4.14.  IP Tunnel Command Reference

4.14.1. Command Hierarchies

4.14.1.1. Configuration Commands

4.14.1.1.1. Hardware Commands

config
— card slot-number
— mda mda-slot
mda-type isa-tunnel
— no mda-type

4.14.1.1.2. ISA Commands

config
isa
tunnel-group tunnel-group-id [create]
tunnel-group tunnel-group-id isa-scale-mode isa-scale-mode [create]
— no tunnel-group tunnel-group-id
backup mda-id
— no backup
description description-string
[no] mda mda-id
[no] multi-active
primary mda-id
— no primary
reassembly [wait-msecs]
— no reassembly
[no] shutdown

4.14.1.1.3. IPsec Commands

Certificate Profile Commands

config
ipsec
cert-profile profile-name [create]
— no cert-profile profile-name
entry entry-id [create]
— no entry entry-id
cert cert-filename
— no cert
key key-filename
— no key
rsa-signature {pkcs1 | pss}
[no] send-chain
[no] ca-profile name
[no] shutdown

Client Database Commands

config
ipsec
client-db db-name [create]
— no client-db db-name
client client-index [create]
— no client client-index
idi any
idi ipv4-prefix {any | ipv4-prefix/ipv4-prefix-length}
idi ipv6-prefix {any | ipv6-prefix/ipv6-prefix-length}
idi string-type string-type string-value string-value
— no idi
peer-ip-prefix ip-prefix/ip-prefix-length
peer-ip-prefix ipv4-any
peer-ip-prefix ipv6-any
client-name name
pre-shared-key key [hash | hash2]
private-interface ip-int-name
private-service service-id
private-service name service-name
[no] shutdown
ts-negotiation ts-list list-name
tunnel-template tunnel-template-id
description description-string
[no] idi
[no] shutdown

Internet Key Exchange (IKE) Commands

config
ipsec
ike-policy ike-policy-id [create]
— no ike-policy ike-policy-id
auth-method {psk | plain-psk-xauth | cert-auth | psk-radius | cert-radius | eap | auto-eap-radius | auto-eap}
auto-eap-method {psk | cert | psk-or-cert}
auto-eap-own-method {psk | cert}
description description-string
dpd [interval interval] [max-retries max-retries] [reply-only]
— no dpd
ike-mode {main | aggressive}
— no ike-mode
ike-transform ike-transform-id [ike-transform-id.]
ike-version {1 | 2}
ikev2-fragment mtu octets reassembly-timeout seconds
ipsec-lifetime ipsec-lifetime
limit-init-exchange [reduced-max-exchange-timeout seconds]
lockout failed-attempts count duration duration-minutes block block-minutes [max-port-per-ip number-of-ports]
— no lockout
nat-traversal [force] [keep-alive-interval keep-alive-interval] [force-keep-alive]
own-auth-method {psk | cert | eap-only}
pfs [dh-group {1 | 2 | 5 | 14 | 15 | 19 | 20 | 21}]
— no pfs
ike-transform ike-transform-id [create]
ike-transform ike-transform-id
dh-group {1 | 2 | 5 | 14 | 15 | 19 | 20 | 21}
ike-auth-algorithm auth-algorithm
ike-encryption-algorithm encryption-algorithm
isakmp-lifetime seconds

IPsec Transform Commands

config
ipsec
ipsec-transform transform-id [create]
— no ipsec-transform transform-id
esp-auth-algorithm {null | md5 | sha1| sha256 | sha384 | sha512| aes-xcbc | auth-encryption}
esp-encryption-algorithm {null | des | 3des | aes128 | aes192 | aes256 | aes128-gcm8 | aes128-gcm12 | aes128-gcm16 | aes192-gcm8 | aes192-gcm12 | aes192-gcm16 | aes256-gcm8 | aes256-gcm12 | aes256-gcm16 | null-aes128-gmac | null-aes192-gmac | null-aes256-gmac}
ipsec-lifetime seconds
ipsec-lifetime inherit
pfs-dh-group {1 | 2 | 5 | 14 | 15 | 19 | 20 | 21}
pfs-dh-group inherit

RADIUS Policy Commands

config
ipsec
radius-accounting-policy name [create]
[no] acct-stats
[no] nas-ip-addr
[no] nas-port-id
radius-server-policy radius-server-policy-name
update-interval minutes [jitter seconds]
[no] nas-ip-addr
[no] nas-port-id
password password [hash | hash2]
— no password
radius-server-policy radius-server-policy-name

IPsec Static Security Association Commands

config
ipsec
static-sa sa-name [create]
— no static-sa sa-name
authentication auth-algorithm ascii-key ascii-string
authentication auth-algorithm hex-key hex-string [hash|hash2]
description description-string
direction ipsec-direction
— no direction
protocol ipsec-protocol
— no protocol
spi spi
— no spi

Trust Anchor Profile/TS List Commands

config
ipsec
trust-anchor-profile name [create]
[no] trust-anchor ca-profile-name
ts-list list-name [create]
— no ts-list list-name
local
entry entry-id [create]
— no entry entry-id
address prefix ip-prefix/ip-prefix-len
address from begin-ip-address to end-ip-address
— no address
protocol any
protocol protocol-id port opaque
protocol protocol-id port any
protocol protocol-id port from begin-port-id to end-port-id
— no protocol
remote
entry entry-id [create]
— no entry entry-id
address prefix ip-prefix/ip-prefix-len
address from begin-ip-address to end-ip-address
— no address
protocol any
protocol protocol-id port opaque
protocol protocol-id port any
protocol protocol-id port from begin-port-id to end-port-id
— no protocol

Tunnel Template Commands

config
ipsec
tunnel-template ipsec-template-identifier [create]
— no tunnel-template ipsec-template-identifier
[no] clear-df-bit
description description-string
pkt-too-big interval seconds
pkt-too-big message-count count
[no] pkt-too-big
ip-mtu octets
— no ip-mtu
replay-window {32 | 64 | 128 | 256 | 512}
transform transform-id [transform-id]
— no transform

4.14.1.2. Service Configuration Commands

4.14.1.2.1. IES Commands

config
— service
— ies service-id [customer customer-id] [vpn vpn-id] [name name]
— interface ip-int-name [tunnel]
— sap sap-id [create]
ip-tunnel ip-tunnel-name [create]
— no ip-tunnel ip-tunnel-name
backup-remote-ip ip-address
[no] clear-df-bit
delivery-service {service-id | svc-name}
description description-string
[no] dest-ip ip-address
dscp dscp-name
— no dscp
[no] gre-header
gre-header send-key send-key receive-key receive-key
ip-mtu octets
— no ip-mtu
reassembly [wait-msecs]
— no reassembly
remote-ip ip-address
— no remote-ip
[no] shutdown
source ip-address
— no source
ipsec-gw name
— no ipsec-gw
cert
cert-profile name
default-result {revoked | good}
primary primary secondary secondary
client-db name
client-db name fallback
client-db name no-fallback
— no client-db
default-secure-service service-id interface ip-int-name
default-tunnel-template ipsec-template-identifier
[no] dhcp
gi-address ip-address
— no gi-address
[no] send-release
server ip-address [ip-address...(up to 8 max)] router router-instance
server ip-address [ip-address...(up to 8 max)] service-name service-name
— no server
[no] shutdown
[no] dhcp6
link-address ipv6-address
[no] send-release
server ip-address [ip-address] router router-instance
server ip-address [ip-address service-name service-name
— no server
[no] shutdown
ike-policy ike-policy-id
— no ike-policy
ipv4
address-source router router-instance dhcp-server local-dhcp4-svr-name pool dhcp4-server-pool [secondary-pool secondary-pool-name]
address-source service-name service-name dhcp-server local-dhcp4-svr-name pool dhcp4-server-pool [secondary-pool secondary-pool-name]
ipv6
address-source router router-instance dhcp-server local-dhcp6-svr-name pool dhcp6-server-pool
address-source service-name service-name dhcp-server local-dhcp6-svr-name pool dhcp6-server-pool
[no] shutdown
local-gateway-address ip-address
local-id type {ipv4 | fqdn | ipv6} [value value]
— no local-id
pre-shared-key key [{hash | hash2}]
radius-accounting-policy policy-name
[no] shutdown
ts-negotiation ts-list list-name

4.14.1.2.2. VPRN Commands

config
— service
— vprn service-id [name name] [customer customer-id] [create ]
— no vprn service-id
ipsec
security-policy security-policy-id [create]
— no security-policy security-policy-id
entry entry-id [create]
— no entry entry-id
local-ip {ip-prefix/prefix-length | ip-prefix netmask | any}
local-v6-ip ipv6-prefix/prefix-length
local-v6-ip any
remote-ip {ip-prefix/prefix-length | ip-prefix netmask | any}
remote-v6-ip any
remote-v6-ip ipv6-prefix/prefix-length
config
— service
— vprn service-id [name name] [customer customer-id] [create ]
— no vprn service-id
— interface ip-int-name [create]
— interface ip-int-name [create] tunnel
— no interface ip-int-name
— ipv6
address ipv6-address/prefix-length [eui-64] [preferred] [track-srrp srrp-instance] [modifier cga-modifier] [dad-disable] [primary-preference primary-preference]
— no address ipv6-address/prefix-length
link-local-address ipv6-address [dad-disable]
sap sap-id [create]
— no sap sap-id
ip-tunnel ip-tunnel-name [create]
— no ip-tunnel ip-tunnel-name
backup-remote-ip ip-address
[no] clear-df-bit
delivery-service {service-id | svc-name}
description description-string
[no] dest-ip ip-address
dscp dscp-name
— no dscp
[no] gre-header
gre-header send-key send-key receive-key receive-key
ip-mtu octets
— no ip-mtu
reassembly [wait-msecs]
— no reassembly
remote-ip ip-address
— no remote-ip
[no] shutdown
source ip-address
— no source
[no] ipsec-gw
cert
cert-profile profile
default-result {revoked | good}
primary primary secondary secondary
client-db name
client-db name fallback
client-db name no-fallback
client-db name
— no client-db
default-secure-service service-id interface ip-int-name
default-tunnel-template ipsec-template-identifier
[no] dhcp
gi-address ip-address
— no gi-address
[no] send-release
server ip-address [ip-address] router router-instance
server ip-address [ip-address] service-name service-name
— no server
[no] shutdown
[no] dhcp6
link-address ip-address
[no] send-release
server ip-address [ip-address] router router-instance
server ip-address [ip-address] service-name service-name
— no server
[no] shutdown
ike-policy ike-policy-id
— no ike-policy
ipv4
address-source router router-instance dhcp-server local-dhcp4-svr-name pool dhcp4-server-pool [secondary-pool secondary-pool-name]
address-source service-name service-name dhcp-server local-dhcp4-svr-name pool dhcp4-server-pool [secondary-pool secondary-pool-name]
ipv6
address-source router router-instance dhcp-server local-dhcp6-svr-name pool dhcp6-server-pool
address-source service-name service-name dhcp-server local-dhcp6-svr-name pool dhcp6-server-pool
[no] shutdown
local-gateway-address ip-address
local-id type {ipv4 | fqdn | ipv6} [value value]
— no local-id
pre-shared-key key [{hash | hash2}]
radius-accounting-policy policy-name
[no] shutdown
ts-negotiation ts-list list-name
ipsec-tunnel ipsec-tunnel-name [create]
— no ipsec-tunnel ipsec-tunnel-name
[no] bfd-designate
[no] bfd-enable {service service-id | service-name service-name} interface interface-name dst-ip ip-address
[no] clear-df-bit
description description-string
[no] dest-ip ip-address
cert
cert-profile profile
default-result {revoked | good}
primary primary secondary secondary
ike-policy ike-policy-id
— no ike-policy
local-id type {ipv4 | fqdn | ipv6} [value value]
— no local-id
pre-shared-key key [{hash | hash2}]
transform transform-id [transform-id...(up to 4 max)]
— no transform
pkt-too-big interval seconds
pkt-too-big message-count count
ip-mtu octets
— no ip-mtu
local-gateway-address ip-address peer ip-address delivery-service service-id
[no] manual-keying
security-association security-entry-id authentication-key authentication-key encryption-key encryption-key spi spi transform transform-id direction {inbound | outbound}
— no security-association security-entry-id direction {inbound | outbound}
replay-window {32 | 64 | 128 | 256 | 512}
security-policy security-policy-id [strict-match]

4.14.1.2.3. IPsec Mastership Election Commands

configure
— redundancy
peer ip-address [create]
— no peer ip-address
[no] mc-ipsec
[no] bfd-enable
discovery-interval interval-secs [boot interval-secs]
keep-alive-interval interval
tunnel-group tunnel-group-id [create]
— no tunnel-group tunnel-group-id
peer-group tunnel-group-id
— no peer-group
priority priority
— no priority
[no] shutdown

4.14.1.2.4. Related Commands

config
— router
— policy-options
— policy-statement
— entry
— from
state state
— no state
config
— redundancy
— multi-chassis
— peer
— sync
[no] ipsec
tunnel-group tunnel-group-id sync-tag tag-name [create]
— no tunnel-group tunnel-group-id

4.14.1.2.5. CMPv2 Commands

config
— system
— security
pki
ca-profile name [create]
— no ca-profile name
cmpv2
http-version [1.0 | 1.1]
key password [hash | hash2] reference reference-number
— no key reference reference-number
url url-string [service-id service-id]
url url-string [service-name service-name]
— no url
revocation-check {crl | crl-optional}
certificate-display-format {ascii | utf8}
admin
cmpv2
cert-request ca ca-profile-name current-key key-filename current-cert cert-filename [hash-alg hash-algorithm] newkey key-filename subject-dn subject-dn [domain-name domain-names] [ip-addr , ip-address | ipv6-address, ] save-as save-path-of-result-cert
clear-request ca ca-profile-name
initial-registration ca ca-profile-name key-to-certify key-filename protection-alg {password password reference ref-number | signature [cert cert-file-name [send-chain [with-ca ca-profile-name]]] [protection-key key-file-name] [hash-alg {md5 | sha1 | sha224 | sha256 | sha384 | sha512}]} subject-dn dn [domain-name domain-names] [ip-addr , ip-address|ipv6-address, ] save-as save-path-of-result-cert
key-update ca ca-profile-name newkey key-filename oldkey key-filename oldcert cert-filename [hash-alg hash-algorithm] save-as save-path-of-result-cert
poll ca ca-profile-name
show-request [ca ca-profile-name]

4.14.1.2.6. Auto-Update Commands

config
— system
file-transmission-profile name [create]
ipv4-source-address ip-address
ipv6-source-address ipv6-address
redirection level
retry count
— no retry
router router-instance
router service vprn-service-name
timeout seconds
config
— system
— security
pki
ca-profile name [create]
— no ca-profile name
auto-crl-update [create]
url-entry entry-id [create]
— no url-entry entry-id
file-transmission-profile profile-name
url url
— no url
periodic-update-interval [days days] [hrs hours] [min minutes] [sec seconds]
pre-update-time [days days] [hrs hours] [min minutes] [sec seconds]
retry-interval seconds
schedule-type schedule-type
[no] shutdown
admin
crl-update ca ca-profile-name

4.14.1.2.7. Show Commands

show
— ipsec
cert-profile name association
cert-profile [name]
cert-profile name entry [value]
certificate filename association
client-db db-name association
client-db db-name client client-index
client-db db-name
gateway name name
gateway [name name] tunnel [private-address-type private-address-type]
gateway [service service-id] [oper-state oper-state]
gateway tunnel [ip-address:port]
gateway name name tunnel ip-address:port
gateway name name tunnel
gateway [name name] tunnel state state
gateway [name name] tunnel idi-value idi-prefix
gateway tunnel count
gateway tunnel [private-address-type private-address-type]
ike-policy ike-policy-id
ike-policy ike-policy-id association [all]
ike-transform[ike-transform-id]
lockout router router-id local-gateway-address local-gateway-address mda mda
lockout router router-id local-gateway-address local-gateway-address remote ip-address[:port]
lockout router router-id mda mda
security-policy service service-id [security-policy-id security-policy-id]
service service-id
static-sa name sa-name
static-sa spi spi
transform [transform-id]
trust-anchor-profile trust-anchor-profile association
trust-anchor-profile [trust-anchor-profile ]
ts-list [list-name]
ts-list list-name association [all]
ts-list list-name local-entry [1..32]
ts-list list-name remote-entry [1..32]
ts-list list-name {local | remote}
tunnel ipsec-tunnel-name
tunnel
tunnel count
tunnel state state
tunnel-template [ipsec-template-identifier]
tunnel-template ipsec-template-identifier] association [all]
— redundancy
— multi-chassis
mc-ipsec peer ip-address tunnel-group tunnel-group-id
mc-ipsec peer ip-address
show
— isa
number-of-tunnels tunnel-type tunnel-type isa mda
number-of-tunnels tunnel-type tunnel-type system
number-of-tunnels tunnel-type tunnel-type tunnel-group tunnel-group-id
throughput tunnel-type tunnel-type system [history-stats-in-count count] [history-stats-in-min minutes] [current]
throughput tunnel-type tunnel-type type type system [history-stats-in-count count] [history-stats-in-min minutes] [current] [show-oid]
throughput tunnel-type tunnel-type isa mda [history-stats-in-count count] [history-stats-in-min minutes] [current]
throughput tunnel-type tunnel-type type type isa mda [history-stats-in-count count] [history-stats-in-min minutes] [current] [show-oid]
throughput tunnel-type tunnel-type tunnel-group tunnel-group-id [history-stats-in-count count] [history-stats-in-min minutes] [current]
throughput tunnel-type tunnel-type type type tunnel-group tunnel-group-id [history-stats-in-count count] [history-stats-in-min minutes] [current] [show-oid]
traffic-forward tunnel-type tunnel-type [type type] isa mda
ike-exchange-failure-rate gateway name
ike-exchange-failure-rate reason reason gateway name [show-oid]
ike-exchange-failure-rate reason reason isa mda [show-oid]
ike-exchange-failure-rate reason reason system [show-oid]
ike-exchange-failure-rate tunnel-group tunnel-group-id [history-stats-in-count count] [history-stats-in-min minutes] [current]
ike-exchange-failure-rate reason reason tunnel-group tunnel-group-id [history-stats-in-count count] [history-stats-in-min minutes] [current] [show-oid]
ikev2-msg-drop message-type message-type isa mda [show-oid]
number-of-tunnels gateway name [history-stats-in-count count] [history-stats-in-min minutes] [current]
number-of-tunnels tunnel-type tunnel-type gateway name [history-stats-in-count count] [history-stats-in-min minutes] [current] [show-oid]
number-of-tunnels isa mda [history-stats-in-count count] [history-stats-in-min minutes] [current]
number-of-tunnels tunnel-type tunnel-type isa mda [history-stats-in-count count] [history-stats-in-min minutes] [current] [show-oid]
number-of-tunnels system [history-stats-in-count count] [history-stats-in-min minutes] [current]
number-of-tunnels tunnel-type tunnel-type system [history-stats-in-count count] [history-stats-in-min minutes] [current] [show-oid]
number-of-tunnels tunnel-group tunnel-group-id [history-stats-in-count count] [history-stats-in-min minutes] [current]
number-of-tunnels tunnel-type tunnel-type tunnel-group tunnel-group-id [history-stats-in-count count] [history-stats-in-min minutes] [current] [show-oid]
throughput gateway name [history-stats-in-count count] [history-stats-in-min min] [current]
throughput type type gateway name [history-stats-in-count count] [history-stats-in-min min] [current] [show-oid]
throughput isa mda [history-stats-in-count count] [history-stats-in-min min] [current]
throughput type type isa mda [history-stats-in-count count] [history-stats-in-min min] [current] [show-oid]
throughput system [history-stats-in-count count] [history-stats-in-min min] [current]
throughput type type system [history-stats-in-count count] [history-stats-in-min min] [current] [show-oid]
throughput tunnel-group tunnel-group-id [history-stats-in-count count] [history-stats-in-min min] [current]
throughput type type tunnel-group tunnel-group-id [history-stats-in-count count] [history-stats-in-min min] [current] [show-oid]
traffic-forward [type type] gateway name
traffic-forward [type type] isa mda
traffic-forward [type type] gateway name dynamic-tunnel ip-address:port
traffic-forward [type type] tunnel ipsec-tunnel-name
tunnel-setup-rate gateway name [history-stats-in-count count] [history-stats-in-min minutes] [current]
tunnel-setup-rate tunnel-type tunnel-type gateway name [history-stats-in-count count] [history-stats-in-min minutes] [current] [show-oid]
tunnel-setup-rate isa mda [history-stats-in-count count] [history-stats-in-min minutes] [current]
tunnel-setup-rate tunnel-type tunnel-type isa mda [history-stats-in-count count] [history-stats-in-min minutes] [current] [show-oid]
tunnel-setup-rate system [history-stats-in-count count] [history-stats-in-min minutes] [current]
tunnel-setup-rate tunnel-type tunnel-type system [history-stats-in-count count] [history-stats-in-min minutes] [current] [show-oid]
tunnel-setup-rate tunnel-group tunnel-group-id [history-stats-in-count count] [history-stats-in-min minutes] [current]
tunnel-setup-rate tunnel-type tunnel-type tunnel-group tunnel-group-id [history-stats-in-count count] [history-stats-in-min minutes] [current] [show-oid]
cpu-usage mda [history-stats-in-count count] [history-stats-in-min minutes] [current]
cpu-usage mda [history-stats-in-count count] [history-stats-in-min minutes] [current] [show-oid] type {control-plane | data-plane}
memory-allocation-failure-rate mda [history-stats-in-count count] [history-stats-in-min minutes] [current] [show-oid]

4.14.1.2.8. Debug Commands

debug
[no] ca-profile profile-name
[no] cmpv2
[no] ca-profile profile-name
[no] ocsp
[no] ca-profile profile-name
— ipsec
[no] certificate filename
[no] no client-db db-name
gateway name name tunnel ip-address[:port] [nat-ip nat-ip[:port]] [detail] [no-dpd-debug] [display-keys]
— no gateway name name tunnel ip-address[:port] [nat-ip nat-ip[:port]]
gateway name name tunnel-subnet ip-prefix/ip-prefix-length [port port] [detail] [no-dpd-debug] [display-keys]
— no gateway name name tunnel-subnet ip-prefix/ip-prefix-length
tunnel ipsec-tunnel-name [detail] [no-dpd-debug] [display-keys]
— no tunnel ipsec-tunnel-name

4.14.1.2.9. Tools Commands

tools
— dump
— ipsec
stats
ike-stats gateway name [dynamic-tunnel ip-address:port]
ike-stats isa mda
ike-stats ipsec-tunnel-name
— perform
— ipsec
client-db db-name lookup peer-ip peer-ip-address
client-db db-name lookup idi string-type {fqdn | rfc822} string-value string-value [peer-ip peer-ip-address]
client-db db-name lookup idi address idi-ip-address [peer-ip peer-ip-address]
ike-initiate tunnel-group-id ipsec-group-id
ike-initiate tunnel-name ipsec-tunnel-name
— redundancy
— multi-chassis
force-switchover tunnel-group local-group-id [now][to {master | standby}]

4.14.1.2.10. Clear Commands

clear
— ipsec
gateway name name tunnel ip-address:port [statistics] [saved-key]
gateway name name tunnel ip-address:port
gateway name name [saved-key]
gateway name name tunnel ip-address:port [saved-key]
lockout router router-id
lockout router router-id local-gateway-address local-gateway-address
lockout router router-id local-gateway-address local-gateway-address remote ip-address[:port]
stats
ike-stats gateway name [dynamic-tunnel ip-address:port]
ike-stats isa mda
ike-stats ipsec-tunnel-name
tunnel ipsec-tunnel-name
tunnel ipsec-tunnel-name [saved-key]
tunnel ipsec-tunnel-name [stats] [saved-key]
tunnel isa mda [saved-key]

4.14.1.2.11. Admin Commands

admin
— ipsec
display-key type {ike | esp} gateway name name dynamic-tunnel ip-address:port
display-key type {ike | esp} tunnel ipsec-tunnel-name

4.14.2. Command Descriptions

4.14.2.1. Generic Commands

description

Syntax 
description description-string
no description
Context 
config>ipsec>client-db
config>ipsec>client-db>client
config>ipsec>ike-policy
config>ipsec>tnl-temp
config>isa>ipsec-group
config>isa>tunnel-group
config>service>ies>if>sap>ip-tunnel
config>service>vprn>if>sap>ip-tunnel
config>service>vprn>if>sap>ipsec-tunnel
Description 

This command creates a text description which is stored in the configuration file to help identify the content of the entity.

The no form of the command removes the string from the configuration.

Parameters 
string—
The description character string. Allowed values are any string up to 80 characters in length composed of printable, 7-bit ASCII characters. If the string contains special characters (#, $, spaces, and so on), the entire string must be enclosed within double quotes.

shutdown

Syntax 
[no] shutdown
Context 
config>ipsec>cert-profile
config>ipsec>client-db
config>ipsec>client-db>client
config>isa
config>isa>aa-group
config>isa>tunnel-grp
config>redundancy>multi-chassis>peer>mc-ipsec>tunnel-group
config>service>ies>if>sap>ip-tunnel
config>service>ies>if>sap>ipsec-gw
config>service>ies>if>sap>ipsec-gw>dhcp
config>service>ies>if>sap>ipsec-gw>dhcp6
config>service>ies>if>sap>ipsec-gw>lcl-addr-assign
config>service>vprn>if>sap>ip-tunnel
config>service>vprn>if>sap>ipsec-gw
config>service>vprn>if>sap>ipsec-gw>dhcp
config>service>vprn>if>sap>ipsec-gw>dhcp6
config>service>vprn>if>sap>ipsec-gw>lcl-addr-assign
Description 

This command administratively disables the entity. When disabled, an entity does not change, reset, or remove any configuration settings or statistics. Many entities must be explicitly enabled using the no shutdown command.

The shutdown command administratively disables an entity. The operational state of the entity is disabled as well as the operational state of any entities contained within. Many objects must be shut down before they may be deleted.

4.14.2.2. Hardware Commands

mda-type

Syntax 
mda-type isa-tunnel
no mda-type
Context 
config>card>mda
Description 

This command provisions or de-provisions an MDA to or from the device configuration for the slot.

Parameters 
isa-tunnel—
Specifies the ISA tunnel.

4.14.2.3. ISA Commands

isa

Syntax 
isa
Context 
config
Description 

This command enables the context to configure Integrated Services Adapter (ISA) parameters.

tunnel-group

Syntax 
tunnel-group tunnel-group-id [create]
tunnel-group tunnel-group-id isa-scale-mode isa-scale-mode [create]
no tunnel-group tunnel-group-id
Context 
config>isa
Description 

This command allows a tunnel group to be created or edited. A tunnel group is a set of one or more MS-ISAs that support the origination and termination of IPsec and IP/GRE tunnels. All of the MS-ISAs in a tunnel group must have isa-tunnel as their configured mda-type. On VSR, isa-scale-mode must be specified, which defines the number of tunnels on each ISA.

The no form of the command deletes the specified tunnel group from the configuration

Parameters 
tunnel-group-id—
Identifies the tunnel-group.
Values—
1 to 16

 

isa-scale-mode—
Defines the maximum number of all tunnels (all types combined) which can be established on each ISA of the tunnel group.
create—
Mandatory keyword used when creating tunnel group in the ISA context. The create keyword requirement can be enabled or disabled in the environment>create context.

active-mda-number

Syntax 
active-mda-number number
no active-mda-number
Context 
config>isa>tunnel-grp
Description 

This command specifies the number of active MS-ISA within all configured MS-ISA in the tunnel-group with multi-active enabled. IPsec traffic will be load balanced across all active MS-ISAs. If the number of configured MS-ISA is greater than the active-mda-number then the delta number of MS-ISA will be backup.

Default 

active-mda-number 1

Parameters 
number—
Specifies the number of active MDAs.
Values—
1 to 16

 

backup

Syntax 
backup mda-id
no backup
Context 
config>isa>tunnel-grp
Description 

This command assigns an ISA IPsec module configured in the specified slot to this IPsec group. The backup module provides the IPsec group with warm redundancy when the primary module in the group is configured. An IPsec group must always have a primary configured.

Primary and backup modules have equal operational status and when both modules are coming up, the one that becomes operational first becomes the active module. An IPsec module can serve as a backup for multiple IPsec groups but the backup can become active for only one ISA IPsec group at a time.

All configuration information is pushed down to the backup MDA from the CPM once the CPM gets notice that the primary module has gone down. This allows multiple IPsec groups to use the same backup module. Any statistics not yet spooled will be lost. Auto-switching from the backup to primary, once the primary becomes available again, is supported.

The operator is notified through SNMP events when:

  1. When the ISA IPsec service goes down (all modules in the group are down) or comes back up (a module in the group becomes active).
  2. When ISA IPsec redundancy fails (one of the modules in the group is down) or recovers (the failed module comes back up).
  3. When an ISA IPsec activity switch took place.

The no form of the command removes the specified module from the IPsec group.

Default 

no backup

Parameters 
mda-id—
Specifies the card/slot identifying a provisioned module to be used as a backup module.
Values—
mda-id: slot/mda slot 1 to up to 10 depending on chassis model mda 1 to 2

 

mda

Syntax 
[no] mda mda-id
Context 
config>isa>tunnel-grp
Description 

This command specifies the MDA ID of the MS-ISA as the member of tunnel-group with multi-active enabled. Up to 16 MDA could be configured under the same tunnel-group.

Parameters 
mda-id—
Specifies the id of MS-ISA.
Values—
iom-slot-id/mda-slot-id

 

ipsec-responder-only

Syntax 
[no] ipsec-responder-only
Context 
config>isa>tunnel-group
Description 

With this command configured, system will only act as IKE responder except for the automatic CHILD_SA re-key upon MC-IPsec switchover.

Default 

no ipsec-responder-only

multi-active

Syntax 
[no] multi-active
Context 
config>isa>tunnel-grp
Description 

This command enables configuring multiple active MS-ISA in the tunnel-group. IPsec traffic will be load balanced to configured active MS-ISAs.

Operational notes:

  1. A shutdown of group and removal of all existing configured tunnels of the tunnel-group are needed before provisioning command “multi-active”.
  2. If the tunnel-group is admin-up with “multi-active” configured then the configuration of “primary” and “backup” are not allowed.
  3. The active-mda-number must be =< total number of ISA configured.
    1. If active-mda-number is less than total number of ISA configured then the delta number of ISA will become backup ISA.
Default 

no multi-active

primary

Syntax 
primary mda-id
no primary
Context 
config>isa>tunnel-grp
Description 

This command assigns an ISA IPsec module configured in the specified slot to this IPsec group. The backup ISA IPsec provides the IPsec group with warm redundancy when the primary ISA IPsec in the group is configured. Primary and backup ISA IPsec have equal operational status and when both MDAs are coming up, the one that becomes operational first becomes the active ISA IPsec.

All configuration information is pushed down to the backup MDA from the CPM once the CPM gets notice that the primary module has gone down. This allows multiple IPsec groups to use the same backup module. Any statistics not yet spooled will be lost. Auto-switching from the backup to primary, once the primary becomes available again, is supported.

The operator is notified through SNMP events when:

  1. When the ISA IPsec service goes down (all modules in the group are down) or comes back up (a module in the group becomes active).
  2. When ISA IPsec redundancy fails (one of the modules in the group is down) or recovers (the failed module comes back up).
  3. When an ISA IPsec activity switch took place.

The no form of the command removes the specified primary ID from the group’s configuration.

Default 

no primary

Parameters 
mda-id —
Specifies the card/slot identifying a provisioned IPsec ISA.

reassembly

Syntax 
reassembly [wait-msecs]
no reassembly
Context 
config>isa>tunnel-group
config>service>ies>if>sap>gre-tunnel
config>service>vprn>if>sap>gre-tunnel
Description 

This command configures IP packet reassembly for IPsec and GRE tunnels supported by an MS-ISA. The reassembly command at the tunnel-group level configures IP packet reassembly for all IPsec and GRE tunnels associated with the tunnel-group. The reassembly command at the GRE tunnel level configures IP packet reassembly for that one specific GRE tunnel, overriding the tunnel-group configuration.

The no form of the command disables IP packet reassembly.

Default 

no reassembly (tunnel-group level)

reassembly (gre-tunnel level)

Parameters 
wait —
Specifies the maximum number of milliseconds that the ISA tunnel application will wait to receive all fragments of a particular IPsec or GRE packet. If one or more fragments are still missing when this limit is reached the partially reassembled datagram is discarded and an ICMP time exceeded message is sent to the source host (if allowed by the ICMP configuration of the sending interface). Internally, the configured value is rounded up to the nearest multiple of 100 ms.
Values—
1 to 5000

 

Default—
2000 (tunnel-group level)

stats-collection

Syntax 
stats-collection
Context 
config>isa>tunnel-grp
Description 

This command enables the context to configure ISA statistics collection parameters.

isa-dp-cpu-usage

Syntax 
[no] isa-dp-cpu-usage
Context 
config>isa>tunnel-grp>stats-collection
Description 

This command enables the system to collect statistics used to derive ISA CPU data plane usage. When enabled, this command impacts the ISA performance.

4.14.2.4. Certificate Profile Commands

cert-profile

Syntax 
cert-profile profile-name [create]
no cert-profile profile-name
Context 
config>ipsec
Description 

This command creates a new cert-profile or enters the configuration context of an existing cert-profile.

The no form of the command removes the profile name from the cert-profile configuration.

Parameters 
profile-name—
Specifies the name of the certification profile up to 32 characters.

entry

Syntax 
entry entry-id [create]
no entry entry-id
Context 
config>ipsec>cert-profile
Description 

This command configures the certificate profile entry information

The no form of the command removes the entry-id value from the cert-profile configuration.

Parameters 
entry-id—
Specifies the entry ID.
Values—
1 to 8

 

cert

Syntax 
cert cert-filename
no cert
Context 
config>ipsec>cert-profile>entry
Description 

This command specifies the file name of an imported certificate for the cert-profile entry.

The no form of the command removes the cert-file-name from the entry configuration.

Default 

no cert

key

Syntax 
key key-filename
no key
Context 
config>ipsec>cert-profile>entry
Description 

This command specifies the filename of an imported key for the cert-profile entry.

The no form of the command removes the key filename from the entry configuration.

Default 

no key

Parameters 
key-filename—
Specifies the filename of an imported key.

rsa-signature

Syntax 
rsa-signature {pkcs1 | pss}
Context 
config>ipsec>cert-profile>entry
Description 

This command specifies the signature scheme for RSA key.

Default 

pkcs1

Parameters 
pkcs1—
Specifies the RSA pkcs#1 v1.5 signature scheme.
pss—
Specifies the RSA probabilistic signature scheme.

send-chain

Syntax 
[no] send-chain
Context 
config>ipsec>cert-profile>entry
Description 

This command enters the configuration context of send-chain in the cert-profile entry.

The configuration of this command is optional, by default system will only send the certificate specified by cert command in the selected entry to the peer. This command allows system to send additional CA certificates to the peer. These additional CA certificates must be in the certificate chain of the certificate specified by the cert command in the same entry.

ca-profile

Syntax 
[no] ca-profile name
Context 
config>ipsec>cert-profile>entry>send-chain
Description 

This command specifies a CA certificate in the specified ca-profile to be sent to the peer.

Multiple configurations (up to seven) of this command are allowed in the same entry.

Parameters 
name—
Specifies the profile name up to 32 characters.

4.14.2.5. Client Database Commands

client-db

Syntax 
client-db db-name [create]
no client-db db-name
Context 
config>ipsec
Description 

This command creates a new IPsec client-db or enters the configuration context of an existing client-db.

An IPsec client-db can be used for IKEv2 dynamic LAN-to-LAN tunnel authentication and authorization. When a new tunnel request is received, the system will match the request to the client entries configured in client-db and use credentials returned by the matched client entry for authentication. If authentication succeeds, the system could also use the IPsec configuration parameters (such as private-service-id) returned by the matched entry to set up the tunnel.

The configured client-db is referenced under the ipsec-gw configuration context using the client-db command.

The no form of the command removes the db-name from the configuration.

