BIANCA-BRICK-IPSEC-MIB: View SNMP OID List / Download MIB

VENDOR: BINTEC COMMUNICATIONS GMBH


 Home MIB: BIANCA-BRICK-IPSEC-MIB
Download as:   

Download standard MIB format if you are planning to load a MIB file into some system (OS, Zabbix, PRTG ...) or view it with a MIB browser. CSV is more suitable for analyzing and viewing OID' and other MIB objects in excel. JSON and YAML formats are usually used in programing even though some systems can use MIB in YAML format (like Logstash).
Keep in mind that standard MIB files can be successfully loaded by systems and programs only if all the required MIB's from the "Imports" section are already loaded.
The tree-like SNMP object navigator requires no explanations because it is very simple to use. And if you stumbled on this MIB from Google note that you can always go back to the home page if you need to perform another MIB or OID lookup.


Object Name OID Type Access Info
 org 1.3
     dod 1.3.6
         internet 1.3.6.1
             private 1.3.6.1.4
                 enterprises 1.3.6.1.4.1
                     bintec 1.3.6.1.4.1.272
                             bibo 1.3.6.1.4.1.272.4
                                 ipsec 1.3.6.1.4.1.272.4.26
                                       ipsecGlobals 1.3.6.1.4.1.272.4.26.1
                                           ipsecGlobPeerIndex 1.3.6.1.4.1.272.4.26.1.1 integer read-write
Index of first IPsec peer in ipsecPeerTable. If this object is set to a Value <= 0, IPSec is switched explicitly off. If the peer referenced by this object does not exist in the table, all packets will be dropped.
                                           ipsecGlobDefaultAuthMethod 1.3.6.1.4.1.272.4.26.1.2 integer read-write
The authentication method used by default. If the ipsecPeerAuthMethod field of an ipsecPeerEntry is set to 'default', this value is assumed. Possible values: pre-sh-key(1), -- Authentication using pre shared keys dss-sig(2), -- Authentication using DSS signatures rsa-sig(3), -- Authentication using RSA signatures rsa-enc(4) -- Authentication using RSA encryption. Enumeration: 'dss-sig': 2, 'pre-sh-key': 1, 'rsa-enc': 4, 'rsa-sig': 3.
                                           ipsecGlobDefaultCertificate 1.3.6.1.4.1.272.4.26.1.3 integer read-write
The index of the default certificate in the certTable used for local authentication for ike keyed rules with non pre-shared-key authentication. This may be overwritten by the certificate specified for the individual ipsec peers.
                                           ipsecGlobDefaultLocalId 1.3.6.1.4.1.272.4.26.1.4 displaystring read-write
The default ID used for local authentication for ike keyed rules. If this is an empty or invaid id string one of the subject alternative names or the subject name from the default certificate is used. This does not relpace an empty local id string for an IPsec peer with a valid certificate. The subject name or one of the subject alternative names from this certificate is used then
                                           ipsecGlobDefaultIpsecProposal 1.3.6.1.4.1.272.4.26.1.5 integer read-write
Index of default ipsec proposal used for traffic entries with empty ipsec proposal, defined for peers with empty default ipsec proposal.
                                           ipsecGlobDefaultIkeProposal 1.3.6.1.4.1.272.4.26.1.6 integer read-write
Index of default ike proposal used for peers with empty default ike proposal.
                                           ipsecGlobDefaultIpsecLifeTime 1.3.6.1.4.1.272.4.26.1.7 integer read-write
Index of default lifetime for ike SA's in ipsecLifeTimeTable. This lifetime is used, when there is no valid lifetime entry specified for an IPsec peer entry.
                                           ipsecGlobDefaultIkeLifeTime 1.3.6.1.4.1.272.4.26.1.8 integer read-write
Index of default lifetime for ipsec SA's in ipsecLifeTimeTable. This lifetime is used, when there is no valid lifetime entry specified for an IPsec SA, its traffic entry and its peer entry.
                                           ipsecGlobDefaultIkeGroup 1.3.6.1.4.1.272.4.26.1.9 integer read-write
Index of default IKE group used for peer entries with empty or invalid ike group. Possible values: 1 (768 bit MODP), 2 (1024 bit MODP), 5 (1536 bit MODP).
                                           ipsecGlobMaxSysLogLevel 1.3.6.1.4.1.272.4.26.1.10 integer read-write
Maximum level for syslog messages issued by IPSec. All messages with a level higher than this value are suppressed, independently from other global syslog level settings. Possible settings: emerg(1), alert(2), crit(3), err(4), warning(5), notice(6), info(7), debug(8). Enumeration: 'info': 7, 'notice': 6, 'err': 4, 'alert': 2, 'debug': 8, 'emerg': 1, 'crit': 3, 'warning': 5.
                                           ipsecGlobDefaultGranularity 1.3.6.1.4.1.272.4.26.1.11 integer read-write
This object specifies the default granularity used for IPSEC SA negotiation. Possible values: coarse(2), -- Create only one SA for each Traffic entry ip(3), -- Create one SA for each host proto(4), -- Create one SA for each protocol and host port(5) -- Create one SA for each port and host. Enumeration: 'port': 5, 'ip': 3, 'coarse': 2, 'proto': 4.
                                           ipsecGlobDefaultPh1Mode 1.3.6.1.4.1.272.4.26.1.12 integer read-write
This object specifies the default exchange mode used for IKE SA negotiation. Possible values: id-protect(1), -- Use identity protection (main) mode aggressive(2) -- Use aggressive mode. Enumeration: 'aggressive': 2, 'id-protect': 1.
                                           ipsecGlobDefaultPfsGroup 1.3.6.1.4.1.272.4.26.1.13 integer read-write
This object specifies the PFS group to use. PFS is done only for phase 2, i.e. the Phase 1 SAs are not deleted after phase 2 negotiation is completed. Note however, that if the peer has configured PFS for identity and destroys phase 1 SAs, this side will also destroy them when notified. Possible values: 0 (no PFS) 1 (768 bit MODP), 2 (1024 bit MODP), 5 (1536 bit MODP).
                                           ipsecGlobIkePort 1.3.6.1.4.1.272.4.26.1.20 integer read-write
This object specifies the port the IKE key management service listens to.
                                           ipsecGlobMaxRetries 1.3.6.1.4.1.272.4.26.1.21 integer read-write
This object specifies the maximum number of retries sent by IKE for one message.
                                           ipsecGlobRetryTimeout0milli 1.3.6.1.4.1.272.4.26.1.22 integer read-write
This object specifies the period of time in milliseconds before an IKE message is repeated for the first time if the answer is missing. After each retry, this timeout is increased up to the value specified in ipsecGlobRetryTimeoutMaxsec.
                                           ipsecGlobRetryTimeoutMaxsec 1.3.6.1.4.1.272.4.26.1.23 integer read-write
This object specifies the maximum period of time in seconds before an IKE message is repeated if the answer is missing. The retry timeout is not increased beyond this limit.
                                           ipsecGlobMaxNegotiationTimeoutsec 1.3.6.1.4.1.272.4.26.1.24 integer read-write
This object specifies the maximum number of seconds after which a negotiation is canceled if it is not finished.
                                           ipsecGlobMaxIkeSas 1.3.6.1.4.1.272.4.26.1.25 integer read-write
This object specifies the maximum number of simultaneous ISAKMP Security associations allowed. If this limit is reached, the entries are removed from the database, starting with the ones that will expire very soon. If that is not enough, the entries are deleted in reverse LRU order.
                                           ipsecGlobAntiCloggingLength 1.3.6.1.4.1.272.4.26.1.26 integer read-write
This object specifies the length in bits of the local secret used for ISAKMP anti-clogging cookies.
                                           ipsecGlobAntiCloggingHash 1.3.6.1.4.1.272.4.26.1.27 integer read-write
This object specifies the algorithm which is used for creating anti-clogging-tokens. Possible values: md5(3), -- MD5 hash algorithm sha1(4) -- SHA hash algorithm. Enumeration: 'sha1': 4, 'md5': 3.
                                           ipsecGlobLocalSecretPeriodsec 1.3.6.1.4.1.272.4.26.1.28 integer read-write
This object specifies the period of time in seconds after which a new secret for creating local anti-clogging tokens is created. The previous secret is remembered, so that the anti-clogging tokens created with the previous secret are also recognized as valid. After the local secret is recreated again, the old tokens are not recognized anymore and all IKE packets belonging to the old security associations are discarded. This means that the maximum lifetime of an ISAKMP SA is twice the value of this timer.
                                           ipsecGlobIgnoreCrPayloads 1.3.6.1.4.1.272.4.26.1.29 integer read-write
This object specifies whether certificate request payloads should be ignored by IKE. Possible values: true(1), -- ignore all certificate requests false(2) -- process certificate request payloads. Enumeration: 'false': 2, 'true': 1.
                                           ipsecGlobNoCrPayloads 1.3.6.1.4.1.272.4.26.1.30 integer read-write
This object specifies whether IKE should suppress certificate requests. Possible values: true(1), -- suppress certificate requests false(2) -- send certificate requests. Enumeration: 'false': 2, 'true': 1.
                                           ipsecGlobNoKeyHashPayloads 1.3.6.1.4.1.272.4.26.1.31 integer read-write
This object specifies whether IKE should suppress key hash payloads. Possible values: true(1), -- suppress key hash payloads false(2) -- send key hash payloads. Enumeration: 'false': 2, 'true': 1.
                                           ipsecGlobNoCrls 1.3.6.1.4.1.272.4.26.1.32 integer read-write
This object specifies whether IKE should send certificate revocation lists. Possible values: true(1), -- do not send certificate revocation lists false(2) -- send certificate revocation lists. Enumeration: 'false': 2, 'true': 1.
                                           ipsecGlobSendFullCertChains 1.3.6.1.4.1.272.4.26.1.33 integer read-write
This object specifies whether IKE should send full certificate chains. Possible values: true(1), -- send full certificate chains false(2) -- do not send full certificate chains. Enumeration: 'false': 2, 'true': 1.
                                           ipsecGlobTrustIcmpMsg 1.3.6.1.4.1.272.4.26.1.34 integer read-write
This object specifies whether IKE should trust icmp port and host unreachable error messages. ICMP port and host unreachable messages are only trusted if there have not yet been received any datagrams from the remote host in this negotiation. This means, if the local side receives an ICMP port or host unreachable message as the first response to the initial packet of a new phase 1 negotiation, it cancels the negotiation immediately. Possible values: true(1), -- trust ICMP messages false(2) -- do not trust ICMP messages. Enumeration: 'false': 2, 'true': 1.
                                           ipsecGlobSpiSize 1.3.6.1.4.1.272.4.26.1.35 integer read-write
A compatibility flag that specifies the length of the SPI in bytes, which is used when an ISAKMP SA SPI (Cookie) is sent to the remote peer. This field takes effect only if ipsecGlobZeroIsakmpCookies is true.
                                           ipsecGlobZeroIsakmpCookies 1.3.6.1.4.1.272.4.26.1.36 integer read-write
This object specifies whether zeroed ISAKMP cookies should be sent. Possible Values: true(1), -- send zero cookies in ISAKMP messages false(2) -- send ISAKMP cookies. Enumeration: 'false': 2, 'true': 1.
                                           ipsecGlobMaxKeyLength 1.3.6.1.4.1.272.4.26.1.37 integer read-write
This object specifies the maximum length of an encryption key (in bits) that is accepted from the remote end. This limit prevents denial of service attacks where the attacker asks for a huge key for an encryption algorithm that allows variable length keys.
                                           ipsecGlobNoInitialContact 1.3.6.1.4.1.272.4.26.1.38 integer read-write
Do not send IKE initial contact messages in IKE negotiations even if no SA's exist with a peer. Possible values: true(1), -- do not send initial contact messages false(2) -- send initial comntact messages if appropriate. Enumeration: 'false': 2, 'true': 1.
                                       ipsecPublicKeyTable 1.3.6.1.4.1.272.4.26.2 no-access
This table contains the list of public key pairs and ID's used with IPSec.
                                           ipsecPubKeyEntry 1.3.6.1.4.1.272.4.26.2.1 no-access
This object contains a key pair for a certain public key algorithm and the ids used together with this key.
                                               ipsecPubKeyIndex 1.3.6.1.4.1.272.4.26.2.1.1 integer read-only
A unique index for this entry.
                                               ipsecPubKeyDescription 1.3.6.1.4.1.272.4.26.2.1.2 displaystring read-write
An optional description for this key.
                                               ipsecPubKeyAlgorithm 1.3.6.1.4.1.272.4.26.2.1.3 integer read-only
This object specifies the algorithm for which the key is used. Possible values: rsa(2), -- The RSA encryption algorithm dsa(3) -- The digital signature algorithm. Enumeration: 'rsa': 2, 'dsa': 3.
                                               ipsecPubKeyKeyLength 1.3.6.1.4.1.272.4.26.2.1.4 integer read-only
The size of the public and private keys in bits.
                                       ipsecSaTable 1.3.6.1.4.1.272.4.26.3 no-access
This table contains the list of currently active IPSec security associations.
                                           ipsecSaEntry 1.3.6.1.4.1.272.4.26.3.1 no-access
This object contains an IPSec security association.
                                               ipsecSaIndex 1.3.6.1.4.1.272.4.26.3.1.1 integer read-only
A unique index for this entry.
                                               ipsecSaState 1.3.6.1.4.1.272.4.26.3.1.3 integer read-write
The current state of the security association Possible values: alive(1), -- The SA is alive and will eventually be rekeyed expired(2), -- The SA is expired and will not be rekeyed delete (3) -- mark this sa for deletion. Enumeration: 'expired': 2, 'alive': 1, 'delete': 3.
                                               ipsecSaCreator 1.3.6.1.4.1.272.4.26.3.1.4 integer read-only
This object specifies how the SA was created Possible values: manual(1), -- A manually keyed IPSec SA ike(2) -- An automatically keyed SA created by IKE. Enumeration: 'manual': 1, 'ike': 2.
                                               ipsecSaDir 1.3.6.1.4.1.272.4.26.3.1.5 integer read-only
This object specifies whether the SA is used for inbound or outbound processing. Possible values: inbound(1), -- An inbound security association outbound(2) -- An outbound security association. Enumeration: 'inbound': 1, 'outbound': 2.
                                               ipsecSaMode 1.3.6.1.4.1.272.4.26.3.1.6 integer read-only
This object specifies whether the SA is in tunnel or transport mode. Possible values: tunnel(1), -- A tunnel mode SA transport(2) -- A transport mode SA. Enumeration: 'tunnel': 1, 'transport': 2.
                                               ipsecSaSecProto 1.3.6.1.4.1.272.4.26.3.1.7 integer read-only
This object specifies the security protocol applied by this SA. Possible values: esp(50), -- Encapsulating Security Payload ah(51), -- Authentication Header ipcomp(108) -- Internet Payload Compression Protocol. Enumeration: 'ah': 51, 'ipcomp': 108, 'esp': 50.
                                               ipsecSaLocalIp 1.3.6.1.4.1.272.4.26.3.1.8 ipaddress read-only
The local IP address of the outer packet header. For transport mode SAs, this address is the same as the ipsecSaSrcAddress.
                                               ipsecSaPeerIp 1.3.6.1.4.1.272.4.26.3.1.9 ipaddress read-only
The destination IP address of the outer packet header. For transport mode SAs, this address is the same as the ipsecSaDstAddress.
                                               ipsecSaSrcAddress 1.3.6.1.4.1.272.4.26.3.1.10 ipaddress read-only
The address of the source network this SA covers (if the SrcRange field is nonzero, this is the first address of a range of addresses).
                                               ipsecSaSrcMaskLen 1.3.6.1.4.1.272.4.26.3.1.11 integer read-only
The mask length of the source network this SA covers (only meaningful, if the SrcRange field is zero).
                                               ipsecSaSrcRange 1.3.6.1.4.1.272.4.26.3.1.12 ipaddress read-only
The last address of a range of source addresses (starting with SrcAddress) this SA covers. Overrides SrcMaskLen.
                                               ipsecSaDstAddress 1.3.6.1.4.1.272.4.26.3.1.13 ipaddress read-only
The address of the destination network this SA covers (if the DstRange field is nonzero, this is the first address of a range of addresses).
                                               ipsecSaDstMaskLen 1.3.6.1.4.1.272.4.26.3.1.14 integer read-only
The mask length of the destination network this SA covers (only meaningful, if the DstRange field is zero).
                                               ipsecSaDstRange 1.3.6.1.4.1.272.4.26.3.1.15 ipaddress read-only
The last address of a range of destination addresses (starting with DstAddress) this SA covers. Overrides DstMaskLen.
                                               ipsecSaSpi 1.3.6.1.4.1.272.4.26.3.1.17 hexvalue read-only
The Security Parameters Index of this SA.
                                               ipsecSaAuthAlg 1.3.6.1.4.1.272.4.26.3.1.18 integer read-only
The hash algorithm used, if any. Possible Values: none(2), -- No hash algorithm applied md5-96(4), -- The MD5 hash algorithm sha1-96(6) -- The Secure Hash Algorithm. Enumeration: 'none': 2, 'sha1-96': 6, 'md5-96': 4.
                                               ipsecSaEncAlg 1.3.6.1.4.1.272.4.26.3.1.19 integer read-only
The encryption algorithm used, if any. Possible Values: none(1), -- No encryption applied des-cbc(2), -- DES in CBC mode des3-cbc(3), -- Triple DES in CBC mode blowfish-cbc(4), -- Blowfish in CBC mode cast128-cbc(5) -- CAST with 128 bit key in CBC mode. Enumeration: 'cast128-cbc': 5, 'none': 1, 'blowfish-cbc': 4, 'des3-cbc': 3, 'des-cbc': 2.
                                               ipsecSaAuthKeyLen 1.3.6.1.4.1.272.4.26.3.1.21 integer read-only
The length of the key used for authentication, if any.
                                               ipsecSaEncKeyLen 1.3.6.1.4.1.272.4.26.3.1.22 integer read-only
The length of the key used for encryption, if any.
                                               ipsecSaLifeSeconds 1.3.6.1.4.1.272.4.26.3.1.25 integer read-only
The period in seconds after which this SA will be destroyed.
                                               ipsecSaLifeKBytes 1.3.6.1.4.1.272.4.26.3.1.26 integer read-only
The amount of data allowed to be protected by this SA until it is destroyed.
                                               ipsecSaProto 1.3.6.1.4.1.272.4.26.3.1.27 integer read-only
The protocol this SA covers. Enumeration: 'ipproto-239': 239, 'ipproto-130': 130, 'mfe': 31, 'skip': 57, 'ttp': 84, 'merit': 32, 'chaos': 16, 'ipproto-159': 159, 'ipproto-158': 158, 'netblt': 30, 'tcf': 87, 'ipproto-150': 150, 'ipproto-153': 153, 'ipproto-152': 152, 'ipproto-155': 155, 'ipproto-154': 154, 'ipproto-157': 157, 'ipproto-156': 156, 'ipproto-252': 252, 'ipproto-253': 253, 'ipproto-250': 250, 'ipproto-145': 145, 'ipproto-254': 254, 'xtp': 36, 'scc': 96, 'tp': 39, 'securevmtp': 82, 'aris': 104, 'bna': 49, 'local': 63, 'rsvp': 46, 'nvp': 11, 'nsfnet': 85, 'ipproto-242': 242, 'sunnd': 77, 'ipxip': 111, 'tcp': 6, 'ipproto-148': 148, 'ipproto-149': 149, 'ipproto-146': 146, 'ipproto-147': 147, 'ipproto-144': 144, 'cphb': 73, 'ipproto-142': 142, 'ipproto-143': 143, 'ipproto-140': 140, 'ipproto-141': 141, 'ipproto-227': 227, 'ipproto-226': 226, 'ipproto-225': 225, 'ipproto-224': 224, 'satmon': 69, 'ipproto-222': 222, 'ipproto-221': 221, 'ipproto-194': 194, 'pc3': 34, 'emcon': 14, 'ipproto-229': 229, 'wsn': 74, 'idpr': 35, 'ipproto-218': 218, 'ipproto-191': 191, 'cftp': 62, 'pvp': 75, 'hop0': 114, 'ipproto-170': 170, 'sep': 33, 'ipproto-219': 219, 'pnni': 102, 'cpnx': 72, 'pim': 103, 'ipproto-228': 228, 'ipproto-233': 233, 'ipproto-234': 234, 'ipproto-235': 235, 'ipproto-139': 139, 'larp': 91, 'ipv6icmp': 58, 'compaq': 110, 'ipproto-232': 232, 'esp': 50, 'ipproto-133': 133, 'ipproto-132': 132, 'ipproto-131': 131, 'ddp': 37, 'ipproto-137': 137, 'mux': 18, 'ipproto-135': 135, 'ipproto-134': 134, 'vrrp': 112, 'ipwip': 94, 'ipproto-125': 125, 'ipproto-211': 211, 'wbmon': 78, 'dcn': 19, 'trunk1': 23, 'trunk2': 24, 'ipproto-198': 198, 'ggp': 3, 'distfs': 68, 'ipproto-169': 169, 'qnx': 106, 'wbexpak': 79, 'ipproto-209': 209, 'ipproto-208': 208, 'ipproto-244': 244, 'xnet': 15, 'ipproto-201': 201, 'ipproto-200': 200, 'ipproto-203': 203, 'ipproto-202': 202, 'pup': 12, 'ipproto-204': 204, 'ipproto-207': 207, 'ipproto-206': 206, 'ipproto-128': 128, 'ipproto-129': 129, 'xns': 22, 'ipproto-237': 237, 'rdp': 27, 'ipproto-120': 120, 'ipproto-121': 121, 'ipproto-122': 122, 'idprc': 38, 'ipproto-124': 124, 'argus': 13, 'ipproto-126': 126, 'ipproto-127': 127, 'ipproto-136': 136, 'ipproto-230': 230, 'idrp': 45, 'vmtp': 81, 'ipproto-116': 116, 'pgm': 113, 'ipproto-123': 123, 'ipproto-195': 195, 'isoip': 80, 'ipproto-197': 197, 'ipproto-196': 196, 'ippc': 67, 'ipproto-190': 190, 'ipproto-193': 193, 'ipproto-192': 192, 'ipproto-216': 216, 'ipproto-217': 217, 'ipproto-214': 214, 'ipproto-215': 215, 'ipproto-199': 199, 'tlsp': 56, 'ipproto-210': 210, 'igmp': 2, 'bbn': 10, 'ipproto-240': 240, 'ipproto-119': 119, 'ipproto-118': 118, 'ipproto-212': 212, 'ipproto-205': 205, 'ipproto-117': 117, 'swipe': 53, 'ipproto-241': 241, 'l2tp': 115, 'ipv6': 41, 'isotp4': 29, 'udp': 17, 'ipproto-189': 189, 'ipproto-213': 213, 'sprite': 90, 'ipproto-182': 182, 'mhrp': 48, 'ipproto-180': 180, 'ipproto-181': 181, 'hmp': 20, 'ipproto-187': 187, 'ipproto-184': 184, 'micp': 95, 'ippcp': 108, 'ipproto-249': 249, 'icmp': 1, 'ipproto-248': 248, 'ipproto-223': 223, 'ipproto-162': 162, 'ipproto-61': 61, 'mtp': 92, 'ipip': 4, 'ipproto-245': 245, 'eigrp': 88, 'ipv6route': 43, 'sdrp': 42, 'inlsp': 52, 'ipv6nonxt': 59, 'rvd': 66, 'prm': 21, 'ah': 51, 'ipproto-188': 188, 'brsatmon': 76, 'an': 107, 'il': 40, 'cbt': 7, 'ipproto-238': 238, 'ax25': 93, 'ifmp': 101, 'ospfigp': 89, 'sat': 64, 'ipproto-177': 177, 'ipproto-176': 176, 'ipproto-175': 175, 'ipproto-174': 174, 'encrypt': 99, 'ipproto-172': 172, 'ipproto-171': 171, 'igp': 9, 'etherip': 97, 'narp': 54, 'ipproto-179': 179, 'ipproto-178': 178, 'ipproto-251': 251, 'gre': 47, 'encap': 98, 'ipproto-183': 183, 'irtp': 28, 'ipproto-220': 220, 'gmtp': 100, 'ipproto-243': 243, 'ipproto-138': 138, 'ipproto-186': 186, 'ipv6frag': 44, 'ipproto-236': 236, 'dgp': 86, 'visa': 70, 'leaf1': 25, 'snp': 109, 'leaf2': 26, 'ipproto-173': 173, 'ipproto-185': 185, 'ipproto-231': 231, 'ipproto-164': 164, 'ipproto-165': 165, 'ipproto-166': 166, 'ipproto-167': 167, 'ipproto-160': 160, 'ipproto-161': 161, 'ipproto-151': 151, 'ipproto-163': 163, 'mobile': 55, 'scps': 105, 'ipproto-247': 247, 'egp': 8, 'ipproto-168': 168, 'kryptolan': 65, 'vines': 83, 'st': 5, 'ipcv': 71, 'ipproto-246': 246, 'dont-verify': 255, 'ipv6opts': 60.
