This command reports the current situation of the IPSEC resource:
[11:42:10] ABILIS_CPX:d d ipsecRES:IpSec --------------------------------------------------------------------- IP_Security_Protocol STATE:ACTIVE MODE:IKE IN-CHK:YES POLICY-IN :1 SA-IN :1 SA-BND-IN :1 POLICY-OUT:1 SA-OUT:1 SA-BND-OUT:1 - Security Associations diagnostics: ----------------------------------- SA Bundle State SPI SrcIp Auth SoftTime Prot Tunnel DstIp Cipher HardTime ------------------------------------------------------------------------ 0 0 MATURE C4DCB36E 192.168.006.002 MD5 INFINITE ESP YES 192.168.006.001 3DES INFINITE ------------------------------------------------------------------------ 1 1 MATURE 1969FC22 192.168.006.001 MD5 INFINITE ESP YES 192.168.006.002 3DES INFINITE ------------------------------------------------------------------------
The meaning:
STATEIPSEC port state:
INACTIVE - configuration parameter
                ACT:NO.
ACTIVE - the driver is fully ready to
                work.
MODEMode of IPSEC:
MANUAL - the IPSEC port is in manual
                mode. Manual manipulates manually-keyed IPSEC
                connections.
IKE - the IPSEC is in automatic IKE
                mode. Auto manipulates automatically-keyed IPSEC
                connections.
IN-CHKIPSEC port inbound policy check flag:
NO - Inbound policy check is
                disabled.
YES - Inbound policy check is
                enabled.
POLICY-IN/POLICY-OUTNumber of inbound/outbound security policies in the policy table.
SA-IN/SA-OUTNumber of inbound/outbound Security Associations (SA) in the SA table.
SA-BND-IN/SA-BND-OUTNumber of inbound/outbound Security Association (SA) bundles in the SA table.
SAID of Security Association record from SA table.
BundleNumber of SA bundle group of Security Association record.
StateState of Security Association:
LARVAL - Security Association is one
                that was created by IKE, but is not working yet. Displayed in
                IKE mode only.
MATURE - Security Association is in
                working mode. In MANUAL mode Security Association always is in
                this state.
DYING - Security Association is one
                whose soft lifetime has expired. Displayed in IKE mode
                only.
DEAD - Security Association is one
                whose hard lifetime has expired, but hasn't been reaped by
                system garbage collection. Incoming and outgoing IP packets
                will be dropped. Displayed in IKE mode only.
SPISecurity Parameters Index which identifies this Security Association IPSEC SA SPI parameter.
SrcIpSource IP address.
AuthAuthentication algorithm for the IPSEC protocol (AH or ESP):
NONE - No algorithm.
MD5 - Message Digest Algorithm
                MD5.
SHA-1 - Message Digest Algorithm
                SHA-1.
SoftTimeTime in seconds when soft timer will be expired and SA will go to the DYING state.
ProtIPSEC protocol:
AH - Authentication Header
                protocol.
ESP - Encapsulating Security Payload
                protocol.
TunnelTransport or tunnel mode of IPSEC protocol:
NO - Transport mode of IPSEC
                protocol.
YES - Tunnel mode of IPSEC
                protocol.
DstIpDestination IP address.
CipherEncryption algorithm for the IPSEC ESP protocol:
NONE - No algorithm.
DES - DES algorithm in CBC
                mode.
3DES - Triple DES algorithm in CBC
                mode.
IDEA - IDEA algorithm in CBC
                mode.
CAST - CAST algorithm in CBC
                mode.
BLOWFISH - BLOWFISH algorithm in CBC
                mode.
HardTimeTime in seconds when hard timer will be expired and SA will go to the DEAD state.
This command can help to understand what is happening, in case of troubles:
Shows the IPSEC resource statistics such as the total number of IP frames received/sent by IPSEC resource from/to the IP, the total number of characters received/sent by the IPSEC port from/to the IP, the total number of bypassed incoming/outgoing IKE packets, etc.
Shows the IPSEC resource statistics and the IPsec Security Associations statistics (the total number of incoming/outgoing characters processed by Security Association, the total number of incoming/outgoing IP frames processed by Security Association, etc.).
[11:42:10] ABILIS_CPX:d s ipsecRES:IpSec --------------------------------------------------------------------- IP_Security_Protocol --- Cleared 0 days 19:43:58 ago, on 05/12/2017 at 19:32:03 ------------- -----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---| FRM | 15547708| 13350951|CHR | 97364895| 1351603212| FRM-OK | 99| 81|CHR-OK | 17176| 40362| FRM-DROP | 0| 0|CHR-DROP | 0| 0| FRM-BYPASS | 15547609| 13350870|CHR-BYPASS | 97347719| 1351562850| ------------------------------------------------------------------------ FRM-IKE | 96| 96|NATT-KA | 0| 0| NO-POLICY | 0| 13350817|LONG | 0| 0| BAD-SA | 0| 0|NO-SA | 0| 0| BAD-FMT | 0| 0|AUTH-FAIL | 0| | BAD-CBLK | 0| |BAD-CHK | 0| | REP-CHK | 0| 0|BAD-ECN | 0| | ------------------------------------------------------------------------
[11:42:10] ABILIS_CPX:d se ipsecRES:IpSec --------------------------------------------------------------------- IP_Security_Protocol --- Cleared 0 days 19:44:00 ago, on 05/12/2017 at 19:32:02 ------------- -----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---| FRM | 15548082| 13351218|CHR | 97849852| 1351637231| FRM-OK | 99| 81|CHR-OK | 17176| 40362| FRM-DROP | 0| 0|CHR-DROP | 0| 0| FRM-BYPASS | 15547983| 13351137|CHR-BYPASS | 97832676| 1351596869| ------------------------------------------------------------------------ FRM-IKE | 96| 96|NATT-KA | 0| 0| NO-POLICY | 0| 13351084|LONG | 0| 0| BAD-SA | 0| 0|NO-SA | 0| 0| BAD-FMT | 0| 0|AUTH-FAIL | 0| | BAD-CBLK | 0| |BAD-CHK | 0| | REP-CHK | 0| 0|BAD-ECN | 0| | ------------------------------------------------------------------------ - Security Associations statistics: ------------------------------------ SA:1 CHR:9784 AUTH-FAIL:0 BAD-CBLK:0 FRM:17 REP-CHK:0 BAD-ECN:0 ------------------------------------------------------------------------ SA:0 CHR:3216 AUTH-FAIL:0 BAD-CBLK:0 FRM:21 REP-CHK:0 BAD-ECN:0 ------------------------------------------------------------------------
With reference to the shown interval of time («Cleared 0 days 19:44:00 ago») these counters show the number of:
FRM | Incoming/outgoing (depended on SA's direction) packets from/to IP. | 
CHR | Incoming/outgoing (depended on SA's direction) characters from/to IP. | 
FRM-OK | Incoming/outgoing packets successful processed. | 
FRM-DROP | Dropped incoming/outgoing packets | 
FRM-BYPASS | Bypassed incoming/outgoing packets. | 
CHR-OK | Incoming/outgoing characters from IP before IPSEC successful processed. | 
CHR-DROP | Dropped incoming/outgoing characters. | 
CHR-BYPASS | Bypassed incoming/outgoing characters. | 
FRM-IKE | Bypassed incoming/outgoing IKE packets. | 
NATT-KA | Dropped incoming/outgoing NAT-T keep alive packets. | 
NO-POLICY | Dropped incoming/outgoing packets. Inbound/outbound policy is not found. | 
LONG | Incoming/outgoing too long packets. | 
BAD-SA | Dropped incoming/outgoing packets. Inbound/outbound SA is
              in bad state. The counter is incremented every time when inbound
              SA is in bad state (LARVAL or
              DEAD). | 
NO-SA | Dropped incoming/outgoing packets. Inbound/outbound SA is not found. | 
BAD-FMT | Incoming/outgoing packets with bad IPSEC format. | 
AUTH-FAIL | Dropped incoming packets. Authentication is failed. | 
BAD-CBLK | Dropped incoming packets. Bad cipher block. | 
BAD-CHK | Dropped incoming packets. Inbound policy check error. | 
REP-CHK | Dropped incoming packets. Replay window check error. | 
BAD-ECN | Dropped outgoing packets. Replay window check error. | 
This command reports the current situation of the IKE resource:
[11:42:10] ABILIS_CPX:d d ikeRES:Ike ----------------------------------------------------------------------- Internet_Keys_Exchange_Protocol IKE-STATE:ACTIVE IPSEC-STATE:ACTIVE CUR-MAX-HOSTS:16 CUR-HOSTS:2 ISAKMP-SA:1 ISAKMP-SA-EST:1 IPSEC-SA:1 IPSEC-SA-EST:1 - Security Associations diagnostics: ----------------------------------- SerialNo Name Type Side LocIp-LocPort LocNet/LocMask State ReplaceTime RemIp-RemPort RemNet/RemMask Pending ExpiryTime ------------------------------------------------------------------------ 1 IPsec RESPONDER 192.168.006.001-500 192.168.006.001/32 QUICK-R2 3422 192.168.006.002-500 192.168.006.002/32 0 3542 ------------------------------------------------------------------------ 2 ISAKMP RESPONDER 192.168.006.001-500 000.000.000.000/00 MAIN-R3 3420 192.168.006.002-500 000.000.000.000/00 0 3540 ------------------------------------------------------------------------
The meaning:
IKE-STATEIKE port state:
DOWN - state set when registration to
                lower UDP port fail (UDP service is not possible).
INACTIVE - configuration parameter
                ACT:NO.
ACTIVE - the driver is fully ready to
                work.
INIT - IKE port is in init
                state.
IPSEC-STATEIPSec port state:
INACTIVE - IPSec port is not "ready"
                to work with IKE.
ACTIVE - IPSec port is fully ready to
                work.
CUR-MAX-HOSTSMaximum hosts configured.
CUR-HOSTSCurrent hosts used.
ISAKMP-SACurrent number of ISAKMP SAs.
ISAKMP-SA-ESTCurrent number of established ISAKMP SAs.
IPSEC-SACurrent number of IPSEC SAs.
IPSEC-SA-ESTCurrent number of established IPSEC SAs.
The meaning of Security Associations diagnostics:
SerialNoSerial number of SA structure.
NameName of IKE Security Associations (SA).
TypeType of IKE Security Associations (SA):
ISAKMP - ISAKMP Security Association
                (main mode of IKE).
IPsec - IPsec Security Association
                (quick mode of IKE).
SideSide of IKE Security Associations (SA):
INITIATOR - Security Association is
                created by local side.
RESPONDER - Security Association is
                created by remote side.
LocIp-LocPortLocal IP address - Local IKE UDP port.
RemIp-RemPortRemote IP address - Remote IKE UDP port.
LocNet/LocMaskLocal client network/Local client network mask. For IPsec SA only.
RemNet/RemMaskRemote client network/Remote client network mask. For IPsec SA only.
StateState of IKE Security Associations (SA):
IDLE - SA is in idle state.
MAIN-R0, MAIN-R1 -
                SA is in main IKE mode. 1 IKE message is received from peer
                (responder side).
MAIN-R2 - SA is in main IKE mode. 2
                IKE message is received from peer (responder side).
MAIN-R3 - SA is in main IKE mode. 3
                IKE message is received from peer (responder side). ISAKMP SA
                is established.
MAIN-I1 - SA is in main IKE mode. 1
                IKE message is sent to peer (initiator side).
MAIN-I2 - SA is in main IKE mode. 2
                IKE message is sent to peer (initiator side).
MAIN-I3 - SA is in main IKE mode. 3
                IKE message is sent to peer (initiator side).
MAIN-I4 - SA is in main IKE mode. 3
                IKE message is received from peer (initiator side). ISAKMP SA
                is established.
QUICK-R0, QUICK-R1
                - SA is in quick IKE mode. 1 IKE message is received from peer
                (responder side).
QUICK-R2 - SA is in quick IKE mode. 2
                IKE message is received from peer (responder side). IPSEC SA
                is established.
QUICK-I1 - SA is in quick IKE mode. 1
                IKE message is sent to peer (initiator side).
QUICK-I2 - SA is in quick IKE mode. 2
                IKE message is sent to peer (initiator side). IPSEC SA is
                established.
PendingNumber of pending IPSEC connections. For ISAKMP SA only.
ReplaceTimeRemaining time (in seconds) to begin replace SA.
ExpiryTimeRemaining time (in seconds) to expire SA.
This command can help to understand what is happening, in case of troubles:
[11:42:10] ABILIS_CPX:d s ikeRES:Ike ----------------------------------------------------------------------- Internet_Keys_Exchange_Protocol --- Cleared 5 days 20:18:18 ago, on 05/12/2017 at 19:31:34 ------------- -----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---| CHR | 71632| 35892|LONG | 0| 0| FRM | 615| 250|BAD-FMT | 4| | FRM-LOST | 0| |DUPLICATED | 0| | ------------------------------------------------------------------------ -----------|--ISAKMP---|---IPSEC---| SA-R | 76| 14| SA-I | 6| 0| SA-EST-R | 10| 13| SA-EST-I | 4| 0| AUTH-FAIL | 0| 0| NO-PROP | 0| 0| ------------------------------------------------------------------------
With reference to the shown interval of time («Cleared 5 days 20:18:18 ago») these counters show the number of:
CHR | Incoming/outgoing characters from/to IP. | 
FRM | Incoming/outgoing frames from/to IP. | 
FRM-LOST | Lost incoming packets: buffer is full. | 
LONG | Incoming/outgoing too long packets from/to UDP. | 
BAD-FMT | Incoming packets with bad IKE format. | 
DUPLICATED | Incoming duplicated packets. | 
SA-R | ISAKMP/IPSEC negotiation attempts (responder side). | 
SA-I | ISAKMP/IPSEC negotiation attempts (initiator side). | 
SA-EST-R | ISAKMP/IPSEC successful established negotiations (responder side). | 
SA-EST-I | ISAKMP/IPSEC successful established negotiations (initiator side). | 
AUTH-FAIL | ISAKMP/IPSEC failed authentications. | 
NO-PROP | Not chosen ISAKMP/IPSEC proposal. |