"vpn tu" does not appear to show any of that information:
> vpn tu
**********     Select Option     **********
(1)             List all IKE SAs
(2)             List all IPsec SAs
(3)             List all IKE SAs for a given peer (GW) or user (Client)
(4)             List all IPsec SAs for a given peer (GW) or user (Client)
(5)             Delete all IPsec SAs for a given peer (GW)
(6)             Delete all IPsec SAs for a given User (Client)
(7)             Delete all IPsec+IKE SAs for a given peer (GW)
(8)             Delete all IPsec+IKE SAs for a given User (Client)
(9)             Delete all IPsec SAs for ALL peers and users
(0)             Delete all IPsec+IKE SAs for ALL peers and users
(Q)             Quit
*******************************************
1
Peer  172.16.10.132, user md5 4d1ec04c938f7451:
        1. IKE SA <f433b35763e193c9,ad88db390b67a16a>:
2
Peer  172.16.10.132, user md5 4d1ec04c938f7451:
        1. SPI's related to IKE SA <f433b35763e193c9,ad88db390b67a16a>:
        INBOUND:
                1. 0xd70c4ede
        OUTBOUND:
                1. 0x70b7338c
Trying "vpn shell" appears not to work:
> vpn shell tunnels/show/IPSec/all
 arrange_objects: Not supported
I also tried looking in the log files for both the appliance and the Endpoint Security product, but was unable to find anything informative in their either.  Is there a particular log file that would log what settings were used to establish the connection?