Networking > Services > VPN > IPSec > Sessions

get ipsecvpn config session local-ip <ip46-address> remote-ip <ip46-address>

Display a configured IPSec VPN session with specific endpoints.

Parameters:

Option Description
<ip-address> Network IP address argument


Example:

nsx-edge-1> get ipsecvpn config session local-ip 10.109.24.20 remote-ip 10.109.24.20 UUID : 00000000-0000-0000-0000-00000000000a Enabled : True IKE Session ID : 2 Local Endpoint Profile : UUID : 00000000-0000-0000-0000-000000000004 Local Address : Ipv4 : 10.109.24.20 Local ID : 174921748 Local ID Type : IPSEC_IP_ADDR_TYPE Peer Endpoint Profile : UUID : 00000000-0000-0000-0000-000000000005 Auth Mode : AUTH_MODE_PSK DPD Profile : UUID : 00000000-0000-0001-0000-000000000001 Enabled : True DPD Probe Interval : 600 sec IKE Profile : UUID : 00000000-0000-0001-0000-000000000002 Authentication Algorithm : AUTH_HMAC_SHA256 Encryption Algorithm : ENCR_AES_128_CBC IKE Version : 3 DH Group : DH_GROUP_5 SA Expiry Time : 1000 sec IKE Role : INITIATOR Ipsec Tunnel Profile : UUID : 00000000-0000-0001-0000-000000000003 AH Transport Protocol Enabled : False Authentication Algorithm : AUTH_HMAC_SHA256 DF Policy : DF_COPY Disable Anti Replay : True Enable ESN : False Encryption Algorithm : ENCR_AES_128_CBC SA Expiry Time : 1200 sec Transport Mode : False Peer Address : 10.109.24.22 Peer ID : 10.109.24.22 Peer ID Type : IPSEC_IP_ADDR_TYPE Policy : UUID : 00000000-0000-0000-0000-00000000000b Action : VPN_ACTION_PROTECT Applied TO : Logical Router Port : 00000000-0000-0000-0000-00000000000c IKE Rulefrom ID : 2 IKE Ruleto ID : 1 Local Subnet : 192.168.2.0/24 Peer Subnet : 172.16.2.0/24 Priority : 10 TCP MSS Direction : TCP_MSS_ADJUST_BOTH TCP MSS Value : 1350 Type : POLICY_BASED_SESSION VPN Service Profile : UUID : 00000000-0000-0001-0000-000000000007 Enable : True IKE State File Encryption PWD : XXXX Ipsec HA Sync Enabled : True SR Clustur ID : 00000000-0000-0001-0000-000000000006 nsx-edge-2> get ipsecvpn config session local-ip 2001::1 remote-ip 2002::1 Fri Feb 04 2022 PST 00:53:06.257 UUID : 00000000-0000-0000-0000-000000000010 Compliance Suite : NONE Enabled : True History : Reason : Status : IKE_STATUS_NEGO Time : 04-Feb-2022 08:47:10 Reason : Negotiation not started Status : IKE_STATUS_DOWN Time : 04-Feb-2022 08:47:10 IKE Session ID : 8193 Local Endpoint Profile : UUID : 00000000-0000-0000-0000-00000000000e Local Address : 2001::1 Local Endpoint State : 3 Local ID : 2001::1 Local ID Type : IPSEC_IP_ADDR_TYPE Peer Endpoint Profile : UUID : 00000000-0000-0000-0000-00000000000f Auth Mode : AUTH_MODE_PSK DPD Profile : UUID : 00000000-0000-0000-0000-00000000000c DPD Probe Interval : 300 sec Enabled : True IKE Profile : UUID : 00000000-0000-0000-0000-00000000000b Authentication Algorithm : AUTH_HMAC_SHA256 DH Group : DH_GROUP_14 Encryption Algorithm : ENCR_AES_128_CBC IKE Version : IKE_FLEX SA Expiry Time : 1000 sec IKE Role : INITIATOR Ipsec Tunnel Profile : UUID : 00000000-0000-0000-0000-00000000000d AH Transport Protocol Enabled : True Authentication Algorithm : AUTH_HMAC_SHA256 DF Policy : DF_COPY Disable Anti Replay : False Enable ESN : False Encryption Algorithm : ENCR_AES_128_CBC PFS Group : DH_GROUP_14 SA Expiry Time : 1200 sec Transport Mode : False Peer Address : 2002::1 Peer ID : 2002::1 Peer ID Type : IPSEC_IP_ADDR_TYPE Policy : UUID : 00000000-0000-0000-0000-040500000000 Action : VPN_ACTION_PROTECT Applied TO : Container : 00001000-0000-0000-0000-000000000001 IKE Rulefrom ID : 2147484677 IKE Ruleto ID : 1029 Local Subnet : 192.168.2.0/24 Peer Subnet : 172.16.2.0/24 Priority : 100 Tunnel Last Status : IPSEC_STATUS_DOWN Type : POLICY_BASED_SESSION VPN Service Profile : UUID : 00000000-0000-0000-0000-000000000011 Enable : True IKE State File Encryption PWD : XXXX Ipsec HA Sync Enabled : True SR Cluster ID : 00000000-0000-0000-0000-000000000014 Sr-Id : 00000000-0000-000a-0000-000000000000

Mode:

Basic

Availability: