EasyManua.ls Logo

Juniper NFX250 - Page 218

Juniper NFX250
230 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Table 26: show security ike sa detail Output Fields (continued)
Field DescriptionField Name
Enabled means that both the IKEv2 initiator and responder support message
fragmentation and have negotiated the support during the IKE_SA_INIT message
exchange.
Size shows the maximum size of an IKEv2 message before it is fragmented.
IKE Fragmentation
Information of the remote access client.Remote Access Client Info
ID of the IKE peer.Peer ike-id
Algorithms
Types of authentication algorithm used to encrypt and secure exchanges between the
peers during the IPsec Phase 2 process:
sha1 Secure Hash Algorithm 1 authentication.
md5 - MD5 authentication.
sha-256 - Secure Hash Algorithm 256 authentication.
sha-384 - Secure Hash Algorithm 384 authentication.
Authentication
Types of encryption algorithm used to encrypt and secure exchanges between the peers
during the IPsec Phase 2 process:
aes-256-cbc - Advanced Encryption Standard (AES) 256-bit encryption.
aes-192-cbc - AES192-bit encryption.
aes-128-cbc - AES 128-bit encryption.
3des-cbc - 3 Data Encryption Standard (DES) encryption.
des-cbc - DES encryption.
Encryption
Specifies the IKE Diffie-Hellman group.Diffie-Hellman group
Traffic Statistics
Number of bytes received.Input bytes
Number of bytes transmitted.Output bytes
Number of packets received.Input packets
Number of packets transmitted.Output packets
Number of IKEv2 fragmented packets received.Input fragmentated packets
Number of IKEv2 fragmented packets transmitted.Output fragmentated packets
number created: The number of SAs created.
number deleted: The number of SAs deleted.
IPSec security associations
Copyright © 2017, Juniper Networks, Inc.200
JDM User Guide for NFX250 Network Services Platform

Table of Contents

Other manuals for Juniper NFX250

Related product manuals