>> MIB - Management Information Base

>> Table: ikeSaTable - (.1.3.6.1.4.1.272.4.26.4.1)

Description: This object contains an IKE security association.

ikeSaTable
OIDNameTypeAccess
.1IndexINTEGERR
.3StateENUMD
.4XchTypeENUMR
.5AuthMethodENUMR
.7RoleENUMR
.8LocalIdDisplayStringR
.9RemoteIdDisplayStringR
.10LocalIpIpAddressR
.11RemoteIpIpAddressR
.12CookieIOCTET STRINGR
.13CookieROCTET STRINGR
.15NumCertsINTEGERR
.16NumNegotiationsINTEGERR
.17BytesINTEGERR
.18MajVersionINTEGERR
.19MinVersionINTEGERR
.20PeerIndexINTEGERR
.22HeartbeatsSentINTEGERR
.23HeartbeatsReceivedINTEGERR
.24CreatedDateR
.25LastUsedDateR
.26EncAlgENUMR
.27HashAlgENUMR
.28PrfAlgENUMR
.29ExpiresDateR

Index
A unique index for this entry.
State
This object specifies the state of the SA.
Possible values:
negotiating(1),        -- the SA is still being negotiated
established(2),        -- the SA negotiation is finished
waiting-for-remove(3), -- the SA is waiting for removal
delete(7)	          -- mark the SA for deletion.
Enumerations:
  • negotiating (1)
  • established (2)
  • waiting-for-remove (3)
  • delete (7)
XchType
The exchange mode used to create the SA.
Possible values:
base(1),	           -- IKE base mode mode
id-protect(2),	   -- IKE identity protection 
-- (oakley main mode)
authentication-only(3), -- Authentication only mode
aggressive(4),	   -- IKE (oakley) aggressive mode
info(5),		   -- IKE informational exchange  mode
quick(32),		   -- IKE quick mode
new-group(33),	   -- IKE new group mode
any(256)		   -- Other mode.
Enumerations:
  • base (1)
  • id-protect (2)
  • aggressive (4)
  • any (256)
AuthMethod
The authenticatin method used when negotiating this SA.
Possible values:
pre-sh-key(1), 	-- Authentication using pre shared keys
dss-sig(2), 	  -- Authentication using DSS signatures
rsa-sig(3), 	  -- Authentication using RSA signatures
rsa-enc(4), 	  -- Authentication using RSA encryption
rsa-enc-rev(5) -- Authentication using revised RSA encryption.
Enumerations:
  • pre-sh-key (1)
  • dss-sig (2)
  • rsa-sig (3)
  • rsa-enc (4)
  • rsa-enc-rev (5)
Role
This object specifies by which side the SA
negotiation was initiated.
Possible values:
initiator(1), -- this end	initiated the SA negotiation 
responder(2)  -- the remote end initiated the SA negotiation.
Enumerations:
  • initiator (1)
  • responder (2)
LocalId
The local ID used for authentication.
RemoteId
The remote ID used for authentication.
LocalIp
The local IP address used in the IKE communication.
RemoteIp
The remote IP address used in the IKE communication.
CookieI
The cookie of the initiator.
CookieR
The cookie of the responder.
NumCerts
The number of certificates received from the remote
side when negotiating this SA.
NumNegotiations
This object specifies the number of currently active 
negotiations for this SA.
Bytes
Number of bytes transmitted using this SA.
MajVersion
The IKE major version number.
MinVersion
The IKE minor version number.
PeerIndex
The index of the peer for which this SA was created.
HeartbeatsSent
Number of Heartbeats sent over this SA.
HeartbeatsReceived
Number of Heartbeats received over this SA.
Created
Time the SA was created.
LastUsed
Time the SA was used last.
EncAlg
The encryption algorithm used.
Enumerations:
  • des (1)
  • idea (2)
  • blowfish (3)
  • rc5 (4)
  • des3 (5)
  • cast128 (6)
  • rijndael (7)
  • twofish (9)
HashAlg
The hash algorithm used.
Enumerations:
  • md5 (1)
  • sha (2)
  • tiger (3)
  • ripemd160 (4)
PrfAlg
The hash algorithm used for the pseudo random function.
Enumerations:
  • md5 (1)
  • sha (2)
  • tiger (3)
  • ripemd160 (4)
Expires
Time the SA will expire.


Copyright ©2003 by BinTec Access Networks GmbH