                                               ipsecSaSrcPort 1.3.6.1.4.1.272.4.26.3.1.28 integer read-only
The source port this SA covers, 0 for any.
                                               ipsecSaDstPort 1.3.6.1.4.1.272.4.26.3.1.29 integer read-only
The destination port this SA covers, 0 for any.
                                               ipsecSaSeconds 1.3.6.1.4.1.272.4.26.3.1.30 integer read-only
The number of seconds since this SA was created.
                                               ipsecSaBytes 1.3.6.1.4.1.272.4.26.3.1.31 integer read-only
The amount of data in kilobytes protected by this SA.
                                               ipsecSaPackets 1.3.6.1.4.1.272.4.26.3.1.32 integer read-only
The number of packets protected by this SA.
                                               ipsecSaReplayErrors 1.3.6.1.4.1.272.4.26.3.1.33 integer read-only
The number of replayed packets detected for this SA.
                                               ipsecSaRecvErrors 1.3.6.1.4.1.272.4.26.3.1.34 integer read-only
The number of receive errors (replayed packets not counted) detected for this SA.
                                               ipsecSaDecryptErrors 1.3.6.1.4.1.272.4.26.3.1.35 integer read-only
The number of decryption errors (ESP only) detected for this SA.
                                       ikeSaTable 1.3.6.1.4.1.272.4.26.4 no-access
This table contains the list of currently active IKE security associations.
                                           ikeSaEntry 1.3.6.1.4.1.272.4.26.4.1 no-access
This object contains an IKE security association.
                                               ikeSaIndex 1.3.6.1.4.1.272.4.26.4.1.1 integer read-only
A unique index for this entry.
                                               ikeSaState 1.3.6.1.4.1.272.4.26.4.1.3 integer read-write
This object specifies the state of the SA. Possible values: negotiating(1), -- the SA is still being negotiated established(2), -- the SA negotiation is finished waiting-for-remove(3), -- the SA is waiting for removal delete(7) -- mark the SA for deletion. Enumeration: 'established': 2, 'waiting-for-remove': 3, 'negotiating': 1, 'delete': 7.
                                               ikeSaXchType 1.3.6.1.4.1.272.4.26.4.1.4 integer read-only
The exchange mode used to create the SA. Possible values: base(1), -- IKE base mode mode id-protect(2), -- IKE identity protection -- (oakley main mode) authentication-only(3), -- Authentication only mode aggressive(4), -- IKE (oakley) aggressive mode info(5), -- IKE informational exchange mode quick(32), -- IKE quick mode new-group(33), -- IKE new group mode any(256) -- Other mode. Enumeration: 'info': 5, 'base': 1, 'authentication-only': 3, 'quick': 32, 'new-group': 33, 'aggressive': 4, 'any': 256, 'id-protect': 2.
                                               ikeSaAuthMethod 1.3.6.1.4.1.272.4.26.4.1.5 integer read-only
The authenticatin method used when negotiating this SA. Possible values: pre-sh-key(1), -- Authentication using pre shared keys dss-sig(2), -- Authentication using DSS signatures rsa-sig(3), -- Authentication using RSA signatures rsa-enc(4) -- Authentication using RSA encryption. Enumeration: 'dss-sig': 2, 'pre-sh-key': 1, 'rsa-enc': 4, 'rsa-sig': 3.
                                               ikeSaAlgs 1.3.6.1.4.1.272.4.26.4.1.6 displaystring read-only
The names of the encryption and hash algorithm and of the prf.
                                               ikeSaRole 1.3.6.1.4.1.272.4.26.4.1.7 integer read-only
This object specifies by which side the SA negotiation was initiated. Possible values: true(1), -- this end initiated the SA negotiation false(2) -- the remote end initiated the SA negotiation. Enumeration: 'initiator': 1, 'responder': 2.
                                               ikeSaLocalId 1.3.6.1.4.1.272.4.26.4.1.8 displaystring read-only
The local ID used for authentication.
                                               ikeSaRemoteId 1.3.6.1.4.1.272.4.26.4.1.9 displaystring read-only
The remote ID used for authentication.
                                               ikeSaRemoteIp 1.3.6.1.4.1.272.4.26.4.1.11 ipaddress read-only
The remote IP address used in the IKE communication.
                                               ikeSaCookieI 1.3.6.1.4.1.272.4.26.4.1.12 octet string read-only
The cookie of the initiator.
                                               ikeSaCookieR 1.3.6.1.4.1.272.4.26.4.1.13 octet string read-only
The cookie of the responder.
                                               ikeSaTimes 1.3.6.1.4.1.272.4.26.4.1.14 displaystring read-only
The creation time and last used time of the SA in human readable format.
                                               ikeSaNumCerts 1.3.6.1.4.1.272.4.26.4.1.15 integer read-only
The number of certificates received from the remote side when negotiating this SA.
                                               ikeSaNumNegotiations 1.3.6.1.4.1.272.4.26.4.1.16 integer read-only
This object specifies the number of currently active negotiations for this SA.
                                               ikeSaBytes 1.3.6.1.4.1.272.4.26.4.1.17 integer read-only
Number of bytes transmitted using this SA.
                                               ikeSaMajVersion 1.3.6.1.4.1.272.4.26.4.1.18 integer read-only
The IKE major version number.
                                               ikeSaMinVersion 1.3.6.1.4.1.272.4.26.4.1.19 integer read-only
The IKE minor version number.
                                       ipsecPeerTable 1.3.6.1.4.1.272.4.26.5 no-access
This table contains the list of IPSec peers.
