(file) Return to CIM_IPsecAction.mof CVS log (file) (dir) Up to [Pegasus] / pegasus / Schemas / CIM231 / DMTF / IPsecPolicy

 1 karl  1.1.2.2 // Copyright (c) 2005 DMTF.  All rights reserved.
 2                  [Version ( "2.8.0" ), 
 3                   UMLPackagePath ( "CIM::IPsecPolicy" ), 
 4                   Description ( 
 5                      "IPsecAction specifies the parameters to use for an IPsec phase "
 6                      "2 negotiation." ), 
 7                   MappingStrings { "IPSP Policy Model.IETF|IPsecAction" }]
 8               class CIM_IPsecAction : CIM_SANegotiationAction {
 9               
10                     [Description ( 
11                         "UsePFS indicates whether perfect forward secrecy is "
12                         "required when refreshing keys." ), 
13                      MappingStrings { "IPSP Policy Model.IETF|IPsecAction.UsePFS" }, 
14                      ModelCorrespondence { "CIM_IPsecSAEndpoint.PFSInUse" }]
15                  boolean UsePFS;
16               
17                     [Description ( 
18                         "UsePhase1Group indicates that the phase 2 GroupId should "
19                         "be the same as that used in the phase 1 key exchange. If "
20                         "UsePFS is False, then this property is ignored. Note "
21                         "that a value of False indicates that the property "
22 karl  1.1.2.2           "GroupId will contain the key exchange group to use for "
23                         "phase 2." ), 
24                      MappingStrings { 
25                         "IPSP Policy Model.IETF|IPsecAction.UseIKEGroup" }]
26                  boolean UsePhase1Group;
27               
28                     [Description ( 
29                         "GroupId specifies the PFS group ID to use. This value is "
30                         "only used if PFS is True and UsePhase1Group is False. If "
31                         "the GroupID number is from the vendor-specific range "
32                         "(32768-65535), the VendorID qualifies the group number. "
33                         "Well-known group identifiers from RFC2412, Appendix E, "
34                         "are: Group 1=\'768 bit prime\', Group 2=\'1024 bit "
35                         "prime\', Group 3=\'Elliptic Curve Group with 155 bit "
36                         "field element\', Group 4=\'Large Elliptic Curve Group "
37                         "with 185 bit field element\', and Group 5=\'1536 bit "
38                         "prime\'." ), 
39                      ValueMap { "0", "1", "2", "3", "4", "5", "..", "0x8000.." }, 
40                      Values { "No Group/Non-Diffie-Hellman Exchange", 
41                         "DH-768 bit prime", "DH-1024 bit prime", 
42                         "EC2N-155 bit field element", 
43 karl  1.1.2.2           "EC2N-185 bit field element", "DH-1536 bit prime", 
44                         "Standard Group - Reserved", "Vendor Reserved" }, 
45                      MappingStrings { 
46                         "IPSP Policy Model.IETF|IPsecAction.GroupID", 
47                         "RFC2412.IETF|Appendix E" }, 
48                      ModelCorrespondence { "CIM_IPsecAction.VendorID", 
49                         "CIM_IKESAEndpoint.GroupID" }]
50                  uint16 GroupId;
51               
52                     [Description ( 
53                         "The property VendorID is used together with the property "
54                         "GroupID (when it is in the vendor-specific range) to "
55                         "identify the key exchange group. VendorID is ignored "
56                         "unless UsePFS is true, AND UsePhase1Group is False, AND "
57                         "GroupID is in the vendor-specific range (32768-65535)." ), 
58                      MappingStrings { "IPSP Policy Model.IETF|IPsecAction.VendorID" }, 
59                      ModelCorrespondence { "CIM_IPsecAction.GroupId", 
60                         "CIM_IKESAEndpoint.VendorID" }]
61                  string VendorID;
62               
63                     [Description ( 
64 karl  1.1.2.2           "The property Granularity is an enumeration that "
65                         "specifies how the selector for the SA should be derived "
66                         "from the traffic that triggered the negotiation. Its "
67                         "values are: \n"
68                         "1=Other; See the OtherGranularity property for more "
69                         "information \n"
70                         "2=Subnet; The source and destination subnet masks are "
71                         "used \n"
72                         "3=Address; The source and destination IP addresses of "
73                         "the triggering packet are used \n"
74                         "4=Protocol; The source and destination IP addresses and "
75                         "the IP protocol of the triggering packet are used \n"
76                         "5=Port; The source and destination IP addresses, IP "
77                         "protocol and the source and destination layer 4 ports of "
78                         "the triggering packet are used." ), 
79                      ValueMap { "1", "2", "3", "4", "5" }, 
80                      Values { "Other", "Subnet", "Address", "Protocol", "Port" }, 
81                      MappingStrings { 
82                         "IPSP Policy Model.IETF|IPsecAction.Granularity" }, 
83                      ModelCorrespondence { "CIM_IPsecAction.OtherGranularity" }]
84                  uint16 Granularity;
85 karl  1.1.2.2 
86                     [Description ( 
87                         "Description of the granularity when the value 1 "
88                         "(\"Other\") is specified for the property, Granularity." ), 
89                      ModelCorrespondence { "CIM_IPsecAction.Granularity" }]
90                  string OtherGranularity;
91               
92               
93               };

No CVS admin address has been configured
Powered by
ViewCVS 0.9.2