VNS3 is sealed virtual appliance, so all access is via the Web UI or restful API. There is no SSH access[1]. No secret accounts, no backdoors!

If you need to check IPsec connection configurations, see the IPsec page on the VNS3 UI or the desc_ipsec API call.

You don't have to do anything with configuration files in VNS3.

On the IPsec Endpoint page (also where you create IPsec endpoints) you will find the information you want to give to your connecting partners:
- NAT-T or Native
- PFS Off or On
- The "Local Private IP" at the top of the IPsec page is your IKE Peer ID
- The parameters in your configuration box for phase1, phase2 (Things like: phase1=aes256-sha1-dh5 )

For your IPsec security associations you will need to create a tunnel on the endpoint using the "New Tunnel" link. The local/remote subnet pair you enter needs to match your partner.

[1] If you need help, you can grant support access via the VNS3 Web UI to allow Cohesive Networks Support to view your device. Once you are finished with support, you can remove support access.