Networking > Services > VPN > IPSec > Sessions

get ipsecvpn config session <uuid-string-arg>

Display a configured IPSec VPN session.

Parameters:

Option Description
<uuid> Generic UUID string argument
Allowed pattern: ^([0-9a-fA-F]{8}-[0-9a-fA-F]{4}-[0-9a-fA-F]{4}-[0-9a-fA-F]{4}-[0-9a-fA-F]{12})$


Example:

nsx-edge-1> get ipsecvpn config session 00000000-0000-0000-0000-00000000000a Enabled : True IKE Session ID : 2 Local Endpoint Profile : UUID : 00000000-0000-0000-0000-000000000004 Local Address : Ipv4 : 10.109.24.20 Local ID : 174921748 Local ID Type : IPSEC_IP_ADDR_TYPE Peer Endpoint Profile : UUID : 00000000-0000-0000-0000-000000000005 Auth Mode : AUTH_MODE_PSK DPD Profile : UUID : 00000000-0000-0001-0000-000000000001 Enabled : True DPD Probe Interval : 600 sec IKE Profile : UUID : 00000000-0000-0001-0000-000000000002 Authentication Algorithm : AUTH_HMAC_SHA256 Encryption Algorithm : ENCR_AES_128_CBC IKE Version : 3 DH Group : DH_GROUP_5 SA Expiry Time : 1000 sec IKE Role : INITIATOR Ipsec Tunnel Profile : UUID : 00000000-0000-0001-0000-000000000003 AH Transport Protocol Enabled : False Authentication Algorithm : AUTH_HMAC_SHA256 DF Policy : DF_COPY Disable Anti Replay : True Enable ESN : False Encryption Algorithm : ENCR_AES_128_CBC SA Expiry Time : 1200 sec Transport Mode : False Peer Address : 10.109.24.22 Peer ID : 10.109.24.22 Peer ID Type : IPSEC_IP_ADDR_TYPE Policy : UUID : 00000000-0000-0000-0000-00000000000b Action : VPN_ACTION_PROTECT Applied TO : Logical Router Port : 00000000-0000-0000-0000-00000000000c IKE Rulefrom ID : 2 IKE Ruleto ID : 1 Local Subnet : 192.168.2.0/24 Peer Subnet : 172.16.2.0/24 Priority : 10 TCP MSS Direction : TCP_MSS_ADJUST_BOTH TCP MSS Value : 1350 Type : POLICY_BASED_SESSION VPN Service Profile : UUID : 00000000-0000-0001-0000-000000000007 Enable : True IKE State File Encryption PWD : XXXX Ipsec HA Sync Enabled : True SR Clustur ID : 00000000-0000-0001-0000-000000000006

Mode:

Basic

Availability: