Step 1 |
show
mgcp
Use this command to display the state of the mgcp package-capability srtp-package and mgcp validate call-agent source-ipaddr commands.
Router# show mgcp
MGCP Admin State ACTIVE, Oper State ACTIVE - Cause Code NONE
MGCP call-agent: 10.7.0.200 Initial protocol service is MGCP 0.1
The following line shows that call-agent validation is enabled:
MGCP validate call-agent source-ipaddr ENABLED
MGCP block-newcalls DISABLED
MGCP send SGCP RSIP: forced/restart/graceful/disconnected DISABLED
MGCP quarantine mode discard/step
MGCP quarantine of persistent events is ENABLED
MGCP dtmf-relay for VoIP disabled for all codec types
MGCP dtmf-relay for VoAAL2 disabled for all codec types
MGCP voip modem passthrough disabled
MGCP voaal2 modem passthrough disabled
MGCP voip modem relay: Disabled.
MGCP TSE payload: 100
MGCP T.38 Named Signalling Event (NSE) response timer: 200
MGCP Network (IP/AAL2) Continuity Test timer: 200
MGCP 'RTP stream loss' timer disabled
MGCP request timeout 500
MGCP maximum exponential request timeout 4000
MGCP gateway port: 2427, MGCP maximum waiting delay 3000
MGCP restart delay 0, MGCP vad DISABLED
MGCP rtrcac DISABLED
MGCP system resource check DISABLED
MGCP xpc-codec: DISABLED, MGCP persistent hookflash: DISABLED
MGCP persistent offhook: ENABLED, MGCP persistent onhook: ENABLED
MGCP piggyback msg DISABLED, MGCP endpoint offset DISABLED
MGCP simple-sdp ENABLED
MGCP undotted-notation DISABLED
MGCP codec type g711ulaw, MGCP packetization period 20
MGCP JB threshold lwm 30, MGCP JB threshold hwm 150
MGCP LAT threshold lwm 150, MGCP LAT threshold hwm 300
MGCP PL threshold lwm 1000, MGCP PL threshold hwm 10000
MGCP CL threshold lwm 1000, MGCP CL threshold hwm 10000
MGCP playout mode is adaptive 60, 4, 200 in msec
MGCP Fax Playout Buffer is 300 in msec
MGCP media (RTP) dscp: ef, MGCP signaling dscp: af31
MGCP default package: line-package
The following lines show that the srtp-package command is enabled:
MGCP supported packages: gm-package dtmf-package mf-package trunk-package
line-package ms-package dt-package mo-package mt-package
sst-package fxr-package srtp-package
MGCP Digit Map matching order: shortest match
SGCP Digit Map matching order: always left-to-right
MGCP VoAAL2 ignore-lco-codec DISABLED
MGCP T.38 Fax is ENABLED
MGCP T.38 Fax ECM is ENABLED
MGCP T.38 Fax NSF Override is DISABLED
MGCP T.38 Fax Low Speed Redundancy: 0MGCP T.38 Fax High Speed Redundancy: 0
MGCP control bound to interface FastEthernet0/0
MGCP media bind :DISABLED
MGCP Upspeed payload type for G711ulaw: 0, G711alaw: 8
MGCP Dynamic payload type for G.726-16K codec
MGCP Dynamic payload type for G.726-24K codec
MGCP Dynamic payload type for G.Clear codec
|
Step 2 |
show
mgcp
connection
Use this command to display information on active connections, including the encryption suite.
Router# show mgcp connection
Endpoint Call_ID(C) Conn_ID(I) (P)ort (M)ode (S)tate (CO)dec (E)vent[SIFL] (R)esult[EA] Encryption(K)
The following line shows that encryption status is enabled, K=1.
1. S1/DS1-0/1 C=2,1,2 I=0x2 P=18204,0 M=2 S=4,4 CO=1 E=0,0,0,0 R=0,0 K=1
|
Step 3 |
show
mgcp
srtp
{summary | detail [endpoint ]}
Use this command to display SRTP connections and validate master keys and salts for endpoints.
Router# show mgcp srtp summary
MGCP SRTP Connection Summary
Endpoint Conn Id Crypto Suite
aaln/S3/SU0/0 8 AES_CM_128_HMAC_SHA1_32
aaln/S3/SU0/1 9 AES_CM_128_HMAC_SHA1_32
S3/DS1-0/1 6 AES_CM_128_HMAC_SHA1_32
S3/DS1-0/2 7 AES_CM_128_HMAC_SHA1_32
4 SRTP connections active
Router# show mgcp srtp detail
MGCP SRTP Connection Detail for Endpoint *
Definitions: CS=Crypto Suite, KS=HASHED Master Key/Salt, SSRC=Syncronization Source, ROC=Rollover Counter, KDR=Key Derivation Rate, SEQ=Sequence Number, FEC=FEC Order, MLT=Master Key Lifetime, MKI=Master Key Index:MKI Size
Endpoint aaln/S3/SU0/0 Call ID 2 Conn ID 8
Tx:CS=AES_CM_128_HMAC_SHA1_32 KS=3NaOYXS9dLoYDaBHpzRejREfhf0= SSRC=Random ROC=0 KDR=1 SEQ=Random FEC=FEC->SRTP MLT=0x80000000 MKI=0:0
Rx:CS=AES_CM_128_HMAC_SHA1_32 KS=llYCQoqxtxtdf7ECe+x+DK+G9v4= SSRC=Random ROC=0 KDR=1 SEQ=Random FEC=FEC->SRTP MLT=0x80000000 MKI=0:0
Endpoint aaln/S3/SU0/1 Call ID 101 Conn ID 9
Tx:CS=AES_CM_128_HMAC_SHA1_32 KS=llYCQoqxtxtdf7ECe+x+DK+G9v4= SSRC=Random ROC=0 KDR=1 SEQ=Random FEC=FEC->SRTP MLT=0x80000000 MKI=0:0
Rx:Not Configured
Endpoint S3/DS1-0/1 Call ID 1 Conn ID 6
Tx:CS=AES_CM_128_HMAC_SHA1_32 KS=3NaOYXS9dLoYDaBHpzRejREfhf0= SSRC=Random ROC=0 KDR=1 SEQ=Random FEC=FEC->SRTP MLT=0x80000000 MKI=0:0
Rx:CS=AES_CM_128_HMAC_SHA1_32 KS=llYCQoqxtxtdf7ECe+x+DK+G9v4= SSRC=Random ROC=0 KDR=1 SEQ=Random FEC=FEC->SRTP MLT=0x80000000 MKI=0:0
Endpoint S3/DS1-0/2 Call ID 100 Conn ID 7
Tx:CS=AES_CM_128_HMAC_SHA1_32 KS=llYCQoqxtxtdf7ECe+x+DK+G9v4= SSRC=Random ROC=0 KDR=1 SEQ=Random FEC=FEC->SRTP MLT=0x80000000 MKI=0:0
Rx:Not Configured
4 SRTP connections displayed
Router# show mgcp srtp detail S3/DS1-0/*
MGCP SRTP Connection Detail for Endpoint S3/DS1-0/*
Definitions: CS=Crypto Suite, KS=HASHED Master Key/Salt, SSRC=Syncronization Source, ROC=Rollover Counter, KDR=Key Derivation Rate, SEQ=Sequence Number, FEC=FEC Order, MLT=Master Key Lifetime, MKI=Master Key Index:MKI Size
The following lines allow you to compare and validate a hashed version of the master key and salt, as indicated by the KS
field, without the display revealing the actual master key and salt.
Endpoint S3/DS1-0/1 Call ID 1 Conn ID 6
Tx:CS=AES_CM_128_HMAC_SHA1_32 KS=3NaOYXS9dLoYDaBHpzRejREfhf0= SSRC=Random ROC=0 KDR=1 SEQ=Random FEC=FEC->SRTP MLT=0x80000000 MKI=0:0
Rx:CS=AES_CM_128_HMAC_SHA1_32 KS=llYCQoqxtxtdf7ECe+x+DK+G9v4= SSRC=Random ROC=0 KDR=1 SEQ=Random FEC=FEC->SRTP MLT=0x80000000 MKI=0:0
Endpoint S3/DS1-0/2 Call ID 100 Conn ID 7
Tx:CS=AES_CM_128_HMAC_SHA1_32 KS=llYCQoqxtxtdf7ECe+x+DK+G9v4= SSRC=Random ROC=0 KDR=1 SEQ=Random FEC=FEC->SRTP MLT=0x80000000 MKI=0:0
Rx:Not Configured
2 SRTP connections displayed
|
Step 4 |
show
mgcp
statistics
Use this command to display statistics, including dropped packets from unconfigured call agents.
Router# show mgcp statistics
UDP pkts rx 0, tx 0
Unrecognized rx pkts 0, MGCP message parsing errors 0
Duplicate MGCP ack tx 0, Invalid versions count 0
The following line shows the number of dropped packets from unconfigured call agents.
rx pkts from unknown Call Agent 0
CreateConn rx 0, successful 0, failed 0
DeleteConn rx 0, successful 0, failed 0
ModifyConn rx 0, successful 0, failed 0
DeleteConn tx 0, successful 0, failed 0
NotifyRequest rx 0, successful 0, failed 0
AuditConnection rx 0, successful 0, failed 0
AuditEndpoint rx 0, successful 0, failed 0
RestartInProgress tx 0, successful 0, failed 0
Notify tx 0, successful 0, failed 0
ACK tx 0, NACK tx 0
ACK rx 0, NACK rx 0
IP address based Call Agents statistics:
No Call Agent message.
System resource check is DISABLED. No available statistic
|
Step 5 |
show
call
active
voice
Use this command to display encryption statistics.
Router# show call active voice
GENERIC: SetupTime=21072 Index=0 PeerAddress= PeerSubAddress= PeerId=0
PeerIfIndex=0 LogicalIfIndex=0 ConnectTime=0 CallState=3 CallSecurity = On CallOrigin=2 ChargedUnits=0
InfoType=0 TransmitPackets=375413 TransmitBytes=7508260 ReceivePackets=377734
ReceiveBytes=7554680
VOIP: ConnectionId[0x19BDF910 0xAF500007 0x0 0x58ED0] RemoteIPAddress=17635075
RemoteUDPPort=16394 RoundTripDelay=0 SelectedQoS=0 SessionProtocol=1
SessionTarget= OnTimeRvPlayout=0 GapFillWithSilence=0 GapFillWithPrediction=600
GapFillWithInterpolation=0 GapFillWithRedundancy=0 HiWaterPlayoutDelay=110
LoWaterPlayoutDelay=64 ReceiveDelay=94 VADEnable=0 CoderTypeRate=0
GENERIC: SetupTime=21072 Index=1 PeerAddress=+14085271001 PeerSubAddress=
PeerId=0 PeerIfIndex=0 LogicalIfIndex=5 ConnectTime=21115 CallState=4 CallOrigin=1
ChargedUnits=0 InfoType=1 TransmitPackets=377915 TransmitBytes=7558300
ReceivePackets=375594 ReceiveBytes=7511880 TotalPacketsEncrypted=375594
The following lines show statistics for encrypted and decrypted packets.
TotalPacketsDecrypted=375594 DecryptionFailurePacketCount=0 TotalPacketsAuthenticated=375594 AuthenticationFailurePacketCount=0 DuplicateReplayPacketCount=0 OutsideWindowReplayPacketCount=0
TELE: ConnectionId=[0x19BDF910 0xAF500007 0x0 0x58ED0] TxDuration=16640
VoiceTxDuration=16640 FaxTxDuration=0 CoderTypeRate=0 NoiseLevel=0 ACOMLevel=4
OutSignalLevel=-440 InSignalLevel=-440 InfoActivity=2 ERLLevel=227
SessionTarget=
|
Step 6 |
show
voice
call
port
Use this command to display SRTP statistics.
Router# show voice call 1/0/0
1/0/0
vtsp level 0 state = S_CONNECTvpm level 1 state = FXSLS_CONNECT
vpm level 0 state = S_UP
calling number , calling name unavailable, calling time 01/08 03:44
c3745_13# ***DSP VOICE TX STATISTICS***
Tx Vox/Fax Pkts: 108616, Tx Sig Pkts: 0, Tx Comfort Pkts: 0
Tx Dur(ms): 2172320, Tx Vox Dur(ms): 2172320, Tx Fax Dur(ms): 0
***DSP VOICE RX STATISTICS***
Rx Vox/Fax Pkts: 108602, Rx Signal Pkts: 0, Rx Comfort Pkts: 0
Rx Dur(ms): 2172320, Rx Vox Dur(ms): 2171990, Rx Fax Dur(ms): 0
Rx Non-seq Pkts: 3, Rx Bad Hdr Pkts: 0
Rx Early Pkts: 0, Rx Late Pkts: 0
***DSP VOICE VP_DELAY STATISTICS***
Clk Offset(ms): -2819596, Rx Delay Est(ms): 65
Rx Delay Lo Water Mark(ms): 65, Rx Delay Hi Water Mark(ms): 65
***DSP VOICE VP_ERROR STATISTICS***
Predict Conceal(ms): 250, Interpolate Conceal(ms): 0
Silence Conceal(ms): 0, Retroact Mem Update(ms): 0
Buf Overflow Discard(ms): 0, Talkspurt Endpoint Detect Err: 0
***DSP LEVELS***
TDM Bus Levels(dBm0): Rx -37.7 from PBX/Phone, Tx -35.5 to PBX/Phone
TDM ACOM Levels(dBm0): +5.0, TDM ERL Level(dBm0): +5.0
TDM Bgd Levels(dBm0): -35.9, with activity being silence
***DSP VOICE ERROR STATISTICS***
Rx Pkt Drops(Invalid Header): 0, Tx Pkt Drops(HPI SAM Overflow): 0
***DSP VOICE SRTP STATISTICS***
The following lines show voice SRTP statistics.
*Jan 8 2004 04:21:01.743 PAT: TotalPacketsEncrypted: 108616 TotalPacketsDecrypted: 108602
DecryptionFailurePacketCount: 0 TotalPacketsAuthenticated: 108602
AuthenticationFailurePacketCount: 0 DuplicateReplayPacketCount: 0
OutsideWindowReplayPacketCount: 0 packetsBadReceivedSSRC: 0
Note
|
When a T.38 fax call (nonsecure) is attempted and the fax call goes through, then switches back to secure voice (SRTP) mode,
output for the show voice call port command displays an authentication failure packet count of 20. This is a normal occurrence and should not affect voice quality.
The authentication failure packet count occurs because the gateways do not switch back to secure voice at the same time; that
is, one side of the call is in SRTP voice mode for a short period of time while the other side is in T.38 fax mode.
|
|
Step 7 |
show
voice
call
status
Use this command to display status of all voice ports.
Router# show voice call status
CallID CID ccVdb Port DSP/Ch Called # Codec Dial-peers
0x5 11DE 0x660B24D0 1/0/0 1/1 g711ulaw 999100/0
0x7 11E1 0x665031A8 1/0:23.-1 1/2 * g729ar8 0/999
0x11 11E4 0x6652B3B4 1/1:1.1 1/3 232222 g729ar8 999/0
3 active calls found
|
Step 8 |
show
voice
call
status
call-id
Use this command to display status of a specific call.
Router# show voice call status 5
Gathering information (10 seconds)...
CallID Port DSP/Ch Codec Rx/Tx En/De ERL/Reflctr Jitter
0x5 1/0/0 1/1 g711ulaw 500/500 500/500 5.0/3 65/0
Router# show voice call status 7
Gathering information (10 seconds)...
CallID Port DSP/Ch Codec Rx/Tx En/De ERL/Reflctr Jitter
0x7 1/0:23.-1 1/2 g729ar8 500/500 500/500 6.0/4 70/0
Router# show voice call status 11
Gathering information (10 seconds)...
CallID Port DSP/Ch Codec Rx/Tx En/De ERL/Reflctr Jitter
0x11 1/1:1.1 1/3 g729ar8 500/500 500/500 7.0/4 70/0
|
Step 9 |
show
voice
dsp
Use this command to display the status of DSP voice channels.
Router# show voice dsp
DSP DSP DSPWARE CURR BOOT PAK TX/RX
TYPE NUM CH CODEC VERSION STATE STATE RST AI VOICEPORT TS ABORT PACK COUNT
==== === == ======== ======= ===== ======= === == ======== === ==== ===========
C549 1 01 {medium} 4.4.3 IDLE idle 0 0 1/0:0 1 0 9357/9775
C549 1 02 {medium} 4.4.3 IDLE idle 0 1/0:0 2 0 0/0
C549 2 01 {medium} 4.4.3 IDLE idle 0 0 1/0:0 3 0 0/0
C549 2 02 {medium} 4.4.3 IDLE idle 0 1/0:0 4 0 0/0
C549 3 01 {medium} 4.4.3 IDLE idle 0 0 1/0:0 5 0 0/13
C549 3 02 {medium} 4.4.3 IDLE idle 0 1/0:0 6 0 0/13
|
Step 10 |
show
rtpspi
call
Use this command to display active SRTP call details.
Router# show rtpspi call
RTP Service Provider info:
No. CallId dstCallId Mode LocalRTP RmtRTP LocalIP RemoteIP SRTP
1 6 5 Snd-Rcv 18662 19392 0xA0A0A0D 0xA0A0A0B 1
2 8 7 Snd-Rcv 18940 16994 0xA0A0A0D 0xA0A0A0B 1
3 16 17 Snd-Rcv 19038 17198 0xA0A0A0D 0xA0A0A0B 1
|
Step 11 |
show
rtpspi
statistics
Use this command to display RTP statistics.
Router# show rtpspi statistics
RTP Statistics info:
No. CallId Xmit-pkts Xmit-bytes Rcvd-pkts Rcvd-bytes Lost pkts Jitter Late
nc
1 6 0x842C 0x54AC30 0x842A 0x54AAE8 0x0 0x41 0x2
2 8 0x52B8 0x7C140 0x52B5 0x7C0F8 0x0 0x46 0x2
3 16 0x2EB0 0x46080 0x2EAF 0x46068 0x0 0x46 0x2
|
Step 12 |
show
ccm-manager
Use this command to display the status and availability of Cisco CallManager.
Router# show ccm-manager
MGCP Domain Name: router
Priority Status Host
============================================================
Primary Registered 10.10.10.130
First Backup Duplicate of Primary 10.10.10.130
Second Backup None
Current active Call Manager: 10.10.10.130
Backhaul/Redundant link port: 2428
Failover Interval: 30 seconds
Keepalive Interval: 15 seconds
Last keepalive sent: 04:06:40 PAT Jan 8 2004 (elapsed time: 00:00:04)
Last MGCP traffic time: 04:06:40 PAT Jan 8 2004 (elapsed time: 00:00:04)
Last failover time: None
Last switchback time: None
Switchback mode: Graceful
MGCP Fallback mode: Enabled/OFF
Last MGCP Fallback start time: 03:42:25 PAT Jan 8 2004
Last MGCP Fallback end time: 03:42:44 PAT Jan 8 2004
MGCP Download Tones: Disabled
Backhaul Link info:
Link Protocol: TCP
Remote Port Number: 2428
Remote IP Address: 10.10.10.130
Current Link State: OPEN
Statistics:
Packets recvd: 7
Recv failures: 0
Packets xmitted: 13
Xmit failures: 0
PRI Ports being backhauled:
Slot 1, port 0
Configuration Error History:
FAX mode: cisco
|
Step 13 |
show
crypto
engine
accelerator
statistic
Use this command to display statistics and error counters for the onboard hardware accelerator of the router for IPsec encryption.
Router# show crypto engine accelerator statistic
Virtual Private Network (VPN) Module in slot : 0
Statistics for Hardware VPN Module since the last clear
of counters 1814 seconds ago
638 packets in 638 packets out
88640 bytes in 87601 bytes out
0 paks/sec in 0 paks/sec out
0 Kbits/sec in 0 Kbits/sec out
315 packets decrypted 323 packets encrypted
37680 bytes before decrypt 49921 bytes encrypted
21104 bytes decrypted 67536 bytes after encrypt
0 packets decompressed 0 packets compressed
0 bytes before decomp 0 bytes before comp
0 bytes after decomp 0 bytes after comp
0 packets bypass decompr 0 packets bypass compres
0 bytes bypass decompres 0 bytes bypass compressi
0 packets not decompress 0 packets not compressed
0 bytes not decompressed 0 bytes not compressed
1.0:1 compression ratio 1.0:1 overall
33 commands out 33 commands acknowledged
Last 5 minutes:
60 packets in 60 packets out
0 paks/sec in 0 paks/sec out
121 bits/sec in 120 bits/sec out
1720 bytes decrypted 1140 bytes encrypted
46 Kbits/sec decrypted 30 Kbits/sec encrypted
1.0:1 compression ratio 1.0:1 overall
Errors:
ppq full errors : 0 ppq rx errors : 0
cmdq full errors : 0 cmdq rx errors : 0
no buffer : 0 replay errors : 0
dest overflow : 0 authentication errors : 0
Other error : 0 RNG self test fail : 0
DF Bit set : 0 Hash Miscompare : 0
Unwrappable object : 0 Missing attribute : 0
Invalid attrribute value: 0 Bad Attribute : 0
Verification Fail : 0 Decrypt Failure : 0
Invalid Packet : 0 Invalid Key : 0
Input Overrun : 0 Input Underrun : 0
Output buffer overrun : 0 Bad handle value : 0
Invalid parameter : 0 Bad function code : 0
Out of handles : 0 Access denied : 0
Warnings:
sessions_expired : 0 packets_fragmented : 0
general: : 0
HSP details:
hsp_operations : 0 hsp_sessions : 0
|
Step 14 |
show
crypto
ipsec
sa
Use this command to display the settings used by current SAs.
Router# show crypto ipsec sa
interface: FastEthernet0/0
Crypto map tag: Gateway, local addr. 10.10.10.13
protected vrf:
local ident (addr/mask/port/port): (10.10.10.13/255.255.255.255/0/0)
remote ident (addr/mask/port/port): (10.10.10.130/255.255.255.255/0/0)
current_peer: 10.10.10.130:500
PERMIT, flags={origin_is_acl,}
#pkts encaps: 324, #pkts encrypt: 324, #pkts digest: 324
#pkts decaps: 316, #pkts decrypt: 316, #pkts verify: 316
#pkts compressed: 0, #pkts decompressed: 0
#pkts not compressed: 0, #pkts compr. failed: 0
#pkts not decompressed: 0, #pkts decompress failed: 0
#send errors 71, #recv errors 0
local crypto endpt.: 10.10.10.13, remote crypto endpt.: 10.10.10.130
path mtu 1500, media mtu 1500
current outbound spi: 9073D35
inbound esp sas:
spi: 0x9FCB508(167556360)
transform: esp-3des esp-sha-hmac ,
in use settings ={Tunnel, }
slot: 0, conn id: 5121, flow_id: 1, crypto map: gateway
crypto engine type: Hardware, engine_id: 2
sa timing: remaining key lifetime (k/sec): (4446388/1913)
ike_cookies: 6A391EE1 E57F3670 D4D78758 2F5C8E7C
IV size: 8 bytes
replay detection support: Y
spi: 0xD132AE54(3509759572)
transform: esp-3des esp-sha-hmac ,
in use settings ={Tunnel, }
