Advertisement
Guest User

ASA: sh crypto ipsec sa

a guest
Jun 11th, 2013
240
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 0.97 KB | None | 0 0
  1. ciscoasa(config)# sh crypto ipsec sa
  2. interface: outside
  3. Crypto map tag: _vpnc_cm, seq num: 10, local addr: 192.168.1.1
  4.  
  5. access-list _vpnc_acl extended permit ip host 192.168.1.1 host X.X.X.149
  6. local ident (addr/mask/prot/port): (192.168.1.1/255.255.255.255/0/0)
  7. remote ident (addr/mask/prot/port): (X.X.X.149/255.255.255.255/0/0)
  8. current_peer: X.X.X.149, username: X.X.X.149
  9. dynamic allocated peer ip: 0.0.0.0
  10.  
  11. #pkts encaps: 15, #pkts encrypt: 15, #pkts digest: 15
  12. #pkts decaps: 15, #pkts decrypt: 15, #pkts verify: 15
  13. #pkts compressed: 0, #pkts decompressed: 0
  14. #pkts not compressed: 15, #pkts comp failed: 0, #pkts decomp failed: 0
  15. #pre-frag successes: 0, #pre-frag failures: 0, #fragments created: 0
  16. #PMTUs sent: 0, #PMTUs rcvd: 0, #decapsulated frgs needing reassembly: 0
  17. #TFC rcvd: 0, #TFC sent: 0
  18. #Valid ICMP Errors rcvd: 0, #Invalid ICMP Errors rcvd: 0
  19. #send errors: 0, #recv errors: 0
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement