Documentation ¶
Overview ¶
The MIB module for modeling Cisco-specific IPsec attributes
Overview of Cisco IPsec MIB ¶
MIB description ¶
This MIB models the Cisco implementation-specific attributes of a Cisco entity that implements IPsec. This MIB is complementary to the standard IPsec MIB proposed jointly by Tivoli and Cisco.
The ciscoIPsec MIB provides the operational information on Cisco's IPsec tunnelling implementation. The following entities are managed: 1) ISAKMP Group: a) ISAKMP global parameters b) ISAKMP Policy Table
2) IPSec Group: a) IPSec Global Parameters b) IPSec Global Traffic Parameters c) Cryptomap Group - Cryptomap Set Table - Cryptomap Table - CryptomapSet Binding Table
3) System Capacity & Capability Group: a) Capacity Parameters b) Capability Parameters
4) Trap Control Group 5) Notifications Group
Index ¶
- type CISCOIPSECMIB
- type CISCOIPSECMIB_CipsCryptomapSetIfTable
- type CISCOIPSECMIB_CipsCryptomapSetIfTable_CipsCryptomapSetIfEntry
- type CISCOIPSECMIB_CipsDynamicCryptomapSetTable
- type CISCOIPSECMIB_CipsDynamicCryptomapSetTable_CipsDynamicCryptomapSetEntry
- type CISCOIPSECMIB_CipsIPsecGlobals
- type CISCOIPSECMIB_CipsIPsecStatistics
- type CISCOIPSECMIB_CipsIsakmpGroup
- type CISCOIPSECMIB_CipsIsakmpPolicyTable
- type CISCOIPSECMIB_CipsIsakmpPolicyTable_CipsIsakmpPolicyEntry
- type CISCOIPSECMIB_CipsStaticCryptomapSetTable
- type CISCOIPSECMIB_CipsStaticCryptomapSetTable_CipsStaticCryptomapSetEntry
- type CISCOIPSECMIB_CipsStaticCryptomapTable
- type CISCOIPSECMIB_CipsStaticCryptomapTable_CipsStaticCryptomapEntry
- type CISCOIPSECMIB_CipsSysCapacityGroup
- type CISCOIPSECMIB_CipsTrapCntlGroup
- type CryptomapSetBindStatus
- type CryptomapType
- type DiffHellmanGrp
- type EncryptAlgo
- type IkeAuthMethod
- type IkeHashAlgo
- type IkeIdentityType
- type TrapStatus
Constants ¶
This section is empty.
Variables ¶
This section is empty.
Functions ¶
This section is empty.
Types ¶
type CISCOIPSECMIB ¶
type CISCOIPSECMIB struct { EntityData types.CommonEntityData YFilter yfilter.YFilter CipsIsakmpGroup CISCOIPSECMIB_CipsIsakmpGroup CipsIPsecGlobals CISCOIPSECMIB_CipsIPsecGlobals CipsIPsecStatistics CISCOIPSECMIB_CipsIPsecStatistics CipsSysCapacityGroup CISCOIPSECMIB_CipsSysCapacityGroup CipsTrapCntlGroup CISCOIPSECMIB_CipsTrapCntlGroup // The table containing the list of all ISAKMP policy entries configured by // the operator. CipsIsakmpPolicyTable CISCOIPSECMIB_CipsIsakmpPolicyTable // The table containing the list of all cryptomap sets that are fully // specified and are not wild-carded. The operator may include different // types of cryptomaps in such a set - manual, CET, ISAKMP or dynamic. CipsStaticCryptomapSetTable CISCOIPSECMIB_CipsStaticCryptomapSetTable // The table containing the list of all dynamic cryptomaps that use IKE, // defined on the managed entity. CipsDynamicCryptomapSetTable CISCOIPSECMIB_CipsDynamicCryptomapSetTable // The table ilisting the member cryptomaps of the cryptomap sets that are // configured on the managed entity. CipsStaticCryptomapTable CISCOIPSECMIB_CipsStaticCryptomapTable // The table lists the binding of cryptomap sets to the interfaces of the // managed entity. CipsCryptomapSetIfTable CISCOIPSECMIB_CipsCryptomapSetIfTable }
CISCOIPSECMIB
func (*CISCOIPSECMIB) GetEntityData ¶
func (cISCOIPSECMIB *CISCOIPSECMIB) GetEntityData() *types.CommonEntityData
type CISCOIPSECMIB_CipsCryptomapSetIfTable ¶
type CISCOIPSECMIB_CipsCryptomapSetIfTable struct { EntityData types.CommonEntityData YFilter yfilter.YFilter // Each entry contains the record of the association between an interface and // a cryptomap set (static) that is defined on the managed entity. Note that // the cryptomap set identified in this binding must static. Dynamic // cryptomaps cannot be bound to interfaces. The type is slice of // CISCOIPSECMIB_CipsCryptomapSetIfTable_CipsCryptomapSetIfEntry. CipsCryptomapSetIfEntry []*CISCOIPSECMIB_CipsCryptomapSetIfTable_CipsCryptomapSetIfEntry }
CISCOIPSECMIB_CipsCryptomapSetIfTable The table lists the binding of cryptomap sets to the interfaces of the managed entity.
func (*CISCOIPSECMIB_CipsCryptomapSetIfTable) GetEntityData ¶
func (cipsCryptomapSetIfTable *CISCOIPSECMIB_CipsCryptomapSetIfTable) GetEntityData() *types.CommonEntityData
type CISCOIPSECMIB_CipsCryptomapSetIfTable_CipsCryptomapSetIfEntry ¶
type CISCOIPSECMIB_CipsCryptomapSetIfTable_CipsCryptomapSetIfEntry struct { EntityData types.CommonEntityData YFilter yfilter.YFilter YListKey string // This attribute is a key. The type is string with range: 1..2147483647. // Refers to if_mib.IFMIB_IfTable_IfEntry_IfIndex IfIndex interface{} // This attribute is a key. The type is string. Refers to // cisco_ipsec_mib.CISCOIPSECMIB_CipsStaticCryptomapSetTable_CipsStaticCryptomapSetEntry_CipsStaticCryptomapSetName CipsStaticCryptomapSetName interface{} // The value of this object identifies if the interface to which the cryptomap // set is attached is a tunnel (such as a GRE or PPTP tunnel). The type is // bool. CipsCryptomapSetIfVirtual interface{} // This object identifies the status of the binding of the specified // cryptomap set with the specified interface. The value when queried is // always 'attached'. When set to 'detached', the cryptomap set if detached // from the specified interface. The effect of this is same as the CLI // command config-if# no crypto map cryptomapSetName Setting the value to // 'attached' will result in SNMP General Error. The type is // CryptomapSetBindStatus. CipsCryptomapSetIfStatus interface{} }
CISCOIPSECMIB_CipsCryptomapSetIfTable_CipsCryptomapSetIfEntry Each entry contains the record of the association between an interface and a cryptomap set (static) that is defined on the managed entity.
Note that the cryptomap set identified in this binding must static. Dynamic cryptomaps cannot be bound to interfaces.
func (*CISCOIPSECMIB_CipsCryptomapSetIfTable_CipsCryptomapSetIfEntry) GetEntityData ¶
func (cipsCryptomapSetIfEntry *CISCOIPSECMIB_CipsCryptomapSetIfTable_CipsCryptomapSetIfEntry) GetEntityData() *types.CommonEntityData
type CISCOIPSECMIB_CipsDynamicCryptomapSetTable ¶
type CISCOIPSECMIB_CipsDynamicCryptomapSetTable struct { EntityData types.CommonEntityData YFilter yfilter.YFilter // Each entry contains the attributes associated with a single dynamic // cryptomap template. The type is slice of // CISCOIPSECMIB_CipsDynamicCryptomapSetTable_CipsDynamicCryptomapSetEntry. CipsDynamicCryptomapSetEntry []*CISCOIPSECMIB_CipsDynamicCryptomapSetTable_CipsDynamicCryptomapSetEntry }
CISCOIPSECMIB_CipsDynamicCryptomapSetTable The table containing the list of all dynamic cryptomaps that use IKE, defined on
the managed entity.
func (*CISCOIPSECMIB_CipsDynamicCryptomapSetTable) GetEntityData ¶
func (cipsDynamicCryptomapSetTable *CISCOIPSECMIB_CipsDynamicCryptomapSetTable) GetEntityData() *types.CommonEntityData
type CISCOIPSECMIB_CipsDynamicCryptomapSetTable_CipsDynamicCryptomapSetEntry ¶
type CISCOIPSECMIB_CipsDynamicCryptomapSetTable_CipsDynamicCryptomapSetEntry struct { EntityData types.CommonEntityData YFilter yfilter.YFilter YListKey string // This attribute is a key. The index of the dynamic cryptomap table. The // value of the string is the one assigned by the operator in defining the // cryptomap set. The type is string. CipsDynamicCryptomapSetName interface{} // The number of cryptomap entries in this cryptomap. The type is interface{} // with range: 0..4294967295. CipsDynamicCryptomapSetSize interface{} // The number of static cryptomap sets with which this dynamic cryptomap is // associated. . The type is interface{} with range: 0..4294967295. CipsDynamicCryptomapSetNumAssoc interface{} }
CISCOIPSECMIB_CipsDynamicCryptomapSetTable_CipsDynamicCryptomapSetEntry Each entry contains the attributes associated with a single dynamic cryptomap template.
func (*CISCOIPSECMIB_CipsDynamicCryptomapSetTable_CipsDynamicCryptomapSetEntry) GetEntityData ¶
func (cipsDynamicCryptomapSetEntry *CISCOIPSECMIB_CipsDynamicCryptomapSetTable_CipsDynamicCryptomapSetEntry) GetEntityData() *types.CommonEntityData
type CISCOIPSECMIB_CipsIPsecGlobals ¶
type CISCOIPSECMIB_CipsIPsecGlobals struct { EntityData types.CommonEntityData YFilter yfilter.YFilter // The default lifetime (in seconds) assigned to an SA as a global policy // (maybe overridden in specific cryptomap definitions). The type is // interface{} with range: 120..86400. Units are Seconds. CipsSALifetime interface{} // The default lifesize in KBytes assigned to an SA as a global policy // (unless overridden in cryptomap definition). The type is interface{} with // range: 2560..536870912. Units are KBytes. CipsSALifesize interface{} // The number of Cryptomap Sets that are are fully configured. Statically // defined cryptomap sets are ones where the operator has fully specified all // the parameters required set up IPSec Virtual Private Networks (VPNs). The // type is interface{} with range: 0..2147483647. Units are Integral Units. CipsNumStaticCryptomapSets interface{} // The number of static Cryptomap Sets that have at least one CET cryptomap // element as a member of the set. The type is interface{} with range: // 0..2147483647. Units are Integral Units. CipsNumCETCryptomapSets interface{} // The number of dynamic IPSec Policy templates (called 'dynamic cryptomap // templates') configured on the managed entity. The type is interface{} with // range: 0..2147483647. Units are Integral Units. CipsNumDynamicCryptomapSets interface{} // The number of static Cryptomap Sets that have at least one dynamic // cryptomap template bound to them which has the Tunnel Endpoint Discovery // (TED) enabled. The type is interface{} with range: 0..2147483647. Units are // Integral Units. CipsNumTEDCryptomapSets interface{} }
CISCOIPSECMIB_CipsIPsecGlobals
func (*CISCOIPSECMIB_CipsIPsecGlobals) GetEntityData ¶
func (cipsIPsecGlobals *CISCOIPSECMIB_CipsIPsecGlobals) GetEntityData() *types.CommonEntityData
type CISCOIPSECMIB_CipsIPsecStatistics ¶
type CISCOIPSECMIB_CipsIPsecStatistics struct { EntityData types.CommonEntityData YFilter yfilter.YFilter // The number of TED probes that were received by this managed entity since // bootup. Not affected by any CLI operation. The type is interface{} with // range: 0..4294967295. Units are Integral Units. CipsNumTEDProbesReceived interface{} // The number of TED probes that were dispatched by all the dynamic cryptomaps // in this managed entity since bootup. Not affected by any CLI operation. // The type is interface{} with range: 0..4294967295. Units are Integral // Units. CipsNumTEDProbesSent interface{} // The number of TED probes that were dispatched by the local entity and that // failed to locate crypto endpoint. Not affected by any CLI operation. The // type is interface{} with range: 0..4294967295. Units are Integral Units. CipsNumTEDFailures interface{} }
CISCOIPSECMIB_CipsIPsecStatistics
func (*CISCOIPSECMIB_CipsIPsecStatistics) GetEntityData ¶
func (cipsIPsecStatistics *CISCOIPSECMIB_CipsIPsecStatistics) GetEntityData() *types.CommonEntityData
type CISCOIPSECMIB_CipsIsakmpGroup ¶
type CISCOIPSECMIB_CipsIsakmpGroup struct { EntityData types.CommonEntityData YFilter yfilter.YFilter // The value of this object is TRUE if ISAKMP has been enabled on the managed // entity. Otherise the value of this object is FALSE. The type is bool. CipsIsakmpEnabled interface{} // The value of this object is shows the type of identity used by the managed // entity in ISAKMP negotiations with another peer. The type is // IkeIdentityType. CipsIsakmpIdentity interface{} // The value of this object is time interval in seconds between successive // ISAKMP keepalive heartbeats issued to the peers to which IKE tunnels have // been setup. The type is interface{} with range: 10..3600. Units are // seconds. CipsIsakmpKeepaliveInterval interface{} // The value of this object is the number of ISAKMP policies that have been // configured on the managed entity. The type is interface{} with range: // 0..2147483647. CipsNumIsakmpPolicies interface{} }
CISCOIPSECMIB_CipsIsakmpGroup
func (*CISCOIPSECMIB_CipsIsakmpGroup) GetEntityData ¶
func (cipsIsakmpGroup *CISCOIPSECMIB_CipsIsakmpGroup) GetEntityData() *types.CommonEntityData
type CISCOIPSECMIB_CipsIsakmpPolicyTable ¶
type CISCOIPSECMIB_CipsIsakmpPolicyTable struct { EntityData types.CommonEntityData YFilter yfilter.YFilter // Each entry contains the attributes associated with a single ISAKMP Policy // entry. The type is slice of // CISCOIPSECMIB_CipsIsakmpPolicyTable_CipsIsakmpPolicyEntry. CipsIsakmpPolicyEntry []*CISCOIPSECMIB_CipsIsakmpPolicyTable_CipsIsakmpPolicyEntry }
CISCOIPSECMIB_CipsIsakmpPolicyTable The table containing the list of all ISAKMP policy entries configured by the operator.
func (*CISCOIPSECMIB_CipsIsakmpPolicyTable) GetEntityData ¶
func (cipsIsakmpPolicyTable *CISCOIPSECMIB_CipsIsakmpPolicyTable) GetEntityData() *types.CommonEntityData
type CISCOIPSECMIB_CipsIsakmpPolicyTable_CipsIsakmpPolicyEntry ¶
type CISCOIPSECMIB_CipsIsakmpPolicyTable_CipsIsakmpPolicyEntry struct { EntityData types.CommonEntityData YFilter yfilter.YFilter YListKey string // This attribute is a key. The priotity of this ISAKMP Policy entry. This is // also the index of this table. The type is interface{} with range: 0..65535. CipsIsakmpPolPriority interface{} // The encryption transform specified by this ISAKMP policy specification. // The Internet Key Exchange (IKE) tunnels setup using this policy item would // use the specified encryption transform to protect the ISAKMP PDUs. The type // is EncryptAlgo. CipsIsakmpPolEncr interface{} // The hash transform specified by this ISAKMP policy specification. The IKE // tunnels setup using this policy item would use the specified hash // transform to protect the ISAKMP PDUs. The type is IkeHashAlgo. CipsIsakmpPolHash interface{} // The peer authentication mthod specified by this ISAKMP policy // specification. If this policy entity is selected for negotiation with a // peer, the local entity would authenticate the peer using the method // specified by this object. The type is IkeAuthMethod. CipsIsakmpPolAuth interface{} // This object specifies the Oakley group used for Diffie Hellman exchange in // the Main Mode. If this policy item is selected to negotiate Main Mode with // an IKE peer, the local entity chooses the group specified by this object // to perform Diffie Hellman exchange with the peer. The type is // DiffHellmanGrp. CipsIsakmpPolGroup interface{} // This object specifies the lifetime in seconds of the IKE tunnels generated // using this policy specification. The type is interface{} with range: // 60..86400. Units are seconds. CipsIsakmpPolLifetime interface{} }
CISCOIPSECMIB_CipsIsakmpPolicyTable_CipsIsakmpPolicyEntry Each entry contains the attributes associated with a single ISAKMP Policy entry.
func (*CISCOIPSECMIB_CipsIsakmpPolicyTable_CipsIsakmpPolicyEntry) GetEntityData ¶
func (cipsIsakmpPolicyEntry *CISCOIPSECMIB_CipsIsakmpPolicyTable_CipsIsakmpPolicyEntry) GetEntityData() *types.CommonEntityData
type CISCOIPSECMIB_CipsStaticCryptomapSetTable ¶
type CISCOIPSECMIB_CipsStaticCryptomapSetTable struct { EntityData types.CommonEntityData YFilter yfilter.YFilter // Each entry contains the attributes associated with a single static // cryptomap set. The type is slice of // CISCOIPSECMIB_CipsStaticCryptomapSetTable_CipsStaticCryptomapSetEntry. CipsStaticCryptomapSetEntry []*CISCOIPSECMIB_CipsStaticCryptomapSetTable_CipsStaticCryptomapSetEntry }
CISCOIPSECMIB_CipsStaticCryptomapSetTable The table containing the list of all cryptomap sets that are fully specified and are not wild-carded.
The operator may include different types of cryptomaps in such a set - manual, CET, ISAKMP or dynamic.
func (*CISCOIPSECMIB_CipsStaticCryptomapSetTable) GetEntityData ¶
func (cipsStaticCryptomapSetTable *CISCOIPSECMIB_CipsStaticCryptomapSetTable) GetEntityData() *types.CommonEntityData
type CISCOIPSECMIB_CipsStaticCryptomapSetTable_CipsStaticCryptomapSetEntry ¶
type CISCOIPSECMIB_CipsStaticCryptomapSetTable_CipsStaticCryptomapSetEntry struct { EntityData types.CommonEntityData YFilter yfilter.YFilter YListKey string // This attribute is a key. The index of the static cryptomap table. The value // of the string is the name string assigned by the operator in defining the // cryptomap set. The type is string. CipsStaticCryptomapSetName interface{} // The total number of cryptomap entries contained in this cryptomap set. . // The type is interface{} with range: 0..4294967295. CipsStaticCryptomapSetSize interface{} // The number of cryptomaps associated with this cryptomap set that use // ISAKMP protocol to do key exchange. The type is interface{} with range: // 0..4294967295. CipsStaticCryptomapSetNumIsakmp interface{} // The number of cryptomaps associated with this cryptomap set that require // the operator to manually setup the keys and SPIs. The type is interface{} // with range: 0..4294967295. CipsStaticCryptomapSetNumManual interface{} // The number of cryptomaps of type 'ipsec-cisco' associated with this // cryptomap set. Such cryptomap elements implement Cisco Encryption // Technology based Virtual Private Networks. The type is interface{} with // range: 0..4294967295. CipsStaticCryptomapSetNumCET interface{} // The number of dynamic cryptomap templates linked to this cryptomap set. The // type is interface{} with range: 0..4294967295. CipsStaticCryptomapSetNumDynamic interface{} // The number of dynamic cryptomap templates linked to this cryptomap set that // have Tunnel Endpoint Discovery (TED) enabled. The type is interface{} with // range: 0..4294967295. CipsStaticCryptomapSetNumDisc interface{} // The number of and IPsec Security Associations that are active and were // setup using this cryptomap. . The type is interface{} with range: // 0..4294967295. CipsStaticCryptomapSetNumSAs interface{} }
CISCOIPSECMIB_CipsStaticCryptomapSetTable_CipsStaticCryptomapSetEntry Each entry contains the attributes associated with a single static cryptomap set.
func (*CISCOIPSECMIB_CipsStaticCryptomapSetTable_CipsStaticCryptomapSetEntry) GetEntityData ¶
func (cipsStaticCryptomapSetEntry *CISCOIPSECMIB_CipsStaticCryptomapSetTable_CipsStaticCryptomapSetEntry) GetEntityData() *types.CommonEntityData
type CISCOIPSECMIB_CipsStaticCryptomapTable ¶
type CISCOIPSECMIB_CipsStaticCryptomapTable struct { EntityData types.CommonEntityData YFilter yfilter.YFilter // Each entry contains the attributes associated with a single static (fully // specified) cryptomap entry. This table does not include the members of // dynamic cryptomap sets that may be linked with the parent static cryptomap // set. The type is slice of // CISCOIPSECMIB_CipsStaticCryptomapTable_CipsStaticCryptomapEntry. CipsStaticCryptomapEntry []*CISCOIPSECMIB_CipsStaticCryptomapTable_CipsStaticCryptomapEntry }
CISCOIPSECMIB_CipsStaticCryptomapTable The table ilisting the member cryptomaps of the cryptomap sets that are configured on the managed entity.
func (*CISCOIPSECMIB_CipsStaticCryptomapTable) GetEntityData ¶
func (cipsStaticCryptomapTable *CISCOIPSECMIB_CipsStaticCryptomapTable) GetEntityData() *types.CommonEntityData
type CISCOIPSECMIB_CipsStaticCryptomapTable_CipsStaticCryptomapEntry ¶
type CISCOIPSECMIB_CipsStaticCryptomapTable_CipsStaticCryptomapEntry struct { EntityData types.CommonEntityData YFilter yfilter.YFilter YListKey string // This attribute is a key. The type is string. Refers to // cisco_ipsec_mib.CISCOIPSECMIB_CipsStaticCryptomapSetTable_CipsStaticCryptomapSetEntry_CipsStaticCryptomapSetName CipsStaticCryptomapSetName interface{} // This attribute is a key. The priority of the cryptomap entry in the // cryptomap set. This is the second index component of this table. The type // is interface{} with range: 0..65535. CipsStaticCryptomapPriority interface{} // The type of the cryptomap entry. This can be an ISAKMP cryptomap, CET or // manual. Dynamic cryptomaps are not counted in this table. The type is // CryptomapType. CipsStaticCryptomapType interface{} // The description string entered by the operatoir while creating this // cryptomap. The string generally identifies a description and the purpose of // this policy. The type is string. CipsStaticCryptomapDescr interface{} // The IP address of the current peer associated with this IPSec policy item. // Traffic that is protected by this cryptomap is protected by a tunnel that // terminates at the device whose IP address is specified by this object. The // type is string with length: 4..4 | 16..16. CipsStaticCryptomapPeer interface{} // The number of peers associated with this cryptomap entry. The peers other // than the one identified by 'cipsStaticCryptomapPeer' are backup peers. // Manual cryptomaps may have only one peer. The type is interface{} with // range: 0..40. CipsStaticCryptomapNumPeers interface{} // This object identifies if the tunnels instantiated due to this policy item // should use Perfect Forward Secrecy (PFS) and if so, what group of Oakley // they should use. The type is DiffHellmanGrp. CipsStaticCryptomapPfs interface{} // This object identifies the lifetime of the IPSec Security Associations (SA) // created using this IPSec policy entry. If this value is zero, the lifetime // assumes the value specified by the global lifetime parameter. The type is // interface{} with range: 0..0 | 120..86400. CipsStaticCryptomapLifetime interface{} // This object identifies the lifesize (maximum traffic in bytes that may be // carried) of the IPSec SAs created using this IPSec policy entry. If this // value is zero, the lifetime assumes the value specified by the global // lifesize parameter. The type is interface{} with range: 0..0 | // 2560..536870912. CipsStaticCryptomapLifesize interface{} // This object identifies the granularity of the IPSec SAs created using this // IPSec policy entry. If this value is TRUE, distinct SA bundles are created // for distinct hosts at the end of the application traffic. The type is bool. CipsStaticCryptomapLevelHost interface{} }
CISCOIPSECMIB_CipsStaticCryptomapTable_CipsStaticCryptomapEntry Each entry contains the attributes associated with a single static (fully specified) cryptomap entry. This table does not include the members of dynamic cryptomap sets that may be linked with the parent static cryptomap set.
func (*CISCOIPSECMIB_CipsStaticCryptomapTable_CipsStaticCryptomapEntry) GetEntityData ¶
func (cipsStaticCryptomapEntry *CISCOIPSECMIB_CipsStaticCryptomapTable_CipsStaticCryptomapEntry) GetEntityData() *types.CommonEntityData
type CISCOIPSECMIB_CipsSysCapacityGroup ¶
type CISCOIPSECMIB_CipsSysCapacityGroup struct { EntityData types.CommonEntityData YFilter yfilter.YFilter // The maximum number of IPsec Security Associations that can be established // on this managed entity. If no theoretical limit exists, this returns value // 0. Not affected by any CLI operation. The type is interface{} with range: // 0..65535. Units are Integral Units. CipsMaxSAs interface{} // The value of this object is TRUE if the managed entity has the hardware // nad software features to support 3DES encryption algorithm. Not affected // by any CLI operation. The type is bool. Cips3DesCapable interface{} }
CISCOIPSECMIB_CipsSysCapacityGroup
func (*CISCOIPSECMIB_CipsSysCapacityGroup) GetEntityData ¶
func (cipsSysCapacityGroup *CISCOIPSECMIB_CipsSysCapacityGroup) GetEntityData() *types.CommonEntityData
type CISCOIPSECMIB_CipsTrapCntlGroup ¶
type CISCOIPSECMIB_CipsTrapCntlGroup struct { EntityData types.CommonEntityData YFilter yfilter.YFilter // This object defines the administrative state of sending the IOS IPsec // ISAKMP Policy Add trap. The type is TrapStatus. CipsCntlIsakmpPolicyAdded interface{} // This object defines the administrative state of sending the IOS IPsec // ISAKMP Policy Delete trap. The type is TrapStatus. CipsCntlIsakmpPolicyDeleted interface{} // This object defines the administrative state of sending the IOS IPsec // Cryptomap Add trap. The type is TrapStatus. CipsCntlCryptomapAdded interface{} // This object defines the administrative state of sending the IOS IPsec // Cryptomap Delete trap. The type is TrapStatus. CipsCntlCryptomapDeleted interface{} // This object defines the administrative state of sending the IOS IPsec trap // that is issued when a cryptomap set is attached to an interface. The type // is TrapStatus. CipsCntlCryptomapSetAttached interface{} // This object defines the administrative state of sending the IOS IPsec trap // that is issued when a cryptomap set is detached from an interface. to which // it was earlier bound. The type is TrapStatus. CipsCntlCryptomapSetDetached interface{} // This object defines the administrative state of sending the IOS IPsec trap // that is issued when the number of SAs crosses the maximum number of SAs // that may be supported on the managed entity. The type is TrapStatus. CipsCntlTooManySAs interface{} }
CISCOIPSECMIB_CipsTrapCntlGroup
func (*CISCOIPSECMIB_CipsTrapCntlGroup) GetEntityData ¶
func (cipsTrapCntlGroup *CISCOIPSECMIB_CipsTrapCntlGroup) GetEntityData() *types.CommonEntityData
type CryptomapSetBindStatus ¶
type CryptomapSetBindStatus string
CryptomapSetBindStatus represents SNMP General Error.
const ( CryptomapSetBindStatus_unknown CryptomapSetBindStatus = "unknown" CryptomapSetBindStatus_attached CryptomapSetBindStatus = "attached" CryptomapSetBindStatus_detached CryptomapSetBindStatus = "detached" )
type CryptomapType ¶
type CryptomapType string
CryptomapType represents is a unit of IOS IPSec policy specification.
const ( CryptomapType_cryptomapTypeNONE CryptomapType = "cryptomapTypeNONE" CryptomapType_cryptomapTypeMANUAL CryptomapType = "cryptomapTypeMANUAL" CryptomapType_cryptomapTypeISAKMP CryptomapType = "cryptomapTypeISAKMP" CryptomapType_cryptomapTypeCET CryptomapType = "cryptomapTypeCET" CryptomapType_cryptomapTypeDYNAMIC CryptomapType = "cryptomapTypeDYNAMIC" CryptomapType_cryptomapTypeDYNAMICDISCOVERY CryptomapType = "cryptomapTypeDYNAMICDISCOVERY" )
type DiffHellmanGrp ¶
type DiffHellmanGrp string
DiffHellmanGrp represents The Diffie Hellman Group used in negotiations.
const ( DiffHellmanGrp_none DiffHellmanGrp = "none" DiffHellmanGrp_dhGroup1 DiffHellmanGrp = "dhGroup1" DiffHellmanGrp_dhGroup2 DiffHellmanGrp = "dhGroup2" )
type EncryptAlgo ¶
type EncryptAlgo string
EncryptAlgo represents The encryption algorithm used in negotiations.
const ( EncryptAlgo_none EncryptAlgo = "none" EncryptAlgo_des EncryptAlgo = "des" EncryptAlgo_des3 EncryptAlgo = "des3" )
type IkeAuthMethod ¶
type IkeAuthMethod string
IkeAuthMethod represents negotiations.
const ( IkeAuthMethod_none IkeAuthMethod = "none" IkeAuthMethod_rsaSig IkeAuthMethod = "rsaSig" IkeAuthMethod_rsaEncrypt IkeAuthMethod = "rsaEncrypt" IkeAuthMethod_revPublicKey IkeAuthMethod = "revPublicKey" )
type IkeHashAlgo ¶
type IkeHashAlgo string
IkeHashAlgo represents IKE negotiations.
const ( IkeHashAlgo_none IkeHashAlgo = "none" IkeHashAlgo_md5 IkeHashAlgo = "md5" IkeHashAlgo_sha IkeHashAlgo = "sha" )
type IkeIdentityType ¶
type IkeIdentityType string
IkeIdentityType represents Main Mode of IPSec tunnel setup.
const ( IkeIdentityType_isakmpIdTypeUNKNOWN IkeIdentityType = "isakmpIdTypeUNKNOWN" IkeIdentityType_isakmpIdTypeADDRESS IkeIdentityType = "isakmpIdTypeADDRESS" IkeIdentityType_isakmpIdTypeHOSTNAME IkeIdentityType = "isakmpIdTypeHOSTNAME" )
type TrapStatus ¶
type TrapStatus string
TrapStatus represents The administrative status for sending a TRAP.
const ( TrapStatus_enabled TrapStatus = "enabled" TrapStatus_disabled TrapStatus = "disabled" )