| cipsIsakmpEnabled | 
      .1.3.6.1.4.1.9.10.62.1.1.1 | 
    
    
      | 
        The value of this object is TRUE if ISAKMP
        has been enabled on the managed entity. Otherise
        the value of this object is FALSE.
       | 
    
    
      | cipsIsakmpIdentity | 
      .1.3.6.1.4.1.9.10.62.1.1.2 | 
    
    
      | 
        The value of this object is shows the type of
        identity used by the managed entity in ISAKMP
        negotiations with another peer.
       | 
    
    
      | cipsIsakmpKeepaliveInterval | 
      .1.3.6.1.4.1.9.10.62.1.1.3 | 
    
    
      | 
        The value of this object is time interval in
        seconds between successive ISAKMP keepalive
        heartbeats issued to the peers to which IKE
        tunnels have been setup.
       | 
    
    
      | cipsNumIsakmpPolicies | 
      .1.3.6.1.4.1.9.10.62.1.1.4 | 
    
    
      | 
        The value of this object is the number of
        ISAKMP policies that have been configured on the
        managed entity.
       | 
    
    
      | cipsIsakmpPolicyEntry | 
      .1.3.6.1.4.1.9.10.62.1.1.5.1 | 
    
    
      | 
        Each entry contains the attributes
        associated with a single ISAKMP
        Policy entry.
       | 
    
    
      | cipsSALifetime | 
      .1.3.6.1.4.1.9.10.62.1.2.1.1 | 
    
    
      | 
        The default lifetime (in seconds) assigned
        to an SA as a global policy (maybe overridden
        in specific cryptomap definitions).
       | 
    
    
      | cipsSALifesize | 
      .1.3.6.1.4.1.9.10.62.1.2.1.2 | 
    
    
      | 
        The default lifesize in KBytes assigned to an SA
        as a global policy (unless overridden in cryptomap
        definition)
       | 
    
    
      | cipsNumStaticCryptomapSets | 
      .1.3.6.1.4.1.9.10.62.1.2.1.3 | 
    
    
      | 
        The number of Cryptomap Sets that are are fully
        configured. Statically defined cryptomap sets
        are ones where the operator has fully specified
        all the parameters required set up IPSec
        Virtual Private Networks (VPNs).
       | 
    
    
      | cipsNumCETCryptomapSets | 
      .1.3.6.1.4.1.9.10.62.1.2.1.4 | 
    
    
      | 
        The number of static Cryptomap Sets that have
        at least one CET cryptomap element
        as a member of the set.
       | 
    
    
      | cipsNumDynamicCryptomapSets | 
      .1.3.6.1.4.1.9.10.62.1.2.1.5 | 
    
    
      | 
        The number of dynamic IPSec Policy templates
        (called 'dynamic cryptomap templates') configured
        on the managed entity.
       | 
    
    
      | cipsNumTEDCryptomapSets | 
      .1.3.6.1.4.1.9.10.62.1.2.1.6 | 
    
    
      | 
        The number of static Cryptomap Sets that have
        at least one dynamic cryptomap template
        bound to them which has the Tunnel Endpoint Discovery
        (TED) enabled.
       | 
    
    
      | cipsNumTEDProbesReceived | 
      .1.3.6.1.4.1.9.10.62.1.2.2.1 | 
    
    
      | 
        The number of TED probes that were received by this
        managed entity since bootup. Not affected by any
        CLI operation.
       | 
    
    
      | cipsNumTEDProbesSent | 
      .1.3.6.1.4.1.9.10.62.1.2.2.2 | 
    
    
      | 
        The number of TED probes that were dispatched by all
        the dynamic cryptomaps in this managed entity since
        bootup. Not affected by any CLI operation.
       | 
    
    
      | cipsNumTEDFailures | 
      .1.3.6.1.4.1.9.10.62.1.2.2.3 | 
    
    
      | 
        The number of TED probes that were dispatched by
        the local entity and that failed to locate crypto
        endpoint.  Not affected by any CLI operation.
       | 
    
    
      | cipsMaxSAs | 
      .1.3.6.1.4.1.9.10.62.1.3.1 | 
    
    
      | 
        The maximum number of IPsec Security Associations
        that can be established on this managed entity.
        If no theoretical limit exists, this
        returns value 0.
        Not affected by any CLI operation.
       | 
    
