cisco_ipsec_policy_map_mib

package
v0.0.0-...-50def94 Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: Nov 2, 2023 License: Apache-2.0 Imports: 6 Imported by: 0

Documentation

Overview

The MIB module maps the IPSec entities created dynamically to the policy entities that caused them. This is an appendix to the IPSEC-MONITOR-MIB that has been proposed to IETF for monitoring IPSec based Virtual Private Networks.

Overview of Cisco IPsec Policy Map MIB

MIB description

There are two components to this MIB:

#1 a table that maps an IPSec Phase-1
   tunnel to the Internet Security Association
   and Key Exchange (ISAKMP) Policy

and

#2 a table that maps an IPSec Phase-2
   tunnel to the corresponding IPSec Policy
   element - called 'cryptomaps' - in IOS
   (Internet Operating System)

The first mappin (also called Internet Key Exchange

or IKE mapping) yields, given the index of

the IKE tunnel in the ikeTunnelTable (IPSEC-MONITOR-MIB), the ISAKMP policy definition defined using the CLI on the managed entity.

The IPSec mapping yields, given the index of the IPSec tunnel in the ipSecTunnelTable (IPSEC-MONITOR-MIB), the IPSec transform and the cryptomap definition that gave rise to this tunnel.

In implementation and usage, this MIB cannot exist independent of the IPSEC-MONITOR-MIB.

Index

Constants

This section is empty.

Variables

This section is empty.

Functions

This section is empty.

Types

type CISCOIPSECPOLICYMAPMIB

type CISCOIPSECPOLICYMAPMIB struct {
	EntityData types.CommonEntityData
	YFilter    yfilter.YFilter

	// The IPSec Phase-1 Internet Key Exchange Tunnel to Policy Mapping Table.
	// There is one entry in this table for each active IPSec Phase-1 Tunnel.
	IkePolMapTable CISCOIPSECPOLICYMAPMIB_IkePolMapTable

	// The IPSec Phase-2 Tunnel to Policy Mapping Table. There is one entry in
	// this table for each active IPSec Phase-2 Tunnel.
	IpSecPolMapTable CISCOIPSECPOLICYMAPMIB_IpSecPolMapTable
}

CISCOIPSECPOLICYMAPMIB

func (*CISCOIPSECPOLICYMAPMIB) GetEntityData

func (cISCOIPSECPOLICYMAPMIB *CISCOIPSECPOLICYMAPMIB) GetEntityData() *types.CommonEntityData

type CISCOIPSECPOLICYMAPMIB_IkePolMapTable

type CISCOIPSECPOLICYMAPMIB_IkePolMapTable struct {
	EntityData types.CommonEntityData
	YFilter    yfilter.YFilter

	// Each entry contains the attributes associated with mapping an active IPSec
	// Phase-1 IKE Tunnel to it's configured Policy definition. The type is slice
	// of CISCOIPSECPOLICYMAPMIB_IkePolMapTable_IkePolMapEntry.
	IkePolMapEntry []*CISCOIPSECPOLICYMAPMIB_IkePolMapTable_IkePolMapEntry
}

CISCOIPSECPOLICYMAPMIB_IkePolMapTable The IPSec Phase-1 Internet Key Exchange Tunnel to Policy Mapping Table. There is one entry in this table for each active IPSec Phase-1 Tunnel.

func (*CISCOIPSECPOLICYMAPMIB_IkePolMapTable) GetEntityData

func (ikePolMapTable *CISCOIPSECPOLICYMAPMIB_IkePolMapTable) GetEntityData() *types.CommonEntityData

type CISCOIPSECPOLICYMAPMIB_IkePolMapTable_IkePolMapEntry

type CISCOIPSECPOLICYMAPMIB_IkePolMapTable_IkePolMapEntry struct {
	EntityData types.CommonEntityData
	YFilter    yfilter.YFilter
	YListKey   string

	// This attribute is a key. The index of the IPSec Phase-1 Tunnel to Policy
	// Map Table.  The value of the index is the number used to represent this
	// IPSec Phase-1 Tunnel in the IPSec MIB (ikeTunIndex in the ikeTunnelTable).
	// The type is interface{} with range: 1..2147483647.
	IkePolMapTunIndex interface{}

	// The number of the locally defined ISAKMP policy used to establish the IPSec
	// IKE Phase-1 Tunnel. This is the number which was used on the crypto
	// command. For example, if the configuration command was:   ==>  crypto
	// isakmp policy 15  then the value of this object would be 15. If ISAKMP was
	// not used to establish this tunnel, then the value of this object will be
	// zero. The type is interface{} with range: 1..2147483647.
	IkePolMapPolicyNum interface{}
}

CISCOIPSECPOLICYMAPMIB_IkePolMapTable_IkePolMapEntry Each entry contains the attributes associated with mapping an active IPSec Phase-1 IKE Tunnel to it's configured Policy definition.

func (*CISCOIPSECPOLICYMAPMIB_IkePolMapTable_IkePolMapEntry) GetEntityData

type CISCOIPSECPOLICYMAPMIB_IpSecPolMapTable

type CISCOIPSECPOLICYMAPMIB_IpSecPolMapTable struct {
	EntityData types.CommonEntityData
	YFilter    yfilter.YFilter

	// Each entry contains the attributes associated with mapping an active IPSec
	// Phase-2 Tunnel to its configured Policy definition. The type is slice of
	// CISCOIPSECPOLICYMAPMIB_IpSecPolMapTable_IpSecPolMapEntry.
	IpSecPolMapEntry []*CISCOIPSECPOLICYMAPMIB_IpSecPolMapTable_IpSecPolMapEntry
}

CISCOIPSECPOLICYMAPMIB_IpSecPolMapTable The IPSec Phase-2 Tunnel to Policy Mapping Table. There is one entry in this table for each active IPSec Phase-2 Tunnel.

func (*CISCOIPSECPOLICYMAPMIB_IpSecPolMapTable) GetEntityData

func (ipSecPolMapTable *CISCOIPSECPOLICYMAPMIB_IpSecPolMapTable) GetEntityData() *types.CommonEntityData

type CISCOIPSECPOLICYMAPMIB_IpSecPolMapTable_IpSecPolMapEntry

type CISCOIPSECPOLICYMAPMIB_IpSecPolMapTable_IpSecPolMapEntry struct {
	EntityData types.CommonEntityData
	YFilter    yfilter.YFilter
	YListKey   string

	// This attribute is a key. The index of the IPSec Phase-2 Tunnel to Policy
	// Map Table. The value of the index is the number used to represent this
	// IPSec Phase-2 Tunnel in the IPSec MIB (ipSecTunIndex in the
	// ipSecTunnelTable). The type is interface{} with range: 1..2147483647.
	IpSecPolMapTunIndex interface{}

	// The value of this object should be the name of  the IPSec Policy
	// (cryptomap) as assigned by the  operator while configuring the policy of
	// the IPSec traffic.  For instance, on an IOS router, the if the command
	// entered to configure the IPSec policy was   ==>  crypto map ftpPolicy 10
	// ipsec-isakmp  then the value of this object would be 'ftpPolicy'. The type
	// is string.
	IpSecPolMapCryptoMapName interface{}

	// The value of this object should be the priority of the IPSec Policy
	// (cryptomap) assigned by the  operator while configuring the policy of  this
	// IPSec tunnel.  For instance, on an IOS router, the if the command entered
	// to configure the IPSec policy was   ==>  crypto map ftpPolicy 10
	// ipsec-isakmp  then the value of this object would be 10. The type is
	// interface{} with range: 1..2147483647.
	IpSecPolMapCryptoMapNum interface{}

	// The value of this object is the number or the name of the access control
	// string (ACL)  that caused this IPSec tunnel to be established.   The ACL
	// that causes an IPSec tunnel  to be established is referenced by the
	// cryptomap of the tunnel.   The ACL identifies the traffic that requires
	// protection as defined by the policy.   For instance, the ACL that requires
	// FTP  traffic between local subnet 172.16.14.0 and a  remote subnet
	// 172.16.16.0 to be protected  is defined as   ==>access-list 101 permit tcp
	// 172.16.14.0 0.0.0.255                   172.16.16.0 0.0.0.255 eq ftp   When
	// this command causes an IPSec tunnel to be   established, the object
	// 'ipSecPolMapAclString'   assumes the string value '101'.   If the ACL is a
	// named list such as   ==> ip access-list standard myAcl        permit
	// 172.16.16.8 0.0.0.0   then the value of this MIB element corresponding to
	// IPSec tunnel that was created by this ACL would   be 'myAcl'. The type is
	// string.
	IpSecPolMapAclString interface{}

	// The value of this object is the access control  entry (ACE) within the ACL
	// that caused this IPSec  tunnel to be established.   For instance, if an ACL
	// defines access for two traffic streams (FTP and SNMP) as follows:
	// access-list 101 permit tcp 172.16.14.0 0.0.0.255
	// 172.16.16.0 0.0.0.255 eq ftp access-list 101 permit udp 172.16.14.0
	// 0.0.0.255                  host 172.16.16.1 eq 161   When associated with
	// an IPSec policy, the second element of the ACL gives rise to an IPSec
	// tunnel in the wake of SNMP traffic. The value of the object
	// 'ipSecPolMapAceString' for the IPSec tunnel would be then the string
	// 'access-list 101 permit udp 172.16.14.0 0.0.0.255                  host
	// 172.16.16.1 eq 161'. The type is string.
	IpSecPolMapAceString interface{}
}

CISCOIPSECPOLICYMAPMIB_IpSecPolMapTable_IpSecPolMapEntry Each entry contains the attributes associated with mapping an active IPSec Phase-2 Tunnel to its configured Policy definition.

func (*CISCOIPSECPOLICYMAPMIB_IpSecPolMapTable_IpSecPolMapEntry) GetEntityData

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL