ACC-IPSEC: View SNMP OID List / Download MIB

VENDOR: ACC


 Home MIB: ACC-IPSEC
Download as:   

Download standard MIB format if you are planning to load a MIB file into some system (OS, Zabbix, PRTG ...) or view it with a MIB browser. CSV is more suitable for analyzing and viewing OID' and other MIB objects in excel. JSON and YAML formats are usually used in programing even though some systems can use MIB in YAML format (like Logstash).
Keep in mind that standard MIB files can be successfully loaded by systems and programs only if all the required MIB's from the "Imports" section are already loaded.
The tree-like SNMP object navigator requires no explanations because it is very simple to use. And if you stumbled on this MIB from Google note that you can always go back to the home page if you need to perform another MIB or OID lookup.


Object Name OID Type Access Info
 accIpsec 1.3.6.1.4.1.5.1.1.81
       accIpsecConfig 1.3.6.1.4.1.5.1.1.81.1
           accIpsecConfigMessageLevel 1.3.6.1.4.1.5.1.1.81.1.1
IPSec message level
           accIpsecConfigDebugMask 1.3.6.1.4.1.5.1.1.81.1.2
IPSec debug mask
           accIpsecConfigSANumber 1.3.6.1.4.1.5.1.1.81.1.3
The maximum number of SAs
           accIpsecConfigAuthenticationAllowed 1.3.6.1.4.1.5.1.1.81.1.4
Authentication allowed
           accIpsecConfigEncryptionKeyLength 1.3.6.1.4.1.5.1.1.81.1.5
The maximum allowed key length for encryption
       accIpsecStats 1.3.6.1.4.1.5.1.1.81.2
           accIpsecStatsInOkPackets 1.3.6.1.4.1.5.1.1.81.2.1
Number of correctly received IPSec packets
           accIpsecStatsOutOkPackets 1.3.6.1.4.1.5.1.1.81.2.2
Number of correctly sent IPSec packets
           accIpsecStatsIllegalInSpis 1.3.6.1.4.1.5.1.1.81.2.3
Number of packets dropped because the SPI was incorrect
           accIpsecStatsIllegalProtos 1.3.6.1.4.1.5.1.1.81.2.4
Number of packets dropped because the protocol contained inside the received IPSec packet was incorrect, i.e. a transport mode SA contained a tunneled packet or a tunnel mode SA contained a non-tunneled packet
           accIpsecStatsUnsuppAHLens 1.3.6.1.4.1.5.1.1.81.2.5
Number of packets dropped because the authenticator length was not supported
           accIpsecStatsUnsuppOpts 1.3.6.1.4.1.5.1.1.81.2.6
Number of packets dropped because some IP options were not supported by IPSec
           accIpsecStatsPacketTooSmalls 1.3.6.1.4.1.5.1.1.81.2.7
Number of packets dropped because the packet was too small to contain all necessary IPSec information
           accIpsecStatsMalformedOpts 1.3.6.1.4.1.5.1.1.81.2.8
Number of packets dropped because some IP options were malformed
           accIpsecStatsUnsuppIPVersions 1.3.6.1.4.1.5.1.1.81.2.9
Number of packets dropped because the tunneled packet was not IPv4
           accIpsecStatsNoRoutes 1.3.6.1.4.1.5.1.1.81.2.10
Number of packets dropped because there was no route to the specified outgoing security gateway
           accIpsecStatsMissingGWs 1.3.6.1.4.1.5.1.1.81.2.11
Number of packets dropped because the outgoing security gateway was not specified
           accIpsecStatsSha1Mismatches 1.3.6.1.4.1.5.1.1.81.2.12
Number of packets dropped because the SHA-1 authenticator was incorrect
           accIpsecStatsMd5Mistmatches 1.3.6.1.4.1.5.1.1.81.2.13
Number of packets dropped because the MD5 authenticator was incorrect
           accIpsecStatsReplayCheckFaileds 1.3.6.1.4.1.5.1.1.81.2.14
Number of packets dropped because replay checks failed
           accIpsecStatsIllegalPads 1.3.6.1.4.1.5.1.1.81.2.15
Number of packets dropped because ESP padding content was incorrect
           accIpsecStatsSeqnoCycles 1.3.6.1.4.1.5.1.1.81.2.16
Number of packets dropped because of sequence number overflow
           accIpsecStatsInsufficientPads 1.3.6.1.4.1.5.1.1.81.2.17
Number of packets dropped because ESP padding was of incorrect length
           accIpsecStatsTtlZeros 1.3.6.1.4.1.5.1.1.81.2.18
