show security ipsec security-associations
Syntax
Release Information
Command introduced in Release 8.5 of Junos OS; fpc, pic, and kmd-instance options added in Release 9.3 of Junos OS.
Description
Display information about the IPsec security associations (SAs).
Options
none—Display information about all SAs.
brief | detail—(Optional) Display the specified level of output.
fpc slot-number—Specific to SRX Series devices. Display information about existing IPsec SAs in this particular Flexible PIC Concentrator (FPC) slot. This option is used to filter the output.
index SA-index-number—(Optional) Display detailed information about the specified security association identified by index number. To obtain a list of all SAs that includes their index numbers, use the command with no options.
kmd-instance—Specific to SRX Series devices. Display information about existing IPsec SAs in the key management process (daemon) (KMD) identified by the FPC slot-number and PIC slot-number. This option is used to filter the output.
- all—All KMD instances running on the Services Processing Unit (SPU)
- kmd-instance-name—Name of the KMD instance running on the SPU.
pic slot-number—Specific to SRX Series devices. Display information about existing IPsec SAs in this particular PIC slot. This option is used to filter the output.
Required Privilege Level
view
Related Topics
clear security ipsec security-associations
List of Sample Output
show security ipsec security-associationsshow security ipsec security-associations index
show security ipsec security-associations brief
show security ipsec security-associations detail
show security ipsec security-associations detail (SRX Series devices)
show security ipsec security-associations fpc 6 pic 1 kmd-instance all (SRX Series devices
Output Fields
Table 123 lists the output fields for the show security ipsec security-associations command. Output fields are listed in the approximate order in which they appear.
Table 123: show security ipsec security-associations
Field Name | Field Description |
|---|---|
Total active tunnels | Total number of active IPsec tunnels. |
ID | Index number of the SA. You can use this number to get additional information about the SA. |
Gateway | IP address of the remote gateway. |
Port | If Network Address Translation (NAT-T) is used, this value is 4500. Otherwise it is the standard IKE port, 500. |
Algorithm | Cryptography used to secure exchanges between peers during the IKE Phase 2 negotiations includes
|
SPI | Security parameter index (SPI) identifier. An SA is uniquely identified by an SPI. Each entry includes the name of the VPN, the remote gateway address, the SPIs for each direction, the encryption and authentication algorithms, and keys. The peer gateways each have two SAs, one resulting from each of the two phases of negotiation: Phase 1 and Phase 2. |
Life: sec/kb | The lifetime of the SA, after which it expires, expressed either in seconds or kilobytes. |
Sta | State has two options, Installed and Not Installed.
|
Mon | The Mon refers to VPN monitoring status. If VPN monitoring is enabled, then this will show U (up) or D (down). A hyphen (-) means VPN monitoring is not enabled for this SA. |
vsys or Virtual-system | The root system. |
Tunnel index | Numeric identifier of the specific IPsec tunnel for the SA. |
Local gateway | Gateway address of the local system. |
Remote gateway | Gateway address of the remote system. |
Local identity | Identity of the local peer so that its partner destination gateway can communicate with it. The value is specified as an IP address, fully qualified domain name, e-mail address, or distinguished name. |
Remote identity | IP address of the destination peer gateway. |
DF-bit | State of the don't fragment bit: set or cleared. |
Policy-name | Name of the applicable policy. |
Location | FPC—Flexible PIC Concentrator (FPC) slot number. PIC—PIC slot number. KMD-Instance—The name of the kmd-instance running on the SPU, identified by the FPC slot-number and PIC slot-number. Currently, 4 kmd-instances running on each SPU and any particular IPsec negotiation is carried out by a single kmd-instance. |
Direction | Direction of the security association; it can be inbound or outbound. |
AUX-SPI | Value of the auxiliary security parameter index.
|
Mode | Mode of the security association:
|
Type | Type of the security association:
|
State | State of the security association:
|
Protocol | Protocol supported.
|
Soft lifetime | The soft lifetime informs the IPsec key management system that the SA is about to expire. Each lifetime of a security association has two display options, hard and soft, one of which must be present for a dynamic security association. This allows the key management system to negotiate a new SA before the hard lifetime expires.
|
Hard lifetime | The hard lifetime specifies the lifetime of the SA.
|
Lifesize Remaining | The lifesize remaining specifies the usage limits in kilobytes. If there is no lifesize specified, it shows unlimited.
|
Anti-replay service | State of the service that prevents packets from being replayed. It can be Enabled or Disabled. |
Replay window size | Configured size of the antireplay service window. It can be 32 or 64 packets. If the replay window size is 0, the antireplay service is disabled. The antireplay window size protects the receiver against replay attacks by rejecting old or duplicate packets. |
Sample Output
show security ipsec security-associations
user@host> show security ipsec security-associationsTotal active tunnels: 1 ID Gateway Port Algorithm SPI Life:sec/kb Sta vsys 5 5.5.5.4 500 esp:3des/sha1 edOcec21 expir unlim I/I 0 5 5.5.5.4 500 esp:3des/sha1
Sample Output
show security ipsec security-associations index
user@host> show security ipsec security-associations
index 5Virtual-system: Root Local gateway: 1.1.1.1, Remote gateway: 1.1.1.2 Local identity: ipv4_subnet(any:0,[0..7]=0.0.0.0/0) Remote identity: ipv4_subnet(any:0,[0...7]=0.0.0.0/0) DF-bit: clear Policy-name: my-policy Direction: inbound, SPI: 494001027, AUX-SPI: 0 Mode: tunnel, Type: dynamic, State: Installed Protocol: ESP, Authentication: hmac-sha1-96, Encryption: 3des-cbc Soft lifetime: Expired Hard lifetime: Expired in 130 seconds Lifesize Remaining: Unlimited Anti-replay service: Enabled, Replay window size: 64 Direction: inbound, SPI: 1498711950, AUX-SPI: 0 Mode: tunnel, Type: dynamic, State: Installed Protocol: ESP, Authentication: hmac-sha1-96, Encryption: 3des-cbc Soft lifetime: Expires in 40 seconds Hard lifetime: Expires in 175 seconds Lifesize Remaining: Unlimited Anti-replay service: Enabled, Replay window size: 64 Direction: outbound, SPI: 4038397695, AUX-SPI: 0 Mode: tunnel, Type: dynamic, State: Installed Protocol: ESP, Authentication: hmac-sha1-96, Encryption: 3des-cbc Soft lifetime: Expires in 40 seconds Hard lifetime: Expires in 175 seconds Lifesize Remaining: Unlimited Anti-replay service: Enabled, Replay window size: 64
Sample Output
show security ipsec security-associations brief
user@host> show security ipsec security-associations
briefTotal active tunnels: 2 ID Gateway Port Algorithm SPI Life:sec/kb Mon vsys <16384 1.1.1.1 500 ESP:3des/sha1 af88baa 28795/unlim D 0 >16384 1.1.1.1 500 ESP:3des/sha1 f4e3e5f4 28795/unlim D 0
Sample Output
show security ipsec security-associations detail
user@host> show security ipsec security-associations
detailVirtual-system: Root Local Gateway: 1.1.1.2, Remote Gateway: 1.1.1.1 Local Identity: ipv4_subnet(any:0,[0..7]=0.0.0.0/0) Remote Identity: ipv4_subnet(any:0,[0..7]=0.0.0.0/0) DF-bit: clear Direction: inbound, SPI: 184060842, AUX-SPI: 0 Hard lifetime: Expires in 28785 seconds Lifesize Remaining: Unlimited Soft lifetime: Expired Mode: tunnel, Type: dynamic, State: installed, VPN Monitoring: DOWN Protocol: ESP, Authentication: hmac-sha1-96, Encryption: 3des-cbc Anti-replay service: enabled, Replay window size: 32 Direction: outbound, SPI: 4108576244, AUX-SPI: 0 Hard lifetime: Expires in 28785 seconds Lifesize Remaining: Unlimited Soft lifetime: Expired Mode: tunnel, Type: dynamic, State: installed, VPN Monitoring: DOWN Protocol: ESP, Authentication: hmac-sha1-96, Encryption: 3des-cbc Anti-replay service: enabled, Replay window size: 32
Sample Output
show security ipsec security-associations detail (SRX Series devices)
user@host> show security ipsec security-associations
detail Virtual-system: Root
Local Gateway: 20.0.0.4, Remote Gateway: 30.0.0.2
Local Identity: ipv4_subnet(any:0,[0..7]=0.0.0.0/0)
Remote Identity: ipv4(any:0,[0..3]=20.0.0.4)
DF-bit: clear
Policy-name: p1
Location: FPC 1, PIC 2, KMD-Instance 3
Direction: inbound, SPI: 3727011331, AUX-SPI: 0
Hard lifetime: Expires in 3570 seconds
Lifesize Remaining: Unlimited
Soft lifetime: Expires in 3525 seconds
Mode: tunnel, Type: dynamic, State: installed, VPN Monitoring: -
Protocol: ESP, Authentication: hmac-sha1-96, Encryption: aes-cbc (128 bits)
Anti-replay service: enabled, Replay window size: 32
Location: FPC 1, PIC 2, KMD-Instance 3
Direction: outbound, SPI: 4212479378, AUX-SPI: 0
Hard lifetime: Expires in 3570 seconds
Lifesize Remaining: Unlimited
Soft lifetime: Expires in 3525 seconds
Mode: tunnel, Type: dynamic, State: installed, VPN Monitoring: -
Protocol: ESP, Authentication: hmac-sha1-96, Encryption: aes-cbc (128 bits)
Anti-replay service: enabled, Replay window size: 32Sample Output
show security ipsec security-associations fpc 6 pic 1 kmd-instance all (SRX Series devices
user@host> show security ipsec security-associations
fpc 6 pic 1 kmd-instance allTotal active tunnels: 1 ID Gateway Port Algorithm SPI Life:sec/kb Mon vsys <2 1.1.1.2 500 ESP:3des/sha1 67a7d25d 28280/unlim - 0 >2 1.1.1.2 500 ESP:3des/sha1 a23cbcdc 28280/unlim - 0
Hide Navigation Pane
Show Navigation Pane
Download
SHA1