FEC-IPSEC-MIB Table View

Table-centric layout grouping table, row, and column objects.

Tables
16
Rows
16
Columns
316
.0.3 · 1 row entry · 21 columns
This table contains the list of currently active IPSec security
associations.
ipsecSaEntry entry .0.3.1
This object contains an IPSec security association.
Indexes
ipsecSaSecProto ipsecSaSpi
Column Syntax OID
ipsecSaIndex
A unique index for this entry.
Integer32
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.3.1.1
ipsecSaState
The current state of the security association
Possible values:
alive(1), -- The SA is alive
expired(2), -- The SA is expired
negotiating(4),-- This SA is currently negotiated
established(5) -- The SA is alive an…
Enumeration
Enumerated Values:
2expired
4negotiating
5established
.0.3.1.3
ipsecSaDir
This object specifies whether the SA is used for inbound or
outbound processing.
Possible values:
inbound(1), -- An inbound security association
outbound(2) -- An outbound security association.
Enumeration
Enumerated Values:
1inbound
2outbound
.0.3.1.5
ipsecSaMode
This object specifies whether the SA is in tunnel or
transport mode.
Possible values:
tunnel(1), -- A tunnel mode SA
transport(2) -- A transport mode SA.
Enumeration
Enumerated Values:
1tunnel
2transport
.0.3.1.6
ipsecSaSecProto
This object specifies the security protocol applied by this SA.
Possible values:
esp(50), -- Encapsulating Security Payload
ah(51), -- Authentication Header
ipcomp(108) -- Internet Payload Compression Protocol.
Enumeration
Enumerated Values:
50esp
51ah
108ipcomp
.0.3.1.7
ipsecSaSpi
The Security Parameters Index of this SA.
.0.3.1.17
ipsecSaAuthAlg
The hash algorithm used, if any.
Possible Values:
none(2), -- No hash algorithm applied
md5-96(4), -- The MD5 hash algorithm
sha1-96(6) -- The Secure Hash Algorithm.
Enumeration
Enumerated Values:
2none
4md5-96
6sha1-96
.0.3.1.18
ipsecSaEncAlg
The encryption algorithm used, if any.
Possible Values:
none(1), -- No encryption applied
des-cbc(2), -- DES in CBC mode
des3-cbc(3), -- Triple DES in CBC mode
blowfish-cbc(4), -- Blowfish in CBC…
Enumeration
Enumerated Values:
1none
2des-cbc
3des3-cbc
4blowfish-cbc
5cast128-cbc
6twofish-cbc
7aes-cbc
.0.3.1.19
ipsecSaCompAlg
The compression algorithm used, if any.
Possible Values:
none(1), -- No compression
deflate(2) -- DEFLATE compression algorithm.
Enumeration
Enumerated Values:
2none
3deflate
.0.3.1.20
ipsecSaAuthKeyLen
The length in bytes of the key used for authentication,
if any.
bytesInteger32
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.3.1.21
ipsecSaEncKeyLen
The length in bytes of the key used for encryption, if any.
bytesInteger32
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.3.1.22
ipsecSaReplayErrors
The number of replayed packets detected for this SA.
Integer32
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.3.1.33
ipsecSaRecvErrors
The number of receive errors (replayed packets not counted)
detected for this SA.
Integer32
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.3.1.34
ipsecSaDecryptErrors
The number of decryption errors (ESP only) detected for
this SA.
Integer32
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.3.1.35
ipsecSaBundle
unique id of SA-bundle within this SA is used.
Integer32
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.3.1.39
ipsecSaBundleNesting
place of SA within SA-Bundle.
Integer32
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.3.1.40
ipsecSaSpiSize
The size of the SPI in bytes.
bytesInteger32
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.3.1.45
ipsecSaEncKey OctetString .0.3.1.64
ipsecSaAuthKey OctetString .0.3.1.65
ipsecSaIkeMajVersion
The IKE major version number.
Integer32
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.3.1.66
ipsecSaIkeMinVersion
The IKE minor version number.
Integer32
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.3.1.67
.0.4 · 1 row entry · 30 columns
This table contains the list of currently active IKE security
associations.
ikeSaEntry entry .0.4.1
This object contains an IKE security association.
Indexes
ikeSaIndex
Column Syntax OID
ikeSaIndex
A unique index for this entry.
Integer32
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.4.1.1
ikeSaState
This object specifies the state of the SA.
Possible values:
negotiating(1), -- the SA is still being negotiated
established(2), -- the SA negotiation is finished
waiting-for-remove(3), -- the SA is wait…
Enumerationr/w
Enumerated Values:
1negotiating
2established
3waiting-for-remove
7delete
.0.4.1.3
ikeSaXchType
The exchange mode used to create the SA.
Possible values:
base(1), -- IKE base mode mode
id-protect(2), -- IKE identity protection
-- (oakley main mode)
authentication-only(3), -- Authentication …
Enumeration
Enumerated Values:
1base
2id-protect
4aggressive
256any
.0.4.1.4
ikeSaAuthMethod
The authenticatin method used when negotiating this SA.
Possible values:
pre-sh-key(1), -- Authentication using pre shared keys
dss-sig(2), -- Authentication using DSS signatures
rsa-sig(3), -- Authentication …
Enumeration
Enumerated Values:
1pre-sh-key
2dss-sig
3rsa-sig
4rsa-enc
5rsa-enc-rev
.0.4.1.5
ikeSaRole
This object specifies by which side the SA
negotiation was initiated.
Possible values:
initiator(1), -- this end initiated the SA negotiation
responder(2) -- the remote end initiated the SA negotiation.
Enumeration
Enumerated Values:
1initiator
2responder
.0.4.1.7
ikeSaLocalId
The local ID used for authentication.
SNMPv2-TCDisplayString
Textual Convention: SNMPv2-TCDisplayString OctetString
Type Constraints:
range: 0..255
.0.4.1.8
ikeSaRemoteId
The remote ID used for authentication.
SNMPv2-TCDisplayString
Textual Convention: SNMPv2-TCDisplayString OctetString
Type Constraints:
range: 0..255
.0.4.1.9
ikeSaLocalIp
The local IP address used in the IKE communication.
SNMPv2-SMIIpAddress
Textual Convention: SNMPv2-SMIIpAddress OctetString
Type Constraints:
range: 4
.0.4.1.10
ikeSaRemoteIp
The remote IP address used in the IKE communication.
SNMPv2-SMIIpAddress
Textual Convention: SNMPv2-SMIIpAddress OctetString
Type Constraints:
range: 4
.0.4.1.11
ikeSaCookieI
The cookie of the initiator.
OctetString .0.4.1.12
ikeSaCookieR
The cookie of the responder.
OctetString .0.4.1.13
ikeSaNumCerts
The number of certificates received from the remote
side when negotiating this SA.
Integer32
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.4.1.15
ikeSaNumNegotiations
This object specifies the number of currently active
negotiations for this SA.
Integer32
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.4.1.16
ikeSaBytes
Number of bytes transmitted using this SA.
bytesInteger32
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.4.1.17
ikeSaMajVersion
The IKE major version number.
Integer32
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.4.1.18
ikeSaMinVersion
The IKE minor version number.
Integer32
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.4.1.19
ikeSaPeerIndex
The index of the peer for which this SA was created.
Integer32
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.4.1.20
ikeSaHeartbeatsEnabled
This object specifies whether heartbeats are sent/expected
over this SA
possible values:
send(1), -- send heartbeats
expect(2), -- expect heartbeats
both(3), -- send and expect heartbeats
none(4) -- neither sen…
Enumeration
Enumerated Values:
1send
2expect
3both
4none
.0.4.1.21
ikeSaHeartbeatsSent
Number of Heartbeats sent over this SA.
Integer32
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.4.1.22
ikeSaHeartbeatsReceived
Number of Heartbeats received over this SA.
Integer32
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.4.1.23
ikeSaCreated
Time the SA was created.
.0.4.1.24
ikeSaLastUsed
Time the SA was used last.
.0.4.1.25
ikeSaEncAlg
The encryption algorithm used.
Enumeration
Enumerated Values:
1des
2idea
3blowfish
4rc5
5des3
6cast128
7aes
9twofish
.0.4.1.26
ikeSaHashAlg
The hash algorithm used.
Enumeration
Enumerated Values:
1md5
2sha
3tiger
4ripemd160
.0.4.1.27
ikeSaPrfAlg
The hash algorithm used for the pseudo random function.
Enumeration
Enumerated Values:
1md5
2sha
3tiger
4ripemd160
.0.4.1.28
ikeSaExpires
Time the SA will expire.
.0.4.1.29
ikeSaLocalPort
Local port currently used for the SA.
Integer32
Constraints:
range: 0-65535
.0.4.1.30
ikeSaRemotePort
Remote port currently used for the SA.
Integer32
Constraints:
range: 0-65535
.0.4.1.31
ikeSaXauthType
This object displayes whether XAUTH is used or not
after complete establishment of the SA.
If XAUTH is used then the type of the extended
authentication is displayed.
Enumeration
Enumerated Values:
0generic
1radius-chap
2otp
3s-key
32768none
.0.4.1.32
ikeSaXauthUser
User name used for Extended Authentication.
SNMPv2-TCDisplayString
Textual Convention: SNMPv2-TCDisplayString OctetString
Type Constraints:
range: 0..255
.0.4.1.33
.0.5 · 1 row entry · 31 columns
This table contains the list of IPSec peers.
ipsecPeerEntry entry .0.5.1
This object contains the description of an IPSec peer.
Indexes
ipsecPeerTrafficList
Column Syntax OID
ipsecPeerIndex
A unique index identifying this entry.
Integer32
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.5.1.1
ipsecPeerDescription
An optional description for this peer.
SNMPv2-TCDisplayStringr/w
Textual Convention: SNMPv2-TCDisplayString OctetString
Type Constraints:
range: 0..255
.0.5.1.3
ipsecPeerPeerIds
The IDs of the peer which are accepted for authentication.
Syntax:
- X500 distinguished name:
<obj-name=obj-value, obj-ID=obj-value, ...>
- IPV4-Address:
|123.456.789.012| with or without '|'
- IPV4 Addres…
SNMPv2-TCDisplayStringr/w
Textual Convention: SNMPv2-TCDisplayString OctetString
Type Constraints:
range: 0..255
.0.5.1.5
ipsecPeerLocalAddress
The local address used for IPSec encrypted packets.
SNMPv2-SMIIpAddressr/w
Textual Convention: SNMPv2-SMIIpAddress OctetString
Type Constraints:
range: 4
.0.5.1.8
ipsecPeerTrafficList
This object specifies the first entry of possibly a
chain of traffic entries from the ipsecTrafficTable
which should be protected with IPSec using this peer.
Integer32r/w
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.5.1.11
ipsecPeerDynamicAddress
The IP-address of the peer.
This object may contain either an IP address or a domain name.
SNMPv2-TCDisplayStringr/w
Textual Convention: SNMPv2-TCDisplayString OctetString
Type Constraints:
range: 0..255
.0.5.1.14
ipsecPeerVirtualInterface
This object specifies if a virtual interface should be created
for this peer. If set to enabled, all traffic routed towards
this peer will be protected. The traffic list for this peer
is ignored then. The index of the …
Enumerationr/w
Enumerated Values:
1disabled
2enabled
.0.5.1.15
ipsecPeerStartMode
This object specifies the events which make the IPSec peer go up.
Possible values:
on-demand(1), -- packet triggered start,
-- fall back to dormant if unused
always-up(2) -- always set up and keep up.
Enumerationr/w
Enumerated Values:
1on-demand
2always-up
.0.5.1.16
ipsecPeerPreSharedKey
The pre-shared-key used with this peer, if pre-shared-keys
are used for authentication. This field serves only
as an input field and its contents are replaced with
a single asterisk immediately after it is set.
SNMPv2-TCDisplayStringr/w
Textual Convention: SNMPv2-TCDisplayString OctetString
Type Constraints:
range: 0..255
.0.5.1.21
ipsecPeerIsdnCB
Switch for turning ISDN call back feature on and off
specifically for peer.
Default value is disabled.
Enumerationr/w
Enumerated Values:
1enabled
2disabled
3passive
4active
.0.5.1.45
ipsecPeerPriority
Defines the matching priority.
Integer32r/w
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.5.1.47
ipsecPeerIkeProfile
When ipsecPeerIkeVersion is set to ikev1 this is an index from
the ikeProfileTable containing a special phase 1 profile to
use for this peer.
When ipsecPeerIkeVersion is set to ikev2 this is an index from
the ikev2Pr…
Integer32r/w
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.5.1.48
ipsecPeerIpsecProfile
The index from the ipsecProfileTable containing a special
phase 2 profile to use for this peer.
Integer32r/w
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.5.1.49
ipsecPeerAdminStatus
Peer administrative state.
Enumerationr/w
Enumerated Values:
1up
2down
4dialup
5callback
15delete
.0.5.1.50
ipsecPeerPreSharedKeyData
Field used for storing the pre-shared-key permanently.
OctetString .0.5.1.63
ipsecPeerIsdnCBMode
Define callback mode.
The following modes are defined:
compat(1) -- compatibility to old callback
auto(2) -- automatically detect best method
auto-d(3) -- automatically detect best D channel method
d(4) --…
Enumerationr/w
Enumerated Values:
1compat
2auto
3auto-d
4d
5db
6b
.0.5.1.66
ipsecPeerIsdnCBDChanMode
Define callback D channel mode.
The following modes are defined:
llc(1) -- code token into LLC information
element only
subaddr(2) -- code token into SUBADDR information
element only
llc-and-subad…
Enumerationr/w
Enumerated Values:
1llc
2subaddr
3llc-and-subaddr
4llc-subaddr
5subaddr-llc
.0.5.1.67
ipsecPeerType
The type of the peer. Dynamic peer entries are duplicated
whenever an incoming IKE request matches the ID and/or
address information of the remote side.
Note:
- For traffic list peers the duplication also includes th…
Enumerationr/w
Enumerated Values:
1fixed
2dynamic-client
.0.5.1.73
ipsecPeerDynAddrPoolId
Identifier of Dynamic Address Pool if IP address is
assigned via IKE Configuration Method.
A value of -1 means that no Pool is assigned.
Integer32r/w
Constraints:
range: -1-65535
.0.5.1.78
ipsecPeerDynAddrLocalIp
The local IP address used in the IKE communication
when remote IP address is taken from IP address pool.
SNMPv2-SMIIpAddressr/w
Textual Convention: SNMPv2-SMIIpAddress OctetString
Type Constraints:
range: 4
.0.5.1.79
ipsecPeerXauthProfile
The index from the xauthProfileTable containing a special
XAUTH profile to use for this peer.
A value of 0 means that no XAUTH profile is assigned.
Unsigned32r/w
Constraints:
range: 0-4294967295
.0.5.1.80
ipsecPeerDynAddrRole
Determines if IKE Config Mode is used and which role is performed:
none(1), -- no IP address assignemt via IKE Config Mode
client(2) -- get IP address via IKE Config Mode from remote
server(3) -- assign IP address via …
Enumerationr/w
Enumerated Values:
1none
2client
3server
.0.5.1.81
ipsecPeerIkeVersion
Indicates the major version of IKE protocol to use. If set to
ikev1 the value of ipsecPeerIkeProfile is used as index into
ikeProfileTable. If set to ikev2 the value of
ipsecPeerIkeProfile is used as index into ikev2P…
Enumerationr/w
Enumerated Values:
1ikev1
2ikev2
.0.5.1.82
ipsecPeerLocalId
The local ID used for authentication with this profile.
Syntax:
- X500 distinguished name:
<obj-name=obj-value, obj-ID=obj-value, ...>
- IPV4-Address:
|123.456.789.012| with or without '|'
- Key-ID: arbitr…
SNMPv2-TCDisplayStringr/w
Textual Convention: SNMPv2-TCDisplayString OctetString
Type Constraints:
range: 0..255
.0.5.1.83
ipsecPeerAuthMethod
This object specifies the authentication method used by default.
If the ipsecPeerAuthMethod field of an ipsecPeerEntry and the
ikePropAuthMethod field of the ikeProposalTableEntry used are
set to 'default', this value …
Enumerationr/w
Enumerated Values:
1pre-sh-key
2dss-sig
3rsa-sig
.0.5.1.84
ipsecPeerCert
The index of the certificate used for authentication
in the certTable. Ignored for AuthMethod == pre_shared_key.
(only for IKEv2).
Integer32r/w
Constraints:
range: 0-32767
.0.5.1.85
ipsecPeerCaCerts
Receives a comma separated list with indices (0..32767)
of special certificate authority certificates accepted
for this profile.
(only for IKEv2).
SNMPv2-TCDisplayStringr/w
Textual Convention: SNMPv2-TCDisplayString OctetString
Type Constraints:
range: 0..255
.0.5.1.86
ipsecPeerDynAddrMode
When IP address assignment via IKE Config Mode is configured
(ipsecPeerDynAddrRole != none) this object specifies the used mode:
pull(1), -- the client will request IP address and the gateway
will answer the reque…
Enumerationr/w
Enumerated Values:
1pull
2push
.0.5.1.87
ipsecPeerMobike
This object indicates whether the peer supports MOBIKE or not.
Only when both sides of a VPN connection support MOBIKE an IP
address change is possible.
Possible values:
enabled(1), -- Peer supports MOBIKE and …
Enumerationr/w
Enumerated Values:
1enabled
2disabled
.0.5.1.88
ipsecPeerPublicIfIndex
The index value which uniquely identifies the physical interface
that should be used for all ipsec traffic as initiator.
When multiple eqivalent routes to the given peer are available this
is used as additional paramete…
Integer32r/w
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.5.1.90
ipsecPeerPublicIfIndexMode
This object defines the mode used in conjunction with
ipsecPeerPublicIfIndex.
force(1), -- the given interface is used, even if a route
with lower metric is available.
preferred(2) -- the given interface is used, …
Enumerationr/w
Enumerated Values:
1force
2preferred
.0.5.1.91
.0.6 · 1 row entry · 10 columns
This table contains the list of IKE proposals. The
entries may be concatenated on a logical or basis
using the NextChoice field to choices of multiple
proposals.
ikeProposalEntry entry .0.6.1
This object contains an IKE proposal, i.e. the
encryption algorithm and the hash algorithm used to
protect traffic sent over an IKE SA.
Indexes
ikePropEncAlg
Column Syntax OID
ikePropIndex
A unique index identifying this entry.
Integer32
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.6.1.1
ikePropNextChoice
This object specifies the index of the next proposal
of a choice of proposals. If this object is 0, this
marks the end of a proposal chain.
Integer32r/w
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.6.1.2
ikePropDescription
An optional textual description of the proposal chain
beginning at this entry.
SNMPv2-TCDisplayStringr/w
Textual Convention: SNMPv2-TCDisplayString OctetString
Type Constraints:
range: 0..255
.0.6.1.3
ikePropEncAlg
This object specifies the encryption algorithm used
to protect traffic sent over an IKE SA.
Possible values:
none(1), -- No encryption applied
des-cbc(2), -- DES in CBC mode
des3-cbc(3), -- Triple DE…
Enumerationr/w
Enumerated Values:
1none
2des-cbc
3des3-cbc
4blowfish-cbc
5cast128-cbc
6twofish-cbc
7aes-cbc
31rijndael-cbc
.0.6.1.4
ikePropHashAlg
This object specifies the hash algorithm used to
protect traffic sent over an IKE SA.
Possible values:
delete(1), -- Delete this entry
none(2), -- No hash algorithm
md5(3), -- The MD5 hash algorithm
sha1(4), --…
Enumerationr/w
Enumerated Values:
1delete
2none
3md5
4sha1
5ripemd160
6tiger192
.0.6.1.5
ikePropGroup
Index of the IKE group used with this proposal.
It may be overridden by a valid IKE group index of an IPSec peer
or in ipsecGlobDefaultIkeGroup.
Possible values:
0 (use default setting in ipsecPeerIkeGroup
or…
Integer32r/w
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.6.1.7
ikePropAuthMethod
This object specifies the authentication method used with this
proposal.
It may be overridden by the setting in the ipsecPeerEntry table.
If set to 'default' the value in ipsecGlobDefaultAuthMethod is used.
Possible …
Enumerationr/w
Enumerated Values:
1pre-sh-key
2dss-sig
3rsa-sig
4rsa-enc
33default
.0.6.1.8
ikePropEncKeySize
This object specifies the encryption key size used with this
proposal. The limits for the individual algorithms can be seen
in the ipsecAlgorithmTable.
If a length outside the limits for the specified algorithm is
spec…
bitsInteger32r/w
Constraints:
range: 0-2048
.0.6.1.9
ikePropEncKeySizeMin
This object specifies the maximum encryption key size accepted
with this proposal.
The limits for the individual algorithms can be seen in the
ipsecAlgorithmTable.
If a length outside the limits for the specified algo…
bitsInteger32r/w
Constraints:
range: 0-2048
.0.6.1.10
ikePropEncKeySizeMax
This object specifies the maximum encryption key size accepted
with this proposal.
The limits for the individual algorithms can be seen in the
ipsecAlgorithmTable.
If a length outside the limits for the specified algo…
bitsInteger32r/w
Constraints:
range: 0-2048
.0.6.1.11
.0.7 · 1 row entry · 24 columns
This table contains lists of Traffic and the actions
which should be applied to it, together with the
necessary parameters.
ipsecTrafficEntry entry .0.7.1
This object contains a description of a type of IP
traffic and the action which should be applied to it
together with the necessary parameters.
Indexes
ipsecTrProto
Column Syntax OID
ipsecTrIndex
A unique index identifying this entry.
Integer32
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.7.1.1
ipsecTrNextIndex
This object specifies the index of the next traffic
entry in hierarchy.
Integer32r/w
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.7.1.2
ipsecTrDescription
An optional human readable description for this traffic entry.
SNMPv2-TCDisplayStringr/w
Textual Convention: SNMPv2-TCDisplayString OctetString
Type Constraints:
range: 0..255
.0.7.1.3
ipsecTrLocalAddress
The source IP-address of this traffic entry. It maybe
either a single address, a network address (in
combination with ipsecTrSrcMask), or the first address
of an address range (in combination with
ipsecTrLocalRange).
SNMPv2-SMIIpAddressr/w
Textual Convention: SNMPv2-SMIIpAddress OctetString
Type Constraints:
range: 4
.0.7.1.4
ipsecTrLocalMaskLen
The length of the network mask for a source network.
Integer32r/w
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.7.1.5
ipsecTrLocalRange
The last address of a source address range. If this
field is nonzero, the ipsecTrLocalMaskLen field is
ignored and the source is considered as a range of
addresses beginning with ipsecTrLocalAddress and ending
with ipse…
SNMPv2-SMIIpAddressr/w
Textual Convention: SNMPv2-SMIIpAddress OctetString
Type Constraints:
range: 4
.0.7.1.6
ipsecTrRemoteAddress
The destination IP-address of this traffic entry. It maybe
either a single address, a network address (in
combination with ipsecTrDstMask), or the first address
of an address range (in combination with
ipsecTrRemoteRang…
SNMPv2-SMIIpAddressr/w
Textual Convention: SNMPv2-SMIIpAddress OctetString
Type Constraints:
range: 4
.0.7.1.7
ipsecTrRemoteMaskLen
The length of the network mask for a destination network.
Integer32r/w
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.7.1.8
ipsecTrRemoteRange
The last address of a destination address range. If
this field is nonzero, the ipsecTrRemoteMaskLen field is
ignored and the source is considered as a range of
addresses beginning with ipsecTrRemoteAddress and ending
wi…
SNMPv2-SMIIpAddressr/w
Textual Convention: SNMPv2-SMIIpAddress OctetString
Type Constraints:
range: 4
.0.7.1.9
ipsecTrProto
The transport protocol defined for this entry.
Enumerationr/w
Enumerated Values:
1icmp
2igmp
3ggp
4ipip
5st
6tcp
7cbt
8egp
9igp
10bbn
11nvp
12pup
13argus
14emcon
15xnet
16chaos
17udp
18mux
19dcn
20hmp
21prm
22xns
23trunk1
24trunk2
25leaf1
26leaf2
27rdp
28irtp
29isotp4
30netblt
31mfe
32merit
33sep
34pc3
35idpr
36xtp
37ddp
38idprc
39tp
40il
41ipv6
42sdrp
43ipv6route
44ipv6frag
45idrp
46rsvp
47gre
48mhrp
49bna
50esp
51ah
52inlsp
53swipe
54narp
55mobile
56tlsp
57skip
58ipv6icmp
59ipv6nonxt
60ipv6opts
61ipproto-61
62cftp
63local
64sat
65kryptolan
66rvd
67ippc
68distfs
69satmon
70visa
71ipcv
72cpnx
73cphb
74wsn
75pvp
76brsatmon
77sunnd
78wbmon
79wbexpak
80isoip
81vmtp
82securevmtp
83vines
84ttp
85nsfnet
86dgp
87tcf
88eigrp
89ospfigp
90sprite
91larp
92mtp
93ax25
94ipwip
95micp
96scc
97etherip
98encap
99encrypt
100gmtp
101ifmp
102pnni
103pim
104aris
105scps
106qnx
107an
108ippcp
109snp
110compaq
111ipxip
112vrrp
113pgm
114hop0
115l2tp
116ipproto-116
117ipproto-117
118ipproto-118
119ipproto-119
120ipproto-120
121ipproto-121
122ipproto-122
123ipproto-123
124ipproto-124
125ipproto-125
126ipproto-126
127ipproto-127
128ipproto-128
129ipproto-129
130ipproto-130
131ipproto-131
132ipproto-132
133ipproto-133
134ipproto-134
135ipproto-135
136ipproto-136
137ipproto-137
138ipproto-138
139ipproto-139
140ipproto-140
141ipproto-141
142ipproto-142
143ipproto-143
144ipproto-144
145ipproto-145
146ipproto-146
147ipproto-147
148ipproto-148
149ipproto-149
150ipproto-150
151ipproto-151
152ipproto-152
153ipproto-153
154ipproto-154
155ipproto-155
156ipproto-156
157ipproto-157
158ipproto-158
159ipproto-159
160ipproto-160
161ipproto-161
162ipproto-162
163ipproto-163
164ipproto-164
165ipproto-165
166ipproto-166
167ipproto-167
168ipproto-168
169ipproto-169
170ipproto-170
171ipproto-171
172ipproto-172
173ipproto-173
174ipproto-174
175ipproto-175
176ipproto-176
177ipproto-177
178ipproto-178
179ipproto-179
180ipproto-180
181ipproto-181
182ipproto-182
183ipproto-183
184ipproto-184
185ipproto-185
186ipproto-186
187ipproto-187
188ipproto-188
189ipproto-189
190ipproto-190
191ipproto-191
192ipproto-192
193ipproto-193
194ipproto-194
195ipproto-195
196ipproto-196
197ipproto-197
198ipproto-198
199ipproto-199
200ipproto-200
201ipproto-201
202ipproto-202
203ipproto-203
204ipproto-204
205ipproto-205
206ipproto-206
207ipproto-207
208ipproto-208
209ipproto-209
210ipproto-210
211ipproto-211
212ipproto-212
213ipproto-213
214ipproto-214
215ipproto-215
216ipproto-216
217ipproto-217
218ipproto-218
219ipproto-219
220ipproto-220
221ipproto-221
222ipproto-222
223ipproto-223
224ipproto-224
225ipproto-225
226ipproto-226
227ipproto-227
228ipproto-228
229ipproto-229
230ipproto-230
231ipproto-231
232ipproto-232
233ipproto-233
234ipproto-234
235ipproto-235
236ipproto-236
237ipproto-237
238ipproto-238
239ipproto-239
240ipproto-240
241ipproto-241
242ipproto-242
243ipproto-243
244ipproto-244
245ipproto-245
246ipproto-246
247ipproto-247
248ipproto-248
249ipproto-249
250ipproto-250
251ipproto-251
252ipproto-252
253ipproto-253
254ipproto-254
255dont-verify
.0.7.1.10
ipsecTrLocalPort
The source port defined for this traffic entry.
Integer32r/w
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.7.1.11
ipsecTrRemotePort
The destination port defined for this traffic entry.
Integer32r/w
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.7.1.12
ipsecTrAction
The action to be applied to traffic matching this entry.
Possible values:
delete(1), -- Delete this entry
always-plain(2), -- Forward the packets without
-- protection even if there is a
-- matc…
Enumerationr/w
Enumerated Values:
1delete
2always-plain
3pass
4protect
5drop
.0.7.1.13
ipsecTrProposal
This object specifies an index in the
ipsecProposalTable. This may be the first proposal of
possibly a choice of multiple, optionally nested
proposals which is to be offered with IKE (automatic
keying) or a manual propo…
Integer32
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.7.1.14
ipsecTrForceTunnelMode
This object specifies the strategy when transport mode is used.
By default, the system always uses transport mode, if possible.
If this variable is set to true, always tunnel mode will be used
for this traffic entry, ev…
Enumeration
Enumerated Values:
1true
2false
.0.7.1.15
ipsecTrLifeTime
This object specifies an index in the
ipsecLifeTimeTable. This lifetime overwrites the
lifetimes specified for all proposals referenced by
this traffic entry. It may itself be overwritten by
an explicit lifetime specifi…
Integer32
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.7.1.16
ipsecTrGranularity
This object specifies the granularity with which SA's
must be created for this kind of traffic.
Possible values:
default(1), -- use the setting from the ipsecPeerTable
coarse(2), -- Create only one SA for each Tra…
Enumeration
Enumerated Values:
1default
2coarse
3ip
4proto
5port
.0.7.1.17
ipsecTrKeepAlive
This object specifies whether SA's created for this kind
of traffic should be rekeyed on expiration of soft
lifetimes even if there has not been sent any traffic
over them.
Possible values:
true(1), -- rekey SA's ev…
Enumeration
Enumerated Values:
1true
2false
3default
.0.7.1.18
ipsecTrInterface
This object specifies the interface for which the traffic
entry should be valid (pass, drop and protect entries).
If this object is set to -1, there is no interface
restriction.
Integer32r/w
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.7.1.19
ipsecTrDirection
This object specifies the direction for which this traffic
entry should match.
It only applies for pass and drop entries, for protect entries
it is meaningless.
Possible values:
bidirectional(1), -- matches packets…
Enumerationr/w
Enumerated Values:
1bidirectional
2inbound
3outbound
.0.7.1.20
ipsecTrLocalAddressType
The type of the local address specification.
This may be either a statically configured address or a
dynamic address which is taken from some state information.
Enumerationr/w
Enumerated Values:
1fixed
2ph1
.0.7.1.21
ipsecTrRemoteAddressType
The type of the remote address specification.
This may be either a statically configured address or a
dynamic address which is taken from some state information.
Enumerationr/w
Enumerated Values:
1fixed
2ph1
3dhcp
.0.7.1.22
ipsecTrProfile
The index from the ipsecProfileTable containing a special
phase 2 profile to use for this traffic entry.
Integer32r/w
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.7.1.23
ipsecTrCreator
This object shows the creator of the traffic entry.
Enumeration
Enumerated Values:
1config
2radius-preset
3radius
4ike
.0.7.1.36
.0.8 · 1 row entry · 28 columns
This table contains the list of IPSec proposals known to the
system. 
The combinations of algorithms allowed are
constructed from any combinations of algorithms
enabled in an entry, in the order of the preferences
specified.
This object contains an IPSec proposal, i.e. a
proposed set of security parameters applied to
traffic sent over an IPSec security association.
Indexes
ipsecPropProto
Column Syntax OID
ipsecPropIndex
A unique index for this entry.
Integer32
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.8.1.1
ipsecPropNext
The index of the next Proposal in the actual chain.
Integer32r/w
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.8.1.2
ipsecPropDescription
An optional human readable description for this proposal.
SNMPv2-TCDisplayStringr/w
Textual Convention: SNMPv2-TCDisplayString OctetString
Type Constraints:
range: 0..255
.0.8.1.4
ipsecPropProto
The security protocol to apply.
Possible values:
esp(1), -- Encapsulating Security Payload
ah(2), -- Authentication Header
esp-ah(3), -- ESP and AH
delete(8) -- delete this entry.
Enumerationr/w
Enumerated Values:
1esp
2ah
3esp-ah
8delete
.0.8.1.6
ipsecPropIpcomp
This object specifies the use of IPComP in the proposal.
Possible values:
enabled(1), -- Enable IPComP
disabled(2), -- Disable IPComP
force(3) -- Force use of IPComP.
Enumerationr/w
Enumerated Values:
1enabled
2disabled
3force
.0.8.1.20
ipsecPropEspAes
This object specifies the use of the AES
encryption algorithm in the proposal.
Possible values:
0, -- disables AES
1..7 -- enables AES and specifies its priority among
the encryption algorithms.
Integer32r/w
Constraints:
range: 0-7
.0.8.1.40
ipsecPropEspTwofish
This object specifies the use of the Twofish
encryption algorithm in the proposal.
Possible values:
0, -- disables Twofish
1..7 -- enables Twofish and specifies its priority among
the encryption algor…
Integer32r/w
Constraints:
range: 0-7
.0.8.1.41
ipsecPropEspBlowfish
This object specifies the use of the Blowfish
encryption algorithm in the proposal.
Possible values:
0, -- disables Blowfish
1..7 -- enables Blowfish and specifies its priority among
the encryption al…
Integer32r/w
Constraints:
range: 0-7
.0.8.1.42
ipsecPropEspCast
This object specifies the use of the Cast
encryption algorithm in the proposal.
Possible values:
0, -- disables Cast
1..7 -- enables Cast and specifies its priority among
the encryption algorithms.
Integer32r/w
Constraints:
range: 0-7
.0.8.1.43
ipsecPropEspDes3
This object specifies the use of the DES3
encryption algorithm in the proposal.
Possible values:
0, -- disables DES3
1..7 -- enables DES3 and specifies its priority among
the encryption algorithms.
Integer32r/w
Constraints:
range: 0-7
.0.8.1.44
ipsecPropEspDes
This object specifies the use of the DES
encryption algorithm in the proposal.
Possible values:
0, -- disables DES
1..7 -- enables DES and specifies its priority among
the encryption algorithms.
Integer32r/w
Constraints:
range: 0-7
.0.8.1.45
ipsecPropEspNull
This object specifies the use of the DES
encryption algorithm in the proposal.
Possible values:
0, -- disables DES
1..7 -- enables DES and specifies its priority among
the encryption algorithms.
Integer32r/w
Constraints:
range: 0-7
.0.8.1.46
ipsecPropEspRijndael
This object specifies the use of the Rijndael
encryption algorithm in the proposal.
The use of this object is deprecated since rijndael has been
accepted as the algorithm for AES. Its value is transferred to
ipsecPropEs…
Integer32r/w
Constraints:
range: -1-7
.0.8.1.49
ipsecPropEspMd5
This object specifies the use of the MD5 authentication
algorithm for ESP in the proposal.
Possible values:
0, -- disables MD5
1..3 -- enables MD5 and specifies its priority among
the authentication …
Integer32r/w
Constraints:
range: 0-3
.0.8.1.50
ipsecPropEspSha1
This object specifies the use of the Sha1 authentication
algorithm for ESP in the proposal.
Possible values:
0, -- disables SHA-1
1..3 -- enables SHA-1 and specifies its priority among
the authentica…
Integer32r/w
Constraints:
range: 0-3
.0.8.1.51
ipsecPropEspNoMac
This object specifies whether ESP without authentication
is allowed in the proposal.
Possible values:
0, -- disables ESP
1..3 -- enables ESP without authentication and specifies
its priority among the…
Integer32r/w
Constraints:
range: 0-3
.0.8.1.52
ipsecPropAhMd5
This object specifies the use of the MD5 authentication
algorithm for AH in the proposal.
Possible values:
0, -- disables MD5
1..2 -- enables MD5 and specifies its priority among
the authentication a…
Integer32r/w
Constraints:
range: 0-2
.0.8.1.60
ipsecPropAhSha1
This object specifies the use of the Sha1 authentication
algorithm for AH in the proposal.
Possible values:
0, -- disables SHA-1
1..2 -- enables SHA-1 and specifies its priority among
the authenticat…
Integer32r/w
Constraints:
range: 0-2
.0.8.1.61
ipsecPropIpcompDeflate
This object specifies the use of the DEFLATE
compression algorithm in the proposal.
Possible values:
0, -- disables DEFLATE
1..1 -- enables DEFLATE and specifies its priority among
the compression alg…
Integer32r/w
Constraints:
range: 0-1
.0.8.1.70
ipsecPropAesKeySize
This object specifies the key size in bits for the AES
algorithm, if enabled.
Possible Values:
aes128(128), -- use 128 bit AES
aes192(192), -- use 192 bit AES
aes256(256) -- use 256 bit AES.
bitsEnumerationr/w
Enumerated Values:
128aes128
192aes192
256aes256
.0.8.1.80
ipsecPropAesKeySizeMin
This object specifies the minimum accepted key size in bits
for the AES algorithm, if enabled.
Possible Values:
aes128(128), -- use 128 bit AES
aes192(192), -- use 192 bit AES
aes256(256) -- use 256 bit AES.
bitsEnumerationr/w
Enumerated Values:
128aes128
192aes192
256aes256
.0.8.1.81
ipsecPropAesKeySizeMax
This object specifies the maximum accepted key size in bits
for the AES algorithm, if enabled.
Possible Values:
aes128(128), -- use 128 bit AES
aes192(192), -- use 192 bit AES
aes256(256) -- use 256 bit AES.
bitsEnumerationr/w
Enumerated Values:
128aes128
192aes192
256aes256
.0.8.1.82
ipsecPropBlowfishKeySize
This object specifies the key size in bits for the Blowfish
algorithm, if enabled.
Note: the key size must be a multiple of 8 bits.
If not, it will be rounded up to the next 8 bit boundary.
bitsInteger32r/w
Constraints:
range: 40-448
.0.8.1.83
ipsecPropBlowfishKeySizeMin
This object specifies the minimum accepted key size in bits
for the Blowfish algorithm, if enabled.
bitsInteger32r/w
Constraints:
range: 40-448
.0.8.1.84
ipsecPropBlowfishKeySizeMax
This object specifies the maximum accepted key size in bits
for the Blowfish algorithm, if enabled.
bitsInteger32r/w
Constraints:
range: 40-448
.0.8.1.85
ipsecPropTwofishKeySize
This object specifies the key size in bits for the Twofish
algorithm, if enabled.
Possible Values:
twofish128(128), -- use 128 bit Twofish
twofish192(192), -- use 192 bit Twofish
twofish256(256) -- use 256 bi…
bitsEnumerationr/w
Enumerated Values:
128twofish128
192twofish192
256twofish256
.0.8.1.86
ipsecPropTwofishKeySizeMin
This object specifies the minimum accepted key size in bits
for the Twofish algorithm, if enabled.
Possible Values:
twofish128(128), -- use 128 bit Twofish
twofish192(192), -- use 192 bit Twofish
twofish256(25…
bitsEnumerationr/w
Enumerated Values:
128twofish128
192twofish192
256twofish256
.0.8.1.87
ipsecPropTwofishKeySizeMax
This object specifies the maximum accepted key size in bits
for the AES algorithm, if enabled.
Possible Values:
twofish128(128), -- use 128 bit Twofish
twofish192(192), -- use 192 bit Twofish
twofish256(256) …
bitsEnumerationr/w
Enumerated Values:
128twofish128
192twofish192
256twofish256
.0.8.1.88
.0.9 · 1 row entry · 6 columns
This table contains the list of defined lifetimes for IPsec 
and IKE SAs.
This object contains a lifetime, i.e. the soft and hard
expiry limits for IPsec and IKE SA's.
The usage of this table is deprecated, use the ikePrfLifeXxx
and ipsecPrfLifeXxx variables in the ikeProfileTable
and ipsecP…
Indexes
ipsecLifeType
Column Syntax OID
ipsecLifeIndex
A unique index identifying this entry.
Integer32
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.9.1.1
ipsecLifeType
This object specifies the type of a lifetime entry.
Enumeration
Enumerated Values:
1delete
2generic
.0.9.1.2
ipsecLifeHardKb
The maximum amount of data (in KB) which may be protected
by an SA before it is deleted.
kilo bytesInteger32
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.9.1.5
ipsecLifeHardSec
The maximum time (in seconds) after which an SA will be
refreshed,.
secondsInteger32
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.9.1.6
ipsecLifePolicy
This object specifies the way the lifetime information is
applied. Possible values:
loose(1), -- accept and use anything proposed
strict(2), -- accept and use only what is configured
notify(3) -- accept anything, if…
Enumeration
Enumerated Values:
1loose
2strict
3notify
.0.9.1.7
ipsecLifeSoftPercent
The percentage of the hard lifetimes (traffic and time based)
after which rekeying is started.
Integer32
Constraints:
range: 50-100
.0.9.1.8
.0.12 · 1 row entry · 10 columns
This table contains dial entries specifying all parameters
needed for ISDN triggered call back.
ipsecDialEntry entry .0.12.1
This object contains a dial entry used for mapping ISDN
numbers to peers for ISDN call back feature.
Indexes
ipsecDialIfIndex
Column Syntax OID
ipsecDialIfIndex
Index that maps to a peer in a unique way.
Integer32r/w
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.12.1.1
ipsecDialDirection
Calling direction for which entry applies.
Enumerationr/w
Enumerated Values:
1incoming
2outgoing
3both
4delete
.0.12.1.2
ipsecDialNumber
Party number of remote peer. Used for matching calling party
number on incoming calls and for called party number on
outgoing calls.
OctetStringr/w
Constraints:
range: 0-63
.0.12.1.3
ipsecDialSubAddress
Subaddress of remote peer. Used for matching calling party
subaddress on incoming calls and for called party subaddress
on outgoing calls.
OctetStringr/w .0.12.1.4
ipsecDialTypeOfSubAddr
Type of subaddress of remote peer. Used for matching calling
party subaddress on incoming calls and for called party
subaddress on outgoing calls.
Enumerationr/w
Enumerated Values:
1nsap
2user-specified
3reserved
.0.12.1.5
ipsecDialLocalNumber
Local Party number. Used for matching called party number on
incoming calls and for calling party number on outgoing calls.
Special value '*' is treated as wildcard, i.e. calls with
any called party number will be accep…
OctetStringr/w
Constraints:
range: 0-63
.0.12.1.6
ipsecDialLocalSubAddress
Local subaddress. Used for matching called party subaddress on
incoming calls and for calling party subaddress on outgoing
calls.
Special value '*' is treated as wildcard, i.e. calls with
any called party subaddress (of…
OctetStringr/w .0.12.1.7
ipsecDialTypeOfLocalSubAddr
Type of local subaddress. Used for matching called party
subaddress on incoming calls and for calling party subaddress
on outgoing calls. Subaddress type is only checked as long as
subaddress is not '*'.
Default value i…
Enumerationr/w
Enumerated Values:
1nsap
2user-specified
3reserved
.0.12.1.8
ipsecDialAdminStatus
Administrative status for dial entry. This object allows for
temporarily disabling ipsecDial entries without the need to
actually deletion them. This is achieved by assigning value
inactive.
Default value is active.
Enumerationr/w
Enumerated Values:
1active
2inactive
.0.12.1.9
ipsecDialOperStatus
Operational status for dial entry. This object indicates
current status ipsecDial entry is in. Beside values defined
for ipsecDialAdminStatus, status blocked-for-outgoing is
defined, which is used in case triggering cal…
Enumeration
Enumerated Values:
1active
2inactive
3blocked-for-outgoing
.0.12.1.10
.0.14 · 1 row entry · 19 columns
This table contains the list of IKE (Phase 1) profiles.
ikeProfileEntry entry .0.14.1
This object contains an IPSec phase 1 profile.
Indexes
ikePrfProposal
Column Syntax OID
ikePrfIndex
A unique index identifying this entry.
Integer32
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.14.1.1
ikePrfDescription
An optional description for this profile.
SNMPv2-TCDisplayStringr/w
Textual Convention: SNMPv2-TCDisplayString OctetString
Type Constraints:
range: 0..255
.0.14.1.2
ikePrfAuthMethod
This object specifies the authentication method used for this profile.
Possible values:
pre-sh-key(1), -- Authentication using pre shared keys
dss-sig(2), -- Authentication using DSS signatures
rsa-sig(3), -- A…
Enumerationr/w
Enumerated Values:
1pre-sh-key
2dss-sig
3rsa-sig
4rsa-enc
14default
15delete
.0.14.1.3
ikePrfMode
This object specifies the exchange mode used for IKE
SA negotiation.
Possible values:
id-protect(1), -- Use identity protection (main) mode
aggressive(2), -- Use aggressive mode
default(3), -- Use default s…
Enumerationr/w
Enumerated Values:
1id-protect
2aggressive
3default
4id-protect-only
5aggressive-only
.0.14.1.4
ikePrfProposal
The index of the first IKE proposal which may be used
for IKE SA negotiation with this profile.
Integer32r/w
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.14.1.5
ikePrfGroup
This object specifies the IKE group to use with this profile.
Possible values:
1: a 768-bit MODP group
2: a 1024-bit MODP group
5: a 1536-bit MODP group
Integer32r/w
Constraints:
range: 1-5
.0.14.1.6
ikePrfCert
The index of the certificate used for authentication
in the certTable. Ignored for AuthMethod == pre_shared_key.
