Task: IPsec (v6.8.0) ================================================== Category: Security Description: IKE configuration and IPsec tunnels state New: No | IPv6: No Vendor Support: ✓ aws@ec2 ✗ alcatel@aos ✓ azure ✗ brocade@fastiron ✓ cisco@ios ✓ cisco@ios-xe ✗ cisco@nx-os ✗ cisco@ios-xr ✓ cisco@asa ○ cisco@wlc-air ○ cisco@sg ✗ cisco@ftd ○ cisco@aci ✗ cisco@meraki ✓ cisco@viptela ○ cisco@apic ✗ cisco@encs ○ dell@ftos ○ dell@powerconnect ○ dell@os10 ✗ fs@fsos ✓ gcp ✗ hp@comware ○ hp@aruba ○ hp@arubasw ✗ hp@arubacx ○ hp@3com ○ hp@aruba-iap ○ riverbed@steelhead ✓ fortinet@fortigate ✗ fortinet@fortiswitch ✓ forcepoint@ngfw ✓ paloalto@pan-os ✗ paloalto@prisma ✓ juniper@junos ○ juniper@mist ✗ checkpoint@gaia ✗ checkpoint@gaia-embedded ○ extreme@boss ○ extreme@enterasys ○ extreme@voss ○ extreme@exos ○ arista@eos ○ f5@big-ip ✗ huawei@vrp ✓ mikrotik@routeros ○ quagga ○ frr ✓ versa@vos ○ silverpeak@unity ✗ vmware@nsx-t ✗ ruckus@vsz ✗ opengear@im ✗ stormshield@sn ✗ nokia@timos ✗ citrix@adc CLI Commands: mikrotik@routeros: /ip ipsec identity print detail fortinet@fortigate: diagnose vpn ike gateway list fortinet@fortigate: get system status mikrotik@routeros: /ip/dns/cache/print detail mikrotik@routeros: /ip dns cache print detail mikrotik@routeros: /ip address print detail mikrotik@routeros: /ip ipsec proposal print detail mikrotik@routeros: /ip ipsec profile print detail mikrotik@routeros: /ip ipsec installed-sa print detail fortinet@fortigate: diagnose vpn tunnel list mikrotik@routeros: /ip ipsec policy print detail mikrotik@routeros: /ip ipsec active-peer print detail mikrotik@routeros: /ip ipsec peer print detail paloalto@pan-os: show inteface all paloalto@pan-os: show interface paloalto@pan-os: show vpn tunnel paloalto@pan-os: show vpn ipsec-sa paloalto@pan-os: show vpn ike-sa forcepoint@ngfw: GET /elements/gateway_profile/ versa@vos: GET /vnms/dashboard/appliance//live?command=interfaces?deep versa@vos: GET /vnms/dashboard/appliance//live?command=orgs/org-services//ipsec/vpn-profile?deep forcepoint@ngfw: GET /elements/mgt_server/ forcepoint@ngfw: GET /elements/external_gateway//external_endpoint/ forcepoint@ngfw: GET /elements/external_gateway/ forcepoint@ngfw: POST /monitoring_status forcepoint@ngfw: GET /elements/rbvpn_tunnel/ forcepoint@ngfw: GET /elements/[single_fw|virtual_fw|fw_cluster]//internal_gateway//internal_endpoint/ paloalto@pan-os: show vpn gateway forcepoint@ngfw: GET /elements/[single_fw|virtual_fw|fw_cluster]//internal_gateway/ forcepoint@ngfw: GET /elements/[single_fw|virtual_fw|fw_cluster]/ forcepoint@ngfw: GET /elements forcepoint@ngfw: ip -s -s -d link forcepoint@ngfw: sg-status -l fortinet@fortigate: show vpn ipsec phase1-interface fortinet@fortigate: show vpn ipsec phase1 azure: GET /vpnGateways//vpnConnection//vpnLinkConnections//getikesas cisco@ios-xe: show crypto ipsec sa cisco@ios-xe: show crypto ikev2 sa detailed cisco@ios-xe: show crypto isakmp sa detail cisco@ios: show interfaces cisco@ios: show crypto ipsec sa cisco@ios: show crypto ikev2 sa detailed cisco@ios: show crypto isakmp sa detail azure: GET /vpnSites cisco@ios-xe: show interfaces azure: GET /vpnGateways azure: GET /virtualNetworkGateways azure: GET /virtualNetworks azure: GET /publicIPAddresses azure: GET /localNetworkGateways azure: GET /connections//getikesas azure: GET /connections aws@ec2: SDK ec2:DescribeVpnConnectionsCommand gcp: GET /compute/v1/projects//global/networks paloalto@pan-os: show vpn flow tunnel-id juniper@junos: show configuration | display set | except "^deactivate" juniper@junos: show security ipsec security-associations detail juniper@junos: show security ike security-associations detail gcp: GET /compute/v1/projects//aggregated/vpnTunnels gcp: GET /compute/v1/projects//aggregated/vpnGateways gcp: GET /compute/v1/projects//aggregated/targetVpnGateways gcp: GET /compute/v1/projects//aggregated/forwardingRules aws@ec2: SDK ec2:DescribeCustomerGatewaysCommand cisco@viptela: GET /dataservice/device/interface?deviceId= cisco@viptela: GET /dataservice/device/ipsec/ike/outbound?deviceId= cisco@viptela: GET /dataservice/device/ipsec/ike/sessions?deviceId= cisco@asa: show interfaces detail cisco@asa: show crypto ipsec sa cisco@asa: show crypto isakmp sa detail cisco@ios-xe: show run | inc qos queue-stats-frame-count Legend: ✓=Full, ✗=Not Yet, ○=N/A