Parameters 
db-name—
Specifies the name of this IPsec client up to 32 characters.
create—
Keyword used to create the security policy instance. The create keyword requirement can be enabled or disabled in the environment>create context.

client

Syntax 
client client-index [create]
no client client-index
Context 
config>ipsec>client-db
Description 

This command creates a new IPsec client entry in the client-db or enters the configuration context of an existing client entry.

There may be multiple client entries defined in the same client-db. If there are multiple entries that match the new tunnel request, then the system will select the entry that has smallest client-index.

The no form of the command reverts to the default.

Parameters 
client-index—
Specifies the ID of the client entry.
Values—
1 to 8000

 

create—
Keyword used to create the security policy instance. The create keyword requirement can be enabled or disabled in the environment>create context.

client-identification

Syntax 
client-identification
Context 
config>ipsec>client-db>client
Description 

This command enables the context to configure client ID information of this IPsec client.

If there are multiple match input are configured in the match-list of the client-db, then all corresponding match criteria must be configured for the client-entry.

idi

Syntax 
idi any
idi ipv4-prefix {any | ipv4-prefix/ipv4-prefix-length}
idi ipv6-prefix {any | ipv6-prefix/ipv6-prefix-length}
idi string-type string-type string-value string-value
no idi
Context 
config>ipsec>client-db> client>client-id
Description 

This command specifies a match criteria that uses the peer’s identification initiator (IDi) as the input, only one IDi criteria can be configured for a given client entry. This command supports the following matching methods:

  1. idi any: Matches any type of IDi with any value.
  1. idi ipv4-prefix: Matches an IDi with the type ID_IPV4_ADDR. If the any parameter is specified, then it will match any IPv4 address. If an IPv4 prefix is specified, then it will match an IPv4 address that is within the specified prefix.
  1. idi ipv6-prefix: Matches an IDi with the type ID_IPV6_ADDR. If the any parameter is specified, then it will match any IPv6 address. If an IPv6 prefix is specified, then it will match an IPv6 address that is within the specified prefix.
  1. idi string-type: Supports following type of IDi:
    1. FQDN: Either a full match or a suffix match
    1. RFC822: Either a full match or a suffix match

The no form of the command reverts to the default.

Default 

no idi

Parameters 
any—
Matches any type of IDi with any value.
ipv4-prefix/ipv4-prefix-length—
Matches any IPv4 address and prefix.
ipv6-prefix/ipv6-prefix-length—
Matches any IPv6 address and prefix.
string-type—
Matches the type of IDi value for this IPsec client entry.
Values—
fqdn, fqdn-suffix, rfc822, rfc822-suffix

 

string-value
Matches the IDi value within the client ID for this IPsec client entry up to 256 characters.

peer-ip-prefix

Syntax 
peer-ip-prefix ip-prefix/ip-prefix-length
peer-ip-prefix ipv4-any
peer-ip-prefix ipv6-any
no peer-ip-prefix
Context 
config>ipsec>client-db> client>client-id
Description 

This command specifies match criteria that uses the peer’s tunnel IP address as the input. Only one peer-ip-prefix criteria can be configured for a given client entry.

The no form of the command reverts to the default.

Default 

no peer-ip-prefix

Parameters 
ip-prefix/ip-prefix-length—
Specifies an IPv4 or IPv6 prefix. It is considered a match if the peer’s tunnel IP address is within the specified prefix.
ipv4-any—
Matches any IPv4 address.
ipv6-any—
Matches any IPv6 address.

client-name

Syntax 
client-name name
no client-name
Context 
config>ipsec>client-db>client
Description 

This command specifies the name of the client entry. The client name can be used in CLI navigation or in show commands.

Default 

no client-name

Parameters 
name—
Specifies the name of the client.

credential

Syntax 
credential
Context 
config>ipsec>client-db>client
Description 

This command enables the context to configure the parameters used to authenticate peers.

pre-shared-key

Syntax 
pre-shared-key key [hash | hash2]
no pre-shared-key
Context 
config>ipsec>client-db>client>credential
Description 

This command specifies a pre-shared key used to authenticate peers.

The no form of the command reverts to the default.

Default 

no pre-shared-key

Parameters 
key—
An ASCII string to use as the pre-shared key for dynamic keying. When the hash or hash2 parameters are not used, the key is a clear text key; otherwise, the key text is encrypted.
hash—
Specifies the key is entered in an encrypted form. If the hash or hash2 parameter is not used, the key is assumed to be in an unencrypted, clear text form. For security, all keys are stored in encrypted form in the configuration file with the hash or hash2 parameter specified
hash2—
Specifies the key is entered in a more complex encrypted form that involves more variables than the key value alone, meaning that the hash2 encrypted variable cannot be copied and pasted. If the hash or hash2 parameter is not used, the key is assumed to be in an unencrypted, clear text form. For security, all keys are stored in encrypted form in the configuration file with the hash or hash2 parameter specified.

private-interface

Syntax 
private-interface ip-int-name
no private-interface
Context 
config>ipsec>client-db>client
Description 

This command specifies the private interface name that is used for tunnel setup.

The no form of the command reverts to the default.

Default 

no private-interface

Parameters 
ip-int-name—
Specifies the name of the private interface.

private-service

Syntax 
private-service service-id
private-service name service-name
no private-service
Context 
config>ipsec>client-db>client
Description 

This command specifies the private service ID that is used for tunnel setup.

The no form of the command reverts to the default.

Default 

no private-service

Parameters 
service-id—
Specifies the service ID of the tunnel delivery service.

This variant of the command is only supported in 'classic' configuration-mode (configure system management-interface configuration-mode classic). The private-service name service-name variant can be used in all configuration modes.

Values—
{id | svc-name}

id:

1 to 2147483647

svc-name:

up to 64 characters (svc-name is an alias for input only. The svc-name gets replaced with an id automatically by SR OS in the configuration).

 

name service-name—
Identifies the service, up to 64 characters.

ts-negotiation

Syntax 
ts-negotiation ts-list list-name
no ts-negotiation
Context 
config>ipsec>client-db>client
Description 

This command specifies the traffic selector (TS) to be used for tunnel setup.

The no form of the command reverts to the default.

Default 

no ts-negotiation

Parameters 
list-name—
Specifies the TS list used by this tunnel, up to 32 characters.

tunnel-template

Syntax 
tunnel-template tunnel-template-id
no tunnel-template
Context 
config>ipsec>client-db>client
Description 

This command specifies the tunnel template to be used for tunnel setup.

The no form of the command reverts to the default.

Default 

no tunnel-template

Parameters 
tunnel-template-id—
Specifies the identifier of the tunnel template.
Values—
1 to 2048

 

match-list

Syntax 
match-list
Context 
config>ipsec>client-db
Description 

This command enables the context of the client-db’s match list. The match list defines the match input used during IPsec’s tunnel setup. If there are multiple inputs configured in the match list, then they all must have matches before the system considers a client entry is a match.

idi

Syntax 
[no] idi
Context 
config>ipsec>client-db>match-list
Description 

This command enables the Identification Initiator (IDi) type in the IPsec client matching process.

The no form of the command disables the IDi matching process.

Default 

no idi

peer-ip-prefix

Syntax 
[no] peer-ip-prefix
Context 
config>ipsec>client-db>match-list
Description 

This command enables the use of the peer’s tunnel IP address as the match input.

The no form of the command disables the peer IP prefix matching process.

Default 

no peer-ip-prefix

4.14.2.6. Internet Key Exchange (IKE) Commands

ipsec

Syntax 
ipsec
Context 
config
Description 

This command enables the context to configure Internet Protocol Security (IPsec) parameters. IPsec is a structure of open standards to ensure private, secure communications over Internet Protocol (IP) networks by using cryptographic security services.

ike-policy

Syntax 
ike-policy ike-policy-id [create]
no ike-policy ike-policy-id
Context 
config>ipsec
Description 

This command enables the context to configured an IKE policy.

The no form of the command

Parameters 
ike-policy-id—
Specifies a policy ID value to identify the IKE policy.
Values—
1 to 2048

 

trust-anchor-profile

Syntax 
trust-anchor-profile name [create]
no trust-anchor-profile name
Context 
config>ipsec
Description 

This command specifies the trust anchor profile name for the IPsec tunnel or IPsec GW.

Default 

no trust-anchor-profile

Parameters 
name—
Specifies the name of trust anchor profile up to 32 characters.

trust-anchor-profile

Syntax 
trust-anchor-profile name
no trust-anchor-profile name
Context 
config>service>ies>if>sap>ipsec-gw>cert
config>service>vprn>if>sap>ipsec-gw>cert
config>service>vprn>if>sap>ipsec-tunnel>cert
Description 

This command specifies the trust anchor profile name for the IPsec tunnel or IPsec GW.

Default 

no trust-anchor-profile

Parameters 
name—
Specifies the name of trust anchor profile, up to 32 characters.

trust-anchor

Syntax 
[no] trust-anchor ca-profile-name
Context 
config>ipsec>trust-anchor-profile
Description 

This command specifies a CA profile as a trust anchor CA. Up to 8 multiple trust anchors can be specified in a single trust anchor profile.

Parameters 
ca-profile-name—
Specifies the name of the trust anchor profile, up to 32 characters.

auth-method

Syntax 
auth-method {psk | plain-psk-xauth | cert-auth | psk-radius | cert-radius | eap | auto-eap-radius | auto-eap}
no auth-method
Context 
config>ipsec>ike-policy
Description 

This command specifies the authentication method used with this IKE policy.

The no form of the command removes the parameter from the configuration.

Default 

no auth-method

Parameters 
psk—
Both client and gateway authenticate each other by a hash derived from a pre-shared secret. Both client and gateway must have the PSK. This work with both IKEv1 and IKEv2
plain-psk-xauth—
Both client and gateway authenticate each other by pre-shared key and RADIUS. This work with IKEv1 only.
psk-radius—
Use the pre-shared-key and RADIUS to authenticate. IKEv2 remote-access tunnel only.
cert-radius—
Use the certificate, public/private key and RADIUS to authenticate. IKEv2 remote-access tunnel only.
eap—
Use the EAP to authenticate peer. IKEv2 remote-access tunnel only
auto-eap-radius—
Use EAP or potentially other method to authenticate the peer. IKEv2 remote-access tunnel only. Also see auto-eap-method and auto-eap-own-method.
auto-eap—
Use the EAP or potentially other RADIUS-related method to authenticate the peer. IKEv2 remote-access tunnel only. Also see auto-eap-method and auto-eap-own-method.

auto-eap-method

Syntax 
auto-eap-method {psk | cert | psk-or-cert}
Context 
config>ipsec>ike-policy
Description 

This command enables following behavior for IKEv2 remote-access tunnel when auth-method is configured as auto-eap-radius:

  1. If there is no AUTH payload in IKE_AUTH request, then system use EAP to authenticate client and also will own-auth-method to generate AUTH payload.
  2. If there is AUTH payload in IKE_AUTH request:
    1. if auto-eap-method is psk, then system proceed as auth-method:psk-radius
    2. if auto-eap-method is cert, then system proceed as auth-method:cert-radius
    3. if auto-eap-method is psk-or-cert, then:
      1. if the "Auth Method" field of AUTH payload is PSK, then system proceed as auth-method:psk-radius
      2. if the "Auth Method" field of AUTH payload is RSA or DSS, then system proceed as auth-method:cert-radius
    4. The system will use auto-eap-own-method to generate AUTH payload.

This command only applies when auth-method is configured as auto-eap-radius.

Default 

auto-eap-method cert

Parameters 
psk—
Uses the pre-shared-key as the authentication method.
cert—
Uses the certificate as the authentication method.
psk-or-cert —
Uses either the pre-shared-key or certificate based on the “Auth Method” field of the received AUTH payload.

auto-eap-own-method

Syntax 
auto-eap-own-method {psk | cert}
Context 
config>ipsec>ike-policy
Description 

This command enables following behavior for IKEv2 remote-access tunnel when auth-method is configured as auto-eap-radius:

  1. If there is no AUTH payload in IKE_AUTH request, then system use EAP to authenticate client and also will own-auth-method to generate AUTH payload.
  2. If there is AUTH payload in IKE_AUTH request:
    1. if auto-eap-method is psk, then system proceed as auth-method:psk-radius.
    2. if auto-eap-method is cert, then system proceed as auth-method:cert-radius.
    3. if auto-eap-method is psk-or-cert, then:
      1. if the "Auth Method" field of AUTH payload is PSK, then system proceed as auth-method:psk-radius.
      2. if the "Auth Method" field of AUTH payload is RSA or DSS, then system proceed as auth-method:cert-radius.
    4. The system will use auto-eap-own-method to generate AUTH payload.

This command only applies when auth-method is configured as auto-eap-radius.

Default 

auto-eap-method cert

Parameters 
psk—
Uses a pre-shared-key to generate AUTH payload.
cert—
Uses a public/private key to generate AUTH payload.

dpd

Syntax 
dpd [interval interval] [max-retries max-retries] [reply-only]
no dpd
Context 
config>ipsec>ike-policy
Description 

This command controls the dead peer detection mechanism.

The no form of the command removes the parameters from the configuration.

Default 

no dpd

Parameters 
interval
Specifies the DPD interval, in seconds. Since more time is necessary to determine if there is incoming traffic, the actual time needed to bring down the tunnel is larger than the DPD interval multiplied by max-retries.
Values—
10 to 300

 

Default—
30
max-retries
Specifies the maximum number of retries before the tunnel is removed.
Values—
2 to 5

 

Default—
3
reply-only—
Specifies whether to initiate a DPD request if there is an incoming ESP or IKE packet. Issuing the command without the reply-only keyword does not initiate a DPD request if there is an incoming ESP packet.

ike-mode

Syntax 
ike-mode {main | aggressive}
no ike-mode
Context 
config>ipsec>ike-policy
Description 

This command specifies one of either two modes of operation. IKE version 1 can support main mode and aggressive mode. The difference lies in the number of messages used to establish the session.

The no form of the command reverts to the default.

Default 

no ike-mode

Parameters 
main—
Specifies identity protection for the hosts initiating the IPsec session. This mode takes slightly longer to complete.
aggressive—
Specifies that the aggressive mode provides no identity protection but is faster.

ike-transform

Syntax 
ike-transform ike-transform-id [ike-transform-id ...(up to 4 max)]
no ike-transform
Context 
config>ipsec>ike-policy
Description 

This command specifies the IKE transform to be used in the IKE policy. Up to four IKE transforms can be specified. If multiple IDs are specified, the system selects an IKE transform based on the peer's proposal. If the system is a tunnel initiator, it uses the configured IKE transform to generate the SA payload.

Default 

no ike-transform

Parameters 
ike-transform-id—
Specifies up to four existing IKE transform instances to be associated with this IKE policy.
Values—
1 to 4096

 

ike-version

Syntax 
ike-version {1 | 2}
Context 
config>ipsec>ike-policy
Description 

This command sets the IKE version (1 or 2) that the ike-policy will use.

Default 

ike-version 1

Parameters 
1 | 2—
Specifies the version of IKE protocol.

ikev1-ph1-responder-delete-notify

Syntax 
[no] ikev1-ph1-responder-delete-notify
Context 
config>ipsec>ike-policy
Description 

This command specifies the system, when deleting an IKEv1 phase 1 SA for which it was the responder, to send a delete notification to the peer. This command only applies when the configured ike-version 1. This command is ignored with IKE version 2.

The no form of the command reverts to the default.

Default 

ikev1-ph1-responder-delete-notify

ikev2-fragment

Syntax 
ikev2-fragment mtu octets reassembly-timeout seconds
no ikev2-fragment
Context 
config>ipsec>ike-policy
Description 

This command enables IKEv2 protocol level fragmentation (RFC 7383). The specified MTU is the maximum size of IKEv2 packet.

Default 

no ikev2-fragment

Parameters 
octets—
Specifies the MTU for IKEv2 messages.
Values—
512 to 9000

 

seconds—
Specifies the timeout for reassembly.
Values—
1 to 5

 

limit-init-exchange

Syntax 
limit-init-exchange [reduced-max-exchange-timeout seconds]
no limit-init-exchange
Context 
config>ipsec>ike-policy
Description 

This command limits the number of ongoing IKEv2 initial exchanges per tunnel to 1. When the system receives a new IKEv2 IKE_SA_INIT request when there is an ongoing IKEv2 initial exchange from same peer, then system reduces the timeout value of the existing exchange to the specified reduced-max-exchange-timout. If the reduced-max-exchange-timout is disabled, then the system does not reduce the timeout value.

The no form of this command reverts to the default value.

Default 

limit-init-exchange reduced-max-exchange-timeout 2

Parameters 
seconds—
Specifies the maximum timeout for the in-progress initial IKE exchange.
Values—
2 to 60, disabled

 

lockout

Syntax 
lockout failed-attempts count duration duration-minutes block block-minutes [max-port-per-ip number-of-ports]
no lockout
Context 
config>ipsec>ike-policy
Description 

This command enables the lockout mechanism for the IPsec tunnel. The system will lock out an IPsec client for the configured time interval if the number of failed authentications exceeds the configured value within the specified duration. This command only applies when the system acts as a tunnel responder.

A client is defined as the tunnel IP address plus the port.

Optionally, the max-port-per-ip parameter can be configured as the maximum number of ports allowed behind the same IP address. If this threshold is exceeded, then all ports behind the IP address are blocked.

The no form of this command disables the lockout mechanism.

Default 

no lockout

Parameters 
count—
Specifies the maximum number of failed authentications allowed during the duration-minutes interval
Values—
1 to 64

 

Default—
3
duration-minutes—
Specifies the interval of time, in minutes, during which the configured failed authentication count must be exceeded in order to trigger a lockout
Values—
1 to 60

 

Default—
5
block-minutes—
Specifies the number of minutes that the client is blocked if the configured failed authentication count is exceeded
Values—
1 to 1440, infinite

 

Default—
10
number-of-ports—
Specifies the maximum number of ports allowed behind the same IP address
Values—
1 to 32000

 

Default—
16

match-peer-id-to-cert

Syntax 
[no] match-peer-id-to-cert
Context 
config>ipsec>ike-policy
Description 

This command enables checking the IKE peer's ID matches the peer's certificate when performing certificate authentication.

Default 

no match-peer-id-to-cert

nat-traversal

Syntax 
nat-traversal [force] [keep-alive-interval keep-alive-interval] [force-keep-alive]
no nat-traversal
Context 
config>ipsec>ike-policy
Description 

This command specifies whether NAT-T (Network Address Translation Traversal) is enabled, disabled or in forced mode.

The no form of the command reverts the parameters to the default.

Default 

no nat-traversal

Parameters 
force—
Forces to enable NAT-T
keep-alive-interval keep-alive-interval
Specifies the keep-alive interval in seconds.
Values—
120 to 600

 

force-keep-alive—
When specified, the keep-alive does not expire.

own-auth-method

Syntax 
own-auth-method {psk | cert | eap-only}
no own-auth-method
Context 
config>ipsec>ike-policy
Description 

This command configures the authentication method used with this IKE policy on its own side.

Default 

no own-auth-method

pfs

Syntax 
pfs [dh-group {1 | 2 | 5 | 14 | 15 | 19 | 20 | 21}]
no pfs
Context 
config>ipsec>ike-policy
Description 

This command enables perfect forward secrecy on the IPsec tunnel using this policy. PFS provides for a new Diffie-Hellman key exchange each time the SA key is renegotiated. After that SA expires, the key is forgotten and another key is generated (if the SA remains up). This means that an attacker who cracks part of the exchange can only read the part that used the key before the key changed. There is no advantage in cracking the other parts if they attacker has already cracked one.

The no form of the command disables PFS. If this it turned off during an active SA, when the SA expires and it is time to re-key the session, the original Diffie-Hellman primes will be used to generate the new keys.

Default 

no pfs

Parameters 
dh-group {1 | 2 | 5 | 14 | 15 | 19 | 20 | 21} —
Specifies which Diffie-Hellman group to use for calculating session keys. More bits provide a higher level of security, but require more processing. Three groups are supported with IKE-v1:

Group   1: 768 bits

Group   2: 1024 bits

Group   5: 1536 bits

Group 14: 2048 bits

Group 15: 3072 bits

Group 19: P-256 ECC Curve, 256 bits

Group 20: P-384 ECC Curve, 384 bits

Group 21: P-512 ECC Curve, 512 bits

relay-unsolicited-cfg-attribute

Syntax 
relay-unsolicited-cfg-attribute
Context 
config>ipsec>ike-policy
Description 

This command enters relay unsolicited configuration attributes context. With this configuration, the configured attributes returned from source (such as a RADIUS server) will be returned to IKEv2 remote-access tunnel client regardless if the client has requested it in the CFG_REQUEST payload.

internal-ip4-address

Syntax 
[no] internal-ip4-address
Context 
config>ipsec>ike-policy>relay-unsol-attr
Description 

This command will return IPv4 address from source (such as a RADIUS server) to IKEv2 remote-access tunnel client regardless if the client has requested it in the CFG_REQUEST payload.

Default 

no internal-ip4-address

internal-ip4-dns

Syntax 
[no] internal-ip4-dns
Context 
config>ipsec>ike-policy>relay-unsol-attr
Description 

This command will return IPv4 DNS server address from source (such as a RADIUS server) to IKEv2 remote-access tunnel client regardless if the client has requested it in the CFG_REQUEST payload.

Default 

no internal-ip4-dns

internal-ip4-netmask

Syntax 
[no] internal-ip4-netmask
Context 
config>ipsec>ike-policy>relay-unsol-attr
Description 

This command will return IPv4 netmask from source (such as a RADIUS server) to IKEv2 remote-access tunnel client regardless if the client has requested it in the CFG_REQUEST payload.

Default 

no internal-ip4-netmask

internal-ip6-dns

Syntax 
[no] internal-ip6-dns
Context 
config>ipsec>ike-policy>relay-unsol-attr
Description 

This command will return IPv6 DNS server address from source (RADIUS server) to IKEv2 remote-access tunnel client regardless if the client has requested it in the CFG_REQUEST payload.

Default 

no internal-ip6-dns

internal-ip6-address

Syntax 
[no] internal-ip6-address
Context 
config>ipsec>ike-policy>relay-unsol-attr
Description 

This command will return IPv6 address from source (such as a RADIUS server) to IKEv2 remote-access tunnel client regardless if the client has requested it in the CFG_REQUEST payload.

Default 

no internal-ip6-address

send-idr-after-eap-success

Syntax 
[no] send-idr-after-eap-success
Context 
config>ipsec>ike-policy
Description 

This command enables the system to add the Identification Responder (IDr) payload in the last IKE authentication response after an Extensible Authentication Protocol (EAP) Success packet is received. When disabled, the system will not include IDr payload.

The no form of the command disables sending the IDr payload in the last IKE.

Default 

send-idr-after-eap-success

ike-transform

Syntax 
ike-transform ike-transform-id [create]
no ike-transform ike-transform-id
Context 
config>ipsec
Description 

This commands creates a new or enters an existing IKE transform instance. The IKE transform include following configuration for IKE SA:

  1. DH Group
  1. IKE authentication algorithm
  1. IKE encryption algorithm
  1. IKE SA lifetime

The ike-transform-id is referenced in the ike-policy configuration.

Parameters 
ike-transform—
Specifies a number used to uniquely identify an IKE transform instance
Values—
1 to 4096

 

create—
Keyword used to create the ike-transform instance. The create keyword requirement can be enabled or disabled in the environment>create context.

dh-group

Syntax 
dh-group {1 | 2 | 5 | 14 | 15 | 19 | 20 | 21}
Context 
config>ipsec>ike-transform
Description 

This command specifies the Diffie-Hellman group to be used in this IKE transform instance.

Default 

dh-group 2 (1024-bit — More Modular Exponential (MODP))

Parameters 
dh-group {1 | 2 | 5 | 14 | 15 | 19 | 20 | 21} —
Specifies which Diffie-Hellman group to use for calculating session keys. More bits provide a higher level of security, but require more processing. Three groups are supported with IKE-v1:

Group   1: 768 bits

Group   2: 1024 bits

Group   5: 1536 bits

Group 14: 2048 bits

Group 15: 3072 bits

Group 19: P-256 ECC Curve, 256 bits

Group 20: P-384 ECC Curve, 384 bits

Group 21: P-512 ECC Curve, 512 bits

ike-auth-algorithm

Syntax 
ike-auth-algorithm auth-algorithm
Context 
config>ipsec>ike-transform
Description 

This command specifies the IKE authentication algorithm for the IKE transform

Default 

ike-auth-algorithm sha1

Parameters 
auth-algorithm—
Specifies the values used to identify the hashing algorithm
Values—
md5 — Configures the use of the hmac-md5 algorithm for authentication
sha1 — Configures the use of the hmac-sha1 algorithm for authentication
sha256 — Configures the use of the hmac-sha256 algorithm for authentication.
sha384 — Configures the use of the hmac-sha384 algorithm for authentication
sha512 — Configures the use of the hmac-sha512 algorithm for authentication.
aes-xcbc — Configures the use of aes-xcbc (RFC 3566, The AES-XCBC-MAC-96 Algorithm and Its Use With IPsec) algorithm for authentication.

 

ike-encryption-algorithm

Syntax 
ike-encryption-algorithm encryption-algorithm
Context 
config>ipsec>ike-transform
Description 

This command specifies the IKE encryption algorithm to be used in the IKE transform instance.

Default 

ike-encryption-algorithm aes128

Parameters 
encryption-algorithm—
Specifies the IKE encryption algorithm
Values—
des — Configures the 56-bit des algorithm for encryption. This is an older algorithm with relatively weak security. While better than nothing, it should only be used where a strong algorithm is not available on both ends at an acceptable performance level.
3des — Configures the 3-des algorithm for encryption. This is a modified application of the des algorithm which uses multiple des operations to make information more secure.
aes128 — Configures the aes algorithm with a block size of 128 bits. This is a mandatory implementation size for aes. This is a very strong algorithm choice.
aes192 — Configures the aes algorithm with a block size of 192 bits. This is a stronger version of aes.
aes256 — Configures the aes algorithm with a block size of 256 bits. This is the strongest available version of aes.
aes128-gcm8 - Configures ESP to use aes-gcm with a 128-bit key size and an 8-byte ICV for encryption and authentication.
aes128-gcm16 - Configures ESP to use aes-gcm with a 128-bit key size and a 16-byte ICV for encryption and authentication.
aes256-gcm8 - Configures ESP to use aes-gcm with a 256-bit key size and an 8-byte ICV for encryption and authentication.
aes256-gcm16 - This parameter configures ESP to use aes-gcm with a 256-bit key size and a 16-byte ICV for encryption and authentication.

 

isakmp-lifetime

Syntax 
isakmp-lifetime seconds
Context 
config>ipsec>ike-transform
Description 

This command specifies the lifetime of the IKE SA.

Default 

isakmp-lifetime 86400

Parameters 
seconds—
Specifies the Phase 1 life time for this IKE transform.
Values—
1200 to 31536000

 

show-ipsec-keys

Syntax 
[no] show-ipsec-keys
Context 
config>ipsec
Description 

This command enables user to optionally include IKE-SA or CHILD-SA keys in the output of debug ipsec or admin ipsec display-key.

The no form of the command disallows the user from including keys in the output.

Default 

no show-ipsec-keys

4.14.2.7. IPsec Transform Commands

ipsec-transform

Syntax 
ipsec-transform transform-id [create]
no ipsec-transform transform-id
Context 
config>ipsec
Description 

This command enables the context to create an ipsec-transform policy. IPsec transforms policies can be shared. A change to the ipsec-transform is allowed at any time. The change will not impact tunnels that have been established until they are renegotiated. If the change is required immediately the tunnel must be cleared (reset) for force renegotiation.

IPsec transform policy assignments to a tunnel require the tunnel to be shutdown.

The no form of the command removes the ID from the configuration.

Parameters 
transform-id—
Specifies a policy ID value to identify the IPsec transform policy.
Values—
1 to 2048

 

create—
This keyword is mandatory when creating an ipsec-transform policy. The create keyword requirement can be enabled or disabled in the environment>create context.

esp-auth-algorithm

Syntax 
esp-auth-algorithm {null | md5 | sha1 | sha256 | sha384 | sha512 | aes-xcbc | auth-encryption}
no esp-auth-algorithm
Context 
config>ipsec>transform
Description 

This command specifies which hashing algorithm should be used for the authentication function Encapsulating Security Payload (ESP). Both ends of a manually configured tunnel must share the same configuration parameters for the IPsec tunnel to enter the operational state.

The no form of the command disables the authentication.

Default 

esp-auth-algorithm sha1

Parameters 
null—
This is a very fast algorithm specified in RFC 2410, which provides no authentication.
md5—
This parameter configures ESP to use the hmac-md5 algorithm for authentication.
sha1—
This parameter configures ESP to use the hmac-sha1 algorithm for authentication.
sha256—
This parameter configures ESP to use the sha256 algorithm for authentication.
sha384—
This parameter configures ESP to use the sha384 algorithm for authentication.
sha512—
This parameter configures ESP to use the sha512 algorithm for authentication.
aes-xcbc—
Specifies the aes-xcbc algorithm for authentication.
auth-encryption—
This parameter must be configured when esp-encryption-algorithm is either aes-gcm or aes-gmac.

esp-encryption-algorithm

Syntax 
esp-encryption-algorithm {null | des | 3des | aes128 | aes192 | aes256| aes128-gcm8 | aes128-gcm12 | aes128-gcm16 | aes192-gcm8 | aes192-gcm12 | aes192-gcm16 | aes256-gcm8 | aes256-gcm12 | aes256-gcm16 | null-aes128-gmac | null-aes192-gmac | null-aes256-gmac}
no esp-encryption-algorithm
Context 
config>ipsec>ipsec-transform
Description 

This command specifies the encryption algorithm to use for the IPsec session. Encryption only applies to esp configurations. If encryption is not defined, esp will not be used.

For IPsec tunnels to come up, both ends need to be configured with the same encryption algorithm.

The no form of the command removes the specified encryption algorithm.

Note:

When aes-gcm or aes-gmac is configured:

  1. esp-auth-algorithm must be set to auth-encryption
  2. the system will not include the authentication algorithm in the ESP proposal of the SA payload
  3. ipsec-transform cannot be used for manual keying
Default 

esp-encryption-algorithm aes128

Parameters 
null—
This parameter configures the high-speed null algorithm, which does nothing. This is the same as not having encryption turned on.
des—
This parameter configures the 56-bit des algorithm for encryption. This is an older algorithm, with relatively weak security. Although slightly better than no encryption, it should only be used where a strong algorithm is not available on both ends at an acceptable performance level.
3des—
This parameter configures the 3-des algorithm for encryption. This is a modified application of the des algorithm which uses multiple des operations to make things more secure.
aes128—
This parameter configures the aes algorithm with a block size of 128 bits. This is the mandatory implementation size for aes. As of today, this is a very strong algorithm choice.
aes192—
This parameter configures the aes algorithm with a block size of 192 bits. This is a stronger version of aes.
aes256—
This parameter configures the aes algorithm with a block size of 256 bits. This is the strongest available version of aes.
aes128-gcm8—
Configures ESP to use aes-gcm with a 128-bit key size and an 8-byte ICV for encryption and authentication.
aes128-gcm12—
Configures ESP to use aes-gcm with a 128-bit key size and a 12-byte ICV for encryption and authentication.
aes128-gcm16—
Configures ESP to use aes-gcm with a 128-bit key size and a 16-byte ICV for encryption and authentication.
aes192-gcm8—
Configures ESP to use aes-gcm with a 192-bit key size and an 8-byte ICV for encryption and authentication.
aes192-gcm12—
Configures ESP to use aes-gcm with a 192-bit key size and a 12-byte ICV for encryption and authentication.
aes192-gcm16—
Configures ESP to use aes-gcm with a 192-bit key size and a 16-byte ICV for encryption and authentication.
aes256-gcm8—
Configures ESP to use aes-gcm with a 256-bit key size and an 8-byte ICV for encryption and authentication.
aes256-gcm12—
Configures ESP to use aes-gcm with a 256-bit key size and a 12-byte ICV for encryption and authentication.
aes128-gcm16—
Configures ESP to use aes-gcm with a 256-bit key size and a 16-byte ICV for encryption and authentication.
null-aes128gmac—
Configures ESP to use aes-gmac with a 128-bit key size for authentication only.
null-aes192gmac—
Configures ESP to use aes-gmac with a 192-bit key size for authentication only.
null-aes256gmac—
Configures ESP to use aes-gmac with a 256-bit key size for authentication only.

ipsec-lifetime

Syntax 
ipsec-lifetime ipsec-lifetime
no ipsec-lifetime
Context 
config>ipsec>ike-policy
Description 

This command specifies the lifetime of the Phase 2 IKE key.

The no form of the command reverts to the default.

Default 

3600

Parameters 
ipsec-lifetime—
Specifies the Phase 2 lifetime for this IKE policy in seconds.
Values—
1200 to 31536000

 

ipsec-lifetime

Syntax 
ipsec-lifetime seconds
ipsec-lifetime inherit
Context 
config>ipsec>ipsec-transform
Description 

This command specifies the CHILD_SA. If the inherit parameter is specified, then the system uses the IPsec lifetime configuration in the corresponding IKE policy configured in the same IPsec gateway or IPsec tunnel.

Default 

ipsec-lifetime inherit

Parameters 
seconds—
Specifies the lifetime of the Phase 2 IKE key in seconds.
Values—
1200 to 31536000

 

inherit—
Specifies that the system uses the ipsec-lifetime configuration in the corresponding IKE policy that is configured for the same IPsec gateway or IPsec tunnel.

pfs-dh-group

Syntax 
pfs-dh-group {1 | 2 | 5 | 14 | 15 | 19 | 20 | 21}
pfs-dh-group inherit
no pfs-dh-group
Context 
config>ipsec>ipsec-transform
Description 

This command specifies the Diffie-Hellman group to be used for Perfect Forward Secrecy (PFS) computation during CHILD_SA rekeying.

The no form of the command reverts to the default.

Default 

pfs-dh-group inherit

Parameters 
{1 | 2 | 5 | 14 | 15 | 19 | 20 | 21}
Specifies the Diffie-Hellman group to achieve PFS.
inherit—
Specifies that the value of the DH group used by the system is inherited from the IPsec gateway or IPsec tunnel.

4.14.2.8. IPsec Static Security Association Commands

static-sa

Syntax 
static-sa sa-name [create]
no static-sa sa-name
Context 
config>ipsec
Description 

This command configures an IPsec static SA.

authentication

Syntax 
authentication auth-algorithm ascii-key ascii-string
authentication auth-algorithm hex-key hex-string [hash|hash2]
no authentication
Context 
config>ipsec>static-sa
Description 

This command configures the authentication algorithm to use for an IPsec manual SA.

Default 

no authentication

Parameters 
auth-algorithm—
Specifies the used authentication algorithm.
Values—
mda5, sha1

 

ascii-string—
Specifies an ASCII key; 16 characters for md5 and 20 characters for sha1.
hex-string—
Specifies a HEX key; 32 hex nibbles for md5 and 40 hex nibbles for sha1.
hash—
Specifies the key is entered in an encrypted form. If the hash or hash2 parameter is not used, the key is assumed to be in an unencrypted, clear text form. For security, all keys are stored in encrypted form in the configuration file with the hash or hash2 parameter specified
hash2—
Specifies the key is entered in a more complex encrypted form that involves more variables than the key value alone, meaning that the hash2 encrypted variable cannot be copied and pasted. If the hash or hash2 parameter is not used, the key is assumed to be in an unencrypted, clear text form. For security, all keys are stored in encrypted form in the configuration file with the hash or hash2 parameter specified.

description

Syntax 
description description-string
no description
Context 
config>ipsec>static-sa
Description 

This command creates a text description which is stored in the configuration file to help identify the content of the entity.

The no form of the command removes the string from the configuration.

Parameters 
string—
The description character string. Allowed values are any string up to 32 characters composed of printable, 7-bit ASCII characters. If the string contains special characters (#, $, spaces, and so on), the entire string must be enclosed within double quotes.

direction

Syntax 
direction ipsec-direction
no direction
Context 
config>ipsec>static-sa
Description 

This command configures the direction for an IPsec manual SA.

