Few points to be noted are as follows
Below mentioned are the algorithm that is supported
Phase 1 sets up mutual authentication of the peers, negotiates cryptographic parameters, and creates session keys. The Phase 1 parameters used by NSX Edge are:
IKE Phase 2 negotiates an IPSec tunnel by creating keying material for the IPSec tunnel to use (either by using the IKE phase one keys as a base or by performing a new key exchange). The IKE Phase 2 parameters supported by NSX Edge are:
Ensure that algorithm and Phase1 & Phase 2 settings are correct on both the sides.
There are few examples mentioned in below links including CISCO ASA .