cisco_ipsec_mib

package
v0.0.0-...-50def94 Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: Nov 2, 2023 License: Apache-2.0 Imports: 6 Imported by: 0

Documentation

Overview

The MIB module for modeling Cisco-specific IPsec attributes

Overview of Cisco IPsec MIB

MIB description

This MIB models the Cisco implementation-specific attributes of a Cisco entity that implements IPsec. This MIB is complementary to the standard IPsec MIB proposed jointly by Tivoli and Cisco.

The ciscoIPsec MIB provides the operational information on Cisco's IPsec tunnelling implementation. The following entities are managed: 1) ISAKMP Group: a) ISAKMP global parameters b) ISAKMP Policy Table

2) IPSec Group: a) IPSec Global Parameters b) IPSec Global Traffic Parameters c) Cryptomap Group - Cryptomap Set Table - Cryptomap Table - CryptomapSet Binding Table

3) System Capacity & Capability Group: a) Capacity Parameters b) Capability Parameters

4) Trap Control Group 5) Notifications Group

Index

Constants

This section is empty.

Variables

This section is empty.

Functions

This section is empty.

Types

type CISCOIPSECMIB

type CISCOIPSECMIB struct {
	EntityData types.CommonEntityData
	YFilter    yfilter.YFilter

	CipsIsakmpGroup CISCOIPSECMIB_CipsIsakmpGroup

	CipsIPsecGlobals CISCOIPSECMIB_CipsIPsecGlobals

	CipsIPsecStatistics CISCOIPSECMIB_CipsIPsecStatistics

	CipsSysCapacityGroup CISCOIPSECMIB_CipsSysCapacityGroup

	CipsTrapCntlGroup CISCOIPSECMIB_CipsTrapCntlGroup

	// The table containing the list of all ISAKMP policy entries configured by
	// the operator.
	CipsIsakmpPolicyTable CISCOIPSECMIB_CipsIsakmpPolicyTable

	// The table containing the list of all cryptomap sets that are fully
	// specified and are not wild-carded.  The operator may include different
	// types of cryptomaps in such a set - manual, CET, ISAKMP or dynamic.
	CipsStaticCryptomapSetTable CISCOIPSECMIB_CipsStaticCryptomapSetTable

	// The table containing the list of all dynamic cryptomaps that use IKE,
	// defined on   the managed entity.
	CipsDynamicCryptomapSetTable CISCOIPSECMIB_CipsDynamicCryptomapSetTable

	// The table ilisting the member cryptomaps of the cryptomap sets that are
	// configured on the managed entity.
	CipsStaticCryptomapTable CISCOIPSECMIB_CipsStaticCryptomapTable

	// The table lists the binding of cryptomap sets to the interfaces of the
	// managed entity.
	CipsCryptomapSetIfTable CISCOIPSECMIB_CipsCryptomapSetIfTable
}

CISCOIPSECMIB

func (*CISCOIPSECMIB) GetEntityData

func (cISCOIPSECMIB *CISCOIPSECMIB) GetEntityData() *types.CommonEntityData

type CISCOIPSECMIB_CipsCryptomapSetIfTable

type CISCOIPSECMIB_CipsCryptomapSetIfTable struct {
	EntityData types.CommonEntityData
	YFilter    yfilter.YFilter

	// Each entry contains the record of the association between an interface and
	// a cryptomap set (static) that is defined on the managed entity.  Note that
	// the cryptomap set identified in  this binding must static. Dynamic
	// cryptomaps cannot be bound to interfaces. The type is slice of
	// CISCOIPSECMIB_CipsCryptomapSetIfTable_CipsCryptomapSetIfEntry.
	CipsCryptomapSetIfEntry []*CISCOIPSECMIB_CipsCryptomapSetIfTable_CipsCryptomapSetIfEntry
}

CISCOIPSECMIB_CipsCryptomapSetIfTable The table lists the binding of cryptomap sets to the interfaces of the managed entity.

func (*CISCOIPSECMIB_CipsCryptomapSetIfTable) GetEntityData

func (cipsCryptomapSetIfTable *CISCOIPSECMIB_CipsCryptomapSetIfTable) GetEntityData() *types.CommonEntityData

type CISCOIPSECMIB_CipsCryptomapSetIfTable_CipsCryptomapSetIfEntry

type CISCOIPSECMIB_CipsCryptomapSetIfTable_CipsCryptomapSetIfEntry struct {
	EntityData types.CommonEntityData
	YFilter    yfilter.YFilter
	YListKey   string

	// This attribute is a key. The type is string with range: 1..2147483647.
	// Refers to if_mib.IFMIB_IfTable_IfEntry_IfIndex
	IfIndex interface{}

	// This attribute is a key. The type is string. Refers to
	// cisco_ipsec_mib.CISCOIPSECMIB_CipsStaticCryptomapSetTable_CipsStaticCryptomapSetEntry_CipsStaticCryptomapSetName
	CipsStaticCryptomapSetName interface{}

	// The value of this object identifies if the interface to which the cryptomap
	// set is attached is a tunnel (such as a GRE or PPTP tunnel). The type is
	// bool.
	CipsCryptomapSetIfVirtual interface{}

	// This object identifies the status of the binding  of the specified
	// cryptomap set with the specified interface. The value when queried is
	// always 'attached'.  When set to 'detached', the cryptomap set if detached
	// from the specified interface. The effect of this is same  as the CLI
	// command  	config-if# no crypto map cryptomapSetName  Setting the value to
	// 'attached' will result in  SNMP General Error. The type is
	// CryptomapSetBindStatus.
	CipsCryptomapSetIfStatus interface{}
}

CISCOIPSECMIB_CipsCryptomapSetIfTable_CipsCryptomapSetIfEntry Each entry contains the record of the association between an interface and a cryptomap set (static) that is defined on the managed entity.

Note that the cryptomap set identified in this binding must static. Dynamic cryptomaps cannot be bound to interfaces.

func (*CISCOIPSECMIB_CipsCryptomapSetIfTable_CipsCryptomapSetIfEntry) GetEntityData

type CISCOIPSECMIB_CipsDynamicCryptomapSetTable

type CISCOIPSECMIB_CipsDynamicCryptomapSetTable struct {
	EntityData types.CommonEntityData
	YFilter    yfilter.YFilter

	// Each entry contains the attributes associated with a single dynamic
	// cryptomap template. The type is slice of
	// CISCOIPSECMIB_CipsDynamicCryptomapSetTable_CipsDynamicCryptomapSetEntry.
	CipsDynamicCryptomapSetEntry []*CISCOIPSECMIB_CipsDynamicCryptomapSetTable_CipsDynamicCryptomapSetEntry
}

CISCOIPSECMIB_CipsDynamicCryptomapSetTable The table containing the list of all dynamic cryptomaps that use IKE, defined on

the managed entity.

func (*CISCOIPSECMIB_CipsDynamicCryptomapSetTable) GetEntityData

func (cipsDynamicCryptomapSetTable *CISCOIPSECMIB_CipsDynamicCryptomapSetTable) GetEntityData() *types.CommonEntityData

type CISCOIPSECMIB_CipsDynamicCryptomapSetTable_CipsDynamicCryptomapSetEntry

type CISCOIPSECMIB_CipsDynamicCryptomapSetTable_CipsDynamicCryptomapSetEntry struct {
	EntityData types.CommonEntityData
	YFilter    yfilter.YFilter
	YListKey   string

	// This attribute is a key. The index of the dynamic cryptomap table.  The
	// value of the string is the one assigned  by the operator in defining the
	// cryptomap set. The type is string.
	CipsDynamicCryptomapSetName interface{}

	// The number of cryptomap entries in this cryptomap. The type is interface{}
	// with range: 0..4294967295.
	CipsDynamicCryptomapSetSize interface{}

	// The number of static cryptomap sets with which this dynamic cryptomap is
	// associated.  . The type is interface{} with range: 0..4294967295.
	CipsDynamicCryptomapSetNumAssoc interface{}
}

CISCOIPSECMIB_CipsDynamicCryptomapSetTable_CipsDynamicCryptomapSetEntry Each entry contains the attributes associated with a single dynamic cryptomap template.

func (*CISCOIPSECMIB_CipsDynamicCryptomapSetTable_CipsDynamicCryptomapSetEntry) GetEntityData

type CISCOIPSECMIB_CipsIPsecGlobals

type CISCOIPSECMIB_CipsIPsecGlobals struct {
	EntityData types.CommonEntityData
	YFilter    yfilter.YFilter

	// The default lifetime (in seconds) assigned  to an SA as a global policy
	// (maybe overridden  in specific cryptomap definitions). The type is
	// interface{} with range: 120..86400. Units are Seconds.
	CipsSALifetime interface{}