Integer32r/w
Constraints:
range: 0-32767
.0.14.1.7
ikePrfLocalId
The local ID used for authentication with this profile.
Syntax:
- X500 distinguished name:
<obj-name=obj-value, obj-ID=obj-value, ...>
- IPV4-Address:
|123.456.789.012| with or without '|'
- IPV4 Address R…
SNMPv2-TCDisplayStringr/w
Textual Convention: SNMPv2-TCDisplayString OctetString
Type Constraints:
range: 0..255
.0.14.1.8
ikePrfCaCerts
Receives a comma separated list with indices (0..32767)
of special certificate authority certificates accepted
for this profile.
SNMPv2-TCDisplayStringr/w
Textual Convention: SNMPv2-TCDisplayString OctetString
Type Constraints:
range: 0..255
.0.14.1.9
ikePrfLifeTime
This object specifies an index in the ipsecLifeTimeTable with the
lifetime settings to be used for IKE SA negotiation with this profile.
If the lifetime pointed to by this index does not exist or is
inappropriate, the …
Integer32
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.14.1.10
ikePrfPfsIdentity
This object specifies whether IKE SA's should be deleted
immediately after a phase 2 (IPSec-) SA pair has been
negotiated.
The consequence of enabling this feature is that before each
phase 2 negotiation there always …
Enumerationr/w
Enumerated Values:
1true
2false
3default
.0.14.1.11
ikePrfHeartbeats
This object specifies whether heartbeats should be sent
over phase 1 SAs for this profile (heartbeats are not
used for IPv6).
Possible values:
none(1), -- neither send nor expect heartbeats
expect(2), -- exp…
Enumerationr/w
Enumerated Values:
1none
2expect
3send
4both
5default
6auto
7dpd
8dpd-idle
.0.14.1.12
ikePrfBlockTime
This object specifies the time in seconds for which a peer is
blocked for any IPSec operations after a phase 1 initiator
negotiation failed.
Special values:
-1: use settings from global profile (do not block by defau…
secondsInteger32r/w
Constraints:
range: -1-86400
.0.14.1.13
ikePrfNatT
This object specifies whether NAT-Traversal is enabled
Possible values:
enabled(1), -- enable Nat-Traversal
disabled(2), -- disable Nat-Traversal
default(3) -- use value from default profile
-- (disa…
Enumerationr/w
Enumerated Values:
1enabled
2disabled
3default
4enforce
.0.14.1.14
ikePrfMtuMax
The maximum MTU value allowed for ipsecPeerStatMtu.
Zero means use value from global profile,
if this is the global profile, 1418 is assumed.
Nonzero values smaller than 214 are reset to the minimum of 214.
Integer32r/w
Constraints:
range: 0-65535
.0.14.1.15
ikePrfLifeSeconds
The maximum time (in seconds) after which an SA will be
deleted.
secondsSNMPv2-SMIUnsigned32r/w
Textual Convention: SNMPv2-SMIUnsigned32 Unsigned32
Type Constraints:
range: 0..4294967295
.0.14.1.16
ikePrfLifeKBytes
The maximum amount of data (in KB) which may be protected
by an SA before it is deleted.
kilo bytesSNMPv2-SMIUnsigned32r/w
Textual Convention: SNMPv2-SMIUnsigned32 Unsigned32
Type Constraints:
range: 0..4294967295
.0.14.1.17
ikePrfLifeRekeyPercent obsolete
WARNING: this object is obsolete and must not be used.
Integer32r/w
Constraints:
range: 50-100
.0.14.1.18
ikePrfLifePolicy
This object specifies the way a lifetime proposal is
handled. Possible values:
loose(1), -- accept and use anything proposed
strict(2), -- accept and use only what is configured
notify(3), -- accept anything, if own…
Enumerationr/w
Enumerated Values:
1loose
2strict
3notify
4use-default-lifetime
.0.14.1.19
.0.15 · 1 row entry · 15 columns
This table contains the list of IPSec (Phase 2) profiles.
ipsecProfileEntry entry .0.15.1
This object contains an IPSec phase 1 profile.
Indexes
ipsecPrfProposal
Column Syntax OID
ipsecPrfIndex
A unique index identifying this entry.
Integer32
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.15.1.1
ipsecPrfDescription
An optional description for this profile.
SNMPv2-TCDisplayStringr/w
Textual Convention: SNMPv2-TCDisplayString OctetString
Type Constraints:
range: 0..255
.0.15.1.2
ipsecPrfProposal
The index of the IPSec proposal used for this profile.
Integer32r/w
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.15.1.3
ipsecPrfPfsGroup
The Diffie Hellman group used for additional Perfect
Forward Secrecy (PFS) DH exponentiations.
Possible values:
-1: do not use PFS
0: use value from default profile (do not use PFS
if this is the default prof…
Integer32r/w
Constraints:
range: -1-5
.0.15.1.4
ipsecPrfLifeTime
This object specifies an index in the
ipsecLifeTimeTable.
The usage of this object is deprecated, use the ipsecPrfLifeXxx
variables directly instead.
Integer32
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.15.1.5
ipsecPrfHeartbeats
This object specifies whether heartbeats should be sent
over phase 2 SAs for this profile (heartbeats are not
used for IPv6).
Possible values:
none(1), -- neither send nor expect heartbeats
expect(2), -- exp…
Enumerationr/w
Enumerated Values:
1none
2expect
3send
4both
5default
6auto
.0.15.1.6
ipsecPrfPmtuDiscovery
This object specifies the PMTU discovery policy for this peer.
Possible values:
disabled(1), -- do not perform PMTU discovery
enabled(2) -- perform PMTU discovery
default(3) -- use settings from peer or global…
Enumerationr/w
Enumerated Values:
1disabled
2enabled
3default
.0.15.1.7
ipsecPrfGranularity
This object specifies the granularity with which SA's
are created with this profile.
Possible values:
default(1), -- use granulaity settings from default profile
-- (coarse if this is the default profile)
coarse(…
Enumerationr/w
Enumerated Values:
1default
2coarse
3ip
4proto
5port
6local-services
.0.15.1.8
ipsecPrfKeepAlive
This object specifies whether IKE SA's
are rekeyed even if there was no data transferred over
them.
Possible values:
true(1), -- rekey SA's even if no data was transferred
false(2), -- do not rekey SA's if no data…
Enumerationr/w
Enumerated Values:
1true
2false
3default
4delete
.0.15.1.9
ipsecPrfVerifyPad
This object is a compatibility option for older ipsec
implementations. It enables or disables an old way of ESP
padding (no self describing padding).
Possible values:
true(1), -- normal, self-describing ESP padding…
Enumerationr/w
Enumerated Values:
1true
2false
3default
.0.15.1.10
ipsecPrfForceTunnelMode
This object specifies the strategy when transport mode is used.
By default, the system always uses transport mode, if possible.
If this variable is set to true, always tunnel mode will be used
for this traffic entry, ev…
Enumerationr/w
Enumerated Values:
1true
2false
3default
.0.15.1.11
ipsecPrfLifeSeconds
The maximum time (in seconds) after which an SA will be
deleted.
secondsSNMPv2-SMIUnsigned32r/w
Textual Convention: SNMPv2-SMIUnsigned32 Unsigned32
Type Constraints:
range: 0..4294967295
.0.15.1.16
ipsecPrfLifeKBytes
The maximum amount of data (in KB) which may be protected
by an SA before it is deleted.
kilo bytesSNMPv2-SMIUnsigned32r/w
Textual Convention: SNMPv2-SMIUnsigned32 Unsigned32
Type Constraints:
range: 0..4294967295
.0.15.1.17
ipsecPrfLifeRekeyPercent
The percentage of the lifetimes (traffic and time based)
after which rekeying is started.
Integer32r/w
Constraints:
range: 50-100
.0.15.1.18
ipsecPrfLifePolicy
This object specifies the way a lifetime proposal is
handled. Possible values:
loose(1), -- accept and use anything proposed
strict(2), -- accept and use only what is configured
notify(3) -- accept anything, if own …
Enumerationr/w
Enumerated Values:
1loose
2strict
3notify
4use-default-lifetime
.0.15.1.19
.0.16 · 1 row entry · 42 columns
This table contains the list of currently active IPSec security
associations.
ipsecBundleEntry entry .0.16.1
This object contains an IPSec security association.
Indexes
ipsecBundleIndex
Column Syntax OID
ipsecBundleIndex
A unique index for this entry.
Integer32
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.16.1.1
ipsecBundlePeerIndex
The index of the peer for which this bundle was created.
Integer32
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.16.1.5
ipsecBundleTrafficIndex
The index of the traffic entry for which this bundle was created.
Integer32
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.16.1.6
ipsecBundleState
The current state of the bundle
Possible values:
established(1), -- The bundle is alive
expired(2), -- The bundle is expired
delete (3), -- Mark this bundle for deletion
negotiating(4), -- This bundle …
Enumerationr/w
Enumerated Values:
1established
2expired
3delete
4negotiating
5rekeyed
6heartbeat-lost
7failed
.0.16.1.7
ipsecBundleNumSas
The number of SAs contained in this bundle.
Integer32
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.16.1.8
ipsecBundleRole
This object specifies by which side the SA bundle
negotiation was initiated.
Possible values:
initiator(1), -- this end initiated the negotiation
responder(2) -- the remote end initiated the negotiation.
Enumeration
Enumerated Values:
1initiator
2responder
.0.16.1.9
ipsecBundleRekeyedBundle
This object indicates upon rekeying, which bundle (actually
its BundleIndex) is going to be replaced by that one.
Integer32
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.16.1.10
ipsecBundleRekeyingBundle
This object indicates upon rekeying, which bundle (actually
its BundleIndex) is going to replace that one.
Integer32
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.16.1.11
ipsecBundleLastStateChange
This object indicates the time in time ticks from system start
by which the state of this bundle entry was changed last.
To determine the absolute time, the current sysUpTime must be
subtracted from this value.
SNMPv2-SMITimeTicks
Textual Convention: SNMPv2-SMITimeTicks Unsigned32
Type Constraints:
range: 0..4294967295
.0.16.1.12
ipsecBundleHeartbeatsEnabled
This object specifies whether heartbeats are sent and/or
expected over this bundle.
Possible values:
none(1), -- neither sending nor expecting heartbeats
expect(2), -- expecting heartbeats
send(3), -- se…
Enumeration
Enumerated Values:
1none
2expect
3send
4both
.0.16.1.13
ipsecBundleCreator
This object specifies how the SA was created
Possible values:
manual(1),-- A manually keyed IPSec SA bundle
ike(2) -- An automatically keyed SA bundle created by IKE.
Enumeration
Enumerated Values:
1manual
2ike
.0.16.1.14
ipsecBundleTunnelLocal
The local IP address of the outer packet header. For
transport mode bundles this address is the same as the
ipsecBundleLocalAddress.
SNMPv2-SMIIpAddress
Textual Convention: SNMPv2-SMIIpAddress OctetString
Type Constraints:
range: 4
.0.16.1.15
ipsecBundleTunnelRemote
The remote IP address of the outer packet header. For
transport mode bundles, this address is the same as the
ipsecBundleRemoteAddress.
SNMPv2-SMIIpAddress
Textual Convention: SNMPv2-SMIIpAddress OctetString
Type Constraints:
range: 4
.0.16.1.16
ipsecBundlePmtuDiscovery
This object specifies the initialization of the DF bit in
outgoing IPSec packets for this bundle. It decides whether
PMTU discovery is propagated over the IPSec tunnel or not.