slot: 0, conn id: 5123, flow_id: 3, crypto map: gateway
crypto engine type: Hardware, engine_id: 2
sa timing: remaining key lifetime (k/sec): (4402107/1913)
ike_cookies: 6A391EE1 E57F3670 D4D78758 2F5C8E7C
IV size: 8 bytes
replay detection support: Y
inbound ah sas:
inbound pcp sas:
outbound esp sas:
spi: 0x7D078A45(2097646149)
transform: esp-3des esp-sha-hmac ,
in use settings ={Tunnel, }
slot: 0, conn id: 5122, flow_id: 2, crypto map: gateway
crypto engine type: Hardware, engine_id: 2
sa timing: remaining key lifetime (k/sec): (4446388/1911)
ike_cookies: 6A391EE1 E57F3670 D4D78758 2F5C8E7C
IV size: 8 bytes
replay detection support: Y
spi: 0x9073D35(151469365)
transform: esp-3des esp-sha-hmac ,
in use settings ={Tunnel, }
slot: 0, conn id: 5124, flow_id: 4, crypto map: gateway
crypto engine type: Hardware, engine_id: 2
sa timing: remaining key lifetime (k/sec): (4402077/1911)
ike_cookies: 6A391EE1 E57F3670 D4D78758 2F5C8E7C
IV size: 8 bytes
replay detection support: Y
outbound ah sas:
outbound pcp sas:
protected vrf:
local ident (addr/mask/prot/port): (10.10.10.13/255.255.255.255/0/0)
remote ident (addr/mask/prot/port): (10.10.10.131/255.255.255.255/0/0)
current_peer: 10.10.10.131:500
PERMIT, flags={origin_is_acl,}
#pkts encaps: 0, #pkts encrypt: 0, #pkts digest: 0
#pkts decaps: 0, #pkts decrypt: 0, #pkts verify: 0
#pkts compressed: 0, #pkts decompressed: 0
#pkts not compressed: 0, #pkts compr. failed: 0
#pkts not decompressed: 0, #pkts decompress failed: 0
#send errors 0, #recv errors 0
local crypto endpt.: 10.10.10.13, remote crypto endpt.: 10.10.10.131
path mtu 1500, media mtu 1500
current outbound spi: 0
inbound esp sas:
inbound ah sas:
inbound pcp sas:
outbound esp sas:
outbound ah sas:
outbound pcp sas:
|
Step 15 |
show
crypto
isakmp
sa
Use this command to display current IKE SAs at a peer.
Router# show crypto isakmp sa
dst src state conn-id slot
10.10.10.130 10.10.10.13 QM_IDLE 1 0
|
Step 16 |
show
crypto
session
Use this command to display the status of the current crypto session.
Router# show crypto session
Crypto session current status
Interface: FastEthernet0/0
Session status: UP-ACTIVE
Peer: 10.10.10.130/500
IKE SA: local 10.10.10.13/500 remote 10.10.10.130/500 Active
IPSEC FLOW: permit ip host 10.10.10.13 host 10.10.10.130
Active SAs: 4, origin: crypto map
|
Step 17 |
show
crypto
session
detail
Use this command to display IPsec details and statistics of the current crypto session.
Router# show crypto session detail
Crypto session current status
Code: C - IKE Configuration mode, D - Dead Peer Detection
K - Keepalives, N - NAT-traversal, X - IKE Extended Authentication
Interface: FastEthernet0/0
Session status: UP-ACTIVE
Peer: 10.10.10.130/500 fvrf: (none) ivrf: (none)
Phase1_id: 10.10.10.130
Desc: (none)
IKE SA: local 10.10.10.13/500 remote 10.10.10.130/500 Active
Capabilities:(none) connid:1 lifetime:07:30:00
IPSEC FLOW: permit ip host 10.10.10.13 host 10.10.10.130
Active SAs: 4, origin: crypto map
Inbound: #pkts dec'ed 335 drop 0 life (KB/Sec) 4402106/1800
Outbound: #pkts enc'ed 327 drop 71 life (KB/Sec) 4402076/180
|