ikePropAuthMethod
FEC-IPSEC-MIB ·
.0.6.1.8
Object
column
r/w
Enumeration
This object specifies the authentication method used with this proposal. It may be overridden by the setting in the ipsecPeerEntry table. If set to 'default' the value in ipsecGlobDefaultAuthMethod is used. Possible values: pre-sh-key(1), -- Authentication using pre shared keys dss-sig(2), -- Authentication using DSS signatures rsa-sig(3), -- Authentication using RSA signatures rsa-enc(4), -- Authentication using RSA encryption default(33) -- Use default authentication method.
Context
- MIB
- FEC-IPSEC-MIB
- OID
.0.6.1.8- Type
- column
- Access
- readwrite
- Status
- current
- Parent
- ikeProposalEntry
- Table
- ikeProposalTable
- Siblings
- 9
Syntax
Enumeration
Values & Constraints
Enumerated Values
1 | pre-sh-key |
2 | dss-sig |
3 | rsa-sig |
4 | rsa-enc |
33 | default |
Related Objects
Sibling Objects
| Object | Type | Syntax | OID |
|---|---|---|---|
| ikePropIndex A unique index identifying this entry. | column | Integer32 | .0.6.1.1 |
| ikePropEncKeySizeMin This object specifies the maximum encryption key size accepted
with this proposal.
The limits for the individual algorithms can be seen in the
ipsecAlgorithmTable.
If a length o… | column | bits Integer32 | .0.6.1.10 |
| ikePropEncKeySizeMax This object specifies the maximum encryption key size accepted
with this proposal.
The limits for the individual algorithms can be seen in the
ipsecAlgorithmTable.
If a length o… | column | bits Integer32 | .0.6.1.11 |
| ikePropNextChoice This object specifies the index of the next proposal
of a choice of proposals. If this object is 0, this
marks the end of a proposal chain. | column | Integer32 | .0.6.1.2 |
| ikePropDescription An optional textual description of the proposal chain
beginning at this entry. | column | SNMPv2-TCDisplayString | .0.6.1.3 |
| ikePropEncAlg This object specifies the encryption algorithm used
to protect traffic sent over an IKE SA.
Possible values:
none(1), -- No encryption applied
des-cbc(2), -- DES in … | column | Enumeration | .0.6.1.4 |
| ikePropHashAlg This object specifies the hash algorithm used to
protect traffic sent over an IKE SA.
Possible values:
delete(1), -- Delete this entry
none(2), -- No hash algorithm
md5(3),… | column | Enumeration | .0.6.1.5 |
| ikePropGroup Index of the IKE group used with this proposal.
It may be overridden by a valid IKE group index of an IPSec peer
or in ipsecGlobDefaultIkeGroup.
Possible values:
0 (use defaul… | column | Integer32 | .0.6.1.7 |
| ikePropEncKeySize This object specifies the encryption key size used with this
proposal. The limits for the individual algorithms can be seen
in the ipsecAlgorithmTable.
If a length outside the li… | column | bits Integer32 | .0.6.1.9 |