Show vpn ipsec sa

Here’s the output.

000 “peer-192.168.1.200-tunnel-1”: 192.168.4.0/24===192.168.1.100[192.168.1.100]…192.168.1.200[192.168.1.200]===192.168.40.0/24; erouted; eroute owner: #4
000 “peer-192.168.1.200-tunnel-1”: ike_life: 28800s; ipsec_life: 3600s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0
000 “peer-192.168.1.200-tunnel-1”: policy: PSK+ENCRYPT+TUNNEL+PFS+UP; prio: 24,24; interface: eth0;
000 “peer-192.168.1.200-tunnel-1”: newest ISAKMP SA: #1; newest IPsec SA: #4;
000 “peer-192.168.1.200-tunnel-1”: IKE proposal: AES_CBC_256/HMAC_SHA1/MODP_1536
000 “peer-192.168.1.200-tunnel-1”: ESP proposal: INVALID_PAYLOAD_TYPE_192/HMAC_SHA1/
000 #3: “peer-192.168.1.200-tunnel-1” STATE_QUICK_R2 (IPsec SA established); EVENT_SA_REPLACE in 3132s
000 #3: “peer-192.168.1.200-tunnel-1” [email protected] (0 bytes) [email protected] (0 bytes); tunnel
000 #2: “peer-192.168.1.200-tunnel-1” STATE_MAIN_R3 (sent MR3, ISAKMP SA established); EVENT_SA_REPLACE in 28332s
000 #4: “peer-192.168.1.200-tunnel-1” STATE_QUICK_I2 (sent QI2, IPsec SA established); EVENT_SA_REPLACE in 2653s; newest IPSEC; eroute owner
000 #4: “peer-192.168.1.200-tunnel-1” [email protected] (0 bytes) [email protected] (0 bytes); tunnel
000 #1: “peer-192.168.1.200-tunnel-1” STATE_MAIN_I4 (ISAKMP SA established); EVENT_SA_REPLACE in 27612s; newest ISAKMP