FS-VPNPOLICY-MIB Table View

Table-centric layout grouping table, row, and column objects.

Tables
6
Rows
6
Columns
67
.1.3.6.1.4.1.2076.143.1.1 · 1 row entry · 43 columns
This table contains the VPN association
between a source and destination. It is
consulted for authentication and ciphering of
inbound and outbound datagrams. Datagrams which
are forwarded by this entity are not authenticated.
fsVpnEntry entry .1.3.6.1.4.1.2076.143.1.1.1
Each entry is a unique parameter to identify the mapping between
a particular source and destination address. The
entry specifies the authentication algorithm and
key to use, the direction of authentication
(inbound or …
Indexes
fsVpnPolicyName
Column Syntax OID
fsVpnPolicyName
This is the index for accessing Ip Security table entries.
OctetString
Constraints:
range: 0-50
.1.3.6.1.4.1.2076.143.1.1.1.1
fsVpnPolicyType
An entity to identify the type of policy
Enumerationr/w
Enumerated Values:
1ipsecManual
2ikePresharedkey
3ikeCertificate
4xauth
5raVpnPresharedKey
.1.3.6.1.4.1.2076.143.1.1.1.2
fsVpnPolicyPriority
An entity to identify the priority of the Policy
Integer32r/w
Constraints:
range: 1-2147483647
.1.3.6.1.4.1.2076.143.1.1.1.3
fsVpnTunTermAddrType
The tunnel termination IP address type. This object support only
ipv4(1), ipv6(2) values.
INET-ADDRESS-MIBInetAddressTyper/w
Textual Convention: INET-ADDRESS-MIBInetAddressType Enumeration
Type Values:
0unknown
1ipv4
2ipv6
3ipv4z
4ipv6z
16dns
25l2vpn
.1.3.6.1.4.1.2076.143.1.1.1.4
fsVpnLocalTunTermAddr
This address is matched with the
local address in the packet during
authentication of inbound and outbound datagrams.
INET-ADDRESS-MIBInetAddressr/w
Textual Convention: INET-ADDRESS-MIBInetAddress OctetString
Type Constraints:
range: 0..255
.1.3.6.1.4.1.2076.143.1.1.1.5
fsVpnRemoteTunTermAddr
This address is matched with the
destination address in the packet during
authentication of inbound and outbound datagrams.
INET-ADDRESS-MIBInetAddressr/w
Textual Convention: INET-ADDRESS-MIBInetAddress OctetString
Type Constraints:
range: 0..255
.1.3.6.1.4.1.2076.143.1.1.1.6
fsVpnProtectNetworkType
The local protected network address type. This object support
only ipv4(1), ipv6(2) values.
INET-ADDRESS-MIBInetAddressTyper/w
Textual Convention: INET-ADDRESS-MIBInetAddressType Enumeration
Type Values:
0unknown
1ipv4
2ipv6
3ipv4z
4ipv6z
16dns
25l2vpn
.1.3.6.1.4.1.2076.143.1.1.1.7
fsVpnLocalProtectNetwork
This address is used in identifying the source
network for a given VPN policy.
INET-ADDRESS-MIBInetAddressr/w
Textual Convention: INET-ADDRESS-MIBInetAddress OctetString
Type Constraints:
range: 0..255
.1.3.6.1.4.1.2076.143.1.1.1.8
fsVpnLocalProtectNetworkPrefixLen
The length of the local protected network prefix.
INET-ADDRESS-MIBInetAddressPrefixLengthr/w
Textual Convention: INET-ADDRESS-MIBInetAddressPrefixLength Unsigned32
Type Constraints:
range: 0..2040
.1.3.6.1.4.1.2076.143.1.1.1.9
fsVpnRemoteProtectNetwork
This address is used in identifying the
destination network for a given VPN policy.
INET-ADDRESS-MIBInetAddressr/w
Textual Convention: INET-ADDRESS-MIBInetAddress OctetString
Type Constraints:
range: 0..255
.1.3.6.1.4.1.2076.143.1.1.1.10
fsVpnRemoteProtectNetworkPrefixLen
The length of the remote protected network prefix.
INET-ADDRESS-MIBInetAddressPrefixLengthr/w
Textual Convention: INET-ADDRESS-MIBInetAddressPrefixLength Unsigned32
Type Constraints:
range: 0..2040
.1.3.6.1.4.1.2076.143.1.1.1.11
fsVpnIkeSrcPortRange
This object specifies the Source port range for the
Traffic Selectors for IKEv2.
OctetStringr/w
Constraints:
range: 1-11
.1.3.6.1.4.1.2076.143.1.1.1.12
fsVpnIkeDstPortRange
This object specifies the Destination port range for the
Traffic Selectors for IKEv2.
OctetStringr/w
Constraints:
range: 1-11
.1.3.6.1.4.1.2076.143.1.1.1.13
fsVpnSecurityProtocol
Security protocol header used for authentication
(AH) or (ESP).
Enumerationr/w
Enumerated Values:
50espproto
51ahproto
.1.3.6.1.4.1.2076.143.1.1.1.14
fsVpnInboundSpi
This is an arbitrary 32-bit value identifying
the security association for this datagram. This
also indicates the SPI for the inbound direction.
The Security Parameter Index value 0 is reserved to
Indicate that 'no secu…
Integer32r/w
Constraints:
range: 256-2147483647
.1.3.6.1.4.1.2076.143.1.1.1.15
fsVpnOutboundSpi
This is an arbitrary 32-bit value identifying
the security association for this datagram. This
also indicates the SPI for the outbound direction. The
Security Parameter Index value 0 is reserved to
Indicate that 'no sec…
Integer32r/w
Constraints:
range: 256-2147483647
.1.3.6.1.4.1.2076.143.1.1.1.16
fsVpnMode
The supporting security association mode
The security association mode must be configured as
tunnel for a security gateway.
A Host can be configured both
in transport and tunnel mode
Enumerationr/w
Enumerated Values:
1tunnel
2transport
.1.3.6.1.4.1.2076.143.1.1.1.17
fsVpnAuthAlgo
The authentication algorithm configured for
the particular security association entry.
Setting the algorithm to hmac-md5 (3),
hmac-sha1(4),xcbcmac(5),hmac-sha-256(12),hmac-sha-384(13)
and hmac-sha-512(14) requires a key…
Enumerationr/w
Enumerated Values:
1hmacmd5
2hmacsha1
5xcbcmac
12hmacsha256
13hmacsha384
14hmacsha512
.1.3.6.1.4.1.2076.143.1.1.1.18
fsVpnAhKey
This is the key used for authentication
when the algorithm configured is either
hmac-md5 , hmac-sha1 ,xcbcmac,hmac-sha-256(12),hmac-sha-384(13)
or hmac-sha-512(14).For HmacMd5and xcbcmac
the key must be 16 bytes, for Hm…
OctetStringr/w
Constraints:
range: 0-64
.1.3.6.1.4.1.2076.143.1.1.1.19
fsVpnEncrAlgo
The algorithm to be used for Encapsulation
Security Payload (ESP) Header. This object is to
be configured only if the Security protocol to be
used is ESP. This entity is used only for IPSEC-Manual.

DES - …
Enumerationr/w
Enumerated Values:
4descbc
5tripledescbc
12aes128
13aes192
14aes256
.1.3.6.1.4.1.2076.143.1.1.1.20
fsVpnEspKey
This is the key used for encryption/decryption
when the algorithm configured is either
descbc,3descbc or aes128,aes192 or aes256.For
3descbc this object is used for configuring the first
key. This entity is used only fo…
OctetStringr/w
Constraints:
range: 0-256
.1.3.6.1.4.1.2076.143.1.1.1.21
fsVpnAntiReplay
The object is used for activating the anti
replay functionality of the security protocols.
This entity is used only for IPSEC-Manual
Enumerationr/w
Enumerated Values:
1enable
2disable
.1.3.6.1.4.1.2076.143.1.1.1.22
fsVpnPolicyFlag
The choices that can be applied on
any outbound/inbound datagrams.
Enumerationr/w
Enumerated Values:
1filter
3apply
4bypass
.1.3.6.1.4.1.2076.143.1.1.1.23
fsVpnProtocol
The Proto index value which uniquely identifies
the protocol for which this Selector Table entry
exists.In case of no specific protocol any can be
used whose value is assigned as 9000
Enumerationr/w
Enumerated Values:
1icmpv4
6tcp
17udp
50espproto
51ahproto
58icmpv6
9000any
.1.3.6.1.4.1.2076.143.1.1.1.24
fsVpnPolicyIntfIndex
This is the interface for which the VPN policy is to be applied.
The value zero indicates interface is not configured yet.
IF-MIBInterfaceIndexOrZeror/w
Textual Convention: IF-MIBInterfaceIndexOrZero Integer32
Type Constraints:
range: 0..2147483647
.1.3.6.1.4.1.2076.143.1.1.1.25
fsVpnIkePhase1HashAlgo
SHA - Specifies to use Secure Hash Algorithm (SHA) as the hash
algorithm. SHA1 produces 160-bit hash values, SHA256 produces 256-bit
hash values, SHA384 produces 384-bit hash values, SHA512 produces
512-bit hash values…
Enumerationr/w
Enumerated Values:
1md5
2sha1
12sha256
13sha384
14sha512
.1.3.6.1.4.1.2076.143.1.1.1.26
fsVpnIkePhase1EncryptionAlgo
Specifies which encryption algorithm should be used in Policy
negotiation
Enumerationr/w
Enumerated Values:
4descbc
5tripledescbc
12aes128
13aes192
14aes256
.1.3.6.1.4.1.2076.143.1.1.1.27
fsVpnIkePhase1DHGroup
Diffie-Hellman (DH) is a public key cryptography protocol that enables
two parties to establish a shared secret over unsecured communications
channels. It will be used in Internet Key Exchange (IKE) to establish
session…
Enumerationr/w
Enumerated Values:
1group1
2group2
5group5
14group14
.1.3.6.1.4.1.2076.143.1.1.1.28
fsVpnIkePhase1LocalIdType
This is Identity Type for supported Local Node.
Enumerationr/w
Enumerated Values:
1ipv4
2fqdn
3email
5ipv6
9dn
11keyId
.1.3.6.1.4.1.2076.143.1.1.1.29
fsVpnIkePhase1LocalIdValue
This is the value for the supported Local Node type of phase 1
SNMPv2-TCDisplayStringr/w
Textual Convention: SNMPv2-TCDisplayString OctetString
Type Constraints:
range: 0..255
.1.3.6.1.4.1.2076.143.1.1.1.30
fsVpnIkePhase1PeerIdType
This is Peer Identity Type supported for phase 1 of the IKE
negotiation.
Enumerationr/w
Enumerated Values:
1ipv4
2fqdn
3email
5ipv6
9dn
11keyId
.1.3.6.1.4.1.2076.143.1.1.1.31
fsVpnIkePhase1PeerIdValue
This is the Peer Identity value for the supported peer type of phase 1.
eg. for ipv4 151.100.10.10, for email abc@xyz.com
SNMPv2-TCDisplayStringr/w
Textual Convention: SNMPv2-TCDisplayString OctetString
Type Constraints:
range: 0..255
.1.3.6.1.4.1.2076.143.1.1.1.32
fsVpnIkePhase1LifeTimeType
Specifies the IKE life time units.
Enumerationr/w
Enumerated Values:
1secs
3mins
4hrs
5days
.1.3.6.1.4.1.2076.143.1.1.1.33
fsVpnIkePhase1LifeTime
Enter the duration, in fsVpnIkePhase1LifeTimeType, of the IKE security
association (SA), after which the IKE SA expires and is re-negotiated.