                                           ipsecPeerEntry 1.3.6.1.4.1.272.4.26.5.1 no-access
This object contains the description of an IPSec peer.
                                               ipsecPeerIndex 1.3.6.1.4.1.272.4.26.5.1.1 integer read-only
A unique index identifying this entry.
                                               ipsecPeerNextIndex 1.3.6.1.4.1.272.4.26.5.1.2 integer read-write
The index of the next peer in hierarchy.
                                               ipsecPeerDescription 1.3.6.1.4.1.272.4.26.5.1.3 displaystring read-write
An optional description for this peer.
                                               ipsecPeerPeerIds 1.3.6.1.4.1.272.4.26.5.1.5 displaystring read-write
The IDs of the peer which are accepted for authentication.
                                               ipsecPeerPeerAddress 1.3.6.1.4.1.272.4.26.5.1.6 ipaddress read-write
The IP-address of the peer.
                                               ipsecPeerLocalId 1.3.6.1.4.1.272.4.26.5.1.7 displaystring read-write
The local ID used for authentication.
                                               ipsecPeerLocalAddress 1.3.6.1.4.1.272.4.26.5.1.8 ipaddress read-write
The local address used for IPSec encrypted packets.
                                               ipsecPeerLocalCert 1.3.6.1.4.1.272.4.26.5.1.9 integer read-write
The index of the certificate used for local authentication in the certTable. Only useful for automatically keyed traffic with dsa or rsa authentication.
                                               ipsecPeerIkeProposals 1.3.6.1.4.1.272.4.26.5.1.10 integer read-write
The index of the first IKE proposal which may be used for IKE SA negotiation with this peer.
                                               ipsecPeerTrafficList 1.3.6.1.4.1.272.4.26.5.1.11 integer read-write
This object specifies the first entry of possibly a chain of traffic entries from the ipsecTrafficTable which should be protected with IPSec using this peer.
                                               ipsecPeerAuthMethod 1.3.6.1.4.1.272.4.26.5.1.20 integer read-write
The authentication method used. Possible values: pre-sh-key(1), -- Authentication using pre shared keys dss-sig(2), -- Authentication using DSS signatures rsa-sig(3), -- Authentication using RSA signatures rsa-enc(4), -- Authentication using RSA encryption default(14), -- Use the default settings from the -- ipsecGlobals table delete(15) -- mark this entry for deletion. Enumeration: 'pre-sh-key': 1, 'rsa-sig': 3, 'default': 14, 'dss-sig': 2, 'rsa-enc': 4, 'delete': 15.
                                               ipsecPeerPreSharedKey 1.3.6.1.4.1.272.4.26.5.1.21 displaystring read-write
The pre-shared-key used with this peer, if pre-shared-keys are used for authentication. This field serves only as an input field and its contents are replaced with a single asterisk immediately after it is set.
                                               ipsecPeerIkeGroup 1.3.6.1.4.1.272.4.26.5.1.22 integer read-write
The Group used for Diffie Hellman key agreement algorithm. Possible values: 0: use default value from ipsecGlobals table 1: a 768-bit MODP group 2: a 1024-bit MODP group 3: a GF[2^155] group 4: a GF[2^185] group 5: a 1536-bit MODP group
                                               ipsecPeerPfsGroup 1.3.6.1.4.1.272.4.26.5.1.23 integer read-write
The Diffie Hellman group used for additional Perfect Forward Secrecy (PFS) DH exponentiations. Possible values: -1: explicitly do not use PFS (overrides ipsecGlob2DefaultPfsGroup), 0: use default value from ipsecGlob2DefaultPfsGroup, 1: a 768-bit MODP group, 2: a 1024-bit MODP group, 5: a 1536-bit MODP group.
                                               ipsecPeerPh1Mode 1.3.6.1.4.1.272.4.26.5.1.24 integer read-write
This object specifies the exchange mode used for IKE SA negotiation. Possible values: id-protect(1), -- Use identity protection (main) mode aggressive(2), -- Use aggressive mode default(3) -- Use default settings from the -- ipsecGlobalsTable. Enumeration: 'default': 3, 'aggressive': 2, 'id-protect': 1.
                                               ipsecPeerIkeLifeTime 1.3.6.1.4.1.272.4.26.5.1.25 integer read-write
This object specifies an index in the ipsecLifeTimeTable. If the lifetime pointed to by this index does not exist or is inappropriate, the default lifetime from the ipsecGlobalsTable is used.
                                               ipsecPeerIpsecLifeTime 1.3.6.1.4.1.272.4.26.5.1.26 integer read-write
This object specifies an index in the ipsecLifeTimeTable. This lifetime overwrites the lifetimes specified for all traffic entries and their proposals referenced by this peer entry. If the lifetime pointed to by this index does not exist or is inappropriate, the default lifetime from the ipsecGlobalsTable is used.
                                               ipsecPeerKeepAlive 1.3.6.1.4.1.272.4.26.5.1.29 integer read-write
This object specifies whether IKE SA's with this peer are rekeyed even if there was no data transferred over them. Possible values: true(1), -- rekey SA's even if no data was transferred false(2) -- do not rekey SA's if no data was transferred. Enumeration: 'false': 2, 'true': 1.
                                               ipsecPeerGranularity 1.3.6.1.4.1.272.4.26.5.1.30 integer read-write
This object specifies the granularity with which SA's with this peer are created. Possible values: default(1), -- use the setting from the ipsecGlobalsTable coarse(2), -- Create only one SA for each Traffic entry ip(3), -- Create one SA for each host proto(4), -- Create one SA for each protocol and host port(5) -- Create one SA for each port and host. Enumeration: 'default': 1, 'ip': 3, 'port': 5, 'coarse': 2, 'proto': 4.
                                               ipsecPeerDontVerifyPad 1.3.6.1.4.1.272.4.26.5.1.31 integer read-write
This object is a compatibility option for older ipsec implementations. It enables or disables an old way of ESP padding (no self describing padding). Possible values: false(1), -- normal, self-describing ESP padding true(2) -- old style ESP padding. Enumeration: 'true': 2, 'false': 1.
                                               ipsecPeerDefaultIpsecProposals 1.3.6.1.4.1.272.4.26.5.1.42 integer read-write
The index of the default IPSec proposal used for encrypting all the traffic bound to the (optional) logical interface created for this peer.
                                               ipsecPeerPreSharedKeyData 1.3.6.1.4.1.272.4.26.5.1.63 octet string no-access
Field used for storing the pre-shared-key permanently.
                                       ikeProposalTable 1.3.6.1.4.1.272.4.26.6 no-access
This table contains the list of IKE proposals. The entries may be concatenated on a logical or basis using the NextChoice field to choices of multiple proposals.
                                           ikeProposalEntry 1.3.6.1.4.1.272.4.26.6.1 no-access
This object contains an IKE proposal, i.e. the encryption algorithm and the hash algorithm used to protect traffic sent over an IKE SA.
                                               ikePropIndex 1.3.6.1.4.1.272.4.26.6.1.1 integer read-only
A unique index identifying this entry.
                                               ikePropNextChoice 1.3.6.1.4.1.272.4.26.6.1.2 integer read-write
This object specifies the index of the next proposal of a choice of proposals. If this object is 0, this marks the end of a proposal chain.
                                               ikePropDescription 1.3.6.1.4.1.272.4.26.6.1.3 displaystring read-write
An optional textual description of the proposal chain beginning at this entry.
                                               ikePropEncAlg 1.3.6.1.4.1.272.4.26.6.1.4 integer read-write
This object specifies the encryption algorithm used to protect traffic sent over an IKE SA. Possible values: none(1), -- No encryption applied des-cbc(2), -- DES in CBC mode des3-cbc(3), -- Triple DES in CBC mode blowfish-cbc(4), -- Blowfish in CBC mode cast128-cbc(5) -- CAST in CBC mode with 128 bit key. Enumeration: 'cast128-cbc': 5, 'none': 1, 'blowfish-cbc': 4, 'des3-cbc': 3, 'des-cbc': 2.
