| Overview | Package | Class | Deprecated | Help |
| Properties | |
|---|---|
| aggrOperationalState |
The aggregated operational status of this IPSecSecuredVpn.
The property has a value of 'unknown' if there are no IPSec Bindings
in this IPSecSecuredVpn.
type=service.AggrOperState access=read-only default=unknown Displayed(tab/group)=Aggregated Operational State (States/IPsec VPN) |
| authenticationKeyInbound |
The value of AuthenticationKey specifies the key used for the authentication
algorithm defined by the Transform Algorithm in the IPsec transform indexed
by TransformId.
type=string minimum=0 maximum=128 Displayed(tab/group)=Authentication Key (Security/Manual Keying - Inbound) |
| authenticationKeyOutbound |
The value of AuthenticationKey specifies the key used for the authentication
algorithm defined by the Transform Algorithm in the IPsec transform indexed
by TransformId.
type=string minimum=0 maximum=128 Displayed(tab/group)=Authentication Key (Security/Manual Keying - Outbound) |
| autoEstablish |
specifies whether to attempt to establish a phase 1 exchange automatically.
type=boolean default=false Displayed(tab/group)=Auto-Establish (Security/Static (IPsec Tunnels)) |
| certFile |
This specifies the local file URL of the certificate to be used with this SAP IPSec tunnel
type=string default=N/A minimum=0 maximum=95 Displayed(tab/group)=Cert File (Security/IKEv2 Configurations - All Tunnels) |
| certTrustAnchorPointer |
This specifies the name for Certificate-Authority Profile name associated with this SAP IPSec
tunnel certificate
type=Pointer default= Displayed(tab/group)=Cert Trust Anchor key (Security/IKEv2 Configurations - All Tunnels) |
| connectionState |
The Connection status - takes into account the status of
all the IPSec Binding Objects
type=service.ConnectionState access=read-only default=none Displayed(tab/group)=Aggregated Connection State (States/IPsec VPN) |
| corporateServiceId |
type=long |
| corporateServicePointer |
The service ( network) to which the IPSecBindings
are connected.
type=Pointer default= Displayed(tab/group)=Corporate Service (/Corporate Service) |
| corporateToSecureServiceConnector |
type=ipsec.CompositeServiceConnector default=none |
| createCompositeService |
The Link Corporate and Secured Service parameter specifies whether corporate and secure services are associated with each other in the IPSec VPN.
type=boolean Displayed(tab/group)=Link Corporate and Secured Service (/Composite Service) |
| description |
type=string minimum=0 maximum=255 Displayed(tab/group)=Description (/IPsec VPN) |
| displayedName |
type=string default= minimum=0 maximum=80 Displayed(tab/group)=IPsec VPN Name (/IPsec VPN) |
| encryptionKeyInbound |
The value of EncryptionKey specifies the key used for the encryption algorithm
defined by the Transform Algorithm in the IPsec transform indexed by TransformId.
type=string minimum=0 maximum=64 Displayed(tab/group)=Encryption Key (Security/Manual Keying - Inbound) |
| encryptionKeyOutbound |
The value of EncryptionKey specifies the key used for the encryption algorithm
defined by the Transform Algorithm in the IPsec transform indexed by TransformId.
type=string minimum=0 maximum=64 Displayed(tab/group)=Encryption Key (Security/Manual Keying - Outbound) |
| id |
A unique Id is generated to represent the IPSecSecuredVpn object
type=long access=read-create minimum=1 maximum=5000 Mandatory on create Displayed(tab/group)=ID (/IPsec VPN) |
| ikePolicyPointer |
specifies the policy id for the SAP IPSec gateway that will be
applied to all dynamic Site to Site tunnels
type=Pointer default= Displayed(tab/group)=IKE Policy (Security/IKE Policy (Site-to-Site)) |
| ikePolicyPointerSoftClient |
specifies the policy id for the SAP IPSec gateway that will be
applied to dynamic tunnels using Radius Authentication (Soft Client)
type=Pointer default= Displayed(tab/group)=IKE Policy (Soft Client) (Security/Radius Authentication) |
| ipsec.IPSecBinding-Set |
type=Children-Set |
| ipsec.IPSecSecuredVpnSite-Set |
type=Children-Set |
| ipsecSecurityPolicy |
type=boolean default=false |
| ipsecTransformPointer |
type=Pointer default= Displayed(tab/group)=IPsec Transform Policy (Security/Static (IPsec Tunnels)) |
| keyFile |
This specifies the key-pair file to be used for X.509 certificate authentication with this SAP IPSec tunnel
type=string default=N/A minimum=0 maximum=95 Displayed(tab/group)=Key File (Security/IKEv2 Configurations - All Tunnels) |
| keyTypeOptionInbound |
type=ipsec.KeyType default=ascii Displayed(tab/group)=Keying Type (Security/Manual Keying - Inbound) |
| keyTypeOptionOutbound |
type=ipsec.KeyType default=ascii Displayed(tab/group)=Keying Type (Security/Manual Keying - Outbound) |
| keying |
specifies the keying type that all static tunnels in the IPSecSecuredVpn will use
on creation
type=ipsec.IPSecTunnelKeyingType Displayed(tab/group)=Keying (Security/Static (IPsec Tunnels)) |
| localIdType |
Specifies the Local ID used for IDi or IDr for IKEv2 tunnels
type=ipsec.LocalIDTypeOption default=none Displayed(tab/group)=Local ID Type (Security/IKEv2 Configurations - All Tunnels) |
| localIdValue |
Specifies the value associated with Local ID Type
type=string default= minimum=0 maximum=255 Displayed(tab/group)=Local ID Value (Security/IKEv2 Configurations - All Tunnels) |
| preSharedKey |
specifies the shared secret between the two peers forming the
tunnel for the SAP IPSec gateway
type=string minimum=1 maximum=64 Displayed(tab/group)=Pre Shared Key (Security/Pre Shared Key - All Tunnels) |
| privateServicePointer |
type=Pointer default= Displayed(tab/group)=Secure Service (Secure Service) |
| replayWindow |
specifies the size of the anti-replay window for the IPSec tunnel and Tunnel template.
If the value of is set to 0, then the anti-replay feature is disabled.
This will be applied to all static tunnels in the IPSecSecuredVpn on creation
type=ipsec.ReplayWindowType default=0 Displayed(tab/group)=Replay Window (Security/Static (IPsec Tunnels)) |
| serviceType |
type=service.ServiceType default=vprn Displayed(tab/group)=Service Type (/Corporate Service) |
| spiInbound |
The value of Spi specifies the SPI (Security Parameter Index) used to lookup the
instruction to verify and decrypt the incoming IPsec packets when the value of
Direction is 'inbound'.
type=int default=256 minimum=256 maximum=16383 Displayed(tab/group)=SPI Inbound (Security/Manual Keying - Inbound) |
| spiOutbound |
The value of Spi specifies the SPI (Security Parameter Index) used to lookup the
instruction to verify and decrypt the outgoing IPsec packets when the value of
Direction is 'outbound'.
type=int default=256 minimum=256 maximum=16383 Displayed(tab/group)=SPI Outbound (Security/Manual Keying - Outbound) |
| subscrAuthPolicyPointer |
Defines which subscriber authentication policy must be
applied when a DHCP msg is received on the interface.
The authentication policy must be previously defined.
The policy will only be applied when DHCP Lease Populate
is set to a non-zero value for this interface.
type=Pointer default= Displayed(tab/group)=Subscriber Authentication Policy (Security/Radius Authentication) |
| tunnelTemplatePointer |
specifies the TIMETRA-IPSEC-MIB::tIPsecTnlTempId used by this SAP IPsec gateway
type=Pointer default= Displayed(tab/group)=IPsec Tunnel Template (Security/Dynamic (IPsec Gateways)) |
| Properties inherited from ManagedObject |
|---|
| actionMask, children-Set, deploymentState, isFaultSquelched, name, objectFullName, selfAlarmed |