565
Field
Description
Auth verify method
Verification method that the IKEv2 proposal uses in
authentication.
Integrity algorithm
Integrity protection algorithms that the IKEv2 proposal uses.
PRF algorithm
PRF algorithms that the IKEv2 proposal uses.
Encryption algorithm
Encryption algorithms that the IKEv2 proposal uses.
Life duration
Lifetime of the IKEv2 SA, in seconds.
Remaining key duration
Remaining lifetime of the IKEv2 SA, in seconds.
Diffie-Hellman group
DH groups used in IKEv2 key negotiation.
NAT traversal
Whether a NAT gateway is detected between the local and
remote ends.
DPD
DPD settings:
•
Detection interval in seconds.
•
Retry interval in seconds.
If DPD is disabled, this field displays
Disabled
.
Transmitting entity
Role of the local end in IKEv2 negotiation, initiator or
responder.
Local window
Window size that the local end uses.
Remote window
Window size that the remote end uses.
Local request message ID
ID of the request message that the local end is about to send.
Remote request message ID
ID of the request message that the remote end is about to
send.
Local next message ID
ID of the message that the local end expects to receive.
Remote next message ID
ID of the message that the remote end expects to receive.
Pushed IP address
IP address pushed to the local end by the remote end.
Assigned IP address
IP address assigned to the remote end by the local end .
# Display the number of IKEv2 SAs.
[Sysname] display ikev2 sa count
IKEv2 SAs count: 0
display ikev2 statistics
Use
display ikev2 statistics
to display IKEv2 statistics.
Syntax
display ikev2 statistics
Views
Any view
Predefined user roles
network-admin
network-operator
Summary of Contents for FlexNetwork MSR Series
Page 1005: ...987 ...