ACC-IPSEC: View SNMP OID List / Download MIB
VENDOR: ACC
Home | MIB: ACC-IPSEC | |||
---|---|---|---|---|
Download as: |
Download standard MIB format if you are planning to load a MIB file into some system (OS, Zabbix, PRTG ...) or view it with a MIB browser. CSV is more suitable for analyzing and viewing OID' and other MIB objects in excel. JSON and YAML formats are usually used in programing even though some systems can use MIB in YAML format (like Logstash).
|
|||
Object Name | OID | Type | Access | Info |
accIpsec | 1.3.6.1.4.1.5.1.1.81 | |||
accIpsecConfig | 1.3.6.1.4.1.5.1.1.81.1 | |||
accIpsecConfigMessageLevel | 1.3.6.1.4.1.5.1.1.81.1.1 |
IPSec message level |
||
accIpsecConfigDebugMask | 1.3.6.1.4.1.5.1.1.81.1.2 |
IPSec debug mask |
||
accIpsecConfigSANumber | 1.3.6.1.4.1.5.1.1.81.1.3 |
The maximum number of SAs |
||
accIpsecConfigAuthenticationAllowed | 1.3.6.1.4.1.5.1.1.81.1.4 |
Authentication allowed |
||
accIpsecConfigEncryptionKeyLength | 1.3.6.1.4.1.5.1.1.81.1.5 |
The maximum allowed key length for encryption |
||
accIpsecStats | 1.3.6.1.4.1.5.1.1.81.2 | |||
accIpsecStatsInOkPackets | 1.3.6.1.4.1.5.1.1.81.2.1 |
Number of correctly received IPSec packets |
||
accIpsecStatsOutOkPackets | 1.3.6.1.4.1.5.1.1.81.2.2 |
Number of correctly sent IPSec packets |
||
accIpsecStatsIllegalInSpis | 1.3.6.1.4.1.5.1.1.81.2.3 |
Number of packets dropped because the SPI was incorrect |
||
accIpsecStatsIllegalProtos | 1.3.6.1.4.1.5.1.1.81.2.4 |
Number of packets dropped because the protocol contained inside the received IPSec packet was incorrect, i.e. a transport mode SA contained a tunneled packet or a tunnel mode SA contained a non-tunneled packet |
||
accIpsecStatsUnsuppAHLens | 1.3.6.1.4.1.5.1.1.81.2.5 |
Number of packets dropped because the authenticator length was not supported |
||
accIpsecStatsUnsuppOpts | 1.3.6.1.4.1.5.1.1.81.2.6 |
Number of packets dropped because some IP options were not supported by IPSec |
||
accIpsecStatsPacketTooSmalls | 1.3.6.1.4.1.5.1.1.81.2.7 |
Number of packets dropped because the packet was too small to contain all necessary IPSec information |
||
accIpsecStatsMalformedOpts | 1.3.6.1.4.1.5.1.1.81.2.8 |
Number of packets dropped because some IP options were malformed |
||
accIpsecStatsUnsuppIPVersions | 1.3.6.1.4.1.5.1.1.81.2.9 |
Number of packets dropped because the tunneled packet was not IPv4 |
||
accIpsecStatsNoRoutes | 1.3.6.1.4.1.5.1.1.81.2.10 |
Number of packets dropped because there was no route to the specified outgoing security gateway |
||
accIpsecStatsMissingGWs | 1.3.6.1.4.1.5.1.1.81.2.11 |
Number of packets dropped because the outgoing security gateway was not specified |
||
accIpsecStatsSha1Mismatches | 1.3.6.1.4.1.5.1.1.81.2.12 |
Number of packets dropped because the SHA-1 authenticator was incorrect |
||
accIpsecStatsMd5Mistmatches | 1.3.6.1.4.1.5.1.1.81.2.13 |
Number of packets dropped because the MD5 authenticator was incorrect |
||
accIpsecStatsReplayCheckFaileds | 1.3.6.1.4.1.5.1.1.81.2.14 |
Number of packets dropped because replay checks failed |
||
accIpsecStatsIllegalPads | 1.3.6.1.4.1.5.1.1.81.2.15 |
Number of packets dropped because ESP padding content was incorrect |
||
accIpsecStatsSeqnoCycles | 1.3.6.1.4.1.5.1.1.81.2.16 |
Number of packets dropped because of sequence number overflow |
||
accIpsecStatsInsufficientPads | 1.3.6.1.4.1.5.1.1.81.2.17 |
Number of packets dropped because ESP padding was of incorrect length |
||
accIpsecStatsTtlZeros | 1.3.6.1.4.1.5.1.1.81.2.18 |
Number of packets dropped because the packet being tunneled had its TTL decremented to zero |
||
accIpsecStatsNoKeys | 1.3.6.1.4.1.5.1.1.81.2.19 |
Number of packets dropped because the required authentication or encryption keys were not set |
||
accIpsecStatsIllegalFragments | 1.3.6.1.4.1.5.1.1.81.2.20 |
Number of packets dropped because a transport mode packet contained a fragment |
||
accIpsecStatsCpuOverloads | 1.3.6.1.4.1.5.1.1.81.2.21 |
Number of packets dropped because of CPU overload |
||
accIpsecStatsHdrAllocs | 1.3.6.1.4.1.5.1.1.81.2.22 |
Number of extra memory allocations done for headers |
||
accIpsecStatsTlrAllocs | 1.3.6.1.4.1.5.1.1.81.2.23 |
Number of extra memory allocations done for trailers |
||
accIpsecStatsBlockJoins | 1.3.6.1.4.1.5.1.1.81.2.24 |
Number of memory block joins |
||
accIpsecSAConfig | 1.3.6.1.4.1.5.1.1.81.3 | |||
accIpsecSAConfigTable | 1.3.6.1.4.1.5.1.1.81.3.1 |
Tok_String |
||
1.3.6.1.4.1.5.1.1.81.3.1.1 |
Tok_String |
|||
accIpsecSAConfigIndex | 1.3.6.1.4.1.5.1.1.81.3.1.1.1 |
The name of the SA entry |
||
accIpsecSAConfigDir | 1.3.6.1.4.1.5.1.1.81.3.1.1.2 |
The direction of the SA |
||
accIpsecSAConfigMode | 1.3.6.1.4.1.5.1.1.81.3.1.1.3 |
SA mode in the security association data base |
||
accIpsecSAConfigProtocol | 1.3.6.1.4.1.5.1.1.81.3.1.1.4 |
Which protocol to use for an SA in the security association data base |
||
accIpsecSAConfigSPI | 1.3.6.1.4.1.5.1.1.81.3.1.1.5 |
The SPI value of the SA |
||
accIpsecSAConfigAuthAlgorithm | 1.3.6.1.4.1.5.1.1.81.3.1.1.6 |
SA authenticaiton algorithm in the security association data base |
||
accIpsecSAConfigReplayCheck | 1.3.6.1.4.1.5.1.1.81.3.1.1.7 |
Replay check prevents the same sequence number from being used twice on received packets |
||
accIpsecSAConfigOverflowAudit | 1.3.6.1.4.1.5.1.1.81.3.1.1.8 |
Overflow audit prevents further packets from being sent when a sequence number overflow occurs |
||
accIpsecSAConfigCopyDF | 1.3.6.1.4.1.5.1.1.81.3.1.1.9 |
The handling of the DF bit on the sent encapsulating header based on the DF bit of the encapsulated header |
||
accIpsecSAConfigDestAddr | 1.3.6.1.4.1.5.1.1.81.3.1.1.10 |
Destination IP address |
||
accIpsecSAConfigSharedAuthSecret | 1.3.6.1.4.1.5.1.1.81.3.1.1.11 |
Shared authentication key for the SA |
||
accIpsecSAConfigEncrAlgorithm | 1.3.6.1.4.1.5.1.1.81.3.1.1.12 |
The encryption algorithm to be used |
||
accIpsecSAConfigSharedEncrSecret | 1.3.6.1.4.1.5.1.1.81.3.1.1.13 |
Shared encryption key for the SA |
||
accIpsecSAConfigPriority | 1.3.6.1.4.1.5.1.1.81.3.1.1.14 |
Priority of the SA |
||
accIpsecSAConfigSequenceNumber | 1.3.6.1.4.1.5.1.1.81.3.1.1.15 |
The sequence number to be used in the next IPSec message to be sent, or the smallest acceptable sequence number in an IPSec message to be received |
||
accIpsecSAConfigStatus | 1.3.6.1.4.1.5.1.1.81.3.1.1.16 |
The current status of this entry |
||
accIpsecSAStats | 1.3.6.1.4.1.5.1.1.81.4 | |||
accIpsecSAStatsTable | 1.3.6.1.4.1.5.1.1.81.4.1 |
Tok_String |
||
1.3.6.1.4.1.5.1.1.81.4.1.1 |
Tok_String |
|||
accIpsecSAStatsIndex | 1.3.6.1.4.1.5.1.1.81.4.1.1.1 |
The name of the SA entry |
||
accIpsecSAStatsOKPackets | 1.3.6.1.4.1.5.1.1.81.4.1.1.2 |
Number of correct packets processed |
||
accIpsecSAStatsNotOKPackets | 1.3.6.1.4.1.5.1.1.81.4.1.1.3 |
Number of incorrect packets processed |
||
accIpsecSAStatsCurrTicks | 1.3.6.1.4.1.5.1.1.81.4.1.1.4 |
The number of time ticks this SA has existed |
||
accIpsecSAStatsCurrBytes | 1.3.6.1.4.1.5.1.1.81.4.1.1.5 |
The number of bytes this SA has processed |
||
accIpsecTraps | 1.3.6.1.4.1.5.1.1.81.5 | |||
accIpsecTrapMsg | 1.3.6.1.4.1.5.1.1.81.5.1 |
Trap message object for level-1 traps of Ipsec module |