IPSEC-MIB: View SNMP OID List / Download MIB
VENDOR: INTERNET-STANDARD
Home | MIB: IPSEC-MIB | |||
---|---|---|---|---|
Download as: |
Download standard MIB format if you are planning to load a MIB file into some system (OS, Zabbix, PRTG ...) or view it with a MIB browser. CSV is more suitable for analyzing and viewing OID' and other MIB objects in excel. JSON and YAML formats are usually used in programing even though some systems can use MIB in YAML format (like Logstash).
|
|||
Object Name | OID | Type | Access | Info |
ipsecMIB | 1.3.6.1.3.500 |
The MIB module to describe generic IPSec objects, and entity level IPSec objects and events. |
||
ipsecMIBObjects | 1.3.6.1.3.500.1 | |||
ipsec | 1.3.6.1.3.500.1.1 | |||
ipsecProtSuiteTable | 1.3.6.1.3.500.1.1.1 | no-access |
The (conceptual) table containing information on IPSec protection suites. |
|
1.3.6.1.3.500.1.1.1.1 | no-access |
An entry (conceptual row) containing the information on a particular IPSec protection suite. |
||
ipsecProtSuiteIndex | 1.3.6.1.3.500.1.1.1.1.1 | integer32 | read-only |
A unique value, greater than zero, for each IPSec protection suite. It is recommended that values are assigned contiguously starting from 1. |
ipsecProtSuiteLocalAddress | 1.3.6.1.3.500.1.1.1.1.2 | octet string | read-only |
The local IP address used by the protection suite. The size of this object is 4 if the address is an IPv4 address, or 16 if the address is an IPv6 address. |
ipsecProtSuiteRemoteAddress | 1.3.6.1.3.500.1.1.1.1.3 | octet string | read-only |
The peer IP address used by the protection suite. The size of this object is 4 if the address is an IPv4 address, or 16 if the address is an IPv6 address. |
ipsecProtSuiteInboundEspSpi | 1.3.6.1.3.500.1.1.1.1.4 | unsigned32 | read-only |
The value of the SPI for the inbound protection suite that provides the ESP security service, or zero if ESP is not used. |
ipsecProtSuiteOutboundEspSpi | 1.3.6.1.3.500.1.1.1.1.5 | unsigned32 | read-only |
The value of the SPI for the outbound protection suite that provides the ESP security service, or zero if ESP is not used. |
ipsecProtSuiteInboundAhSpi | 1.3.6.1.3.500.1.1.1.1.6 | unsigned32 | read-only |
The value of the SPI for the inbound protection suite that provides the AH security service, or zero if AH is not used. |
ipsecProtSuiteOutboundAhSpi | 1.3.6.1.3.500.1.1.1.1.7 | unsigned32 | read-only |
The value of the SPI for the outbound protection suite that provides the AH security service, or zero if AH is not used. |
ipsecProtSuiteInboundCompCpi | 1.3.6.1.3.500.1.1.1.1.8 | integer | read-only |
The value of the CPI for the inbound protection suite that provides IP compression, or zero if IPCOMP is not used. |
ipsecProtSuiteOutboundCompCpi | 1.3.6.1.3.500.1.1.1.1.9 | integer | read-only |
The value of the CPI for the outbound protection suite that provides IP compression, or zero if IPCOMP is not used. |
ipsecProtSuiteLocalId | 1.3.6.1.3.500.1.1.1.1.10 | octet string | read-only |
The local identifier of the protection suite, or 0 if unknown or if the protection suite uses transport mode encapsulation. This value is taken directly from the optional ID payloads that are exchange during phase 2 negotiations. |
ipsecProtSuiteLocalIdType | 1.3.6.1.3.500.1.1.1.1.11 | unsigned32 | read-only |
The type of identifier presented by 'ipsecTunnelLocalId', or 0 if unknown or if the protection suite uses transport mode encapsulation. This value is taken directly from the optional ID payloads that are exchange during phase 2 negotiations. |
ipsecProtSuiteRemoteId | 1.3.6.1.3.500.1.1.1.1.12 | octet string | read-only |
The remote identifier of the protection suite, or 0 if unknown or if the protection suite uses transport mode encapsulation. This value is taken directly from the optional ID payloads that are exchange during phase 2 negotiations. |
ipsecProtSuiteRemoteIdType | 1.3.6.1.3.500.1.1.1.1.13 | unsigned32 | read-only |
The type of identifier presented by 'ipsecTunnelRemoteId', or 0 if unknown or if the protection suite uses transport mode encapsulation. This value is taken directly from the optional ID payloads that are exchange during phase 2 negotiations. |
ipsecProtSuiteProtocol | 1.3.6.1.3.500.1.1.1.1.14 | integer32 | read-only |
The IP protocol number that this protection suite carries, or 0 if it carries any protocol. |
ipsecProtSuiteLocalPort | 1.3.6.1.3.500.1.1.1.1.15 | integer32 | read-only |
The local UDP or TCP port number that this protection suite carries, or 0 if it carries any port number. |
ipsecProtSuiteRemotePort | 1.3.6.1.3.500.1.1.1.1.16 | integer32 | read-only |
The remote UDP or TCP port number that this protection suite carries, or 0 if it carries any port number. |
ipsecProtSuiteDifHelGroupDesc | 1.3.6.1.3.500.1.1.1.1.17 | integer32 | read-only |
A unique value representing the Diffie-Hellman group description used to set up this protection suite, or 0 if the description is unknown. Specific values are used as described in the ISAKMP Class Values of Group Description from Appendix A of [IKE]. |
ipsecProtSuiteDifHelGroupType | 1.3.6.1.3.500.1.1.1.1.18 | integer32 | read-only |
A unique value representing the Diffie-Hellman group type used to set up this protection suite, or 0 if the type is unknown. Specific values are used as described in the ISAKMP Class Values of Group Type from Appendix A of [IKE]. |
ipsecProtSuitePFS | 1.3.6.1.3.500.1.1.1.1.19 | truthvalue | read-only |
'true' if the protection suite was created using perfect forward secrect. |
ipsecProtSuiteEncapsulation | 1.3.6.1.3.500.1.1.1.1.20 | integer | read-only |
The type of encapsulation used by this protection suite. Enumeration: 'tunnel': 2, 'transport': 1. |
ipsecProtSuiteEspEncAlg | 1.3.6.1.3.500.1.1.1.1.21 | integer32 | read-only |
A unique value representing the encryption algorithm applied to traffic carried by this protection suite if it uses ESP or 0 if there is no encryption applied by ESP or if ESP is not used. Specific values are taken from section 4.4.4 of [IPDOI]. |
ipsecProtSuiteEspEncKeyLength | 1.3.6.1.3.500.1.1.1.1.22 | unsigned32 | read-only |
The length of the encryption key in bits used for the algorithm specified in the 'ipsecTunnelEspEncAlg' object, or 0 if the key length is implicit in the specified algorithm or there is no encryption specified. |
ipsecProtSuiteEspAuthAlg | 1.3.6.1.3.500.1.1.1.1.23 | integer32 | read-only |
A unique value representing the hash algorithm applied to traffic carried by this protection suite if it uses ESP or 0 if there is no authentication applied by ESP or if ESP is not used. Specific values are taken from the Authentication Algorithm attribute values of Section 4.5 of [IPDOI]. |
ipsecProtSuiteAhAuthAlg | 1.3.6.1.3.500.1.1.1.1.24 | integer32 | read-only |
A unique value representing the hash algorithm applied to traffic carried by this protection suite if it uses AH or 0 if AH is not used. Specific values are taken from Section 4.4.3 of [IPDOI]. |
ipsecProtSuiteCompAlg | 1.3.6.1.3.500.1.1.1.1.25 | integer32 | read-only |
A unique value representing the compression algorithm applied to traffic carried by this protection suite if it uses IPCOMP. Specific values are taken from Section 4.4.5 of [IPDOI]. |
ipsecProtSuiteCreationTime | 1.3.6.1.3.500.1.1.1.1.26 | dateandtime | read-only |
The date and time that the current protection suite was set up. |
ipsecProtSuiteTimeLimit | 1.3.6.1.3.500.1.1.1.1.27 | octet string | read-only |
The maximum lifetime in seconds of the protection suite, or 0 if there is no time constraint on its expiration. |
