Get IP Sec VPNIKE Session Status
List status of IPSec session. Query parameter source supports both realtime and cached mode.
Please use below Policy APIs.
GET /policy/api/v1/infra/tier-0s/<tier-0-id>/ipsec-vpn-services/<service-id>/sessions/<session-id>/detailed-status
GET /policy/api/v1/infra/tier-1s/<tier-1-id>/ipsec-vpn-services/<service-id>/sessions/<session-id>/detailed-status
session-id
Data source type.
OK
{
"aggregate_traffic_counters": {
"bytes_in": 0,
"bytes_out": 0,
"dropped_packets_in": 0,
"dropped_packets_out": 0,
"packets_in": 0,
"packets_out": 0
},
"display_name": "string",
"failed_tunnels": 0,
"ike_status": {
"fail_reason": "string",
"ike_session_state": "string",
"transport_node_id": "string"
},
"ipsec_vpn_session_id": "string",
"last_update_timestamp": 0,
"negotiated_tunnels": 0,
"session_status": "string",
"total_tunnels": 0
}
Provides the following traffic statistics for IPSec VPN tunnels since the time the tunnels are UP:
- Incoming packet count.
- Outgoing packet count.
- Dropped packet count.
Display name of vpn session.
Number of failed tunnels.
Status for IPSec VPN IKE session UP, DOWN, NEGOTIATING and fail reason if IKE session is down.
UUID of vpn session.
Timestamp when the data was last updated.
Number of negotiated tunnels.
Gives session status consolidated using IKE status and tunnel status. It can be UP, DOWN, DEGRADED. If IKE and all tunnels are UP status will be UP, if all down it will be DOWN, otherwise it will be DEGRADED.
Total number of tunnels.
curl -H 'Authorization: <value>' https://{api_host}/api/v1/vpn/ipsec/sessions/{session-id}/status