Number of packets dropped because the packet being tunneled had its TTL decremented to zero
           accIpsecStatsNoKeys 1.3.6.1.4.1.5.1.1.81.2.19
Number of packets dropped because the required authentication or encryption keys were not set
           accIpsecStatsIllegalFragments 1.3.6.1.4.1.5.1.1.81.2.20
Number of packets dropped because a transport mode packet contained a fragment
           accIpsecStatsCpuOverloads 1.3.6.1.4.1.5.1.1.81.2.21
Number of packets dropped because of CPU overload
           accIpsecStatsHdrAllocs 1.3.6.1.4.1.5.1.1.81.2.22
Number of extra memory allocations done for headers
           accIpsecStatsTlrAllocs 1.3.6.1.4.1.5.1.1.81.2.23
Number of extra memory allocations done for trailers
           accIpsecStatsBlockJoins 1.3.6.1.4.1.5.1.1.81.2.24
Number of memory block joins
       accIpsecSAConfig 1.3.6.1.4.1.5.1.1.81.3
           accIpsecSAConfigTable 1.3.6.1.4.1.5.1.1.81.3.1
Tok_String
               accIpsecSAConfigEntry 1.3.6.1.4.1.5.1.1.81.3.1.1
Tok_String
                   accIpsecSAConfigIndex 1.3.6.1.4.1.5.1.1.81.3.1.1.1
The name of the SA entry
                   accIpsecSAConfigDir 1.3.6.1.4.1.5.1.1.81.3.1.1.2
The direction of the SA
                   accIpsecSAConfigMode 1.3.6.1.4.1.5.1.1.81.3.1.1.3
SA mode in the security association data base
                   accIpsecSAConfigProtocol 1.3.6.1.4.1.5.1.1.81.3.1.1.4
Which protocol to use for an SA in the security association data base
                   accIpsecSAConfigSPI 1.3.6.1.4.1.5.1.1.81.3.1.1.5
The SPI value of the SA
                   accIpsecSAConfigAuthAlgorithm 1.3.6.1.4.1.5.1.1.81.3.1.1.6
SA authenticaiton algorithm in the security association data base
                   accIpsecSAConfigReplayCheck 1.3.6.1.4.1.5.1.1.81.3.1.1.7
Replay check prevents the same sequence number from being used twice on received packets
                   accIpsecSAConfigOverflowAudit 1.3.6.1.4.1.5.1.1.81.3.1.1.8
Overflow audit prevents further packets from being sent when a sequence number overflow occurs
                   accIpsecSAConfigCopyDF 1.3.6.1.4.1.5.1.1.81.3.1.1.9
The handling of the DF bit on the sent encapsulating header based on the DF bit of the encapsulated header
                   accIpsecSAConfigDestAddr 1.3.6.1.4.1.5.1.1.81.3.1.1.10
Destination IP address
                   accIpsecSAConfigSharedAuthSecret 1.3.6.1.4.1.5.1.1.81.3.1.1.11
Shared authentication key for the SA
                   accIpsecSAConfigEncrAlgorithm 1.3.6.1.4.1.5.1.1.81.3.1.1.12
The encryption algorithm to be used
                   accIpsecSAConfigSharedEncrSecret 1.3.6.1.4.1.5.1.1.81.3.1.1.13
Shared encryption key for the SA
                   accIpsecSAConfigPriority 1.3.6.1.4.1.5.1.1.81.3.1.1.14
Priority of the SA
                   accIpsecSAConfigSequenceNumber 1.3.6.1.4.1.5.1.1.81.3.1.1.15
The sequence number to be used in the next IPSec message to be sent, or the smallest acceptable sequence number in an IPSec message to be received
                   accIpsecSAConfigStatus 1.3.6.1.4.1.5.1.1.81.3.1.1.16
The current status of this entry
       accIpsecSAStats 1.3.6.1.4.1.5.1.1.81.4
           accIpsecSAStatsTable 1.3.6.1.4.1.5.1.1.81.4.1
Tok_String
               accIpsecSAStatsEntry 1.3.6.1.4.1.5.1.1.81.4.1.1
Tok_String
                   accIpsecSAStatsIndex 1.3.6.1.4.1.5.1.1.81.4.1.1.1
The name of the SA entry
                   accIpsecSAStatsOKPackets 1.3.6.1.4.1.5.1.1.81.4.1.1.2
Number of correct packets processed
                   accIpsecSAStatsNotOKPackets 1.3.6.1.4.1.5.1.1.81.4.1.1.3
Number of incorrect packets processed
                   accIpsecSAStatsCurrTicks 1.3.6.1.4.1.5.1.1.81.4.1.1.4
The number of time ticks this SA has existed
                   accIpsecSAStatsCurrBytes 1.3.6.1.4.1.5.1.1.81.4.1.1.5
The number of bytes this SA has processed
       accIpsecTraps 1.3.6.1.4.1.5.1.1.81.5
           accIpsecTrapMsg 1.3.6.1.4.1.5.1.1.81.5.1
Trap message object for level-1 traps of Ipsec module