CISCO-CRYPTO-ACCELERATOR-MIB
File:
CISCO-CRYPTO-ACCELERATOR-MIB.mib (45541 bytes)
Imported modules
Imported symbols
Defined Types
CAModuleType |
|
This type yields the marketing label of the module
type and supplements the corresponding
entPhysicalVendorType MIB variable, if the crypto
accelerator has an entry in entPhysicalTable.
The value 'other' has been provided to keep the MIB
still applicable while new crypto accelerators
emerge.
'software' denotes the software implementation of
crypto functions.
'integrated' denotes crypto accelerator modules which
are integrated into the managed entity and are hence
not modular.
'sep' and 'sepe' are scalable encryption processors
used in VPN3000 series concentrators.
'a1700VpnModule' identifies the crypto accelerator
used in in 1700 series routers.
'aimVpn' series of crypto accelerators are designed
specifically for 2600 and 3700 platforms. Further,
the aimVpnII series also function on 2800 series
routers.
'aimVpn' series of crypto accelerators are designed
specifically for 2600 and 2700 platforms.
'isa' is designed for 7200 series routers.
'vam' series of crypto accelerators are to be used
on 7200 and 7300 series routers.
'vpnsm' denotes the Catalyst 6500 VPN service module,
which is deemed a sophisticated 'crypto accelerator'.
The 'caviumNitrox' series of crypto accelerators
represent the crypto accelerator chipsets used in
ASA devices.
|
TEXTUAL-CONVENTION |
|
|
|
|
INTEGER |
other(1), software(2), integrated(3), sep(4), sepe(5), a1700VpnModule(6), aimVpnIBp(7), aimVpnIEp(8), aimVpnIIBp(9), aimVpnIIEp(10), aimVpnIIHp(11), isa(12), vam(13), vam2(14), vam2plus(15), vpnsm(16), caviumNitrox(17), caviumNitroxII(18), caviumNitroxLite(19) |
|
CAProtocolType |
|
The security protocol using the services of the
crypto accelerator module. The list of protocols
supported commonly by crypto accelerators include
Internet Key Exchange (ike), IP Security Phase-2
protocols (ipsec), Secure Shell (ssh), Secure Socket
Layer (ssl) and Secure Real-time Transport Protocol
(srtp).
The value 'other' has been provided so that the MIB
may still be valid while new protocols emerge and
the MIB has not been updated to enumerate them. |
TEXTUAL-CONVENTION |
|
|
|
|
INTEGER |
other(1), ikev1(2), ikev2(3), ipsec(4), ssl(5), ssh(6), srtp(7) |
|
CcaAcceleratorEntry |
|
SEQUENCE |
|
|
|
|
ccaAcclIndex |
Unsigned32 |
|
|
ccaAcclEntPhysicalIndex |
EntPhysicalIndexOrZero |
|
|
ccaAcclStatus |
ModuleOperType |
|
|
ccaAcclType |
CAModuleType |
|
|
ccaAcclVersion |
SnmpAdminString |
|
|
ccaAcclSlot |
Unsigned32 |
|
|
ccaAcclActiveTime |
TimeTicks |
|
|
ccaAcclInPkts |
Counter64 |
|
|
ccaAcclOutPkts |
Counter64 |
|
|
ccaAcclOutBadPkts |
Counter64 |
|
|
ccaAcclInOctets |
Counter64 |
|
|
ccaAcclOutOctets |
Counter64 |
|
|
ccaAcclHashOutboundPkts |
Counter64 |
|
|
ccaAcclHashOutboundOctets |
Counter64 |
|
|
ccaAcclHashInboundPkts |
Counter64 |
|
|
ccaAcclHashInboundOctets |
Counter64 |
|
|
ccaAcclEncryptPkts |
Counter64 |
|
|
ccaAcclEncryptOctets |
Counter64 |
|
|
ccaAcclDecryptPkts |
Counter64 |
|
|
ccaAcclDecryptOctets |
Counter64 |
|
|
ccaAcclTransformsTotal |
Counter64 |
|
|
ccaAcclDropsPkts |
Counter64 |
|
|
ccaAcclRandRequests |
Counter64 |
|
|
ccaAcclRandReqFails |
Counter64 |
|
|
ccaAcclDHKeysGenerated |
Counter64 |
|
|
ccaAcclDHDerivedSecretKeys |
Counter64 |
|
|
ccaAcclRSAKeysGenerated |
Counter64 |
|
|
ccaAcclRSASignings |
Counter64 |
|
|
ccaAcclRSAVerifications |
Counter64 |
|
|
ccaAcclRSAEncryptPkts |
Counter64 |
|
|
ccaAcclRSAEncryptOctets |
Counter64 |
|
|
ccaAcclRSADecryptPkts |
Counter64 |
|
|
ccaAcclRSADecryptOctets |
Counter64 |
|
|
ccaAcclDSAKeysGenerated |
Counter64 |
|
|
ccaAcclDSASignings |
Counter64 |
|
|
ccaAcclDSAVerifications |
Counter64 |
|
|
ccaAcclOutboundSSLRecords |
Counter64 |
|
|
ccaAcclInboundSSLRecords |
Counter64 |
|
CcaProtocolStatsEntry |
|
SEQUENCE |
|
|
|
|
ccaProtId |
CAProtocolType |
|
|
ccaProtPktEncryptsReqs |
Counter64 |
|
|
ccaProtPktDecryptsReqs |
Counter64 |
|
|
ccaProtHmacCalcReqs |
Counter64 |
|
|
ccaProtSaCreateReqs |
Counter64 |
|
|
ccaProtSaRekeyReqs |
Counter64 |
|
|
ccaProtSaDeleteReqs |
Counter64 |
|
|
ccaProtPktEncapReqs |
Counter64 |
|
|
ccaProtPktDecapReqs |
Counter64 |
|
|
ccaProtNextPhaseKeyAllocReqs |
Counter64 |
|
|
ccaProtRndGenReqs |
Counter64 |
|
|
ccaProtFailedReqs |
Counter64 |
|
Defined Values
ciscoCryptoAcceleratorMIB |
1.3.6.1.4.1.9.9.467 |
The MIB module for monitoring the identity, status,
activity and faults of crypto accelerator (CA) modules
used in devices implementing security services.
The purpose of this MIB is to facilitate the following:
1) facilitate the discovery of hardware crypto
accelerator modules installed in a security device
2) monitor the activity, faults and performance of
hardware crypto accelerators and help the Network
Management Station (NMS) correlate the performance
of the CA modules with that of the security services
(IPsec, SSL, SSH, PKI etc) using the modules.
|
MODULE-IDENTITY |
|
|
|
ccaSupportsHwCrypto |
1.3.6.1.4.1.9.9.467.1.1.1 |
This MIB object assumes the value of True if the
managed device is capable of including hardware crypto
accelerator.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
TruthValue |
|
|
ccaSupportsModularHwCrypto |
1.3.6.1.4.1.9.9.467.1.1.2 |
This MIB object assumes the value of True if the
managed device supports field removable hardware
crypto accelerators.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
TruthValue |
|
|
ccaMaxAccelerators |
1.3.6.1.4.1.9.9.467.1.1.3 |
The maximum number of hardware crypto accelerators
which may be simultaneously operational in this device.
If the managed device can support only software
encryption, the value of this MIB object should be set
to zero.
If there is not set limit on the maximum number of
crypto accelerator modules which the managed device
can support, the agent should return a value of '-1'
for this MIB variable.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Integer32 |
-1..50 |
|
ccaMaxCryptoThroughput |
1.3.6.1.4.1.9.9.467.1.1.4 |
The maximum crypto throughput that may be supported
by the managed device with the current number of active
crypto accelerators.
If this value cannot be determined, the agent should
return a value of 0.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Unsigned32 |
|
|
ccaMaxCryptoConnections |
1.3.6.1.4.1.9.9.467.1.1.5 |
The maximum number of VPN flows (connections) the managed
device can support with the current number of active
crypto accelerators.