The no form of the command reverts to the default value.

Default 

direction bidirectional

Parameters 
ipsec-direction—
Identifies the direction to which this static SA entry can be applied.
Values—
inbound, outbound, bidirectional

 

protocol

Syntax 
protocol ipsec-protocol
no protocol
Context 
config>ipsec>static-sa
Description 

This command configures the security protocol to use for an IPsec manual SA. The no statement resets to the default value.

Default 

protocol esp

Parameters 
ipsec-protocol—
Identifies the IPsec protocol used with this static SA.
Values—
ah — Specifies the Authentication Header protocol. esp — Specifies the Encapsulation Security Payload protocol.

 

spi

Syntax 
spi spi
no spi
Context 
config>ipsec>static-sa
Description 

This command configures the SPI key value for an IPsec manual SA.

This command specifies the SPI (Security Parameter Index) used to lookup the instruction to verify and decrypt the incoming IPsec packets when the value of the direction command is inbound.

The SPI value specifies the SPI that will be used in the encoding of the outgoing packets when the when the value of the direction command is outbound. The remote node can use this SPI to lookup the instruction to verify and decrypt the packet.

If no spi is selected, then this static SA cannot be used.

The no form of the command reverts to the default value.

Default 

no spi

Parameters 
spi—
Specifies the security parameter index for this SA.
Values—
256 to 16383

 

4.14.2.9. Trust Anchor Profile/TS Commands

auto-establish

Syntax 
[no] auto-establish
Context 
config>service>vprn>if>sap>ipsec-tun>dynamic-keying
Description 

The system will automatically establish phase 1 SA as soon as the tunnel is provisioned and enabled (no shutdown). This option should only be configured on one side of the tunnel.

Any associated static routes will remain up as long as the tunnel could be up, even though it may actually be operationally down according to the CLI.

ts-list

Syntax 
ts-list list-name [create]
no ts-list list-name
Context 
config>ipsec
Description 

This command creates a new traffic selector (TS).

The no form of the command removes the list name from the configuration.

Parameters 
list-name—
Specifies the name of the TS-list.

local

Syntax 
local
Context 
config>ipsec>ts-list
Description 

This command enables the context to configure local TS-list parameters. The TS-list is the traffic selector of the local system, such as TSr, when the system acts as an IKEv2 responder.

remote

Syntax 
remote
Context 
config>ipsec>ts-list
Description 

This command enables the context to configure remote TS-list parameters. The TS-list is the traffic selector of the local system, such as TSi, when the system acts as an IKEv2 responder.

entry

Syntax 
entry entry-id [create]
no entry entry-id
Context 
config>ipsec>ts-list>local
config>ipsec>ts-list>remote
Description 

This command creates a new TS-list entry or enables the context to configure an existing TS-list entry.

The no form of the command removes the entry from the local or remote configuration.

Parameters 
entry-id—
Specifies the entry ID
Values—
1 to 32

 

address

Syntax 
address prefix ip-prefix/ip-prefix-len
address from begin-ip-address to end-ip-address
no address
Context 
config>ipsec>ts-list>local>entry
config>ipsec>ts-list>remote>entry
Description 

This command specifies the address range in the IKEv2 traffic selector.

Default 

no address

Parameters 
ip-prefix/ip-prefix-len—
Specifies the IP prefix and subnet mask.
begin-ip-address—
Specifies the beginning address of the range for this entry.
end-ip-address—
Specifies the ending address of the range for this entry.

protocol

Syntax 
protocol any
protocol protocol-id port opaque
protocol protocol-id port any
protocol protocol-id port from begin-port-id to end-port-id
no protocol
Context 
config>ipsec>ts-list>local>entry
config>ipsec>ts-list>remote>entry
Description 

This command specifies the protocol and port range in the IKEv2 traffic selector.

The SR OS supports OPAQUE ports and port ranges for the following protocols:

  1. TCP
  2. UDP
  3. SCTP
  4. ICMP
  5. ICMPv6
  6. MIPv6

For ICMP and ICMPv6, the port value takes the form icmp-type/icmp-code. For MIPv6, the port value is the mobility header type. For other protocols, only the port any configuration can be used.

Default 

no protocol

Parameters 
protocol-id—
Specifies the protocol ID. The value can be a number, a protocol name, or any.
begin-port-id—
Specifies the beginning of the port range.
Values—
For TCP, UDP, and SCTP, the value is the port number.
For ICMP and ICMPv6, the value takes the form icmp-type/icmp-code; for example, 0/0.
For MIPv6, the value is the mobility header type.

 

end-port-id—
Specifies the end of the port range
Values—
For TCP, UDP, and SCTP, the value is the port number.
For ICMP and ICMPv6, the value takes the form icmp-type/icmp-code; for example, 0/0.
For MIPv6, the value is the mobility header type.

 

opaque—
Specifies OPAQUE ports.
any—
Specifies any port.

ts-negotiation

Syntax 
ts-negotiation ts-list list-name
no ts-negotiation
Context 
config>service>ies>if>sap>ipsec-gw
config>service>vprn>if>sap>ipsec-gw
Description 

This command enables the IKEv2 traffic selector negotiation with the specified ts-list.

Parameters 
list-name—
Specifies the ts-list name

4.14.2.10. Tunnel Template Commands

tunnel-template

Syntax 
tunnel-template ipsec-template-identifier [create]
no tunnel-template ipsec-template-identifier
Context 
config>ipsec
Description 

This command creates a tunnel template. Up to 2000 templates are allowed.

Parameters 
ipsec-template-identifier—
Specifies the template identifier.
Values—
1 to 2048

 

create—
Mandatory keyword used when creating a tunnel-template in the IPsec context. The create keyword requirement can be enabled or disabled in the environment>create context.

clear-df-bit

Syntax 
[no] clear-df-bit
Context 
config>ipsec>tnl-temp
Description 

This command enables clearing of the Do-not-Fragment bit.

Default 

no clear-df-bit

encapsulated-ip-mtu

Syntax 
encapsulated-ip-mtu octets
no encapsulated-ip-mtu
Context 
config>ipsec>tnl-temp
config>service>ies>if>sap>ip-tunnel
config>service>vprn>if>sap>ip-tunnel
config>service>vprn>if>sap>ipsec-tun
Description 

This command specifies the max size of encapsulated tunnel packet for the ipsec-tunnel/ip-tunnel or the dynamic tunnels terminated on the ipsec-gw. If the encapsulated v4 or v6 tunnel packet exceeds the encapsulated-ip-mtu, then system fragments the packet against the encapsulated-ip-mtu.

Default 

no encapsulated-ip-mtu

Parameters 
octets—
Specifies the max size in octets.
Values—
512 to 9000

 

icmp6-generation

Syntax 
icmp6-generation
Context 
config>ipsec>tnl-temp
config>service>ies>if>sap>ip-tunnel
config>service>vprn>if>sap>ip-tunnel
config>service>vprn>if>sap>ipsec-tun
Description 

This command enables the ICMPv6 packet generation configuration context.

pkt-too-big

Syntax 
pkt-too-big interval seconds
pkt-too-big message-count count
[no] pkt-too-big
Context 
config>ipsec>tnl-temp>icmp6-gen
config>service>vprn>if>sap>ipsec-tun>icmp6-gen
Description 

This command enables system to send ICMPv6 PTB (Packet Too Big) message on private side and optionally specifies the rate.

With this command configured, system will send PTB back if received v6 packet on private side is bigger than 1280 bytes and also exceeds the private MTU of the tunnel.

The ip-mtu command (under ipsec-tunnel or tunnel-template) specifies the private MTU for the ipsec-tunnel or dynamic tunnel.

Parameters 
seconds—
the maximum interval during which messages can be sent, in seconds.
Values—
1 to 60

 

Default—
10
count—
the maximum number of ICMPv6 messages that can be sent during the configured interval
Values—
10 to 1000

 

Default—
100

ip-mtu

Syntax 
ip-mtu octets
no ip-mtu
Context 
config>ipsec>tnl-temp
Description 

This command configures the template IP MTU.

Default 

no ip-mtu

Parameters 
octets —
Specifies the maximum size in octets.
Values—
512 to 9000

 

private-tcp-mss-adjust

Syntax 
private-tcp-mss-adjust octets
no private-tcp-mss-adjust
Context 
config>ipsec>tnl-temp
config>service>vprn>if>sap>ip-tunnel
config>service>vprn>if>sap>ipsec-tun
config>service>ies>if>sap>ip-tunnel
Description 

This command enables TCP MSS adjust for IPsec or IP tunnels on the private side. When the command is configured, the system updates the TCP MSS option to the value of the received TCP SYN packet on the private side.

The no form of the command disables TCP MSS adjust on the private side.

Default 

no private-tcp-mcc-adjust

Parameters 
octets—
Specifies the new TCP MSS value in octets.
Values—
512 to 9000

 

public-tcp-mss-adjust

Syntax 
public-tcp-mss-adjust octets
public-tcp-mss-adjust auto
no public-tcp-mss-adjust
Context 
config>ipsec>tnl-temp
config>service>vprn>if>sap>ipsec-tun
config>service>vprn>if>ip-tunnel
config>service>ies>if>sap>ip-tunnel
Description 

This command enables TCP MSS adjust for IPsec or IP tunnels on the public side. When the command is configured, the system updates the TCP MSS option value to received.TCP SYN packet encapsulation in the ESP packet.

If auto is specified, the system derives the new MSS value based on the public MTU and IPsec overhead.

The no form of this command disables TCP MSS adjust on the public side.

Default 

no public-tcp-mss-adjust

Parameters 
auto—
Derive the new MSS value based on the public MTU and IPsec overhead.
octets—
Specifies the new TCP MSS value in octets.
Values—
512 to 9000

 

replay-window

Syntax 
replay-window {32 | 64 | 128 | 256 | 512}
no replay-window
Context 
config>ipsec>tnl-temp
Description 

This command sets the anti-replay window.

The no form of the command removes the parameter from the configuration.

Default 

no replay-window

Parameters 
{32 | 64 | 128 | 256 | 512}—
Specifies the size of the anti-replay window.

sp-reverse-route

Syntax 
[no] sp-reverse-route
Context 
config>ipsec>tnl-temp
Description 

This command specifies whether the node using this template will accept framed-routes sent by the RADIUS server and install them for the lifetime of the tunnel as managed routes.

The no form of the command disables sp-reverse-route.

Default 

no sp-reverse-route

transform

Syntax 
transform transform-id [transform-id]
no transform
Context 
config>ipsec>tnl-temp
config>service>ies>if>sap>ipsec-gw
config>service>vprn>if>sap>ipsec-gw
config>service>vprn>if>sap>ipsec-tunnel
Description 

This command configures IPsec transform.

Default 

no transform

Parameters 
transform-id—
Specifies up to four transform IDs.

4.14.2.11. Service Configuration Commands

ipsec

Syntax 
ipsec
Context 
config>service>vprn>ipsec
Description 

This command enables the context to configure IPsec policies.

cert-profile

Syntax 
cert-profile name
no cert-profile
Context 
config>service>ies>if>sap>ipsec-gw>cert
config>service>vprn>if>sap>ipsec-gw>cert
config>service>vprn>if>sap>ipsec-tun>dyn>cert
Description 

This command specifies a cert-profile for the IPsec tunnel or IPsec gw.

Parameters 
name—
Specifies the name of profile up to 32 characters.

allow-reverse-route-override

Syntax 
allow-reverse-route-override
Context 
config>service>vprn>ipsec
Description 

With this command configured, the system will allow a new dynamic LAN-to-LAN tunnel that terminates in the private VPRN service to be created with an overlapping reverse route. If the ID is the same as an existing one, the existing CHILD_SA and route will be removed.

Default 

no allow-reverse-route-override

security-policy

Syntax 
security-policy security-policy-id [create]
no security-policy security-policy-id
Context 
config>service>vprn>ipsec
Description 

This command configures a security policy to use for an IPsec tunnel.

Parameters 
security-policy-id—
specifies a value to be assigned to a security policy.
Values—
1 to 32768

 

create—
Keyword used to create the security policy instance. The create keyword requirement can be enabled or disabled in the environment>create context.

entry

Syntax 
entry entry-id [create]
no entry entry-id
Context 
config>service>vprn>ipsec>sec-plcy
Description 

This command configures an IPsec security policy entry.

Parameters 
entry-id—
Specifies the IPsec security policy entry.
Values—
1 to 16

 

create—
Keyword used to create the security policy entry instance. The create keyword requirement can be enabled or disabled in the environment>create context.

local-ip

Syntax 
local-ip {ip-prefix/prefix-length | ip-prefix netmask | any}
Context 
config>service>vprn>ipsec>sec-plcy>entry
Description 

This command configures the local (from the VPN) IP prefix/mask for the policy parameter entry.

Only one entry is necessary to describe a potential flow. The local-ip and remote-ip commands can be defined only once. The system will evaluate the local IP as the source IP when traffic is examined in the direction of VPN to the tunnel and as the destination IP when traffic flows from the tunnel to the VPN. The remote IP will be evaluated as the source IP when traffic flows from the tunnel to the VPN when traffic flows from the VPN to the tunnel.

Parameters 
ip-prefix—
The destination address of the aggregate route in dotted decimal notation
Values—
a.b.c.d (host bits must be 0)
prefix-length   1 to 32

 

netmask—
The subnet mask in dotted decimal notation
any—
keyword to specify that it can be any address

local-v6-ip

Syntax 
local-v6-ip ipv6-prefix/prefix-length
local-v6-ip any
no local-v6-ip
Context 
config>service>vprn>ipsec>sec-plcy>entry
Description 

This command specifies the local v6 prefix for the security-policy entry.

Parameters 
ipv6-prefix/prefix-length—
Specifies the local v6 prefix and length
Values—

ipv6-address/prefix: ipv6-address

x:x:x:x:x:x:x:x (eight 16-bit pieces)

  

x:x:x:x:x:x:d.d.d.d

  

x [0 to FFFF]H

d [0 to 255]D

host bits must be 0

:: not allowed

prefix-length [1 to 128]

 

any—
keyword to specify that it can be any address.

remote-ip

Syntax 
remote-ip {ip-prefix/prefix-length | ip-prefix netmask | any}
Context 
config>service>vprn>ipsec>sec-plcy>entry
Description 

This command configures the remote (from the tunnel) IP prefix/mask for the policy parameter entry.

Only one entry is necessary to describe a potential flow. The local-ip and remote-ip commands can be defined only once. The system will evaluate the local IP as the source IP when traffic is examined in the direction of VPN to the tunnel and as the destination IP when traffic flows from the tunnel to the VPN. The remote IP will be evaluated as the source IP when traffic flows from the tunnel to the VPN when traffic flows from the VPN to the tunnel.

Parameters 
ip-prefix—
The destination address of the aggregate route in dotted decimal notation.
Values—
a.b.c.d (host bits must be 0)
prefix-length   1 to 32

 

netmask—
The subnet mask in dotted decimal notation.
any—
keyword to specify that it can be any address.

remote-v6-ip

Syntax 
remote-v6-ip any
remote-v6-ip ipv6-prefix/prefix-length
no remote-v6-ip
Context 
config>service>vprn>ipsec>sec-plcy>entry
Description 

This command specifies the remote v6 prefix for the security-policy entry.

Parameters 
ipv6-prefix/prefix-length—
Specifies the local v6 prefix and length.
Values—

ipv6-address/prefix: ipv6-address

x:x:x:x:x:x:x:x (eight 16-bit pieces)

  

x:x:x:x:x:x:d.d.d.d

  

x [0 to FFFF]H

d [0 to 255]D

host bits must be 0

:: not allowed

prefix-length [1 to 28]

 

any—
A keyword to specify that any address can be used.

address

Syntax 
address ipv6-address/prefix-length [eui-64] [track-srrp srrp-instance] [modifier cga-modifier] [dad-disable] [primary-preference primary-preference]
no address ipv6-address/prefix-length
Context 
config>service>vprn>if>ipv6
Description 

This command add an IPv6 address to the tunnel interface.

The prefix length must be 96 or higher.

Parameters 
ipv6-address/prefix-length—
Specifies the IPv6 address on the interface.
Values—

ipv6-address/prefix: ipv6-address

x:x:x:x:x:x:x:x (eight 16-bit pieces)

  

x:x:x:x:x:x:d.d.d.d

  

x [0 to FFFF]H

d [0 to 255]D

prefix-length  

1 to 128

 

eui-64—
When the eui-64 keyword is specified, a complete IPv6 address from the supplied prefix and 64-bit interface identifier is formed. The 64-bit interface identifier is derived from MAC address on Ethernet interfaces. For interfaces without a MAC address, for example ATM interfaces, the Base MAC address of the chassis is used.

link-local-address

Syntax 
link-local-address ipv6-address [dad-disable]
Context 
config>service>vprn>if>ipv6
Description 

This command specifies the link-local-address for the tunnel interface.

Only one link-local-address is allowed per interface.

Parameters 
ipv6-address—
Specifies the IPv6 address on the interface.
Values—

ipv6-address/prefix: ipv6-address

x:x:x:x:x:x:x:x (eight 16-bit pieces)

  

x:x:x:x:x:x:d.d.d.d

  

x [0 to FFFF]H

d [0 to 255]D

 

dad-disable—
Disables Duplicate Address Detection.

dynamic-tunnel-redundant-next-hop

Syntax 
dynamic-tunnel-redundant-next-hop ip-address
no dynamic-tunnel-redundant-next-hop
Context 
config>service>ies>if
config>service>vprn>if
Description 

This command configures the dynamic ISA tunnel redundant next-hop address.

Default 

no dynamic-tunnel-redundant-next-hop

Parameters 
ip-address—
Specifies the IP address of the next hop.

static-tunnel-redundant-next-hop

Syntax 
static-tunnel-redundant-next-hop ip-address
no static-tunnel-redundant-next-hop
Context 
config>service>ies>if
config>service>vprn>if
Description 

This command specifies redundant next-hop address on public or private IPsec interface (with public or private tunnel-sap) for static IPsec tunnel. The specified next-hop address will be used by standby node to shunt IPsec traffic to master in case of it receives them.

The next-hop address will be resolved in routing table of corresponding service.

Default 

no static-tunnel-redundant-next-hop

Parameters 
ip-address—
Specifies the IP address of the next hop.

interface

Syntax 
interface ip-int-name [create] [tunnel]
no interface ip-int-name
Context 
config>service>vprn
Description 

This command creates a logical IP routing interface for a Virtual Private Routed Network (VPRN). Once created, attributes like an IP address and service access point (SAP) can be associated with the IP interface.

The interface command, under the context of services, is used to create and maintain IP routing interfaces within VPRN service IDs. The interface command can be executed in the context of an VPRN service ID. The IP interface created is associated with the service core network routing instance and default routing table. The typical use for IP interfaces created in this manner is for subscriber Internet access.

Interface names are case sensitive and must be unique within the group of defined IP interfaces defined for config router interface and config service vprn interface. Interface names must not be in the dotted decimal notation of an IP address. For example, the name “1.1.1.1” is not allowed, but “int-1.1.1.1” is allowed. Show commands for router interfaces use either interface names or the IP addresses. Use unique IP address values and IP address names to maintain clarity. It could be unclear to the user if the same IP address and IP address name values are used. Although not recommended, duplicate interface names can exist in different router instances.

The available IP address space for local subnets and routes is controlled with the config router service-prefix command. The service-prefix command administers the allowed subnets that can be defined on service IP interfaces. It also controls the prefixes that may be learned or statically defined with the service IP interface as the egress interface. This allows segmenting the IP address space into config router and config service domains.

When a new name is entered, a new logical router interface is created. When an existing interface name is entered, the user enters the router interface context for editing and configuration.

By default, there are no default IP interface names defined within the system. All VPRN IP interfaces must be explicitly defined. Interfaces are created in an enabled state.

The no form of this command removes IP the interface and all the associated configuration. The interface must be administratively shutdown before issuing the no interface command.

For VPRN services, the IP interface must be shutdown before the SAP on that interface may be removed. VPRN services do not have the shutdown command in the SAP CLI context. VPRN service SAPs rely on the interface status to enable and disable them.

Parameters 
ip-int-name—
Specifies the name of the IP interface. Interface names, up to 32 alphanumeric characters. If the string contains special characters (#, $, spaces, and so on), the entire string must be enclosed within double quotes.
tunnel—
Specifies that the interface is configured as tunnel interface, which could be used to terminate IPsec or GRE tunnels in the private service.
create—
Keyword used to create the IPsec interface instance. The create keyword requirement can be enabled or disabled in the environment>create context.

sap

Syntax 
sap sap-id [create]
no sap sap-id
Context 
config>service>ies>if
config>service>vprn>if
Description 

This command creates a Service Access Point (SAP) within a service. A SAP is a combination of port and encapsulation parameters which identifies the service access point on the interface and within the router. Each SAP must be unique.

All SAPs must be explicitly created. If no SAPs are created within a service or on an IP interface, a SAP will not exist on that object.

Enter an existing SAP without the create keyword to edit SAP parameters. The SAP is owned by the service in which it was created.

A SAP can only be associated with a single service. A SAP can only be defined on a port that has been configured as an access port using the config interface port-type port-id mode access command. Channelized TDM ports are always access ports.

If a port is shutdown, all SAPs on that port become operationally down. When a service is shutdown, SAPs for the service are not displayed as operationally down although all traffic traversing the service will be discarded. The operational state of a SAP is relative to the operational state of the port on which the SAP is defined.

The no form of this command deletes the SAP with the specified port. When a SAP is deleted, all configuration parameters for the SAP will also be deleted.

Default 

No SAPs are defined.

Special Cases 
SAP Tunnels—
sap tunnel-id.private | public:tag — This parameter associates a tunnel group SAP with this interface.

This context will provide a SAP to the tunnel. The operator may associate an ingress and egress QoS policies as well as filters and virtual scheduling contexts. Internally this creates an Ethernet SAP that will be used to send and receive encrypted traffic to and from the MDA. Multiple tunnels can be associated with this SAP. The “tag” will be a dot1q value. The operator may see it as an identifier. The range is limited to 1 to 4094.

Parameters 
sap-id—
Specifies the physical port identifier portion of the SAP definition.
port-id—
Specifies the physical port ID in the slot/mda/port format.

If the card in the slot has Media Dependent Adapters (MDAs) installed, the port-id must be in the slot_number/MDA_number/port_number format. For example 61/2/3 specifies port 3 on MDA 2 in slot 61.

Table 27:  Port ID Syntax  

null

port-id | lag-id

dot1q

{port-id | lag-id}:{qtag1 | cp-conn-prof-id

qinq

{port-id | lag-id}:{qtag1 | cp-conn-prof-id}.{qtag2 | cp-conn-prof-id}

      cp: keyword

      conn-prof-id: 1 to 8000

port-id

slot/mda/port [.channel]

eth-sat-id

esat-id/slot/port

esat: keyword

id: 1 to20

pxc-id

psc-id.sub-port

pxc psc-id.sub-port

pxc: keyword

id: 1 to 64

sub-port: a, b

lag-id

lag-id

lag: keyword

id: 1 to 800

qtag1

0 to 4094

qtag2

* | null | 0 to 4094

The port-id must reference a valid port type. When the port-id parameter represents SONET/SDH and TDM channels the port ID must include the channel ID. A period “.” separates the physical port from the channel-id. The port must be configured as an access port.

If the SONET/SDH port is configured as clear-channel then only the port is specified.

create—
Keyword used to create a SAP instance.

ipsec-tunnel

Syntax 
ipsec-tunnel ipsec-tunnel-name [create]
no ipsec-tunnel ipsec-tunnel-name
Context 
config>service>vprn>if>sap
Description 

This command specifies an IPsec tunnel name. An IPsec client sets up the encrypted tunnel across public network. The 7750 SR IPsec MDA acts as a concentrator gathering, and terminating these IPsec tunnels into an IES or VPRN service. This mechanism allows as service provider to offer a global VPRN service even if node of the VPRN are on an uncontrolled or insecure portion of the network.

Parameters 
ipsec-tunnel-name—
Specifies an IPsec tunnel name, up to 32 characters.
create—
Keyword used to create the IPsec tunnel instance. The create keyword requirement can be enabled or disabled in the environment>create context.

bfd-designate

Syntax 
[no] bfd-designate
Context 
config>service>vprn>if>sap>ipsec-tunnel
Description 

This command specifies whether this IPsec tunnel is the BFD designated tunnel.

Default 

no bfd-designate

bfd-enable

Syntax 
[no] bfd-enable {service service-id | service-name service-name} interface interface-name dst-ip ip-address
Context 
config>service>vprn>if>sap>ipsec-tunnel
Description 

This command assigns a BFD session to provide a heart-beat mechanism for a given IPsec tunnel. There can be only one BFD session assigned to any given IPsec tunnel, but there can be multiple IPsec tunnels using same BFD session. BFD controls the state of the associated tunnel. If the BFD session goes down, the system will also bring down the associated non-designated IPsec tunnel.

Parameters 
service-id —
Specifies the service ID on which the BFD session resides.
service-name —
Specifies the service name on which the BFD session resides.
interface-name—
Specifies the name of the interface used by the BFD session.
ip-address—
Specifies the destination address to be used for the BFD session.

dynamic-keying

Syntax 
[no] dynamic-keying
Context 
config>service>vprn>if>sap>ipsec-tunnel
Description 

This command enables dynamic keying for the IPsec tunnel.

The no form of the command disables dynamic keying.

auto-establish

Syntax 
[no] auto-establish
Context 
config>service>vprn>if>sap>ipsec-tun>dynamic-keying
Description 

This command specifies whether to attempt to establish a phase 1 exchange automatically.

The no form of the command disables the automatic attempts to establish a phase 1 exchange.

Default 

no auto-establish

transform

Syntax 
transform transform-id [transform-id]
no transform
Context 
config>service>vprn>if>sap>ipsec-tun>dynamic-keying
config>ipsec>tnl-temp
Description 

This command associates the IPsec transform sets allowed for this tunnel. A maximum of four transforms can be specified. The transforms are listed in decreasing order of preference (the first one specified is the most preferred).

Default 

no transform

Parameters 
transform-id—
Specifies the value used for transforms for dynamic keying.
Values—
1 to 2048

 

manual-keying

Syntax 
[no] manual-keying
Context 
config>service>vprn>if>sap>ipsec-tunnel
Description 

This command configures Security Association (SA) for manual keying. When enabled, the command specifies whether this SA entry is created manually by the user or dynamically by the IPsec sub-system.

security-association

Syntax 
security-association security-entry-id authentication-key authentication-key encryption-key encryption-key spi spi transform transform-id direction {inbound | outbound}
no security-association security-entry-id direction {inbound | outbound}
Context 
config>service>vprn>if>sap>ipsec-tunnel>manual-keying
Description 

This command configures the information required for manual keying SA creation.

Parameters 
security-entry-id—
Specifies the ID of an SA entry.
Values—
1 to 16

 

encryption-key encryption-key
specifies the key used for the encryption algorithm.
Values—
none or 0x0 to 0xFFFFFFFF...(max 64 hex nibbles)

 

authentication-key authentication-key
The authentication key.
Values—
none or 0x0 to 0xFFFFFFFF...(max 40 hex nibbles)

 

spi spi
Specifies the Security Parameter Index (SPI) used to look up the instruction to verify and decrypt the incoming IPsec packets when the direction is inbound. When the direction is outbound, the SPI that will be used in the encoding of the outgoing packets. The remote node can use this SPI to lookup the instruction to verify and decrypt the packet.
Values—
256 to 16383

 

transform transform-id
Specifies the transform entry that will be used by this SA entry. This object should be specified for all the entries created which are manual SAs. If the value is dynamic, then this value is irrelevant and will be zero.
Values—
1 to 2048

 

direction {inbound | outbound}—
Specifies the direction of an IPsec tunnel.

replay-window

Syntax 
replay-window {32 | 64 | 128 | 256 | 512}
no replay-window
Context 
config>ipsec>tnl-temp
config>service>vprn>if>sap>ipsec-tunnel
Description 

This command specifies the size of the anti-replay window. The anti-replay window protocol secures IP against an entity that can inject messages in a message stream from a source to a destination computer on the Internet.

Default 

no replay-window

Parameters 
{32 | 64 | 128 | 256 | 512}—
Specifies the size of the SA anti-replay window.

security-policy

Syntax 
security-policy security-policy-id [strict-match]
no security-policy
Context 
config>service>vprn>if>sap>ipsec-tunnel
Description 

This command configures an IPsec security policy. The policy may then be associated with static IPsec tunnels defined in the same routing instance.

With strict-match parameter enabled, when a CREATE_CHILD exchange request is received for a static IPsec tunnel, and this request is not a re-key request, then ISA matches the received TSi and TSr with the configured security policy. This can be a match only when a received TS (in TSi or TSr) address range matches exactly with the subnet in a security policy entry.

If there is no match, then the setup fails, and TS_UNACCEPTABLE is sent.

If there is a match, but there is an existing CHILD_SA for the matched security policy, then the setup fails, and NO_PROPOSAL_CHOSEN.

If there is a match, and there is not CHILD_SA for the matched entry, then the subnet is sent in the matched security-policy entry as TSi and TSr, and the CHILD_SA is created.

Default 

no security-policy

Parameters 
security-policy-id—
Specifies the IPsec security policy entry that the tunnel will use.
Values—
1 to 32768

 

strict-match—
Enables strict match of security-policy entry.

4.14.2.12. Interface SAP Tunnel Commands

ip-tunnel

Syntax 
ip-tunnel ip-tunnel-name [create]
no ip-tunnel ip-tunnel-name
Context 
config>service>ies>if>sap
config>service>vprn>if>sap
Description 

This command is used to configure an IP-GRE or IP-IP tunnel and associate it with a private tunnel SAP within an IES or VPRN service.

The no form of the command deletes the specified IP/GRE or IP-IP tunnel from the configuration. The tunnel must be administratively shutdown before issuing the no ip-tunnel command.

Parameters 
ip-tunnel-name —
Specifies the name of the IP tunnel. Tunnel names can be from 1 to 32 alphanumeric characters. If the string contains special characters (for example, #, $, spaces), the entire string must be enclosed within double quotes.

source

Syntax 
source ip-address
no source
Context 
config>service>ies>if>sap>ip-tunnel
config>service>vprn>if>sap>ip-tunnel
Description 

This command sets the source IPv4 address of GRE encapsulated packets associated with a particular GRE tunnel. It must be an address in the subnet of the associated public tunnel SAP interface. The GRE tunnel does not come up until a valid source address is configured.

The no form of the command deletes the source address from the GRE tunnel configuration. The tunnel must be administratively shutdown before issuing the no source command.

Default 

no source

Parameters 
ip-address—
Specifies the source IPv4 address of the GRE tunnel.
Values—
1.0.0.0 to 223.255.255.255

 

remote-ip

Syntax 
remote-ip ip-address
no remote-ip
Context 
config>service>interface>ies>sap>ip-tunnel
config>service>interface>vprn>sap>ip-tunnel
Description 

This command sets the primary destination IPv4 address of GRE encapsulated packets associated with a particular GRE tunnel. If this address is reachable in the delivery service (there is a route) then this is the destination IPv4 address of GRE encapsulated packets sent by the delivery service.

The no form of the command deletes the destination address from the GRE tunnel configuration.

Default 

no remote-ip

Parameters 
ip-address—
Specifies the destination IPv4 address of the GRE tunnel.
Values—
1.0.0.0 to 223.255.255.255

 

backup-remote-ip

Syntax 
backup-remote-ip ip-address
no backup-remote-ip
Context 
config>service>>ies>interface>sap>ip-tunnel
config>service>vprn>interface>sap>ip-tunnel
Description 

This command sets the backup destination IPv4 address of GRE encapsulated packets associated with a particular GRE tunnel. If the primary destination address is not reachable in the delivery service (there is no route) or not defined then this is the destination IPv4 address of GRE encapsulated packets sent by the delivery service.

The no form of the command deletes the backup-destination address from the GRE tunnel configuration.

Default 

no backup-remote-ip

Parameters 
ip-address—
Specifies the destination IPv4 address of the GRE tunnel.
Values—
1.0.0.0 to 223.255.255.255

 

clear-df-bit

Syntax 
[no] clear-df-bit
Context 
config>service>ies>if>sap>ip-tunnel
config>service>vprn>if>sap>ip-tunnel
config>service>vprn>if>sap>ipsec-tunnel
Description 

This command instructs the MS-ISA to reset the DF bit to 0 in all payload IP packets associated with the GRE or IPsec tunnel, before any potential fragmentation resulting from the ip-mtu command. (This will require a modification of the header checksum.) The no clear-df-bit command, corresponding to the default behavior, leaves the DF bit unchanged.

The no form of the command disables the DF bit reset.

Default 

no clear-df-bit

delivery-service

Syntax 
delivery-service {service-id | svc-name}
no delivery-service
Context 
config>service>interface>ies>sap>delivery-service
config>service>interface>vprn>sap>gre-tunnel
Description 

This command sets the delivery service for GRE encapsulated packets associated with a particular GRE tunnel. This is the IES or VPRN service where the GRE encapsulated packets are injected and terminated. The delivery service may be the same service that owns the private tunnel SAP associated with the GRE tunnel. The GRE tunnel does not come up until a valid delivery service is configured.

The no form of the command deletes the delivery-service from the GRE tunnel configuration.

Default 

no delivery-service

Parameters 
service-id—
Identifies the service used to originate and terminate the GRE encapsulated packets belonging to the GRE tunnel.
Values—
1 to 2147483647

 

svc-name—
Identifies the service used to originate and terminate the GRE encapsulated packets belonging to the GRE tunnel, up to 64 characters.

dscp

Syntax 
dscp dscp-name
no dscp
Context 
config>service>interface>ies>sap
config>service>interface>vprn>sap>gre-tunnel
Description 

This command sets the DSCP code-point in the outer IP header of GRE encapsulated packets associated with a particular GRE tunnel. The default, set using the no form of the command, is to copy the DSCP value from the inner IP header (after remarking by the private tunnel SAP egress qos policy) to the outer IP header.

Default 

no dscp

Parameters 
dscp—
Specifies the DSCP code-point to be used.
Values—
be, cp1, cp2, cp3, cp4, cp5, cp6, cp7, cs1, cp9, af11, cp11, af12, cp13, af13, cp15, cs2, cp17, af21, cp19, af22, cp21, af23, cp23, cs3, cp25, af31, cp27, af32, cp29, af33, cp31, cs4, cp33, af41, cp35, af42, cp37, af43, cp39, cs5, cp41, cp42, cp43, cp44, cp45, ef, cp47, nc1, cp49, cp50, cp51, cp52, cp53, cp54, cp55, nc2, cp57, cp58, cp59, cp60, cp61, cp62, cp63

 

dest-ip

Syntax 
[no] dest-ip ip-address
Context 
config>service>ies>if>sap>ip-tunnel
config>service>vprn>if>sap>ip-tunnel
config>service>vprn>sap>ipsec-tunnel
Description 

This command configures a private IPv4 or IPv6 address of the remote tunnel endpoint. A tunnel can have up to 16 dest-ip commands. At least one dest-ip address is required in the configuration of a tunnel. A tunnel does not come up operationally unless all dest-ip addresses are reachable (part of a local subnet).

Unnumbered interfaces are not supported.

Parameters 
ip-address —
Specifies the private IPv4 or IPv6 address of the remote IP tunnel endpoint. If this remote IP address is not within the subnet of the IP interface associated with the tunnel then the tunnel will not come up.
Values—

<ip-address>

ipv4-address

a.b.c.d

ipv6-address

x:x:x:x:x:x:x:x (eight 16-bit pieces)

x:x:x:x:x:x:d.d.d.d

x - [0 to FFFF]H

d - [0 to 255]D

 

gre-header

Syntax 
[no] gre-header
gre-header send-key send-key receive-key receive-key
Context 
config>service>ies>sap>ip-tunnel
config>service>vprn>sap>ip-tunnel
Description 

This command configures the type of the IP tunnel. If the gre-header command is configured then the tunnel is a GRE tunnel with a GRE header inserted between the outer and inner IP headers. If the no form of the command is configured then the tunnel is a simple IP-IP tunnel.