                                               ikePropHashAlg 1.3.6.1.4.1.272.4.26.6.1.5 integer read-write
This object specifies the hash algorithm used to protect traffic sent over an IKE SA. Possible values: delete(1), -- Delete this entry none(2), -- No hash algorithm md5(3), -- The MD5 hash algorithm sha1(4), -- The Secure Hash Algorithm. Enumeration: 'sha1': 4, 'none': 2, 'md5': 3, 'delete': 1.
                                       ipsecTrafficTable 1.3.6.1.4.1.272.4.26.7 no-access
This table contains lists of Traffic and the actions which should be applied to it, together with the necessary parameters.
                                           ipsecTrafficEntry 1.3.6.1.4.1.272.4.26.7.1 no-access
This object contains a description of a type of IP traffic and the action which should be applied to it together with the necessary parameters.
                                               ipsecTrIndex 1.3.6.1.4.1.272.4.26.7.1.1 integer read-only
A unique index identifying this entry.
                                               ipsecTrNextIndex 1.3.6.1.4.1.272.4.26.7.1.2 integer read-write
This object specifies the index of the next traffic entry in hierarchy.
                                               ipsecTrDescription 1.3.6.1.4.1.272.4.26.7.1.3 displaystring read-write
An optional human readable description for this traffic entry.
                                               ipsecTrLocalAddress 1.3.6.1.4.1.272.4.26.7.1.4 ipaddress read-write
The source IP-address of this traffic entry. It maybe either a single address, a network address (in combination with ipsecTrSrcMask), or the first address of an address range (in combination with ipsecTrLocalRange).
                                               ipsecTrLocalMaskLen 1.3.6.1.4.1.272.4.26.7.1.5 integer read-write
The length of the network mask for a source network.
                                               ipsecTrLocalRange 1.3.6.1.4.1.272.4.26.7.1.6 ipaddress read-write
The last address of a source address range. If this field is nonzero, the ipsecTrLocalMaskLen field is ignored and the source is considered as a range of addresses beginning with ipsecTrLocalAddress and ending with ipsecTrLocalRange.
                                               ipsecTrRemoteAddress 1.3.6.1.4.1.272.4.26.7.1.7 ipaddress read-write
The destination IP-address of this traffic entry. It maybe either a single address, a network address (in combination with ipsecTrDstMask), or the first address of an address range (in combination with ipsecTrRemoteRange).
                                               ipsecTrRemoteMaskLen 1.3.6.1.4.1.272.4.26.7.1.8 integer read-write
The length of the network mask for a destination network.
                                               ipsecTrRemoteRange 1.3.6.1.4.1.272.4.26.7.1.9 ipaddress read-write
The last address of a destination address range. If this field is nonzero, the ipsecTrRemoteMaskLen field is ignored and the source is considered as a range of addresses beginning with ipsecTrRemoteAddress and ending with ipsecTrRemoteRange.
                                               ipsecTrProto 1.3.6.1.4.1.272.4.26.7.1.10 integer read-write
The transport protocol defined for this entry. Enumeration: 'ipproto-239': 239, 'ipproto-130': 130, 'mfe': 31, 'skip': 57, 'ttp': 84, 'merit': 32, 'chaos': 16, 'ipproto-159': 159, 'ipproto-158': 158, 'netblt': 30, 'tcf': 87, 'ipproto-150': 150, 'ipproto-153': 153, 'ipproto-152': 152, 'ipproto-155': 155, 'ipproto-154': 154, 'ipproto-157': 157, 'ipproto-156': 156, 'ipproto-252': 252, 'ipproto-253': 253, 'ipproto-250': 250, 'ipproto-145': 145, 'ipproto-254': 254, 'xtp': 36, 'scc': 96, 'tp': 39, 'securevmtp': 82, 'aris': 104, 'bna': 49, 'local': 63, 'rsvp': 46, 'nvp': 11, 'nsfnet': 85, 'ipproto-242': 242, 'sunnd': 77, 'ipxip': 111, 'tcp': 6, 'ipproto-148': 148, 'ipproto-149': 149, 'ipproto-146': 146, 'ipproto-147': 147, 'ipproto-144': 144, 'cphb': 73, 'ipproto-142': 142, 'ipproto-143': 143, 'ipproto-140': 140, 'ipproto-141': 141, 'ipproto-227': 227, 'ipproto-226': 226, 'ipproto-225': 225, 'ipproto-224': 224, 'satmon': 69, 'ipproto-222': 222, 'ipproto-221': 221, 'ipproto-194': 194, 'pc3': 34, 'emcon': 14, 'ipproto-229': 229, 'wsn': 74, 'idpr': 35, 'ipproto-218': 218, 'ipproto-191': 191, 'cftp': 62, 'pvp': 75, 'hop0': 114, 'ipproto-170': 170, 'sep': 33, 'ipproto-219': 219, 'pnni': 102, 'cpnx': 72, 'pim': 103, 'ipproto-228': 228, 'ipproto-233': 233, 'ipproto-234': 234, 'ipproto-235': 235, 'ipproto-139': 139, 'larp': 91, 'ipv6icmp': 58, 'compaq': 110, 'ipproto-232': 232, 'esp': 50, 'ipproto-133': 133, 'ipproto-132': 132, 'ipproto-131': 131, 'ddp': 37, 'ipproto-137': 137, 'mux': 18, 'ipproto-135': 135, 'ipproto-134': 134, 'vrrp': 112, 'ipwip': 94, 'ipproto-125': 125, 'ipproto-211': 211, 'wbmon': 78, 'dcn': 19, 'trunk1': 23, 'trunk2': 24, 'ipproto-198': 198, 'ggp': 3, 'distfs': 68, 'ipproto-169': 169, 'qnx': 106, 'wbexpak': 79, 'ipproto-209': 209, 'ipproto-208': 208, 'ipproto-244': 244, 'xnet': 15, 'ipproto-201': 201, 'ipproto-200': 200, 'ipproto-203': 203, 'ipproto-202': 202, 'pup': 12, 'ipproto-204': 204, 'ipproto-207': 207, 'ipproto-206': 206, 'ipproto-128': 128, 'ipproto-129': 129, 'xns': 22, 'ipproto-237': 237, 'rdp': 27, 'ipproto-120': 120, 'ipproto-121': 121, 'ipproto-122': 122, 'idprc': 38, 'ipproto-124': 124, 'argus': 13, 'ipproto-126': 126, 'ipproto-127': 127, 'ipproto-136': 136, 'ipproto-230': 230, 'idrp': 45, 'vmtp': 81, 'ipproto-116': 116, 'pgm': 113, 'ipproto-123': 123, 'ipproto-195': 195, 'isoip': 80, 'ipproto-197': 197, 'ipproto-196': 196, 'ippc': 67, 'ipproto-190': 190, 'ipproto-193': 193, 'ipproto-192': 192, 'ipproto-216': 216, 'ipproto-217': 217, 'ipproto-214': 214, 'ipproto-215': 215, 'ipproto-199': 199, 'tlsp': 56, 'ipproto-210': 210, 'igmp': 2, 'bbn': 10, 'ipproto-240': 240, 'ipproto-119': 119, 'ipproto-118': 118, 'ipproto-212': 212, 'ipproto-205': 205, 'ipproto-117': 117, 'swipe': 53, 'ipproto-241': 241, 'l2tp': 115, 'ipv6': 41, 'isotp4': 29, 'udp': 17, 'ipproto-189': 189, 'ipproto-213': 213, 'sprite': 90, 'ipproto-182': 182, 'mhrp': 48, 'ipproto-180': 180, 'ipproto-181': 181, 'hmp': 20, 'ipproto-187': 187, 'ipproto-184': 184, 'micp': 95, 'ippcp': 108, 'ipproto-249': 249, 'icmp': 1, 'ipproto-248': 248, 'ipproto-223': 223, 'ipproto-162': 162, 'ipproto-61': 61, 'mtp': 92, 'ipip': 4, 'ipproto-245': 245, 'eigrp': 88, 'ipv6route': 43, 'sdrp': 42, 'inlsp': 52, 'ipv6nonxt': 59, 'rvd': 66, 'prm': 21, 'ah': 51, 'ipproto-188': 188, 'brsatmon': 76, 'an': 107, 'il': 40, 'cbt': 7, 'ipproto-238': 238, 'ax25': 93, 'ifmp': 101, 'ospfigp': 89, 'sat': 64, 'ipproto-177': 177, 'ipproto-176': 176, 'ipproto-175': 175, 'ipproto-174': 174, 'encrypt': 99, 'ipproto-172': 172, 'ipproto-171': 171, 'igp': 9, 'etherip': 97, 'narp': 54, 'ipproto-179': 179, 'ipproto-178': 178, 'ipproto-251': 251, 'gre': 47, 'encap': 98, 'ipproto-183': 183, 'irtp': 28, 'ipproto-220': 220, 'gmtp': 100, 'ipproto-243': 243, 'ipproto-138': 138, 'ipproto-186': 186, 'ipv6frag': 44, 'ipproto-236': 236, 'dgp': 86, 'visa': 70, 'leaf1': 25, 'snp': 109, 'leaf2': 26, 'ipproto-173': 173, 'ipproto-185': 185, 'ipproto-231': 231, 'ipproto-164': 164, 'ipproto-165': 165, 'ipproto-166': 166, 'ipproto-167': 167, 'ipproto-160': 160, 'ipproto-161': 161, 'ipproto-151': 151, 'ipproto-163': 163, 'mobile': 55, 'scps': 105, 'ipproto-247': 247, 'egp': 8, 'ipproto-168': 168, 'kryptolan': 65, 'vines': 83, 'st': 5, 'ipcv': 71, 'ipproto-246': 246, 'dont-verify': 255, 'ipv6opts': 60.
                                               ipsecTrLocalPort 1.3.6.1.4.1.272.4.26.7.1.11 integer read-write
The source port defined for this traffic entry.
                                               ipsecTrRemotePort 1.3.6.1.4.1.272.4.26.7.1.12 integer read-write
The destination port defined for this traffic entry.
                                               ipsecTrAction 1.3.6.1.4.1.272.4.26.7.1.13 integer read-write
The action to be applied to traffic matching this entry. Possible values: delete(1), -- Delete this entry always-plain(2), -- Forward the packets without -- protection even if there is a -- matching SA and independent from -- the position of the traffic entry -- in the list. pass(3), -- Forward the packets without -- protection protect(4), -- Protect the traffic as specified -- in the proposal. Drop unprotected -- traffic of this kind. drop(5) -- Drop all packets matching this -- traffic entry. Enumeration: 'always-plain': 2, 'drop': 5, 'protect': 4, 'pass': 3, 'delete': 1.
                                               ipsecTrProposal 1.3.6.1.4.1.272.4.26.7.1.14 integer read-write
This object specifies an index in the ipsecProposalTable. This may be the first proposal of possibly a choice of multiple, optionally nested proposals which is to be offered with IKE (automatic keying) or a manual proposal (manual keying).
                                               ipsecTrForceTunnelMode 1.3.6.1.4.1.272.4.26.7.1.15 integer read-write
This object specifies the strategy when transport mode is used. By default, the system always uses transport mode, if possible. If this variable is set to true, always tunnel mode will be used for this traffic entry, even if source and destination address match the tunnel endpoints. Possible values: true(1), -- Use tunnel mode even if transport mode is possible false(2) -- Use transport mode whenever possible. Enumeration: 'false': 2, 'true': 1.
                                               ipsecTrLifeTime 1.3.6.1.4.1.272.4.26.7.1.16 integer read-write
This object specifies an index in the ipsecLifeTimeTable. This lifetime overwrites the lifetimes specified for all proposals referenced by this traffic entry. It may itself be overwritten by an explicit lifetime specified for the peer entry referencing this traffic entry. If the lifetime pointed to by this index does not exist or is inappropriate, the default lifetime from the ipsecGlobalsTable is used.
                                               ipsecTrGranularity 1.3.6.1.4.1.272.4.26.7.1.17 integer read-write
This object specifies the granularity with which SA's must be created for this kind of traffic. Possible values: default(1), -- use the setting from the ipsecPeerTable coarse(2), -- Create only one SA for each Traffic entry ip(3), -- Create one SA for each host proto(4), -- Create one SA for each protocol and host port(5) -- Create one SA for each port and host. Enumeration: 'default': 1, 'ip': 3, 'port': 5, 'coarse': 2, 'proto': 4.
                                               ipsecTrKeepAlive 1.3.6.1.4.1.272.4.26.7.1.18 integer read-write
This object specifies whether SA's created for this kind of traffic should be rekeyed on expiration of soft lifetimes even if there has not been sent any traffic over them. Possible values: true(1), -- rekey SA's even if no data was transferred false(2), -- do not rekey SA's if no data was transferred default(3) -- use the default setting from the peer entry -- referencing this traffic entry. Enumeration: 'default': 3, 'false': 2, 'true': 1.
                                       ipsecProposalTable 1.3.6.1.4.1.272.4.26.8 no-access
This table contains the list of IPSec proposals. The entries may be concatenated on a logical 'or' or a logical 'and' basis -depending on the setting of the 'BoolOp' field- using the 'Next' field. This makes the configuration of multiple choices of proposal bundles possible. Possible concatenation: (proposal1 or propsal2 or ... proposaln) and (proposal1 or propsal2 or ... proposaln) and : : (proposal1 or propsal2 or ... proposaln) This table also includes manually keyed security associations, which may not be concatenated to choices with BoolOp set to 'or'
                                           ipsecProposalEntry 1.3.6.1.4.1.272.4.26.8.1 no-access
This object contains an IPSec proposal, i.e. a proposed set of security parameters applied to traffic sent over an IPSec security association.
                                               ipsecPropIndex 1.3.6.1.4.1.272.4.26.8.1.1 integer read-only
A unique index for this entry.
                                               ipsecPropNext 1.3.6.1.4.1.272.4.26.8.1.2 integer read-write
The index of the next Proposal in the actual chain.
                                               ipsecPropBoolOp 1.3.6.1.4.1.272.4.26.8.1.3 integer read-write
This object specifies how the proposal referenced by Next should be concatenated. Possible values: delete(1), -- Delete this entry or(2), -- Concatenation with logical 'or' and(3) -- Concatenation with logical 'and'. Enumeration: 'and': 3, 'or': 2, 'delete': 1.
                                               ipsecPropDescription 1.3.6.1.4.1.272.4.26.8.1.4 displaystring read-write
An optional human readable description for this proposal.
                                               ipsecPropProto 1.3.6.1.4.1.272.4.26.8.1.6 integer read-write
The security protocol to apply. Possible values: esp(1), -- Encapsulating Security Payload ah(2) -- Authentication Header. Enumeration: 'ah': 2, 'esp': 1.
                                               ipsecPropEncAlg 1.3.6.1.4.1.272.4.26.8.1.7 integer read-write
The encryption algorithm to apply, if any. Possible values: none(1), -- No encryption applied des-cbc(2), -- DES in CBC mode des3-cbc(3), -- Triple DES in CBC mode blowfish(4), -- Blowfish in CBC mode cast128-cbc(5) -- CAST with 128 bit key in CBC mode. Enumeration: 'cast128-cbc': 5, 'none': 1, 'blowfish-cbc': 4, 'des3-cbc': 3, 'des-cbc': 2.
                                               ipsecPropAuthAlg 1.3.6.1.4.1.272.4.26.8.1.8 integer read-write
The hmac algorithm to use for authentication, if any. Possible values: none(2), -- No hmac md5-96(4), -- Use the MD5 hash algorithm with 96 bit -- output sha1-96(6) -- Use the Secure Hash Algorithm with 96 bit -- output. Enumeration: 'none': 2, 'sha1-96': 6, 'md5-96': 4.
                                               ipsecPropLifeTime 1.3.6.1.4.1.272.4.26.8.1.10 integer read-write
The index in the ipsecLifeTimeTable containing the lifetime values ued for an SA created from this proposal. This field may be overwritten by an explicit lifetime specified for the traffic entry which references this proposal entry, or by an explicit lifetime specified for the peer entry referencing that traffic entry. If this field is empty or points to a nonexistent or inappropriate lifetime entry, the default life time from the ipsecGlobalsTable is used.
                                               ipsecPropInSpi 1.3.6.1.4.1.272.4.26.8.1.11 hexvalue read-write
This object specifies the Security Parameters Index (SPI) which should be used for the inbound SA of a manually keyed Proposal. The SPI is used to distinguish between multiple IPSec connections to the same peer with the same security protocol. The outbound SPI of the remote sides' corresponding proposal entry has to be equal to this value. This object is ignored for automatically keyed SAs, as it is chosen randomly by the initiator.
                                               ipsecPropOutSpi 1.3.6.1.4.1.272.4.26.8.1.12 hexvalue read-write
This object specifies the Security Parameters Index (SPI) which should be used for the outbound SA of a manually keyed Proposal. The SPI is used to distinguish between multiple IPSec connections to the same peer with the same security protocol. The inbound SPI of the remote sides' corresponding proposal entry has to be equal to this value. This object is ignored for automatically keyed SAs, as it is chosen randomly by the initiator.
                                               ipsecPropEncKeyIn 1.3.6.1.4.1.272.4.26.8.1.14 displaystring read-write
This object serves as an input field for the inbound encryption key used with manually keyed SAs. Its contents are reset to a single asterisk immediately after the set operation (or input via the console). It is not evaluated for automatic proposals or for proposals which do not require an encryption key.
                                               ipsecPropEncKeyOut 1.3.6.1.4.1.272.4.26.8.1.15 displaystring read-write
This object serves as an input field for the outbound encryption key used with manually keyed SAs. Its contents are reset to a single asterisk immediately after the set operation (or input via the console). It is not evaluated for automatic proposals or for proposals which do not require an encryption key.
                                               ipsecPropAuthKeyIn 1.3.6.1.4.1.272.4.26.8.1.17 displaystring read-write
This object serves as an input field for the inbound authentication key used with manually keyed SAs. Its contents are reset to a single asterisk immediately after the set operation (or input via the console). It is not evaluated for automatic proposals or for proposals which do not require an authentication key.
                                               ipsecPropAuthKeyOut 1.3.6.1.4.1.272.4.26.8.1.18 displaystring read-write
This object serves as an input field for the outbound authentication key used with manually keyed SAs. Its contents are reset to a single asterisk immediately after the set operation (or input via the console). It is not evaluated for automatic proposals or for proposals which do not require an authentication key.
                                               ipsecPropEncKeyDataIn 1.3.6.1.4.1.272.4.26.8.1.33 octet string no-access
                                               ipsecPropEncKeyDataOut 1.3.6.1.4.1.272.4.26.8.1.34 octet string no-access
                                               ipsecPropAuthKeyDataIn 1.3.6.1.4.1.272.4.26.8.1.35 octet string no-access
                                               ipsecPropAuthKeyDataOut 1.3.6.1.4.1.272.4.26.8.1.36 octet string no-access
                                       ipsecLifeTimeTable 1.3.6.1.4.1.272.4.26.9 no-access
This table contains the list of defined lifetimes for IPsec and IKE SAs.
                                           ipsecLifeTimeEntry 1.3.6.1.4.1.272.4.26.9.1 no-access
This object contains a lifetime, i.e. the soft and hard expiry limits for IPsec and IKE SA's.
                                               ipsecLifeIndex 1.3.6.1.4.1.272.4.26.9.1.1 integer read-only
A unique index identifying this entry.
                                               ipsecLifeType 1.3.6.1.4.1.272.4.26.9.1.2 integer read-write
This object specifies the type of a lifetime entry. Enumeration: 'generic': 2, 'delete': 1.
                                               ipsecLifeSoftKb 1.3.6.1.4.1.272.4.26.9.1.3 integer read-write
The maximum amount of data (in KB) which may be protected by an SA before it is refreshed.
                                               ipsecLifeSoftSec 1.3.6.1.4.1.272.4.26.9.1.4 integer read-write
The maximum time (in seconds) after which an SA will be refreshed,.
                                               ipsecLifeHardKb 1.3.6.1.4.1.272.4.26.9.1.5 integer read-write
The maximum amount of data (in KB) which may be protected by an SA before it is deleted.
                                               ipsecLifeHardSec 1.3.6.1.4.1.272.4.26.9.1.6 integer read-write
The maximum time (in seconds) after which an SA will be refreshed,.
                                       ipsecStats 1.3.6.1.4.1.272.4.26.10
                                             ipsecStatsCurrentIkeSas 1.3.6.1.4.1.272.4.26.10.1 integer read-only
Current number of IKE SA's.
                                             ipsecStatsCurrentIpsecSas 1.3.6.1.4.1.272.4.26.10.2 integer read-only
Current number of IPSec SA's.
                                             ipsecStatsIp 1.3.6.1.4.1.272.4.26.10.3 integer read-only
Number of IP packets processed.
                                             ipsecStatsNonIp 1.3.6.1.4.1.272.4.26.10.4 integer read-only
Number of non-IP packets processed.
                                             ipsecStatsAh 1.3.6.1.4.1.272.4.26.10.5 integer read-only
Number of AH packets processed.
                                             ipsecStatsEsp 1.3.6.1.4.1.272.4.26.10.6 integer read-only
Number of ESP packets processed.
                                             ipsecStatsDrop 1.3.6.1.4.1.272.4.26.10.7 integer read-only
Number of packets dropped.
                                             ipsecStatsPass 1.3.6.1.4.1.272.4.26.10.8 integer read-only
Number of packets passed plain.
                                             ipsecStatsTrig 1.3.6.1.4.1.272.4.26.10.9 integer read-only
Number of packets which triggered an IKE negotiation.
                                             ipsecStatsFragPkt 1.3.6.1.4.1.272.4.26.10.10 integer read-only
Number of partial packets currently being reassembled.
                                             ipsecStatsFragBytes 1.3.6.1.4.1.272.4.26.10.11 integer read-only
Total size of the partial packets currently being reassembled.
                                             ipsecStatsFragNonfirst 1.3.6.1.4.1.272.4.26.10.12 integer read-only
Number of non-first fragments currently queued.
                                       ipsecGlobalsContinued 1.3.6.1.4.1.272.4.26.11
                                             ipsecGlobContPreIpsecRules 1.3.6.1.4.1.272.4.26.11.1 integer read-write
This object specifies an index in the IPsec traffic table containing a list of traffic definitions which has to be considered prior to the traffic lists of the IPSec peers in IPSec traffic processing. It may contain either pass or drop entries (protect entries are ignored, if erroneously configured).
                                             ipsecGlobContDefaultRule 1.3.6.1.4.1.272.4.26.11.2 integer read-write
This object specifies how to treat packets which do not match any entry in the traffic lists of the active peers. Possible values: drop(1), -- drop all packets pass(2) -- allow all packets pass plain. Enumeration: 'drop': 1, 'pass': 2.