	// The default lifesize in KBytes assigned to an SA  as a global policy
	// (unless overridden in cryptomap  definition). The type is interface{} with
	// range: 2560..536870912. Units are KBytes.
	CipsSALifesize interface{}

	// The number of Cryptomap Sets that are are fully configured. Statically
	// defined cryptomap sets  are ones where the operator has fully specified all
	// the parameters required set up IPSec  Virtual Private Networks (VPNs). The
	// type is interface{} with range: 0..2147483647. Units are Integral Units.
	CipsNumStaticCryptomapSets interface{}

	// The number of static Cryptomap Sets that have  at least one CET cryptomap
	// element as a member of the set. The type is interface{} with range:
	// 0..2147483647. Units are Integral Units.
	CipsNumCETCryptomapSets interface{}

	// The number of dynamic IPSec Policy templates (called 'dynamic cryptomap
	// templates') configured on the managed entity. The type is interface{} with
	// range: 0..2147483647. Units are Integral Units.
	CipsNumDynamicCryptomapSets interface{}

	// The number of static Cryptomap Sets that have  at least one dynamic
	// cryptomap template  bound to them which has the Tunnel Endpoint Discovery
	// (TED) enabled. The type is interface{} with range: 0..2147483647. Units are
	// Integral Units.
	CipsNumTEDCryptomapSets interface{}
}

CISCOIPSECMIB_CipsIPsecGlobals

func (*CISCOIPSECMIB_CipsIPsecGlobals) GetEntityData

func (cipsIPsecGlobals *CISCOIPSECMIB_CipsIPsecGlobals) GetEntityData() *types.CommonEntityData

type CISCOIPSECMIB_CipsIPsecStatistics

type CISCOIPSECMIB_CipsIPsecStatistics struct {
	EntityData types.CommonEntityData
	YFilter    yfilter.YFilter

	// The number of TED probes that were received by this  managed entity since
	// bootup. Not affected by any  CLI operation. The type is interface{} with
	// range: 0..4294967295. Units are Integral Units.
	CipsNumTEDProbesReceived interface{}

	// The number of TED probes that were dispatched by all the dynamic cryptomaps
	// in this managed entity since  bootup. Not affected by any CLI operation.
	// The type is interface{} with range: 0..4294967295. Units are Integral
	// Units.
	CipsNumTEDProbesSent interface{}

	// The number of TED probes that were dispatched by  the local entity and that
	// failed to locate crypto  endpoint.  Not affected by any CLI operation. The
	// type is interface{} with range: 0..4294967295. Units are Integral Units.
	CipsNumTEDFailures interface{}
}

CISCOIPSECMIB_CipsIPsecStatistics

func (*CISCOIPSECMIB_CipsIPsecStatistics) GetEntityData

func (cipsIPsecStatistics *CISCOIPSECMIB_CipsIPsecStatistics) GetEntityData() *types.CommonEntityData

type CISCOIPSECMIB_CipsIsakmpGroup

type CISCOIPSECMIB_CipsIsakmpGroup struct {
	EntityData types.CommonEntityData
	YFilter    yfilter.YFilter

	// The value of this object is TRUE if ISAKMP has been enabled on the managed
	// entity. Otherise the value of this object is FALSE. The type is bool.
	CipsIsakmpEnabled interface{}

	// The value of this object is shows the type of identity used by the managed
	// entity in ISAKMP negotiations with another peer. The type is
	// IkeIdentityType.
	CipsIsakmpIdentity interface{}

	// The value of this object is time interval in seconds between successive
	// ISAKMP keepalive heartbeats issued to the peers to which IKE tunnels have
	// been setup. The type is interface{} with range: 10..3600. Units are
	// seconds.
	CipsIsakmpKeepaliveInterval interface{}

	// The value of this object is the number of ISAKMP policies that have been
	// configured on the  managed entity. The type is interface{} with range:
	// 0..2147483647.
	CipsNumIsakmpPolicies interface{}
}

CISCOIPSECMIB_CipsIsakmpGroup

func (*CISCOIPSECMIB_CipsIsakmpGroup) GetEntityData

func (cipsIsakmpGroup *CISCOIPSECMIB_CipsIsakmpGroup) GetEntityData() *types.CommonEntityData

type CISCOIPSECMIB_CipsIsakmpPolicyTable

type CISCOIPSECMIB_CipsIsakmpPolicyTable struct {
	EntityData types.CommonEntityData
	YFilter    yfilter.YFilter

	// Each entry contains the attributes  associated with a single ISAKMP Policy
	// entry. The type is slice of
	// CISCOIPSECMIB_CipsIsakmpPolicyTable_CipsIsakmpPolicyEntry.
	CipsIsakmpPolicyEntry []*CISCOIPSECMIB_CipsIsakmpPolicyTable_CipsIsakmpPolicyEntry
}

CISCOIPSECMIB_CipsIsakmpPolicyTable The table containing the list of all ISAKMP policy entries configured by the operator.

func (*CISCOIPSECMIB_CipsIsakmpPolicyTable) GetEntityData

func (cipsIsakmpPolicyTable *CISCOIPSECMIB_CipsIsakmpPolicyTable) GetEntityData() *types.CommonEntityData

type CISCOIPSECMIB_CipsIsakmpPolicyTable_CipsIsakmpPolicyEntry

type CISCOIPSECMIB_CipsIsakmpPolicyTable_CipsIsakmpPolicyEntry struct {
	EntityData types.CommonEntityData
	YFilter    yfilter.YFilter
	YListKey   string

	// This attribute is a key. The priotity of this ISAKMP Policy entry. This is
	// also the index of this table. The type is interface{} with range: 0..65535.
	CipsIsakmpPolPriority interface{}

	// The encryption transform specified by this  ISAKMP policy specification.
	// The Internet Key Exchange (IKE) tunnels setup using this policy item would
	// use the specified encryption transform to protect the ISAKMP PDUs. The type
	// is EncryptAlgo.
	CipsIsakmpPolEncr interface{}

	// The hash transform specified by this  ISAKMP policy specification. The IKE
	// tunnels setup using this policy item would use the  specified hash
	// transform to protect the ISAKMP PDUs. The type is IkeHashAlgo.
	CipsIsakmpPolHash interface{}

	// The peer authentication mthod specified by this ISAKMP policy
	// specification. If this policy entity is selected for negotiation with a
	// peer, the local entity would authenticate the peer using  the method
	// specified by this object. The type is IkeAuthMethod.
	CipsIsakmpPolAuth interface{}

	// This object specifies the Oakley group used  for Diffie Hellman exchange in
	// the Main Mode.  If this policy item is selected to negotiate Main Mode with
	// an IKE peer, the local entity  chooses the group specified by this object
	// to perform Diffie Hellman exchange with the peer. The type is
	// DiffHellmanGrp.
	CipsIsakmpPolGroup interface{}

	// This object specifies the lifetime in seconds of the IKE tunnels generated
	// using this  policy specification. The type is interface{} with range:
	// 60..86400. Units are seconds.
	CipsIsakmpPolLifetime interface{}
}

CISCOIPSECMIB_CipsIsakmpPolicyTable_CipsIsakmpPolicyEntry Each entry contains the attributes associated with a single ISAKMP Policy entry.

func (*CISCOIPSECMIB_CipsIsakmpPolicyTable_CipsIsakmpPolicyEntry) GetEntityData

type CISCOIPSECMIB_CipsStaticCryptomapSetTable

type CISCOIPSECMIB_CipsStaticCryptomapSetTable struct {
	EntityData types.CommonEntityData
	YFilter    yfilter.YFilter

	// Each entry contains the attributes  associated with a single static
	// cryptomap set. The type is slice of
	// CISCOIPSECMIB_CipsStaticCryptomapSetTable_CipsStaticCryptomapSetEntry.
	CipsStaticCryptomapSetEntry []*CISCOIPSECMIB_CipsStaticCryptomapSetTable_CipsStaticCryptomapSetEntry
}

CISCOIPSECMIB_CipsStaticCryptomapSetTable The table containing the list of all cryptomap sets that are fully specified and are not wild-carded.

The operator may include different types of cryptomaps in such a set - manual, CET, ISAKMP or dynamic.

func (*CISCOIPSECMIB_CipsStaticCryptomapSetTable) GetEntityData

func (cipsStaticCryptomapSetTable *CISCOIPSECMIB_CipsStaticCryptomapSetTable) GetEntityData() *types.CommonEntityData

type CISCOIPSECMIB_CipsStaticCryptomapSetTable_CipsStaticCryptomapSetEntry

type CISCOIPSECMIB_CipsStaticCryptomapSetTable_CipsStaticCryptomapSetEntry struct {
	EntityData types.CommonEntityData
	YFilter    yfilter.YFilter
	YListKey   string

	// This attribute is a key. The index of the static cryptomap table. The value
	// of the string is the name string assigned by the  operator in defining the
	// cryptomap set. The type is string.
	CipsStaticCryptomapSetName interface{}

	// The total number of cryptomap entries contained in this cryptomap set. .
	// The type is interface{} with range: 0..4294967295.
	CipsStaticCryptomapSetSize interface{}

	// The number of cryptomaps associated with this  cryptomap set that use
	// ISAKMP protocol to do key exchange. The type is interface{} with range:
	// 0..4294967295.
	CipsStaticCryptomapSetNumIsakmp interface{}

	// The number of cryptomaps associated with this  cryptomap set that require
	// the operator to manually setup the keys and SPIs. The type is interface{}
	// with range: 0..4294967295.
	CipsStaticCryptomapSetNumManual interface{}

	// The number of cryptomaps of type 'ipsec-cisco'  associated with this
	// cryptomap set. Such cryptomap elements implement Cisco Encryption
	// Technology based Virtual Private Networks. The type is interface{} with
	// range: 0..4294967295.
	CipsStaticCryptomapSetNumCET interface{}

	// The number of dynamic cryptomap templates linked to this cryptomap set. The
	// type is interface{} with range: 0..4294967295.
	CipsStaticCryptomapSetNumDynamic interface{}

	// The number of dynamic cryptomap templates linked to this cryptomap set that
	// have Tunnel Endpoint Discovery (TED) enabled. The type is interface{} with
	// range: 0..4294967295.
	CipsStaticCryptomapSetNumDisc interface{}

	// The number of and IPsec Security Associations that are active and were
	// setup using this cryptomap.  . The type is interface{} with range:
	// 0..4294967295.
	CipsStaticCryptomapSetNumSAs interface{}
}

CISCOIPSECMIB_CipsStaticCryptomapSetTable_CipsStaticCryptomapSetEntry Each entry contains the attributes associated with a single static cryptomap set.

func (*CISCOIPSECMIB_CipsStaticCryptomapSetTable_CipsStaticCryptomapSetEntry) GetEntityData

type CISCOIPSECMIB_CipsStaticCryptomapTable

type CISCOIPSECMIB_CipsStaticCryptomapTable struct {
	EntityData types.CommonEntityData
	YFilter    yfilter.YFilter

	// Each entry contains the attributes  associated with a single static  (fully
	// specified) cryptomap entry. This table does not include the members  of
	// dynamic cryptomap sets that may be linked with the parent static cryptomap
	// set. The type is slice of
	// CISCOIPSECMIB_CipsStaticCryptomapTable_CipsStaticCryptomapEntry.
	CipsStaticCryptomapEntry []*CISCOIPSECMIB_CipsStaticCryptomapTable_CipsStaticCryptomapEntry
}

CISCOIPSECMIB_CipsStaticCryptomapTable The table ilisting the member cryptomaps of the cryptomap sets that are configured on the managed entity.

func (*CISCOIPSECMIB_CipsStaticCryptomapTable) GetEntityData

func (cipsStaticCryptomapTable *CISCOIPSECMIB_CipsStaticCryptomapTable) GetEntityData() *types.CommonEntityData

type CISCOIPSECMIB_CipsStaticCryptomapTable_CipsStaticCryptomapEntry

type CISCOIPSECMIB_CipsStaticCryptomapTable_CipsStaticCryptomapEntry struct {
	EntityData types.CommonEntityData
	YFilter    yfilter.YFilter
	YListKey   string

	// This attribute is a key. The type is string. Refers to
	// cisco_ipsec_mib.CISCOIPSECMIB_CipsStaticCryptomapSetTable_CipsStaticCryptomapSetEntry_CipsStaticCryptomapSetName
	CipsStaticCryptomapSetName interface{}

	// This attribute is a key. The priority of the cryptomap entry in the
	// cryptomap set. This is the second index component of this table. The type
	// is interface{} with range: 0..65535.
	CipsStaticCryptomapPriority interface{}

	// The type of the cryptomap entry. This can be an ISAKMP cryptomap, CET or
	// manual. Dynamic cryptomaps are not counted in this table. The type is
	// CryptomapType.
	CipsStaticCryptomapType interface{}

