cisco_ipsec_flow_monitor_mib

package
v0.0.0-...-50def94 Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: Nov 2, 2023 License: Apache-2.0 Imports: 6 Imported by: 0

Documentation

Overview

This is a MIB Module for monitoring the structures in IPSec-based Virtual Private Networks. The MIB has been designed to be adopted as an IETF standard. Hence Cisco-specific features of IPSec protocol are excluded from this MIB.

Acronyms The following acronyms are used in this document:

IPSec:      Secure IP Protocol

VPN:        Virtual Private Network

ISAKMP:     Internet Security Association and Key Exchange
            Protocol

IKE:        Internet Key Exchange Protocol

SA:         Security Association

MM:         Main Mode - the process of setting up
            a Phase 1 SA to secure the exchanges
            required to setup Phase 2 SAs

QM:         Quick Mode - the process of setting up
            Phase 2 Security Associations using
            a Phase 1 SA.

Overview of IPsec MIB

The MIB contains six major groups of objects which are used to manage the IPSec Protocol. These groups include a Levels Group, a Phase-1 Group, a Phase-2 Group, a History Group, a Failure Group and a TRAP Control Group. The following table illustrates the structure of the IPSec MIB.

The Phase 1 group models objects pertaining to IKE negotiations and tunnels.

The Phase 2 group models objects pertaining to IPSec data tunnels.

The History group is to aid applications that do trending analysis.

The Failure group is to enable an operator to do troubleshooting and debugging of the VPN Router. Further, counters are supported to aid Intrusion Detection.

In addition to the five major MIB Groups, there are a number of Notifications. The following table illustrates the name and description of the IPSec TRAPs.

For a detailed discussion, please refer to the IETF draft draft-ietf-ipsec-flow-monitoring-mib-00.txt.

Index

Constants

This section is empty.

Variables

This section is empty.

Functions

This section is empty.

Types

type AuthAlgo

type AuthAlgo string

AuthAlgo represents security association of an IPsec Phase-2 Tunnel.

const (
	AuthAlgo_none AuthAlgo = "none"

	AuthAlgo_hmacMd5 AuthAlgo = "hmacMd5"

	AuthAlgo_hmacSha AuthAlgo = "hmacSha"
)

type CISCOIPSECFLOWMONITORMIB

type CISCOIPSECFLOWMONITORMIB struct {
	EntityData types.CommonEntityData
	YFilter    yfilter.YFilter

	CipSecLevels CISCOIPSECFLOWMONITORMIB_CipSecLevels

	CikeGlobalStats CISCOIPSECFLOWMONITORMIB_CikeGlobalStats

	CipSecGlobalStats CISCOIPSECFLOWMONITORMIB_CipSecGlobalStats

	CipSecHistGlobalCntl CISCOIPSECFLOWMONITORMIB_CipSecHistGlobalCntl

	CipSecFailGlobalCntl CISCOIPSECFLOWMONITORMIB_CipSecFailGlobalCntl

	CipSecTrapCntl CISCOIPSECFLOWMONITORMIB_CipSecTrapCntl

	// The IPsec Phase-1 Internet Key Exchange Peer Table. There is one entry in
	// this table for each IPsec Phase-1 IKE peer association which is currently
	// associated with an active IPsec Phase-1 Tunnel. The IPsec Phase-1 IKE
	// Tunnel associated with this IPsec Phase-1 IKE peer association may or may
	// not be currently active.
	CikePeerTable CISCOIPSECFLOWMONITORMIB_CikePeerTable

	// The IPsec Phase-1 Internet Key Exchange Tunnel Table. There is one entry in
	// this table for each active IPsec Phase-1 IKE Tunnel.
	CikeTunnelTable CISCOIPSECFLOWMONITORMIB_CikeTunnelTable

	// The IPsec Phase-1 Internet Key Exchange Peer Association to IPsec Phase-2
	// Tunnel Correlation Table. There is one entry in this table for each active
	// IPsec Phase-2 Tunnel.
	CikePeerCorrTable CISCOIPSECFLOWMONITORMIB_CikePeerCorrTable

	// Phase-1 IKE stats information is included in this table. Each entry is
	// related to a specific gateway which is  identified by 'cmgwIndex'.
	CikePhase1GWStatsTable CISCOIPSECFLOWMONITORMIB_CikePhase1GWStatsTable

	// The IPsec Phase-2 Tunnel Table. There is one entry in this table for  each
	// active IPsec Phase-2 Tunnel.
	CipSecTunnelTable CISCOIPSECFLOWMONITORMIB_CipSecTunnelTable

	// The IPsec Phase-2 Tunnel Endpoint Table. This table contains an entry for
	// each  active endpoint associated with an IPsec  Phase-2 Tunnel.
	CipSecEndPtTable CISCOIPSECFLOWMONITORMIB_CipSecEndPtTable

	// The IPsec Phase-2 Security Protection Index Table. This table contains an
	// entry for each active  and expiring security  association.
	CipSecSpiTable CISCOIPSECFLOWMONITORMIB_CipSecSpiTable

	// Phase-2 IPsec stats information is included in this table. Each entry is
	// related to a specific gateway which is  identified by 'cmgwIndex'.
	CipSecPhase2GWStatsTable CISCOIPSECFLOWMONITORMIB_CipSecPhase2GWStatsTable

	// The IPsec Phase-1 Internet Key Exchange Tunnel History Table.  This table
	// is implemented as a  sliding window in which only the last n entries  are
	// maintained.  The maximum number of entries  is specified by the
	// cipSecHistTableSize object.
	CikeTunnelHistTable CISCOIPSECFLOWMONITORMIB_CikeTunnelHistTable

	// The IPsec Phase-2 Tunnel History Table. This table is implemented as a
	// sliding  window in which only the last n entries are maintained.  The
	// maximum number  of entries is specified by the cipSecHistTableSize object.
	CipSecTunnelHistTable CISCOIPSECFLOWMONITORMIB_CipSecTunnelHistTable

	// The IPsec Phase-2 Tunnel Endpoint History Table. This table is implemented
	// as a  sliding window in which only the last n entries are maintained.   The
	// maximum number of entries is specified by the cipSecHistTableSize object.
	CipSecEndPtHistTable CISCOIPSECFLOWMONITORMIB_CipSecEndPtHistTable

	// The IPsec Phase-1 Failure Table. This table is implemented as a sliding
	// window in which only the last n entries are  maintained.  The maximum
	// number of entries is specified by the cipSecFailTableSize object.
	CikeFailTable CISCOIPSECFLOWMONITORMIB_CikeFailTable

	// The IPsec Phase-2 Failure Table. This table is implemented as a sliding
	// window  in which only the last n entries are maintained.   The maximum
	// number of entries is specified by the cipSecFailTableSize object.
	CipSecFailTable CISCOIPSECFLOWMONITORMIB_CipSecFailTable
}

CISCOIPSECFLOWMONITORMIB

func (*CISCOIPSECFLOWMONITORMIB) GetEntityData

func (cISCOIPSECFLOWMONITORMIB *CISCOIPSECFLOWMONITORMIB) GetEntityData() *types.CommonEntityData

type CISCOIPSECFLOWMONITORMIB_CikeFailTable

type CISCOIPSECFLOWMONITORMIB_CikeFailTable struct {
	EntityData types.CommonEntityData
	YFilter    yfilter.YFilter

	// Each entry contains the attributes associated with  an IPsec Phase-1
	// failure. The type is slice of
	// CISCOIPSECFLOWMONITORMIB_CikeFailTable_CikeFailEntry.
	CikeFailEntry []*CISCOIPSECFLOWMONITORMIB_CikeFailTable_CikeFailEntry
}

CISCOIPSECFLOWMONITORMIB_CikeFailTable The IPsec Phase-1 Failure Table. This table is implemented as a sliding window in which only the last n entries are maintained. The maximum number of entries is specified by the cipSecFailTableSize object.

func (*CISCOIPSECFLOWMONITORMIB_CikeFailTable) GetEntityData

func (cikeFailTable *CISCOIPSECFLOWMONITORMIB_CikeFailTable) GetEntityData() *types.CommonEntityData

type CISCOIPSECFLOWMONITORMIB_CikeFailTable_CikeFailEntry

type CISCOIPSECFLOWMONITORMIB_CikeFailTable_CikeFailEntry struct {
	EntityData types.CommonEntityData
	YFilter    yfilter.YFilter
	YListKey   string

	// This attribute is a key. The IPsec Phase-1 Failure Table index. The value
	// of the index is a number which  begins at one and is incremented with each
	// IPsec Phase-1 failure. The value of this object will wrap at 2,147,483,647.
	// The type is interface{} with range: 1..2147483647.
	CikeFailIndex interface{}

	// The reason for the failure.  Possible reasons include: 1 = other 2 = peer
	// delete request was received 3 = contact with peer was lost 4 = local
	// failure occurred 5 = authentication failure 6 = hash validation failure 7 =
	// encryption failure 8 = internal error occurred 9 = system capacity failure
	// 10 = proposal failure 11 = peer's certificate is unavailable 12 = peer's
	// certificate was found invalid 13 = local certificate expired 14 =
	// certificate revoke list (crl) failure 15 = peer encoding error 16 =
	// non-existent security association 17 = operator requested termination. The
	// type is CikeFailReason.
	CikeFailReason interface{}

	// The value of sysUpTime in hundredths of seconds at the time of the failure.
	// The type is interface{} with range: 0..4294967295.
	CikeFailTime interface{}

	// The type of local peer identity.  The local peer may be identified by:  1.
	// an IP address, or  2. a host name. The type is IkePeerType.
	CikeFailLocalType interface{}

	// The value of the local peer identity.  If the local peer type is an IP
	// Address, then this is the IP Address used to identify the local peer.  If
	// the local peer type is a host name, then this is the host name used to
	// identify the local peer. The type is string.
	CikeFailLocalValue interface{}

	// The type of remote peer identity.  The remote peer may be identified by:
	// 1. an IP address, or  2. a host name. The type is IkePeerType.
	CikeFailRemoteType interface{}

	// The value of the remote peer identity.  If the remote peer type is an IP
	// Address, then this is the IP Address used to identify the remote peer.  If
	// the remote peer type is a host name, then this is the host name used to
	// identify the remote peer. The type is string.
	CikeFailRemoteValue interface{}

	// The IP address of the local peer. The type is string with length: 4..4 |
	// 16..16.
	CikeFailLocalAddr interface{}

	// The IP address of the remote peer. The type is string with length: 4..4 |
	// 16..16.
	CikeFailRemoteAddr interface{}
}

CISCOIPSECFLOWMONITORMIB_CikeFailTable_CikeFailEntry Each entry contains the attributes associated with

an IPsec Phase-1 failure.

func (*CISCOIPSECFLOWMONITORMIB_CikeFailTable_CikeFailEntry) GetEntityData

type CISCOIPSECFLOWMONITORMIB_CikeFailTable_CikeFailEntry_CikeFailReason

type CISCOIPSECFLOWMONITORMIB_CikeFailTable_CikeFailEntry_CikeFailReason string

CISCOIPSECFLOWMONITORMIB_CikeFailTable_CikeFailEntry_CikeFailReason represents 17 = operator requested termination.

const (
	CISCOIPSECFLOWMONITORMIB_CikeFailTable_CikeFailEntry_CikeFailReason_other CISCOIPSECFLOWMONITORMIB_CikeFailTable_CikeFailEntry_CikeFailReason = "other"

	CISCOIPSECFLOWMONITORMIB_CikeFailTable_CikeFailEntry_CikeFailReason_peerDelRequest CISCOIPSECFLOWMONITORMIB_CikeFailTable_CikeFailEntry_CikeFailReason = "peerDelRequest"

	CISCOIPSECFLOWMONITORMIB_CikeFailTable_CikeFailEntry_CikeFailReason_peerLost CISCOIPSECFLOWMONITORMIB_CikeFailTable_CikeFailEntry_CikeFailReason = "peerLost"

	CISCOIPSECFLOWMONITORMIB_CikeFailTable_CikeFailEntry_CikeFailReason_localFailure CISCOIPSECFLOWMONITORMIB_CikeFailTable_CikeFailEntry_CikeFailReason = "localFailure"

	CISCOIPSECFLOWMONITORMIB_CikeFailTable_CikeFailEntry_CikeFailReason_authFailure CISCOIPSECFLOWMONITORMIB_CikeFailTable_CikeFailEntry_CikeFailReason = "authFailure"

	CISCOIPSECFLOWMONITORMIB_CikeFailTable_CikeFailEntry_CikeFailReason_hashValidation CISCOIPSECFLOWMONITORMIB_CikeFailTable_CikeFailEntry_CikeFailReason = "hashValidation"

	CISCOIPSECFLOWMONITORMIB_CikeFailTable_CikeFailEntry_CikeFailReason_encryptFailure CISCOIPSECFLOWMONITORMIB_CikeFailTable_CikeFailEntry_CikeFailReason = "encryptFailure"

	CISCOIPSECFLOWMONITORMIB_CikeFailTable_CikeFailEntry_CikeFailReason_internalError CISCOIPSECFLOWMONITORMIB_CikeFailTable_CikeFailEntry_CikeFailReason = "internalError"

	CISCOIPSECFLOWMONITORMIB_CikeFailTable_CikeFailEntry_CikeFailReason_sysCapExceeded CISCOIPSECFLOWMONITORMIB_CikeFailTable_CikeFailEntry_CikeFailReason = "sysCapExceeded"

	CISCOIPSECFLOWMONITORMIB_CikeFailTable_CikeFailEntry_CikeFailReason_proposalFailure CISCOIPSECFLOWMONITORMIB_CikeFailTable_CikeFailEntry_CikeFailReason = "proposalFailure"

	CISCOIPSECFLOWMONITORMIB_CikeFailTable_CikeFailEntry_CikeFailReason_peerCertUnavailable CISCOIPSECFLOWMONITORMIB_CikeFailTable_CikeFailEntry_CikeFailReason = "peerCertUnavailable"

	CISCOIPSECFLOWMONITORMIB_CikeFailTable_CikeFailEntry_CikeFailReason_peerCertNotValid CISCOIPSECFLOWMONITORMIB_CikeFailTable_CikeFailEntry_CikeFailReason = "peerCertNotValid"

	CISCOIPSECFLOWMONITORMIB_CikeFailTable_CikeFailEntry_CikeFailReason_localCertExpired CISCOIPSECFLOWMONITORMIB_CikeFailTable_CikeFailEntry_CikeFailReason = "localCertExpired"

	CISCOIPSECFLOWMONITORMIB_CikeFailTable_CikeFailEntry_CikeFailReason_crlFailure CISCOIPSECFLOWMONITORMIB_CikeFailTable_CikeFailEntry_CikeFailReason = "crlFailure"

	CISCOIPSECFLOWMONITORMIB_CikeFailTable_CikeFailEntry_CikeFailReason_peerEncodingError CISCOIPSECFLOWMONITORMIB_CikeFailTable_CikeFailEntry_CikeFailReason = "peerEncodingError"

	CISCOIPSECFLOWMONITORMIB_CikeFailTable_CikeFailEntry_CikeFailReason_nonExistentSa CISCOIPSECFLOWMONITORMIB_CikeFailTable_CikeFailEntry_CikeFailReason = "nonExistentSa"

	CISCOIPSECFLOWMONITORMIB_CikeFailTable_CikeFailEntry_CikeFailReason_operRequest CISCOIPSECFLOWMONITORMIB_CikeFailTable_CikeFailEntry_CikeFailReason = "operRequest"
)

type CISCOIPSECFLOWMONITORMIB_CikeGlobalStats

type CISCOIPSECFLOWMONITORMIB_CikeGlobalStats struct {
	EntityData types.CommonEntityData
	YFilter    yfilter.YFilter

	// The number of currently active IPsec Phase-1 IKE Tunnels. The type is
	// interface{} with range: 0..4294967295.
	CikeGlobalActiveTunnels interface{}

	// The total number of previously active IPsec Phase-1 IKE Tunnels. The type
	// is interface{} with range: 0..4294967295. Units are SAs.
	CikeGlobalPreviousTunnels interface{}

	// The total number of octets received by all currently and previously active
	// IPsec Phase-1 IKE Tunnels. The type is interface{} with range:
	// 0..4294967295. Units are Octets.
	CikeGlobalInOctets interface{}

	// The total number of packets received by all currently and previously active
	// IPsec  Phase-1 IKE Tunnels. The type is interface{} with range:
	// 0..4294967295. Units are Packets.
	CikeGlobalInPkts interface{}

	// The total number of packets which were dropped during receive processing by
	// all  currently and previously  active IPsec Phase-1 IKE Tunnels. The type
	// is interface{} with range: 0..4294967295. Units are Packets.
	CikeGlobalInDropPkts interface{}

	// The total number of notifys received by all currently and previously active
	// IPsec  Phase-1 IKE Tunnels. The type is interface{} with range:
	// 0..4294967295. Units are Notification Payloads.
	CikeGlobalInNotifys interface{}

	// The total number of IPsec Phase-2 exchanges received by all currently and
	// previously  active IPsec Phase-1 IKE Tunnels. The type is interface{} with
	// range: 0..4294967295. Units are SA Payloads.
	CikeGlobalInP2Exchgs interface{}

	// The total number of IPsec Phase-2 exchanges which were received and found
	// to be invalid  by all currently and previously active IPsec  Phase-1 IKE
	// Tunnels. The type is interface{} with range: 0..4294967295. Units are SA
	// Payloads.
	CikeGlobalInP2ExchgInvalids interface{}

	// The total number of IPsec Phase-2 exchanges which were received and
	// rejected by all  currently and previously active IPsec Phase-1  IKE
	// Tunnels. The type is interface{} with range: 0..4294967295. Units are SA
	// Payloads.
	CikeGlobalInP2ExchgRejects interface{}

	// The total number of IPsec Phase-2 security association delete requests
	// received by all  currently and previously  active and IPsec Phase-1 IKE
	// Tunnels. The type is interface{} with range: 0..4294967295. Units are
	// Notification Payloads.
	CikeGlobalInP2SaDelRequests interface{}

	// The total number of octets sent by all currently and previously active and
	// IPsec Phase-1  IKE Tunnels. The type is interface{} with range:
	// 0..4294967295. Units are Octets.
	CikeGlobalOutOctets interface{}

	// The total number of packets sent by all currently and previously active and
	// IPsec Phase-1  Tunnels. The type is interface{} with range: 0..4294967295.
	// Units are Packets.
	CikeGlobalOutPkts interface{}

	// The total number of packets which were dropped during send processing by
	// all currently  and previously  active IPsec Phase-1 IKE Tunnels. The type
	// is interface{} with range: 0..4294967295. Units are Packets.
	CikeGlobalOutDropPkts interface{}

	// The total number of notifys sent by all currently and previously active
	// IPsec Phase-1 IKE Tunnels. The type is interface{} with range:
	// 0..4294967295. Units are Notification Payloads.
	CikeGlobalOutNotifys interface{}

	// The total number of IPsec Phase-2 exchanges which were sent by all
	// currently and previously  active IPsec Phase-1 IKE Tunnels. The type is
	// interface{} with range: 0..4294967295. Units are SA Payloads.
	CikeGlobalOutP2Exchgs interface{}

	// The total number of IPsec Phase-2 exchanges which were sent and found to be
	// invalid by  all currently and previously active IPsec Phase-1  Tunnels. The
	// type is interface{} with range: 0..4294967295. Units are SA Payloads.
	CikeGlobalOutP2ExchgInvalids interface{}

	// The total number of IPsec Phase-2 exchanges which were sent and rejected by
	// all currently and  previously active IPsec Phase-1 IKE Tunnels. The type is
	// interface{} with range: 0..4294967295. Units are SA Payloads.
	CikeGlobalOutP2ExchgRejects interface{}

	// The total number of IPsec Phase-2 SA delete requests sent by all currently
	// and  previously active IPsec Phase-1 IKE Tunnels. The type is interface{}
	// with range: 0..4294967295. Units are Notification Payloads.
	CikeGlobalOutP2SaDelRequests interface{}

	// The total number of IPsec Phase-1 IKE Tunnels which were locally initiated.
	// The type is interface{} with range: 0..4294967295. Units are SAs.
	CikeGlobalInitTunnels interface{}

	// The total number of IPsec Phase-1 IKE Tunnels which were locally initiated
	// and failed to activate. The type is interface{} with range: 0..4294967295.
	// Units are SAs.
	CikeGlobalInitTunnelFails interface{}

	// The total number of IPsec Phase-1 IKE Tunnels which were remotely initiated
	// and failed to activate. The type is interface{} with range: 0..4294967295.
	// Units are SAs.
	CikeGlobalRespTunnelFails interface{}

	// The total number of system capacity failures which occurred during
	// processing of all current  and previously active IPsec Phase-1 IKE Tunnels.
	// The type is interface{} with range: 0..4294967295. Units are Failures.
	CikeGlobalSysCapFails interface{}

	// The total number of authentications which ended in failure by all current
	// and previous IPsec Phase-1 IKE Tunnels. The type is interface{} with range:
	// 0..4294967295. Units are Failures.
	CikeGlobalAuthFails interface{}

	// The total number of decryptions which ended in failure by all current and
	// previous IPsec Phase-1 IKE Tunnels. The type is interface{} with range:
	// 0..4294967295. Units are Failures.
	CikeGlobalDecryptFails interface{}

	// The total number of hash validations which ended in failure by all current
	// and previous IPsec Phase-1 IKE Tunnels. The type is interface{} with range:
	// 0..4294967295. Units are Failures.
	CikeGlobalHashValidFails interface{}

	// The total number of non-existent Security Association in failures which
	// occurred during processing of  all current and previous IPsec Phase-1 IKE
	// Tunnels. The type is interface{} with range: 0..4294967295. Units are
	// Failures.
	CikeGlobalNoSaFails interface{}
}

CISCOIPSECFLOWMONITORMIB_CikeGlobalStats

func (*CISCOIPSECFLOWMONITORMIB_CikeGlobalStats) GetEntityData

func (cikeGlobalStats *CISCOIPSECFLOWMONITORMIB_CikeGlobalStats) GetEntityData() *types.CommonEntityData

type CISCOIPSECFLOWMONITORMIB_CikePeerCorrTable

type CISCOIPSECFLOWMONITORMIB_CikePeerCorrTable struct {
	EntityData types.CommonEntityData
	YFilter    yfilter.YFilter

	// Each entry contains the attributes of an IPsec Phase-1 IKE Peer Association
	// to IPsec Phase-2 Tunnel Correlation. The type is slice of
	// CISCOIPSECFLOWMONITORMIB_CikePeerCorrTable_CikePeerCorrEntry.
	CikePeerCorrEntry []*CISCOIPSECFLOWMONITORMIB_CikePeerCorrTable_CikePeerCorrEntry
}

CISCOIPSECFLOWMONITORMIB_CikePeerCorrTable The IPsec Phase-1 Internet Key Exchange Peer Association to IPsec Phase-2 Tunnel Correlation Table. There is one entry in this table for each active IPsec Phase-2 Tunnel.

func (*CISCOIPSECFLOWMONITORMIB_CikePeerCorrTable) GetEntityData

func (cikePeerCorrTable *CISCOIPSECFLOWMONITORMIB_CikePeerCorrTable) GetEntityData() *types.CommonEntityData

type CISCOIPSECFLOWMONITORMIB_CikePeerCorrTable_CikePeerCorrEntry

type CISCOIPSECFLOWMONITORMIB_CikePeerCorrTable_CikePeerCorrEntry struct {
	EntityData types.CommonEntityData
	YFilter    yfilter.YFilter
	YListKey   string

	// This attribute is a key. The type of local peer identity. The local peer
	// may be identified by: 1. an IP address, or 2. a host name. The type is
	// IkePeerType.
	CikePeerCorrLocalType interface{}

	// This attribute is a key. The value of the local peer identity.  If the
	// local peer type is an IP Address, then this is the IP Address used to
	// identify the local peer.  If the local peer type is a host name, then this
	// is the host name used to identify the local peer. The type is string.
	CikePeerCorrLocalValue interface{}

	// This attribute is a key. The type of remote peer identity. The remote peer
	// may be identified by: 1. an IP address, or 2. a host name. The type is
	// IkePeerType.
	CikePeerCorrRemoteType interface{}

	// This attribute is a key. The value of the remote peer identity.  If the
	// remote peer type is an IP Address, then this is the IP Address used to
	// identify the remote peer.  If the remote peer type is a host name, then
	// this is the host name used to identify the remote peer. The type is string.
	CikePeerCorrRemoteValue interface{}

	// This attribute is a key. The internal index of the local-remote peer
	// association.  This internal index is  used to uniquely identify multiple
	// associations  between the local and remote peer. The type is interface{}
	// with range: 1..2147483647.
	CikePeerCorrIntIndex interface{}

	// This attribute is a key. The sequence number of the local-remote peer
	// association.  This sequence number is  used to uniquely identify multiple
	// instances  of an unique association between  the local and remote peer. The
	// type is interface{} with range: 1..2147483647.
	CikePeerCorrSeqNum interface{}

	// The index of the active IPsec Phase-2 Tunnel (cipSecTunIndex in the
	// cipSecTunnelTable) for this IPsec Phase-1 IKE Peer Association. The type is
	// interface{} with range: 1..2147483647.
	CikePeerCorrIpSecTunIndex interface{}
}

CISCOIPSECFLOWMONITORMIB_CikePeerCorrTable_CikePeerCorrEntry Each entry contains the attributes of an IPsec Phase-1 IKE Peer Association to IPsec Phase-2 Tunnel Correlation.

func (*CISCOIPSECFLOWMONITORMIB_CikePeerCorrTable_CikePeerCorrEntry) GetEntityData

type CISCOIPSECFLOWMONITORMIB_CikePeerTable

type CISCOIPSECFLOWMONITORMIB_CikePeerTable struct {
	EntityData types.CommonEntityData
	YFilter    yfilter.YFilter

	// Each entry contains the attributes associated with an IPsec Phase-1 IKE
	// peer association. The type is slice of
	// CISCOIPSECFLOWMONITORMIB_CikePeerTable_CikePeerEntry.
	CikePeerEntry []*CISCOIPSECFLOWMONITORMIB_CikePeerTable_CikePeerEntry
}

CISCOIPSECFLOWMONITORMIB_CikePeerTable The IPsec Phase-1 Internet Key Exchange Peer Table. There is one entry in this table for each IPsec Phase-1 IKE peer association which is currently associated with an active IPsec Phase-1 Tunnel. The IPsec Phase-1 IKE Tunnel associated with this IPsec Phase-1 IKE peer association may or may not be currently active.

func (*CISCOIPSECFLOWMONITORMIB_CikePeerTable) GetEntityData

func (cikePeerTable *CISCOIPSECFLOWMONITORMIB_CikePeerTable) GetEntityData() *types.CommonEntityData

type CISCOIPSECFLOWMONITORMIB_CikePeerTable_CikePeerEntry

type CISCOIPSECFLOWMONITORMIB_CikePeerTable_CikePeerEntry struct {
	EntityData types.CommonEntityData
	YFilter    yfilter.YFilter
	YListKey   string

	// This attribute is a key. The type of local peer identity.  The local peer
	// may be identified by: 1. an IP address, or 2. a host name. The type is
	// IkePeerType.
	CikePeerLocalType interface{}

	// This attribute is a key. The value of the local peer identity.  If the
	// local peer type is an IP Address, then this is the IP Address used to
	// identify the local peer.  If the local peer type is a host name, then this
	// is the host name used to identify the local peer. The type is string.
	CikePeerLocalValue interface{}

	// This attribute is a key. The type of remote peer identity.  The remote peer
	// may be identified by: 1. an IP address, or 2. a host name. The type is
	// IkePeerType.
	CikePeerRemoteType interface{}

	// This attribute is a key. The value of the remote peer identity.  If the
	// remote peer type is an IP Address, then this is the IP Address used to
	// identify the remote peer.  If the remote peer type is a host name, then
	// this is the host name used to identify the remote peer. The type is string.
	CikePeerRemoteValue interface{}

	// This attribute is a key. The internal index of the local-remote peer
	// association.  This internal index is used  to uniquely identify multiple
	// associations between  the local and remote peer. The type is interface{}
	// with range: 1..2147483647.
	CikePeerIntIndex interface{}

	// The IP address of the local peer. The type is string with length: 4..4 |
	// 16..16.
	CikePeerLocalAddr interface{}

	// The IP address of the remote peer. The type is string with length: 4..4 |
	// 16..16.
	CikePeerRemoteAddr interface{}

	// The length of time that the peer association has existed in hundredths of a
	// second. The type is interface{} with range: 0..2147483647.
	CikePeerActiveTime interface{}

	// The index of the active IPsec Phase-1 IKE Tunnel (cikeTunIndex in the
	// cikeTunnelTable) for this peer association.  If an IPsec Phase-1 IKE Tunnel
	// is not currently active, then the value of this object will be zero. The
	// type is interface{} with range: 1..2147483647.
	CikePeerActiveTunnelIndex interface{}
}

CISCOIPSECFLOWMONITORMIB_CikePeerTable_CikePeerEntry Each entry contains the attributes associated with an IPsec Phase-1 IKE peer association.

func (*CISCOIPSECFLOWMONITORMIB_CikePeerTable_CikePeerEntry) GetEntityData

type CISCOIPSECFLOWMONITORMIB_CikePhase1GWStatsTable

type CISCOIPSECFLOWMONITORMIB_CikePhase1GWStatsTable struct {
	EntityData types.CommonEntityData
	YFilter    yfilter.YFilter

	// Each entry contains the attributes of an Phase-1 IKE stats information for
	// the related gateway.  There is only one entry for each gateway. The entry
	// is created when a gateway up and cannot be deleted. The type is slice of
	// CISCOIPSECFLOWMONITORMIB_CikePhase1GWStatsTable_CikePhase1GWStatsEntry.
	CikePhase1GWStatsEntry []*CISCOIPSECFLOWMONITORMIB_CikePhase1GWStatsTable_CikePhase1GWStatsEntry
}

CISCOIPSECFLOWMONITORMIB_CikePhase1GWStatsTable Phase-1 IKE stats information is included in this table. Each entry is related to a specific gateway which is identified by 'cmgwIndex'.

func (*CISCOIPSECFLOWMONITORMIB_CikePhase1GWStatsTable) GetEntityData

func (cikePhase1GWStatsTable *CISCOIPSECFLOWMONITORMIB_CikePhase1GWStatsTable) GetEntityData() *types.CommonEntityData

type CISCOIPSECFLOWMONITORMIB_CikePhase1GWStatsTable_CikePhase1GWStatsEntry

type CISCOIPSECFLOWMONITORMIB_CikePhase1GWStatsTable_CikePhase1GWStatsEntry struct {
	EntityData types.CommonEntityData
	YFilter    yfilter.YFilter
	YListKey   string

	// This attribute is a key. The type is string with range: 1..2147483647.
	// Refers to
	// cisco_media_gateway_mib.CISCOMEDIAGATEWAYMIB_CMediaGwTable_CMediaGwEntry_CmgwIndex
	CmgwIndex interface{}

	// The number of currently active IPsec Phase-1 IKE Tunnels. The type is
	// interface{} with range: 0..4294967295.
	CikePhase1GWActiveTunnels interface{}

	// The total number of previously active IPsec Phase-1 IKE Tunnels. The type
	// is interface{} with range: 0..4294967295. Units are SAs.
	CikePhase1GWPreviousTunnels interface{}

	// The total number of octets received by all currently and previously active
	// IPsec Phase-1 IKE Tunnels. The type is interface{} with range:
	// 0..4294967295. Units are Octets.
	CikePhase1GWInOctets interface{}

	// The total number of packets received by all currently and previously active
	// IPsec  Phase-1 IKE Tunnels. The type is interface{} with range:
	// 0..4294967295. Units are Packets.
	CikePhase1GWInPkts interface{}

	// The total number of packets which were dropped during receive processing by
	// all  currently and previously active IPsec Phase-1 IKE Tunnels. The type is
	// interface{} with range: 0..4294967295. Units are Packets.
	CikePhase1GWInDropPkts interface{}

	// The total number of notifys received by all currently and previously active
	// IPsec  Phase-1 IKE Tunnels. The type is interface{} with range:
	// 0..4294967295. Units are Notification Payloads.
	CikePhase1GWInNotifys interface{}

	// The total number of IPsec Phase-2 exchanges received by all currently and
	// previously  active IPsec Phase-1 IKE Tunnels. The type is interface{} with
	// range: 0..4294967295. Units are SA Payloads.
	CikePhase1GWInP2Exchgs interface{}

	// The total number of IPsec Phase-2 exchanges which were received and found
	// to be invalid  by all currently and previously active IPsec  Phase-1 IKE
	// Tunnels. The type is interface{} with range: 0..4294967295. Units are SA
	// Payloads.
	CikePhase1GWInP2ExchgInvalids interface{}

	// The total number of IPsec Phase-2 exchanges which were received and
	// rejected by all  currently and previously active IPsec Phase-1  IKE
	// Tunnels. The type is interface{} with range: 0..4294967295. Units are SA
	// Payloads.
	CikePhase1GWInP2ExchgRejects interface{}

	// The total number of IPsec Phase-2 'Security Association' delete requests
	// received by all  currently and previously active and IPsec  Phase-1 IKE
	// Tunnels. The type is interface{} with range: 0..4294967295. Units are
	// Notification Payloads.
	CikePhase1GWInP2SaDelRequests interface{}

	// The total number of octets sent by all currently and previously active and
	// IPsec Phase-1  IKE Tunnels. The type is interface{} with range:
	// 0..4294967295. Units are Octets.
	CikePhase1GWOutOctets interface{}

	// The total number of packets sent by all currently and previously active and
	// IPsec Phase-1  Tunnels. The type is interface{} with range: 0..4294967295.
	// Units are Packets.
	CikePhase1GWOutPkts interface{}

	// The total number of packets which were dropped during send processing by
	// all currently  and previously active IPsec Phase-1 IKE Tunnels. The type is
	// interface{} with range: 0..4294967295. Units are Packets.
	CikePhase1GWOutDropPkts interface{}

	// The total number of notifys sent by all currently and previously active
	// IPsec Phase-1 IKE Tunnels. The type is interface{} with range:
	// 0..4294967295. Units are Notification Payloads.
	CikePhase1GWOutNotifys interface{}

	// The total number of IPsec Phase-2 exchanges which were sent by all
	// currently and previously  active IPsec Phase-1 IKE Tunnels. The type is
	// interface{} with range: 0..4294967295. Units are SA Payloads.
	CikePhase1GWOutP2Exchgs interface{}

	// The total number of IPsec Phase-2 exchanges which were sent and found to be
	// invalid by  all currently and previously active IPsec Phase-1  Tunnels. The
	// type is interface{} with range: 0..4294967295. Units are SA Payloads.
	CikePhase1GWOutP2ExchgInvalids interface{}

	// The total number of IPsec Phase-2 exchanges which were sent and rejected by
	// all currently and previously active IPsec Phase-1 IKE Tunnels. The type is
	// interface{} with range: 0..4294967295. Units are SA Payloads.
	CikePhase1GWOutP2ExchgRejects interface{}

	// The total number of IPsec Phase-2 SA delete requests sent by all currently
	// and  previously active IPsec Phase-1 IKE Tunnels. The type is interface{}
	// with range: 0..4294967295. Units are Notification Payloads.
	CikePhase1GWOutP2SaDelRequests interface{}

	// The total number of IPsec Phase-1 IKE Tunnels which were locally initiated.
	// The type is interface{} with range: 0..4294967295. Units are SAs.
	CikePhase1GWInitTunnels interface{}

	// The total number of IPsec Phase-1 IKE Tunnels which were locally initiated
	// and failed to activate. The type is interface{} with range: 0..4294967295.
	// Units are SAs.
	CikePhase1GWInitTunnelFails interface{}

	// The total number of IPsec Phase-1 IKE Tunnels which were remotely initiated
	// and failed to activate. The type is interface{} with range: 0..4294967295.
	// Units are SAs.
	CikePhase1GWRespTunnelFails interface{}

	// The total number of system capacity failures which occurred during
	// processing of all current  and previously active IPsec Phase-1 IKE Tunnels.
	// The type is interface{} with range: 0..4294967295. Units are Failures.
	CikePhase1GWSysCapFails interface{}

	// The total number of authentications which ended in failure by all current
	// and previous IPsec Phase-1 IKE Tunnels. The type is interface{} with range:
	// 0..4294967295. Units are Failures.
	CikePhase1GWAuthFails interface{}

	// The total number of decryptions which ended in failure by all current and
	// previous IPsec Phase-1 IKE Tunnels. The type is interface{} with range:
	// 0..4294967295. Units are Failures.
	CikePhase1GWDecryptFails interface{}

	// The total number of hash validations which ended in failure by all current
	// and previous IPsec Phase-1 IKE Tunnels. The type is interface{} with range:
	// 0..4294967295. Units are Failures.
	CikePhase1GWHashValidFails interface{}

	// The total number of non-existent 'Security Association' failures occurred
	// during processing of current and  previous IPsec Phase-1 IKE Tunnels. The
	// type is interface{} with range: 0..4294967295. Units are Failures.
	CikePhase1GWNoSaFails interface{}
}

CISCOIPSECFLOWMONITORMIB_CikePhase1GWStatsTable_CikePhase1GWStatsEntry Each entry contains the attributes of an Phase-1 IKE stats information for the related gateway.

