IPSEC-MIB: View SNMP OID List / Download MIB

VENDOR: INTERNET-STANDARD


 Home MIB: IPSEC-MIB
Download as:   

Download standard MIB format if you are planning to load a MIB file into some system (OS, Zabbix, PRTG ...) or view it with a MIB browser. CSV is more suitable for analyzing and viewing OID' and other MIB objects in excel. JSON and YAML formats are usually used in programing even though some systems can use MIB in YAML format (like Logstash).
Keep in mind that standard MIB files can be successfully loaded by systems and programs only if all the required MIB's from the "Imports" section are already loaded.
The tree-like SNMP object navigator requires no explanations because it is very simple to use. And if you stumbled on this MIB from Google note that you can always go back to the home page if you need to perform another MIB or OID lookup.


Object Name OID Type Access Info
 ipsecMIB 1.3.6.1.3.500
The MIB module to describe generic IPSec objects, and entity level IPSec objects and events.
         ipsecMIBObjects 1.3.6.1.3.500.1
             ipsec 1.3.6.1.3.500.1.1
                 ipsecProtSuiteTable 1.3.6.1.3.500.1.1.1 no-access
The (conceptual) table containing information on IPSec protection suites.
                     ipsecProtSuiteEntry 1.3.6.1.3.500.1.1.1.1 no-access
An entry (conceptual row) containing the information on a particular IPSec protection suite.
                         ipsecProtSuiteIndex 1.3.6.1.3.500.1.1.1.1.1 integer32 read-only
A unique value, greater than zero, for each IPSec protection suite. It is recommended that values are assigned contiguously starting from 1.
                         ipsecProtSuiteLocalAddress 1.3.6.1.3.500.1.1.1.1.2 octet string read-only
The local IP address used by the protection suite. The size of this object is 4 if the address is an IPv4 address, or 16 if the address is an IPv6 address.
                         ipsecProtSuiteRemoteAddress 1.3.6.1.3.500.1.1.1.1.3 octet string read-only
The peer IP address used by the protection suite. The size of this object is 4 if the address is an IPv4 address, or 16 if the address is an IPv6 address.
                         ipsecProtSuiteInboundEspSpi 1.3.6.1.3.500.1.1.1.1.4 unsigned32 read-only
The value of the SPI for the inbound protection suite that provides the ESP security service, or zero if ESP is not used.
                         ipsecProtSuiteOutboundEspSpi 1.3.6.1.3.500.1.1.1.1.5 unsigned32 read-only
The value of the SPI for the outbound protection suite that provides the ESP security service, or zero if ESP is not used.
                         ipsecProtSuiteInboundAhSpi 1.3.6.1.3.500.1.1.1.1.6 unsigned32 read-only
The value of the SPI for the inbound protection suite that provides the AH security service, or zero if AH is not used.
                         ipsecProtSuiteOutboundAhSpi 1.3.6.1.3.500.1.1.1.1.7 unsigned32 read-only
The value of the SPI for the outbound protection suite that provides the AH security service, or zero if AH is not used.
                         ipsecProtSuiteInboundCompCpi 1.3.6.1.3.500.1.1.1.1.8 integer read-only
The value of the CPI for the inbound protection suite that provides IP compression, or zero if IPCOMP is not used.
                         ipsecProtSuiteOutboundCompCpi 1.3.6.1.3.500.1.1.1.1.9 integer read-only
The value of the CPI for the outbound protection suite that provides IP compression, or zero if IPCOMP is not used.
                         ipsecProtSuiteLocalId 1.3.6.1.3.500.1.1.1.1.10 octet string read-only
The local identifier of the protection suite, or 0 if unknown or if the protection suite uses transport mode encapsulation. This value is taken directly from the optional ID payloads that are exchange during phase 2 negotiations.
                         ipsecProtSuiteLocalIdType 1.3.6.1.3.500.1.1.1.1.11 unsigned32 read-only
The type of identifier presented by 'ipsecTunnelLocalId', or 0 if unknown or if the protection suite uses transport mode encapsulation. This value is taken directly from the optional ID payloads that are exchange during phase 2 negotiations.
                         ipsecProtSuiteRemoteId 1.3.6.1.3.500.1.1.1.1.12 octet string read-only
The remote identifier of the protection suite, or 0 if unknown or if the protection suite uses transport mode encapsulation. This value is taken directly from the optional ID payloads that are exchange during phase 2 negotiations.
                         ipsecProtSuiteRemoteIdType 1.3.6.1.3.500.1.1.1.1.13 unsigned32 read-only
The type of identifier presented by 'ipsecTunnelRemoteId', or 0 if unknown or if the protection suite uses transport mode encapsulation. This value is taken directly from the optional ID payloads that are exchange during phase 2 negotiations.
                         ipsecProtSuiteProtocol 1.3.6.1.3.500.1.1.1.1.14 integer32 read-only
The IP protocol number that this protection suite carries, or 0 if it carries any protocol.
                         ipsecProtSuiteLocalPort 1.3.6.1.3.500.1.1.1.1.15 integer32 read-only
The local UDP or TCP port number that this protection suite carries, or 0 if it carries any port number.
                         ipsecProtSuiteRemotePort 1.3.6.1.3.500.1.1.1.1.16 integer32 read-only
The remote UDP or TCP port number that this protection suite carries, or 0 if it carries any port number.
                         ipsecProtSuiteDifHelGroupDesc 1.3.6.1.3.500.1.1.1.1.17 integer32 read-only
A unique value representing the Diffie-Hellman group description used to set up this protection suite, or 0 if the description is unknown. Specific values are used as described in the ISAKMP Class Values of Group Description from Appendix A of [IKE].
                         ipsecProtSuiteDifHelGroupType 1.3.6.1.3.500.1.1.1.1.18 integer32 read-only
A unique value representing the Diffie-Hellman group type used to set up this protection suite, or 0 if the type is unknown. Specific values are used as described in the ISAKMP Class Values of Group Type from Appendix A of [IKE].
                         ipsecProtSuitePFS 1.3.6.1.3.500.1.1.1.1.19 truthvalue read-only
'true' if the protection suite was created using perfect forward secrect.
                         ipsecProtSuiteEncapsulation 1.3.6.1.3.500.1.1.1.1.20 integer read-only
The type of encapsulation used by this protection suite. Enumeration: 'tunnel': 2, 'transport': 1.
                         ipsecProtSuiteEspEncAlg 1.3.6.1.3.500.1.1.1.1.21 integer32 read-only
A unique value representing the encryption algorithm applied to traffic carried by this protection suite if it uses ESP or 0 if there is no encryption applied by ESP or if ESP is not used. Specific values are taken from section 4.4.4 of [IPDOI].
                         ipsecProtSuiteEspEncKeyLength 1.3.6.1.3.500.1.1.1.1.22 unsigned32 read-only
The length of the encryption key in bits used for the algorithm specified in the 'ipsecTunnelEspEncAlg' object, or 0 if the key length is implicit in the specified algorithm or there is no encryption specified.
                         ipsecProtSuiteEspAuthAlg 1.3.6.1.3.500.1.1.1.1.23 integer32 read-only
A unique value representing the hash algorithm applied to traffic carried by this protection suite if it uses ESP or 0 if there is no authentication applied by ESP or if ESP is not used. Specific values are taken from the Authentication Algorithm attribute values of Section 4.5 of [IPDOI].
                         ipsecProtSuiteAhAuthAlg 1.3.6.1.3.500.1.1.1.1.24 integer32 read-only
A unique value representing the hash algorithm applied to traffic carried by this protection suite if it uses AH or 0 if AH is not used. Specific values are taken from Section 4.4.3 of [IPDOI].
                         ipsecProtSuiteCompAlg 1.3.6.1.3.500.1.1.1.1.25 integer32 read-only
A unique value representing the compression algorithm applied to traffic carried by this protection suite if it uses IPCOMP. Specific values are taken from Section 4.4.5 of [IPDOI].
                         ipsecProtSuiteCreationTime 1.3.6.1.3.500.1.1.1.1.26 dateandtime read-only
The date and time that the current protection suite was set up.
