Networking > Services > VPN > IPSec > IKE

get ipsecvpn ikesa logical-router <uuid-string-arg> sessionid <ipsec-vpn-session-id-arg>

Display an IKE SA on given Logical Router.

Parameters:

Option Description
<uuid> Generic UUID string argument
Allowed pattern: ^([0-9a-fA-F]{8}-[0-9a-fA-F]{4}-[0-9a-fA-F]{4}-[0-9a-fA-F]{4}-[0-9a-fA-F]{12})$
<session-id> IKE Session ID


Example:

nsx-edge-1> get ipsecvpn ikesa sessionid 2 Total Number of IKE SAs: 1 IKE Version : IKEv2 IKE Status : Up IKE Session ID : 2 Session Name : Tunnel-62791cf0-7a541cb-915a6e5d-b6ed32f6 Session Type : Policy Based IKE SPI Initiator : 0x0c6a7a809f4a6e2f IKE SPI Responder : 0x33bbea1267703b12 Role : Responder Number of Child SA Pairs : 1 Created Timestamp : 2017-12-27 20:49:52 IKE SA Uptime : 163 sec IKE SA Lifetime : 1000 sec DPD Probe Interval : 600 sec IP Address: Local : 10.109.24.20 Remote : 10.109.24.22 Identity: Local : 10.109.24.20 (ipv4) Remote : 10.109.24.22 (ipv4) Algorithm: Encryption : aes128-cbc Authentication : hmac-sha2 PRF : hmac-sha2 DH Group : 14 Authentication Method : Pre-shared key ----------------------------------------

Mode:

Basic

Availability: