ikePropEncAlg
FEC-IPSEC-MIB ·
.0.6.1.4
Object
column
r/w
Enumeration
This object specifies the encryption algorithm used to protect traffic sent over an IKE SA. Possible values: none(1), -- No encryption applied des-cbc(2), -- DES in CBC mode des3-cbc(3), -- Triple DES in CBC mode blowfish-cbc(4), -- Blowfish in CBC mode cast128-cbc(5) -- CAST in CBC mode with 128 bit key twofish-cbc(6), -- Twofish in CBC mode aes-cbc(7), -- AES in CBC mode rijndael-cbc(31) -- rijndael (former name for AES).
Context
- MIB
- FEC-IPSEC-MIB
- OID
.0.6.1.4- Type
- column
- Access
- readwrite
- Status
- current
- Parent
- ikeProposalEntry
- Table
- ikeProposalTable
- Siblings
- 9
Syntax
Enumeration
Values & Constraints
Enumerated Values
1 | none |
2 | des-cbc |
3 | des3-cbc |
4 | blowfish-cbc |
5 | cast128-cbc |
6 | twofish-cbc |
7 | aes-cbc |
31 | rijndael-cbc |
Related Objects
Sibling Objects
| Object | Type | Syntax | OID |
|---|---|---|---|
| ikePropIndex A unique index identifying this entry. | column | Integer32 | .0.6.1.1 |
| ikePropEncKeySizeMin This object specifies the maximum encryption key size accepted
with this proposal.
The limits for the individual algorithms can be seen in the
ipsecAlgorithmTable.
If a length o… | column | bits Integer32 | .0.6.1.10 |
| ikePropEncKeySizeMax This object specifies the maximum encryption key size accepted
with this proposal.
The limits for the individual algorithms can be seen in the
ipsecAlgorithmTable.
If a length o… | column | bits Integer32 | .0.6.1.11 |
| ikePropNextChoice This object specifies the index of the next proposal
of a choice of proposals. If this object is 0, this
marks the end of a proposal chain. | column | Integer32 | .0.6.1.2 |
| ikePropDescription An optional textual description of the proposal chain
beginning at this entry. | column | SNMPv2-TCDisplayString | .0.6.1.3 |
| ikePropHashAlg This object specifies the hash algorithm used to
protect traffic sent over an IKE SA.
Possible values:
delete(1), -- Delete this entry
none(2), -- No hash algorithm
md5(3),… | column | Enumeration | .0.6.1.5 |
| ikePropGroup Index of the IKE group used with this proposal.
It may be overridden by a valid IKE group index of an IPSec peer
or in ipsecGlobDefaultIkeGroup.
Possible values:
0 (use defaul… | column | Integer32 | .0.6.1.7 |
| ikePropAuthMethod This object specifies the authentication method used with this
proposal.
It may be overridden by the setting in the ipsecPeerEntry table.
If set to 'default' the value in ipsecG… | column | Enumeration | .0.6.1.8 |
| ikePropEncKeySize This object specifies the encryption key size used with this
proposal. The limits for the individual algorithms can be seen
in the ipsecAlgorithmTable.
If a length outside the li… | column | bits Integer32 | .0.6.1.9 |