                         ipsecProtSuiteTimeLimit 1.3.6.1.3.500.1.1.1.1.27 octet string read-only
The maximum lifetime in seconds of the protection suite, or 0 if there is no time constraint on its expiration.
                         ipsecProtSuiteTrafficLimit 1.3.6.1.3.500.1.1.1.1.28 octet string read-only
The maximum traffic in 1024-byte blocks that the protection suite is allowed to support, or 0 if there is no traffic constraint on its expiration.
                         ipsecProtSuiteInTrafficCount 1.3.6.1.3.500.1.1.1.1.29 octet string read-only
The amount of inbound traffic accumulated that counts against the protection suite's expiration by traffic limitation, measured in 1024-byte blocks. This value may be 0 if the protection suite does not expire based on traffic. In the case of multiple SAs within a protection suite, this value is the maximum of any traffic accumulation values applied to any of the individual SAs within the protection suite.
                         ipsecProtSuiteOutTrafficCount 1.3.6.1.3.500.1.1.1.1.30 octet string read-only
The amount of outbound traffic accumulated that counts against the protection suite's expiration by traffic limitation, measured in 1024-byte blocks. This value may be 0 if the protection suite does not expire based on traffic. In the case of multiple SAs within a protection suite, this value is the maximum of any traffic accumulation values applied to any of the individual SAs within the protection suite.
                         ipsecProtSuiteInboundTraffic 1.3.6.1.3.500.1.1.1.1.31 counter64 read-only
The amount of user level traffic measured in bytes handled by the protection suite in the inbound direction. This is not necessarily the same as the amount of traffic applied against the traffic expiration limit.
                         ipsecProtSuiteOutboundTraffic 1.3.6.1.3.500.1.1.1.1.32 counter64 read-only
The amount of user level traffic measured in bytes handled by the protection suite in the outbound direction. This is not necessarily the same as the amount of traffic applied against the traffic expiration limit.
                         ipsecProtSuiteInboundPackets 1.3.6.1.3.500.1.1.1.1.33 counter64 read-only
The number of packets handled by the protection suite in the inbound direction.
                         ipsecProtSuiteOutboundPackets 1.3.6.1.3.500.1.1.1.1.34 counter64 read-only
The number of packets handled by the protection suite in the outbound direction.
                         ipsecProtSuiteDecryptErrors 1.3.6.1.3.500.1.1.1.1.35 counter32 read-only
The number of inbound packets discarded by the protection suite due to decryption errors.
                         ipsecProtSuiteAuthErrors 1.3.6.1.3.500.1.1.1.1.36 counter32 read-only
The number of inbound packets discarded by the protection suite due to authentication errors. This includes hash failures in both ESP and AH.
                         ipsecProtSuiteReplayErrors 1.3.6.1.3.500.1.1.1.1.37 counter32 read-only
The number of inbound packets discarded by the protection suite due to replay errors. This includes replay failures both ESP and AH.
                         ipsecProtSuitePolicyErrors 1.3.6.1.3.500.1.1.1.1.38 counter32 read-only
The number of inbound packets discarded by the protection suite due to policy errors.
                         ipsecProtSuiteOtherReceiveErrors 1.3.6.1.3.500.1.1.1.1.39 counter32 read-only
The number of inbound packets discarded by the protection suite due to errors other than decryption, authentication or replay errors. This may include decompression errors or errors due to a lack of receive buffers.
                         ipsecProtSuiteSendErrors 1.3.6.1.3.500.1.1.1.1.40 counter32 read-only
The number of outbound packets discarded by the protection suite due to any error. This may include compression errors or errors due to a lack of transmit buffers.
                 ipsecIkeSaTable 1.3.6.1.3.500.1.1.2 no-access
The (conceptual) table containing information on IPSec's IKE SAs.
                     ipsecIkeSaEntry 1.3.6.1.3.500.1.1.2.1 no-access
An entry (conceptual row) containing the information on a particular IKE SA.
                         ipsecIkeSaIndex 1.3.6.1.3.500.1.1.2.1.1 integer32 read-only
A unique value, greater than zero, for each phase 1 SA. It is recommended that values are assigned contiguously starting from 1. The value for each entry must remain constant at least from one re-initialization of entity's network management system to the next re-initialization.
