NSX VPN Trobleshooting

get ipsecvpn session active

Gives a list of all IPsec tunnels active in the edge nodes

Command example output

IKE Session ID : 8211
UUID : 7f42fddb-fa0d-42ce-920a-4171a72a27ca
SR ID : 3353e3a8-3597-494f-80e9-544365ec200e
Type : Policy
Auth Mode : PSK
Compliance Suite : NONE

Local IP : 185.xx.xx.37 Peer IP : 176.xx.xx.99
Local ID : 185.xx.xx.37 Peer ID : 176.xx.xx.99
Session Status : Up

Policy Rules
Policy UUID : 00003400-2000-1d2c-2000-1d3100000000
ToRule ID : 536878385 FromRule ID : 2684362033
Local Subnet : 192.168.16.0/24 Peer Subnet : 192.168.203.0/24
Tunnel Status : Up


get ipsecvpn session summary

Gives you a summary for all IPsec tunnels in the edge nodes – good for an overview of all with a down status

Command example output
Wed Jun 07 2023 UTC 12:05:58.768
Version  SID  Compliance Suite Type    Auth  Status        Local IP         Peer IP          Down Reason
----------------------------------------------------------------------------------------------------------------------------
IKEv2    8196 NONE             Policy  PSK   Up            185.xx.xx.16   87.xx.xx.170
IKEv1    0    NONE             Policy  PSK   Down          185.xx.xx.184     212.xx.xx.136  SR state is not Active
IKEv1    8202 NONE             Policy  PSK   Up            185.xx.xx.49      152.xx.xx.18
IKEv2    0    NONE             Policy  PSK   Down          185.xx.xx.5    87.xx.xx.56     Session disabled
IKEv1    0    NONE             Policy  PSK   Down          185.xx.xx.13   46.xx.xx.21      SR state is not Active

get ipsecvpn session sessionid <session-id SID>

Gives more detailed information, such as session id, IPSec version, Authentication, local IP and remote IP.

Command example output
    Wed Jun 07 2023 UTC 12:47:56.059
    Total Number of IKE SAs: 1

    IKE Version              : IKEv2
    IKE Status               : Up
    IKE Session ID           : 8196
    Session Name             : Tunnel-50070020-c1134981-bd2075e9-a2315fce
    Session Type             : Policy Based

    IKE SPI Initiator        : 0x943e7e1ae27fb8ea
    IKE SPI Responder        : 0x2248cf04abbd01e5
    Role                     : Responder

    Number of Child SA Pairs : 1
    Created Timestamp        : 2023-06-07 12:12:32
    IKE SA Uptime            : 2124 sec
    IKE SA Lifetime          : 28800 sec
    DPD Probe Interval       : 60 sec

    IP Address:
      Local                  : 185.xx.xx.16
      Remote                 : 87.xx.xx.170

    Identity:
      Local                  : 185.xx.xx.16 (ipv4)
      Remote                 : 87.xx.xx.170 (ipv4)

    Algorithm:
      Encryption             : aes256-cbc
      Authentication         : hmac-sha256-128
      PRF                    : hmac-sha256
    DH Group                 : 14

    Authentication Method    : Pre-shared key

    VMW Feature Capabilities:
      Local                  : VMW_VENDOR_ID
      Remote                 :
    ----------------------------------------

get ipsecvpn ikesa sessionid 8196

Retrieve IKE security associations in detail, such as Service Parameter Index (SPI)

Command example output

Wed Jun 07 2023 UTC 12:47:56.059
    Total Number of IKE SAs: 1

    IKE Version              : IKEv2
    IKE Status               : Up
    IKE Session ID           : 8196
    Session Name             : Tunnel-50070020-c1134981-bd2075e9-a2315fce
    Session Type             : Policy Based

    IKE SPI Initiator        : 0x943e7e1ae27fb8ea
    IKE SPI Responder        : 0x2248cf04abbd01e5
    Role                     : Responder

    Number of Child SA Pairs : 1
    Created Timestamp        : 2023-06-07 12:12:32
    IKE SA Uptime            : 2124 sec
    IKE SA Lifetime          : 28800 sec
    DPD Probe Interval       : 60 sec

    IP Address:
      Local                  : 185.xx.xx.16
      Remote                 : 87.xx.1x.170

    Identity:
      Local                  : 185.x.x.16 (ipv4)
      Remote                 : 87.x.x.170 (ipv4)

    Algorithm:
      Encryption             : aes256-cbc
      Authentication         : hmac-sha256-128
      PRF                    : hmac-sha256
    DH Group                 : 14

    Authentication Method    : Pre-shared key

    VMW Feature Capabilities:
      Local                  : VMW_VENDOR_ID
      Remote                 :
    ----------------------------------------

get ipsecvpn sad session <Policy UUID>

Retrieve IPSec policy UUID, Encapsulating Security Payload (ESP). UUID found from get ipsecvpn session sessionid <sessionid>

Command example output
Wed Jun 07 2023 UTC 12:53:22.316
    Total Number of IPSec SAs: 2

    Outbound SAs:
      Rule ID                     : 536878159
      Policy UUID                 : 00003400-2000-0c6f-2000-1c4f00000000
      VRF ID                      : 45
      SPI                         : 0xb71a06ad

      Created Timestamp           : 2023-06-07 12:12:31
      SA Uptime                   : 2451 sec
      SA Lifetime                 : 3600 sec

      NAT-Traversal               : False
      ESN                         : False
      DF Policy                   : clear

      SA Hit                      : 0
      Sequence Number (Sent)      : 0
      Anti-Replay Window Size     : 960
      TCP MSS Value               : 0

      Traffic Mode                : Tunnel
      Protocol                    : ESP

      IP Address:
        Source                    : 185.xx.xx.16
        Destination               : 87.xx.xx.170

      Subnets:
        Source                    : 10.44.44.0/24
        Destination               : 192.168.1.0/24

      Algorithm:
        Encryption                : aes-256-cbc
        Authentication            : sha256-hmac

      Multi-Path                  : Disabled
    ----------------------------------------
    Inbound SAs:
      Rule ID                     : 2684361807
      Policy UUID                 : 00003400-2000-0c6f-2000-1c4f00000000
      VRF ID                      : 45
      SPI                         : 0xca8d1d00

      Created Timestamp           : 2023-06-07 12:12:31
      SA Uptime                   : 2451 sec
      SA Lifetime                 : 3600 sec

      NAT-Traversal               : False
      ESN                         : False
      DF Policy                   : clear

      SA Hit                      : 1
      Sequence Number (Recv)      : 2446
      Anti-Replay Window Size     : 960
      TCP MSS Value               : 0

      Traffic Mode                : Tunnel
      Protocol                    : ESP

      IP Address:
        Source                    : 87.xx.xx.170
        Destination               : 185.xx.xx.16

      Subnets:
        Source                    : 192.168.1.0/24
        Destination               : 10.44.44.0/24

      Algorithm:
        Encryption                : aes-256-cbc
        Authentication            : sha256-hmac

      Multi-Path                  : Disabled
    ----------------------------------------

get ipsecvpn ipsecsa session-id <session-id>

Retrieve IPsec security associations

Command example output
Wed Jun 07 2023 UTC 12:56:22.485
    Total Number of IPSec SA Pairs: 1

    Session ID               : 8196
    Created Timestamp        : 2023-06-07 12:12:31
    Local TS                 : ipv4(10.44.44.0-10.44.44.255)
    Remote TS                : ipv4(192.168.1.0-192.168.1.255)

    SPI In         : 0xca8d1d00         SPI Out        : 0xb71a06ad
    Rule ID In     : 536878159          Rule ID Out    : 2684361807
    SA Uptime      : 2631 sec           SA Lifetime    : 3600 sec
    Local Endpoint : 185.xx.xx.16     Remote Endpoint: 87.xx.xx.170

    Algorithm: aes256-cbc/hmac-sha256-128
    NAT-T: False,  ESN: False,  DF-Policy: Clear
    Anti-Replay Window Size: 960, Role: Responder
    ----------------------------------------

Was this article helpful?
YesNo