To view information about IPsec security (SAs), select Monitor>IPSec VPN>IPsec VPN in the J-Web interface. To view the IPsec statistics information for a particular SA, select the IPsec SA ID value on the IPsec VPN page.
Alternatively, enter the following CLI commands:
Table 44 summarizes key output fields in the IPsec VPN display.
Table 44: Summary of Key IPsec VPN Information Output Fields
Field |
Values |
Additional Information |
---|---|---|
IPsec Security Associations | ||
Total configured SA |
Total number of IPsec security associations (SAs) configured on the device. |
|
ID |
Index number of the SA. |
|
Gateway |
IP address of the remote gateway. |
|
Port |
If Network Address Translation (NAT-T) is used, this value is 4500. Otherwise, it is the standard IKE port, 500. |
|
Algorithm |
Cryptography used to secure exchanges between peers during the IKE Phase 2 negotiations:
|
|
SPI |
Security parameter index (SPI) identifier. An SA is uniquely identified by an SPI. Each entry includes the name of the VPN, the remote gateway address, the SPIs for each direction, the encryption and authentication algorithms, and keys. The peer gateways each have two SAs, one resulting from each of the two phases of negotiation: Phase 1 and Phase 2. |
|
Life: sec/kb |
The lifetime of the SA, after which it expires, expressed either in seconds or kilobytes. |
|
State |
State has two options, Installed and Not Installed.
|
For transport mode, the value of State is always Installed. |
Vsys |
The root system. |
|
IPsec Statistics Information | ||
ESP Statistics |
Encapsulation Security Protocol (ESP) statistics include the following:
|
|
AH Statistics |
Authentication Header (AH) statistics include the following:
|
|
Errors |
Errors include the following
|
|
Details for IPsec SA Index: ID | ||
Virtual System |
The root system. |
|
Local Gateway |
Gateway address of the local system. |
|
Remote Gateway |
Gateway address of the remote system. |
|
Local identity |
Specifies the identity of the local peer so that its partner destination gateway can communicate with it. The value is specified as any of the following: IPv4 address, fully qualified domain name, e-mail address, or distinguished name. |
|
Remote identity |
IPv4 address of the destination peer gateway. |
|
Df bit |
State of the don’t fragment bit—set or cleared. |
|
Policy name |
Name of the applicable policy. |
|
Direction |
Direction of the security association—inbound, or outbound. |
|
SPI |
Security parameter index (SPI) identifier. An SA is uniquely identified by an SPI. Each entry includes the name of the VPN, the remote gateway address, the SPIs for each direction, the encryption and authentication algorithms, and keys. The peer gateways each have two SAs, one resulting from each of the two phases of negotiation: Phase 1 and Phase 2. |
|
Mode |
Mode of the security association. Mode can be transport or tunnel.
|
|
Type |
Type of the security association, either manual or dynamic.
|
|
State |
State has two options, Installed, and Not Installed.
|
For transport mode, the value of State is always Installed. |
Protocol |
Protocol supported:
|
|
Authentication/ Encryption |
|
|
Soft Lifetime |
The soft lifetime informs the IPsec key management system that the SA is about to expire.
|
Each lifetime of a security association has two display options, hard and soft, one of which must be present for a dynamic security association. This allows the key management system to negotiate a new SA before the hard lifetime expires. |
Hard Lifetime |
The hard lifetime specifies the lifetime of the SA.
|
|
Anti Replay Service |
State of the service that prevents packets from being replayed. It can be Enabled or Disabled. |
|
Replay Window Size |
Configured size of the antireplay service window. It can be 32 or 64 packets. If the replay window size is 0, the antireplay service is disabled. |
The antireplay window size protects the receiver against replay attacks by rejecting old or duplicate packets. |