Networking
>
Services
>
VPN
>
IPSec
>
Sessions
get ipsecvpn config session local-ip <ip46-address> remote-ip <ip46-address>
Display a configured IPSec VPN session with specific endpoints.
Parameters:
<ip-address> |
Network IP address argument |
Example:
nsx-edge-1> get ipsecvpn config session local-ip 10.109.24.20 remote-ip 10.109.24.20
UUID : 00000000-0000-0000-0000-00000000000a
Enabled : True
IKE Session ID : 2
Local Endpoint Profile :
UUID : 00000000-0000-0000-0000-000000000004
Local Address :
Ipv4 : 10.109.24.20
Local ID : 174921748
Local ID Type : IPSEC_IP_ADDR_TYPE
Peer Endpoint Profile :
UUID : 00000000-0000-0000-0000-000000000005
Auth Mode : AUTH_MODE_PSK
DPD Profile :
UUID : 00000000-0000-0001-0000-000000000001
Enabled : True
DPD Probe Interval : 600 sec
IKE Profile :
UUID : 00000000-0000-0001-0000-000000000002
Authentication Algorithm : AUTH_HMAC_SHA256
Encryption Algorithm : ENCR_AES_128_CBC
IKE Version : 3
DH Group : DH_GROUP_5
SA Expiry Time : 1000 sec
IKE Role : INITIATOR
Ipsec Tunnel Profile :
UUID : 00000000-0000-0001-0000-000000000003
AH Transport Protocol Enabled : False
Authentication Algorithm : AUTH_HMAC_SHA256
DF Policy : DF_COPY
Disable Anti Replay : True
Enable ESN : False
Encryption Algorithm : ENCR_AES_128_CBC
SA Expiry Time : 1200 sec
Transport Mode : False
Peer Address : 10.109.24.22
Peer ID : 10.109.24.22
Peer ID Type : IPSEC_IP_ADDR_TYPE
Policy :
UUID : 00000000-0000-0000-0000-00000000000b
Action : VPN_ACTION_PROTECT
Applied TO :
Logical Router Port : 00000000-0000-0000-0000-00000000000c
IKE Rulefrom ID : 2
IKE Ruleto ID : 1
Local Subnet : 192.168.2.0/24
Peer Subnet : 172.16.2.0/24
Priority : 10
TCP MSS Direction : TCP_MSS_ADJUST_BOTH
TCP MSS Value : 1350
Type : POLICY_BASED_SESSION
VPN Service Profile :
UUID : 00000000-0000-0001-0000-000000000007
Enable : True
IKE State File Encryption PWD : XXXX
Ipsec HA Sync Enabled : True
SR Clustur ID : 00000000-0000-0001-0000-000000000006
nsx-edge-2> get ipsecvpn config session local-ip 2001::1 remote-ip 2002::1
Fri Feb 04 2022 PST 00:53:06.257
UUID : 00000000-0000-0000-0000-000000000010
Compliance Suite : NONE
Enabled : True
History :
Reason :
Status : IKE_STATUS_NEGO
Time : 04-Feb-2022 08:47:10
Reason : Negotiation not started
Status : IKE_STATUS_DOWN
Time : 04-Feb-2022 08:47:10
IKE Session ID : 8193
Local Endpoint Profile :
UUID : 00000000-0000-0000-0000-00000000000e
Local Address : 2001::1
Local Endpoint State : 3
Local ID : 2001::1
Local ID Type : IPSEC_IP_ADDR_TYPE
Peer Endpoint Profile :
UUID : 00000000-0000-0000-0000-00000000000f
Auth Mode : AUTH_MODE_PSK
DPD Profile :
UUID : 00000000-0000-0000-0000-00000000000c
DPD Probe Interval : 300 sec
Enabled : True
IKE Profile :
UUID : 00000000-0000-0000-0000-00000000000b
Authentication Algorithm : AUTH_HMAC_SHA256
DH Group : DH_GROUP_14
Encryption Algorithm : ENCR_AES_128_CBC
IKE Version : IKE_FLEX
SA Expiry Time : 1000 sec
IKE Role : INITIATOR
Ipsec Tunnel Profile :
UUID : 00000000-0000-0000-0000-00000000000d
AH Transport Protocol Enabled : True
Authentication Algorithm : AUTH_HMAC_SHA256
DF Policy : DF_COPY
Disable Anti Replay : False
Enable ESN : False
Encryption Algorithm : ENCR_AES_128_CBC
PFS Group : DH_GROUP_14
SA Expiry Time : 1200 sec
Transport Mode : False
Peer Address : 2002::1
Peer ID : 2002::1
Peer ID Type : IPSEC_IP_ADDR_TYPE
Policy :
UUID : 00000000-0000-0000-0000-040500000000
Action : VPN_ACTION_PROTECT
Applied TO :
Container : 00001000-0000-0000-0000-000000000001
IKE Rulefrom ID : 2147484677
IKE Ruleto ID : 1029
Local Subnet : 192.168.2.0/24
Peer Subnet : 172.16.2.0/24
Priority : 100
Tunnel Last Status : IPSEC_STATUS_DOWN
Type : POLICY_BASED_SESSION
VPN Service Profile :
UUID : 00000000-0000-0000-0000-000000000011
Enable : True
IKE State File Encryption PWD : XXXX
Ipsec HA Sync Enabled : True
SR Cluster ID : 00000000-0000-0000-0000-000000000014
Sr-Id : 00000000-0000-000a-0000-000000000000
Mode:
Basic
Availability: