Monitoring Nat Pools - Juniper J-Series Administration Manual

Juniper networks router administration guide
Hide thumbs Also See for J-Series:
Table of Contents

Advertisement

J-series
Services Router Administration Guide
Table 74: Summary of Key IPSec Output Fields (continued)
Field
Values
Exchange Type
Type of IKE exchange. The IKE exchange type determines the number of messages in the exchange
and the payload types contained in each message. Each exchange type provides a particular set of
security services, such as anonymity of the participants, perfect forward secrecy of the keying
material, and authentication of the participants. J-series Services Routers support the following types
of IKE exchanges:
Role
Role of the router in the IKE exchange:
Authentication Method
Method used for IKE authentication. The type of authentication determines which payloads are
exchanged and when they are exchanged. J-series Services Routers support only the
authentication type.
Local Address
Prefix and port number of the local tunnel endpoint.
Remote Address
Prefix and port number of the remote tunnel endpoint.
Lifetime
Number of seconds remaining until the IKE security association expires.
Algorithm
Type of authentication algorithm used for the security association:
Authentication
Algorithm Encryption
Type of encryption algorithm used for the security association:
Algorithm PRF
The pseudorandom function that generates highly unpredictable random numbers:
hmac-sha1
Input Bytes
Number of bytes received on the IKE security association.
Output Bytes
Number of bytes transmitted on the IKE security association.
Input Packets
Number of packets received on the IKE security association.
Output Packets
Number of packets transmitted on the IKE security association.
IPSec Security
Number of IPSec security associations that have been created and deleted on the router. Only security
Associations
associations whose negotiations are complete are listed. When a security association is taken down,
it is listed as a deleted security association.
Phase 2 Negotiations
Number of phase 2 IKE negotiations in progress.
in Progress

Monitoring NAT Pools

NAT pool information includes information about the address ranges configured
within the pool on the Services Router. To view NAT pool information, select
Monitor>NAT in the J-Web interface, or enter the following CLI
142
Using the Monitoring Tools
—IKE exchange is done with six messages. The
Main
protecting the identity of the neighbor.
Aggressive
—IKE exchange is done with three messages. The
encrypt the payload, leaving the identity of the neighbor unprotected.
.
exchange type encrypts the payload,
Main
Aggressive
or
.
Initiator
Responder
md5
des-cbc
exchange type does not
pre-shared keys
or
.
sha1
,
3des-cbc
, or
None
.
or
hmac-md5
show
command:

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents