Wellfleet-IPSEC-MIB: View SNMP OID List / Download MIB

VENDOR: WELLFLEET


 Home MIB: Wellfleet-IPSEC-MIB
Download as:   

Download standard MIB format if you are planning to load a MIB file into some system (OS, Zabbix, PRTG ...) or view it with a MIB browser. CSV is more suitable for analyzing and viewing OID' and other MIB objects in excel. JSON and YAML formats are usually used in programing even though some systems can use MIB in YAML format (like Logstash).
Keep in mind that standard MIB files can be successfully loaded by systems and programs only if all the required MIB's from the "Imports" section are already loaded.
The tree-like SNMP object navigator requires no explanations because it is very simple to use. And if you stumbled on this MIB from Google note that you can always go back to the home page if you need to perform another MIB or OID lookup.


Object Name OID Type Access Info
 wfIpsecBase 1.3.6.1.4.1.18.3.5.3.26.1
     wfIpsecBaseCreate 1.3.6.1.4.1.18.3.5.3.26.1.1 integer read-write
Create/Delete parameter. Default is created. Users perform a set operation on this object in order to create/delete IPSec. Enumeration: 'deleted': 2, 'created': 1.
     wfIpsecBaseEnable 1.3.6.1.4.1.18.3.5.3.26.1.2 integer read-write
Enable/Disable parameter. Default is enabled. Users perform a set operation on this object in order to enable/disable IPSec. Enumeration: 'disabled': 2, 'enabled': 1.
     wfIpsecBaseState 1.3.6.1.4.1.18.3.5.3.26.1.3 integer read-only
The current state of IPsec. Enumeration: 'down': 2, 'notpresent': 3, 'up': 1.
     wfIpsecBaseEspEncipherEnable 1.3.6.1.4.1.18.3.5.3.26.1.4 integer read-write
Used to control the whether ESP enciphers packets or not. Set this attribute to disable for debugging purposes only. When set to disabled, packets that match a policy that uses ESP to encipher the payload will not be enciphered. This allows one to view the plaintext inner headers for debugging purposes. Enumeration: 'disabled': 2, 'enabled': 1.
     wfIpsecBaseMaxManualSpi 1.3.6.1.4.1.18.3.5.3.26.1.5 integer read-write
The maximum SPI value that will be accepted for manually configured SAs. The SA values 0 - 255 is reserved. To enter this value add the number of SAs belonging to a particular IPSec protocol ex ESP to 255. The default value is maximum of 32 unique ESP SAs. The value 255 will cause no manual SAs supported
 wfIpsecSelectorInTable 1.3.6.1.4.1.18.3.5.3.26.2 no-access
A table of selectors used to identify which IP security policy should be applied to a packet.
     wfIpsecSelectorInEntry 1.3.6.1.4.1.18.3.5.3.26.2.1 no-access
IP Security Selectors for a policy
         wfIpsecSelectorInCreate 1.3.6.1.4.1.18.3.5.3.26.2.1.1 integer read-write
Defines the existence of the policy's selectors: created - instance exists delete - instance should be deleted. Enumeration: 'deleted': 2, 'created': 1.
         wfIpsecSelectorInEnable 1.3.6.1.4.1.18.3.5.3.26.2.1.2 integer read-write
Defines whether or not the policy should be used: enabled - activate the policy's selectors. disabled - deactivate the policy's selectors. Enumeration: 'disabled': 2, 'enabled': 1.
         wfIpsecSelectorInStatus 1.3.6.1.4.1.18.3.5.3.26.2.1.3 integer read-only
Defines the current status of the this instance: up: this instance is in use down: this instance is misconfigured inactive: this instance is disabled notpresent: the IPsec code isn't loaded Enumeration: 'down': 2, 'notpresent': 4, 'inactive': 3, 'up': 1.
         wfIpsecSelectorInCounter 1.3.6.1.4.1.18.3.5.3.26.2.1.4 counter read-only
The number of received packets that have matched the selectors.
         wfIpsecSelectorInDefinition 1.3.6.1.4.1.18.3.5.3.26.2.1.5 opaque read-write
The policy's selector definition.
         wfIpsecSelectorInReserved 1.3.6.1.4.1.18.3.5.3.26.2.1.6 integer read-only
Reserved field.
         wfIpsecSelectorInInterface 1.3.6.1.4.1.18.3.5.3.26.2.1.7 ipaddress read-only
The network address of the IP interface to which the corresponding policy is applied.
         wfIpsecSelectorInCircuit 1.3.6.1.4.1.18.3.5.3.26.2.1.8 integer read-only
The ID of the Circuit to which the corresponding policy is applied.
         wfIpsecSelectorInPolicyNumber 1.3.6.1.4.1.18.3.5.3.26.2.1.9 integer read-only
ID policy's selectors.
         wfIpsecSelectorInFragment 1.3.6.1.4.1.18.3.5.3.26.2.1.10 integer read-only
Fragment number - for large sets of selectors.
         wfIpsecSelectorInName 1.3.6.1.4.1.18.3.5.3.26.2.1.11 displaystring read-write
name of this instance of selectors.
 wfIpsecSelectorOutTable 1.3.6.1.4.1.18.3.5.3.26.3 no-access
A table of selectors used to identify which IP security policy should be applied to a packet.
     wfIpsecSelectorOutEntry 1.3.6.1.4.1.18.3.5.3.26.3.1 no-access
IP Security Selectors for a policy
         wfIpsecSelectorOutCreate 1.3.6.1.4.1.18.3.5.3.26.3.1.1 integer read-write
Defines the existence of the policy's selectors: created - instance exists delete - instance should be deleted. Enumeration: 'deleted': 2, 'created': 1.
         wfIpsecSelectorOutEnable 1.3.6.1.4.1.18.3.5.3.26.3.1.2 integer read-write
Defines whether or not the policy should be used: enabled - activate the policy's selectors. disabled - deactivate the policy's selectors. Enumeration: 'disabled': 2, 'enabled': 1.
         wfIpsecSelectorOutStatus 1.3.6.1.4.1.18.3.5.3.26.3.1.3 integer read-only
Defines the current status of the this instance: up: this instance is in use down: this instance is misconfigured inactive: this instance is disabled notpresent: the IPsec code isn't loaded Enumeration: 'down': 2, 'notpresent': 4, 'inactive': 3, 'up': 1.
         wfIpsecSelectorOutCounter 1.3.6.1.4.1.18.3.5.3.26.3.1.4 counter read-only
The number of received packets that have matched the selectors.
         wfIpsecSelectorOutDefinition 1.3.6.1.4.1.18.3.5.3.26.3.1.5 opaque read-write
The policy's selector definition.
         wfIpsecSelectorOutReserved 1.3.6.1.4.1.18.3.5.3.26.3.1.6 integer read-only
Reserved field.
         wfIpsecSelectorOutInterface 1.3.6.1.4.1.18.3.5.3.26.3.1.7 ipaddress read-only
The network address of the IP interface to which the corresponding policy is applied.
         wfIpsecSelectorOutCircuit 1.3.6.1.4.1.18.3.5.3.26.3.1.8 integer read-only
The ID of the Circuit to which the corresponding policy is applied.
         wfIpsecSelectorOutPolicyNumber 1.3.6.1.4.1.18.3.5.3.26.3.1.9 integer read-only
ID policy's selectors.
         wfIpsecSelectorOutFragment 1.3.6.1.4.1.18.3.5.3.26.3.1.10 integer read-only
Fragment number - for large sets of selectors.
         wfIpsecSelectorOutName 1.3.6.1.4.1.18.3.5.3.26.3.1.11 displaystring read-write
name of this instance of selectors.
 wfIpsecDescriptorTable 1.3.6.1.4.1.18.3.5.3.26.4 no-access
Table of IP security descriptors
     wfIpsecDescriptorEntry 1.3.6.1.4.1.18.3.5.3.26.4.1 no-access
An IP security Descriptor
         wfIpsecDescriptorCreate 1.3.6.1.4.1.18.3.5.3.26.4.1.1 integer read-write
Create/Delete parameter. Default is created. Enumeration: 'deleted': 2, 'created': 1.
         wfIpsecDescriptorStatus 1.3.6.1.4.1.18.3.5.3.26.4.1.2 integer read-only
The status of this instance: up: this instance is in use down: this instance is misconfigured inactive: this instance is disabled notpresent: the IPsec code isn't loaded Enumeration: 'down': 2, 'notpresent': 4, 'inactive': 3, 'up': 1.
         wfIpsecDescriptorPolicyNumber 1.3.6.1.4.1.18.3.5.3.26.4.1.3 integer read-only
Allows instance of wfIpsecSelectorOutEntry to be matched with this instance.
         wfIpsecDescriptorInterface 1.3.6.1.4.1.18.3.5.3.26.4.1.4 ipaddress read-only
The IP address of the security gateway which this descriptor belongs to.
         wfIpsecDescriptorCircuit 1.3.6.1.4.1.18.3.5.3.26.4.1.5 integer read-only
The ID of the Circuit to which this instance applies.
         wfIpsecDescriptorManualSaList 1.3.6.1.4.1.18.3.5.3.26.4.1.6 opaque read-write
the octet string represents an ordered list of Security Associations (SAs). the format of each 9 byte sequence is: ------------+-----------+-----------+------------+----------- | protocol | Peer IP Address | ------------+-----------+-----------+------------+----------- | SPI | ------------+-----------+-----------+------------+
         wfIpsecDescriptorSaMode 1.3.6.1.4.1.18.3.5.3.26.4.1.7 integer read-write
Identifies mode of the SA for this policy. Enumeration: 'tunnel': 1, 'transport': 2.
         wfIpsecDescriptorPfs 1.3.6.1.4.1.18.3.5.3.26.4.1.8 integer read-write
Identifies whether perfect forward secrecy is required or not. Enumeration: 'false': 2, 'true': 1.
         wfIpsecDescriptorProposals 1.3.6.1.4.1.18.3.5.3.26.4.1.9 opaque read-write
the octet string represents an ordered list of proposals. Every 2 octets in the string contains a number which corresponds to an instance I.D. of wfIpsecProposalEntry. The list of proposals is a logically ORed list.
         wfIpsecDescriptorSourceForDestAddr 1.3.6.1.4.1.18.3.5.3.26.4.1.10 integer read-write
The source for the destination IP address value to be used in the SA. 'packet' limits use of the SA to those packets which have a matching IP addr even if the policy permits a range. 'policy' allows more than one traffic flow to use the SA if the policy permits a range of IP addresses. Enumeration: 'policy': 2, 'packet': 1.
         wfIpsecDescriptorSourceForSrcAddr 1.3.6.1.4.1.18.3.5.3.26.4.1.11 integer read-write
The source for the destination IP address value to be used in the SA. 'packet' limits use of the SA to those packets which have a matching IP addr even if the policy permits a range. 'policy' allows more than one traffic flow to use the SA if the policy permits a range of IP addresses. Enumeration: 'policy': 2, 'packet': 1.
         wfIpsecDescriptorSourceForProtocol 1.3.6.1.4.1.18.3.5.3.26.4.1.12 integer read-write
The source for the destination IP address value to be used in the SA. 'packet' limits use of the SA to those packets which have a matching IP addr even if the policy permits a range. 'policy' allows more than one traffic flow to use the SA if the policy permits a range of IP addresses. Enumeration: 'policy': 2, 'packet': 1.
         wfIpsecDescriptorStartSourceAddr 1.3.6.1.4.1.18.3.5.3.26.4.1.13 ipaddress read-write
The start Source IP address for the dynamic SA.
         wfIpsecDescriptorEndSourceAddr 1.3.6.1.4.1.18.3.5.3.26.4.1.14 ipaddress read-write
The end Source IP address for the dynamic SA.
         wfIpsecDescriptorStartDestAddr 1.3.6.1.4.1.18.3.5.3.26.4.1.15 ipaddress read-write
The start Destination IP address for the dynamic SA.
         wfIpsecDescriptorEndDestAddr 1.3.6.1.4.1.18.3.5.3.26.4.1.16 ipaddress read-write
The end Source IP address for the dynamic SA.
         wfIpsecDescriptorSourcePort 1.3.6.1.4.1.18.3.5.3.26.4.1.17 integer read-write
The source port number for the dynamic SA.
         wfIpsecDescriptorProtocol 1.3.6.1.4.1.18.3.5.3.26.4.1.18 integer read-write
The IP protocol for the dynamic SA.
         wfIpsecDescriptorPrimarySG 1.3.6.1.4.1.18.3.5.3.26.4.1.19 ipaddress read-write
The address of the remote gateway.
         wfIpsecDescriptorInboundIdleTimer 1.3.6.1.4.1.18.3.5.3.26.4.1.20 integer read-write
Inbound (Unprotect) SA inactivity timer, in minutes. If no traffic is received on an automated inbound SA for the indicated time, both SAs for this policy will be deleted. A value of zero disables the timer.
         wfIpsecDescriptorAntiReplayWindow 1.3.6.1.4.1.18.3.5.3.26.4.1.21 integer read-write
Anti-replay checking implies checking the sequence number of each encrypted packet received and determining if we have received this packet before. Anti-replay checking by receivers of encrypted traffic is optional. It must only happen if authentication is select one of the security services for this flow. Anti-replay even if enabled will not happen for packets which are only encrypted. This MIB attribute controls the number of packets which are kept track of for replay checking. Anything sequence number less than the window size is thrown away. Enumeration: 'disabled': 1, 'pkts32': 32, 'pkts64': 64, 'pkts128': 128.
         wfIpsecDescriptorDestPort 1.3.6.1.4.1.18.3.5.3.26.4.1.22 integer read-write
The destination port number for the dynamic SA.
 wfIpsecEspSaTable 1.3.6.1.4.1.18.3.5.3.26.5 no-access
The ESP security association table
     wfIpsecEspSaEntry 1.3.6.1.4.1.18.3.5.3.26.5.1 no-access
Entry in ESP security association table
         wfIpsecEspSaCreate 1.3.6.1.4.1.18.3.5.3.26.5.1.1 integer read-write
Create/Delete parameter. Enumeration: 'deleted': 2, 'created': 1.
         wfIpsecEspSaStatus 1.3.6.1.4.1.18.3.5.3.26.5.1.2 integer read-only
The current status of this Security Association: up: this SA is in use down: this SA is misconfigured inactive: this SA is disabled notpresent: the IPsec code isn't loaded Enumeration: 'down': 2, 'notpresent': 4, 'inactive': 3, 'up': 1.
         wfIpsecEspSaSrc 1.3.6.1.4.1.18.3.5.3.26.5.1.3 ipaddress read-only
The IP address of the SA's source.
         wfIpsecEspSaDest 1.3.6.1.4.1.18.3.5.3.26.5.1.4 ipaddress read-only
The IP address of the SA's destination.
         wfIpsecEspSaSpi 1.3.6.1.4.1.18.3.5.3.26.5.1.5 integer read-only
The security parameters index
         wfIpsecEspSaCipherAlg 1.3.6.1.4.1.18.3.5.3.26.5.1.6 integer read-write
Identifies cipher algorithm for this SA. Enumeration: 'none': 1, 'des': 2, 'desede': 3.
         wfIpsecEspSaManualCipherKey 1.3.6.1.4.1.18.3.5.3.26.5.1.7 octet string read-write
The key for a manually-keyed SA's cipher algorithm
         wfIpsecEspSaDesKeyStrength 1.3.6.1.4.1.18.3.5.3.26.5.1.8 integer read-write
The strength of the cipher key. Enumeration: 'fiftysixbit': 2, 'fortybit': 1.
         wfIpsecEspSaIntegrityAlg 1.3.6.1.4.1.18.3.5.3.26.5.1.9 integer read-write
The algorithm for ESP Auth. Enumeration: 'hmacMd5': 2, 'none': 1, 'hmacSha1': 3.
         wfIpsecEspSaManualIntegrityKey 1.3.6.1.4.1.18.3.5.3.26.5.1.10 octet string read-write
The key for a manually-keyed SA's integrity algorithm
         wfIpsecEspSaVerifyPad 1.3.6.1.4.1.18.3.5.3.26.5.1.11 integer read-write
This attribute enables checking of the pad field of ESP packets making sure it is in expected numeric ascending order. Packets with bad padding are discarded. Enumeration: 'disabled': 2, 'enabled': 1.
         wfIpsecEspSaReset 1.3.6.1.4.1.18.3.5.3.26.5.1.12 integer read-write
Reset IPSec SA statistics indicator.
         wfIpsecEspSaBadAuthen 1.3.6.1.4.1.18.3.5.3.26.5.1.13 counter read-only
The number of received encrypted packets that could not be properly authenticated.
         wfIpsecEspSaBadDecrypt 1.3.6.1.4.1.18.3.5.3.26.5.1.14 counter read-only
The number of received packets that could not be properly decrypted.
         wfIpsecEspSaBadPad 1.3.6.1.4.1.18.3.5.3.26.5.1.15 counter read-only
The number of received packets that contained bad padding information.
         wfIpsecEspSaProtectPkt 1.3.6.1.4.1.18.3.5.3.26.5.1.16 counter read-only
The number of successfully encrypted packets.
         wfIpsecEspSaUnprotectPkt 1.3.6.1.4.1.18.3.5.3.26.5.1.17 counter read-only
The number of successfully decrypted packets.
         wfIpsecEspSaEncryptByte 1.3.6.1.4.1.18.3.5.3.26.5.1.18 counter read-only
The number of successfully encrypted bytes.
         wfIpsecEspSaDecryptByte 1.3.6.1.4.1.18.3.5.3.26.5.1.19 counter read-only
The number of successfully encrypted bytes.
         wfIpsecEspSaMode 1.3.6.1.4.1.18.3.5.3.26.5.1.20 integer read-write
Identifies mode of the SA. Enumeration: 'tunnel': 1, 'transport': 2.
         wfIpsecEspSaPfs 1.3.6.1.4.1.18.3.5.3.26.5.1.21 integer read-write
Identifies whether this SA has perfect forward secrecy or not. Enumeration: 'false': 2, 'true': 1.
         wfIpsecEspSaExpiryType 1.3.6.1.4.1.18.3.5.3.26.5.1.22 integer read-write
The units used to interpret the expiry value. The SA's keys don't expire when this is set to none. Enumeration: 'seconds': 1, 'kilobytes': 2, 'none': 3.
         wfIpsecEspSaExpiryValue 1.3.6.1.4.1.18.3.5.3.26.5.1.23 integer read-write
The value used to determine when the keys for this SA expire.
 wfIpsecStatsTable 1.3.6.1.4.1.18.3.5.3.26.6 no-access
The interface statistics table
     wfIpsecStatsEntry 1.3.6.1.4.1.18.3.5.3.26.6.1 no-access
Entry in Interface Statistics Table
         wfIpsecStatsCreate 1.3.6.1.4.1.18.3.5.3.26.6.1.1 integer read-only
Create/Delete parameter. Enumeration: 'deleted': 2, 'created': 1.
         wfIpsecStatsInterface 1.3.6.1.4.1.18.3.5.3.26.6.1.2 ipaddress read-only
The IP address of the security gateway which these statistics belong to.
         wfIpsecStatsCircuit 1.3.6.1.4.1.18.3.5.3.26.6.1.3 integer read-only
The ID of the Circuit to which this instance applies.
         wfIpsecStatsReset 1.3.6.1.4.1.18.3.5.3.26.6.1.4 integer read-write
Reset IPSec statistics indicator.
         wfIpsecStatsUnprotectPkt 1.3.6.1.4.1.18.3.5.3.26.6.1.5 counter read-only
The number of received packets successfully decrypted.
         wfIpsecStatsProtectPkt 1.3.6.1.4.1.18.3.5.3.26.6.1.6 counter read-only
The number of received packets successfully encrypted.
         wfIpsecStatsBypassPkt 1.3.6.1.4.1.18.3.5.3.26.6.1.7 counter read-only
The number of received packets that have bypassed.
         wfIpsecStatsDropPkt 1.3.6.1.4.1.18.3.5.3.26.6.1.8 counter read-only
The number of received packets that have been dropped.
         wfIpsecStatsNoSa 1.3.6.1.4.1.18.3.5.3.26.6.1.9 counter read-only
The number of received packets for which no SA was found.
         wfIpsecStatsLastBadSpi 1.3.6.1.4.1.18.3.5.3.26.6.1.10 integer read-only
The last security parameters index for which no SA could be found.
         wfIpsecStatsNoPolicyMatch 1.3.6.1.4.1.18.3.5.3.26.6.1.11 counter read-only
The number of received packets for which no policy match could be found.
         wfIpsecStatsSaExpDropBytes 1.3.6.1.4.1.18.3.5.3.26.6.1.12 counter read-only
The number of bytes discarded owing to SA Expiry
         wfIpsecStatsOutClips 1.3.6.1.4.1.18.3.5.3.26.6.1.13 counter read-only
The number of outbound packets clipped due to buffer congestion.
         wfIpsecStatsInClips 1.3.6.1.4.1.18.3.5.3.26.6.1.14 counter read-only
The number of inbound packets clipped due to buffer congestion.
 wfIpsecRemoteGatewayTable 1.3.6.1.4.1.18.3.5.3.26.7 no-access
A table of known remote Security Gateways.
     wfIpsecRemoteGatewayEntry 1.3.6.1.4.1.18.3.5.3.26.7.1 no-access
A remote Security Gateway
         wfIpsecRemoteGatewayCreate 1.3.6.1.4.1.18.3.5.3.26.7.1.1 integer read-write
creates or deletes an instance. Enumeration: 'deleted': 2, 'created': 1.
         wfIpsecRemoteGatewayEnable 1.3.6.1.4.1.18.3.5.3.26.7.1.2 integer read-write
enables and disables this instance. Enumeration: 'disabled': 2, 'enabled': 1.
         wfIpsecRemoteGatewayStatus 1.3.6.1.4.1.18.3.5.3.26.7.1.3 integer read-only
Defines the current status of the instance: inactive - ? active - ? error - ? Enumeration: 'active': 1, 'notpresent': 4, 'inactive': 3, 'error': 2.
         wfIpsecRemoteGatewayInterface 1.3.6.1.4.1.18.3.5.3.26.7.1.4 ipaddress read-only
The address of the IP interface to which this instance applies.
         wfIpsecRemoteGatewayCircuit 1.3.6.1.4.1.18.3.5.3.26.7.1.5 integer read-only
The ID of the Circuit to which the instance applies.
         wfIpsecRemoteGatewayIndex 1.3.6.1.4.1.18.3.5.3.26.7.1.6 integer read-only
An index used to differentiate remote gateway instances.
         wfIpsecRemoteGatewayIpAddr 1.3.6.1.4.1.18.3.5.3.26.7.1.7 ipaddress read-write
The address of the remote gateway.
         wfIpsecRemoteGatewayRange 1.3.6.1.4.1.18.3.5.3.26.7.1.8 octet string read-write
The range of destination IP addresses that the remote security gateway represents.
         wfIpsecRemoteGatewayName 1.3.6.1.4.1.18.3.5.3.26.7.1.9 displaystring read-write
name of the remote security gateway.
 wfIpsecProposalTable 1.3.6.1.4.1.18.3.5.3.26.8 no-access
Table of IP security proposals
     wfIpsecProposalEntry 1.3.6.1.4.1.18.3.5.3.26.8.1 no-access
An IP security Proposal. This is essentially a sequence of protection suites represented by wfIpsecSuiteEntry instances
         wfIpsecProposalCreate 1.3.6.1.4.1.18.3.5.3.26.8.1.1 integer read-write
Create/Delete parameter. Default is created. Enumeration: 'deleted': 2, 'created': 1.
         wfIpsecProposalStatus 1.3.6.1.4.1.18.3.5.3.26.8.1.2 integer read-only
The status of this Proposal. Enumeration: 'active': 1, 'notpresent': 4, 'inactive': 3, 'error': 2.
         wfIpsecProposalName 1.3.6.1.4.1.18.3.5.3.26.8.1.3 displaystring read-write
Proposal name.
         wfIpsecProposalNumber 1.3.6.1.4.1.18.3.5.3.26.8.1.4 integer read-only
A number that identifies this proposal.
         wfIpsecProposalSuites 1.3.6.1.4.1.18.3.5.3.26.8.1.5 opaque read-write
the octet string contains a list of ordered, 2 byte numbers that correspond to wfIpsecSuiteEntry instance ID's. The list of protection suites is a logically ANDed list. This allows multiple protocols to be used for a policy.
 wfIpsecSuiteTable 1.3.6.1.4.1.18.3.5.3.26.9 no-access
Table of IP security protection suites
     wfIpsecSuiteEntry 1.3.6.1.4.1.18.3.5.3.26.9.1 no-access
An IP security protection suite
         wfIpsecSuiteCreate 1.3.6.1.4.1.18.3.5.3.26.9.1.1 integer read-write
Create/Delete parameter. Default is created. Enumeration: 'deleted': 2, 'created': 1.
         wfIpsecSuiteStatus 1.3.6.1.4.1.18.3.5.3.26.9.1.2 integer read-only
The status of this Suite. Enumeration: 'active': 1, 'notpresent': 4, 'inactive': 3, 'error': 2.
         wfIpsecSuiteName 1.3.6.1.4.1.18.3.5.3.26.9.1.3 displaystring read-write
Suite name.
         wfIpsecSuiteNumber 1.3.6.1.4.1.18.3.5.3.26.9.1.4 integer read-only
A number that identifies this protection suite.
         wfIpsecSuiteEspProtocol 1.3.6.1.4.1.18.3.5.3.26.9.1.5 opaque read-write
The ordered sequence of wfIpsecEspTransformEntry instances that comprise this protection suite.
         wfIpsecSuiteAhProtocol 1.3.6.1.4.1.18.3.5.3.26.9.1.6 opaque read-write
The ordered sequence of wfIpsecAhProposalEntry instances that comprise this protection suite.
 wfIpsecEspTransformTable 1.3.6.1.4.1.18.3.5.3.26.10 no-access
Table of IP security policies
       wfIpsecEspTransformEntry 1.3.6.1.4.1.18.3.5.3.26.10.1 no-access
An IP security ESP Transform
           wfIpsecEspTransformCreate 1.3.6.1.4.1.18.3.5.3.26.10.1.1 integer read-write
Create/Delete parameter. Default is created. Enumeration: 'deleted': 2, 'created': 1.
           wfIpsecEspTransformStatus 1.3.6.1.4.1.18.3.5.3.26.10.1.2 integer read-only
The status of this ESP Transform. Enumeration: 'active': 1, 'notpresent': 4, 'inactive': 3, 'error': 2.
           wfIpsecEspTransformName 1.3.6.1.4.1.18.3.5.3.26.10.1.3 displaystring read-write
ESP Transform name.
           wfIpsecEspTransformNumber 1.3.6.1.4.1.18.3.5.3.26.10.1.4 integer read-only
A number that identifies this ESP proposal.
           wfIpsecEspTransformCipherAlg 1.3.6.1.4.1.18.3.5.3.26.10.1.5 integer read-write
The cipher algorithm for ESP. Enumeration: 'none': 1, 'des': 2, 'desede': 3.
           wfIpsecEspTransformKeyLength 1.3.6.1.4.1.18.3.5.3.26.10.1.6 integer read-write
The key length for the ESP cipher algorithm.
           wfIpsecEspTransformIntegrityAlg 1.3.6.1.4.1.18.3.5.3.26.10.1.7 integer read-write
The algorithm for ESP Auth. Enumeration: 'hmacMd5': 2, 'none': 1, 'hmacSha1': 3.
           wfIpsecEspTransformExpiryTime 1.3.6.1.4.1.18.3.5.3.26.10.1.8 integer read-write
The value used to determine when the keys for this SA expire due to the passage of time. The units are minutes. The minium recommended value is 10 min.
           wfIpsecEspTransformExpiryMBytes 1.3.6.1.4.1.18.3.5.3.26.10.1.9 integer read-write
The value used to determine when the keys for this SA expire due to the number of bytes processed. The units are mega-bytes. The minium recommended value is 10 Mbytes. A value of 0 indicates that MByte expiry is not desired.
           wfIpsecEspTransformExpiryPref 1.3.6.1.4.1.18.3.5.3.26.10.1.10 integer read-write
The value used to determine precedence between time/kbyte expiry Enumeration: 'mbytes': 2, 'minutes': 1.
 wfIpsecAhTransformTable 1.3.6.1.4.1.18.3.5.3.26.11 no-access
Table of IP security policies
       wfIpsecAhTransformEntry 1.3.6.1.4.1.18.3.5.3.26.11.1 no-access
An IP security AhTransform
           wfIpsecAhTransformCreate 1.3.6.1.4.1.18.3.5.3.26.11.1.1 integer read-write
Create/Delete parameter. Default is created. Enumeration: 'deleted': 2, 'created': 1.
           wfIpsecAhTransformStatus 1.3.6.1.4.1.18.3.5.3.26.11.1.2 integer read-only
The status of this AhTransform. Enumeration: 'active': 1, 'notpresent': 4, 'inactive': 3, 'error': 2.
           wfIpsecAhTransformName 1.3.6.1.4.1.18.3.5.3.26.11.1.3 displaystring read-write
AhTransform name.
           wfIpsecAhTransformNumber 1.3.6.1.4.1.18.3.5.3.26.11.1.4 integer read-only
A number that identifies this AH proposal.
           wfIpsecAhTransformIntegrityAlg 1.3.6.1.4.1.18.3.5.3.26.11.1.5 integer read-write
The algorithm for AH. Enumeration: 'hmacMd5': 2, 'none': 1, 'hmacSha1': 3.
           wfIpsecAhTransformGroup 1.3.6.1.4.1.18.3.5.3.26.11.1.6 integer read-write
The DH group Enumeration: 'one': 1.
           wfIpsecAhTransformExpiryType 1.3.6.1.4.1.18.3.5.3.26.11.1.7 integer read-write
The units used to interpret the expiry value. The SA's keys don't expire when this is set to none. Enumeration: 'seconds': 1, 'kilobytes': 2, 'none': 3.
           wfIpsecAhTransformExpiryValue 1.3.6.1.4.1.18.3.5.3.26.11.1.8 integer read-write
The value used to determine when the keys for this SA expire.
 wfIpsecSaStatsTable 1.3.6.1.4.1.18.3.5.3.26.12 no-access
The Ipsec automated SA table
       wfIpsecSaStatsEntry 1.3.6.1.4.1.18.3.5.3.26.12.1 no-access
Entry in Automated ESP SA table
           wfIpsecSaStatsStatus 1.3.6.1.4.1.18.3.5.3.26.12.1.1 integer read-only
The current status of this Security Association: up: this SA is in use down: this SA is misconfigured ??? inactive: this SA is disabled ??? notpresent: the IPsec code isn't loaded ??? Enumeration: 'down': 2, 'notpresent': 4, 'inactive': 3, 'up': 1.
           wfIpsecSaStatsSrc 1.3.6.1.4.1.18.3.5.3.26.12.1.2 ipaddress read-only
The IP address of the SA's source.
           wfIpsecSaStatsDest 1.3.6.1.4.1.18.3.5.3.26.12.1.3 ipaddress read-only
The IP address of the SA's destination.
           wfIpsecSaStatsSpi 1.3.6.1.4.1.18.3.5.3.26.12.1.4 gauge read-only
The security parameters index
           wfIpsecSaStatsProto 1.3.6.1.4.1.18.3.5.3.26.12.1.5 integer read-only
The protocol used by this SA. Enumeration: 'ah': 3, 'none': 1, 'esp': 2.
           wfIpsecSaStatsCipherAlg 1.3.6.1.4.1.18.3.5.3.26.12.1.6 integer read-only
Identifies cipher algorithm for this SA. Enumeration: 'none': 1, 'des': 2, 'desede': 3.
           wfIpsecSaStatsIntegrityAlg 1.3.6.1.4.1.18.3.5.3.26.12.1.7 integer read-only
The algorithm for ESP Auth. Enumeration: 'hmacMd5': 2, 'none': 1, 'hmacSha1': 3.
           wfIpsecSaStatsBadAuthen 1.3.6.1.4.1.18.3.5.3.26.12.1.8 counter read-only
The number of received encrypted packets that could not be properly authenticated.
           wfIpsecSaStatsBadDecrypt 1.3.6.1.4.1.18.3.5.3.26.12.1.9 counter read-only
The number of received packets that could not be properly decrypted.
           wfIpsecSaStatsBadPad 1.3.6.1.4.1.18.3.5.3.26.12.1.10 counter read-only
The number of received packets that contained bad padding information.
           wfIpsecSaStatsProtectPkt 1.3.6.1.4.1.18.3.5.3.26.12.1.11 counter read-only
The number of successfully encrypted packets.
           wfIpsecSaStatsUnprotectPkt 1.3.6.1.4.1.18.3.5.3.26.12.1.12 counter read-only
The number of successfully decrypted packets.
           wfIpsecSaStatsEncryptByte 1.3.6.1.4.1.18.3.5.3.26.12.1.13 counter read-only
The number of successfully encrypted bytes.
           wfIpsecSaStatsDecryptByte 1.3.6.1.4.1.18.3.5.3.26.12.1.14 counter read-only
The number of successfully encrypted bytes.
           wfIpsecSaStatsMode 1.3.6.1.4.1.18.3.5.3.26.12.1.15 integer read-only
Identifies mode of the SA. Enumeration: 'tunnel': 1, 'transport': 2.
           wfIpsecSaStatsPfs 1.3.6.1.4.1.18.3.5.3.26.12.1.16 integer read-only
Identifies whether this SA has perfect forward secrecy or not. Enumeration: 'false': 2, 'true': 1.
           wfIpsecSaStatsExpiryType 1.3.6.1.4.1.18.3.5.3.26.12.1.17 integer read-only
The units used to interpret the expiry value. The SA's keys don't expire when this is set to none. Enumeration: 'seconds': 1, 'kilobytes': 2, 'none': 3.
           wfIpsecSaStatsExpiryValue 1.3.6.1.4.1.18.3.5.3.26.12.1.18 integer read-only
The value used to determine when the keys for this SA expire.