show security ike security-associations
Syntax
Release Information
Command introduced in Release 8.5 of Junos OS; fpc, pic, and kmd-instance options added in Release 9.3 of Junos OS.
Description
Display information about Internet Key Exchange (IKE) security associations (SAs).
Options
none—Display standard information about existing IKE SAs, including index numbers.
peer-address—(Optional) Display details about a particular SA, based on the IP address of the destination peer. This option and index provide the same level of output.
brief—(Optional) Display standard information about all existing IKE SAs. (Default)
detail—(Optional) Display detailed information about all existing IKE SAs.
fpc slot-number—Specific to SRX Series devices. Display information about existing IKE SAs in this particular Flexible PIC Concentrator (FPC) slot. This option is used to filter the output.
index SA-index-number—(Optional) Display information for a particular SA based on the index number of the SA. To obtain the index number for a particular SA, display the list of existing SAs by using the command with no options. This option and peer-address provide the same level of output.
kmd-instance —Specific to SRX Series devices. Display information about existing IKE SAs in the key management process (daemon) (KMD) identified by the FPC slot-number and PIC slot-number. This option is used to filter the output.
- all—All KMD instances running on the Services Processing Unit (SPU).
- kmd-instance-name—Name of the KMD instance running on the SPU.
pic slot-number —Specific to SRX Series devices. Display information about existing IKE SAs in this particular PIC slot. This option is used to filter the output.
Required Privilege Level
view
Related Topics
clear security ike security-associations
List of Sample Output
show security ike security-associationsshow security ike security-associations detail
show security ike security-associations detail (SRX Series devices)
show security ike security-associations index 8 detail
show security ike security-associations 1.1.1.2
show security ike security-associations fpc 6 pic 1 kmd-instance all (SRX Series devices)
Output Fields
Table 121 lists the output fields for the show security ike security-associations command. Output fields are listed in the approximate order in which they appear.
Table 121: show security ike security-associations Output Fields
Field Name | Field Description |
|---|---|
IKE Peer or Remote Address | IP address of the destination peer with which the local peer communicates. |
Index | Index number of an SA. This number is an internally generated number you can use to display information about a single SA. |
Location |
|
Role | Part played in the IKE session. The device triggering the IKE negotiation is the initiator, and the device accepting the first IKE exchange packets is the responder. |
State | State of the IKE security associations:
|
Initiator cookie | Random number, called a cookie, which is sent to the remote node when the IKE negotiation is triggered. |
Responder cookie | Random number generated by the remote node and sent back to the initiator as a verification that the packets were received. A cookie is aimed at protecting the computing resources from attack without spending excessive CPU resources to determine the cookie's authenticity. |
Mode or Exchange type | Negotiation method agreed on by the two IPsec endpoints, or peers, used to exchange information between themselves. Each exchange type determines the number of messages and the payload types that are contained in each message. The modes, or exchange types, are
|
Local | Address of the local peer. |
Remote | Address of the remote peer. |
Lifetime | Number of seconds remaining until the IKE SA expires. |
Algorithms | Internet Key Exchange (IKE) algorithms used to encrypt and secure exchanges between the peers during the IPsec Phase 2 process:
|
Traffic statistics |
|
Flags | Notification to the key management process of the status of the IKE negotiation:
|
IPSec security associations |
|
Phase 2 negotiations in progress | Number of phase 2 IKE negotiations in progress and status information:
|
Sample Output
show security ike security-associations
user@host> show security ike security-associationsIndex Remote Address State Initiator cookie Responder cookie Mode 8 1.1.1.2 UP 3a895f8a9f620198 9040753e66d700bb Main Index Remote Address State Initiator cookie Responder cookie Mode 9 1.2.1.3 UP 5ba96hfa9f65067 1 70890755b65b80b d Main
Sample Output
show security ike security-associations detail
user@host> show security ike security-associations
detailIKE peer 1.1.1.2, Index 8, Role: Responder, State: UP Initiator cookie: 3a895f8a9f620198, Responder cookie: 9040753e66d700bb Exchange type: Main, Authentication method: Pre-shared keys Local: 1.1.1.1: 500, Remote: 1.1.1.2:500 Lifetime: Expired in 381 seconds Algorithms: Authentication : md5 Encryption: 3des-cbc Pseudo random function hmac-md5 Traffic statistics: Input bytes: 11268 Output bytes: 6940 Input packets: 57 Output packets 57 Flags: Caller notification sent IPsec security associations: 0 created, 0 deleted Phase 2 negotiations in progress: 1 Negotiation type: Quick mode, Role: Responder, Message ID: 1765792815 Local: 1.1.1.1:500, Remote: 1.1.1.2:500 Local identity: No Id Remote identity: No Id Flags: Caller notification sent, Waiting for remove
Sample Output
show security ike security-associations detail (SRX Series devices)
user@host> show security ike security-associations
detailIKE peer 30.0.0.2, Index 1, Location: FPC 1, PIC 2, KMD-Instance 3 Role: Initiator, State: UP Initiator cookie: 58196469ec2df068, Responder cookie: e4de44f4ef333df9 Exchange type: Main, Authentication method: Pre-shared-keys Local: 20.0.0.4:500, Remote: 30.0.0.2:500 Lifetime: Expires in 1171 seconds Algorithms: Authentication : sha1 Encryption : 3des-cbc Pseudo random function: hmac-sha1 Traffic statistics: Input bytes : 604 Output bytes : 1472 Input packets: 4 Output packets: 8 Flags: Caller notification sent IPsec security associations: 1 created, 0 deleted Phase 2 negotiations in progress: 0
Sample Output
show security ike security-associations index 8 detail
user@host> show security ike security-associations
index 8 detailIKE peer 1.1.1.2, Index 8 Role: Responder, State:UP Initiator cookie: 3a895f8a9f620198, Responder cookie: 9040753e66d700bb Exchange type; main, Authentication method: Pre-shared-keys Local: 1.1.1.1:500, Remote: 1.1.1.2:500 Lifetime: Expired in 381 seconds Algorithms: Authentication: md5 Encryption: 3des-cbc Pseudo random function hmac-md5 Traffic statistics: Input bytes: 11268 Output bytes: 6940 Input packets: 57 Output packets: 57 Flags: Caller notification sent IPsec security associations: 0 created, 0 deleted Phase 2 negotiations in progress: 1 Negotiation type: Quick mode, Role: Responder, Message ID: 1765792815 Local: 1.1.1.1:500, Remote: 1.1.1.2:500 Local identity: No Id Remote identity: No Id Flags: Caller notification sent, Waiting for remove
Sample Output
show security ike security-associations 1.1.1.2
user@host> show security ike security-associations
1.1.1.2Index Remote Address State Initiator cookie Responder cookie Mode 8 1.1.1.2 UP 3a895f8a9f620198 9040753e66d700bb Main
Sample Output
show security ike security-associations fpc 6 pic 1 kmd-instance all (SRX Series devices)
user@host> show security ike security-associations
fpc 6 pic 1 kmd-instance allIndex Remote Address State Initiator cookie Responder cookie Mode 1728053250 1.1.1.2 UP fc959afd1070d10b bdeb7e8c1ea99483 Main
Hide Navigation Pane
Show Navigation Pane
Download
SHA1