Wellfleet-IPSEC-MIB: View SNMP OID List / Download MIB
VENDOR: WELLFLEET
Home | MIB: Wellfleet-IPSEC-MIB | |||
---|---|---|---|---|
Download as: |
Download standard MIB format if you are planning to load a MIB file into some system (OS, Zabbix, PRTG ...) or view it with a MIB browser. CSV is more suitable for analyzing and viewing OID' and other MIB objects in excel. JSON and YAML formats are usually used in programing even though some systems can use MIB in YAML format (like Logstash).
|
|||
Object Name | OID | Type | Access | Info |
wfIpsecBase | 1.3.6.1.4.1.18.3.5.3.26.1 | |||
wfIpsecBaseCreate | 1.3.6.1.4.1.18.3.5.3.26.1.1 | integer | read-write |
Create/Delete parameter. Default is created. Users perform a set operation on this object in order to create/delete IPSec. Enumeration: 'deleted': 2, 'created': 1. |
wfIpsecBaseEnable | 1.3.6.1.4.1.18.3.5.3.26.1.2 | integer | read-write |
Enable/Disable parameter. Default is enabled. Users perform a set operation on this object in order to enable/disable IPSec. Enumeration: 'disabled': 2, 'enabled': 1. |
wfIpsecBaseState | 1.3.6.1.4.1.18.3.5.3.26.1.3 | integer | read-only |
The current state of IPsec. Enumeration: 'down': 2, 'notpresent': 3, 'up': 1. |
wfIpsecBaseEspEncipherEnable | 1.3.6.1.4.1.18.3.5.3.26.1.4 | integer | read-write |
Used to control the whether ESP enciphers packets or not. Set this attribute to disable for debugging purposes only. When set to disabled, packets that match a policy that uses ESP to encipher the payload will not be enciphered. This allows one to view the plaintext inner headers for debugging purposes. Enumeration: 'disabled': 2, 'enabled': 1. |
wfIpsecBaseMaxManualSpi | 1.3.6.1.4.1.18.3.5.3.26.1.5 | integer | read-write |
The maximum SPI value that will be accepted for manually configured SAs. The SA values 0 - 255 is reserved. To enter this value add the number of SAs belonging to a particular IPSec protocol ex ESP to 255. The default value is maximum of 32 unique ESP SAs. The value 255 will cause no manual SAs supported |
wfIpsecSelectorInTable | 1.3.6.1.4.1.18.3.5.3.26.2 | no-access |
A table of selectors used to identify which IP security policy should be applied to a packet. |
|
1.3.6.1.4.1.18.3.5.3.26.2.1 | no-access |
IP Security Selectors for a policy |
||
wfIpsecSelectorInCreate | 1.3.6.1.4.1.18.3.5.3.26.2.1.1 | integer | read-write |
Defines the existence of the policy's selectors: created - instance exists delete - instance should be deleted. Enumeration: 'deleted': 2, 'created': 1. |
wfIpsecSelectorInEnable | 1.3.6.1.4.1.18.3.5.3.26.2.1.2 | integer | read-write |
Defines whether or not the policy should be used: enabled - activate the policy's selectors. disabled - deactivate the policy's selectors. Enumeration: 'disabled': 2, 'enabled': 1. |
wfIpsecSelectorInStatus | 1.3.6.1.4.1.18.3.5.3.26.2.1.3 | integer | read-only |
Defines the current status of the this instance: up: this instance is in use down: this instance is misconfigured inactive: this instance is disabled notpresent: the IPsec code isn't loaded Enumeration: 'down': 2, 'notpresent': 4, 'inactive': 3, 'up': 1. |
wfIpsecSelectorInCounter | 1.3.6.1.4.1.18.3.5.3.26.2.1.4 | counter | read-only |
The number of received packets that have matched the selectors. |
wfIpsecSelectorInDefinition | 1.3.6.1.4.1.18.3.5.3.26.2.1.5 | opaque | read-write |
The policy's selector definition. |
wfIpsecSelectorInReserved | 1.3.6.1.4.1.18.3.5.3.26.2.1.6 | integer | read-only |
Reserved field. |
wfIpsecSelectorInInterface | 1.3.6.1.4.1.18.3.5.3.26.2.1.7 | ipaddress | read-only |
The network address of the IP interface to which the corresponding policy is applied. |
wfIpsecSelectorInCircuit | 1.3.6.1.4.1.18.3.5.3.26.2.1.8 | integer | read-only |
The ID of the Circuit to which the corresponding policy is applied. |
wfIpsecSelectorInPolicyNumber | 1.3.6.1.4.1.18.3.5.3.26.2.1.9 | integer | read-only |
ID policy's selectors. |
wfIpsecSelectorInFragment | 1.3.6.1.4.1.18.3.5.3.26.2.1.10 | integer | read-only |
Fragment number - for large sets of selectors. |
wfIpsecSelectorInName | 1.3.6.1.4.1.18.3.5.3.26.2.1.11 | displaystring | read-write |
name of this instance of selectors. |
wfIpsecSelectorOutTable | 1.3.6.1.4.1.18.3.5.3.26.3 | no-access |
A table of selectors used to identify which IP security policy should be applied to a packet. |
|
1.3.6.1.4.1.18.3.5.3.26.3.1 | no-access |
IP Security Selectors for a policy |
||
wfIpsecSelectorOutCreate | 1.3.6.1.4.1.18.3.5.3.26.3.1.1 | integer | read-write |
Defines the existence of the policy's selectors: created - instance exists delete - instance should be deleted. Enumeration: 'deleted': 2, 'created': 1. |
wfIpsecSelectorOutEnable | 1.3.6.1.4.1.18.3.5.3.26.3.1.2 | integer | read-write |
Defines whether or not the policy should be used: enabled - activate the policy's selectors. disabled - deactivate the policy's selectors. Enumeration: 'disabled': 2, 'enabled': 1. |
wfIpsecSelectorOutStatus | 1.3.6.1.4.1.18.3.5.3.26.3.1.3 | integer | read-only |
Defines the current status of the this instance: up: this instance is in use down: this instance is misconfigured inactive: this instance is disabled notpresent: the IPsec code isn't loaded Enumeration: 'down': 2, 'notpresent': 4, 'inactive': 3, 'up': 1. |
wfIpsecSelectorOutCounter | 1.3.6.1.4.1.18.3.5.3.26.3.1.4 | counter | read-only |
The number of received packets that have matched the selectors. |
wfIpsecSelectorOutDefinition | 1.3.6.1.4.1.18.3.5.3.26.3.1.5 | opaque | read-write |
The policy's selector definition. |
wfIpsecSelectorOutReserved | 1.3.6.1.4.1.18.3.5.3.26.3.1.6 | integer | read-only |
Reserved field. |
wfIpsecSelectorOutInterface | 1.3.6.1.4.1.18.3.5.3.26.3.1.7 | ipaddress | read-only |
The network address of the IP interface to which the corresponding policy is applied. |
wfIpsecSelectorOutCircuit | 1.3.6.1.4.1.18.3.5.3.26.3.1.8 | integer | read-only |
The ID of the Circuit to which the corresponding policy is applied. |
wfIpsecSelectorOutPolicyNumber | 1.3.6.1.4.1.18.3.5.3.26.3.1.9 | integer | read-only |
ID policy's selectors. |
wfIpsecSelectorOutFragment | 1.3.6.1.4.1.18.3.5.3.26.3.1.10 | integer | read-only |
Fragment number - for large sets of selectors. |
wfIpsecSelectorOutName | 1.3.6.1.4.1.18.3.5.3.26.3.1.11 | displaystring | read-write |
name of this instance of selectors. |
wfIpsecDescriptorTable | 1.3.6.1.4.1.18.3.5.3.26.4 | no-access |
Table of IP security descriptors |
|
1.3.6.1.4.1.18.3.5.3.26.4.1 | no-access |
An IP security Descriptor |
||
wfIpsecDescriptorCreate | 1.3.6.1.4.1.18.3.5.3.26.4.1.1 | integer | read-write |
Create/Delete parameter. Default is created. Enumeration: 'deleted': 2, 'created': 1. |
wfIpsecDescriptorStatus | 1.3.6.1.4.1.18.3.5.3.26.4.1.2 | integer | read-only |
The status of this instance: up: this instance is in use down: this instance is misconfigured inactive: this instance is disabled notpresent: the IPsec code isn't loaded Enumeration: 'down': 2, 'notpresent': 4, 'inactive': 3, 'up': 1. |
wfIpsecDescriptorPolicyNumber | 1.3.6.1.4.1.18.3.5.3.26.4.1.3 | integer | read-only |
