show security group-vpn member ipsec security-associations
Syntax
show security group-vpn member ipsec security-associations [brief | detail] [index sa-index]
Description
Display group VPN security associations (SAs) for a group member. Group VPNv2 is supported on SRX300, SRX320, SRX340, SRX345, SRX550HM, SRX1500, SRX4100, SRX4200, and SRX4600 Series Firewalls and vSRX Virtual Firewall instances.
Options
none—Display information about all group VPN SAs for the group member.
brief—(Optional) Display summary output.detail—(Optional) Display detailed output.indexsa-index—(Optional) Display detailed information about the specified SA identified by index number. To obtain a list of all SAs that includes their index numbers, use the command with no options.
Required Privilege Level
view
Output Fields
Table 1 lists the output fields for the show security group-vpn
member ipsec security-associations command. Output fields are
listed in the approximate order in which they appear.
Field Name |
Field Description |
|---|---|
|
Total number of active IPsec tunnels. |
|
Index number of the SA. You can use this number to get additional information about the SA. |
|
IP address of the group server (remote gateway). |
|
If Network Address Translation-Traversal (NAT-T) is used, this value is 4500. Otherwise it is the standard IKE port, 500. |
|
Cryptography used to secure exchanges between peers during the IKE Phase 2 negotiations includes
|
|
Security parameter index (SPI) identifier. An SA is uniquely identified by an SPI. |
|
The lifetime of the SA, after which it expires, expressed either in seconds or kilobytes. |
|
Group identifier. |
|
The root system. |
|
Gateway address of the local system. |
|
IP address of the group server. |
|
Identity of the local peer so that its partner destination gateway can communicate with it. The value is specified as an IPv4 address, fully qualified domain name, e-mail address, or distinguished name. |
|
IPv4 address of the destination peer gateway. |
|
State of the don't fragment bit: set or cleared. |
Forward-policy-mismatch |
Enable the support for forwarding policy-mismatched packets |
|
Name of the applicable policy. |
|
Direction of the security association; it can be inbound or outbound. |
|
Value of the auxiliary security parameter index.
|
|
The hard lifetime specifies the lifetime of the SA.
|
|
The lifesize remaining specifies the usage limits in kilobytes. If there is no lifesize specified, it shows unlimited.
|
|
The soft lifetime informs the IPsec key management system that the SA is about to expire. Each lifetime of a security association has two display options, hard and soft, one of which must be present for a dynamic security association. This allows the key management system to negotiate a new SA before the hard lifetime expires.
|
|
Mode of the security association:
|
|
Protocol supported. Transport mode supports Encapsulation Security Protocol (ESP). |
|
State of the service that prevents packets from being
replayed. It can be |
Sample Output
show security group-vpn member ipsec security-associations
user@host> show security group-vpn member ipsec security-associations Total active tunnels: 2 ID Server Port Algorithm SPI Life:sec/kb GId lsys <>49157 192.168.1.53 848 ESP:3des/sha1 c0792f86 114/ unlim 2000 root <>49156 192.168.1.53 848 ESP:aes-256/md5 7def169d 18/ unlim 2000 root <>49156 192.168.1.53 848 ESP:aes-256/md5 86c48448 146/ unlim 2000 root
Sample Output
show security group-vpn member ipsec security-associations detail
user@host> show security group-vpn member ipsec security-associations detail
Virtual-system: root Group VPN Name: group2000
Local Gateway: 192.168.1.70, GDOI Server: 192.168.1.53
Group Id: 2000
Routing Instance: vr1
Recovery Probe: Enabled
DF-bit: clear
Forward-policy-mismatch:Enabled
Stats:
Pull Succeeded : 3
Pull Failed : 0
Pull Timeout : 6
Pull Aborted : 0
Push Succeeded : 1773
Push Failed : 0
Server Failover : 0
Delete Received : 0
Exceed Maximum Keys(4) : 0
Exceed Maximum Policies(10): 0
Unsupported Algo : 0
Flags:
Rekey Needed: no
List of policies received from server:
Tunnel-id: 49157
Source IP: ipv4_subnet(any:900,[0..7]=192.168.1.0/24)
Destination IP: ipv4_subnet(any:901,[0..7]=192.168.1.0/24)
Direction: bi-directional, SPI: c0792f86
Protocol: ESP, Authentication: sha1, Encryption: 3des
Hard lifetime: Expires in 81 seconds, Activated
Lifesize Remaining: Unlimited
Soft lifetime: Expired
Mode: Tunnel, Type: Group VPN, State: installed
Anti-replay service: D3P enabled, Window size: 3000 milliseconds
Direction: bi-directional, SPI: a645b381
Protocol: ESP, Authentication: sha1, Encryption: 3des
Hard lifetime: Expires in 207 seconds, Activated in 51 seconds
Lifesize Remaining: Unlimited
Soft lifetime: Expires in 117 seconds
Mode: Tunnel, Type: Group VPN, State: installed
Anti-replay service: D3P enabled, Window size: 3000 milliseconds
Release Information
Command introduced in Junos OS Release 10.2.
Command introduced in Junos OS Release 18.2R1 for MX-series.