(file) Return to Network_IPsec.mof CVS log (file) (dir) Up to [Pegasus] / pegasus / Schemas / CIMPrelim291

  1 a.dunfey 1.1 // ===================================================================
  2              // Title:  Network IPSec
  3              // $State: Preliminary $
  4              // $Date: 2005/01/05 00:54:00 $
  5              // $Source: /home/dmtf2/dotorg/var/cvs/repositories/dev/Schema/MOF/Network_IPsec.mof,v $
  6              // $Revision: 1.5 $
  7              // ===================================================================
  8              //#pragma inLine ("Includes/copyright.inc")
  9              // Copyright 1998-2005 Distributed Management Task Force, Inc. (DMTF).
 10              // All rights reserved.
 11              // DMTF is a not-for-profit association of industry members dedicated
 12              // to promoting enterprise and systems management and interoperability.
 13              // DMTF specifications and documents may be reproduced for uses
 14              // consistent with this purpose by members and non-members,
 15              // provided that correct attribution is given.
 16              // As DMTF specifications may be revised from time to time,
 17              // the particular version and release date should always be noted.
 18              // 
 19              // Implementation of certain elements of this standard or proposed
 20              // standard may be subject to third party patent rights, including
 21              // provisional patent rights (herein "patent rights"). DMTF makes
 22 a.dunfey 1.1 // no representations to users of the standard as to the existence
 23              // of such rights, and is not responsible to recognize, disclose, or
 24              // identify any or all such third party patent right, owners or
 25              // claimants, nor for any incomplete or inaccurate identification or
 26              // disclosure of such rights, owners or claimants. DMTF shall have no
 27              // liability to any party, in any manner or circumstance, under any
 28              // legal theory whatsoever, for failure to recognize, disclose, or
 29              // identify any such third party patent rights, or for such party's
 30              // reliance on the standard or incorporation thereof in its product,
 31              // protocols or testing procedures. DMTF shall have no liability to
 32              // any party implementing such standard, whether such implementation
 33              // is foreseeable or not, nor to any patent owner or claimant, and shall
 34              // have no liability or responsibility for costs or losses incurred if
 35              // a standard is withdrawn or modified after publication, and shall be
 36              // indemnified and held harmless by any party implementing the
 37              // standard from any and all claims of infringement by a patent owner
 38              // for such implementations.
 39              // 
 40              // For information about patents held by third-parties which have
 41              // notified the DMTF that, in their opinion, such patent may relate to
 42              // or impact implementations of DMTF standards, visit
 43 a.dunfey 1.1 // http://www.dmtf.org/about/policies/disclosures.php.
 44              //#pragma inLine
 45              // ===================================================================
 46              // Description: The Network Model extends the management concepts to
 47              //              represent protocol interfaces and network/protocol
 48              //              services.  This file defines the classes to manage
 49              //              an IPsec security association.
 50              // 
 51              //              The object classes below are listed in an order that
 52              //              avoids forward references. Required objects, defined
 53              //              by other working groups, are omitted.
 54              // ==================================================================
 55              // This model was originally introduced in CIM V2.6 Preliminary and
 56              // was not promoted to Final status.  The following CR updates the
 57              // V2.6 MOF and better aligns it with the IETF I-D from the IPSP
 58              // Working Group.
 59              // CR1026 - Modifications to the V2.6 MOF for IPsec management
 60              // Change Log CIM V2.8
 61              // CR1194 - Promote all classes to final
 62              // CR1238 - Fix model correspondece reference problems in final version
 63              // 
 64 a.dunfey 1.1 // Change Log for V2.9
 65              // No changes
 66              // ===================================================================
 67              
 68              #pragma Locale ("en_US")
 69              
 70              
 71              // ==================================================================
 72              // Security Association Endpoints
 73              // ==================================================================
 74              
 75              // ==================================================================
 76              // SecurityAssociationEndpoint
 77              // ==================================================================
 78                 [Version ( "2.8.0" ), Description (
 79                     "SecurityAssociationEndpoint (SAEndpoint) represents the "
 80                     "endpoint of a secure connection. This is typically an IP "
 81                     "connection, although the model allows more flexibility than "
 82                     "just IP. The SecurityAssociationEndpoint is tied to an "
 83                     "IPProtocolEndpoint (or possibly other endpoint) using the "
 84                     "LogicalIdentity association. Note that an endpoint is defined "
 85 a.dunfey 1.1        "at both ends of the connection.")]