	// The description string entered by the operatoir while creating this
	// cryptomap. The string generally identifies a description and the purpose of
	// this policy. The type is string.
	CipsStaticCryptomapDescr interface{}

	// The IP address of the current peer associated with  this IPSec policy item.
	// Traffic that is protected by this cryptomap is protected by a tunnel that
	// terminates at the device whose IP address is specified by this object. The
	// type is string with length: 4..4 | 16..16.
	CipsStaticCryptomapPeer interface{}

	// The number of peers associated with this cryptomap  entry. The peers other
	// than the one identified by  'cipsStaticCryptomapPeer' are backup peers.
	// Manual cryptomaps may have only one peer. The type is interface{} with
	// range: 0..40.
	CipsStaticCryptomapNumPeers interface{}

	// This object identifies if the tunnels instantiated due to this policy item
	// should use Perfect Forward Secrecy  (PFS) and if so, what group of Oakley
	// they should use. The type is DiffHellmanGrp.
	CipsStaticCryptomapPfs interface{}

	// This object identifies the lifetime of the IPSec Security Associations (SA)
	// created using this IPSec policy entry. If this value is zero, the lifetime
	// assumes the  value specified by the global lifetime parameter. The type is
	// interface{} with range: 0..0 | 120..86400.
	CipsStaticCryptomapLifetime interface{}

	// This object identifies the lifesize (maximum traffic in bytes that may be
	// carried) of the IPSec SAs created using this IPSec policy entry.  If this
	// value is zero, the lifetime assumes the  value specified by the global
	// lifesize parameter. The type is interface{} with range: 0..0 |
	// 2560..536870912.
	CipsStaticCryptomapLifesize interface{}

	// This object identifies the granularity of the IPSec SAs created using this
	// IPSec policy entry.  If this value is TRUE, distinct SA bundles are created
	// for distinct hosts at the end of the application traffic. The type is bool.
	CipsStaticCryptomapLevelHost interface{}
}

CISCOIPSECMIB_CipsStaticCryptomapTable_CipsStaticCryptomapEntry Each entry contains the attributes associated with a single static (fully specified) cryptomap entry. This table does not include the members of dynamic cryptomap sets that may be linked with the parent static cryptomap set.

func (*CISCOIPSECMIB_CipsStaticCryptomapTable_CipsStaticCryptomapEntry) GetEntityData

type CISCOIPSECMIB_CipsSysCapacityGroup

type CISCOIPSECMIB_CipsSysCapacityGroup struct {
	EntityData types.CommonEntityData
	YFilter    yfilter.YFilter

	// The maximum number of IPsec Security Associations that can be established
	// on this managed entity. If no theoretical limit exists, this returns value
	// 0.  Not affected by any CLI operation. The type is interface{} with range:
	// 0..65535. Units are Integral Units.
	CipsMaxSAs interface{}

	// The value of this object is TRUE if the  managed entity has the hardware
	// nad software  features to support 3DES encryption algorithm.  Not affected
	// by any CLI operation. The type is bool.
	Cips3DesCapable interface{}
}

CISCOIPSECMIB_CipsSysCapacityGroup

func (*CISCOIPSECMIB_CipsSysCapacityGroup) GetEntityData

func (cipsSysCapacityGroup *CISCOIPSECMIB_CipsSysCapacityGroup) GetEntityData() *types.CommonEntityData

type CISCOIPSECMIB_CipsTrapCntlGroup

type CISCOIPSECMIB_CipsTrapCntlGroup struct {
	EntityData types.CommonEntityData
	YFilter    yfilter.YFilter

	// This object defines the administrative state of  sending the IOS IPsec
	// ISAKMP Policy Add trap. The type is TrapStatus.
	CipsCntlIsakmpPolicyAdded interface{}

	// This object defines the administrative state of  sending the IOS IPsec
	// ISAKMP Policy Delete trap. The type is TrapStatus.
	CipsCntlIsakmpPolicyDeleted interface{}

	// This object defines the administrative state of  sending the IOS IPsec
	// Cryptomap Add trap. The type is TrapStatus.
	CipsCntlCryptomapAdded interface{}

	// This object defines the administrative state of  sending the IOS IPsec
	// Cryptomap Delete trap. The type is TrapStatus.
	CipsCntlCryptomapDeleted interface{}

	// This object defines the administrative state of  sending the IOS IPsec trap
	// that is issued when a cryptomap set is attached to an interface. The type
	// is TrapStatus.
	CipsCntlCryptomapSetAttached interface{}

	// This object defines the administrative state of  sending the IOS IPsec trap
	// that is issued when a cryptomap set is detached from an interface. to which
	// it was earlier bound. The type is TrapStatus.
	CipsCntlCryptomapSetDetached interface{}

	// This object defines the administrative state of  sending the IOS IPsec trap
	// that is issued when the number of SAs crosses the maximum number of SAs
	// that may be supported on the managed entity. The type is TrapStatus.
	CipsCntlTooManySAs interface{}
}

CISCOIPSECMIB_CipsTrapCntlGroup

func (*CISCOIPSECMIB_CipsTrapCntlGroup) GetEntityData

func (cipsTrapCntlGroup *CISCOIPSECMIB_CipsTrapCntlGroup) GetEntityData() *types.CommonEntityData

type CryptomapSetBindStatus

type CryptomapSetBindStatus string

CryptomapSetBindStatus represents SNMP General Error.

const (
	CryptomapSetBindStatus_unknown CryptomapSetBindStatus = "unknown"

	CryptomapSetBindStatus_attached CryptomapSetBindStatus = "attached"

	CryptomapSetBindStatus_detached CryptomapSetBindStatus = "detached"
)

type CryptomapType

type CryptomapType string

CryptomapType represents is a unit of IOS IPSec policy specification.

const (
	CryptomapType_cryptomapTypeNONE CryptomapType = "cryptomapTypeNONE"

	CryptomapType_cryptomapTypeMANUAL CryptomapType = "cryptomapTypeMANUAL"

	CryptomapType_cryptomapTypeISAKMP CryptomapType = "cryptomapTypeISAKMP"

	CryptomapType_cryptomapTypeCET CryptomapType = "cryptomapTypeCET"

	CryptomapType_cryptomapTypeDYNAMIC CryptomapType = "cryptomapTypeDYNAMIC"

	CryptomapType_cryptomapTypeDYNAMICDISCOVERY CryptomapType = "cryptomapTypeDYNAMICDISCOVERY"
)

type DiffHellmanGrp

type DiffHellmanGrp string

DiffHellmanGrp represents The Diffie Hellman Group used in negotiations.

const (
	DiffHellmanGrp_none DiffHellmanGrp = "none"

	DiffHellmanGrp_dhGroup1 DiffHellmanGrp = "dhGroup1"

	DiffHellmanGrp_dhGroup2 DiffHellmanGrp = "dhGroup2"
)

type EncryptAlgo

type EncryptAlgo string

EncryptAlgo represents The encryption algorithm used in negotiations.

const (
	EncryptAlgo_none EncryptAlgo = "none"

	EncryptAlgo_des EncryptAlgo = "des"

	EncryptAlgo_des3 EncryptAlgo = "des3"
)

type IkeAuthMethod

type IkeAuthMethod string

IkeAuthMethod represents negotiations.

const (
	IkeAuthMethod_none IkeAuthMethod = "none"

	IkeAuthMethod_preSharedKey IkeAuthMethod = "preSharedKey"

	IkeAuthMethod_rsaSig IkeAuthMethod = "rsaSig"

	IkeAuthMethod_rsaEncrypt IkeAuthMethod = "rsaEncrypt"

	IkeAuthMethod_revPublicKey IkeAuthMethod = "revPublicKey"
)

type IkeHashAlgo

type IkeHashAlgo string

IkeHashAlgo represents IKE negotiations.

const (
	IkeHashAlgo_none IkeHashAlgo = "none"

	IkeHashAlgo_md5 IkeHashAlgo = "md5"

	IkeHashAlgo_sha IkeHashAlgo = "sha"
)

type IkeIdentityType

type IkeIdentityType string

IkeIdentityType represents Main Mode of IPSec tunnel setup.

const (
	IkeIdentityType_isakmpIdTypeUNKNOWN IkeIdentityType = "isakmpIdTypeUNKNOWN"

	IkeIdentityType_isakmpIdTypeADDRESS IkeIdentityType = "isakmpIdTypeADDRESS"

	IkeIdentityType_isakmpIdTypeHOSTNAME IkeIdentityType = "isakmpIdTypeHOSTNAME"
)

type TrapStatus

type TrapStatus string

TrapStatus represents The administrative status for sending a TRAP.

const (
	TrapStatus_enabled TrapStatus = "enabled"

	TrapStatus_disabled TrapStatus = "disabled"
)

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL