[Contents] [Prev] [Next] [Index] [Report an Error]

show security ike security-associations

Syntax

show security ike security-associations
<peer-address>
<brief | detail>
<fpc slot-number>
<index SA-index-number>
<kmd-instance (all | kmd-instance-name)>
<pic slot-number>

Release Information

Command introduced in Release 8.5 of JUNOS software; fpc, pic, and kmd-instance options added in Release 9.3 of JUNOS software.

Description

Display information about Internet Key Exchange (IKE) security associations (SAs).

This command is supported on J-series and SRX-series devices.

Options

noneDisplay standard information about existing IKE SAs, including index numbers.

peer-address—(Optional) Display details about a particular SA, based on the IP address of the destination peer. This option and index provide the same level of output.

brief—(Optional) Display standard information about all existing IKE SAs. (Default)

detail—(Optional) Display detailed information about all existing IKE SAs.

fpc slot-number—Specific to SRX-series services gateway. Display information about existing IKE SAs in this particular Flexible PIC Concentrator (FPC) slot. This option is used to filter the output.

index SA-index-number—(Optional) Display information for a particular SA based on the index number of the SA. To obtain the index number for a particular SA, display the list of existing SAs by using the command with no options. This option and peer-address provide the same level of output.

kmd-instance —Specific to SRX-series services gateway. Display information about existing IKE SAs in the key management process (daemon) (KMD) identified by the FPC slot-number and PIC slot-number. This option is used to filter the output.

pic slot-number —Specific to SRX-series services gateway. Display information about existing IKE SAs in this particular PIC slot. This option is used to filter the output.

Required Privilege Level

view

Related Topics

clear security ike security-associations

List of Sample Output

show security ike security-associations
show security ike security-associations detail
show security ike security-associations detail (SRX-series devices)
show security ike security-associations index 8 detail
show security ike security-associations 1.1.1.2
show security ike security-associations fpc 6 pic 1 kmd-instance all (SRX-series devices)

Output Fields

Table 64 lists the output fields for the show security ike security-associations command. Output fields are listed in the approximate order in which they appear.

Table 64: show security ike security-associations Output Fields

Field Name

Field Description

IKE Peer or Remote Address

IP address of the destination peer with which the local peer communicates.

Index

Index number of an SA. This number is an internally generated number you can use to display information about a single SA.

Location

  • FPC—Flexible PIC Concentrator (FPC) slot number.
  • PIC—PIC slot number.
  • KMD-Instance—The name of the kmd-instance running on the SPU, identified by the FPC slot-number and PIC slot-number. Currently, 4 kmd-instances running on each SPU and any particular IKE negotiation is carried out by a single kmd-instance.

Role

Part played in the IKE session. The device triggering the IKE negotiation is the initiator, and the device accepting the first IKE exchange packets is the responder.

State

State of the IKE security associations:

  • DOWN—SA has not been negotiated with the peer.
  • UP—SA has been negotiated with the peer.

Initiator cookie

Random number, called a cookie, which is sent to the remote node when the IKE negotiation is triggered.

Responder cookie

Random number generated by the remote node and sent back to the initiator as a verification that the packets were received.

A cookie is aimed at protecting the computing resources from attack without spending excessive CPU resources to determine the cookie's authenticity.

Mode or Exchange type

Negotiation method agreed on by the two IPSec endpoints, or peers, used to exchange information between themselves. Each exchange type determines the number of messages and the payload types that are contained in each message. The modes, or exchange types, are

  • main—The exchange is done with six messages. This mode or exchange type encrypts the payload, protecting the identity of the neighbor. The authentication method used is displayed: preshared keys or certificate.
  • aggressive—The exchange is done with three messages. This mode or exchange type does not encrypt the payload, leaving the identity of the neighbor unprotected.

Local

Address of the local peer.

Remote

Address of the remote peer.

Lifetime

Number of seconds remaining until the IKE SA expires.

Algorithms

Internet Key Exchange (IKE) algorithms used to encrypt and secure exchanges between the peers during the IPSec Phase 2 process:

  • Authentication—Type of authentication algorithm used.
    • sha1—Secure Hash Algorithm 1(sha1) authentication.
    • md5—MD5 authentication
  • Encryption—Type of encryption algorithm used..
    • aes-256-cbc—Advanced Encryption Standard (AES) 256-bit encryption.
    • aes-192-cbc— AES192-bit encryption
    • aes-128-cbc—AES 128-bit encryption.
    • 3des-cbc—3 Data Encryption Standard (DES) encryption.
    • des-cbc—DES encryption.

Traffic statistics

  • Input bytes—Number of bytes received.
  • Output bytes—Number of bytes transmitted.
  • Input packets—Number of packets received.
  • Output packets—Number of packets transmitted.

Flags

Notification to the key management process of the status of the IKE negotiation:

  • caller notification sent—Caller program notified about the completion of the IKE negotiation.
  • waiting for done—Negotiation is done. The library is waiting for the remote end retransmission timers to expire.
  • waiting for remove—Negotiation has failed. The library is waiting for the remote end retransmission timers to expire before removing this negotiation.
  • waiting for policy manager—Negotiation is waiting for a response from the policy manager.

IPSec security associations

  • number created: The number of SAs created.
  • number deleted: The number of SAs deleted.

