This is the built-in help made by Microsoft for the command 'Get-NetIPsecQuickModeSA', in PowerShell version 5 - as retrieved from
Windows version 'Microsoft Windows Server 2012 R2 Standard' PowerShell help files on 2016-06-23.
For PowerShell version 3 and up, where you have Update-Help, this command was run just before creating the web pages from the help files.
Returns active quick mode security associations (SAs) from the target computer.
Get-NetIPsecQuickModeSA [-All] [-AsJob] [-CimSession <CimSession>] [-ThrottleLimit <Int32>] [<CommonParameters>]
Get-NetIPsecQuickModeSA [-AsJob] [-CimSession <CimSession>] [-ThrottleLimit <Int32>] -AssociatedNetIPsecMainModeSA <CimInstance> [<CommonParameters>]
Get-NetIPsecQuickModeSA [-Name] <String> [-AsJob] [-CimSession <CimSession>] [-ThrottleLimit <Int32>] [<CommonParameters>]
The Get-NetIPsecQuickModeSA cmdlet gets an active quick mode security association (SA). Two computers can exchange network packets within the context of the quick mode SA
once established. This cmdlet is used for policy monitoring.
A quick mode negotiation establishes a secure channel between two computers to protect the user data that is exchanged between them. During a quick mode negotiation, the
keying material is refreshed or, if necessary, new keys are generated. A protection suite that protects the IP data traffic is also selected. The exchange of information
required to negotiate a quick mode SA is performed within the context of the main mode SA. After the quick mode SA is established, the two computers can exchange network
packets within the context of the quick mode SA. There is only one main mode SA between a pair of computers, but there can be many quick mode SAs.
Monitoring quick mode SAs can provide information about which peers are currently connected to this computer, and which protection suite is protecting the data exchanged
between them. Separate SAs are created for IPv4 and IPv6 connections.
Online Version: http://go.microsoft.com/fwlink/?LinkId=287710
This example gets all of the IPsec quick mode SAs on the local computer.
PS C:\>$computer1 = "RemoteMachineName"
PS C:\>Get-NetIPsecMainModeSA –Name "196511" –CimSession $computer1 | Remove-NetIPsecQuickModeSA –CimSession $computer1
This example removes all of the active main mode cryptographic sets associated with the specified quick mode SA on a remote computer.