show security group-vpn server ike security-associations
Syntax
Release Information
Command introduced in Release 10.2 of Junos OS.
Description
Display IKE security associations (SAs).
Options
none—Display all IKE SAs for all groups.
brief—(Optional) Display summary output.
detail—(Optional) Display detailed level of output.
group—(Optional) Display IKE SAs for the specified group.
group-id—(Optional) Display IKE SAs for the specified group.
![]() | Note: An IKE SA can be used by a group member to register to multiple groups. When you specify the group or group-id options to list the IKE SAs for a specified group, all existing IKE SAs that could be used to register to the group are displayed. |
index—(Optional) Display information for a particular SA based on the index number of the SA. To obtain the index number for a particular SA, display the list of existing SAs by using the command with no options.
Required Privilege Level
view
Related Topics
show security group-vpn member ike security-associations
List of Sample Output
show security group-vpn server ike security-associationsshow security group-vpn server ike security-associations detail
Output Fields
Table 99 lists the output fields for the show security group-vpn server ike security-associations command. Output fields are listed in the approximate order in which they appear.
Table 99: show security group-vpn member ike security-associations Output Fields
Field Name | Field Description |
|---|---|
Index | Index number of an SA. This number is an internally generated number you can use to display information about a single SA. |
Remote Address | IP address of the destination peer with which the local peer communicates. |
State | State of the IKE security associations:
|
Initiator cookie | Random number, called a cookie, which is sent to the remote node when the IKE negotiation is triggered. |
Responder cookie | Random number generated by the remote node and sent back to the initiator as a verification that the packets were received. A cookie is aimed at protecting the computing resources from attack without spending excessive CPU resources to determine the cookie's authenticity. |
Mode | Negotiation method agreed on by the two IPsec endpoints, or peers, used to exchange information between themselves. Each exchange type determines the number of messages and the payload types that are contained in each message. The modes, or exchange types, are
|
IKE Peer | IP address of the destination peer with which the local peer communicates. |
Exchange type | Negotiation method agreed on by the two IPsec endpoints, or peers, used to exchange information between themselves. Each exchange type determines the number of messages and the payload types that are contained in each message. The modes, or exchange types, are
|
Authentication method | Method the server uses to authenticate the source of IKE messages:
rsa-signatures—Digital signature, a certificate that confirms the identity of the certificate holder. |
Local | Address of the local peer. |
Remote | Address of the remote peer. |
Lifetime | Number of seconds remaining until the IKE SA expires. |
Algorithms | Internet Key Exchange (IKE) algorithms used to encrypt and secure exchanges between the peers during the IPsec Phase 2 process:
|
Traffic statistics |
|
IPSec security associations |
|
Phase 2 negotiations in progress | Number of Phase 2 IKE negotiations in progress and status information:
|
Sample Output
show security group-vpn server ike security-associations
user@host> show security group-vpn server ike
security-associationsIndex Remote Address State Initiator cookie Responder cookie Mode 2059 10.1.1.13 UP 86c09e79d3f986b6 aadaaaf97129b8cc Main
Sample Output
show security group-vpn server ike security-associations detail
user@host> show security group-vpn server ike
security-associations detailIKE peer 10.1.1.13, Index 2059,
Role: Responder, State: UP
Initiator cookie: 86c09e79d3f986b6, Responder cookie: aadaaaf97129b8cc
Exchange type: Main, Authentication method: Pre-shared-keys
Local: 10.1.1.11:848, Remote: 10.1.1.13:848
Lifetime: Expires in 3571 seconds
Algorithms:
Authentication : sha1
Encryption : 3des-cbc
Pseudo random function: hmac-sha1
Traffic statistics:
Input bytes : 628
Output bytes : 1196
Input packets: 5
Output packets: 5
Flags: Caller notification sent
IPSec security associations: 0 created, 0 deleted
Phase 2 negotiations in progress: 1
Negotiation type: Quick mode, Role: Responder, Message ID: 2158764791
Local: 10.1.1.11:848, Remote: 10.1.1.13:848
Local identity: 10.1.1.11
Remote identity: 10.1.1.13
Flags: Caller notification sent, Waiting for done
Hide Navigation Pane
Show Navigation Pane
Download
SHA1