There is only one entry for each gateway. The entry is created when a gateway up and cannot be deleted.

func (*CISCOIPSECFLOWMONITORMIB_CikePhase1GWStatsTable_CikePhase1GWStatsEntry) GetEntityData

type CISCOIPSECFLOWMONITORMIB_CikeTunnelHistTable

type CISCOIPSECFLOWMONITORMIB_CikeTunnelHistTable struct {
	EntityData types.CommonEntityData
	YFilter    yfilter.YFilter

	// Each entry contains the attributes associated with a previously active
	// IPsec  Phase-1 IKE Tunnel. The type is slice of
	// CISCOIPSECFLOWMONITORMIB_CikeTunnelHistTable_CikeTunnelHistEntry.
	CikeTunnelHistEntry []*CISCOIPSECFLOWMONITORMIB_CikeTunnelHistTable_CikeTunnelHistEntry
}

CISCOIPSECFLOWMONITORMIB_CikeTunnelHistTable The IPsec Phase-1 Internet Key Exchange Tunnel History Table. This table is implemented as a sliding window in which only the last n entries are maintained. The maximum number of entries

is specified by the cipSecHistTableSize object.

func (*CISCOIPSECFLOWMONITORMIB_CikeTunnelHistTable) GetEntityData

func (cikeTunnelHistTable *CISCOIPSECFLOWMONITORMIB_CikeTunnelHistTable) GetEntityData() *types.CommonEntityData

type CISCOIPSECFLOWMONITORMIB_CikeTunnelHistTable_CikeTunnelHistEntry

type CISCOIPSECFLOWMONITORMIB_CikeTunnelHistTable_CikeTunnelHistEntry struct {
	EntityData types.CommonEntityData
	YFilter    yfilter.YFilter
	YListKey   string

	// This attribute is a key. The index of the IPsec Phase-1 IKE Tunnel History
	// Table.  The value of the index is a number which  begins at one and is
	// incremented with each  tunnel that ends. The value of this object  will
	// wrap at 2,147,483,647. The type is interface{} with range: 1..2147483647.
	CikeTunHistIndex interface{}

	// The reason the IPsec Phase-1 IKE Tunnel was terminated. Possible reasons
	// include: 1 = other 2 = normal termination 3 = operator request 4 = peer
	// delete request was received 5 = contact with peer was lost 6 = local
	// failure occurred. 7 = operator initiated check point request. The type is
	// CikeTunHistTermReason.
	CikeTunHistTermReason interface{}

	// The index of the previously active IPsec Phase-1 IKE Tunnel. The type is
	// interface{} with range: 1..2147483647.
	CikeTunHistActiveIndex interface{}

	// The type of local peer identity.  The local peer may be identified by:  1.
	// an IP address, or  2. a host name. The type is IkePeerType.
	CikeTunHistPeerLocalType interface{}

	// The value of the local peer identity.  If the local peer type is an IP
	// Address, then this is the IP Address used to identify the local peer.  If
	// the local peer type is a host name, then this is the host name used to
	// identify the local peer. The type is string.
	CikeTunHistPeerLocalValue interface{}

	// The internal index of the local-remote peer association.  This internal
	// index is used to  uniquely identify multiple associations between  the
	// local and remote peer. The type is interface{} with range: 1..2147483647.
	CikeTunHistPeerIntIndex interface{}

	// The type of remote peer identity.  The remote peer may be identified by:
	// 1. an IP address, or  2. a host name. The type is IkePeerType.
	CikeTunHistPeerRemoteType interface{}

	// The value of the remote peer identity.  If the remote peer type is an IP
	// Address, then this is the IP Address used to identify the remote peer.  If
	// the remote peer type is a host name, then this is the host name used to
	// identify the remote peer. The type is string.
	CikeTunHistPeerRemoteValue interface{}

	// The IP address of the local endpoint for the IPsec Phase-1 IKE Tunnel. The
	// type is string with length: 4..4 | 16..16.
	CikeTunHistLocalAddr interface{}

	// The DNS name of the local IP address for the IPsec Phase-1 IKE Tunnel. If
	// the DNS  name associated with the local tunnel endpoint  is not known, then
	// the value of this  object will be a NULL string. The type is string.
	CikeTunHistLocalName interface{}

	// The IP address of the remote endpoint for the IPsec Phase-1 IKE Tunnel. The
	// type is string with length: 4..4 | 16..16.
	CikeTunHistRemoteAddr interface{}

	// The DNS name of the remote IP address of IPsec Phase-1 IKE Tunnel. If the
	// DNS name associated with the remote tunnel endpoint is not known, then the
	// value of this object will be a NULL string. The type is string.
	CikeTunHistRemoteName interface{}

	// The negotiation mode of the IPsec Phase-1 IKE Tunnel. The type is
	// IkeNegoMode.
	CikeTunHistNegoMode interface{}

	// The Diffie Hellman Group used in IPsec Phase-1 IKE negotiations. The type
	// is DiffHellmanGrp.
	CikeTunHistDiffHellmanGrp interface{}

	// The encryption algorithm used in IPsec Phase-1 IKE negotiations. The type
	// is EncryptAlgo.
	CikeTunHistEncryptAlgo interface{}

	// The hash algorithm used in IPsec Phase-1 IKE negotiations. The type is
	// IkeHashAlgo.
	CikeTunHistHashAlgo interface{}

	// The authentication method used in IPsec Phase-1 IKE negotiations. The type
	// is IkeAuthMethod.
	CikeTunHistAuthMethod interface{}

	// The negotiated LifeTime of the IPsec Phase-1 IKE Tunnel in seconds. The
	// type is interface{} with range: 1..2147483647.
	CikeTunHistLifeTime interface{}

	// The value of sysUpTime in hundredths of seconds when the IPsec Phase-1 IKE
	// tunnel was started. The type is interface{} with range: 0..4294967295.
	CikeTunHistStartTime interface{}

	// The length of time the IPsec Phase-1 IKE tunnel was been active in
	// hundredths of seconds. The type is interface{} with range: 0..2147483647.
	CikeTunHistActiveTime interface{}

	// The total number of security associations refreshes performed. The type is
	// interface{} with range: 0..4294967295. Units are QM Exchanges.
	CikeTunHistTotalRefreshes interface{}

	// The total number of security associations used during the  life of the
	// IPsec Phase-1 IKE Tunnel. The type is interface{} with range:
	// 0..4294967295. Units are SAs.
	CikeTunHistTotalSas interface{}

	// The total number of octets received by this IPsec Phase-1  IKE Tunnel. The
	// type is interface{} with range: 0..4294967295. Units are Octets.
	CikeTunHistInOctets interface{}

	// The total number of packets received by this IPsec Phase-1  IKE Tunnel. The
	// type is interface{} with range: 0..4294967295. Units are Packets.
	CikeTunHistInPkts interface{}

	// The total number of packets dropped by this IPsec Phase-1  IKE Tunnel
	// during receive processing. The type is interface{} with range:
	// 0..4294967295. Units are Packets.
	CikeTunHistInDropPkts interface{}

	// The total number of notifys received by this IPsec Phase-1  IKE Tunnel. The
	// type is interface{} with range: 0..4294967295. Units are Notification
	// Payloads.
	CikeTunHistInNotifys interface{}

	// The total number of IPsec Phase-2 exchanges received by  this IPsec Phase-1
	// IKE Tunnel. The type is interface{} with range: 0..4294967295. Units are SA
	// Payloads.
	CikeTunHistInP2Exchgs interface{}

	// The total number of IPsec Phase-2 exchanges received and  found to be
	// invalid by this IPsec Phase-1 IKE Tunnel. The type is interface{} with
	// range: 0..4294967295. Units are SA Payloads.
	CikeTunHistInP2ExchgInvalids interface{}

	// The total number of IPsec Phase-2 exchanges received and  rejected by this
	// IPsec Phase-1 IKE Tunnel. The type is interface{} with range:
	// 0..4294967295. Units are SA Payloads.
	CikeTunHistInP2ExchgRejects interface{}

	// The total number of IPsec Phase-2 security association delete requests
	// received by this IPsec  Phase-1 IKE Tunnel. The type is interface{} with
	// range: 0..4294967295. Units are Notification Payloads.
	CikeTunHistInP2SaDelRequests interface{}

	// The total number of octets sent by this IPsec Phase-1 IKE Tunnel. The type
	// is interface{} with range: 0..4294967295. Units are Octets.
	CikeTunHistOutOctets interface{}

	// The total number of packets sent by this IPsec Phase-1 IKE Tunnel. The type
	// is interface{} with range: 0..4294967295. Units are Packets.
	CikeTunHistOutPkts interface{}

	// The total number of packets dropped by this IPsec Phase-1  IKE Tunnel
	// during send processing. The type is interface{} with range: 0..4294967295.
	// Units are Packets.
	CikeTunHistOutDropPkts interface{}

	// The total number of notifys sent by this IPsec Phase-1 IKE Tunnel. The type
	// is interface{} with range: 0..4294967295. Units are Notification Payloads.
	CikeTunHistOutNotifys interface{}

	// The total number of IPsec Phase-2 exchanges sent by this IPsec Phase-1 IKE
	// Tunnel. The type is interface{} with range: 0..4294967295. Units are SA
	// Payloads.
	CikeTunHistOutP2Exchgs interface{}

	// The total number of IPsec Phase-2 exchanges sent and found to be invalid by
	// this IPsec Phase-1 IKE Tunnel. The type is interface{} with range:
	// 0..4294967295. Units are SA Payloads.
	CikeTunHistOutP2ExchgInvalids interface{}

	// The total number of IPsec Phase-2 exchanges sent and rejected by this IPsec
	// Phase-1 IKE Tunnel. The type is interface{} with range: 0..4294967295.
	// Units are SA Payloads.
	CikeTunHistOutP2ExchgRejects interface{}

	// The total number of IPsec Phase-2 security association delete requests sent
	// by this IPsec Phase-1 IKE Tunnel. The type is interface{} with range:
	// 0..4294967295. Units are Notification Payloads.
	CikeTunHistOutP2SaDelRequests interface{}
}

CISCOIPSECFLOWMONITORMIB_CikeTunnelHistTable_CikeTunnelHistEntry Each entry contains the attributes associated with a previously active IPsec Phase-1 IKE Tunnel.

func (*CISCOIPSECFLOWMONITORMIB_CikeTunnelHistTable_CikeTunnelHistEntry) GetEntityData

type CISCOIPSECFLOWMONITORMIB_CikeTunnelHistTable_CikeTunnelHistEntry_CikeTunHistTermReason

type CISCOIPSECFLOWMONITORMIB_CikeTunnelHistTable_CikeTunnelHistEntry_CikeTunHistTermReason string

CISCOIPSECFLOWMONITORMIB_CikeTunnelHistTable_CikeTunnelHistEntry_CikeTunHistTermReason represents 7 = operator initiated check point request

const (
	CISCOIPSECFLOWMONITORMIB_CikeTunnelHistTable_CikeTunnelHistEntry_CikeTunHistTermReason_other CISCOIPSECFLOWMONITORMIB_CikeTunnelHistTable_CikeTunnelHistEntry_CikeTunHistTermReason = "other"

	CISCOIPSECFLOWMONITORMIB_CikeTunnelHistTable_CikeTunnelHistEntry_CikeTunHistTermReason_normal CISCOIPSECFLOWMONITORMIB_CikeTunnelHistTable_CikeTunnelHistEntry_CikeTunHistTermReason = "normal"

	CISCOIPSECFLOWMONITORMIB_CikeTunnelHistTable_CikeTunnelHistEntry_CikeTunHistTermReason_operRequest CISCOIPSECFLOWMONITORMIB_CikeTunnelHistTable_CikeTunnelHistEntry_CikeTunHistTermReason = "operRequest"

	CISCOIPSECFLOWMONITORMIB_CikeTunnelHistTable_CikeTunnelHistEntry_CikeTunHistTermReason_peerDelRequest CISCOIPSECFLOWMONITORMIB_CikeTunnelHistTable_CikeTunnelHistEntry_CikeTunHistTermReason = "peerDelRequest"

	CISCOIPSECFLOWMONITORMIB_CikeTunnelHistTable_CikeTunnelHistEntry_CikeTunHistTermReason_peerLost CISCOIPSECFLOWMONITORMIB_CikeTunnelHistTable_CikeTunnelHistEntry_CikeTunHistTermReason = "peerLost"

	CISCOIPSECFLOWMONITORMIB_CikeTunnelHistTable_CikeTunnelHistEntry_CikeTunHistTermReason_localFailure CISCOIPSECFLOWMONITORMIB_CikeTunnelHistTable_CikeTunnelHistEntry_CikeTunHistTermReason = "localFailure"

	CISCOIPSECFLOWMONITORMIB_CikeTunnelHistTable_CikeTunnelHistEntry_CikeTunHistTermReason_checkPointReg CISCOIPSECFLOWMONITORMIB_CikeTunnelHistTable_CikeTunnelHistEntry_CikeTunHistTermReason = "checkPointReg"
)

type CISCOIPSECFLOWMONITORMIB_CikeTunnelTable

type CISCOIPSECFLOWMONITORMIB_CikeTunnelTable struct {
	EntityData types.CommonEntityData
	YFilter    yfilter.YFilter

	// Each entry contains the attributes associated with an active IPsec Phase-1
	// IKE Tunnel. The type is slice of
	// CISCOIPSECFLOWMONITORMIB_CikeTunnelTable_CikeTunnelEntry.
	CikeTunnelEntry []*CISCOIPSECFLOWMONITORMIB_CikeTunnelTable_CikeTunnelEntry
}

CISCOIPSECFLOWMONITORMIB_CikeTunnelTable The IPsec Phase-1 Internet Key Exchange Tunnel Table. There is one entry in this table for each active IPsec Phase-1 IKE Tunnel.

func (*CISCOIPSECFLOWMONITORMIB_CikeTunnelTable) GetEntityData

func (cikeTunnelTable *CISCOIPSECFLOWMONITORMIB_CikeTunnelTable) GetEntityData() *types.CommonEntityData

type CISCOIPSECFLOWMONITORMIB_CikeTunnelTable_CikeTunnelEntry

type CISCOIPSECFLOWMONITORMIB_CikeTunnelTable_CikeTunnelEntry struct {
	EntityData types.CommonEntityData
	YFilter    yfilter.YFilter
	YListKey   string

	// This attribute is a key. The index of the IPsec Phase-1 IKE Tunnel Table.
	// The value of the index is a number which begins  at one and is incremented
	// with each tunnel that  is created. The value of this object will  wrap at
	// 2,147,483,647. The type is interface{} with range: 1..2147483647.
	CikeTunIndex interface{}

	// The type of local peer identity.  The local peer may be identified by:  1.
	// an IP address, or  2. a host name. The type is IkePeerType.
	CikeTunLocalType interface{}

	// The value of the local peer identity.  If the local peer type is an IP
	// Address, then this is the IP Address used to identify the local peer.  If
	// the local peer type is a host name, then this is the host name used to
	// identify the local peer. The type is string.
	CikeTunLocalValue interface{}

	// The IP address of the local endpoint for the IPsec Phase-1 IKE Tunnel. The
	// type is string with length: 4..4 | 16..16.
	CikeTunLocalAddr interface{}

	// The DNS name of the local IP address for the IPsec Phase-1 IKE Tunnel. If
	// the DNS  name associated with the local tunnel endpoint  is not known, then
	// the value of this  object will be a NULL string. The type is string.
	CikeTunLocalName interface{}

	// The type of remote peer identity. The remote peer may be identified by:  1.
	// an IP address, or  2. a host name. The type is IkePeerType.
	CikeTunRemoteType interface{}

	// The value of the remote peer identity.  If the remote peer type is an IP
	// Address, then this is the IP Address used to identify the remote peer.  If
	// the remote peer type is a host name, then  this is the host name used to
	// identify the  remote peer. The type is string.
	CikeTunRemoteValue interface{}

	// The IP address of the remote endpoint for the IPsec Phase-1 IKE Tunnel. The
	// type is string with length: 4..4 | 16..16.
	CikeTunRemoteAddr interface{}

	// The DNS name of the remote IP address of IPsec Phase-1 IKE Tunnel. If the
	// DNS name associated with the remote tunnel endpoint is not known, then the
	// value of this object will be a NULL string. The type is string.
	CikeTunRemoteName interface{}

	// The negotiation mode of the IPsec Phase-1 IKE Tunnel. The type is
	// IkeNegoMode.
	CikeTunNegoMode interface{}

	// The Diffie Hellman Group used in IPsec Phase-1 IKE negotiations. The type
	// is DiffHellmanGrp.
	CikeTunDiffHellmanGrp interface{}

	// The encryption algorithm used in IPsec Phase-1 IKE negotiations. The type
	// is EncryptAlgo.
	CikeTunEncryptAlgo interface{}

	// The hash algorithm used in IPsec Phase-1 IKE negotiations. The type is
	// IkeHashAlgo.
	CikeTunHashAlgo interface{}

	// The authentication method used in IPsec Phase-1 IKE negotiations. The type
	// is IkeAuthMethod.
	CikeTunAuthMethod interface{}

	// The negotiated LifeTime of the IPsec Phase-1 IKE Tunnel in seconds. The
	// type is interface{} with range: 1..2147483647. Units are seconds.
	CikeTunLifeTime interface{}

	// The length of time the IPsec Phase-1 IKE tunnel has been active in
	// hundredths of seconds. The type is interface{} with range: 0..2147483647.
	CikeTunActiveTime interface{}

	// The security association refresh threshold in seconds. The type is
	// interface{} with range: 1..2147483647. Units are seconds.
	CikeTunSaRefreshThreshold interface{}

	// The total number of security associations refreshes performed. The type is
	// interface{} with range: 0..4294967295. Units are QM Exchanges.
	CikeTunTotalRefreshes interface{}

	// The total number of octets received by this IPsec Phase-1 IKE Tunnel. The
	// type is interface{} with range: 0..4294967295. Units are Octets.
	CikeTunInOctets interface{}

	// The total number of packets received by this IPsec Phase-1 IKE Tunnel. The
	// type is interface{} with range: 0..4294967295. Units are Packets.
	CikeTunInPkts interface{}

	// The total number of packets dropped by this IPsec Phase-1 IKE Tunnel during
	// receive processing. The type is interface{} with range: 0..4294967295.
	// Units are Packets.
	CikeTunInDropPkts interface{}

	// The total number of notifys received by this IPsec Phase-1 IKE Tunnel. The
	// type is interface{} with range: 0..4294967295. Units are Notification
	// Payloads.
	CikeTunInNotifys interface{}

	// The total number of IPsec Phase-2 exchanges received by  this IPsec Phase-1
	// IKE Tunnel. The type is interface{} with range: 0..4294967295. Units are SA
	// Payloads.
	CikeTunInP2Exchgs interface{}

	// The total number of IPsec Phase-2 exchanges received and found to be
	// invalid  by this IPsec Phase-1 IKE Tunnel. The type is interface{} with
	// range: 0..4294967295. Units are SA Payloads.
	CikeTunInP2ExchgInvalids interface{}

	// The total number of IPsec Phase-2 exchanges received and rejected by this
	// IPsec Phase-1  Tunnel. The type is interface{} with range: 0..4294967295.
	// Units are SA Payloads.
	CikeTunInP2ExchgRejects interface{}

	// The total number of IPsec Phase-2 security association delete requests
	// received  by this IPsec Phase-1 IKE Tunnel. The type is interface{} with
	// range: 0..4294967295. Units are Notification Payloads.
	CikeTunInP2SaDelRequests interface{}

	// The total number of octets sent by this IPsec Phase-1 IKE Tunnel. The type
	// is interface{} with range: 0..4294967295. Units are Octets.
	CikeTunOutOctets interface{}

	// The total number of packets sent by this IPsec Phase-1 IKE Tunnel. The type
	// is interface{} with range: 0..4294967295. Units are Packets.
	CikeTunOutPkts interface{}

	// The total number of packets dropped by this IPsec Phase-1 IKE Tunnel during
	// send processing. The type is interface{} with range: 0..4294967295. Units
	// are Packets.
	CikeTunOutDropPkts interface{}

	// The total number of notifys sent by this IPsec Phase-1 Tunnel. The type is
	// interface{} with range: 0..4294967295. Units are Notification Payloads.
	CikeTunOutNotifys interface{}

	// The total number of IPsec Phase-2 exchanges sent by this IPsec Phase-1 IKE
	// Tunnel. The type is interface{} with range: 0..4294967295. Units are SA
	// Payloads.
	CikeTunOutP2Exchgs interface{}

	// The total number of IPsec Phase-2 exchanges sent and found to be invalid by
	// this IPsec Phase-1 IKE Tunnel. The type is interface{} with range:
	// 0..4294967295. Units are SA Payloads.
	CikeTunOutP2ExchgInvalids interface{}

	// The total number of IPsec Phase-2 exchanges sent and rejected by this IPsec
	// Phase-1 IKE Tunnel. The type is interface{} with range: 0..4294967295.
	// Units are SA Payloads.
	CikeTunOutP2ExchgRejects interface{}

	// The total number of IPsec Phase-2 security association delete requests sent
	// by this IPsec Phase-1 IKE Tunnel. The type is interface{} with range:
	// 0..4294967295. Units are Notification Payloads.
	CikeTunOutP2SaDelRequests interface{}

	// The status of the MIB table row.  This object can be used to bring the
	// tunnel down  by setting value of this object to destroy(2).  This object
	// cannot be used to create  a MIB table row. The type is TunnelStatus.
	CikeTunStatus interface{}
}

CISCOIPSECFLOWMONITORMIB_CikeTunnelTable_CikeTunnelEntry Each entry contains the attributes associated with an active IPsec Phase-1 IKE Tunnel.

func (*CISCOIPSECFLOWMONITORMIB_CikeTunnelTable_CikeTunnelEntry) GetEntityData

type CISCOIPSECFLOWMONITORMIB_CipSecEndPtHistTable

type CISCOIPSECFLOWMONITORMIB_CipSecEndPtHistTable struct {
	EntityData types.CommonEntityData
	YFilter    yfilter.YFilter

	// Each entry contains the attributes associated with a previously active
	// IPsec Phase-2 Tunnel Endpoint. The type is slice of
	// CISCOIPSECFLOWMONITORMIB_CipSecEndPtHistTable_CipSecEndPtHistEntry.
	CipSecEndPtHistEntry []*CISCOIPSECFLOWMONITORMIB_CipSecEndPtHistTable_CipSecEndPtHistEntry
}

CISCOIPSECFLOWMONITORMIB_CipSecEndPtHistTable The IPsec Phase-2 Tunnel Endpoint History Table. This table is implemented as a sliding window in which only the last n entries are maintained. The maximum number of entries is specified by the cipSecHistTableSize object.

func (*CISCOIPSECFLOWMONITORMIB_CipSecEndPtHistTable) GetEntityData

func (cipSecEndPtHistTable *CISCOIPSECFLOWMONITORMIB_CipSecEndPtHistTable) GetEntityData() *types.CommonEntityData

type CISCOIPSECFLOWMONITORMIB_CipSecEndPtHistTable_CipSecEndPtHistEntry

type CISCOIPSECFLOWMONITORMIB_CipSecEndPtHistTable_CipSecEndPtHistEntry struct {
	EntityData types.CommonEntityData
	YFilter    yfilter.YFilter
	YListKey   string

	// This attribute is a key. The number of the previously active Endpoint
	// associated  with a IPsec Phase-2 Tunnel Table.  The value   of this index
	// is a number which begins at   one and is incremented with each Endpoint
	// associated with an IPsec Phase-2 Tunnel.  The value of this object will
	// wrap at 2,147,483,647. The type is interface{} with range: 1..2147483647.
	CipSecEndPtHistIndex interface{}

	// The index  of the previously active IPsec Phase-2 Tunnel Table. The type is
	// interface{} with range: 1..2147483647.
	CipSecEndPtHistTunIndex interface{}

	// The index  of the previously active Endpoint. The type is interface{} with
	// range: 1..2147483647.
	CipSecEndPtHistActiveIndex interface{}

	// The DNS name of the local Endpoint. The type is string.
	CipSecEndPtHistLocalName interface{}

	// The type of identity for the local Endpoint. Possible values are: 1) a
	// single IP address, or 2) an IP address range, or 3) an IP subnet. The type
	// is EndPtType.
	CipSecEndPtHistLocalType interface{}

	// The local Endpoint's first IP address specification.  If the local Endpoint
	// type is single IP address,  then this is the value of the IP address.  If
	// the local Endpoint type is IP subnet, then this is the value of the subnet.
	// If the local Endpoint type is IP address range,  then this is the value of
	// beginning IP address of  the range. The type is string with length: 4..4 |
	// 16..16.
	CipSecEndPtHistLocalAddr1 interface{}

	// The local Endpoint's second IP address specification.  If the local
	// Endpoint type is single IP address,  then this is the value of the IP
	// address.  If the local Endpoint type is IP subnet, then this is the value
	// of the subnet mask.  If the local Endpoint type is IP address range,  then
	// this is the value of ending IP address of the range. The type is string
	// with length: 4..4 | 16..16.
	CipSecEndPtHistLocalAddr2 interface{}

	// The protocol number of the local Endpoint's traffic. The type is
	// interface{} with range: 0..255.
	CipSecEndPtHistLocalProtocol interface{}

	// The port number of the local Endpoint's traffic. The type is interface{}
	// with range: 0..65535.
	CipSecEndPtHistLocalPort interface{}

	// The DNS name of the remote Endpoint. The type is string.
	CipSecEndPtHistRemoteName interface{}

	// The type of identity for the remote Endpoint. Possible values are: 1) a
	// single IP address, or 2) an IP address range, or 3) an IP subnet. The type
	// is EndPtType.
	CipSecEndPtHistRemoteType interface{}

	// The remote Endpoint's first IP address specification.  If the remote
	// Endpoint type is single IP address,  then this is the value of the IP
	// address.  If the remote Endpoint type is IP subnet, then this is the value
	// of the subnet.  If the remote Endpoint type is IP address range,  then this
	// is the value of beginning IP address of the range. The type is string with
	// length: 4..4 | 16..16.
	CipSecEndPtHistRemoteAddr1 interface{}

	// The remote Endpoint's second IP address specification.  If the remote
	// Endpoint type is single IP address,  then this is the value of the IP
	// address.  If the remote Endpoint type is IP subnet, then this is the value
	// of the subnet mask.  If the remote Endpoint type is IP address range,  then
	// this is the value of ending IP address of the range. The type is string
	// with length: 4..4 | 16..16.
	CipSecEndPtHistRemoteAddr2 interface{}

	// The protocol number of the remote Endpoint's traffic. The type is
	// interface{} with range: 0..255.
	CipSecEndPtHistRemoteProtocol interface{}

	// The port number of the remote Endpoint's traffic. The type is interface{}
	// with range: 0..65535.
	CipSecEndPtHistRemotePort interface{}
}

CISCOIPSECFLOWMONITORMIB_CipSecEndPtHistTable_CipSecEndPtHistEntry Each entry contains the attributes associated with a previously active IPsec Phase-2 Tunnel Endpoint.

func (*CISCOIPSECFLOWMONITORMIB_CipSecEndPtHistTable_CipSecEndPtHistEntry) GetEntityData

type CISCOIPSECFLOWMONITORMIB_CipSecEndPtTable

type CISCOIPSECFLOWMONITORMIB_CipSecEndPtTable struct {
	EntityData types.CommonEntityData
	YFilter    yfilter.YFilter

	// An IPsec Phase-2 Tunnel Endpoint entry. The type is slice of
	// CISCOIPSECFLOWMONITORMIB_CipSecEndPtTable_CipSecEndPtEntry.
	CipSecEndPtEntry []*CISCOIPSECFLOWMONITORMIB_CipSecEndPtTable_CipSecEndPtEntry
}

CISCOIPSECFLOWMONITORMIB_CipSecEndPtTable The IPsec Phase-2 Tunnel Endpoint Table. This table contains an entry for each active endpoint associated with an IPsec

Phase-2 Tunnel.

func (*CISCOIPSECFLOWMONITORMIB_CipSecEndPtTable) GetEntityData

func (cipSecEndPtTable *CISCOIPSECFLOWMONITORMIB_CipSecEndPtTable) GetEntityData() *types.CommonEntityData

type CISCOIPSECFLOWMONITORMIB_CipSecEndPtTable_CipSecEndPtEntry

type CISCOIPSECFLOWMONITORMIB_CipSecEndPtTable_CipSecEndPtEntry struct {
	EntityData types.CommonEntityData
	YFilter    yfilter.YFilter
	YListKey   string

	// This attribute is a key. The type is string with range: 1..2147483647.
	// Refers to
	// cisco_ipsec_flow_monitor_mib.CISCOIPSECFLOWMONITORMIB_CipSecTunnelTable_CipSecTunnelEntry_CipSecTunIndex
	CipSecTunIndex interface{}

	// This attribute is a key. The number of the Endpoint associated with the
	// IPsec Phase-2 Tunnel Table.  The value of this index is a number which
	// begins at one and  is incremented with each Endpoint associated  with an
	// IPsec Phase-2 Tunnel. The value of this object will wrap at 2,147,483,647.
	// The type is interface{} with range: 1..2147483647.
	CipSecEndPtIndex interface{}

	// The DNS name of the local Endpoint. The type is string.
	CipSecEndPtLocalName interface{}

	// The type of identity for the local Endpoint. Possible values are: 1) a
	// single IP address, or 2) an IP address range, or 3) an IP subnet. The type
	// is EndPtType.
	CipSecEndPtLocalType interface{}

	// The local Endpoint's first IP address specification.  If the local Endpoint
	// type is single IP address,  then this is the value of the IP address.  If
	// the local Endpoint type is IP subnet, then this is the value of the subnet.
	// If the local Endpoint type is IP address range,  then this is the value of
	// beginning IP address  of the range. The type is string with length: 4..4 |
	// 16..16.
	CipSecEndPtLocalAddr1 interface{}

	// The local Endpoint's second IP address specification.  If the local
	// Endpoint type is single IP address,  then this is the value of the IP
	// address.  If the local Endpoint type is IP subnet, then this is the value
	// of the subnet mask.  If the local Endpoint type is IP address range,  then
	// this is the value of ending IP address  of the range. The type is string
	// with length: 4..4 | 16..16.
	CipSecEndPtLocalAddr2 interface{}

	// The protocol number of the local Endpoint's traffic. The type is
	// interface{} with range: 0..255.
	CipSecEndPtLocalProtocol interface{}

	// The port number of the local Endpoint's traffic. The type is interface{}
	// with range: 0..65535.
	CipSecEndPtLocalPort interface{}

	// The DNS name of the remote Endpoint. The type is string.
	CipSecEndPtRemoteName interface{}

	// The type of identity for the remote Endpoint. Possible values are: 1) a
	// single IP address, or 2) an IP address range, or 3) an IP subnet. The type
	// is EndPtType.
	CipSecEndPtRemoteType interface{}

	// The remote Endpoint's first IP address specification.  If the remote
	// Endpoint type is single IP address,  then this is the value of the IP
	// address.  If the remote Endpoint type is IP subnet, then this is the value
	// of the subnet.  If the remote Endpoint type is IP address range,  then this
	// is the value of beginning IP address  of the range. The type is string with
	// length: 4..4 | 16..16.
	CipSecEndPtRemoteAddr1 interface{}

	// The remote Endpoint's second IP address specification.  If the remote
	// Endpoint type is single IP address,  then this is the value of the IP
	// address.  If the remote Endpoint type is IP subnet, then this is the value
	// of the subnet mask.  If the remote Endpoint type is IP address range,  then
	// this is the value of ending IP address of  the range. The type is string
	// with length: 4..4 | 16..16.
	CipSecEndPtRemoteAddr2 interface{}

	// The protocol number of the remote Endpoint's traffic. The type is
	// interface{} with range: 0..255.
	CipSecEndPtRemoteProtocol interface{}

	// The port number of the remote Endpoint's traffic. The type is interface{}
	// with range: 0..65535.
	CipSecEndPtRemotePort interface{}
}

CISCOIPSECFLOWMONITORMIB_CipSecEndPtTable_CipSecEndPtEntry An IPsec Phase-2 Tunnel Endpoint entry.

func (*CISCOIPSECFLOWMONITORMIB_CipSecEndPtTable_CipSecEndPtEntry) GetEntityData

type CISCOIPSECFLOWMONITORMIB_CipSecFailGlobalCntl

type CISCOIPSECFLOWMONITORMIB_CipSecFailGlobalCntl struct {
	EntityData types.CommonEntityData
	YFilter    yfilter.YFilter

	// The window size of the IPsec Phase-1 and Phase-2 Failure Tables.  The IPsec
	// Phase-1 and Phase-2 Failure Tables are implemented as a sliding window in
	// which only the last n entries are maintained.  This object is used specify
	// the number of entries which will be  maintained in the IPsec Phase-1 and
	// Phase-2 Failure  Tables.  An implementation may choose suitable minimum and
	// maximum values for this element based on the local  policy and available
	// resources. If an SNMP SET request  specifies a value outside this window
	// for this element,  a BAD VALUE may be returned. The type is interface{}
	// with range: 1..2147483647.
	CipSecFailTableSize interface{}
}