 86              class CIM_SecurityAssociationEndpoint : CIM_ProtocolEndpoint {
 87              
 88                    [Override ( "InstallDate" ), Description (
 89                        "InstallDate records when the SA (and its endpoint) was "
 90                        "created.")]
 91                 datetime InstallDate;
 92              
 93                    [Description (
 94                        "LifetimeSeconds specifies the maximum time that the SA will "
 95                        "be considered valid after it has been created. A value of "
 96                        "zero indicates that the default of 8 hours be used. A "
 97                        "non-zero value indicates the seconds lifetime."), 
 98                     Units ( "Seconds" )]
 99                 uint64 LifetimeSeconds = 0;
100              
101                    [Write, Description (
102                        "RefreshThresholdSecondsPercentage is the lifetime "
103                        "percentage after which a new SA should be acquired, before "
104                        "the existing SA expires. A random period may be added to a "
105                        "calculated threshold to reduce network thrashing."), 
106 a.dunfey 1.1        Units ( "Percent" ), MinValue ( 0 ), MaxValue ( 100 )]
107                 uint8 RefreshThresholdSecondsPercentage;
108              
109                    [Description (
110                        "IdleDurationSeconds specifies how long the SA can be idle "
111                        "before it is deleted. The default value, 0, indicates that "
112                        "there is no idle timeout period."), 
113                     Units ( "Seconds" )]
114                 uint64 IdleDurationSeconds = 0;
115              
116                    [Description (
117                        "LifetimeKilobytes specifies the maximum number of kilobytes "
118                        "of data traffic to be protected by the SA. A value of zero "
119                        "(the default) indicates that there should be no maximum "
120                        "kilobyte lifetime. A non-zero value specifies the desired "
121                        "kilobyte lifetime. The SA is deleted when the "
122                        "LifetimeKilobyte value is exceeded."), 
123                     Units ( "KiloBytes" )]
124                 uint64 LifetimeKilobytes = 0;
125              
126                    [Write, Description (
127 a.dunfey 1.1           "RefreshThresholdKbytesPercentage is the lifetime percentage "
128                        "of kilobytes processed, at which a new SA should be "
129                        "acquired. A random value may be added to the calculated "
130                        "threshold to reduce network thrashing."), 
131                     Units ( "Percent" ), MinValue ( 0 ), MaxValue ( 100 )]
132                 uint8 RefreshThresholdKbytesPercentage;
133              
134                    [Write, Description (
135                        "PacketLoggingActive causes a log to be kept of traffic "
136                        "processed by the SAEndpoint.")]
137                 boolean PacketLoggingActive;
138              };
139              
140              
141              // ==================================================================
142              // FilterOfSecurityAssociation
143              // ==================================================================
144                 [Association, Version ( "2.8.0" ), Description (
145                     "FilterOfSecurityAssociation associates a network traffic "
146                     "specification (i.e., a FilterList) with a SecurityAssociation "
147                     "Endpoint, to which the filter list applies.")]
148 a.dunfey 1.1 class CIM_FilterOfSecurityAssociation : CIM_Dependency {
149              
150                    [Override ( "Antecedent" ), Max ( 1 ), Description (
151                        "FilterList describing the traffic to be selected/matched.")]
152                 CIM_FilterList REF Antecedent;
153              
154                    [Override ( "Dependent" ), Description (
155                        "SecurityAssociation using the FilterList as its traffic "
156                        "selector.")]
157                 CIM_SecurityAssociationEndpoint REF Dependent;
158              };
159              
160              
161              // ==================================================================
162              // SAEndpointConnectionStatistics
163              // ==================================================================
164                 [Version ( "2.8.0" ), Description (
165                     "This class captures statistical and time-related information "
166                     "about the use of the IPsec or IKE Security Associations, "
167                     "through their IPsecSAEndpoint or IKESAEndpoint. The relevant "
168                     "SAEndpoint is determined by traversing the "
169 a.dunfey 1.1        "ElementStatisticalData association.")]
170              class CIM_SAEndpointConnectionStatistics : CIM_StatisticalData {
171              
172                    [Description (
173                        "Number of bytes that have been protected by the associated "
174                        "SAEndpoint."), 
175                     Units ( "Bytes" ), Counter]
176                 uint64 ByteCount;
177              
178                    [Description (
179                        "LastAccessed indicates when the SAEndpoint was last used. "
180                        "This property is helpful in determining if the SA (and its "
181                        "endpoint) will be deleted due to sitting idle.")]
