BROCADE-IPSEC-MIB
This Ruckus Wireless, Inc' proprietery MIB module describes
SNMP Objects and Traps for IPSec support on router/switch
product.
Supported Platforms:
- supported on NI XMR/MLX platforms.
- supported on FI ICX7450 platforms.
Copyright 1996-2017 Ruckus Wireless, Inc.
All rights reserved.
This Ruckus Wireless, Inc SNMP Management Information
Base Specification embodies Ruckus Wireless, Inc'
confidential and proprietary intellectual property.
Ruckus Wireless, Inc retains all title and ownership
in the Specification, including any revisions.
This Specification is supplied AS IS, and Ruckus Wireless, Inc
Systems makes no warranty, either express or implied, as to the
use, operation, condition, or performance of the specification,
and any unintended consequence it may on the user environment.
brocadeIPSecMIB
1.3.6.1.4.1.1991.1.1.15.1
Imported Objects
| FOUNDRY-SN-ROOT-MIB | brcdIPSec |
| IPSEC-SPD-MIB | spdIPDestinationAddress spdIPDestinationType spdIPSourceAddress spdIPSourceType spdPacketDirection |
| SNMPv2-SMI | IpAddress MODULE-IDENTITY OBJECT-TYPE Unsigned32 |
| SNMPv2-TC | DateAndTime DisplayString |
Objects (12)
|
|
.1.3.6.1.4.1.1991.1.1.15.1 |
|
|
|
.1.3.6.1.4.1.1991.1.1.15.1.0 |
|
|
|
.1.3.6.1.4.1.1991.1.1.15.1.1 |
|
|
|
SNMPv2-TCDisplayString | .1.3.6.1.4.1.1991.1.1.15.1.1.1 |
|
|
Unsigned32 | .1.3.6.1.4.1.1991.1.1.15.1.1.2 |
|
|
Unsigned32 | .1.3.6.1.4.1.1991.1.1.15.1.1.3 |
|
|
Unsigned32 | .1.3.6.1.4.1.1991.1.1.15.1.1.4 |
|
|
Unsigned32 | .1.3.6.1.4.1.1991.1.1.15.1.1.5 |
|
|
Unsigned32 | .1.3.6.1.4.1.1991.1.1.15.1.1.6 |
|
|
Unsigned32 | .1.3.6.1.4.1.1991.1.1.15.1.1.7 |
|
|
SNMPv2-TCDisplayString | .1.3.6.1.4.1.1991.1.1.15.1.1.8 |
|
|
SNMPv2-TCDisplayString | .1.3.6.1.4.1.1991.1.1.15.1.1.9 |
Notifications / Traps (16)
| Name | OID | Description |
|---|---|---|
|
IPSEC-SPD-MIBspdIPSourceType IPSEC-SPD-MIBspdIPSourceAddress IPSEC-SPD-MIBspdIPDestinationType IPSEC-SPD-MIBspdIPDestinationAddress brcdIPSecSPIValue
|
.1.3.6.1.4.1.1991.1.1.15.1.0.1 |
The SNMP trap that is generated when no valid Security Association exists for a session. |
|
|
.1.3.6.1.4.1.1991.1.1.15.1.0.10 |
The SNMP trap that is generated when maximum IKE peer limit is reached. |
|
|
.1.3.6.1.4.1.1991.1.1.15.1.0.11 |
The SNMP trap that is generated when the system recovers from the maximum IKE peer limit condition. |
|
brcdIPSecSessionState IPSEC-SPD-MIBspdIPSourceType IPSEC-SPD-MIBspdIPSourceAddress IPSEC-SPD-MIBspdIPDestinationType IPSEC-SPD-MIBspdIPDestinationAddress brcdIPSecVRFValue brcdIPSecSPIValue IPSEC-SPD-MIBspdPacketDirection
|
.1.3.6.1.4.1.1991.1.1.15.1.0.12 |
The SNMP trap that is generated when IPsec session state is changed. |
|
brcdIPSecSessionState IPSEC-SPD-MIBspdIPSourceType IPSEC-SPD-MIBspdIPSourceAddress IPSEC-SPD-MIBspdIPDestinationType IPSEC-SPD-MIBspdIPDestinationAddress brcdIPSecVRFValue brcdIPSecSPIValue
|
.1.3.6.1.4.1.1991.1.1.15.1.0.13 |
The SNMP trap that is generated when IKEv2 session state is changed. |
|
|
.1.3.6.1.4.1.1991.1.1.15.1.0.14 |
The SNMP trap that is generated when IPsec module state is changed. |
|
|
.1.3.6.1.4.1.1991.1.1.15.1.0.15 |
The SNMP trap that is generated when maximum IKE peer limit is reached. |
|
|
.1.3.6.1.4.1.1991.1.1.15.1.0.16 |
The SNMP trap that is generated when the system recovers from the maximum IKE peer limit condition. |
|
IPSEC-SPD-MIBspdIPSourceType IPSEC-SPD-MIBspdIPSourceAddress IPSEC-SPD-MIBspdIPDestinationType IPSEC-SPD-MIBspdIPDestinationAddress brcdIPSecSPIValue
|
.1.3.6.1.4.1.1991.1.1.15.1.0.2 |
The SNMP trap that is generated when a packet offered to ESP for processing appears to be an IP fragment, i.e., the OFFSET field is non-zero or the MORE FRAGMENTS flag is set. |
|
IPSEC-SPD-MIBspdIPSourceType IPSEC-SPD-MIBspdIPSourceAddress IPSEC-SPD-MIBspdIPDestinationType IPSEC-SPD-MIBspdIPDestinationAddress brcdIPSecSPIValue
|
.1.3.6.1.4.1.1991.1.1.15.1.0.3 |
The SNMP trap that is generated when there is an attempt to transmit a packet that would result in Sequence Number overflow. |
|
IPSEC-SPD-MIBspdIPSourceType IPSEC-SPD-MIBspdIPSourceAddress IPSEC-SPD-MIBspdIPDestinationType IPSEC-SPD-MIBspdIPDestinationAddress brcdIPSecSPIValue brcdIPSecSequenceNumber
|
.1.3.6.1.4.1.1991.1.1.15.1.0.4 |
The SNMP trap that is generated when the received packet fails the anti-replay checks. |
|
IPSEC-SPD-MIBspdIPSourceType IPSEC-SPD-MIBspdIPSourceAddress IPSEC-SPD-MIBspdIPDestinationType IPSEC-SPD-MIBspdIPDestinationAddress brcdIPSecSPIValue brcdIPSecSequenceNumber
|
.1.3.6.1.4.1.1991.1.1.15.1.0.5 |
The SNMP trap that is generated when the received packet fails integrity check. |
|
IPSEC-SPD-MIBspdIPSourceType IPSEC-SPD-MIBspdIPSourceAddress IPSEC-SPD-MIBspdIPDestinationType IPSEC-SPD-MIBspdIPDestinationAddress brcdIPSecSPIValue brcdIPSecSequenceNumber
|
.1.3.6.1.4.1.1991.1.1.15.1.0.6 |
The SNMP trap that is generated when the deencapsulation of received packet failed. |
|
IPSEC-SPD-MIBspdIPSourceType IPSEC-SPD-MIBspdIPSourceAddress IPSEC-SPD-MIBspdIPDestinationType IPSEC-SPD-MIBspdIPDestinationAddress brcdIPSecSPIValue
|
.1.3.6.1.4.1.1991.1.1.15.1.0.7 |
The SNMP trap that is generated when the check on IP packet length fails for the received packet. |
|
IPSEC-SPD-MIBspdIPSourceType IPSEC-SPD-MIBspdIPSourceAddress IPSEC-SPD-MIBspdIPDestinationType IPSEC-SPD-MIBspdIPDestinationAddress brcdIPSecSPIValue brcdIKEMessageType
|
.1.3.6.1.4.1.1991.1.1.15.1.0.8 |
The SNMP trap that is generated when an invalid IKE message Type is received. |
|
IPSEC-SPD-MIBspdIPSourceType IPSEC-SPD-MIBspdIPSourceAddress IPSEC-SPD-MIBspdIPDestinationType IPSEC-SPD-MIBspdIPDestinationAddress brcdIPSecSPIValue brcdIKEPayloadType
|
.1.3.6.1.4.1.1991.1.1.15.1.0.9 |
The SNMP trap that is generated when an invalid IKE payload is received. |