ikeProposalEntry
FEC-IPSEC-MIB ·
.0.6.1
Object
row
This object contains an IKE proposal, i.e. the encryption algorithm and the hash algorithm used to protect traffic sent over an IKE SA.
Context
- MIB
- FEC-IPSEC-MIB
- OID
.0.6.1- Type
- row
- Status
- current
- Parent
- ikeProposalTable
- Table
- ikeProposalTable
- Children
- 10
Syntax
No syntax metadata recorded.
Values & Constraints
No enumerated values or constraints recorded.
Related Objects
Child Objects
| Object | Type | Syntax | OID |
|---|---|---|---|
| ikePropIndex A unique index identifying this entry. | column | Integer32 | .0.6.1.1 |
| ikePropEncKeySizeMin This object specifies the maximum encryption key size accepted
with this proposal.
The limits for the individual algorithms can be seen in the
ipsecAlgorithmTable.
If a length o… | column | bits Integer32 | .0.6.1.10 |
| ikePropEncKeySizeMax This object specifies the maximum encryption key size accepted
with this proposal.
The limits for the individual algorithms can be seen in the
ipsecAlgorithmTable.
If a length o… | column | bits Integer32 | .0.6.1.11 |
| ikePropNextChoice This object specifies the index of the next proposal
of a choice of proposals. If this object is 0, this
marks the end of a proposal chain. | column | Integer32 | .0.6.1.2 |
| ikePropDescription An optional textual description of the proposal chain
beginning at this entry. | column | SNMPv2-TCDisplayString | .0.6.1.3 |
| ikePropEncAlg This object specifies the encryption algorithm used
to protect traffic sent over an IKE SA.
Possible values:
none(1), -- No encryption applied
des-cbc(2), -- DES in … | column | Enumeration | .0.6.1.4 |
| ikePropHashAlg This object specifies the hash algorithm used to
protect traffic sent over an IKE SA.
Possible values:
delete(1), -- Delete this entry
none(2), -- No hash algorithm
md5(3),… | column | Enumeration | .0.6.1.5 |
| ikePropGroup Index of the IKE group used with this proposal.
It may be overridden by a valid IKE group index of an IPSec peer
or in ipsecGlobDefaultIkeGroup.
Possible values:
0 (use defaul… | column | Integer32 | .0.6.1.7 |
| ikePropAuthMethod This object specifies the authentication method used with this
proposal.
It may be overridden by the setting in the ipsecPeerEntry table.
If set to 'default' the value in ipsecG… | column | Enumeration | .0.6.1.8 |
| ikePropEncKeySize This object specifies the encryption key size used with this
proposal. The limits for the individual algorithms can be seen
in the ipsecAlgorithmTable.
If a length outside the li… | column | bits Integer32 | .0.6.1.9 |
Indexes
| Object | Type | Syntax | OID |
|---|---|---|---|
| ikePropEncAlg This object specifies the encryption algorithm used
to protect traffic sent over an IKE SA.
Possible values:
none(1), -- No encryption applied
des-cbc(2), -- DES in … | column | Enumeration | .0.6.1.4 |