everything in the codes sections below for xx.xx.xx.xx are all the same IP address of our VPN on the high end SRX
from the SRX100
root@SRX100> show security ike security-associations detail
IKE peer xx.xx.xx.xx, Index 1,
Role: Initiator, State: UP
Initiator cookie: 2e0dd31285632209, Responder cookie: bdff73304f4989d9
Exchange type: Aggressive, Authentication method: Pre-shared-keys
Local: 192.168.253.110:500, Remote: xx.xx.xx.xx:500
Lifetime: Expires in 28731 seconds
Algorithms:
Authentication : sha1
Encryption : aes-cbc (128 bits)
Pseudo random function: hmac-sha1
Traffic statistics:
Input bytes : 372
Output bytes : 2186
Input packets: 1
Output packets: 7
Flags: Caller notification sent, Waiting for done
IPSec security associations: 0 created, 0 deleted
Phase 2 negotiations in progress: 1
Negotiation type: Quick mode, Role: Initiator, Message ID: 2084390421
Local: 192.168.253.110:500, Remote: xx.xx.xx.xx:500
Local identity: ipv4_subnet(any:0,[0..7]=0.0.0.0/0)
Remote identity: ipv4_subnet(any:0,[0..7]=0.0.0.0/0)
and a security flow session on the SRX 100
root@SRX100> show security flow session destination-prefix xx.xx.xx.xx
Session ID: 271, Policy name: self-traffic-policy/1, Timeout: 40, Valid
In: 192.168.253.110/500 --> xx.xx.xx.xx/500;udp, If: .local..0, Pkts: 6, Bytes: 2256
Out: xx.xx.xx.xx/500 --> 192.168.253.110/500;udp, If: fe-0/0/0.0, Pkts: 0, Bytes: 0
Total sessions: 1
and a security flow session on the SRX 210
root@SRX210> show security flow session destination-prefix xx.xx.xx.xx
Session ID: 32397, Policy name: default-permit/5, Timeout: 44, Valid
In: 192.168.253.110/500 --> xx.xx.xx.xx/500;udp, If: vlan.0, Pkts: 6, Bytes: 2256
Out: xx.xx.xx.xx/500 --> 24.158.15.70/25343;udp, If: fe-0/0/7.0, Pkts: 0, Bytes: 0
Total sessions: 1