Usage Scenario
You can run the display ipsec sa command to check whether the SA configurations for outgoing protocol packets on the local end are identical with those for incoming protocol packets on the peer end. The display ipsec sa command output displays the following information:
The actual command output varies according to the device. The command output here is only an example.
<HUAWEI> display ipsec sa brief
Total Manual IP security association number: 1
IP security association name: 11
current IPsec sa number: 2
-------------------------------------------------------------------------------------------
Src Address Dst Address SPI Protocol Algorithm VPN
-------------------------------------------------------------------------------------------
10.1.1.1 10.1.1.2 852978435 ESP E:AES A:SHA2-256-128 -
10.1.1.2 10.1.1.1 195316743 ESP E:AES A:SHA2-256-128 -
<HUAWEI> disp ipsec sa 2021-07-23 11:24:18.392 IKE IP Security Association : ================================== IPsec SA Information for Slot : 1 ================================== =============================== Interface: Tunnel1015 =============================== ----------------------------- IPsec policy name: "client_1015" sequence number: 1 instance id: 0 mode: isakmp vpn: ipsec_tunnel_1015 ext: - ----------------------------- connection id: 48467 rule number: 5 encapsulation mode: tunnel tunnel local: 10.16.4.247 tunnel remote: 10.16.1.1 flow source: 10.16.4.247/255.255.255.255 0-65535 0 0xFF flow destination: 10.16.1.1/255.255.255.255 0-65535 0 0xFF input/output security packets: 4810242/1603626 input/output security kilobytes: 582490/194189 input/output bandwidth limit drop packets: 0/0 input/output bandwidth limit drop kilobytes: 0/0 [inbound ESP SAs] establish: 2021-07-22 21:27:46 spi: 1750602558 (0x6858133e) vpn: ipsec_tunnel_1015 said: 41647 proposal: ESP-ENCRYPT-256-AES ESP-AUTH-SHA2-256 sa remaining key duration (kilobytes/sec): --/554608 max received sequence-number: 4810242 udp encapsulation used for nat traversal: N [outbound ESP SAs] establish: 2021-07-22 21:27:46 spi: 1843820463 (0x6de677af) vpn: ipsec_tunnel_1015 said: 41648 proposal: ESP-ENCRYPT-256-AES ESP-AUTH-SHA2-256 sa remaining key duration (kilobytes/sec): --/554608 max sent sequence-number: 1603626 udp encapsulation used for nat traversal: N
Item | Description |
---|---|
sa remaining key duration (kilobytes/sec) | Rekey Lifetime. |
Total Manual IP security association number | Number of all manual IPsec SAs. |
IP security association name | Name of a manual IPsec SA. |
current IPsec sa number | Number of automatic IPsec SAs. |
IPsec SA Information for Slot | IPsec SA information of a specified board. |
IPsec policy name | Name of the IPSec policy used by an SA. |
Src Address | Source IP address. |
Dst Address | Destination IP address. |
SPI | Stateful packet inspection. |
Protocol Algorithm | Protocol algorithm. |
VPN | VPN. |
sequence number | Sequence number of the security policy. |
instance id | Instance ID. |
connection id | Connection ID. |
rule number | Security ACL rule ID. |
encapsulation mode | Encapsulation mode. |
tunnel local | Local tunnel address. |
tunnel remote | IP address of the peer tunnel. |
flow source | Source flow characteristics, including the IP address, port number, protocol number, and DSCP. |
flow destination | Destination flow characteristics, including the IP address, port number, protocol number, and DSCP. |
input/output security packets | Number of incoming or outgoing encrypted packets. |
input/output security kilobytes | Number of bytes in inbound or outbound encrypted packets. |
input/output bandwidth limit drop packets | Number of packets discarded in the inbound or outbound direction due to rate limiting. |
input/output bandwidth limit drop kilobytes | Number of bytes discarded in the inbound or outbound direction due to rate limiting. |
inbound ESP SAs | ESP SA information in the inbound direction. |
max received sequence-number | Maximum receiving sequence number. |
max sent sequence-number | Maximum sending sequence number. |
udp encapsulation used for nat traversal | UDP encapsulation during NAT traversal. |
outbound ESP SAs | SA parameters in the outbound direction. |
Interface | Interface to which the IPSec policy is bound. |
mode | Policy mode: isakmp: automatic mode. dynatemplate: template mode. |
vpn | Ciphertext VPN instance. |
ext | Additional information about the IPSec SA. |
establish | Time when the SA is generated. |
spi | Security Parameter Index (SPI). |
said | SA Index. |
proposal | Proposal. |