Default 

no gre-header

Parameters 
send-key send-key
Specifies a 32-bit unsigned integer.
Values—
0 to 4294967295

 

receive-key receive-key
Specifies a 32-bit unsigned integer.
Values—
0 to 4294967295

 

ip-mtu

Syntax 
ip-mtu octets
no ip-mtu
Context 
config>service>ies>if>sap>ip-tunnel
config>service>vprn>if>sap>ip-tunnel
config>service>vprn>if>sap>ipsec-tunnel
Description 

This command configures the IP maximum transmit unit (packet) for this interface.

Because this connects a Layer 2 to a Layer 3 service, this parameter can be adjusted under the IES interface.

The MTU that is advertised from the IES size is:

MINIMUM((SdpOperPathMtu - EtherHeaderSize), (Configured ip-mtu))

By default (for the Ethernet network interface), if no ip-mtu is configured it is (1568 - 14) equals 1554.

The ip-mtu command instructs the MS-ISA to perform IP packet fragmentation, prior to IPsec encryption and encapsulation, based on the configured MTU value. In particular:

If the length of a payload IP packet (including its header) exceeds the configured MTU value and the DF flag is clear (due to the presence of the clear-df-bit command or because the original DF value was 0) then the MS-ISA fragments the payload packet as efficiently as possible (i.e. it creates the minimum number of fragments each less than or equal to the configured MTU size); in each created fragment the DF bit shall be 0.

If the length of a payload IP packet (including its header) exceeds the configured MTU value and the DF flag is set (because the original DF value was 1 and the tunnel has no clear-df-bit in its configuration) then the MS-ISA discards the payload packet without sending an ICMP type 3/code 4 message back to the packet’s source address.

The no ip-mtu command, corresponding to the default behavior, disables fragmentation of IP packets by the MS-ISA; all IP packets, regardless of size or DF bit setting, are allowed into the tunnel.

The effective MTU for packets entering a tunnel is the minimum of the private tunnel SAP interface IP MTU value (used by the IOM) and the tunnel IP MTU value (configured using the above command and used by the MS-ISA). So if it desired to fragment IP packets larger than X bytes with DF set, rather than discarding them, the tunnel IP MTU should be set to X and the private tunnel SAP interface IP MTU should be set to a value larger than X.

Default 

no ip-mtu

reassembly

Syntax 
reassembly [wait-msecs]
no reassembly
Context 
config>service>ies>if>sap>ip-tunnel
config>service>vprn>if>sap>ip-tunnel
Description 

This command configures the reassembly wait time.

4.14.2.12.1. IPsec Gateway Commands

ipsec-gw

Syntax 
ipsec-gw name
no ipsec-gw
Context 
config>service>ies>if>sap
config>service>vprn>if>sap
Description 

This command configures an IPsec gateway.

default-secure-service

Syntax 
default-secure-service service-id interface ip-int-name
no default-secure-service
Context 
config>service>ies>if>sap>ipsec-gateway
config>service>vprn>if>sap>ipsec-gateway
Description 

This command specifies a service ID or service name of the default security service used by this SAP IPsec gateway.

Parameters 
service-id—
Specifies a default secure service.
Values—
service-id: 1 to 2147483647 svc-name: An existing service name up to 64 characters.

 

default-tunnel-template

Syntax 
default-tunnel-template ipsec-template-identifier
no default-tunnel-template
Context 
config>service>ies>if>sap>ipsec-gateway
config>service>vprn>if>sap>ipsec-gateway
Description 

This command configures a default tunnel policy template for the gateway.

dhcp

Syntax 
[no] dhcp
Context 
config>service>ies>if>sap>ipsec-gateway
config>service>vprn>if>sap>ipsec-gateway
Description 

This command enters the context of DHCPv4-based address assignment for IKEv2 remote-access tunnels.

The system will act as a DHCPv4 client on behalf of the IPsec client, and also a relay agent to relay DHCPv4 packets to the DHCPv4 server.

DHCPv4 DORA(Discovery/Offer/Request/Ack) exchange happens during IKEv2 remote-access tunnel setup. And system also supports standard renew

In order to use this feature, the relay-proxy must be enabled on the corresponding interface (either the private interface or the interface that has the gi-address as the interface address.

Default 

no dhcp

dhcp6

Syntax 
[no] dhcp6
Context 
config>service>ies>if>sap>ipsec-gateway
config>service>vprn>if>sap>ipsec-gateway
Description 

This command enters the context of DHCPv6-based address assignment for IKEv2 remote-access tunnels.

The system will act as a DHCPv6 client on behalf of the IPsec client, and will also act as a relay agent to relay DHCPv6 packets to the DHCPv6 server.

DHCPv6 exchange happens during IKEv2 remote-access tunnel setup. The system also supports standard renew.

Default 

no dhcp6

gi-address

Syntax 
gi-address ip-address
no gi-address
Context 
config>service>ies>if>sap>ipsec-gw>dhcp
config>service>vprn>if>sap>ipsec-gw>dhcp
Description 

This command specifies the gateway IP address of the DHCPv4 packets sent by the system. IPsec DHCP Relay uses only the gi-address configuration found under the IPsec gateway and does not take into account gi-address with src-ip-addr configuration below other interfaces

Default 

no gi-address

Parameters 
ip-address—
Specifies the host IP address to be used for DHCP relay packets.

link-address

Syntax 
link-address ipv6-address
no link-address
Context 
config>service>ies>if>sap>ipsec-gw>dhcp6
config>service>vprn>if>sap>ipsec-gw>dhcp6
Description 

This command specifies the link address of the relayed DHCPv6 packets sent by the system.

Default 

no link-address

Parameters 
ipv6-address—
Specifies a global unicast IPv6 address.

send-release

Syntax 
[no] send-release
Context 
config>service>ies>if>sap>ipsec-gw>dhcp
config>service>ies>if>sap>ipsec-gw>dhcp6
config>service>vprn>if>sap>ipsec-gw>dhcp
config>service>vprn>if>sap>ipsec-gw>dhcp6
Description 

This command enables the system to send a DHCPv4/v6 release message when the IPsec tunnel is removed.

Default 

no send-release

server

Syntax 
server ip-address [ip-address...(up to 8 max)] router router-instance
server ip-address [ip-address...(up to 8 max)] service-name service-name
no server
Context 
config>service>ies>if>sap>ipsec-gw>dhcp
config>service>ies>if>sap>ipsec-gw>dhcp6
config>service>vprn>if>sap>ipsec-gw>dhcp
config>service>vprn>if>sap>ipsec-gw>dhcp6
Description 

This command specifies up to eight DHCPv4/v6 server addresses for DHCPv4/v6-based address assignment. If multiple server addresses are specified, the first advertised DHCPv4/v6 address received will be chosen.

Default 

no server

Parameters 
ip-address—
Specifies a unicast IPv4 address (for DHCPv4) or global unicast IPv6 address (for DHCPv6).
Values—

ipv4-address

a.b.c.d

ipv6-address

x:x:x:x:x:x:x:x (eight 16-bit pieces)

x:x:x:x:x:x:d.d.d.d

x - [0..FFFF]H

d - [0..255]D

 

router-instance—
Specifies the router instance ID used to reach the configured server address.

This variant of the command is only supported in 'classic' configuration-mode (configure system management-interface configuration-mode classic). The server ip-address service-name service-name variant can be used in all configuration modes.

Values—
{router-name | vprn-svc-id}

vprn-svc-id:

1 to 2147483647

router-name:

router-name is an alias for input only. The router-name gets replaced with an id automatically by SR OS in the configuration).

 

Default—
Base
service-name—
Specifies the name of the IES or VPRN service used to reach the configured server address, up to 64 characters.

ike-policy

Syntax 
ike-policy ike-policy-id
no ike-policy
Context 
config>service>ies>if>sap>ipsec-gw
config>service>vprn>if>sap>ipsec-gw
Description 

This command configures IKE policy for the gateway.

Parameters 
ike-policy-id—
Specifies the IKE policy ID.
Values—
1 to 2048

 

local-address-assignment

Syntax 
[no] local-address-assignment
Context 
config>service>ies>if>sap>ipsec-gw
config>service>vprn>if>sap>ipsec-gw
Description 

This command enables the context to configure local address assignments for the IPsec gateway.

ipv4

Syntax 
ipv4
Context 
config>service>ies>if>sap>ipsec-gw>lcl-addr-assign
config>service>vprn>if>sap>ipsec-gw>lcl-addr-assign
Description 

This command enables the context to configure IPv4 local address assignment parameters for the IPsec gateway.

address-source

Syntax 
address-source router router-instance dhcp-server local-dhcp4-svr-name pool dhcp4-server-pool [secondary-pool secondary-pool-name]
address-source service-name service-name dhcp-server local-dhcp4-svr-name pool dhcp4-server-pool [secondary-pool secondary-pool-name]
address-source router router-instance dhcp-server local-dhcp6-svr-name pool dhcp6-server-pool
address-source service-name service-name dhcp-server local-dhcp6-svr-name pool dhcp6-server-pool
no address-source
Context 
config>service>ies>if>sap>ipsec-gw>lcl-addr-assign>ipv4
config>service>vprn>if>sap>ipsec-gw>lcl-addr-assign>ipv4
config>service>ies>if>sap>ipsec-gw>lcl-addr-assign>ipv6
config>service>vprn>if>sap>ipsec-gw>lcl-addr-assign>ipv6
Description 

This command specifies the IPv4 or IPv6 source of the local address assignment for the IPsec gateway, which is a pool of a local DHCPv4 or DHCPv6 server. The system will assign an internal address to an IKEv2 remote-access client from the specified pool.

Beside the IP address, netmask and DNS server can also be returned. For IPv4, the netmask and DNS server address can be returned from the specified pool, as well as the IP address. The netmask returned to the IPsec client is derived from the subnet length from the subnet x.x.x.x/m create configuration, not the subnet-mask configuration in the subnet context. For IPv6, the DNS server address can be returned from the specified pool, as well as the IP address.

For IPv4, a secondary pool can be optionally specified. The secondary pool is used if the system is unable to assign addresses from the primary pool.

Default 

no address-source

Parameters 
router-instance—
Specifies the router instance ID where the local DHCPv4 or DHCPv6 server is defined, up to 32 characters.

This variant of the command is only supported in 'classic' configuration-mode (configure system management-interface configuration-mode classic). The address-source service-name service-name variant can be used in all configuration modes.

service-name—
Specifies the name of the service where the local DHCPv4 or DHCPv6 server is defined, up to 64 characters.
local-dhcp4-svr-name —
Specifies the name of the local DHCPv4 server, up to 32 characters.
local-dhcp6-svr-name —
Specifies the name of the local DHCv6 server, up to 32 characters.
dhcp4-server-pool—
The name of the pool defined in the specified DHCPv4 server, up to 32 characters.
dhcp6-server-pool—
The name of the pool defined in the specified DHCPv6 server, up to 32 characters.
secondary-pool-name—
The name of the secondary pool defined in the specified server, up to 32 characters.

ipv6

Syntax 
ipv6
Context 
config>service>ies>if>sap>ipsec-gw>lcl-addr-assign
config>service>vprn>if>sap>ipsec-gw>lcl-addr-assign
Description 

This command enables the context to configure IPv6 local address assignment parameters for the IPsec gateway.

local-gateway-address

Syntax 
local-gateway-address ip-address
no local-gateway-address
Context 
config>service>ies>if>sap>ipsec-gw
config>service>vprn>if>sap>ipsec-gw
Description 

This command configures local gateway address of the IPsec gateway.

Parameters 
ip-address —
Specifies a unicast IPv4 address or a global unicast IPv6 address. This address must be within the subnet of the public interface.

local-gateway-address

Syntax 
local-gateway-address ip-address peer ip-address delivery-service service-id
no local-gateway-address
Context 
config>service>vprn>if>sap>ipsec-tunnel
Description 

This command specifies the local gateway address used for the tunnel and the address of the remote security gateway at the other end of the tunnel remote peer IP address to use.

Default 

The base routing context is used if the delivery-router option is not specified.

Parameters 
ip-address—
IP address of the local end of the tunnel.
delivery-service service-id
The ID of the IES or VPRN (front-door) delivery service of this tunnel. Use this service-id to find the VPRN used for delivery.
Values—
service-id: 1 to 2147483648
svc-name: Specifies an existing service name up to 64 characters in length.

 

local-id

Syntax 
local-id type {ipv4 | fqdn | ipv6} [value value]
no local-id
Context 
config>service>ies>if>sap>ipsec-gw
config>service>vprn>if>sap>ipsec-gw
service>vprn>if>sap>ipsec-tun>dyn
Description 

This command specifies the local ID for 7750 SRs used for IDi or IDr for IKEv2 tunnels.

The no form of the command removes the parameters from the configuration.

Default 

Depends on local-auth-method like following:

  1. Psk:local tunnel ip address
  2. Cert-auth: subject of the local certificate
Parameters 
type—
Specifies the type of local ID payload, it could be IPv4 or IPv6 address/FQDN domain name, distinguish name of subject in X.509 certificate.
ipv4—
Specifies to use IPv4 as the local ID type, the default value is the local tunnel end-point address.
ipv6—
Specifies to use IPv6 as the local ID type, the default value is the local tunnel end-point address.
fqdn —
Specifies to use FQDN as the local ID type. The value must be configured.
value—
Specifies the data type as an enumerated integer that describes the local identifier type used for IDi or IDr for IKEv2 up to 255 characters.

max-history-esp-key-records

Syntax 
max-history-esp-key-records max-records
no max-history-esp-key-records
Context 
config>service>ies>if>sap>ipsec-gw
config>service>vprn>if>sap>ipsec-gw
config>service>vprn>if>sap>ipsec-tunnel
Description 

This command enables the system to keep records of CHILD-SA keys for the corresponding ipsec-gw or ipsec-tunnel. There is a system wide limit of maximum number of IPsec tunnels that save keys. If the number of tunnel exceeds that limit, the system will not save keys for the new tunnels. Check with Nokia support for details of the limitation.

This command is ignored if config>ipsec>no show-ipsec-keys is configured.

The no form of the command prevents the system from keeping records.

Default 

no max-history-esp-key-records

Parameters 
max-records—
Specifies the maximum number of recent records.
Values—
1 to 48

 

max-history-ike-key-records

Syntax 
max-history-ike-key-records max-records
no max-history-ike-key-records
Context 
config>service>ies>if>sap>ipsec-gw
config>service>vprn>if>sap>ipsec-gw
config>service>vprn>if>sap>ipsec-tunnel
Description 

This command enables system to keep records of IKE-SA keys for the corresponding ipsec-gw or ipsec-tunnel.

This command is ignored if config>ipsec>no show-ipsec-keys is configured. There is a system wide limit of maximum number of IPsec tunnels that save keys. If the number of tunnel exceeds that limit, the system will not save keys for the new tunnels. Check with Nokia support for details of the limitation.

The no form of the command prevents the system from keeping records.

Default 

no max-history-ike-key-records

Parameters 
max-records—
Specifies the maximum number of recent records.
Values—
1 to 3

 

pre-shared-key

Syntax 
pre-shared-key key [{hash | hash2}]
no pre-shared-key
Context 
config>service>ies>if>sap>ipsec-gw
config>service>vprn>if>sap>ipsec-gw
config>service>vprn>if>sap>ipsec-tunnel>dynamic-keying
Description 

This command configures the pre-shared key for the IPsec gateway or IPsec tunnel.

Default 

no pre-shared-key

Parameters 
key—
An ASCII string to use as the pre-shared key for dynamic keying. When the hash or hash2 parameters are not used, the key is a clear text key; otherwise, the key text is encrypted.
hash—
Specifies the key is entered in an encrypted form. If the hash or hash2 parameter is not used, the key is assumed to be in an unencrypted, clear text form. For security, all keys are stored in encrypted form in the configuration file with the hash or hash2 parameter specified
hash2—
Specifies the key is entered in a more complex encrypted form that involves more variables than the key value alone, meaning that the hash2 encrypted variable cannot be copied and pasted. If the hash or hash2 parameter is not used, the key is assumed to be in an unencrypted, clear text form. For security, all keys are stored in encrypted form in the configuration file with the hash or hash2 parameter specified.

radius-accounting-policy

Syntax 
radius-accounting-policy policy-name
no radius-accounting-policy
Context 
config>service>ies>if>sap>ipsec-gw
config>service>vprn>if>sap>ipsec-gw
Description 

This command specifies the radius-accounting-policy to be used for the IKEv2 remote-access tunnels terminated on the ipsec-gw. The radius-accounting-policy is defined under config>ipsec context.

Parameters 
policy-name—
Specifies the name of an existing radius-accounting-policy.

radius-authentication-policy

Syntax 
radius-authentication-policy name
no radius-authentication-policy
Context 
config>service>ies>if>sap>ipsec-gw
config>service>vprn>if>sap>ipsec-gw
Description 

This command specifies the policy to be used for the IKEv2 remote-access tunnels terminated on the IPsec GW. The radius-authentication-policy is defined under config>ipsec context.

Parameters 
name—
Specifies the name of an existing RADIUS authentication policy.

cert

Syntax 
cert
Context 
config>service>ies>if>sap>ipsec-gw
config>service>vprn>if>sap>ipsec-gw
Description 

This command configures cert parameters used by this SAP IPsec gateway.

status-verify

Syntax 
status-verify
Context 
config>service>ies>if>sap>ipsec-gw>cert
config>service>vprn>if>sap>ipsec-gw>cert
config>service>vprn>if>sap>ipsec-tun>dyn>cert
Description 

This command enables the context to configure certificate revocation status verification parameters.

default-result

Syntax 
default-result {revoked | good}
no default-result
Context 
config>service>ies>if>sap>ipsec-gw>cert>status-verify
config>service>vprn>if>sap>ipsec-gw>cert>status-verify
config>service>vprn>if>sap>ipsec-tun>dyn>cert>status-verify
Description 

This command specifies the default result when both the primary and secondary method failed to provide an answer.

Default 

default-result revoked

Parameters 
good—
Specifies that the certificate is considered as acceptable.
revoked—
Specifies that the certificate is considered as revoked.

primary

Syntax 
primary primary secondary secondary
Context 
config>service>ies>if>sap>ipsec-gw>cert>status-verify
config>service>vprn>if>sap>ipsec-gw>cert>status-verify
config>service>vprn>if>sap>ipsec-tun>dyn>cert>status-verify
Description 

This command specifies the primary and secondary methods that are used to verify the revocation status of the peer’s certificate; either CRL or OCSP.

OCSP or CRL uses the corresponding configuration in the CA profile of the issuer of the certificate in question.

Default 

primary crl

Parameters 
primary—
Specifies the primary method of Certificate Status Verification (CSV) that is used to verify the revocation status of the certificate of the peer.
Values—
ocsp — Specifies that the OCSP protocol should be used. The OCSP server is configured in the corresponding CA profile.
crl — Specifies that the local CRL file should be used. The CRL file is configured in the corresponding CA profile.

 

Default—
crl
secondary—
Specifies the secondary method of CSV that is used to verify revocation status of the certificate of the peer.
Values—
ocsp — Specifies that the OCSP protocol should be used. The OCSP server is configured in the corresponding CA profile.
crl — Specifies that the local CRL file should be used. The CRL file is configured in the corresponding CA profile.
none — Specifies that no secondary methods of CSV are used.

 

Default—
none

client-db

Syntax 
client-db name
client-db name fallback
client-db name no-fallback
no client-db
Context 
config>service>ies>if>sap>ipsec-gw
config>service>vprn>if>sap>ipsec-gw
Description 

This command enables the use of an IPsec client database. The system uses the specified client database to authenticate IKEv2 dynamic LAN-to-LAN tunnel.

Default 

no client-db

Parameters 
name—
Specifies the name of the client database
fallback—
Specifies whether or not this IPsec gateway falls back to the default authentication policy when the IPsec tunnel authentication request fails to match any clients in the IPsec database.
no-fallback—
Specifies that if the client database lookup fails to return a matched result, the system will fail the tunnel setup.

4.14.2.13. RADIUS Policy Commands

radius-accounting-policy

Syntax 
radius-accounting-policy name [create]
no radius-accounting-policy name
Context 
config>ipsec
Description 

This command specifies an existing RADIUS accounting policy to use to collect accounting statistics on this subscriber profile by RADIUS. This command is used independently of the collect-stats command.

Parameters 
name—
Specifies an existing RADIUS based accounting policy.

radius-authentication-policy

Syntax 
radius-authentication-policy name [create]
no radius-authentication-policy name
Context 
config>ipsec
Description 

This command specifies the radius authentication policy associated with this IPsec gateway.

include-radius-attribute

Syntax 
[no] include-radius-attribute
Context 
config>ipsec>rad-acct-plcy
config>ipsec>rad-auth-plcy
Description 

This command enables the context to specify the RADIUS parameters that the system should include into RADIUS authentication-request messages.

acct-stats

Syntax 
[no] acct-stats
Context 
config>ipsec>rad-acct-plcy>include
Description 

This command enables the system to include accounting attributes in RADIUS acct-stop and interim-update packets.

The no form of the command disables the system from including accounting attributes in RADIUS acct-stop and interim-update packets.

called-station-id

Syntax 
[no] called-station-id
Context 
config>ipsec>rad-acct-plcy>include
config>ipsec>rad-auth-plcy>include
Description 

This command includes called station ID attributes.

The no form of the command excludes called station ID attributes.

Default 

no called-station-id

calling-station-id

Syntax 
[no] calling-station-id
Context 
config>ipsec>rad-acct-plcy>include
config>ipsec>rad-auth-plcy>include
Description 

This command enables the inclusion of the calling-station-id attribute in RADIUS authentication requests and RADIUS accounting messages.

Default 

no calling-station-id

client-cert-subject-key-id

Syntax 
[no] client-cert-subject-key-id
Context 
config>ipsec>rad-auth-plcy>include
Description 

This command enables the inclusion of the Subject Key Identifier of the peer's certificate in the RADIUS Access-Request packet as VSA: Alc-Subject-Key-Identifier. Refer to the 7750 SR and VSR RADIUS Attributes Reference Guide for more information.

Default 

no client-cert-subject-key-id

framed-ip-addr

Syntax 
[no] framed-ip-addr
Context 
config>ipsec>rad-acct-plcy>include
Description 

This command enables the inclusion of the framed-ip-addr attribute.

Default 

no framed-ip-addr

framed-ipv6-prefix

Syntax 
[no] framed-ipv6-prefix
Context 
config>ipsec>rad-acct-plcy>include
Description 

This command enables the inclusion of the framed-ipv6-prefix attribute.

Default 

no framed-ip-addr

nas-identifier

Syntax 
[no] nas-identifier
Context 
config>ipsec>rad-acct-plcy>include
config>ipsec>rad-auth-plcy>include
Description 

This command enables the generation of the nas-identifier RADIUS attribute.

Default 

no nas-identifier

nas-ip-addr

Syntax 
[no] nas-ip-addr
Context 
config>ipsec>rad-acct-plcy>include
config>ipsec>rad-auth-plcy>include
Description 

This command enables the generation of the NAS IP address attribute.

Default 

no nas-ip-addr

nas-port-id

Syntax 
[no] nas-port-id
Context 
config>ipsec>rad-acct-plcy>include
config>ipsec>rad-auth-plcy>include
Description 

This command enables the generation of the nas-port-id RADIUS attribute. Optionally, the value of this attribute (the SAP-id) can be prefixed by a fixed string and suffixed by the circuit-id or the remote-id of the client connection. If a suffix is configured, but no corresponding data is available, the suffix used will be 0/0/0/0/0/0.

Default 

no nas-port-id

radius-server-policy

Syntax 
radius-server-policy radius-server-policy-name
no radius-server-policy
Context 
config>ipsec>rad-acct-plcy
config>ipsec>rad-auth-plcy
Description 

This command references an existing radius-server-policy (available under the config>aaa context) for use in subscriber management authentication and accounting.

When configured in an authentication-policy, following CLI commands are ignored in the policy to avoid conflicts:

  1. all commands in the radius-authentication-server context
  2. accept-authorization-change
  3. coa-script-policy
  4. accept-script-policy
  5. request-script-policy

When configured in a radius-accounting-policy, following CLI commands are ignored in the policy to avoid conflicts:

  1. all commands in the radius-accounting-server context
  2. acct-request-script-policy

The no form of the command removes the radius-server-policy reference from the configuration

Default 

no radius-server-policy

Parameters 
radius-server-policy-name—
Specifies the RADIUS server policy.

update-interval

Syntax 
update-interval minutes [jitter seconds]
no update-interval
Context 
config>ipsec>rad-acct-plcy
Description 

This command enables the system to send RADIUS interim-update packets for IKEv2 remote-access tunnels. The RADIUS attributes in the interim-update packet are the same as acct-start. The value of the Acct-status-type in the interim-update message is 3.

Default 

update-interval 10

Parameters 
minutes—
Specifies the interval in minutes.
Values—
5 to 259200

 

seconds—
Specifies the jitter as the number of seconds when the system sends each interim-update packet.
Values—
0 to 3600

 

password

Syntax 
password password [hash | hash2]
no password
Context 
config>ipsec>rad-auth-plcy
Description 

This command specifies the password that is used in the RADIUS access requests.

The no form of the command resets the password to its default of ALU and will be stored using hash/hash2 encryption.

Default 

no password

Parameters 
password—
Specifies a password string up to 64characters.
hash—
Specifies the key is entered in an encrypted form. If the hash or hash2 parameter is not used, the key is assumed to be in an unencrypted, clear text form. For security, all keys are stored in encrypted form in the configuration file with the hash or hash2 parameter specified
hash2—
Specifies the key is entered in a more complex encrypted form that involves more variables than the key value alone, meaning that the hash2 encrypted variable cannot be copied and pasted. If the hash or hash2 parameter is not used, the key is assumed to be in an unencrypted, clear text form. For security, all keys are stored in encrypted form in the configuration file with the hash or hash2 parameter specified.

4.14.2.14. CMPv2 Commands

pki

Syntax 
pki
Context 
config>system>security
Description 

This command enables the context to configure PKI related parameters.

ca-profile

Syntax 
ca-profile name [create]
no ca-profile name
Context 
config>system>security>pki
Description 

This command creates a new ca-profile or enters the configuration context of an existing ca-profile. Up to 128 ca-profiles can be created in the system. A shutdown of the ca-profile will not affect the current up and running ipsec-tunnel or ipsec-gw that is associated with the ca-profile. However, authentication afterwards will fail with a shutdown ca-profile.

Executing a no shutdown command in this context will cause the system to reload the configured cert-file and crl-file.

A ca-profile can be applied under the ipsec-tunnel or ipsec-gw configuration.

The no form of this command removes the name parameter from the configuration. A ca-profile cannot be removed until all the associated entities (ipsec-tunnel/gw) have been removed.

Parameters 
name—
Specifies the name of the ca-profile up to 32 characters.
create—
Keyword used to create a new ca-profile. The create keyword requirement can be enabled or disabled in the environment>create context.

certificate

Syntax 
certificate
Context 
admin
Description 

This command enables the context to configure X.509 certificate related operational parameters.

certificate-display-format

Syntax 
certificate-display-format {ascii | utf8}
Context 
config>system>security>pki
Description 

This command specifies the certificate subject display format.

Default 

certificate-display-format ascii

Parameters 
ascii—
Use ASCII encoding.
utf8—
Use utf8 encoding.

cmpv2

Syntax 
cmpv2
Context 
admin>certificate
config>system>security>pki>ca-profile
Description 

This command enables the context to configure CMPv2 parameters. Changes are not allowed when the CA profile is enabled (no shutdown).

accept-unprotected-errormsg

Syntax 
[no] accept-unprotected-errormsg
Context 
config>system>security>pki>ca-profile>cmpv2
Description 

This command enables the system to accept both protected and unprotected CMPv2 error message. Without this command, system will only accept protected error messages.

The no form of the command causes the system to only accept protected PKI confirmation message.

Default 

no accept-unprotected-errormsg

accept-unprotected-pkiconf

Syntax 
[no] accept-unprotected-pkiconf
Context 
config>system>security>pki>ca-profile>cmpv2
Description 

This command enables the system to accept both protected and unprotected CMPv2 PKI confirmation messages. Without this command, system will only accept protected PKI confirmation message.

The no form of the command causes the system to only accept protected PKI confirmation message.

Default 

no accept-unprotected-pkiconf

always-set-sender-for-ir

Syntax 
[no] always-set-sender-for-ir
Context 
config>system>security>pki>ca-profile>cmpv2
Description 

This command specifies to always set the sender field in CMPv2 header of all Initial Registration (IR) messages with the subject name. By default, the sender field is only set if an optional certificate is specified in the CMPv2 request.

Default 

no always-set-sender-for-ir

key-list

Syntax 
key-list
Context 
config>system>security>pki>ca-profile>cmpv2
Description 

This command enables the context to configure pre-shared key list parameters.

key

Syntax 
key password [hash | hash2] reference reference-number
no key reference reference-number
Context 
config>system>security>pki>ca-profile>cmpv2>key-list
Description 

This command specifies a pre-shared key used for CMPv2 initial registration. Multiples of key commands are allowed to be configured under this context.

The password and reference-number is distributed by the CA via out-of-band means.

The configured password is stored in configuration file in an encrypted form by using SR OS hash2 algorithm.

The no form of the command removes the parameters from the configuration.

Parameters 
password—
Specifies a printable ASCII string, up to 64 characters.
hash—
Specifies the key is entered in an encrypted form. If the hash or hash2 parameter is not used, the key is assumed to be in an unencrypted, clear text form. For security, all keys are stored in encrypted form in the configuration file with the hash or hash2 parameter specified
hash2—
Specifies the key is entered in a more complex encrypted form that involves more variables than the key value alone, meaning that the hash2 encrypted variable cannot be copied and pasted. If the hash or hash2 parameter is not used, the key is assumed to be in an unencrypted, clear text form. For security, all keys are stored in encrypted form in the configuration file with the hash or hash2 parameter specified.
reference reference-number
Specifies a printable ASCII string, up to 64 characters in length.

url

Syntax 
url url-string [service-id service-id]
url url-string [service-name service-name]
no url
Context 
config>system>security>pki>ca-profile>cmpv2
Description 

This command specifies HTTP URL of the CMPv2 server. The URL must be unique across all configured ca-profiles.

The URL will be resolved by the DNS server configured (if configured) in the corresponding router context.

If the service-id is 0 or omitted, then system will try to resolve the FQDN via DNS server configured in bof.cfg. After resolution, the system will connect to the address in management routing instance first, then base routing instance.

If the service is VPRN, then the system only allows HTTP ports 80 and 8080.

Default 

no url

Parameters 
url-string—
Specifies the HTTP URL of the CMPv2 server up to 180 characters.
service-id service-id
Specifies the service instance that used to reach CMPv2 server.
Values—
Service ID: 1 to 2147483647
base-router: 0

 

revocation-check

Syntax 
revocation-check {crl | crl-optional}
Context 
config>system>security>pki>ca-profile
Description 

This command specifies the revocation method system used to check the revocation status of certificate issued by the CA, the default value is crl, which will use CRL. But if it is crl-optional, then it means when the user disables the ca-profile, then the system will try to load the configured CRL (specified by the crl-file command). However, if the system fails to load it for following reasons, then the system still brings the ca-profile oper-up, but leaves the CRL as non-exist.

  1. CRL file does not exist
  2. CRL is not properly encoded - maybe due to interrupted file transfer
  3. CRL does not match cert
  4. Wrong CRL version
  5. CRL expired

If the system needs to use the CRL of a specific ca-profile to check the revocation status of an end-entity cert, and the CRL is non-existent due to the above reasons, then the system will treat it as being unable to get an answer from CRL and fall back to the next status-verify method or default-result.

If the system needs to check the revocation of a CA cert in cert chain, and if the CRL is non-existent due to the above reasons, then the system will skip checking the revocation status of the CA cert. For example, if CA1 is issued by CA2, if CA2’s revocation-check is crl-optional and the CA2’s CRL is non-existent, then the system will not check CA1 cert’s revocation status and consider it as “good”.

Note:

Users must shutdown the ca-profile to change the revocation-check configuration.

Default 

revocation-check crl

Parameters 
crl—
Specifies to use the configured CRL.
crl-optional—
Specifies that the CRL is optional.

http-response-timeout

Syntax 
http-response-timeout timeout
no http-response-timeout
Context 
config>system>security>pki>ca-profile>cmpv2
Description 

This command specifies the timeout value for HTTP response that is used by CMPv2.

The no form of the command reverts to the default.

Default 

http-response-timeout 30

Parameters 
timeout—
Specifies the HTTP response timeout, in seconds.
Values—
1 to 3600

 

http-version

Syntax 
http-version [1.0 | 1.1]
Context 
config>system>security>pki>ca-profile>cmpv2
Description 

This command configures the HTTP version for CMPv2 messages.

Default 

http-version 1.1

response-signing-cert

Syntax 
response-signing-cert filename
no response-signing-cert
Context 
config>system>security>pki>ca-profile>cmpv2
Description 

This command specifies a imported certificate that is used to verify the CMP response message if they are protected by signature. If this command is not configured, then CA’s certificate will be used.

Default 

no response-signing-cert

Parameters 
filename—
Specifies the filename of the imported certificate.

same-recipnonce-for-pollreq

Syntax 
[no] same-recipnonce-for-pollreq
Context 
config>system>security>pki>ca-profile>cmpv2
Description 

This command enables the system to use same recipNonce as the last CMPv2 response for poll request.

Default 

no same-recipnonce-for-pollreq

cert-request

Syntax 
cert-request ca ca-profile-name current-key key-filename current-cert cert-filename [hash-alg hash-algorithm] newkey key-filename subject-dn subject-dn [domain-name domain-names] [ip-addr ip-address | ipv6-address] save-as save-path-of-result-cert
Context 
admin>certificate>cmpv2
Description 

This command requests an additional certificate after the system has obtained the initial certificate from the CA.

The request is authenticated by a signature signed by the current-key, along with the current-cert. The hash algorithm used for signature is depends on the key type:

  1. DSA key: SHA1
  2. RSA key: MD5/SHA1/SHA224 | SHA256 | SHA384 | SHA512, by default is SHA1

In some cases, the CA may not return a certificate immediately, due to reasons such as request processing need manual intervention. In such cases, the admin certificate cmpv2 poll command can be used to poll the status of the request.

Parameters 
ca ca-profile-name
Specifies a ca-profile name which includes CMP server information up to 32 characters.
current-key key-filename
Specifies corresponding certificate issued by the CA up to 95 characters.
current-cert cert-filename
Specifies the file name of an imported certificate that is attached to the certificate request up to 95 characters.
newkey key-filename
Specifies the file name of the imported key up to 95 characters.
hash-alg hash-algorithm
Specifies the hash algorithm for RSA key.
Values—
md5,sha1,sha224,sha256,sha384,sha512

 

subject-dn dn
Specifies the subject of the requesting certificate up to 256 characters.
Values—
attr1=val1,attr2=val2 where: attrN={C | ST | O | OU | CN}

 

save-as save-path-of-result-cert
Specifies the save full path name of saving the result certificate, up to 200 characters.
domain-name domain-names
Specifies FQDNs for SubjectAltName of the requesting certificate, separated by commas, up to 512 characters.
ip-addr ip-address | ipv6-address
Specifies an IPv4 or IPv6 address for SubjectAtName of the requesting certificate.

clear-request

Syntax 
clear-request ca ca-profile-name
Context 
admin>certificate>cmpv2
Description 

This command clears current pending CMPv2 requests toward the specified CA. If there are no pending requests, it will clear the saved result of prior request.

Parameters 
ca ca-profile-name
Specifies a ca-profile name up to 32 characters.

initial-registration

Syntax 
initial-registration ca ca-profile-name key-to-certify key-filename protection-alg {password password reference ref-number | signature [cert cert-file-name [send-chain [with-ca ca-profile-name]]] [protection-key key-file-name] [hash-alg {md5 | sha1 | sha224 | sha256 | sha384 | sha512}]} subject-dn dn [domain-name domain-names] [ip-addr ip-address | ipv6-address] save-as save-path-of-result-cert
Context 
admin>certificate>cmpv2
Description 

This command request initial certificate from CA by using CMPv2 initial registration procedure.

The ca parameter specifies a CA-profile which includes CMP server information.

The key-to-certify is an imported key file to be certified by the CA.

The protection-key is an imported key file used to for message protection if protection-alg is signature.

The request is authenticated either of following methods:

  1. A password and a reference number that pre-distributed by CA via out-of-band means.
  2. The specified password and reference number are not necessarily in the cmp-keylist configured in the corresponding CA-Profile
  3. A signature signed by the protection-key or key-to-certify, optionally along with the corresponding certificate. If the protection-key is not specified, system will use the key-to-certify for message protection. The hash algorithm used for signature is depends on key type:
  4. DSA key: SHA1
  5. RSA key: MD5/SHA1/SHA224 | SHA256 | SHA384 | SHA512, by default is SHA1

Optionally, the system could also send a certificate or a chain of certificates in extraCerts field. Certificate is specified by the “cert” parameter, it must include the public key of the key used for message protection.

Sending a chain is enabled by specify the send-chain parameter.

subject-dn specifies the subject of the requesting certificate.

save-as specifies full path name of saving the result certificate.

In some cases, CA may not return certificate immediately, due to reason like request processing need manual intervention. In such cases, the admin certificate cmpv2 poll command could be used to poll the status of the request. If key-list is not configured in the corresponding ca-profile, then the system will use the existing password to authenticate the CMPv2 packets from server if it is in password protection.

If key-list is configured in the corresponding ca-profile and server doesn't send SenderKID, then the system will use lexicographical first key in the key-list to authenticate the CMPv2 packets from server in case it is in password protection.

Parameters 
ca-profile-name
Specifies a ca-profile name which includes CMP server information up to 32 characters.
key-filename
Specifies the file name of the key to certify up to 95 characters.
password
Specifies an ASCII string up to 64 characters.
ref-number
Specifies the reference number for this CA initial authentication key up to 64 characters.
cert-file-name
specifies the certificate file up to 95 characters.
ca-profile-name
Specifies to send the chain.
key-file-name
Specifies the protection key associated with the action on the CA profile.
hash-algorithm
Specifies the hash algorithm for RSA key.
Values—
md5,sha1,sha224,sha256,sha384,sha512

 

dn
Specifies the subject of the requesting certificate up to 256 characters.
Values—
attr1 equals val1
attr2 equals val2 where: attrN equals {C | ST | O | OU | CN}

 

save-path-of-result-cert
Specifies the save full path name of saving the result certificate up to 200 characters.
domain-name domain-names
Specifies FQDNs for SubjectAltName of the requesting certificate, separated by commas, up to 512 characters.
ip-address | ipv6-address
Specifies an IPv4 or IPv6 address for SubjectAtName of the requesting certificate.

key-update

Syntax 
key-update ca ca-profile-name newkey key-filename oldkey key-filename oldcert cert-filename [hash-alg hash-algorithm] save-as save-path-of-result-cert
Context 
admin>certificate>cmpv2
Description 

This command requests a new certificate from the CA to update an existing certificate due to reasons such as key refresh or replacing compromised key.

In some cases, the CA may not return certificate immediately, due to reasons such as request processing need manual intervention. In such cases, the admin certificate cmpv2 poll command can be used to poll the status of the request.

Parameters 
ca-profile-name
Specifies a ca-profile name which includes CMP server information up to 32 characters.
key-filename
Specifies the key file of the requesting certificate up to 95 characters.
key-filename
Specifies the key to be replaced up to 95 characters.
cert-filename
Specifies the file name of an imported certificate to be replaced up to 95 characters.
hash-algorithm
Specifies the hash algorithm for RSA key.
Values—
md5,sha1,sha224,sha256,sha384,sha512

 

save-path-of-result-cert
Specifies the save full path name of saving the result certificate up to 200 characters.

poll

Syntax 
poll ca ca-profile-name
Context 
admin>certificate>cmpv2
Description 

This command polls the status of the pending CMPv2 request toward the specified CA.

If the response is ready, this command will resume the CMPv2 protocol exchange with server as the original command would do. The requests could be also still be pending as a result, then this command could be used again to poll the status.

SR OS allows only one pending CMP request per CA, which means no new request is allowed when a pending request is present.

Parameters 
ca-profile-name
Specifies a ca-profile name up to 32 characters.

show-request

Syntax 
show-request [ca ca-profile-name]
Context 
admin>certificate>cmpv2
Description 

This command displays current the CMPv2 pending request toward the specified CA. If there is no pending request, the last pending request is displayed including the status (success/fail/rejected) and the receive time of last CMPv2 message from server.

The following information is included in the output:

  1. Request type, original input parameter (password is not displayed), checkAfter and reason in of last PollRepContent, time of original command input.
Parameters 
ca-profile-name
Specifies a ca-profile name up to 32 characters. If not specified, the system will display pending requests of all ca-profiles.

4.14.2.15. Auto-Update Command Descriptions

file-transmission-profile

Syntax 
file-transmission-profile name [create]
no file-transmission-profile name
Context 
config>system
Description 

This command creates a new file transmission profile or enters the configuration context of an existing file-transmission-profile.

The file-transmission-profile context defines transport parameters for protocol such as HTTP, include routing instance, source address, timeout value, and so on.

Parameters 
name—
Specifies the file-transmission-profile name, up to 32 characters.

ipv4-source-address

Syntax 
ipv4-source-address ip-address
no ipv4-source-address
Context 
config>system>file-trans-prof
Description 

This command specifies the IPv4 source address used for transport protocol.

The no form of this command uses the default source address which typically is the address of the egress interface.

Default 

no ipv4-source-address

Parameters 
ip-address —
Specifies a unicast v4 address. This should be a local interface address.

ipv6-source-address

Syntax 
ipv6-source-address ipv6-address
no ipv6-source-address
Context 
config>system>file-trans-prof
Description 

This command specifies the IPv6 source address used for transport protocol.

The no form of this command uses the default source address which typically is the address of egress interface.

Default 

no ipv6-source-address

Parameters 
Ipv6-address—
Specifies a unicast v6 address. This should be a local interface address.

redirection

Syntax 
redirection level
no redirection
Context 
config>system>file-trans-prof
Description 

This command enables system to accept HTTP redirection response, along with the max level of redirection. The virtual router may send a new request to another server if the requested resources are not available (temporarily available to another server).

Default 

no redirection

Parameters 
level—
Specifies the maximum level of redirection of the file transmission profile max level of HTTP redirection.
Values—
1 to 8

 

retry

Syntax 
retry count
no retry
Context 
config>system>file-trans-prof
Description 

This command specifies the number of retries on transport protocol level.

When the virtual router does not receive any data from a server (e.g., FTP or HTTP server) after the configured timeout seconds, the router may repeat the request to the server. The number of retries specifies the maximum number of repeated requests.

The no form of this command disables the retry.

Default 

no retry

Parameters 
count—
Specifies the number of retries.
Values—
1 to 256

 

router

Syntax 
router router-instance
router service vprn-service-name
Context 
config>system>file-trans-prof
Description 

This command specifies the routing instance that the transport protocol uses.

Default 

router Base

Parameters 
router-instance—
Specifies the router instance on which the file transmission connection will be established.

This variant of the command is only supported in 'classic' configuration-mode (configure system management-interface configuration-mode classic). The router service vprn-service-name variant can be used in all configuration modes.

Values—
{router-name | vprn-svc-id}

router-name:

Base, management

router-name is an alias for input only. The router-name gets replaced with an id automatically by SR OS in the configuration).

vprn-svc-id:

1 to 2147483647

 

Default—
Base
service vprn-service-name—
Identifies the service, up to 64 characters.

timeout

Syntax 
timeout seconds
Context 
config>system>file-trans-prof
Description 

This command specifies timeout value in seconds for transport protocol. The timeout is the maximum waiting time to receive any data from the server (e.g., FTP or HTTP server).

Default 

timeout 60

Parameters 
seconds—
Specifies the connection timeout (in seconds) for the file transmission.
Values—
1 to 3600

 

auto-crl-update

Syntax 
auto-crl-update [create]
no auto-crl-update
Context 
config>system>security>pki>ca-prof
Description 

This command creates an auto CRL update configuration context with the create parameter, or enters the auto-crl-update configuration context without the create parameter.

This mechanism auto downloads a CRL file from a list of configured HTTP URLs either periodically or before existing CRL expires. If the downloaded CRL is more recent than the existing one, then the existing one will be replaced.

Note:

The configured URL must point to a DER encoded CRL file.

Parameters 
create—
Creates an auto CRL update for the ca-profile.

crl-urls

Syntax 
crl-urls
Context 
config>system>security>pki>ca-prof>auto-crl-update
Description 

This command enables the context to configure crl-urls parameters. The system allows up to eight URL entries to be configured and will try each URL in order and stop when a qualified CRL is successfully downloaded. A qualified CRL is a valid CRL signed by the CA and is more recent than the existing CRL.

If none of the configured URLs returns a qualified CRL, then:

  1. If the schedule-type is next-update-based, system will wait for configure retry-interval before it start from beginning of the list again.
  2. If the schedule-type is periodic, then system will wait till next periodic update time.

If the user wants to manually stop the download, shutting down of auto-crl-retrieval could be used to achieve this.

url-entry

Syntax 
url-entry entry-id [create]
no url-entry entry-id
Context 
config>system>security>pki>ca-prof>auto-crl-update>crl-urls
Description 

This command creates a new crl-url entry with the create parameter, or enters an existing url-entry configuration context without create parameter.

The no form of this command removes the specified entry.

Parameters 
entry-id—
Specifies a URL configured on this system.
Values—
1 to 8

 

create—
Creates an auto URL entry.

file-transmission-profile

Syntax 
file-transmission-profile profile-name
no file-transmission-profile
Context 
config>system>security>pki>ca-prof>auto-crl-update>crl-urls>url-entry
Description 

This command specifies the file-transmission-profile for the url-entry. When the system downloads a CRL from the configured URL in the url-entry it will use the transportation parameter configured in the file-transmission-profile. auto-crl-update supports Base/Management/VPRN routing instance. vpls-management is not supported. In case of VPRN, the HTTP server port can only be 80 or 8080.

The no form of the command removes the specified profile name.

Default 

no file-transmission-profile

Parameters 
profile-name—
Specifies the name of the file transmission profile to be matched up to 32 characters. The profile name is configured in the config>system>file-transmission-profile context.

url

Syntax 
url url
no url
Context 
config>system>security>pki>ca-prof>auto-crl-update>crl-urls> url-entry
Description 

This command specifies the HTTP URL of the CRL file for the url-entry. The system supports both IPv4 and IPv6 HTTP connections.

Note:

The URL must point to a DER encoded CRL.

Default 

no url

Parameters 
url—
Specifies the URL, which specifies the location, where an updated CRL can be downloaded from.

periodic-update-interval

Syntax 
periodic-update-interval [days days] [hrs hours] [min minutes] [sec seconds]
Context 
config>system>security>pki>ca-prof>auto-crl-update
Description 

This command specifies the interval for periodic updates. The minimal interval is 1 hour. The maximum interval is 366 days.

Default 

periodic-update-interval days 1

Parameters 
days days
Specifies the number of days for periodic updates.
Values—
0 to 366

 

hours
Specifies the number of hours for periodic updates.
Values—
0 to 23

 

minutes
Specifies the number of minutes for periodic updates.
Values—
0 to 59

 

seconds
Specifies the number of seconds for periodic updates.
Values—
0 to 59

 

retry-interval

Syntax 
retry-interval seconds
no retry-interval
Context 
config>system>security>pki>ca-prof>auto-crl-update
Description 

This command specifies the interval, in seconds, that the system waits before retrying the configured url-entry list when schedule-type is next-update-based and none of the URLs return a qualified CRL.

The no form of the command causes the system to retry immediately without waiting.

Default 

retry-interval 3600

Parameters 
seconds—
Specifies an interval, in seconds, before retrying to update the CRL.
Values—
1 to 31622400

 

pre-update-time

Syntax 
pre-update-time [days days] [hrs hours] [min minutes] [sec seconds]
Context 
config>system>security>pki>ca-prof>auto-crl-update
Description 

This command specifies the pre-download time for next-update-based update.

Default 

pre-update-time hrs 1

Parameters 
days
Specifies the time period, in days, prior to the next update time of the current CRL.
Values—
0 to 366

 

hours
Specifies the time period, in hours, prior to the next update time of the current CRL.
Values—
0 to 23

 

minutes
Specifies the time period, in minutes, prior to the next update time of the current CRL.
Values—
0 to 59

 

seconds
Specifies the time period, in seconds, prior to the next update time of the current CRL.
Values—
0 to 59

 

schedule-type

Syntax 
schedule-type schedule-type
Context 
config>system>security>pki>ca-prof>auto-crl-update
Description 

This command specifies the schedule type for auto CRL update. The system supports two types:

  1. periodic: — The system will download a CRL periodically at the interval configured via the periodic-update-interval command. For example, if the periodic-update-interval is 1 day, then the system will download a CRL every 1 day. The minimal periodic-update-interval is 1 hour.
  2. next-update-based — The system will download a CRL at the time = Next_Update_of_existing_CRL minus pre-update-time. For example, if the Next-Update of the existing CRL is 2015-06-30 06:00 and pre-update-time is 1 hour, then the system will start downloading at 2015-06-30, 05:00.
Default 

schedule-type next-update-based

Parameters 
schedule-type—
Specifies the type of time scheduler to update the CRL.
Values—
periodic, next-update-based

 

shutdown

Syntax 
[no] shutdown
Context 
config>system>security>pki>ca-prof>auto-crl-update
Description 

This command disables the auto CRL update.

The no form of this command enables an auto CRL update. Upon no shutdown, if the configured CRL file does not exist, is invalid or is expired or if the schedule-type is next-update-based and current time passed (Next-Update_of_existing_CRL - pre-update-time), then system will start downloading CRL right away.

Default 

shutdown

crl-update

Syntax 
crl-update ca ca-profile-name
Context 
admin>certificate
Description 

This command manually triggers the CRL update for the specified ca-profile.

Using this command requires shutting down the auto-crl-update.

Parameters 
ca-profile-name—
Specifies the name of the Certificate Authority profile.

4.14.2.16. IPsec Mastership Election Commands

The commands described in this section are supported on the 7750 SR only.

multi-chassis

Syntax 
multi-chassis
Context 
config>redundancy
Description 

This command enables the context to configure multi-chassis parameters.

peer

Syntax 
peer ip-address [create]
no peer ip-address
Context 
config>redundancy>multi-chassis
Description 

This command configures a multi-chassis redundancy peer.

Parameters 
ip-address—
Specifies the peer address.
create—
Mandatory keyword used when creating tunnel group in the ISA context. The create keyword requirement can be enabled or disabled in the environment>create context.

mc-ipsec

Syntax 
[no] mc-ipsec
Context 
config>redundancy>multi-chassis>peer
Description 

This command enables the context to configure multi-chassis peer parameters.

bfd-enable

Syntax 
[no] bfd-enable
Context 
config>redundancy>multi-chassis>peer>mc-ipsec
Description 

This command enables tracking a central BFD session, if the BFD session goes down, then system consider the peer is down and change the mc-ipsec status of configured tunnel-group accordingly.

The BFD session uses specified the loopback interface (in the specified service) address as the source address and uses specified dst-ip as the destination address. Other BFD parameters are configured with the bfd command on the specified interface.

Default 

no bfd-enable

discovery-interval

Syntax 
discovery-interval interval-secs [boot interval-secs]
no discovery-interval
Context 
config>redundancy>multi-chassis>peer>mc-ipsec
Description 

This command specifies the time interval of tunnel-group stays in the Discovery state. Interval-1 is used as discovery-interval when a new tunnel-group is added to multi-chassis redundancy (mp-ipsec); interval-2 is used as discovery-interval when system boot-up, it is optional, when it is not specified, the interval-1 will be used.

Default 

discovery-interval 300 boot 300

Parameters 
interval-secs—
Specifies the maximum duration, in seconds, of the discovery interval during which a newly activated multi- chassis IPsec tunnel-group will remain dormant while trying to contact its redundant peer. Groups held dormant in this manner will neither pass traffic nor negotiate security keys. This interval ends when either the redundant peer is contacted and a master election occurs, or when the maximum duration expires.
Values—
1 to 1800

 

interval-secs
Specifies the maximum duration of an interval immediately following system start up. When the normal discovery interval for a group would expire while the post-boot discovery interval is still active, then the group's discovery interval is extended until the post-boot discovery interval expires. This allows an extension to the normal discovery stage of groups following a chassis reboot, to account for the larger variance in routing
Values—
1 to 1800

 

hold-on-neighbor-failure

Syntax 
hold-on-neighbor-failure multiplier
no hold-on-neighbor-failure
Context 
config>redundancy>multi-chassis>peer>mc-ipsec
Description 

This command specifies the number of keep-alive failures before the peer is considered to be down.

The no form of the command reverts to the default.

Default 

hold-on-neighbor-failure 3

Parameters 
multiplier—
Specifies the hold time applied on the neighbor failure
Values—
2 to 25

 

keep-alive-interval

Syntax 
keep-alive-interval interval
no keep-alive-interval
Context 
config>redundancy>multi-chassis>peer>mc-ipsec
Description 

This command specifies the time interval of the mastership election protocol sending keep-alive packet.

The no form of the command reverts to the default.

Default 

keep-alive-interval 10

Parameters 
interval—
Specifies the keep alive interval in tenths of seconds.
Values—
5 to 500

 

tunnel-group

Syntax 
tunnel-group tunnel-group-id [create]
no tunnel-group tunnel-group-id
Context 
config>redundancy>multi-chassis>peer>mc-ipsec
Description 

This command enables multi-chassis redundancy for specified tunnel-group; or enters an already configured tunnel-group context. The configured tunnel-group could failover independently.

The no form of the command removes the tunnel group ID from the configuration.

Parameters 
tunnel-group-id—
Specifies the tunnel-group identifier.
Values—
1 to 16

 

peer-group

Syntax 
peer-group tunnel-group-id
no peer-group
Context 
config>redundancy>multi-chassis>peer>mc-ipsec>tunnel-group
Description 

This command specifies the corresponding tunnel-group id on peer node. The peer tunnel-group id does not necessary equals to local tunnel-group id.

The no form of the command removes the tunnel group ID from the configuration.

Parameters 
tunnel-group-id—
Specifies the tunnel-group identifier.
Values—
1 to 16

 

priority

Syntax 
priority priority
no priority
Context 
config>redundancy>multi-chassis>peer>mc-ipsec>tunnel-group
Description 

This command specifies the local priority of the tunnel-group, this is used to elect master, higher number win. If priority are same, then the peer has more active ISA win; and priority and the number of active ISA are same, then the peer with higher IP address win.

The no form of the command removes the priority value from the configuration.

Default 

priority 100

Parameters 
priority—
Specifies the priority of this tunnel-group.
Values—
0 to 255

 

state

Syntax 
state state
no state
Context 
config>router>policy-options>policy-statement>entry>from
Description 

This command will configure a match criteria on the state attribute. The state attribute carries the state of an SRRP instance and it can be applied to:

  1. subscriber-interface routes
  2. subscriber-management routes (/32 IPv4 and IPv6 PD wan-host)
  3. managed-routes (applicable only to IPv4).

Based on the state attribute of the route we can manipulate the route advertisement into the network.

We can enable or disable (in case there is no SRRP running) tracking of SRRP state by routes.

This is done on a per subscriber-interface route basis, where a subscriber-interface route is tracking a single SRRP instance state (SRRP instance might be in a Fate Sharing Group).

For subscriber-management and managed-routes, tracking is enabled per group interface under which SRRP is enabled.

Parameters 
state—
The state attribute.
Values—
srrp-master, srrp-non-master, ipsec-master-with-peer, ipsec-non-master, ipsec-master-without-peer

srrp-master

Track routes with the state attribute carrying srrp-master state

srrp-non-master

Track routes with the state attribute carrying srrp-non-master state.

ipsec-master-with-peer

Track routes with the state attribute carrying ipsec-master-with-peer state.

ipsec-non-master

Track routes with the state attribute carrying ipsec-non-master state.

ipsec-master-without-peer

Track routes with the state attribute carrying ipsec-master-without-peer state.

 

tunnel-group

Syntax 
tunnel-group tunnel-group-id sync-tag tag-name [create]
no tunnel-group tunnel-group-id
Context 
config>redundancy>multi-chassis>peer>sync
Description 

This command enables multi-chassis synchronization of IPsec states of specified tunnel-groups with a peer. The sync-tag parameter is used to match corresponding tunnel-group on both peers. IPsec states will be synchronized between tunnel-groups with same sync-tag.

Parameters 
tunnel-group-id—
Specifies the ID of the tunnel group.
tag-name—
Specifies the name of the sync-tag.

ipsec

Syntax 
[no] ipsec
Context 
config>redundancy>multi-chassis>peer>sync
Description 

This command enables multi-chassis synchronization of IPsec states on system level.

Default 

no ipsec

4.14.2.17. Show Commands

cert-profile

Syntax 
cert-profile name association
cert-profile [name]
cert-profile name entry [value]
Context 
show>ipsec
Description 

This command displays IPsec certificate profile information.

Parameters 
name—
Specifies an existing certificate profile name
association—
Displays information for which this IPsec certificate profile is associated
value
Displays information for the specified entry
Values—
1 to 8

 

Output 

The following is an example output of the show ipsec cert-profile command.

Sample Output
*A:Dut-A# show ipsec cert-profile cert "cert-1.der" 
==============================================================================
Certificate Profile Entry 
==============================================================================
Id Cert                     Key                      Status Flags
------------------------------------------------------------------------------
1  cert-1.der               key-1.der                
==============================================================================
*A:Dut-A# 
 
 
*A:Dut-A# show ipsec cert-profile "cert-1.der" entry 1
===============================================================================
IPsec Certificate Profile: cert-1.der Entry: 1 Detail
===============================================================================
Cert File        : cert-1.der
Key File         : key-1.der
Status Flags     : (Not Specified)
Comp Chain       : complete             
 
Compute Chain CA Profiles
-------------------------------------------------------------------------------
CA10
CA9
CA8
CA7
CA6
===============================================================================
*A:Dut-A# 

certificate

Syntax 
certificate filename association
Context 
show
show>ipsec
Description 

This command displays certificate-related information.

Parameters 
filename—
Specifies the certificate file name.
association—
Displays information for which this IPsec certificate is associated.
Output 

The following is an example output of the show certificate command.

Sample Output
*A:Dut-B# show certificate ca-profile   
-------------------------------------------------------------------------------
Max Cert Chain Depth: 7 (default)
-------------------------------------------------------------------------------
Certificate Display Format: 1 ASCII
===============================================================================
CA Profile
===============================================================================
CA Profile        Admin Oper  Cert File                CRL File
                  State State                          
-------------------------------------------------------------------------------
CA0               up    up    CA1-00cert.der           CA1-00crl.der
CA1               up    up    CA1-01cert.der           CA1-01crl.der
CA2               up    up    CA1-02cert.der           CA1-02crl.der
CA3               up    up    CA1-03cert.der           CA1-03crl.der
CA4               up    up    CA1-04cert.der           CA1-04crl.der
CA5               up    up    rsa_sha512_1024_0cert.d* rsa_sha512_1024_0crl.der
CA6               up    up    rsa_sha512_1024_1cert.d* rsa_sha512_1024_1crl.der
CA7               up    up    rsa_sha512_1024_2cert.d* rsa_sha512_1024_2crl.der
CA8               up    up    rsa_sha512_1024_3cert.d* rsa_sha512_1024_3crl.der
CA9               up    up    rsa_sha512_1024_4cert.d* rsa_sha512_1024_4crl.der
CA10              up    up    rsa_sha512_1024_5cert.d* rsa_sha512_1024_5crl.der
CA11              up    up    rsa_sha384_1024_0cert.d* rsa_sha384_1024_0crl.der
CA12              up    up    rsa_sha384_1024_1cert.d* rsa_sha384_1024_1crl.der
CA13              up    up    rsa_sha384_1024_2cert.d* rsa_sha384_1024_2crl.der
CA14              up    up    rsa_sha384_1024_3cert.d* rsa_sha384_1024_3crl.der
CA15              up    up    rsa_sha384_1024_4cert.d* rsa_sha384_1024_4crl.der
CA16              up    up    rsa_sha384_1024_5cert.d* rsa_sha384_1024_5crl.der
CMPv2             up    up    rsaCMPv2cert.der         rsaCMPv2CRL.der
-------------------------------------------------------------------------------
Entries found: 18
===============================================================================
* indicates that the corresponding row element may have been truncated.
*A:Dut-B# 
 
 
*A:Dut-B# show ipsec certificate cert-1.der association 
===============================================================================
Associated Tunnels
===============================================================================
Tunnel                        SvcId       Sap                           Admin
-------------------------------------------------------------------------------
tun-1-s-cert-v2               3           tunnel-1.private:3            Up
tun-1-s-cert-MTA-v2           8           tunnel-1.private:7            Up
tun-1-s-cert-i_op-ss-v2       42          tunnel-1.private:10           Up
tun-1-s-cert-MTA-i_op-ss-v2   48          tunnel-1.private:11           Up
-------------------------------------------------------------------------------
IPsec Tunnels: 4
===============================================================================
*A:Dut-B# 
 
 

In the following example, the "cert-1.der" is the certificate-profile name, whereas above the cert-1.der is the actual file in use.

*A:Dut-B# show ipsec cert-profile association "cert-1.der" 
===============================================================================
IPsec tunnels using certificate profile
===============================================================================
SvcId      Type   SAP                          Tunnel
-------------------------------------------------------------------------------
3          vprn   tunnel-1.private:3           tun-1-s-cert-v2
8          vprn   tunnel-1.private:7           tun-1-s-cert-MTA-v2
42         vprn   tunnel-1.private:10          tun-1-s-cert-i_op-ss-v2
48         vprn   tunnel-1.private:11          tun-1-s-cert-MTA-i_op-ss-v2
===============================================================================
Number of tunnel entries: 4
===============================================================================
===============================================================================
IPsec gateways using certificate profile
===============================================================================
SvcId      Type   SAP                          Gateway
-------------------------------------------------------------------------------
1057       vprn   tunnel-1.public:18           d-cert-MTA-g1-1-v2
1092       vprn   tunnel-1.public:21           d-cert-i_op-ss-g1-1-v2
===============================================================================
Number of gateway entries: 2
===============================================================================
*A:Dut-B# 
 
 
show ipsec gateway tunnel 10.2.2.100:500 
===============================================================================
IPsec Remote Users Tunnel Detail
===============================================================================
IP Addr: 10.2.2.100:500, port: 500
-------------------------------------------------------------------------------
Service Id       : 300                  Sap Id           : tunnel-1.public:100
Address          : 10.2.2.100:500
Private If       : priv
Private Address  : 10.20.20.50
Private Service  : 400                  Template Id      : 1
Replay Window    : None                 Bi Direction SA  : true
Host MDA         : 1/2                  
Match TrustAnchor: labroot              
Last Oper Changed: 05/04/2016 17:36:20  
IKE IDI Type     : derAsn1Dn            
IKE IDI Value    : CN=Client-1
-------------------------------------------------------------------------------
Dynamic Keying Parameters
-------------------------------------------------------------------------------
Transform Id1    : 1                    Transform Id2    : None
Transform Id3    : None                 Transform Id4    : None
IPsec GW Name    : rw
Local GW Address : 172.16.100.1       
Ike Policy Id    : 1                    Ike Pol Auth     : cert
Pre Shared Key   : None
Cert Profile     : segw
Trust Anchor Prof: labroot              
Selected Cert    : segw-1.cert
Selected Key     : segw-1.key
Send Chain Prof  : None
Local Id Type    : none                 
Client Database
    Name         : (Not Specified)      
    Client ID    : None                 
Radius Acct Plcy : None                 
Radius Auth Plcy : None                 
TS-List          : <none>
Certificate Status Verify
-------------------------------------------------------------------------------
Primary          : crl                  Secondary        : none
Default Result   : good                 
DHCP
-------------------------------------------------------------------------------
Admin State      : Up                   Send Release     : true
Service          : 400                  
Gi-Address       : 10.20.20.1           
Server1-Address  : 10.9.9.9              
DHCPv4 Lease
-------------------------------------------------------------------------------
Private Address    : 10.20.20.50
Acquired           : 2016/05/04 17:36:19 UTC
Renew              : 2016/05/04 18:06:19 UTC
Rebind             : 2016/05/04 18:28:49 UTC
Valid Lifetime
    End            : 2016/05/04 18:36:19 UTC
    Total          : 3600 seconds
    Remaining      : 3585 seconds
Server             : 10.9.9.9
-------------------------------------------------------------------------------
ISAKMP-SA
-------------------------------------------------------------------------------
State            : Up                   
Established      : 05/04/2016 17:36:20  Lifetime         : 86400
Expires          : 05/05/2016 17:36:20  
ISAKMP Statistics
--------------------
Tx Packets       : 2                    Rx Packets       : 2
Tx Errors        : 0                    Rx Errors        : 0
Tx DPD           : 0                    Rx DPD           : 0
Tx DPD ACK       : 0                    Rx DPD ACK       : 0
DPD Timeouts     : 0                    Rx DPD Errors    : 0
-------------------------------------------------------------------------------
IPsec-SA : 1, Inbound (index 2)
-------------------------------------------------------------------------------
SPI              : 207232               
Auth Algorithm   : Sha1                 Encr Algorithm   : Aes128
Installed        : 05/04/2016 17:36:20  Lifetime         : 3600
Local Traffic Selectors:
10.9.9.9-10.9.9.9
    any protocol
Remote Traffic Selectors:
10.20.20.50-10.20.20.50
    any protocol
Aggregate Statistics
--------------------
Bytes Processed  : 0                    Packets Processed: 0
Crypto Errors    : 0                    Replay Errors    : 0
SA Errors        : 0                    Policy Errors    : 0
-------------------------------------------------------------------------------
IPsec-SA : 1, Outbound (index 1)      
-------------------------------------------------------------------------------
SPI              : 3433111520           
Auth Algorithm   : Sha1                 Encr Algorithm   : Aes128
Installed        : 05/04/2016 17:36:20  Lifetime         : 3600
Local Traffic Selectors:
10.9.9.9-10.9.9.9
    any protocol
Remote Traffic Selectors:
10.20.20.50-10.20.20.50
    any protocol
Aggregate Statistics
--------------------
Bytes Processed  : 0                    Packets Processed: 0
Crypto Errors    : 0                    Replay Errors    : 0
SA Errors        : 0                    Policy Errors    : 0
===============================================================================
Fragmentation Statistics
===============================================================================
Encapsulation Overhead                 : 73
Pre-Encapsulation
    Fragmentation Count                : 0
    Last Fragmented Packet Size        : 0
Post-Encapsulation                    
    Fragmentation Count                : 0
    Last Fragmented Packet Size        : 0
===============================================================================
===============================================================================

client-db

Syntax 
client-db
client-db db-name association
client-db db-name client client-index
client-db db-name
Context 
show>ipsec
Description 

This commands displays information for client databases. Using this command without any parameters will list all configured client database.

Parameters 
db-name—
Species to list all IPsec gateways that use the specified client database.
association—
Displays information for which this client database is associated.
client client-index
Specifies the client index or client name of client entry in the client database.
Output 

The following is an example output of the show client-db command.

Sample Output
show ipsec client-db     
===============================================================================
IPsec Client Database
===============================================================================
Name                                Admin State   Match List
-------------------------------------------------------------------------------
test                                Up            idi peer-ip-prefix 
-------------------------------------------------------------------------------
No. of entries: 1
===============================================================================
show ipsec client-db "test" 
===============================================================================
IPsec Client Database "test"
===============================================================================
Description: (Not Specified)
Match List : idi peer-ip-prefix 
Admin State: Up
-------------------------------------------------------------------------------
Database Client List
-------------------------------------------------------------------------------
Index     Name                                    Admin State
-------------------------------------------------------------------------------
1         client-1                                Up
2         client-2                                Up
-------------------------------------------------------------------------------
No. of entries: 2
-------------------------------------------------------------------------------
===============================================================================

gateway

Syntax 
gateway name name
gateway [name name] tunnel [private-address-type private-address-type]
gateway [service service-id]
gateway tunnel [ip-address:port]
gateway name name tunnel ip-address:port
gateway name name tunnel
gateway [name name] tunnel state state
gateway [name name] tunnel idi-value idi-prefix
gateway tunnel count
gateway tunnel [private-address-type private-address-type]
Context 
show>ipsec
Description 

This command displays IPsec gateway information.

Parameters 
name
Specifies an IPsec gateway name.
service-id
Specifies the service ID of the default security service used by the IPsec gateway.
Values—
1 to 214748364 svc-name: Up to 64 characters maximum

 

ip-address:port
Displays the IP address and UDP port of the SAP IPsec gateway to the tunnel.
Values—
0 to 65535

 

state
Specifies the state of the tunnel.
Values—
up, down

 

idi-prefix
Displays a string as an IDi prefix. With this parameter, the system lists all the peers with IDi that has specified prefixes.
count—
Displays the number of IPsec gateway tunnels with the ike-policy>authmethod command set to psk.
Output 

The following is an example output of the show ipsec gateway command.

Sample Output
show ipsec gateway tunnel 10.2.2.100:500 
===============================================================================
IPsec Remote Users Tunnel Detail
===============================================================================
IP Addr: 10.2.2.100:500, port: 500
-------------------------------------------------------------------------------
Service Id       : 300                  Sap Id           : tunnel-1.public:100
Address          : 10.2.2.100:500
Private If       : priv
Private Address  : 10.20.20.50
Private Service  : 400                  Template Id      : 1
Replay Window    : None                 Bi Direction SA  : true
Host MDA         : 1/2                  
Match TrustAnchor: labroot              
Last Oper Changed: 05/04/2016 17:36:20  
IKE IDI Type     : derAsn1Dn            
IKE IDI Value    : CN=Client-1
-------------------------------------------------------------------------------
Dynamic Keying Parameters
-------------------------------------------------------------------------------
Transform Id1    : 1                    Transform Id2    : None
Transform Id3    : None                 Transform Id4    : None
IPsec GW Name    : rw
Local GW Address : 172.16.100.1       
Ike Policy Id    : 1                    Ike Pol Auth     : cert
Pre Shared Key   : None
Cert Profile     : segw
Trust Anchor Prof: labroot              
Selected Cert    : segw-1.cert
Selected Key     : segw-1.key
Send Chain Prof  : None
Local Id Type    : none                 
Client Database
    Name         : (Not Specified)      
    Client ID    : None                 
Radius Acct Plcy : None                 
Radius Auth Plcy : None                 
TS-List          : <none>
Certificate Status Verify
-------------------------------------------------------------------------------
Primary          : crl                  Secondary        : none
Default Result   : good                 
DHCP
-------------------------------------------------------------------------------
Admin State      : Up                   Send Release     : true
Service          : 400                  
Gi-Address       : 10.20.20.1           
Server1-Address  : 10.9.9.9             
DHCPv4 Lease
-------------------------------------------------------------------------------
Private Address    : 10.20.20.50
Acquired           : 2016/05/04 17:36:19 UTC
Renew              : 2016/05/04 18:06:19 UTC
Rebind             : 2016/05/04 18:28:49 UTC
Valid Lifetime
    End            : 2016/05/04 18:36:19 UTC
    Total          : 3600 seconds
    Remaining      : 3585 seconds
Server             : 10.9.9.9
-------------------------------------------------------------------------------
ISAKMP-SA
-------------------------------------------------------------------------------
State            : Up                   
Established      : 05/04/2016 17:36:20  Lifetime         : 86400
Expires          : 05/05/2016 17:36:20  
ISAKMP Statistics
--------------------
Tx Packets       : 2                    Rx Packets       : 2
Tx Errors        : 0                    Rx Errors        : 0
Tx DPD           : 0                    Rx DPD           : 0
Tx DPD ACK       : 0                    Rx DPD ACK       : 0
DPD Timeouts     : 0                    Rx DPD Errors    : 0
-------------------------------------------------------------------------------
IPsec-SA : 1, Inbound (index 2)
-------------------------------------------------------------------------------
SPI              : 207232               
Auth Algorithm   : Sha1                 Encr Algorithm   : Aes128
Installed        : 05/04/2016 17:36:20  Lifetime         : 3600
Local Traffic Selectors:
10.9.9.9-10.9.9.9
    any protocol
Remote Traffic Selectors:
10.20.20.50-10.20.20.50
    any protocol
Aggregate Statistics
--------------------
Bytes Processed  : 0                    Packets Processed: 0
Crypto Errors    : 0                    Replay Errors    : 0
SA Errors        : 0                    Policy Errors    : 0
-------------------------------------------------------------------------------
IPsec-SA : 1, Outbound (index 1)      
-------------------------------------------------------------------------------
SPI              : 3433111520           
Auth Algorithm   : Sha1                 Encr Algorithm   : Aes128
Installed        : 05/04/2016 17:36:20  Lifetime         : 3600
Local Traffic Selectors:
10.9.9.9-10.9.9.9
    any protocol
Remote Traffic Selectors:
10.20.20.50-10.20.20.50
    any protocol
Aggregate Statistics
--------------------
Bytes Processed  : 0                    Packets Processed: 0
Crypto Errors    : 0                    Replay Errors    : 0
SA Errors        : 0                    Policy Errors    : 0
===============================================================================
Fragmentation Statistics
===============================================================================
Encapsulation Overhead                 : 73
Pre-Encapsulation
    Fragmentation Count                : 0
    Last Fragmented Packet Size        : 0
Post-Encapsulation                    
    Fragmentation Count                : 0
    Last Fragmented Packet Size        : 0
===============================================================================
 
A:vsim-2# show ipsec gateway name "rw" tunnel 10.1.1.100 
===============================================================================
IPsec Remote Users Tunnel Detail
===============================================================================
-------------------------------------------------------------------------------
IP Addr: 10.1.1.100, port: 500
-------------------------------------------------------------------------------
Service Id       : 300                  Sap Id           : tunnel-1.public:100
Address          : 10.1.1.100
Private If       : priv
Private Address  : 10.20.20.50
Private Service  : 400                  Template Id      : 1
Replay Window    : None                 Bi Direction SA  : true
Host MDA         : 1/2                  
Match TrustAnchor: labroot              
Last Oper Changed: 12/14/2016 22:17:05  
IKE IDI Type     : derAsn1Dn            
IKE IDI Value    : CN=Client-1
TS List          : <none>
Pre-Shared Key   : <none>
IKE Policy       : (Not Specified)      
TCP MSS
    Public       : N/A                  
    Private      : 1200 octets          
-------------------------------------------------------------------------------
Dynamic Keying Parameters
-------------------------------------------------------------------------------
Transform Id1    : 1                    Transform Id2    : None
Transform Id3    : None                 Transform Id4    : None
IPsec GW Name    : rw
Local GW Address : 172.16.100.1
Ike Policy Id    : 1                    Ike Pol Auth     : cert
Cert Profile     : segw
Trust Anchor Prof: labroot              
Selected Cert    : segw-1.cert
Selected Key     : segw-1.key
Send Chain Prof  : None
Local Id Type    : none                 
Client Database
    Client Index : None                 
Radius Acct Plcy : None                 
Radius Auth Plcy : None                 
Certificate Status Verify
-------------------------------------------------------------------------------
Primary          : crl                  Secondary        : none
Default Result   : good                 
                                      
DHCP
-------------------------------------------------------------------------------
Admin State      : Up                   Send Release     : true
Service          : 400                  
Gi-Address       : 10.20.20.1           
Server1-Address  : 10.9.9.9             
DHCPv4 Lease
-------------------------------------------------------------------------------
Private Address    : 10.20.20.50
Acquired           : 2016/12/14 22:17:04 UTC
Renew              : 2016/12/14 22:47:04 UTC
Rebind             : 2016/12/14 23:09:34 UTC
Valid Lifetime
    End            : 2016/12/14 23:17:04 UTC
    Total          : 3600 seconds
    Remaining      : 3580 seconds
Server             : 10.9.9.9
-------------------------------------------------------------------------------
ISAKMP-SA
-------------------------------------------------------------------------------
State            : Up                   
Established      : 12/14/2016 22:17:04  Lifetime         : 86400
Expires          : 12/15/2016 22:17:04  
ISAKMP Statistics
--------------------
Tx Packets       : 2                    Rx Packets       : 2
Tx Errors        : 0                    Rx Errors        : 0
Tx DPD           : 0                    Rx DPD           : 0
Tx DPD ACK       : 0                    Rx DPD ACK       : 0
DPD Timeouts     : 0                    Rx DPD Errors    : 0
-------------------------------------------------------------------------------
IPsec-SA : 1, Inbound (index 2)
-------------------------------------------------------------------------------
SPI              : 322790               
Auth Algorithm   : Sha1                 Encr Algorithm   : Aes128
Installed        : 12/14/2016 22:17:05  Lifetime         : 3600
Local Traffic Selectors:
172.16.100.1-172.16.100.1
    any protocol
Remote Traffic Selectors:
10.20.20.50-10.20.20.50
    any protocol
Aggregate Statistics
--------------------
Bytes Processed  : 0                    Packets Processed: 0
Crypto Errors    : 0                    Replay Errors    : 0
SA Errors        : 0                    Policy Errors    : 0
-------------------------------------------------------------------------------
IPsec-SA : 1, Outbound (index 1)
-------------------------------------------------------------------------------
SPI              : 3462984686           
Auth Algorithm   : Sha1                 Encr Algorithm   : Aes128
Installed        : 12/14/2016 22:17:05  Lifetime         : 3600
Local Traffic Selectors:
172.16.100.1-172.16.100.1
    any protocol
Remote Traffic Selectors:
10.20.20.50-10.20.20.50
    any protocol
Aggregate Statistics
--------------------
Bytes Processed  : 0                    Packets Processed: 0
Crypto Errors    : 0                    Replay Errors    : 0
SA Errors        : 0                    Policy Errors    : 0
===============================================================================
Fragmentation Statistics
===============================================================================
Encapsulation Overhead                 : 73
Pre-Encapsulation
    Fragmentation Count                : 0
    Last Fragmented Packet Size        : 0
Post-Encapsulation
    Fragmentation Count                : 0
    Last Fragmented Packet Size        : 0
===============================================================================
===============================================================================

tunnel

Syntax 
tunnel [gre-tunnel-name]
Context 
show>gre
Description 

This command displays information about a particular GRE tunnel or all GRE tunnels.

Parameters 
gre-tunnel-name—
Specifies the name of a GRE tunnel.
Output 

Table 28 lists the information displayed for each GRE tunnel.

Table 28:  Show GRE Tunnel Output Fields 

Label

Description

TunnelName (Tunnel Name)

The name of the GRE tunnel.

SvcID (Service ID)

The service ID of the IES or VPRN service that owns the GRE tunnel.

SapId (Sap ID)

The ID of the private tunnel SAP that owns the GRE tunnel.

Description

The description for the GRE tunnel.

LocalAddress (Source Address)

The source address of the GRE tunnel (public/outer IP)

RemoteAddress (Remote Address)

The destination address of the GRE tunnel (public/outer IP)

Bkup RemAddr (Backup Address)

The backup destination address of the GRE tunnel (public/outer IP)

To (Target Address)

The remote address of the GRE tunnel (private/inner IP). This is the peer’s IP address to the GRE tunnel. This comes from the tunnel configuration.

DlvrySvcId (Delivery Service)

The service ID of the IES or VPRN service that handles the GRE encapsulated packets belonging to the tunnel.

DSCP

The forced DSCP code point in the outer IP healer of GRE encapsulated packets belonging to the tunnel.

Admn (Admin State)

Admin state of the tunnel (up/down).

Oper (Operational State)

Operational state of the tunnel (up/down).

Oper Rem Addr (Oper Remote Addr)

The destination address of the GRE tunnel (public/outer IP) that is currently being used.

Pkts Rx

Number of GRE packets received belonging to the tunnel.

Pkts Tx

Number of GRE packets transmitted belonging to the tunnel.

Bytes Rx

Number of bytes in received GRE packets associated with the tunnel.

Bytes Tx

Number of bytes in transmitted GRE packets associated with the tunnel.

Key Ignored Rx

Incremented every time a GRE packet is received with a GRE key field.

Too Big Tx

Incremented every time an IP packet with DF=1 is to be forwarded into the GRE tunnel and its size exceeds the interface IP MTU.

Seq Ignored Rx

Incremented every time a GRE packet is received with a sequence number.

Vers Unsup. Rx

Incremented every time a GRE packet is dropped because the GRE version is unsupported.

Invalid Chksum Rx

Incremented every time a GRE packet is dropped because the checksum is invalid.

Loops Rx

Incremented every time a GRE packet is dropped because the destination IP address of the un-encapsulated packet would cause it be re-encapsulated into the same tunnel.

Sample Output
dut-A# show gre tunnel 
===============================================================================
GRE Tunnels
===============================================================================
TunnelName                       LocalAddress     SvcId       Admn             
 SapId                            RemoteAddress    DlvrySvcId  Oper            
  To                               Bkup RemAddr     DSCP        Oper Rem Addr  
-------------------------------------------------------------------------------
toce2                            10.1.1.7         500         Up              
 tunnel-1.private:1               10.1.1.3         500         Up             
  20.1.1.2                         10.1.2.7         None        10.1.1.3      
toce2_backup                     10.1.2.3         502         Up              
 tunnel-1.private:3               10.1.1.3         502         Up             
  10.1.2.2                         10.0.0.0         None        10.1.1.3      
-------------------------------------------------------------------------------
GRE Tunnels: 2
===============================================================================
 
A:Dut-A# show gre tunnel "toce2"  
===============================================================================
GRE Tunnel Configuration Detail
===============================================================================
Service Id       : 500                  Sap Id           : tunnel-1.private:1
Tunnel Name      : toce2
Description      : None
Target Address   : 10.1.1.2             Delivery Service : 500
Admin State      : Up                   Oper State       : Up
Source Address   : 10.1.1.7             Oper Remote Addr : 10.1.1.3
Remote Address   : 10.1.1.3             Backup Address   : 10.1.2.7
DSCP             : None                 
Oper Flags       : None
 
===============================================================================
GRE Tunnel Statistics: toce2
===============================================================================
Errors Rx        : 0                    Errors Tx        : 0
Pkts Rx          : 165342804            Pkts Tx          : 605753463
Bytes Rx         : 84986201256          Bytes Tx         : 296819196870
Key Ignored Rx   : 0                    Too Big Tx       : 0
Seq Ignored Rx   : 0                    
Vers Unsup. Rx   : 0                    
Invalid Chksum Rx: 0                    
Loops Rx         : 0                    
===============================================================================
===============================================================================
 

ike-policy

Syntax 
ike-policy ike-policy-id
ike-policy
Context 
show>ipsec
Description 

This command displays

Parameters 
ike-policy-id—
Specifies the ID of an IKE policy entry.
Values—
1 to 2048

 

Output 

The following is an example output for the show ipsec ike-policy command.

Sample Output
*A:ALA-48# show ipsec ike-policy 10
===============================================================================
IPsec IKE policy Configuration Detail
===============================================================================
Policy Id        : 10                   IKE Mode         : main
DH Group         : Group2               Auth Method      : psk
PFS              : False                PFS DH Group     : Group2
Auth Algorithm   : Sha1                 Encr Algorithm   : Aes128
ISAKMP Lifetime  : 86400                IPsec Lifetime   : 3600
NAT Traversal    : Disabled
NAT-T Keep Alive : 0                    Behind NAT Only  : True
DPD              : Disabled
DPD Interval     : 30                   DPD Max Retries  : 3
Description      : (Not Specified)
===============================================================================
*A:ALA-48#

ike-transform

Syntax 
ike-transform [ike-transform-id]
Context 
show>ipsec
Description 

This command displays information for the specified IKE transform instance. Information for all IKE transform instances is displayed when an ike-transform-id is not specified.

Parameters 
ike-transform-id—
Specifies an existing IKE transform instance
Values—
1 to 4096

 

Output 

The following output is an example of IKE transform information.

Sample Output
Node# show ipsec ike-transform
===============================================================================
IKE Transforms
===============================================================================
ID      Diffie-Hellman    Authentication        Encryption       ISAKMP
        Group             Algorithm             Algorithm        Lifetime
-------------------------------------------------------------------------------
100     14                sha1                  aes128           86400
-------------------------------------------------------------------------------
No. of IKE Transforms: 1
===============================================================================

lockout

Syntax 
lockout router router-id local-gateway-address local-gateway-address mda mda
lockout router router-id local-gateway-address local-gateway-address remote ip-address[:port]
lockout router router-id mda mda
Context 
show>ipsec
Description 

This command displays the lockout status for the specified IPsec clients. If remote address information is not specified, the system will display a list of clients that have been locked out on the specified ISA, along with the IPsec gateway if local-gateway-address is specified.

Parameters 
router-id—
Specifies the ID of the router where the IPsec gateway is configured
local-gateway-address—
Specifies the IP address of the local IPsec gateway
mda—
Specifies the MDA ID of the ISA
ip-address—
Specifies the IP address of the remote client
port—
Specifies the port of the remote client
Output 

The following output is an example of lockout information.

Sample Output
show ipsec lockout router 300 local-gateway-address 172.16.100.1 remote
192.168.61.100:500 
===============================================================================
IPsec Lockout Client
===============================================================================
Lockout               : True
Router ID             : 300
Local Gateway Address : 172.16.100.1
Lockout Client Address: 192.168.61.100
Lockout Client Port   : 500
No. of Failed Attempts: 2
No. of Dropped Packets: 2
Remaining Block Time  : 289 seconds
===============================================================================

radius-accounting-policy

Syntax 
radius-accounting-policy [name]
Context 
show>ipsec
Description 

This command displays RADIUS accounting-policy related information.

Parameters 
name—
Specifies an existing RADIUS accounting policy.
Output 

The following is an example output for the show ipsec radius-accounting-policy command.

Sample Output
show ipsec radius-accounting-policy 
===============================================================================
Radius Accounting Policy
===============================================================================
Policy Name                Server Policy              Include Attribs   Upd Int
                                                                         Jitter
-------------------------------------------------------------------------------
rad-acct-policy-1                                     nasId nasPortId   20
                                                      framedIpAddr      
                                                                         10
===============================================================================
Number of entries: 1
===============================================================================
 
 
show ipsec radius-accounting-policy "rad-acct-policy-1" 
===============================================================================
IPsec Radius Accounting Policy Detail
===============================================================================
Name             : rad-acct-policy-1
Server Policy    : (Not Specified)
Include Attr     : nasId nasPortId framedIpAddr
Update Interval  : 20
Jitter           : 10 sec.
===============================================================================
 

radius-authentication-policy

Syntax 
radius-authentication-policy [name]
Context 
show>ipsec
Description 

This command displays IPsec RADIUS authentication policy information.

Parameters 
name—
Specifies an existing RADIUS authentication policy.

security-policy

Syntax 
security-policy service service-id [security-policy-id security-policy-id]
security-policy
Context 
show>ipsec
Description 

This command displays

Parameters 
service-id—
Specifies the service-id of the tunnel delivery service.
Values—
1 to 214748364
svc-name: 64 char max

 

security-policy-id—
Specifies the IPsec security policy entry that this tunnel will use.
Values—
1 to 8192

 

Output 

The following is an example output for the show ipsec security-policy command.

Sample Output
*A:ALA-48>show>ipsec# security-policy 1
========================================================================
Security Policy Param Entries
========================================================================
SvcId      Security   Policy     LocalIp             RemoteIp
           PlcyId     ParamsId
------------------------------------------------------------------------
1          1          1          0.0.0.0/0           0.0.0.0/0
------------------------------------------------------------------------
No. of IPsec Security Policy Param Entries: 1
========================================================================
*A:ALA-48>show>ipsec#

service

Syntax 
service service-id
Context 
show>ipsec
Description 

This command displays service specific IPsec configuration.

Parameters 
service-id—
The VPRN service ID or service name.
Values—
service-id: 1 to 2147483647
svc-name: up to 64 characters maximum

 

Output 

The following is an example output for the service command.

Sample Output
SHOW>IPSEC# SERVICE 400 
===============================================================================
SERVICE-SPECIFIC IPSEC CONFIGURATIONS
===============================================================================
REVERSE ROUTE OVERRIDE: ENABLED
===============================================================================

static-sa

Syntax 
static-sa
static-sa name sa-name
static-sa spi spi
Context 
show>ipsec
Description 

This command displays IPsec static-SA information.

Parameters 
sa-name—
Specifies the SA name.
Values—
32 chars max

 

spi—
Specifies the spi.
Values—
256..16383

 

transform

Syntax 
transform [transform-id]
Context 
show>ipsec
Description 

This command displays information of the specified IPsec transform or lists all configured IKE transform information when the IKE transform ID is not specified.

Parameters 
transform-id—
Specifies an IPsec transform entry.
Values—
1 to 2048

 

Output 

The following is an example output for the show ipsec transform command.

Sample Output
NODE# show ipsec transform 
=============================================================================
IPSEC TRANSFORMS
=============================================================================
TRANSFORMID    ESPAUTH        ESPENCRYPTION   PFS         IPSEC
               ALGORITHM      ALGORITHM       DH GROUP    LIFETIME (SEC)
-----------------------------------------------------------------------------
1              SHA256         AES128          INHERIT     INHERIT
10             SHA256         AES256          14          20000
99             SHA1           AES192          15          30000
100            SHA1           AES128          INHERIT     INHERIT
-----------------------------------------------------------------------------
NO. OF IPSEC TRANSFORMS: 4
=============================================================================

trust-anchor-profile

Syntax 
trust-anchor-profile [trust-anchor-profile] association
trust-anchor-profile [trust-anchor-profile]
Context 
show>ipsec
Description 

This command displays trust anchor profile information.

Parameters 
trust-anchor-profile—
Specifies the trust anchor profile name up to 32 characters in length.
association—
Displays information for which this trust anchor profile is associated.
Output 

The following is an example output for the show ipsec trust-anchor-profile command.

Sample Output
*A:Dut-A#  show ipsec trust-anchor-profile 
==================================================================
Trust Anchor Profile Information
==================================================================
Name                             CA Profiles Down
------------------------------------------------------------------
CA0wCMPv2                        0
CA1wCMPv2                        0
CA2wCMPv2                        0
CA3wCMPv2                        0
CA4wCMPv2                        0
CA5wCMPv2                        0
CA6wCMPv2                        0
CA7wCMPv2                        0
CA8wCMPv2                        0
CA9wCMPv2                        0
CA10wCMPv2                       0
==================================================================
*A:Dut-A# 
 
 
 
*A:Dut-A# show ipsec trust-anchor-profile
==================================================================
Trust Anchor CA-profile List 
==================================================================
CA Profile                       Admin/Oper State
------------------------------------------------------------------
CA6                              up/up
CMPv2                            up/up
==================================================================
*A:Dut-A# 

ts-list

Syntax 
ts-list [list-name]
ts-list list-name association
ts-list list-name local-entry [1 to 32]
ts-list list-name remote-entry [1 to 32]
ts-list list-name {local | remote}
Context 
show>ipsec
Description 

This command displays IPsec traffic-selector list (TS-list) information.

Entering this command without a parameter will list all configured TS-lists.

Entering this command with the association parameter will list all IPsec gateways that use the specified TS-list.

Entering this command with the local or local-entry parameter will list all or specified local entries of the specified TS-list.

Entering this command with the remote or remote-entry parameter will list all or specified remote entries of the specified TS-list.

Parameters 
list-name—
The traffic-selector list name
association—
Displays all associations of the TS-list
local-entry [1 to 32]—
The entry ID of a local entry
remote-entry [1 to 32]—
The entry ID of a remote entry
local—
Displays all local entries
remote—
Displays all remote entries
Output 

The following output is an example of TS-list information.

Sample Output
show ipsec ts-list
===============================================================================
Traffic Selector List
===============================================================================
TS-List
-------------------------------------------------------------------------------
fullts
===============================================================================
*A:vsim-02-cpm# show ipsec ts-list "fullts" 
===============================================================================
TS-List "fullts" Local Entries Information
===============================================================================
Entry ID           : 1
Status             : Invalid
Protocol ID        : Not Specified
Protocol Port Range: Not Specified
Prefix/Len         : 10.10.10.1/32
-------------------------------------------------------------------------------
Entry ID           : 2
Status             : Valid
Protocol ID        : tcp
Protocol Port Range: 80 - 80
Prefix/Len         : 10.10.10.2/32
-------------------------------------------------------------------------------
No. of entries: 2
===============================================================================
===============================================================================
TS-List "fullts" Remote Entries Information
===============================================================================
Entry ID           : 1
Status             : Valid
Protocol ID        : tcp              
Protocol Port Range: any
Prefix/Len         : 0.0.0.0/0
-------------------------------------------------------------------------------
No. of entries: 1
===============================================================================

tunnel

Syntax 
tunnel ipsec-tunnel-name
tunnel
tunnel count
tunnel state state
Context 
show>ipsec
Description 

This command displays IPsec tunnel information.

Parameters 
ipsec-tunnel-name—
Specifies the name of the tunnel up to 32 characters.
state—
Specifies one of up, down, or limited

tunnel-template

Syntax 
tunnel-template [ipsec-template-identifier]
tunnel-template ipsec-template-identifier association [all]
Context 
show>ipsec
Description 

This command displays IPsec tunnel template information.

Parameters 
ipsec template identifier—
Displays an existing IPsec tunnel template ID.
Values—
1 to 2048

 

Output 

The following is an example output for the show ipsec tunnel-template command.

Sample Output
*A:ALA-48>config>ipsec# show ipsec tunnel-template 1
===============================================================================
IPsec Tunnel Template
===============================================================================
Id      Trnsfrm1  Trnsfrm2  Trnsfrm3  Trnsfrm4  ReverseRoute      ReplayWnd
-------------------------------------------------------------------------------
1       1         none      none      none      useSecurityPolicy 128
-------------------------------------------------------------------------------
Number of templates: 1
===============================================================================
*A:ALA-48>config>ipsec#

mc-ipsec

Syntax 
mc-ipsec peer ip-address tunnel-group tunnel-group-id
mc-ipsec peer ip-address
Context 
show>redundancy>multi-chassis
Description 

This command displays the 7750 SR IPsec multi-chassis states. Optionally, only state of specified tunnel-group will be displayed.

Parameters 
ip-address—
Specifies the peer address.
tunnel-group-id—
Specifies the tunnel-group.
Output 

Table 29 describes show redundancy multi-chassis mc-ipsec output fields.

Table 29:  Show MC-IPsec Peer Output Fields 

Label

Description

Admin State

Displays the admin state of mc-ipsec.

Mastership/Master State

Displays the current MIMP state.

Protection Status

Displays nominal or notReady.

notReady means the system is not ready for a switchover. There could be major traffic impact if switchover happens in case of notReady.

nominal means the tunnel-group is in a better situation to switchover than notReady. However there still might be traffic impact.

Installed

Displays the number of tunnels that has been successfully installed on MS-ISA

Installing

Displays the number of tunnels that are being installed on MS-ISA.

Awaiting Config

Displays the number of synced tunnels that do not have corresponding configuration ready

Failed

Displays the number of tunnels that have been failed to installed on MS-ISA.

Sample Output
show redundancy multi-chassis mc-ipsec peer 10.2.2.2 
===============================================================================
Multi-Chassis MC-IPsec
===============================================================================
Peer Name       : (Not Specified)
Peer Addr       : 10.2.2.2             
Keep Alive Intvl: 1.0 secs            Hold on Nbr Fail     : 3
Discovery Intvl : 300 secs            Discovery Boot Intvl : 300 secs
BFD             : Disable             
Last update     : 09/27/2012 00:44:23 
 
======================================================================
Multi-Chassis IPsec Multi Active Tunnel-Group Table
======================================================================
ID             Peer Group     Priority  Admin State    Mastership
----------------------------------------------------------------------
1              2              100       Up             standby
----------------------------------------------------------------------
Multi Active Tunnel Group Entries found: 1
======================================================================
 
 
show redundancy multi-chassis mc-ipsec peer 10.2.2.2 tunnel-group 1 
===============================================================================
Multi-Chassis MC-IPsec Multi Active Tunnel-Group: 1
===============================================================================
Peer Ex Tnl Grp : 2                   Priority             : 100
Master State    : standby             Protection Status    : nominal
Admin State     : Up                  Oper State           : Up
===============================================================================
======================================================================
Multi-Chassis Tunnel Statistics
======================================================================
                              Static              Dynamic
----------------------------------------------------------------------
Installed                     1                   0
Installing                    0                   0
Awaiting Config               0                   0
Failed                        0                   0
======================================================================

statistics

Syntax 
statistics
Context 
show>isa
Description 

This command enables the context to display ISA statistical information.

ip-tunnel-stats

Syntax 
ip-tunnel-stats
Context 
show>isa>stats
Description 

This command enables the context to display IP tunnel statistical information. This includes statistics for non-IPsec tunnels supported on tunnel ISAs.

number-of-tunnels

Syntax 
number-of-tunnels tunnel-type tunnel-type isa mda
number-of-tunnels tunnel-type tunnel-type system
number-of-tunnels tunnel-type tunnel-type tunnel-group tunnel-group-id
Context 
show>isa>stats>ip-tunnel-stats
Description 

This command displays the number of tunnels that are operationally up for the specified tunnel and scope.

The following scope types are supported:

  1. per ISA
  2. per tunnel group
  3. per system
    Note that L2TPv2 does not have a per-ISA scope.

The system collects statistics every hour for the past 24 hours per wall clock. A current value is also included in the output.

Parameters 
tunnel-type—
Displays information about the tunnel type.
Values—
gre, ip-in-ip, l2tpv3

 

mda—
Displays information about the ISA ID.
Values—
slot/mda

 

system—
Displays information about the system.
tunnel-group-id—
Displays information about the tunnel group ID.
Values—
1 to 16

 

throughput

Syntax 
throughput tunnel-type tunnel-type system [history-stats-in-count count] [history-stats-in-min minutes] [current]
throughput tunnel-type tunnel-type type type system [history-stats-in-count count] [history-stats-in-min minutes] [current] [show-oid]
throughput tunnel-type tunnel-type isa mda [history-stats-in-count count] [history-stats-in-min minutes] [current]
throughput tunnel-type tunnel-type type type isa mda [history-stats-in-count count] [history-stats-in-min minutes] [current] [show-oid]
throughput tunnel-type tunnel-type tunnel-group tunnel-group-id [history-stats-in-count count] [history-stats-in-min minutes] [current]
throughput tunnel-type tunnel-type type type tunnel-group tunnel-group-id [history-stats-in-count count] [history-stats-in-min minutes] [current] [show-oid]
Context 
show>isa>stats>ip-tunnel-stats
Description 

This command displays throughput statistics for the specified tunnel types and scope.

The following scopes are supported:

  1. per ISA
  2. per tunnel group
  3. per system

The statistics include the following information:

  1. total packet per second (encapsulated and decapsulated)
  2. encapsulated packets per second
  3. decapsulated packets per second
  4. total bits per second (encapsulated and decapsulated) in Mibits/s
  5. encapsulated bits per second in Mibits/s
  6. decapsulated bits per second in Mibits/s

Syntax notes:

  1. 1 Mibits/s equals 220 bit/s
  2. The bits per second counter is an integer which is a rounded down value from the measured value.

The system collects stats every 10 minutes for last the 24 hour per the wall clock. A current value is also included in the output. The value is an average derived value of 10 minutes. The start time indicates the starting timestamp of measurement. The sampling duration indicates the duration of measurement.

Parameters 
tunnel-type—
Displays the type of tunnel.
Values—
gre, ip-in-ip, l2tpv3

 

mda—
Displays the ISA ID.
Values—
slot/mda

 

tunnel-group-id—
Displays the ID of the tunnel group.
Values—
1 to 16

 

type—
Displays the type of breakdown counter.
Values—
bidir-pps, bidir-bps, encap-pps, encap-bps, decap-pps, decap-bps

 

count—
Displays the number historical values to be included in the output.
Values—
1 to 24

 

minutes—
Displays the number of minutes of historical values to be included in output.
Values—
1 to 1440

 

current—
Displays only the current values.
show-oid—
Specifies to include the SNMP object identifier (OID) and the instance ID for the latest historical value in the output.
Output 

The following is an example output of the show isa statistics throughput ip-tunnel-stats command.

Sample Output
show>isa>stats>ip-tunnel-stats# throughput tunnel-type gre tunnel-group 1 
===============================================================================
STATISTICS FOR ISA TUNNEL GROUP 1
===============================================================================
INDEX        VALUE                     START TIME          SAMPLING DURATION
-------------------------------------------------------------------------------
ENCAPSULATED GRE TUNNEL THROUGHPUT (PKTS/SEC)
1 (CURRENT)  62                        2017/05/22 21:50:00 MIN 6 SEC 24 
2            62                        2017/05/22 21:40:00 MIN 10 
3            62                        2017/05/22 21:30:00 MIN 10 
4            62                        2017/05/22 21:20:00 MIN 10 
5            62                        2017/05/22 21:10:00 MIN 10 
6            87                        2017/05/22 21:00:00 MIN 10 
7            18                        2017/05/22 20:50:00 MIN 10 
8            0                         2017/05/22 20:40:00 MIN 10 
9            0                         2017/05/22 20:30:00 MIN 10 
10           0                         2017/05/22 20:20:00 MIN 10 
11           0                         2017/05/22 20:10:00 MIN 10 
12           0                         2017/05/22 20:00:00 MIN 10 
13           0                         2017/05/22 19:50:00 MIN 10 
14           0                         2017/05/22 19:40:00 MIN 10 
15           0                         2017/05/22 19:30:00 MIN 10 
16           0                         2017/05/22 19:20:00 MIN 10 
17           0                         2017/05/22 19:10:00 MIN 10 
18           0                         2017/05/22 19:00:00 MIN 10 
19           0                         2017/05/22 18:50:00 MIN 10 
20           0                         2017/05/22 18:40:00 MIN 10 
21           0                         2017/05/22 18:30:00 MIN 10 
22           0                         2017/05/22 18:20:00 MIN 10 
23           0                         2017/05/22 18:10:00 MIN 10 
24           0                         2017/05/22 18:00:00 MIN 10 
25           0                         2017/05/22 17:50:00 MIN 10 
26           0                         2017/05/22 17:45:12 MIN 4 SEC 49 
DECAPSULATED GRE TUNNEL THROUGHPUT (PKTS/SEC)
1 (CURRENT)  249                       2017/05/22 21:50:00 MIN 6 SEC 24 
2            249                       2017/05/22 21:40:00 MIN 10 
3            249                       2017/05/22 21:30:00 MIN 10 
4            249                       2017/05/22 21:20:00 MIN 10 
5            249                       2017/05/22 21:10:00 MIN 10 
6            145                       2017/05/22 21:00:00 MIN 10 
7            18                        2017/05/22 20:50:00 MIN 10 
8            0                         2017/05/22 20:40:00 MIN 10 
9            0                         2017/05/22 20:30:00 MIN 10 
10           0                         2017/05/22 20:20:00 MIN 10 
11           0                         2017/05/22 20:10:00 MIN 10 
12           0                         2017/05/22 20:00:00 MIN 10 
13           0                         2017/05/22 19:50:00 MIN 10 
14           0                         2017/05/22 19:40:00 MIN 10 
15           0                         2017/05/22 19:30:00 MIN 10 
16           0                         2017/05/22 19:20:00 MIN 10 
17           0                         2017/05/22 19:10:00 MIN 10 
18           0                         2017/05/22 19:00:00 MIN 10 
19           0                         2017/05/22 18:50:00 MIN 10 
20           0                         2017/05/22 18:40:00 MIN 10 
21           0                         2017/05/22 18:30:00 MIN 10 
22           0                         2017/05/22 18:20:00 MIN 10 
23           0                         2017/05/22 18:10:00 MIN 10 
24           0                         2017/05/22 18:00:00 MIN 10 
25           0                         2017/05/22 17:50:00 MIN 10 
26           0                         2017/05/22 17:45:12 MIN 4 SEC 49 
ENCAPSULATED AND DECAPSULATED GRE TUNNEL THROUGHPUT (PKTS/SEC)
1 (CURRENT)  312                       2017/05/22 21:50:00 MIN 6 SEC 24 
2            311                       2017/05/22 21:40:00 MIN 10 
3            311                       2017/05/22 21:30:00 MIN 10 
4            311                       2017/05/22 21:20:00 MIN 10 
5            311                       2017/05/22 21:10:00 MIN 10 
6            233                       2017/05/22 21:00:00 MIN 10 
7            37                        2017/05/22 20:50:00 MIN 10 
8            0                         2017/05/22 20:40:00 MIN 10 
9            0                         2017/05/22 20:30:00 MIN 10 
10           0                         2017/05/22 20:20:00 MIN 10 
11           0                         2017/05/22 20:10:00 MIN 10 
12           0                         2017/05/22 20:00:00 MIN 10 
13           0                         2017/05/22 19:50:00 MIN 10 
14           0                         2017/05/22 19:40:00 MIN 10 
15           0                         2017/05/22 19:30:00 MIN 10 
16           0                         2017/05/22 19:20:00 MIN 10 
17           0                         2017/05/22 19:10:00 MIN 10 
18           0                         2017/05/22 19:00:00 MIN 10 
19           0                         2017/05/22 18:50:00 MIN 10 
4            2                         2017/05/22 21:20:00 MIN 10 
5            2                         2017/05/22 21:10:00 MIN 10 
6            0                         2017/05/22 21:00:00 MIN 10 
7            0                         2017/05/22 20:50:00 MIN 10 
8            0                         2017/05/22 20:40:00 MIN 10 
9            0                         2017/05/22 20:30:00 MIN 10 
10           0                         2017/05/22 20:20:00 MIN 10 
11           0                         2017/05/22 20:10:00 MIN 10 
12           0                         2017/05/22 20:00:00 MIN 10 
13           0                         2017/05/22 19:50:00 MIN 10 
14           0                         2017/05/22 19:40:00 MIN 10 
15           0                         2017/05/22 19:30:00 MIN 10 
16           0                         2017/05/22 19:20:00 MIN 10 
17           0                         2017/05/22 19:10:00 MIN 10 
18           0                         2017/05/22 19:00:00 MIN 10 
19           0                         2017/05/22 18:50:00 MIN 10 
20           0                         2017/05/22 18:40:00 MIN 10 
21           0                         2017/05/22 18:30:00 MIN 10 
22           0                         2017/05/22 18:20:00 MIN 10 
23           0                         2017/05/22 18:10:00 MIN 10 
24           0                         2017/05/22 18:00:00 MIN 10 
25           0                         2017/05/22 17:50:00 MIN 10 
26           0                         2017/05/22 17:45:12 MIN 4 SEC 49 
DECAPSULATED GRE TUNNEL THROUGHPUT (MIBIT/SEC)
1 (CURRENT)  2                         2017/05/22 21:50:00 MIN 6 SEC 24 
2            2                         2017/05/22 21:40:00 MIN 10 
3            2                         2017/05/22 21:30:00 MIN 10 
4            2                         2017/05/22 21:20:00 MIN 10 
5            2                         2017/05/22 21:10:00 MIN 10 
6            0                         2017/05/22 21:00:00 MIN 10 
7            0                         2017/05/22 20:50:00 MIN 10 
8            0                         2017/05/22 20:40:00 MIN 10 
9            0                         2017/05/22 20:30:00 MIN 10 
10           0                         2017/05/22 20:20:00 MIN 10 
11           0                         2017/05/22 20:10:00 MIN 10 
12           0                         2017/05/22 20:00:00 MIN 10 
13           0                         2017/05/22 19:50:00 MIN 10 
14           0                         2017/05/22 19:40:00 MIN 10 
15           0                         2017/05/22 19:30:00 MIN 10 
16           0                         2017/05/22 19:20:00 MIN 10 
17           0                         2017/05/22 19:10:00 MIN 10 
18           0                         2017/05/22 19:00:00 MIN 10 
19           0                         2017/05/22 18:50:00 MIN 10 
20           0                         2017/05/22 18:40:00 MIN 10 
21           0                         2017/05/22 18:30:00 MIN 10 
22           0                         2017/05/22 18:20:00 MIN 10 
23           0                         2017/05/22 18:10:00 MIN 10 
24           0                         2017/05/22 18:00:00 MIN 10 
25           0                         2017/05/22 17:50:00 MIN 10 
26           0                         2017/05/22 17:45:12 MIN 4 SEC 49 
ENCAPSULATED AND DECAPSULATED GRE TUNNEL THROUGHPUT (MIBIT/SEC)
1 (CURRENT)  4                         2017/05/22 21:50:00 MIN 6 SEC 24 
2            4                         2017/05/22 21:40:00 MIN 10 
3            4                         2017/05/22 21:30:00 MIN 10 
4            4                         2017/05/22 21:20:00 MIN 10 
5            4                         2017/05/22 21:10:00 MIN 10                                                                        
6            1                         2017/05/22 21:00:00 MIN 10 
7            0                         2017/05/22 20:50:00 MIN 10 
8            0                         2017/05/22 20:40:00 MIN 10 
9            0                         2017/05/22 20:30:00 MIN 10 
10           0                         2017/05/22 20:20:00 MIN 10 
11           0                         2017/05/22 20:10:00 MIN 10 
12           0                         2017/05/22 20:00:00 MIN 10 
13           0                         2017/05/22 19:50:00 MIN 10 
14           0                         2017/05/22 19:40:00 MIN 10 
15           0                         2017/05/22 19:30:00 MIN 10 
16           0                         2017/05/22 19:20:00 MIN 10 
17           0                         2017/05/22 19:10:00 MIN 10 
18           0                         2017/05/22 19:00:00 MIN 10 
19           0                         2017/05/22 18:50:00 MIN 10 
20           0                         2017/05/22 18:40:00 MIN 10 
21           0                         2017/05/22 18:30:00 MIN 10 
22           0                         2017/05/22 18:20:00 MIN 10 
23           0                         2017/05/22 18:10:00 MIN 10 
24           0                         2017/05/22 18:00:00 MIN 10 
25           0                         2017/05/22 17:50:00 MIN 10 
26           0                         2017/05/22 17:45:12 MIN 4 SEC 49 
-------------------------------------------------------------------------------
NO. OF ENTRIES: 156
===============================================================================

traffic-forward

Syntax 
traffic-forward tunnel-type tunnel-type [type type] isa mda
Context 
show>isa>stats>ip-tunnel-stats
Description 

This command displays traffic forward statistics for the specified tunnel-type on the specified ISA.

The statistics includes the following information:

  1. The number of bidirectional (encapsulated and decapsulated) packets
  2. The number of encapsulated packets
  3. The number of decapsulated packets
  4. The number of bidirectional (encapsulated and decapsulated) kilobytes
  5. The number of kilobytes for encapsulated traffic
  6. The number of kilobytes for decapsulated traffic

In the output, 1 kilobyte equals 210 bytes.

Parameters 
tunnel-type—
Displays the type of the tunnel.
Values—
gre, ip-in-ip, l2tpv3

 

mda—
Displays the ISA ID.
Values—
slot/mda

 

type—
Displays the type of breakdown counter.
Values—
bidir-pkts, bidir-kbs, encap-pkts, encap-kbs, decap-pkts, decap-kbs

 

Output 

The following is an example output of the show router statistics ip-tunnel-stats traffic-forward command.

Output Sample
show>isa>stats>ip-tunnel-stats# traffic-forward tunnel-type gre isa 1/2 
===============================================================================
STATISTICS FOR ISA 1/2
===============================================================================
INDEX        VALUE                     START TIME          SAMPLING DURATION
-------------------------------------------------------------------------------
NUMBER OF ENCAPED GRE TUNNEL PACKETS
1 (CURRENT)  367,474                   2017/05/22 17:45:12 HRS 4 MIN 45 SEC 46 
NUMBER OF DECAPED GRE TUNNEL PACKETS                                                                                                     [0/1874]
1 (CURRENT)  1,310,402                 2017/05/22 17:45:12 HRS 4 MIN 45 SEC 46 
NUMBER OF ENCAPED AND DECAPED GRE TUNNEL PACKETS
1 (CURRENT)  1,677,876                 2017/05/22 17:45:12 HRS 4 MIN 45 SEC 46 
NUMBER OF KIBIBYTES IN THE ENCAPED GRE TUNNEL PACKETS
1 (CURRENT)  1,544,351                 2017/05/22 17:45:12 HRS 4 MIN 45 SEC 46 
NUMBER OF KIBIBYTES IN THE DECAPED GRE TUNNEL PACKETS
1 (CURRENT)  1,573,014                 2017/05/22 17:45:12 HRS 4 MIN 45 SEC 46 
NUMBER OF KIBIBYTES IN THE ENCAPED AND DECAPED GRE TUNNEL PACKETS
1 (CURRENT)  3,117,365                 2017/05/22 17:45:12 HRS 4 MIN 45 SEC 46 
-------------------------------------------------------------------------------
NO. OF ENTRIES: 6
===============================================================================

ipsec-stats

Syntax 
ipsec-stats
Context 
show>isa>stats
Description 

This command enables the context to display IPsec tunnel statistics.

ike-exchange-failure-rate

Syntax 
ike-exchange-failure-rate gateway name
ike-exchange-failure-rate reason reason gateway name [show-oid]
ike-exchange-failure-rate isa mda
ike-exchange-failure-rate reason reason isa mda [show-oid]
ike-exchange-failure-rate system
ike-exchange-failure-rate reason reason system [show-oid]
ike-exchange-failure-rate tunnel-group tunnel-group-id [history-stats-in-count count] [history-stats-in-min minutes] [current]
ike-exchange-failure-rate reason reason tunnel-group tunnel-group-id [history-stats-in-count count] [history-stats-in-min minutes] [current] [show-oid]
Context 
show>isa>stats>ipsec-stats
Description 

This command displays IKE exchange failure rate statistics of the specified scope.

This command supports following scopes:

  1. per system
  2. per ISA
  3. per tunnel group
  4. per IPSec GW

The rate includes the following reasons:

  1. authentication failure
  1. non-proposal chosen
  1. internal address assignment failure
  1. invalid traffic selector (TS)
  1. invalid key exchange (KE)
  1. DPD timeout
  1. Others

The start time value indicates the starting timestamp of measurement. The sampling duration indicates the duration of the measurement.

If a record has non-zero value, the system also shows the timestamp and local or remote tunnel endpoint for the first and last occurrence in the sampling duration.

Parameters 
name —
Displays information about the specified IPsec GW name up to 32 characters in length.
tunnel-type —
Displays information about the specified the tunnel type.
Values—
all, sl2l, dl2l, ra

 

reason—
Displays information for the cause of the failure.
Values—
auth-failure, non-proposal-chosen, internal-addr-assignment-failure, invalid-ts, invalid-ke, dpd-timeout, other

 

system—
Displays information about the system.
mda—
Displays information about the specified ISA ID.
Values—
slot/mda

 

tunnel-group-id —
Displays information about the specified tunnel group ID.
Values—
1 to 16

 

name —
Displays information about the specified IPsec GW name up to 32 characters in length.
count—
Displays information for the number of statistics intervals to be displayed (starting with the most recent).
Values—
1 to 96

 

minutes—
Displays information about the specified period covered by the statistics to be displayed (starting with the most recent).
Values—
1 to 1440

 

current—
Displays information about the current statistic value. The values of count and minutes are ignored by the system once this parameter is specified.
show-oid—
Displays information about the Object Identifier (OID) of the current statistical value.
Output 

The following is an example output of the show isa stats ipsec-stats ike-exchange-failure-rate command.

Sample Output
show>isa>stats>ipsec-stats# ike-exchange-failure-rate gateway "rw2"                     
===============================================================================
STATISTICS FOR IPSEC GATEWAY "RW2"
===============================================================================
INDEX        VALUE                     START TIME          SAMPLING DURATION
  FAILURE TM               INFO                            
-------------------------------------------------------------------------------
IKE EXCHANGE FAILURE RATE (FAILURES/SEC) - AUTHENTICATION FAILURE
1 (CURRENT)  0.00                      2017/07/31 23:00:00 MIN 4 SEC 51 
2            0.02                      2017/07/31 22:52:15 MIN 7 SEC 40 
  FST: 2017/07/31 22:54:30 RMT:10.1.1.100:[500]
                           LCL:172.16.200.1:[500]
  LST: 2017/07/31 22:54:33 RMT:10.1.1.100:[500]
                           LCL:172.16.200.1:[500]
IKE EXCHANGE FAILURE RATE (FAILURES/SEC) - NON-PROPOSAL CHOSEN
1 (CURRENT)  0.00                      2017/07/31 23:00:00 MIN 4 SEC 51 
2            0.00                      2017/07/31 22:52:15 MIN 7 SEC 40 
IKE EXCHANGE FAILURE RATE (FAILURES/SEC) - ADDRESS ASSIGNMENT FAILURE
1 (CURRENT)  0.00                      2017/07/31 23:00:00 MIN 4 SEC 51 
2            0.00                      2017/07/31 22:52:15 MIN 7 SEC 40 
IKE EXCHANGE FAILURE RATE (FAILURES/SEC) - INVALID TRAFFIC SELECTOR
1 (CURRENT)  0.00                      2017/07/31 23:00:00 MIN 4 SEC 51 
2            0.00                      2017/07/31 22:52:15 MIN 7 SEC 40 
IKE EXCHANGE FAILURE RATE (FAILURES/SEC) - INVALID KEY EXCHANGE
1 (CURRENT)  0.00                      2017/07/31 23:00:00 MIN 4 SEC 51 
2            0.00                      2017/07/31 22:52:15 MIN 7 SEC 40 
IKE EXCHANGE FAILURE RATE (FAILURES/SEC) - DPD TIMEOUT
1 (CURRENT)  0.00                      2017/07/31 23:00:00 MIN 4 SEC 51 
2            0.00                      2017/07/31 22:52:15 MIN 7 SEC 40 
IKE EXCHANGE FAILURE RATE (FAILURES/SEC) - OTHER FAILURE REASONS
1 (CURRENT)  0.00                      2017/07/31 23:00:00 MIN 4 SEC 51 
2            0.00                      2017/07/31 22:52:15 MIN 7 SEC 40 
-------------------------------------------------------------------------------
NO. OF ENTRIES: 18
===============================================================================

ikev2-msg-drop

Syntax 
ikev2-msg-drop message-type message-type isa mda [show-oid]
Context 
show>isa>stats>ipsec-stats
Description 

This command displays the early drop counter for received IKEv2 messages on the specified ISA. These counters reflect the number of packets dropped early in the process when ISA is congested.

Parameters 
message-type—
Specifies the exchange type of the packet to display.
Values—
ike-sa-init, ike-auth, create-child-and-info

 

mda —
Specifies the slot and MDA in the format slot/mda.
Values—
slot — 1 to 10
mda — 1 or 2

 

show-oid—
Displays the SNMP object ID of the counter.
Output 

The following is an example output of the ikev2-msg-drop message-type command.

Sample Output
show>isa>stats>ipsec-stats# ikev2-msg-drop message-type ike-sa-init isa 1/2 show-oid 
-------------------------------------------------------------------------------
Current Statistic Info
-------------------------------------------------------------------------------
OID: tmnxIPsecIsaHistStatsValue32.1.1.2.700.1
-------------------------------------------------------------------------------
===============================================================================
Statistics for ISA 1/2
===============================================================================
Index        Value                     Start Time          Sampling Duration
-------------------------------------------------------------------------------
Number of IKE-SA-INIT exchange packet drops
1 (current)  0                         2018/03/06 21:28:37 min 3 sec 59 
-------------------------------------------------------------------------------
No. of entries: 1

number-of-tunnels

Syntax 
number-of-tunnels gateway name [history-stats-in-count count] [history-stats-in-min minutes] [current]
number-of-tunnels tunnel-type tunnel-type gateway name [history-stats-in-count count] [history-stats-in-min minutes] [current] [show-oid]
number-of-tunnels isa mda [history-stats-in-count count] [history-stats-in-min minutes] [current]
number-of-tunnels tunnel-type tunnel-type isa mda [history-stats-in-count count] [history-stats-in-min minutes] [current] [show-oid]
number-of-tunnels system [history-stats-in-count count] [history-stats-in-min minutes] [current]
number-of-tunnels tunnel-type tunnel-type system [history-stats-in-count count] [history-stats-in-min minutes] [current] [show-oid]
number-of-tunnels tunnel-group tunnel-group-id [history-stats-in-count count] [history-stats-in-min minutes] [current]
number-of-tunnels tunnel-type tunnel-type tunnel-group tunnel-group-id [history-stats-in-count count] [history-stats-in-min minutes] [current] [show-oid]
Context 
show>isa>stats>ipsec-stats
Description 

This command displays information for the number of IPsec tunnel statistics of the specified tunnel type and scope. The system collects statistics every hour for the last 24 hour according to the wall clock. The current value is also included in the output.

This command supports following scopes:

  1. per system
  2. per ISA
  3. per tunnel group
  4. per IPsec GW

The start time value in the output indicates the time when the results are collected.

Parameters 
tunnel-type —
Displays information about the specified the tunnel type.
Values—
all, sl2l, dl2l, ra

 

mda—
Displays information about the specified ISA ID.
Values—
slot/mda

 

tunnel-group-id —
Displays information about the specified tunnel group ID.
Values—
1 to 16

 

name —
Displays information about the specified IPsec GW name up to 32 characters in length.
count—
Displays information for the number of statistics intervals to be displayed (starting with the most recent).
Values—
1 to 96

 

minutes—
Displays information about the specified period covered by the statistics to be displayed (starting with the most recent).
Values—
1 to 1440

 

current—
Displays information about the current value. The values of count and minutes are ignored by the system once this parameter is specified.
show-oid—
Displays information about the Object Identifier (OID) of the current statistical value.
Output 

The following is an example output of the show isa statistics ipsec-stats number of tunnels command.

Sample Output
show>isa>stats>ipsec-stats# number-of-tunnels tunnel-group 1 
===============================================================================
STATISTICS FOR ISA TUNNEL GROUP 1
===============================================================================
INDEX        VALUE                     START TIME          SAMPLING DURATION
-------------------------------------------------------------------------------
NUMBER OF TOTAL IPSEC TUNNELS
1 (CURRENT)  1                         2017/05/23 00:30:13 N/A
2            1                         2017/05/23 00:00:00 N/A
3            1                         2017/05/22 23:00:00 N/A
4            0                         2017/05/22 22:00:00 N/A
5            0                         2017/05/22 21:00:00 N/A
6            0                         2017/05/22 20:00:00 N/A
7            0                         2017/05/22 19:00:00 N/A
8            1                         2017/05/22 18:00:00 N/A
NUMBER OF IPSEC STATIC LAN-TO-LAN (SL2L) TUNNELS
1 (CURRENT)  0                         2017/05/23 00:30:13 N/A
2            0                         2017/05/23 00:00:00 N/A
3            0                         2017/05/22 23:00:00 N/A
4            0                         2017/05/22 22:00:00 N/A
5            0                         2017/05/22 21:00:00 N/A
6            0                         2017/05/22 20:00:00 N/A
7            0                         2017/05/22 19:00:00 N/A
8            0                         2017/05/22 18:00:00 N/A
NUMBER OF IPSEC DYNAMIC LAN-TO-LAN (DL2L) TUNNELS
1 (CURRENT)  0                         2017/05/23 00:30:13 N/A
2            0                         2017/05/23 00:00:00 N/A
3            0                         2017/05/22 23:00:00 N/A
4            0                         2017/05/22 22:00:00 N/A
5            0                         2017/05/22 21:00:00 N/A
6            0                         2017/05/22 20:00:00 N/A
7            0                         2017/05/22 19:00:00 N/A
8            0                         2017/05/22 18:00:00 N/A
NUMBER OF IPSEC REMOTE ACCESS (RA) TUNNELS
1 (CURRENT)  1                         2017/05/23 00:30:13 N/A
2            1                         2017/05/23 00:00:00 N/A
3            1                         2017/05/22 23:00:00 N/A
4            0                         2017/05/22 22:00:00 N/A
5            0                         2017/05/22 21:00:00 N/A
6            0                         2017/05/22 20:00:00 N/A
7            0                         2017/05/22 19:00:00 N/A
8            1                         2017/05/22 18:00:00 N/A
-------------------------------------------------------------------------------
NO. OF ENTRIES: 32
===============================================================================
SHOW>ISA>STATS>IPSEC-STATS# NUMBER-OF-TUNNELS TUNNEL-GROUP 1 SHOW-OID TUNNEL-TYPE ALL 
-------------------------------------------------------------------------------
CURRENT STATISTIC INFO
-------------------------------------------------------------------------------
OID: TMNXIPSECTNLGRPHISTSTATSVALUE10.1.1.2
-------------------------------------------------------------------------------
===============================================================================
STATISTICS FOR ISA TUNNEL GROUP 1
===============================================================================
INDEX        VALUE                     START TIME          SAMPLING DURATION
-------------------------------------------------------------------------------
NUMBER OF TOTAL IPSEC TUNNELS
1 (CURRENT)  1                         2017/05/23 00:32:04 N/A
2            1                         2017/05/23 00:00:00 N/A
3            1                         2017/05/22 23:00:00 N/A
4            0                         2017/05/22 22:00:00 N/A
5            0                         2017/05/22 21:00:00 N/A
6            0                         2017/05/22 20:00:00 N/A
7            0                         2017/05/22 19:00:00 N/A
8            1                         2017/05/22 18:00:00 N/A
-------------------------------------------------------------------------------
NO. OF ENTRIES: 8                     
===============================================================================

throughput

Syntax 
throughput gateway name [history-stats-in-count count] [history-stats-in-min min] [current]
throughput type type gateway name [history-stats-in-count count] [history-stats-in-min min] [current] [show-oid]
throughput isa mda [history-stats-in-count count] [history-stats-in-min min] [current]
throughput type type isa mda [history-stats-in-count count] [history-stats-in-min min] [current] [show-oid]
throughput system [history-stats-in-count count] [history-stats-in-min min] [current]
throughput type type system [history-stats-in-count count] [history-stats-in-min min] [current] [show-oid]
throughput tunnel-group tunnel-group-id [history-stats-in-count count] [history-stats-in-min min] [current]
throughput type type tunnel-group tunnel-group-id [history-stats-in-count count] [history-stats-in-min min] [current] [show-oid]
Context 
show>isa>stats>ipsec-stats
Description 

This command displays IPsec throughput statistics for the specified scope.

The system collects statistics every 10 minutes for last 24 hour per wall clock. A current value is included in the output.

This command supports following the scopes:

  1. per system
  2. per ISA
  3. per tunnel group
  4. per IPsec GW

The statistics include:

  1. The number of bidirectional encrypted and decrypted per second
  2. The number of encrypted packets per second
  3. The number of decrypted packets per second
  4. The number of bidirectional (encrypted and decrypted) bits per second (in Mibits/s)
  5. The number of bidirectional encrypted bits per second (in Mibits/s)
  6. The number of bidirectional decrypted bits per second (in Mibits/s)

Syntax notes:

  1. 1 Mibits/s equals 220 bit/s
  2. The bits per second counter is an integer, which is a value rounded down from the measured value.
Parameters 
mda—
Displays information about the specified ISA.
Values—
slot/mda

 

tunnel-group-id—
Displays information about the specified tunnel group ID.
Values—
1 to 16

 

name—
Displays information about the name of the IPsec GW up to 32 characters in length.
count—
Displays information about the number of historical values to be included in the output
Values—
1 to 24

 

min—
Displays information about the number of minutes of historical values to be included in output
Values—
1 to 1440

 

current—
Displays information about the current value.
show-oid—
Displays information about include SNMP OID and instance ID for the latest historical value in the output, for a specified type of counter.
Output 

The following output is an example of the show isa stats ipsec-stats throughput command.

Sample Output
show>isa>stats>ipsec-stats# throughput tunnel-group 1 
===============================================================================
STATISTICS FOR ISA TUNNEL GROUP 1
===============================================================================
INDEX        VALUE                     START TIME          SAMPLING DURATION
-------------------------------------------------------------------------------
ENCRYPTED IPSEC TRAFFIC THROUGHPUT (PKTS/SEC)
1 (CURRENT)  99                        2017/05/23 22:00:00 MIN 7 SEC 51 
2            72                        2017/05/23 21:50:00 MIN 10 
3            0                         2017/05/23 21:40:00 MIN 10 
4            0                         2017/05/23 21:30:00 MIN 10 
5            0                         2017/05/23 21:20:00 MIN 10 
6            0                         2017/05/23 21:10:00 MIN 10 
7            0                         2017/05/23 21:00:00 MIN 10 
8            0                         2017/05/23 20:50:00 MIN 10 
9            0                         2017/05/23 20:40:00 MIN 10 
10           0                         2017/05/23 20:30:00 MIN 10 
11           0                         2017/05/23 20:20:00 MIN 10 
12           0                         2017/05/23 20:10:00 MIN 10 
13           0                         2017/05/23 20:00:00 MIN 10 
14           0                         2017/05/23 19:50:00 MIN 10 
15           0                         2017/05/23 19:40:00 MIN 10 
16           0                         2017/05/23 19:30:00 MIN 10 
17           0                         2017/05/23 19:20:00 MIN 10 
18           0                         2017/05/23 19:10:00 MIN 10 
19           0                         2017/05/23 19:00:00 MIN 10 
20           0                         2017/05/23 18:50:00 MIN 10 
21           0                         2017/05/23 18:40:00 MIN 10 
22           0                         2017/05/23 18:30:00 MIN 10 
23           0                         2017/05/23 18:20:00 MIN 10 
24           0                         2017/05/23 18:10:00 MIN 10 
25           0                         2017/05/23 18:00:00 MIN 10 
26           0                         2017/05/23 17:50:48 MIN 9 SEC 12 
DECRYPTED IPSEC TRAFFIC THROUGHPUT (PKTS/SEC)
1 (CURRENT)  99                        2017/05/23 22:00:00 MIN 7 SEC 51 
2            72                        2017/05/23 21:50:00 MIN 10 
3            0                         2017/05/23 21:40:00 MIN 10 
4            0                         2017/05/23 21:30:00 MIN 10 
5            0                         2017/05/23 21:20:00 MIN 10 
6            0                         2017/05/23 21:10:00 MIN 10 
7            0                         2017/05/23 21:00:00 MIN 10 
8            0                         2017/05/23 20:50:00 MIN 10 
9            0                         2017/05/23 20:40:00 MIN 10 
10           0                         2017/05/23 20:30:00 MIN 10 
11           0                         2017/05/23 20:20:00 MIN 10 
12           0                         2017/05/23 20:10:00 MIN 10 
13           0                         2017/05/23 20:00:00 MIN 10 
14           0                         2017/05/23 19:50:00 MIN 10 
15           0                         2017/05/23 19:40:00 MIN 10 
16           0                         2017/05/23 19:30:00 MIN 10 
17           0                         2017/05/23 19:20:00 MIN 10 
18           0                         2017/05/23 19:10:00 MIN 10 
19           0                         2017/05/23 19:00:00 MIN 10 
20           0                         2017/05/23 18:50:00 MIN 10 
21           0                         2017/05/23 18:40:00 MIN 10 
22           0                         2017/05/23 18:30:00 MIN 10 
23           0                         2017/05/23 18:20:00 MIN 10 
24           0                         2017/05/23 18:10:00 MIN 10 
25           0                         2017/05/23 18:00:00 MIN 10 
26           0                         2017/05/23 17:50:48 MIN 9 SEC 12 
ENCRYPTED AND DECRYPTED IPSEC TRAFFIC THROUGHPUT (PKTS/SEC)
1 (CURRENT)  199                       2017/05/23 22:00:00 MIN 7 SEC 51 
2            145                       2017/05/23 21:50:00 MIN 10 
3            0                         2017/05/23 21:40:00 MIN 10 
4            0                         2017/05/23 21:30:00 MIN 10 
5            0                         2017/05/23 21:20:00 MIN 10 
6            0                         2017/05/23 21:10:00 MIN 10 
7            0                         2017/05/23 21:00:00 MIN 10 
8            0                         2017/05/23 20:50:00 MIN 10 
9            0                         2017/05/23 20:40:00 MIN 10 
10           0                         2017/05/23 20:30:00 MIN 10 
11           0                         2017/05/23 20:20:00 MIN 10 
12           0                         2017/05/23 20:10:00 MIN 10 
4            0                         2017/05/23 21:30:00 MIN 10 
5            0                         2017/05/23 21:20:00 MIN 10 
6            0                         2017/05/23 21:10:00 MIN 10 
7            0                         2017/05/23 21:00:00 MIN 10 
8            0                         2017/05/23 20:50:00 MIN 10 
9            0                         2017/05/23 20:40:00 MIN 10 
10           0                         2017/05/23 20:30:00 MIN 10 
11           0                         2017/05/23 20:20:00 MIN 10 
12           0                         2017/05/23 20:10:00 MIN 10 
13           0                         2017/05/23 20:00:00 MIN 10 
14           0                         2017/05/23 19:50:00 MIN 10 
15           0                         2017/05/23 19:40:00 MIN 10 
16           0                         2017/05/23 19:30:00 MIN 10 
17           0                         2017/05/23 19:20:00 MIN 10 
18           0                         2017/05/23 19:10:00 MIN 10 
19           0                         2017/05/23 19:00:00 MIN 10 
20           0                         2017/05/23 18:50:00 MIN 10 
21           0                         2017/05/23 18:40:00 MIN 10 
22           0                         2017/05/23 18:30:00 MIN 10 
23           0                         2017/05/23 18:20:00 MIN 10 
24           0                         2017/05/23 18:10:00 MIN 10 
25           0                         2017/05/23 18:00:00 MIN 10 
26           0                         2017/05/23 17:50:48 MIN 9 SEC 12 
DECRYPTED IPSEC TRAFFIC THROUGHPUT (MIBIT/SEC)
1 (CURRENT)  3                         2017/05/23 22:00:00 MIN 7 SEC 51 
2            2                         2017/05/23 21:50:00 MIN 10 
3            0                         2017/05/23 21:40:00 MIN 10 
4            0                         2017/05/23 21:30:00 MIN 10 
5            0                         2017/05/23 21:20:00 MIN 10 
6            0                         2017/05/23 21:10:00 MIN 10 
7            0                         2017/05/23 21:00:00 MIN 10 
8            0                         2017/05/23 20:50:00 MIN 10 
9            0                         2017/05/23 20:40:00 MIN 10 
10           0                         2017/05/23 20:30:00 MIN 10 
11           0                         2017/05/23 20:20:00 MIN 10 
12           0                         2017/05/23 20:10:00 MIN 10 
13           0                         2017/05/23 20:00:00 MIN 10 
14           0                         2017/05/23 19:50:00 MIN 10 
15           0                         2017/05/23 19:40:00 MIN 10 
16           0                         2017/05/23 19:30:00 MIN 10 
17           0                         2017/05/23 19:20:00 MIN 10 
18           0                         2017/05/23 19:10:00 MIN 10 
19           0                         2017/05/23 19:00:00 MIN 10 
20           0                         2017/05/23 18:50:00 MIN 10 
21           0                         2017/05/23 18:40:00 MIN 10 
22           0                         2017/05/23 18:30:00 MIN 10 
23           0                         2017/05/23 18:20:00 MIN 10 
24           0                         2017/05/23 18:10:00 MIN 10 
25           0                         2017/05/23 18:00:00 MIN 10 
26           0                         2017/05/23 17:50:48 MIN 9 SEC 12 
ENCRYPTED AND DECRYPTED IPSEC TRAFFIC THROUGHPUT (MIBIT/SEC)
1 (CURRENT)  7                         2017/05/23 22:00:00 MIN 7 SEC 51 
2            5                         2017/05/23 21:50:00 MIN 10 
3            0                         2017/05/23 21:40:00 MIN 10 
4            0                         2017/05/23 21:30:00 MIN 10 
5            0                         2017/05/23 21:20:00 MIN 10 
6            0                         2017/05/23 21:10:00 MIN 10 
7            0                         2017/05/23 21:00:00 MIN 10 
8            0                         2017/05/23 20:50:00 MIN 10 
9            0                         2017/05/23 20:40:00 MIN 10 
10           0                         2017/05/23 20:30:00 MIN 10 
11           0                         2017/05/23 20:20:00 MIN 10 
12           0                         2017/05/23 20:10:00 MIN 10 
13           0                         2017/05/23 20:00:00 MIN 10 
14           0                         2017/05/23 19:50:00 MIN 10 
15           0                         2017/05/23 19:40:00 MIN 10 
16           0                         2017/05/23 19:30:00 MIN 10 
17           0                         2017/05/23 19:20:00 MIN 10 
18           0                         2017/05/23 19:10:00 MIN 10 
19           0                         2017/05/23 19:00:00 MIN 10 
20           0                         2017/05/23 18:50:00 MIN 10 
21           0                         2017/05/23 18:40:00 MIN 10 
22           0                         2017/05/23 18:30:00 MIN 10 
23           0                         2017/05/23 18:20:00 MIN 10 
24           0                         2017/05/23 18:10:00 MIN 10 
25           0                         2017/05/23 18:00:00 MIN 10 
26           0                         2017/05/23 17:50:48 MIN 9 SEC 12 
-------------------------------------------------------------------------------
NO. OF ENTRIES: 156
===============================================================================
show>isa>stats>ipsec-stats# throughput type bidir-bps isa 1/2 show-oid 
-------------------------------------------------------------------------------
CURRENT STATISTIC INFO
-------------------------------------------------------------------------------
OID: TMNXIPSECISAHISTSTATSVALUE10.1.1.2.105.2
-------------------------------------------------------------------------------
===============================================================================
STATISTICS FOR ISA 1/2
===============================================================================
INDEX        VALUE                     START TIME          SAMPLING DURATION
-------------------------------------------------------------------------------
ENCRYPTED AND DECRYPTED IPSEC TRAFFIC THROUGHPUT (MIBIT/SEC)
1 (CURRENT)  7                         2017/05/23 22:10:00 MIN 1 SEC 9 
2            7                         2017/05/23 22:00:00 MIN 10 
3            5                         2017/05/23 21:50:00 MIN 10 
4            0                         2017/05/23 21:40:00 MIN 10 
5            0                         2017/05/23 21:30:00 MIN 10 
6            0                         2017/05/23 21:20:00 MIN 10 
7            0                         2017/05/23 21:10:00 MIN 10 
8            0                         2017/05/23 21:00:00 MIN 10 
9            0                         2017/05/23 20:50:00 MIN 10 
10           0                         2017/05/23 20:40:00 MIN 10 
11           0                         2017/05/23 20:30:00 MIN 10 
12           0                         2017/05/23 20:20:00 MIN 10 
13           0                         2017/05/23 20:10:00 MIN 10 
14           0                         2017/05/23 20:00:00 MIN 10 
15           0                         2017/05/23 19:50:00 MIN 10 
16           0                         2017/05/23 19:40:00 MIN 10 
17           0                         2017/05/23 19:30:00 MIN 10 
18           0                         2017/05/23 19:20:00 MIN 10 
19           0                         2017/05/23 19:10:00 MIN 10 
20           0                         2017/05/23 19:00:00 MIN 10 
21           0                         2017/05/23 18:50:00 MIN 10 
22           0                         2017/05/23 18:40:00 MIN 10 
23           0                         2017/05/23 18:30:00 MIN 10 
24           0                         2017/05/23 18:20:00 MIN 10 
25           0                         2017/05/23 18:10:00 MIN 10 
26           0                         2017/05/23 18:00:00 MIN 10 
27           0                         2017/05/23 17:50:48 MIN 9 SEC 12 
-------------------------------------------------------------------------------
NO. OF ENTRIES: 27
===============================================================================

traffic-forward

Syntax 
traffic-forward [type type] gateway name
traffic-forward [type type] isa mda
traffic-forward [type type] gateway name dynamic-tunnel ip-address:port
traffic-forward [type type] tunnel ipsec-tunnel-name
Context 
show>isa>stats>ipsec-stats
Description 

This command displays traffic forward statistics of the specified scope.

This command supports following scopes:

  1. per system
  2. per ISA
  3. per tunnel group
  4. per IPsec GW

The statistics include:

  1. The number of bidirectional encrypted and decrypted packets
  2. The number of encrypted packets
  3. The number of decrypted packets per second
  4. The number of bidirectional (encrypted and decrypted) in kilobytes
  5. The number of bidirectional encrypted bits in kilobytes
  6. The number of bidirectional decrypted bits in kilobytes

1 kilobyte equals 210 bytes

The start time indicates the starting timestamp of the measurement. The sampling duration indicates the duration of the measurement.

Parameters 
name—
Displays information about the name of the IPsec GW up to 32 characters in length.
mda—
Displays information about the specified ISA.
Values—
slot/mda

 

tunnel-group-id—
Displays information about the specified tunnel group ID.
Values—
1 to 16

 

ip-address:port—
Displays information about the IP address and port of the peer for dynamic tunneling.
ipsec-tunnel-name—
Specifies the name of the static LAN-to-LAN tunnel up to 32 characters in length.
Output 

The following output is an example of the show isa stats ipsec-stats traffic forward isa command.

Sample Output
show>isa>stats>ipsec-stats# traffic-forward isa 1/2 
===============================================================================
STATISTICS FOR ISA 1/2
===============================================================================
INDEX        VALUE                     START TIME          SAMPLING DURATION
-------------------------------------------------------------------------------
NUMBER OF ENCRYPTED IPSEC PACKETS
1 (CURRENT)  770,881                   2017/05/23 17:50:48 HRS 6 MIN 33 SEC 57 
NUMBER OF DECRYPTED IPSEC PACKETS
1 (CURRENT)  770,881                   2017/05/23 17:50:48 HRS 6 MIN 33 SEC 57 
NUMBER OF ENCRYPTED AND DECRYPTED IPSEC PACKETS
1 (CURRENT)  1,541,762                 2017/05/23 17:50:48 HRS 6 MIN 33 SEC 57 
NUMBER OF KIBIBYTES IN THE ENCRYPTED IPSEC PACKETS
1 (CURRENT)  3,785,141                 2017/05/23 17:50:48 HRS 6 MIN 33 SEC 57 
NUMBER OF KIBIBYTES IN THE DECRYPTED IPSEC PACKETS
1 (CURRENT)  3,785,141                 2017/05/23 17:50:48 HRS 6 MIN 33 SEC 57 
NUMBER OF KIBIBYTES IN THE ENCRYPTED AND DECRYPTED IPSEC PACKETS
1 (CURRENT)  7,570,282                 2017/05/23 17:50:48 HRS 6 MIN 33 SEC 57 
-------------------------------------------------------------------------------
NO. OF ENTRIES: 6
=============================================================================== 
 
show>isa>stats>ipsec-stats# traffic-forward gateway "rw" dynamic-tunnel 10.1.1.100:500
===============================================================================
STATISTICS FOR IPSEC REMOTE USER TUNNEL "10.1.1.100:500"
===============================================================================
INDEX        VALUE                     START TIME          SAMPLING DURATION
-------------------------------------------------------------------------------
NUMBER OF ENCRYPTED IPSEC PACKETS
1 (CURRENT)  676,774                   2017/05/23 22:36:15 HRS 1 MIN 52 SEC 49 
NUMBER OF DECRYPTED IPSEC PACKETS
1 (CURRENT)  676,774                   2017/05/23 22:36:15 HRS 1 MIN 52 SEC 49 
NUMBER OF ENCRYPTED AND DECRYPTED IPSEC PACKETS
1 (CURRENT)  1,353,548                 2017/05/23 22:36:15 HRS 1 MIN 52 SEC 49 
NUMBER OF KIBIBYTES IN THE ENCRYPTED IPSEC PACKETS
1 (CURRENT)  3,323,066                 2017/05/23 22:36:15 HRS 1 MIN 52 SEC 49 
NUMBER OF KIBIBYTES IN THE DECRYPTED IPSEC PACKETS
1 (CURRENT)  3,323,066                 2017/05/23 22:36:15 HRS 1 MIN 52 SEC 49 
NUMBER OF KIBIBYTES IN THE ENCRYPTED AND DECRYPTED IPSEC PACKETS
1 (CURRENT)  6,646,132                 2017/05/23 22:36:15 HRS 1 MIN 52 SEC 49 
-------------------------------------------------------------------------------
NO. OF ENTRIES: 6
===============================================================================

tunnel-setup-rate

Syntax 
tunnel-setup-rate gateway name [history-stats-in-count count] [history-stats-in-min minutes] [current]
tunnel-setup-rate tunnel-type tunnel-type gateway name [history-stats-in-count count] [history-stats-in-min minutes] [current] [show-oid]
tunnel-setup-rate isa mda [history-stats-in-count count] [history-stats-in-min minutes] [current]
tunnel-setup-rate tunnel-type tunnel-type isa mda [history-stats-in-count count] [history-stats-in-min minutes] [current] [show-oid]
tunnel-setup-rate system [history-stats-in-count count] [history-stats-in-min minutes] [current]
tunnel-setup-rate tunnel-type tunnel-type system [history-stats-in-count count] [history-stats-in-min minutes] [current] [show-oid]
tunnel-setup-rate tunnel-group tunnel-group-id [history-stats-in-count count] [history-stats-in-min minutes] [current]
tunnel-setup-rate tunnel-type tunnel-type tunnel-group tunnel-group-id [history-stats-in-count count] [history-stats-in-min minutes] [current] [show-oid]
Context 
show>isa>stats>ipsec-stats
Description 

This command displays IPsec tunnel setup rate statistics of the specified scope.