Phase 2 negotiations in progress

Number of phase 2 IKE negotiations in progress and status information:

  • Negotiation type—Type of phase 2 negotiation. The JUNOS software currently supports quick mode.
  • Message ID—Unique identifier for a phase 2 negotiation.
  • Local identity—Identity of the local phase 2 negotiation. The format is id-type-name (proto-name:port-number,[0..id-data-len] = iddata-presentation)
  • Remote identity—Identity of the remote phase 2 negotiation. The format is id-type-name (proto-name:port-number,[0..id-data-len] = iddata-presentation)
  • Flags—Notification to the key management process of the status of the IKE negotiation:
    • caller notification sent—Caller program notified about the completion of the IKE negotiation.
    • waiting for done—Negotiation is done. The library is waiting for the remote end retransmission timers to expire.
    • waiting for remove—Negotiation has failed. The library is waiting for the remote end retransmission timers to expire before removing this negotiation.
    • waiting for policy manager—Negotiation is waiting for a response from the policy manager.

show security ike security-associations

user@host> show security ike security-associations
Index		Remote Address				State		Initiator cookie					Responder cookie					Mode
8		1.1.1.2				UP		3a895f8a9f620198					9040753e66d700bb					Main
Index		Remote Address				State		Initiator cookie					Responder cookie					Mode
9		1.2.1.3 				UP		5ba96hfa9f65067			1		70890755b65b80b			d		Main

show security ike security-associations detail

user@host> show security ike security-associations detail
IKE peer 1.1.1.2, Index 8, 
	Role: Responder, State: UP
	Initiator cookie: 3a895f8a9f620198, Responder cookie: 9040753e66d700bb
	Exchange type: Main, Authentication method: Pre-shared keys
	Local: 1.1.1.1: 500, Remote: 1.1.1.2:500
	Lifetime: Expired in 381 seconds
	Algorithms:
		Authentication	: 					md5
		Encryption: 		 	 			3des-cbc
		Pseudo random function						hmac-md5
	Traffic statistics:
		Input bytes:						11268
		Output bytes: 						6940
		Input packets:						57
		Output packets						57
	Flags: Caller notification sent 
	IPsec security associations: 0 created, 0 deleted	
	Phase 2 negotiations in progress: 1

		Negotiation type: Quick mode, Role: Responder, Message ID: 1765792815
		Local: 1.1.1.1:500, Remote: 1.1.1.2:500
		Local identity: No Id
		Remote identity: No Id
		Flags: Caller notification sent, Waiting for remove  

show security ike security-associations detail (SRX-series devices)

user@host> show security ike security-associations detaill
IKE peer 30.0.0.2, Index 1,
  Location: FPC 1, PIC 2, KMD-Instance 3
  Role: Initiator, State: UP
  Initiator cookie: 58196469ec2df068, Responder cookie: e4de44f4ef333df9
  Exchange type: Main, Authentication method: Pre-shared-keys
  Local: 20.0.0.4:500, Remote: 30.0.0.2:500
  Lifetime: Expires in 1171 seconds
  Algorithms:
   Authentication        : sha1
   Encryption            : 3des-cbc
   Pseudo random function: hmac-sha1
  Traffic statistics:
   Input  bytes  :                  604
   Output bytes  :                 1472
   Input  packets:                    4
   Output packets:                    8
  Flags: Caller notification sent 
  IPsec security associations: 1 created, 0 deleted
  Phase 2 negotiations in progress: 0  

show security ike security-associations index 8 detail

user@host> show security ike security-associations index 8 detail
IKE peer 1.1.1.2, Index 8
	Role: Responder, State:UP
	Initiator cookie: 3a895f8a9f620198, Responder cookie: 9040753e66d700bb
	Exchange type; main, Authentication method: Pre-shared-keys
	Local: 1.1.1.1:500, Remote: 1.1.1.2:500
	Lifetime: Expired in 381 seconds
	Algorithms:
		Authentication: 						md5
		Encryption:						3des-cbc
		Pseudo random function						hmac-md5
	Traffic statistics: 
		Input bytes:							11268
		Output bytes:						 	6940
		Input packets:						 	57
		Output packets: 							57
	Flags: Caller notification sent
	IPsec security associations: 0 created, 0 deleted
	Phase 2 negotiations in progress: 1

		Negotiation type: Quick mode, Role: Responder, Message ID: 1765792815
		Local: 1.1.1.1:500, Remote: 1.1.1.2:500
		Local identity: No Id
		Remote identity: No Id
		Flags: Caller notification sent, Waiting for remove

show security ike security-associations 1.1.1.2

user@host> show security ike security-associations 1.1.1.2
Index   Remote Address  State  Initiator cookie  Responder cookie  Mode

8       1.1.1.2         UP     3a895f8a9f620198  9040753e66d700bb  Main

show security ike security-associations fpc 6 pic 1 kmd-instance all (SRX-series devices)

user@host> show security ike security-associations fpc 6 pic 1 kmd-instance all
Index   Remote Address  State  Initiator cookie  Responder cookie  Mode

1728053250 1.1.1.2      UP     fc959afd1070d10b  bdeb7e8c1ea99483  Main

[Contents] [Prev] [Next] [Index] [Report an Error]