![]() |
Table Of Contents
IPsec and IKE MIB Support for
Cisco VRF-Aware IPsecPrerequisites for IPsec and IKE MIB Support for
Cisco VRF-Aware IPsecInformation About IPsec and IKE MIB Support for
Cisco VRF-Aware IPsecMIBs Supported by the IPsec and IKE MIB Support for
Cisco VRF-Aware IPsec FeatureHow to Configure IPsec and IKE MIB Support for
Cisco VRF-Aware IPsecHow to Troubleshoot the IPsec and IKE MIB Support for Cisco VRF-Aware IPsec Feature
Configuration Examples for IPsec and IKE MIB Support for Cisco VRF-Aware IPsec
Configuration That Has Two VRFs: Examples
IPsec and IKE MIB Support for
Cisco VRF-Aware IPsec
The IPsec and IKE MIB Support for Cisco VRF-Aware IPsec feature provides manageability of Virtual Private Network routing and forwarding- (VRF-) aware IP security (IPsec) using MIBs. The benefit of this feature is that VRF-aware IPsec MIBs provide the granular details of IPsec statistics and performance metrics on a VRF basis.
History for the IPsec and IKE MIB Support for Cisco VRF-Aware IPsec Feature
Finding Support Information for Platforms and Cisco IOS Software Images
Use Cisco Feature Navigator to find information about platform support and Cisco IOS software image support. Access Cisco Feature Navigator at http://www.cisco.com/go/fn. You must have an account on Cisco.com. If you do not have an account or have forgotten your username or password, click Cancel at the login dialog box and follow the instructions that appear.
Contents
•
Prerequisites for IPsec and IKE MIB Support for Cisco VRF-Aware IPsec
•
Information About IPsec and IKE MIB Support for Cisco VRF-Aware IPsec
•
How to Configure IPsec and IKE MIB Support for Cisco VRF-Aware IPsec
•
Configuration Examples for IPsec and IKE MIB Support for Cisco VRF-Aware IPsec
Prerequisites for IPsec and IKE MIB Support for
Cisco VRF-Aware IPsec•
You should be familiar with configuring Simple Network Management Protocol (SNMP).
Information About IPsec and IKE MIB Support for
Cisco VRF-Aware IPsecTo configure IPsec and MIB Support for Cisco VRF-Aware IPsec, you should understand the following concepts:
•
MIBs Supported by the IPsec and IKE MIB Support for Cisco VRF-Aware IPsec Feature
MIBs Supported by the IPsec and IKE MIB Support for
Cisco VRF-Aware IPsec FeatureThe following MIBs are supported by the IPsec and IKE MIB Support for Cisco VRF-Aware IPsec feature:
•
CISCO-IPSEC-FLOW-MONITOR-MIB
•
CISCO-IPSEC-MIB
•
The CISCO-IPSEC-POLICY-MAP-MIB continues to be supported. However, because this MIB applies to the entire router rather than to a specific VPN VRF instance, it is not VRF aware; therefore, polling of the object identifiers (OIDs) that belong to this MIB is accomplished with respect to the global VRF context.
How to Configure IPsec and IKE MIB Support for
Cisco VRF-Aware IPsecNo special configuration is needed for this feature. The SNMP framework can be used to manage VRF-aware IPsec using MIBs. See the section "Configuration Examples for IPsec and IKE MIB Support for Cisco VRF-Aware IPsec" for a reference to configuring SNMP.
The following section provides information about troubleshooting this feature:
•
How to Troubleshoot the IPsec and IKE MIB Support for Cisco VRF-Aware IPsec Feature
How to Troubleshoot the IPsec and IKE MIB Support for Cisco VRF-Aware IPsec Feature
The following debug crypto mib command and keywords may be used to display information about the IPsec and Internet Key Exchange (IKE) MIB as it relates to Cisco VRF-aware IPsec.
SUMMARY STEPS
1.
enable
2.
debug crypto mib detail
3.
debug crypto mib error
DETAILED STEPS
Configuration Examples for IPsec and IKE MIB Support for Cisco VRF-Aware IPsec
This section includes the following example:
•
Configuration That Has Two VRFs: Examples
Configuration That Has Two VRFs: Examples
The following output example is for a typical hub configuration that has two VRFs. The output is what you would see if you were to poll for the IPsec security association (SA). Router 3745b is the VRF-aware router.
Two VRFs Configured
The following output shows that two VRFs have been configured (vrf1 and vrf2).