if you wish to save setup time for new IPsec SAs, configure a …
SNMPv2-SMIInteger32r/w
Textual Convention: SNMPv2-SMIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.1.3.6.1.4.1.2076.143.1.1.1.34
fsVpnIkePhase1Mode
Specifies the IKE Phase 1 mode, whether main or aggressive.
Enumerationr/w
Enumerated Values:
2main
4aggressive
.1.3.6.1.4.1.2076.143.1.1.1.35
fsVpnIkePhase2AuthAlgo
Specifies which hash algorithm to be used
Enumerationr/w
Enumerated Values:
1md5
2sha
5xcbcmac
12hmacsha256
13hmacsha384
14hmacsha512
.1.3.6.1.4.1.2076.143.1.1.1.36
fsVpnIkePhase2EspEncryptionAlgo
Specifies which encryption algorithm should be used for ESP
Enumerationr/w
Enumerated Values:
4descbc
5tripledescbc
11null
12aes128
13aes192
14aes256
15aesctr128
16aesctr192
17aesctr256
.1.3.6.1.4.1.2076.143.1.1.1.37
fsVpnIkePhase2LifeTimeType
Specifies the IPSec SA life time type.
Enumerationr/w
Enumerated Values:
1secs
2kb
3mins
4hrs
5days
.1.3.6.1.4.1.2076.143.1.1.1.38
fsVpnIkePhase2LifeTime
Specifies the IPsec security association (SA) lifetime in
fsVpnIkePhase2LifeTimeType. The SA is re-negotiated after the time limit
elapses.
SNMPv2-SMIInteger32r/w
Textual Convention: SNMPv2-SMIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.1.3.6.1.4.1.2076.143.1.1.1.39
fsVpnIkePhase2DHGroup
Perfect Forward Secrecy (PFS) generates and uses a unique session key
for each encrypted exchange. The unique session key protects the
exchange from subsequent decryption, even if the entire exchange was
recorded and th…
Enumerationr/w
Enumerated Values:
0none
1group1
2group2
5group5
14group14
.1.3.6.1.4.1.2076.143.1.1.1.40
fsVpnIkeVersion
This object is used for configuring the IKE version - IKev1 (1)
or IKEv2 (2) protocol to be used for key negotiation
Enumerationr/w
Enumerated Values:
1ikev1
2ikev2
.1.3.6.1.4.1.2076.143.1.1.1.41
fsVpnCertAlgoType
This object is used for configuring the Authentication Algorithm -
RSA (1) or DSA (2) to be used for authentication
This object needs to configure as RSA (1) or DSA (1) to configure
fsVpnPolicyType object as ikeCertific…
Enumerationr/w
Enumerated Values:
1rsa
2dsa
.1.3.6.1.4.1.2076.143.1.1.1.42
fsVpnPolicyRowStatus
This object is used to create and delete rows from the fsVpnTable.
SNMPv2-TCRowStatusr/w
Textual Convention: SNMPv2-TCRowStatus Enumeration
Type Values:
1active
2notInService
3notReady
4createAndGo
5createAndWait
6destroy
.1.3.6.1.4.1.2076.143.1.1.1.43
.1.3.6.1.4.1.2076.143.1.2 · 1 row entry · 3 columns
This table is used to identify the remote
access users when acting as a RAVPN Server
fsVpnRaUsersEntry entry .1.3.6.1.4.1.2076.143.1.2.1
This table is used for configuration of
usernames and passwords for remote access
users
Indexes
fsVpnRaUserName
Column Syntax OID
fsVpnRaUserName
User Name is the index for accessing
the Remote Users table
OctetString
Constraints:
range: 1-32
.1.3.6.1.4.1.2076.143.1.2.1.1
fsVpnRaUserSecret
Password for the remote user
OctetStringr/w
Constraints:
range: 1-32
.1.3.6.1.4.1.2076.143.1.2.1.2
fsVpnRaUserRowStatus
This object is used to create and delete rows
in the fsVpnRaUsersTable.
SNMPv2-TCRowStatusr/w
Textual Convention: SNMPv2-TCRowStatus Enumeration
Type Values:
1active
2notInService
3notReady
4createAndGo
5createAndWait
6destroy
.1.3.6.1.4.1.2076.143.1.2.1.3
.1.3.6.1.4.1.2076.143.1.3 · 1 row entry · 6 columns
This table is used to allocated IP addresses
to remote users using local address pool
fsVpnRaAddressPoolEntry entry .1.3.6.1.4.1.2076.143.1.3.1
This table is used for configuration of
local address pool for the remote users.
Start and end IP address should be specified
for each pool
Indexes
fsVpnRaAddressPoolName
Column Syntax OID
fsVpnRaAddressPoolName
Pool Name is the index for accessing
the Remote Access Address Pool table
OctetString
Constraints:
range: 1-32
.1.3.6.1.4.1.2076.143.1.3.1.1
fsVpnRaAddressPoolAddrType
IP address type of the pool for remote users This object support
only ipv4(1), ipv6(2) values.
INET-ADDRESS-MIBInetAddressTyper/w
Textual Convention: INET-ADDRESS-MIBInetAddressType Enumeration
Type Values:
0unknown
1ipv4
2ipv6
3ipv4z
4ipv6z
16dns
25l2vpn
.1.3.6.1.4.1.2076.143.1.3.1.2
fsVpnRaAddressPoolStart
Starting IP address of the pool for remote users
INET-ADDRESS-MIBInetAddressr/w
Textual Convention: INET-ADDRESS-MIBInetAddress OctetString
Type Constraints:
range: 0..255
.1.3.6.1.4.1.2076.143.1.3.1.3
fsVpnRaAddressPoolEnd
End IP address of the pool for remote users
INET-ADDRESS-MIBInetAddressr/w
Textual Convention: INET-ADDRESS-MIBInetAddress OctetString
Type Constraints:
range: 0..255
.1.3.6.1.4.1.2076.143.1.3.1.4
fsVpnRaAddressPoolPrefixLen
The prefix length of the address pool
INET-ADDRESS-MIBInetAddressPrefixLengthr/w
Textual Convention: INET-ADDRESS-MIBInetAddressPrefixLength Unsigned32
Type Constraints:
range: 0..2040
.1.3.6.1.4.1.2076.143.1.3.1.5
fsVpnRaAddressPoolRowStatus
This object is used to create and delete rows
in the fsVpnRaAddressPoolTable.
SNMPv2-TCRowStatusr/w
Textual Convention: SNMPv2-TCRowStatus Enumeration
Type Values:
1active
2notInService
3notReady
4createAndGo
5createAndWait
6destroy
.1.3.6.1.4.1.2076.143.1.3.1.6
.1.3.6.1.4.1.2076.143.1.4 · 1 row entry · 5 columns
This table provides VPN tunnels remote users
identities information.
          
The remote identity and the preshared key (PSK)
bindings are globally available to all the VPN
tunnels and can be mapped whenever required.
          
One identity can be mapped to multiple tunnels.
fsVpnRemoteIdEntry entry .1.3.6.1.4.1.2076.143.1.4.1
A row in this table does not support 'notInService'
and 'createAndGo'.
Indexes
fsVpnRemoteIdType fsVpnRemoteIdValue
Column Syntax OID
fsVpnRemoteIdType
User identity types supported by the gateway chosen
to interpret the data of fsVpnRemoteIdValue object.

Ip addresses should be represented with 'ipv4' type.

A fully qualified domain name (o…
Enumeration
Enumerated Values:
1ipv4
2fqdn
3email
5ipv6
9dn
11keyId
.1.3.6.1.4.1.2076.143.1.4.1.1
fsVpnRemoteIdValue
It represents the value corresponding to the type
mentioned in fsVpnRemoteIdType object.

The maximum permitted length of an FQDN is 255 bytes.
SNMPv2-TCDisplayString
Textual Convention: SNMPv2-TCDisplayString OctetString
Type Constraints:
range: 0..255
.1.3.6.1.4.1.2076.143.1.4.1.2
fsVpnRemoteIdKey
This is the pre-shared key with the gateway. The PSK
will be used by the gateway to authenticate the phase-I
IKE transactions with this user.
SNMPv2-TCDisplayStringr/w
Textual Convention: SNMPv2-TCDisplayString OctetString
Type Constraints:
range: 0..255
.1.3.6.1.4.1.2076.143.1.4.1.3
fsVpnRemoteIdAuthType
It represents the value corresponding to the
Authentication method configured.
SNMPv2-SMIInteger32r/w
Textual Convention: SNMPv2-SMIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.1.3.6.1.4.1.2076.143.1.4.1.4
fsVpnRemoteIdStatus
Used to add and delete the remote user identities.

A value of 'createAndGo' is not supported because PSK
is mandatory to authenticate the user.
SNMPv2-TCRowStatusr/w
Textual Convention: SNMPv2-TCRowStatus Enumeration
Type Values:
1active
2notInService
3notReady
4createAndGo
5createAndWait
6destroy
.1.3.6.1.4.1.2076.143.1.4.1.5
.1.3.6.1.4.1.2076.143.1.5 · 1 row entry · 6 columns
This table provides certificates information that 
are used for peer authentication.
          