Allows instance of wfIpsecSelectorOutEntry to be matched with this instance. |
wfIpsecDescriptorInterface | 1.3.6.1.4.1.18.3.5.3.26.4.1.4 | ipaddress | read-only |
The IP address of the security gateway which this descriptor belongs to. |
wfIpsecDescriptorCircuit | 1.3.6.1.4.1.18.3.5.3.26.4.1.5 | integer | read-only |
The ID of the Circuit to which this instance applies. |
wfIpsecDescriptorManualSaList | 1.3.6.1.4.1.18.3.5.3.26.4.1.6 | opaque | read-write |
the octet string represents an ordered list of Security Associations (SAs). the format of each 9 byte sequence is: ------------+-----------+-----------+------------+----------- | protocol | Peer IP Address | ------------+-----------+-----------+------------+----------- | SPI | ------------+-----------+-----------+------------+ |
wfIpsecDescriptorSaMode | 1.3.6.1.4.1.18.3.5.3.26.4.1.7 | integer | read-write |
Identifies mode of the SA for this policy. Enumeration: 'tunnel': 1, 'transport': 2. |
wfIpsecDescriptorPfs | 1.3.6.1.4.1.18.3.5.3.26.4.1.8 | integer | read-write |
Identifies whether perfect forward secrecy is required or not. Enumeration: 'false': 2, 'true': 1. |
wfIpsecDescriptorProposals | 1.3.6.1.4.1.18.3.5.3.26.4.1.9 | opaque | read-write |
the octet string represents an ordered list of proposals. Every 2 octets in the string contains a number which corresponds to an instance I.D. of wfIpsecProposalEntry. The list of proposals is a logically ORed list. |
wfIpsecDescriptorSourceForDestAddr | 1.3.6.1.4.1.18.3.5.3.26.4.1.10 | integer | read-write |
The source for the destination IP address value to be used in the SA. 'packet' limits use of the SA to those packets which have a matching IP addr even if the policy permits a range. 'policy' allows more than one traffic flow to use the SA if the policy permits a range of IP addresses. Enumeration: 'policy': 2, 'packet': 1. |
wfIpsecDescriptorSourceForSrcAddr | 1.3.6.1.4.1.18.3.5.3.26.4.1.11 | integer | read-write |
The source for the destination IP address value to be used in the SA. 'packet' limits use of the SA to those packets which have a matching IP addr even if the policy permits a range. 'policy' allows more than one traffic flow to use the SA if the policy permits a range of IP addresses. Enumeration: 'policy': 2, 'packet': 1. |
wfIpsecDescriptorSourceForProtocol | 1.3.6.1.4.1.18.3.5.3.26.4.1.12 | integer | read-write |
The source for the destination IP address value to be used in the SA. 'packet' limits use of the SA to those packets which have a matching IP addr even if the policy permits a range. 'policy' allows more than one traffic flow to use the SA if the policy permits a range of IP addresses. Enumeration: 'policy': 2, 'packet': 1. |
wfIpsecDescriptorStartSourceAddr | 1.3.6.1.4.1.18.3.5.3.26.4.1.13 | ipaddress | read-write |
The start Source IP address for the dynamic SA. |
wfIpsecDescriptorEndSourceAddr | 1.3.6.1.4.1.18.3.5.3.26.4.1.14 | ipaddress | read-write |
The end Source IP address for the dynamic SA. |
wfIpsecDescriptorStartDestAddr | 1.3.6.1.4.1.18.3.5.3.26.4.1.15 | ipaddress | read-write |
The start Destination IP address for the dynamic SA. |
wfIpsecDescriptorEndDestAddr | 1.3.6.1.4.1.18.3.5.3.26.4.1.16 | ipaddress | read-write |
The end Source IP address for the dynamic SA. |
wfIpsecDescriptorSourcePort | 1.3.6.1.4.1.18.3.5.3.26.4.1.17 | integer | read-write |
The source port number for the dynamic SA. |
wfIpsecDescriptorProtocol | 1.3.6.1.4.1.18.3.5.3.26.4.1.18 | integer | read-write |
