>> MIB - Management Information Base

>> Table: ikev2SaTable - (.1.3.6.1.4.1.272.4.26.21.1)

Description: This object contains an IKE security association.

ikev2SaTable
OIDNameTypeAccess
.1IndexINTEGERR
.2StateENUMD
.3AuthMethodENUMR
.4EncAlgENUMR
.5IntegAlgENUMR
.6PrfAlgENUMR
.7GroupINTEGERR
.8RoleENUMR
.9LocalIdDisplayStringR
.10RemoteIdDisplayStringR
.11LocalIpIpAddressR
.12RemoteIpIpAddressR
.13SpiIOCTET STRINGR
.14SpiROCTET STRINGR
.15CreatedDateR
.16LastUsedDateR
.17ExpiresDateR
.18NumCertsINTEGERR
.19NumNegotiationsINTEGERR
.20BytesINTEGERR
.21PeerIndexINTEGERR
.22LocalPortINTEGERR
.23RemotePortINTEGERR
.24Ip6LocalIpInetAddressIPv6R
.25Ip6RemoteIpInetAddressIPv6R
.26RekeysDateR

Index
A unique index for this entry.
State
This object specifies the state of the SA. Possible values: negotiating(1), -- the SA is still being negotiated established(2), -- the SA negotiation is finished waiting-for-remove(3), -- the SA is waiting for removal delete(7) -- mark the SA for deletion.

Enumerations:

  • negotiating (1)
  • established (2)
  • waiting-for-remove (3)
  • delete (7)
AuthMethod
The authentication method used when creating this SA. Possible values: pre-sh-key(1), -- Authentication using pre shared keys dss-sig(2), -- Authentication using DSS signatures rsa-sig(3), -- Authentication using RSA signatures rsa-enc(4), -- Authentication using RSA encryption rsa-enc-rev(5) -- Authentication using revised RSA encryption.

Enumerations:

  • pre-sh-key (1)
  • dss-sig (2)
  • rsa-sig (3)
  • rsa-enc (4)
  • rsa-enc-rev (5)
EncAlg
The encryption algorithm used for the IKE_SA. Possible values: des(2), des3(3), rc5(4), idea(5), cast(6), blowfish(7), aes-cbc(12), aes-ctr(13)

Enumerations:

  • des (2)
  • des3 (3)
  • rc5 (4)
  • idea (5)
  • cast (6)
  • blowfish (7)
  • aes-cbc (12)
  • aes-ctr (13)
IntegAlg
The integrity protection algorithm used for the IKE_SA. Possible values: hmac-md5-96(1), hmac-sha1-96(2), hmac-sha2-256(3), hmac-sha2-384(4), hmac-sha2-512(5)

Enumerations:

  • hmac-md5-96 (1)
  • hmac-sha1-96 (2)
  • hmac-sha2-256 (3)
  • hmac-sha2-384 (4)
  • hmac-sha2-512 (5)
PrfAlg
The hash algorithm used for the pseudo random function. Possible values: hmac-md5(1), hmac-sha1(2), hmac-sha2-256(3), hmac-sha2-384(4), hmac-sha2-512(5)

Enumerations:

  • hmac-md5 (1)
  • hmac-sha1 (2)
  • hmac-sha2-256 (3)
  • hmac-sha2-384 (4)
  • hmac-sha2-512 (5)
Group
The Diffie-Hellman group used for the IKE_SA. Possible values: 1 - DH-group 768-bit MODP, 2 - DH-group 1024-bit MODP
Role
This object specifies by which side the SA negotiation was initiated. Possible values: initiator(1), -- this end initiated the SA negotiation responder(2) -- the remote end initiated the SA negotiation.

Enumerations:

  • initiator (1)
  • responder (2)
LocalId
The local ID used for authentication.

Length: 0 to 255

RemoteId
The remote ID used for authentication.

Length: 0 to 255

LocalIp
The local IP address used in the IKE communication.
RemoteIp
The remote IP address used in the IKE communication.
SpiI
The SPI of the initiator.
SpiR
The SPI of the responder.
Created
Time the SA was created.

Range: 0 to -1

LastUsed
Time the SA was used last.

Range: 0 to -1

Expires
Time the SA will expire.

Range: 0 to -1

NumCerts
The number of certificates received from the remote side when negotiating this SA.
NumNegotiations
This object specifies the number of currently active negotiations for this SA.
Bytes
Number of bytes transmitted using this SA.
PeerIndex
The index of the peer for which this SA was created.
LocalPort
Local port currently used for the SA.

Range: 0 to 65535

RemotePort
Remote port currently used for the SA.

Range: 0 to 65535

Ip6LocalIp
The local IPv6 address used in the IKE communication.
Ip6RemoteIp
The remote IPv6 address used in the IKE communication.
Rekeys
Time the SA will rekey.

Range: 0 to -1


MIB Reference to Software Version 10.2.12 generated on 2023/08/29. Provided by webmaster@bintec-elmeg.com
Copyright ©2023 by bintec elmeg GmbH