If this value cannot be determined, the agent should
return a value of 0.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Unsigned32 |
|
|
ccaGlobalInOctets |
1.3.6.1.4.1.9.9.467.1.2.1.3 |
The total number of octets input to all the crypto
accelerators installed in the device.
The value is cumulative from last reboot of the
managed entity.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
ccaGlobalOutOctets |
1.3.6.1.4.1.9.9.467.1.2.1.4 |
The total number of octets output by all the crypto
accelerators installed in the device.
The value is cumulative from last reboot of the
managed entity.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
ccaGlobalInPkts |
1.3.6.1.4.1.9.9.467.1.2.1.5 |
The total number of packets input to all the crypto
accelerators installed in the device.
The value is cumulative from last reboot of the
managed entity.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
ccaGlobalOutPkts |
1.3.6.1.4.1.9.9.467.1.2.1.6 |
The total number of packets output by all the crypto
accelerators installed in the device.
The value is cumulative from last reboot of the
managed entity.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
ccaGlobalOutErrPkts |
1.3.6.1.4.1.9.9.467.1.2.1.7 |
The total number of packets output by all the crypto
accelerators installed in the device which were found
to be generated with errors (checksum errors, other
errors).
The value is cumulative from last reboot of the
managed entity.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
ccaAcceleratorTable |
1.3.6.1.4.1.9.9.467.1.2.2 |
The crypto accelerator table. There is one entry
in this table for each crypto accelerator installed
in the managed device. |
Status: current |
Access: not-accessible |
OBJECT-TYPE |
|
|
|
|
SEQUENCE OF |
|
|
|
|
CcaAcceleratorEntry |
|
ccaAcceleratorEntry |
1.3.6.1.4.1.9.9.467.1.2.2.1 |
Each entry contains the attributes and statistics
of a crypto accelerator module installed on the managed
device. |
Status: current |
Access: not-accessible |
OBJECT-TYPE |
|
|
|
|
CcaAcceleratorEntry |
|
|
ccaAcclIndex |
1.3.6.1.4.1.9.9.467.1.2.2.1.1 |
The index uniquely identifying a specific crypto
accelerator. |
Status: current |
Access: not-accessible |
OBJECT-TYPE |
|
|
|
|
Unsigned32 |
1..50 |
|
ccaAcclEntPhysicalIndex |
1.3.6.1.4.1.9.9.467.1.2.2.1.2 |
The value of entPhysicalIndex of the module
corresponding to this conceptual row or zero,
if the module is not an entity listed in
'entPhysicalTable' of rfc2737. |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
EntPhysicalIndexOrZero |
|
|
ccaAcclStatus |
1.3.6.1.4.1.9.9.467.1.2.2.1.3 |
The state of the crypto accelerator corresponding
to this row. |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
ModuleOperType |
|
|
ccaAcclType |
1.3.6.1.4.1.9.9.467.1.2.2.1.4 |
The type of the crypto accelerator corresponding to
this row. |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
CAModuleType |
|
|
ccaAcclVersion |
1.3.6.1.4.1.9.9.467.1.2.2.1.5 |
The version string of the firmware of the crypto
accelerator corresponding to this row. |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
SnmpAdminString |
|
|
ccaAcclSlot |
1.3.6.1.4.1.9.9.467.1.2.2.1.6 |
The slot number of the crypto accelerator
corresponding to this row. |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Unsigned32 |
|
|
ccaAcclActiveTime |
1.3.6.1.4.1.9.9.467.1.2.2.1.7 |
The number of seconds elapsed since the crypto
accelerator corresponding to this row transitioned
into the 'active' state. |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
TimeTicks |
|
|
ccaAcclInPkts |
1.3.6.1.4.1.9.9.467.1.2.2.1.8 |
The number of packets input to this module for
processing since the last reboot of the device. |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
ccaAcclOutPkts |
1.3.6.1.4.1.9.9.467.1.2.2.1.9 |
The number of packets output by this module after
processing, since last reboot of the device. |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
ccaAcclOutBadPkts |
1.3.6.1.4.1.9.9.467.1.2.2.1.10 |
The number of packets output by this module after
processing which had crypto errors, since last reboot
of the device. |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
ccaAcclInOctets |
1.3.6.1.4.1.9.9.467.1.2.2.1.11 |
The number of octets input to this module for
processing since last reboot of the device. |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
ccaAcclOutOctets |
1.3.6.1.4.1.9.9.467.1.2.2.1.12 |
The number of octets output by this module after
processing since last reboot of the device. |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
ccaAcclHashOutboundPkts |
1.3.6.1.4.1.9.9.467.1.2.2.1.13 |
The number of packets output by this module which
were prepared for hash validation since the last
reboot of the device.
Hash validation is a cryptographic operation used
to verify the integrity of a block of data received
from a trusted source.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
ccaAcclHashOutboundOctets |
1.3.6.1.4.1.9.9.467.1.2.2.1.14 |
The number of octets output by this module which were
prepared for hash validation since the last reboot of
the device. |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
ccaAcclHashInboundPkts |
1.3.6.1.4.1.9.9.467.1.2.2.1.15 |
The number of packets input to this module which
required hash validation since the last reboot of
the device. |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
ccaAcclHashInboundOctets |
1.3.6.1.4.1.9.9.467.1.2.2.1.16 |
The number of octets input to this module which were
authenticated using hash validation since the last
reboot of the device. |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
ccaAcclEncryptPkts |
1.3.6.1.4.1.9.9.467.1.2.2.1.17 |
The number of packets input to this module which
required encryption since the last reboot of the
device. |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
ccaAcclEncryptOctets |
1.3.6.1.4.1.9.9.467.1.2.2.1.18 |
The number of octets input to this module which
required encryption since the last reboot of the
device. |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
ccaAcclDecryptPkts |
1.3.6.1.4.1.9.9.467.1.2.2.1.19 |
The number of packets input to this module which
required decryption since the last reboot of the
device. |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
ccaAcclDecryptOctets |
1.3.6.1.4.1.9.9.467.1.2.2.1.20 |
The number of octets input to this module which
required decryption since the last reboot of the
device. |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
ccaAcclDropsPkts |
1.3.6.1.4.1.9.9.467.1.2.2.1.22 |
The number of packets input to this module which were
dropped prior to processing since the last reboot of
the device. |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
ccaAcclRandRequests |
1.3.6.1.4.1.9.9.467.1.2.2.1.23 |
The number of requests received by this crypto
accelerator to generate random numbers since the last
reboot of the device. |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
ccaAcclRandReqFails |
1.3.6.1.4.1.9.9.467.1.2.2.1.24 |
The number of random number requests received by this
module which were not fulfilled, counted since the last
reboot of the device. |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
ccaAcclDHKeysGenerated |
1.3.6.1.4.1.9.9.467.1.2.2.1.25 |
The number of Diffie Hellman key pairs generated by
this module since the last reboot. |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
ccaAcclDHDerivedSecretKeys |
1.3.6.1.4.1.9.9.467.1.2.2.1.26 |
The number of times this module has derived Diffie Hellman
secret keys since the last reboot of the device. |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
ccaAcclRSAKeysGenerated |
1.3.6.1.4.1.9.9.467.1.2.2.1.27 |
The number of times a new RSA key pair was generated
by this module, counted since the last time this module
assumed 'active' status. |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
ccaAcclRSASignings |
1.3.6.1.4.1.9.9.467.1.2.2.1.28 |
The number of times an RSA Digital Signature has been
generated by this module, counted since the last time
this module assumed 'active' status. |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
ccaAcclRSAVerifications |
1.3.6.1.4.1.9.9.467.1.2.2.1.29 |
The number of times an RSA Digital Signature has
been verified by this module, counted since the last
time this module assumed 'active' status. |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
ccaAcclRSAEncryptPkts |
1.3.6.1.4.1.9.9.467.1.2.2.1.30 |
The number of packets input to this module which
required RSA encryption, counted since the last time
this module assumed 'active' status. |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
ccaAcclRSAEncryptOctets |
1.3.6.1.4.1.9.9.467.1.2.2.1.31 |
The number of octets input to this module which
required RSA encryption, counted since the last time
this module assumed 'active' status. |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
ccaAcclRSADecryptPkts |
1.3.6.1.4.1.9.9.467.1.2.2.1.32 |
The number of packets input to this module which
required RSA decryption, counted since the last time
this module assumed 'active' status. |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
ccaAcclRSADecryptOctets |
1.3.6.1.4.1.9.9.467.1.2.2.1.33 |
The number of octets input to this module which
required RSA decryption, counted since the last time
this module assumed 'active' status. |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
ccaAcclDSAKeysGenerated |
1.3.6.1.4.1.9.9.467.1.2.2.1.34 |
The number of times DSA key pair has been generated by
this module, counted since the last time this module
assumed 'active' status. |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
ccaAcclDSASignings |
1.3.6.1.4.1.9.9.467.1.2.2.1.35 |
The number of times DSA signature has been generated
by this module, counted since the last time this module
assumed 'active' status. |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
ccaAcclDSAVerifications |
1.3.6.1.4.1.9.9.467.1.2.2.1.36 |
The number of times DSA signature has been verified
by this module, counted since the last time this module
assumed 'active' status. |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
ccaAcclOutboundSSLRecords |
1.3.6.1.4.1.9.9.467.1.2.2.1.37 |
The number of combined outbound hash/encrypt SSL
records processed by this module, counted since the
last time this module assumed 'active' status. |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
ccaAcclInboundSSLRecords |
1.3.6.1.4.1.9.9.467.1.2.2.1.38 |
The number of combined inbound hash/encrypt SSL
records processed by this module, counted since the
last time this module assumed 'active' status. |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
ccaProtocolStatsTable |
1.3.6.1.4.1.9.9.467.1.2.3.1 |
The crypto accelerator statistics catalogued by
security protocol causing the activity. There is only
entry in this table for each security protocol listed
in the textual convention 'CAProtocolType'. |
Status: current |
Access: not-accessible |
OBJECT-TYPE |
|
|
|
|
SEQUENCE OF |
|
|
|
|
CcaProtocolStatsEntry |
|
ccaProtocolStatsEntry |
1.3.6.1.4.1.9.9.467.1.2.3.1.1 |
Each entry contains the statistics corresponding to
a specific security protocol. |
Status: current |
Access: not-accessible |
OBJECT-TYPE |
|
|
|
|
CcaProtocolStatsEntry |
|
|
ccaProtId |
1.3.6.1.4.1.9.9.467.1.2.3.1.1.1 |
The index uniquely identifies the security protocol
for which this row summarizes the statistics. |
Status: current |
Access: not-accessible |
OBJECT-TYPE |
|
|
|
|
CAProtocolType |
|
|
ccaProtPktEncryptsReqs |
1.3.6.1.4.1.9.9.467.1.2.3.1.1.2 |
The number of payload encrypt requests received by
the crypto accelerators from this security protocol,
counted since the last reboot of the device. |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
ccaProtPktDecryptsReqs |
1.3.6.1.4.1.9.9.467.1.2.3.1.1.3 |
The number of payload decrypt requests received by
the crypto accelerators from this security protocol,
counted since the last reboot of the device. |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
ccaProtHmacCalcReqs |
1.3.6.1.4.1.9.9.467.1.2.3.1.1.4 |
The number of times keyed HMAC calculation requests
were received by the crypto accelerators due to the
operation of this security protocol, counted since
the last reboot of the device. |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
ccaProtSaCreateReqs |
1.3.6.1.4.1.9.9.467.1.2.3.1.1.5 |
The number of times requests for creation of
security associations were received by the crypto
accelerators from this security protocol, counted
since the last reboot of the device. |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
ccaProtSaRekeyReqs |
1.3.6.1.4.1.9.9.467.1.2.3.1.1.6 |
The number of times requests for rekeying of
existing security associations were received by
the crypto accelerators from this security protocol,
counted since the last reboot of the device. |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
ccaProtSaDeleteReqs |
1.3.6.1.4.1.9.9.467.1.2.3.1.1.7 |
The number of times requests for deletion of
security associations were received by the crypto
accelerators from this security protocol, counted
since the last reboot of the device. |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
ccaProtPktEncapReqs |
1.3.6.1.4.1.9.9.467.1.2.3.1.1.8 |
The number of times requests for payload
encapsulation were received by the crypto accelerators
from this security protocol, counted since the last
reboot of the device. |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
ccaProtPktDecapReqs |
1.3.6.1.4.1.9.9.467.1.2.3.1.1.9 |
The number of times requests for payload decapsulation
were received by the crypto accelerators from this
security protocol, counted since the last reboot of
the device. |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
ccaProtNextPhaseKeyAllocReqs |
1.3.6.1.4.1.9.9.467.1.2.3.1.1.10 |
The number of times requests for allocation of
keys for the next phase of the protocol operation
which were received by the crypto accelerators from
this security protocol, counted since the last reboot
of the device.
As an example, for IKE, this would identify the number
of times key allocation requests for Quick Mode were
received by the crypto accelerator from the IKE protocol
engine. |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
ccaProtRndGenReqs |
1.3.6.1.4.1.9.9.467.1.2.3.1.1.11 |
The number of times requests for generation of
random number(s) were received by the crypto
accelerators from this security protocol, counted
since the last reboot of the device. |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
ccaProtFailedReqs |
1.3.6.1.4.1.9.9.467.1.2.3.1.1.12 |
The number of times requests received from this
security protocol could not be fulfilled, counted
since the last reboot of the device. |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
ccaNotifCntlAcclInserted |
1.3.6.1.4.1.9.9.467.1.3.1 |
This variable controls the generation of
'ciscoCryAccelInserted' notification.
When this variable is set to 'true', generation
of the notification is enabled. When this variable
is set to 'false', generation of the notification
is disabled.
|
Status: current |
Access: read-write |
OBJECT-TYPE |
|
|
|
|
TruthValue |
|
|
ccaNotifCntlAcclRemoved |
1.3.6.1.4.1.9.9.467.1.3.2 |
This variable controls the generation of
'ciscoCryAccelRemoved' notification.
When this variable is set to 'true', generation of
the notification is enabled. When this variable is
set to 'false', generation of the notification is
disabled.
|
Status: current |
Access: read-write |
OBJECT-TYPE |
|
|
|
|
TruthValue |
|
|
ccaNotifCntlAcclOperational |
1.3.6.1.4.1.9.9.467.1.3.3 |
This variable controls the generation of
'ciscoCryAccelOperational' notification.
When this variable is set to 'true', generation
of the notification is enabled. When this variable
is set to 'false', generation of the notification
is disabled.
|
Status: current |
Access: read-write |
OBJECT-TYPE |
|
|
|
|
TruthValue |
|
|
ccaNotifCntlAcclDisabled |
1.3.6.1.4.1.9.9.467.1.3.4 |
This variable controls the generation of
'ciscoCryAccelDisabled' notification.
When this variable is set to 'true', generation of
the notification is enabled. When this variable is
set to 'false', generation of the notification is
disabled.
|
Status: current |
Access: read-write |
OBJECT-TYPE |
|
|
|
|
TruthValue |
|
|
ciscoCryAccelInserted |
1.3.6.1.4.1.9.9.467.0.1 |
A crypto accelerator module has been inserted into the
managed device.
|
Status: current |
Access: read-write |
NOTIFICATION-TYPE |
|
|
|
ciscoCryAccelRemoved |
1.3.6.1.4.1.9.9.467.0.2 |
A crypto accelerator module has been removed from the
managed device.
|
Status: current |
Access: read-write |
NOTIFICATION-TYPE |
|
|
|
ciscoCryAccelOperational |
1.3.6.1.4.1.9.9.467.0.3 |
A crypto accelerator module has become operational. |
Status: current |
Access: read-write |
NOTIFICATION-TYPE |
|
|
|
ciscoCryAccelDisabled |
1.3.6.1.4.1.9.9.467.0.4 |
A crypto accelerator module has become non-operational. |
Status: current |
Access: read-write |
NOTIFICATION-TYPE |
|
|
|
ciscoCryAccelMIBCompliance |
1.3.6.1.4.1.9.9.467.2.1.1 |
The compliance statement for entities which
implement the CISCO Crypto Accelerator MIB. |
Status: current |
Access: read-write |
MODULE-COMPLIANCE |
|
|
|
ciscoCryAccCapacityGroup |
1.3.6.1.4.1.9.9.467.2.2.1 |
This group consists of all the MIB variables
defined under crAcCapacity using which the management
station may determine the limits of capacity of the
managed device with regards to the support of
crypto accelerators. |
Status: current |
Access: read-write |
OBJECT-GROUP |
|
|
|
ciscoCryAccSummaryActivityGroup |
1.3.6.1.4.1.9.9.467.2.2.2 |
This group consists of the counters which model the
summary activity of the crypto accelerators in the
managed entity. |
Status: current |
Access: read-write |
OBJECT-GROUP |
|
|
|
ciscoCryAccModuleActivityGroup |
1.3.6.1.4.1.9.9.467.2.2.3 |
This group consists of the counters which model the
summary activity of the crypto accelerators in the
managed entity.
Following are definitions of some terms used in
this compliance group:
Crypto Accelerator
'Crypto Accelerator' denotes a hardware or software
device which the managed entity uses to offload some
or all computations pertaining to cryptographic
operations. A crypto accelerator module may be
implemented as a Field Removable Unit or an
integrated hardware element such an Application
Specific Integrated Chip (ASIC).
Module
The term 'Module' has been used in this MIB to
denote a hardware crypto accelerator.
Diffie-Hellman
The Diffie-Hellman key agreement protocol (also called
exponential key agreement) was developed by Diffie and
Hellman in 1976. The protocol allows two users to
exchange a secret key over an insecure medium without
any prior secrets.
RSA
An Internet encryption and authentication system that
uses an algorithm developed in 1977 by Ron Rivest,
Adi Shamir, and Leonard Adleman.
DSS
Digital Signature Standard (DSS) is the digital
signature algorithm (DSA) developed by the U.S.
National Security Agency (NSA) to generate a digital
signature for the authentication of electronic
documents.
IPsec
IP security protocol.
SSL
Secure Socket Layer Protocol.
SSH
Secure Shell Protocol.
PKI
Public Key Infrastructure
|
Status: current |
Access: read-write |
OBJECT-GROUP |
|
|
|
ciscoCryAccProtocolActivityGroup |
1.3.6.1.4.1.9.9.467.2.2.4 |
This group consists of the counters which model
the protocol-specific activity of the crypto
accelerators in the managed entity. |
Status: current |
Access: read-write |
OBJECT-GROUP |
|
|
|
ciscoCryAccNotifsCntlGroup |
1.3.6.1.4.1.9.9.467.2.2.5 |
This group consists of all the MIB variables which
allow the network management station to control the
emission of the notifications defined in this MIB.
Per a different compliance clause dfined in this
module, the agent is not required to provide write
access to these MIB variables. |
Status: current |
Access: read-write |
OBJECT-GROUP |
|
|
|
ciscoCryAccNotifsGroup |
1.3.6.1.4.1.9.9.467.2.2.6 |
This group consists of all the notifications defined
to signal the change in status and operation of crypto
accelerator modules. |
Status: current |
Access: read-write |
NOTIFICATION-GROUP |
|
|
|