182                 datetime LastAccessed;
183              };
184              
185              
186              // ==================================================================
187              // SAEndpointRefreshSettings
188              // ==================================================================
189                 [Version ( "2.8.0" ), Description (
190 a.dunfey 1.1        "SAEndpointRefreshSettings hold the refresh thresholds for the "
191                     "SecurityAssociationEndpoint. Since these settings may change "
192                     "for an SA, the properties are defined both in this class and "
193                     "in SecurityAssociationEndpoint.")]
194              class CIM_SAEndpointRefreshSettings : CIM_SettingData {
195              
196                    [Write, Description (
197                        "RefreshThresholdSecondsPercentage is the lifetime "
198                        "percentage after which a new SA should be acquired, before "
199                        "the existing SA expires."), 
200                     Units ( "Percent" ), MinValue ( 0 ), MaxValue ( 100 ), 
201                     ModelCorrespondence { "CIM_SecurityAssociationEndpoint." 
202                        "RefreshThresholdSecondsPercentage" }]
203                 uint8 RefreshThresholdSecondsPercentage;
204              
205                    [Write, Description (
206                        "RefreshThresholdKbytesPercentage is the lifetime percentage "
207                        "of kilobytes processed, at which a new SA should be "
208                        "acquired."), 
209                     Units ( "Percent" ), MinValue ( 0 ), MaxValue ( 100 ), 
210                     ModelCorrespondence { "CIM_SecurityAssociationEndpoint." 
211 a.dunfey 1.1           "RefreshThresholdKbytesPercentage" }]
212                 uint8 RefreshThresholdKbytesPercentage;
213              };
214              
215              
216              // ==================================================================
217              // IPsecSAEndpoint
218              // ==================================================================
219                 [Version ( "2.8.0" ), Description (
220                     "IPsecSAEndpoints are types of SecurityAssociationEndpoints "
221                     "representing both negotiated and static SAs that correspond to "
222                     "AH, ESP, or IPCOMP transforms.")]
223              class CIM_IPsecSAEndpoint : CIM_SecurityAssociationEndpoint {
224              
225                    [Description (
226                        "SPI contains the Security Parameter Index of the SA. This "
227                        "value in string form may also be used in the key field "
228                        "'Name' inherited from ServiceAccessPoint.")]
229                 uint32 SPI;
230              
231                    [Description (
232 a.dunfey 1.1           "InboundDirection specifies whether the SA applies to "
233                        "inbound (TRUE) or outbound (FALSE) traffic.")]
234                 boolean InboundDirection;
235              
236                    [Description (
237                        "EncapsulationMode indicates whether the IPsecSAEndpoint "
238                        "uses transport or tunnel encapsulation."), 
239                     ValueMap { "0", "2", "3" }, 
240                     Values { "Unknown", "Tunnel", "Transport" }]
241                 uint16 EncapsulationMode;
242              
243                    [Description (
244                        "DFHandling controls how the 'Don't Fragment' bit is managed "
245                        "by the IPsecSAEndpoint."), 
246                     ValueMap { "0", "2", "3", "4" }, 
247                     Values { "Unknown", "Copy from Internal to External IP Header",
248                        "Set DF Bit in External Header to 1",
249                        "Set DF Bit in External Header to 0" }]
250                 uint16 DFHandling;
251              
252                    [Description (
253 a.dunfey 1.1           "PFSInUse indicates whether perfect forward secrecy is "
254                        "required when refreshing keys.")]
255                 boolean PFSInUse;
256              };
257              
258              
259              // ==================================================================
260              // PeerOfIPsecSAEndpoint
261              // ==================================================================
262                 [Association, Version ( "2.8.0" ), Description (
263                     "PeerOfIPsecSAEndpoint identifies the peer of the "
264                     "IPsecSAEndpoint.")]
265              class CIM_PeerOfSAEndpoint : CIM_Dependency {
266              
267                    [Override ( "Antecedent" ), Max ( 1 ), Description (
268                        "The peer for the SAEndpoint.")]
269                 CIM_RemoteServiceAccessPoint REF Antecedent;
270              
271                    [Override ( "Dependent" ), Description (
272                        "The IPsecSAEndpoint which has a peer.")]
273                 CIM_IPsecSAEndpoint REF Dependent;
274 a.dunfey 1.1 };
275              
276              
277              // ==================================================================
278              // IKESAEndpoint
279              // ==================================================================
280                 [Version ( "2.8.0" ), Description (
281                     "IKESAEndpoint is created in the first phase of SA negotiation "
282                     "and protects the key negotiation traffic. This endpoint is "
283                     "only created when IKE is the key exchange protocol. Other "
284                     "protocols and their endpoints will be defined in a future "
285                     "release.")]
286              class CIM_IKESAEndpoint : CIM_SecurityAssociationEndpoint {
287              
288                    [Description (
289                        "Identifier of the IKE phase 1 negotiation initiator. "
290                        "Combined with the ResponderCookie, this value, in string "
291                        "form, may be used to construct the value of the key field "
292                        "'Name', inherited from ServiceAccessPoint.")]
293                 uint64 InitiatorCookie;
294              
295 a.dunfey 1.1       [Description (
296                        "Identifier of the IKE phase 1 negotiation responder. "
297                        "Combined with the InitiatorCookie, this value, in string "
298                        "form, may be used to construct the value of the key field "
299                        "'Name', inherited from ServiceAccessPoint.")]
300                 uint64 ResponderCookie;
301              
302                    [Description (
303                        "CipherAlgorithm is an enumeration that specifies the "
304                        "encryption algorithm used by the IKESAEndpoint. The list of "
305                        "algorithms was generated from Appendix A of RFC2409. Note "
306                        "that the enumeration is different than the RFC list, since "
307                        "the values of Unknown and Other are taken into account."), 
308                     ValueMap { "0", "1", "2", "3", "4", "5", "6", "7", "8..65000",
309                        "65001..65535" }, 
310                     Values { "Unknown", "Other", "DES", "IDEA", "Blowfish", "RC5",
311                        "3DES", "CAST", "DMTF/IANA Reserved", "Vendor Reserved" }, 
312                     MappingStrings { "RFC2409.IETF|Appendix A" }, 
313                     ModelCorrespondence { "CIM_IKESAEndpoint.OtherCipherAlgorithm" }]
314                 uint16 CipherAlgorithm;
315              
316 a.dunfey 1.1       [Description (
317                        "Description of the encryption algorithm when the value 1 "
318                        "(\"Other\") is specified for the property, CipherAlgorithm."), 
319                     ModelCorrespondence { "CIM_IKESAEndpoint.CipherAlgorithm" }]
320                 string OtherCipherAlgorithm;
321              
322                    [Description (
323                        "HashAlgorithm is an enumeration that specifies the hash "
324                        "function used by the IKESAEndpoint. The list of algorithms "
325                        "was generated from Appendix A of RFC2409. Note that the "
326                        "enumeration is different than the RFC list, since the "
327                        "values of Unknown and Other are taken into account."), 
328                     ValueMap { "0", "1", "2", "3", "4", "5..65000", "65001..65535" }, 
329                     Values { "Unknown", "Other", "MD5", "SHA-1", "Tiger",
330                        "DMTF/IANA Reserved", "Vendor Reserved" }, 
331                     MappingStrings { "RFC2409.IETF|Appendix A" }, 
332                     ModelCorrespondence { "CIM_IKESAEndpoint.OtherHashAlgorithm" }]
333                 uint16 HashAlgorithm;
334              
335                    [Description (
336                        "Description of the hash function when the value 1 "
337 a.dunfey 1.1           "(\"Other\") is specified for the property, HashAlgorithm."), 
338                     ModelCorrespondence { "CIM_IKESAEndpoint.HashAlgorithm" }]
339                 string OtherHashAlgorithm;
340              
