchange to the initiator
- AM_FINAL_IInitiator has finished aggressive mode negotiation
- AM_DONE_RResponder has finished aggressive mode negotiation
- MM_SA_IInitiator has sent initial main mode SA payload to the responder
- MM_SA_RResponder has sent a response to the initial main mode SA
- MM_KE_IInitiator has sent initial main mode key exchange to the responder
- MM_KE_RResponder has sent a response to the key exchange
- MM_FINAL_IInitiator has sent the final packet in the main mode negotiation
- MM_FINAL_RResponder has finished main mode negotiation
- MM_DONE_IInitiator has finished main mode negotiation
- DONEPhase 1 SA negotiation is complete, as evidenced by receipt of some phase 2 messages
- Local CookieUnique identifier (SPI) for the local phase 1 IKE SA
- Remote CookieUnique identifier (SPI) for the remote phase 1 IKE SA
The following example displays the IKE phase 1 SAs for three remote client PCs that are accessing an E-series router (IP address 21.227.9.8).
The first client PC listed (IP address 21.227.9.10) is not located behind a NAT device, and is therefore not using NAT-T to access the router. This PC appears in the Remote:Port column with its own IP address (21.227.9.10) and UDP port number 500.
The remaining two client PCs are located behind a NAT device that has IP address 21.227.9.11, and are using NAT-T to access the router. These PCs appear in the Remote:Port column with the same IP address (21.227.9.11) but with two different UDP port numbers, 4500 and 14500.
host1#show ipsec ike-saIKE Phase 1 SA's:Local:Port Remote:Port Time(Sec) State Local Cookie Remote Cookie21.227.9.8:500 21.227.9.10:500 26133 DONE 0x87a943562124c711 0xafa2cf4a260399a421.227.9.8:4500 21.227.9.11:4500 28774 DONE 0x01f9efa234d45ad8 0xada4cb7cafee924321.227.9.8:4500 21.227.9.11:14500 28729 DONE 0x0c5ccb6b94b00051 0xe975c0ae3b9ca8bfshow ipsec option
- Use to display whether NAT-T is enabled or disabled on the current virtual router.
- The show ipsec option command also displays the status of dead peer detection (DPD) on the virtual router. For information about configuring and monitoring DPD, see Chapter 6, Configuring IPSec.
- Example
host1:westford#show ipsec optionIPsec options:Dead Peer Detection: disabledNAT Traversal : enabledshow ipsec transport interface
- Virtual routerVirtual router on which this profile is configured
- ApplicationType of application the connection can protect
- pfs groupPFS group being used for the connection
- MtuTunnel's MTU size
- Local addressLocal endpoint address
- Remote addressRemote endpoint address
- Local identityShows the subnet, protocol, and port
- Remote identityShows the subnet, protocol, and port
- Inbound spiInbound security parameter index
- Inbound transformInbound algorithm
- Inbound lifetimeInbound configured lifetime in seconds and kilobytes
- Outbound spiOutbound security parameter index
- Outbound transformOutbound algorithm
- Outbound lifetimeOutbound configured lifetime in seconds and kilobytes
- InUserPacketsNumber of user packets received
- InUserOctetsNumber of octets received from user packets
- InAccPacketsNumber of encapsulated packets received
- InAccOctetsNumber of octets received in encapsulated packets
- InAuthErrorsNumber of authentication errors received
- InReplyErrorsNumber of reply errors in received traffic
- InPolicyErrorsNumber of policy errors in received traffic
- InOtherRxErrorsNumber of packets received that have errors other than those listed above
- InDecryptErrorsNumber of decryption errors in received traffic
- InPadErrorsNumber of packets received that had invalid values after the packet was decrypted
- OutUserPacketsNumber of user packets sent
- OutUserOctetsNumber of octets sent in user packets
- OutAccPacketsNumber of encapsulated packets sent
- OutAccOctetsNumber of octets sent in encapsulated packets
- OutPolicyErrorsNumber of packets arriving at the transport connection for encapsulation that do not meet the specified identifier (selector)
- OutOtherTxErrorsNumber of outbound packets that have errors other than those listed above
