ALCATEL-IND1-IPSEC-MIB: View SNMP OID List / Download MIB
VENDOR: ALCATEL
Home | MIB: ALCATEL-IND1-IPSEC-MIB | |||
---|---|---|---|---|
Download as: |
Download standard MIB format if you are planning to load a MIB file into some system (OS, Zabbix, PRTG ...) or view it with a MIB browser. CSV is more suitable for analyzing and viewing OID' and other MIB objects in excel. JSON and YAML formats are usually used in programing even though some systems can use MIB in YAML format (like Logstash).
|
|||
Object Name | OID | Type | Access | Info |
alcatelIND1IPsecMIB | 1.3.6.1.4.1.6486.801.1.2.1.43.1 |
This module describes an authoritative enterprise-specific Simple Network Management Protocol (SNMP) Management Information Base (MIB): Proprietary IPsec MIB definitions The right to make changes in specification and other information contained in this document without prior notice is reserved. No liability shall be assumed for any incidental, indirect, special, or consequential damages whatsoever arising from or related to this document or the information contained herein. Vendors, end-users, and other interested parties are granted non-exclusive license to use this specification in connection with management of the products for which it is intended to be used. Copyright (C) 1995-2010 Alcatel-Lucent ALL RIGHTS RESERVED WORLDWIDE |
||
alcatelIND1IPsecMIBObjects | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1 | |||
alaIPsecConfig | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.1 | |||
alaIPsecSecurityKeyTable | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.1.1 | no-access |
Table allowing the configuration of the switch's IPsec security key. The security key is used to encrypt and IPsec related information retained in permanent storage. There is always a single row in this table with an index value of 1. |
|
1.3.6.1.4.1.6486.801.1.2.1.43.1.1.1.1.1 | no-access |
The security key entry. |
||
alaIPsecSecurityKeyID | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.1.1.1.1 | unsigned32 | no-access |
The row's identifier. Only one entry is ever present, with an ID value of 1. |
alaIPsecSecurityKeyCurrent | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.1.1.1.2 | octet string | read-write |
The current value of the 16-byte IPsec security key. If an attempt is made to read the value of this object, a zero-length octet string will be returned. |
alaIPsecSecurityKeyNew | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.1.1.1.3 | octet string | read-write |
Used to set a new 16-byte value for the IPsec security key. Both alaIPsecSecurityKeyCurrent (with its correct value) and alaIPsecSecurityKeyNew must be specified in the same SNMP SET message. If alaIPsecSecurityKeyCurrent is not present, or if its value is incorrect, the attempt to set a new key will fail. If an attempt is made to read the value of this object, a zero-length octet string will be returned. |
alaIPsecStatisticsTable | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.1.2 | no-access |
Table allowing the IPv6 statistics to be retrieved. |
|
1.3.6.1.4.1.6486.801.1.2.1.43.1.1.1.2.1 | no-access |
The statistics entry. |
||
alaIPsecStatisticsProtocol | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.1.2.1.1 | integer | no-access |
IP protocol version covered by the IPsec statistics. Enumeration: 'ipv6': 6. |
alaIPsecStatisticsInSuccessful | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.1.2.1.2 | counter32 | read-only |
Number of incoming packets requiring IPsec processing that were successfully handled. |
alaIPsecStatisticsInPolicyViolation | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.1.2.1.3 | counter32 | read-only |
Number of incoming packets that were dropped because of policy violations. |
alaIPsecStatisticsInNoSA | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.1.2.1.4 | counter32 | read-only |
Number of incoming packets dropped because no matching SA was found. |
alaIPsecStatisticsInUnknownSPI | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.1.2.1.5 | counter32 | read-only |
Number of incoming packets dropped because the SPI was unknown. |
alaIPsecStatisticsInAHReplay | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.1.2.1.6 | counter32 | read-only |
Number of incoming packets that failed the AH replay check. |
alaIPsecStatisticsInESPReplay | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.1.2.1.7 | counter32 | read-only |
Number of incoming packets taht failed the ESP replay check. |
alaIPsecStatisticsInAHAuthenticationSuccess | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.1.2.1.8 | counter32 | read-only |
Number of incoming packets that successfully passed AH authentication. |
alaIPsecStatisticsInAHAuthenticationFail | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.1.2.1.9 | counter32 | read-only |
Number of incoming packets that failed AH authentication. |
alaIPsecStatisticsInESPAuthenticationSuccess | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.1.2.1.10 | counter32 | read-only |
Number of incoming packets that successfully passed ESP authentication. |
alaIPsecStatisticsInESPAuthenticationFail | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.1.2.1.11 | counter32 | read-only |
Number of incoming packets that failed ESP authentication. |
alaIPsecStatisticsInBadPacket | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.1.2.1.12 | counter32 | read-only |
Number of incoming packets requiring IPsec processing that were not valid. |
alaIPsecStatisticsInNoMemory | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.1.2.1.13 | counter32 | read-only |
Number of incoming IPsec packets dropped because no memory was available. |
alaIPsecStatisticsOutSuccessful | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.1.2.1.14 | counter32 | read-only |
Number of outgoing packets requiring IPsec processing that were successfully handled. |
alaIPsecStatisticsOutPolicyViolation | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.1.2.1.15 | counter32 | read-only |
Number of outgoing packets dropped because of a policy violation. |
alaIPsecStatisticsOutNoSA | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.1.2.1.16 | counter32 | read-only |
Number of outgoing packets dropped because no matching SA was found. |
alaIPsecStatisticsOutBadPacket | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.1.2.1.17 | counter32 | read-only |
Number of outgoing packets requiring IPsec processing that were not valid. |
alaIPsecStatisticsOutNoMemory | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.1.2.1.18 | counter32 | read-only |
Number of outgoing IPsec packets dropped because no memory was available. |
alaIPsecStatisticsInDiscarded | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.1.2.1.19 | counter32 | read-only |
Number of incoming packets dropped because they matched a discard policy. |
alaIPsecStatisticsOutDiscarded | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.1.2.1.20 | counter32 | read-only |
Number of outgoing packets dropped because they matched a discard policy. |
alaIPsecSecurityPolicyTable | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.2 | no-access |
Table allowing the configuration of IPsec security policies. |
|
1.3.6.1.4.1.6486.801.1.2.1.43.1.1.2.1 | no-access |
A security policy entry. |
||
alaIPsecSecurityPolicyID | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.2.1.1 | unsigned32 | no-access |
A unique identifier for this security policy. When creating a new policy, a zero value must be specified. An available policy ID will then be automatically assigned to the policy. |
alaIPsecSecurityPolicySourceType | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.2.1.2 | inetaddresstype | read-only |
The type of source address specified. Currently only ipv6(2) is allowed. |
alaIPsecSecurityPolicySource | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.2.1.3 | inetaddress | read-only |
The source of packets covered by this policy. |
alaIPsecSecurityPolicySourcePrefixLength | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.2.1.4 | ipsecprefixlength | read-only |
The number of bits of the source address used to determine which packets are covered by this policy. The default value varies depending upon the type of source address specified: IPv4 - 32 IPv6 - 128 DNS name - 0 (any other value is ignored) |
alaIPsecSecurityPolicySourcePort | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.2.1.5 | ipsecportnumber | read-only |
The source port of packets covered by this policy. To match packets from any port, specify the 0 wildcard value. A wildcard policy will only be used when there is no exact match to a destination port in another entry. |
alaIPsecSecurityPolicyDestinationType | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.2.1.6 | inetaddresstype | read-only |
The type of destination address specified. Currently only ipv6(2) is allowed. |
alaIPsecSecurityPolicyDestination | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.2.1.7 | inetaddress | read-only |
The destination of packets covered by this policy. |
alaIPsecSecurityPolicyDestinationPrefixLength | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.2.1.8 | ipsecprefixlength | read-only |
The number of bits of the destination prefix used to determine which packets are covered by this policy. The default value varies depending upon the type of destination address specified: IPv4 - 32 IPv6 - 128 DNS name - 0 (any other value is ignored) |
alaIPsecSecurityPolicyDestinationPort | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.2.1.9 | ipsecportnumber | read-only |
The destination port of packets covered by this policy. To match packets from any port, specify the 0 wildcard value. A wildcard policy will only be used when there is no exact match to a destination port in another entry. |
alaIPsecSecurityPolicyULProtocol | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.2.1.10 | ipseculprotocol | read-only |
The upper-layer protocol of packets covered by this policy. To match all protocols, specify the 255 wildcard value. A wildcard policy will only be used when there is no exact match to the protocol value specified in another entry. |
alaIPsecSecurityPolicyICMPv6Type | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.2.1.11 | integer32 | read-only |
If the upper-layer protocol is ICMPv6, an ICMPv6 type value may be specified to restrict the policy to a specific packet type. To match all ICMPv6 packets, the 0 wildcard value should be specified. |
alaIPsecSecurityPolicyDirection | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.2.1.12 | integer | read-only |
The direction of traffic covered by this policy. Enumeration: 'out': 2, 'in': 1. |
alaIPsecSecurityPolicyName | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.2.1.13 | snmpadminstring | read-only |
A name for this policy. |
alaIPsecSecurityPolicyDescription | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.2.1.14 | ipsecdescription | read-only |
A detailed description of this policy. |
alaIPsecSecurityPolicyAction | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.2.1.15 | integer | read-only |
The action to take on traffic covered by this policy. discard(0) means that all traffic covered by the policy will be discarded. none(1) means that no IPsec processing will be done on the traffic covered by this policy. ipsec(2) means that IPsec processing will take place on the traffic. One or more rules should be defined in the IPsec Rule Table. If no rules are defined processing is identical to none(0) being specified. Enumeration: 'discard': 0, 'none': 1, 'ipsec': 2. |
alaIPsecSecurityPolicyAdminState | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.2.1.16 | ipsecadminstate | read-only |
Allows a policy to be administratively enabled or disabled. |
alaIPsecSecurityPolicyOperationalState | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.2.1.17 | ipsecoperationalstate | read-only |
The operational state of this policy. |
alaIPsecSecurityPolicyPriority | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.2.1.18 | integer32 | read-only |
The priority for this policy. When traffic would be covered by multiple policies the policy with the highest priority value is used. If two policies have the same priority, the one configured first has precedence. |
alaIPsecSecurityPolicyRowStatus | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.2.1.19 | rowstatus | read-only |
Used to control the addition and removal of security policy entries. |
alaIPsecSecurityPolicyRuleTable | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.3 | no-access |
Table allowing the configuration of the IPsec rules for a security policy. |
|
1.3.6.1.4.1.6486.801.1.2.1.43.1.1.3.1 | no-access |
A security policy entry. |
||
alaIPsecSecurityPolicyRuleIndex | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.3.1.1 | unsigned32 | no-access |
Index specifying the order in which multiple rules for the same security policy will be applied. Rules are indexed by the order in which they are applied to the original payload. For example, for a security policy where an IPv6 payload should be protected by an ESP header, which should be protected by an AH header, there would be two Rule Table entries. The ESP entry would have an index of 1 (first rule applied to the payload). The AH entry would have an index of 2 (second rule applied). |
alaIPsecSecurityPolicyRuleProtocol | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.3.1.2 | integer | read-only |
Indicates the type of header required by the rule. Enumeration: 'ah': 1, 'esp': 2. |
alaIPsecSecurityPolicyRuleMode | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.3.1.3 | integer | read-only |
The mode in which the rule's protocol is running. At present, only transport(1) is allowed. Until tunnel mode is supported, transport(1) will be treated as the default value. Enumeration: 'transport': 1. |
alaIPsecSecurityPolicyRuleRowStatus | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.3.1.4 | rowstatus | read-only |
Used to control the addition and removal of security policy IPsec rule entries. |
alaIPsecSAConfigTable | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.4 | no-access |
Table allowing the manual configuration of Security Associations in the Security Association Database (SAD). |
|
1.3.6.1.4.1.6486.801.1.2.1.43.1.1.4.1 | no-access |
Manually configured security association (SA) parameters. |
||
alaIPsecSAConfigID | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.4.1.1 | unsigned32 | no-access |
A unique identifier for this manually configured SA. When creating a new SA, a zero value must be specified. An available ID will then be automatically assigned to the SA. |
alaIPsecSAConfigType | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.4.1.2 | ipsecsatype | read-only |
The type of this SA: AH or ESP. Once set, the type may not be changed. |
alaIPsecSAConfigSourceType | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.4.1.3 | inetaddresstype | read-only |
The type of source address specified. Currently only ipv6(2) is allowed. |
alaIPsecSAConfigSource | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.4.1.4 | inetaddress | read-only |
The source of packets covered by this SA. |
alaIPsecSAConfigDestinationType | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.4.1.5 | inetaddresstype | read-only |
The type of destination address specified. Currently only ipv6(2) is allowed. |
alaIPsecSAConfigDestination | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.4.1.6 | inetaddress | read-only |
The destination of packets covered by this SA. |
alaIPsecSAConfigSPI | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.4.1.7 | unsigned32 | read-only |
The Security Parameters Index (SPI) of this SA. |
alaIPsecSAConfigName | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.4.1.8 | snmpadminstring | read-only |
The name of this manually configured SA. |
alaIPsecSAConfigDescription | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.4.1.9 | ipsecdescription | read-only |
A detailed description for the manually created IPsec SA. |
alaIPsecSAConfigEncryptionAlgorithm | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.4.1.10 | ipsecespalgorithm | read-only |
For an ESP SA, defines the encryption algorithm to be used. null(11) should be specified if ESP is being used for integrity only. If null(11) is specified, alaIPsecSAConfigAuthenticationAlgorithm may not be none(0). aesctr(13) is not valid for manually configured SAs. The value of this object is none(0) for AH SAs. |
alaIPsecSAConfigEncryptionKeyLength | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.4.1.11 | unsigned32 | read-only |
For those algorithms where multiple key lengths are supported, specifies the key length to be used. Zero may be specified to use the default key length. |
alaIPsecSAConfigAuthenticationAlgorithm | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.4.1.12 | ipsecahalgorithm | read-only |
Defines the authentication algorithm to be used. For ESP SAs, none(0) may be specified for encryption-only ESP. For ESP integrity-only, ESP integrity and encryption, or for AH SAs, hmacmd5(2), hmacsha1(3), or aesxcbcmac(9) must be specified. |
alaIPsecSAConfigAdminState | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.4.1.13 | ipsecadminstate | read-only |
Allows a manually configured SA to be administratively enabled or disabled. |
alaIPsecSAConfigOperationalState | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.4.1.14 | ipsecoperationalstate | read-only |
The operational state of the manually configured SA. |
alaIPsecSAConfigRowStatus | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.4.1.15 | rowstatus | read-only |
Used to control the addition and removal of manually configured IPsec SAs. |
alaIPsecKeyTable | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.5 | no-access |
Table used to configure the keys used by manually configured Security Associations in the IPsec Security Association Configuration table. |
|
1.3.6.1.4.1.6486.801.1.2.1.43.1.1.5.1 | no-access |
An IPsec key. Keys in the table must be uniquely identified by the combination of key type and key name. However, since the key name can be up to 255 characters, beyond the 128-element size limit for SNMP index objects, the key ID is used to uniquely identify a key for SNMP access. |
||
alaIPsecKeyID | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.5.1.1 | unsigned32 | no-access |
A unique identifier for this key. When creating a new key, a zero value must be specified. An available ID will then be automatically assigned to the key. |
alaIPsecKeyType | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.5.1.2 | integer | read-only |
Indicates if the key is to be used for encryption or authentication by a SA. Once a key is created, its type may not be changed. Enumeration: 'saAuthentication': 1, 'saEncryption': 2. |
alaIPsecKeyName | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.5.1.3 | octet string | read-only |
The name of the key. For manually-configured SA keys, the name is limited to a maximum length of 20 characters and should correspond to an entry in the alaIPsecSAConfigTable. The key name may not be changed once a key is created. |
alaIPsecKey | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.5.1.4 | octet string | read-only |
The key value. The value specified must match the required key length for the algorithm using the key. If an attempt is made to read the value of this object a zero-length octet string will be returned. |
alaIPsecKeyEncrypted | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.5.1.5 | truthvalue | read-only |
If true, the key value is specified in AOS encrypted form. For example, keys being restored from the configuration file. |
alaIPsecKeyRowStatus | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.5.1.6 | rowstatus | read-only |
Used to control the addition and removal of keys. |
alaIPsecErrorsTable | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.6 | no-access |
Table allowing retrieval of the IPsec error counters. |
|
1.3.6.1.4.1.6486.801.1.2.1.43.1.1.6.1 | no-access |
The error counters entry. |
||
alaIPsecErrorsProtocol | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.6.1.1 | integer | no-access |
IP protocol version covered by the IPsec error counters. Enumeration: 'ipv6': 6. |
alaIPsecErrorsInPolicyViolation | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.6.1.2 | counter32 | read-only |
Number of incoming packets that were dropped because of policy violations. |
alaIPsecErrorsInNoSA | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.6.1.3 | counter32 | read-only |
Number of incoming packets dropped because no matching SA was found. |
alaIPsecErrorsInReplay | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.6.1.4 | counter32 | read-only |
Number of incoming packets that failed a replay check. |
alaIPsecErrorsInAuthenticationFail | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.6.1.5 | counter32 | read-only |
Number of incoming packets that failed authentication. |
alaIPsecErrorsInDiscarded | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.6.1.6 | counter32 | read-only |
Number of incoming packets dropped because they matched a discard policy. |
alaIPsecErrorsInOther | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.6.1.7 | counter32 | read-only |
Number of incoming packets dropped for a reason not otherwise counted. |
alaIPsecErrorsOutNoSA | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.6.1.8 | counter32 | read-only |
Number of outgoing packets dropped because no matching SA was found. |
alaIPsecErrorsOutDiscarded | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.6.1.9 | counter32 | read-only |
Number of outgoing packets dropped because they matched a discard policy. |
alaIPsecErrorsOutOther | 1.3.6.1.4.1.6486.801.1.2.1.43.1.1.6.1.10 | counter32 | read-only |
Number of outgoing packets dropped for a reason not otherwise counted. |
alcatelIND1IPsecMIBConformance | 1.3.6.1.4.1.6486.801.1.2.1.43.1.2 | |||
alcatelIND1IPsecMIBCompliances | 1.3.6.1.4.1.6486.801.1.2.1.43.1.2.1 | |||
alaIPsecCompliance | 1.3.6.1.4.1.6486.801.1.2.1.43.1.2.1.1 |
The compliance statement for Alcatel switches implementing ALCATEL-IND1-IPSEC-MIB. |
||
alcatelIND1IPsecMIBGroups | 1.3.6.1.4.1.6486.801.1.2.1.43.1.2.2 | |||
alaIPsecConfigGroup | 1.3.6.1.4.1.6486.801.1.2.1.43.1.2.2.1 |
A collection of objects to support global configuration of IPsec. |
||
alaIPsecSecurityPolicyGroup | 1.3.6.1.4.1.6486.801.1.2.1.43.1.2.2.2 |
A collection of objects to support management of IPsec security policies. |
||
alaIPsecSAConfigGroup | 1.3.6.1.4.1.6486.801.1.2.1.43.1.2.2.3 |
A collection of objects to support management of manually configured IPsec SAs. |
||
alaIPsecKeyGroup | 1.3.6.1.4.1.6486.801.1.2.1.43.1.2.2.4 |
A collection of objects to support management of keys. |
||
alaIPsecCountersGroup | 1.3.6.1.4.1.6486.801.1.2.1.43.1.2.2.5 |
A collection of objects to support management of IPsec counters. |
||
alaIPsecStatisticsGroup | 1.3.6.1.4.1.6486.801.1.2.1.43.1.2.2.6 |
A collection of objects to support management of IPsec statistics. |