Reference record for OID 1.3.6.1.4.1.9.9.172.1.2.1.1.5



parent
1.3.6.1.4.1.9.9.172.1.2.1.1 (ipSecPolMapEntry)
node code
5
node name
ipSecPolMapAceString
dot oid
1.3.6.1.4.1.9.9.172.1.2.1.1.5
type
OBJECT-TYPE
asn1 oid
  • {iso(1) identified-organization(3) dod(6) internet(1) private(4) enterprise(1) cisco(9) ciscoMgmt(9) ciscoIpSecPolMapMIB(172) ciscoIpSecPolMapMIBObjects(1) ipSecPhaseTwoPolMap(2) ipSecPolMapTable(1) ipSecPolMapEntry(1) ipSecPolMapAceString(5)}
  • {iso(1) identified-organization(3) dod(6) internet(1) private(4) enterprises(1) cisco(9) ciscoMgmt(9) ciscoIpSecPolMapMIB(172) ciscoIpSecPolMapMIBObjects(1) ipSecPhaseTwoPolMap(2) ipSecPolMapTable(1) ipSecPolMapEntry(1) ipSecPolMapAceString(5)}
  • {iso(1) org(3) dod(6) internet(1) private(4) enterprise(1) cisco(9) ciscoMgmt(9) ciscoIpSecPolMapMIB(172) ciscoIpSecPolMapMIBObjects(1) ipSecPhaseTwoPolMap(2) ipSecPolMapTable(1) ipSecPolMapEntry(1) ipSecPolMapAceString(5)}
  • {iso(1) org(3) dod(6) internet(1) private(4) enterprises(1) cisco(9) ciscoMgmt(9) ciscoIpSecPolMapMIB(172) ciscoIpSecPolMapMIBObjects(1) ipSecPhaseTwoPolMap(2) ipSecPolMapTable(1) ipSecPolMapEntry(1) ipSecPolMapAceString(5)}
  • {iso(1) iso-identified-organization(3) dod(6) internet(1) private(4) enterprise(1) cisco(9) ciscoMgmt(9) ciscoIpSecPolMapMIB(172) ciscoIpSecPolMapMIBObjects(1) ipSecPhaseTwoPolMap(2) ipSecPolMapTable(1) ipSecPolMapEntry(1) ipSecPolMapAceString(5)}
  • {iso(1) iso-identified-organization(3) dod(6) internet(1) private(4) enterprises(1) cisco(9) ciscoMgmt(9) ciscoIpSecPolMapMIB(172) ciscoIpSecPolMapMIBObjects(1) ipSecPhaseTwoPolMap(2) ipSecPolMapTable(1) ipSecPolMapEntry(1) ipSecPolMapAceString(5)}
  • iri oid
  • /iso/identified-organization/dod/internet/private/enterprise/cisco/ciscoMgmt/ciscoIpSecPolMapMIB/ciscoIpSecPolMapMIBObjects/ipSecPhaseTwoPolMap/ipSecPolMapTable/ipSecPolMapEntry/ipSecPolMapAceString
  • /iso/identified-organization/dod/internet/private/enterprises/cisco/ciscoMgmt/ciscoIpSecPolMapMIB/ciscoIpSecPolMapMIBObjects/ipSecPhaseTwoPolMap/ipSecPolMapTable/ipSecPolMapEntry/ipSecPolMapAceString
  • /iso/org/dod/internet/private/enterprise/cisco/ciscoMgmt/ciscoIpSecPolMapMIB/ciscoIpSecPolMapMIBObjects/ipSecPhaseTwoPolMap/ipSecPolMapTable/ipSecPolMapEntry/ipSecPolMapAceString
  • /iso/org/dod/internet/private/enterprises/cisco/ciscoMgmt/ciscoIpSecPolMapMIB/ciscoIpSecPolMapMIBObjects/ipSecPhaseTwoPolMap/ipSecPolMapTable/ipSecPolMapEntry/ipSecPolMapAceString
  • /iso/iso-identified-organization/dod/internet/private/enterprise/cisco/ciscoMgmt/ciscoIpSecPolMapMIB/ciscoIpSecPolMapMIBObjects/ipSecPhaseTwoPolMap/ipSecPolMapTable/ipSecPolMapEntry/ipSecPolMapAceString
  • /iso/iso-identified-organization/dod/internet/private/enterprises/cisco/ciscoMgmt/ciscoIpSecPolMapMIB/ciscoIpSecPolMapMIBObjects/ipSecPhaseTwoPolMap/ipSecPolMapTable/ipSecPolMapEntry/ipSecPolMapAceString
  • iri by oid_info
    /ISO/Identified-Organization/6/1/4/1/9/9/172/1/2/1/1/5

    Description by circitor

    The value of this object is the access control
    entry (ACE) within the ACL that caused this IPSec
    tunnel to be established.

    For instance, if an ACL defines access for two
    traffic streams (FTP and SNMP) as follows:

    access-list 101 permit tcp 172.16.14.0 0.0.0.255
    172.16.16.0 0.0.0.255 eq ftp
    access-list 101 permit udp 172.16.14.0 0.0.0.255
    host 172.16.16.1 eq 161


    When associated with an IPSec policy, the second
    element of the ACL gives rise to an IPSec tunnel
    in the wake of SNMP traffic. The value of the
    object 'ipSecPolMapAceString' for the IPSec tunnel
    would be then the string
    'access-list 101 permit udp 172.16.14.0 0.0.0.255
    host 172.16.16.1 eq 161'

    Parsed from file CISCO-IPSEC-POLICY-MAP-MIB.mib
    Module: CISCO-IPSEC-POLICY-MAP-MIB

    Description by cisco_v1

    The value of this object is the access control
    entry (ACE) within the ACL that caused this IPSec
    tunnel to be established.

    For instance, if an ACL defines access for two
    traffic streams (FTP and SNMP) as follows:

    access-list 101 permit tcp 172.16.14.0 0.0.0.255
    172.16.16.0 0.0.0.255 eq ftp
    access-list 101 permit udp 172.16.14.0 0.0.0.255
    host 172.16.16.1 eq 161


    When associated with an IPSec policy, the second
    element of the ACL gives rise to an IPSec tunnel
    in the wake of SNMP traffic. The value of the
    object 'ipSecPolMapAceString' for the IPSec tunnel
    would be then the string
    'access-list 101 permit udp 172.16.14.0 0.0.0.255
    host 172.16.16.1 eq 161'

    Description by mibdepot

    The value of this object is the access control
    entry (ACE) within the ACL that caused this IPSec
    tunnel to be established.

    For instance, if an ACL defines access for two
    traffic streams (FTP and SNMP) as follows:

    access-list 101 permit tcp 172.16.14.0 0.0.0.255
    172.16.16.0 0.0.0.255 eq ftp
    access-list 101 permit udp 172.16.14.0 0.0.0.255
    host 172.16.16.1 eq 161


    When associated with an IPSec policy, the second
    element of the ACL gives rise to an IPSec tunnel
    in the wake of SNMP traffic. The value of the
    object 'ipSecPolMapAceString' for the IPSec tunnel
    would be then the string
    'access-list 101 permit udp 172.16.14.0 0.0.0.255
    host 172.16.16.1 eq 161'

    Parsed from file CISCO-IPSEC-POLICY-MAP-MIB.my.txt
    Company: None
    Module: CISCO-IPSEC-POLICY-MAP-MIB

    Description by cisco

    The value of this object is the access control
    entry (ACE) within the ACL that caused this IPSec
    tunnel to be established.

    For instance, if an ACL defines access for two
    traffic streams (FTP and SNMP) as follows:

    access-list 101 permit tcp 172.16.14.0 0.0.0.255
    172.16.16.0 0.0.0.255 eq ftp
    access-list 101 permit udp 172.16.14.0 0.0.0.255
    host 172.16.16.1 eq 161


    When associated with an IPSec policy, the second
    element of the ACL gives rise to an IPSec tunnel
    in the wake of SNMP traffic. The value of the
    object 'ipSecPolMapAceString' for the IPSec tunnel
    would be then the string
    'access-list 101 permit udp 172.16.14.0 0.0.0.255
    host 172.16.16.1 eq 161'

    Information by circitor

    ipSecPolMapAceString OBJECT-TYPE SYNTAX DisplayString MAX-ACCESS read-only STATUS current DESCRIPTION "The value of this object is the access control entry (ACE) within the ACL that caused this IPSec tunnel to be established. For instance, if an ACL defines access for two traffic streams (FTP and SNMP) as follows: access-list 101 permit tcp 172.16.14.0 0.0.0.255 172.16.16.0 0.0.0.255 eq ftp access-list 101 permit udp 172.16.14.0 0.0.0.255 host 172.16.16.1 eq 161 When associated with an IPSec policy, the second element of the ACL gives rise to an IPSec tunnel in the wake of SNMP traffic. The value of the object 'ipSecPolMapAceString' for the IPSec tunnel would be then the string 'access-list 101 permit udp 172.16.14.0 0.0.0.255 host 172.16.16.1 eq 161'" ::= { ipSecPolMapEntry 5 }

    Information by cisco_v1

    ipSecPolMapAceString OBJECT-TYPE SYNTAX DisplayString ACCESS read-only STATUS mandatory DESCRIPTION "The value of this object is the access control entry (ACE) within the ACL that caused this IPSec tunnel to be established. For instance, if an ACL defines access for two traffic streams (FTP and SNMP) as follows: access-list 101 permit tcp 172.16.14.0 0.0.0.255 172.16.16.0 0.0.0.255 eq ftp access-list 101 permit udp 172.16.14.0 0.0.0.255 host 172.16.16.1 eq 161 When associated with an IPSec policy, the second element of the ACL gives rise to an IPSec tunnel in the wake of SNMP traffic. The value of the object 'ipSecPolMapAceString' for the IPSec tunnel would be then the string 'access-list 101 permit udp 172.16.14.0 0.0.0.255 host 172.16.16.1 eq 161'" ::= { ipSecPolMapEntry 5 }

    Information by oid_info

    Vendor: Cisco
    Module: CISCO-IPSEC-POLICY-MAP-MIB

    [Automatically extracted from oidview.com]

    Information by mibdepot

    ipSecPolMapAceString OBJECT-TYPE SYNTAX DisplayString MAX-ACCESS read-only STATUS current DESCRIPTION "The value of this object is the access control entry (ACE) within the ACL that caused this IPSec tunnel to be established. For instance, if an ACL defines access for two traffic streams (FTP and SNMP) as follows: access-list 101 permit tcp 172.16.14.0 0.0.0.255 172.16.16.0 0.0.0.255 eq ftp access-list 101 permit udp 172.16.14.0 0.0.0.255 host 172.16.16.1 eq 161 When associated with an IPSec policy, the second element of the ACL gives rise to an IPSec tunnel in the wake of SNMP traffic. The value of the object 'ipSecPolMapAceString' for the IPSec tunnel would be then the string 'access-list 101 permit udp 172.16.14.0 0.0.0.255 host 172.16.16.1 eq 161'" ::= { ipSecPolMapEntry 5 }

    Information by cisco

    ipSecPolMapAceString OBJECT-TYPE SYNTAX DisplayString MAX-ACCESS read-only STATUS current DESCRIPTION "The value of this object is the access control entry (ACE) within the ACL that caused this IPSec tunnel to be established. For instance, if an ACL defines access for two traffic streams (FTP and SNMP) as follows: access-list 101 permit tcp 172.16.14.0 0.0.0.255 172.16.16.0 0.0.0.255 eq ftp access-list 101 permit udp 172.16.14.0 0.0.0.255 host 172.16.16.1 eq 161 When associated with an IPSec policy, the second element of the ACL gives rise to an IPSec tunnel in the wake of SNMP traffic. The value of the object 'ipSecPolMapAceString' for the IPSec tunnel would be then the string 'access-list 101 permit udp 172.16.14.0 0.0.0.255 host 172.16.16.1 eq 161'" ::= { ipSecPolMapEntry 5 }

    First Registration Authority (recovered by parent 1.3.6.1.4.1.9)

    Greg Satz

    Current Registration Authority (recovered by parent 1.3.6.1.4.1.9)

    Cisco Systems, Inc.

    Brothers (4)

    OIDNameSub childrenSub Nodes TotalDescription
    1.3.6.1.4.1.9.9.172.1.2.1.1.1 ipSecPolMapTunIndex 0 0 The index of the IPSec Phase-2 Tunnel to Policy
    Map Table. The value of the index is the number
    used to represent this IPSec Phas…
    1.3.6.1.4.1.9.9.172.1.2.1.1.2 ipSecPolMapCryptoMapName 0 0 The value of this object should be the name of
    the IPSec Policy (cryptomap) as assigned by the
    operator while configuring the pol…
    1.3.6.1.4.1.9.9.172.1.2.1.1.3 ipSecPolMapCryptoMapNum 0 0 The value of this object should be the priority
    of the IPSec Policy (cryptomap) assigned by the
    operator while configuring the po…
    1.3.6.1.4.1.9.9.172.1.2.1.1.4 ipSecPolMapAclString 0 0 The value of this object is the number or
    the name of the access control string (ACL)
    that caused this IPSec tunnel to be establi…