J-series™ Services Router Administration Guide

Table 74: Summary of Key IPSec Output Fields (continued)

Field

Values

Exchange Type

Type of IKE exchange. The IKE exchange type determines the number of messages in the exchange

 

and the payload types contained in each message. Each exchange type provides a particular set of

 

security services, such as anonymity of the participants, perfect forward secrecy of the keying

 

material, and authentication of the participants. J-series Services Routers support the following types

 

of IKE exchanges:

 

Main—IKE exchange is done with six messages. The Main exchange type encrypts the payload,

 

protecting the identity of the neighbor.

 

Aggressive—IKE exchange is done with three messages. The Aggressive exchange type does not

 

encrypt the payload, leaving the identity of the neighbor unprotected.

Role

Role of the router in the IKE exchange: Initiator or Responder.

Authentication Method

Method used for IKE authentication. The type of authentication determines which payloads are

 

exchanged and when they are exchanged. J-series Services Routers support only the pre-shared keys

 

authentication type.

Local Address

Prefix and port number of the local tunnel endpoint.

Remote Address

Prefix and port number of the remote tunnel endpoint.

Lifetime

Number of seconds remaining until the IKE security association expires.

Algorithm

Type of authentication algorithm used for the security association: md5 or sha1.

Authentication

 

Algorithm Encryption

Type of encryption algorithm used for the security association: des-cbc, 3des-cbc, or None.

Algorithm PRF

The pseudorandom function that generates highly unpredictable random numbers: hmac-md5or

 

hmac-sha1.

Input Bytes

Number of bytes received on the IKE security association.

Output Bytes

Number of bytes transmitted on the IKE security association.

Input Packets

Number of packets received on the IKE security association.

Output Packets

Number of packets transmitted on the IKE security association.

IPSec Security

Number of IPSec security associations that have been created and deleted on the router. Only security

Associations

associations whose negotiations are complete are listed. When a security association is taken down,

 

it is listed as a deleted security association.

Phase 2 Negotiations

Number of phase 2 IKE negotiations in progress.

in Progress

 

Monitoring NAT Pools

NAT pool information includes information about the address ranges configured within the pool on the Services Router. To view NAT pool information, select Monitor>NAT in the J-Web interface, or enter the following CLI show command:

142Using the Monitoring Tools

Page 164
Image 164
Juniper Networks J-Series manual Monitoring NAT Pools, Hmac-sha1