Reference record for OID 1.3.6.1.4.1.2.6.119.4.15.4.4.9



parent
1.3.6.1.4.1.2.6.119.4.15.4.4 (vpSecurityAction)
node code
9
node name
vpSecurityIpcompCorTable
dot oid
1.3.6.1.4.1.2.6.119.4.15.4.4.9
type
OBJECT-TYPE
asn1 oid
  • {iso(1) identified-organization(3) dod(6) internet(1) private(4) enterprise(1) ibm(2) ibmProd(6) ibmIROC(119) ibmIROCrouting(4) ibmIROCVPNpolicy(15) vpActions(4) vpSecurityAction(4) vpSecurityIpcompCorTable(9)}
  • {iso(1) identified-organization(3) dod(6) internet(1) private(4) enterprise(1) ibm(2) prod(6) ibmIROC(119) ibmIROCrouting(4) ibmIROCVPNpolicy(15) vpActions(4) vpSecurityAction(4) vpSecurityIpcompCorTable(9)}
  • ...skipped...
  • {iso(1) org(3) dod(6) internet(1) private(4) enterprise(1) ibm(2) ibmProd(6) ibmIROC(119) ibmIROCrouting(4) ibmIROCVPNpolicy(15) vpActions(4) vpSecurityAction(4) vpSecurityIpcompCorTable(9)}
  • {iso(1) org(3) dod(6) internet(1) private(4) enterprise(1) ibm(2) prod(6) ibmIROC(119) ibmIROCrouting(4) ibmIROCVPNpolicy(15) vpActions(4) vpSecurityAction(4) vpSecurityIpcompCorTable(9)}
  • {iso(1) org(3) dod(6) internet(1) private(4) enterprises(1) ibm(2) ibmProd(6) ibmIROC(119) ibmIROCrouting(4) ibmIROCVPNpolicy(15) vpActions(4) vpSecurityAction(4) vpSecurityIpcompCorTable(9)}
  • {iso(1) org(3) dod(6) internet(1) private(4) enterprises(1) ibm(2) prod(6) ibmIROC(119) ibmIROCrouting(4) ibmIROCVPNpolicy(15) vpActions(4) vpSecurityAction(4) vpSecurityIpcompCorTable(9)}
  • ...skipped...
  • {iso(1) iso-identified-organization(3) dod(6) internet(1) private(4) enterprises(1) ibm(2) ibmProd(6) ibmIROC(119) ibmIROCrouting(4) ibmIROCVPNpolicy(15) vpActions(4) vpSecurityAction(4) vpSecurityIpcompCorTable(9)}
  • {iso(1) iso-identified-organization(3) dod(6) internet(1) private(4) enterprises(1) ibm(2) prod(6) ibmIROC(119) ibmIROCrouting(4) ibmIROCVPNpolicy(15) vpActions(4) vpSecurityAction(4) vpSecurityIpcompCorTable(9)}
  • iri oid
  • /iso/identified-organization/dod/internet/private/enterprise/ibm/ibmProd/ibmIROC/ibmIROCrouting/ibmIROCVPNpolicy/vpActions/vpSecurityAction/vpSecurityIpcompCorTable
  • /iso/identified-organization/dod/internet/private/enterprise/ibm/prod/ibmIROC/ibmIROCrouting/ibmIROCVPNpolicy/vpActions/vpSecurityAction/vpSecurityIpcompCorTable
  • ...skipped...
  • /iso/org/dod/internet/private/enterprise/ibm/ibmProd/ibmIROC/ibmIROCrouting/ibmIROCVPNpolicy/vpActions/vpSecurityAction/vpSecurityIpcompCorTable
  • /iso/org/dod/internet/private/enterprise/ibm/prod/ibmIROC/ibmIROCrouting/ibmIROCVPNpolicy/vpActions/vpSecurityAction/vpSecurityIpcompCorTable
  • /iso/org/dod/internet/private/enterprises/ibm/ibmProd/ibmIROC/ibmIROCrouting/ibmIROCVPNpolicy/vpActions/vpSecurityAction/vpSecurityIpcompCorTable
  • /iso/org/dod/internet/private/enterprises/ibm/prod/ibmIROC/ibmIROCrouting/ibmIROCVPNpolicy/vpActions/vpSecurityAction/vpSecurityIpcompCorTable
  • ...skipped...
  • /iso/iso-identified-organization/dod/internet/private/enterprises/ibm/ibmProd/ibmIROC/ibmIROCrouting/ibmIROCVPNpolicy/vpActions/vpSecurityAction/vpSecurityIpcompCorTable
  • /iso/iso-identified-organization/dod/internet/private/enterprises/ibm/prod/ibmIROC/ibmIROCrouting/ibmIROCVPNpolicy/vpActions/vpSecurityAction/vpSecurityIpcompCorTable
  • iri by oid_info
    /ISO/Identified-Organization/6/1/4/1/2/6/119/4/15/4/4/9

