Reference record for OID 1.3.6.1.4.1.1022.10.1.1.1.1.1



parent
1.3.6.1.4.1.1022.10.1.1.1.1 (ipsecIkeSaEntry)
node code
1
node name
ipsecIkeSaIndex
dot oid
1.3.6.1.4.1.1022.10.1.1.1.1.1
type
OBJECT-TYPE
asn1 oid
  • {iso(1) identified-organization(3) dod(6) internet(1) private(4) enterprise(1) timestep(1022) ipsecMIB(10) ipsecMIBObjects(1) ipsec(1) ipsecIkeSaTable(1) ipsecIkeSaEntry(1) ipsecIkeSaIndex(1)}
  • {iso(1) identified-organization(3) dod(6) internet(1) private(4) enterprises(1) timestep(1022) ipsecMIB(10) ipsecMIBObjects(1) ipsec(1) ipsecIkeSaTable(1) ipsecIkeSaEntry(1) ipsecIkeSaIndex(1)}
  • {iso(1) org(3) dod(6) internet(1) private(4) enterprise(1) timestep(1022) ipsecMIB(10) ipsecMIBObjects(1) ipsec(1) ipsecIkeSaTable(1) ipsecIkeSaEntry(1) ipsecIkeSaIndex(1)}
  • {iso(1) org(3) dod(6) internet(1) private(4) enterprises(1) timestep(1022) ipsecMIB(10) ipsecMIBObjects(1) ipsec(1) ipsecIkeSaTable(1) ipsecIkeSaEntry(1) ipsecIkeSaIndex(1)}
  • {iso(1) iso-identified-organization(3) dod(6) internet(1) private(4) enterprise(1) timestep(1022) ipsecMIB(10) ipsecMIBObjects(1) ipsec(1) ipsecIkeSaTable(1) ipsecIkeSaEntry(1) ipsecIkeSaIndex(1)}
  • {iso(1) iso-identified-organization(3) dod(6) internet(1) private(4) enterprises(1) timestep(1022) ipsecMIB(10) ipsecMIBObjects(1) ipsec(1) ipsecIkeSaTable(1) ipsecIkeSaEntry(1) ipsecIkeSaIndex(1)}
  • iri oid
  • /iso/identified-organization/dod/internet/private/enterprise/timestep/ipsecMIB/ipsecMIBObjects/ipsec/ipsecIkeSaTable/ipsecIkeSaEntry/ipsecIkeSaIndex
  • /iso/identified-organization/dod/internet/private/enterprises/timestep/ipsecMIB/ipsecMIBObjects/ipsec/ipsecIkeSaTable/ipsecIkeSaEntry/ipsecIkeSaIndex
  • /iso/org/dod/internet/private/enterprise/timestep/ipsecMIB/ipsecMIBObjects/ipsec/ipsecIkeSaTable/ipsecIkeSaEntry/ipsecIkeSaIndex
  • /iso/org/dod/internet/private/enterprises/timestep/ipsecMIB/ipsecMIBObjects/ipsec/ipsecIkeSaTable/ipsecIkeSaEntry/ipsecIkeSaIndex
  • /iso/iso-identified-organization/dod/internet/private/enterprise/timestep/ipsecMIB/ipsecMIBObjects/ipsec/ipsecIkeSaTable/ipsecIkeSaEntry/ipsecIkeSaIndex
  • /iso/iso-identified-organization/dod/internet/private/enterprises/timestep/ipsecMIB/ipsecMIBObjects/ipsec/ipsecIkeSaTable/ipsecIkeSaEntry/ipsecIkeSaIndex
  • iri by oid_info
    /ISO/Identified-Organization/6/1/4/1/1022/10/1/1/1/1/1

    Description by circitor

    A unique value, greater than zero, for each tunnel
    interface. It is recommended that values are assigned
    contiguously starting from 1.

    The value for each tunnel interface must remain constant
    at least from one re-initialization of entity's network
    management system to the next re-initialization.

    Further, the value for tunnel interfaces that are marked
    as permanent must remain constant across all re-
    initializations of the network management system.

    Parsed from file TIMESTEP-IPSEC-MIB.mib
    Module: TIMESTEP-IPSEC-MIB

    Information by oid_info

    Vendor: TimeStep Corp.
    Module: TIMESTEP-IPSEC-MIB

    [Automatically extracted from oidview.com]

    Information by circitor

    ipsecIkeSaIndex OBJECT-TYPE SYNTAX Integer32 (1..16777215) MAX-ACCESS read-only STATUS current DESCRIPTION "A unique value, greater than zero, for each tunnel interface. It is recommended that values are assigned contiguously starting from 1. The value for each tunnel interface must remain constant at least from one re-initialization of entity's network management system to the next re-initialization. Further, the value for tunnel interfaces that are marked as permanent must remain constant across all re- initializations of the network management system." ::= { ipsecIkeSaEntry 1 }

    First Registration Authority (recovered by parent 1.3.6.1.4.1.1022)

    Stephane Lacelle

    Brothers (45)

    OIDNameSub childrenSub Nodes TotalDescription
    1.3.6.1.4.1.1022.10.1.1.1.1.2 ipsecIkeSaPeerIpAddress 0 0 The IP address of the peer that this SA was negotiated
    with, or 0 if unknown.
    1.3.6.1.4.1.1022.10.1.1.1.1.3 ipsecIkeSaPeerPortNumber 0 0 The port number of the peer that this SA was negotiated
    with, or 0 if the default ISAKMP port number (500).
    1.3.6.1.4.1.1022.10.1.1.1.1.4 ipsecIkeSaAuthMethod 0 0 The authentication method used to authenticate the
    peers.

    Note that this does not include the specific method of
    authentication if…
    1.3.6.1.4.1.1022.10.1.1.1.1.5 ipsecIkeSaPeerIdType 0 0 The type of ID used by the peer.

    Specific values are used as described in Section 4.6.2.1
    of [IPDOI].
    1.3.6.1.4.1.1022.10.1.1.1.1.6 ipsecIkeSaPeerId 0 0 The ID of the peer this SA was negotiated with.

    The length may require truncation under some conditions.
    1.3.6.1.4.1.1022.10.1.1.1.1.7 ipsecIkeSaPeerCertSerialNum 0 0 The serial number of the certificate of the peer this SA
    was negotiated with.

    This object has no meaning if a certificate was not…
    1.3.6.1.4.1.1022.10.1.1.1.1.8 ipsecIkeSaPeerCertIssuer 0 0 The serial number of the certificate of the peer this SA
    was negotiated with.

    This object has no meaning if a certificate was not…
    1.3.6.1.4.1.1022.10.1.1.1.1.9 ipsecIkeSaType 0 0 The type of virtual tunnel represented by this row.

    A transient link will disappear from the table when
    the SAs needed for it can…
    1.3.6.1.4.1.1022.10.1.1.1.1.10 ipsecIkeSaStatus 0 0 The status of the virtual tunnel represented by this
    row, if the tunnel is configured as permanent.

    'neverTried' means that no at…
    1.3.6.1.4.1.1022.10.1.1.1.1.11 ipsecIkeSaEncAlg 0 0 A unique value representing the encryption algorithm
    applied to traffic carried by this SA or 0 if there
    is no encryption applied…
    1.3.6.1.4.1.1022.10.1.1.1.1.12 ipsecIkeSaEncKeyLength 0 0 The length of the encryption key in bits used for
    algorithm specified in the ipsecIkeSaEncAlg object or 0
    if the key length is im…
    1.3.6.1.4.1.1022.10.1.1.1.1.13 ipsecIkeSaHashAlg 0 0 A unique value representing the hash algorithm applied
    to traffic carried by this SA or 0 if there is no
    encryption applied.

    Speci…
    1.3.6.1.4.1.1022.10.1.1.1.1.14 ipsecIkeSaDifHelGroupDesc 0 0 A unique value representing the Diffie-Hellman group
    description used or 0 if the group is unknown.

    Specific values are used as d…
    1.3.6.1.4.1.1022.10.1.1.1.1.15 ipsecIkeSaDifHelGroupType 0 0 A unique value representing the Diffie-Hellman group
    type used or 0 if the group is unknown.

    Specific values are used as describe…
    1.3.6.1.4.1.1022.10.1.1.1.1.16 ipsecIkeSaDifHelFieldSize 0 0 The field size, in bits, of a Diffie-Hellman group.
    1.3.6.1.4.1.1022.10.1.1.1.1.17 ipsecIkeSaPRF 0 0 The pseudo-random functions used, or 0 if not used or if
    unknown.

    Specific values are used as described in the ISAKMP Class
    Values…
    1.3.6.1.4.1.1022.10.1.1.1.1.18 ipsecIkeSaPFS 0 0 A value that indicates that perfect forward secrecy is
    used for all IPSec SAs created by this IKE SA.
    1.3.6.1.4.1.1022.10.1.1.1.1.19 ipsecIkeSaInitiatorCookie 0 0 The value of the cookie used by the initiator for the
    current phase 1 SA.
    1.3.6.1.4.1.1022.10.1.1.1.1.20 ipsecIkeSaResponderCookie 0 0 The value of the cookie used by the responder for the
    current phase 1 SA.
    1.3.6.1.4.1.1022.10.1.1.1.1.21 ipsecIkeSaTimeStart 0 0 The date and time that the current SA within the link
    was set up.

    It is not the date and time that the virtual tunnel was
    set up.
    1.3.6.1.4.1.1022.10.1.1.1.1.22 ipsecIkeSaTimeLimit 0 0 The maximum lifetime in seconds of the current SA
    supporting the virtual tunnel, or 0 if there is no time
    constraint on its expir…
    1.3.6.1.4.1.1022.10.1.1.1.1.23 ipsecIkeSaTrafficLimit 0 0 The maximum traffic in 1024-byte blocks that the current
    SA supporting the virtual tunnel is allowed to support,
    or 0 if there is…
    1.3.6.1.4.1.1022.10.1.1.1.1.24 ipsecIkeSaInboundTraffic 0 0 The amount traffic measured in bytes handled in the
    current SA in the inbound direction.
    1.3.6.1.4.1.1022.10.1.1.1.1.25 ipsecIkeSaOutboundTraffic 0 0 The amount traffic measured in bytes handled in the
    current SA in the outbound direction.
    1.3.6.1.4.1.1022.10.1.1.1.1.26 ipsecIkeSaInboundPackets 0 0 The number of packets handled in the current SA in the
    inbound direction.
    1.3.6.1.4.1.1022.10.1.1.1.1.27 ipsecIkeSaOutboundPackets 0 0 The number of packets handled in the current SA in the
    outbound direction.
    1.3.6.1.4.1.1022.10.1.1.1.1.28 ipsecIkeSaTotalSaNum 0 0 The total number of SAs, including the current SA, that
    have been set up to support this virtual tunnel.
    1.3.6.1.4.1.1022.10.1.1.1.1.29 ipsecIkeSaFirstTimeStart 0 0 The data and time that this virtual tunnel was
    originally set up.

    It is not the time that the current SA was set up.

    If this is a …
    1.3.6.1.4.1.1022.10.1.1.1.1.30 ipsecIkeSaTotalInboundTraffic 0 0 The total amount of traffic measured in bytes handled in
    the tunnel in the inbound direction. In other words, it
    is the aggregate…
    1.3.6.1.4.1.1022.10.1.1.1.1.31 ipsecIkeSaTotalOutboundTraffic 0 0 The total amount of traffic measured in bytes handled in
    the tunnel in the outbound direction. In other words, it
    is the aggregat…
    1.3.6.1.4.1.1022.10.1.1.1.1.32 ipsecIkeSaTotalInboundPackets 0 0 The total number of packets handled by the virtual
    tunnel since it became active in the inbound direction.
    In other words, it is …
    1.3.6.1.4.1.1022.10.1.1.1.1.33 ipsecIkeSaTotalOutboundPackets 0 0 The total number of packets handled by the virtual
    tunnel since it became active in the outbound direction.
    In other words, it is…
    1.3.6.1.4.1.1022.10.1.1.1.1.34 ipsecIkeSaDecryptErrors 0 0 The total number of inbound packets to this SA discarded
    due to decryption errors.

    Note that this refers to IKE protocol packets,…
    1.3.6.1.4.1.1022.10.1.1.1.1.35 ipsecIkeSaHashErrors 0 0 The total number of inbound packets to this SA discarded
    due to hash errors.

    Note that this refers to IKE protocol packets, and n…
    1.3.6.1.4.1.1022.10.1.1.1.1.36 ipsecIkeSaOtherReceiveErrors 0 0 The total number of inbound packets to this SA discarded
    for reasons other than bad hashes or decryption errors.
    This may include…
    1.3.6.1.4.1.1022.10.1.1.1.1.37 ipsecIkeSaSendErrors 0 0 The total number of outbound packets from this SA
    discarded for any reason. This may include packets
    dropped to a lack of transmi…
    1.3.6.1.4.1.1022.10.1.1.1.1.38 ipsecIkeSaIpsecInboundTraffic 0 0 The total amount of inbound traffic measured in bytes
    handled by all IPSec SAs set up by phase 1 SAs supporting
    this tunnel.

    If th…
    1.3.6.1.4.1.1022.10.1.1.1.1.39 ipsecIkeSaIpsecOutboundTraffic 0 0 The total amount of outbound traffic measured in bytes
    handled by all IPSec SAs set up by phase 1 SAs supporting
    this tunnel.

    If t…
    1.3.6.1.4.1.1022.10.1.1.1.1.40 ipsecIkeSaIpsecInboundPackets 0 0 The total number of inbound packets handled by all IPSec
    SAs set up by phase 1 SAs supporting this tunnel.
    If this is a permanent…
    1.3.6.1.4.1.1022.10.1.1.1.1.41 ipsecIkeSaIpsecOutboundPackets 0 0 The total number of outbound packets handled by all
    IPSec SAs set up by phase 1 SAs supporting this tunnel.

    If this is a permanen…
    1.3.6.1.4.1.1022.10.1.1.1.1.42 ipsecIkeSaIpsecDecryptErrors 0 0 The total number of inbound packets discarded by all
    IPSec SAs due to decryption errors.

    If this is a permanent virtual tunnel, i…
    1.3.6.1.4.1.1022.10.1.1.1.1.43 ipsecIkeSaIpsecAuthErrors 0 0 The total number of inbound packets discarded by all
    IPSec SAs due to authentication errors. This includes
    hash failures in IPSec…
    1.3.6.1.4.1.1022.10.1.1.1.1.44 ipsecIkeSaIpsecReplayErrors 0 0 The total number of inbound packets discarded by all
    IPSec SAs due to replay errors.

    If this is a permanent virtual tunnel, it is…
    1.3.6.1.4.1.1022.10.1.1.1.1.45 ipsecIkeSaIpsecOtherReceiveErrors 0 0 The total number of inbound packets discarded by all
    IPSec SAs due to errors other than authentication,
    decryption or replay erro…
    1.3.6.1.4.1.1022.10.1.1.1.1.46 ipsecIkeSaIpsecSendErrors 0 0 The total number of outbound packets discarded by all
    IPSec SAs due to any error. This may include packets
    dropped due to lack of…