Class CIM_IKESAEndpoint
extends CIM_SecurityAssociationEndpoint

IKESAEndpoint is created in the first phase of SA negotiation and protects the key negotiation traffic. This endpoint is only created when IKE is the key exchange protocol. Other protocols and their endpoints will be defined in a future release.

Table of Contents
Hierarchy
Direct Known Subclasses
Class Qualifiers
Class Properties
Class Methods


Class Hierarchy

CIM_ManagedElement
   |
   +--CIM_ManagedSystemElement
   |
   +--CIM_LogicalElement
   |
   +--CIM_EnabledLogicalElement
   |
   +--CIM_ServiceAccessPoint
   |
   +--CIM_ProtocolEndpoint
   |
   +--CIM_SecurityAssociationEndpoint
   |
   +--CIM_IKESAEndpoint

Direct Known Subclasses

Class Qualifiers

NameData TypeValue
DescriptionstringIKESAEndpoint is created in the first phase of SA negotiation and protects the key negotiation traffic. This endpoint is only created when IKE is the key exchange protocol. Other protocols and their endpoints will be defined in a future release.
UMLPackagePathstringCIM::Network::IPsec
Versionstring2.8.0

Class Properties

Local Class Properties

NameData TypeDefault ValueQualifiers
NameData TypeValue
AuthenticationMethoduint16
DescriptionstringAuthenticationMethod is an enumeration that specifies the operation of the IKESAEndpoint. The list of methods was generated from Appendix A of RFC2409. Note that the enumeration is different than the RFC list, since the values of Unknown and Other are taken into account.
MappingStringsstringRFC2409.IETF|Appendix A
ModelCorrespondencestringCIM_IKESAEndpoint.OtherAuthenticationMethod
ValueMapstring0, 1, 2, 3, 4, 5, 6, 7..65000, 65001..65535
ValuesstringUnknown, Other, Pre-shared Key, DSS Signatures, RSA Signatures, Encryption with RSA, Revised Encryption with RSA, DMTF/IANA Reserved, Vendor Reserved
CipherAlgorithmuint16
DescriptionstringCipherAlgorithm is an enumeration that specifies the encryption algorithm used by the IKESAEndpoint. The list of algorithms was generated from Appendix A of RFC2409. Note that the enumeration is different than the RFC list, since the values of Unknown and Other are taken into account.
MappingStringsstringRFC2409.IETF|Appendix A
ModelCorrespondencestringCIM_IKESAEndpoint.OtherCipherAlgorithm
ValueMapstring0, 1, 2, 3, 4, 5, 6, 7, 8..65000, 65001..65535
ValuesstringUnknown, Other, DES, IDEA, Blowfish, RC5, 3DES, CAST, DMTF/IANA Reserved, Vendor Reserved
GroupIduint16
DescriptionstringGroupId specifies the key exchange group ID. If the GroupID number is from the vendor-specific range (32768-65535), the VendorID qualifies the group number. Well-known group identifiers from RFC2412, Appendix E, are: Group 1='768 bit prime', Group 2='1024 bit prime', Group 3= 'Elliptic Curve Group with 155 bit field element', Group 4= 'Large Elliptic Curve Group with 185 bit field element', and Group 5='1536 bit prime'.
MappingStringsstringRFC2412.IETF|Appendix E
ModelCorrespondencestringCIM_IKESAEndpoint.VendorID
ValueMapstring0, 1, 2, 3, 4, 5, .., 0x8000..
ValuesstringNo Group/Non-Diffie-Hellman Exchange, DH-768 bit prime, DH-1024 bit prime, EC2N-155 bit field element, EC2N-185 bit field element, DH-1536 bit prime, Standard Group - Reserved, Vendor Reserved
HashAlgorithmuint16
DescriptionstringHashAlgorithm is an enumeration that specifies the hash function used by the IKESAEndpoint. The list of algorithms was generated from Appendix A of RFC2409. Note that the enumeration is different than the RFC list, since the values of Unknown and Other are taken into account.
MappingStringsstringRFC2409.IETF|Appendix A
ModelCorrespondencestringCIM_IKESAEndpoint.OtherHashAlgorithm
ValueMapstring0, 1, 2, 3, 4, 5..65000, 65001..65535
ValuesstringUnknown, Other, MD5, SHA-1, Tiger, DMTF/IANA Reserved, Vendor Reserved
InitiatorCookieuint64
DescriptionstringIdentifier of the IKE phase 1 negotiation initiator. Combined with the ResponderCookie, this value, in string form, may be used to construct the value of the key field 'Name', inherited from ServiceAccessPoint.
OtherAuthenticationMethodstring
DescriptionstringDescription of the method when the value 1 ("Other") is specified for the property, AuthenticationMethod.
ModelCorrespondencestringCIM_IKESAEndpoint.AuthenticationMethod
OtherCipherAlgorithmstring
DescriptionstringDescription of the encryption algorithm when the value 1 ("Other") is specified for the property, CipherAlgorithm.
ModelCorrespondencestringCIM_IKESAEndpoint.CipherAlgorithm
OtherHashAlgorithmstring
DescriptionstringDescription of the hash function when the value 1 ("Other") is specified for the property, HashAlgorithm.
ModelCorrespondencestringCIM_IKESAEndpoint.HashAlgorithm
ResponderCookieuint64
DescriptionstringIdentifier of the IKE phase 1 negotiation responder. Combined with the InitiatorCookie, this value, in string form, may be used to construct the value of the key field 'Name', inherited from ServiceAccessPoint.
VendorIDstring
DescriptionstringVendorID identifies the vendor when the value of GroupID is in the vendor-specific range, 32768 to 65535.
ModelCorrespondencestringCIM_IKESAEndpoint.GroupId

Inherited Properties

NameData Type
BroadcastResetSupportedboolean
Captionstring
CommunicationStatusuint16
CreationClassNamestring
Descriptionstring
DetailedStatusuint16
ElementNamestring
EnabledDefaultuint16
EnabledStateuint16
Generationuint64
HealthStateuint16
IdleDurationSecondsuint64
InstallDatedatetime
InstanceIDstring
LifetimeKilobytesuint64
LifetimeSecondsuint64
Namestring
NameFormatstring
OperatingStatusuint16
OtherEnabledStatestring
OtherTypeDescriptionstring
PacketLoggingActiveboolean
PrimaryStatusuint16
ProtocolIFTypeuint16
ProtocolTypeuint16
RefreshThresholdKbytesPercentageuint8
RefreshThresholdSecondsPercentageuint8
RequestedStateuint16
Statusstring
SystemCreationClassNamestring
SystemNamestring
TimeOfLastStateChangedatetime
TransitioningToStateuint16
AvailableRequestedStatesuint16[]
OperationalStatusuint16[]
StatusDescriptionsstring[]

Class Methods

Inherited Class Methods

NameReturn Type
BroadcastResetuint32
RequestStateChangeuint32