CISCO-IPSEC-SIGNALING-MIB

        
This MIB Module models status, performance and failures
of a protocol with the generic characteristics of signalling 
protocols used with IPsec and FC-SP protocols. Examples
of such protocols include IKE, KINK, etc. This MIB views the
common attributes of such protocols. Signaling protocols are
also referred in this document as 'Control Protocols', since 
they perform session control.
        
This MIB is an attempt to capture the generic aspects 
of the signaling activity. The protocol-specific aspects
of a signaling protocol still need to be captured 
in a protocol-specific MIB (e.g., CISCO-IKE-FLOW-MIB, etc.).
        
Acronyms
The following acronyms are used in this document:
        
   IPsec:      Secure IP Protocol
        
   VPN:        Virtual Private Network
        
   ISAKMP:     Internet Security Association and Key Exchange
               Protocol
        
   IKE:        Internet Key Exchange Protocol
        
   SA:         Security Association 
           (ref: rfc2408).
        
   Phase 1 Tunnel:
               An ISAKMP SA can be regarded as representing
               a flow of ISAKMP/IKE traffic. Hence an ISAKMP
               is referred to as a 'Phase 1 Tunnel' in this
               document. 
        
   Control Tunnel:
               Another term for a Phase 1 Tunnel.
        
   Phase 2 Tunnel:
               An instance of a non-ISAKMP SA  bundle in which all
               the SA share the same proxy identifiers (IDii,IDir)
               protect the same stream of application traffic.
               Such an SA bundle is termed a 'Phase 2 Tunnel'.
               Note that a Phase 2 tunnel may comprise different
               SA bundles and different number of SA bundles at
               different times (due to key refresh).
        
        
History of the MIB
 A precursor to this MIB was the IPsec Flow Monitor MIB, which
 combined the objects pertaining to IKE and IPsec (Phase-2)
 into a single MIB module. Furthermore, the MIB supported only
 one signaling protocol, IKEv1, in addition to manual keying.
        
 The MIB was written by Tivoli and implemented in IBM Nways 
 routers in 1999. During late 1999, Cisco adopted the MIB and 
 together with Tivoli publised the IPsec Flow Monitor MIB in 
 IETF IPsec WG in draft-ietf-ipsec-flow-monitoring-mib-00.txt. 
 In 2000, the MIB was Cisco-ized and implemented as
 CISCO-IPSEC-FLOW-MONITOR-MIB in IOS and VPN3000 platforms.
        
 With the evolution of IKEv2, the MIB was modified and 
 presented to the IPsec WG again in May 2003 in
 draft-ietf-ipsec-flow-monitoring-mib-02.txt.
        
 With the emergence to multiple signaling protocols, it has
 further evolved to define separate set of MIB modules to 
 instrument IPsec signaling alone. Thus, this MIB module
 is now the generic IPsec signaling MIB.
          
Overview of MIB
 The MIB contains major groups of objects which are
 used to manage the generic aspects of IPsec signaling. 
 These groups include a global statistics, control tunnel table,
 Peer association group, control tunnel history group,
 signaling failure group and notification group.
        
 The global statistics, tunnel table and peer association
 groups aid in the real-time monitoring of IPsec signaling
 activity.
        
 The History group is to aid applications that do
 trending analysis.
        
 The Failure group is to enable an operator to
 do troubleshooting and debugging.
 Further, counters are supported to aid detection
 of potential security violations.
        
 The notifications are modeled as generic IPsec control 
 notifications and are parameterized by the identity of the
 specific signaling protocol which caused the notification
 to be issued.
    

Imported Objects

CIPsecTunnelStatus, CIPsecPhase1TunnelIndex, CIPsecEncryptAlgorithm, CIPsecIkeAuthMethod, CIPsecIkeHashAlgorithm, CIPsecPhase1PeerIdentityType, CIPsecEncryptionKeySize, CIPsecControlProtocolCISCO-IPSEC-TC
ciscoMgmtCISCO-SMI
SnmpAdminStringSNMP-FRAMEWORK-MIB
OBJECT-GROUP, NOTIFICATION-GROUP, MODULE-COMPLIANCESNMPv2-CONF
MODULE-IDENTITY, Unsigned32, Gauge32, Counter64, Counter32, NOTIFICATION-TYPE, OBJECT-TYPESNMPv2-SMI
TruthValue, TimeInterval, TimeStampSNMPv2-TC