The system collects statistics every hour for the last 24 hour period per wall clock. A current value is also included in the output.

This command supports following scopes:

  1. per system
  2. per ISA
  3. per tunnel group
  4. per IPsec GW

The statics include the following setup rates:

  1. static tunnel
  2. dynamic LAN-to-LAN tunnel
  3. remote access tunnel
  4. all types of tunnel

The start time indicates the starting timestamp of measurement. The sampling duration indicates the duration of measurement.

Parameters 
name—
Displays information about the name of the IPsec GW up to 32 characters in length.
mda—
Displays information about the specified ISA.
Values—
slot/mda

 

tunnel-group-id—
Displays information about the specified tunnel group ID.
Values—
1 to 16

 

count—
Displays information for the number of statistics intervals to be displayed (starting with the most recent).
Values—
1 to 24

 

minutes—
Displays information about the specified period covered by the statistics to be displayed (starting with the most recent).
Values—
1 to 1440

 

type—
Displays information about the specified tunnel type associated with this IPsec GW.
Values—
all, sl2l, dl2l, ra

 

current—
Displays information about the current statistic value. The values of count and minutes are ignored by the system once this parameter is specified.
show-oid—
Displays information about the OID of the current statistical value.

tunnel-isa

Syntax 
tunnel-isa
Context 
show>isa>stats
Description 

This command enables the context to display tunnel ISA statistics including ISA CPU usage and memory allocation failure rates.

cpu-usage

Syntax 
cpu-usage mda [history-stats-in-count count] [history-stats-in-min minutes] [current]
cpu-usage mda [history-stats-in-count count] [history-stats-in-min minutes] [current] [show-oid] type {control-plane | data-plane}
Context 
show>isa>stats>tunnel-isa
Description 

This command displays the CPU usage of the specified ISA. The information includes control plane usage and data plane usage.

The data plane usage collection depends on the configuration of config>isa>tunnel-grp>stats-collection>isa-dp-cpu-usage system collects usage every 5 minutes for the last 24 hours. The output also includes the current value.

Parameters 
count—
Displays information for the number of statistics intervals to be displayed (starting with the most recent).
Values—
1 to 24

 

minutes—
Displays information about the specified period covered by the statistics to be displayed (starting with the most recent).
Values—
1 to 1440

 

current—
Displays information about the current statistic value. The values of count and minutes are ignored by the system once this parameter is specified.
show-oid—
Displays information about the Object Identifier (OID) of the current statistical value.
mda—
Displays information about the specified ISA.
Values—
slot/mda

 

control-plane—
Displays information about the control plane.
data-plane—
Displays information about the data plane
Output 

The following is an example output of the show isa stats tunnel-isa cpu-usage configuration.

Sample Output
show>isa>stats>tunnel-isa# cpu-usage 1/2 
===============================================================================
STATISTICS FOR ISA 1/2
===============================================================================
INDEX        VALUE                     START TIME          SAMPLING DURATION
-------------------------------------------------------------------------------
ISA CONTROL PLANE CPU USAGE PERCENTAGE (%)
16           0.05                      2017/05/24 02:30:00 MIN 5 
17           0.00                      2017/05/24 02:25:00 MIN 5 
18           0.03                      2017/05/24 02:20:00 MIN 5 
19           0.06                      2017/05/24 02:15:00 MIN 5 
20           0.05                      2017/05/24 02:10:00 MIN 5 
21           0.07                      2017/05/24 02:05:00 MIN 5 
22           0.06                      2017/05/24 02:00:00 MIN 5 
23           0.05                      2017/05/24 01:55:00 MIN 5 
24           0.00                      2017/05/24 01:50:00 MIN 5 
25           0.07                      2017/05/24 01:45:00 MIN 5 
26           0.01                      2017/05/24 01:40:00 MIN 5 
27           0.04                      2017/05/24 01:35:00 MIN 5 
28           0.01                      2017/05/24 01:30:00 MIN 5 
29           0.00                      2017/05/24 01:25:00 MIN 5 
30           0.01                      2017/05/24 01:20:00 MIN 5 
31           0.01                      2017/05/24 01:15:00 MIN 5 
32           0.01                      2017/05/24 01:10:00 MIN 5 
33           0.06                      2017/05/24 01:05:00 MIN 5 
34           0.01                      2017/05/24 01:00:00 MIN 5 
35           0.02                      2017/05/24 00:55:00 MIN 5 
36           0.03                      2017/05/24 00:50:00 MIN 5 
37           0.03                      2017/05/24 00:45:00 MIN 5 
38           0.01                      2017/05/24 00:40:00 MIN 5 
39           0.01                      2017/05/24 00:35:00 MIN 5 
40           0.02                      2017/05/24 00:30:00 MIN 5 
41           0.01                      2017/05/24 00:25:00 MIN 5 
42           0.03                      2017/05/24 00:20:00 MIN 5 
43           0.02                      2017/05/24 00:15:00 MIN 5 
44           0.06                      2017/05/24 00:10:00 MIN 5 
45           0.05                      2017/05/24 00:05:00 MIN 5 
46           0.00                      2017/05/24 00:00:00 MIN 5 
47           0.02                      2017/05/23 23:55:00 MIN 5 
48           0.04                      2017/05/23 23:50:00 MIN 5 
49           0.03                      2017/05/23 23:45:00 MIN 5 
50           0.06                      2017/05/23 23:40:00 MIN 5 
51           0.00                      2017/05/23 23:35:00 MIN 5 
52           0.05                      2017/05/23 23:30:00 MIN 5 
53           0.02                      2017/05/23 23:25:00 MIN 5 
54           0.03                      2017/05/23 23:20:00 MIN 5 
55           0.02                      2017/05/23 23:15:00 MIN 5 
56           0.06                      2017/05/23 23:10:00 MIN 5 
57           0.04                      2017/05/23 23:05:00 MIN 5 
58           0.00                      2017/05/23 23:00:00 MIN 5 
59           0.00                      2017/05/23 22:55:00 MIN 5 
60           0.04                      2017/05/23 22:50:00 MIN 5 
61           0.03                      2017/05/23 22:45:00 MIN 5 
62           0.03                      2017/05/23 22:40:00 MIN 5 
63           0.04                      2017/05/23 22:35:00 MIN 5 
64           0.05                      2017/05/23 22:30:00 MIN 5 
65           0.02                      2017/05/23 22:25:00 MIN 5 
66           0.05                      2017/05/23 22:20:00 MIN 5 
67           0.03                      2017/05/23 22:15:00 MIN 5 
68           0.01                      2017/05/23 22:10:00 MIN 5 
69           0.02                      2017/05/23 22:05:00 MIN 5 
70           0.01                      2017/05/23 22:00:00 MIN 5 
71           0.05                      2017/05/23 21:55:00 MIN 5 
72           0.02                      2017/05/23 21:50:00 MIN 5 
73           0.02                      2017/05/23 21:45:00 MIN 5 
74           0.00                      2017/05/23 21:40:00 MIN 5 
75           0.00                      2017/05/23 21:35:00 MIN 5 
76           0.01                      2017/05/23 21:30:00 MIN 5 
77           0.06                      2017/05/23 21:25:00 MIN 5 
78           0.01                      2017/05/23 21:20:00 MIN 5 
79           0.01                      2017/05/23 21:15:00 MIN 5 
80           0.00                      2017/05/23 21:10:00 MIN 5 
81           0.06                      2017/05/23 21:05:00 MIN 5 
82           0.06                      2017/05/23 21:00:00 MIN 5 
83           0.00                      2017/05/23 20:55:00 MIN 5 
84           0.02                      2017/05/23 20:50:00 MIN 5 
85           0.00                      2017/05/23 20:45:00 MIN 5 
86           0.00                      2017/05/23 20:40:00 MIN 5 
87           0.06                      2017/05/23 20:35:00 MIN 5 
88           0.01                      2017/05/23 20:30:00 MIN 5 
89           0.01                      2017/05/23 20:25:00 MIN 5 
90           0.02                      2017/05/23 20:20:00 MIN 5 
91           0.03                      2017/05/23 20:15:00 MIN 5 
92           0.04                      2017/05/23 20:10:00 MIN 5 
93           0.05                      2017/05/23 20:05:00 MIN 5 
94           0.05                      2017/05/23 20:00:00 MIN 5 
95           0.05                      2017/05/23 19:55:00 MIN 5 
96           0.05                      2017/05/23 19:50:00 MIN 5 
97           0.06                      2017/05/23 19:45:00 MIN 5 
98           0.06                      2017/05/23 19:40:00 MIN 5 
99           0.05                      2017/05/23 19:35:00 MIN 5 
100          0.05                      2017/05/23 19:30:00 MIN 5 
101          0.04                      2017/05/23 19:25:00 MIN 5 
102          0.04                      2017/05/23 19:20:00 MIN 5 
103          0.04                      2017/05/23 19:15:00 MIN 5 
104          0.05                      2017/05/23 19:10:00 MIN 5 
105          0.04                      2017/05/23 19:05:00 MIN 5 
106          0.03                      2017/05/23 19:00:00 MIN 5 
107          0.03                      2017/05/23 18:55:00 MIN 5 
108          0.01                      2017/05/23 18:50:00 MIN 5 
109          0.02                      2017/05/23 18:45:00 MIN 5 
110          0.02                      2017/05/23 18:40:00 MIN 5 
111          0.02                      2017/05/23 18:35:00 MIN 5 
112          0.01                      2017/05/23 18:30:00 MIN 5 
113          0.02                      2017/05/23 18:25:00 MIN 5 
114          0.02                      2017/05/23 18:20:00 MIN 5 
115          0.01                      2017/05/23 18:15:00 MIN 5 
116          0.02                      2017/05/23 18:10:00 MIN 5 
117          0.01                      2017/05/23 18:05:00 MIN 5 
118          0.02                      2017/05/23 18:00:00 MIN 5 
119          0.01                      2017/05/23 17:55:00 MIN 5 
120          0.08                      2017/05/23 17:50:48 MIN 4 SEC 12 
ISA DATA PLANE CPU USAGE PERCENTAGE (%)
1 (CURRENT)  13.13                     2017/05/24 03:45:00 SEC 25 
2            13.24                     2017/05/24 03:40:00 MIN 5 
3            13.43                     2017/05/24 03:35:00 MIN 5 
4            13.30                     2017/05/24 03:30:00 MIN 5 
5            13.26                     2017/05/24 03:25:00 MIN 5 
6            13.16                     2017/05/24 03:20:00 MIN 5 
7            13.16                     2017/05/24 03:15:00 MIN 5 
8            13.22                     2017/05/24 03:10:00 MIN 5 
9            13.31                     2017/05/24 03:05:00 MIN 5 
10           13.95                     2017/05/24 03:00:00 MIN 5 
11           13.71                     2017/05/24 02:55:00 MIN 5 
12           14.00                     2017/05/24 02:50:00 MIN 5 
13           13.26                     2017/05/24 02:45:00 MIN 5 
14           13.11                     2017/05/24 02:40:00 MIN 5 
15           13.09                     2017/05/24 02:35:00 MIN 5 
16           13.22                     2017/05/24 02:30:00 MIN 5 
17           13.91                     2017/05/24 02:25:00 MIN 5 
18           13.53                     2017/05/24 02:20:00 MIN 5 
19           13.83                     2017/05/24 02:15:00 MIN 5 
20           13.05                     2017/05/24 02:10:00 MIN 5 
21           13.10                     2017/05/24 02:05:00 MIN 5 
22           13.09                     2017/05/24 02:00:00 MIN 5 
23           13.72                     2017/05/24 01:55:00 MIN 5 
24           13.65                     2017/05/24 01:50:00 MIN 5 
25           13.81                     2017/05/24 01:45:00 MIN 5 
26           13.31                     2017/05/24 01:40:00 MIN 5 
27           13.10                     2017/05/24 01:35:00 MIN 5 
28           13.10                     2017/05/24 01:30:00 MIN 5 
29           13.31                     2017/05/24 01:25:00 MIN 5 
30           13.92                     2017/05/24 01:20:00 MIN 5 
31           13.58                     2017/05/24 01:15:00 MIN 5 
32           13.64                     2017/05/24 01:10:00 MIN 5 
33           13.11                     2017/05/24 01:05:00 MIN 5 
34           13.18                     2017/05/24 01:00:00 MIN 5 
35           13.27                     2017/05/24 00:55:00 MIN 5 
36           13.90                     2017/05/24 00:50:00 MIN 5 
37           13.59                     2017/05/24 00:45:00 MIN 5 
38           13.79                     2017/05/24 00:40:00 MIN 5 
39           13.16                     2017/05/24 00:35:00 MIN 5 
40           13.24                     2017/05/24 00:30:00 MIN 5 
41           13.28                     2017/05/24 00:25:00 MIN 5 
42           14.02                     2017/05/24 00:20:00 MIN 5 
43           13.65                     2017/05/24 00:15:00 MIN 5 
44           13.66                     2017/05/24 00:10:00 MIN 5 
45           13.07                     2017/05/24 00:05:00 MIN 5 
46           13.12                     2017/05/24 00:00:00 MIN 5 
47           13.32                     2017/05/23 23:55:00 MIN 5 
48           13.80                     2017/05/23 23:50:00 MIN 5 
49           13.69                     2017/05/23 23:45:00 MIN 5 
50           13.37                     2017/05/23 23:40:00 MIN 5 
51           13.05                     2017/05/23 23:35:00 MIN 5 
52           13.07                     2017/05/23 23:30:00 MIN 5 
53           13.58                     2017/05/23 23:25:00 MIN 5 
54           13.55                     2017/05/23 23:20:00 MIN 5 
55           13.80                     2017/05/23 23:15:00 MIN 5 
56           13.18                     2017/05/23 23:10:00 MIN 5 
57           13.13                     2017/05/23 23:05:00 MIN 5 
58           13.12                     2017/05/23 23:00:00 MIN 5 
59           13.80                     2017/05/23 22:55:00 MIN 5 
60           13.55                     2017/05/23 22:50:00 MIN 5 
61           13.77                     2017/05/23 22:45:00 MIN 5 
62           13.08                     2017/05/23 22:40:00 MIN 5 
63           9.77                      2017/05/23 22:35:00 MIN 5 
64           0.02                      2017/05/23 22:30:00 MIN 5 
65           0.02                      2017/05/23 22:25:00 MIN 5 
66           0.01                      2017/05/23 22:20:00 MIN 5 
67           0.00                      2017/05/23 22:15:00 MIN 5 
68           7.08                      2017/05/23 22:10:00 MIN 5 
69           13.09                     2017/05/23 22:05:00 MIN 5 
70           13.58                     2017/05/23 22:00:00 MIN 5 
71           13.63                     2017/05/23 21:55:00 MIN 5 
72           6.34                      2017/05/23 21:50:00 MIN 5 
73           0.00                      2017/05/23 21:45:00 MIN 5 
74           0.00                      2017/05/23 21:40:00 MIN 5 
75           0.00                      2017/05/23 21:35:00 MIN 5 
76           0.00                      2017/05/23 21:30:00 MIN 5 
77           0.00                      2017/05/23 21:25:00 MIN 5 
78           0.00                      2017/05/23 21:20:00 MIN 5 
79           0.00                      2017/05/23 21:15:00 MIN 5 
80           0.00                      2017/05/23 21:10:00 MIN 5 
81           0.00                      2017/05/23 21:05:00 MIN 5 
82           0.00                      2017/05/23 21:00:00 MIN 5 
83           0.00                      2017/05/23 20:55:00 MIN 5 
84           0.00                      2017/05/23 20:50:00 MIN 5 
85           0.00                      2017/05/23 20:45:00 MIN 5 
86           0.00                      2017/05/23 20:40:00 MIN 5 
87           0.00                      2017/05/23 20:35:00 MIN 5 
88           0.00                      2017/05/23 20:30:00 MIN 5 
89           0.00                      2017/05/23 20:25:00 MIN 5 
90           0.00                      2017/05/23 20:20:00 MIN 5 
91           0.00                      2017/05/23 20:15:00 MIN 5 
92           0.00                      2017/05/23 20:10:00 MIN 5 
93           0.00                      2017/05/23 20:05:00 MIN 5 
94           0.00                      2017/05/23 20:00:00 MIN 5 
95           0.00                      2017/05/23 19:55:00 MIN 5 
96           0.00                      2017/05/23 19:50:00 MIN 5 
97           0.00                      2017/05/23 19:45:00 MIN 5 
98           0.00                      2017/05/23 19:40:00 MIN 5 
99           0.00                      2017/05/23 19:35:00 MIN 5 
100          0.00                      2017/05/23 19:30:00 MIN 5 
101          0.00                      2017/05/23 19:25:00 MIN 5 
102          0.00                      2017/05/23 19:20:00 MIN 5 
103          0.00                      2017/05/23 19:15:00 MIN 5 
104          0.00                      2017/05/23 19:10:00 MIN 5 
105          0.00                      2017/05/23 19:05:00 MIN 5 
106          0.00                      2017/05/23 19:00:00 MIN 5 
107          0.00                      2017/05/23 18:55:00 MIN 5 
108          0.00                      2017/05/23 18:50:00 MIN 5 
109          0.00                      2017/05/23 18:45:00 MIN 5 
110          0.00                      2017/05/23 18:40:00 MIN 5 
111          0.00                      2017/05/23 18:35:00 MIN 5 
112          0.00                      2017/05/23 18:30:00 MIN 5 
113          0.00                      2017/05/23 18:25:00 MIN 5 
114          0.00                      2017/05/23 18:20:00 MIN 5 
115          0.00                      2017/05/23 18:15:00 MIN 5 
116          0.00                      2017/05/23 18:10:00 MIN 5 
117          0.00                      2017/05/23 18:05:00 MIN 5 
118          0.00                      2017/05/23 18:00:00 MIN 5 
119          0.00                      2017/05/23 17:55:00 MIN 5 
120          0.00                      2017/05/23 17:50:48 MIN 4 SEC 12 
-------------------------------------------------------------------------------
NO. OF ENTRIES: 240
===============================================================================

memory-allocation-failure-rate

Syntax 
memory-allocation-failure-rate mda [history-stats-in-count count] [history-stats-in-min minutes] [current] [show-oid]
Context 
show>isa>stats>tunnel-isa
Description 

This command displays memory allocation failure rate of the specified ISA. The system collects usage information every hour for last 24 hours. The output also includes a current value.

Parameters 
mda—
Displays information about the specified ISA.
Values—
slot/mda

 

count—
Displays information for the number of statistics intervals to be displayed (starting with the most recent).
Values—
1 to 24

 

minutes—
Displays information about the specified period covered by the statistics to be displayed (starting with the most recent).
Values—
1 to 1440

 

current—
Displays information about the current statistic value. The values of count and minutes are ignored by the system once this parameter is specified.
show-oid—
Displays information about the Object Identifier (OID) of the current statistical value.
Output 

The following is an example output of the show isa stats tunnel-isa memory-allocation-failure-rate configuration.

Sample Output
show>isa>stats>tunnel-isa# memory-allocation-failure-rate 1/2 
===============================================================================
STATISTICS FOR ISA 1/2
===============================================================================
INDEX        VALUE                     START TIME          SAMPLING DURATION
-------------------------------------------------------------------------------
ISA MEMORY ALLOCATION FAILURE RATE (FAILURES/HOUR)
1 (CURRENT)  0                         2017/05/24 03:00:00 MIN 47 SEC 47 
2            0                         2017/05/24 02:00:00 HRS 1 
3            0                         2017/05/24 01:00:00 HRS 1 
4            0                         2017/05/24 00:00:00 HRS 1 
5            0                         2017/05/23 23:00:00 HRS 1 
6            0                         2017/05/23 22:00:00 HRS 1 
7            0                         2017/05/23 21:00:00 HRS 1 
8            0                         2017/05/23 20:00:00 HRS 1 
9            0                         2017/05/23 19:00:00 HRS 1 
10           0                         2017/05/23 18:00:00 HRS 1 
11           0                         2017/05/23 17:50:48 MIN 9 SEC 12 
-------------------------------------------------------------------------------
NO. OF ENTRIES: 11
=============================================================================== 

4.14.2.18. Debug Commands

gateway

Syntax 
gateway name name tunnel ip-address[:port] [nat-ip nat-ip[:port]] [detail] [no-dpd-debug] [display-keys]
no gateway name name tunnel ip-address[:port] [nat-ip nat-ip[:port]
gateway name name tunnel-subnet ip-prefix/ip-prefix-length [port port] [detail] [no-dpd-debug] [display-keys]
no gateway name name tunnel-subnet ip-prefix/ip-prefix-length
Context 
debug>ipsec
Description 

This command enables debugging for dynamic IPsec tunnels that terminate on the specified IPsec gateway.

The tunnel to be debugged can be specified by either its source address or source subnet. If a subnet is specified, the system will enable debugging for all tunnels with source addresses in the specified subnet.

Parameters 
name—
The name of the IPsec gateway up to 32 characters.
ip-address:port —
The tunnel IP address of the remote peer and, optionally, the remote UDP port of IKE.
nat-ip:port—
The inside IP address of the NAT tunnel and, optionally, the port.
detail—
Specifies to display detailed debug information.
no-dpd-debug—
Specifies to stop logging IKEv1 and IKEv2 DPD events during debug in order to produce less noise.
ip-prefix/ip-prefix-length—
The subnet of the peer’s tunnel address.
display-keys—
Specifies the IKE-SA and CHILD-SA keys for inclusion in the debug output.

tunnel

Syntax 
tunnel ipsec-tunnel-name [detail] [no-dpd-debug] [display-keys]
no tunnel ipsec-tunnel-name
Context 
debug>ipsec
Description 

This command enables debugging for specified IPsec tunnel.

Note:

Up to 16 IPsec tunnels are allowed, to enable debugging, at a time.

Parameters 
ipsec-tunnel-name—
Specifies the name of ipsec-tunnel, up to 32 characters.
detail—
Displays detailed debug information.
no-dpd-debug—
Stops logging IKEv1 and IKEv2 DPD events for less noise during debug.
display-keys—
Specifies the IKE-SA and CHILD-SA keys for inclusion in the debug output.

certificate

Syntax 
certificate
Context 
debug
Description 

This command enables debug for certificate chain computation in cert-profile.

auto-crl-updates

Syntax 
[no] auto-crl-updates
Context 
debug>certificate
Description 

This command enables trace for automated and manual CRL updates.

ca-profile

Syntax 
[no] ca-profile profile-name
Context 
debug>certificate>auto-crl-updates
debug>certificate>cmpv2
debug>certificate>ocsp
Description 

This command debugs output of the specified CA profile.

  1. Protection method of each message is logged.
  2. All HTTP messages are logged. Format allows offline analysis using Wireshark.
  3. In the event of failed transactions, saved certificates are not deleted from file system for further debug and analysis.
  4. The system allows CMPv2 debugging for multiple ca-profile at the same time.
Parameters 
profile-name—
Specifies the name of the CA profile, up to 32 characters.

cmpv2

Syntax 
[no] cmpv2
Context 
debug>certificate
Description 

This command enables the context to perform CMPv2 operations.

ocsp

Syntax 
[no] ocsp
Context 
debug>certificate
Description 

This command enables debug output of OCSP protocol for the specified CA.

Default 

no ocsp

certificate

Syntax 
certificate filename
Context 
debug>ipsec
Description 

This command enables debug for certificate chain computation in cert-profile.

Parameters 
filename—
Displays the filename of imported certificate, up to 95 characters.

client-db

Syntax 
[no] no client-db db-name
Context 
debug>ipsec
Description 

This command enables debugging for the specified IPsec client-db.

Parameters 
db-name—
Specifies the IPsec client database name, up to 32 characters.

4.14.2.19. Tools Commands

stats

Syntax 
stats
Context 
tools>dump>ipsec
Description 

This command enables the context do dump ipsec statistics.

ike-stats

Syntax 
ike-stats gateway name [dynamic-tunnel ip-address:port]
ike-stats isa mda
ike-stats ipsec-tunnel-name
Context 
tools>dump>ipsec>stats
Description 

This command dumps various internal IKE statistics for the specified scope:

  1. per ISA
  2. per static LAN-to-LAN tunnel
  3. per dynamic tunnel

The start time indicates the time of the last reset.

Parameters 
name—
Dumps information about the name of the IPsec GW, up to 32 characters.
ip-address:port—
Dumps information about the IP address and port of the peer for dynamic tunneling.
mda—
Dumps information about the specified ISA.
Values—
slot/mda

 

ipsec-tunnel-name—
Dumps the name of the static LAN-to-LAN tunnel, up to 32 characters.

mc-ipsec

Syntax 
mc-ipsec
Context 
tools>perform>redundancy>multi-chassis
Description 

This command enables the 7750 SR mc-ipsec context.

force-switchover

Syntax 
force-switchover tunnel-group local-group-id [now] [to {master | standby}]
Context 
tools>perform>redundancy>multi-chassis>mc-ipsec
Description 

This command manually switches over the 7750 SR mc-ipsec mastership of specified tunnel-group.

Parameters 
local-group-id—
Specifies the local tunnel-group id configured in the config>redundancy>multi-chassis>peer>mc-ipsec context.
now—
This optional parameter removes the prompt of confirmation.
to {master | standby}—
specifies the desired mastership state to be achieved following a forced switch between this tunnel group and its redundant peer. If the target state matches the current state when the switch is attempted, then no switch will occur.

client-db

Syntax 
client-db db-name lookup peer-ip peer-ip-address
client-db db-name lookup idi string-type {fqdn | rfc822} string-value string-value [peer-ip peer-ip-address]
client-db db-name lookup idi address idi-ip-address [peer-ip peer-ip-address]
Context 
tools>perform>ipsec
Description 

This command performs a lookup in the specified client-db by using specified input and displays the matching result.

Sample Output

tools perform ipsec client-db "test" lookup idi string-type rfc822 string-
value client-1@examplebm.com peer-ip  10.10.10.100 
Result              :  Ok
Database            :  test
Criterion - Ike Idi :  RFC822 "client-1@examplebm.com"
Criterion - Peer IP :  10.10.10.100
Matched Record      :  1 "client-1"
Elapsed Time (us)   :  2 
Parameters 
db-name—
Specifies the name of the client-db.
peer-ip peer-ip-address
Specifies the peer’s tunnel IP address as input, either v4 or v6.
string-type—
Specifies the peer’s IDi as input.
Values—
fqdn, rfc822

 

idi-ip-address—
Specifies the peer’s IDi of address type as input, either v4 or v6
string-value string-value
Specifies the value of FQDN or RFC822 IDi.

ike-initiate

Syntax 
ike-initiate tunnel-group-id ipsec-group-id
ike-initiate tunnel-name ipsec-tunnel-name
Context 
tools>perform>ipsec
Description 

This command initiates tunnel setup for the specified LAN-to-LAN tunnel or for all static LAN-to-LAN tunnels in the specified tunnel group. This command initiates tunnel setup regardless of the configuration of the ipsec-responder-only command under the specified tunnel group.

The command only initiates tunnel setup when the tunnel group is in the MC-IPsec master state, or if MC-IPsec is not enabled for the tunnel group. If MC-IPsec is enabled and the tunnel group is not in the master state, the system will abort tunnel setup if MIMP goes down or if mastership changes during the tunnel setup.

Operationally up tunnels are not affected by this command. The system will not try to initiate a tunnel setup if the tunnel’s operation flags are not clear.

The system does not automatically retry tunnel setup if a tunnel setup fails.

Parameters 
ipsec-group-id—
The ID of the tunnel group where all static LAN-to-LAN tunnels are initiated.
ipsec-tunnel-name—
The name of the IPsec tunnel to be initiated.

4.14.2.20. Clear Commands

gateway

Syntax 
gateway name name tunnel ip-address:port [statistics] [saved-key]
gateway name name tunnel ip-address:port
gateway name name [saved-key]
gateway name name tunnel ip-address:port [saved-key]
Context 
clear>ipsec
Description 

This command clears dynamic IPsec tunnel states.

The system will clear the stats counter for the specified tunnel when the statistics parameter option is specified.

The system will clear the saved IKE and ESP keys for the specified tunnel, or for all tunnels on the specified gateway if no tunnel is specified when the saved-key parameter option is specified.

The system will remove the specified tunnel when the statistics or saved-key parameters are not specified.

Parameters 
name—
Specifies the name of the IPsec GW up to 32 characters.
ip-address—
Specifies the IP address and port of the remote peer.
Values—

<ip-address>

ip-address

a.b.c.d

ipv6-address

x:x:x:x:x:x:x:x

x:x:x:x:x:x:d.d.d.d

x - [0 to FFFF]H

d - [0 to 255]D

 

port—
The port of the remote peer.
Values—
0 to 65535

 

statistics
Clears the stats counter.
saved-key
Removes the saved IKE and ESP keys.

lockout

Syntax 
lockout router router-id
lockout router router-id local-gateway-address local-gateway-address
lockout router router-id local-gateway-address local-gateway-address remote ip-address[:port]
Context 
clear>ipsec
Description 

This command clears the lockout state for the specified clients. If remote address information is not specified, the system will clear the lockout state for all clients within the specified routing instance, along with all clients within the specified IPsec gateway if local-gateway-address is specified.

Parameters 
router-id—
The ID of the router where the IPsec gateway is configured.
local-gateway-address—
The IP address of the local IPsec gateway.
ip-address—
The IP address of the remote client.
port—
The port of the remote client.

stats

Syntax 
stats
Context 
clear>ipsec
Description 

This command enables the context to clear IKE statistics.

ike-stats

Syntax 
ike-stats gateway name [dynamic-tunnel ip-address:port]
ike-stats isa mda
ike-stats ipsec-tunnel-name
Context 
clear>ipsec>stats
Description 

This command clears various internal IKE statistics for the specified scope:

  1. per ISA
  2. per static LAN-to-LAN tunnel
  3. per dynamic tunnel

The start time indicates the time of the last reset.

Parameters 
name—
Clears information about the name of the IPsec GW up to 32 characters.
ip-address:port—
Clears information about the IP address and port of the peer for dynamic tunneling.
mda—
Clears information about the specified ISA.
Values—
slot/mda

 

ipsec-tunnel-name—
Clears the name of the static LAN-to-LAN tunnel up to 32 characters.

tunnel

Syntax 
tunnel ipsec-tunnel-name
tunnel ipsec-tunnel-name [saved-key]
tunnel ipsec-tunnel-name [stats] [saved-key]
tunnel isa mda [saved-key]
Context 
clear>ipsec
Description 

This command clears static IPsec tunnel states.

The system will clear the stats counter for the specified tunnel when the stats parameter option is specified.

The system will clear the saved IKE and ESP keys for the specified tunnel, when the saved-key parameter option is specified.

The system will remove the specified tunnel when the stats or saved-key parameters are not specified.

Parameters 
ipsec-tunnel-name—
Specifies the name of the IPsec tunnel up to 32 characters.
saved-key
Removes the saved IKE and ESP keys.
stats
Clears the stats counter.
mda—
Clear all static tunnels terminated on the specified ISA.

4.14.2.21. Admin Commands

display-key

Syntax 
display-key type {ike | esp} gateway name name dynamic-tunnel ip-address:port
display-key type {ike | esp} tunnel ipsec-tunnel-name
Context 
admin>ipsec
Description 

This command displays existing IKE-SA or CHILD-SA keys..

Note:

This command does not work if config>ipsec>no show-ipsec-keys or no max-history-{esp|ike}-key-records is configured under corresponding ipsec-gw or ipsec-tunnel.

Parameters 
name—
The name, up to 32 characters.
ip-address—
The IP address of the remote client.
Values—

<ip-address>

ip-address

a.b.c.d

ipv6-address

x:x:x:x:x:x:x:x

x:x:x:x:x:x:d.d.d.d

x - [0 to FFFF]H

d - [0 to 255]D

 

port—
The port of the remote client.
Values—
0 to 65535

 

ipsec-tunnel-name—
The IPsec tunnel name, up to 32 characters.
Output 

The following outputs are examples of the admin ipsec display-key command.

Sample Output
admin ipsec display-key type ike gateway name "rw" dynamic-tunnel 11.1.1.100:500  
===============================================================================
IKE-SA history: max-num-records 3 current-num-saved-records 1
                local: 172.16.100.1 remote: 11.1.1.100 
record [0]: established time: 01/25/2018 20:51:55
  Initiator-SPI: d67ac71d73656496 Responder-SPI: d67ac71d73656496  Ike Version: 2
  SK_er: aes128, len: 16, val: a5da1c57f09a7eb7dbe9526cd52e2189
  SK_ar: sha1, len: 20, val: c11797bb8ebe5a1fadf46363bf5e763552bb45d0
  SK_ei: aes128, len: 16, val: 467124009cc577a8b23882a81ab9df70
  SK_ai: sha1, len: 20, val: 7dfef89bad31cb72d1ca8da2c04a9521993c7f9
Sample Output
admin ipsec display-key type esp gateway name "rw" dynamic-tunnel 11.1.1.100:500                              
ESP-SA history: max-num-records 48 current-num-saved-records 2ynamic-tunnel 11.1.1.100:500 
                local: 172.16.100.1 remote: 11.1.1.100 
record [0]: established time: 01/25/2018 20:54:56
  InSpi:  154532(0x00025ba4)
          encr-alg: aes128 len: 16 val: 0xd26aa32d8bd328b1e8332fa5c7b5eeaa
          auth-alg: sha1 len: 20 val: 0x0b37ddb824a43921d3b0ee81a6910eed065a9845
  OutSpi: 3286259439(0xc3e056ef)
          encr-alg: aes128 len: 16 val: 0x3acd95376ce04fcded2e0c80cc4289cf
          alg: sha1 len: 20 val: 0x9f5a46b5cdc572972b44cdbd36b5f824ab060634
record [1]: established time: 01/25/2018 20:51:55
  InSpi:  261186(0x0003fc42)
          encr-alg: aes128 len: 16 val: 0x8bf97675d37de3e3f6e634e3e11fc3aa
          auth-alg: sha1 len: 20 val: 0xf10c0f0821488cc14f8715cc323441fc967a79dd
  OutSpi: 3246917342(0xc18806de)
          encr-alg: aes128 len: 16 val: 0xf36aaaa7a3a09734fe4fc6cd0ac9043e
          alg: sha1 len: 20 val: 0x40c13a444e4fb1d42a13812f70b17041ed0f56ee