CISCOIPSECFLOWMONITORMIB_CipSecFailGlobalCntl

func (*CISCOIPSECFLOWMONITORMIB_CipSecFailGlobalCntl) GetEntityData

func (cipSecFailGlobalCntl *CISCOIPSECFLOWMONITORMIB_CipSecFailGlobalCntl) GetEntityData() *types.CommonEntityData

type CISCOIPSECFLOWMONITORMIB_CipSecFailTable

type CISCOIPSECFLOWMONITORMIB_CipSecFailTable struct {
	EntityData types.CommonEntityData
	YFilter    yfilter.YFilter

	// Each entry contains the attributes associated with an IPsec Phase-1
	// failure. The type is slice of
	// CISCOIPSECFLOWMONITORMIB_CipSecFailTable_CipSecFailEntry.
	CipSecFailEntry []*CISCOIPSECFLOWMONITORMIB_CipSecFailTable_CipSecFailEntry
}

CISCOIPSECFLOWMONITORMIB_CipSecFailTable The IPsec Phase-2 Failure Table. This table is implemented as a sliding window in which only the last n entries are maintained. The maximum number of entries is specified by the cipSecFailTableSize object.

func (*CISCOIPSECFLOWMONITORMIB_CipSecFailTable) GetEntityData

func (cipSecFailTable *CISCOIPSECFLOWMONITORMIB_CipSecFailTable) GetEntityData() *types.CommonEntityData

type CISCOIPSECFLOWMONITORMIB_CipSecFailTable_CipSecFailEntry

type CISCOIPSECFLOWMONITORMIB_CipSecFailTable_CipSecFailEntry struct {
	EntityData types.CommonEntityData
	YFilter    yfilter.YFilter
	YListKey   string

	// This attribute is a key. The IPsec Phase-2 Failure Table index. The value
	// of the index is a number which  begins at one and is incremented with each
	// IPsec Phase-1 failure. The value of this object will wrap at 2,147,483,647.
	// The type is interface{} with range: 1..2147483647.
	CipSecFailIndex interface{}

	// The reason for the failure.  Possible reasons include:   1 = other   2 =
	// internal error occurred   3 = peer encoding error   4 = proposal failure
	// 5 = protocol use failure   6 = non-existent security association   7 =
	// decryption failure   8 = encryption failure   9 = inbound authentication
	// failure  10 = outbound authentication failure  11 = compression failure  12
	// = system capacity failure  13 = peer delete request was received  14 =
	// contact with peer was lost  15 = sequence number rolled over  16 = operator
	// requested termination. The type is CipSecFailReason.
	CipSecFailReason interface{}

	// The value of sysUpTime in hundredths of seconds at the time of the failure.
	// The type is interface{} with range: 0..4294967295.
	CipSecFailTime interface{}

	// The Phase-2 Tunnel index (cipSecTunIndex). The type is interface{} with
	// range: 1..2147483647.
	CipSecFailTunnelIndex interface{}

	// The security association SPI value. The type is interface{} with range:
	// 0..2147483647.
	CipSecFailSaSpi interface{}

	// The packet's source IP address. The type is string with length: 4..4 |
	// 16..16.
	CipSecFailPktSrcAddr interface{}

	// The packet's destination IP address. The type is string with length: 4..4 |
	// 16..16.
	CipSecFailPktDstAddr interface{}
}

CISCOIPSECFLOWMONITORMIB_CipSecFailTable_CipSecFailEntry Each entry contains the attributes associated with an IPsec Phase-1 failure.

func (*CISCOIPSECFLOWMONITORMIB_CipSecFailTable_CipSecFailEntry) GetEntityData

type CISCOIPSECFLOWMONITORMIB_CipSecFailTable_CipSecFailEntry_CipSecFailReason

type CISCOIPSECFLOWMONITORMIB_CipSecFailTable_CipSecFailEntry_CipSecFailReason string

CISCOIPSECFLOWMONITORMIB_CipSecFailTable_CipSecFailEntry_CipSecFailReason represents 16 = operator requested termination.

const (
	CISCOIPSECFLOWMONITORMIB_CipSecFailTable_CipSecFailEntry_CipSecFailReason_other CISCOIPSECFLOWMONITORMIB_CipSecFailTable_CipSecFailEntry_CipSecFailReason = "other"

	CISCOIPSECFLOWMONITORMIB_CipSecFailTable_CipSecFailEntry_CipSecFailReason_internalError CISCOIPSECFLOWMONITORMIB_CipSecFailTable_CipSecFailEntry_CipSecFailReason = "internalError"

	CISCOIPSECFLOWMONITORMIB_CipSecFailTable_CipSecFailEntry_CipSecFailReason_peerEncodingError CISCOIPSECFLOWMONITORMIB_CipSecFailTable_CipSecFailEntry_CipSecFailReason = "peerEncodingError"

	CISCOIPSECFLOWMONITORMIB_CipSecFailTable_CipSecFailEntry_CipSecFailReason_proposalFailure CISCOIPSECFLOWMONITORMIB_CipSecFailTable_CipSecFailEntry_CipSecFailReason = "proposalFailure"

	CISCOIPSECFLOWMONITORMIB_CipSecFailTable_CipSecFailEntry_CipSecFailReason_protocolUseFail CISCOIPSECFLOWMONITORMIB_CipSecFailTable_CipSecFailEntry_CipSecFailReason = "protocolUseFail"

	CISCOIPSECFLOWMONITORMIB_CipSecFailTable_CipSecFailEntry_CipSecFailReason_nonExistentSa CISCOIPSECFLOWMONITORMIB_CipSecFailTable_CipSecFailEntry_CipSecFailReason = "nonExistentSa"

	CISCOIPSECFLOWMONITORMIB_CipSecFailTable_CipSecFailEntry_CipSecFailReason_decryptFailure CISCOIPSECFLOWMONITORMIB_CipSecFailTable_CipSecFailEntry_CipSecFailReason = "decryptFailure"

	CISCOIPSECFLOWMONITORMIB_CipSecFailTable_CipSecFailEntry_CipSecFailReason_encryptFailure CISCOIPSECFLOWMONITORMIB_CipSecFailTable_CipSecFailEntry_CipSecFailReason = "encryptFailure"

	CISCOIPSECFLOWMONITORMIB_CipSecFailTable_CipSecFailEntry_CipSecFailReason_inAuthFailure CISCOIPSECFLOWMONITORMIB_CipSecFailTable_CipSecFailEntry_CipSecFailReason = "inAuthFailure"

	CISCOIPSECFLOWMONITORMIB_CipSecFailTable_CipSecFailEntry_CipSecFailReason_outAuthFailure CISCOIPSECFLOWMONITORMIB_CipSecFailTable_CipSecFailEntry_CipSecFailReason = "outAuthFailure"

	CISCOIPSECFLOWMONITORMIB_CipSecFailTable_CipSecFailEntry_CipSecFailReason_compression CISCOIPSECFLOWMONITORMIB_CipSecFailTable_CipSecFailEntry_CipSecFailReason = "compression"

	CISCOIPSECFLOWMONITORMIB_CipSecFailTable_CipSecFailEntry_CipSecFailReason_sysCapExceeded CISCOIPSECFLOWMONITORMIB_CipSecFailTable_CipSecFailEntry_CipSecFailReason = "sysCapExceeded"

	CISCOIPSECFLOWMONITORMIB_CipSecFailTable_CipSecFailEntry_CipSecFailReason_peerDelRequest CISCOIPSECFLOWMONITORMIB_CipSecFailTable_CipSecFailEntry_CipSecFailReason = "peerDelRequest"

	CISCOIPSECFLOWMONITORMIB_CipSecFailTable_CipSecFailEntry_CipSecFailReason_peerLost CISCOIPSECFLOWMONITORMIB_CipSecFailTable_CipSecFailEntry_CipSecFailReason = "peerLost"

	CISCOIPSECFLOWMONITORMIB_CipSecFailTable_CipSecFailEntry_CipSecFailReason_seqNumRollOver CISCOIPSECFLOWMONITORMIB_CipSecFailTable_CipSecFailEntry_CipSecFailReason = "seqNumRollOver"

	CISCOIPSECFLOWMONITORMIB_CipSecFailTable_CipSecFailEntry_CipSecFailReason_operRequest CISCOIPSECFLOWMONITORMIB_CipSecFailTable_CipSecFailEntry_CipSecFailReason = "operRequest"
)

type CISCOIPSECFLOWMONITORMIB_CipSecGlobalStats

type CISCOIPSECFLOWMONITORMIB_CipSecGlobalStats struct {
	EntityData types.CommonEntityData
	YFilter    yfilter.YFilter

	// The total number of currently active IPsec Phase-2 Tunnels. The type is
	// interface{} with range: 0..4294967295.
	CipSecGlobalActiveTunnels interface{}

	// The total number of previously active IPsec Phase-2 Tunnels. The type is
	// interface{} with range: 0..4294967295. Units are Phase-2 Tunnels.
	CipSecGlobalPreviousTunnels interface{}

	// The total number of octets received by all current and previous IPsec
	// Phase-2 Tunnels.  This value is accumulated BEFORE determining whether or
	// not the packet should be decompressed. See also cipSecGlobalInOctWraps for
	// the number of times this counter has wrapped. The type is interface{} with
	// range: 0..4294967295. Units are Octets.
	CipSecGlobalInOctets interface{}

	// A high capacity count of the total number of octets received by all current
	// and previous IPsec Phase-2 Tunnels. This value is accumulated BEFORE
	// determining whether or not the packet should be decompressed. The type is
	// interface{} with range: 0..18446744073709551615.
	CipSecGlobalHcInOctets interface{}

	// The number of times the global octets received counter
	// (cipSecGlobalInOctets) has wrapped. The type is interface{} with range:
	// 0..4294967295. Units are Integral units.
	CipSecGlobalInOctWraps interface{}

	// The total number of decompressed octets received by all current and
	// previous IPsec Phase-2 Tunnels.   This value is accumulated AFTER the
	// packet is  decompressed. If compression is not being used,  this value will
	// match the value of cipSecGlobalInOctets.  See also
	// cipSecGlobalInDecompOctWraps  for the number of times this counter has
	// wrapped. The type is interface{} with range: 0..4294967295. Units are
	// Octets.
	CipSecGlobalInDecompOctets interface{}

	// A high capacity count of the total number of decompressed octets received
	// by all current  and previous IPsec Phase-2 Tunnels.  This value  is
	// accumulated AFTER the packet is decompressed.  If compression is not being
	// used, this value   will match the value of cipSecGlobalHcInOctets. The type
	// is interface{} with range: 0..18446744073709551615.
	CipSecGlobalHcInDecompOctets interface{}

	// The number of times the global decompressed octets received counter
	// (cipSecGlobalInDecompOctets) has wrapped. The type is interface{} with
	// range: 0..4294967295. Units are Integral units.
	CipSecGlobalInDecompOctWraps interface{}

	// The total number of packets received by all current and previous  IPsec
	// Phase-2 Tunnels. The type is interface{} with range: 0..4294967295. Units
	// are Packets.
	CipSecGlobalInPkts interface{}

	// The total number of packets dropped during receive processing by all
	// current and previous  IPsec Phase-2 Tunnels. This count does NOT include
	// packets dropped due to  Anti-Replay processing. The type is interface{}
	// with range: 0..4294967295. Units are Packets.
	CipSecGlobalInDrops interface{}

	// The total number of packets dropped during receive processing due to
	// Anti-Replay  processing by all current and previous IPsec  Phase-2 Tunnels.
	// The type is interface{} with range: 0..4294967295. Units are Packets.
	CipSecGlobalInReplayDrops interface{}

	// The total number of inbound authentication's performed by all current and
	// previous IPsec  Phase-2 Tunnels. The type is interface{} with range:
	// 0..4294967295. Units are Events.
	CipSecGlobalInAuths interface{}

	// The total number of inbound authentication's which ended in failure by all
	// current and previous  IPsec Phase-2 Tunnels. The type is interface{} with
	// range: 0..4294967295. Units are Failures.
	CipSecGlobalInAuthFails interface{}

	// The total number of inbound decryption's performed by all current and
	// previous IPsec  Phase-2 Tunnels. The type is interface{} with range:
	// 0..4294967295. Units are Packets.
	CipSecGlobalInDecrypts interface{}

	// The total number of inbound decryption's which ended in failure by all
	// current and  previous IPsec Phase-2 Tunnels. The type is interface{} with
	// range: 0..4294967295. Units are Packets.
	CipSecGlobalInDecryptFails interface{}

	// The total number of octets sent by all current and previous IPsec Phase-2
	// Tunnels.   This value is accumulated AFTER determining  whether or not the
	// packet should be compressed.   See also cipSecGlobalOutOctWraps for the
	// number of times this counter has wrapped. The type is interface{} with
	// range: 0..4294967295. Units are Octets.
	CipSecGlobalOutOctets interface{}

	// A high capacity count of the total number of octets sent by all current and
	// previous  IPsec Phase-2 Tunnels.  This value is accumulated  AFTER
	// determining whether or not the packet should  be compressed. The type is
	// interface{} with range: 0..18446744073709551615.
	CipSecGlobalHcOutOctets interface{}

	// The number of times the global octets sent counter (cipSecGlobalOutOctets)
	// has wrapped. The type is interface{} with range: 0..4294967295. Units are
	// Integral units.
	CipSecGlobalOutOctWraps interface{}

	// The total number of uncompressed octets sent by all current and previous
	// IPsec Phase-2 Tunnels.   This value is accumulated BEFORE the packet is
	// compressed. If compression is not being used, this  value will match the
	// value of cipSecGlobalOutOctets.  See also cipSecGlobalOutDecompOctWraps for
	// the number  of times this counter has wrapped. The type is interface{} with
	// range: 0..4294967295. Units are Octets.
	CipSecGlobalOutUncompOctets interface{}

	// A high capacity count of the total number of uncompressed octets sent by
	// all current and previous  IPsec Phase-2 Tunnels.  This value is accumulated
	// BEFORE the packet is compressed.  If compression is  not being used, this
	// value will match the       value of cipSecGlobalHcOutOctets. The type is
	// interface{} with range: 0..18446744073709551615. Units are Octets.
	CipSecGlobalHcOutUncompOctets interface{}

	// The number of times the global uncompressed octets sent counter
	// (cipSecGlobalOutUncompOctets)  has wrapped. The type is interface{} with
	// range: 0..4294967295. Units are Integral units.
	CipSecGlobalOutUncompOctWraps interface{}

	// The total number of packets sent by all current and previous  IPsec Phase-2
	// Tunnels. The type is interface{} with range: 0..4294967295. Units are
	// Packets.
	CipSecGlobalOutPkts interface{}

	// The total number of packets dropped during send processing by all current
	// and previous IPsec  Phase-2 Tunnels. The type is interface{} with range:
	// 0..4294967295. Units are Packets.
	CipSecGlobalOutDrops interface{}

	// The total number of outbound authentication's performed by all current and
	// previous IPsec  Phase-2 Tunnels. The type is interface{} with range:
	// 0..4294967295. Units are Events.
	CipSecGlobalOutAuths interface{}

	// The total number of outbound authentication's which ended in failure  by
	// all current and previous IPsec Phase-2 Tunnels. The type is interface{}
	// with range: 0..4294967295. Units are Failures.
	CipSecGlobalOutAuthFails interface{}

	// The total number of outbound encryption's performed by all current and
	// previous IPsec Phase-2 Tunnels. The type is interface{} with range:
	// 0..4294967295. Units are Packets.
	CipSecGlobalOutEncrypts interface{}

	// The total number of outbound encryption's which ended in failure by all
	// current and  previous IPsec Phase-2 Tunnels. The type is interface{} with
	// range: 0..4294967295. Units are Failures.
	CipSecGlobalOutEncryptFails interface{}

	// The total number of protocol use failures which occurred during processing
	// of all current  and previously active IPsec Phase-2 Tunnels. The type is
	// interface{} with range: 0..4294967295. Units are Failures.
	CipSecGlobalProtocolUseFails interface{}

	// The total number of non-existent Security Association in failures which
	// occurred  during processing of all current  and previous IPsec Phase-2
	// Tunnels. The type is interface{} with range: 0..4294967295. Units are
	// Failures.
	CipSecGlobalNoSaFails interface{}

	// The total number of system capacity failures which occurred during
	// processing of all current  and previously active IPsec Phase-2 Tunnels. The
	// type is interface{} with range: 0..4294967295. Units are Failures.
	CipSecGlobalSysCapFails interface{}
}

CISCOIPSECFLOWMONITORMIB_CipSecGlobalStats

func (*CISCOIPSECFLOWMONITORMIB_CipSecGlobalStats) GetEntityData

func (cipSecGlobalStats *CISCOIPSECFLOWMONITORMIB_CipSecGlobalStats) GetEntityData() *types.CommonEntityData

type CISCOIPSECFLOWMONITORMIB_CipSecHistGlobalCntl

type CISCOIPSECFLOWMONITORMIB_CipSecHistGlobalCntl struct {
	EntityData types.CommonEntityData
	YFilter    yfilter.YFilter

	// The window size of the IPsec Phase-1 and Phase-2 History Tables.  The IPsec
	// Phase-1 and Phase-2 History Tables are implemented as a sliding window in
	// which only the last n entries are maintained.  This object is used specify
	// the number of entries which will be  maintained in the IPsec Phase-1 and
	// Phase-2 History Tables.  An implementation may choose suitable minimum and
	// maximum values for this element based on the local  policy and available
	// resources. If an SNMP SET request  specifies a value outside this window
	// for this element,  a BAD VALUE may be returned. The type is interface{}
	// with range: 1..2147483647.
	CipSecHistTableSize interface{}