host1:vr11#show ipsec transport interfaceIPSEC transport interface 5 is UpIPSEC transport interface 6 is Up2 Ipsec transport interfaces foundExample 2 host1:vr11#show ipsec transport interface 5IPSEC transport interface 5 is UpExample 3 host1:vr11#show ipsec transport interface detail 5IPSEC transport interface 5 is UpConfigurationVirtual router vr00Application greNo pfs groupMtu is 1440Local address is 10.255.0.61Remote address is 10.255.0.62Local identity is subnet 10.255.0.61 255.255.255.255, proto 47, port 0Remote identity is subnet 10.255.0.62 255.255.255.255, proto 47, port 0Inbound spi 0x15c30204Inbound transform transport-esp-3des-sha1Inbound lifetime 900 seconds 102400 kilobytesOutbound spi is 0x16a10205Outbound transform transport-esp-3des-sha1Outbound lifetime 900 seconds 102400 kilobytesStatisticsInUserPackets 5InUserOctets 270InAccPackets 5InAccOctets 440InAuthErrors 0InReplayErrors 0InPolicyErrors 0InOtherRxErrors 0InDecryptErrors 0InPadErrors 0OutUserPackets 5OutUserOctets 270OutAccPackets 5OutAccOctets 440OutPolicyErrors 0OutOtherTxErrors 0show ipsec transport interface summary
- Use to display a summary of existing IPSec transport connections by application and state.
- Field descriptions
- upNumber of IPSec transport interfaces that are currently up
- downNumber of IPSec transport interfaces that are currently down
- upper-boundNumber of IPSec transport interfaces that are currently bound to the upper layer
host1:vr11#show ipsec transport interface summaryOperational status up down upper-bound2 0 2show ipsec transport profile
- Virtual routerVirtual router on which this profile is configured
- Peer addressRemote endpoint address
- ApplicationType(s) of application that this profile is protecting
- Lifetime range in secondsLifetime range in seconds configured for the profile
- Lifetime range in kilobytesLifetime range in kilobytes configured for the profile
- TransformSetTransform set(s) configured for the profile
- Pfs groupPFS group configured for the profile; 0 (zero) means that PFS is not configured for the profile
- Local ip addressLocal endpoint address
host1:vr11#show ipsec transport profileIPSEC transport profile goi1IPSEC transport profile goi22 Ipsec transport profiles foundExample 2 host1:vr11#show ipsec transport profile goi1IPSEC transport profile goi1Virtual router vr00Peer address 10.255.0.62Application gre,dvmrpLifetime range in seconds 900 900Lifetime range in kilobytes 102400 4294967294TransformSet transport-esp-3des-sha1Pfs group 0Local ip address : 10.255.0.61show l2tp destination profile
- Use to display configuration information for an L2TP destination profile and its associated L2TP host profiles.
- If single-shot tunnels are configured for a particular host profile, the command displays this information as an attribute of the profile for that remote host.
- Field descriptions
- TransportMethod used to transfer traffic
- Virtual routerName of the virtual router
- Peer addressIP address of the LAC
- Destination profile maximum sessionsMaximum number of sessions allowed for the destination profile
- Destination profile current session countNumber of current sessions for the destination profile
- Remote host isName of the remote host
- Tunnel password isPassword for the tunnel
- Interface profile isName of the host profile
- Local host name isName of the local host
- Ipsec transport isStatus of the IPSec transport connection: enabled or disabled
- Disconnect-cause avp isStatus of the disconnect cause AVP generation: enabled or disabled
- Tunnels are single-shotIndicates that single-shot tunnels are configured for this host profile
- Current session count isNumber of current sessions for the host profile
host1#show l2tp destination profile westfordL2TP destination profile westfordConfigurationDestination addressTransport ipUdpVirtual router defaultPeer address 172.31.1.99StatisticsDestination profile current session count is 1Host profile attributesRemote host is lac-1ConfigurationTunnel password is passwordInterface profile is tunneled-userLocal host name is lns-1Ipsec transport is enabledDisconnect-cause avp is enabledTunnels are single-shotStatisticsCurrent session count is 11 L2TP host profile found