| Overview | Package | Class | Deprecated | Help |
| Properties | |
|---|---|
| adminState |
This specifies the administrative state of the tunnel.
type=netw.AdministrativeState default=tmnxOutOfService Displayed(tab/group)=Administrative State (States) |
| autoEstablish |
Specifies whether to attempt to establish a phase 1 exchange automatically.
type=boolean default=false Displayed(tab/group)=Auto-Establish (Dynamic Keying) |
| bfdDesignate |
The Designated parameter specifies whether the IPsec tunnel is the designated BFD tunnel.
type=boolean default=false Displayed(tab/group)=Designated (BFD) |
| bfdEnable |
The Enabled parameter specifies whether to create a BFD object for the IPsec tunnel.
type=boolean default=false Displayed(tab/group)=Enabled (BFD) |
| certProfileName |
type=string default= Displayed(tab/group)=Certificate Profile (Dynamic Keying/Certificate) |
| clearDfBit |
This specifies whether to clear Do not Fragment (DF) bit in the outgoing packets in this tunnel.
type=boolean default=false Displayed(tab/group)=Clear Do-Not-Fragment Bit (/IP Fragmentation) |
| copyTrafficClass |
While set to true, it will cause DSCP/ECN(IPv4) or traffic class(IPv6) to be copied from outer
IP header to inner IP header after decapsulation.
type=boolean default=false Displayed(tab/group)=Copy Traffic Class Upon Decapsulation |
| creationOrigin |
type=svt.L2RouteOriginType access=read-create default=manual |
| defaultResult |
This specifies the default result when both primary and secondary method failed to provide an answer.
type=ipsec.DefaultResultVal default=revoked Displayed(tab/group)=Default Result (Dynamic Keying/Certificate Status Verification) |
| description |
Specifies the user-provided description for the tunnel.
type=string default= minimum=0 maximum=80 Displayed(tab/group)=Description |
| dynamicKeyTransformId1 |
The Transform ID 1 parameter specifies the IPsec transform policy that is associated with the IPsec tunnel.
type=long default=0 minimum=0 maximum=2048 Displayed(tab/group)=Transform ID 1 (Dynamic Keying) |
| dynamicKeyTransformId2 |
The Transform ID 1 parameter specifies the IPsec transform policy that is associated with the IPsec tunnel.
type=long default=0 minimum=0 maximum=2048 Displayed(tab/group)=Transform ID 2 (Dynamic Keying) |
| dynamicKeyTransformId3 |
The Transform ID 1 parameter specifies the IPsec transform policy that is associated with the IPsec tunnel.
type=long default=0 minimum=0 maximum=2048 Displayed(tab/group)=Transform ID 3 (Dynamic Keying) |
| dynamicKeyTransformId4 |
The Transform ID 1 parameter specifies the IPsec transform policy that is associated with the IPsec tunnel.
type=long default=0 minimum=0 maximum=2048 Displayed(tab/group)=Transform ID 4 (Dynamic Keying) |
| encapsulatedIpMtu |
This specifies the MTU size for IP packets after tunnel encapsulation has been added.
The range is 0 or between 512 and 9000. When a value of zero (0) is specified, it indicates the maximum supported MTU size
on the SAP for this tunnel.
type=long default=0 minimum=0 maximum=9000 units=Octets Displayed(tab/group)=Encapsulated IP MTU (/IP Fragmentation) |
| gwAddressType |
Specifies the type of address in tmnxIPsecTunnelLclGwAddr.
type=rtr.InetAddressType default=ipv4 Displayed(tab/group)=Local Gateway Address Type (/Tunnel Endpoints) |
| gwIpAddress |
Specifies the address of the interface on the remote node of this IPsec tunnel.
type=InetAddress default=0.0.0.0 Displayed(tab/group)=Local Gateway Address (/Tunnel Endpoints) |
| icmp6NumPkt2Big |
This specifies how many packet-too-big ICMPv6 messages are issued.
type=long default=100 minimum=10 maximum=1000 Displayed(tab/group)=Number of Messages (/ICMPv6 Message Generation) |
| icmp6Pkt2Big |
This specifies whether packet-too-big ICMP messages should be sent.
type=boolean default=true Displayed(tab/group)=Packet-Too-Big Messages Enabled (/ICMPv6 Message Generation) |
| icmp6Pkt2BigTime |
This specifies the time frame in seconds that is used to limit the number of packet-too-big ICMPv6
messages issued per time frame.
type=long default=10 minimum=1 maximum=60 units=seconds Displayed(tab/group)=Message Time Frame (/ICMPv6 Message Generation) |
| icmpFragReq |
Specifies whether or not 'Fragmentation required and DF flag set' ICMP messages should be sent.