	// The current state of check point processing.  This object will return ready
	// when the agent is  ready to create on-demand history entries for  active
	// IPsec Tunnels or checkPoint when the  agent is currently creating on-demand
	// history  entries for active IPsec Tunnels.  By setting this value to
	// checkPoint, the agent  will create: a) an entry in the IPsec Phase-1 Tunnel
	// History     for each active IPsec Phase-1 Tunnel and b) an entry in the
	// IPsec Phase-2 Tunnel History     Table and an entry in the IPsec Phase-2
	// Tunnel EndPoint History Table    for each active IPsec Phase-2 Tunnel. The
	// type is CipSecHistCheckPoint.
	CipSecHistCheckPoint interface{}
}

CISCOIPSECFLOWMONITORMIB_CipSecHistGlobalCntl

func (*CISCOIPSECFLOWMONITORMIB_CipSecHistGlobalCntl) GetEntityData

func (cipSecHistGlobalCntl *CISCOIPSECFLOWMONITORMIB_CipSecHistGlobalCntl) GetEntityData() *types.CommonEntityData

type CISCOIPSECFLOWMONITORMIB_CipSecHistGlobalCntl_CipSecHistCheckPoint

type CISCOIPSECFLOWMONITORMIB_CipSecHistGlobalCntl_CipSecHistCheckPoint string

CISCOIPSECFLOWMONITORMIB_CipSecHistGlobalCntl_CipSecHistCheckPoint represents for each active IPsec Phase-2 Tunnel.

const (
	CISCOIPSECFLOWMONITORMIB_CipSecHistGlobalCntl_CipSecHistCheckPoint_ready CISCOIPSECFLOWMONITORMIB_CipSecHistGlobalCntl_CipSecHistCheckPoint = "ready"

	CISCOIPSECFLOWMONITORMIB_CipSecHistGlobalCntl_CipSecHistCheckPoint_checkPoint CISCOIPSECFLOWMONITORMIB_CipSecHistGlobalCntl_CipSecHistCheckPoint = "checkPoint"
)

type CISCOIPSECFLOWMONITORMIB_CipSecLevels

type CISCOIPSECFLOWMONITORMIB_CipSecLevels struct {
	EntityData types.CommonEntityData
	YFilter    yfilter.YFilter

	// The level of the IPsec MIB. The type is interface{} with range: 1..4096.
	CipSecMibLevel interface{}
}

CISCOIPSECFLOWMONITORMIB_CipSecLevels

func (*CISCOIPSECFLOWMONITORMIB_CipSecLevels) GetEntityData

func (cipSecLevels *CISCOIPSECFLOWMONITORMIB_CipSecLevels) GetEntityData() *types.CommonEntityData

type CISCOIPSECFLOWMONITORMIB_CipSecPhase2GWStatsTable

type CISCOIPSECFLOWMONITORMIB_CipSecPhase2GWStatsTable struct {
	EntityData types.CommonEntityData
	YFilter    yfilter.YFilter

	// Each entry contains the attributes of an Phase-2 IPsec stats information
	// for the related gateway.  There is only one entry for each gateway. The
	// entry  is created when a gateway up and cannot be deleted. The type is
	// slice of
	// CISCOIPSECFLOWMONITORMIB_CipSecPhase2GWStatsTable_CipSecPhase2GWStatsEntry.
	CipSecPhase2GWStatsEntry []*CISCOIPSECFLOWMONITORMIB_CipSecPhase2GWStatsTable_CipSecPhase2GWStatsEntry
}

CISCOIPSECFLOWMONITORMIB_CipSecPhase2GWStatsTable Phase-2 IPsec stats information is included in this table. Each entry is related to a specific gateway which is identified by 'cmgwIndex'

func (*CISCOIPSECFLOWMONITORMIB_CipSecPhase2GWStatsTable) GetEntityData

func (cipSecPhase2GWStatsTable *CISCOIPSECFLOWMONITORMIB_CipSecPhase2GWStatsTable) GetEntityData() *types.CommonEntityData

type CISCOIPSECFLOWMONITORMIB_CipSecPhase2GWStatsTable_CipSecPhase2GWStatsEntry

type CISCOIPSECFLOWMONITORMIB_CipSecPhase2GWStatsTable_CipSecPhase2GWStatsEntry struct {
	EntityData types.CommonEntityData
	YFilter    yfilter.YFilter
	YListKey   string

	// This attribute is a key. The type is string with range: 1..2147483647.
	// Refers to
	// cisco_media_gateway_mib.CISCOMEDIAGATEWAYMIB_CMediaGwTable_CMediaGwEntry_CmgwIndex
	CmgwIndex interface{}

	// The total number of currently active IPsec Phase-2 Tunnels. The type is
	// interface{} with range: 0..4294967295.
	CipSecPhase2GWActiveTunnels interface{}

	// The total number of previously active IPsec Phase-2 Tunnels. The type is
	// interface{} with range: 0..4294967295. Units are Phase-2 Tunnels.
	CipSecPhase2GWPreviousTunnels interface{}

	// The total number of octets received by all current and previous IPsec
	// Phase-2 Tunnels.  This value is accumulated BEFORE determining  whether or
	// not the packet should be decompressed.  See also cipSecGlobalInOctWraps for
	// the number of times this counter has wrapped. The type is interface{} with
	// range: 0..4294967295. Units are Octets.
	CipSecPhase2GWInOctets interface{}

	// The number of times the global octets received counter
	// (cipSecGlobalInOctets) has wrapped. The type is interface{} with range:
	// 0..4294967295. Units are Integral units.
	CipSecPhase2GWInOctWraps interface{}

	// The total number of decompressed octets received by all current and
	// previous IPsec Phase-2 Tunnels.   This value is accumulated AFTER the
	// packet is  decompressed. If compression is not being used,  this value will
	// match the value of cipSecGlobalInOctets.  See also
	// cipSecGlobalInDecompOctWraps for the number of times this counter has
	// wrapped. The type is interface{} with range: 0..4294967295. Units are
	// Octets.
	CipSecPhase2GWInDecompOctets interface{}

	// The number of times the global decompressed octets received counter
	// (cipSecGlobalInDecompOctets)  has wrapped. The type is interface{} with
	// range: 0..4294967295. Units are Integral units.
	CipSecPhase2GWInDecompOctWraps interface{}

	// The total number of packets received by all current and previous IPsec
	// Phase-2 Tunnels. The type is interface{} with range: 0..4294967295. Units
	// are Packets.
	CipSecPhase2GWInPkts interface{}

	// The total number of packets dropped during receive processing by all
	// current and previous  IPsec Phase-2 Tunnels. This count does NOT include
	// packets dropped due to Anti-Replay processing. The type is interface{} with
	// range: 0..4294967295. Units are Packets.
	CipSecPhase2GWInDrops interface{}

	// The total number of packets dropped during receive processing due to
	// Anti-Replay  processing by all current and previous IPsec Phase-2 Tunnels.
	// The type is interface{} with range: 0..4294967295. Units are Packets.
	CipSecPhase2GWInReplayDrops interface{}

	// The total number of inbound authentication's performed by all current and
	// previous IPsec  Phase-2 Tunnels. The type is interface{} with range:
	// 0..4294967295. Units are Events.
	CipSecPhase2GWInAuths interface{}

	// The total number of inbound authentication's which ended in failure by all
	// current and previous  IPsec Phase-2 Tunnels. The type is interface{} with
	// range: 0..4294967295. Units are Failures.
	CipSecPhase2GWInAuthFails interface{}

	// The total number of inbound decryption's performed by all current and
	// previous IPsec  Phase-2 Tunnels. The type is interface{} with range:
	// 0..4294967295. Units are Packets.
	CipSecPhase2GWInDecrypts interface{}

	// The total number of inbound decryption's which ended in failure by all
	// current and  previous IPsec Phase-2 Tunnels. The type is interface{} with
	// range: 0..4294967295. Units are Packets.
	CipSecPhase2GWInDecryptFails interface{}

	// The total number of octets sent by all current and previous IPsec Phase-2
	// Tunnels.   This value is accumulated AFTER determining  whether or not the
	// packet should be compressed.   See also cipSecGlobalOutOctWraps for the
	// number of times this counter has wrapped. The type is interface{} with
	// range: 0..4294967295. Units are Octets.
	CipSecPhase2GWOutOctets interface{}

	// The number of times the global octets sent counter (cipSecGlobalOutOctets)
	// has wrapped. The type is interface{} with range: 0..4294967295. Units are
	// Integral units.
	CipSecPhase2GWOutOctWraps interface{}

	// The total number of uncompressed octets sent by all current and previous
	// IPsec Phase-2 Tunnels.   This value is accumulated BEFORE the packet is
	// compressed. If compression is not being used, this  value will match the
	// value of cipSecGlobalOutOctets.  See also cipSecGlobalOutDecompOctWraps for
	// the number  of times this counter has wrapped. The type is interface{} with
	// range: 0..4294967295. Units are Octets.
	CipSecPhase2GWOutUncompOctets interface{}

	// The number of times the global uncompressed octets sent counter
	// (cipSecGlobalOutUncompOctets)  has wrapped. The type is interface{} with
	// range: 0..4294967295. Units are Integral units.
	CipSecPhase2GWOutUncompOctWraps interface{}

	// The total number of packets sent by all current and previous IPsec Phase-2
	// Tunnels. The type is interface{} with range: 0..4294967295. Units are
	// Packets.
	CipSecPhase2GWOutPkts interface{}

	// The total number of packets dropped during send processing by all current
	// and previous IPsec  Phase-2 Tunnels. The type is interface{} with range:
	// 0..4294967295. Units are Packets.
	CipSecPhase2GWOutDrops interface{}

	// The total number of outbound authentication's performed by all current and
	// previous IPsec  Phase-2 Tunnels. The type is interface{} with range:
	// 0..4294967295. Units are Events.
	CipSecPhase2GWOutAuths interface{}

	// The total number of outbound authentication's which ended in failure by all
	// current and previous IPsec Phase-2 Tunnels. The type is interface{} with
	// range: 0..4294967295. Units are Failures.
	CipSecPhase2GWOutAuthFails interface{}

	// The total number of outbound encryption's performed by all current and
	// previous IPsec Phase-2 Tunnels. The type is interface{} with range:
	// 0..4294967295. Units are Packets.
	CipSecPhase2GWOutEncrypts interface{}

	// The total number of outbound encryption's which ended in failure by all
	// current and  previous IPsec Phase-2 Tunnels. The type is interface{} with
	// range: 0..4294967295. Units are Failures.
	CipSecPhase2GWOutEncryptFails interface{}

	// The total number of protocol use failures which occurred during processing
	// of all current  and previously active IPsec Phase-2 Tunnels. The type is
	// interface{} with range: 0..4294967295. Units are Failures.
	CipSecPhase2GWProtocolUseFails interface{}

	// The total number of non-existent Security Association in failures which
	// occurred  during processing of all current and previous IPsec Phase-2
	// Tunnels. The type is interface{} with range: 0..4294967295. Units are
	// Failures.
	CipSecPhase2GWNoSaFails interface{}

	// The total number of system capacity failures which occurred during
	// processing of all current  and previously active IPsec Phase-2 Tunnels. The
	// type is interface{} with range: 0..4294967295. Units are Failures.
	CipSecPhase2GWSysCapFails interface{}
}

CISCOIPSECFLOWMONITORMIB_CipSecPhase2GWStatsTable_CipSecPhase2GWStatsEntry Each entry contains the attributes of an Phase-2 IPsec stats information for the related gateway.

There is only one entry for each gateway. The entry is created when a gateway up and cannot be deleted.

func (*CISCOIPSECFLOWMONITORMIB_CipSecPhase2GWStatsTable_CipSecPhase2GWStatsEntry) GetEntityData

type CISCOIPSECFLOWMONITORMIB_CipSecSpiTable

type CISCOIPSECFLOWMONITORMIB_CipSecSpiTable struct {
	EntityData types.CommonEntityData
	YFilter    yfilter.YFilter

	// Each entry contains the attributes associated with active and expiring
	// IPsec Phase-2  security associations. The type is slice of
	// CISCOIPSECFLOWMONITORMIB_CipSecSpiTable_CipSecSpiEntry.
	CipSecSpiEntry []*CISCOIPSECFLOWMONITORMIB_CipSecSpiTable_CipSecSpiEntry
}

CISCOIPSECFLOWMONITORMIB_CipSecSpiTable The IPsec Phase-2 Security Protection Index Table. This table contains an entry for each active and expiring security

association.

func (*CISCOIPSECFLOWMONITORMIB_CipSecSpiTable) GetEntityData

func (cipSecSpiTable *CISCOIPSECFLOWMONITORMIB_CipSecSpiTable) GetEntityData() *types.CommonEntityData

type CISCOIPSECFLOWMONITORMIB_CipSecSpiTable_CipSecSpiEntry

type CISCOIPSECFLOWMONITORMIB_CipSecSpiTable_CipSecSpiEntry struct {
	EntityData types.CommonEntityData
	YFilter    yfilter.YFilter
	YListKey   string

	// This attribute is a key. The type is string with range: 1..2147483647.
	// Refers to
	// cisco_ipsec_flow_monitor_mib.CISCOIPSECFLOWMONITORMIB_CipSecTunnelTable_CipSecTunnelEntry_CipSecTunIndex
	CipSecTunIndex interface{}

	// This attribute is a key. The number of the SPI associated with the Phase-2
	// Tunnel Table.  The value of this  index is a number which begins at one and
	// is  incremented with each SPI associated with an  IPsec Phase-2 Tunnel.
	// The value of this  object will wrap at 2,147,483,647. The type is
	// interface{} with range: 1..2147483647.
	CipSecSpiIndex interface{}

	// The direction of the SPI. The type is CipSecSpiDirection.
	CipSecSpiDirection interface{}

	// The value of the SPI. The type is interface{} with range: 1..4294967295.
	CipSecSpiValue interface{}

	// The protocol of the SPI. The type is CipSecSpiProtocol.
	CipSecSpiProtocol interface{}

	// The status of the SPI. The type is CipSecSpiStatus.
	CipSecSpiStatus interface{}
}

CISCOIPSECFLOWMONITORMIB_CipSecSpiTable_CipSecSpiEntry Each entry contains the attributes associated with active and expiring IPsec Phase-2 security associations.

func (*CISCOIPSECFLOWMONITORMIB_CipSecSpiTable_CipSecSpiEntry) GetEntityData

type CISCOIPSECFLOWMONITORMIB_CipSecSpiTable_CipSecSpiEntry_CipSecSpiDirection

type CISCOIPSECFLOWMONITORMIB_CipSecSpiTable_CipSecSpiEntry_CipSecSpiDirection string

CISCOIPSECFLOWMONITORMIB_CipSecSpiTable_CipSecSpiEntry_CipSecSpiDirection represents The direction of the SPI.

const (
	CISCOIPSECFLOWMONITORMIB_CipSecSpiTable_CipSecSpiEntry_CipSecSpiDirection_in CISCOIPSECFLOWMONITORMIB_CipSecSpiTable_CipSecSpiEntry_CipSecSpiDirection = "in"

	CISCOIPSECFLOWMONITORMIB_CipSecSpiTable_CipSecSpiEntry_CipSecSpiDirection_out CISCOIPSECFLOWMONITORMIB_CipSecSpiTable_CipSecSpiEntry_CipSecSpiDirection = "out"
)

type CISCOIPSECFLOWMONITORMIB_CipSecSpiTable_CipSecSpiEntry_CipSecSpiProtocol

type CISCOIPSECFLOWMONITORMIB_CipSecSpiTable_CipSecSpiEntry_CipSecSpiProtocol string

CISCOIPSECFLOWMONITORMIB_CipSecSpiTable_CipSecSpiEntry_CipSecSpiProtocol represents The protocol of the SPI.

const (
	CISCOIPSECFLOWMONITORMIB_CipSecSpiTable_CipSecSpiEntry_CipSecSpiProtocol_ah CISCOIPSECFLOWMONITORMIB_CipSecSpiTable_CipSecSpiEntry_CipSecSpiProtocol = "ah"

	CISCOIPSECFLOWMONITORMIB_CipSecSpiTable_CipSecSpiEntry_CipSecSpiProtocol_esp CISCOIPSECFLOWMONITORMIB_CipSecSpiTable_CipSecSpiEntry_CipSecSpiProtocol = "esp"

	CISCOIPSECFLOWMONITORMIB_CipSecSpiTable_CipSecSpiEntry_CipSecSpiProtocol_ipcomp CISCOIPSECFLOWMONITORMIB_CipSecSpiTable_CipSecSpiEntry_CipSecSpiProtocol = "ipcomp"
)

type CISCOIPSECFLOWMONITORMIB_CipSecSpiTable_CipSecSpiEntry_CipSecSpiStatus

type CISCOIPSECFLOWMONITORMIB_CipSecSpiTable_CipSecSpiEntry_CipSecSpiStatus string

CISCOIPSECFLOWMONITORMIB_CipSecSpiTable_CipSecSpiEntry_CipSecSpiStatus represents The status of the SPI.

const (
	CISCOIPSECFLOWMONITORMIB_CipSecSpiTable_CipSecSpiEntry_CipSecSpiStatus_active CISCOIPSECFLOWMONITORMIB_CipSecSpiTable_CipSecSpiEntry_CipSecSpiStatus = "active"

	CISCOIPSECFLOWMONITORMIB_CipSecSpiTable_CipSecSpiEntry_CipSecSpiStatus_expiring CISCOIPSECFLOWMONITORMIB_CipSecSpiTable_CipSecSpiEntry_CipSecSpiStatus = "expiring"
)

type CISCOIPSECFLOWMONITORMIB_CipSecTrapCntl

type CISCOIPSECFLOWMONITORMIB_CipSecTrapCntl struct {
	EntityData types.CommonEntityData
	YFilter    yfilter.YFilter

	// This object defines the administrative state of sending the IPsec IKE
	// Phase-1 Tunnel Start TRAP. The type is TrapStatus.
	CipSecTrapCntlIkeTunnelStart interface{}

	// This object defines the administrative state of sending the  IPsec IKE
	// Phase-1 Tunnel Stop TRAP. The type is TrapStatus.
	CipSecTrapCntlIkeTunnelStop interface{}

	// This object defines the administrative state of sending the  IPsec IKE
	// Phase-1 System Failure TRAP. The type is TrapStatus.
	CipSecTrapCntlIkeSysFailure interface{}

	// This object defines the administrative state of sending the  IPsec IKE
	// Phase-1 Certificate/CRL Failure TRAP. The type is TrapStatus.
	CipSecTrapCntlIkeCertCrlFailure interface{}

	// This object defines the administrative state of sending the  IPsec IKE
	// Phase-1 Protocol Failure TRAP. The type is TrapStatus.
	CipSecTrapCntlIkeProtocolFail interface{}

	// This object defines the administrative state of sending the  IPsec IKE
	// Phase-1 No Security Association TRAP. The type is TrapStatus.
	CipSecTrapCntlIkeNoSa interface{}

	// This object defines the administrative state of sending the IPsec  Phase-2
	// Tunnel Start TRAP. The type is TrapStatus.
	CipSecTrapCntlIpSecTunnelStart interface{}

	// This object defines the administrative state of sending the IPsec  Phase-2
	// Tunnel Stop TRAP. The type is TrapStatus.
	CipSecTrapCntlIpSecTunnelStop interface{}

	// This object defines the administrative state of sending the IPsec  Phase-2
	// System Failure TRAP. The type is TrapStatus.
	CipSecTrapCntlIpSecSysFailure interface{}

	// This object defines the administrative state of sending the IPsec  Phase-2
	// Set Up Failure TRAP. The type is TrapStatus.
	CipSecTrapCntlIpSecSetUpFailure interface{}

	// This object defines the administrative state of sending the IPsec  Phase-2
	// Early Tunnel Termination TRAP. The type is TrapStatus.
	CipSecTrapCntlIpSecEarlyTunTerm interface{}

	// This object defines the administrative state of sending the IPsec  Phase-2
	// Protocol Failure TRAP. The type is TrapStatus.
	CipSecTrapCntlIpSecProtocolFail interface{}

	// This object defines the administrative state of sending the IPsec  Phase-2
	// No Security Association TRAP. The type is TrapStatus.
	CipSecTrapCntlIpSecNoSa interface{}
}

CISCOIPSECFLOWMONITORMIB_CipSecTrapCntl

func (*CISCOIPSECFLOWMONITORMIB_CipSecTrapCntl) GetEntityData

func (cipSecTrapCntl *CISCOIPSECFLOWMONITORMIB_CipSecTrapCntl) GetEntityData() *types.CommonEntityData

type CISCOIPSECFLOWMONITORMIB_CipSecTunnelHistTable

type CISCOIPSECFLOWMONITORMIB_CipSecTunnelHistTable struct {
	EntityData types.CommonEntityData
	YFilter    yfilter.YFilter

	// Each entry contains the attributes associated with a previously active
	// IPsec Phase-2 Tunnel. The type is slice of
	// CISCOIPSECFLOWMONITORMIB_CipSecTunnelHistTable_CipSecTunnelHistEntry.
	CipSecTunnelHistEntry []*CISCOIPSECFLOWMONITORMIB_CipSecTunnelHistTable_CipSecTunnelHistEntry
}

CISCOIPSECFLOWMONITORMIB_CipSecTunnelHistTable The IPsec Phase-2 Tunnel History Table. This table is implemented as a sliding window in which only the last n entries are maintained. The maximum number of entries is specified by the cipSecHistTableSize object.

func (*CISCOIPSECFLOWMONITORMIB_CipSecTunnelHistTable) GetEntityData

func (cipSecTunnelHistTable *CISCOIPSECFLOWMONITORMIB_CipSecTunnelHistTable) GetEntityData() *types.CommonEntityData

type CISCOIPSECFLOWMONITORMIB_CipSecTunnelHistTable_CipSecTunnelHistEntry

type CISCOIPSECFLOWMONITORMIB_CipSecTunnelHistTable_CipSecTunnelHistEntry struct {
	EntityData types.CommonEntityData
	YFilter    yfilter.YFilter
	YListKey   string

	// This attribute is a key. The index of the IPsec Phase-2 Tunnel History
	// Table. The value of the index is a number which  begins at one and is
	// incremented with each tunnel  that ends. The value of this object will wrap
	// at 2,147,483,647. The type is interface{} with range: 1..2147483647.
	CipSecTunHistIndex interface{}

	// The reason the IPsec Phase-2 Tunnel was terminated. Possible reasons
	// include: 1 = other 2 = normal termination 3 = operator request 4 = peer
	// delete request was received 5 = contact with peer was lost 6 = local
	// failure occurred 7 = operator initiated check point request. The type is
	// CipSecTunHistTermReason.
	CipSecTunHistTermReason interface{}

	// The index of the previously active IPsec Phase-2 Tunnel. The type is
	// interface{} with range: 1..2147483647.
	CipSecTunHistActiveIndex interface{}

	// The index of the associated IPsec Phase-1 Tunnel (cikeTunIndex in the
	// cikeTunnelTable). The type is interface{} with range: 1..2147483647.
	CipSecTunHistIkeTunnelIndex interface{}

	// The IP address of the local endpoint for the IPsec Phase-2 Tunnel. The type
	// is string with length: 4..4 | 16..16.
	CipSecTunHistLocalAddr interface{}

	// The IP address of the remote endpoint for the IPsec Phase-2 Tunnel. The
	// type is string with length: 4..4 | 16..16.
	CipSecTunHistRemoteAddr interface{}

	// The type of key used by the IPsec Phase-2 Tunnel. The type is KeyType.
	CipSecTunHistKeyType interface{}

	// The encapsulation mode used by the IPsec Phase-2 Tunnel. The type is
	// EncapMode.
	CipSecTunHistEncapMode interface{}

	// The negotiated LifeSize of the IPsec Phase-2 Tunnel in kilobytes. The type
	// is interface{} with range: 1..2147483647. Units are KBytes.
	CipSecTunHistLifeSize interface{}

	// The negotiated LifeTime of the IPsec Phase-2 Tunnel in seconds. The type is
	// interface{} with range: 1..2147483647. Units are Seconds.
	CipSecTunHistLifeTime interface{}

	// The value of sysUpTime in hundredths of seconds when the IPsec Phase-2
	// Tunnel was started. The type is interface{} with range: 0..4294967295.
	CipSecTunHistStartTime interface{}

	// The length of time the IPsec Phase-2 Tunnel has been active in hundredths
	// of seconds. The type is interface{} with range: 0..2147483647.
	CipSecTunHistActiveTime interface{}

	// The total number of security association refreshes performed. The type is
	// interface{} with range: 0..4294967295. Units are QM Exchanges.
	CipSecTunHistTotalRefreshes interface{}

	// The total number of security associations used during the  life of the
	// IPsec Phase-2 Tunnel. The type is interface{} with range: 0..4294967295.
	// Units are SAs.
	CipSecTunHistTotalSas interface{}

	// The Diffie Hellman Group used by the inbound security association of the
	// IPsec Phase-2 Tunnel. The type is DiffHellmanGrp.
	CipSecTunHistInSaDiffHellmanGrp interface{}

	// The encryption algorithm used by the inbound security association of the
	// IPsec Phase-2 Tunnel. The type is EncryptAlgo.
	CipSecTunHistInSaEncryptAlgo interface{}

	// The authentication algorithm used by the inbound authentication header (AH)
	// security association of the IPsec Phase-2 Tunnel. The type is AuthAlgo.
	CipSecTunHistInSaAhAuthAlgo interface{}

	// The authentication algorithm used by the inbound encapsulation security
	// protocol (ESP)  security association of the IPsec Phase-2 Tunnel. The type
	// is AuthAlgo.
	CipSecTunHistInSaEspAuthAlgo interface{}

	// The decompression algorithm used by the inbound security association of the
	// IPsec Phase-2 Tunnel. The type is CompAlgo.
	CipSecTunHistInSaDecompAlgo interface{}

	// The Diffie Hellman Group used by the outbound security association of the
	// IPsec Phase-2 Tunnel. The type is DiffHellmanGrp.
	CipSecTunHistOutSaDiffHellmanGrp interface{}

	// The encryption algorithm used by the outbound security association of the
	// IPsec Phase-2 Tunnel. The type is EncryptAlgo.
	CipSecTunHistOutSaEncryptAlgo interface{}

	// The authentication algorithm used by the outbound authentication header
	// (AH) security association of the IPsec Phase-2 Tunnel. The type is
	// AuthAlgo.
	CipSecTunHistOutSaAhAuthAlgo interface{}

	// The authentication algorithm used by the inbound encapsulation security
	// protocol (ESP)  security association of the IPsec Phase-2 Tunnel. The type
	// is AuthAlgo.
	CipSecTunHistOutSaEspAuthAlgo interface{}

	// The compression algorithm used by the inbound security association of the
	// IPsec Phase-2 Tunnel. The type is CompAlgo.
	CipSecTunHistOutSaCompAlgo interface{}

	// The total number of octets received by this IPsec Phase-2 Tunnel.  This
	// value is accumulated BEFORE determining whether or not the packet should
	// be decompressed.  See also cipSecTunInOctWraps for  the number of times
	// this counter has wrapped. The type is interface{} with range:
	// 0..4294967295. Units are Octets.
	CipSecTunHistInOctets interface{}

	// A high capacity count of the total number of octets received by this IPsec
	// Phase-2 Tunnel.  This value is accumulated BEFORE determining whether or
	// not  the packet should be decompressed. The type is interface{} with range:
	// 0..18446744073709551615.
	CipSecTunHistHcInOctets interface{}

	// The number of times the octets received counter (cipSecTunInOctets) has
	// wrapped. The type is interface{} with range: 0..4294967295. Units are
	// Integral units.
	CipSecTunHistInOctWraps interface{}

	// The total number of decompressed octets received by this IPsec Phase-2
	// Tunnel.  This value is accumulated AFTER the packet is decompressed. If
	// compression is not being used, this value will match the value of
	// cipSecTunHistInOctets. See also cipSecTunInDecompOctWraps for the number of
	// times this counter has wrapped. The type is interface{} with range:
	// 0..4294967295. Units are Octets.
	CipSecTunHistInDecompOctets interface{}

	// A high capacity count of the total number of decompressed octets received
	// by this IPsec Phase-2 Tunnel.  This value is accumulated AFTER the packet
	// is decompressed. If compression is not being used, this value will match
	// the value of cipSecTunHistHcInOctets. The type is interface{} with range:
	// 0..18446744073709551615.
	CipSecTunHistHcInDecompOctets interface{}

	// The number of times the decompressed octets received counter
	// (cipSecTunInDecompOctets) has wrapped. The type is interface{} with range:
	// 0..4294967295. Units are Integral units.
	CipSecTunHistInDecompOctWraps interface{}

	// The total number of packets received by this IPsec Phase-2 Tunnel. The type
	// is interface{} with range: 0..4294967295. Units are Packets.
	CipSecTunHistInPkts interface{}

	// The total number of packets dropped during receive processing by this IPsec
	// Phase-2 Tunnel.  This count does NOT include packets  dropped due to
	// Anti-Replay processing. The type is interface{} with range: 0..4294967295.
	// Units are Packets.
	CipSecTunHistInDropPkts interface{}

	// The total number of packets dropped during receive processing due to
	// Anti-Replay processing  by this IPsec Phase-2 Tunnel. The type is
	// interface{} with range: 0..4294967295. Units are Packets.
	CipSecTunHistInReplayDropPkts interface{}

	// The total number of inbound authentication's performed  by this IPsec
	// Phase-2 Tunnel. The type is interface{} with range: 0..4294967295. Units
	// are Events.
	CipSecTunHistInAuths interface{}

	// The total number of inbound authentication's which ended in  failure by
	// this IPsec Phase-2 Tunnel . The type is interface{} with range:
	// 0..4294967295. Units are Failures.
	CipSecTunHistInAuthFails interface{}

	// The total number of inbound decryption's performed by this IPsec Phase-2
	// Tunnel. The type is interface{} with range: 0..4294967295. Units are
	// Packets.
	CipSecTunHistInDecrypts interface{}

	// The total number of inbound decryption's which ended in failure  by this
	// IPsec Phase-2 Tunnel. The type is interface{} with range: 0..4294967295.
	// Units are Failures.
	CipSecTunHistInDecryptFails interface{}

	// The total number of octets sent by this IPsec Phase-2 Tunnel.  This value
	// is accumulated AFTER determining whether or not the  packet should be
	// compressed.  See also cipSecTunOutOctWraps for the number of times this
	// counter has wrapped. The type is interface{} with range: 0..4294967295.
	// Units are Octets.
	CipSecTunHistOutOctets interface{}

	// A high capacity count of the total number of octets sent by this IPsec
	// Phase-2 Tunnel.  This value  is accumulated AFTER determining whether or
	// not  the packet should be compressed. The type is interface{} with range:
	// 0..18446744073709551615.
	CipSecTunHistHcOutOctets interface{}

	// The number of times the octets sent counter (cipSecTunOutOctets) has
	// wrapped. The type is interface{} with range: 0..4294967295. Units are
	// Integral units.
	CipSecTunHistOutOctWraps interface{}

	// The total number of uncompressed octets sent by this IPsec Phase-2 Tunnel.
	// This value is accumulated BEFORE the packet is compressed. If compression
	// is not being used, this value will match the value of
	// cipSecTunHistOutOctets.  See also  cipSecTunOutDecompOctWraps for the
	// number of times this counter has wrapped. The type is interface{} with
	// range: 0..4294967295. Units are Octets.
	CipSecTunHistOutUncompOctets interface{}

	// A high capacity count of the total number of uncompressed octets sent by
	// this  IPsec Phase-2 Tunnel.  This value is accumulated  BEFORE the packet
	// is compressed. If compression is not being used, this value will match the
	// value of cipSecTunHistHcOutOctets. The type is interface{} with range:
	// 0..18446744073709551615. Units are Octets.
	CipSecTunHistHcOutUncompOctets interface{}

	// The number of times the uncompressed octets sent counter
	// (cipSecTunOutUncompOctets) has wrapped. The type is interface{} with range:
	// 0..4294967295. Units are Integral units.
	CipSecTunHistOutUncompOctWraps interface{}

	// The total number of packets sent by this IPsec Phase-2 Tunnel. The type is
	// interface{} with range: 0..4294967295. Units are Packets.
	CipSecTunHistOutPkts interface{}

	// The total number of packets dropped during send processing  by this IPsec
	// Phase-2 Tunnel. The type is interface{} with range: 0..4294967295. Units
	// are Packets.
	CipSecTunHistOutDropPkts interface{}

	// The total number of outbound authentication's performed by this IPsec
	// Phase-2 Tunnel. The type is interface{} with range: 0..4294967295. Units
	// are Events.
	CipSecTunHistOutAuths interface{}

	// The total number of outbound authentication's which ended in  failure by
	// this IPsec Phase-2 Tunnel. The type is interface{} with range:
	// 0..4294967295. Units are Failures.
	CipSecTunHistOutAuthFails interface{}

	// The total number of outbound encryption's performed by this IPsec Phase-2
	// Tunnel. The type is interface{} with range: 0..4294967295. Units are
	// Packets.
	CipSecTunHistOutEncrypts interface{}

	// The total number of outbound encryption's which ended in failure  by this
	// IPsec Phase-2 Tunnel. The type is interface{} with range: 0..4294967295.
	// Units are Failures.
	CipSecTunHistOutEncryptFails interface{}
}

CISCOIPSECFLOWMONITORMIB_CipSecTunnelHistTable_CipSecTunnelHistEntry Each entry contains the attributes associated with a previously active IPsec Phase-2 Tunnel.

func (*CISCOIPSECFLOWMONITORMIB_CipSecTunnelHistTable_CipSecTunnelHistEntry) GetEntityData

type CISCOIPSECFLOWMONITORMIB_CipSecTunnelHistTable_CipSecTunnelHistEntry_CipSecTunHistTermReason

type CISCOIPSECFLOWMONITORMIB_CipSecTunnelHistTable_CipSecTunnelHistEntry_CipSecTunHistTermReason string

CISCOIPSECFLOWMONITORMIB_CipSecTunnelHistTable_CipSecTunnelHistEntry_CipSecTunHistTermReason represents 7 = operator initiated check point request

const (
	CISCOIPSECFLOWMONITORMIB_CipSecTunnelHistTable_CipSecTunnelHistEntry_CipSecTunHistTermReason_other CISCOIPSECFLOWMONITORMIB_CipSecTunnelHistTable_CipSecTunnelHistEntry_CipSecTunHistTermReason = "other"

	CISCOIPSECFLOWMONITORMIB_CipSecTunnelHistTable_CipSecTunnelHistEntry_CipSecTunHistTermReason_normal CISCOIPSECFLOWMONITORMIB_CipSecTunnelHistTable_CipSecTunnelHistEntry_CipSecTunHistTermReason = "normal"

	CISCOIPSECFLOWMONITORMIB_CipSecTunnelHistTable_CipSecTunnelHistEntry_CipSecTunHistTermReason_operRequest CISCOIPSECFLOWMONITORMIB_CipSecTunnelHistTable_CipSecTunnelHistEntry_CipSecTunHistTermReason = "operRequest"

	CISCOIPSECFLOWMONITORMIB_CipSecTunnelHistTable_CipSecTunnelHistEntry_CipSecTunHistTermReason_peerDelRequest CISCOIPSECFLOWMONITORMIB_CipSecTunnelHistTable_CipSecTunnelHistEntry_CipSecTunHistTermReason = "peerDelRequest"

	CISCOIPSECFLOWMONITORMIB_CipSecTunnelHistTable_CipSecTunnelHistEntry_CipSecTunHistTermReason_peerLost CISCOIPSECFLOWMONITORMIB_CipSecTunnelHistTable_CipSecTunnelHistEntry_CipSecTunHistTermReason = "peerLost"

	CISCOIPSECFLOWMONITORMIB_CipSecTunnelHistTable_CipSecTunnelHistEntry_CipSecTunHistTermReason_seqNumRollOver CISCOIPSECFLOWMONITORMIB_CipSecTunnelHistTable_CipSecTunnelHistEntry_CipSecTunHistTermReason = "seqNumRollOver"

	CISCOIPSECFLOWMONITORMIB_CipSecTunnelHistTable_CipSecTunnelHistEntry_CipSecTunHistTermReason_checkPointReq CISCOIPSECFLOWMONITORMIB_CipSecTunnelHistTable_CipSecTunnelHistEntry_CipSecTunHistTermReason = "checkPointReq"
)

type CISCOIPSECFLOWMONITORMIB_CipSecTunnelTable

type CISCOIPSECFLOWMONITORMIB_CipSecTunnelTable struct {
	EntityData types.CommonEntityData
	YFilter    yfilter.YFilter

	// Each entry contains the attributes associated with an active IPsec Phase-2
	// Tunnel. The type is slice of
	// CISCOIPSECFLOWMONITORMIB_CipSecTunnelTable_CipSecTunnelEntry.
	CipSecTunnelEntry []*CISCOIPSECFLOWMONITORMIB_CipSecTunnelTable_CipSecTunnelEntry
}

CISCOIPSECFLOWMONITORMIB_CipSecTunnelTable The IPsec Phase-2 Tunnel Table. There is one entry in this table for each active IPsec Phase-2 Tunnel.

func (*CISCOIPSECFLOWMONITORMIB_CipSecTunnelTable) GetEntityData

func (cipSecTunnelTable *CISCOIPSECFLOWMONITORMIB_CipSecTunnelTable) GetEntityData() *types.CommonEntityData

type CISCOIPSECFLOWMONITORMIB_CipSecTunnelTable_CipSecTunnelEntry

type CISCOIPSECFLOWMONITORMIB_CipSecTunnelTable_CipSecTunnelEntry struct {
	EntityData types.CommonEntityData
	YFilter    yfilter.YFilter
	YListKey   string

	// This attribute is a key. The index of the IPsec Phase-2 Tunnel Table. The
	// value of the index is a number which begins  at one and is incremented with
	// each tunnel that  is created. The value of this object will wrap  at
	// 2,147,483,647. The type is interface{} with range: 1..2147483647.
	CipSecTunIndex interface{}

	// The index of the associated IPsec Phase-1 IKE Tunnel.  (cikeTunIndex in the
	// cikeTunnelTable). The type is interface{} with range: 1..2147483647.
	CipSecTunIkeTunnelIndex interface{}

	// An indicator which specifies whether or not the IPsec Phase-1 IKE Tunnel
	// currently exists. The type is bool.
	CipSecTunIkeTunnelAlive interface{}

	// The IP address of the local endpoint for the IPsec Phase-2 Tunnel. The type
	// is string with length: 4..4 | 16..16.
	CipSecTunLocalAddr interface{}

	// The IP address of the remote endpoint for the IPsec Phase-2 Tunnel. The
	// type is string with length: 4..4 | 16..16.
	CipSecTunRemoteAddr interface{}

	// The type of key used by the IPsec Phase-2 Tunnel. The type is KeyType.
	CipSecTunKeyType interface{}

	// The encapsulation mode used by the IPsec Phase-2 Tunnel. The type is
	// EncapMode.
	CipSecTunEncapMode interface{}

	// The negotiated LifeSize of the IPsec Phase-2 Tunnel in kilobytes. The type
	// is interface{} with range: 1..2147483647. Units are KBytes.
	CipSecTunLifeSize interface{}

	// The negotiated LifeTime of the IPsec Phase-2 Tunnel in seconds. The type is
	// interface{} with range: 1..2147483647. Units are Seconds.
	CipSecTunLifeTime interface{}

	// The length of time the IPsec Phase-2 Tunnel has been  active in hundredths
	// of seconds. The type is interface{} with range: 0..2147483647.
	CipSecTunActiveTime interface{}

	// The security association LifeSize refresh threshold in kilobytes. The type
	// is interface{} with range: 1..2147483647. Units are KBytes.
	CipSecTunSaLifeSizeThreshold interface{}

	// The security association LifeTime refresh threshold in seconds. The type is
	// interface{} with range: 1..2147483647. Units are Seconds.
	CipSecTunSaLifeTimeThreshold interface{}

	// The total number of security association refreshes performed. The type is
	// interface{} with range: 0..4294967295. Units are QM Exchanges.
	CipSecTunTotalRefreshes interface{}

	// The total number of security associations which have expired. The type is
	// interface{} with range: 0..4294967295. Units are SAs.
	CipSecTunExpiredSaInstances interface{}

	// The number of security associations which are currently active or expiring.
	// The type is interface{} with range: 0..4294967295.
	CipSecTunCurrentSaInstances interface{}

	// The Diffie Hellman Group used by the inbound security association of the
	// IPsec Phase-2 Tunnel. The type is DiffHellmanGrp.
	CipSecTunInSaDiffHellmanGrp interface{}

	// The encryption algorithm used by the inbound security association of the
	// IPsec Phase-2 Tunnel. The type is EncryptAlgo.
	CipSecTunInSaEncryptAlgo interface{}

	// The authentication algorithm used by the inbound authentication header (AH)
	// security association of the IPsec Phase-2 Tunnel. The type is AuthAlgo.
	CipSecTunInSaAhAuthAlgo interface{}

	// The authentication algorithm used by the inbound encapsulation security
	// protocol (ESP) security  association of the IPsec Phase-2 Tunnel. The type
	// is AuthAlgo.
	CipSecTunInSaEspAuthAlgo interface{}

	// The decompression algorithm used by the inbound security association of the
	// IPsec Phase-2 Tunnel. The type is CompAlgo.
	CipSecTunInSaDecompAlgo interface{}

	// The Diffie Hellman Group used by the outbound security association of the
	// IPsec Phase-2 Tunnel. The type is DiffHellmanGrp.
	CipSecTunOutSaDiffHellmanGrp interface{}

	// The encryption algorithm used by the outbound security association of the
	// IPsec Phase-2 Tunnel. The type is EncryptAlgo.
	CipSecTunOutSaEncryptAlgo interface{}

	// The authentication algorithm used by the outbound authentication header
	// (AH) security association of the IPsec Phase-2 Tunnel. The type is
	// AuthAlgo.
	CipSecTunOutSaAhAuthAlgo interface{}

	// The authentication algorithm used by the inbound encapsulation security
	// protocol (ESP)  security association of the IPsec Phase-2 Tunnel. The type
	// is AuthAlgo.
	CipSecTunOutSaEspAuthAlgo interface{}

	// The compression algorithm used by the inbound security association of the
	// IPsec Phase-2 Tunnel. The type is CompAlgo.
	CipSecTunOutSaCompAlgo interface{}

	// The total number of octets received by this IPsec Phase-2 Tunnel.  This
	// value is accumulated BEFORE determining whether or not the packet should be
	// decompressed.  See also cipSecTunInOctWraps for the number of times this
	// counter has wrapped. The type is interface{} with range: 0..4294967295.
	// Units are Octets.
	CipSecTunInOctets interface{}

	// A high capacity count of the total number of octets received by this IPsec
	// Phase-2 Tunnel.  This value is accumulated BEFORE determining whether or
	// not the packet should be decompressed. The type is interface{} with range:
	// 0..18446744073709551615. Units are Octets.
	CipSecTunHcInOctets interface{}

	// The number of times the octets received counter (cipSecTunInOctets) has
	// wrapped. The type is interface{} with range: 0..4294967295. Units are
	// Integral units.
	CipSecTunInOctWraps interface{}

	// The total number of decompressed octets received by this IPsec Phase-2
	// Tunnel. This value is  accumulated AFTER the packet is decompressed.  If
	// compression is not being  used, this value will match the value of
	// cipSecTunInOctets.  See also cipSecTunInDecompOctWraps   for the number of
	// times  this counter has wrapped. The type is interface{} with range:
	// 0..4294967295. Units are Octets.
	CipSecTunInDecompOctets interface{}

	// A high capacity count of the total number of decompressed octets received
	// by this IPsec Phase-2 Tunnel.  This value is accumulated AFTER the packet
	// is decompressed. If compression is not being used, this value will match
	// the value of cipSecTunHcInOctets. The type is interface{} with range:
	// 0..18446744073709551615.
	CipSecTunHcInDecompOctets interface{}

	// The number of times the decompressed octets received counter
	// (cipSecTunInDecompOctets) has wrapped. The type is interface{} with range:
	// 0..4294967295. Units are Integral units.
	CipSecTunInDecompOctWraps interface{}

	// The total number of packets received by this IPsec Phase-2 Tunnel. The type
	// is interface{} with range: 0..4294967295. Units are Packets.
	CipSecTunInPkts interface{}

	// The total number of packets dropped during receive processing by this IPsec
	// Phase-2  Tunnel. This count does NOT include  packets dropped due to
	// Anti-Replay processing. The type is interface{} with range: 0..4294967295.
	// Units are Packets.
	CipSecTunInDropPkts interface{}

	// The total number of packets dropped during receive processing due to
	// Anti-Replay processing  by this IPsec Phase-2 Tunnel. The type is
	// interface{} with range: 0..4294967295. Units are Packets.
	CipSecTunInReplayDropPkts interface{}

	// The total number of inbound authentication's performed by this  IPsec
	// Phase-2 Tunnel. The type is interface{} with range: 0..4294967295. Units
	// are Events.
	CipSecTunInAuths interface{}

	// The total number of inbound authentication's which ended in  failure by
	// this IPsec Phase-2 Tunnel . The type is interface{} with range:
	// 0..4294967295. Units are Failures.
	CipSecTunInAuthFails interface{}

	// The total number of inbound decryption's performed by this IPsec Phase-2
	// Tunnel. The type is interface{} with range: 0..4294967295. Units are
	// Packets.
	CipSecTunInDecrypts interface{}

	// The total number of inbound decryption's which ended in failure  by this
	// IPsec Phase-2 Tunnel. The type is interface{} with range: 0..4294967295.
	// Units are Failures.
	CipSecTunInDecryptFails interface{}

	// The total number of octets sent by this IPsec Phase-2 Tunnel.  This value
	// is accumulated AFTER determining whether or not the packet should  be
	// compressed.  See also cipSecTunOutOctWraps for the number of times this
	// counter has wrapped. The type is interface{} with range: 0..4294967295.
	// Units are Octets.
	CipSecTunOutOctets interface{}

	// A high capacity count of the total number of octets sent by this IPsec
	// Phase-2 Tunnel.  This value is accumulated AFTER determining whether or not
	// the  packet should be compressed. The type is interface{} with range:
	// 0..18446744073709551615.
	CipSecTunHcOutOctets interface{}

	// The number of times the out octets counter (cipSecTunOutOctets) has
	// wrapped. The type is interface{} with range: 0..4294967295. Units are
	// Integral units.
	CipSecTunOutOctWraps interface{}

	// The total number of uncompressed octets sent by this IPsec Phase-2 Tunnel.
	// This value  is accumulated BEFORE the packet is compressed.  If compression
	// is not being used, this value  will match the value of cipSecTunOutOctets.
	// See also cipSecTunOutDecompOctWraps for the   number of times this counter
	// has wrapped. The type is interface{} with range: 0..4294967295. Units are
	// Octets.
	CipSecTunOutUncompOctets interface{}

	// A high capacity count of the total number of uncompressed octets sent by
	// this IPsec  Phase-2 Tunnel.  This value is accumulated BEFORE  the packet
	// is compressed. If compression  is not being used, this value will match the
	// value  of cipSecTunHcOutOctets. The type is interface{} with range:
	// 0..18446744073709551615.
	CipSecTunHcOutUncompOctets interface{}

	// The number of times the uncompressed octets sent counter
	// (cipSecTunOutUncompOctets) has wrapped. The type is interface{} with range:
	// 0..4294967295. Units are Integral units.
	CipSecTunOutUncompOctWraps interface{}

	// The total number of packets sent by this IPsec Phase-2 Tunnel. The type is
	// interface{} with range: 0..4294967295. Units are Packets.
	CipSecTunOutPkts interface{}

	// The total number of packets dropped during send processing by this IPsec
	// Phase-2 Tunnel. The type is interface{} with range: 0..4294967295. Units
	// are Packets.
	CipSecTunOutDropPkts interface{}

	// The total number of outbound authentication's performed by this IPsec
	// Phase-2 Tunnel. The type is interface{} with range: 0..4294967295. Units
	// are Events.
	CipSecTunOutAuths interface{}

	// The total number of outbound authentication's which ended in failure  by
	// this IPsec Phase-2 Tunnel. The type is interface{} with range:
	// 0..4294967295. Units are Failures.
	CipSecTunOutAuthFails interface{}

	// The total number of outbound encryption's performed by this IPsec Phase-2
	// Tunnel. The type is interface{} with range: 0..4294967295. Units are
	// Packets.
	CipSecTunOutEncrypts interface{}

	// The total number of outbound encryption's which ended in failure by this
	// IPsec Phase-2 Tunnel. The type is interface{} with range: 0..4294967295.
	// Units are Failures.
	CipSecTunOutEncryptFails interface{}

	// The status of the MIB table row.  This object can be used to bring the
	// tunnel down by setting value of this object to destroy(2). When the value
	// is set to destroy(2), the SA bundle is destroyed and this row is deleted
	// from this table.  When this MIB value is queried, the value of active(1) is
	// always returned, if the instance  exists.  This object cannot be used to
	// create a MIB  table row. The type is TunnelStatus.
	CipSecTunStatus interface{}
}

CISCOIPSECFLOWMONITORMIB_CipSecTunnelTable_CipSecTunnelEntry Each entry contains the attributes associated with an active IPsec Phase-2 Tunnel.

func (*CISCOIPSECFLOWMONITORMIB_CipSecTunnelTable_CipSecTunnelEntry) GetEntityData

type CompAlgo

type CompAlgo string

CompAlgo represents security association of an IPsec Phase-2 Tunnel.

const (
	CompAlgo_none CompAlgo = "none"

	CompAlgo_ldf CompAlgo = "ldf"
)

type DiffHellmanGrp

type DiffHellmanGrp string

DiffHellmanGrp represents The Diffie Hellman Group used in negotiations.

const (
	DiffHellmanGrp_none DiffHellmanGrp = "none"

	DiffHellmanGrp_dhGroup1 DiffHellmanGrp = "dhGroup1"

	DiffHellmanGrp_dhGroup2 DiffHellmanGrp = "dhGroup2"
)

type EncapMode

type EncapMode string

EncapMode represents Tunnel.

const (
	EncapMode_tunnel EncapMode = "tunnel"

	EncapMode_transport EncapMode = "transport"
)

type EncryptAlgo

type EncryptAlgo string

EncryptAlgo represents The encryption algorithm used in negotiations.

const (
	EncryptAlgo_none EncryptAlgo = "none"

	EncryptAlgo_des EncryptAlgo = "des"

	EncryptAlgo_des3 EncryptAlgo = "des3"
)

type EndPtType

type EndPtType string

EndPtType represents The type of identity use to specify an IPsec End Point.

const (
	EndPtType_singleIpAddr EndPtType = "singleIpAddr"

	EndPtType_ipAddrRange EndPtType = "ipAddrRange"

	EndPtType_ipSubnet EndPtType = "ipSubnet"
)

type IkeAuthMethod

type IkeAuthMethod string

IkeAuthMethod represents negotiations.

const (
	IkeAuthMethod_none IkeAuthMethod = "none"

	IkeAuthMethod_preSharedKey IkeAuthMethod = "preSharedKey"

	IkeAuthMethod_rsaSig IkeAuthMethod = "rsaSig"

	IkeAuthMethod_rsaEncrypt IkeAuthMethod = "rsaEncrypt"

	IkeAuthMethod_revPublicKey IkeAuthMethod = "revPublicKey"
)

type IkeHashAlgo

type IkeHashAlgo string

IkeHashAlgo represents IKE negotiations.

const (
	IkeHashAlgo_none IkeHashAlgo = "none"

	IkeHashAlgo_md5 IkeHashAlgo = "md5"

	IkeHashAlgo_sha IkeHashAlgo = "sha"
)

type IkeNegoMode

type IkeNegoMode string

IkeNegoMode represents The IPsec Phase-1 IKE negotiation mode.

const (
	IkeNegoMode_main IkeNegoMode = "main"

	IkeNegoMode_aggressive IkeNegoMode = "aggressive"
)

type IkePeerType

type IkePeerType string

IkePeerType represents 2. a host name.

const (
	IkePeerType_ipAddrPeer IkePeerType = "ipAddrPeer"

	IkePeerType_namePeer IkePeerType = "namePeer"
)

type KeyType

type KeyType string

KeyType represents The type of key used by an IPsec Phase-2 Tunnel.

const (
	KeyType_ike KeyType = "ike"

	KeyType_manual KeyType = "manual"
)

type TrapStatus

type TrapStatus string

TrapStatus represents The administrative status for sending a TRAP.

const (
	TrapStatus_enabled TrapStatus = "enabled"

	TrapStatus_disabled TrapStatus = "disabled"
)

type TunnelStatus

type TunnelStatus string

TunnelStatus represents type cannot be used to create a Tunnel.

const (
	TunnelStatus_active TunnelStatus = "active"

	TunnelStatus_destroy TunnelStatus = "destroy"
)

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL