This section contains information about troubleshooting and monitoring IPSec.
To troubleshoot and monitor IPSec, use the following system event logs:
For more information about using event logs, see the JUNOSe System Event Logging Reference Guide.
To view your IPSec configuration and to monitor IPSec tunnels and statistics, use the following show commands.
show ipsec ike-policy-rule
show ike policy-rule
![]() |
Note: The show ipsec ike-policy-rule command replaces the show ipsec isakmp-policy-rule command, which may be removed completely in a future release. |
host1#show ipsec ike-policy-rule
IKE Policy Rules:
Protection suite priority: 5
encryption algorithm :3DES Triple Data Encryption Standard(168 bit keys)
hash algorithm :SHA Secure Hash Standard
authentication method:RSA Signatures
Diffie-Hellman group :5 (1536 bit)
lifetime :7200 seconds
aggressive mode :Not Allowed
Protection suite priority: 6
encryption algorithm :3DES Triple Data Encryption Standard(168 bit keys)
hash algorithm :SHA Secure Hash Standard
authentication method:Pre Shared Keys
Diffie-Hellman group :2 (1024 bit)
lifetime :28800 seconds
aggressive mode :Not Allowed
show ipsec ike-sa
show ike sa
![]() |
Note: The show ipsec ike-sa command replaces the show ike sa command, which may be removed completely in a future release. |
host1# show ipsec ike-sa IKE Phase 1 SA's: Local:Port Remote:Port Time(Sec) State Local Cookie Remote Cookie 195.0.0.100:500 195.0.0.200:500 1551 DONE 0x90ee723e6cb0c016 0xf7d3651e93d56431 195.0.0.100:500 195.0.0.200:500 1552 DONE 0x821bccf81dcedbb0 0x35152bdb7a9c734e 195.0.1.100:500 195.0.1.200:500 1687 DONE 0x1b4fbcebe36d1b16 0xed742166a305a6a0 195.0.1.100:500 195.0.1.200:500 1687 DONE 0xacf3acd1b3555b6a 0x0af9edbc95622869 195.0.2.100:500 195.0.2.200:500 1688 DONE 0x3153379b32d8c936 0x17f5d77f9badc3cf 195.0.2.100:500 195.0.2.200:500 1688 DONE 0x6573dcbc9bf31fae 0x7af8b4d13078b463 195.0.3.100:500 195.0.3.200:500 1685 DONE 0xdc7df648fcac375a 0x0346752d2881d5c5 195.0.3.100:500 195.0.3.200:500 1685 DONE 0xe776e9ffb6678635 0x8de857af1c681874 195.0.4.100:500 195.0.4.200:500 1690 DONE 0x16410d890500e94e 0xbd47831b55e81c27
show ipsec lifetime
host1#show ipsec lifetime Default lifetime in seconds is '7200'. Default lifetime in kilobytes is '4294967295'.
show ipsec local-endpoint
host1#show ipsec local-endpoint transport-virtual-router default Local endpoint for transport-virtual-router default is '0.0.0.0'.
show ipsec option
host1:vrA#show ipsec option
IPsec options: Dead Peer Detection: disabled NAT Traversal : enabled TX Invalid Cookie : disabled
show ipsec transform-set
host1#show ipsec transform-set
Transform-set: Highest security = {esp-3des-hmac-sha }.
Transform-set: transform-esp-3des-hmac-sha = {esp-3des-hmac-sha }.
host1#show ipsec transform-set transform-esp-3des-hmac-sha
Transform-set: transform-esp-3des-hmac-sha = {esp-3des-hmac-sha}.
show ipsec tunnel detail
hostl#show ipsec tunnel detail IPSEC tunnel r200000 is Up Tunnel configuration: Tunnel type is signaled Tunnel mtu is 1440 Tunnel local endpoint is 195.0.0.200 Tunnel remote endpoint is 195.0.0.100 Tunnel source is 195.0.0.200 Tunnel destination is 195.0.0.100 Tunnel backup destination is 0.0.0.0 Tunnel transport virtual router is r Tunnel transform set is perf Tunnel local identity is ipAddress: 4.0.0.100 Tunnel peer identity is ipAddress: 3.0.0.100 Tunnel lifetime seconds is 7200 Tunnel lifetime kilobytes is 1024000 Tunnel pfs is group 5 Tunnel administrative state is Up
Tunnel Operational Attributes: inboundSpi = 0x17270202, inboundSa = esp-3des-hmac-sha inbound lifetime: allowed 7200s, remaining 7100s inbound traffic: allowed 1024000KB, remaining 1023997KB
outboundSpi = 0x283b0201, outboundSa = esp-3des-hmac-sha outbound lifetime: allowed 7200s, remaining 7100s outbound traffic: allowed 1024000KB, remaining 1023997KB
Tunnel Statistics: InUserPackets 15 InUserOctets 1920 InAccPackets 15 InAccOctets 2760 InAuthErrors 0 InReplayErrors 0 InPolicyErrors 0 InOtherRxErrors 0 InDecryptErrors 0 InPadErrors 0
OutUserPackets 15 OutUserOctets 1920 OutAccPackets 15 OutAccOctets 2760 OutPolicyErrors 0 OutOtherTxErrors 0
show ipsec tunnel summary
host1#show ipsec tunnel summary
Total number of ipsec interface is 40
Administrative status enabled disabled
40 0
Operational status up down lower-down not-present
40 0 0 0
show ipsec tunnel virtual-router
host1#show ipsec tunnel virtual-router default ip 10.255.1.13 IPSEC tunnel s0l1e3d0 is up IPSEC tunnel s0l1e3d1 is up IPSEC tunnel s0l2e3d0 is up IPSEC tunnel s0l2e3d1 is up IPSEC tunnel s0l3e3d0 is up IPSEC tunnel s0l4e3d0 is up IPSEC tunnel s0l4e3d1 is up IPSEC tunnel s0l5e3d0 is up
show license ipsec-tunnels
host1#show license ipsec-tunnels ipsec-tunnels license is 'g1k23b23eb2j' which allows 5000 tunnels with 1 IPsec card and 7500 tunnels with 2 or more IPsec cards.