If icmpFragReq is not enabled, both icmpFragReqNum and icmpFragReqTime values are set to default.
type=boolean default=true Displayed(tab/group)=Fragmentation Messages Enabled (/ICMP Message Generation) |
| icmpFragReqNum |
Specifies how many 'Fragmentation required and DF flag set' ICMP messages are transmitted
in the time frame specified by icmpFragReqTime
type=long default=100 minimum=10 maximum=1000 Displayed(tab/group)=Number of Messages (/ICMP Message Generation) |
| icmpFragReqTime |
Specifies the time frame in seconds that is used to limit the number of 'Fragmentation required
and DF flag set' ICMP messages transmitted per time frame.
type=int default=10 minimum=1 maximum=60 units=seconds Displayed(tab/group)=Message Time Frame (/ICMP Message Generation) |
| ikePolicyId |
The Transform ID 1 parameter specifies the IPsec transform policy that is associated with the IPsec tunnel.
type=long default=0 minimum=0 maximum=2048 Displayed(tab/group)=IKE Policy (Dynamic Keying) |
| interfaceId |
type=long access=read-only default=0 Displayed(tab/group)=Interface ID (/Interface) |
| interfaceName |
type=string access=read-only default= maximum=252 Displayed(tab/group)=Interface Name (/Interface) |
| ipMtu |
This specifies the MTU size for IP packets for this tunnel.
The range is 0 or between 512 and 9000. When a value of zero (0) is specified, it indicates the maximum supported MTU size
on the SAP for this tunnel.
type=long default=0 minimum=0 maximum=9000 units=Octets Displayed(tab/group)=Configured IP MTU (/IP Fragmentation) |
| keying |
Specifies the keying type that this tunnel will use.
type=ipsec.KeyingType Displayed(tab/group)=Keying |
| localIdType |
Specifies the Local ID used for IDi or IDr for IKEv2 tunnels.
type=ipsec.LocalIDTypeOption default=none Displayed(tab/group)=Type (Dynamic Keying/Local ID) |
| localIdValue |
Specifies the value associated with Local ID Type.
type=string default= minimum=0 maximum=255 Displayed(tab/group)=Value (Dynamic Keying/Local ID) |
| matchTrustAnchor |
type=string access=read-only default= Displayed(tab/group)=Match Trust Anchor (Dynamic Keying/Certificate) |
| maxNumPh1SaKeys |
This specifies the maximum number of security association (SA) phase 1 keys,
which can be saved by the system for this IPsec tunnel.
type=int default=0 minimum=0 maximum=3 Displayed(tab/group)=Phase 1 (/Max Num of Keys) |
| maxNumPh2SaKeys |
This specifies the maximum number of security association (SA) phase 2 keys,
which can be saved by the system, for this IPsec tunnel.
type=int default=0 minimum=0 maximum=48 Displayed(tab/group)=Phase 2 (/Max Num of Keys) |
| operationalFlags |
Indicates the reason why the tunnel is operationally down.
type=ipsec.TunnelOperFlagsType access=read-only Displayed(tab/group)=Operational Flags (States) |
| operationalState |
This indicates the operational status of tunnel.
type=netw.OperationalState access=read-only default=unknown Displayed(tab/group)=Operational State (States) |
| pMtuDiscoveryAging |
Specifies the number of seconds used to age out the learned MTU, which is obtained through
path MTU discovery.
type=long default=900 minimum=900 maximum=3600 units=seconds Displayed(tab/group)=Path MTU Aging Time (/IP Fragmentation) |
| preSharedKey |
Specifies the shared secret between the two peers forming the tunnel.
The value of tmnxIPsecTunnelIkePreSharedKey is a valid and non null
string only if the value of tmnxIPsecTunnelKeyingType is 'dynamic'.
type=string default= minimum=0 maximum=64 Displayed(tab/group)=Pre-shared key (Dynamic Keying) |
| primary |
This specifies the primary method used to verify revocation status of the peer's certificate.
type=ipsec.PrimaryVal default=crl Displayed(tab/group)=Primary (Dynamic Keying/Certificate Status Verification) |
| privateSap |
Specifies the SAP encapsulation value.
type=int access=read-create default=0 minimum=0 maximum=4094 Displayed(tab/group)=Private Sap Encapsulation |
| privateSvcId |
Specifies the private service ID of this tunnel.
type=long access=read-only default=0 |
| privateSvcName |
Specifies the private service name of this tunnel.
type=string default= |
| privateTcpMssAdjust |
Specifies the Maximum Segment Size (MSS) for the TCP traffic in an IPsec tunnel which is
sent from the private network to the public network. The system may use this value to
adjust or insert the MSS option in TCP SYN packet.
Valid values (-1|512..9000).
The value of '-1' specifies that the TCP MSS adjustment functionality on the private
side is disabled.
type=long default=-1 minimum=-1 maximum=9000 Displayed(tab/group)=Private (/TCP MSS Adjust) |
| propogatePMtuV4 |
Specifies whether or not to propogate a path MTU to IPv4 hosts.
type=boolean default=true Displayed(tab/group)=Propogate Path MTU IPv4 (/IP Fragmentation) |
| propogatePMtuV6 |
Specifies whether or not to propogate a path MTU to IPv6 hosts.
type=boolean default=true Displayed(tab/group)=Propogate Path MTU IPv6 (/IP Fragmentation) |
| publicTcpMssAdjust |
Specifies the Maximum Segment Size (MSS) for the TCP traffic in an IPsec tunnel which is
sent from the public network to the private network. The system may use this value to
adjust or insert the MSS option in TCP SYN packet.
Valid values (-1|0|512..9000).
The TCP MSS adjustment functionality on the public side network is disabled when the
following conditions are met.
1) The value of publicTcpMssAdjust is '-1' or
2) The values of publicTcpMssAdjust and encapsulatedIpMtu are both '0'.
The new MSS is calculated based on the following rules.
1) When the value of publicTcpMssAdjust is '0' (auto) and encapsulatedIpMtu has a non-zero value,
New MSS = encapsulatedIpMtu - total header size (e.g., encryption, encapsulation, TCP and IP headers)
2) When the value of publicTcpMssAdjust is in the range of (512..9000)
New MSS = publicTcpMssAdjust.
type=long default=-1 minimum=-1 maximum=9000 Displayed(tab/group)=Public (/TCP MSS Adjust) |
| remoteAddressType |
Specifies the address of the interface on the remote node of this IPsec tunnel.
type=rtr.InetAddressType default=ipv4 Displayed(tab/group)=Remote Gateway Address Type (/Tunnel Endpoints) |
| remoteIpAddress |
Specifies the address of the idisplnterface on the remote node of this IPsec tunnel.
type=InetAddress default=0.0.0.0 Displayed(tab/group)=Remote Gateway Address (/Tunnel Endpoints) |
| replayWindow |
Specifies the size of the anti-replay window for the IPsec tunnel and Tunnel template.
If the value of is set to 0, then the anti-replay feature is disabled.
type=ipsec.ReplayWindowType default=0 Displayed(tab/group)=Replay Window |
| routerId |
type=long access=read-only default=0 Displayed(tab/group)=Routing Instance ID (/Routing Instance) |
| rtr.IPSecSecurityAssociation-Set |
type=Children-Set |
| rtr.IPSecTunnelBfd-Set |
type=Children-Set |
| secondary |
This specifies the secondary method used to verify revocation status of the peer's certificate.
type=ipsec.SecondaryVal default=none Displayed(tab/group)=Secondary (Dynamic Keying/Certificate Status Verification) |
| securityPolicyId |
Specifies the IPsec security policy entry in the tmnxVRtSecPlcyTable that this tunnel.
type=long default=0 minimum=0 maximum=32768 Displayed(tab/group)=Security Policy ID |
| siteId |
type=string access=read-only default=0.0.0.0 maximum=50 Displayed(tab/group)=Site ID (/Site) |
| trustAnchorProfileName |
type=string default= Displayed(tab/group)=Trust Anchor Profile (Dynamic Keying/Certificate) |
| tunnelName |
Specifies the name of the IPSec Tunnel for a given secured interface.
type=string access=read-create default= minimum=1 maximum=32 Mandatory on create Displayed(tab/group)=Name |
| Properties inherited from ManagedObject |
|---|
| actionMask, children-Set, deploymentState, isFaultSquelched, name, objectFullName, selfAlarmed |
| Supported Network Elements | |
|---|---|
| 7750 SR |
Supported from 19.7.R1
|
| 7705 SAR Gen 2 | |
| 7705 SAR Hm | Supported from 19.7.R1 |
| Product Specifics | |
| 7705 SAR Gen 2 25.0 | |
| 7705 SAR Hm 21.0 | |
| 7705 SAR Hm 22.0 | |
| 7705 SAR Hm 23.0 | |
| 7705 SAR Hm 24.0 | |
| 7705 SAR Hm 25.0 | |
| 7750 SR 21.0 | |
| 7750 SR 22.0 | |
| 7750 SR 23.0 | |
| 7750 SR 24.0 | |
| 7750 SR 25.0 | |