Reference record for OID 1.3.6.1.4.1.9.9.172.1.2.1.1.4



parent
1.3.6.1.4.1.9.9.172.1.2.1.1 (ipSecPolMapEntry)
node code
4
node name
ipSecPolMapAclString
dot oid
1.3.6.1.4.1.9.9.172.1.2.1.1.4
type
OBJECT-TYPE
asn1 oid
  • {iso(1) identified-organization(3) dod(6) internet(1) private(4) enterprise(1) cisco(9) ciscoMgmt(9) ciscoIpSecPolMapMIB(172) ciscoIpSecPolMapMIBObjects(1) ipSecPhaseTwoPolMap(2) ipSecPolMapTable(1) ipSecPolMapEntry(1) ipSecPolMapAclString(4)}
  • {iso(1) identified-organization(3) dod(6) internet(1) private(4) enterprises(1) cisco(9) ciscoMgmt(9) ciscoIpSecPolMapMIB(172) ciscoIpSecPolMapMIBObjects(1) ipSecPhaseTwoPolMap(2) ipSecPolMapTable(1) ipSecPolMapEntry(1) ipSecPolMapAclString(4)}
  • {iso(1) org(3) dod(6) internet(1) private(4) enterprise(1) cisco(9) ciscoMgmt(9) ciscoIpSecPolMapMIB(172) ciscoIpSecPolMapMIBObjects(1) ipSecPhaseTwoPolMap(2) ipSecPolMapTable(1) ipSecPolMapEntry(1) ipSecPolMapAclString(4)}
  • {iso(1) org(3) dod(6) internet(1) private(4) enterprises(1) cisco(9) ciscoMgmt(9) ciscoIpSecPolMapMIB(172) ciscoIpSecPolMapMIBObjects(1) ipSecPhaseTwoPolMap(2) ipSecPolMapTable(1) ipSecPolMapEntry(1) ipSecPolMapAclString(4)}
  • {iso(1) iso-identified-organization(3) dod(6) internet(1) private(4) enterprise(1) cisco(9) ciscoMgmt(9) ciscoIpSecPolMapMIB(172) ciscoIpSecPolMapMIBObjects(1) ipSecPhaseTwoPolMap(2) ipSecPolMapTable(1) ipSecPolMapEntry(1) ipSecPolMapAclString(4)}
  • {iso(1) iso-identified-organization(3) dod(6) internet(1) private(4) enterprises(1) cisco(9) ciscoMgmt(9) ciscoIpSecPolMapMIB(172) ciscoIpSecPolMapMIBObjects(1) ipSecPhaseTwoPolMap(2) ipSecPolMapTable(1) ipSecPolMapEntry(1) ipSecPolMapAclString(4)}
  • iri oid
  • /iso/identified-organization/dod/internet/private/enterprise/cisco/ciscoMgmt/ciscoIpSecPolMapMIB/ciscoIpSecPolMapMIBObjects/ipSecPhaseTwoPolMap/ipSecPolMapTable/ipSecPolMapEntry/ipSecPolMapAclString
  • /iso/identified-organization/dod/internet/private/enterprises/cisco/ciscoMgmt/ciscoIpSecPolMapMIB/ciscoIpSecPolMapMIBObjects/ipSecPhaseTwoPolMap/ipSecPolMapTable/ipSecPolMapEntry/ipSecPolMapAclString
  • /iso/org/dod/internet/private/enterprise/cisco/ciscoMgmt/ciscoIpSecPolMapMIB/ciscoIpSecPolMapMIBObjects/ipSecPhaseTwoPolMap/ipSecPolMapTable/ipSecPolMapEntry/ipSecPolMapAclString
  • /iso/org/dod/internet/private/enterprises/cisco/ciscoMgmt/ciscoIpSecPolMapMIB/ciscoIpSecPolMapMIBObjects/ipSecPhaseTwoPolMap/ipSecPolMapTable/ipSecPolMapEntry/ipSecPolMapAclString
  • /iso/iso-identified-organization/dod/internet/private/enterprise/cisco/ciscoMgmt/ciscoIpSecPolMapMIB/ciscoIpSecPolMapMIBObjects/ipSecPhaseTwoPolMap/ipSecPolMapTable/ipSecPolMapEntry/ipSecPolMapAclString
  • /iso/iso-identified-organization/dod/internet/private/enterprises/cisco/ciscoMgmt/ciscoIpSecPolMapMIB/ciscoIpSecPolMapMIBObjects/ipSecPhaseTwoPolMap/ipSecPolMapTable/ipSecPolMapEntry/ipSecPolMapAclString
  • iri by oid_info
    /ISO/Identified-Organization/6/1/4/1/9/9/172/1/2/1/1/4

    Description by circitor

    The value of this object is the number or
    the name of the access control string (ACL)
    that caused this IPSec tunnel to be established.
    The ACL that causes an IPSec tunnel
    to be established is referenced by the
    cryptomap of the tunnel.

    The ACL identifies the traffic that requires
    protection as defined by the policy.

    For instance, the ACL that requires FTP
    traffic between local subnet 172.16.14.0 and a
    remote subnet 172.16.16.0 to be protected
    is defined as

    ==>access-list 101 permit tcp 172.16.14.0 0.0.0.255
    172.16.16.0 0.0.0.255 eq ftp

    When this command causes an IPSec tunnel to be
    established, the object 'ipSecPolMapAclString'
    assumes the string value '101'.

    If the ACL is a named list such as
    ==> ip access-list standard myAcl
    permit 172.16.16.8 0.0.0.0

    then the value of this MIB element corresponding to
    IPSec tunnel that was created by this ACL would
    be 'myAcl'.

    Parsed from file CISCO-IPSEC-POLICY-MAP-MIB.mib
    Module: CISCO-IPSEC-POLICY-MAP-MIB

    Description by cisco_v1

    The value of this object is the number or
    the name of the access control string (ACL)
    that caused this IPSec tunnel to be established.
    The ACL that causes an IPSec tunnel
    to be established is referenced by the
    cryptomap of the tunnel.

    The ACL identifies the traffic that requires
    protection as defined by the policy.

    For instance, the ACL that requires FTP
    traffic between local subnet 172.16.14.0 and a
    remote subnet 172.16.16.0 to be protected
    is defined as

    ==>access-list 101 permit tcp 172.16.14.0 0.0.0.255
    172.16.16.0 0.0.0.255 eq ftp

    When this command causes an IPSec tunnel to be
    established, the object 'ipSecPolMapAclString'
    assumes the string value '101'.

    If the ACL is a named list such as
    ==> ip access-list standard myAcl
    permit 172.16.16.8 0.0.0.0

    then the value of this MIB element corresponding to
    IPSec tunnel that was created by this ACL would
    be 'myAcl'.

    Description by mibdepot

    The value of this object is the number or
    the name of the access control string (ACL)
    that caused this IPSec tunnel to be established.
    The ACL that causes an IPSec tunnel
    to be established is referenced by the
    cryptomap of the tunnel.

    The ACL identifies the traffic that requires
    protection as defined by the policy.

    For instance, the ACL that requires FTP
    traffic between local subnet 172.16.14.0 and a
    remote subnet 172.16.16.0 to be protected
    is defined as

    ==>access-list 101 permit tcp 172.16.14.0 0.0.0.255
    172.16.16.0 0.0.0.255 eq ftp

    When this command causes an IPSec tunnel to be
    established, the object 'ipSecPolMapAclString'
    assumes the string value '101'.

    If the ACL is a named list such as
    ==> ip access-list standard myAcl
    permit 172.16.16.8 0.0.0.0

    then the value of this MIB element corresponding to
    IPSec tunnel that was created by this ACL would
    be 'myAcl'.

    Parsed from file CISCO-IPSEC-POLICY-MAP-MIB.my.txt
    Company: None
    Module: CISCO-IPSEC-POLICY-MAP-MIB

    Description by cisco

    The value of this object is the number or
    the name of the access control string (ACL)
    that caused this IPSec tunnel to be established.
    The ACL that causes an IPSec tunnel
    to be established is referenced by the
    cryptomap of the tunnel.

    The ACL identifies the traffic that requires
    protection as defined by the policy.

    For instance, the ACL that requires FTP
    traffic between local subnet 172.16.14.0 and a
    remote subnet 172.16.16.0 to be protected
    is defined as

    ==>access-list 101 permit tcp 172.16.14.0 0.0.0.255
    172.16.16.0 0.0.0.255 eq ftp

    When this command causes an IPSec tunnel to be
    established, the object 'ipSecPolMapAclString'
    assumes the string value '101'.

    If the ACL is a named list such as
    ==> ip access-list standard myAcl
    permit 172.16.16.8 0.0.0.0

    then the value of this MIB element corresponding to
    IPSec tunnel that was created by this ACL would
    be 'myAcl'.

    Information by circitor

    ipSecPolMapAclString OBJECT-TYPE SYNTAX DisplayString MAX-ACCESS read-only STATUS current DESCRIPTION "The value of this object is the number or the name of the access control string (ACL) that caused this IPSec tunnel to be established. The ACL that causes an IPSec tunnel to be established is referenced by the cryptomap of the tunnel. The ACL identifies the traffic that requires protection as defined by the policy. For instance, the ACL that requires FTP traffic between local subnet 172.16.14.0 and a remote subnet 172.16.16.0 to be protected is defined as ==>access-list 101 permit tcp 172.16.14.0 0.0.0.255 172.16.16.0 0.0.0.255 eq ftp When this command causes an IPSec tunnel to be established, the object 'ipSecPolMapAclString' assumes the string value '101'. If the ACL is a named list such as ==> ip access-list standard myAcl permit 172.16.16.8 0.0.0.0 then the value of this MIB element corresponding to IPSec tunnel that was created by this ACL would be 'myAcl'." ::= { ipSecPolMapEntry 4 }

    Information by cisco_v1

    ipSecPolMapAclString OBJECT-TYPE SYNTAX DisplayString ACCESS read-only STATUS mandatory DESCRIPTION "The value of this object is the number or the name of the access control string (ACL) that caused this IPSec tunnel to be established. The ACL that causes an IPSec tunnel to be established is referenced by the cryptomap of the tunnel. The ACL identifies the traffic that requires protection as defined by the policy. For instance, the ACL that requires FTP traffic between local subnet 172.16.14.0 and a remote subnet 172.16.16.0 to be protected is defined as ==>access-list 101 permit tcp 172.16.14.0 0.0.0.255 172.16.16.0 0.0.0.255 eq ftp When this command causes an IPSec tunnel to be established, the object 'ipSecPolMapAclString' assumes the string value '101'. If the ACL is a named list such as ==> ip access-list standard myAcl permit 172.16.16.8 0.0.0.0 then the value of this MIB element corresponding to IPSec tunnel that was created by this ACL would be 'myAcl'." ::= { ipSecPolMapEntry 4 }

    Information by oid_info

    Vendor: Cisco
    Module: CISCO-IPSEC-POLICY-MAP-MIB

    [Automatically extracted from oidview.com]

    Information by mibdepot

    ipSecPolMapAclString OBJECT-TYPE SYNTAX DisplayString MAX-ACCESS read-only STATUS current DESCRIPTION "The value of this object is the number or the name of the access control string (ACL) that caused this IPSec tunnel to be established. The ACL that causes an IPSec tunnel to be established is referenced by the cryptomap of the tunnel. The ACL identifies the traffic that requires protection as defined by the policy. For instance, the ACL that requires FTP traffic between local subnet 172.16.14.0 and a remote subnet 172.16.16.0 to be protected is defined as ==>access-list 101 permit tcp 172.16.14.0 0.0.0.255 172.16.16.0 0.0.0.255 eq ftp When this command causes an IPSec tunnel to be established, the object 'ipSecPolMapAclString' assumes the string value '101'. If the ACL is a named list such as ==> ip access-list standard myAcl permit 172.16.16.8 0.0.0.0 then the value of this MIB element corresponding to IPSec tunnel that was created by this ACL would be 'myAcl'." ::= { ipSecPolMapEntry 4 }

    Information by cisco

    ipSecPolMapAclString OBJECT-TYPE SYNTAX DisplayString MAX-ACCESS read-only STATUS current DESCRIPTION "The value of this object is the number or the name of the access control string (ACL) that caused this IPSec tunnel to be established. The ACL that causes an IPSec tunnel to be established is referenced by the cryptomap of the tunnel. The ACL identifies the traffic that requires protection as defined by the policy. For instance, the ACL that requires FTP traffic between local subnet 172.16.14.0 and a remote subnet 172.16.16.0 to be protected is defined as ==>access-list 101 permit tcp 172.16.14.0 0.0.0.255 172.16.16.0 0.0.0.255 eq ftp When this command causes an IPSec tunnel to be established, the object 'ipSecPolMapAclString' assumes the string value '101'. If the ACL is a named list such as ==> ip access-list standard myAcl permit 172.16.16.8 0.0.0.0 then the value of this MIB element corresponding to IPSec tunnel that was created by this ACL would be 'myAcl'." ::= { ipSecPolMapEntry 4 }

    First Registration Authority (recovered by parent 1.3.6.1.4.1.9)

    Greg Satz

    Current Registration Authority (recovered by parent 1.3.6.1.4.1.9)

    Cisco Systems, Inc.

    Brothers (4)

    OIDNameSub childrenSub Nodes TotalDescription
    1.3.6.1.4.1.9.9.172.1.2.1.1.1 ipSecPolMapTunIndex 0 0 The index of the IPSec Phase-2 Tunnel to Policy
    Map Table. The value of the index is the number
    used to represent this IPSec Phas…
    1.3.6.1.4.1.9.9.172.1.2.1.1.2 ipSecPolMapCryptoMapName 0 0 The value of this object should be the name of
    the IPSec Policy (cryptomap) as assigned by the
    operator while configuring the pol…
    1.3.6.1.4.1.9.9.172.1.2.1.1.3 ipSecPolMapCryptoMapNum 0 0 The value of this object should be the priority
    of the IPSec Policy (cryptomap) assigned by the
    operator while configuring the po…
    1.3.6.1.4.1.9.9.172.1.2.1.1.5 ipSecPolMapAceString 0 0 The value of this object is the access control
    entry (ACE) within the ACL that caused this IPSec
    tunnel to be established.

    For ins…