When Remote Gateway is static IP, user can select either Disable, Enable as Client or Enable as Server in XAuth. In Enable as Client, user will have to enter the username and the passwords. In Enable as Server, user will have to select from PAP or CHAP.
When Remote Gateway is Dialup user, user can select either Disable or Enable as Server (Enable as Client will be disabled). In Enable as Server, user will have to enter the username and the passwords.
Parsed from file fortinet.mib.txt
Company: None
Module: FORTINET-MIB
When Remote Gateway is static IP, user can select either Disable, Enable as Client or Enable as Server in XAuth. In Enable as Client, user will have to enter the username and the passwords. In Enable as Server, user will have to select from PAP or CHAP.
When Remote Gateway is Dialup user, user can select either Disable or Enable as Server (Enable as Client will be disabled). In Enable as Server, user will have to enter the username and the passwords.
Parsed from file FORTINET-MIB.mib
Module: FORTINET-MIB
Vendor: Fortinet, Inc.
Module: FORTINET-MIB
[Automatically extracted from oidview.com]
fnVpnRemoteGWXAuth OBJECT-TYPE SYNTAX INTEGER { enableAsClient ( 1 ) , enableAsServer ( 2 ) , diable ( 3 ) } ACCESS read-only STATUS mandatory DESCRIPTION "When Remote Gateway is static IP, user can select either Disable, Enable as Client or Enable as Server in XAuth. In Enable as Client, user will have to enter the username and the passwords. In Enable as Server, user will have to select from PAP or CHAP. When Remote Gateway is Dialup user, user can select either Disable or Enable as Server (Enable as Client will be disabled). In Enable as Server, user will have to enter the username and the passwords." ::= { fnVpnRemoteGWEntry 24 }
fnVpnRemoteGWXAuth OBJECT-TYPE SYNTAX INTEGER { enableAsClient ( 1 ) , enableAsServer ( 2 ) , diable ( 3 ) } ACCESS read-only STATUS mandatory DESCRIPTION "When Remote Gateway is static IP, user can select either Disable, Enable as Client or Enable as Server in XAuth. In Enable as Client, user will have to enter the username and the passwords. In Enable as Server, user will have to select from PAP or CHAP. When Remote Gateway is Dialup user, user can select either Disable or Enable as Server (Enable as Client will be disabled). In Enable as Server, user will have to enter the username and the passwords." ::= { fnVpnRemoteGWEntry 24 }
OID | Name | Sub children | Sub Nodes Total | Description |
---|---|---|---|---|
1.3.6.1.4.1.12356.4.1.4.1.1 | fnVpnRemoteGWIndex | 0 | 0 | Column Description |
1.3.6.1.4.1.12356.4.1.4.1.2 | fnVpnRemoteGWName | 0 | 0 | Column Description |
1.3.6.1.4.1.12356.4.1.4.1.3 | fnVpnRemoteGWIp | 0 | 0 | This entry is valid only when remote gateway type is set to staticIP |
1.3.6.1.4.1.12356.4.1.4.1.4 | fnVpnRemoteGWMode | 0 | 0 | Description |
1.3.6.1.4.1.12356.4.1.4.1.5 | fnVpnRemoteGWPh1Encrp1 | 0 | 0 | Description |
1.3.6.1.4.1.12356.4.1.4.1.6 | fnVpnRemoteGWPh1Auth1 | 0 | 0 | Description |
1.3.6.1.4.1.12356.4.1.4.1.7 | fnVpnRemoteGWPh1Encrp2 | 0 | 0 | Description |
1.3.6.1.4.1.12356.4.1.4.1.8 | fnVpnRemoteGWPh1Auth2 | 0 | 0 | Description |
1.3.6.1.4.1.12356.4.1.4.1.9 | fnVpnRemoteGWPh1Encrp3 | 0 | 0 | Description |
1.3.6.1.4.1.12356.4.1.4.1.10 | fnVpnRemoteGWPh1Auth3 | 0 | 0 | Description |
1.3.6.1.4.1.12356.4.1.4.1.11 | fnVpnRemoteGWDhGrp | 0 | 0 | Description |
1.3.6.1.4.1.12356.4.1.4.1.12 | fnVpnRemoteGWKeylife | 0 | 0 | Keylife in seconds |
1.3.6.1.4.1.12356.4.1.4.1.13 | fnVpnRemoteGWPreKey | 0 | 0 | Pre-shared key value. The entry is valid when the authentication method is selected as Preshared-Key |
1.3.6.1.4.1.12356.4.1.4.1.14 | fnVpnRemoteGWLocalID | 0 | 0 | Description |
1.3.6.1.4.1.12356.4.1.4.1.15 | fnVpnRemoteGWNatT | 0 | 0 | Turn on/off Nat traversal |
1.3.6.1.4.1.12356.4.1.4.1.16 | fnVpnRemoteGWKAFreq | 0 | 0 | Keep alive frequency in seconds |
1.3.6.1.4.1.12356.4.1.4.1.17 | fnVpnRemoteGWType | 0 | 0 | The remote gateway type. |
1.3.6.1.4.1.12356.4.1.4.1.18 | fnVpnRemoteGWUserGrp | 0 | 0 | This entry is valid only when remote gateway type is dialUpUser |
1.3.6.1.4.1.12356.4.1.4.1.19 | fnVpnRemoteGWAuthMethod | 0 | 0 | Authentication method |
1.3.6.1.4.1.12356.4.1.4.1.20 | fnVpnRemoteGWCertName | 0 | 0 | Certificate name. This entry is valid when authentication method is selected as RSA-Signature |
1.3.6.1.4.1.12356.4.1.4.1.21 | fnVpnRemoteGWPeerOpt | 0 | 0 | Peer option |
1.3.6.1.4.1.12356.4.1.4.1.22 | fnVpnRemoteGWPeerGrpName | 0 | 0 | When peer option is chosen as acceptPeerIdInDialupGroup, this entry is the dialup group name. |
1.3.6.1.4.1.12356.4.1.4.1.23 | fnVpnRemoteGWPeerId | 0 | 0 | When peer option is chosen as acceptThisPeerID, this is the peer ID that is to be accepted. |
1.3.6.1.4.1.12356.4.1.4.1.25 | fnVpnRemoteGWXAuthUserName | 0 | 0 | Description |
1.3.6.1.4.1.12356.4.1.4.1.26 | fnVpnRemoteGWXAuthPasswd | 0 | 0 | Description |
1.3.6.1.4.1.12356.4.1.4.1.27 | fnVpnRemoteGWXAuthPap | 0 | 0 | Description |
1.3.6.1.4.1.12356.4.1.4.1.28 | fnVpnRemoteGWDeadPeerDet | 0 | 0 | Turn on/off dead peer detection |
1.3.6.1.4.1.12356.4.1.4.1.29 | fnVpnRemoteGWDpdIdleWorry | 0 | 0 | There are four options in Dead Peer Detection: Idle Worry, Retry Count, Retry Interval and Idle Cleanup |
1.3.6.1.4.1.12356.4.1.4.1.30 | fnVpnRemoteGWDpdRetryCound | 0 | 0 | There are four options in Dead Peer Detection: Idle Worry, Retry Count, Retry Interval and Idle Cleanup |
1.3.6.1.4.1.12356.4.1.4.1.31 | fnVpnRemoteGWDpdRetryInt | 0 | 0 | There are four options in Dead Peer Detection: Idle Worry, Retry Count, Retry Interval and Idle Cleanup |
1.3.6.1.4.1.12356.4.1.4.1.32 | fnVpnRemoteGWDpdIdleCleanup | 0 | 0 | There are four options in Dead Peer Detection: Idle Worry, Retry Count, Retry Interval and Idle Cleanup |