    Description by mibdepot

    The Security IPCOMP Transform Correlation Table. This table can be
    used to correlate Security Proposals with IPCOMP Transforms.
    A Security Proposal may be associated with one or more
    IPCOMP Transforms.

    Parsed from file vpnpolicy.mib.txt
    Company: None
    Module: VPNPOLICY-MIB

    Description by circitor

    The Security IPCOMP Transform Correlation Table. This table can be
    used to correlate Security Proposals with IPCOMP Transforms.
    A Security Proposal may be associated with one or more
    IPCOMP Transforms.

    Parsed from file VPNPOLICY-MIB.mib
    Module: VPNPOLICY-MIB

    Information by oid_info

    Vendor: IBM
    Module: VPNPOLICY-MIB

    [Automatically extracted from oidview.com]

    Information by mibdepot

    vpSecurityIpcompCorTable OBJECT-TYPE SYNTAX SEQUENCE OF VpSecurityIpcompCorEntry ACCESS not-accessible STATUS mandatory DESCRIPTION "The Security IPCOMP Transform Correlation Table. This table can be used to correlate Security Proposals with IPCOMP Transforms. A Security Proposal may be associated with one or more IPCOMP Transforms." ::= { vpSecurityAction 9 }

    Information by circitor

    vpSecurityIpcompCorTable OBJECT-TYPE SYNTAX SEQUENCE OF VpSecurityIpcompCorEntry ACCESS not-accessible STATUS mandatory DESCRIPTION "The Security IPCOMP Transform Correlation Table. This table can be used to correlate Security Proposals with IPCOMP Transforms. A Security Proposal may be associated with one or more IPCOMP Transforms." ::= { vpSecurityAction 9 }

    First Registration Authority (recovered by parent 1.3.6.1.4.1.2)

    Bob Moore

    Children (1)

    OIDNameSub childrenSub Nodes TotalDescription
    1.3.6.1.4.1.2.6.119.4.15.4.4.9.1 vpSecurityIpcompCorEntry 2 2 A Security Security IPCOMP Transform Correlation Table entry.

    Brothers (9)

    OIDNameSub childrenSub Nodes TotalDescription
    1.3.6.1.4.1.2.6.119.4.15.4.4.1 vpSecurityActionTable 1 20 The Security Action Table.
    1.3.6.1.4.1.2.6.119.4.15.4.4.2 vpSecurityProposalTable 1 4 The Security Proposal Table.
    1.3.6.1.4.1.2.6.119.4.15.4.4.3 vpSecurityAhTransTable 1 6 vpSecurityAhtransTable
    1.3.6.1.4.1.2.6.119.4.15.4.4.4 vpSecurityEspTransTable 1 7 The Security ESP Transform Table.
    1.3.6.1.4.1.2.6.119.4.15.4.4.5 vpSecurityIpcompTransTable 1 6 The Security IPCOMP Transform Table.
    1.3.6.1.4.1.2.6.119.4.15.4.4.6 vpSecurityPropCorTable 1 3 The Security Proposal Correlation Table. This table can be used to
    to correlate Security Actions with Security Proposals. A Se…
    1.3.6.1.4.1.2.6.119.4.15.4.4.7 vpSecurityAhCorTable 1 3 The Security AH Transform Correlation Table. This table can be used
    to correlate Security Proposals with AH Transforms. A Secur…
    1.3.6.1.4.1.2.6.119.4.15.4.4.8 vpSecurityEspCorTable 1 3 The Security ESP Transform Correlation Table. This table can be used
    to correlate Security Proposals with ESP Transforms. A Se…
    1.3.6.1.4.1.2.6.119.4.15.4.4.10 vpSecurityActiveInstTable 1 4 The Security Active Instance Table.