ipsecProtSuiteTrafficLimit | 1.3.6.1.3.500.1.1.1.1.28 | octet string | read-only |
The maximum traffic in 1024-byte blocks that the protection suite is allowed to support, or 0 if there is no traffic constraint on its expiration. |
ipsecProtSuiteInTrafficCount | 1.3.6.1.3.500.1.1.1.1.29 | octet string | read-only |
The amount of inbound traffic accumulated that counts against the protection suite's expiration by traffic limitation, measured in 1024-byte blocks. This value may be 0 if the protection suite does not expire based on traffic. In the case of multiple SAs within a protection suite, this value is the maximum of any traffic accumulation values applied to any of the individual SAs within the protection suite. |
ipsecProtSuiteOutTrafficCount | 1.3.6.1.3.500.1.1.1.1.30 | octet string | read-only |
The amount of outbound traffic accumulated that counts against the protection suite's expiration by traffic limitation, measured in 1024-byte blocks. This value may be 0 if the protection suite does not expire based on traffic. In the case of multiple SAs within a protection suite, this value is the maximum of any traffic accumulation values applied to any of the individual SAs within the protection suite. |
ipsecProtSuiteInboundTraffic | 1.3.6.1.3.500.1.1.1.1.31 | counter64 | read-only |
The amount of user level traffic measured in bytes handled by the protection suite in the inbound direction. This is not necessarily the same as the amount of traffic applied against the traffic expiration limit. |
ipsecProtSuiteOutboundTraffic | 1.3.6.1.3.500.1.1.1.1.32 | counter64 | read-only |
The amount of user level traffic measured in bytes handled by the protection suite in the outbound direction. This is not necessarily the same as the amount of traffic applied against the traffic expiration limit. |
ipsecProtSuiteInboundPackets | 1.3.6.1.3.500.1.1.1.1.33 | counter64 | read-only |
The number of packets handled by the protection suite in the inbound direction. |
ipsecProtSuiteOutboundPackets | 1.3.6.1.3.500.1.1.1.1.34 | counter64 | read-only |
The number of packets handled by the protection suite in the outbound direction. |
ipsecProtSuiteDecryptErrors | 1.3.6.1.3.500.1.1.1.1.35 | counter32 | read-only |
The number of inbound packets discarded by the protection suite due to decryption errors. |
ipsecProtSuiteAuthErrors | 1.3.6.1.3.500.1.1.1.1.36 | counter32 | read-only |
The number of inbound packets discarded by the protection suite due to authentication errors. This includes hash failures in both ESP and AH. |
ipsecProtSuiteReplayErrors | 1.3.6.1.3.500.1.1.1.1.37 | counter32 | read-only |
The number of inbound packets discarded by the protection suite due to replay errors. This includes replay failures both ESP and AH. |
ipsecProtSuitePolicyErrors | 1.3.6.1.3.500.1.1.1.1.38 | counter32 | read-only |
The number of inbound packets discarded by the protection suite due to policy errors. |
ipsecProtSuiteOtherReceiveErrors | 1.3.6.1.3.500.1.1.1.1.39 | counter32 | read-only |
The number of inbound packets discarded by the protection suite due to errors other than decryption, authentication or replay errors. This may include decompression errors or errors due to a lack of receive buffers. |
ipsecProtSuiteSendErrors | 1.3.6.1.3.500.1.1.1.1.40 | counter32 | read-only |
The number of outbound packets discarded by the protection suite due to any error. This may include compression errors or errors due to a lack of transmit buffers. |
ipsecIkeSaTable | 1.3.6.1.3.500.1.1.2 | no-access |
The (conceptual) table containing information on IPSec's IKE SAs. |
|
1.3.6.1.3.500.1.1.2.1 | no-access |
An entry (conceptual row) containing the information on a particular IKE SA. |
||
ipsecIkeSaIndex | 1.3.6.1.3.500.1.1.2.1.1 | integer32 | read-only |
A unique value, greater than zero, for each phase 1 SA. It is recommended that values are assigned contiguously starting from 1. The value for each entry must remain constant at least from one re-initialization of entity's network management system to the next re-initialization. |
ipsecIkeSaInitiatorCookie | 1.3.6.1.3.500.1.1.2.1.2 | octet string | read-only |
The value of the cookie used by the initiator for the phase 1 SA. |
ipsecIkeSaResponderCookie | 1.3.6.1.3.500.1.1.2.1.3 | octet string | read-only |
The value of the cookie used by the responder for the phase 1 SA. |
ipsecIkeSaLocalIpAddress | 1.3.6.1.3.500.1.1.2.1.4 | octet string | read-only |
The local IP address used to negotiated the SA. The size of the object is 4 if the address is an IPv4 address and 16 if an IPv6 address. |
ipsecIkeSaLocalPortNumber | 1.3.6.1.3.500.1.1.2.1.5 | integer | read-only |
The local UDP port number that this SA was negotiated with. |
ipsecIkeSaLocalIdType | 1.3.6.1.3.500.1.1.2.1.8 | integer32 | read-only |
The type of ID used by the local end of this SA. Specific values are used as described in Section 4.6.2.1 of [IPDOI]. |
ipsecIkeSaLocalId | 1.3.6.1.3.500.1.1.2.1.9 | octet string | read-only |
The ID of the local host that negotiated this SA. The length may require truncation under some conditions. |
ipsecIkeSaPeerIpAddress | 1.3.6.1.3.500.1.1.2.1.10 | octet string | read-only |
The IP address of the peer that this SA was negotiated with. The size of the object is 4 if the address is an IPv4 address and 16 if it is an IPv6 address. |
ipsecIkeSaPeerPortNumber | 1.3.6.1.3.500.1.1.2.1.11 | integer | read-only |
The UDP port number of the peer that this SA was negotiated with. |
ipsecIkeSaAuthMethod | 1.3.6.1.3.500.1.1.2.1.12 | integer32 | read-only |
The authentication method used to authenticate the peer. Note that this does not include the specific method of authentication if extended authenticated is used. Specific values are used as described in the ISAKMP Class Values of Authentication Method from Appendix A of [IKE]. |
ipsecIkeSaPeerIdType | 1.3.6.1.3.500.1.1.2.1.13 | integer32 | read-only |
The type of ID used by the peer. Specific values are used as described in Section 4.6.2.1 of [IPDOI]. |
ipsecIkeSaPeerId | 1.3.6.1.3.500.1.1.2.1.14 | octet string | read-only |
The ID of the peer this SA was negotiated with. The length may require truncation under some conditions. |
ipsecIkeSaPeerCertSerialNum | 1.3.6.1.3.500.1.1.2.1.15 | octet string | read-only |
The serial number of the certificate of the peer this SA was negotiated with. This object has no meaning if a certificate was not used in authenticating the peer. |
ipsecIkeSaPeerCertIssuer | 1.3.6.1.3.500.1.1.2.1.16 | octet string | read-only |
The issuer of the certificate of the peer this SA was negotiated with. This object has no meaning if a certificate was not used in authenticating the peer. |
ipsecIkeSaEncAlg | 1.3.6.1.3.500.1.1.2.1.17 | integer | read-only |
A unique value representing the encryption algorithm applied to traffic carried by this SA. Specific values are used as described in the ISAKMP Class Values of Encryption Algorithms from Appendix A of [IKE]. |
ipsecIkeSaEncKeyLength | 1.3.6.1.3.500.1.1.2.1.18 | integer32 | read-only |
The length of the encryption key in bits used for algorithm specified in the ipsecIkeSaEncAlg object or 0 if the key length is implicit in the specified algorithm. |
ipsecIkeSaHashAlg | 1.3.6.1.3.500.1.1.2.1.19 | integer32 | read-only |
A unique value representing the hash algorithm applied to traffic carried by this SA. Specific values are used as described in the ISAKMP Class Values of Hash Algorithms from Appendix A of [IKE]. |
ipsecIkeSaDifHelGroupDesc | 1.3.6.1.3.500.1.1.2.1.20 | integer32 | read-only |
A unique value representing the Diffie-Hellman group description used or 0 if the group is unknown. Specific values are used as described in the ISAKMP Class Values of Group Description from Appendix A of [IKE]. |
ipsecIkeSaDifHelGroupType | 1.3.6.1.3.500.1.1.2.1.21 | integer32 | read-only |
A unique value representing the Diffie-Hellman group type used or 0 if the group is unknown. Specific values are used as described in the ISAKMP Class Values of Group Type from Appendix A of [IKE]. |
ipsecIkeSaDifHelFieldSize | 1.3.6.1.3.500.1.1.2.1.22 | integer32 | read-only |
The field size, in bits, of the Diffie-Hellman group used to generate the key-pair, or 0 if unknown. |
ipsecIkeSaPRF | 1.3.6.1.3.500.1.1.2.1.23 | integer32 | read-only |
The pseudo-random functions used, or 0 if not used or if unknown. Specific values are used as described in the ISAKMP Class Values of PRF from Appendix A of [IKE] (which specifies none at the present time). |
ipsecIkeSaPFS | 1.3.6.1.3.500.1.1.2.1.24 | truthvalue | read-only |
A value that indicates that perfect forward secrecy is used for all IPSec SAs created by this IKE SA. |
ipsecIkeSaTimeStart | 1.3.6.1.3.500.1.1.2.1.25 | dateandtime | read-only |
The date and time that the SA was set up. |
ipsecIkeSaTimeLimit | 1.3.6.1.3.500.1.1.2.1.26 | octet string | read-only |
The maximum lifetime in seconds of the SA, or 0 if there is no time constraint on its expiration. |
ipsecIkeSaTrafficLimit | 1.3.6.1.3.500.1.1.2.1.27 | octet string | read-only |
The maximum traffic in 1024-byte blocks that the SA is allowed to carry, or 0 if there is no traffic constraint on its expiration. |
ipsecIkeSaInboundTraffic | 1.3.6.1.3.500.1.1.2.1.28 | counter64 | read-only |
The amount traffic measured in bytes handled in the SA in the inbound direction. |
ipsecIkeSaOutboundTraffic | 1.3.6.1.3.500.1.1.2.1.29 | counter64 | read-only |
The amount traffic measured in bytes handled in the SA in the outbound direction. |
ipsecIkeSaInboundPackets | 1.3.6.1.3.500.1.1.2.1.30 | counter32 | read-only |
The number of packets handled in the SA in the inbound direction. |
ipsecIkeSaOutboundPackets | 1.3.6.1.3.500.1.1.2.1.31 | counter32 | read-only |
The number of packets handled in the SA in the outbound direction. |
ipsecIkeProtSuitesCreated | 1.3.6.1.3.500.1.1.2.1.32 | counter32 | read-only |
The total number of phase 2 protection suites created by the SA. |
ipsecIkeProtSuitesDeleted | 1.3.6.1.3.500.1.1.2.1.33 | counter32 | read-only |
The total number of phase 2 protection suites deleted by the SA. |
ipsecIkeSaDecryptErrors | 1.3.6.1.3.500.1.1.2.1.34 | counter32 | read-only |
The number of inbound packets discarded by the phase1 SA due to decryption errors. |
ipsecIkeSaAuthErrors | 1.3.6.1.3.500.1.1.2.1.35 | counter32 | read-only |
The number of inbound packets discarded by the phase 1 SA due to authentication errors. |
ipsecIkeSaOtherReceiveErrors | 1.3.6.1.3.500.1.1.2.1.36 | counter32 | read-only |
The number of inbound packets discarded by the phase 1 SA due to errors other than decryption or authentication errors. This may include errors due to a lack of receive buffers. |
ipsecIkeSaSendErrors | 1.3.6.1.3.500.1.1.2.1.37 | counter32 | read-only |
The number of outbound packets discarded by the phase 1 SA due to any error. This may include errors due to a lack of transmit buffers. |
ipsecTrapsA | 1.3.6.1.3.500.1.1.3 | |||
ipsecTraps | 1.3.6.1.3.500.1.1.3.0 | |||
ipsecTrapIkeNegFailure | 1.3.6.1.3.500.1.1.3.0.1 |
An attempt to negotiate a phase 1 SA failed. |
||
ipsecTrapInvalidCookie | 1.3.6.1.3.500.1.1.3.0.2 |
IKE packets with invalid cookies were detected from the specified peer. Implementations SHOULD send one trap per peer (within a reasonable time period, rather than sending one trap per packet. |
||
ipsecTrapIpsecNegFailure | 1.3.6.1.3.500.1.1.3.0.3 |
An attempt to negotiate a phase 2 protection suite within the specified IKE SA failed. |
||
ipsecTrapIpsecAuthFailure | 1.3.6.1.3.500.1.1.3.0.4 |
IPSec packets with invalid hashes were found in the specified protection suite. Implementations SHOULD send one trap per protection suite (within a reasonable time period), rather than sending one trap per packet. |
||
ipsecTrapIpsecReplayFailure | 1.3.6.1.3.500.1.1.3.0.5 |
IPSec packets with invalid sequence numbers were found in the specified protection suite. Implementations SHOULD send one trap per protection suite (within a reasonable time period), rather than sending one trap per packet. |
||
ipsecTrapIpsecPolicyFailure | 1.3.6.1.3.500.1.1.3.0.6 |
IPSec packets carrying packets with invalid selectors for the specified protection suite were found. Implementations SHOULD send one trap per protection suite (within a reasonable time period), rather than sending one trap per packet. |
||
ipsecTrapInvalidSpi | 1.3.6.1.3.500.1.1.3.0.7 |
ESP, AH or IPCOMP packets with unknown SPIs (or CPIs) were detected from the specified peer. Implementations SHOULD send one trap per peer (within a reasonable time period), rather than sending one trap per packet. |
||
ipsecIpsecStats | 1.3.6.1.3.500.1.1.4 | |||
ipsecIpsecTotalProtSuites | 1.3.6.1.3.500.1.1.4.1 | counter64 | read-only |
The total number of phase 2 protection suites established by the entity since boot time. |
ipsecIpsecNegFailures | 1.3.6.1.3.500.1.1.4.2 | counter64 | read-only |
The total number of phase 2 protection suite negotiations that failed that occurred in the entity since boot time. |
ipsecIpsecTotalInboundPackets | 1.3.6.1.3.500.1.1.4.3 | counter64 | read-only |
The total number of inbound packets carried on IPSec protection suites since boot time. |
ipsecIpsecTotalTransOutboundPackets | 1.3.6.1.3.500.1.1.4.4 | counter64 | read-only |
The total number of outbound packets carried on IPSec protection suites since boot time. |
ipsecIpsecTotalTransInboundTraffic | 1.3.6.1.3.500.1.1.4.5 | counter64 | read-only |
The total amount of inbound traffic carried on IPSec protection suites since boot time, measured in 1024-octet blocks. |
ipsecIpsecTotalTransOutboundTraffic | 1.3.6.1.3.500.1.1.4.6 | counter64 | read-only |
The total amount of outbound traffic carried on IPSec protection suites since boot time, measured in 1024-octet blocks. |
ipsecIpsecErrorStats | 1.3.6.1.3.500.1.1.5 | |||
ipsecIpsecDecryptionErrors | 1.3.6.1.3.500.1.1.5.1 | counter32 | read-only |
The total number of packets received by the entity in the IPSec protection suites since boot time with decryption errors. |
ipsecIpsecAuthenticationErrors | 1.3.6.1.3.500.1.1.5.2 | counter32 | read-only |
The total number of packets received by the entity in the IPSec protection suites since boot time with authentication errors. This includes all packets in which the hash value is determined to be invalid. |
ipsecIpsecReplayErrors | 1.3.6.1.3.500.1.1.5.3 | counter32 | read-only |
The total number of packets received by the entity in the IPSec protection suites since boot time with replay errors. |
ipsecIpsecPolicyErrors | 1.3.6.1.3.500.1.1.5.4 | counter32 | read-only |
The total number of packets received by the entity in the IPSec protection suites since boot time and discarded due to policy errors. This includes packets that had selectors that were invalid for the SA or protection suite that carried them. |
ipsecIpsecOtherReceiveErrors | 1.3.6.1.3.500.1.1.5.5 | counter32 | read-only |
The total number of packets received by the entity in the IPSec protection suites since boot time and discarded due to errors not due to decryption, authentication, replay or policy. |
ipsecIpsecSendErrors | 1.3.6.1.3.500.1.1.5.6 | counter32 | read-only |
The total number of packets to be sent by the entity in the IPSec protection suites since boot time and discarded due to errors. |
ipsecUnknownSpiErrors | 1.3.6.1.3.500.1.1.5.7 | counter32 | read-only |
The total number of packets received by the entity since boot time with SPIs or CPIs that were not valid. |
ipsecIkeStats | 1.3.6.1.3.500.1.1.6 | |||
ipsecIkeTotalSAs | 1.3.6.1.3.500.1.1.6.1 | counter64 | read-only |
The total number of phase 1 SAs successfully established by the entity since boot time. |
ipsecIkeNegFailures | 1.3.6.1.3.500.1.1.6.2 | counter64 | read-only |
The total number of phase 1 SA negotiations that failed that occurred in the entity since boot time. |
ipsecIkeTotalInboundPackets | 1.3.6.1.3.500.1.1.6.3 | counter64 | read-only |
The total number of inbound packets carried on phase 1 SAs since boot time. |
ipsecIkeTotalTransOutboundPackets | 1.3.6.1.3.500.1.1.6.4 | counter64 | read-only |
The total number of outbound packets carried on phase 1 SAs since boot time. |
ipsecIkeTotalTransInboundTraffic | 1.3.6.1.3.500.1.1.6.5 | counter64 | read-only |
The total amount of inbound traffic carried on phase 1 SAs since boot time, measured in 1024-octet blocks. |
ipsecIkeTotalTransOutboundTraffic | 1.3.6.1.3.500.1.1.6.6 | counter64 | read-only |
The total amount of outbound traffic carried on phase 1 SAs since boot time, measured in 1024-octet blocks. |
ipsecIkeErrorStats | 1.3.6.1.3.500.1.1.7 | |||
ipsecIkeProtocolErrors | 1.3.6.1.3.500.1.1.7.1 | counter32 | read-only |
The total number of packets received by the entity since boot time with IKE protocol errors. This includes packets with invalid cookies, but does not include errors that are associated with specific IKE SAs. |
ipsecIkeDecryptionErrors | 1.3.6.1.3.500.1.1.7.2 | counter32 | read-only |
The total number of packets received by the entity in the IPSec protection suites since boot time with decryption errors. |
ipsecIkeAuthenticationErrors | 1.3.6.1.3.500.1.1.7.3 | counter32 | read-only |
The total number of packets received by the entity in the IPSec protection suites since boot time with authentication errors. This includes all packets in which the hash value is determined to be invalid. |
ipsecIkeOtherReceiveErrors | 1.3.6.1.3.500.1.1.7.4 | counter32 | read-only |
The total number of packets received by the entity in phase 1 SAs since boot time and discarded due to errors not due to decryption or authentication. |
ipsecIkeSendErrors | 1.3.6.1.3.500.1.1.7.5 | counter32 | read-only |
The total number of packets to be sent by the entity in phase 1 SAs since boot time and discarded due to errors. |
ipsecNotifications | 1.3.6.1.3.500.1.1.8 | |||
ipsecNotifyMessageTotalCount | 1.3.6.1.3.500.1.1.8.1 | counter64 | read-only |
The total number of all types of notify messages sent or received by the entity since boot time. It is the sum of all occurrences in the 'ipsecNotifyCountTable'. |
ipsecNotifyCountTable | 1.3.6.1.3.500.1.1.8.2 | no-access |
The (conceptual) table containing information on IPSec notify message counts. This table MAY be sparsely populated; that is, rows for which the count is 0 may be absent. |
|
1.3.6.1.3.500.1.1.8.2.1 | no-access |
An entry (conceptual row) containing the total number of occurrences of a notify message. |
||
ipsecNotifyMessage | 1.3.6.1.3.500.1.1.8.2.1.1 | integer | read-only |
The value representing a specific IPSec notify message, or 0 if unknown. Values are assigned from the set of notify message types as defined in Section 3.14.1 of [ISAKMP]. In addition, the value 0 may be used for this object when the object is used as a trap cause, and the cause is unknown. |
ipsecNotifyMessageCount | 1.3.6.1.3.500.1.1.8.2.1.2 | counter32 | read-only |
The total number of times the specific notify message has been received or sent by the entity since system boot. |