The following examples display a successful negotiating result between NSX Edge and a Cisco device.

NSX Edge

From the NSX Edge command line interface (ipsec auto -status, part of show service ipsec command):

000 #2: "s1-c1":500 STATE_QUICK_I2 (sent QI2, IPsec SA established); 
      EVENT_SA_REPLACE in 2430s; newest IPSEC; eroute owner; isakmp#1; idle; 
      import:admin initiate
000 #2: "s1-c1" esp.f5f6877d@ esp.7aaf335f@ 
      tun.0@ tun.0@ ref=0 refhim=4294901761
000 #1: "s1-c1":500 STATE_MAIN_I4 (ISAKMP SA established); EVENT_SA_REPLACE in 
      27623s; newest ISAKMP; lastdpd=0s(seq in:0 out:0); idle; 
      import:admin initiate


ciscoasa# show crypto isakmp sa detail

    Active SA: 1
    Rekey SA: 0 (A tunnel will report 1 Active and 1 Rekey SA during rekey)
Total IKE SA: 1

    IKE Peer:
    Type : L2L        Role    : responder 
    Rekey : no        State   : MM_ACTIVE
    Encrypt : 3des    Hash    : SHA       
    Auth : preshared  Lifetime: 28800
    Lifetime Remaining: 28379