Router3745b# show running-configBuilding configuration...Current configuration : 6567 bytes!version 12.4service timestamps debug datetime msec localtimeservice timestamps log uptimeno service password-encryption!hostname ipsecf-3745b!boot-start-markerboot-end-marker!no logging consoleenable password lab!no aaa new-model!resource policy!memory-size iomem 5clock timezone PST -8clock summer-time PDT recurringip subnet-zeroip cef!!ip vrf vrf1rd 1:101context vrf-vrf1-contextroute-target export 1:101route-target import 1:101!ip vrf vrf2rd 2:101context vrf-vrf2-contextroute-target export 2:101route-target import 2:101!no ip domain lookup!!crypto keyring vrf1-1 vrf vrf1pre-shared-key address 10.1.1.1 255.255.255.0 key vrf1-1crypto keyring vrf2-1 vrf vrf2pre-shared-key address 10.1.2.1 255.255.255.0 key vrf2-1!!crypto isakmp policy 1authentication pre-share!crypto isakmp policy 50authentication pre-sharecrypto isakmp key global1-1 address 10.1.151.1crypto isakmp key global2-1 address 10.1.152.1crypto isakmp profile vrf1-1keyring vrf1-1match identity address 10.1.1.1 255.255.255.255 vrf1crypto isakmp profile vrf2-1keyring vrf2-1match identity address 10.1.2.1 255.255.255.255 vrf2!crypto ipsec security-association lifetime kilobytes 99000crypto ipsec security-association lifetime seconds 5000!crypto ipsec transform-set tset ah-sha-hmac esp-des esp-sha-hmac!crypto map global1-1 10 ipsec-isakmpset peer 10.1.151.1set transform-set tsetmatch address 151!crypto map global2-1 10 ipsec-isakmpset peer 10.1.152.1set transform-set tsetmatch address 152!crypto map vrf1-1 10 ipsec-isakmpset peer 10.1.1.1set transform-set tsetset isakmp-profile vrf1-1match address 101!crypto map vrf2-1 10 ipsec-isakmpset peer 10.1.2.1set transform-set tsetset isakmp-profile vrf2-1match address 102!!interface FastEthernet0/0ip address 10.1.38.25 255.255.255.0no ip mroute-cacheduplex autospeed auto!interface Serial0/0no ip addressshutdownclock rate 2000000!interface FastEthernet0/1no ip addressno ip mroute-cacheshutdownduplex autospeed auto!interface Serial0/1no ip addressshutdownclock rate 2000000!interface Serial1/0no ip addressencapsulation frame-relayno ip route-cache cefno ip route-cacheno ip mroute-cacheno keepaliveserial restart-delay 0clock rate 128000no frame-relay inverse-arp!interface Serial1/0.1 point-to-pointip vrf forwarding vrf1ip address 10.3.1.1 255.255.255.0no ip route-cacheframe-relay interface-dlci 21!interface Serial1/0.2 point-to-pointip vrf forwarding vrf2ip address 10.3.2.1 255.255.255.0no ip route-cacheframe-relay interface-dlci 22!interface Serial1/0.151 point-to-pointip address 10.7.151.1 255.255.255.0no ip route-cacheframe-relay interface-dlci 151!interface Serial1/0.152 point-to-pointip address 10.7.152.1 255.255.255.0no ip route-cacheframe-relay interface-dlci 152!interface Serial1/1no ip addressno ip mroute-cacheshutdownserial restart-delay 0!interface Serial1/2no ip addressencapsulation frame-relayno ip route-cache cefno ip route-cacheno ip mroute-cacheno keepaliveserial restart-delay 0no frame-relay inverse-arp!interface Serial1/2.1 point-to-pointip vrf forwarding vrf1ip address 10.1.1.2 255.255.255.0no ip route-cacheframe-relay interface-dlci 21crypto map vrf1-1!interface Serial1/2.2 point-to-pointip vrf forwarding vrf2ip address 10.1.2.2 255.255.255.0no ip route-cacheframe-relay interface-dlci 22crypto map vrf2-1!interface Serial1/2.151 point-to-pointip address 10.5.151.2 255.255.255.0no ip route-cacheframe-relay interface-dlci 151crypto map global1-1!interface Serial1/2.152 point-to-pointip address 10.5.152.2 255.255.255.0no ip route-cacheframe-relay interface-dlci 152crypto map global2-1!interface Serial1/3no ip addressno ip mroute-cacheshutdownserial restart-delay 0!ip default-gateway 10.1.38.1ip classlessip route 10.1.1.6 255.255.255.255 10.1.151.1ip route 10.2.1.6 255.255.255.255 10.1.152.1ip route 10.6.2.1 255.255.255.255 10.7.151.2ip route 10.6.2.2 255.255.255.255 10.7.152.2ip route 172.19.216.110 255.255.255.255 FastEthernet0/0ip route vrf vrf1 10.20.1.1 255.255.255.255 10.1.1.1ip route vrf vrf1 10.22.1.1 255.255.255.255 10.30.1.1ip route vrf vrf2 10.20.2.1 255.255.255.255 10.1.2.1ip route vrf vrf2 10.22.2.1 255.255.255.255 10.30.1.2!!ip http serverno ip http secure-server!ip access-list standard vrf-vrf1-contextip access-list standard vrf-vrf2-context!access-list 101 permit ip host 10.22.1.1 host 10.20.1.1access-list 102 permit ip host 10.22.2.1 host 10.20.2.1access-list 151 permit ip host 10.6.2.1 host 10.1.1.6access-list 152 permit ip host 10.6.2.2 host 10.2.1.6snmp-server group abc1 v2c context vrf-vrf1-context read view_vrf1 notify *tv.FFFFFFFF.FFFFFFFF.FFFFFFFF.F access vrf-vrf1-contextsnmp-server group abc2 v2c context vrf-vrf2-context read view_vrf2 notify *tv.FFFFFFFF.FFFFFFFF.FFFFFFFF.F access vrf-vrf2-contextsnmp-server view view_vrf1 iso includedsnmp-server view view_vrf2 iso includedsnmp-server community abc1 RWsnmp-server community global1 RWsnmp-server community abc2 RWsnmp-server community global2 RWsnmp-server enable traps ttysnmp-server enable traps configsnmp-server host 172.19.216.110 version 2c abc1snmp-server host 172.19.216.110 vrf vrf1 version 2c abc1 udp-port 2001 ipsec isakmpsnmp-server host 172.19.216.110 version 2c abc2snmp-server host 172.19.216.110 vrf vrf2 version 2c abc2 udp-port 2002 ipsec isakmpsnmp-server context vrf-vrf1-contextsnmp-server context vrf-vrf2-context!!snmp mib community-map abc1 context vrf-vrf1-contextsnmp mib community-map abc2 context vrf-vrf2-context!!control-plane!!line con 0exec-timeout 0 0line aux 0line vty 0 4login!!webvpn context Default_contextssl authenticate verify all!no inservice!!endBoth VRFs Cleared
The following output, for abc1 and abc2, shows that both VRFs have been "cleared" to ensure that all the counters are initialized to a known value.
The following output shows that VRF abc1 has been cleared:
orcas:2> setenv SR_MGR_CONF /users/green1orcas:3> setenv SR_UTIL_SNMP_VERSION v2corcas:5> setenv SR_UTIL_COMMUNITY abc1orcas:6> setenv SR_MGR_CONF_DIR /users/green1orcas:7> /auto/sw/packages/snmpr/10.14.2.0/solaris2bin/getmany -v2c 10.1.38.25 cipSecMIBObjectscipSecMibLevel.0 = 1cikeGlobalActiveTunnels.0 = 0cikeGlobalPreviousTunnels.0 = 0cikeGlobalInOctets.0 = 0cikeGlobalInPkts.0 = 0cikeGlobalInDropPkts.0 = 0cikeGlobalInNotifys.0 = 0cikeGlobalInP2Exchgs.0 = 0cikeGlobalInP2ExchgInvalids.0 = 0cikeGlobalInP2ExchgRejects.0 = 0cikeGlobalInP2SaDelRequests.0 = 0cikeGlobalOutOctets.0 = 0cikeGlobalOutPkts.0 = 0cikeGlobalOutDropPkts.0 = 0cikeGlobalOutNotifys.0 = 0cikeGlobalOutP2Exchgs.0 = 0cikeGlobalOutP2ExchgInvalids.0 = 0cikeGlobalOutP2ExchgRejects.0 = 0cikeGlobalOutP2SaDelRequests.0 = 0cikeGlobalInitTunnels.0 = 0cikeGlobalInitTunnelFails.0 = 0cikeGlobalRespTunnelFails.0 = 0cikeGlobalSysCapFails.0 = 0cikeGlobalAuthFails.0 = 0cikeGlobalDecryptFails.0 = 0cikeGlobalHashValidFails.0 = 0cikeGlobalNoSaFails.0 = 0cipSecGlobalActiveTunnels.0 = 0cipSecGlobalPreviousTunnels.0 = 0cipSecGlobalInOctets.0 = 0cipSecGlobalHcInOctets.0 = 0x00cipSecGlobalInOctWraps.0 = 0cipSecGlobalInDecompOctets.0 = 0cipSecGlobalHcInDecompOctets.0 = 0x00cipSecGlobalInDecompOctWraps.0 = 0cipSecGlobalInPkts.0 = 0cipSecGlobalInDrops.0 = 0cipSecGlobalInReplayDrops.0 = 0cipSecGlobalInAuths.0 = 0cipSecGlobalInAuthFails.0 = 0cipSecGlobalInDecrypts.0 = 0cipSecGlobalInDecryptFails.0 = 0cipSecGlobalOutOctets.0 = 0cipSecGlobalHcOutOctets.0 = 0x00cipSecGlobalOutOctWraps.0 = 0cipSecGlobalOutUncompOctets.0 = 0cipSecGlobalHcOutUncompOctets.0 = 0x00cipSecGlobalOutUncompOctWraps.0 = 0cipSecGlobalOutPkts.0 = 0cipSecGlobalOutDrops.0 = 0cipSecGlobalOutAuths.0 = 0cipSecGlobalOutAuthFails.0 = 0cipSecGlobalOutEncrypts.0 = 0cipSecGlobalOutEncryptFails.0 = 0cipSecGlobalProtocolUseFails.0 = 0cipSecGlobalNoSaFails.0 = 0cipSecGlobalSysCapFails.0 = 0cipSecHistTableSize.0 = 200cipSecHistCheckPoint.0 = ready(1)cipSecFailTableSize.0 = 200cipSecTrapCntlIkeTunnelStart.0 = enabled(1)cipSecTrapCntlIkeTunnelStop.0 = enabled(1)cipSecTrapCntlIkeSysFailure.0 = disabled(2)cipSecTrapCntlIkeCertCrlFailure.0 = disabled(2)cipSecTrapCntlIkeProtocolFail.0 = disabled(2)cipSecTrapCntlIkeNoSa.0 = disabled(2)cipSecTrapCntlIpSecTunnelStart.0 = enabled(1)cipSecTrapCntlIpSecTunnelStop.0 = enabled(1)cipSecTrapCntlIpSecSysFailure.0 = disabled(2)cipSecTrapCntlIpSecSetUpFailure.0 = disabled(2)cipSecTrapCntlIpSecEarlyTunTerm.0 = disabled(2)cipSecTrapCntlIpSecProtocolFail.0 = disabled(2)cipSecTrapCntlIpSecNoSa.0 = disabled(2)The following output shows that VRF abc2 has been cleared:
orcas:8> setenv SR_UTIL_COMMUNITY abc2orcas:9> /auto/sw/packages/snmpr/14.2.0.0/solaris2bin/getmany -v2c 10.1.38.25 cipSecMIBObjectscipSecMibLevel.0 = 1cikeGlobalActiveTunnels.0 = 0cikeGlobalPreviousTunnels.0 = 0cikeGlobalInOctets.0 = 0cikeGlobalInPkts.0 = 0cikeGlobalInDropPkts.0 = 0cikeGlobalInNotifys.0 = 0cikeGlobalInP2Exchgs.0 = 0cikeGlobalInP2ExchgInvalids.0 = 0cikeGlobalInP2ExchgRejects.0 = 0cikeGlobalInP2SaDelRequests.0 = 0cikeGlobalOutOctets.0 = 0cikeGlobalOutPkts.0 = 0cikeGlobalOutDropPkts.0 = 0cikeGlobalOutNotifys.0 = 0cikeGlobalOutP2Exchgs.0 = 0cikeGlobalOutP2ExchgInvalids.0 = 0cikeGlobalOutP2ExchgRejects.0 = 0cikeGlobalOutP2SaDelRequests.0 = 0cikeGlobalInitTunnels.0 = 0cikeGlobalInitTunnelFails.0 = 0cikeGlobalRespTunnelFails.0 = 0cikeGlobalSysCapFails.0 = 0cikeGlobalAuthFails.0 = 0cikeGlobalDecryptFails.0 = 0cikeGlobalHashValidFails.0 = 0cikeGlobalNoSaFails.0 = 0cipSecGlobalActiveTunnels.0 = 0cipSecGlobalPreviousTunnels.0 = 0cipSecGlobalInOctets.0 = 0cipSecGlobalHcInOctets.0 = 0x00cipSecGlobalInOctWraps.0 = 0cipSecGlobalInDecompOctets.0 = 0cipSecGlobalHcInDecompOctets.0 = 0x00cipSecGlobalInDecompOctWraps.0 = 0cipSecGlobalInPkts.0 = 0cipSecGlobalInDrops.0 = 0cipSecGlobalInReplayDrops.0 = 0cipSecGlobalInAuths.0 = 0cipSecGlobalInAuthFails.0 = 0cipSecGlobalInDecrypts.0 = 0cipSecGlobalInDecryptFails.0 = 0cipSecGlobalOutOctets.0 = 0cipSecGlobalHcOutOctets.0 = 0x00cipSecGlobalOutOctWraps.0 = 0cipSecGlobalOutUncompOctets.0 = 0cipSecGlobalHcOutUncompOctets.0 = 0x00cipSecGlobalOutUncompOctWraps.0 = 0cipSecGlobalOutPkts.0 = 0cipSecGlobalOutDrops.0 = 0cipSecGlobalOutAuths.0 = 0cipSecGlobalOutAuthFails.0 = 0cipSecGlobalOutEncrypts.0 = 0cipSecGlobalOutEncryptFails.0 = 0cipSecGlobalProtocolUseFails.0 = 0cipSecGlobalNoSaFails.0 = 0cipSecGlobalSysCapFails.0 = 0cipSecHistTableSize.0 = 200cipSecHistCheckPoint.0 = ready(1)cipSecFailTableSize.0 = 200cipSecTrapCntlIkeTunnelStart.0 = enabled(1)cipSecTrapCntlIkeTunnelStop.0 = enabled(1)cipSecTrapCntlIkeSysFailure.0 = disabled(2)cipSecTrapCntlIkeCertCrlFailure.0 = disabled(2)cipSecTrapCntlIkeProtocolFail.0 = disabled(2)cipSecTrapCntlIkeNoSa.0 = disabled(2)cipSecTrapCntlIpSecTunnelStart.0 = enabled(1)cipSecTrapCntlIpSecTunnelStop.0 = enabled(1)cipSecTrapCntlIpSecSysFailure.0 = disabled(2)cipSecTrapCntlIpSecSetUpFailure.0 = disabled(2)cipSecTrapCntlIpSecEarlyTunTerm.0 = disabled(2)cipSecTrapCntlIpSecProtocolFail.0 = disabled(2)cipSecTrapCntlIpSecNoSa.0 = disabled(2)orcas:10>orcas:10>orcas:10>VRF abc1 Pinged
The following output shows that VRF abc1 has been pinged:
Router3745a# pingProtocol [ip]:Target IP address: 10.22.1.1Repeat count [5]:Datagram size [100]:Timeout in seconds [2]:Extended commands [n]: ySource address or interface: 10.20.1.1Type of service [0]:Set DF bit in IP header? [no]:Validate reply data? [no]:Data pattern [0xABCD]:Loose, Strict, Record, Timestamp, Verbose[none]:Sweep range of sizes [n]:Type escape sequence to abort.Sending 5, 100-byte ICMP Echos to 10.22.1.1, timeout is 2 seconds:Packet sent with a source address of 10.20.1.1VRF abc1 Polled
Polling VRF abc1 results in the following output:
Note
After the ping, the counters should show some nonzero values.
orcas:10>orcas:12> setenv SR_UTIL_COMMUNITY abc1orcas:13> /auto/sw/packages/snmpr/10.14.2.0/solaris2bin/getmany -v2c 10.1.38.25 cipSecMIBObjectscipSecMibLevel.0 = 1cikeGlobalActiveTunnels.0 = 1cikeGlobalPreviousTunnels.0 = 0cikeGlobalInOctets.0 = 336cikeGlobalInPkts.0 = 2cikeGlobalInDropPkts.0 = 0cikeGlobalInNotifys.0 = 1cikeGlobalInP2Exchgs.0 = 2cikeGlobalInP2ExchgInvalids.0 = 0cikeGlobalInP2ExchgRejects.0 = 0cikeGlobalInP2SaDelRequests.0 = 0cikeGlobalOutOctets.0 = 344cikeGlobalOutPkts.0 = 2cikeGlobalOutDropPkts.0 = 0cikeGlobalOutNotifys.0 = 0cikeGlobalOutP2Exchgs.0 = 1cikeGlobalOutP2ExchgInvalids.0 = 0cikeGlobalOutP2ExchgRejects.0 = 0cikeGlobalOutP2SaDelRequests.0 = 0cikeGlobalInitTunnels.0 = 0cikeGlobalInitTunnelFails.0 = 0cikeGlobalRespTunnelFails.0 = 0cikeGlobalSysCapFails.0 = 0cikeGlobalAuthFails.0 = 0cikeGlobalDecryptFails.0 = 0cikeGlobalHashValidFails.0 = 0cikeGlobalNoSaFails.0 = 0cikePeerLocalAddr.1.15.48.49.48.46.48.48.49.46.48.48.49.46.48.48.50.1.15.48.49.48.46.48.48 .49.46.48.48.49.46.48.48.49.1 = 0a 01 01 02cikePeerRemoteAddr.1.15.48.49.48.46.48.48.49.46.48.48.49.46.48.48.50.1.15.48.49.48.46.48.4 8.49.46.48.48.49.46.48.48.49.1 = 0a 01 01 01cikePeerActiveTime.1.15.48.49.48.46.48.48.49.46.48.48.49.46.48.48.50.1.15.48.49.48.46.48.4 8.49.46.48.48.49.46.48.48.49.1 = 13743cikePeerActiveTunnelIndex.1.15.48.49.48.46.48.48.49.46.48.48.49.46.48.48.50.1.15.48.49.48. 46.48.48.49.46.48.48.49.46.48.48.49.1 = 1cikeTunLocalType.1 = ipAddrPeer(1)cikeTunLocalValue.1 = 010.001.001.002cikeTunLocalAddr.1 = 0a 01 01 02cikeTunLocalName.1 = ipsecf-3745bcikeTunRemoteType.1 = ipAddrPeer(1)cikeTunRemoteValue.1 = 010.001.001.001cikeTunRemoteAddr.1 = 0a 01 01 01cikeTunRemoteName.1 =cikeTunNegoMode.1 = main(1)cikeTunDiffHellmanGrp.1 = dhGroup1(2)cikeTunEncryptAlgo.1 = des(2)cikeTunHashAlgo.1 = sha(3)cikeTunAuthMethod.1 = preSharedKey(2)cikeTunLifeTime.1 = 86400cikeTunActiveTime.1 = 13752cikeTunSaRefreshThreshold.1 = 0cikeTunTotalRefreshes.1 = 0cikeTunInOctets.1 = 336cikeTunInPkts.1 = 2cikeTunInDropPkts.1 = 0cikeTunInNotifys.1 = 1cikeTunInP2Exchgs.1 = 2cikeTunInP2ExchgInvalids.1 = 0cikeTunInP2ExchgRejects.1 = 0cikeTunInP2SaDelRequests.1 = 0cikeTunOutOctets.1 = 344cikeTunOutPkts.1 = 2cikeTunOutDropPkts.1 = 0cikeTunOutNotifys.1 = 0cikeTunOutP2Exchgs.1 = 1cikeTunOutP2ExchgInvalids.1 = 0cikeTunOutP2ExchgRejects.1 = 0cikeTunOutP2SaDelRequests.1 = 0cikeTunStatus.1 = active(1)cikePeerCorrIpSecTunIndex.1.15.48.49.48.46.48.48.49.46.48.48.49.46.48.48.50.1.15.48.49.48. 46.48.48.49.46.48.48.49.46.48.48.49.1.1 = 1cipSecGlobalActiveTunnels.0 = 1cipSecGlobalPreviousTunnels.0 = 0cipSecGlobalInOctets.0 = 400cipSecGlobalHcInOctets.0 = 0x0190cipSecGlobalInOctWraps.0 = 0cipSecGlobalInDecompOctets.0 = 400cipSecGlobalHcInDecompOctets.0 = 0x0190cipSecGlobalInDecompOctWraps.0 = 0cipSecGlobalInPkts.0 = 4cipSecGlobalInDrops.0 = 0cipSecGlobalInReplayDrops.0 = 0cipSecGlobalInAuths.0 = 4cipSecGlobalInAuthFails.0 = 0cipSecGlobalInDecrypts.0 = 4cipSecGlobalInDecryptFails.0 = 0cipSecGlobalOutOctets.0 = 704cipSecGlobalHcOutOctets.0 = 0x02c0cipSecGlobalOutOctWraps.0 = 0cipSecGlobalOutUncompOctets.0 = 704cipSecGlobalHcOutUncompOctets.0 = 0x02c0cipSecGlobalOutUncompOctWraps.0 = 0cipSecGlobalOutPkts.0 = 4cipSecGlobalOutDrops.0 = 0cipSecGlobalOutAuths.0 = 4cipSecGlobalOutAuthFails.0 = 0cipSecGlobalOutEncrypts.0 = 4cipSecGlobalOutEncryptFails.0 = 0cipSecGlobalProtocolUseFails.0 = 0cipSecGlobalNoSaFails.0 = 0cipSecGlobalSysCapFails.0 = 0cipSecTunIkeTunnelIndex.1 = 1cipSecTunIkeTunnelAlive.1 = true(1)cipSecTunLocalAddr.1 = 0a 01 01 02cipSecTunRemoteAddr.1 = 0a 01 01 01cipSecTunKeyType.1 = ike(1)cipSecTunEncapMode.1 = tunnel(1)cipSecTunLifeSize.1 = 99000cipSecTunLifeTime.1 = 