Objects

ciscoIPsecSignalingMIB .1.3.6.1.4.1.9.9.438
ciscoIPsecSigMIBNotifs .1.3.6.1.4.1.9.9.438.0
ciscoIPsecSigMIBObjects .1.3.6.1.4.1.9.9.438.1
cisgIpsSgCurrentActivity .1.3.6.1.4.1.9.9.438.1.1
cisgIpsSgGlobalStatsTable .1.3.6.1.4.1.9.9.438.1.1.1
cisgIpsSgGlobalStatsEntry .1.3.6.1.4.1.9.9.438.1.1.1.1
cisgIpsSgProtocol
.1.3.6.1.4.1.9.9.438.1.1.1.1.1
cisgIpsSgGlobalOutPkts
.1.3.6.1.4.1.9.9.438.1.1.1.1.10
cisgIpsSgGlobalOutDropPkts
.1.3.6.1.4.1.9.9.438.1.1.1.1.11
cisgIpsSgGlobalOutNotifys
.1.3.6.1.4.1.9.9.438.1.1.1.1.12
cisgIpsSgGlobalOutP2SaDelReqs
.1.3.6.1.4.1.9.9.438.1.1.1.1.13
cisgIpsSgGlobalInitTunnels
.1.3.6.1.4.1.9.9.438.1.1.1.1.14
cisgIpsSgGlobalInitTunnelFails
.1.3.6.1.4.1.9.9.438.1.1.1.1.15
cisgIpsSgGlobalRespTunnels
.1.3.6.1.4.1.9.9.438.1.1.1.1.16
cisgIpsSgGlobalRespTunnelFails
.1.3.6.1.4.1.9.9.438.1.1.1.1.17
cisgIpsSgGlobalSysCapFails
.1.3.6.1.4.1.9.9.438.1.1.1.1.18
cisgIpsSgGlobalAuthFails
.1.3.6.1.4.1.9.9.438.1.1.1.1.19
cisgIpsSgGlobalActiveTunnels
.1.3.6.1.4.1.9.9.438.1.1.1.1.2
cisgIpsSgGlobalDecryptFails
.1.3.6.1.4.1.9.9.438.1.1.1.1.20
cisgIpsSgGlobalHashValidFails
.1.3.6.1.4.1.9.9.438.1.1.1.1.21
cisgIpsSgGlobalBadTunnelRefs
.1.3.6.1.4.1.9.9.438.1.1.1.1.22
cisgIpsSgGlobalInP1SaDelReqs
.1.3.6.1.4.1.9.9.438.1.1.1.1.23
cisgIpsSgGlobalOutP1SaDelReqs
.1.3.6.1.4.1.9.9.438.1.1.1.1.24
cisgIpsSgGlobalPreviousTunnels
.1.3.6.1.4.1.9.9.438.1.1.1.1.3
cisgIpsSgGlobalInOctets
.1.3.6.1.4.1.9.9.438.1.1.1.1.4
cisgIpsSgGlobalInPkts
.1.3.6.1.4.1.9.9.438.1.1.1.1.5
cisgIpsSgGlobalInDropPkts
.1.3.6.1.4.1.9.9.438.1.1.1.1.6
cisgIpsSgGlobalInNotifys
.1.3.6.1.4.1.9.9.438.1.1.1.1.7
cisgIpsSgGlobalInP2SaDelReqs
.1.3.6.1.4.1.9.9.438.1.1.1.1.8
cisgIpsSgGlobalOutOctets
.1.3.6.1.4.1.9.9.438.1.1.1.1.9
cisgIpsSgTunnelTable .1.3.6.1.4.1.9.9.438.1.1.2
cisgIpsSgTunnelEntry .1.3.6.1.4.1.9.9.438.1.1.2.1
cisgIpsSgTunIndex
.1.3.6.1.4.1.9.9.438.1.1.2.1.1
cisgIpsSgTunRemoteAddress .1.3.6.1.4.1.9.9.438.1.1.2.1.10
cisgIpsSgTunRemoteName .1.3.6.1.4.1.9.9.438.1.1.2.1.11
cisgIpsSgTunEncryptAlgo
.1.3.6.1.4.1.9.9.438.1.1.2.1.12
cisgIpsSgTunEncryptKeySize
.1.3.6.1.4.1.9.9.438.1.1.2.1.13
cisgIpsSgTunHashAlgo
.1.3.6.1.4.1.9.9.438.1.1.2.1.14
cisgIpsSgTunAuthMethod
.1.3.6.1.4.1.9.9.438.1.1.2.1.15
cisgIpsSgTunLifeTime .1.3.6.1.4.1.9.9.438.1.1.2.1.16
cisgIpsSgTunActiveTime
.1.3.6.1.4.1.9.9.438.1.1.2.1.17
cisgIpsSgTunInOctets
.1.3.6.1.4.1.9.9.438.1.1.2.1.18
cisgIpsSgTunInPkts
.1.3.6.1.4.1.9.9.438.1.1.2.1.19
cisgIpsSgTunLocalType
.1.3.6.1.4.1.9.9.438.1.1.2.1.2
cisgIpsSgTunInDropPkts
.1.3.6.1.4.1.9.9.438.1.1.2.1.20
cisgIpsSgTunInNotifys
.1.3.6.1.4.1.9.9.438.1.1.2.1.21
cisgIpsSgTunOutOctets
.1.3.6.1.4.1.9.9.438.1.1.2.1.22
cisgIpsSgTunOutPkts
.1.3.6.1.4.1.9.9.438.1.1.2.1.23
cisgIpsSgTunOutDropPkts
.1.3.6.1.4.1.9.9.438.1.1.2.1.24
cisgIpsSgTunOutNotifys
.1.3.6.1.4.1.9.9.438.1.1.2.1.25
cisgIpsSgTunOutP2SaDelReqs
.1.3.6.1.4.1.9.9.438.1.1.2.1.26
cisgIpsSgTunStatus
.1.3.6.1.4.1.9.9.438.1.1.2.1.27
cisgIpsSgTunAction .1.3.6.1.4.1.9.9.438.1.1.2.1.28
cisgIpsSgTunLocalValue .1.3.6.1.4.1.9.9.438.1.1.2.1.3
cisgIpsSgTunLocalAddressType
.1.3.6.1.4.1.9.9.438.1.1.2.1.4
cisgIpsSgTunLocalAddress .1.3.6.1.4.1.9.9.438.1.1.2.1.5
cisgIpsSgTunLocalName .1.3.6.1.4.1.9.9.438.1.1.2.1.6
cisgIpsSgTunRemoteType
.1.3.6.1.4.1.9.9.438.1.1.2.1.7
cisgIpsSgTunRemoteValue .1.3.6.1.4.1.9.9.438.1.1.2.1.8
cisgIpsSgTunRemoteAddressType
.1.3.6.1.4.1.9.9.438.1.1.2.1.9
cisgIpsSgPeerAssociations .1.3.6.1.4.1.9.9.438.1.2
cisgIpsSgHistory .1.3.6.1.4.1.9.9.438.1.3
cisgIpsSgHistGlobal .1.3.6.1.4.1.9.9.438.1.3.1
cisgIpsSgHistGlobalCntl .1.3.6.1.4.1.9.9.438.1.3.1.1
cisgIpsSgHistTableSize .1.3.6.1.4.1.9.9.438.1.3.1.1.1
cisgIpsSgTunnelHistTable .1.3.6.1.4.1.9.9.438.1.3.2
cisgIpsSgTunnelHistEntry .1.3.6.1.4.1.9.9.438.1.3.2.1
cisgIpsSgTunHistIndex .1.3.6.1.4.1.9.9.438.1.3.2.1.1
cisgIpsSgTunHistLocalAddr .1.3.6.1.4.1.9.9.438.1.3.2.1.10
cisgIpsSgTunHistLocalName .1.3.6.1.4.1.9.9.438.1.3.2.1.11
cisgIpsSgTunHistRemoteAddrType
.1.3.6.1.4.1.9.9.438.1.3.2.1.12
cisgIpsSgTunHistRemoteAddr .1.3.6.1.4.1.9.9.438.1.3.2.1.13
cisgIpsSgTunHistRemoteName .1.3.6.1.4.1.9.9.438.1.3.2.1.14
cisgIpsSgTunHistEncryptAlgo
.1.3.6.1.4.1.9.9.438.1.3.2.1.15
cisgIpsSgTunHistEncryptKeySize
.1.3.6.1.4.1.9.9.438.1.3.2.1.16
cisgIpsSgTunHistHashAlgo
.1.3.6.1.4.1.9.9.438.1.3.2.1.17
cisgIpsSgTunHistAuthMethod
.1.3.6.1.4.1.9.9.438.1.3.2.1.18
cisgIpsSgTunHistLifeTime .1.3.6.1.4.1.9.9.438.1.3.2.1.19
cisgIpsSgTunHistTermReason .1.3.6.1.4.1.9.9.438.1.3.2.1.2
cisgIpsSgTunHistStartTime
.1.3.6.1.4.1.9.9.438.1.3.2.1.20
cisgIpsSgTunHistActiveTime
.1.3.6.1.4.1.9.9.438.1.3.2.1.21
cisgIpsSgTunHistInOctets
.1.3.6.1.4.1.9.9.438.1.3.2.1.22
cisgIpsSgTunHistInPkts
.1.3.6.1.4.1.9.9.438.1.3.2.1.23
cisgIpsSgTunHistInDropPkts
.1.3.6.1.4.1.9.9.438.1.3.2.1.24
cisgIpsSgTunHistInNotifys
.1.3.6.1.4.1.9.9.438.1.3.2.1.25
cisgIpsSgTunHistInP2SaDelReqs
.1.3.6.1.4.1.9.9.438.1.3.2.1.26
cisgIpsSgTunHistOutOctets
.1.3.6.1.4.1.9.9.438.1.3.2.1.27
cisgIpsSgTunHistOutPkts
.1.3.6.1.4.1.9.9.438.1.3.2.1.28
cisgIpsSgTunHistOutDropPkts
.1.3.6.1.4.1.9.9.438.1.3.2.1.29
cisgIpsSgTunHistActiveIndex
.1.3.6.1.4.1.9.9.438.1.3.2.1.3
cisgIpsSgTunHistOutNotifys
.1.3.6.1.4.1.9.9.438.1.3.2.1.30
cisgIpsSgTunHistOutP2SaDelReqs
.1.3.6.1.4.1.9.9.438.1.3.2.1.31
cisgIpsSgTunHistPeerLocalType
.1.3.6.1.4.1.9.9.438.1.3.2.1.4
cisgIpsSgTunHistPeerLocalValue .1.3.6.1.4.1.9.9.438.1.3.2.1.5
cisgIpsSgTunHistPeerIntIndex .1.3.6.1.4.1.9.9.438.1.3.2.1.6
cisgIpsSgTunHistPeerRemoteType
.1.3.6.1.4.1.9.9.438.1.3.2.1.7
cisgIpsSgTunHistPeerRemoteValue .1.3.6.1.4.1.9.9.438.1.3.2.1.8
cisgIpsSgTunHistLocalAddrType
.1.3.6.1.4.1.9.9.438.1.3.2.1.9
cisgIpsSgFailures .1.3.6.1.4.1.9.9.438.1.4
cisgIpsSgFailGlobal .1.3.6.1.4.1.9.9.438.1.4.1
cisgIpsSgFailGlobalCntl .1.3.6.1.4.1.9.9.438.1.4.1.1
cisgIpsSgFailTableSize .1.3.6.1.4.1.9.9.438.1.4.1.1.1
cisgIpsSgFailTable .1.3.6.1.4.1.9.9.438.1.4.2
cisgIpsSgFailEntry .1.3.6.1.4.1.9.9.438.1.4.2.1
cisgIpsSgFailIndex .1.3.6.1.4.1.9.9.438.1.4.2.1.1
cisgIpsSgFailReason .1.3.6.1.4.1.9.9.438.1.4.2.1.2
cisgIpsSgFailTime
.1.3.6.1.4.1.9.9.438.1.4.2.1.3
cisgIpsSgFailLocalType
.1.3.6.1.4.1.9.9.438.1.4.2.1.4
cisgIpsSgFailLocalValue .1.3.6.1.4.1.9.9.438.1.4.2.1.5
cisgIpsSgFailRemoteType
.1.3.6.1.4.1.9.9.438.1.4.2.1.6
cisgIpsSgFailRemoteValue .1.3.6.1.4.1.9.9.438.1.4.2.1.7
cisgIpsSgFailLocalAddress .1.3.6.1.4.1.9.9.438.1.4.2.1.8
cisgIpsSgFailRemoteAddress .1.3.6.1.4.1.9.9.438.1.4.2.1.9
cisgIpsSgNotificationCntl .1.3.6.1.4.1.9.9.438.1.5
cisgIpsSgNotifCntlAllNotifs
.1.3.6.1.4.1.9.9.438.1.5.1
cisgIpsSgNotifCntlTunnelStart
.1.3.6.1.4.1.9.9.438.1.5.2
cisgIpsSgNotifCntlTunnelStop
.1.3.6.1.4.1.9.9.438.1.5.3
cisgIpsSgNotifCntlSysFailure
.1.3.6.1.4.1.9.9.438.1.5.4
cisgIpsSgNotifCntlCertCrlFail
.1.3.6.1.4.1.9.9.438.1.5.5
ciscoIPsecSigMIBConform .1.3.6.1.4.1.9.9.438.2
ciscoIpsSgMIBCompliances .1.3.6.1.4.1.9.9.438.2.1
ciscoIpsSgMIBGroups .1.3.6.1.4.1.9.9.438.2.2

Notifications/Traps

NameOIDDescription
ciscoIpsSgTunnelStart





.1.3.6.1.4.1.9.9.438.0.1
ication is generated when an control tunnel
becomes active.
ciscoIpsSgTunnelStop






.1.3.6.1.4.1.9.9.438.0.2
ication is generated when an 
control tunnel becomes inactive.
ciscoIpsSgSysFailure


.1.3.6.1.4.1.9.9.438.0.3
ication is generated when the processing 
for an control Tunnel experiences an 
system capacity error.
ciscoIpsSgCertCrlFailure


.1.3.6.1.4.1.9.9.438.0.4
ication is generated when the 
processing for an control Tunnel 
experiences a Certificate or a Certificate 
validation (CRL or OCSP) related error.