Mh, not sure. Here's one sanitized example:
username@fwname_node0> show security ipsec inactive-tunnels detail
node0:
--------------------------------------------------------------------------
Location: FPC 0, PIC 0, KMD-Instance 1
ID: 131180 Virtual-system: root, VPN Name: 153001-TunnelNameCensored
Local Gateway: 123.123.123.123
Local Identity: ipv4_subnet(any:0,[0..7]=0.0.0.0/0)
Remote Identity: ipv4_subnet(any:0,[0..7]=0.0.0.0/0)
Version: IKEv1
DF-bit: clear, Bind-interface: st0.119
Port: 500, Nego#: 0, Fail#: 0, Def-Del#: 0 Flag: 0x604a29
Tunnel events:
Thu Oct 26 2017 12:19:36 +0300: Dynamic tunnel configuration is ready. Waiting for peer(s) to initiate negotation (1 times)
Fri Oct 13 2017 23:20:48 +0300: External interface's address received. Information updated (1 times)
Fri Oct 13 2017 23:20:48 +0300: Bind-interface's zone received. Information updated (1 times)
Fri Oct 13 2017 23:20:48 +0300: External interface's zone received. Information updated (1 times)
Location: FPC 0, PIC 0, KMD-Instance 1
username@fwname_node0> show security ipsec security-associations vpn-name 153001-TunnelNameCensored
node0:
--------------------------------------------------------------------------
Total active tunnels: 1
ID Algorithm SPI Life:sec/kb Mon lsys Port Gateway
<69470457 ESP:aes-cbc-128/sha1 42d3e51a 1232/ unlim - root 64916 22.222.22.222
>69470457 ESP:aes-cbc-128/sha1 e9baa29d 1232/ unlim - root 64916 22.222.22.222
{primary:node0}
username@fwname_node0> show security ipsec security-associations vpn-name 153001-TunnelNameCensored detail
node0:
--------------------------------------------------------------------------
ID: 69470457 Virtual-system: root, VPN Name: 153001-TunnelNameCensored
Local Gateway: 123.123.123.123, Remote Gateway: 22.222.22.222
Local Identity: ipv4_subnet(any:0,[0..7]=0.0.0.0/0)
Remote Identity: ipv4_subnet(any:0,[0..7]=0.0.0.0/0)
Version: IKEv1
DF-bit: clear, Bind-interface: st0.119
Port: 64916, Nego#: 364, Fail#: 0, Def-Del#: 0 Flag: 0x608a29
Tunnel events:
Thu Oct 26 2017 11:40:50 +0300: IPSec SA negotiation successfully completed (108 times)
Thu Oct 26 2017 10:01:28 +0300: IKE SA negotiation successfully completed (37 times)
Fri Oct 13 2017 23:22:11 +0300: IPSec SA delete payload received from peer, corresponding IPSec SAs cleared (1 times)
Fri Oct 13 2017 23:22:11 +0300: Tunnel is ready. Waiting for trigger event or peer to trigger negotiation (2 times)
Location: FPC 1, PIC 0, KMD-Instance 2
Direction: inbound, SPI: 42d3e51a, AUX-SPI: 0
, VPN Monitoring: -
Hard lifetime: Expires in 1221 seconds
Lifesize Remaining: Unlimited
Soft lifetime: Expires in 660 seconds
Mode: Tunnel(0 0), Type: dynamic, State: installed
Protocol: ESP, Authentication: hmac-sha1-96, Encryption: aes-cbc (128 bits)
Anti-replay service: counter-based enabled, Replay window size: 64
Location: FPC 1, PIC 0, KMD-Instance 2
Direction: outbound, SPI: e9baa29d, AUX-SPI: 0
, VPN Monitoring: -
Hard lifetime: Expires in 1221 seconds
Lifesize Remaining: Unlimited
Soft lifetime: Expires in 660 seconds
Mode: Tunnel(0 0), Type: dynamic, State: installed
Protocol: ESP, Authentication: hmac-sha1-96, Encryption: aes-cbc (128 bits)
Anti-replay service: counter-based enabled, Replay window size: 64
{primary:node0}