The IP protocol for the dynamic SA. |
wfIpsecDescriptorPrimarySG | 1.3.6.1.4.1.18.3.5.3.26.4.1.19 | ipaddress | read-write |
The address of the remote gateway. |
wfIpsecDescriptorInboundIdleTimer | 1.3.6.1.4.1.18.3.5.3.26.4.1.20 | integer | read-write |
Inbound (Unprotect) SA inactivity timer, in minutes. If no traffic is received on an automated inbound SA for the indicated time, both SAs for this policy will be deleted. A value of zero disables the timer. |
wfIpsecDescriptorAntiReplayWindow | 1.3.6.1.4.1.18.3.5.3.26.4.1.21 | integer | read-write |
Anti-replay checking implies checking the sequence number of each encrypted packet received and determining if we have received this packet before. Anti-replay checking by receivers of encrypted traffic is optional. It must only happen if authentication is select one of the security services for this flow. Anti-replay even if enabled will not happen for packets which are only encrypted. This MIB attribute controls the number of packets which are kept track of for replay checking. Anything sequence number less than the window size is thrown away. Enumeration: 'disabled': 1, 'pkts32': 32, 'pkts64': 64, 'pkts128': 128. |
wfIpsecDescriptorDestPort | 1.3.6.1.4.1.18.3.5.3.26.4.1.22 | integer | read-write |
The destination port number for the dynamic SA. |
wfIpsecEspSaTable | 1.3.6.1.4.1.18.3.5.3.26.5 | no-access |
The ESP security association table |
|
1.3.6.1.4.1.18.3.5.3.26.5.1 | no-access |
Entry in ESP security association table |
||
wfIpsecEspSaCreate | 1.3.6.1.4.1.18.3.5.3.26.5.1.1 | integer | read-write |
Create/Delete parameter. Enumeration: 'deleted': 2, 'created': 1. |
wfIpsecEspSaStatus | 1.3.6.1.4.1.18.3.5.3.26.5.1.2 | integer | read-only |
The current status of this Security Association: up: this SA is in use down: this SA is misconfigured inactive: this SA is disabled notpresent: the IPsec code isn't loaded Enumeration: 'down': 2, 'notpresent': 4, 'inactive': 3, 'up': 1. |
wfIpsecEspSaSrc | 1.3.6.1.4.1.18.3.5.3.26.5.1.3 | ipaddress | read-only |
The IP address of the SA's source. |
wfIpsecEspSaDest | 1.3.6.1.4.1.18.3.5.3.26.5.1.4 | ipaddress | read-only |
The IP address of the SA's destination. |
wfIpsecEspSaSpi | 1.3.6.1.4.1.18.3.5.3.26.5.1.5 | integer | read-only |
The security parameters index |
wfIpsecEspSaCipherAlg | 1.3.6.1.4.1.18.3.5.3.26.5.1.6 | integer | read-write |
Identifies cipher algorithm for this SA. Enumeration: 'none': 1, 'des': 2, 'desede': 3. |
wfIpsecEspSaManualCipherKey | 1.3.6.1.4.1.18.3.5.3.26.5.1.7 | octet string | read-write |
The key for a manually-keyed SA's cipher algorithm |
wfIpsecEspSaDesKeyStrength | 1.3.6.1.4.1.18.3.5.3.26.5.1.8 | integer | read-write |
The strength of the cipher key. Enumeration: 'fiftysixbit': 2, 'fortybit': 1. |
wfIpsecEspSaIntegrityAlg | 1.3.6.1.4.1.18.3.5.3.26.5.1.9 | integer | read-write |
The algorithm for ESP Auth. Enumeration: 'hmacMd5': 2, 'none': 1, 'hmacSha1': 3. |
wfIpsecEspSaManualIntegrityKey | 1.3.6.1.4.1.18.3.5.3.26.5.1.10 | octet string | read-write |
The key for a manually-keyed SA's integrity algorithm |
wfIpsecEspSaVerifyPad | 1.3.6.1.4.1.18.3.5.3.26.5.1.11 | integer | read-write |
This attribute enables checking of the pad field of ESP packets making sure it is in expected numeric ascending order. Packets with bad padding are discarded. Enumeration: 'disabled': 2, 'enabled': 1. |
wfIpsecEspSaReset | 1.3.6.1.4.1.18.3.5.3.26.5.1.12 | integer | read-write |
Reset IPSec SA statistics indicator. |
wfIpsecEspSaBadAuthen | 1.3.6.1.4.1.18.3.5.3.26.5.1.13 | counter | read-only |
The number of received encrypted packets that could not be properly authenticated. |
wfIpsecEspSaBadDecrypt | 1.3.6.1.4.1.18.3.5.3.26.5.1.14 | counter | read-only |
The number of received packets that could not be properly decrypted. |
wfIpsecEspSaBadPad | 1.3.6.1.4.1.18.3.5.3.26.5.1.15 | counter | read-only |
The number of received packets that contained bad padding information. |
wfIpsecEspSaProtectPkt | 1.3.6.1.4.1.18.3.5.3.26.5.1.16 | counter | read-only |
The number of successfully encrypted packets. |
wfIpsecEspSaUnprotectPkt | 1.3.6.1.4.1.18.3.5.3.26.5.1.17 | counter | read-only |
The number of successfully decrypted packets. |
wfIpsecEspSaEncryptByte | 1.3.6.1.4.1.18.3.5.3.26.5.1.18 | counter | read-only |
The number of successfully encrypted bytes. |
wfIpsecEspSaDecryptByte | 1.3.6.1.4.1.18.3.5.3.26.5.1.19 | counter | read-only |
The number of successfully encrypted bytes. |
wfIpsecEspSaMode | 1.3.6.1.4.1.18.3.5.3.26.5.1.20 | integer | read-write |
Identifies mode of the SA. Enumeration: 'tunnel': 1, 'transport': 2. |
wfIpsecEspSaPfs | 1.3.6.1.4.1.18.3.5.3.26.5.1.21 | integer | read-write |
Identifies whether this SA has perfect forward secrecy or not. Enumeration: 'false': 2, 'true': 1. |
wfIpsecEspSaExpiryType | 1.3.6.1.4.1.18.3.5.3.26.5.1.22 | integer | read-write |
The units used to interpret the expiry value. The SA's keys don't expire when this is set to none. Enumeration: 'seconds': 1, 'kilobytes': 2, 'none': 3. |
wfIpsecEspSaExpiryValue | 1.3.6.1.4.1.18.3.5.3.26.5.1.23 | integer | read-write |
The value used to determine when the keys for this SA expire. |
wfIpsecStatsTable | 1.3.6.1.4.1.18.3.5.3.26.6 | no-access |
The interface statistics table |
|
1.3.6.1.4.1.18.3.5.3.26.6.1 | no-access |
Entry in Interface Statistics Table |
||
wfIpsecStatsCreate | 1.3.6.1.4.1.18.3.5.3.26.6.1.1 | integer | read-only |
Create/Delete parameter. Enumeration: 'deleted': 2, 'created': 1. |
wfIpsecStatsInterface | 1.3.6.1.4.1.18.3.5.3.26.6.1.2 | ipaddress | read-only |
The IP address of the security gateway which these statistics belong to. |
wfIpsecStatsCircuit | 1.3.6.1.4.1.18.3.5.3.26.6.1.3 | integer | read-only |
The ID of the Circuit to which this instance applies. |
wfIpsecStatsReset | 1.3.6.1.4.1.18.3.5.3.26.6.1.4 | integer | read-write |
Reset IPSec statistics indicator. |
wfIpsecStatsUnprotectPkt | 1.3.6.1.4.1.18.3.5.3.26.6.1.5 | counter | read-only |
The number of received packets successfully decrypted. |
wfIpsecStatsProtectPkt | 1.3.6.1.4.1.18.3.5.3.26.6.1.6 | counter | read-only |
The number of received packets successfully encrypted. |
wfIpsecStatsBypassPkt | 1.3.6.1.4.1.18.3.5.3.26.6.1.7 | counter | read-only |
The number of received packets that have bypassed. |
wfIpsecStatsDropPkt | 1.3.6.1.4.1.18.3.5.3.26.6.1.8 | counter | read-only |
The number of received packets that have been dropped. |
wfIpsecStatsNoSa | 1.3.6.1.4.1.18.3.5.3.26.6.1.9 | counter | read-only |
The number of received packets for which no SA was found. |
wfIpsecStatsLastBadSpi | 1.3.6.1.4.1.18.3.5.3.26.6.1.10 | integer | read-only |
The last security parameters index for which no SA could be found. |
wfIpsecStatsNoPolicyMatch | 1.3.6.1.4.1.18.3.5.3.26.6.1.11 | counter | read-only |
The number of received packets for which no policy match could be found. |
wfIpsecStatsSaExpDropBytes | 1.3.6.1.4.1.18.3.5.3.26.6.1.12 | counter | read-only |
The number of bytes discarded owing to SA Expiry |
wfIpsecStatsOutClips | 1.3.6.1.4.1.18.3.5.3.26.6.1.13 | counter | read-only |
The number of outbound packets clipped due to buffer congestion. |
wfIpsecStatsInClips | 1.3.6.1.4.1.18.3.5.3.26.6.1.14 | counter | read-only |
The number of inbound packets clipped due to buffer congestion. |
wfIpsecRemoteGatewayTable | 1.3.6.1.4.1.18.3.5.3.26.7 | no-access |
A table of known remote Security Gateways. |
|
1.3.6.1.4.1.18.3.5.3.26.7.1 | no-access |
A remote Security Gateway |
||
wfIpsecRemoteGatewayCreate | 1.3.6.1.4.1.18.3.5.3.26.7.1.1 | integer | read-write |
creates or deletes an instance. Enumeration: 'deleted': 2, 'created': 1. |
wfIpsecRemoteGatewayEnable | 1.3.6.1.4.1.18.3.5.3.26.7.1.2 | integer | read-write |
enables and disables this instance. Enumeration: 'disabled': 2, 'enabled': 1. |
wfIpsecRemoteGatewayStatus | 1.3.6.1.4.1.18.3.5.3.26.7.1.3 | integer | read-only |
Defines the current status of the instance: inactive - ? active - ? error - ? Enumeration: 'active': 1, 'notpresent': 4, 'inactive': 3, 'error': 2. |
wfIpsecRemoteGatewayInterface | 1.3.6.1.4.1.18.3.5.3.26.7.1.4 | ipaddress | read-only |
The address of the IP interface to which this instance applies. |
wfIpsecRemoteGatewayCircuit | 1.3.6.1.4.1.18.3.5.3.26.7.1.5 | integer | read-only |
The ID of the Circuit to which the instance applies. |
wfIpsecRemoteGatewayIndex | 1.3.6.1.4.1.18.3.5.3.26.7.1.6 | integer | read-only |
An index used to differentiate remote gateway instances. |
wfIpsecRemoteGatewayIpAddr | 1.3.6.1.4.1.18.3.5.3.26.7.1.7 | ipaddress | read-write |
The address of the remote gateway. |
wfIpsecRemoteGatewayRange | 1.3.6.1.4.1.18.3.5.3.26.7.1.8 | octet string | read-write |
The range of destination IP addresses that the remote security gateway represents. |
wfIpsecRemoteGatewayName | 1.3.6.1.4.1.18.3.5.3.26.7.1.9 | displaystring | read-write |
name of the remote security gateway. |
wfIpsecProposalTable | 1.3.6.1.4.1.18.3.5.3.26.8 | no-access |
Table of IP security proposals |
|
1.3.6.1.4.1.18.3.5.3.26.8.1 | no-access |
An IP security Proposal. This is essentially a sequence of protection suites represented by wfIpsecSuiteEntry instances |
||
wfIpsecProposalCreate | 1.3.6.1.4.1.18.3.5.3.26.8.1.1 | integer | read-write |
Create/Delete parameter. Default is created. Enumeration: 'deleted': 2, 'created': 1. |
wfIpsecProposalStatus | 1.3.6.1.4.1.18.3.5.3.26.8.1.2 | integer | read-only |
The status of this Proposal. Enumeration: 'active': 1, 'notpresent': 4, 'inactive': 3, 'error': 2. |
wfIpsecProposalName | 1.3.6.1.4.1.18.3.5.3.26.8.1.3 | displaystring | read-write |
Proposal name. |
wfIpsecProposalNumber | 1.3.6.1.4.1.18.3.5.3.26.8.1.4 | integer | read-only |
A number that identifies this proposal. |
wfIpsecProposalSuites | 1.3.6.1.4.1.18.3.5.3.26.8.1.5 | opaque | read-write |
the octet string contains a list of ordered, 2 byte numbers that correspond to wfIpsecSuiteEntry instance ID's. The list of protection suites is a logically ANDed list. This allows multiple protocols to be used for a policy. |
wfIpsecSuiteTable | 1.3.6.1.4.1.18.3.5.3.26.9 | no-access |
Table of IP security protection suites |
|
1.3.6.1.4.1.18.3.5.3.26.9.1 | no-access |
An IP security protection suite |
||
wfIpsecSuiteCreate | 1.3.6.1.4.1.18.3.5.3.26.9.1.1 | integer | read-write |
Create/Delete parameter. Default is created. Enumeration: 'deleted': 2, 'created': 1. |
wfIpsecSuiteStatus | 1.3.6.1.4.1.18.3.5.3.26.9.1.2 | integer | read-only |
The status of this Suite. Enumeration: 'active': 1, 'notpresent': 4, 'inactive': 3, 'error': 2. |
wfIpsecSuiteName | 1.3.6.1.4.1.18.3.5.3.26.9.1.3 | displaystring | read-write |
Suite name. |
wfIpsecSuiteNumber | 1.3.6.1.4.1.18.3.5.3.26.9.1.4 | integer | read-only |
A number that identifies this protection suite. |
wfIpsecSuiteEspProtocol | 1.3.6.1.4.1.18.3.5.3.26.9.1.5 | opaque | read-write |
The ordered sequence of wfIpsecEspTransformEntry instances that comprise this protection suite. |
wfIpsecSuiteAhProtocol | 1.3.6.1.4.1.18.3.5.3.26.9.1.6 | opaque | read-write |
The ordered sequence of wfIpsecAhProposalEntry instances that comprise this protection suite. |
wfIpsecEspTransformTable | 1.3.6.1.4.1.18.3.5.3.26.10 | no-access |
Table of IP security policies |
|
1.3.6.1.4.1.18.3.5.3.26.10.1 | no-access |
An IP security ESP Transform |
||
wfIpsecEspTransformCreate | 1.3.6.1.4.1.18.3.5.3.26.10.1.1 | integer | read-write |
Create/Delete parameter. Default is created. Enumeration: 'deleted': 2, 'created': 1. |
wfIpsecEspTransformStatus | 1.3.6.1.4.1.18.3.5.3.26.10.1.2 | integer | read-only |
The status of this ESP Transform. Enumeration: 'active': 1, 'notpresent': 4, 'inactive': 3, 'error': 2. |
wfIpsecEspTransformName | 1.3.6.1.4.1.18.3.5.3.26.10.1.3 | displaystring | read-write |
ESP Transform name. |
wfIpsecEspTransformNumber | 1.3.6.1.4.1.18.3.5.3.26.10.1.4 | integer | read-only |
A number that identifies this ESP proposal. |
wfIpsecEspTransformCipherAlg | 1.3.6.1.4.1.18.3.5.3.26.10.1.5 | integer | read-write |
The cipher algorithm for ESP. Enumeration: 'none': 1, 'des': 2, 'desede': 3. |
wfIpsecEspTransformKeyLength | 1.3.6.1.4.1.18.3.5.3.26.10.1.6 | integer | read-write |
The key length for the ESP cipher algorithm. |
wfIpsecEspTransformIntegrityAlg | 1.3.6.1.4.1.18.3.5.3.26.10.1.7 | integer | read-write |
The algorithm for ESP Auth. Enumeration: 'hmacMd5': 2, 'none': 1, 'hmacSha1': 3. |
wfIpsecEspTransformExpiryTime | 1.3.6.1.4.1.18.3.5.3.26.10.1.8 | integer | read-write |
The value used to determine when the keys for this SA expire due to the passage of time. The units are minutes. The minium recommended value is 10 min. |
wfIpsecEspTransformExpiryMBytes | 1.3.6.1.4.1.18.3.5.3.26.10.1.9 | integer | read-write |
The value used to determine when the keys for this SA expire due to the number of bytes processed. The units are mega-bytes. The minium recommended value is 10 Mbytes. A value of 0 indicates that MByte expiry is not desired. |
wfIpsecEspTransformExpiryPref | 1.3.6.1.4.1.18.3.5.3.26.10.1.10 | integer | read-write |
The value used to determine precedence between time/kbyte expiry Enumeration: 'mbytes': 2, 'minutes': 1. |
wfIpsecAhTransformTable | 1.3.6.1.4.1.18.3.5.3.26.11 | no-access |
Table of IP security policies |
|
1.3.6.1.4.1.18.3.5.3.26.11.1 | no-access |
An IP security AhTransform |
||
wfIpsecAhTransformCreate | 1.3.6.1.4.1.18.3.5.3.26.11.1.1 | integer | read-write |
Create/Delete parameter. Default is created. Enumeration: 'deleted': 2, 'created': 1. |
wfIpsecAhTransformStatus | 1.3.6.1.4.1.18.3.5.3.26.11.1.2 | integer | read-only |
The status of this AhTransform. Enumeration: 'active': 1, 'notpresent': 4, 'inactive': 3, 'error': 2. |
wfIpsecAhTransformName | 1.3.6.1.4.1.18.3.5.3.26.11.1.3 | displaystring | read-write |
AhTransform name. |
wfIpsecAhTransformNumber | 1.3.6.1.4.1.18.3.5.3.26.11.1.4 | integer | read-only |
A number that identifies this AH proposal. |
wfIpsecAhTransformIntegrityAlg | 1.3.6.1.4.1.18.3.5.3.26.11.1.5 | integer | read-write |
The algorithm for AH. Enumeration: 'hmacMd5': 2, 'none': 1, 'hmacSha1': 3. |
wfIpsecAhTransformGroup | 1.3.6.1.4.1.18.3.5.3.26.11.1.6 | integer | read-write |
The DH group Enumeration: 'one': 1. |
wfIpsecAhTransformExpiryType | 1.3.6.1.4.1.18.3.5.3.26.11.1.7 | integer | read-write |
The units used to interpret the expiry value. The SA's keys don't expire when this is set to none. Enumeration: 'seconds': 1, 'kilobytes': 2, 'none': 3. |
wfIpsecAhTransformExpiryValue | 1.3.6.1.4.1.18.3.5.3.26.11.1.8 | integer | read-write |
The value used to determine when the keys for this SA expire. |
wfIpsecSaStatsTable | 1.3.6.1.4.1.18.3.5.3.26.12 | no-access |
The Ipsec automated SA table |
|
1.3.6.1.4.1.18.3.5.3.26.12.1 | no-access |
Entry in Automated ESP SA table |
||
wfIpsecSaStatsStatus | 1.3.6.1.4.1.18.3.5.3.26.12.1.1 | integer | read-only |
The current status of this Security Association: up: this SA is in use down: this SA is misconfigured ??? inactive: this SA is disabled ??? notpresent: the IPsec code isn't loaded ??? Enumeration: 'down': 2, 'notpresent': 4, 'inactive': 3, 'up': 1. |
wfIpsecSaStatsSrc | 1.3.6.1.4.1.18.3.5.3.26.12.1.2 | ipaddress | read-only |
The IP address of the SA's source. |
wfIpsecSaStatsDest | 1.3.6.1.4.1.18.3.5.3.26.12.1.3 | ipaddress | read-only |
The IP address of the SA's destination. |
wfIpsecSaStatsSpi | 1.3.6.1.4.1.18.3.5.3.26.12.1.4 | gauge | read-only |
The security parameters index |
wfIpsecSaStatsProto | 1.3.6.1.4.1.18.3.5.3.26.12.1.5 | integer | read-only |
The protocol used by this SA. Enumeration: 'ah': 3, 'none': 1, 'esp': 2. |
wfIpsecSaStatsCipherAlg | 1.3.6.1.4.1.18.3.5.3.26.12.1.6 | integer | read-only |
Identifies cipher algorithm for this SA. Enumeration: 'none': 1, 'des': 2, 'desede': 3. |
wfIpsecSaStatsIntegrityAlg | 1.3.6.1.4.1.18.3.5.3.26.12.1.7 | integer | read-only |
The algorithm for ESP Auth. Enumeration: 'hmacMd5': 2, 'none': 1, 'hmacSha1': 3. |
wfIpsecSaStatsBadAuthen | 1.3.6.1.4.1.18.3.5.3.26.12.1.8 | counter | read-only |
The number of received encrypted packets that could not be properly authenticated. |
wfIpsecSaStatsBadDecrypt | 1.3.6.1.4.1.18.3.5.3.26.12.1.9 | counter | read-only |
The number of received packets that could not be properly decrypted. |
wfIpsecSaStatsBadPad | 1.3.6.1.4.1.18.3.5.3.26.12.1.10 | counter | read-only |
The number of received packets that contained bad padding information. |
wfIpsecSaStatsProtectPkt | 1.3.6.1.4.1.18.3.5.3.26.12.1.11 | counter | read-only |
The number of successfully encrypted packets. |
wfIpsecSaStatsUnprotectPkt | 1.3.6.1.4.1.18.3.5.3.26.12.1.12 | counter | read-only |
The number of successfully decrypted packets. |
wfIpsecSaStatsEncryptByte | 1.3.6.1.4.1.18.3.5.3.26.12.1.13 | counter | read-only |
The number of successfully encrypted bytes. |
wfIpsecSaStatsDecryptByte | 1.3.6.1.4.1.18.3.5.3.26.12.1.14 | counter | read-only |
The number of successfully encrypted bytes. |
wfIpsecSaStatsMode | 1.3.6.1.4.1.18.3.5.3.26.12.1.15 | integer | read-only |
Identifies mode of the SA. Enumeration: 'tunnel': 1, 'transport': 2. |
wfIpsecSaStatsPfs | 1.3.6.1.4.1.18.3.5.3.26.12.1.16 | integer | read-only |
Identifies whether this SA has perfect forward secrecy or not. Enumeration: 'false': 2, 'true': 1. |
wfIpsecSaStatsExpiryType | 1.3.6.1.4.1.18.3.5.3.26.12.1.17 | integer | read-only |
The units used to interpret the expiry value. The SA's keys don't expire when this is set to none. Enumeration: 'seconds': 1, 'kilobytes': 2, 'none': 3. |
wfIpsecSaStatsExpiryValue | 1.3.6.1.4.1.18.3.5.3.26.12.1.18 | integer | read-only |
The value used to determine when the keys for this SA expire. |