HM2-VPN-MIB: View SNMP OID List / Download MIB

VENDOR: RICHARD HIRSCHMANN


 Home MIB: HM2-VPN-MIB
Download as:   

Download standard MIB format if you are planning to load a MIB file into some system (OS, Zabbix, PRTG ...) or view it with a MIB browser. CSV is more suitable for analyzing and viewing OID' and other MIB objects in excel. JSON and YAML formats are usually used in programing even though some systems can use MIB in YAML format (like Logstash).
Keep in mind that standard MIB files can be successfully loaded by systems and programs only if all the required MIB's from the "Imports" section are already loaded.
The tree-like SNMP object navigator requires no explanations because it is very simple to use. And if you stumbled on this MIB from Google note that you can always go back to the home page if you need to perform another MIB or OID lookup.


Object Name OID Type Access Info
 hm2VpnMib 1.3.6.1.4.1.248.11.120
This MIB defines the SNMP interface for Hirschmann VPN implementations.
         hm2VpnMibNotifications 1.3.6.1.4.1.248.11.120.0
             hm2VpnUpTrap 1.3.6.1.4.1.248.11.120.0.1
A hm2VpnUpTrap trap signals that a VPN connection is about to enter the up state from some other state (see 'hm2VpnConnOperStatus').
             hm2VpnDownTrap 1.3.6.1.4.1.248.11.120.0.2
A hm2VpnDownTrap trap signals that a VPN connection is about to enter the down state from some other state (see 'hm2VpnConnOperStatus').
         hm2VpnMibObjects 1.3.6.1.4.1.248.11.120.1
             hm2VpnGeneralGroup 1.3.6.1.4.1.248.11.120.1.1
             hm2VpnConnectionGroup 1.3.6.1.4.1.248.11.120.1.2
                 hm2VpnConnMax 1.3.6.1.4.1.248.11.120.1.2.1 integer32 read-only
Maximum number of VPN connections supported. Notice that the maximum number of active and up VPN connections is limited to hm2VpnConnActiveMax.
                 hm2VpnConnActiveMax 1.3.6.1.4.1.248.11.120.1.2.2 integer32 read-only
Maximum number of active (and up) VPN connections supported.
                 hm2VpnConnNext 1.3.6.1.4.1.248.11.120.1.2.3 integer32 read-only
This object always holds an appropriate value to be used for hm2VpnConnIndex when creating entries in the hm2VpnConnTable. The value 0 indicates that no unassigned entries are available. To obtain the hm2VpnConnIndex value for a new entry, the management station issues a SNMP retrieval operation to obtain the current value of this object. After each row creation or deletion the agent modifies the value to the next unassigned index.
                 hm2VpnConnTable 1.3.6.1.4.1.248.11.120.1.2.10 no-access
A list of VPN connections.
                       hm2VpnConnEntry 1.3.6.1.4.1.248.11.120.1.2.10.1 no-access
A VPN connection entry.
                           hm2VpnConnIndex 1.3.6.1.4.1.248.11.120.1.2.10.1.1 integer32 no-access
An index that uniquely identifies the entry in the table.
                           hm2VpnConnIkeVersion 1.3.6.1.4.1.248.11.120.1.2.10.1.2 integer read-only
Version of the IKE protocol: o ike: accept IKEv1/v2 as responder, start with IKEv2 as initiator o ikev1: used protocol is IKE version 1 (ISAKMP) o ikev2: used protocol is IKE version 2 Enumeration: 'ikev2': 3, 'ike': 1, 'ikev1': 2.
                           hm2VpnConnIkeStartup 1.3.6.1.4.1.248.11.120.1.2.10.1.3 integer read-only
If this host acts as a responder it does not initiate a key exchange (IKE) nor connection parameters negotiation. Otherwise, this host acts as an initiator - then it initiates an IKE actively. Enumeration: 'initiator': 1, 'responder': 2.
                           hm2VpnConnIkeLifetime 1.3.6.1.4.1.248.11.120.1.2.10.1.4 integer32 read-only
Lifetime of IKE security association in seconds. The maximum value is 24 hours (86400 seconds).
                           hm2VpnConnIkeDpdTimeout 1.3.6.1.4.1.248.11.120.1.2.10.1.5 integer32 read-only
If greater than zero, the local peer sends Dead Peer Detection (DPD) messages (according to RFC 3706) to the remote peer. This value specifies the timeout in seconds, the remote peer is declared dead, if not responding. The value 0 disables this feature.
                           hm2VpnConnIkeLocalAddr 1.3.6.1.4.1.248.11.120.1.2.10.1.6 displaystring read-only
Hostname (FQDN) or IP address of local security gateway. If the value is 'any', then the IP address of the matching interface is used. Establishing the connection may be delayed until the hostname (if specified) can be resolved.
                           hm2VpnConnIkeRemoteAddr 1.3.6.1.4.1.248.11.120.1.2.10.1.7 displaystring read-only
Typically the hostname (FQDN) or IP address of remote security gateway. If this value is 'any', then any IP address is accepted when establishing an IKE-SA as responder. Also a network in CIDR notation, to be accepted when establishing the IKE-SA, is allowed as responder. As initiator such values are not allowed. Establishing the VPN connection may be delayed until the hostname (if specified) can be resolved.
                           hm2VpnConnIkeAuthType 1.3.6.1.4.1.248.11.120.1.2.10.1.8 integer read-only
Type of authentication to be used: pre-shared key, individual X509 certificates (separate for CA and local identification) or one PKCS12 container with all the needed certificates (including the CA). Enumeration: 'psk': 1, 'individualx509': 2, 'pkcs12': 3.
                           hm2VpnConnIkeAuthMode 1.3.6.1.4.1.248.11.120.1.2.10.1.9 integer read-only
The phase 1 exchange mode to be used (IKEv1). Enumeration: 'aggressive': 2, 'main': 1.
                           hm2VpnConnIkeAuthCertCA 1.3.6.1.4.1.248.11.120.1.2.10.1.10 displaystring read-only
PEM encoded X.509 certificate file name (RFC 1422), if authentication type in 'hm2VpnConnIkeAuthType' is 'individualx509'. This certificate is used for RSA based signature verification in local and remote certificates. The file needs to be uploaded separately.
                           hm2VpnConnIkeAuthCertRemote 1.3.6.1.4.1.248.11.120.1.2.10.1.11 displaystring read-only
PEM encoded X.509 certificate file name (RFC 1422), if authentication type in 'hm2VpnConnIkeAuthType' is 'individualx509'. This certificate is used for RSA based authentication of remote peer at the local side. This certificate binds the identity of remote peer to it's public key. It is optional because typically send by the remote peer while negotiating an ISAKMP/IKE security association. The file needs to be uploaded separately.
                           hm2VpnConnIkeAuthCertLocal 1.3.6.1.4.1.248.11.120.1.2.10.1.12 displaystring read-only
PEM encoded X.509 certificate file name (RFC 1422) to be used, if authentication type in 'hm2VpnConnIkeAuthType' is 'individualx509' or 'pkcs12'. This certificate is used for authentication of local peer at the remote side. The certificate binds the identity of local peer to it's public key, signed by the certification authority (CA) from 'hm2VpnConnIkeAuthCertCA'. The file needs to be uploaded separately.
                           hm2VpnConnIkeAuthPrivKey 1.3.6.1.4.1.248.11.120.1.2.10.1.13 displaystring read-only
Private key file name to be used, if authentication type in 'hm2VpnConnIkeAuthType' is 'individualx509' and the key stored on the device is encrypted with a passphrase (so it cannot automatically be matched with the certificate). Note that this is only the filename of the private key. The passphrase must be added to 'hm2VpnConnIkeAuthPasswd'.
                           hm2VpnConnIkeAuthPasswd 1.3.6.1.4.1.248.11.120.1.2.10.1.14 displaystring read-only
Passphrase to be used for decryption of private key from 'hm2VpnConnIkeAuthPrivKey' or the certificate container for 'pkcs12' type certificates which are uploaded encrypted.