Possible values:
enabled(1), -- copy DF …
Enumeration
Enumerated Values:
1disabled
2enabled
.0.16.1.17
ipsecBundleKeepAlive
This object specifies the circumstances under which this SA
bundle will be rekeyed.
Possible values:
true(1), -- rekey even if no traffic was processed
false(2) -- rekey only if at least one packet was processed.
Enumeration
Enumerated Values:
1true
2false
.0.16.1.18
ipsecBundleVerifyPad
This object specifies the kind of padding expected for ESP SAs
within this bundle.
Possible values:
true(1), -- normal, self-describing ESP padding
false(2) -- old style ESP padding.
Enumeration
Enumerated Values:
1true
2false
.0.16.1.19
ipsecBundleLifeSeconds
The period in seconds after which this bundle will be destroyed.
secondsSNMPv2-SMIUnsigned32
Textual Convention: SNMPv2-SMIUnsigned32 Unsigned32
Type Constraints:
range: 0..4294967295
.0.16.1.20
ipsecBundleLifeKBytes
The amount of data allowed to be protected by this bundle until
it is destroyed (ipsecBundleOutBytes or ipecBundleOutBytes).
kilo bytesSNMPv2-SMIUnsigned32
Textual Convention: SNMPv2-SMIUnsigned32 Unsigned32
Type Constraints:
range: 0..4294967295
.0.16.1.21
ipsecBundleRekeySeconds
The period in seconds after which this bundle will be rekeyed.
secondsInteger32
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.16.1.22
ipsecBundleRekeyKBytes
The amount of data allowed to be protected by this bundle until
it is rekeyed (ipsecBundleOutBytes or ipecBundleOutBytes).
kilo bytesInteger32
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.16.1.23
ipsecBundleProto
The protocol of the traffic selectors.
Enumeration
Enumerated Values:
1icmp
2igmp
3ggp
4ipip
5st
6tcp
7cbt
8egp
9igp
10bbn
11nvp
12pup
13argus
14emcon
15xnet
16chaos
17udp
18mux
19dcn
20hmp
21prm
22xns
23trunk1
24trunk2
25leaf1
26leaf2
27rdp
28irtp
29isotp4
30netblt
31mfe
32merit
33sep
34pc3
35idpr
36xtp
37ddp
38idprc
39tp
40il
41ipv6
42sdrp
43ipv6route
44ipv6frag
45idrp
46rsvp
47gre
48mhrp
49bna
50esp
51ah
52inlsp
53swipe
54narp
55mobile
56tlsp
57skip
58ipv6icmp
59ipv6nonxt
60ipv6opts
61ipproto-61
62cftp
63local
64sat
65kryptolan
66rvd
67ippc
68distfs
69satmon
70visa
71ipcv
72cpnx
73cphb
74wsn
75pvp
76brsatmon
77sunnd
78wbmon
79wbexpak
80isoip
81vmtp
82securevmtp
83vines
84ttp
85nsfnet
86dgp
87tcf
88eigrp
89ospfigp
90sprite
91larp
92mtp
93ax25
94ipwip
95micp
96scc
97etherip
98encap
99encrypt
100gmtp
101ifmp
102pnni
103pim
104aris
105scps
106qnx
107an
108ippcp
109snp
110compaq
111ipxip
112vrrp
113pgm
114hop0
115l2tp
116ipproto-116
117ipproto-117
118ipproto-118
119ipproto-119
120ipproto-120
121ipproto-121
122ipproto-122
123ipproto-123
124ipproto-124
125ipproto-125
126ipproto-126
127ipproto-127
128ipproto-128
129ipproto-129
130ipproto-130
131ipproto-131
132ipproto-132
133ipproto-133
134ipproto-134
135ipproto-135
136ipproto-136
137ipproto-137
138ipproto-138
139ipproto-139
140ipproto-140
141ipproto-141
142ipproto-142
143ipproto-143
144ipproto-144
145ipproto-145
146ipproto-146
147ipproto-147
148ipproto-148
149ipproto-149
150ipproto-150
151ipproto-151
152ipproto-152
153ipproto-153
154ipproto-154
155ipproto-155
156ipproto-156
157ipproto-157
158ipproto-158
159ipproto-159
160ipproto-160
161ipproto-161
162ipproto-162
163ipproto-163
164ipproto-164
165ipproto-165
166ipproto-166
167ipproto-167
168ipproto-168
169ipproto-169
170ipproto-170
171ipproto-171
172ipproto-172
173ipproto-173
174ipproto-174
175ipproto-175
176ipproto-176
177ipproto-177
178ipproto-178
179ipproto-179
180ipproto-180
181ipproto-181
182ipproto-182
183ipproto-183
184ipproto-184
185ipproto-185
186ipproto-186
187ipproto-187
188ipproto-188
189ipproto-189
190ipproto-190
191ipproto-191
192ipproto-192
193ipproto-193
194ipproto-194
195ipproto-195
196ipproto-196
197ipproto-197
198ipproto-198
199ipproto-199
200ipproto-200
201ipproto-201
202ipproto-202
203ipproto-203
204ipproto-204
205ipproto-205
206ipproto-206
207ipproto-207
208ipproto-208
209ipproto-209
210ipproto-210
211ipproto-211
212ipproto-212
213ipproto-213
214ipproto-214
215ipproto-215
216ipproto-216
217ipproto-217
218ipproto-218
219ipproto-219
220ipproto-220
221ipproto-221
222ipproto-222
223ipproto-223
224ipproto-224
225ipproto-225
226ipproto-226
227ipproto-227
228ipproto-228
229ipproto-229
230ipproto-230
231ipproto-231
232ipproto-232
233ipproto-233
234ipproto-234
235ipproto-235
236ipproto-236
237ipproto-237
238ipproto-238
239ipproto-239
240ipproto-240
241ipproto-241
242ipproto-242
243ipproto-243
244ipproto-244
245ipproto-245
246ipproto-246
247ipproto-247
248ipproto-248
249ipproto-249
250ipproto-250
251ipproto-251
252ipproto-252
253ipproto-253
254ipproto-254
255dont-verify
.0.16.1.24
ipsecBundleLocalAddress
The local address (host or network or range start address)
of the traffic selectors,
source for outbound, destination for inbound.
SNMPv2-SMIIpAddress
Textual Convention: SNMPv2-SMIIpAddress OctetString
Type Constraints:
range: 4
.0.16.1.25
ipsecBundleLocalMaskLen
The local network masklen of the traffic selectors,
source for outbound, destination for inbound.
Integer32
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.16.1.26
ipsecBundleLocalRange
The local address range end address of the traffic selectors,
source for outbound, destination for inbound.
SNMPv2-SMIIpAddress
Textual Convention: SNMPv2-SMIIpAddress OctetString
Type Constraints:
range: 4
.0.16.1.27
ipsecBundleLocalPort
The local port of the traffic selectors,
source for outbound, destination for inbound.
Integer32
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.16.1.28
ipsecBundleRemoteAddress
The remote address (host or network or range start address)
of the traffic selectors
source for outbound, destination for inbound.
SNMPv2-SMIIpAddress
Textual Convention: SNMPv2-SMIIpAddress OctetString
Type Constraints:
range: 4
.0.16.1.29
ipsecBundleRemoteMaskLen
The remote network masklen of the traffic selectors
source for outbound, destination for inbound.
Integer32
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.16.1.30
ipsecBundleRemoteRange
The remote address range end address of the traffic selectors
source for outbound, destination for inbound.
SNMPv2-SMIIpAddress
Textual Convention: SNMPv2-SMIIpAddress OctetString
Type Constraints:
range: 4
.0.16.1.31
ipsecBundleRemotePort
The remote port of the traffic selectors
source for outbound, destination for inbound.
Integer32
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.16.1.32
ipsecBundleInPkt
The total number of inbound packets processed by this bundle.
SNMPv2-SMICounter64
Textual Convention: SNMPv2-SMICounter64 Unsigned64
Type Constraints:
range: 0..18446744073709551615
.0.16.1.33
ipsecBundleInHb
The number of heartbeat packets received over this bundle.
SNMPv2-SMICounter64
Textual Convention: SNMPv2-SMICounter64 Unsigned64
Type Constraints:
range: 0..18446744073709551615
.0.16.1.34
ipsecBundleInBytes
The number of inbound bytes (including IPSec overhead)
processed by this bundle.
bytesSNMPv2-SMICounter64
Textual Convention: SNMPv2-SMICounter64 Unsigned64
Type Constraints:
range: 0..18446744073709551615
.0.16.1.35
ipsecBundleInBytesNetto
The number of inbound bytes (netto: IPSec headers excluded)
processed by this bundle.
bytesSNMPv2-SMICounter64
Textual Convention: SNMPv2-SMICounter64 Unsigned64
Type Constraints:
range: 0..18446744073709551615
.0.16.1.37
ipsecBundleOutPkt
The total number of outbound packets processed by this bundle.
SNMPv2-SMICounter64
Textual Convention: SNMPv2-SMICounter64 Unsigned64
Type Constraints:
range: 0..18446744073709551615
.0.16.1.39
ipsecBundleOutHb
The number of heartbeat packets sent for this bundle.
SNMPv2-SMICounter64
Textual Convention: SNMPv2-SMICounter64 Unsigned64
Type Constraints:
range: 0..18446744073709551615
.0.16.1.40
ipsecBundleOutBytes
The number of outbound bytes (including IPSec overhead)
processed by this bundle.
bytesSNMPv2-SMICounter64
Textual Convention: SNMPv2-SMICounter64 Unsigned64
Type Constraints:
range: 0..18446744073709551615
.0.16.1.41
ipsecBundleOutBytesNetto
The number of outbound bytes (netto: IPSec headers excluded)
processed by this bundle.
bytesSNMPv2-SMICounter64
Textual Convention: SNMPv2-SMICounter64 Unsigned64
Type Constraints:
range: 0..18446744073709551615
.0.16.1.43
ipsecBundleNatT
This object specifies if the udp encapsulation of ESP packets
is active within this bundle.
Possible values:
enabled(1), -- use udp encapsulation
disabled(2) -- do not use udp encapsulation.
Enumeration
Enumerated Values:
1enabled
2disabled
.0.16.1.45
ipsecBundleNatOaLocal
The local IP address as seen by the remote side.
Only valid for transport mode bundles with NatT enabled.
SNMPv2-SMIIpAddress
Textual Convention: SNMPv2-SMIIpAddress OctetString
Type Constraints:
range: 4
.0.16.1.46
ipsecBundleNatOaRemote
The remote IP address as seen by the remote side.
Only valid for transport mode bundles with NatT enabled.
SNMPv2-SMIIpAddress
Textual Convention: SNMPv2-SMIIpAddress OctetString
Type Constraints:
range: 4
.0.16.1.47
ipsecBundleIkeMajVersion
The IKE major version number.
Integer32
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.16.1.48
ipsecBundleIkeMinVersion
The IKE minor version number.
Integer32
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.16.1.49
.0.17 · 1 row entry · 7 columns
This table contains the list of supported IPSec algorithms
and their key sizes.
ipsecAlgorithmEntry entry .0.17.1
This object contains an IPSec algorithm.
Indexes
ipsecAlgId
Column Syntax OID
ipsecAlgId
The id of the algorithm.
Possible values:
aes(1), -- AES cipher alg
twofish(2), -- Twofish cipher alg
blowfish(3), -- Blowfish cipher alg
cast(4), -- Cast cipher alg
des3(5), -- Triple DES cipher alg
des(6),…
Enumeration
Enumerated Values:
1aes
2twofish
3blowfish
4cast
5des3
6des
7null
31rijndael
.0.17.1.1
ipsecAlgMinKeySize
The minimum key length in bits possible for this algorithm.
bitsInteger32
Constraints:
range: 0-2048
.0.17.1.3
ipsecAlgDefKeySize
The default key length in bits used for this algorithm.
bitsInteger32
Constraints:
range: 0-2048
.0.17.1.4
ipsecAlgMaxKeySize
The maximum key length in bits possible for this algorithm.
bitsInteger32
Constraints:
range: 0-2048
.0.17.1.5
ipsecAlgUseMinKeySize obsolete
WARNING: this object is obsolete and must not be used.
bitsInteger32
Constraints:
range: 0-2048
.0.17.1.6
ipsecAlgUseDefKeySize obsolete
WARNING: this object is obsolete and must not be used.
bitsInteger32
Constraints:
range: 0-2048
.0.17.1.7
ipsecAlgUseMaxKeySize obsolete
WARNING: this object is obsolete and must not be used.
bitsInteger32
Constraints:
range: 0-2048
.0.17.1.8
.0.18 · 1 row entry · 8 columns
This table contains the list of XAUTH profiles.
xauthProfileEntry entry .0.18.1
This object contains an XAUTH profile.
Indexes
xauthPrfIndex
Column Syntax OID
xauthPrfIndex
A unique index identifying this entry.
Unsigned32r/w
Constraints:
range: 1-4294967295
.0.18.1.1
xauthPrfDescription
An optional description for this profile, only used for
descriptive purposes (max. 50 characters).
OctetStringr/w
Constraints:
range: 0-50
.0.18.1.2
xauthPrfRole
This object specifies which role is choosed for this profile.
Possible values:
server(1) -- XAUTH is used and local device is the XAUTH server,
i.e. this side requests extended authentication
client(2) -- XAU…
Enumerationr/w
Enumerated Values:
1server
2client
.0.18.1.3
xauthPrfMode
This object specifies the kind how to get user data for authentication.
Possible values:
local(1), -- user data are configured locally in the entries
of xauthUserListTable that are referenced by
xauthPrfUserList…
Enumerationr/w
Enumerated Values:
1local
2radius
.0.18.1.4
xauthPrfAAAServerGroupId
This object specifies the group ID which is used for RADIUS
authentication to find the associated server entry in
radiusSrvTable for XAUTH. See description of radiusSrvGroupId for
details.
This object is only valid for…
Integer32r/w
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.18.1.5
xauthPrfUserListGroupId
This object refers to a group of one or more user entries in
xauthUserListTable.
This object is only valid for entries with xauthPrfUserMode 'local'.
Integer32r/w
Constraints:
range: 1-1000
.0.18.1.6
xauthPrfTimeout obsolete
WARNING: this object is obsolete and must not be used.
secondsInteger32r/w
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.18.1.7
xauthPrfAdminStatus
MIB entry deletion is performed by this object:
- enable : enables xauthPrfTable entry
- delete : deletes xauthPrfTable entry.
Enumerationr/w
Enumerated Values:
1enable
2delete
.0.18.1.8
.0.19 · 1 row entry · 6 columns
This table contains the list of XAUTH users.
xauthUserListEntry entry .0.19.1
This object contains an XAUTH user.
Indexes
xauthUserListIndex
Column Syntax OID
xauthUserListIndex
A unique index identifying this entry.
Integer32r/w
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.19.1.1
xauthUserListGroupId
ID for creating logical groups of XAUTH users.
Integer32r/w
Constraints:
range: 1-1000
.0.19.1.2
xauthUserListName
This object specifies the user name.
OctetStringr/w
Constraints:
range: 1-63
.0.19.1.3
xauthUserListPassword
This object specifies the user's password.
This field serves only as an input field and its contents
is replaced with a single asterisk immediately after it is set.
OctetStringr/w
Constraints:
range: 0-63
.0.19.1.4
xauthUserListPasswordData
Field used for storing the user's password permanently.
OctetString .0.19.1.5
xauthUserListAdminStatus
MIB entry deletion is performed by this object:
- enable : enables xauthUserListTable entry
- delete : deletes xauthUserListTable entry.
Enumerationr/w
Enumerated Values:
1enable
2delete
.0.19.1.6
.0.28 · 1 row entry · 47 columns
This table contains the list of IPSec peers status and statistic variables.
ipsecPeerStatEntry entry .0.28.1
This object contains the status and statistic variables of an IPSec peer.
Indexes
ipsecPeerStatIndex
Column Syntax OID
ipsecPeerStatIndex
A unique index identifying this entry.
Integer32
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.28.1.1
ipsecPeerStatNextIndex
The index of the next peer in hierarchy.
Integer32
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.28.1.2
ipsecPeerStatCaCerts
Receives a comma separated list with indices of optional
certificate authority certificates accepted for this peer.
SNMPv2-TCDisplayString
Textual Convention: SNMPv2-TCDisplayString OctetString
Type Constraints:
range: 0..255
.0.28.1.3
ipsecPeerStatPeerAddress
This object shows the fixed IP-address of the peer, if any.
SNMPv2-SMIIpAddress
Textual Convention: SNMPv2-SMIIpAddress OctetString
Type Constraints:
range: 4
.0.28.1.4
ipsecPeerStatLocalId
The local ID used for authentication.
Syntax:
- X500 distinguished name:
<obj-name=obj-value, obj-ID=obj-value, ...>
- IPV4-Address:
|123.456.789.012| with or without '|'
- IPV4 Address Range:
|123.456…
SNMPv2-TCDisplayString
Textual Convention: SNMPv2-TCDisplayString OctetString
Type Constraints:
range: 0..255
.0.28.1.5
ipsecPeerStatLocalCert
The index of the certificate used for local authentication
in the certTable. Only useful for automatically keyed traffic
with dsa or rsa authentication.
Integer32
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.28.1.6
ipsecPeerStatPublicInterface
This object specifies the index of the public interface
for which the traffic list assigned to this peer should be
valid.
If set to -1, the traffic list is valid for all interfaces.

If the traffic is ro…
Integer32
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.28.1.7
ipsecPeerStatIkeProposals
Index of default ike proposal used for peers with empty default
ike proposal.
Integer32
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.28.1.8
ipsecPeerStatPfsIdentity
This object specifies whether IKE SA's should be deleted
immediately after a phase 2 (IPSec-) SA pair has been
negotiated.
If overrides the default setting ipsecGlobContDefaultPfsIdentity
if not set to 'default'.
The c…
Enumeration
Enumerated Values:
1true
2false
3default
.0.28.1.9
ipsecPeerStatAuthMethod
This object specifies the authentication method used for this peer.
It overrides the setting in the IKE proposals used.
Possible values:
pre-sh-key(1), -- Authentication using pre shared keys
dss-sig(2), -- Auth…
Enumeration
Enumerated Values:
1pre-sh-key
2dss-sig
3rsa-sig
4rsa-enc
14default
15delete
.0.28.1.10
ipsecPeerStatIkeGroup
This object specifies a special IKE group which is to be used
for this peer only. It overrides the setting in the ikeProposal
used.
Possible values:
0: use the value from the ikeProposal used
1: a 768-bit MODP grou…
Integer32
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.28.1.11
ipsecPeerStatPfsGroup
The Diffie Hellman group used for additional Perfect
Forward Secrecy (PFS) DH exponentiations.
Possible values:
-1: explicitly do not use PFS
(overrides ipsecGlob2DefaultPfsGroup),
0: use default value from i…
Integer32
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.28.1.12
ipsecPeerStatPh1Mode
This object specifies the exchange mode used for IKE
SA negotiation.
Possible values:
id-protect(1), -- Use identity protection (main) mode
aggressive(2), -- Use aggressive mode
default(3) -- Use default setti…
Enumeration
Enumerated Values:
1id-protect
2aggressive
3default
.0.28.1.13
ipsecPeerStatIkeLifeTime
This object specifies an index in the ipsecLifeTimeTable with the
lifetime settings to be used for IKE SA negotiation with this peer.
It overrides the setting in the IKE proposal used.
If the lifetime pointed to by th…
Integer32
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.28.1.14
ipsecPeerStatIpsecLifeTime
This object specifies an index in the
ipsecLifeTimeTable. This lifetime overwrites the
lifetimes specified for all traffic entries and their
proposals referenced by this peer entry. If the
lifetime pointed to by this in…
Integer32
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.28.1.15
ipsecPeerStatKeepAlive
This object specifies whether IKE SA's with this peer
are rekeyed even if there was no data transferred over
them.
Possible values:
true(1), -- rekey SA's even if no data was transferred
false(2) -- do not rekey S…
Enumeration
Enumerated Values:
1true
2false
.0.28.1.16
ipsecPeerStatGranularity
This object specifies the granularity with which SA's
with this peer are created.
Possible values:
default(1), -- use the setting from the ipsecGlobalsTable
coarse(2), -- Create only one SA for each Traffic entry
Enumeration
Enumerated Values:
1default
2coarse
3ip
4proto
5port
.0.28.1.17
ipsecPeerStatDontVerifyPad
This object is a compatibility option for older ipsec
implementations. It enables or disables an old way of ESP
padding (no self describing padding).
Possible values:
false(1), -- normal, self-describing ESP paddi…
Enumeration
Enumerated Values:
1false
2true
.0.28.1.18
ipsecPeerStatNoPmtuDiscovery
This object specifies the PMTU discovery policy for this peer.
Possible values:
true(1), -- do not perform PMTU discovery
false(2) -- perform PMTU discovery
default(3)-- use default settings from
-- ipsecGlo…
Enumeration
Enumerated Values:
1true
2false
3default
.0.28.1.19
ipsecPeerStatOperStatus
Peer operational state.
Enumeration
Enumerated Values:
1up
2down
5dormant
6blocked
33awaiting-callback
35ip-lookup
36going-up
37wait-if
38wait-publish
39wait-localip
40going-up-trans
.0.28.1.20
ipsecPeerStatDefaultIpsecProposals
The index of the default IPSec proposal used for
encrypting all the traffic bound to the (optional)
logical interface created for this peer.
Integer32
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.28.1.21
ipsecPeerStatHeartbeat
This object specifies whether heartbeats should be sent
over phase 1 SAs for this peer.
Possible values:
none(1), -- neither send nor expect heartbeats
expect(2), -- expect heartbeats
send(3), -- send h…
Enumeration
Enumerated Values:
1none
2expect
3send
4both
5default
.0.28.1.22
ipsecPeerStatTtl
This object shows the maximum period of time in seconds
the peer will remain in the current state.
Integer32
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.28.1.23
ipsecPeerStatCurrentLocalAddress
The currently used local IP-address for this peer.
SNMPv2-SMIIpAddress
Textual Convention: SNMPv2-SMIIpAddress OctetString
Type Constraints:
range: 4
.0.28.1.24
ipsecPeerStatCurrentRemoteAddress
The currently known remote IP-address of this peer.
SNMPv2-SMIIpAddress
Textual Convention: SNMPv2-SMIIpAddress OctetString
Type Constraints:
range: 4
.0.28.1.25
ipsecPeerStatNumP1
The number of current IKE SAs for this peer.
Integer32
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.28.1.26
ipsecPeerStatNumP1Negotiating
The number of current IKE SAs in state 'negotiating'
for this peer.