341                    [Description (
342                        "AuthenticationMethod is an enumeration that specifies the "
343                        "operation of the IKESAEndpoint. The list of methods was "
344                        "generated from Appendix A of RFC2409. Note that the "
345                        "enumeration is different than the RFC list, since the "
346                        "values of Unknown and Other are taken into account."), 
347                     ValueMap { "0", "1", "2", "3", "4", "5", "6", "7..65000",
348                        "65001..65535" }, 
349                     Values { "Unknown", "Other", "Pre-shared Key", "DSS Signatures",
350                        "RSA Signatures", "Encryption with RSA",
351                        "Revised Encryption with RSA", "DMTF/IANA Reserved",
352                        "Vendor Reserved" }, 
353                     MappingStrings { "RFC2409.IETF|Appendix A" }, 
354                     ModelCorrespondence { 
355                        "CIM_IKESAEndpoint.OtherAuthenticationMethod" }]
356                 uint16 AuthenticationMethod;
357              
358 a.dunfey 1.1       [Description (
359                        "Description of the method when the value 1 (\"Other\") is "
360                        "specified for the property, AuthenticationMethod."), 
361                     ModelCorrespondence { "CIM_IKESAEndpoint.AuthenticationMethod" }]
362                 string OtherAuthenticationMethod;
363              
364                    [Description (
365                        "GroupId specifies the key exchange group ID. If the GroupID "
366                        "number is from the vendor-specific range (32768-65535), the "
367                        "VendorID qualifies the group number. Well-known group "
368                        "identifiers from RFC2412, Appendix E, are: Group 1='768 bit "
369                        "prime', Group 2='1024 bit prime', Group 3= 'Elliptic Curve "
370                        "Group with 155 bit field element', Group 4= 'Large Elliptic "
371                        "Curve Group with 185 bit field element', and Group 5='1536 "
372                        "bit prime'."), 
373                     ValueMap { "0", "1", "2", "3", "4", "5", "..", "0x8000.." }, 
374                     Values { "No Group/Non-Diffie-Hellman Exchange",
375                        "DH-768 bit prime", "DH-1024 bit prime",
376                        "EC2N-155 bit field element", "EC2N-185 bit field element",
377                        "DH-1536 bit prime", "Standard Group - Reserved",
378                        "Vendor Reserved" }, 
379 a.dunfey 1.1        MappingStrings { "RFC2412.IETF|Appendix E" }, 
380                     ModelCorrespondence { "CIM_IKESAEndpoint.VendorID" }]
381                 uint16 GroupId;
382              
383                    [Description (
384                        "VendorID identifies the vendor when the value of GroupID is "
385                        "in the vendor-specific range, 32768 to 65535."), 
386                     ModelCorrespondence { "CIM_IKESAEndpoint.GroupId" }]
387                 string VendorID;
388              };
389              
390              
391              // ==================================================================
392              // Phase1SAUsedForPhase2
393              // ==================================================================
394                 [Association, Version ( "2.8.0" ), Description (
395                     "Phase1SAUsedForPhase2 associates a phase 1 endpoint (such as "
396                     "an IKESAEndpoint) with an IPsecSAEndpoint that was negotiated "
397                     "using that phase 1 Security Association.")]
398              class CIM_Phase1SAUsedForPhase2 : CIM_Dependency {
399              
400 a.dunfey 1.1       [Override ( "Antecedent" ), Max ( 1 ), Description (
401                        "Phase 1 SAEndpoint that protected the negotiation of the "
402                        "phase 2 Security Association. An example of a phase 1 "
403                        "endpoint is an IKESAEndpoint.")]
404                 CIM_SecurityAssociationEndpoint REF Antecedent;
405              
406                    [Override ( "Dependent" ), Description (
407                        "The phase 2 SAEndpoint.")]
408                 CIM_IPsecSAEndpoint REF Dependent;
409              };
410              
411              
412              // ==================================================================
413              // Security Association Transforms
414              // ==================================================================
415              
416              // ==================================================================
417              // SATransform
418              // ==================================================================
419                 [Abstract, Version ( "2.8.0" ), Description (
420                     "SATransform is the base class for the various types of "
421 a.dunfey 1.1        "transforms that are in effect for an existing IPsecSAEndpoint, "
422                     "or aggregated into phase 2 proposals used during the IPsec "
423                     "negotiation process. This class is defined as a kind of "
424                     "ScopedSettingData, since it describes the set of transform "
425                     "properties that MUST be applied together, if negotiated. This "
426                     "subclassing is different than that defined in IETF's IPSP "
427                     "Policy draft - where it is subclassed from Policy. The "
428                     "definition as SettingData is more consistent with the "
429                     "application of the properties as a set, to the negotiated "
430                     "Security Association. \n"
431                     "\n"
432                     "Note that an instance of this class is 'scoped' or contained "
433                     "by a System (either a ComputerSystem or AdminDomain), rather "
434                     "than by a SecurityAssociationEndpoint. This is indicated by "
435                     "instantiating the ScopedSetting association, and is necessary "
436                     "since the transform data is used in IPsec negotiation policies "
437                     "(also scoped by Systems) before ever being associated with a "
438                     "SecurityAssociationEndpoint. The latter semantics (i.e., that "
439                     "'this' transform is negotiated for 'this' Security "
440                     "Association) is conveyed via a subclass of ElementSettingData, "
441                     "TransformOfSecurityAssociation."), 
442 a.dunfey 1.1     MappingStrings { "IPSP Model.IETF|SATransform" }]
443              class CIM_SATransform : CIM_ScopedSettingData {
444              
445                    [Override ( "ElementName" ), 
446                     MappingStrings { "IPSP Model.IETF|SATransform.CommonName" }]
447                 string ElementName;
448              
449                    [Description (
450                        "MaxLifetimeSeconds specifies the maximum time that the "
451                        "Security Association should be considered valid after it "
452                        "has been created. A value of 0, the default, indicates that "
453                        "8 hours should be used. A non-zero value indicates the "
454                        "maximum lifetime in seconds."), 
455                     Units ( "Seconds" ), 
456                     MappingStrings { "IPSP " 
457                        "Model.IETF|SATransform.MaxLifetimeSeconds" }]
458                 uint64 MaxLifetimeSeconds = 0;
459              
460                    [Description (
461                        "MaxLifetimeKilobytes specifies the maximum kilobyte "
462                        "lifetime for a Security Association. Different lifetimes "
463 a.dunfey 1.1           "are used, depending on the strength of the encryption "
464                        "algorithm. A value of 0, the default, indicates that no "
465                        "maximum should be defined. A non-zero value specifies the "
466                        "desired kilobyte lifetime."), 
467                     Units ( "KiloBytes" ), 
468                     MappingStrings { "IPSP " 
469                        "Model.IETF|SATransform.MaxLifetimeKilobytes" }]
470                 uint64 MaxLifetimeKilobytes = 0;
471              
472                    [Description (
473                        "VendorID identifies vendor-defined transforms. If this "
474                        "field is empty (the default), then this is a standard "
475                        "transform."), 
476                     MappingStrings { "IPSP Model.IETF|SATransform.VendorID" }]
477                 string VendorID = "";
478              };
479              
480              
481              // ==================================================================
482              // TransformOfSecurityAssociation
483              // ==================================================================
484 a.dunfey 1.1    [Association, Version ( "2.8.0" ), Description (
485                     "TransformOfSecurityAssociation maps a SecurityAssociation "
486                     "Endpoint with the transform that it uses. For security, no "
487                     "keying material of the SA is exposed.")]
488              class CIM_TransformOfSecurityAssociation : CIM_ElementSettingData {
489              
490                    [Override ( "SettingData" ), Min ( 1 ), Max ( 1 ), Description (
491                        "Transform of the IPsecSAEndpoint.")]
492                 CIM_SATransform REF SettingData;
493              
494                    [Override ( "ManagedElement" ), Description (
495                        "The IPsecSAEndpoint that uses the transform.")]
496                 CIM_IPsecSAEndpoint REF ManagedElement;
497              };
498              
499              
500              // ==================================================================
501              // AHTransform
502              // ==================================================================
503                 [Version ( "2.8.0" ), Description (
504                     "AHTransform defines the parameters used for a phase 2 AH "
505 a.dunfey 1.1        "(Authentication Header) Security Association."), 
506                  MappingStrings { "IPSP Model.IETF|AHTransform" }]
507              class CIM_AHTransform : CIM_SATransform {
508              
509                    [Description (
510                        "AHTransformId is an enumeration that specifies the hash "
511                        "algorithm to be used. The list of values was generated from "
512                        "RFC2407, Section 4.4.3."), 
513                     ValueMap { "1", "2", "3", "4" }, 
514                     Values { "Other", "MD5", "SHA-1", "DES" }, 
515                     MappingStrings { "IPSP Model.IETF|AHTransform.AHTransformID",
516                        "RFC2407.IETF|Section 4.4.3" }, 
517                     ModelCorrespondence { "CIM_AHTransform.OtherAHTransformId" }]
518                 uint16 AHTransformId;
519              
520                    [Description (
521                        "Description of the hash algorithm when the value 1 "
522                        "(\"Other\") is specified for the property, AHTransformId."), 
523                     ModelCorrespondence { "CIM_AHTransform.AHTransformId" }]
524                 string OtherAHTransformId;
525              
526 a.dunfey 1.1       [Description (
527                        "UseReplayPrevention causes the local peer to enable replay "
528                        "prevention detection. This can be accomplished by using a "
529                        "sequence number when sending a packet or checking the "
530                        "sequence number upon receipt of a packet."), 
531                     MappingStrings { "IPSP " 
532                        "Model.IETF|AHTransform.UseReplayPrevention" }]
533                 boolean UseReplayPrevention;
534              
535                    [Description (
536                        "ReplayPreventionWindowsSize specifies, in bits, the length "
537                        "of the sliding window used by the replay prevention "
538                        "mechanism. The value of this property is meaningless if "
539                        "UseReplayPrevention is false. The window size MUST be a "
540                        "power of 2."), 
541                     Units ( "Bits" ), 
542                     MappingStrings { "IPSP " 
543                        "Model.IETF|AHTransform.ReplayPreventionWindowSize" }]
544                 uint32 ReplayPreventionWindowSize;
545              };
546              
547 a.dunfey 1.1 
548              // ==================================================================
549              // ESPTransform
550              // ==================================================================
551                 [Version ( "2.8.0" ), Description (
552                     "ESPTransform defines the parameters used for a phase 2 ESP "
553                     "(Encapsulating Security Protocol) Security Association."), 
554                  MappingStrings { "IPSP Model.IETF|ESPTransform" }]
555              class CIM_ESPTransform : CIM_SATransform {
556              
557                    [Description (
558                        "IntegrityTransformId is an enumeration that specifies the "
559                        "ESP integrity algorithm to be used. The list of values is "
560                        "generated from the enumeration defined in RFC2407, Section "
561                        "4.5. Note that the enumeration is different than the RFC "
562                        "list, since the values of Other and None are taken into "
563                        "account. Also, note that 2 (\"None\") is used when ESP is "
564                        "negotiated without authentication."), 
565                     ValueMap { "1", "2", "3", "4", "5", "6", "7..61439",
566                        "61440..65535" }, 
567                     Values { "Other", "None", "MD5", "SHA-1", "DES", "KPDK",
568 a.dunfey 1.1           "DMTF/IANA Reserved", "Vendor Reserved" }, 
569                     MappingStrings { "IPSP " 
570                        "Model.IETF|ESPTransform.IntegrityTransformId",
571                        "RFC2407.IETF|Section 4.5" }, 
572                     ModelCorrespondence { 
573                        "CIM_ESPTransform.OtherIntegrityTransformId" }]
574                 uint16 IntegrityTransformId;
575              
576                    [Description (
577                        "Description of the integrity algorithm when the value 1 "
578                        "(\"Other\") is specified for the property, "
579                        "IntegrityTransformId."), 
580                     ModelCorrespondence { "CIM_ESPTransform.IntegrityTransformId" }]
581                 string OtherIntegrityTransformId;
582              
583                    [Description (
584                        "CipherTransformId is an enumeration that specifies the ESP "
585                        "encrypion algorithm to be used. The list of values is "
586                        "defined in RFC2407, Section 4.4.4, where the RFC's NULL "
587                        "value maps to 2-\"None\". Note that the enumeration is "
588                        "different than the RFC list, since 'Other' is added to the "
589 a.dunfey 1.1           "enumeration."), 
590                     ValueMap { "1", "2", "3", "4", "5", "6", "7", "8", "9", "10",
591                        "11", "12" }, 
592                     Values { "Other", "None", "DES_IV64", "DES", "3DES", "RC5",
593                        "IDEA", "CAST", "Blowfish", "3-IDEA", "DES_IV32", "RC4" }, 
594                     MappingStrings { "IPSP " 
595                        "Model.IETF|ESPTransform.CipherTransformId",
596                        "RFC2407.IETF|Section 4.4.4" }, 
597                     ModelCorrespondence { "CIM_ESPTransform.OtherCipherTransformId" 