                         ipsecIkeSaInitiatorCookie 1.3.6.1.3.500.1.1.2.1.2 octet string read-only
The value of the cookie used by the initiator for the phase 1 SA.
                         ipsecIkeSaResponderCookie 1.3.6.1.3.500.1.1.2.1.3 octet string read-only
The value of the cookie used by the responder for the phase 1 SA.
                         ipsecIkeSaLocalIpAddress 1.3.6.1.3.500.1.1.2.1.4 octet string read-only
The local IP address used to negotiated the SA. The size of the object is 4 if the address is an IPv4 address and 16 if an IPv6 address.
                         ipsecIkeSaLocalPortNumber 1.3.6.1.3.500.1.1.2.1.5 integer read-only
The local UDP port number that this SA was negotiated with.
                         ipsecIkeSaLocalIdType 1.3.6.1.3.500.1.1.2.1.8 integer32 read-only
The type of ID used by the local end of this SA. Specific values are used as described in Section 4.6.2.1 of [IPDOI].
                         ipsecIkeSaLocalId 1.3.6.1.3.500.1.1.2.1.9 octet string read-only
The ID of the local host that negotiated this SA. The length may require truncation under some conditions.
                         ipsecIkeSaPeerIpAddress 1.3.6.1.3.500.1.1.2.1.10 octet string read-only
The IP address of the peer that this SA was negotiated with. The size of the object is 4 if the address is an IPv4 address and 16 if it is an IPv6 address.
                         ipsecIkeSaPeerPortNumber 1.3.6.1.3.500.1.1.2.1.11 integer read-only
The UDP port number of the peer that this SA was negotiated with.
                         ipsecIkeSaAuthMethod 1.3.6.1.3.500.1.1.2.1.12 integer32 read-only
The authentication method used to authenticate the peer. Note that this does not include the specific method of authentication if extended authenticated is used. Specific values are used as described in the ISAKMP Class Values of Authentication Method from Appendix A of [IKE].
                         ipsecIkeSaPeerIdType 1.3.6.1.3.500.1.1.2.1.13 integer32 read-only
The type of ID used by the peer. Specific values are used as described in Section 4.6.2.1 of [IPDOI].
                         ipsecIkeSaPeerId 1.3.6.1.3.500.1.1.2.1.14 octet string read-only
The ID of the peer this SA was negotiated with. The length may require truncation under some conditions.
                         ipsecIkeSaPeerCertSerialNum 1.3.6.1.3.500.1.1.2.1.15 octet string read-only
The serial number of the certificate of the peer this SA was negotiated with. This object has no meaning if a certificate was not used in authenticating the peer.
                         ipsecIkeSaPeerCertIssuer 1.3.6.1.3.500.1.1.2.1.16 octet string read-only
The issuer of the certificate of the peer this SA was negotiated with. This object has no meaning if a certificate was not used in authenticating the peer.
                         ipsecIkeSaEncAlg 1.3.6.1.3.500.1.1.2.1.17 integer read-only
A unique value representing the encryption algorithm applied to traffic carried by this SA. Specific values are used as described in the ISAKMP Class Values of Encryption Algorithms from Appendix A of [IKE].
                         ipsecIkeSaEncKeyLength 1.3.6.1.3.500.1.1.2.1.18 integer32 read-only
The length of the encryption key in bits used for algorithm specified in the ipsecIkeSaEncAlg object or 0 if the key length is implicit in the specified algorithm.
                         ipsecIkeSaHashAlg 1.3.6.1.3.500.1.1.2.1.19 integer32 read-only
A unique value representing the hash algorithm applied to traffic carried by this SA. Specific values are used as described in the ISAKMP Class Values of Hash Algorithms from Appendix A of [IKE].
                         ipsecIkeSaDifHelGroupDesc 1.3.6.1.3.500.1.1.2.1.20 integer32 read-only
A unique value representing the Diffie-Hellman group description used or 0 if the group is unknown. Specific values are used as described in the ISAKMP Class Values of Group Description from Appendix A of [IKE].
                         ipsecIkeSaDifHelGroupType 1.3.6.1.3.500.1.1.2.1.21 integer32 read-only
A unique value representing the Diffie-Hellman group type used or 0 if the group is unknown. Specific values are used as described in the ISAKMP Class Values of Group Type from Appendix A of [IKE].
                         ipsecIkeSaDifHelFieldSize 1.3.6.1.3.500.1.1.2.1.22 integer32 read-only
The field size, in bits, of the Diffie-Hellman group used to generate the key-pair, or 0 if unknown.
                         ipsecIkeSaPRF 1.3.6.1.3.500.1.1.2.1.23 integer32 read-only
The pseudo-random functions used, or 0 if not used or if unknown. Specific values are used as described in the ISAKMP Class Values of PRF from Appendix A of [IKE] (which specifies none at the present time).
                         ipsecIkeSaPFS 1.3.6.1.3.500.1.1.2.1.24 truthvalue read-only
A value that indicates that perfect forward secrecy is used for all IPSec SAs created by this IKE SA.
                         ipsecIkeSaTimeStart 1.3.6.1.3.500.1.1.2.1.25 dateandtime read-only
The date and time that the SA was set up.
                         ipsecIkeSaTimeLimit 1.3.6.1.3.500.1.1.2.1.26 octet string read-only
The maximum lifetime in seconds of the SA, or 0 if there is no time constraint on its expiration.
                         ipsecIkeSaTrafficLimit 1.3.6.1.3.500.1.1.2.1.27 octet string read-only
The maximum traffic in 1024-byte blocks that the SA is allowed to carry, or 0 if there is no traffic constraint on its expiration.
                         ipsecIkeSaInboundTraffic 1.3.6.1.3.500.1.1.2.1.28 counter64 read-only
The amount traffic measured in bytes handled in the SA in the inbound direction.
                         ipsecIkeSaOutboundTraffic 1.3.6.1.3.500.1.1.2.1.29 counter64 read-only
The amount traffic measured in bytes handled in the SA in the outbound direction.
                         ipsecIkeSaInboundPackets 1.3.6.1.3.500.1.1.2.1.30 counter32 read-only
The number of packets handled in the SA in the inbound direction.
                         ipsecIkeSaOutboundPackets 1.3.6.1.3.500.1.1.2.1.31 counter32 read-only
The number of packets handled in the SA in the outbound direction.
                         ipsecIkeProtSuitesCreated 1.3.6.1.3.500.1.1.2.1.32 counter32 read-only
The total number of phase 2 protection suites created by the SA.
                         ipsecIkeProtSuitesDeleted 1.3.6.1.3.500.1.1.2.1.33 counter32 read-only
The total number of phase 2 protection suites deleted by the SA.
                         ipsecIkeSaDecryptErrors 1.3.6.1.3.500.1.1.2.1.34 counter32 read-only
The number of inbound packets discarded by the phase1 SA due to decryption errors.
                         ipsecIkeSaAuthErrors 1.3.6.1.3.500.1.1.2.1.35 counter32 read-only
The number of inbound packets discarded by the phase 1 SA due to authentication errors.
                         ipsecIkeSaOtherReceiveErrors 1.3.6.1.3.500.1.1.2.1.36 counter32 read-only
The number of inbound packets discarded by the phase 1 SA due to errors other than decryption or authentication errors. This may include errors due to a lack of receive buffers.
                         ipsecIkeSaSendErrors 1.3.6.1.3.500.1.1.2.1.37 counter32 read-only
The number of outbound packets discarded by the phase 1 SA due to any error. This may include errors due to a lack of transmit buffers.
                 ipsecTrapsA 1.3.6.1.3.500.1.1.3
                     ipsecTraps 1.3.6.1.3.500.1.1.3.0
                         ipsecTrapIkeNegFailure 1.3.6.1.3.500.1.1.3.0.1
An attempt to negotiate a phase 1 SA failed.
                         ipsecTrapInvalidCookie 1.3.6.1.3.500.1.1.3.0.2
IKE packets with invalid cookies were detected from the specified peer. Implementations SHOULD send one trap per peer (within a reasonable time period, rather than sending one trap per packet.
                         ipsecTrapIpsecNegFailure 1.3.6.1.3.500.1.1.3.0.3
An attempt to negotiate a phase 2 protection suite within the specified IKE SA failed.
                         ipsecTrapIpsecAuthFailure 1.3.6.1.3.500.1.1.3.0.4
IPSec packets with invalid hashes were found in the specified protection suite. Implementations SHOULD send one trap per protection suite (within a reasonable time period), rather than sending one trap per packet.
                         ipsecTrapIpsecReplayFailure 1.3.6.1.3.500.1.1.3.0.5
IPSec packets with invalid sequence numbers were found in the specified protection suite. Implementations SHOULD send one trap per protection suite (within a reasonable time period), rather than sending one trap per packet.
                         ipsecTrapIpsecPolicyFailure 1.3.6.1.3.500.1.1.3.0.6
IPSec packets carrying packets with invalid selectors for the specified protection suite were found. Implementations SHOULD send one trap per protection suite (within a reasonable time period), rather than sending one trap per packet.
                         ipsecTrapInvalidSpi 1.3.6.1.3.500.1.1.3.0.7
ESP, AH or IPCOMP packets with unknown SPIs (or CPIs) were detected from the specified peer. Implementations SHOULD send one trap per peer (within a reasonable time period), rather than sending one trap per packet.
                 ipsecIpsecStats 1.3.6.1.3.500.1.1.4
                     ipsecIpsecTotalProtSuites 1.3.6.1.3.500.1.1.4.1 counter64 read-only
The total number of phase 2 protection suites established by the entity since boot time.
                     ipsecIpsecNegFailures 1.3.6.1.3.500.1.1.4.2 counter64 read-only
The total number of phase 2 protection suite negotiations that failed that occurred in the entity since boot time.
                     ipsecIpsecTotalInboundPackets 1.3.6.1.3.500.1.1.4.3 counter64 read-only
The total number of inbound packets carried on IPSec protection suites since boot time.
                     ipsecIpsecTotalTransOutboundPackets 1.3.6.1.3.500.1.1.4.4 counter64 read-only
The total number of outbound packets carried on IPSec protection suites since boot time.
                     ipsecIpsecTotalTransInboundTraffic 1.3.6.1.3.500.1.1.4.5 counter64 read-only
The total amount of inbound traffic carried on IPSec protection suites since boot time, measured in 1024-octet blocks.
                     ipsecIpsecTotalTransOutboundTraffic 1.3.6.1.3.500.1.1.4.6 counter64 read-only
The total amount of outbound traffic carried on IPSec protection suites since boot time, measured in 1024-octet blocks.
                 ipsecIpsecErrorStats 1.3.6.1.3.500.1.1.5
                     ipsecIpsecDecryptionErrors 1.3.6.1.3.500.1.1.5.1 counter32 read-only
The total number of packets received by the entity in the IPSec protection suites since boot time with decryption errors.
                     ipsecIpsecAuthenticationErrors 1.3.6.1.3.500.1.1.5.2 counter32 read-only
The total number of packets received by the entity in the IPSec protection suites since boot time with authentication errors. This includes all packets in which the hash value is determined to be invalid.
                     ipsecIpsecReplayErrors 1.3.6.1.3.500.1.1.5.3 counter32 read-only
The total number of packets received by the entity in the IPSec protection suites since boot time with replay errors.
                     ipsecIpsecPolicyErrors 1.3.6.1.3.500.1.1.5.4 counter32 read-only
The total number of packets received by the entity in the IPSec protection suites since boot time and discarded due to policy errors. This includes packets that had selectors that were invalid for the SA or protection suite that carried them.
                     ipsecIpsecOtherReceiveErrors 1.3.6.1.3.500.1.1.5.5 counter32 read-only
The total number of packets received by the entity in the IPSec protection suites since boot time and discarded due to errors not due to decryption, authentication, replay or policy.
                     ipsecIpsecSendErrors 1.3.6.1.3.500.1.1.5.6 counter32 read-only
The total number of packets to be sent by the entity in the IPSec protection suites since boot time and discarded due to errors.
                     ipsecUnknownSpiErrors 1.3.6.1.3.500.1.1.5.7 counter32 read-only
The total number of packets received by the entity since boot time with SPIs or CPIs that were not valid.
                 ipsecIkeStats 1.3.6.1.3.500.1.1.6
                     ipsecIkeTotalSAs 1.3.6.1.3.500.1.1.6.1 counter64 read-only
The total number of phase 1 SAs successfully established by the entity since boot time.
                     ipsecIkeNegFailures 1.3.6.1.3.500.1.1.6.2 counter64 read-only
The total number of phase 1 SA negotiations that failed that occurred in the entity since boot time.
                     ipsecIkeTotalInboundPackets 1.3.6.1.3.500.1.1.6.3 counter64 read-only
The total number of inbound packets carried on phase 1 SAs since boot time.
                     ipsecIkeTotalTransOutboundPackets 1.3.6.1.3.500.1.1.6.4 counter64 read-only
The total number of outbound packets carried on phase 1 SAs since boot time.
                     ipsecIkeTotalTransInboundTraffic 1.3.6.1.3.500.1.1.6.5 counter64 read-only
The total amount of inbound traffic carried on phase 1 SAs since boot time, measured in 1024-octet blocks.
                     ipsecIkeTotalTransOutboundTraffic 1.3.6.1.3.500.1.1.6.6 counter64 read-only
The total amount of outbound traffic carried on phase 1 SAs since boot time, measured in 1024-octet blocks.
                 ipsecIkeErrorStats 1.3.6.1.3.500.1.1.7
                     ipsecIkeProtocolErrors 1.3.6.1.3.500.1.1.7.1 counter32 read-only
The total number of packets received by the entity since boot time with IKE protocol errors. This includes packets with invalid cookies, but does not include errors that are associated with specific IKE SAs.
                     ipsecIkeDecryptionErrors 1.3.6.1.3.500.1.1.7.2 counter32 read-only
The total number of packets received by the entity in the IPSec protection suites since boot time with decryption errors.
                     ipsecIkeAuthenticationErrors 1.3.6.1.3.500.1.1.7.3 counter32 read-only
The total number of packets received by the entity in the IPSec protection suites since boot time with authentication errors. This includes all packets in which the hash value is determined to be invalid.
                     ipsecIkeOtherReceiveErrors 1.3.6.1.3.500.1.1.7.4 counter32 read-only
The total number of packets received by the entity in phase 1 SAs since boot time and discarded due to errors not due to decryption or authentication.
                     ipsecIkeSendErrors 1.3.6.1.3.500.1.1.7.5 counter32 read-only
The total number of packets to be sent by the entity in phase 1 SAs since boot time and discarded due to errors.
                 ipsecNotifications 1.3.6.1.3.500.1.1.8
                     ipsecNotifyMessageTotalCount 1.3.6.1.3.500.1.1.8.1 counter64 read-only
The total number of all types of notify messages sent or received by the entity since boot time. It is the sum of all occurrences in the 'ipsecNotifyCountTable'.
                     ipsecNotifyCountTable 1.3.6.1.3.500.1.1.8.2 no-access
The (conceptual) table containing information on IPSec notify message counts. This table MAY be sparsely populated; that is, rows for which the count is 0 may be absent.
                         ipsecNotifyCountEntry 1.3.6.1.3.500.1.1.8.2.1 no-access
An entry (conceptual row) containing the total number of occurrences of a notify message.
                             ipsecNotifyMessage 1.3.6.1.3.500.1.1.8.2.1.1 integer read-only
The value representing a specific IPSec notify message, or 0 if unknown. Values are assigned from the set of notify message types as defined in Section 3.14.1 of [ISAKMP]. In addition, the value 0 may be used for this object when the object is used as a trap cause, and the cause is unknown.
                             ipsecNotifyMessageCount 1.3.6.1.3.500.1.1.8.2.1.2 counter32 read-only
The total number of times the specific notify message has been received or sent by the entity since system boot.