Table 25: show security ike sa Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198
Table 26: show security ike sa detail Output Fields . . . . . . . . . . . . . . . . . . . . . . . 199
Table 27: show security ike active-peer Output Fields . . . . . . . . . . . . . . . . . . . . . 203
Table 28: show security ipsec sa Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . 204
Table 29: show security ipsec sa detail Output Fields . . . . . . . . . . . . . . . . . . . . . 205
Table 30: show security ipsec statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208
Table 31: show security ipsec inactive-tunnels Output Fields . . . . . . . . . . . . . . . . 210
Copyright © 2017, Juniper Networks, Inc.xii
JDM User Guide for NFX250 Network Services Platform