Observium_CE/mibs/bintec/FEC-IPSEC-MIB

7264 lines
213 KiB
Plaintext

-- This file is corresponding to Release 9.1.10.101 from 2014/08/11 00:00:00
---------------------------------------------------------------------------
-- (C)opyright 2006-2014 bintec elmeg GmbH
-- $RCSfile: mib-ipsec,v $
-- $Revision: 1.39 $
-- $Date: 2014-02-07 11:21:02 $
---------------------------------------------------------------------------
FEC-IPSEC-MIB DEFINITIONS ::= BEGIN
IMPORTS
MODULE-IDENTITY, OBJECT-TYPE, NOTIFICATION-TYPE, enterprises,
IpAddress, TimeTicks, Counter32, snmpModules, mib-2, Unsigned32, Counter64
FROM SNMPv2-SMI
DisplayString, TestAndIncr, TimeStamp
FROM SNMPv2-TC
MODULE-COMPLIANCE, OBJECT-GROUP, NOTIFICATION-GROUP
FROM SNMPv2-CONF
ipsec, Date, HexValue, BitValue
FROM BINTEC-MIB
InetAddressIPv6
FROM INET-ADDRESS-MIB;
---------------------------------------------------------------------------
ipsecMIB MODULE-IDENTITY
LAST-UPDATED "201308120000Z"
ORGANIZATION "bintec elmeg GmbH"
CONTACT-INFO "EMail: info@bintec-elmeg.com
Web: www.bintec-elmeg.com"
DESCRIPTION "Vendor specific Management Information for the IPSec Subsystem"
::= { ipsec 250 }
---------------------------------------------------------------------------
-- Global IPSec Settings
ipsecGlobals OBJECT IDENTIFIER ::= { ipsec 1 }
--Static table containing global settings for IPSec
ipsecGlobPeerIndex OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Index of first IPsec peer in ipsecPeerTable.
If this object is set to a Value <= 0, IPSec is switched
explicitly off. If the peer referenced by this object does not
exist in the table, all packets will be dropped."
::= { ipsecGlobals 1 }
ipsecGlobEnabled OBJECT-TYPE
SYNTAX INTEGER {
true(1), -- IPSec enabled
false(2) -- IPSec disabled
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"Enables/disables IPSec globally."
DEFVAL { false }
::= { ipsecGlobals 41 }
ipsecGlobDefaultAuthMethod OBJECT-TYPE
SYNTAX INTEGER {
pre-sh-key(1), -- Authentication using pre shared keys
dss-sig(2), -- Authentication using DSS signatures
rsa-sig(3), -- Authentication using RSA signatures
rsa-enc(4) -- Authentication using RSA encryption
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"This object specifies the authentication method used by default.
If the ipsecPeerAuthMethod field of an ipsecPeerEntry and the
ikePropAuthMethod field of the ikeProposalTableEntry used are
set to 'default', this value is assumed.
Possible values:
pre-sh-key(1), -- Authentication using pre shared keys
dss-sig(2), -- Authentication using DSS signatures
rsa-sig(3), -- Authentication using RSA signatures
rsa-enc(4) -- Authentication using RSA encryption."
::= { ipsecGlobals 2 }
ipsecGlobDefaultCertificate OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The index of the default certificate in the certTable used for
local authentication for ike keyed rules with non
pre-shared-key authentication. This may be overwritten by the
certificate specified for the individual ipsec peers."
::= { ipsecGlobals 3 }
ipsecGlobDefaultLocalId OBJECT-TYPE
SYNTAX DisplayString
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The default ID used for local authentication for ike keyed
rules. If this is an empty or invaid id string one of the
subject alternative names or the subject name from the default
certificate is used. This does not relpace an empty local
id string for an IPsec peer with a valid certificate. The
subject name or one of the subject alternative names from this
certificate is used then"
::= { ipsecGlobals 4 }
ipsecGlobDefaultIpsecProposal OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Index of default ipsec proposal used for traffic entries with
empty ipsec proposal, defined for peers with empty default
ipsec proposal."
::= { ipsecGlobals 5 }
ipsecGlobDefaultIkeProposal OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Index of default ike proposal used for peers with empty default
ike proposal."
::= { ipsecGlobals 6 }
ipsecGlobDefaultIpsecLifeTime OBJECT-TYPE
SYNTAX INTEGER
UNITS "seconds"
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Index of default lifetime for ike SA's in ipsecLifeTimeTable.
This lifetime is used, when there is no valid lifetime entry
specified for an IPsec peer entry."
::= { ipsecGlobals 7 }
ipsecGlobDefaultIkeLifeTime OBJECT-TYPE
SYNTAX INTEGER
UNITS "seconds"
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"This object specifies an index in the ipsecLifeTimeTable with the
default lifetime settings used for IKE SA's.
This lifetime is used whenever there is no valid lifetime entry
specified for a peer entry and the IKE proposal used."
::= { ipsecGlobals 8 }
ipsecGlobDefaultIkeGroup OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Index of default IKE group used if no IKE group is defined for a peer.
Possible values:
1 (768 bit MODP),
2 (1024 bit MODP),
5 (1536 bit MODP)."
DEFVAL { 1 }
::= { ipsecGlobals 9 }
ipsecGlobIkeProfile OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies the default IKE (phase 1) profile
to use."
DEFVAL { 0 }
::= { ipsecGlobals 39 }
ipsecGlobIpsecProfile OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies the default IPSec (phase 2) profile
to use."
DEFVAL { 0 }
::= { ipsecGlobals 40 }
ipsecGlobMaxSysLogLevel OBJECT-TYPE
SYNTAX INTEGER {
emerg(1),
alert(2),
crit(3),
err(4),
warning(5),
notice(6),
info(7),
debug(8)
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"Maximum level for syslog messages issued by IPSec. All
messages with a level higher than this value are suppressed,
independently from other global syslog level settings.
Possible settings:
emerg(1),
alert(2),
crit(3),
err(4),
warning(5),
notice(6),
info(7),
debug(8)."
DEFVAL { debug }
::= { ipsecGlobals 10 }
ipsecGlobDefaultGranularity OBJECT-TYPE
SYNTAX INTEGER {
coarse(2), -- Create only one SA for each Traffic entry
ip(3), -- Create one SA for each host
proto(4), -- Create one SA for each protocol and host
port(5) -- Create one SA for each port and host
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"This object specifies the default granularity used
for IPSEC SA negotiation.
Possible values:
coarse(2), -- Create only one SA for each Traffic entry
ip(3), -- Create one SA for each host
proto(4), -- Create one SA for each protocol and host
port(5) -- Create one SA for each port and host."
DEFVAL { coarse }
::= { ipsecGlobals 11 }
ipsecGlobDefaultPh1Mode OBJECT-TYPE
SYNTAX INTEGER {
id-protect(1), -- Use identity protection (main) mode
aggressive(2) -- Use aggressive mode
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"This object specifies the default exchange mode used for IKE
SA negotiation.
Possible values:
id-protect(1), -- Use identity protection (main) mode
aggressive(2) -- Use aggressive mode."
DEFVAL { id-protect }
::= { ipsecGlobals 12 }
ipsecGlobDefaultPfsGroup OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"This object specifies the PFS group to use.
PFS is done only for phase 2, i.e. the Phase 1 SAs are not
deleted after phase 2 negotiation is completed.
Note however, that if the peer has configured PFS for
identity and destroys phase 1 SAs, this side will also
destroy them when notified.
Possible values:
0 (no PFS)
1 (768 bit MODP),
2 (1024 bit MODP),
5 (1536 bit MODP)."
::= { ipsecGlobals 13 }
ipsecGlobIkePort OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies the port the IKE key management service
listens to."
DEFVAL { 500 }
::= { ipsecGlobals 20 }
ipsecGlobMaxRetries OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies the maximum number of retries sent by IKE
for one message."
DEFVAL { 10 }
::= { ipsecGlobals 21 }
ipsecGlobRetryTimeout0milli OBJECT-TYPE
SYNTAX INTEGER
UNITS "milliseconds"
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies the period of time in milliseconds before
an IKE message is repeated for the first time if the answer is
missing. After each retry, this timeout is increased up to the
value specified in ipsecGlobRetryTimeoutMaxsec."
DEFVAL { 500 }
::= { ipsecGlobals 22 }
ipsecGlobRetryTimeoutMaxsec OBJECT-TYPE
SYNTAX INTEGER
UNITS "seconds"
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies the maximum period of time in seconds
before an IKE message is repeated if the answer is missing. The
retry timeout is not increased beyond this limit."
DEFVAL { 30 }
::= { ipsecGlobals 23 }
ipsecGlobMaxNegotiationTimeoutsec OBJECT-TYPE
SYNTAX INTEGER
UNITS "seconds"
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies the maximum number of seconds after which
a negotiation is canceled if it is not finished."
DEFVAL { 300 }
::= { ipsecGlobals 24 }
ipsecGlobMaxIkeSas OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies the maximum number of simultaneous ISAKMP
Security associations allowed. If this limit is reached, the
entries are removed from the database, starting with the ones
that will expire very soon. If that is not enough, the entries
are deleted in reverse LRU order."
DEFVAL { 512 }
::= { ipsecGlobals 25 }
ipsecGlobIgnoreCrPayloads OBJECT-TYPE
SYNTAX INTEGER {
true(1), -- ignore all certificate requests
false(2) -- process certificate request payloads
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies whether certificate request payloads
should be ignored by IKE.
Possible values:
true(1), -- ignore all certificate requests
false(2) -- process certificate request payloads."
DEFVAL { false }
::= { ipsecGlobals 29 }
ipsecGlobNoCrPayloads OBJECT-TYPE
SYNTAX INTEGER {
true(1), -- suppress certificate requests
false(2) -- send certificate requests
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies whether IKE should suppress certificate
requests.
Possible values:
true(1), -- suppress certificate requests
false(2) -- send certificate requests."
DEFVAL { false }
::= { ipsecGlobals 30 }
ipsecGlobNoKeyHashPayloads OBJECT-TYPE
SYNTAX INTEGER {
true(1), -- do not send key hash payloads
false(2) -- send key hash payloads
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies whether IKE should suppress key hash
payloads.
Possible values:
true(1), -- suppress key hash payloads
false(2) -- send key hash payloads."
DEFVAL { false }
::= { ipsecGlobals 31 }
ipsecGlobNoCrls OBJECT-TYPE
SYNTAX INTEGER {
true(1), -- do not send certificate revocation lists
false(2) -- send certificate revocation lists
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies whether IKE should send certificate
revocation lists.
Possible values:
true(1), -- do not send certificate revocation lists
false(2) -- send certificate revocation lists."
DEFVAL { true }
::= { ipsecGlobals 32 }
ipsecGlobSendFullCertChains OBJECT-TYPE
SYNTAX INTEGER {
true(1), -- send full certificate chains
false(2) -- do not send full certificate chains
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies whether IKE should send full certificate
chains.
Possible values:
true(1), -- send full certificate chains
false(2) -- do not send full certificate chains."
DEFVAL { true }
::= { ipsecGlobals 33 }
ipsecGlobTrustIcmpMsg OBJECT-TYPE
SYNTAX INTEGER {
true(1), -- trust ICMP messages
false(2) -- do not trust ICMP messages
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies whether IKE should trust icmp port and
host unreachable error messages. ICMP port and host unreachable
messages are only trusted if there have not yet been received
any datagrams from the remote host in this negotiation.
This means, if the local side receives an ICMP port or host
unreachable message as the first response to the initial packet
of a new phase 1 negotiation, it cancels the negotiation
immediately.
Possible values:
true(1), -- trust ICMP messages
false(2) -- do not trust ICMP messages."
DEFVAL { false }
::= { ipsecGlobals 34 }
ipsecGlobSpiSize OBJECT-TYPE
SYNTAX INTEGER
UNITS "bytes"
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"A compatibility flag that specifies the length of the SPI in
bytes, which is used when an ISAKMP SA SPI (Cookie) is sent to
the remote peer.
This field takes effect only if ipsecGlobZeroIsakmpCookies
is true."
DEFVAL { 32 }
::= { ipsecGlobals 35 }
ipsecGlobZeroIsakmpCookies OBJECT-TYPE
SYNTAX INTEGER {
true(1), -- send zero cookies in ISAKMP messages
false(2) -- send ISAKMP cookies
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies whether zeroed ISAKMP cookies should be
sent.
Possible Values:
true(1), -- send zero cookies in ISAKMP messages
false(2) -- send ISAKMP cookies."
DEFVAL { false }
::= { ipsecGlobals 36 }
ipsecGlobMaxKeyLength OBJECT-TYPE
SYNTAX INTEGER
UNITS "bits"
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies the maximum length of an encryption key
(in bits) that is accepted from the remote end. This limit
prevents denial of service attacks where the attacker asks for
a huge key for an encryption algorithm that allows variable
length keys."
DEFVAL { 1024 }
::= { ipsecGlobals 37 }
ipsecGlobNoInitialContact OBJECT-TYPE
SYNTAX INTEGER {
true(1), -- do not send initial contact messages
false(2) -- send initial contact messages if appropriate
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"Do not send IKE initial contact messages in IKE negotiations
even if no SA's exist with a peer.
Possible values:
true(1), -- do not send initial contact messages
false(2) -- send initial contact messages if appropriate."
DEFVAL { false }
::= { ipsecGlobals 38 }
ipsecGlobBlockTimeout OBJECT-TYPE
SYNTAX INTEGER (1..3600)
UNITS "seconds"
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"For peers with nonzero block time, the value of this object is
used instead of ipsecGlobMaxNegotiationTimeoutSec."
DEFVAL { 15 }
::= { ipsecGlobals 42 }
ipsecGlobDPDIdleThreshold OBJECT-TYPE
SYNTAX INTEGER (1..3600)
UNITS "seconds"
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"The minimum idle time period after which a dpd request is sent."
DEFVAL { 15 }
::= { ipsecGlobals 43 }
ipsecGlobDPDMaxRetries OBJECT-TYPE
SYNTAX INTEGER (1..10)
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"The number of DPD retries sent before a peer is considered dead."
DEFVAL { 3 }
::= { ipsecGlobals 44 }
ipsecGlobDPDRetryTimeout OBJECT-TYPE
SYNTAX INTEGER (1..10)
UNITS "seconds"
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"The number of seconds between retries."
DEFVAL { 2 }
::= { ipsecGlobals 45 }
ipsecGlobIkev2Enabled OBJECT-TYPE
SYNTAX INTEGER {
true(1), -- IKEv2 enabled
false(2) -- IKEv2 disabled
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"Enables/disables IKEv2 globally."
DEFVAL { true }
::= { ipsecGlobals 46 }
-- End Global IPSec Settings
-- Second Table With Global IPSec Settings
ipsecGlobalsContinued OBJECT IDENTIFIER ::= { ipsec 11 }
-- Second static table containing global settings for IPSec
ipsecGlobContPreIpsecRules OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies an index in the IPsec traffic
table containing a list of traffic definitions which
has to be considered prior to the traffic lists of
the IPSec peers in IPSec traffic processing.
It may contain either pass or drop entries (protect entries
are ignored, if erroneously configured)."
DEFVAL { 0 }
::= { ipsecGlobalsContinued 1 }
ipsecGlobContPostIpsecRules OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies an index in the IPsec traffic
table containing a list of traffic definitions which
has to be considered after the traffic lists of
the IPSec peers in IPSec traffic processing.
It may contain either pass or drop entries (protect entries
are ignored, if erroneously configured)."
DEFVAL { 0 }
::= { ipsecGlobalsContinued 11 }
ipsecGlobContDefaultRule OBJECT-TYPE
SYNTAX INTEGER {
drop(1), -- drop all packets
pass(2) -- allow all packets pass plain
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies how to treat packets which do not match
any entry in the traffic lists of the active peers or the
pre-and post IPSec rules.
Possible values:
drop(1), -- drop all packets
pass(2) -- allow all packets pass plain."
DEFVAL { drop }
::= { ipsecGlobalsContinued 2 }
ipsecGlobContUse32BitCpi OBJECT-TYPE
SYNTAX INTEGER {
true(1), -- send CPI as 32 bit numbers
false(2) -- send CPI as 16 bit numbers
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies whether the CPI values in IKE IPComP
negotiations should be sent as 16 bit numbers.
Possible values:
true(1), -- send CPI as 32 bit numbers
false(2) -- send CPI as 16 bit numbers."
DEFVAL { false }
::= { ipsecGlobalsContinued 4 }
ipsecGlobContNoWellKnownCpis OBJECT-TYPE
SYNTAX INTEGER {
true(1), -- do not use the well known cpi values
false(2) -- use the well known cpi values
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies whether the well known CPI values
should be used in IKE IPComP negotiations. If set to true,
IKE will allocate random CPI values from the negotiable
range 256-61439.
Possible values:
true(1), -- do not use the well known cpi values
false(2) -- use the well known cpi values."
DEFVAL { false }
::= { ipsecGlobalsContinued 5 }
ipsecGlobContNoPmtuDiscovery OBJECT-TYPE
SYNTAX INTEGER {
true(1), -- do not perform PMTU discovery
false(2) -- perform PMTU discovery
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"This object specifies the default PMTU discovery policy
if the ipsecPeerPmtuDiscovery flag is set to default.
Possible values:
true(1), -- do not perform PMTU discovery
false(2) -- perform PMTU discovery."
DEFVAL { true }
::= { ipsecGlobalsContinued 7 }
ipsecGlobContDefaultPmtuTtl OBJECT-TYPE
SYNTAX INTEGER
UNITS "minutes"
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies the time-to-live (in minutes) of a
PMTU value derived from an ICMP PMTU message
received for an IPSec packet. After this time, the mtu is
increased step-by-step using the values from RFC 1191 until
a new ICMP PMTU message is received. A ttl value of 0 means
infinite."
DEFVAL { 10 }
::= { ipsecGlobalsContinued 8 }
ipsecGlobContPrivateInterface OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies the index of the systems' private
interface. If the private interface is set (i.e. non-negative),
certain address spoofing attacks are made impossible from IPSec
itself."
DEFVAL { -1 }
::= { ipsecGlobalsContinued 9 }
ipsecGlobContSaSyncInterface OBJECT-TYPE
SYNTAX INTEGER {
true(1), -- delete SAs
false(2) -- do not delete SAs
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies whether IKE and IPSec SA's should be
are deleted if the interface over which the packets are
initially sent is going down or dormant
Possible values:
true(1), -- delete SAs
false(2) -- do not delete SAs."
DEFVAL { false }
::= { ipsecGlobalsContinued 10 }
ipsecGlobContDefaultPfsIdentity OBJECT-TYPE
SYNTAX INTEGER {
true(1), -- delete phase 1 SAs
false(2) -- do not delete phase 1 SAs
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies whether IKE SA's should be deleted
immediately after a phase 2 (IPSec-) SA pair has been
negotiated.
It may be overridden by the individual settings for a peer
entry, if the ipsecPeerPfsIdentity is not set to 'default'.
The consequence of enabling this feature is that before each
phase 2 negotiation there always has to be a phase 1
negotiation. Thus individual phase 2 SAs cannot be
associated with one another or, respectively, if the
identity of a remote peer is known to an eavesdropper
for one SA, he cannot conclude that the next SA is
negotiated with the same remote peer.
Note: Setting this flag only makes sense if configured
together with id-protect mode or RSA encryption for
authentication and if the IP address of the remote
peer does not allow conclusions about its identity
(i.e. dynamic remote peer addresses).
Possible values:
true(1), -- delete phase 1 SAs
false(2) -- do not delete phase 1 SAs."
DEFVAL { false }
::= { ipsecGlobalsContinued 12 }
ipsecGlobContPfsIdentityDelay OBJECT-TYPE
SYNTAX INTEGER
UNITS "seconds"
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies the number of seconds to wait before
deleting the underlying phase 1 SA after a Phase 2 SA has
been established, if PFS for identity is configured."
DEFVAL { 8 }
::= { ipsecGlobalsContinued 15 }
ipsecGlobContIkeLoggingLevel OBJECT-TYPE
SYNTAX INTEGER (0..127)
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies the IKE logging level.
IKE log messages are output as syslog messages on level debug.
Note that the global syslog table level must be set to debug
in order to see these messages.
Possible values:
0: no IKE log messages
... 3: IKE error output
... 6: IKE trace output
... 9: IKE detailed results output
10 ...: hexdumps of IKE messages."
DEFVAL { 0 }
::= { ipsecGlobalsContinued 13 }
ipsecGlobContHeartbeatDefault OBJECT-TYPE
SYNTAX INTEGER {
none(1), -- neither send nor expect heartbeats
expect(2), -- expect heartbeats
send(3), -- send heartbeats
both(4) -- send and expect heartbeats
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"This object specifies whether heartbeats should be sent
over phase 1 SAs (not used for IPv6).
Possible values:
none(1), -- neither send nor expect heartbeats
expect(2), -- expect heartbeats
send(3), -- send heartbeats
both(4) -- send and expect heartbeats."
DEFVAL { none }
::= { ipsecGlobalsContinued 16 }
ipsecGlobContHeartbeatInterval OBJECT-TYPE
SYNTAX INTEGER (1..900)
UNITS "seconds"
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies the time interval in seconds between
heartbeats. At this rate heartbeats are sent and/or
expected if configured (not used for IPv6)."
DEFVAL { 5 }
::= { ipsecGlobalsContinued 17 }
ipsecGlobContHeartbeatTolerance OBJECT-TYPE
SYNTAX INTEGER (1..900)
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies the maximum number of missing heartbeats
allowed before an SA is discarded (not used for IPv6)."
DEFVAL { 4 }
::= { ipsecGlobalsContinued 18 }
ipsecGlobContDialBlockTime OBJECT-TYPE
SYNTAX INTEGER (-1..43200)
UNITS "minutes"
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"Amount of time in minutes how long an ipsecDial entry remains
in state blocked-for-outgoing after a cost producing trigger
call was detected. Given value denotes time in minutes.
Special value -1 means to block entry until unblocked manually
by deactivating entry and reactivating it afterwards.
Default value is -1."
DEFVAL { -1 }
::= { ipsecGlobalsContinued 14 }
ipsecGlobContObsoleteFeatureMask OBJECT-TYPE
SYNTAX BitValue
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"Some obsolete features are represented by a bit in this mask
and could be re-enabled for testing or compatibility purpose.
A mask-bit of 1 enable the approprate (obsolete) feature.
A mask-bit of 0 disable the appropriate feature completely.
Bit Feature
0x00000001: re-enable delayed apf-graph-node-memory free
0x00000002: tbd.
The default-value is 0 - all obsolete features are disabled.
Do not change this default-value if not really necessary"
DEFVAL { 0 }
::= { ipsecGlobalsContinued 66 }
ipsecGlobContP1Always OBJECT-TYPE
SYNTAX INTEGER {
enabled (1), -- always rekey phase 1 if phase 2 is rekeyed
disabled (2) -- rekey phase 1 only if necessary
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies whether a phase 1 rekeying is always
done immediately before phase 2 rekeying.
Note this is different from pfs for identity because the
latter discards the phase 1 SA immediately after phase 2
establishment.
This feature is mainly a compatibility flag for some
non-standard implementations which always expect a phase 1 SA
if a phase 2 SA exists. Please also select a longer lifetime
for phase 1 than phase 2 then."
DEFVAL { disabled }
::= { ipsecGlobalsContinued 69 }
ipsecGlobContHwAccel OBJECT-TYPE
SYNTAX INTEGER {
yes (1),
no (2)
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"Enables/disables usage of encryption engine."
DEFVAL { yes }
::= { ipsecGlobalsContinued 70 }
ipsecGlobContSupportVarKeyLength4Twofish OBJECT-TYPE
SYNTAX INTEGER {
yes (1),
no (2)
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"Enables/disables support of variable key sizes for the
Twofish algorithm. Note that the Twofish related settings
within the ipsecAlgorithmTable will be synchronized
accordingly. If set to no (2) the system will act in the
backward compatibility mode. This setting might be necessary
in some dedicated cases in order to avoid IKE negotiation
problems."
DEFVAL { yes }
::= { ipsecGlobalsContinued 71 }
ipsecGlobContIkev2Profile OBJECT-TYPE
SYNTAX Unsigned32
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies the default IKE_SA profile to use
(only for IKEv2). If set to 0 no profile is configured
as default."
DEFVAL { 0 }
::= { ipsecGlobalsContinued 72 }
ipsecGlobContMaxIkev2Sas OBJECT-TYPE
SYNTAX INTEGER (1..100000)
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies the maximum number of simultaneous IKEv2
Security associations allowed. If this limit is reached, the
entries are removed from the database, starting with the ones
that will expire very soon. If that is not enough, the entries
are deleted in reverse LRU order."
DEFVAL { 512 }
::= { ipsecGlobalsContinued 73 }
ipsecGlobContPathFinder OBJECT-TYPE
SYNTAX INTEGER {
enabled (1),
disabled (2)
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"Enables/disables the IPSec pathfinder mode, that means
all the traffic (IKE, ESP and AH) is embedded within a
pseudo HTTPS session between the peers (similar to the
NAT-T mode)."
DEFVAL { disabled }
::= { ipsecGlobalsContinued 74 }
ipsecGlobContXauthTimeout OBJECT-TYPE
SYNTAX INTEGER (10..600)
UNITS "seconds"
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"If an extended authentication is requested, this is
the time (in seconds) the device will wait for response. A useful
value is important when username and password are entered manually
by the user."
DEFVAL { 120 }
::= { ipsecGlobalsContinued 75 }
-- End Second Table With Global IPSec Settings
-- IPSec RADIUS settings Table
ipsecRadius OBJECT IDENTIFIER ::= { ipsec 13 }
-- Table with RADIUS settings for IPSec
ipsecRadiusPresetState OBJECT-TYPE
SYNTAX INTEGER {
not-loaded(1), -- RADIUS preset peers are not loaded
loading(2), -- RADIUS preset peers are currently loaded
loaded(3), -- RADIUS preset peers have been loaded
reloading(4) -- RADIUS preset peers are currently reloaded
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"This object shows the status of the RADIUS preset peers load
process."
DEFVAL { not-loaded }
::= { ipsecRadius 1 }
ipsecRadiusPresetPeers OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The number of RADIUS preset peers currently loaded."
::= { ipsecRadius 2 }
ipsecRadiusDynamicAuthentication OBJECT-TYPE
SYNTAX INTEGER {
enabled(1), -- dynamic authentication via RADIUS enabled
disabled(2) -- dynamic authentication via RADIUS disabled
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object enables/disables dynamic authentication via RADIUS.
If no peer has been found matching an incoming IKE negotiation,
the configured RADIUS servers are consulted (if any)."
DEFVAL { disabled }
::= { ipsecRadius 3 }
-- End global IPSec Radius settings
-- IPSec Security Associations Table
ipsecSaTable OBJECT-TYPE
SYNTAX SEQUENCE OF IpsecSaEntry
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"This table contains the list of currently active IPSec security
associations."
::= { ipsec 3 }
ipsecSaEntry OBJECT-TYPE
SYNTAX IpsecSaEntry
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"This object contains an IPSec security association."
INDEX {
ipsecSaSecProto,
ipsecSaSpi
}
::= { ipsecSaTable 1 }
IpsecSaEntry ::=
SEQUENCE {
ipsecSaIndex INTEGER,
ipsecSaState INTEGER,
ipsecSaDir INTEGER,
ipsecSaMode INTEGER,
ipsecSaSecProto INTEGER,
ipsecSaSpi HexValue,
ipsecSaAuthAlg INTEGER,
ipsecSaEncAlg INTEGER,
ipsecSaCompAlg INTEGER,
ipsecSaAuthKeyLen INTEGER,
ipsecSaEncKeyLen INTEGER,
ipsecSaReplayErrors INTEGER,
ipsecSaRecvErrors INTEGER,
ipsecSaDecryptErrors INTEGER,
ipsecSaBundle INTEGER,
ipsecSaBundleNesting INTEGER,
ipsecSaSpiSize INTEGER,
ipsecSaEncKey OCTET STRING,
ipsecSaAuthKey OCTET STRING,
ipsecSaIkeMajVersion INTEGER,
ipsecSaIkeMinVersion INTEGER
}
ipsecSaIndex OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"A unique index for this entry."
::= { ipsecSaEntry 1 }
ipsecSaState OBJECT-TYPE
SYNTAX INTEGER {
expired(2), -- The SA is expired and will not be rekeyed
negotiating(4), -- This SA is currently negotiated
established(5) -- The SA is alive and will eventually be rekeyed
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The current state of the security association
Possible values:
alive(1), -- The SA is alive
expired(2), -- The SA is expired
negotiating(4),-- This SA is currently negotiated
established(5) -- The SA is alive and will eventually be
rekeyed."
DEFVAL { negotiating }
::= { ipsecSaEntry 3 }
ipsecSaDir OBJECT-TYPE
SYNTAX INTEGER {
inbound(1), -- An inbound security association
outbound(2) -- An outbound security association
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"This object specifies whether the SA is used for inbound or
outbound processing.
Possible values:
inbound(1), -- An inbound security association
outbound(2) -- An outbound security association."
::= { ipsecSaEntry 5 }
ipsecSaMode OBJECT-TYPE
SYNTAX INTEGER {
tunnel(1), -- A tunnel mode SA
transport(2) -- A transport mode SA
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"This object specifies whether the SA is in tunnel or
transport mode.
Possible values:
tunnel(1), -- A tunnel mode SA
transport(2) -- A transport mode SA."
::= { ipsecSaEntry 6 }
ipsecSaSecProto OBJECT-TYPE
SYNTAX INTEGER {
esp(50), -- Encapsulating Security Payload
ah(51), -- Authentication Header
ipcomp(108) -- Internet Payload Compression Protocol
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"This object specifies the security protocol applied by this SA.
Possible values:
esp(50), -- Encapsulating Security Payload
ah(51), -- Authentication Header
ipcomp(108) -- Internet Payload Compression Protocol."
::= { ipsecSaEntry 7 }
ipsecSaSpi OBJECT-TYPE
SYNTAX HexValue
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The Security Parameters Index of this SA."
::= { ipsecSaEntry 17 }
ipsecSaAuthAlg OBJECT-TYPE
SYNTAX INTEGER {
none(2), -- No hash algorithm
md5-96(4), -- The MD5 hash algorithm
sha1-96(6) -- The Secure Hash Algorithm
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The hash algorithm used, if any.
Possible Values:
none(2), -- No hash algorithm applied
md5-96(4), -- The MD5 hash algorithm
sha1-96(6) -- The Secure Hash Algorithm."
::= { ipsecSaEntry 18 }
ipsecSaEncAlg OBJECT-TYPE
SYNTAX INTEGER {
none(1), -- No encryption applied
des-cbc(2), -- DES in CBC mode
des3-cbc(3), -- Triple DES in CBC mode
blowfish-cbc(4), -- Blowfish in CBC mode
cast128-cbc(5), -- CAST with 128 bit key in CBC mode
twofish-cbc(6), -- Twofish in CBC mode
aes-cbc(7) -- AES in CBC mode
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The encryption algorithm used, if any.
Possible Values:
none(1), -- No encryption applied
des-cbc(2), -- DES in CBC mode
des3-cbc(3), -- Triple DES in CBC mode
blowfish-cbc(4), -- Blowfish in CBC mode
cast128-cbc(5), -- CAST with 128 bit key in CBC mode
twofish-cbc(6), -- Twofish in CBC mode
aes-cbc(7) -- AES in CBC mode."
::= { ipsecSaEntry 19 }
ipsecSaCompAlg OBJECT-TYPE
SYNTAX INTEGER {
none(2), -- No compression
deflate(3) -- DEFLATE compression algorithm
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The compression algorithm used, if any.
Possible Values:
none(1), -- No compression
deflate(2) -- DEFLATE compression algorithm."
DEFVAL { none }
::= { ipsecSaEntry 20 }
ipsecSaAuthKeyLen OBJECT-TYPE
SYNTAX INTEGER
UNITS "bytes"
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The length in bytes of the key used for authentication,
if any."
::= { ipsecSaEntry 21 }
ipsecSaEncKeyLen OBJECT-TYPE
SYNTAX INTEGER
UNITS "bytes"
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The length in bytes of the key used for encryption, if any."
::= { ipsecSaEntry 22 }
ipsecSaReplayErrors OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The number of replayed packets detected for this SA."
::= { ipsecSaEntry 33 }
ipsecSaRecvErrors OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The number of receive errors (replayed packets not counted)
detected for this SA."
::= { ipsecSaEntry 34 }
ipsecSaDecryptErrors OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The number of decryption errors (ESP only) detected for
this SA."
::= { ipsecSaEntry 35 }
ipsecSaBundle OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"unique id of SA-bundle within this SA is used."
::= { ipsecSaEntry 39 }
ipsecSaBundleNesting OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"place of SA within SA-Bundle."
::= { ipsecSaEntry 40 }
ipsecSaSpiSize OBJECT-TYPE
SYNTAX INTEGER
UNITS "bytes"
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The size of the SPI in bytes."
::= { ipsecSaEntry 45 }
ipsecSaEncKey OBJECT-TYPE
SYNTAX OCTET STRING
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
""
::= { ipsecSaEntry 64 }
ipsecSaAuthKey OBJECT-TYPE
SYNTAX OCTET STRING
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
""
::= { ipsecSaEntry 65 }
ipsecSaIkeMajVersion OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The IKE major version number."
DEFVAL { 1 }
::= { ipsecSaEntry 66 }
ipsecSaIkeMinVersion OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The IKE minor version number."
DEFVAL { 0 }
::= { ipsecSaEntry 67 }
-- End IPSec Security Associations Table
-- IPSec SA Bundle Table
ipsecBundleTable OBJECT-TYPE
SYNTAX SEQUENCE OF IpsecBundleEntry
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"This table contains the list of currently active IPSec security
associations."
::= { ipsec 16 }
ipsecBundleEntry OBJECT-TYPE
SYNTAX IpsecBundleEntry
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"This object contains an IPSec security association."
INDEX {
ipsecBundleIndex
}
::= { ipsecBundleTable 1 }
IpsecBundleEntry ::=
SEQUENCE {
ipsecBundleIndex INTEGER,
ipsecBundlePeerIndex INTEGER,
ipsecBundleTrafficIndex INTEGER,
ipsecBundleState INTEGER,
ipsecBundleNumSas INTEGER,
ipsecBundleRole INTEGER,
ipsecBundleRekeyedBundle INTEGER,
ipsecBundleRekeyingBundle INTEGER,
ipsecBundleLastStateChange TimeTicks,
ipsecBundleHeartbeatsEnabled INTEGER,
ipsecBundleCreator INTEGER,
ipsecBundleTunnelLocal IpAddress,
ipsecBundleTunnelRemote IpAddress,
ipsecBundlePmtuDiscovery INTEGER,
ipsecBundleKeepAlive INTEGER,
ipsecBundleVerifyPad INTEGER,
ipsecBundleLifeSeconds Unsigned32,
ipsecBundleLifeKBytes Unsigned32,
ipsecBundleRekeySeconds INTEGER,
ipsecBundleRekeyKBytes INTEGER,
ipsecBundleProto INTEGER,
ipsecBundleLocalAddress IpAddress,
ipsecBundleLocalMaskLen INTEGER,
ipsecBundleLocalRange IpAddress,
ipsecBundleLocalPort INTEGER,
ipsecBundleRemoteAddress IpAddress,
ipsecBundleRemoteMaskLen INTEGER,
ipsecBundleRemoteRange IpAddress,
ipsecBundleRemotePort INTEGER,
ipsecBundleInPkt Counter64,
ipsecBundleInHb Counter64,
ipsecBundleInBytes Counter64,
ipsecBundleInBytesNetto Counter64,
ipsecBundleOutPkt Counter64,
ipsecBundleOutHb Counter64,
ipsecBundleOutBytes Counter64,
ipsecBundleOutBytesNetto Counter64,
ipsecBundleNatT INTEGER,
ipsecBundleNatOaLocal IpAddress,
ipsecBundleNatOaRemote IpAddress,
ipsecBundleIkeMajVersion INTEGER,
ipsecBundleIkeMinVersion INTEGER
}
ipsecBundleIndex OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"A unique index for this entry."
::= { ipsecBundleEntry 1 }
ipsecBundlePeerIndex OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The index of the peer for which this bundle was created."
::= { ipsecBundleEntry 5 }
ipsecBundleTrafficIndex OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The index of the traffic entry for which this bundle was created."
::= { ipsecBundleEntry 6 }
ipsecBundleState OBJECT-TYPE
SYNTAX INTEGER {
established(1), -- The bundle is alive
expired(2), -- The bundle is expired
delete (3), -- Mark this bundle for deletion
negotiating(4), -- This bundle is currently negotiated
rekeyed(5), -- Rekeying of bundle succeeded
heartbeat-lost(6), -- Heartbeat receive timeout
failed(7) -- The negotiation failed
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"The current state of the bundle
Possible values:
established(1), -- The bundle is alive
expired(2), -- The bundle is expired
delete (3), -- Mark this bundle for deletion
negotiating(4), -- This bundle is currently negotiated
rekeyed(5), -- Rekeying of bundle succeeded
heartbeat-lost(6), -- Heartbeat receive timeout
failed(7) -- The negotiation failed."
DEFVAL { negotiating }
::= { ipsecBundleEntry 7 }
ipsecBundleNumSas OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The number of SAs contained in this bundle."
::= { ipsecBundleEntry 8 }
ipsecBundleRole OBJECT-TYPE
SYNTAX INTEGER {
initiator(1), -- this end initiated the negotiation
responder(2) -- the remote end initiated the negotiation
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"This object specifies by which side the SA bundle
negotiation was initiated.
Possible values:
initiator(1), -- this end initiated the negotiation
responder(2) -- the remote end initiated the negotiation."
::= { ipsecBundleEntry 9 }
ipsecBundleRekeyedBundle OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"This object indicates upon rekeying, which bundle (actually
its BundleIndex) is going to be replaced by that one."
::= { ipsecBundleEntry 10 }
ipsecBundleRekeyingBundle OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"This object indicates upon rekeying, which bundle (actually
its BundleIndex) is going to replace that one."
::= { ipsecBundleEntry 11 }
ipsecBundleLastStateChange OBJECT-TYPE
SYNTAX TimeTicks
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"This object indicates the time in time ticks from system start
by which the state of this bundle entry was changed last.
To determine the absolute time, the current sysUpTime must be
subtracted from this value."
::= { ipsecBundleEntry 12 }
ipsecBundleHeartbeatsEnabled OBJECT-TYPE
SYNTAX INTEGER {
none(1), -- neither sending nor expecting heartbeats
expect(2), -- expecting heartbeats
send(3), -- sending heartbeats
both(4) -- sending and expecting heartbeats
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"This object specifies whether heartbeats are sent and/or
expected over this bundle.
Possible values:
none(1), -- neither sending nor expecting heartbeats
expect(2), -- expecting heartbeats
send(3), -- sending heartbeats
both(4) -- sending and expecting heartbeats."
::= { ipsecBundleEntry 13 }
ipsecBundleCreator OBJECT-TYPE
SYNTAX INTEGER {
manual(1), -- A manually keyed IPSec SA bundle
ike(2) -- An automatically keyed SA bundle created by IKE
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"This object specifies how the SA was created
Possible values:
manual(1),-- A manually keyed IPSec SA bundle
ike(2) -- An automatically keyed SA bundle created by IKE."
::= { ipsecBundleEntry 14 }
ipsecBundleTunnelLocal OBJECT-TYPE
SYNTAX IpAddress
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The local IP address of the outer packet header. For
transport mode bundles this address is the same as the
ipsecBundleLocalAddress."
::= { ipsecBundleEntry 15 }
ipsecBundleTunnelRemote OBJECT-TYPE
SYNTAX IpAddress
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The remote IP address of the outer packet header. For
transport mode bundles, this address is the same as the
ipsecBundleRemoteAddress."
::= { ipsecBundleEntry 16 }
ipsecBundlePmtuDiscovery OBJECT-TYPE
SYNTAX INTEGER {
enabled(2), -- copy DF bit from original packet; propagate PMTU
disabled(1) -- clear DF bit in IPSec packet;
-- fragment if necessary
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"This object specifies the initialization of the DF bit in
outgoing IPSec packets for this bundle. It decides whether
PMTU discovery is propagated over the IPSec tunnel or not.
Possible values:
enabled(1), -- copy DF bit from original packet; propagate PMTU
disabled(2) -- clear DF bit in IPSec packet;
-- fragment if necessary."
::= { ipsecBundleEntry 17 }
ipsecBundleKeepAlive OBJECT-TYPE
SYNTAX INTEGER {
true(1), -- rekey even if no traffic was processed by this bundle
false(2) -- rekey only if at least one packet was processed
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"This object specifies the circumstances under which this SA
bundle will be rekeyed.
Possible values:
true(1), -- rekey even if no traffic was processed
false(2) -- rekey only if at least one packet was processed."
::= { ipsecBundleEntry 18 }
ipsecBundleVerifyPad OBJECT-TYPE
SYNTAX INTEGER {
true(1), -- normal, self-describing ESP padding
false(2) -- old style ESP padding
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"This object specifies the kind of padding expected for ESP SAs
within this bundle.
Possible values:
true(1), -- normal, self-describing ESP padding
false(2) -- old style ESP padding."
::= { ipsecBundleEntry 19 }
ipsecBundleLifeSeconds OBJECT-TYPE
SYNTAX Unsigned32
UNITS "seconds"
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The period in seconds after which this bundle will be destroyed."
::= { ipsecBundleEntry 20 }
ipsecBundleLifeKBytes OBJECT-TYPE
SYNTAX Unsigned32
UNITS "kilo bytes"
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The amount of data allowed to be protected by this bundle until
it is destroyed (ipsecBundleOutBytes or ipecBundleOutBytes)."
::= { ipsecBundleEntry 21 }
ipsecBundleRekeySeconds OBJECT-TYPE
SYNTAX INTEGER
UNITS "seconds"
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The period in seconds after which this bundle will be rekeyed."
::= { ipsecBundleEntry 22 }
ipsecBundleRekeyKBytes OBJECT-TYPE
SYNTAX INTEGER
UNITS "kilo bytes"
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The amount of data allowed to be protected by this bundle until
it is rekeyed (ipsecBundleOutBytes or ipecBundleOutBytes)."
::= { ipsecBundleEntry 23 }
ipsecBundleProto OBJECT-TYPE
SYNTAX INTEGER {
icmp(1),
igmp(2),
ggp(3),
ipip(4),
st(5),
tcp(6),
cbt(7),
egp(8),
igp(9),
bbn(10),
nvp(11),
pup(12),
argus(13),
emcon(14),
xnet(15),
chaos(16),
udp(17),
mux(18),
dcn(19),
hmp(20),
prm(21),
xns(22),
trunk1(23),
trunk2(24),
leaf1(25),
leaf2(26),
rdp(27),
irtp(28),
isotp4(29),
netblt(30),
mfe(31),
merit(32),
sep(33),
pc3(34),
idpr(35),
xtp(36),
ddp(37),
idprc(38),
tp(39),
il(40),
ipv6(41),
sdrp(42),
ipv6route(43),
ipv6frag(44),
idrp(45),
rsvp(46),
gre(47),
mhrp(48),
bna(49),
esp(50),
ah(51),
inlsp(52),
swipe(53),
narp(54),
mobile(55),
tlsp(56),
skip(57),
ipv6icmp(58),
ipv6nonxt(59),
ipv6opts(60),
ipproto-61(61),
cftp(62),
local(63),
sat(64),
kryptolan(65),
rvd(66),
ippc(67),
distfs(68),
satmon(69),
visa(70),
ipcv(71),
cpnx(72),
cphb(73),
wsn(74),
pvp(75),
brsatmon(76),
sunnd(77),
wbmon(78),
wbexpak(79),
isoip(80),
vmtp(81),
securevmtp(82),
vines(83),
ttp(84),
nsfnet(85),
dgp(86),
tcf(87),
eigrp(88),
ospfigp(89),
sprite(90),
larp(91),
mtp(92),
ax25(93),
ipwip(94),
micp(95),
scc(96),
etherip(97),
encap(98),
encrypt(99),
gmtp(100),
ifmp(101),
pnni(102),
pim(103),
aris(104),
scps(105),
qnx(106),
an(107),
ippcp(108),
snp(109),
compaq(110),
ipxip(111),
vrrp(112),
pgm(113),
hop0(114),
l2tp(115),
ipproto-116(116),
ipproto-117(117),
ipproto-118(118),
ipproto-119(119),
ipproto-120(120),
ipproto-121(121),
ipproto-122(122),
ipproto-123(123),
ipproto-124(124),
ipproto-125(125),
ipproto-126(126),
ipproto-127(127),
ipproto-128(128),
ipproto-129(129),
ipproto-130(130),
ipproto-131(131),
ipproto-132(132),
ipproto-133(133),
ipproto-134(134),
ipproto-135(135),
ipproto-136(136),
ipproto-137(137),
ipproto-138(138),
ipproto-139(139),
ipproto-140(140),
ipproto-141(141),
ipproto-142(142),
ipproto-143(143),
ipproto-144(144),
ipproto-145(145),
ipproto-146(146),
ipproto-147(147),
ipproto-148(148),
ipproto-149(149),
ipproto-150(150),
ipproto-151(151),
ipproto-152(152),
ipproto-153(153),
ipproto-154(154),
ipproto-155(155),
ipproto-156(156),
ipproto-157(157),
ipproto-158(158),
ipproto-159(159),
ipproto-160(160),
ipproto-161(161),
ipproto-162(162),
ipproto-163(163),
ipproto-164(164),
ipproto-165(165),
ipproto-166(166),
ipproto-167(167),
ipproto-168(168),
ipproto-169(169),
ipproto-170(170),
ipproto-171(171),
ipproto-172(172),
ipproto-173(173),
ipproto-174(174),
ipproto-175(175),
ipproto-176(176),
ipproto-177(177),
ipproto-178(178),
ipproto-179(179),
ipproto-180(180),
ipproto-181(181),
ipproto-182(182),
ipproto-183(183),
ipproto-184(184),
ipproto-185(185),
ipproto-186(186),
ipproto-187(187),
ipproto-188(188),
ipproto-189(189),
ipproto-190(190),
ipproto-191(191),
ipproto-192(192),
ipproto-193(193),
ipproto-194(194),
ipproto-195(195),
ipproto-196(196),
ipproto-197(197),
ipproto-198(198),
ipproto-199(199),
ipproto-200(200),
ipproto-201(201),
ipproto-202(202),
ipproto-203(203),
ipproto-204(204),
ipproto-205(205),
ipproto-206(206),
ipproto-207(207),
ipproto-208(208),
ipproto-209(209),
ipproto-210(210),
ipproto-211(211),
ipproto-212(212),
ipproto-213(213),
ipproto-214(214),
ipproto-215(215),
ipproto-216(216),
ipproto-217(217),
ipproto-218(218),
ipproto-219(219),
ipproto-220(220),
ipproto-221(221),
ipproto-222(222),
ipproto-223(223),
ipproto-224(224),
ipproto-225(225),
ipproto-226(226),
ipproto-227(227),
ipproto-228(228),
ipproto-229(229),
ipproto-230(230),
ipproto-231(231),
ipproto-232(232),
ipproto-233(233),
ipproto-234(234),
ipproto-235(235),
ipproto-236(236),
ipproto-237(237),
ipproto-238(238),
ipproto-239(239),
ipproto-240(240),
ipproto-241(241),
ipproto-242(242),
ipproto-243(243),
ipproto-244(244),
ipproto-245(245),
ipproto-246(246),
ipproto-247(247),
ipproto-248(248),
ipproto-249(249),
ipproto-250(250),
ipproto-251(251),
ipproto-252(252),
ipproto-253(253),
ipproto-254(254),
dont-verify(255)
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The protocol of the traffic selectors."
