Index State Initiator cookie Responder cookie Mode Remote Address
676433 UP 8fc3685317282b7a eb2a747d018aeae3 Main 202.100.1.17
admin@VSRX> show security ike security-associations 202.100.1.17 detail
IKE peer 202.100.1.17, Index 676433, Gateway Name: to-fgt
Role: Initiator, State: UP
Initiator cookie: 8fc3685317282b7a, Responder cookie: eb2a747d018aeae3
Exchange type: Main, Authentication method: Pre-shared-keys
Local: 101.100.1.116:500, Remote: 202.100.1.17:500
Lifetime: Expires in 84489 seconds
Reauth Lifetime: Disabled
IKE Fragmentation: Disabled, Size: 0
Remote Access Client Info: Unknown Client
Peer ike-id: 202.100.1.17
AAA assigned IP: 0.0.0.0
Algorithms:
Authentication : hmac-sha256-128
Encryption : aes256-cbc
Pseudo random function: hmac-sha256
Diffie-Hellman group : DH-group-5
Traffic statistics:
Input bytes : 2128
Output bytes : 1816
Input packets: 8
Output packets: 8
Input fragmentated packets: 0
Output fragmentated packets: 0
IPSec security associations: 2 created, 0 deleted
Phase 2 negotiations in progress: 1
Negotiation type: Quick mode, Role: Initiator, Message ID: 0
Local: 101.100.1.116:500, Remote: 202.100.1.17:500
Local identity: 101.100.1.116
Remote identity: 202.100.1.17
Flags: IKE SA is created
admin@VSRX> show security ipsec security-associations
Total active tunnels: 1 Total Ipsec sas: 1
ID Algorithm SPI Life:sec/kb Mon lsys Port Gateway
<131073 ESP:aes-cbc-256/sha256 d16fa035 41742/ unlim U root 500 202.100.1.17
>131073 ESP:aes-cbc-256/sha256 f3e75fc3 41742/ unlim U root 500 202.100.1.17
admin@VSRX> show security ipsec security-associations vpn-name to-fgt detail
ID: 131073 Virtual-system: root, VPN Name: to-fgt
Local Gateway: 101.100.1.116, Remote Gateway: 202.100.1.17
Local Identity: ipv4_subnet(any:0,[0..7]=0.0.0.0/0)
Remote Identity: ipv4_subnet(any:0,[0..7]=0.0.0.0/0)
Version: IKEv1
DF-bit: clear, Copy-Outer-DSCP Disabled, Bind-interface: st0.1
Port: 500, Nego#: 2, Fail#: 0, Def-Del#: 0 Flag: 0x600a29
Multi-sa, Configured SAs# 1, Negotiated SAs#: 1
Tunnel events:
Wed May 13 2020 04:13:29: IPSec SA negotiation successfully completed (1 times)
Wed May 13 2020 04:13:24: Peer proposed phase2 proposal conflicts with local configuration. Negotiation failed (1 times)
Wed May 13 2020 04:13:24: VPN monitoring detected tunnel as down. Existing IPSec SAs cleared (1 times)
Wed May 13 2020 04:03:01: IPSec SA negotiation successfully completed (1 times)
Wed May 13 2020 04:03:01: Tunnel is ready. Waiting for trigger event or peer to trigger negotiation (1 times)
Wed May 13 2020 04:03:01: External interface's address received. Information updated (1 times)
Wed May 13 2020 04:03:01: Bind-interface's zone received. Information updated (1 times)
Wed May 13 2020 04:03:01: External interface's zone received. Information updated (1 times)
Wed May 13 2020 04:03:01: IKE SA negotiation successfully completed (1 times)
Direction: inbound, SPI: d16fa035, AUX-SPI: 0
, VPN Monitoring: UP
Hard lifetime: Expires in 41989 seconds
Lifesize Remaining: Unlimited
Soft lifetime: Expires in 41412 seconds
Mode: Tunnel(10 10), Type: dynamic, State: installed
Protocol: ESP, Authentication: hmac-sha256-128, Encryption: aes-cbc (256 bits)
Anti-replay service: counter-based enabled, Replay window size: 64
Direction: outbound, SPI: f3e75fc3, AUX-SPI: 0
, VPN Monitoring: UP
Hard lifetime: Expires in 41989 seconds
Lifesize Remaining: Unlimited
Soft lifetime: Expires in 41412 seconds
Mode: Tunnel(10 10), Type: dynamic, State: installed
Protocol: ESP, Authentication: hmac-sha256-128, Encryption: aes-cbc (256 bits)
Anti-replay service: counter-based enabled, Replay window size: 64