"vpn tu" does not appear to show any of that information:
> vpn tu
********** Select Option **********
(1) List all IKE SAs
(2) List all IPsec SAs
(3) List all IKE SAs for a given peer (GW) or user (Client)
(4) List all IPsec SAs for a given peer (GW) or user (Client)
(5) Delete all IPsec SAs for a given peer (GW)
(6) Delete all IPsec SAs for a given User (Client)
(7) Delete all IPsec+IKE SAs for a given peer (GW)
(8) Delete all IPsec+IKE SAs for a given User (Client)
(9) Delete all IPsec SAs for ALL peers and users
(0) Delete all IPsec+IKE SAs for ALL peers and users
(Q) Quit
*******************************************
1
Peer 172.16.10.132, user md5 4d1ec04c938f7451:
1. IKE SA <f433b35763e193c9,ad88db390b67a16a>:
2
Peer 172.16.10.132, user md5 4d1ec04c938f7451:
1. SPI's related to IKE SA <f433b35763e193c9,ad88db390b67a16a>:
INBOUND:
1. 0xd70c4ede
OUTBOUND:
1. 0x70b7338c
Trying "vpn shell" appears not to work:
> vpn shell tunnels/show/IPSec/all
arrange_objects: Not supported
I also tried looking in the log files for both the appliance and the Endpoint Security product, but was unable to find anything informative in their either. Is there a particular log file that would log what settings were used to establish the connection?