Verifying the Active Device
Router# show redundancy states
my state = 13 -ACTIVE
peer state = 8 -STANDBY HOT
Mode = Duplex
Unit ID = 0
Split Mode = Disabled
Manual Swact = Enabled
Communications = Up
client count = 7
client_notification_TMR = 30000 milliseconds
keep_alive TMR = 4000 milliseconds
keep_alive count = 0
keep_alive threshold = 7
RF debug mask = 0x0
Router# show crypto isakmp sa active
dst src state conn-id slot status
209.165.201.3 209.165.200.225 QM_IDLE 5 0 ACTIVE
Router# show crypto ipsec sa active
interface:Ethernet0/0
Crypto map tag:to-peer-outside, local addr 209.165.201.3
protected vrf:(none)
local ident (addr/mask/prot/port):(192.168.0.1/255.255.255.255/0/0)
remote ident (addr/mask/prot/port):(172.16.0.1/255.255.255.255/0/0)
current_peer 209.165.200.225 port 500
PERMIT, flags={origin_is_acl,}
#pkts encaps:3, #pkts encrypt:3, #pkts digest:3
#pkts decaps:4, #pkts decrypt:4, #pkts verify:4
#pkts compressed:0, #pkts decompressed:0
#pkts not compressed:0, #pkts compr. failed:0
#pkts not decompressed:0, #pkts decompress failed:0
#send errors 0, #recv errors 0
local crypto endpt.:209.165.201.3, remote crypto endpt.:209.165.200.225
path mtu 1500, media mtu 1500
current outbound spi:0xD42904F0(3559458032)
inbound esp sas:
spi:0xD3E9ABD0(3555306448)
transform:esp-aes ,
in use settings ={Tunnel, }
conn id:2006, flow_id:6, crypto map:to-peer-outside
sa timing:remaining key lifetime (k/sec):(4586265/3542)
HA last key lifetime sent(k):(4586267)
ike_cookies:9263635C CA4B4E99 C14E908E 8EE2D79C
IV size:16 bytes
replay detection support:Y
Status:ACTIVE
inbound ah sas:
spi: 0xF3EE3620(4092474912)
transform: ah-sha-hmac ,
in use settings ={Tunnel, }
conn id: 2006, flow_id: 6, crypto map: to-peer-outside
sa timing: remaining key lifetime (k/sec): (4586265/3542)
HA last key lifetime sent(k): (4586267)
ike_cookies: 9263635C CA4B4E99 C14E908E 8EE2D79C
replay detection support: Y
Status: ACTIVE
inbound pcp sas:
outbound esp sas:
spi: 0xD42904F0(3559458032)
transform: esp-aes ,
in use settings ={Tunnel, }
conn id: 2009, flow_id: 9, crypto map: to-peer-outside
sa timing: remaining key lifetime (k/sec): (4586266/3542)
HA last key lifetime sent(k): (4586267)
ike_cookies: 9263635C CA4B4E99 C14E908E 8EE2D79C
IV size: 16 bytes
replay detection support: Y
Status: ACTIVE
outbound ah sas:
spi: 0x75251086(1965363334)
transform: ah-sha-hmac ,
in use settings ={Tunnel, }
conn id: 2009, flow_id: 9, crypto map: to-peer-outside
sa timing: remaining key lifetime (k/sec): (4586266/3542)
HA last key lifetime sent(k): (4586267)
ike_cookies: 9263635C CA4B4E99 C14E908E 8EE2D79C
replay detection support: Y
Status: ACTIVE
outbound pcp sas:
Router# show crypto session active
Crypto session current status
Interface: Ethernet0/0
Session status: UP-ACTIVE
Peer: 209.165.200.225 port 500
IKE SA: local 209.165.201.3/500 remote 209.165.200.225/500 Active
IKE SA: local 209.165.201.3/500 remote 209.165.200.225/500 Active
IPSEC FLOW: permit ip host 192.168.0.1 host 172.16.0.1
Active SAs: 4, origin: crypto map
Router# show crypto ha
IKE VIP: 209.165.201.3
stamp: 74 BA 70 27 9C 4F 7F 81 3A 70 13 C9 65 22 E7 76
IPSec VIP: 209.165.201.3
IPSec VIP: 255.255.255.253
IPSec VIP: 255.255.255.254
Verifying the Standby Device
Router# show redundancy states
my state = 8 -STANDBY HOT
peer state = 13 -ACTIVE
Mode = Duplex
Unit ID = 0
Split Mode = Disabled
Manual Swact = Enabled
Communications = Up
client count = 7
client_notification_TMR = 30000 milliseconds
keep_alive TMR = 4000 milliseconds
keep_alive count = 1
keep_alive threshold = 7
RF debug mask = 0x0
Router# show crypto isakmp sa standby
dst src state conn-id slot status
209.165.201.3 209.165.200.225 QM_IDLE 5 0 STDBY
Router# show crypto ipsec sa standby
interface:Ethernet0/0
Crypto map tag:to-peer-outside, local addr 209.165.201.3
protected vrf:(none)
local ident (addr/mask/prot/port):(192.168.0.1/255.255.255.255/0/0)
remote ident (addr/mask/prot/port):(172.16.0.1/255.255.255.255/0/0)
current_peer 209.165.200.225 port 500
PERMIT, flags={origin_is_acl,}
#pkts encaps:0, #pkts encrypt:0, #pkts digest:0
#pkts decaps:0, #pkts decrypt:0, #pkts verify:0
#pkts compressed:0, #pkts decompressed:0
#pkts not compressed:0, #pkts compr. failed:0
#pkts not decompressed:0, #pkts decompress failed:0
#send errors 0, #recv errors 0
local crypto endpt.:209.165.201.3, remote crypto endpt.:209.165.200.225
path mtu 1500, media mtu 1500
current outbound spi:0xD42904F0(3559458032)
inbound esp sas:
spi:0xD3E9ABD0(3555306448)
transform:esp-aes ,
in use settings ={Tunnel, }
conn id:2012, flow_id:12, crypto map:to-peer-outside
sa timing:remaining key lifetime (k/sec):(4441561/3486)
HA last key lifetime sent(k):(4441561)
ike_cookies:00000000 00000000 00000000 00000000
IV size:16 bytes
replay detection support:Y
Status:STANDBY
inbound ah sas:
spi:0xF3EE3620(4092474912)
transform:ah-sha-hmac ,
in use settings ={Tunnel, }
conn id:2012, flow_id:12, crypto map:to-peer-outside
sa timing:remaining key lifetime (k/sec):(4441561/3486)
HA last key lifetime sent(k):(4441561)
ike_cookies:00000000 00000000 00000000 00000000
replay detection support:Y
Status:STANDBY
inbound pcp sas:
outbound esp sas:
spi:0xD42904F0(3559458032)
transform:esp-aes ,
in use settings ={Tunnel, }
conn id:2011, flow_id:11, crypto map:to-peer-outside
sa timing:remaining key lifetime (k/sec):(4441561/3485)
HA last key lifetime sent(k):(4441561)
ike_cookies:00000000 00000000 00000000 00000000
IV size:16 bytes
replay detection support:Y
Status:STANDBY
outbound ah sas:
spi:0x75251086(1965363334)
transform:ah-sha-hmac ,
in use settings ={Tunnel, }
conn id:2011, flow_id:11, crypto map:to-peer-outside
sa timing:remaining key lifetime (k/sec):(4441561/3485)
HA last key lifetime sent(k):(4441561)
ike_cookies:00000000 00000000 00000000 00000000
replay detection support:Y
Status:STANDBY
outbound pcp sas:
Router# show crypto session standby
Crypto session current status
Interface:Ethernet0/0
Session status:UP-STANDBY
Peer:209.165.200.225 port 500
IKE SA:local 209.165.201.3/500 remote 209.165.200.225/500 Active
IPSEC FLOW:permit ip host 192.168.0.1 host 172.16.0.1
Active SAs:4, origin:crypto map
Router# show crypto ha
IKE VIP:209.165.201.3
stamp:74 BA 70 27 9C 4F 7F 81 3A 70 13 C9 65 22 E7 76
IPSec VIP:209.165.201.3
IPSec VIP:255.255.255.253
IPSec VIP:255.255.255.254
ha-R2#
Verifying the Active and Standby SAs
The following sample output shows SAs of both the active and standby devices:
Router# show crypto isakmp sa
dst src state conn-id slot status
209.165.201.3 209.165.200.225 QM_IDLE 2 0 STDBY
10.0.0.1 10.0.0.2 QM_IDLE 1 0 ACTIVE