HM2-VPN-MIB: View SNMP OID List / Download MIB
VENDOR: RICHARD HIRSCHMANN
Home | MIB: HM2-VPN-MIB | |||
---|---|---|---|---|
Download as: |
Download standard MIB format if you are planning to load a MIB file into some system (OS, Zabbix, PRTG ...) or view it with a MIB browser. CSV is more suitable for analyzing and viewing OID' and other MIB objects in excel. JSON and YAML formats are usually used in programing even though some systems can use MIB in YAML format (like Logstash).
|
|||
Object Name | OID | Type | Access | Info |
hm2VpnMib | 1.3.6.1.4.1.248.11.120 |
This MIB defines the SNMP interface for Hirschmann VPN implementations. |
||
hm2VpnMibNotifications | 1.3.6.1.4.1.248.11.120.0 | |||
hm2VpnUpTrap | 1.3.6.1.4.1.248.11.120.0.1 |
A hm2VpnUpTrap trap signals that a VPN connection is about to enter the up state from some other state (see 'hm2VpnConnOperStatus'). |
||
hm2VpnDownTrap | 1.3.6.1.4.1.248.11.120.0.2 |
A hm2VpnDownTrap trap signals that a VPN connection is about to enter the down state from some other state (see 'hm2VpnConnOperStatus'). |
||
hm2VpnMibObjects | 1.3.6.1.4.1.248.11.120.1 | |||
hm2VpnGeneralGroup | 1.3.6.1.4.1.248.11.120.1.1 | |||
hm2VpnConnectionGroup | 1.3.6.1.4.1.248.11.120.1.2 | |||
hm2VpnConnMax | 1.3.6.1.4.1.248.11.120.1.2.1 | integer32 | read-only |
Maximum number of VPN connections supported. Notice that the maximum number of active and up VPN connections is limited to hm2VpnConnActiveMax. |
hm2VpnConnActiveMax | 1.3.6.1.4.1.248.11.120.1.2.2 | integer32 | read-only |
Maximum number of active (and up) VPN connections supported. |
hm2VpnConnNext | 1.3.6.1.4.1.248.11.120.1.2.3 | integer32 | read-only |
This object always holds an appropriate value to be used for hm2VpnConnIndex when creating entries in the hm2VpnConnTable. The value 0 indicates that no unassigned entries are available. To obtain the hm2VpnConnIndex value for a new entry, the management station issues a SNMP retrieval operation to obtain the current value of this object. After each row creation or deletion the agent modifies the value to the next unassigned index. |
hm2VpnConnTable | 1.3.6.1.4.1.248.11.120.1.2.10 | no-access |
A list of VPN connections. |
|
1.3.6.1.4.1.248.11.120.1.2.10.1 | no-access |
A VPN connection entry. |
||
hm2VpnConnIndex | 1.3.6.1.4.1.248.11.120.1.2.10.1.1 | integer32 | no-access |
An index that uniquely identifies the entry in the table. |
hm2VpnConnIkeVersion | 1.3.6.1.4.1.248.11.120.1.2.10.1.2 | integer | read-only |
Version of the IKE protocol: o ike: accept IKEv1/v2 as responder, start with IKEv2 as initiator o ikev1: used protocol is IKE version 1 (ISAKMP) o ikev2: used protocol is IKE version 2 Enumeration: 'ikev2': 3, 'ike': 1, 'ikev1': 2. |
hm2VpnConnIkeStartup | 1.3.6.1.4.1.248.11.120.1.2.10.1.3 | integer | read-only |
If this host acts as a responder it does not initiate a key exchange (IKE) nor connection parameters negotiation. Otherwise, this host acts as an initiator - then it initiates an IKE actively. Enumeration: 'initiator': 1, 'responder': 2. |
hm2VpnConnIkeLifetime | 1.3.6.1.4.1.248.11.120.1.2.10.1.4 | integer32 | read-only |
Lifetime of IKE security association in seconds. The maximum value is 24 hours (86400 seconds). |
hm2VpnConnIkeDpdTimeout | 1.3.6.1.4.1.248.11.120.1.2.10.1.5 | integer32 | read-only |
If greater than zero, the local peer sends Dead Peer Detection (DPD) messages (according to RFC 3706) to the remote peer. This value specifies the timeout in seconds, the remote peer is declared dead, if not responding. The value 0 disables this feature. |
hm2VpnConnIkeLocalAddr | 1.3.6.1.4.1.248.11.120.1.2.10.1.6 | displaystring | read-only |
Hostname (FQDN) or IP address of local security gateway. If the value is 'any', then the IP address of the matching interface is used. Establishing the connection may be delayed until the hostname (if specified) can be resolved. |
hm2VpnConnIkeRemoteAddr | 1.3.6.1.4.1.248.11.120.1.2.10.1.7 | displaystring | read-only |
Typically the hostname (FQDN) or IP address of remote security gateway. If this value is 'any', then any IP address is accepted when establishing an IKE-SA as responder. Also a network in CIDR notation, to be accepted when establishing the IKE-SA, is allowed as responder. As initiator such values are not allowed. Establishing the VPN connection may be delayed until the hostname (if specified) can be resolved. |
hm2VpnConnIkeAuthType | 1.3.6.1.4.1.248.11.120.1.2.10.1.8 | integer | read-only |
Type of authentication to be used: pre-shared key, individual X509 certificates (separate for CA and local identification) or one PKCS12 container with all the needed certificates (including the CA). Enumeration: 'psk': 1, 'individualx509': 2, 'pkcs12': 3. |
hm2VpnConnIkeAuthMode | 1.3.6.1.4.1.248.11.120.1.2.10.1.9 | integer | read-only |
The phase 1 exchange mode to be used (IKEv1). Enumeration: 'aggressive': 2, 'main': 1. |
hm2VpnConnIkeAuthCertCA | 1.3.6.1.4.1.248.11.120.1.2.10.1.10 | displaystring | read-only |
PEM encoded X.509 certificate file name (RFC 1422), if authentication type in 'hm2VpnConnIkeAuthType' is 'individualx509'. This certificate is used for RSA based signature verification in local and remote certificates. The file needs to be uploaded separately. |
hm2VpnConnIkeAuthCertRemote | 1.3.6.1.4.1.248.11.120.1.2.10.1.11 | displaystring | read-only |
PEM encoded X.509 certificate file name (RFC 1422), if authentication type in 'hm2VpnConnIkeAuthType' is 'individualx509'. This certificate is used for RSA based authentication of remote peer at the local side. This certificate binds the identity of remote peer to it's public key. It is optional because typically send by the remote peer while negotiating an ISAKMP/IKE security association. The file needs to be uploaded separately. |
hm2VpnConnIkeAuthCertLocal | 1.3.6.1.4.1.248.11.120.1.2.10.1.12 | displaystring | read-only |
PEM encoded X.509 certificate file name (RFC 1422) to be used, if authentication type in 'hm2VpnConnIkeAuthType' is 'individualx509' or 'pkcs12'. This certificate is used for authentication of local peer at the remote side. The certificate binds the identity of local peer to it's public key, signed by the certification authority (CA) from 'hm2VpnConnIkeAuthCertCA'. The file needs to be uploaded separately. |
hm2VpnConnIkeAuthPrivKey | 1.3.6.1.4.1.248.11.120.1.2.10.1.13 | displaystring | read-only |
Private key file name to be used, if authentication type in 'hm2VpnConnIkeAuthType' is 'individualx509' and the key stored on the device is encrypted with a passphrase (so it cannot automatically be matched with the certificate). Note that this is only the filename of the private key. The passphrase must be added to 'hm2VpnConnIkeAuthPasswd'. |
hm2VpnConnIkeAuthPasswd | 1.3.6.1.4.1.248.11.120.1.2.10.1.14 | displaystring | read-only |
Passphrase to be used for decryption of private key from 'hm2VpnConnIkeAuthPrivKey' or the certificate container for 'pkcs12' type certificates which are uploaded encrypted. |
hm2VpnConnIkeAuthPsk | 1.3.6.1.4.1.248.11.120.1.2.10.1.15 | displaystring | read-only |
Pre-shared key (passphrase) to be used if authentication type in 'hm2VpnConnIkeAuthType' is 'psk'. The pre-shared key sequence cannot contain newline or double-quote characters. Alternatively to characters sequence, pre-shared secrets can be represented as hexadecimal or Base64 encoded binary values. A character sequence beginning with 0x is interpreted as sequence hexadecimal digits. Similarly, a character sequence beginning with 0s is interpreted as Base64 encoded binary data. |
hm2VpnConnIkeAuthLocId | 1.3.6.1.4.1.248.11.120.1.2.10.1.16 | displaystring | read-only |
Local peer identifier to be sent within ID payload during negotiation. The ID payload is used to identify the initiator of the security association. The identity is used by the responder to determine the correct host system security policy requirement for the association (see RFC 2407, section 4.6.2 for details when using IKEv1 and RFC 4306, section 3.5 for IKEv2). Allowed formats for this object depend on 'hm2VpnConnIkeAuthLocType': o default: don't care o address: don't care, take IPv4 address or host name from hm2VpnConnIkeLocalAddr o id: - IPv4 address or host name - key identifier - fully qualified domain name - fully qualified RFC 822 email address - X.500 distinguished name (DN) |
hm2VpnConnIkeAuthLocType | 1.3.6.1.4.1.248.11.120.1.2.10.1.17 | integer | read-only |
Type of local peer identifier in 'hm2VpnConnIkeAuthLocId': o default: If 'hm2VpnConnIkeAuthType' is 'psk' then use the IP address or host name from 'hm2VpnConnIkeLocalAddr' as local identifier. In case of 'individualx509' or 'pkcs12' use the DN from local certificate in 'hm2VpnConnIkeAuthCertLocal'. o address: use the IP address or DNS name from 'hm2VpnConnIkeLocalAddr' as local identifier. o id: use the configured value in hm2VpnConnIkeAuthLocId (it can be of any type in the description). For further information see RFC 2407, section 4.6.2 Enumeration: 'default': 1, 'id': 3, 'address': 2. |
hm2VpnConnIkeAuthRemId | 1.3.6.1.4.1.248.11.120.1.2.10.1.18 | displaystring | read-only |
Remote peer identifier to be compared with ID payload during negotiation. The ID payload is used to identify the initiator of the security association. The identity is used by the responder to determine the correct host system security policy requirement for the association (see RFC 2407, section 4.6.2 for details when using IKEv1 and RFC 4306, section 3.5 for IKEv2). Allowed formats for this entry depend on 'hm2VpnConnIkeAuthRemType': o any: don't care o address: don't care, take IPv4 address or host name from hm2VpnConnIkeRemoteAddr o id: - IPv4 address or host name - key identifier - fully qualified domain name - fully qualified RFC 822 email address - X.500 distinguished name (DN) |
hm2VpnConnIkeAuthRemType | 1.3.6.1.4.1.248.11.120.1.2.10.1.19 | integer | read-only |
Type of remote peer identifier in hm2VpnConnIkeAuthRemId: o any: received remote identifier is not checked o address: use the IP address or host name from 'hm2VpnConnIkeRemoteAddr' as remote identifier. o id: use the configured value in hm2VpnConnIkeAuthRemId (it can be of any type in the description). For further information see RFC 2407, section 4.6.2 Enumeration: 'id': 3, 'any': 1, 'address': 2. |
hm2VpnConnIkeAlgDh | 1.3.6.1.4.1.248.11.120.1.2.10.1.20 | integer | read-only |
Diffie-Hellman key agreement algorithm to be used for establishment of IKE-SA: o any: accept all supported algorithms as responder, use default as initiator o modp1024: RSA with 1024 bits modulus (DH Group 2) o modp1536: RSA with 1536 bits modulus (DH Group 5) o modp2048: RSA with 2048 bits modulus (DH Group 14) o modp3072: RSA with 3072 bits modulus (DH Group 15) o modp4096: RSA with 4096 bits modulus (DH Group 16) Enumeration: 'modp1536': 3, 'modp1024': 2, 'modp3072': 5, 'modp4096': 6, 'modp2048': 4, 'any': 1. |
hm2VpnConnIkeAlgMac | 1.3.6.1.4.1.248.11.120.1.2.10.1.21 | integer | read-only |
Integrity (MAC) algorithm to be used in IKEv2: o any: accept all supported algorithms as responder, use various pre-defined as initiator o hmacmd5: HMAC-MD5 (length 96 bit) o hmacsha1: HMAC-SHA1 (length 96 bit) o hmacsha256: HMAC-SHA256 (length 128 bit) o hmacsha384: HMAC-SHA384 (length 196 bit) o hmacsha512: HMAC-SHA512 (length 256 bit) Enumeration: 'hmacsha512': 6, 'hmacsha384': 5, 'hmacsha256': 4, 'hmacmd5': 2, 'hmacsha1': 3, 'any': 1. |
hm2VpnConnIkeAlgEncr | 1.3.6.1.4.1.248.11.120.1.2.10.1.22 | integer | read-only |
Encryption algorithm to be used in IKE: o any: accept all supported algorithms as responder, use various pre-defined as initiator o des: DES o des3: Triple-DES o aes128: AES with 128 key bits o aes192: AES with 192 key bits o aes256: AES with 256 key bits Enumeration: 'aes256': 6, 'des': 2, 'des3': 3, 'aes128': 4, 'aes192': 5, 'any': 1. |
hm2VpnConnIkeReAuth | 1.3.6.1.4.1.248.11.120.1.2.10.1.23 | truthvalue | read-only |
whether re-keying of an IKE_SA should also re-authenticate the peer. In IKEv1, re-authentication is always done (also when set to false). In IKEv2, a value of false does re-keying without un-installing the IPsec SAs, a value of true creates a new IKE_SA from scratch and tries to recreate all IPsec SAs. |
hm2VpnConnIpsecMode | 1.3.6.1.4.1.248.11.120.1.2.10.1.24 | integer | read-only |
IPsec encapsulation mode. Enumeration: 'tunnel': 1. |
hm2VpnConnIpsecLifetime | 1.3.6.1.4.1.248.11.120.1.2.10.1.25 | integer32 | read-only |
Lifetime of IPsec security association in seconds. The maximum value is 8 hours (28800 seconds). |
hm2VpnConnMargintime | 1.3.6.1.4.1.248.11.120.1.2.10.1.26 | integer32 | read-only |
How long before connection expiry or keying-channel expiry should attempts to negotiate a replacement begin. The maximum value is half an hour (1800 seconds). The margin time needs to be at most half of the lifetime. |
hm2VpnConnIpsecAlgDh | 1.3.6.1.4.1.248.11.120.1.2.10.1.27 | integer | read-only |
Diffie-Hellman key agreement algorithm to be used for IPsec-SA session key establishment: o any: accept all supported algorithms as responder, use various pre-defined as initiator o modp1024: RSA with 1024 bits modulus (DH Group 2) o modp1536: RSA with 1536 bits modulus (DH Group 5) o modp2048: RSA with 2048 bits modulus (DH Group 14) o modp3072: RSA with 3072 bits modulus (DH Group 15) o modp4096: RSA with 4096 bits modulus (DH Group 16) o none: no Perfect Forward Secrecy (PFS) Enumeration: 'modp1536': 3, 'none': 7, 'modp1024': 2, 'modp3072': 5, 'modp4096': 6, 'modp2048': 4, 'any': 1. |
hm2VpnConnIpsecAlgMac | 1.3.6.1.4.1.248.11.120.1.2.10.1.28 | integer | read-only |
Integrity (MAC) algorithm to be used in IPsec: o any: accept all supported algorithms as responder, use various pre-defined as initiator o hmacmd5: HMAC-MD5 (length 96 bit) o hmacsha1: HMAC-SHA1 (length 96 bit) o hmacsha256: HMAC-SHA256 (length 128 bit) o hmacsha384: HMAC-SHA384 (length 196 bit) o hmacsha512: HMAC-SHA512 (length 256 bit) Enumeration: 'hmacsha512': 6, 'hmacsha384': 5, 'hmacsha256': 4, 'hmacmd5': 2, 'hmacsha1': 3, 'any': 1. |
hm2VpnConnIpsecAlgEncr | 1.3.6.1.4.1.248.11.120.1.2.10.1.29 | integer | read-only |
Encryption algorithm to be used for payload encryption in IPsec: o any: accept all supported algorithms as responder, use various pre-defined as initiator o des: DES o des3: Triple-DES o aes128: AES-CBC with 128 key bits o aes192: AES-CBC with 192 key bits o aes256: AES-CBC with 256 key bits o aes128ctr: AES-COUNTER with 128 key bits o aes192ctr: AES-COUNTER with 192 key bits o aes256ctr: AES-COUNTER with 256 key bits o aes128gcm64: AES-GCM with 64 bit ICV with 128 key bits o aes128gcm96: AES-GCM with 96 bit ICV with 128 key bits o aes128gcm128: AES-GCM with 128 bit ICV with 128 key bits o aes192gcm64: AES-GCM with 64 bit ICV with 192 key bits o aes192gcm96: AES-GCM with 96 bit ICV with 192 key bits o aes192gcm128: AES-GCM with 128 bit ICV with 192 key bits o aes256gcm64: AES-GCM with 64 bit ICV with 256 key bits o aes256gcm96: AES-GCM with 96 bit ICV with 256 key bits o aes256gcm128: AES-GCM with 128 bit ICV with 256 key bits Enumeration: 'aes128ctr': 7, 'aes256': 6, 'aes128gcm96': 11, 'aes192gcm64': 13, 'aes192gcm96': 14, 'aes192gcm128': 15, 'aes128gcm64': 10, 'des': 2, 'aes128gcm128': 12, 'des3': 3, 'aes256ctr': 9, 'aes192ctr': 8, 'aes128': 4, 'aes256gcm96': 17, 'aes256gcm128': 18, 'aes192': 5, 'aes256gcm64': 16, 'any': 1. |
hm2VpnConnOperStatus | 1.3.6.1.4.1.248.11.120.1.2.10.1.30 | integer | read-only |
The current operational status of the VPN connection: o 'up': the IKE-SA and all IPsec SAs are up; o 'down': the IKE-SA and all IPsec SAs are down; o 'negotiation': key exchange and algorithm negotiation is in progress (or, as responder, waiting to be contacted for that purpose); o 'constructing': the IKE-SA is up, but at least one IPsec-SA is not established so far; o 'dormant': waiting for a precondition to be fulfilled before connection setup, e.g.: - a dynamically assigned IP address; - successful hostname resolution; - assignment of a valid system time. o 're-keying': key exchange is in progress after timeout of lifetime has occured, either IKE or IPSEC; Enumeration: 'negotiation': 3, 'dormant': 5, 'constructing': 4, 'up': 1, 'down': 2, 're-keying': 6. |
hm2VpnConnDesc | 1.3.6.1.4.1.248.11.120.1.2.10.1.31 | displaystring | read-only |
User defined text. |
hm2VpnConnLastError | 1.3.6.1.4.1.248.11.120.1.2.10.1.32 | hmlargedisplaystring | read-only |
Last error notification occurred for this connection. This is useful if the connection does not reach the up state to see if an error has occurred in the proposal exchange or when establishing the tunnel. In most cases this variable should be empty. |
hm2VpnConnDebug | 1.3.6.1.4.1.248.11.120.1.2.10.1.33 | bits | read-only |
Used for debugging purpose of the VPN connections. May affect the performance significant. Please handle with care. If the bit is set informational(0) messages, unhandled(1) messages (not handled by the stack) are logged to the event log Bits: 'unhandled': 1, 'informational': 0. |
hm2VpnConnRowStatus | 1.3.6.1.4.1.248.11.120.1.2.10.1.34 | rowstatus | read-only |
The row status of this table entry. If the row status is 'active' then it is not allowed to change any value (this applies also to active traffic selectors). The maximum number of active VPN connections is limited to hm2VpnConnMax. The maximum number of active and up VPN connections is limited to hm2VpnConnActiveMax. |
hm2VpnConnInfoTable | 1.3.6.1.4.1.248.11.120.1.2.15 | no-access |
A list of VPN connections. |
|
1.3.6.1.4.1.248.11.120.1.2.15.1 | no-access |
A VPN connection entry. |
||
hm2VpnConnInfoIkeVersionUsed | 1.3.6.1.4.1.248.11.120.1.2.15.1.1 | integer | read-only |
Version of the IKE protocol used by connection: o ikev1: used protocol is IKE version 1 (ISAKMP) o ikev2: used protocol is IKE version 2 Enumeration: 'ikev2': 2, 'ikev1': 1. |
hm2VpnConnInfoIkeProposal | 1.3.6.1.4.1.248.11.120.1.2.15.1.2 | displaystring | read-only |
Algorithms the IKE use for key exchange. |
hm2VpnConnInfoIpsecProposal | 1.3.6.1.4.1.248.11.120.1.2.15.1.3 | displaystring | read-only |
Algorithms IPsec use for the data communication. |
hm2VpnConnInfoLocalHost | 1.3.6.1.4.1.248.11.120.1.2.15.1.4 | displaystring | read-only |
Local host detected by IKE. |
hm2VpnConnInfoRemoteHost | 1.3.6.1.4.1.248.11.120.1.2.15.1.5 | displaystring | read-only |
Remote host detected by IKE. |
hm2VpnConnInfoEstablished | 1.3.6.1.4.1.248.11.120.1.2.15.1.6 | unsigned32 | read-only |
Time in seconds since the connection has been established (is updated after IKE re-authentication). |
hm2VpnConnInfoIKEReauth | 1.3.6.1.4.1.248.11.120.1.2.15.1.7 | unsigned32 | read-only |
Time in seconds when the next IKE re-authentication will take place. |
hm2VpnConnInfoIKERekeying | 1.3.6.1.4.1.248.11.120.1.2.15.1.8 | unsigned32 | read-only |
Time in seconds when the next IKE re-keying will take place. |
hm2VpnConnInfoIpsecRekeying | 1.3.6.1.4.1.248.11.120.1.2.15.1.9 | unsigned32 | read-only |
Time in seconds when the next IPsec re-keying will take place. |
hm2VpnConnInfoIpsecInBytes | 1.3.6.1.4.1.248.11.120.1.2.15.1.10 | counter64 | read-only |
Number of input Bytes from this IPsec tunnel. |
hm2VpnConnInfoIpsecInPackets | 1.3.6.1.4.1.248.11.120.1.2.15.1.11 | counter64 | read-only |
Number of input packets from this IPsec tunnel. |
hm2VpnConnInfoIpsecInUse | 1.3.6.1.4.1.248.11.120.1.2.15.1.12 | unsigned32 | read-only |
Time in seconds since the IPsec tunnel has received last time data. |
hm2VpnConnInfoIpsecOutBytes | 1.3.6.1.4.1.248.11.120.1.2.15.1.13 | counter64 | read-only |
Number of output Bytes to this IPsec tunnel. |
hm2VpnConnInfoIpsecOutPackets | 1.3.6.1.4.1.248.11.120.1.2.15.1.14 | counter64 | read-only |
Number of output packets to this IPsec tunnel. |
hm2VpnConnInfoIpsecOutUse | 1.3.6.1.4.1.248.11.120.1.2.15.1.15 | unsigned32 | read-only |
Time in seconds since to the IPsec tunnel has sent last time data. |
hm2VpnConnInfoIKEInitiatorSPI | 1.3.6.1.4.1.248.11.120.1.2.15.1.16 | displaystring | read-only |
The IKE initiator SPI (local or remote, depends on initiator settings). |
hm2VpnConnInfoIKEResponderSPI | 1.3.6.1.4.1.248.11.120.1.2.15.1.17 | displaystring | read-only |
The IKE responder SPI (local or remote, depends on initiator settings). |
hm2VpnConnInfoIpsecInSPI | 1.3.6.1.4.1.248.11.120.1.2.15.1.18 | displaystring | read-only |
The input IPsec SPI. |
hm2VpnConnInfoIpsecOutSPI | 1.3.6.1.4.1.248.11.120.1.2.15.1.19 | displaystring | read-only |
The output IPsec SPI. |
hm2VpnTrafficSelGroup | 1.3.6.1.4.1.248.11.120.1.3 | |||
hm2VpnTrafficSelTable | 1.3.6.1.4.1.248.11.120.1.3.1 | no-access |
A list of traffic selectors. For details on the role of traffic selectors in IPsec protocol see RFC 2409, section 5.5 and RFC 4306, section 2.9. |
|
1.3.6.1.4.1.248.11.120.1.3.1.1 | no-access |
A traffic selector entry. A traffic selector defines the subnet/host addresses for which this IPSec connection (SA) is responsible. |
||
hm2VpnTrafficSelIndex | 1.3.6.1.4.1.248.11.120.1.3.1.1.1 | integer32 | no-access |
An index that (together with the connection index hm2VpnConnIndex) identifies the entry in the traffic selector table. This index can be choosen freely, but must be greater than 0. |
hm2VpnTrafficSelSrcAddr | 1.3.6.1.4.1.248.11.120.1.3.1.1.2 | displaystring | read-only |
Host or subnet address in CIDR notation (a.b.c.d/n) for which this traffic descriptor (and the associated VPN connection) is responsible. This address is compared to the source address of IP packets sent, when determining the associated IPsec and IKE-SA. The special keyword 'any' means that the address comparison always matches. |
hm2VpnTrafficSelDstAddr | 1.3.6.1.4.1.248.11.120.1.3.1.1.3 | displaystring | read-only |
Host or subnet address in CIDR notation (a.b.c.d/n) for which this traffic descriptor (and the associated VPN connection) is responsible. This address is compared to the destination address of IP packets sent, when determining the associated IPsec and IKE-SA. The special keyword 'any' means that the address comparison always matches. |
hm2VpnTrafficSelSrcRest | 1.3.6.1.4.1.248.11.120.1.3.1.1.4 | displaystring | read-only |
The optional source restrictions (names or numbers) |
hm2VpnTrafficSelDstRest | 1.3.6.1.4.1.248.11.120.1.3.1.1.5 | displaystring | read-only |
The optional destination restrictions (names or numbers) |
hm2VpnTrafficSelDesc | 1.3.6.1.4.1.248.11.120.1.3.1.1.6 | displaystring | read-only |
User defined text. |
hm2VpnTrafficSelRowStatus | 1.3.6.1.4.1.248.11.120.1.3.1.1.7 | rowstatus | read-only |
The row status of this table entry. Only traffic selector entries with an 'active' row status will be considered if the connections row status is set 'active'. Independent of that dependency any value in this entry can be changed only if the row status is not 'active'. |
hm2VpnCertificateGroup | 1.3.6.1.4.1.248.11.120.1.4 | |||
hm2VpnCertificateUploadPassphrase | 1.3.6.1.4.1.248.11.120.1.4.1 | displaystring | read-write |
Setting the correct passphrase here before uploading an encrypted private key or an encrypted PKCS12 container will trigger the decryption of the uploaded file before storing on the device. The value cannot be read and is not stored after the file transfer. WARNING: the file is stored unencrypted on the device. Use with care! |
hm2VpnCertificateTable | 1.3.6.1.4.1.248.11.120.1.4.10 | no-access |
The list of certificates available on the device. |
|
1.3.6.1.4.1.248.11.120.1.4.10.1 | no-access |
A certificate file entry. A certificate file which has been copied to the device and can be used for VPN connections. |
||
hm2VpnCertificateIndex | 1.3.6.1.4.1.248.11.120.1.4.10.1.1 | integer32 | no-access |
Index of the entry. |
hm2VpnCertificateSubject | 1.3.6.1.4.1.248.11.120.1.4.10.1.2 | displaystring | read-only |
Subject field of certificate. |
hm2VpnCertificateIssuer | 1.3.6.1.4.1.248.11.120.1.4.10.1.3 | displaystring | read-only |
Certificate issuer. |
hm2VpnCertificateStartDate | 1.3.6.1.4.1.248.11.120.1.4.10.1.4 | hmtimeseconds1970 | read-only |
Time and date when certificate is begining to be valid. |
hm2VpnCertificateEndDate | 1.3.6.1.4.1.248.11.120.1.4.10.1.5 | hmtimeseconds1970 | read-only |
Time and date when certificate will expire. |
hm2VpnCertificateFileName | 1.3.6.1.4.1.248.11.120.1.4.10.1.6 | displaystring | read-only |
Name of the file consisting of alphanumeric characters plus hyphen, underscore and dot. |
hm2VpnCertificateType | 1.3.6.1.4.1.248.11.120.1.4.10.1.7 | integer | read-only |
Type of the container file used. Enumeration: 'peer': 2, 'encryptedkey': 3, 'ca': 1, 'pkcs12': 4, 'encryptedpkcs12': 5. |
hm2VpnCertificateCertUploadDate | 1.3.6.1.4.1.248.11.120.1.4.10.1.8 | hmtimeseconds1970 | read-only |
Time and date of last write access using the content of the variable hm2SystemTime. |
hm2VpnCertificatePrivateKeyStatus | 1.3.6.1.4.1.248.11.120.1.4.10.1.9 | integer | read-only |
Shows if a Peer certificate has a private key uploaded on the device. A Peer certificate cannot be used without a private key uploaded to the device. Does not apply to CA certificates. Enumeration: 'notFound': 3, 'none': 1, 'present': 2. |
hm2VpnCertificatePrivateKeyFile | 1.3.6.1.4.1.248.11.120.1.4.10.1.10 | displaystring | read-only |
Name of the file consisting of alphanumeric characters plus hyphen, underscore and dot. |
hm2VpnCertificateNoConnections | 1.3.6.1.4.1.248.11.120.1.4.10.1.11 | integer32 | read-only |
Number of active connections that use this certificate. The certificate cannot be deleted from the device unless there are no active connections using it (this field is set to 0). |
hm2VpnCertificateUserActions | 1.3.6.1.4.1.248.11.120.1.4.10.1.12 | integer | read-write |
Provides a way to delete unused certificate files from the device. A certificate can only be deleted if there are no active connections using it (see hm2VpnCertificateNoConnections). Deleting a Peer certificate automatically deletes the private key asociated with it (if any). Enumeration: 'other': 1, 'delete': 2. |
hm2VpnMibSNMPExtensionGroup | 1.3.6.1.4.1.248.11.120.3 | |||
hm2VpnMibSNMPExtensionNoTrafficSelector | 1.3.6.1.4.1.248.11.120.3.1 |
Indicates that for a VPN connection no active traffic selectors are available. |
||
hm2VpnMibSNMPExtensionTooManyActive | 1.3.6.1.4.1.248.11.120.3.2 |
Indicates that too many VPN connections are in active state. |
||
hm2VpnMibSNMPExtensionTooManyConns | 1.3.6.1.4.1.248.11.120.3.3 |
Indicates that too many VPN connections shall be added to the configuration. |
||
hm2VpnMibSNMPExtensionActiveRow | 1.3.6.1.4.1.248.11.120.3.4 |
Indicates that an active row shall be changed. |
||
hm2VpnMibSNMPExtensionInitiatorAny | 1.3.6.1.4.1.248.11.120.3.5 |
Indicates that for a VPN connection as initiator the remote end point is set to any. |