5000cipSecTunActiveTime.1 = 13749cipSecTunSaLifeSizeThreshold.1 = 64cipSecTunSaLifeTimeThreshold.1 = 10cipSecTunTotalRefreshes.1 = 0cipSecTunExpiredSaInstances.1 = 0cipSecTunCurrentSaInstances.1 = 4cipSecTunInSaDiffHellmanGrp.1 = dhGroup1(2)cipSecTunInSaEncryptAlgo.1 = des(2)cipSecTunInSaAhAuthAlgo.1 = hmacSha(3)cipSecTunInSaEspAuthAlgo.1 = hmacSha(3)cipSecTunInSaDecompAlgo.1 = none(1)cipSecTunOutSaDiffHellmanGrp.1 = dhGroup1(2)cipSecTunOutSaEncryptAlgo.1 = des(2)cipSecTunOutSaAhAuthAlgo.1 = hmacSha(3)cipSecTunOutSaEspAuthAlgo.1 = hmacSha(3)cipSecTunOutSaCompAlgo.1 = none(1)cipSecTunInOctets.1 = 400cipSecTunHcInOctets.1 = 0x0190cipSecTunInOctWraps.1 = 0cipSecTunInDecompOctets.1 = 400cipSecTunHcInDecompOctets.1 = 0x0190cipSecTunInDecompOctWraps.1 = 0cipSecTunInPkts.1 = 4cipSecTunInDropPkts.1 = 0cipSecTunInReplayDropPkts.1 = 0cipSecTunInAuths.1 = 4cipSecTunInAuthFails.1 = 0cipSecTunInDecrypts.1 = 4cipSecTunInDecryptFails.1 = 0cipSecTunOutOctets.1 = 704cipSecTunHcOutOctets.1 = 0x02c0cipSecTunOutOctWraps.1 = 0cipSecTunOutUncompOctets.1 = 704cipSecTunHcOutUncompOctets.1 = 0x02c0cipSecTunOutUncompOctWraps.1 = 0cipSecTunOutPkts.1 = 4cipSecTunOutDropPkts.1 = 0cipSecTunOutAuths.1 = 4cipSecTunOutAuthFails.1 = 0cipSecTunOutEncrypts.1 = 4cipSecTunOutEncryptFails.1 = 0cipSecTunStatus.1 = active(1)cipSecEndPtLocalName.1.1 =cipSecEndPtLocalType.1.1 = singleIpAddr(1)cipSecEndPtLocalAddr1.1.1 = 16 01 01 01cipSecEndPtLocalAddr2.1.1 = 16 01 01 01cipSecEndPtLocalProtocol.1.1 = 0cipSecEndPtLocalPort.1.1 = 0cipSecEndPtRemoteName.1.1 =cipSecEndPtRemoteType.1.1 = singleIpAddr(1)cipSecEndPtRemoteAddr1.1.1 = 14 01 01 01cipSecEndPtRemoteAddr2.1.1 = 14 01 01 01cipSecEndPtRemoteProtocol.1.1 = 0cipSecEndPtRemotePort.1.1 = 0cipSecSpiDirection.1.1 = in(1)cipSecSpiDirection.1.2 = out(2)cipSecSpiDirection.1.3 = in(1)cipSecSpiDirection.1.4 = out(2)cipSecSpiValue.1.1 = 3891970674cipSecSpiValue.1.2 = 1963217493cipSecSpiValue.1.3 = 3691920464cipSecSpiValue.1.4 = 3458912974cipSecSpiProtocol.1.1 = ah(1)cipSecSpiProtocol.1.2 = ah(1)cipSecSpiProtocol.1.3 = esp(2)cipSecSpiProtocol.1.4 = esp(2)cipSecSpiStatus.1.1 = active(1)cipSecSpiStatus.1.2 = active(1)cipSecSpiStatus.1.3 = active(1)cipSecSpiStatus.1.4 = active(1)cipSecHistTableSize.0 = 200cipSecHistCheckPoint.0 = ready(1)cipSecFailTableSize.0 = 200cipSecTrapCntlIkeTunnelStart.0 = enabled(1)cipSecTrapCntlIkeTunnelStop.0 = enabled(1)cipSecTrapCntlIkeSysFailure.0 = disabled(2)cipSecTrapCntlIkeCertCrlFailure.0 = disabled(2)cipSecTrapCntlIkeProtocolFail.0 = disabled(2)cipSecTrapCntlIkeNoSa.0 = disabled(2)cipSecTrapCntlIpSecTunnelStart.0 = enabled(1)cipSecTrapCntlIpSecTunnelStop.0 = enabled(1)cipSecTrapCntlIpSecSysFailure.0 = disabled(2)cipSecTrapCntlIpSecSetUpFailure.0 = disabled(2)cipSecTrapCntlIpSecEarlyTunTerm.0 = disabled(2)cipSecTrapCntlIpSecProtocolFail.0 = disabled(2)cipSecTrapCntlIpSecNoSa.0 = disabled(2)orcas:14>orcas:14>orcas:14>VRF abc2 Polled
Polling VRF abc2 results in the following output:
Note
The ping was completed for VRF abc1 only. Therefore, the counters of VRF abc2 should remain in the initialized state.
setenv SR_UTIL_COMMUNITY abc2orcas:15>orcas:15> /auto/sw/packages/snmpr/10.14.2.0/solaris2bin/getmany -v2c 10.1.38.25 cipSecMIBObjectscipSecMibLevel.0 = 1cikeGlobalActiveTunnels.0 = 0cikeGlobalPreviousTunnels.0 = 0cikeGlobalInOctets.0 = 0cikeGlobalInPkts.0 = 0cikeGlobalInDropPkts.0 = 0cikeGlobalInNotifys.0 = 0cikeGlobalInP2Exchgs.0 = 0cikeGlobalInP2ExchgInvalids.0 = 0cikeGlobalInP2ExchgRejects.0 = 0cikeGlobalInP2SaDelRequests.0 = 0cikeGlobalOutOctets.0 = 0cikeGlobalOutPkts.0 = 0cikeGlobalOutDropPkts.0 = 0cikeGlobalOutNotifys.0 = 0cikeGlobalOutP2Exchgs.0 = 0cikeGlobalOutP2ExchgInvalids.0 = 0cikeGlobalOutP2ExchgRejects.0 = 0cikeGlobalOutP2SaDelRequests.0 = 0cikeGlobalInitTunnels.0 = 0cikeGlobalInitTunnelFails.0 = 0cikeGlobalRespTunnelFails.0 = 0cikeGlobalSysCapFails.0 = 0cikeGlobalAuthFails.0 = 0cikeGlobalDecryptFails.0 = 0cikeGlobalHashValidFails.0 = 0cikeGlobalNoSaFails.0 = 0cipSecGlobalActiveTunnels.0 = 0cipSecGlobalPreviousTunnels.0 = 0cipSecGlobalInOctets.0 = 0cipSecGlobalHcInOctets.0 = 0x00cipSecGlobalInOctWraps.0 = 0cipSecGlobalInDecompOctets.0 = 0cipSecGlobalHcInDecompOctets.0 = 0x00cipSecGlobalInDecompOctWraps.0 = 0cipSecGlobalInPkts.0 = 0cipSecGlobalInDrops.0 = 0cipSecGlobalInReplayDrops.0 = 0cipSecGlobalInAuths.0 = 0cipSecGlobalInAuthFails.0 = 0cipSecGlobalInDecrypts.0 = 0cipSecGlobalInDecryptFails.0 = 0cipSecGlobalOutOctets.0 = 0cipSecGlobalHcOutOctets.0 = 0x00cipSecGlobalOutOctWraps.0 = 0cipSecGlobalOutUncompOctets.0 = 0cipSecGlobalHcOutUncompOctets.0 = 0x00cipSecGlobalOutUncompOctWraps.0 = 0cipSecGlobalOutPkts.0 = 0cipSecGlobalOutDrops.0 = 0cipSecGlobalOutAuths.0 = 0cipSecGlobalOutAuthFails.0 = 0cipSecGlobalOutEncrypts.0 = 0cipSecGlobalOutEncryptFails.0 = 0cipSecGlobalProtocolUseFails.0 = 0cipSecGlobalNoSaFails.0 = 0cipSecGlobalSysCapFails.0 = 0cipSecHistTableSize.0 = 200cipSecHistCheckPoint.0 = ready(1)cipSecFailTableSize.0 = 200cipSecTrapCntlIkeTunnelStart.0 = enabled(1)cipSecTrapCntlIkeTunnelStop.0 = enabled(1)cipSecTrapCntlIkeSysFailure.0 = disabled(2)cipSecTrapCntlIkeCertCrlFailure.0 = disabled(2)cipSecTrapCntlIkeProtocolFail.0 = disabled(2)cipSecTrapCntlIkeNoSa.0 = disabled(2)cipSecTrapCntlIpSecTunnelStart.0 = enabled(1)cipSecTrapCntlIpSecTunnelStop.0 = enabled(1)cipSecTrapCntlIpSecSysFailure.0 = disabled(2)cipSecTrapCntlIpSecSetUpFailure.0 = disabled(2)cipSecTrapCntlIpSecEarlyTunTerm.0 = disabled(2)cipSecTrapCntlIpSecProtocolFail.0 = disabled(2)cipSecTrapCntlIpSecNoSa.0 = disabled(2)orcas:16>Additional References
The following sections provide references related to the IPsec and IKE MIB Support for
Cisco VRF-Aware IPsec feature.Related Documents
Related Topic Document TitleCisco IOS commands by technology
Cisco IOS Release Command References, Release 12.4T
Cisco IOS master commands list
Configuring SNMP
The chapter "Configuring SNMP Support" in the Cisco IOS Network Management Configuration Guide.
Configuring VRF-Aware IPsec
VRF-Aware IPSec feature module, Release 12.2(15)T
Standards
Standard TitleNo new or modified standards are supported by this feature, and support for existing standards has not been modified by this feature.
—
MIBs
RFCs
RFC TitleNo new or modified RFCs are supported by this feature, and support for existing RFCs has not been modified by this feature.
—
Technical Assistance
Command Reference
This section documents a modified command only.
debug crypto mib
To display debug messages for the IP Security (IPsec) MIB subsystem, use the debug crypto mib command in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug crypto mib [detail | error]
no debug crypto mib [detail | error]
Syntax Description
Defaults
Message notification debugging is not enabled.
Command Modes
Privileged EXEC
Command History
Release Modification12.1(4)E
This command was introduced.
12.2(4)T
This command was integrated into Cisco IOS Release 12.2(4)T.
12.4(4)T
The detail and error keywords were added.
Examples
The following example shows IPsec MIB debug message notification being enabled:
Router# debug crypto mibCrypto IPSec Mgmt Entity debugging is onThe following example shows that detailed information about events that are occurring in the subsystem has been requested:
Router# debug crypto mib detailThe following example shows that information has been requested about error events in the MIB agent:
Router# debug crypto mib error
Related Commands
Copyright © 2005 Cisco Systems, Inc. All rights reserved.