                           hm2VpnConnIkeAuthPsk 1.3.6.1.4.1.248.11.120.1.2.10.1.15 displaystring read-only
Pre-shared key (passphrase) to be used if authentication type in 'hm2VpnConnIkeAuthType' is 'psk'. The pre-shared key sequence cannot contain newline or double-quote characters. Alternatively to characters sequence, pre-shared secrets can be represented as hexadecimal or Base64 encoded binary values. A character sequence beginning with 0x is interpreted as sequence hexadecimal digits. Similarly, a character sequence beginning with 0s is interpreted as Base64 encoded binary data.
                           hm2VpnConnIkeAuthLocId 1.3.6.1.4.1.248.11.120.1.2.10.1.16 displaystring read-only
Local peer identifier to be sent within ID payload during negotiation. The ID payload is used to identify the initiator of the security association. The identity is used by the responder to determine the correct host system security policy requirement for the association (see RFC 2407, section 4.6.2 for details when using IKEv1 and RFC 4306, section 3.5 for IKEv2). Allowed formats for this object depend on 'hm2VpnConnIkeAuthLocType': o default: don't care o address: don't care, take IPv4 address or host name from hm2VpnConnIkeLocalAddr o id: - IPv4 address or host name - key identifier - fully qualified domain name - fully qualified RFC 822 email address - X.500 distinguished name (DN)
                           hm2VpnConnIkeAuthLocType 1.3.6.1.4.1.248.11.120.1.2.10.1.17 integer read-only
Type of local peer identifier in 'hm2VpnConnIkeAuthLocId': o default: If 'hm2VpnConnIkeAuthType' is 'psk' then use the IP address or host name from 'hm2VpnConnIkeLocalAddr' as local identifier. In case of 'individualx509' or 'pkcs12' use the DN from local certificate in 'hm2VpnConnIkeAuthCertLocal'. o address: use the IP address or DNS name from 'hm2VpnConnIkeLocalAddr' as local identifier. o id: use the configured value in hm2VpnConnIkeAuthLocId (it can be of any type in the description). For further information see RFC 2407, section 4.6.2 Enumeration: 'default': 1, 'id': 3, 'address': 2.
                           hm2VpnConnIkeAuthRemId 1.3.6.1.4.1.248.11.120.1.2.10.1.18 displaystring read-only
Remote peer identifier to be compared with ID payload during negotiation. The ID payload is used to identify the initiator of the security association. The identity is used by the responder to determine the correct host system security policy requirement for the association (see RFC 2407, section 4.6.2 for details when using IKEv1 and RFC 4306, section 3.5 for IKEv2). Allowed formats for this entry depend on 'hm2VpnConnIkeAuthRemType': o any: don't care o address: don't care, take IPv4 address or host name from hm2VpnConnIkeRemoteAddr o id: - IPv4 address or host name - key identifier - fully qualified domain name - fully qualified RFC 822 email address - X.500 distinguished name (DN)
                           hm2VpnConnIkeAuthRemType 1.3.6.1.4.1.248.11.120.1.2.10.1.19 integer read-only
Type of remote peer identifier in hm2VpnConnIkeAuthRemId: o any: received remote identifier is not checked o address: use the IP address or host name from 'hm2VpnConnIkeRemoteAddr' as remote identifier. o id: use the configured value in hm2VpnConnIkeAuthRemId (it can be of any type in the description). For further information see RFC 2407, section 4.6.2 Enumeration: 'id': 3, 'any': 1, 'address': 2.
                           hm2VpnConnIkeAlgDh 1.3.6.1.4.1.248.11.120.1.2.10.1.20 integer read-only
Diffie-Hellman key agreement algorithm to be used for establishment of IKE-SA: o any: accept all supported algorithms as responder, use default as initiator o modp1024: RSA with 1024 bits modulus (DH Group 2) o modp1536: RSA with 1536 bits modulus (DH Group 5) o modp2048: RSA with 2048 bits modulus (DH Group 14) o modp3072: RSA with 3072 bits modulus (DH Group 15) o modp4096: RSA with 4096 bits modulus (DH Group 16) Enumeration: 'modp1536': 3, 'modp1024': 2, 'modp3072': 5, 'modp4096': 6, 'modp2048': 4, 'any': 1.
                           hm2VpnConnIkeAlgMac 1.3.6.1.4.1.248.11.120.1.2.10.1.21 integer read-only
Integrity (MAC) algorithm to be used in IKEv2: o any: accept all supported algorithms as responder, use various pre-defined as initiator o hmacmd5: HMAC-MD5 (length 96 bit) o hmacsha1: HMAC-SHA1 (length 96 bit) o hmacsha256: HMAC-SHA256 (length 128 bit) o hmacsha384: HMAC-SHA384 (length 196 bit) o hmacsha512: HMAC-SHA512 (length 256 bit) Enumeration: 'hmacsha512': 6, 'hmacsha384': 5, 'hmacsha256': 4, 'hmacmd5': 2, 'hmacsha1': 3, 'any': 1.
                           hm2VpnConnIkeAlgEncr 1.3.6.1.4.1.248.11.120.1.2.10.1.22 integer read-only
Encryption algorithm to be used in IKE: o any: accept all supported algorithms as responder, use various pre-defined as initiator o des: DES o des3: Triple-DES o aes128: AES with 128 key bits o aes192: AES with 192 key bits o aes256: AES with 256 key bits Enumeration: 'aes256': 6, 'des': 2, 'des3': 3, 'aes128': 4, 'aes192': 5, 'any': 1.
                           hm2VpnConnIkeReAuth 1.3.6.1.4.1.248.11.120.1.2.10.1.23 truthvalue read-only
whether re-keying of an IKE_SA should also re-authenticate the peer. In IKEv1, re-authentication is always done (also when set to false). In IKEv2, a value of false does re-keying without un-installing the IPsec SAs, a value of true creates a new IKE_SA from scratch and tries to recreate all IPsec SAs.
                           hm2VpnConnIpsecMode 1.3.6.1.4.1.248.11.120.1.2.10.1.24 integer read-only
IPsec encapsulation mode. Enumeration: 'tunnel': 1.
                           hm2VpnConnIpsecLifetime 1.3.6.1.4.1.248.11.120.1.2.10.1.25 integer32 read-only
Lifetime of IPsec security association in seconds. The maximum value is 8 hours (28800 seconds).
                           hm2VpnConnMargintime 1.3.6.1.4.1.248.11.120.1.2.10.1.26 integer32 read-only
How long before connection expiry or keying-channel expiry should attempts to negotiate a replacement begin. The maximum value is half an hour (1800 seconds). The margin time needs to be at most half of the lifetime.
                           hm2VpnConnIpsecAlgDh 1.3.6.1.4.1.248.11.120.1.2.10.1.27 integer read-only
Diffie-Hellman key agreement algorithm to be used for IPsec-SA session key establishment: o any: accept all supported algorithms as responder, use various pre-defined as initiator o modp1024: RSA with 1024 bits modulus (DH Group 2) o modp1536: RSA with 1536 bits modulus (DH Group 5) o modp2048: RSA with 2048 bits modulus (DH Group 14) o modp3072: RSA with 3072 bits modulus (DH Group 15) o modp4096: RSA with 4096 bits modulus (DH Group 16) o none: no Perfect Forward Secrecy (PFS) Enumeration: 'modp1536': 3, 'none': 7, 'modp1024': 2, 'modp3072': 5, 'modp4096': 6, 'modp2048': 4, 'any': 1.
                           hm2VpnConnIpsecAlgMac 1.3.6.1.4.1.248.11.120.1.2.10.1.28 integer read-only
Integrity (MAC) algorithm to be used in IPsec: o any: accept all supported algorithms as responder, use various pre-defined as initiator o hmacmd5: HMAC-MD5 (length 96 bit) o hmacsha1: HMAC-SHA1 (length 96 bit) o hmacsha256: HMAC-SHA256 (length 128 bit) o hmacsha384: HMAC-SHA384 (length 196 bit) o hmacsha512: HMAC-SHA512 (length 256 bit) Enumeration: 'hmacsha512': 6, 'hmacsha384': 5, 'hmacsha256': 4, 'hmacmd5': 2, 'hmacsha1': 3, 'any': 1.
                           hm2VpnConnIpsecAlgEncr 1.3.6.1.4.1.248.11.120.1.2.10.1.29 integer read-only
Encryption algorithm to be used for payload encryption in IPsec: o any: accept all supported algorithms as responder, use various pre-defined as initiator o des: DES o des3: Triple-DES o aes128: AES-CBC with 128 key bits o aes192: AES-CBC with 192 key bits o aes256: AES-CBC with 256 key bits o aes128ctr: AES-COUNTER with 128 key bits o aes192ctr: AES-COUNTER with 192 key bits o aes256ctr: AES-COUNTER with 256 key bits o aes128gcm64: AES-GCM with 64 bit ICV with 128 key bits o aes128gcm96: AES-GCM with 96 bit ICV with 128 key bits o aes128gcm128: AES-GCM with 128 bit ICV with 128 key bits o aes192gcm64: AES-GCM with 64 bit ICV with 192 key bits o aes192gcm96: AES-GCM with 96 bit ICV with 192 key bits o aes192gcm128: AES-GCM with 128 bit ICV with 192 key bits o aes256gcm64: AES-GCM with 64 bit ICV with 256 key bits o aes256gcm96: AES-GCM with 96 bit ICV with 256 key bits o aes256gcm128: AES-GCM with 128 bit ICV with 256 key bits Enumeration: 'aes128ctr': 7, 'aes256': 6, 'aes128gcm96': 11, 'aes192gcm64': 13, 'aes192gcm96': 14, 'aes192gcm128': 15, 'aes128gcm64': 10, 'des': 2, 'aes128gcm128': 12, 'des3': 3, 'aes256ctr': 9, 'aes192ctr': 8, 'aes128': 4, 'aes256gcm96': 17, 'aes256gcm128': 18, 'aes192': 5, 'aes256gcm64': 16, 'any': 1.
                           hm2VpnConnOperStatus 1.3.6.1.4.1.248.11.120.1.2.10.1.30 integer read-only
The current operational status of the VPN connection: o 'up': the IKE-SA and all IPsec SAs are up; o 'down': the IKE-SA and all IPsec SAs are down; o 'negotiation': key exchange and algorithm negotiation is in progress (or, as responder, waiting to be contacted for that purpose); o 'constructing': the IKE-SA is up, but at least one IPsec-SA is not established so far; o 'dormant': waiting for a precondition to be fulfilled before connection setup, e.g.: - a dynamically assigned IP address; - successful hostname resolution; - assignment of a valid system time. o 're-keying': key exchange is in progress after timeout of lifetime has occured, either IKE or IPSEC; Enumeration: 'negotiation': 3, 'dormant': 5, 'constructing': 4, 'up': 1, 'down': 2, 're-keying': 6.
                           hm2VpnConnDesc 1.3.6.1.4.1.248.11.120.1.2.10.1.31 displaystring read-only
User defined text.
                           hm2VpnConnLastError 1.3.6.1.4.1.248.11.120.1.2.10.1.32 hmlargedisplaystring read-only
Last error notification occurred for this connection. This is useful if the connection does not reach the up state to see if an error has occurred in the proposal exchange or when establishing the tunnel. In most cases this variable should be empty.
                           hm2VpnConnDebug 1.3.6.1.4.1.248.11.120.1.2.10.1.33 bits read-only
Used for debugging purpose of the VPN connections. May affect the performance significant. Please handle with care. If the bit is set informational(0) messages, unhandled(1) messages (not handled by the stack) are logged to the event log Bits: 'unhandled': 1, 'informational': 0.
                           hm2VpnConnRowStatus 1.3.6.1.4.1.248.11.120.1.2.10.1.34 rowstatus read-only
The row status of this table entry. If the row status is 'active' then it is not allowed to change any value (this applies also to active traffic selectors). The maximum number of active VPN connections is limited to hm2VpnConnMax. The maximum number of active and up VPN connections is limited to hm2VpnConnActiveMax.
                 hm2VpnConnInfoTable 1.3.6.1.4.1.248.11.120.1.2.15 no-access
A list of VPN connections.
                       hm2VpnConnInfoEntry 1.3.6.1.4.1.248.11.120.1.2.15.1 no-access
A VPN connection entry.
                           hm2VpnConnInfoIkeVersionUsed 1.3.6.1.4.1.248.11.120.1.2.15.1.1 integer read-only
Version of the IKE protocol used by connection: o ikev1: used protocol is IKE version 1 (ISAKMP) o ikev2: used protocol is IKE version 2 Enumeration: 'ikev2': 2, 'ikev1': 1.
                           hm2VpnConnInfoIkeProposal 1.3.6.1.4.1.248.11.120.1.2.15.1.2 displaystring read-only
Algorithms the IKE use for key exchange.
                           hm2VpnConnInfoIpsecProposal 1.3.6.1.4.1.248.11.120.1.2.15.1.3 displaystring read-only
Algorithms IPsec use for the data communication.
                           hm2VpnConnInfoLocalHost 1.3.6.1.4.1.248.11.120.1.2.15.1.4 displaystring read-only
Local host detected by IKE.
                           hm2VpnConnInfoRemoteHost 1.3.6.1.4.1.248.11.120.1.2.15.1.5 displaystring read-only
Remote host detected by IKE.
                           hm2VpnConnInfoEstablished 1.3.6.1.4.1.248.11.120.1.2.15.1.6 unsigned32 read-only
Time in seconds since the connection has been established (is updated after IKE re-authentication).
                           hm2VpnConnInfoIKEReauth 1.3.6.1.4.1.248.11.120.1.2.15.1.7 unsigned32 read-only
Time in seconds when the next IKE re-authentication will take place.
                           hm2VpnConnInfoIKERekeying 1.3.6.1.4.1.248.11.120.1.2.15.1.8 unsigned32 read-only
Time in seconds when the next IKE re-keying will take place.
                           hm2VpnConnInfoIpsecRekeying 1.3.6.1.4.1.248.11.120.1.2.15.1.9 unsigned32 read-only
Time in seconds when the next IPsec re-keying will take place.
                           hm2VpnConnInfoIpsecInBytes 1.3.6.1.4.1.248.11.120.1.2.15.1.10 counter64 read-only
Number of input Bytes from this IPsec tunnel.
                           hm2VpnConnInfoIpsecInPackets 1.3.6.1.4.1.248.11.120.1.2.15.1.11 counter64 read-only
Number of input packets from this IPsec tunnel.
                           hm2VpnConnInfoIpsecInUse 1.3.6.1.4.1.248.11.120.1.2.15.1.12 unsigned32 read-only
Time in seconds since the IPsec tunnel has received last time data.
                           hm2VpnConnInfoIpsecOutBytes 1.3.6.1.4.1.248.11.120.1.2.15.1.13 counter64 read-only
Number of output Bytes to this IPsec tunnel.
                           hm2VpnConnInfoIpsecOutPackets 1.3.6.1.4.1.248.11.120.1.2.15.1.14 counter64 read-only
Number of output packets to this IPsec tunnel.
                           hm2VpnConnInfoIpsecOutUse 1.3.6.1.4.1.248.11.120.1.2.15.1.15 unsigned32 read-only
Time in seconds since to the IPsec tunnel has sent last time data.
                           hm2VpnConnInfoIKEInitiatorSPI 1.3.6.1.4.1.248.11.120.1.2.15.1.16 displaystring read-only
The IKE initiator SPI (local or remote, depends on initiator settings).
                           hm2VpnConnInfoIKEResponderSPI 1.3.6.1.4.1.248.11.120.1.2.15.1.17 displaystring read-only
The IKE responder SPI (local or remote, depends on initiator settings).
                           hm2VpnConnInfoIpsecInSPI 1.3.6.1.4.1.248.11.120.1.2.15.1.18 displaystring read-only
The input IPsec SPI.
                           hm2VpnConnInfoIpsecOutSPI 1.3.6.1.4.1.248.11.120.1.2.15.1.19 displaystring read-only
The output IPsec SPI.
             hm2VpnTrafficSelGroup 1.3.6.1.4.1.248.11.120.1.3
                 hm2VpnTrafficSelTable 1.3.6.1.4.1.248.11.120.1.3.1 no-access
A list of traffic selectors. For details on the role of traffic selectors in IPsec protocol see RFC 2409, section 5.5 and RFC 4306, section 2.9.
                     hm2VpnTrafficSelEntry 1.3.6.1.4.1.248.11.120.1.3.1.1 no-access
A traffic selector entry. A traffic selector defines the subnet/host addresses for which this IPSec connection (SA) is responsible.
                         hm2VpnTrafficSelIndex 1.3.6.1.4.1.248.11.120.1.3.1.1.1 integer32 no-access
An index that (together with the connection index hm2VpnConnIndex) identifies the entry in the traffic selector table. This index can be choosen freely, but must be greater than 0.
                         hm2VpnTrafficSelSrcAddr 1.3.6.1.4.1.248.11.120.1.3.1.1.2 displaystring read-only
Host or subnet address in CIDR notation (a.b.c.d/n) for which this traffic descriptor (and the associated VPN connection) is responsible. This address is compared to the source address of IP packets sent, when determining the associated IPsec and IKE-SA. The special keyword 'any' means that the address comparison always matches.
                         hm2VpnTrafficSelDstAddr 1.3.6.1.4.1.248.11.120.1.3.1.1.3 displaystring read-only
Host or subnet address in CIDR notation (a.b.c.d/n) for which this traffic descriptor (and the associated VPN connection) is responsible. This address is compared to the destination address of IP packets sent, when determining the associated IPsec and IKE-SA. The special keyword 'any' means that the address comparison always matches.
                         hm2VpnTrafficSelSrcRest 1.3.6.1.4.1.248.11.120.1.3.1.1.4 displaystring read-only
The optional source restrictions (names or numbers) , e.g. tcp/http which is equal to 6/80, or udp which is equal to udp/any or /53 which is equal to any/53
                         hm2VpnTrafficSelDstRest 1.3.6.1.4.1.248.11.120.1.3.1.1.5 displaystring read-only
The optional destination restrictions (names or numbers) , e.g. tcp/http which is equal to 6/80, or udp which is equal to udp/any or /53 which is equal to any/53
                         hm2VpnTrafficSelDesc 1.3.6.1.4.1.248.11.120.1.3.1.1.6 displaystring read-only
User defined text.
                         hm2VpnTrafficSelRowStatus 1.3.6.1.4.1.248.11.120.1.3.1.1.7 rowstatus read-only
The row status of this table entry. Only traffic selector entries with an 'active' row status will be considered if the connections row status is set 'active'. Independent of that dependency any value in this entry can be changed only if the row status is not 'active'.
             hm2VpnCertificateGroup 1.3.6.1.4.1.248.11.120.1.4
                 hm2VpnCertificateUploadPassphrase 1.3.6.1.4.1.248.11.120.1.4.1 displaystring read-write
Setting the correct passphrase here before uploading an encrypted private key or an encrypted PKCS12 container will trigger the decryption of the uploaded file before storing on the device. The value cannot be read and is not stored after the file transfer. WARNING: the file is stored unencrypted on the device. Use with care!
                 hm2VpnCertificateTable 1.3.6.1.4.1.248.11.120.1.4.10 no-access
The list of certificates available on the device.
                       hm2VpnCertificateEntry 1.3.6.1.4.1.248.11.120.1.4.10.1 no-access
A certificate file entry. A certificate file which has been copied to the device and can be used for VPN connections.
                           hm2VpnCertificateIndex 1.3.6.1.4.1.248.11.120.1.4.10.1.1 integer32 no-access
Index of the entry.
                           hm2VpnCertificateSubject 1.3.6.1.4.1.248.11.120.1.4.10.1.2 displaystring read-only
Subject field of certificate.
                           hm2VpnCertificateIssuer 1.3.6.1.4.1.248.11.120.1.4.10.1.3 displaystring read-only
Certificate issuer.
                           hm2VpnCertificateStartDate 1.3.6.1.4.1.248.11.120.1.4.10.1.4 hmtimeseconds1970 read-only
Time and date when certificate is begining to be valid.
                           hm2VpnCertificateEndDate 1.3.6.1.4.1.248.11.120.1.4.10.1.5 hmtimeseconds1970 read-only
Time and date when certificate will expire.
                           hm2VpnCertificateFileName 1.3.6.1.4.1.248.11.120.1.4.10.1.6 displaystring read-only
Name of the file consisting of alphanumeric characters plus hyphen, underscore and dot.
                           hm2VpnCertificateType 1.3.6.1.4.1.248.11.120.1.4.10.1.7 integer read-only
Type of the container file used. Enumeration: 'peer': 2, 'encryptedkey': 3, 'ca': 1, 'pkcs12': 4, 'encryptedpkcs12': 5.
                           hm2VpnCertificateCertUploadDate 1.3.6.1.4.1.248.11.120.1.4.10.1.8 hmtimeseconds1970 read-only
Time and date of last write access using the content of the variable hm2SystemTime.
                           hm2VpnCertificatePrivateKeyStatus 1.3.6.1.4.1.248.11.120.1.4.10.1.9 integer read-only
Shows if a Peer certificate has a private key uploaded on the device. A Peer certificate cannot be used without a private key uploaded to the device. Does not apply to CA certificates. Enumeration: 'notFound': 3, 'none': 1, 'present': 2.
                           hm2VpnCertificatePrivateKeyFile 1.3.6.1.4.1.248.11.120.1.4.10.1.10 displaystring read-only
Name of the file consisting of alphanumeric characters plus hyphen, underscore and dot.
                           hm2VpnCertificateNoConnections 1.3.6.1.4.1.248.11.120.1.4.10.1.11 integer32 read-only
Number of active connections that use this certificate. The certificate cannot be deleted from the device unless there are no active connections using it (this field is set to 0).
                           hm2VpnCertificateUserActions 1.3.6.1.4.1.248.11.120.1.4.10.1.12 integer read-write
Provides a way to delete unused certificate files from the device. A certificate can only be deleted if there are no active connections using it (see hm2VpnCertificateNoConnections). Deleting a Peer certificate automatically deletes the private key asociated with it (if any). Enumeration: 'other': 1, 'delete': 2.
         hm2VpnMibSNMPExtensionGroup 1.3.6.1.4.1.248.11.120.3
             hm2VpnMibSNMPExtensionNoTrafficSelector 1.3.6.1.4.1.248.11.120.3.1
Indicates that for a VPN connection no active traffic selectors are available.
             hm2VpnMibSNMPExtensionTooManyActive 1.3.6.1.4.1.248.11.120.3.2
Indicates that too many VPN connections are in active state.
             hm2VpnMibSNMPExtensionTooManyConns 1.3.6.1.4.1.248.11.120.3.3
Indicates that too many VPN connections shall be added to the configuration.
             hm2VpnMibSNMPExtensionActiveRow 1.3.6.1.4.1.248.11.120.3.4
Indicates that an active row shall be changed.
             hm2VpnMibSNMPExtensionInitiatorAny 1.3.6.1.4.1.248.11.120.3.5
Indicates that for a VPN connection as initiator the remote end point is set to any.