Integer32
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.28.1.27
ipsecPeerStatNumP1Established
The number of current IKE SAs in state 'established'
for this peer.
Integer32
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.28.1.28
ipsecPeerStatNumP1Deleted
The number of current IKE SAs in state 'waiting_for_remove'
for this peer.
Integer32
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.28.1.29
ipsecPeerStatNumBundles
The number of current IPSec SA bundles for this peer.
Integer32
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.28.1.30
ipsecPeerStatNumBundlesNegotiating
The number of current IPSec SA bundles for this peer.
Integer32
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.28.1.31
ipsecPeerStatNumBundlesEstablished
The number of current IPSec SA bundles in state 'established'
for this peer.
Integer32
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.28.1.32
ipsecPeerStatPh1LToken
Locally generated token that must be used by triggered peer
upon call back.
Integer32
Constraints:
range: 0-65535
.0.28.1.33
ipsecPeerStatPh1RToken
Remotely generated token which must be used during phase one
of IPsec connection establishment.
Integer32
Constraints:
range: 0-65535
.0.28.1.34
ipsecPeerStatIsdnCBNextMode
Define callback mode that is to be tried next.
The following modes are defined:
unknown(1) -- still unset, derive it from other
settings
d-llc(2) -- use D channel mode with LLC next
d-subaddr(3) -- us…
Enumeration
Enumerated Values:
1unknown
2d-llc
3d-subaddr
4d-llc-subaddr
5b
.0.28.1.35
ipsecPeerStatNatDetect
The latest result of the NAT detection performed with the peer.
Possible values:
local(1), -- local NAT detected
remote(2), -- remote NAT detected
both(3), -- local and remote NAT detected
none(4), -- no NAT present…
Enumeration
Enumerated Values:
1local
2remote
3both
4none
8unknown
.0.28.1.36
ipsecPeerStatNatTLocalPort
The local port currently usd for NAT-T IKE and ESP SAs
with this Peer.
Integer32
Constraints:
range: 0-65535
.0.28.1.37
ipsecPeerStatNatTRemotePort
The remote port currently usd for NAT-T IKE and ESP SAs
with this Peer.
Integer32
Constraints:
range: 0-65535
.0.28.1.38
ipsecPeerStatMtu
The current MTU of this peer. This value is copied to ifMtu if
ipsecPeerVirtualInterface is set to enabled.
Integer32
Constraints:
range: 0-65535
.0.28.1.39
ipsecPeerStatRxIdle
The time period for which no packet has been received
from this peer.
SNMPv2-SMITimeTicks
Textual Convention: SNMPv2-SMITimeTicks Unsigned32
Type Constraints:
range: 0..4294967295
.0.28.1.40
ipsecPeerStatTxIdle
The time period for which no packet has been transmitted
to this peer.
SNMPv2-SMITimeTicks
Textual Convention: SNMPv2-SMITimeTicks Unsigned32
Type Constraints:
range: 0..4294967295
.0.28.1.41
ipsecPeerStatDPD
The type of Dead Peer Detection (DPD) currently active
for this peer.
Possible values:
none(1) -- DPD not active
v1(2) -- DPD Version 1 active
v1-idle(3) -- DPD Version 1 in idle mode active
ikev2(4) -- IKEv2 INFOR…
Enumeration
Enumerated Values:
1none
2v1
3v1-idle
4ikev2
.0.28.1.42
ipsecPeerStatDPDRetries
The nuber of DPD retries currently sent without reply.
Integer32
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.28.1.43
ipsecPeerStatNumIkeSas
The number of current IKE SAs for this peer (only for IKEv2).
Integer32
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.28.1.44
ipsecPeerStatNumIkeSasNegotiating
The number of current IKE SAs in state 'negotiating'
for this peer (only for IKEv2).
Integer32
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.28.1.45
ipsecPeerStatNumIkeSasEstablished
The number of current IKE SAs in state 'established'
for this peer (only for IKEv2).
Integer32
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.28.1.46
ipsecPeerStatNumIkeSasDeleted
The number of current IKE SAs in state 'waiting_for_remove'
for this peer (only for IKEv2).
Integer32
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.28.1.47
.0.29 · 1 row entry · 12 columns
This table contains peer related lists of traffic permitted
for Phase 2 negotiation. Note that this table contains
optional entries solely, in the default case (no entries)
subsequently no restriction will take place.
This table contains peer related lists of traffic permitted
for Phase 2 negotiation. Note that this table contains
optional entries solely, in the default case (no entries)
subsequently no restriction will take place.
Indexes
ipsecPeerTrafficIfindex ipsecPeerTrafficLocalAddress ipsecPeerTrafficRemoteAddress
Column Syntax OID
ipsecPeerTrafficIfindex
.
Integer32r/w
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.0.29.1.1
ipsecPeerTrafficDescription
An optional human readable description for this entry.
SNMPv2-TCDisplayStringr/w
Textual Convention: SNMPv2-TCDisplayString OctetString
Type Constraints:
range: 0..255
.0.29.1.2
ipsecPeerTrafficLocalAddress
The local IP-address of this entry. It maybe
either a single address or a network address (in
combination with ipsecPeerTrafficLocalMask).
SNMPv2-SMIIpAddressr/w
Textual Convention: SNMPv2-SMIIpAddress OctetString
Type Constraints:
range: 4
.0.29.1.3
ipsecPeerTrafficLocalMask
The length of the network mask for a local network.
SNMPv2-SMIIpAddressr/w
Textual Convention: SNMPv2-SMIIpAddress OctetString
Type Constraints:
range: 4
.0.29.1.4
ipsecPeerTrafficLocalPort
The local port defined for this entry.
Integer32r/w
Constraints:
range: -1-65535
.0.29.1.5
ipsecPeerTrafficLocalPortRange
The local port range defined for this entry.
Integer32r/w
Constraints:
range: 0-65534
.0.29.1.6
ipsecPeerTrafficRemoteAddress
The remote IP-address of this entry. It maybe
either a single address or a network address (in
combination with ipsecPeerTrafficRemoteMask).
SNMPv2-SMIIpAddressr/w
Textual Convention: SNMPv2-SMIIpAddress OctetString
Type Constraints:
range: 4
.0.29.1.7
ipsecPeerTrafficRemoteMask
The network mask for a remote network.
SNMPv2-SMIIpAddressr/w
Textual Convention: SNMPv2-SMIIpAddress OctetString
Type Constraints:
range: 4
.0.29.1.8
ipsecPeerTrafficRemotePort
The remote UDP/TCP port defined for this entry.
Integer32r/w
Constraints:
range: -1-65535
.0.29.1.9
ipsecPeerTrafficRemotePortRange
The remote UDP/TCP port range defined for this entry.
Integer32r/w
Constraints:
range: 0-65534
.0.29.1.10
ipsecPeerTrafficProtocol
The transport protocol defined for this entry.
Enumerationr/w
Enumerated Values:
1icmp
2igmp
3ggp
4ipip
5st
6tcp
7cbt
8egp
9igp
10bbn
11nvp
12pup
13argus
14emcon
15xnet
16chaos
17udp
18mux
19dcn
20hmp
21prm
22xns
23trunk1
24trunk2
25leaf1
26leaf2
27rdp
28irtp
29isotp4
30netblt
31mfe
32merit
33sep
34pc3
35idpr
36xtp
37ddp
38idprc
39tp
40il
41ipv6
42sdrp
43ipv6route
44ipv6frag
45idrp
46rsvp
47gre
48mhrp
49bna
50esp
51ah
52inlsp
53swipe
54narp
55mobile
56tlsp
57skip
58ipv6icmp
59ipv6nonxt
60ipv6opts
61ipproto-61
62cftp
63local
64sat
65kryptolan
66rvd
67ippc
68distfs
69satmon
70visa
71ipcv
72cpnx
73cphb
74wsn
75pvp
76brsatmon
77sunnd
78wbmon
79wbexpak
80isoip
81vmtp
82securevmtp
83vines
84ttp
85nsfnet
86dgp
87tcf
88eigrp
89ospfigp
90sprite
91larp
92mtp
93ax25
94ipwip
95micp
96scc
97etherip
98encap
99encrypt
100gmtp
101ifmp
102pnni
103pim
104aris
105scps
106qnx
107an
108ippcp
109snp
110compaq
111ipxip
112vrrp
113pgm
114hop0
115l2tp
116ipproto-116
117ipproto-117
118ipproto-118
119ipproto-119
120ipproto-120
121ipproto-121
122ipproto-122
123ipproto-123
124ipproto-124
125ipproto-125
126ipproto-126
127ipproto-127
128ipproto-128
129ipproto-129
130ipproto-130
131ipproto-131
132ipproto-132
133ipproto-133
134ipproto-134
135ipproto-135
136ipproto-136
137ipproto-137
138ipproto-138
139ipproto-139
140ipproto-140
141ipproto-141
142ipproto-142
143ipproto-143
144ipproto-144
145ipproto-145
146ipproto-146
147ipproto-147
148ipproto-148
149ipproto-149
150ipproto-150
151ipproto-151
152ipproto-152
153ipproto-153
154ipproto-154
155ipproto-155
156ipproto-156
157ipproto-157
158ipproto-158
159ipproto-159
160ipproto-160
161ipproto-161
162ipproto-162
163ipproto-163
164ipproto-164
165ipproto-165
166ipproto-166
167ipproto-167
168ipproto-168
169ipproto-169
170ipproto-170
171ipproto-171
172ipproto-172
173ipproto-173
174ipproto-174
175ipproto-175
176ipproto-176
177ipproto-177
178ipproto-178
179ipproto-179
180ipproto-180
181ipproto-181
182ipproto-182
183ipproto-183
184ipproto-184
185ipproto-185
186ipproto-186
187ipproto-187
188ipproto-188
189ipproto-189
190ipproto-190
191ipproto-191
192ipproto-192
193ipproto-193
194ipproto-194
195ipproto-195
196ipproto-196
197ipproto-197
198ipproto-198
199ipproto-199
200ipproto-200
201ipproto-201
202ipproto-202
203ipproto-203
204ipproto-204
205ipproto-205
206ipproto-206
207ipproto-207
208ipproto-208
209ipproto-209
210ipproto-210
211ipproto-211
212ipproto-212
213ipproto-213
214ipproto-214
215ipproto-215
216ipproto-216
217ipproto-217
218ipproto-218
219ipproto-219
220ipproto-220
221ipproto-221
222ipproto-222
223ipproto-223
224ipproto-224
225ipproto-225
226ipproto-226
227ipproto-227
228ipproto-228
229ipproto-229
230ipproto-230
231ipproto-231
232ipproto-232
233ipproto-233
234ipproto-234
235ipproto-235
236ipproto-236
237ipproto-237
238ipproto-238
239ipproto-239
240ipproto-240
241ipproto-241
242ipproto-242
243ipproto-243
244ipproto-244
245ipproto-245
246ipproto-246
247ipproto-247
248ipproto-248
249ipproto-249
250ipproto-250
251ipproto-251
252ipproto-252
253ipproto-253
254ipproto-254
256dont-verify
.0.29.1.11
ipsecPeerTrafficPolicy
This object specifies whether this network policy is used
for inbound, outbound or both processing.
Possible values:
delete(1) -- delete this entry
role-initiator(2) -- P2 initiator mode traffic policy
role-…
Enumerationr/w
Enumerated Values:
1delete
2role-initiator
3role-responder
4both
.0.29.1.12