::= { ipsecBundleEntry 24 }
ipsecBundleLocalAddress OBJECT-TYPE
SYNTAX IpAddress
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The local address (host or network or range start address)
of the traffic selectors,
source for outbound, destination for inbound."
::= { ipsecBundleEntry 25 }
ipsecBundleLocalMaskLen OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The local network masklen of the traffic selectors,
source for outbound, destination for inbound."
::= { ipsecBundleEntry 26 }
ipsecBundleLocalRange OBJECT-TYPE
SYNTAX IpAddress
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The local address range end address of the traffic selectors,
source for outbound, destination for inbound."
::= { ipsecBundleEntry 27 }
ipsecBundleLocalPort OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The local port of the traffic selectors,
source for outbound, destination for inbound."
::= { ipsecBundleEntry 28 }
ipsecBundleRemoteAddress OBJECT-TYPE
SYNTAX IpAddress
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The remote address (host or network or range start address)
of the traffic selectors
source for outbound, destination for inbound."
::= { ipsecBundleEntry 29 }
ipsecBundleRemoteMaskLen OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The remote network masklen of the traffic selectors
source for outbound, destination for inbound."
::= { ipsecBundleEntry 30 }
ipsecBundleRemoteRange OBJECT-TYPE
SYNTAX IpAddress
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The remote address range end address of the traffic selectors
source for outbound, destination for inbound."
::= { ipsecBundleEntry 31 }
ipsecBundleRemotePort OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The remote port of the traffic selectors
source for outbound, destination for inbound."
::= { ipsecBundleEntry 32 }
ipsecBundleInPkt OBJECT-TYPE
SYNTAX Counter64
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The total number of inbound packets processed by this bundle."
::= { ipsecBundleEntry 33 }
ipsecBundleInHb OBJECT-TYPE
SYNTAX Counter64
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The number of heartbeat packets received over this bundle."
::= { ipsecBundleEntry 34 }
ipsecBundleInBytes OBJECT-TYPE
SYNTAX Counter64
UNITS "bytes"
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The number of inbound bytes (including IPSec overhead)
processed by this bundle."
::= { ipsecBundleEntry 35 }
ipsecBundleInBytesNetto OBJECT-TYPE
SYNTAX Counter64
UNITS "bytes"
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The number of inbound bytes (netto: IPSec headers excluded)
processed by this bundle."
::= { ipsecBundleEntry 37 }
ipsecBundleOutPkt OBJECT-TYPE
SYNTAX Counter64
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The total number of outbound packets processed by this bundle."
::= { ipsecBundleEntry 39 }
ipsecBundleOutHb OBJECT-TYPE
SYNTAX Counter64
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The number of heartbeat packets sent for this bundle."
::= { ipsecBundleEntry 40 }
ipsecBundleOutBytes OBJECT-TYPE
SYNTAX Counter64
UNITS "bytes"
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The number of outbound bytes (including IPSec overhead)
processed by this bundle."
::= { ipsecBundleEntry 41 }
ipsecBundleOutBytesNetto OBJECT-TYPE
SYNTAX Counter64
UNITS "bytes"
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The number of outbound bytes (netto: IPSec headers excluded)
processed by this bundle."
::= { ipsecBundleEntry 43 }
ipsecBundleNatT OBJECT-TYPE
SYNTAX INTEGER {
enabled(1), -- use udp encapsulation
disabled(2) -- do not use udp encapsulation
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"This object specifies if the udp encapsulation of ESP packets
is active within this bundle.
Possible values:
enabled(1), -- use udp encapsulation
disabled(2) -- do not use udp encapsulation."
::= { ipsecBundleEntry 45 }
ipsecBundleNatOaLocal OBJECT-TYPE
SYNTAX IpAddress
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The local IP address as seen by the remote side.
Only valid for transport mode bundles with NatT enabled."
::= { ipsecBundleEntry 46 }
ipsecBundleNatOaRemote OBJECT-TYPE
SYNTAX IpAddress
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The remote IP address as seen by the remote side.
Only valid for transport mode bundles with NatT enabled."
::= { ipsecBundleEntry 47 }
ipsecBundleIkeMajVersion OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The IKE major version number."
DEFVAL { 1 }
::= { ipsecBundleEntry 48 }
ipsecBundleIkeMinVersion OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The IKE minor version number."
DEFVAL { 0 }
::= { ipsecBundleEntry 49 }
-- End IPSec Bundle Table
-- IKE Security Associations Table
ikeSaTable OBJECT-TYPE
SYNTAX SEQUENCE OF IkeSaEntry
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"This table contains the list of currently active IKE security
associations."
::= { ipsec 4 }
ikeSaEntry OBJECT-TYPE
SYNTAX IkeSaEntry
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"This object contains an IKE security association."
INDEX {
ikeSaIndex
}
::= { ikeSaTable 1 }
IkeSaEntry ::=
SEQUENCE {
ikeSaIndex INTEGER,
ikeSaState INTEGER,
ikeSaXchType INTEGER,
ikeSaAuthMethod INTEGER,
ikeSaEncAlg INTEGER,
ikeSaHashAlg INTEGER,
ikeSaPrfAlg INTEGER,
ikeSaRole INTEGER,
ikeSaLocalId DisplayString,
ikeSaRemoteId DisplayString,
ikeSaLocalIp IpAddress,
ikeSaRemoteIp IpAddress,
ikeSaCookieI OCTET STRING,
ikeSaCookieR OCTET STRING,
ikeSaCreated Date,
ikeSaLastUsed Date,
ikeSaExpires Date,
ikeSaNumCerts INTEGER,
ikeSaNumNegotiations INTEGER,
ikeSaBytes INTEGER,
ikeSaMajVersion INTEGER,
ikeSaMinVersion INTEGER,
ikeSaPeerIndex INTEGER,
ikeSaHeartbeatsEnabled INTEGER,
ikeSaHeartbeatsSent INTEGER,
ikeSaHeartbeatsReceived INTEGER,
ikeSaLocalPort INTEGER,
ikeSaRemotePort INTEGER,
ikeSaXauthType INTEGER,
ikeSaXauthUser DisplayString
}
ikeSaIndex OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"A unique index for this entry."
::= { ikeSaEntry 1 }
ikeSaState OBJECT-TYPE
SYNTAX INTEGER {
negotiating(1), -- the SA is still being negotiated
established(2), -- the SA negotiation is finished
waiting-for-remove(3), -- the SA is waiting for removal
delete(7) -- mark the SA for deletion
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies the state of the SA.
Possible values:
negotiating(1), -- the SA is still being negotiated
established(2), -- the SA negotiation is finished
waiting-for-remove(3), -- the SA is waiting for removal
delete(7) -- mark the SA for deletion."
DEFVAL { negotiating }
::= { ikeSaEntry 3 }
ikeSaXchType OBJECT-TYPE
SYNTAX INTEGER {
base(1), -- IKE base mode mode
id-protect(2), -- IKE identity protection
-- (oakley main mode)
aggressive(4), -- IKE (oakley) aggressive mode
any(256) -- Other mode
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The exchange mode used to create the SA.
Possible values:
base(1), -- IKE base mode mode
id-protect(2), -- IKE identity protection
-- (oakley main mode)
authentication-only(3), -- Authentication only mode
aggressive(4), -- IKE (oakley) aggressive mode
info(5), -- IKE informational exchange mode
quick(32), -- IKE quick mode
new-group(33), -- IKE new group mode
any(256) -- Other mode."
::= { ikeSaEntry 4 }
ikeSaAuthMethod OBJECT-TYPE
SYNTAX INTEGER {
pre-sh-key(1), -- Authentication using pre shared keys
dss-sig(2), -- Authentication using DSS signatures
rsa-sig(3), -- Authentication using RSA signatures
rsa-enc(4), -- Authentication using RSA encryption
rsa-enc-rev(5) -- Authentication using revised RSA encryption
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The authenticatin method used when negotiating this SA.
Possible values:
pre-sh-key(1), -- Authentication using pre shared keys
dss-sig(2), -- Authentication using DSS signatures
rsa-sig(3), -- Authentication using RSA signatures
rsa-enc(4), -- Authentication using RSA encryption
rsa-enc-rev(5) -- Authentication using revised RSA encryption."
::= { ikeSaEntry 5 }
ikeSaEncAlg OBJECT-TYPE
SYNTAX INTEGER {
des(1),
idea(2), -- not used
blowfish(3),
rc5(4), -- not used
des3(5),
cast128(6), -- CAST with 128 bit key
aes(7), -- AES encryption algorithm
twofish(9)
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The encryption algorithm used."
::= { ikeSaEntry 26 }
ikeSaHashAlg OBJECT-TYPE
SYNTAX INTEGER {
md5(1), -- The MD5 hash algorithm
sha(2), -- The Secure Hash Algorithm
tiger(3), -- The Tiger hash algorithm
ripemd160(4) -- The RIPE MD 160 hash algorithm
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The hash algorithm used."
::= { ikeSaEntry 27 }
ikeSaPrfAlg OBJECT-TYPE
SYNTAX INTEGER {
md5(1), -- The MD5 hash algorithm
sha(2), -- The Secure Hash Algorithm
tiger(3), -- The Tiger hash algorithm
ripemd160(4) -- The RIPE MD 160 hash algorithm
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The hash algorithm used for the pseudo random function."
::= { ikeSaEntry 28 }
ikeSaRole OBJECT-TYPE
SYNTAX INTEGER {
initiator(1), -- this end initiated the SA negotiation
responder(2) -- the remote end initiated the SA negotiation
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"This object specifies by which side the SA
negotiation was initiated.
Possible values:
initiator(1), -- this end initiated the SA negotiation
responder(2) -- the remote end initiated the SA negotiation."
::= { ikeSaEntry 7 }
ikeSaLocalId OBJECT-TYPE
SYNTAX DisplayString
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The local ID used for authentication."
::= { ikeSaEntry 8 }
ikeSaRemoteId OBJECT-TYPE
SYNTAX DisplayString
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The remote ID used for authentication."
::= { ikeSaEntry 9 }
ikeSaLocalIp OBJECT-TYPE
SYNTAX IpAddress
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The local IP address used in the IKE communication."
::= { ikeSaEntry 10 }
ikeSaRemoteIp OBJECT-TYPE
SYNTAX IpAddress
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The remote IP address used in the IKE communication."
::= { ikeSaEntry 11 }
ikeSaCookieI OBJECT-TYPE
SYNTAX OCTET STRING
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The cookie of the initiator."
::= { ikeSaEntry 12 }
ikeSaCookieR OBJECT-TYPE
SYNTAX OCTET STRING
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The cookie of the responder."
::= { ikeSaEntry 13 }
ikeSaCreated OBJECT-TYPE
SYNTAX Date
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Time the SA was created."
::= { ikeSaEntry 24 }
ikeSaLastUsed OBJECT-TYPE
SYNTAX Date
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Time the SA was used last."
::= { ikeSaEntry 25 }
ikeSaExpires OBJECT-TYPE
SYNTAX Date
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Time the SA will expire."
::= { ikeSaEntry 29 }
ikeSaNumCerts OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The number of certificates received from the remote
side when negotiating this SA."
::= { ikeSaEntry 15 }
ikeSaNumNegotiations OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"This object specifies the number of currently active
negotiations for this SA."
::= { ikeSaEntry 16 }
ikeSaBytes OBJECT-TYPE
SYNTAX INTEGER
UNITS "bytes"
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Number of bytes transmitted using this SA."
::= { ikeSaEntry 17 }
ikeSaMajVersion OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The IKE major version number."
::= { ikeSaEntry 18 }
ikeSaMinVersion OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The IKE minor version number."
::= { ikeSaEntry 19 }
ikeSaPeerIndex OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The index of the peer for which this SA was created."
::= { ikeSaEntry 20 }
ikeSaHeartbeatsEnabled OBJECT-TYPE
SYNTAX INTEGER {
send(1), -- send heartbeats
expect(2), -- expect heartbeats
both(3), -- send and expect heartbeats
none(4) -- neither send nor expect heartbeats
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"This object specifies whether heartbeats are sent/expected
over this SA
possible values:
send(1), -- send heartbeats
expect(2), -- expect heartbeats
both(3), -- send and expect heartbeats
none(4) -- neither send nor expect heartbeats."
::= { ikeSaEntry 21 }
ikeSaHeartbeatsSent OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Number of Heartbeats sent over this SA."
::= { ikeSaEntry 22 }
ikeSaHeartbeatsReceived OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Number of Heartbeats received over this SA."
::= { ikeSaEntry 23 }
ikeSaLocalPort OBJECT-TYPE
SYNTAX INTEGER (0..65535)
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Local port currently used for the SA."
::= { ikeSaEntry 30 }
ikeSaRemotePort OBJECT-TYPE
SYNTAX INTEGER (0..65535)
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Remote port currently used for the SA."
::= { ikeSaEntry 31 }
ikeSaXauthType OBJECT-TYPE
SYNTAX INTEGER {
generic(0), -- generic
radius-chap(1), -- RADIUS-CHAP
otp(2), -- One-Time-Password
s-key(3), -- S/KEY One-Time-Password
none(32768) -- no XAUTH used
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"This object displayes whether XAUTH is used or not
after complete establishment of the SA.
If XAUTH is used then the type of the extended
authentication is displayed."
DEFVAL { none }
::= { ikeSaEntry 32 }
ikeSaXauthUser OBJECT-TYPE
SYNTAX DisplayString
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"User name used for Extended Authentication."
::= { ikeSaEntry 33 }
-- End IKE Security Associations Table
-- IKE (Phase 1) Profile Table
ikeProfileTable OBJECT-TYPE
SYNTAX SEQUENCE OF IkeProfileEntry
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"This table contains the list of IKE (Phase 1) profiles."
::= { ipsec 14 }
ikeProfileEntry OBJECT-TYPE
SYNTAX IkeProfileEntry
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"This object contains an IPSec phase 1 profile."
INDEX {
ikePrfProposal
}
::= { ikeProfileTable 1 }
IkeProfileEntry ::=
SEQUENCE {
ikePrfIndex INTEGER,
ikePrfDescription DisplayString,
ikePrfAuthMethod INTEGER,
ikePrfMode INTEGER,
ikePrfProposal INTEGER,
ikePrfGroup INTEGER,
ikePrfCert INTEGER,
ikePrfLocalId DisplayString,
ikePrfCaCerts DisplayString,
ikePrfLifeTime INTEGER,
ikePrfPfsIdentity INTEGER,
ikePrfHeartbeats INTEGER,
ikePrfBlockTime INTEGER,
ikePrfNatT INTEGER,
ikePrfMtuMax INTEGER,
ikePrfLifeSeconds Unsigned32,
ikePrfLifeKBytes Unsigned32,
ikePrfLifeRekeyPercent INTEGER,
ikePrfLifePolicy INTEGER
}
ikePrfIndex OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"A unique index identifying this entry."
::= { ikeProfileEntry 1 }
ikePrfDescription OBJECT-TYPE
SYNTAX DisplayString
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"An optional description for this profile."
::= { ikeProfileEntry 2 }
ikePrfAuthMethod OBJECT-TYPE
SYNTAX INTEGER {
pre-sh-key(1), -- Authentication using pre shared keys
dss-sig(2), -- Authentication using DSS signatures
rsa-sig(3), -- Authentication using RSA signatures
rsa-enc(4), -- Authentication using RSA encryption
default(14), -- use settings from default profile
delete(15) -- mark this entry for deletion
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies the authentication method used for this profile.
Possible values:
pre-sh-key(1), -- Authentication using pre shared keys
dss-sig(2), -- Authentication using DSS signatures
rsa-sig(3), -- Authentication using RSA signatures
rsa-enc(4), -- Authentication using RSA encryption
default(14), -- use settings from default profile
-- (pre-sh-key if this is the default profile)
delete(15) -- mark this entry for deletion."
DEFVAL { default }
::= { ikeProfileEntry 3 }
ikePrfMode OBJECT-TYPE
SYNTAX INTEGER {
id-protect(1), -- Use identity protection (main) mode
aggressive(2), -- Use aggressive mode
default(3), -- Use default setting from the
-- global profile
id-protect-only(4), -- only id-protect mode allowed
aggressive-only(5) -- only aggressive mode allowed
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies the exchange mode used for IKE
SA negotiation.
Possible values:
id-protect(1), -- Use identity protection (main) mode
aggressive(2), -- Use aggressive mode
default(3), -- Use default setting from the
-- global profile
id-protect-only(4), -- only id-protect mode allowed
aggressive-only(5) -- only aggressive mode allowed."
DEFVAL { default }
::= { ikeProfileEntry 4 }
ikePrfProposal OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"The index of the first IKE proposal which may be used
for IKE SA negotiation with this profile."
::= { ikeProfileEntry 5 }
ikePrfGroup OBJECT-TYPE
SYNTAX INTEGER (1..5)
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies the IKE group to use with this profile.
Possible values:
1: a 768-bit MODP group
2: a 1024-bit MODP group
5: a 1536-bit MODP group"
::= { ikeProfileEntry 6 }
ikePrfCert OBJECT-TYPE
SYNTAX INTEGER (0..32767)
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"The index of the certificate used for authentication
in the certTable. Ignored for AuthMethod == pre_shared_key."
::= { ikeProfileEntry 7 }
ikePrfLocalId OBJECT-TYPE
SYNTAX DisplayString
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"The local ID used for authentication with this profile.
Syntax:
- X500 distinguished name:
<obj-name=obj-value, obj-ID=obj-value, ...>
- IPV4-Address:
|123.456.789.012| with or without '|'
- IPV4 Address Range:
|123.456.789.012-123.456.789.013| with or without '|'
- IPV4 Address Subnet:
|123.456.789.012/255.255.255.0| with or without '|'
or:
|123.456.789.012/24| with or without '|'
- Key-ID: arbitrary string:
{anything}
- Fully Qualified User Name (FQUN):
(anything) or user@domain with mandatory '@'
- Fully Qualified Domain Name (FQDN):
[anything] or any name without '@' not matching any other
syntax"
::= { ikeProfileEntry 8 }
ikePrfCaCerts OBJECT-TYPE
SYNTAX DisplayString
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"Receives a comma separated list with indices (0..32767)
of special certificate authority certificates accepted
for this profile."
::= { ikeProfileEntry 9 }
ikePrfLifeTime OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"This object specifies an index in the ipsecLifeTimeTable with the
lifetime settings to be used for IKE SA negotiation with this profile.
If the lifetime pointed to by this index does not exist or is
inappropriate, the default lifetime is taken.
The usage of this object is deprecated, use the ikePrfLifeXxx
variables directly instead."
DEFVAL { -1 }
::= { ikeProfileEntry 10 }
ikePrfPfsIdentity OBJECT-TYPE
SYNTAX INTEGER {
true(1), -- delete phase 1 SAs
false(2), -- reuse phase 1 SAs
default(3) -- use value from default profile
-- (false, if this is the default profile)
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies whether IKE SA's should be deleted
immediately after a phase 2 (IPSec-) SA pair has been
negotiated.
The consequence of enabling this feature is that before each
phase 2 negotiation there always has to be a phase 1
negotiation. Thus individual phase 2 SAs cannot be
associated with one another or, respectively, if the
identity of a remote peer is known to an eavesdropper
for one SA, he cannot conclude that the next SA is
negotiated with the same remote peer.
Note: Setting this flag only makes sense if configured
together with id-protect mode or RSA encryption for
authentication and if the IP address of the remote
peer does not allow conclusions about its identity
(i.e. dynamic remote peer addresses).
Possible values:
true(1), -- delete phase 1 SAs
false(2), -- reuse phase 1 SAs
default(3) -- use value from default profile
-- (false if this is the default profile)."
DEFVAL { default }
::= { ikeProfileEntry 11 }
ikePrfHeartbeats OBJECT-TYPE
SYNTAX INTEGER {
none(1), -- neither send nor expect heartbeats
expect(2), -- expect heartbeats
send(3), -- send heartbeats
both(4), -- send and expect heartbeats
default(5), -- use default value
auto(6), -- detect support using vendor id
dpd(7), -- use DPD method for proof-of-liveliness
dpd-idle(8) -- use DPD, detect dead peers even while idle
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies whether heartbeats should be sent
over phase 1 SAs for this profile (heartbeats are not
used for IPv6).
Possible values:
none(1), -- neither send nor expect heartbeats
expect(2), -- expect heartbeats
send(3), -- send heartbeats
both(4), -- send and expect heartbeats
default(5), -- use value from default profile
-- (auto if this is the default profile)
auto(6), -- detect support using vendor id
dpd(7), -- use DPD method for proof-of-liveliness
dpd-idle(8) -- use DPD, detect dead peers even while idle."
DEFVAL { default }
::= { ikeProfileEntry 12 }
ikePrfBlockTime OBJECT-TYPE
SYNTAX INTEGER (-1..86400)
UNITS "seconds"
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies the time in seconds for which a peer is
blocked for any IPSec operations after a phase 1 initiator
negotiation failed.
Special values:
-1: use settings from global profile (do not block by default)
0: do not block the peer at all."
DEFVAL { -1 }
::= { ikeProfileEntry 13 }
ikePrfNatT OBJECT-TYPE
SYNTAX INTEGER {
enabled(1), -- enable Nat-Traversal
disabled(2), -- disable Nat-Traversal
default(3), -- use value from default profile
-- (enabled, if this is the default profile)
enforce(4) -- enforce NAT-T, independant from NAT
-- detection
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies whether NAT-Traversal is enabled
Possible values:
enabled(1), -- enable Nat-Traversal
disabled(2), -- disable Nat-Traversal
default(3) -- use value from default profile
-- (disabled, if this is the default profile)."
DEFVAL { default }
::= { ikeProfileEntry 14 }
ikePrfMtuMax OBJECT-TYPE
SYNTAX INTEGER (0..65535)
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"The maximum MTU value allowed for ipsecPeerStatMtu.
Zero means use value from global profile,
if this is the global profile, 1418 is assumed.
Nonzero values smaller than 214 are reset to the minimum of 214."
DEFVAL { 0 }
::= { ikeProfileEntry 15 }
ikePrfLifeSeconds OBJECT-TYPE
SYNTAX Unsigned32
UNITS "seconds"
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"The maximum time (in seconds) after which an SA will be
deleted."
DEFVAL { 900 }
::= { ikeProfileEntry 16 }
ikePrfLifeKBytes OBJECT-TYPE
SYNTAX Unsigned32
UNITS "kilo bytes"
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"The maximum amount of data (in KB) which may be protected
by an SA before it is deleted."
DEFVAL { 0 }
::= { ikeProfileEntry 17 }
ikePrfLifeRekeyPercent OBJECT-TYPE
SYNTAX INTEGER (50..100)
MAX-ACCESS read-write
STATUS obsolete
DESCRIPTION
"WARNING: this object is obsolete and must not be used."
DEFVAL { 80 }
::= { ikeProfileEntry 18 }
ikePrfLifePolicy OBJECT-TYPE
SYNTAX INTEGER {
loose(1), -- accept and use anything proposed
strict(2), -- accept and use only what is configured
notify(3), -- accept anything (send responder lifetime)
use-default-lifetime(4) -- use lifetime values from default
-- profile
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies the way a lifetime proposal is
handled. Possible values:
loose(1), -- accept and use anything proposed
strict(2), -- accept and use only what is configured
notify(3), -- accept anything, if own values are smaller
than what was proposed use these and
send responder lifetime notification
use_default_lifetime(4) -- use lifetime values from default
-- profile."
DEFVAL { use-default-lifetime }
::= { ikeProfileEntry 19 }
-- End IKE (Phase 1) Profile Table
-- IPSec (Phase 2) Profile Table
ipsecProfileTable OBJECT-TYPE
SYNTAX SEQUENCE OF IpsecProfileEntry
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"This table contains the list of IPSec (Phase 2) profiles."
::= { ipsec 15 }
ipsecProfileEntry OBJECT-TYPE
SYNTAX IpsecProfileEntry
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"This object contains an IPSec phase 1 profile."
INDEX {
ipsecPrfProposal
}
::= { ipsecProfileTable 1 }
IpsecProfileEntry ::=
SEQUENCE {
ipsecPrfIndex INTEGER,
ipsecPrfDescription DisplayString,
ipsecPrfProposal INTEGER,
ipsecPrfPfsGroup INTEGER,
ipsecPrfLifeTime INTEGER,
ipsecPrfHeartbeats INTEGER,
ipsecPrfPmtuDiscovery INTEGER,
ipsecPrfGranularity INTEGER,
ipsecPrfKeepAlive INTEGER,
ipsecPrfVerifyPad INTEGER,
ipsecPrfForceTunnelMode INTEGER,
ipsecPrfLifeSeconds Unsigned32,
ipsecPrfLifeKBytes Unsigned32,
ipsecPrfLifeRekeyPercent INTEGER,
ipsecPrfLifePolicy INTEGER
}
ipsecPrfIndex OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"A unique index identifying this entry."
::= { ipsecProfileEntry 1 }
ipsecPrfDescription OBJECT-TYPE
SYNTAX DisplayString
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"An optional description for this profile."
::= { ipsecProfileEntry 2 }
ipsecPrfProposal OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"The index of the IPSec proposal used for this profile."
::= { ipsecProfileEntry 3 }
ipsecPrfPfsGroup OBJECT-TYPE
SYNTAX INTEGER (-1..5)
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"The Diffie Hellman group used for additional Perfect
Forward Secrecy (PFS) DH exponentiations.
Possible values:
-1: do not use PFS
0: use value from default profile (do not use PFS
if this is the default profile)
1: a 768-bit MODP group,
2: a 1024-bit MODP group,
5: a 1536-bit MODP group."
::= { ipsecProfileEntry 4 }
ipsecPrfLifeTime OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"This object specifies an index in the
ipsecLifeTimeTable.
The usage of this object is deprecated, use the ipsecPrfLifeXxx
variables directly instead."
DEFVAL { -1 }
::= { ipsecProfileEntry 5 }
ipsecPrfHeartbeats OBJECT-TYPE
SYNTAX INTEGER {
none(1), -- neither send nor expect heartbeats
expect(2), -- expect heartbeats
send(3), -- send heartbeats
both(4), -- send and expect heartbeats
default(5), -- use settings from peer or global profile
auto(6) -- detect support using vendor id
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies whether heartbeats should be sent
over phase 2 SAs for this profile (heartbeats are not
used for IPv6).
Possible values:
none(1), -- neither send nor expect heartbeats
expect(2), -- expect heartbeats
send(3), -- send heartbeats
both(4). -- send and expect heartbeats
default(5), -- use settings from peer or global profile
(auto if this is the global profile)
auto(6) -- detect support using vendor id."
DEFVAL { default }
::= { ipsecProfileEntry 6 }
ipsecPrfPmtuDiscovery OBJECT-TYPE
SYNTAX INTEGER {
disabled(1), -- do not perform PMTU discovery
enabled(2), -- perform PMTU discovery
default(3) -- use settings from peer or global profile
-- (enabled if this is the global profile)
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies the PMTU discovery policy for this peer.
Possible values:
disabled(1), -- do not perform PMTU discovery
enabled(2) -- perform PMTU discovery
default(3) -- use settings from peer or global profile
-- (enabled if this is the global profile)."
DEFVAL { default }
::= { ipsecProfileEntry 7 }
ipsecPrfGranularity OBJECT-TYPE
SYNTAX INTEGER {
default(1), -- use granulaity settings from default profile
-- (coarse if this is the default profile)
coarse(2), -- Create only one SA for each Traffic entry
ip(3), -- Create one SA for each host
proto(4), -- Create one SA for each protocol and host
port(5), -- Create one SA for each port and host
local-services(6) -- same as 'coarse' but 'ip' for local services
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies the granularity with which SA's
are created with this profile.
Possible values:
default(1), -- use granulaity settings from default profile
-- (coarse if this is the default profile)
coarse(2), -- Create only one SA for each Traffic entry
ip(3), -- Create one SA for each host
proto(4), -- Create one SA for each protocol and host
port(5) -- Create one SA for each port and host."
DEFVAL { default }
::= { ipsecProfileEntry 8 }
ipsecPrfKeepAlive OBJECT-TYPE
SYNTAX INTEGER {
true(1), -- rekey SA's even if no data was transferred
false(2), -- do not rekey SA's if no data was transferred
default (3), -- use value from default profile
-- (false if this is the default profile)
delete (4) -- mark this entry for deletion
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies whether IKE SA's
are rekeyed even if there was no data transferred over
them.
Possible values:
true(1), -- rekey SA's even if no data was transferred
false(2), -- do not rekey SA's if no data was transferred
default (3), -- use value from default profile
-- (false if this is the default profile)
delete (4) -- mark this entry for deletion."
DEFVAL { default }
::= { ipsecProfileEntry 9 }
ipsecPrfVerifyPad OBJECT-TYPE
SYNTAX INTEGER {
true(1), -- normal, self-describing ESP padding
false(2), -- old style ESP padding
default(3) -- use setting from peer or global profile
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object is a compatibility option for older ipsec
implementations. It enables or disables an old way of ESP
padding (no self describing padding).
Possible values:
true(1), -- normal, self-describing ESP padding
false(2), -- old style ESP padding
default(3) -- use setting from peer or global profile
(true if this is the global profile)."
DEFVAL { default }
::= { ipsecProfileEntry 10 }
ipsecPrfForceTunnelMode OBJECT-TYPE
SYNTAX INTEGER {
true(1), -- Use tunnel mode even if transport mode is possible
false(2), -- Use transport mode whenever possible
default(3) -- Use settings from default profile
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies the strategy when transport mode is used.
By default, the system always uses transport mode, if possible.
If this variable is set to true, always tunnel mode will be used
for this traffic entry, even if source and destination address
match the tunnel endpoints.
Possible values:
true(1), -- Use tunnel mode even if transport mode is possible
false(2), -- Use transport mode whenever possible
default(3) -- Use settings from default profile
(if this is the default, false is assumed)."
DEFVAL { default }
::= { ipsecProfileEntry 11 }
ipsecPrfLifeSeconds OBJECT-TYPE
SYNTAX Unsigned32
UNITS "seconds"
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"The maximum time (in seconds) after which an SA will be
deleted."
DEFVAL { 900 }
::= { ipsecProfileEntry 16 }
ipsecPrfLifeKBytes OBJECT-TYPE
SYNTAX Unsigned32
UNITS "kilo bytes"
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"The maximum amount of data (in KB) which may be protected
by an SA before it is deleted."
DEFVAL { 0 }
::= { ipsecProfileEntry 17 }
ipsecPrfLifeRekeyPercent OBJECT-TYPE
SYNTAX INTEGER (50..100)
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"The percentage of the lifetimes (traffic and time based)
after which rekeying is started."
DEFVAL { 80 }
::= { ipsecProfileEntry 18 }
ipsecPrfLifePolicy OBJECT-TYPE
SYNTAX INTEGER {
loose(1), -- accept and use anything proposed
strict(2), -- accept and use only what is configured
notify(3), -- accept anything (send responder lifetime)
use-default-lifetime(4) -- use lifetime values from default
-- profile
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies the way a lifetime proposal is
handled. Possible values:
loose(1), -- accept and use anything proposed
strict(2), -- accept and use only what is configured
notify(3) -- accept anything, if own values are smaller
than what was proposed use these and
send responder lifetime notification
use_default_lifetime(4) -- use lifetime values from default
-- profile."
DEFVAL { use-default-lifetime }
::= { ipsecProfileEntry 19 }
-- End IPSec (Phase 2) Profile Table
-- IPSec Peer Table
ipsecPeerTable OBJECT-TYPE
SYNTAX SEQUENCE OF IpsecPeerEntry
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"This table contains the list of IPSec peers."
::= { ipsec 5 }
ipsecPeerEntry OBJECT-TYPE
SYNTAX IpsecPeerEntry
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"This object contains the description of an IPSec peer."
INDEX {
ipsecPeerTrafficList
}
::= { ipsecPeerTable 1 }
IpsecPeerEntry ::=
SEQUENCE {
ipsecPeerIndex INTEGER,
ipsecPeerPriority INTEGER,
ipsecPeerDescription DisplayString,
ipsecPeerDynamicAddress DisplayString,
ipsecPeerPeerIds DisplayString,
ipsecPeerLocalAddress IpAddress,
ipsecPeerTrafficList INTEGER,
ipsecPeerIkeProfile INTEGER,
ipsecPeerIpsecProfile INTEGER,
ipsecPeerPreSharedKey DisplayString,
ipsecPeerVirtualInterface INTEGER,
ipsecPeerStartMode INTEGER,
ipsecPeerAdminStatus INTEGER,
ipsecPeerIsdnCB INTEGER,
ipsecPeerPreSharedKeyData OCTET STRING,
ipsecPeerIsdnCBMode INTEGER,
ipsecPeerIsdnCBDChanMode INTEGER,
ipsecPeerType INTEGER,
ipsecPeerDynAddrPoolId INTEGER,
ipsecPeerDynAddrLocalIp IpAddress,
ipsecPeerXauthProfile Unsigned32,
ipsecPeerDynAddrRole INTEGER,
ipsecPeerIkeVersion INTEGER,
-- IKEv2 specific Peer parameters
ipsecPeerLocalId DisplayString,
ipsecPeerAuthMethod INTEGER,
ipsecPeerCert INTEGER,
ipsecPeerCaCerts DisplayString,
-- universal (IKEv1 and IKEv2) Peer parameters
ipsecPeerDynAddrMode INTEGER,
ipsecPeerMobike INTEGER,
ipsecPeerPublicIfIndex INTEGER,
ipsecPeerPublicIfIndexMode INTEGER
}
-- these read-only parameters are moved to the new ipsecPeerStatTable:
-- ipsecPeerNextIndex OID ipsecPeerEntry 2
-- ipsecPeerCaCerts OID ipsecPeerEntry 4
-- ipsecPeerPeerAddress OID ipsecPeerEntry 6
-- ipsecPeerLocalId OID ipsecPeerEntry 7
-- ipsecPeerLocalCert OID ipsecPeerEntry 9
-- ipsecPeerIkeProposals OID ipsecPeerEntry 10
-- ipsecPeerPublicInterface OID ipsecPeerEntry 12
-- ipsecPeerPfsIdentity OID ipsecPeerEntry 13
-- ipsecPeerAuthMethod OID ipsecPeerEntry 20
-- ipsecPeerIkeGroup OID ipsecPeerEntry 22
-- ipsecPeerPfsGroup OID ipsecPeerEntry 23
-- ipsecPeerPh1Mode OID ipsecPeerEntry 24
-- ipsecPeerIkeLifeTime OID ipsecPeerEntry 25
-- ipsecPeerIpsecLifeTime OID ipsecPeerEntry 26
-- ipsecPeerKeepAlive OID ipsecPeerEntry 29
-- ipsecPeerGranularity OID ipsecPeerEntry 30
-- ipsecPeerDontVerifyPad OID ipsecPeerEntry 31
-- ipsecPeerNoPmtuDiscovery OID ipsecPeerEntry 36
-- ipsecPeerOperStatus OID ipsecPeerEntry 44
-- ipsecPeerDefaultIpsecProposals OID ipsecPeerEntry 42
-- ipsecPeerHeartbeat OID ipsecPeerEntry 43
-- ipsecPeerTtl OID ipsecPeerEntry 51
-- ipsecPeerCurrentLocalAddress OID ipsecPeerEntry 52
-- ipsecPeerCurrentRemoteAddress OID ipsecPeerEntry 53
-- ipsecPeerNumP1 OID ipsecPeerEntry 54
-- ipsecPeerNumP1Negotiating OID ipsecPeerEntry 55
-- ipsecPeerNumP1Established OID ipsecPeerEntry 56
-- ipsecPeerNumP1Deleted OID ipsecPeerEntry 57
-- ipsecPeerNumBundles OID ipsecPeerEntry 58
-- ipsecPeerNumBundlesNegotiating OID ipsecPeerEntry 59
-- ipsecPeerNumBundlesEstablished OID ipsecPeerEntry 60
-- ipsecPeerPh1LToken OID ipsecPeerEntry 64
-- ipsecPeerPh1RToken OID ipsecPeerEntry 65
-- ipsecPeerIsdnCBNextMode OID ipsecPeerEntry 68
-- ipsecPeerNatDetect OID ipsecPeerEntry 69
-- ipsecPeerNatTLocalPort OID ipsecPeerEntry 70
-- ipsecPeerNatTRemotePort OID ipsecPeerEntry 71
-- ipsecPeerMtu OID ipsecPeerEntry 72
-- ipsecPeerRxIdle OID ipsecPeerEntry 74
-- ipsecPeerTxIdle OID ipsecPeerEntry 75
-- ipsecPeerDPD OID ipsecPeerEntry 76
-- ipsecPeerDPDRetries OID ipsecPeerEntry 77
ipsecPeerIndex OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"A unique index identifying this entry."
::= { ipsecPeerEntry 1 }
ipsecPeerPriority OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"Defines the matching priority."
::= { ipsecPeerEntry 47 }
ipsecPeerDescription OBJECT-TYPE
SYNTAX DisplayString
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"An optional description for this peer."
::= { ipsecPeerEntry 3 }
ipsecPeerDynamicAddress OBJECT-TYPE
SYNTAX DisplayString
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"The IP-address of the peer.
This object may contain either an IP address or a domain name."
::= { ipsecPeerEntry 14 }
ipsecPeerPeerIds OBJECT-TYPE
SYNTAX DisplayString
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"The IDs of the peer which are accepted for authentication.
Syntax:
- X500 distinguished name:
<obj-name=obj-value, obj-ID=obj-value, ...>
- IPV4-Address:
|123.456.789.012| with or without '|'
- IPV4 Address Range (only IKEv1):
|123.456.789.012-123.456.789.013| with or without '|'
- IPV4 Address Subnet (only IKEv1):
|123.456.789.012/255.255.255.0| with or without '|'
or:
|123.456.789.012/24| with or without '|'
- Key-ID: arbitrary string:
{anything}
- Fully Qualified User Name (FQUN) (for IKEv1) or
Fully-qualified RFC 822 email address string (for IKEv2):
(anything) or user@domain with mandatory '@'
- Fully Qualified Domain Name (FQDN):
[anything] or any name without '@' not matching any other
syntax"
::= { ipsecPeerEntry 5 }
ipsecPeerLocalAddress OBJECT-TYPE
SYNTAX IpAddress
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"The local address used for IPSec encrypted packets."
::= { ipsecPeerEntry 8 }
ipsecPeerTrafficList OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies the first entry of possibly a
chain of traffic entries from the ipsecTrafficTable
which should be protected with IPSec using this peer."
::= { ipsecPeerEntry 11 }
ipsecPeerVirtualInterface OBJECT-TYPE
SYNTAX INTEGER {
disabled(1), -- no virtual interface for this peer
enabled(2) -- a virtual interface will be assigned this peer
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies if a virtual interface should be created
for this peer. If set to enabled, all traffic routed towards
this peer will be protected. The traffic list for this peer
is ignored then. The index of the interface associated with
this peer is calculated as follows:
ifIndex = ipsecPeerIndex + 100000."
DEFVAL { disabled }
::= { ipsecPeerEntry 15 }
ipsecPeerStartMode OBJECT-TYPE
SYNTAX INTEGER {
on-demand(1), -- packet triggered start,
-- fall back to dormant if unused
always-up(2) -- always set up and keep up
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies the events which make the IPSec peer go up.
Possible values:
on-demand(1), -- packet triggered start,
-- fall back to dormant if unused
always-up(2) -- always set up and keep up."
DEFVAL { on-demand }
::= { ipsecPeerEntry 16 }
ipsecPeerIkeProfile OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"When ipsecPeerIkeVersion is set to ikev1 this is an index from
the ikeProfileTable containing a special phase 1 profile to
use for this peer.
When ipsecPeerIkeVersion is set to ikev2 this is an index from
the ikev2ProfileTable containing a special IKE_SA profile to
use for this peer."
::= { ipsecPeerEntry 48 }
ipsecPeerIpsecProfile OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"The index from the ipsecProfileTable containing a special
phase 2 profile to use for this peer."
::= { ipsecPeerEntry 49 }
ipsecPeerPreSharedKey OBJECT-TYPE
SYNTAX DisplayString
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"The pre-shared-key used with this peer, if pre-shared-keys
are used for authentication. This field serves only
as an input field and its contents are replaced with
a single asterisk immediately after it is set."
::= { ipsecPeerEntry 21 }
ipsecPeerAdminStatus OBJECT-TYPE
SYNTAX INTEGER {
up(1),
down(2),
-- testing(3),
dialup(4),
callback(5),
delete(15)
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"Peer administrative state."
DEFVAL { up }
::= { ipsecPeerEntry 50 }
ipsecPeerIsdnCB OBJECT-TYPE
SYNTAX INTEGER {
enabled(1),
disabled(2),
passive(3), -- expect an ISDN call and setup IPSec tunnel
active(4) -- setup an ISDN call and expect IPSec tunnel setup
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"Switch for turning ISDN call back feature on and off
specifically for peer.
Default value is disabled."
DEFVAL { disabled }
::= { ipsecPeerEntry 45 }
ipsecPeerPreSharedKeyData OBJECT-TYPE
SYNTAX OCTET STRING
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"Field used for storing the pre-shared-key permanently."
::= { ipsecPeerEntry 63 }
ipsecPeerIsdnCBMode OBJECT-TYPE
SYNTAX INTEGER {
compat(1),
auto(2),
auto-d(3),
d(4),
db(5),
b(6)
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"Define callback mode.
The following modes are defined:
compat(1) -- compatibility to old callback
auto(2) -- automatically detect best method
auto-d(3) -- automatically detect best D channel method
d(4) -- use D channel only
db(5) -- try D channel first, fall back to B
b(6) -- use B channel only
Default value for that variable is compat(1)."
DEFVAL { compat }
::= { ipsecPeerEntry 66 }
ipsecPeerIsdnCBDChanMode OBJECT-TYPE
SYNTAX INTEGER {
llc(1),
subaddr(2),
llc-and-subaddr(3),
llc-subaddr(4),
subaddr-llc(5)
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"Define callback D channel mode.
The following modes are defined:
llc(1) -- code token into LLC information
element only
subaddr(2) -- code token into SUBADDR information
element only
llc-and-subaddr(3) -- redundantly use LLC and SUBADDR
information elements
llc-subaddr(4) -- try LLC first, then SUBADDR
subaddr-llc(5) -- try SUBADDR first, then LLC
Default value for that variable is LLC(1)."
DEFVAL { llc }
::= { ipsecPeerEntry 67 }
ipsecPeerType OBJECT-TYPE
SYNTAX INTEGER {
fixed(1), -- only one peer allowed for this entry
dynamic-client(2) -- duplicated for each incoming client
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"The type of the peer. Dynamic peer entries are duplicated
whenever an incoming IKE request matches the ID and/or
address information of the remote side.
Note:
- For traffic list peers the duplication also includes the
traffic list entries configured for this peer entry.
- For virtual interface peers, host routes will be added
for the peer address automatically.
Possible values:
fixed(1), -- only one peer allowed for this entry
dynamic_client(2) -- duplicated for each incoming client."
DEFVAL { fixed }
::= { ipsecPeerEntry 73 }
ipsecPeerDynAddrPoolId OBJECT-TYPE
SYNTAX INTEGER (-1..65535)
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"Identifier of Dynamic Address Pool if IP address is
assigned via IKE Configuration Method.
A value of -1 means that no Pool is assigned."
DEFVAL { -1 }
::= { ipsecPeerEntry 78 }
ipsecPeerDynAddrLocalIp OBJECT-TYPE
SYNTAX IpAddress
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"The local IP address used in the IKE communication
when remote IP address is taken from IP address pool."
::= { ipsecPeerEntry 79 }
ipsecPeerXauthProfile OBJECT-TYPE
SYNTAX Unsigned32 (0..4294967295)
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"The index from the xauthProfileTable containing a special
XAUTH profile to use for this peer.
A value of 0 means that no XAUTH profile is assigned."
DEFVAL { 0 }
::= { ipsecPeerEntry 80 }
ipsecPeerDynAddrRole OBJECT-TYPE
SYNTAX INTEGER {
none(1), -- no IP address assignment via IKE Config Mode
client(2), -- get IP address via IKE Config Mode from remote
server(3) -- assign IP address via IKE Config Mode to remote
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"Determines if IKE Config Mode is used and which role is performed:
none(1), -- no IP address assignemt via IKE Config Mode
client(2) -- get IP address via IKE Config Mode from remote
server(3) -- assign IP address via IKE Config Mode to remote
In server role ipsecPeerDynAddrPoolId defines IP address pool to
use for address assignment to clients. If an invalid pool ID is
configured, peer is treated as if role was 'none'.
Default is 'none', that means IKE Config Mode is not used at all."
DEFVAL { none }
::= { ipsecPeerEntry 81 }
ipsecPeerIkeVersion OBJECT-TYPE
SYNTAX INTEGER {
ikev1(1),
ikev2(2)
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"Indicates the major version of IKE protocol to use. If set to
ikev1 the value of ipsecPeerIkeProfile is used as index into
ikeProfileTable. If set to ikev2 the value of
ipsecPeerIkeProfile is used as index into ikev2ProfileTable."
DEFVAL { ikev1 }
::= { ipsecPeerEntry 82 }
-- IKEv2 specific Peer parameters
ipsecPeerLocalId OBJECT-TYPE
SYNTAX DisplayString
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"The local ID used for authentication with this profile.
Syntax:
- X500 distinguished name:
<obj-name=obj-value, obj-ID=obj-value, ...>
- IPV4-Address:
|123.456.789.012| with or without '|'
- Key-ID: arbitrary string:
{anything}
- Fully-qualified RFC 822 email address string:
(anything) or user@domain with mandatory '@'
- Fully Qualified Domain Name (FQDN):
[anything] or any name without '@' not matching any other
syntax
(only for IKEv2)."
::= { ipsecPeerEntry 83 }
ipsecPeerAuthMethod OBJECT-TYPE
SYNTAX INTEGER {
pre-sh-key(1), -- Authentication using pre shared keys
dss-sig(2), -- Authentication using DSS signatures
rsa-sig(3) -- Authentication using RSA signatures
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies the authentication method used by default.
If the ipsecPeerAuthMethod field of an ipsecPeerEntry and the
ikePropAuthMethod field of the ikeProposalTableEntry used are
set to 'default', this value is assumed.
Possible values:
pre-sh-key(1), -- Authentication using pre shared keys
dss-sig(2), -- Authentication using DSS signatures
rsa-sig(3) -- Authentication using RSA signatures
(only for IKEv2)."
::= { ipsecPeerEntry 84 }
ipsecPeerCert OBJECT-TYPE
SYNTAX INTEGER (0..32767)
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"The index of the certificate used for authentication
in the certTable. Ignored for AuthMethod == pre_shared_key.
(only for IKEv2)."
::= { ipsecPeerEntry 85 }
ipsecPeerCaCerts OBJECT-TYPE
SYNTAX DisplayString
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"Receives a comma separated list with indices (0..32767)
of special certificate authority certificates accepted
for this profile.
(only for IKEv2)."
::= { ipsecPeerEntry 86 }
ipsecPeerDynAddrMode OBJECT-TYPE
SYNTAX INTEGER {
pull(1), -- the client will request IP address and the gateway
-- will answer the request
push(2) -- the gateway will set IP address to the client and
-- the client will accept or deny it
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"When IP address assignment via IKE Config Mode is configured
(ipsecPeerDynAddrRole != none) this object specifies the used mode:
pull(1), -- the client will request IP address and the gateway
will answer the request
push(2) -- the gateway will set IP address to the client and
the client will accept or deny it
The ipsecPeerDynAddrMode value has to be the same for both sides of
the tunnel. With default value 'pull' the peer (ipsecPeerDynAddrRole ==
client) will request IP address and the gateway (ipsecPeerDynAddrRole ==
server) will answer the request.
The 'push' mode is needed for partner devices that require this mode.
This object matters only when ipsecPeerDynAddrRole != none."
DEFVAL { pull }
::= { ipsecPeerEntry 87 }
ipsecPeerMobike OBJECT-TYPE
SYNTAX INTEGER {
enabled(1), -- peer supports MOBIKE
disabled(2) -- peer does not support MOBIKE
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object indicates whether the peer supports MOBIKE or not.
Only when both sides of a VPN connection support MOBIKE an IP
address change is possible.
Possible values:
enabled(1), -- Peer supports MOBIKE and signals MOBIKE
support by including a MOBIKE_SUPPORTED
notification in the IKE_AUTH message.
disabled(2) -- Peer does not support MOBIKE.
(only for IKEv2)."
DEFVAL { enabled }
::= { ipsecPeerEntry 88 }
ipsecPeerPublicIfIndex OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"The index value which uniquely identifies the physical interface
that should be used for all ipsec traffic as initiator.
When multiple eqivalent routes to the given peer are available this
is used as additional parameter for routing decisions.
If set to -1 then normal routing is used.
As responder the interface from the first received packet is used
and therefore this index value is ignored."
DEFVAL { -1 }
::= { ipsecPeerEntry 90 }
ipsecPeerPublicIfIndexMode OBJECT-TYPE
SYNTAX INTEGER {
force(1), -- the given interface is used, even if a route
-- with lower metric is available.
preferred(2) -- the given interface is used, if no route
-- with lower metric is available.
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object defines the mode used in conjunction with
ipsecPeerPublicIfIndex.
force(1), -- the given interface is used, even if a route
with lower metric is available.
preferred(2) -- the given interface is used, if no route
with lower metric is available.
This object matters only when ipsecPeerPublicIfIndex > 0."
DEFVAL { force }
::= { ipsecPeerEntry 91 }
-- End IPSec Peer Table
-- IKE IPSec Peer Status and Statistic Variables Table
ipsecPeerStatTable OBJECT-TYPE
SYNTAX SEQUENCE OF IpsecPeerStatEntry
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"This table contains the list of IPSec peers status and statistic variables."
::= { ipsec 28 }
ipsecPeerStatEntry OBJECT-TYPE
SYNTAX IpsecPeerStatEntry
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"This object contains the status and statistic variables of an IPSec peer."
INDEX {
ipsecPeerStatIndex
}
::= { ipsecPeerStatTable 1 }
IpsecPeerStatEntry ::=
SEQUENCE {
ipsecPeerStatIndex INTEGER,
ipsecPeerStatNextIndex INTEGER,
ipsecPeerStatCaCerts DisplayString,
ipsecPeerStatPeerAddress IpAddress,
ipsecPeerStatLocalId DisplayString,
ipsecPeerStatLocalCert INTEGER,
ipsecPeerStatPublicInterface INTEGER,
ipsecPeerStatIkeProposals INTEGER,
ipsecPeerStatPfsIdentity INTEGER,
ipsecPeerStatAuthMethod INTEGER,
ipsecPeerStatIkeGroup INTEGER,
ipsecPeerStatPfsGroup INTEGER,
ipsecPeerStatPh1Mode INTEGER,
ipsecPeerStatIkeLifeTime INTEGER,
ipsecPeerStatIpsecLifeTime INTEGER,
ipsecPeerStatKeepAlive INTEGER,
ipsecPeerStatGranularity INTEGER,
ipsecPeerStatDontVerifyPad INTEGER,
ipsecPeerStatNoPmtuDiscovery INTEGER,
ipsecPeerStatOperStatus INTEGER,
ipsecPeerStatDefaultIpsecProposals INTEGER,
ipsecPeerStatHeartbeat INTEGER,
ipsecPeerStatTtl INTEGER,
ipsecPeerStatCurrentLocalAddress IpAddress,
ipsecPeerStatCurrentRemoteAddress IpAddress,
ipsecPeerStatNumP1 INTEGER,
ipsecPeerStatNumP1Negotiating INTEGER,
ipsecPeerStatNumP1Established INTEGER,
ipsecPeerStatNumP1Deleted INTEGER,
ipsecPeerStatNumBundles INTEGER,
ipsecPeerStatNumBundlesNegotiating INTEGER,
ipsecPeerStatNumBundlesEstablished INTEGER,
ipsecPeerStatPh1LToken INTEGER,
ipsecPeerStatPh1RToken INTEGER,
ipsecPeerStatIsdnCBNextMode INTEGER,
ipsecPeerStatNatDetect INTEGER,
ipsecPeerStatNatTLocalPort INTEGER,
ipsecPeerStatNatTRemotePort INTEGER,
ipsecPeerStatMtu INTEGER,
ipsecPeerStatRxIdle TimeTicks,
ipsecPeerStatTxIdle TimeTicks,
ipsecPeerStatDPD INTEGER,
ipsecPeerStatDPDRetries INTEGER,
-- IKEv2 specific Peer parameters
ipsecPeerStatNumIkeSas INTEGER,
ipsecPeerStatNumIkeSasNegotiating INTEGER,
ipsecPeerStatNumIkeSasEstablished INTEGER,
ipsecPeerStatNumIkeSasDeleted INTEGER
}
ipsecPeerStatIndex OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"A unique index identifying this entry."
::= { ipsecPeerStatEntry 1 }
ipsecPeerStatNextIndex OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The index of the next peer in hierarchy."
::= { ipsecPeerStatEntry 2 }
ipsecPeerStatCaCerts OBJECT-TYPE
SYNTAX DisplayString
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Receives a comma separated list with indices of optional
certificate authority certificates accepted for this peer."
::= { ipsecPeerStatEntry 3 }
ipsecPeerStatPeerAddress OBJECT-TYPE
SYNTAX IpAddress
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"This object shows the fixed IP-address of the peer, if any."
::= { ipsecPeerStatEntry 4 }
ipsecPeerStatLocalId OBJECT-TYPE
SYNTAX DisplayString
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The local ID used for authentication.
Syntax:
- X500 distinguished name:
<obj-name=obj-value, obj-ID=obj-value, ...>
- IPV4-Address:
|123.456.789.012| with or without '|'
- IPV4 Address Range:
|123.456.789.012-123.456.789.013| with or without '|'
- IPV4 Address Subnet:
|123.456.789.012/255.255.255.0| with or without '|'
or:
|123.456.789.012/24| with or without '|'
- Key-ID: arbitrary length hexadecimal string
with even number of digits:
{ 01 23 45 67 89 ab cd ef }
- Fully Qualified User Name (FQUN):
(anything) or user@domain with mandatory '@'
- Fully Qualified Domain Name (FQDN):
[anything] or any name without '@' not matching any other
syntax
The usage of this field is deprecated, use ikePrfLocalId now!"
::= { ipsecPeerStatEntry 5 }
ipsecPeerStatLocalCert OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The index of the certificate used for local authentication
in the certTable. Only useful for automatically keyed traffic
with dsa or rsa authentication."
::= { ipsecPeerStatEntry 6 }
ipsecPeerStatPublicInterface OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"This object specifies the index of the public interface
for which the traffic list assigned to this peer should be
valid.
If set to -1, the traffic list is valid for all interfaces.
If the traffic is routed via a different interface,
no SA negotiation is performed and traffic may be unprotected
unless there is another peer for the other interface."
DEFVAL { -1 }
::= { ipsecPeerStatEntry 7 }
ipsecPeerStatIkeProposals OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Index of default ike proposal used for peers with empty default
ike proposal."
::= { ipsecPeerStatEntry 8 }
ipsecPeerStatPfsIdentity OBJECT-TYPE
SYNTAX INTEGER {
true(1), -- delete phase 1 SAs
false(2), -- do not delete phase 1 SAs
default(3) -- use setting in ipsecGlobContDefaultPfsIdentity
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"This object specifies whether IKE SA's should be deleted
immediately after a phase 2 (IPSec-) SA pair has been
negotiated.
If overrides the default setting ipsecGlobContDefaultPfsIdentity
if not set to 'default'.
The consequence of enabling this feature is that before each
phase 2 negotiation there always has to be a phase 1
negotiation. Thus individual phase 2 SAs cannot be
associated with one another or, respectively, if the
identity of a remote peer is known to an eavesdropper
for one SA, he cannot conclude that the next SA is
negotiated with the same remote peer.
Note: Setting this flag only makes sense if configured
together with id-protect mode or RSA encryption for
authentication and if the IP address of the remote
peer does not allow conclusions about its identity
(i.e. dynamic remote peer addresses).
Possible values:
true(1), -- delete phase 1 SAs
false(2), -- do not delete phase 1 SAs
default(3) -- use setting in ipsecGlobContDefaultPfsIdentity."
DEFVAL { default }
::= { ipsecPeerStatEntry 9 }
ipsecPeerStatAuthMethod OBJECT-TYPE
SYNTAX INTEGER {
pre-sh-key(1), -- Authentication using pre shared keys
dss-sig(2), -- Authentication using DSS signatures
rsa-sig(3), -- Authentication using RSA signatures
rsa-enc(4), -- Authentication using RSA encryption
default(14), -- Use the default settings from the ikeProposalEntry
-- used or the ipsecGlobDefaultAuthMethod
delete(15) -- mark this entry for deletion
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"This object specifies the authentication method used for this peer.
It overrides the setting in the IKE proposals used.
Possible values:
pre-sh-key(1), -- Authentication using pre shared keys
dss-sig(2), -- Authentication using DSS signatures
rsa-sig(3), -- Authentication using RSA signatures
rsa-enc(4), -- Authentication using RSA encryption
default(14), -- Use the setting from the ikeProposalEntry
-- used or the ipsecGlobDefaultAuthMethod
delete(15) -- mark this entry for deletion."
DEFVAL { default }
::= { ipsecPeerStatEntry 10 }
ipsecPeerStatIkeGroup OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"This object specifies a special IKE group which is to be used
for this peer only. It overrides the setting in the ikeProposal
used.
Possible values:
0: use the value from the ikeProposal used
1: a 768-bit MODP group
2: a 1024-bit MODP group
5: a 1536-bit MODP group"
::= { ipsecPeerStatEntry 11 }
ipsecPeerStatPfsGroup OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The Diffie Hellman group used for additional Perfect
Forward Secrecy (PFS) DH exponentiations.
Possible values:
-1: explicitly do not use PFS
(overrides ipsecGlob2DefaultPfsGroup),
0: use default value from ipsecGlob2DefaultPfsGroup,
1: a 768-bit MODP group,
2: a 1024-bit MODP group,
5: a 1536-bit MODP group."
::= { ipsecPeerStatEntry 12 }
ipsecPeerStatPh1Mode OBJECT-TYPE
SYNTAX INTEGER {
id-protect(1), -- Use identity protection (main) mode
aggressive(2), -- Use aggressive mode
default(3) -- Use default setting from the
-- ipsecGlobalsTable
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"This object specifies the exchange mode used for IKE
SA negotiation.
Possible values:
id-protect(1), -- Use identity protection (main) mode
aggressive(2), -- Use aggressive mode
default(3) -- Use default settings from the
-- ipsecGlobalsTable."
DEFVAL { default }
::= { ipsecPeerStatEntry 13 }
ipsecPeerStatIkeLifeTime OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"This object specifies an index in the ipsecLifeTimeTable with the
lifetime settings to be used for IKE SA negotiation with this peer.
It overrides the setting in the IKE proposal used.
If the lifetime pointed to by this index does not exist or is
inappropriate, the lifetime from the IKE proposal used is
taken."
::= { ipsecPeerStatEntry 14 }
ipsecPeerStatIpsecLifeTime OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"This object specifies an index in the
ipsecLifeTimeTable. This lifetime overwrites the
lifetimes specified for all traffic entries and their
proposals referenced by this peer entry. If the
lifetime pointed to by this index does not exist or
is inappropriate, the default lifetime from the
ipsecGlobalsTable is used."
::= { ipsecPeerStatEntry 15 }
ipsecPeerStatKeepAlive OBJECT-TYPE
SYNTAX INTEGER {
true(1), -- rekey SA's even if no data was transferred
false(2) -- do not rekey SA's if no data was transferred
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"This object specifies whether IKE SA's with this peer
are rekeyed even if there was no data transferred over
them.
Possible values:
true(1), -- rekey SA's even if no data was transferred
false(2) -- do not rekey SA's if no data was transferred."
::= { ipsecPeerStatEntry 16 }
ipsecPeerStatGranularity OBJECT-TYPE
SYNTAX INTEGER {
default(1), -- use the setting from the ipsecGlobalsTable
coarse(2), -- Create only one SA for each Traffic entry
ip(3), -- Create one SA for each host
proto(4), -- Create one SA for each protocol and host
port(5) -- Create one SA for each port and host
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"This object specifies the granularity with which SA's
with this peer are created.
Possible values:
default(1), -- use the setting from the ipsecGlobalsTable
coarse(2), -- Create only one SA for each Traffic entry
ip(3), -- Create one SA for each host
proto(4), -- Create one SA for each protocol and host
port(5) -- Create one SA for each port and host."
DEFVAL { default }
::= { ipsecPeerStatEntry 17 }
ipsecPeerStatDontVerifyPad OBJECT-TYPE
SYNTAX INTEGER {
false(1), -- normal, self-describing ESP padding
true(2) -- old style ESP padding
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"This object is a compatibility option for older ipsec
implementations. It enables or disables an old way of ESP
padding (no self describing padding).
Possible values:
false(1), -- normal, self-describing ESP padding
true(2) -- old style ESP padding."
::= { ipsecPeerStatEntry 18 }
ipsecPeerStatNoPmtuDiscovery OBJECT-TYPE
SYNTAX INTEGER {
true(1), -- do not perform PMTU discovery
false(2), -- perform PMTU discovery
default(3)-- use default settings from
-- ipsecGlobContNoPmtuDiscovery
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"This object specifies the PMTU discovery policy for this peer.
Possible values:
true(1), -- do not perform PMTU discovery
false(2) -- perform PMTU discovery
default(3)-- use default settings from
-- ipsecGlobContNoPmtuDiscovery."
DEFVAL { default }
::= { ipsecPeerStatEntry 19 }
ipsecPeerStatOperStatus OBJECT-TYPE
SYNTAX INTEGER {
-- *** states as defined for ifOperStatus ***
up(1),
down(2),
-- testing(3),
-- unknown(4),
dormant(5),
blocked(6),
-- idle(32),
awaiting-callback(33),
-- calling-back(34),
ip-lookup(35),
going-up(36),
wait-if(37),
wait-publish(38),
wait-localip(39),
going-up-trans(40)
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Peer operational state."
DEFVAL { dormant }
::= { ipsecPeerStatEntry 20 }
ipsecPeerStatDefaultIpsecProposals OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The index of the default IPSec proposal used for
encrypting all the traffic bound to the (optional)
logical interface created for this peer."
::= { ipsecPeerStatEntry 21 }
ipsecPeerStatHeartbeat OBJECT-TYPE
SYNTAX INTEGER {
none(1), -- neither send nor expect heartbeats
expect(2), -- expect heartbeats
send(3), -- send heartbeats
both(4), -- send and expect heartbeats
default(5) -- use setting from
-- ipsecGlobContHeartbeatDefault
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"This object specifies whether heartbeats should be sent
over phase 1 SAs for this peer.
Possible values:
none(1), -- neither send nor expect heartbeats
expect(2), -- expect heartbeats
send(3), -- send heartbeats
both(4), -- send and expect heartbeats
default(5) -- use setting from
-- ipsecGlobContHeartbeatDefault."
DEFVAL { default }
::= { ipsecPeerStatEntry 22 }
ipsecPeerStatTtl OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"This object shows the maximum period of time in seconds
the peer will remain in the current state."
::= { ipsecPeerStatEntry 23 }
ipsecPeerStatCurrentLocalAddress OBJECT-TYPE
SYNTAX IpAddress
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The currently used local IP-address for this peer."
::= { ipsecPeerStatEntry 24 }
ipsecPeerStatCurrentRemoteAddress OBJECT-TYPE
SYNTAX IpAddress
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The currently known remote IP-address of this peer."
::= { ipsecPeerStatEntry 25 }
ipsecPeerStatNumP1 OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The number of current IKE SAs for this peer."
::= { ipsecPeerStatEntry 26 }
ipsecPeerStatNumP1Negotiating OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The number of current IKE SAs in state 'negotiating'
for this peer."
::= { ipsecPeerStatEntry 27 }
ipsecPeerStatNumP1Established OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The number of current IKE SAs in state 'established'
for this peer."
::= { ipsecPeerStatEntry 28 }
ipsecPeerStatNumP1Deleted OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The number of current IKE SAs in state 'waiting_for_remove'
for this peer."
::= { ipsecPeerStatEntry 29 }
ipsecPeerStatNumBundles OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The number of current IPSec SA bundles for this peer."
::= { ipsecPeerStatEntry 30 }
ipsecPeerStatNumBundlesNegotiating OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The number of current IPSec SA bundles for this peer."
::= { ipsecPeerStatEntry 31 }
ipsecPeerStatNumBundlesEstablished OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The number of current IPSec SA bundles in state 'established'
for this peer."
::= { ipsecPeerStatEntry 32 }
ipsecPeerStatPh1LToken OBJECT-TYPE
SYNTAX INTEGER (0..65535)
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Locally generated token that must be used by triggered peer
upon call back."
::= { ipsecPeerStatEntry 33 }
ipsecPeerStatPh1RToken OBJECT-TYPE
SYNTAX INTEGER (0..65535)
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Remotely generated token which must be used during phase one
of IPsec connection establishment."
::= { ipsecPeerStatEntry 34 }
ipsecPeerStatIsdnCBNextMode OBJECT-TYPE
SYNTAX INTEGER {
unknown(1),
d-llc(2),
d-subaddr(3),
d-llc-subaddr(4),
b(5)
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Define callback mode that is to be tried next.
The following modes are defined:
unknown(1) -- still unset, derive it from other
settings
d-llc(2) -- use D channel mode with LLC next
d-subaddr(3) -- use D channel mode with SUBADDR next
d-llc-subaddr(4) -- use D channel mode with LLC and
SUBADDR next
b(5) -- use B channel mode next
Default value for that variable is unknown(1)."
DEFVAL { unknown }
::= { ipsecPeerStatEntry 35 }
ipsecPeerStatNatDetect OBJECT-TYPE
SYNTAX INTEGER {
local(1), -- local NAT detected
remote(2), -- remote NAT detected
both(3), -- local and remote NAT detected
none(4), -- no NAT present
unknown(8) -- NAT detection not finished
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The latest result of the NAT detection performed with the peer.
Possible values:
local(1), -- local NAT detected
remote(2), -- remote NAT detected
both(3), -- local and remote NAT detected
none(4), -- no NAT present
unknown(8) -- NAT detection not performed or not finished."
::= { ipsecPeerStatEntry 36 }
ipsecPeerStatNatTLocalPort OBJECT-TYPE
SYNTAX INTEGER (0..65535)
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The local port currently usd for NAT-T IKE and ESP SAs
with this Peer."
::= { ipsecPeerStatEntry 37 }
ipsecPeerStatNatTRemotePort OBJECT-TYPE
SYNTAX INTEGER (0..65535)
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The remote port currently usd for NAT-T IKE and ESP SAs
with this Peer."
::= { ipsecPeerStatEntry 38 }
ipsecPeerStatMtu OBJECT-TYPE
SYNTAX INTEGER (0..65535)
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The current MTU of this peer. This value is copied to ifMtu if
ipsecPeerVirtualInterface is set to enabled."
DEFVAL { 1418 }
::= { ipsecPeerStatEntry 39 }
ipsecPeerStatRxIdle OBJECT-TYPE
SYNTAX TimeTicks
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The time period for which no packet has been received
from this peer."
::= { ipsecPeerStatEntry 40 }
ipsecPeerStatTxIdle OBJECT-TYPE
SYNTAX TimeTicks
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The time period for which no packet has been transmitted
to this peer."
::= { ipsecPeerStatEntry 41 }
ipsecPeerStatDPD OBJECT-TYPE
SYNTAX INTEGER {
none(1), -- DPD not active
v1(2), -- DPD Version 1 active
v1-idle(3), -- DPD Version 1 in idle mode active
ikev2(4) -- IKEv2 INFORMATIONAL exchanges active
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The type of Dead Peer Detection (DPD) currently active
for this peer.
Possible values:
none(1) -- DPD not active
v1(2) -- DPD Version 1 active
v1-idle(3) -- DPD Version 1 in idle mode active
ikev2(4) -- IKEv2 INFORMATIONAL exchanges active."
DEFVAL { none }
::= { ipsecPeerStatEntry 42 }
ipsecPeerStatDPDRetries OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The nuber of DPD retries currently sent without reply."
::= { ipsecPeerStatEntry 43 }
ipsecPeerStatNumIkeSas OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The number of current IKE SAs for this peer (only for IKEv2)."
::= { ipsecPeerStatEntry 44 }
ipsecPeerStatNumIkeSasNegotiating OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The number of current IKE SAs in state 'negotiating'
for this peer (only for IKEv2)."
::= { ipsecPeerStatEntry 45 }
ipsecPeerStatNumIkeSasEstablished OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The number of current IKE SAs in state 'established'
for this peer (only for IKEv2)."
::= { ipsecPeerStatEntry 46 }
ipsecPeerStatNumIkeSasDeleted OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The number of current IKE SAs in state 'waiting_for_remove'
for this peer (only for IKEv2)."
::= { ipsecPeerStatEntry 47 }
-- End IPSec Peer Status and Statistic Variables Table
-- IKE Proposal Table
ikeProposalTable OBJECT-TYPE
SYNTAX SEQUENCE OF IkeProposalEntry
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"This table contains the list of IKE proposals. The
entries may be concatenated on a logical or basis
using the NextChoice field to choices of multiple
proposals."
::= { ipsec 6 }
ikeProposalEntry OBJECT-TYPE
SYNTAX IkeProposalEntry
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"This object contains an IKE proposal, i.e. the
encryption algorithm and the hash algorithm used to
protect traffic sent over an IKE SA."
INDEX {
ikePropEncAlg
}
::= { ikeProposalTable 1 }
IkeProposalEntry ::=
SEQUENCE {
ikePropIndex INTEGER,
ikePropNextChoice INTEGER,
ikePropDescription DisplayString,
ikePropEncAlg INTEGER,
ikePropHashAlg INTEGER,
ikePropGroup INTEGER,
ikePropAuthMethod INTEGER,
ikePropEncKeySize INTEGER,
ikePropEncKeySizeMin INTEGER,
ikePropEncKeySizeMax INTEGER
}
ikePropIndex OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"A unique index identifying this entry."
::= { ikeProposalEntry 1 }
ikePropNextChoice OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies the index of the next proposal
of a choice of proposals. If this object is 0, this
marks the end of a proposal chain."
::= { ikeProposalEntry 2 }
ikePropDescription OBJECT-TYPE
SYNTAX DisplayString
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"An optional textual description of the proposal chain
beginning at this entry."
::= { ikeProposalEntry 3 }
ikePropEncAlg OBJECT-TYPE
SYNTAX INTEGER {
none(1), -- No encryption applied
des-cbc(2), -- DES in CBC mode
des3-cbc(3), -- Triple DES in CBC mode
blowfish-cbc(4),-- Blowfish in CBC mode
cast128-cbc(5), -- CAST in CBC mode with 128 bit key
twofish-cbc(6), -- Twofish in CBC mode
aes-cbc(7), -- AES in CBC mode
rijndael-cbc(31) -- rijndael (former name for AES)
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies the encryption algorithm used
to protect traffic sent over an IKE SA.
Possible values:
none(1), -- No encryption applied
des-cbc(2), -- DES in CBC mode
des3-cbc(3), -- Triple DES in CBC mode
blowfish-cbc(4), -- Blowfish in CBC mode
cast128-cbc(5) -- CAST in CBC mode with 128 bit key
twofish-cbc(6), -- Twofish in CBC mode
aes-cbc(7), -- AES in CBC mode
rijndael-cbc(31) -- rijndael (former name for AES)."
DEFVAL { aes-cbc }
::= { ikeProposalEntry 4 }
ikePropHashAlg OBJECT-TYPE
SYNTAX INTEGER {
delete(1), -- Delete this entry
none(2), -- No hash algorithm
md5(3), -- The MD5 hash algorithm
sha1(4), -- The Secure Hash Algorithm
ripemd160(5), -- The RipeMD160 Hash Algorithm
tiger192(6) -- The Tiger Hash Algorithm
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies the hash algorithm used to
protect traffic sent over an IKE SA.
Possible values:
delete(1), -- Delete this entry
none(2), -- No hash algorithm
md5(3), -- The MD5 hash algorithm
sha1(4), -- The Secure Hash Algorithm
ripemd160(5),-- The RipeMD160 Hash Algorithm
tiger192(6) -- The Tiger Hash Algorithm."
DEFVAL { ripemd160 }
::= { ikeProposalEntry 5 }
ikePropGroup OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"Index of the IKE group used with this proposal.
It may be overridden by a valid IKE group index of an IPSec peer
or in ipsecGlobDefaultIkeGroup.
Possible values:
0 (use default setting in ipsecPeerIkeGroup
or ipsecGlobDefaultIkeGroup),
1 (768 bit MODP),
2 (1024 bit MODP),
5 (1536 bit MODP)."
DEFVAL { 2 }
::= { ikeProposalEntry 7 }
ikePropAuthMethod OBJECT-TYPE
SYNTAX INTEGER {
pre-sh-key(1), -- Authentication using pre shared keys
dss-sig(2), -- Authentication using DSS signatures
rsa-sig(3), -- Authentication using RSA signatures
rsa-enc(4), -- Authentication using RSA encryption
default(33) -- Use default authentication method
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies the authentication method used with this
proposal.
It may be overridden by the setting in the ipsecPeerEntry table.
If set to 'default' the value in ipsecGlobDefaultAuthMethod is used.
Possible values:
pre-sh-key(1), -- Authentication using pre shared keys
dss-sig(2), -- Authentication using DSS signatures
rsa-sig(3), -- Authentication using RSA signatures
rsa-enc(4), -- Authentication using RSA encryption
default(33) -- Use default authentication method."
DEFVAL { default }
::= { ikeProposalEntry 8 }
ikePropEncKeySize OBJECT-TYPE
SYNTAX INTEGER (0..2048)
UNITS "bits"
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies the encryption key size used with this
proposal. The limits for the individual algorithms can be seen
in the ipsecAlgorithmTable.
If a length outside the limits for the specified algorithm is
specified, it is reset to the max/min value possible."
::= { ikeProposalEntry 9 }
ikePropEncKeySizeMin OBJECT-TYPE
SYNTAX INTEGER (0..2048)
UNITS "bits"
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies the maximum encryption key size accepted
with this proposal.
The limits for the individual algorithms can be seen in the
ipsecAlgorithmTable.
If a length outside the limits for the specified algorithm is
specified, it is reset to the max/min value possible."
::= { ikeProposalEntry 10 }
ikePropEncKeySizeMax OBJECT-TYPE
SYNTAX INTEGER (0..2048)
UNITS "bits"
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies the maximum encryption key size accepted
with this proposal.
The limits for the individual algorithms can be seen in the
ipsecAlgorithmTable.
If a length outside the limits for the specified algorithm is
specified, it is reset to the max/min value possible."
::= { ikeProposalEntry 11 }
-- End IKE Proposal Table
-- IPSec Traffic Table
ipsecTrafficTable OBJECT-TYPE
SYNTAX SEQUENCE OF IpsecTrafficEntry
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"This table contains lists of Traffic and the actions
which should be applied to it, together with the
necessary parameters."
::= { ipsec 7 }
ipsecTrafficEntry OBJECT-TYPE
SYNTAX IpsecTrafficEntry
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"This object contains a description of a type of IP
traffic and the action which should be applied to it
together with the necessary parameters."
INDEX {
ipsecTrProto
}
::= { ipsecTrafficTable 1 }
IpsecTrafficEntry ::=
SEQUENCE {
ipsecTrIndex INTEGER,
ipsecTrNextIndex INTEGER,
ipsecTrDescription DisplayString,
ipsecTrLocalAddressType INTEGER,
ipsecTrLocalAddress IpAddress,
ipsecTrLocalMaskLen INTEGER,
ipsecTrLocalRange IpAddress,
ipsecTrRemoteAddressType INTEGER,
ipsecTrRemoteAddress IpAddress,
ipsecTrRemoteMaskLen INTEGER,
ipsecTrRemoteRange IpAddress,
ipsecTrProto INTEGER,
ipsecTrLocalPort INTEGER,
ipsecTrRemotePort INTEGER,
ipsecTrAction INTEGER,
ipsecTrProposal INTEGER,
ipsecTrForceTunnelMode INTEGER,
ipsecTrLifeTime INTEGER,
ipsecTrGranularity INTEGER,
ipsecTrKeepAlive INTEGER,
ipsecTrProfile INTEGER,
ipsecTrInterface INTEGER,
ipsecTrDirection INTEGER,
ipsecTrCreator INTEGER
}
ipsecTrIndex OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"A unique index identifying this entry."
::= { ipsecTrafficEntry 1 }
ipsecTrNextIndex OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies the index of the next traffic
entry in hierarchy."
::= { ipsecTrafficEntry 2 }
ipsecTrDescription OBJECT-TYPE
SYNTAX DisplayString
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"An optional human readable description for this traffic entry."
::= { ipsecTrafficEntry 3 }
ipsecTrLocalAddressType OBJECT-TYPE
SYNTAX INTEGER {
fixed(1), -- fixed address
ph1(2) -- own dynamic phase 1 address
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"The type of the local address specification.
This may be either a statically configured address or a
dynamic address which is taken from some state information."
DEFVAL { fixed }
::= { ipsecTrafficEntry 21 }
ipsecTrLocalAddress OBJECT-TYPE
SYNTAX IpAddress
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"The source IP-address of this traffic entry. It maybe
either a single address, a network address (in
combination with ipsecTrSrcMask), or the first address
of an address range (in combination with
ipsecTrLocalRange)."
::= { ipsecTrafficEntry 4 }
ipsecTrLocalMaskLen OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"The length of the network mask for a source network."
::= { ipsecTrafficEntry 5 }
ipsecTrLocalRange OBJECT-TYPE
SYNTAX IpAddress
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"The last address of a source address range. If this
field is nonzero, the ipsecTrLocalMaskLen field is
ignored and the source is considered as a range of
addresses beginning with ipsecTrLocalAddress and ending
with ipsecTrLocalRange."
::= { ipsecTrafficEntry 6 }
ipsecTrRemoteAddressType OBJECT-TYPE
SYNTAX INTEGER {
fixed(1), -- fixed address
ph1(2), -- remote dynamic phase 1 address
dhcp(3) -- remote ip address retrieved via DHCP
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"The type of the remote address specification.
This may be either a statically configured address or a
dynamic address which is taken from some state information."
DEFVAL { fixed }
::= { ipsecTrafficEntry 22 }
ipsecTrRemoteAddress OBJECT-TYPE
SYNTAX IpAddress
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"The destination IP-address of this traffic entry. It maybe
either a single address, a network address (in
combination with ipsecTrDstMask), or the first address
of an address range (in combination with
ipsecTrRemoteRange)."
::= { ipsecTrafficEntry 7 }
ipsecTrRemoteMaskLen OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"The length of the network mask for a destination network."
::= { ipsecTrafficEntry 8 }
ipsecTrRemoteRange OBJECT-TYPE
SYNTAX IpAddress
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"The last address of a destination address range. If
this field is nonzero, the ipsecTrRemoteMaskLen field is
ignored and the source is considered as a range of
addresses beginning with ipsecTrRemoteAddress and ending
with ipsecTrRemoteRange."
::= { ipsecTrafficEntry 9 }
ipsecTrProto OBJECT-TYPE
SYNTAX INTEGER {
icmp(1),
igmp(2),
ggp(3),
ipip(4),
st(5),
tcp(6),
cbt(7),
egp(8),
igp(9),
bbn(10),
nvp(11),
pup(12),
argus(13),
emcon(14),
xnet(15),
chaos(16),
udp(17),
mux(18),
dcn(19),
hmp(20),
prm(21),
xns(22),
trunk1(23),
trunk2(24),
leaf1(25),
leaf2(26),
rdp(27),
irtp(28),
isotp4(29),
netblt(30),
mfe(31),
merit(32),
sep(33),
pc3(34),
idpr(35),
xtp(36),
ddp(37),
idprc(38),
tp(39),
il(40),
ipv6(41),
sdrp(42),
ipv6route(43),
ipv6frag(44),
idrp(45),
rsvp(46),
gre(47),
mhrp(48),
bna(49),
esp(50),
ah(51),
inlsp(52),
swipe(53),
narp(54),
mobile(55),
tlsp(56),
skip(57),
ipv6icmp(58),
ipv6nonxt(59),
ipv6opts(60),
ipproto-61(61),
cftp(62),
local(63),
sat(64),
kryptolan(65),
rvd(66),
ippc(67),
distfs(68),
satmon(69),
visa(70),
ipcv(71),
cpnx(72),
cphb(73),
wsn(74),
pvp(75),
brsatmon(76),
sunnd(77),
wbmon(78),
wbexpak(79),
isoip(80),
vmtp(81),
securevmtp(82),
vines(83),
ttp(84),
nsfnet(85),
dgp(86),
tcf(87),
eigrp(88),
ospfigp(89),
sprite(90),
larp(91),
mtp(92),
ax25(93),
ipwip(94),
micp(95),
scc(96),
etherip(97),
encap(98),
encrypt(99),
gmtp(100),
ifmp(101),
pnni(102),
pim(103),
aris(104),
scps(105),
qnx(106),
an(107),
ippcp(108),
snp(109),
compaq(110),
ipxip(111),
vrrp(112),
pgm(113),
hop0(114),
l2tp(115),
ipproto-116(116),
ipproto-117(117),
ipproto-118(118),
ipproto-119(119),
ipproto-120(120),
ipproto-121(121),
ipproto-122(122),
ipproto-123(123),
ipproto-124(124),
ipproto-125(125),
ipproto-126(126),
ipproto-127(127),
ipproto-128(128),
ipproto-129(129),
ipproto-130(130),
ipproto-131(131),
ipproto-132(132),
ipproto-133(133),
ipproto-134(134),
ipproto-135(135),
ipproto-136(136),
ipproto-137(137),
ipproto-138(138),
ipproto-139(139),
ipproto-140(140),
ipproto-141(141),
ipproto-142(142),
ipproto-143(143),
ipproto-144(144),
ipproto-145(145),
ipproto-146(146),
ipproto-147(147),
ipproto-148(148),
ipproto-149(149),
ipproto-150(150),
ipproto-151(151),
ipproto-152(152),
ipproto-153(153),
ipproto-154(154),
ipproto-155(155),
ipproto-156(156),
ipproto-157(157),
ipproto-158(158),
ipproto-159(159),
ipproto-160(160),
ipproto-161(161),
ipproto-162(162),
ipproto-163(163),
ipproto-164(164),
ipproto-165(165),
ipproto-166(166),
ipproto-167(167),
ipproto-168(168),
ipproto-169(169),
ipproto-170(170),
ipproto-171(171),
ipproto-172(172),
ipproto-173(173),
ipproto-174(174),
ipproto-175(175),
ipproto-176(176),
ipproto-177(177),
ipproto-178(178),
ipproto-179(179),
ipproto-180(180),
ipproto-181(181),
ipproto-182(182),
ipproto-183(183),
ipproto-184(184),
ipproto-185(185),
ipproto-186(186),
ipproto-187(187),
ipproto-188(188),
ipproto-189(189),
ipproto-190(190),
ipproto-191(191),
ipproto-192(192),
ipproto-193(193),
ipproto-194(194),
ipproto-195(195),
ipproto-196(196),
ipproto-197(197),
ipproto-198(198),
ipproto-199(199),
ipproto-200(200),
ipproto-201(201),
ipproto-202(202),
ipproto-203(203),
ipproto-204(204),
ipproto-205(205),
ipproto-206(206),
ipproto-207(207),
ipproto-208(208),
ipproto-209(209),
ipproto-210(210),
ipproto-211(211),
ipproto-212(212),
ipproto-213(213),
ipproto-214(214),
ipproto-215(215),
ipproto-216(216),
ipproto-217(217),
ipproto-218(218),
ipproto-219(219),
ipproto-220(220),
ipproto-221(221),
ipproto-222(222),
ipproto-223(223),
ipproto-224(224),
ipproto-225(225),
ipproto-226(226),
ipproto-227(227),
ipproto-228(228),
ipproto-229(229),
ipproto-230(230),
ipproto-231(231),
ipproto-232(232),
ipproto-233(233),
ipproto-234(234),
ipproto-235(235),
ipproto-236(236),
ipproto-237(237),
ipproto-238(238),
ipproto-239(239),
ipproto-240(240),
ipproto-241(241),
ipproto-242(242),
ipproto-243(243),
ipproto-244(244),
ipproto-245(245),
ipproto-246(246),
ipproto-247(247),
ipproto-248(248),
ipproto-249(249),
ipproto-250(250),
ipproto-251(251),
ipproto-252(252),
ipproto-253(253),
ipproto-254(254),
dont-verify(255)
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"The transport protocol defined for this entry."
DEFVAL { dont-verify }
::= { ipsecTrafficEntry 10 }
ipsecTrLocalPort OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"The source port defined for this traffic entry."
::= { ipsecTrafficEntry 11 }
ipsecTrRemotePort OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"The destination port defined for this traffic entry."
::= { ipsecTrafficEntry 12 }
ipsecTrAction OBJECT-TYPE
SYNTAX INTEGER {
delete(1), -- Delete this entry
always-plain(2), -- Forward the packets without
-- protection even if there is a
-- matching SA and independent from
-- the position of the traffic entry
-- in the list.
pass(3), -- Forward the packets without
-- protection
protect(4), -- Protect the traffic as specified
-- in the proposal. Drop unprotected
-- traffic of this kind.
drop(5) -- Drop all packets matching this
-- traffic entry
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"The action to be applied to traffic matching this entry.
Possible values:
delete(1), -- Delete this entry
always-plain(2), -- Forward the packets without
-- protection even if there is a
-- matching SA and independent from
-- the position of the traffic entry
-- in the list.
pass(3), -- Forward the packets without
-- protection
protect(4), -- Protect the traffic as specified
-- in the proposal. Drop unprotected
-- traffic of this kind.
drop(5) -- Drop all packets matching this
-- traffic entry."
DEFVAL { protect }
::= { ipsecTrafficEntry 13 }
ipsecTrProposal OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"This object specifies an index in the
ipsecProposalTable. This may be the first proposal of
possibly a choice of multiple, optionally nested
proposals which is to be offered with IKE (automatic
keying) or a manual proposal (manual keying)."
::= { ipsecTrafficEntry 14 }
ipsecTrForceTunnelMode OBJECT-TYPE
SYNTAX INTEGER {
true(1), -- Use tunnel mode even if transport mode is possible
false(2) -- Use transport mode whenever possible
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"This object specifies the strategy when transport mode is used.
By default, the system always uses transport mode, if possible.
If this variable is set to true, always tunnel mode will be used
for this traffic entry, even if source and destination address
match the tunnel endpoints.
Possible values:
true(1), -- Use tunnel mode even if transport mode is possible
false(2) -- Use transport mode whenever possible."
::= { ipsecTrafficEntry 15 }
ipsecTrLifeTime OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"This object specifies an index in the
ipsecLifeTimeTable. This lifetime overwrites the
lifetimes specified for all proposals referenced by
this traffic entry. It may itself be overwritten by
an explicit lifetime specified for the peer entry
referencing this traffic entry. If the lifetime
pointed to by this index does not exist or is
inappropriate, the default lifetime from the
ipsecGlobalsTable is used."
::= { ipsecTrafficEntry 16 }
ipsecTrGranularity OBJECT-TYPE
SYNTAX INTEGER {
default(1), -- use the setting from the ipsecPeerTable
coarse(2), -- Create only one SA for each Traffic entry
ip(3), -- Create one SA for each host
proto(4), -- Create one SA for each protocol and host
port(5) -- Create one SA for each port and host
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"This object specifies the granularity with which SA's
must be created for this kind of traffic.
Possible values:
default(1), -- use the setting from the ipsecPeerTable
coarse(2), -- Create only one SA for each Traffic entry
ip(3), -- Create one SA for each host
proto(4), -- Create one SA for each protocol and host
port(5) -- Create one SA for each port and host."
DEFVAL { default }
::= { ipsecTrafficEntry 17 }
ipsecTrKeepAlive OBJECT-TYPE
SYNTAX INTEGER {
true(1), -- rekey SA's even if no data was transferred
false(2), -- do not rekey SA's if no data was transferred
default(3) -- use the default setting from the peer entry
-- referencing this traffic entry
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"This object specifies whether SA's created for this kind
of traffic should be rekeyed on expiration of soft
lifetimes even if there has not been sent any traffic
over them.
Possible values:
true(1), -- rekey SA's even if no data was transferred
false(2), -- do not rekey SA's if no data was transferred
default(3) -- use the default setting from the peer entry
-- referencing this traffic entry."
DEFVAL { default }
::= { ipsecTrafficEntry 18 }
ipsecTrProfile OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"The index from the ipsecProfileTable containing a special
phase 2 profile to use for this traffic entry."
::= { ipsecTrafficEntry 23 }
ipsecTrInterface OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies the interface for which the traffic
entry should be valid (pass, drop and protect entries).
If this object is set to -1, there is no interface
restriction."
DEFVAL { -1 }
::= { ipsecTrafficEntry 19 }
ipsecTrDirection OBJECT-TYPE
SYNTAX INTEGER {
bidirectional(1), -- matches packets from remote to local
-- and vice versa
inbound(2), -- matches only packets from remote to local
outbound(3) -- matches only packets from local to remote
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies the direction for which this traffic
entry should match.
It only applies for pass and drop entries, for protect entries
it is meaningless.
Possible values:
bidirectional(1), -- matches packets from remote to local
-- and vice versa
inbound(2), -- matches only packets from remote to local
outbound(3) -- matches only packets from local to remote."
DEFVAL { 1 }
::= { ipsecTrafficEntry 20 }
ipsecTrCreator OBJECT-TYPE
SYNTAX INTEGER {
config(1), -- created by configd/snmp
radius-preset(2), -- created by RADIUS preset
radius(3), -- created by dynamic RADIUS
ike(4) -- created by IKE (for dynamic client)
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"This object shows the creator of the traffic entry."
DEFVAL { config }
::= { ipsecTrafficEntry 36 }
-- End IPSec Traffic Table
-- IPSec Algorithm definition table
ipsecAlgorithmTable OBJECT-TYPE
SYNTAX SEQUENCE OF IpsecAlgorithmEntry
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"This table contains the list of supported IPSec algorithms
and their key sizes."
::= { ipsec 17 }
ipsecAlgorithmEntry OBJECT-TYPE
SYNTAX IpsecAlgorithmEntry
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"This object contains an IPSec algorithm."
INDEX {
ipsecAlgId
}
::= { ipsecAlgorithmTable 1 }
IpsecAlgorithmEntry ::=
SEQUENCE {
ipsecAlgId INTEGER,
ipsecAlgMinKeySize INTEGER,
ipsecAlgDefKeySize INTEGER,
ipsecAlgMaxKeySize INTEGER,
ipsecAlgUseMinKeySize INTEGER,
ipsecAlgUseDefKeySize INTEGER,
ipsecAlgUseMaxKeySize INTEGER
}
ipsecAlgId OBJECT-TYPE
SYNTAX INTEGER {
aes(1), -- AES cipher alg
twofish(2), -- Twofish cipher alg
blowfish(3), -- Blowfish cipher alg
cast(4), -- Cast cipher alg
des3(5), -- Triple DES cipher alg
des(6), -- DES cipher alg
null(7), -- NULL pseudo cipher
rijndael(31) -- rijndael (former name for AES)
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The id of the algorithm.
Possible values:
aes(1), -- AES cipher alg
twofish(2), -- Twofish cipher alg
blowfish(3), -- Blowfish cipher alg
cast(4), -- Cast cipher alg
des3(5), -- Triple DES cipher alg
des(6), -- DES cipher alg
null(7), -- NULL pseudo cipher
rijndael(31) -- rijndael (former name for AES)."
::= { ipsecAlgorithmEntry 1 }
ipsecAlgMinKeySize OBJECT-TYPE
SYNTAX INTEGER (0..2048)
UNITS "bits"
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The minimum key length in bits possible for this algorithm."
::= { ipsecAlgorithmEntry 3 }
ipsecAlgDefKeySize OBJECT-TYPE
SYNTAX INTEGER (0..2048)
UNITS "bits"
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The default key length in bits used for this algorithm."
::= { ipsecAlgorithmEntry 4 }
ipsecAlgMaxKeySize OBJECT-TYPE
SYNTAX INTEGER (0..2048)
UNITS "bits"
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The maximum key length in bits possible for this algorithm."
::= { ipsecAlgorithmEntry 5 }
ipsecAlgUseMinKeySize OBJECT-TYPE
SYNTAX INTEGER (0..2048)
UNITS "bits"
MAX-ACCESS read-only
STATUS obsolete
DESCRIPTION
"WARNING: this object is obsolete and must not be used."
::= { ipsecAlgorithmEntry 6 }
ipsecAlgUseDefKeySize OBJECT-TYPE
SYNTAX INTEGER (0..2048)
UNITS "bits"
MAX-ACCESS read-only
STATUS obsolete
DESCRIPTION
"WARNING: this object is obsolete and must not be used."
::= { ipsecAlgorithmEntry 7 }
ipsecAlgUseMaxKeySize OBJECT-TYPE
SYNTAX INTEGER (0..2048)
UNITS "bits"
MAX-ACCESS read-only
STATUS obsolete
DESCRIPTION
"WARNING: this object is obsolete and must not be used."
::= { ipsecAlgorithmEntry 8 }
-- End IPSec Algorithm definition table
-- IPSec Proposal Table
ipsecProposalTable OBJECT-TYPE
SYNTAX SEQUENCE OF IpsecProposalEntry
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"This table contains the list of IPSec proposals known to the
system.
The combinations of algorithms allowed are
constructed from any combinations of algorithms
enabled in an entry, in the order of the preferences
specified."
::= { ipsec 8 }
ipsecProposalEntry OBJECT-TYPE
SYNTAX IpsecProposalEntry
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"This object contains an IPSec proposal, i.e. a
proposed set of security parameters applied to
traffic sent over an IPSec security association."
INDEX {
ipsecPropProto
}
::= { ipsecProposalTable 1 }
IpsecProposalEntry ::=
SEQUENCE {
ipsecPropIndex INTEGER,
ipsecPropNext INTEGER,
ipsecPropDescription DisplayString,
ipsecPropProto INTEGER,
ipsecPropIpcomp INTEGER,
ipsecPropEspAes INTEGER,
ipsecPropEspTwofish INTEGER,
ipsecPropEspBlowfish INTEGER,
ipsecPropEspCast INTEGER,
ipsecPropEspDes3 INTEGER,
ipsecPropEspDes INTEGER,
ipsecPropEspNull INTEGER,
ipsecPropEspRijndael INTEGER,
ipsecPropEspMd5 INTEGER,
ipsecPropEspSha1 INTEGER,
ipsecPropEspNoMac INTEGER,
ipsecPropAhMd5 INTEGER,
ipsecPropAhSha1 INTEGER,
ipsecPropIpcompDeflate INTEGER,
ipsecPropAesKeySize INTEGER,
ipsecPropAesKeySizeMin INTEGER,
ipsecPropAesKeySizeMax INTEGER,
ipsecPropBlowfishKeySize INTEGER,
ipsecPropBlowfishKeySizeMin INTEGER,
ipsecPropBlowfishKeySizeMax INTEGER,
ipsecPropTwofishKeySize INTEGER,
ipsecPropTwofishKeySizeMin INTEGER,
ipsecPropTwofishKeySizeMax INTEGER
}
ipsecPropIndex OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"A unique index for this entry."
::= { ipsecProposalEntry 1 }
ipsecPropNext OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"The index of the next Proposal in the actual chain."
::= { ipsecProposalEntry 2 }
ipsecPropDescription OBJECT-TYPE
SYNTAX DisplayString
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"An optional human readable description for this proposal."
::= { ipsecProposalEntry 4 }
ipsecPropProto OBJECT-TYPE
SYNTAX INTEGER {
esp(1), -- Encapsulating Security Payload
ah(2), -- Authentication Header
esp-ah(3), -- ESP and AH
delete(8) -- delete this entry
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"The security protocol to apply.
Possible values:
esp(1), -- Encapsulating Security Payload
ah(2), -- Authentication Header
esp-ah(3), -- ESP and AH
delete(8) -- delete this entry."
DEFVAL { esp }
::= { ipsecProposalEntry 6 }
ipsecPropIpcomp OBJECT-TYPE
SYNTAX INTEGER {
enabled(1), -- Enable IPComP
disabled(2), -- Disable IPComP
force(3) -- Force use of IPComP
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies the use of IPComP in the proposal.
Possible values:
enabled(1), -- Enable IPComP
disabled(2), -- Disable IPComP
force(3) -- Force use of IPComP."
DEFVAL { disabled }
::= { ipsecProposalEntry 20 }
ipsecPropEspAes OBJECT-TYPE
SYNTAX INTEGER (0..7)
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies the use of the AES
encryption algorithm in the proposal.
Possible values:
0, -- disables AES
1..7 -- enables AES and specifies its priority among
the encryption algorithms."
::= { ipsecProposalEntry 40 }
ipsecPropEspTwofish OBJECT-TYPE
SYNTAX INTEGER (0..7)
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies the use of the Twofish
encryption algorithm in the proposal.
Possible values:
0, -- disables Twofish
1..7 -- enables Twofish and specifies its priority among
the encryption algorithms."
::= { ipsecProposalEntry 41 }
ipsecPropEspBlowfish OBJECT-TYPE
SYNTAX INTEGER (0..7)
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies the use of the Blowfish
encryption algorithm in the proposal.
Possible values:
0, -- disables Blowfish
1..7 -- enables Blowfish and specifies its priority among
the encryption algorithms."
::= { ipsecProposalEntry 42 }
ipsecPropEspCast OBJECT-TYPE
SYNTAX INTEGER (0..7)
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies the use of the Cast
encryption algorithm in the proposal.
Possible values:
0, -- disables Cast
1..7 -- enables Cast and specifies its priority among
the encryption algorithms."
::= { ipsecProposalEntry 43 }
ipsecPropEspDes3 OBJECT-TYPE
SYNTAX INTEGER (0..7)
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies the use of the DES3
encryption algorithm in the proposal.
Possible values:
0, -- disables DES3
1..7 -- enables DES3 and specifies its priority among
the encryption algorithms."
::= { ipsecProposalEntry 44 }
ipsecPropEspDes OBJECT-TYPE
SYNTAX INTEGER (0..7)
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies the use of the DES
encryption algorithm in the proposal.
Possible values:
0, -- disables DES
1..7 -- enables DES and specifies its priority among
the encryption algorithms."
::= { ipsecProposalEntry 45 }
ipsecPropEspNull OBJECT-TYPE
SYNTAX INTEGER (0..7)
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies the use of the DES
encryption algorithm in the proposal.
Possible values:
0, -- disables DES
1..7 -- enables DES and specifies its priority among
the encryption algorithms."
::= { ipsecProposalEntry 46 }
ipsecPropEspRijndael OBJECT-TYPE
SYNTAX INTEGER (-1..7)
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies the use of the Rijndael
encryption algorithm in the proposal.
The use of this object is deprecated since rijndael has been
accepted as the algorithm for AES. Its value is transferred to
ipsecPropEspAes, if different from -1.
Possible values:
-1 -- use ipsecPropEspAes to determine the priority value
0, -- disables Rijndael
1..7 -- enables Rijndael and specifies its priority among
the encryption algorithms."
DEFVAL { -1 }
::= { ipsecProposalEntry 49 }
ipsecPropEspMd5 OBJECT-TYPE
SYNTAX INTEGER (0..3)
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies the use of the MD5 authentication
algorithm for ESP in the proposal.
Possible values:
0, -- disables MD5
1..3 -- enables MD5 and specifies its priority among
the authentication algorithms."
::= { ipsecProposalEntry 50 }
ipsecPropEspSha1 OBJECT-TYPE
SYNTAX INTEGER (0..3)
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies the use of the Sha1 authentication
algorithm for ESP in the proposal.
Possible values:
0, -- disables SHA-1
1..3 -- enables SHA-1 and specifies its priority among
the authentication algorithms."
::= { ipsecProposalEntry 51 }
ipsecPropEspNoMac OBJECT-TYPE
SYNTAX INTEGER (0..3)
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies whether ESP without authentication
is allowed in the proposal.
Possible values:
0, -- disables ESP
1..3 -- enables ESP without authentication and specifies
its priority among the other authentication
algorithms enabled for ESP."
::= { ipsecProposalEntry 52 }
ipsecPropAhMd5 OBJECT-TYPE
SYNTAX INTEGER (0..2)
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies the use of the MD5 authentication
algorithm for AH in the proposal.
Possible values:
0, -- disables MD5
1..2 -- enables MD5 and specifies its priority among
the authentication algorithms."
::= { ipsecProposalEntry 60 }
ipsecPropAhSha1 OBJECT-TYPE
SYNTAX INTEGER (0..2)
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies the use of the Sha1 authentication
algorithm for AH in the proposal.
Possible values:
0, -- disables SHA-1
1..2 -- enables SHA-1 and specifies its priority among
the authentication algorithms."
::= { ipsecProposalEntry 61 }
ipsecPropIpcompDeflate OBJECT-TYPE
SYNTAX INTEGER (0..1)
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies the use of the DEFLATE
compression algorithm in the proposal.
Possible values:
0, -- disables DEFLATE
1..1 -- enables DEFLATE and specifies its priority among
the compression algorithms."
::= { ipsecProposalEntry 70 }
ipsecPropAesKeySize OBJECT-TYPE
SYNTAX INTEGER {
aes128(128), -- use 128 bit AES
aes192(192), -- use 192 bit AES
aes256(256) -- use 256 bit AES
}
UNITS "bits"
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies the key size in bits for the AES
algorithm, if enabled.
Possible Values:
aes128(128), -- use 128 bit AES
aes192(192), -- use 192 bit AES
aes256(256) -- use 256 bit AES."
::= { ipsecProposalEntry 80 }
ipsecPropAesKeySizeMin OBJECT-TYPE
SYNTAX INTEGER {
aes128(128), -- use 128 bit AES
aes192(192), -- use 192 bit AES
aes256(256) -- use 256 bit AES
}
UNITS "bits"
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies the minimum accepted key size in bits
for the AES algorithm, if enabled.
Possible Values:
aes128(128), -- use 128 bit AES
aes192(192), -- use 192 bit AES
aes256(256) -- use 256 bit AES."
::= { ipsecProposalEntry 81 }
ipsecPropAesKeySizeMax OBJECT-TYPE
SYNTAX INTEGER {
aes128(128), -- use 128 bit AES
aes192(192), -- use 192 bit AES
aes256(256) -- use 256 bit AES
}
UNITS "bits"
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies the maximum accepted key size in bits
for the AES algorithm, if enabled.
Possible Values:
aes128(128), -- use 128 bit AES
aes192(192), -- use 192 bit AES
aes256(256) -- use 256 bit AES."
::= { ipsecProposalEntry 82 }
ipsecPropBlowfishKeySize OBJECT-TYPE
SYNTAX INTEGER (40..448)
UNITS "bits"
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies the key size in bits for the Blowfish
algorithm, if enabled.
Note: the key size must be a multiple of 8 bits.
If not, it will be rounded up to the next 8 bit boundary."
::= { ipsecProposalEntry 83 }
ipsecPropBlowfishKeySizeMin OBJECT-TYPE
SYNTAX INTEGER (40..448)
UNITS "bits"
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies the minimum accepted key size in bits
for the Blowfish algorithm, if enabled."
::= { ipsecProposalEntry 84 }
ipsecPropBlowfishKeySizeMax OBJECT-TYPE
SYNTAX INTEGER (40..448)
UNITS "bits"
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies the maximum accepted key size in bits
for the Blowfish algorithm, if enabled."
::= { ipsecProposalEntry 85 }
ipsecPropTwofishKeySize OBJECT-TYPE
SYNTAX INTEGER {
twofish128(128), -- use 128 bit Twofish
twofish192(192), -- use 192 bit Twofish
twofish256(256) -- use 256 bit Twofish
}
UNITS "bits"
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies the key size in bits for the Twofish
algorithm, if enabled.
Possible Values:
twofish128(128), -- use 128 bit Twofish
twofish192(192), -- use 192 bit Twofish
twofish256(256) -- use 256 bit Twofish."
::= { ipsecProposalEntry 86 }
ipsecPropTwofishKeySizeMin OBJECT-TYPE
SYNTAX INTEGER {
twofish128(128), -- use 128 bit Twofish
twofish192(192), -- use 192 bit Twofish
twofish256(256) -- use 256 bit Twofish
}
UNITS "bits"
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies the minimum accepted key size in bits
for the Twofish algorithm, if enabled.
Possible Values:
twofish128(128), -- use 128 bit Twofish
twofish192(192), -- use 192 bit Twofish
twofish256(256) -- use 256 bit Twofish."
::= { ipsecProposalEntry 87 }
ipsecPropTwofishKeySizeMax OBJECT-TYPE
SYNTAX INTEGER {
twofish128(128), -- use 128 bit Twofish
twofish192(192), -- use 192 bit Twofish
twofish256(256) -- use 256 bit Twofish
}
UNITS "bits"
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies the maximum accepted key size in bits
for the AES algorithm, if enabled.
Possible Values:
twofish128(128), -- use 128 bit Twofish
twofish192(192), -- use 192 bit Twofish
twofish256(256) -- use 256 bit Twofish."
::= { ipsecProposalEntry 88 }
-- End IPSec Proposal Table
-- IPSec Life Time Table
ipsecLifeTimeTable OBJECT-TYPE
SYNTAX SEQUENCE OF IpsecLifeTimeEntry
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"This table contains the list of defined lifetimes for IPsec
and IKE SAs."
::= { ipsec 9 }
ipsecLifeTimeEntry OBJECT-TYPE
SYNTAX IpsecLifeTimeEntry
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"This object contains a lifetime, i.e. the soft and hard
expiry limits for IPsec and IKE SA's.
The usage of this table is deprecated, use the ikePrfLifeXxx
and ipsecPrfLifeXxx variables in the ikeProfileTable
and ipsecProfileTable directly instead."
INDEX {
ipsecLifeType
}
::= { ipsecLifeTimeTable 1 }
IpsecLifeTimeEntry ::=
SEQUENCE {
ipsecLifeIndex INTEGER,
ipsecLifeType INTEGER,
ipsecLifeHardKb INTEGER,
ipsecLifeHardSec INTEGER,
ipsecLifePolicy INTEGER,
ipsecLifeSoftPercent INTEGER
}
ipsecLifeIndex OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"A unique index identifying this entry."
::= { ipsecLifeTimeEntry 1 }
ipsecLifeType OBJECT-TYPE
SYNTAX INTEGER {
delete(1), -- Delete this entry
generic(2)
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"This object specifies the type of a lifetime entry."
DEFVAL { generic }
::= { ipsecLifeTimeEntry 2 }
ipsecLifeHardKb OBJECT-TYPE
SYNTAX INTEGER
UNITS "kilo bytes"
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The maximum amount of data (in KB) which may be protected
by an SA before it is deleted."
DEFVAL { 0 }
::= { ipsecLifeTimeEntry 5 }
ipsecLifeHardSec OBJECT-TYPE
SYNTAX INTEGER
UNITS "seconds"
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The maximum time (in seconds) after which an SA will be
refreshed,."
DEFVAL { 900 }
::= { ipsecLifeTimeEntry 6 }
ipsecLifePolicy OBJECT-TYPE
SYNTAX INTEGER {
loose(1), -- accept and use anything proposed
strict(2), -- accept and use only what is configured
notify(3) -- accept anything (send responder lifetime)
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"This object specifies the way the lifetime information is
applied. Possible values:
loose(1), -- accept and use anything proposed
strict(2), -- accept and use only what is configured
notify(3) -- accept anything, if own values are smaller
than what was proposed use these and
send responder lifetime notification."
DEFVAL { loose }
::= { ipsecLifeTimeEntry 7 }
ipsecLifeSoftPercent OBJECT-TYPE
SYNTAX INTEGER (50..100)
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The percentage of the hard lifetimes (traffic and time based)
after which rekeying is started."
DEFVAL { 80 }
::= { ipsecLifeTimeEntry 8 }
-- End IPSec Life Time Table
-- IPSec global statistics Table
ipsecStats OBJECT IDENTIFIER ::= { ipsec 10 }
--Static table containing global IPSec statistics
ipsecStatsCurrentIkeSas OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Current number of IKE SA's (both IKEv1 and IKEv2)."
::= { ipsecStats 1 }
ipsecStatsCurrentIpsecSas OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Current number of IPSec SA's."
::= { ipsecStats 2 }
ipsecStatsTrig OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Number of packets which triggered an IKE negotiation."
::= { ipsecStats 9 }
ipsecStatsFragPkt OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Number of partial packets currently being reassembled."
::= { ipsecStats 10 }
ipsecStatsFragBytes OBJECT-TYPE
SYNTAX INTEGER
UNITS "bytes"
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Total size of the partial packets currently being reassembled."
::= { ipsecStats 11 }
ipsecStatsFragNonfirst OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Number of non-first fragments currently queued."
::= { ipsecStats 12 }
ipsecStatsDecryptErrors OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Number of decryption errors."
::= { ipsecStats 13 }
ipsecStatsAuthErrors OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Number of authentication errors."
::= { ipsecStats 14 }
ipsecStatsReplayErrors OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Number of replay errors."
::= { ipsecStats 15 }
ipsecStatsPolicyErrors OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Number of policy errors."
::= { ipsecStats 16 }
ipsecStatsOtherErrors OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Number of other receive errors."
::= { ipsecStats 17 }
ipsecStatsSendErrors OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Number of send errors."
::= { ipsecStats 18 }
ipsecStatsUnknownSpiErrors OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Number of unknown SPI errors."
::= { ipsecStats 19 }
ipsecStatsIkeNumP1 OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The number of IKE phase-1 negotiations performed. "
::= { ipsecStats 20 }
ipsecStatsIkeNumFailedP1 OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The number of failed IKE phase-1 negotiations."
::= { ipsecStats 21 }
ipsecStatsIkeNumQm OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The number of IKE quick-mode negotiations performed. "
::= { ipsecStats 22 }
ipsecStatsIkeNumFailedQm OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The number of failed IKE quick-mode negotiations. "
::= { ipsecStats 23 }
ipsecStatsEspCurrentInbound OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The number of active inbound ESP SAs."
::= { ipsecStats 24 }
ipsecStatsEspTotalInbound OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The number of inbound ESP SAs since the system was started."
::= { ipsecStats 25 }
ipsecStatsEspCurrentOutbound OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The number of active outbound ESP SAs."
::= { ipsecStats 26 }
ipsecStatsEspTotalOutbound OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The number of outbound ESP SAs since the system was started."
::= { ipsecStats 27 }
ipsecStatsAhCurrentInbound OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The number of active inbound AH SAs."
::= { ipsecStats 28 }
ipsecStatsAhTotalInbound OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The number of inbound AH SAs since the system was started."
::= { ipsecStats 29 }
ipsecStatsAhCurrentOutbound OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The number of active outbound AH SAs."
::= { ipsecStats 30 }
ipsecStatsAhTotalOutbound OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The number of outbound AH SAs since the system was started."
::= { ipsecStats 31 }
ipsecStatsIpcompCurrentInbound OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The number of active inbound IPComp SAs."
::= { ipsecStats 32 }
ipsecStatsIpcompTotalInbound OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The number of inbound IPComp SAs since the system was started."
::= { ipsecStats 33 }
ipsecStatsIpcompCurrentOutbound OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The number of active outbound IPComp SAs."
::= { ipsecStats 34 }
ipsecStatsIpcompTotalOutbound OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The number of outbound IPComp SAs since the system was started."
::= { ipsecStats 35 }
ipsecStatsPeersUp OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The number of Peers currently in state 'up'."
::= { ipsecStats 36 }
ipsecStatsPeersBlocked OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The number of Peers currently in state 'blocked'."
::= { ipsecStats 37 }
ipsecStatsPeersDormant OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The number of Peers currently in state 'dormant'."
::= { ipsecStats 38 }
ipsecStatsCurrentIkeSasNegotiating OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Current number of IKE SA's in state 'established'
(both IKEv1 and IKEv2)."
::= { ipsecStats 39 }
ipsecStatsCurrentIkeSasEstablished OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Current number of IKE SA's in state 'established'
(both IKEv1 and IKEv2)."
::= { ipsecStats 40 }
ipsecStatsCurrentIkeSasDeleted OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Current number of IKE SA's in state 'deleted' or
'waiting_for_remove' (both IKEv1 and IKEv2)."
::= { ipsecStats 41 }
ipsecStatsCurrentBundles OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Current number of IPSec bundles."
::= { ipsecStats 42 }
ipsecStatsCurrentBundlesEstablished OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Current number of IPSec bundles in state 'established'."
::= { ipsecStats 43 }
ipsecStatsCurrentBundlesNegotiating OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Current number of IPSec bundles in state 'established'."
::= { ipsecStats 44 }
ipsecStatsInPkt OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Number of packets received."
::= { ipsecStats 45 }
ipsecStatsInPass OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Number of inbound packets passed."
::= { ipsecStats 46 }
ipsecStatsInDrop OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Number of inbound packets dropped (error packets excluded)."
::= { ipsecStats 47 }
ipsecStatsInDecaps OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Number of inbound error packets."
::= { ipsecStats 48 }
ipsecStatsInErrors OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Number of inbound packets dropped."
::= { ipsecStats 49 }
ipsecStatsOutPkt OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Number of outbound packets."
::= { ipsecStats 50 }
ipsecStatsOutPass OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Number of outbound packets passed."
::= { ipsecStats 51 }
ipsecStatsOutDrop OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Number of outbound packets dropped (error packets excluded)."
::= { ipsecStats 52 }
ipsecStatsOutEncaps OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Number of outbound packets encapsulated."
::= { ipsecStats 53 }
ipsecStatsOutErrors OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Number of outbound error packets."
::= { ipsecStats 544 }
ipsecStatsInEsp OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Number of inbound packets decapsulated by ESP."
::= { ipsecStats 55 }
ipsecStatsInAh OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Number of inbound packets decapsulated by AH."
::= { ipsecStats 56 }
ipsecStatsInIpcomp OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Number of inbound packets decapsulated by IPComP."
::= { ipsecStats 57 }
ipsecStatsOutEsp OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Number of outbound packets encapsulated by ESP."
::= { ipsecStats 58 }
ipsecStatsOutAh OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Number of outbound packets encapsulated by AH."
::= { ipsecStats 59 }
ipsecStatsOutIpcomp OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Number of outbound packets encapsulated by IPComP."
::= { ipsecStats 60 }
ipsecStatsIkev2NumIkeSas OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The number of IKE_SA negotiations performed (only for IKEv2)."
::= { ipsecStats 63 }
ipsecStatsIkev2NumFailedIkeSas OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The number of failed IKE_SA negotiations (only for IKEv2)."
::= { ipsecStats 64 }
ipsecStatsIkev2NumCreateChildSas OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The number of CREATE_CHILD_SA exchanges performed (only for IKEv2)."
::= { ipsecStats 65 }
ipsecStatsIkev2NumFailedCreateChildSas OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The number of failed CREATE_CHILD_SA exchanges (only for IKEv2)."
::= { ipsecStats 66 }
-- IPSec Dial Table
ipsecDialTable OBJECT-TYPE
SYNTAX SEQUENCE OF IpsecDialEntry
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"This table contains dial entries specifying all parameters
needed for ISDN triggered call back."
::= { ipsec 12 }
ipsecDialEntry OBJECT-TYPE
SYNTAX IpsecDialEntry
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"This object contains a dial entry used for mapping ISDN
numbers to peers for ISDN call back feature."
INDEX {
ipsecDialIfIndex
}
::= { ipsecDialTable 1 }
IpsecDialEntry ::=
SEQUENCE {
ipsecDialIfIndex INTEGER,
ipsecDialDirection INTEGER,
ipsecDialNumber DisplayString,
ipsecDialSubAddress OCTET STRING,
ipsecDialTypeOfSubAddr INTEGER,
ipsecDialLocalNumber DisplayString,
ipsecDialLocalSubAddress OCTET STRING,
ipsecDialTypeOfLocalSubAddr INTEGER,
ipsecDialAdminStatus INTEGER,
ipsecDialOperStatus INTEGER
}
ipsecDialIfIndex OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"Index that maps to a peer in a unique way."
::= { ipsecDialEntry 1 }
ipsecDialDirection OBJECT-TYPE
SYNTAX INTEGER {
incoming(1),
outgoing(2),
both(3),
delete(4)
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"Calling direction for which entry applies."
DEFVAL { both }
::= { ipsecDialEntry 2 }
ipsecDialNumber OBJECT-TYPE
SYNTAX DisplayString (SIZE(0..63))
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"Party number of remote peer. Used for matching calling party
number on incoming calls and for called party number on
outgoing calls."
::= { ipsecDialEntry 3 }
ipsecDialSubAddress OBJECT-TYPE
SYNTAX OCTET STRING
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"Subaddress of remote peer. Used for matching calling party
subaddress on incoming calls and for called party subaddress
on outgoing calls."
DEFVAL { "" }
::= { ipsecDialEntry 4 }
ipsecDialTypeOfSubAddr OBJECT-TYPE
SYNTAX INTEGER {
nsap(1),
user-specified(2),
reserved(3)
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"Type of subaddress of remote peer. Used for matching calling
party subaddress on incoming calls and for called party
subaddress on outgoing calls."
DEFVAL { nsap }
::= { ipsecDialEntry 5 }
ipsecDialLocalNumber OBJECT-TYPE
SYNTAX DisplayString (SIZE(0..63))
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"Local Party number. Used for matching called party number on
incoming calls and for calling party number on outgoing calls.
Special value '*' is treated as wildcard, i.e. calls with
any called party number will be accepted.
Default value is '*'."
DEFVAL { "*" }
::= { ipsecDialEntry 6 }
ipsecDialLocalSubAddress OBJECT-TYPE
SYNTAX OCTET STRING
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"Local subaddress. Used for matching called party subaddress on
incoming calls and for calling party subaddress on outgoing
calls.
Special value '*' is treated as wildcard, i.e. calls with
any called party subaddress (of arbitrary type) will be
accepted.
Default value is '*'."
DEFVAL { "*" }
::= { ipsecDialEntry 7 }
ipsecDialTypeOfLocalSubAddr OBJECT-TYPE
SYNTAX INTEGER {
nsap(1),
user-specified(2),
reserved(3)
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"Type of local subaddress. Used for matching called party
subaddress on incoming calls and for calling party subaddress
on outgoing calls. Subaddress type is only checked as long as
subaddress is not '*'.
Default value is nsap."
DEFVAL { nsap }
::= { ipsecDialEntry 8 }
ipsecDialAdminStatus OBJECT-TYPE
SYNTAX INTEGER {
active(1),
inactive(2)
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"Administrative status for dial entry. This object allows for
temporarily disabling ipsecDial entries without the need to
actually deletion them. This is achieved by assigning value
inactive.
Default value is active."
DEFVAL { active }
::= { ipsecDialEntry 9 }
ipsecDialOperStatus OBJECT-TYPE
SYNTAX INTEGER {
active(1),
inactive(2),
blocked-for-outgoing(3)
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Operational status for dial entry. This object indicates
current status ipsecDial entry is in. Beside values defined
for ipsecDialAdminStatus, status blocked-for-outgoing is
defined, which is used in case triggering call back resulted
in a cost generating connected call to avoid unpredictably
high phone bills."
::= { ipsecDialEntry 10 }
-- End IPSec Dial Table
-- XAUTH Profile Table
xauthProfileTable OBJECT-TYPE
SYNTAX SEQUENCE OF XauthProfileEntry
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"This table contains the list of XAUTH profiles."
::= { ipsec 18 }
xauthProfileEntry OBJECT-TYPE
SYNTAX XauthProfileEntry
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"This object contains an XAUTH profile."
INDEX {
xauthPrfIndex
}
::= { xauthProfileTable 1 }
XauthProfileEntry ::=
SEQUENCE {
xauthPrfIndex Unsigned32,
xauthPrfDescription DisplayString,
xauthPrfRole INTEGER,
xauthPrfMode INTEGER,
xauthPrfAAAServerGroupId INTEGER,
xauthPrfUserListGroupId INTEGER,
xauthPrfTimeout INTEGER,
xauthPrfAdminStatus INTEGER
}
xauthPrfIndex OBJECT-TYPE
SYNTAX Unsigned32 (1..4294967295)
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"A unique index identifying this entry."
::= { xauthProfileEntry 1 }
xauthPrfDescription OBJECT-TYPE
SYNTAX DisplayString (SIZE (0..50))
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"An optional description for this profile, only used for
descriptive purposes (max. 50 characters)."
::= { xauthProfileEntry 2 }
xauthPrfRole OBJECT-TYPE
SYNTAX INTEGER {
server(1), -- XAUTH server
client(2) -- XAUTH client
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies which role is choosed for this profile.
Possible values:
server(1) -- XAUTH is used and local device is the XAUTH server,
i.e. this side requests extended authentication
client(2) -- XAUTH is used and local device is the XAUTH client,
i.e. this side responds with its extended
authentication credentials
"
DEFVAL { server }
::= { xauthProfileEntry 3 }
xauthPrfMode OBJECT-TYPE
SYNTAX INTEGER {
local(1), --
radius(2) --
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies the kind how to get user data for authentication.
Possible values:
local(1), -- user data are configured locally in the entries
of xauthUserListTable that are referenced by
xauthPrfUserListGroupId
radius(1) -- user data are configured at RADIUS server, RADIUS server
is referenced by xauthPrfAAAServerGroupId that
corresponds to radiusSrvGroupId in radiusSrvTable,
'radius' mode is only valid for server role
"
DEFVAL { radius }
::= { xauthProfileEntry 4 }
xauthPrfAAAServerGroupId OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies the group ID which is used for RADIUS
authentication to find the associated server entry in
radiusSrvTable for XAUTH. See description of radiusSrvGroupId for
details.
This object is only valid for entries with xauthPrfMode 'radius'."
DEFVAL { 0 }
::= { xauthProfileEntry 5 }
xauthPrfUserListGroupId OBJECT-TYPE
SYNTAX INTEGER (1..1000)
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object refers to a group of one or more user entries in
xauthUserListTable.
This object is only valid for entries with xauthPrfUserMode 'local'."
DEFVAL { 1 }
::= { xauthProfileEntry 6 }
xauthPrfTimeout OBJECT-TYPE
SYNTAX INTEGER
UNITS "seconds"
MAX-ACCESS read-write
STATUS obsolete
DESCRIPTION
"WARNING: this object is obsolete and must not be used."
DEFVAL { 0 }
::= { xauthProfileEntry 7 }
xauthPrfAdminStatus OBJECT-TYPE
SYNTAX INTEGER { enable(1), delete(2) }
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"MIB entry deletion is performed by this object:
- enable : enables xauthPrfTable entry
- delete : deletes xauthPrfTable entry."
DEFVAL { enable }
::= { xauthProfileEntry 8 }
-- End XAUTH Profile Table
-- XAUTH User List Table
xauthUserListTable OBJECT-TYPE
SYNTAX SEQUENCE OF XauthUserListEntry
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"This table contains the list of XAUTH users."
::= { ipsec 19 }
xauthUserListEntry OBJECT-TYPE
SYNTAX XauthUserListEntry
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"This object contains an XAUTH user."
INDEX {
xauthUserListIndex
}
::= { xauthUserListTable 1 }
XauthUserListEntry ::=
SEQUENCE {
xauthUserListIndex INTEGER,
xauthUserListGroupId INTEGER,
xauthUserListName DisplayString,
xauthUserListPassword DisplayString,
xauthUserListPasswordData OCTET STRING,
xauthUserListAdminStatus INTEGER
}
xauthUserListIndex OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"A unique index identifying this entry."
::= { xauthUserListEntry 1 }
xauthUserListGroupId OBJECT-TYPE
SYNTAX INTEGER (1..1000)
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"ID for creating logical groups of XAUTH users."
DEFVAL { 1 }
::= { xauthUserListEntry 2 }
xauthUserListName OBJECT-TYPE
SYNTAX DisplayString (SIZE(1..63))
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies the user name."
::= { xauthUserListEntry 3 }
xauthUserListPassword OBJECT-TYPE
SYNTAX DisplayString (SIZE(0..63))
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies the user's password.
This field serves only as an input field and its contents
is replaced with a single asterisk immediately after it is set."
::= { xauthUserListEntry 4 }
xauthUserListPasswordData OBJECT-TYPE
SYNTAX OCTET STRING
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"Field used for storing the user's password permanently."
::= { xauthUserListEntry 5 }
xauthUserListAdminStatus OBJECT-TYPE
SYNTAX INTEGER { enable(1), delete(2) }
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"MIB entry deletion is performed by this object:
- enable : enables xauthUserListTable entry
- delete : deletes xauthUserListTable entry."
DEFVAL { enable }
::= { xauthUserListEntry 6 }
-- End IPSec XAUTH User Table
-- IPSecPeerTraffic Table
ipsecPeerTrafficTable OBJECT-TYPE
SYNTAX SEQUENCE OF IpsecPeerTrafficEntry
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"This table contains peer related lists of traffic permitted
for Phase 2 negotiation. Note that this table contains
optional entries solely, in the default case (no entries)
subsequently no restriction will take place."
::= { ipsec 29 }
ipsecPeerTrafficEntry OBJECT-TYPE
SYNTAX IpsecPeerTrafficEntry
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"This table contains peer related lists of traffic permitted
for Phase 2 negotiation. Note that this table contains
optional entries solely, in the default case (no entries)
subsequently no restriction will take place."
INDEX {
ipsecPeerTrafficIfindex, ipsecPeerTrafficLocalAddress,
ipsecPeerTrafficRemoteAddress
}
::= { ipsecPeerTrafficTable 1 }
IpsecPeerTrafficEntry ::=
SEQUENCE {
ipsecPeerTrafficIfindex INTEGER,
ipsecPeerTrafficDescription DisplayString,
ipsecPeerTrafficLocalAddress IpAddress,
ipsecPeerTrafficLocalMask IpAddress,
ipsecPeerTrafficLocalPort INTEGER,
ipsecPeerTrafficLocalPortRange INTEGER,
ipsecPeerTrafficRemoteAddress IpAddress,
ipsecPeerTrafficRemoteMask IpAddress,
ipsecPeerTrafficRemotePort INTEGER,
ipsecPeerTrafficRemotePortRange INTEGER,
ipsecPeerTrafficProtocol INTEGER,
ipsecPeerTrafficPolicy INTEGER
-- ipsecPeerTrafficAction INTEGER
}
ipsecPeerTrafficIfindex OBJECT-TYPE
SYNTAX INTEGER
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"."
::= { ipsecPeerTrafficEntry 1 }
ipsecPeerTrafficDescription OBJECT-TYPE
SYNTAX DisplayString
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"An optional human readable description for this entry."
::= { ipsecPeerTrafficEntry 2 }
ipsecPeerTrafficLocalAddress OBJECT-TYPE
SYNTAX IpAddress
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"The local IP-address of this entry. It maybe
either a single address or a network address (in
combination with ipsecPeerTrafficLocalMask)."
::= { ipsecPeerTrafficEntry 3 }
ipsecPeerTrafficLocalMask OBJECT-TYPE
SYNTAX IpAddress
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"The length of the network mask for a local network."
::= { ipsecPeerTrafficEntry 4 }
ipsecPeerTrafficLocalPort OBJECT-TYPE
SYNTAX INTEGER (-1..65535)
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"The local port defined for this entry."
DEFVAL { -1 }
::= { ipsecPeerTrafficEntry 5 }
ipsecPeerTrafficLocalPortRange OBJECT-TYPE
SYNTAX INTEGER (0..65534)
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"The local port range defined for this entry."
DEFVAL { 1 }
::= { ipsecPeerTrafficEntry 6 }
ipsecPeerTrafficRemoteAddress OBJECT-TYPE
SYNTAX IpAddress
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"The remote IP-address of this entry. It maybe
either a single address or a network address (in
combination with ipsecPeerTrafficRemoteMask)."
::= { ipsecPeerTrafficEntry 7 }
ipsecPeerTrafficRemoteMask OBJECT-TYPE
SYNTAX IpAddress
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"The network mask for a remote network."
::= { ipsecPeerTrafficEntry 8 }
ipsecPeerTrafficRemotePort OBJECT-TYPE
SYNTAX INTEGER (-1..65535)
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"The remote UDP/TCP port defined for this entry."
DEFVAL { -1 }
::= { ipsecPeerTrafficEntry 9 }
ipsecPeerTrafficRemotePortRange OBJECT-TYPE
SYNTAX INTEGER (0..65534)
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"The remote UDP/TCP port range defined for this entry."
DEFVAL { 1 }
::= { ipsecPeerTrafficEntry 10 }
ipsecPeerTrafficProtocol OBJECT-TYPE
SYNTAX INTEGER {
icmp(1),
igmp(2),
ggp(3),
ipip(4),
st(5),
tcp(6),
cbt(7),
egp(8),
igp(9),
bbn(10),
nvp(11),
pup(12),
argus(13),
emcon(14),
xnet(15),
chaos(16),
udp(17),
mux(18),
dcn(19),
hmp(20),
prm(21),
xns(22),
trunk1(23),
trunk2(24),
leaf1(25),
leaf2(26),
rdp(27),
irtp(28),
isotp4(29),
netblt(30),
mfe(31),
merit(32),
sep(33),
pc3(34),
idpr(35),
xtp(36),
ddp(37),
idprc(38),
tp(39),
il(40),
ipv6(41),
sdrp(42),
ipv6route(43),
ipv6frag(44),
idrp(45),
rsvp(46),
gre(47),
mhrp(48),
bna(49),
esp(50),
ah(51),
inlsp(52),
swipe(53),
narp(54),
mobile(55),
tlsp(56),
skip(57),
ipv6icmp(58),
ipv6nonxt(59),
ipv6opts(60),
ipproto-61(61),
cftp(62),
local(63),
sat(64),
kryptolan(65),
rvd(66),
ippc(67),
distfs(68),
satmon(69),
visa(70),
ipcv(71),
cpnx(72),
cphb(73),
wsn(74),
pvp(75),
brsatmon(76),
sunnd(77),
wbmon(78),
wbexpak(79),
isoip(80),
vmtp(81),
securevmtp(82),
vines(83),
ttp(84),
nsfnet(85),
dgp(86),
tcf(87),
eigrp(88),
ospfigp(89),
sprite(90),
larp(91),
mtp(92),
ax25(93),
ipwip(94),
micp(95),
scc(96),
etherip(97),
encap(98),
encrypt(99),
gmtp(100),
ifmp(101),
pnni(102),
pim(103),
aris(104),
scps(105),
qnx(106),
an(107),
ippcp(108),
snp(109),
compaq(110),
ipxip(111),
vrrp(112),
pgm(113),
hop0(114),
l2tp(115),
ipproto-116(116),
ipproto-117(117),
ipproto-118(118),
ipproto-119(119),
ipproto-120(120),
ipproto-121(121),
ipproto-122(122),
ipproto-123(123),
ipproto-124(124),
ipproto-125(125),
ipproto-126(126),
ipproto-127(127),
ipproto-128(128),
ipproto-129(129),
ipproto-130(130),
ipproto-131(131),
ipproto-132(132),
ipproto-133(133),
ipproto-134(134),
ipproto-135(135),
ipproto-136(136),
ipproto-137(137),
ipproto-138(138),
ipproto-139(139),
ipproto-140(140),
ipproto-141(141),
ipproto-142(142),
ipproto-143(143),
ipproto-144(144),
ipproto-145(145),
ipproto-146(146),
ipproto-147(147),
ipproto-148(148),
ipproto-149(149),
ipproto-150(150),
ipproto-151(151),
ipproto-152(152),
ipproto-153(153),
ipproto-154(154),
ipproto-155(155),
ipproto-156(156),
ipproto-157(157),
ipproto-158(158),
ipproto-159(159),
ipproto-160(160),
ipproto-161(161),
ipproto-162(162),
ipproto-163(163),
ipproto-164(164),
ipproto-165(165),
ipproto-166(166),
ipproto-167(167),
ipproto-168(168),
ipproto-169(169),
ipproto-170(170),
ipproto-171(171),
ipproto-172(172),
ipproto-173(173),
ipproto-174(174),
ipproto-175(175),
ipproto-176(176),
ipproto-177(177),
ipproto-178(178),
ipproto-179(179),
ipproto-180(180),
ipproto-181(181),
ipproto-182(182),
ipproto-183(183),
ipproto-184(184),
ipproto-185(185),
ipproto-186(186),
ipproto-187(187),
ipproto-188(188),
ipproto-189(189),
ipproto-190(190),
ipproto-191(191),
ipproto-192(192),
ipproto-193(193),
ipproto-194(194),
ipproto-195(195),
ipproto-196(196),
ipproto-197(197),
ipproto-198(198),
ipproto-199(199),
ipproto-200(200),
ipproto-201(201),
ipproto-202(202),
ipproto-203(203),
ipproto-204(204),
ipproto-205(205),
ipproto-206(206),
ipproto-207(207),
ipproto-208(208),
ipproto-209(209),
ipproto-210(210),
ipproto-211(211),
ipproto-212(212),
ipproto-213(213),
ipproto-214(214),
ipproto-215(215),
ipproto-216(216),
ipproto-217(217),
ipproto-218(218),
ipproto-219(219),
ipproto-220(220),
ipproto-221(221),
ipproto-222(222),
ipproto-223(223),
ipproto-224(224),
ipproto-225(225),
ipproto-226(226),
ipproto-227(227),
ipproto-228(228),
ipproto-229(229),
ipproto-230(230),
ipproto-231(231),
ipproto-232(232),
ipproto-233(233),
ipproto-234(234),
ipproto-235(235),
ipproto-236(236),
ipproto-237(237),
ipproto-238(238),
ipproto-239(239),
ipproto-240(240),
ipproto-241(241),
ipproto-242(242),
ipproto-243(243),
ipproto-244(244),
ipproto-245(245),
ipproto-246(246),
ipproto-247(247),
ipproto-248(248),
ipproto-249(249),
ipproto-250(250),
ipproto-251(251),
ipproto-252(252),
ipproto-253(253),
ipproto-254(254),
dont-verify(256)
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"The transport protocol defined for this entry."
DEFVAL { dont-verify }
::= { ipsecPeerTrafficEntry 11 }
ipsecPeerTrafficPolicy OBJECT-TYPE
SYNTAX INTEGER {
delete(1), -- delete this entry
role-initiator(2), -- P2 initiator mode traffic policy
role-responder(3), -- P2 responder mode traffic policy
both(4) -- P2 initiator as well as responder traffic policy
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This object specifies whether this network policy is used
for inbound, outbound or both processing.
Possible values:
delete(1) -- delete this entry
role-initiator(2) -- P2 initiator mode traffic policy
role-responder(3) -- P2 responder mode traffic policy
both(4) -- P2 initiator as well as responder
traffic policy."
DEFVAL { role-initiator }
::= { ipsecPeerTrafficEntry 12 }
-- End IPSecPeerTraffic Table
END