The certificates are globally available to all the VPN
tunnels and can be mapped whenever required.
          
One identity can be mapped to multiple tunnels.
fsVpnCertInfoEntry entry .1.3.6.1.4.1.2076.143.1.5.1
'createAndGo' is not supported by this table.
Indexes
fsVpnCertKeyString
Column Syntax OID
fsVpnCertKeyString
Key identity string supported by the gateway choosen
to uniquely identify the certificate information.
SNMPv2-TCDisplayString
Textual Convention: SNMPv2-TCDisplayString OctetString
Type Constraints:
range: 0..255
.1.3.6.1.4.1.2076.143.1.5.1.1
fsVpnCertKeyType
It represents the type of algorithm used to
generate the key which is used to generate the
certificate.
RSA - Ron Rivest, Adi Shamir and Len Adleman Algorithm,
DSA - Digital Signature Algorithm.
Enumerationr/w
Enumerated Values:
1rsa
2dsa
.1.3.6.1.4.1.2076.143.1.5.1.2
fsVpnCertKeyFileName
This is the file in which the key used to generate the
certificate is stored.
SNMPv2-TCDisplayStringr/w
Textual Convention: SNMPv2-TCDisplayString OctetString
Type Constraints:
range: 0..255
.1.3.6.1.4.1.2076.143.1.5.1.3
fsVpnCertFileName
This is the file in which the certificate information
is stored. This will be used by the gateway to
authenticate the phase-I IKE transactions with this user.
SNMPv2-TCDisplayStringr/w
Textual Convention: SNMPv2-TCDisplayString OctetString
Type Constraints:
range: 0..255
.1.3.6.1.4.1.2076.143.1.5.1.4
fsVpnCertEncodeType
It represents the encoding type by which the
certificate information are encoded
PEM - Privacy Enhanced Mail encoding
DER - Distinguished Encoding Rules encoding.
Enumerationr/w
Enumerated Values:
1pem
2der
.1.3.6.1.4.1.2076.143.1.5.1.5
fsVpnCertStatus
'createAndGo' is not supported by this table.
SNMPv2-TCRowStatusr/w
Textual Convention: SNMPv2-TCRowStatus Enumeration
Type Values:
1active
2notInService
3notReady
4createAndGo
5createAndWait
6destroy
.1.3.6.1.4.1.2076.143.1.5.1.6
.1.3.6.1.4.1.2076.143.1.6 · 1 row entry · 4 columns
This table provides Certificate Authority (CA)
certificates information.
          
The certificates are globally available to authorize 
all the VPN certificates and can be mapped 
whenever required.
fsVpnCaCertInfoEntry entry .1.3.6.1.4.1.2076.143.1.6.1
'createAndGo is not supported by this table.
Indexes
fsVpnCaCertKeyString
Column Syntax OID
fsVpnCaCertKeyString
Key identity string supported by the gateway chosen
to uniquely identify the CA certificate information.
SNMPv2-TCDisplayString
Textual Convention: SNMPv2-TCDisplayString OctetString
Type Constraints:
range: 0..255
.1.3.6.1.4.1.2076.143.1.6.1.1
fsVpnCaCertFileName
This is the file in which the CA certificate information
is stored. This will be used by the gateway to
authorize the peer certificates used for security
negotiations.
SNMPv2-TCDisplayStringr/w
Textual Convention: SNMPv2-TCDisplayString OctetString
Type Constraints:
range: 0..255
.1.3.6.1.4.1.2076.143.1.6.1.2
fsVpnCaCertEncodeType
It represents the encoding type by which the
certificate information are encoded
PEM - Privacy Enhanced Mail encoding
DER - Distinguished Encoding Rules encoding.
Enumerationr/w
Enumerated Values:
1pem
2der
.1.3.6.1.4.1.2076.143.1.6.1.3
fsVpnCaCertStatus
'createAndGo' is not supported by this table.
SNMPv2-TCRowStatusr/w
Textual Convention: SNMPv2-TCRowStatus Enumeration
Type Values:
1active
2notInService
3notReady
4createAndGo
5createAndWait
6destroy
.1.3.6.1.4.1.2076.143.1.6.1.4