Networking > Services > VPN > IPSec > Services

get ipsecvpn sad session <uuid-string-arg>

Display IPSec SA present in Security Association Database(datapath).

Parameters:

Option Description
<uuid> Generic UUID string argument
Allowed pattern: ^([0-9a-fA-F]{8}-[0-9a-fA-F]{4}-[0-9a-fA-F]{4}-[0-9a-fA-F]{4}-[0-9a-fA-F]{12})$


Example:

nsx-edge-1> get ipsecvpn sad session 4414bbb7-401f-4fbf-9c8f-6253e90104c2 Total Number of IPSec SAs: 2 Outbound SAs: Rule ID : 305634502 Policy UUID : fdc19389-518b-4f3c-9237-9cc6781ac0b5 VRF ID : 1 SPI : 0xcb5289fb Created Timestamp : 2022-05-30 03:49:40 SA Uptime : 2662 sec SA Lifetime : 3600 sec NAT-Traversal : False ESN : False DF Policy : copy SA Hit : 1 Sequence Number (Sent) : 13293 Anti-Replay Window Size : 960 TCP MSS Value : 0 Traffic Mode : Tunnel Protocol : ESP IP Address: Source : 192.168.50.100 Destination : 20.20.20.101 Algorithm: Encryption : aes-128-cbc Authentication : sha256-hmac Multi-Path : Disabled ---------------------------------------- Inbound SAs: Rule ID : 2453118150 Policy UUID : fdc19389-518b-4f3c-9237-9cc6781ac0b5 VRF ID : 1 SPI : 0xeafaee00 Created Timestamp : 2022-05-30 03:49:40 SA Uptime : 2662 sec SA Lifetime : 3600 sec NAT-Traversal : False ESN : False DF Policy : copy SA Hit : 1 Sequence Number (Recv) : 11664 Anti-Replay Window Size : 960 TCP MSS Value : 0 Traffic Mode : Tunnel Protocol : ESP IP Address: Source : 20.20.20.101 Destination : 192.168.50.100 Algorithm: Encryption : aes-128-cbc Authentication : sha256-hmac Multi-Path : Disabled ----------------------------------------

Mode:

Basic

Availability: