CISCO-IPSEC-POLICY-MAP-MIB Table View
Table-centric layout grouping table, row, and column objects.
Tables
2
Rows
2
Columns
7
ikePolMapTable
table.1.3.6.1.4.1.9.9.172.1.1.1
·
1 row entry
·
2 columns
The IPSec Phase-1 Internet Key Exchange Tunnel to Policy Mapping Table. There is one entry in this table for each active IPSec Phase-1 Tunnel.
Each entry contains the attributes associated
with mapping an active IPSec Phase-1 IKE Tunnel
to it's configured Policy definition.
with mapping an active IPSec Phase-1 IKE Tunnel
to it's configured Policy definition.
Indexes
ikePolMapTunIndex
| Column | Syntax | OID |
|---|---|---|
|
ikePolMapTunIndex
The index of the IPSec Phase-1 Tunnel to Policy
Map Table. The value of the index is the number used to represent this IPSec Phase-1 Tunnel in the IPSec MIB (ikeTunIndex in the ikeTunnelTable). |
Integer32 Constraints: range: 1-2147483647 |
.1.3.6.1.4.1.9.9.172.1.1.1.1.1 |
|
ikePolMapPolicyNum
The number of the locally defined ISAKMP policy
used to establish the IPSec IKE Phase-1 Tunnel. This is the number which was used on the crypto command. For example, if the configuration command was: ==>… |
Integer32 Constraints: range: 1-2147483647 |
.1.3.6.1.4.1.9.9.172.1.1.1.1.2 |
ipSecPolMapTable
table.1.3.6.1.4.1.9.9.172.1.2.1
·
1 row entry
·
5 columns
The IPSec Phase-2 Tunnel to Policy Mapping Table. There is one entry in this table for each active IPSec Phase-2 Tunnel.
Each entry contains the attributes associated
with mapping an active IPSec Phase-2 Tunnel
to its configured Policy definition.
with mapping an active IPSec Phase-2 Tunnel
to its configured Policy definition.
Indexes
ipSecPolMapTunIndex
| Column | Syntax | OID |
|---|---|---|
|
ipSecPolMapTunIndex
The index of the IPSec Phase-2 Tunnel to Policy
Map Table. The value of the index is the number used to represent this IPSec Phase-2 Tunnel in the IPSec MIB (ipSecTunIndex in the ipSecTunnelTable). |
Integer32 Constraints: range: 1-2147483647 |
.1.3.6.1.4.1.9.9.172.1.2.1.1.1 |
|
ipSecPolMapCryptoMapName
The value of this object should be the name of
the IPSec Policy (cryptomap) as assigned by the operator while configuring the policy of the IPSec traffic. For instance, on an IOS router, the if the com… |
SNMPv2-TCDisplayString Textual Convention: SNMPv2-TCDisplayString OctetStringType Constraints: range: 0..255 |
.1.3.6.1.4.1.9.9.172.1.2.1.1.2 |
|
ipSecPolMapCryptoMapNum
The value of this object should be the priority
of the IPSec Policy (cryptomap) assigned by the operator while configuring the policy of this IPSec tunnel. For instance, on an IOS router, the if the com… |
Integer32 Constraints: range: 1-2147483647 |
.1.3.6.1.4.1.9.9.172.1.2.1.1.3 |
|
ipSecPolMapAclString
The value of this object is the number or
the name of the access control string (ACL) that caused this IPSec tunnel to be established. The ACL that causes an IPSec tunnel to be established is referenced by the cry… |
SNMPv2-TCDisplayString Textual Convention: SNMPv2-TCDisplayString OctetStringType Constraints: range: 0..255 |
.1.3.6.1.4.1.9.9.172.1.2.1.1.4 |
|
ipSecPolMapAceString
The value of this object is the access control
entry (ACE) within the ACL that caused this IPSec tunnel to be established. For instance, if an ACL defines access for two traffic streams (FTP and SNMP) … |
SNMPv2-TCDisplayString Textual Convention: SNMPv2-TCDisplayString OctetStringType Constraints: range: 0..255 |
.1.3.6.1.4.1.9.9.172.1.2.1.1.5 |