598                        }]
599                 uint16 CipherTransformId;
600              
601                    [Description (
602                        "Description of the encryption algorithm when the value 1 "
603                        "(\"Other\") is specified for the property, "
604                        "CipherTransformId."), 
605                     ModelCorrespondence { "CIM_ESPTransform.CipherTransformId" }]
606                 string OtherCipherTransformId;
607              
608                    [Description (
609                        "CipherKeyLength specifies, in bits, the key length for the "
610 a.dunfey 1.1           "encryption algorithm. For algorithms with fixed key "
611                        "lengths, this value is ignored."), 
612                     Units ( "Bits" ), 
613                     MappingStrings { "IPSP Model.IETF|ESPTransform.CipherKeyLength" 
614                        }]
615                 uint16 CipherKeyLength;
616              
617                    [Description (
618                        "CipherKeyRounds specifies the key rounds for the encryption "
619                        "algorithm. For algorithms with a fixed number of key "
620                        "rounds, this value is ignored. Currently, key rounds are "
621                        "NOT defined for any ESP encryption algorithms."), 
622                     MappingStrings { "IPSP Model.IETF|ESPTransform.CipherKeyRounds" 
623                        }]
624                 uint16 CipherKeyRounds;
625              
626                    [Description (
627                        "UseReplayPrevention causes the local peer to enable replay "
628                        "prevention detection. This can be accomplished by using a "
629                        "sequence number when sending a packet or checking the "
630                        "sequence number upon receipt of a packet."), 
631 a.dunfey 1.1        MappingStrings { "IPSP " 
632                        "Model.IETF|ESPTransform.UseReplayPrevention" }]
633                 boolean UseReplayPrevention;
634              
635                    [Description (
636                        "ReplayPreventionWindowsSize specifies, in bits, the length "
637                        "of the sliding window used by the replay prevention "
638                        "mechanism. The value of this property is meaningless if "
639                        "UseReplayPrevention is false. The window size MUST be a "
640                        "power of 2."), 
641                     Units ( "Bits" ), 
642                     MappingStrings { "IPSP " 
643                        "Model.IETF|ESPTransform.ReplayPreventionWindowSize" }]
644                 uint32 ReplayPreventionWindowSize;
645              };
646              
647              
648              // ==================================================================
649              // IPCOMPTransform
650              // ==================================================================
651                 [Version ( "2.8.0" ), Description (
652 a.dunfey 1.1        "The IPCOMPTransform specifies the IP compression algorithm to "
653                     "use for payload of the Security Association."), 
654                  MappingStrings { "IPSP Model.IETF|IPCOMPTransform" }]
655              class CIM_IPCOMPTransform : CIM_SATransform {
656              
657                    [Description (
658                        "The Algorithm is an enumeration that designates the IPCOMP "
659                        "compression algorithm to use. Its values are generated from "
660                        "RFC2407, Section 4.4.5. Note that the values are modified "
661                        "from the RFC, since 'Other' must be taken into account."), 
662                     ValueMap { "1", "2", "3", "4" }, 
663                     Values { "Other", "Vendor Algorithm/OUI", "DEFLATE", "LZS" }, 
664                     MappingStrings { "IPSP Model.IETF|IPCOMPTransform.Algorithm",
665                        "RFC2407.IETF|Section 4.4.5" }, 
666                     ModelCorrespondence { "CIM_IPCOMPTransform.PrivateAlgorithm",
667                        "CIM_IPCOMPTransform.OtherAlgorithm" }]
668                 uint16 Algorithm;
669              
670                    [Description (
671                        "Description of the compression algorithm when the value 1 "
672                        "(\"Other\") is specified for the property, Algorithm."), 
673 a.dunfey 1.1        ModelCorrespondence { "CIM_IPCOMPTransform.Algorithm" }]
674                 string OtherAlgorithm;
675              
676                    [Description (
677                        "A private compression algorithm, used when the Algorithm "
678                        "property is set to 2, \"Vendor Algorithm/OUI\"."), 
679                     MappingStrings { "IPSP " 
680                        "Model.IETF|IPCOMPTransform.PrivateAlgorithm" }, 
681                     ModelCorrespondence { "CIM_IPCOMPTransform.Algorithm" }]
682                 uint32 PrivateAlgorithm;
683              
684                    [Description (
685                        "DictionarySize is an optional field that specifies the log2 "
686                        "maximum size of the dictionary for the compression "
687                        "algorithm. For dictionaries that have a fixed size, this "
688                        "value is ignored."), 
689                     MappingStrings { "IPSP " 
690                        "Model.IETF|IPCOMPTransform.DictionarySize" }]
691                 uint16 DictionarySize;
692              };
693              
694 a.dunfey 1.1 
695              // ===================================================================
696              // end of file
697              // ===================================================================

No CVS admin address has been configured
Powered by
ViewCVS 0.9.2