    
      | cips3DesCapable | 
      .1.3.6.1.4.1.9.10.62.1.3.2 | 
    
    
      | 
        The value of this object is TRUE if the
        managed entity has the hardware nad software
        features to support 3DES encryption algorithm.
        Not affected by any CLI operation.
       | 
    
    
      | cipsStaticCryptomapSetEntry | 
      .1.3.6.1.4.1.9.10.62.1.2.3.1.1 | 
    
    
      | 
        Each entry contains the attributes
        associated with a single static
        cryptomap set.
       | 
    
    
      | cipsDynamicCryptomapSetEntry | 
      .1.3.6.1.4.1.9.10.62.1.2.3.2.1 | 
    
    
      | 
        Each entry contains the attributes associated
        with a single dynamic cryptomap template.
       | 
    
    
      | cipsStaticCryptomapEntry | 
      .1.3.6.1.4.1.9.10.62.1.2.3.3.1 | 
    
    
      | 
        Each entry contains the attributes
        associated with a single static
        (fully specified) cryptomap entry.
        This table does not include the members
        of dynamic cryptomap sets that may be
        linked with the parent static cryptomap set.
       | 
    
    
      | cipsCryptomapSetIfEntry | 
      .1.3.6.1.4.1.9.10.62.1.2.3.4.1 | 
    
    
      | 
        Each entry contains the record of
        the association between an interface
        and a cryptomap set (static) that is defined
        on the managed entity.
        Note that the cryptomap set identified in
        this binding must static. Dynamic cryptomaps cannot
        be bound to interfaces.
       | 
    
    
      | cipsCntlIsakmpPolicyAdded | 
      .1.3.6.1.4.1.9.10.62.1.4.1 | 
    
    
      | 
        This object defines the administrative state of
        sending the IOS IPsec ISAKMP Policy Add trap.
       | 
    
    
      | cipsCntlIsakmpPolicyDeleted | 
      .1.3.6.1.4.1.9.10.62.1.4.2 | 
    
    
      | 
        This object defines the administrative state of
        sending the IOS IPsec ISAKMP Policy Delete trap.
       | 
    
    
      | cipsCntlCryptomapAdded | 
      .1.3.6.1.4.1.9.10.62.1.4.3 | 
    
    
      | 
        This object defines the administrative state of
        sending the IOS IPsec Cryptomap Add trap.
       | 
    
    
      | cipsCntlCryptomapDeleted | 
      .1.3.6.1.4.1.9.10.62.1.4.4 | 
    
    
      | 
        This object defines the administrative state of
        sending the IOS IPsec Cryptomap Delete trap.
       | 
    
    
      | cipsCntlCryptomapSetAttached | 
      .1.3.6.1.4.1.9.10.62.1.4.5 | 
    
    
      | 
        This object defines the administrative state of
        sending the IOS IPsec trap that is issued
        when a cryptomap set is attached to an interface.
       | 
    
    
      | cipsCntlCryptomapSetDetached | 
      .1.3.6.1.4.1.9.10.62.1.4.6 | 
    
    
      | 
        This object defines the administrative state of
        sending the IOS IPsec trap that is issued
        when a cryptomap set is detached from an interface.
        to which it was earlier bound.
       | 
    
    
      | cipsCntlTooManySAs | 
      .1.3.6.1.4.1.9.10.62.1.4.7 | 
    
    
      | 
        This object defines the administrative state of
        sending the IOS IPsec trap that is issued
        when the number of SAs crosses the maximum
        number of SAs that may be supported on
        the managed entity.
       | 
    
  
  
    
      | cipsIsakmpPolPriority | 
      .1.3.6.1.4.1.9.10.62.1.1.5.1.1 | 
    
    
      | 
        The priotity of this ISAKMP Policy entry.
        This is also the index of this table.
       | 
    
    
      | cipsIsakmpPolEncr | 
      .1.3.6.1.4.1.9.10.62.1.1.5.1.2 | 
    
    
      | 
        The encryption transform specified by this
        ISAKMP policy specification. The Internet Key Exchange
        (IKE) tunnels setup using this policy item would
        use the specified encryption transform to protect the
        ISAKMP PDUs.
       | 
    
    
      | cipsIsakmpPolHash | 
      .1.3.6.1.4.1.9.10.62.1.1.5.1.3 | 
    
    
      | 
        The hash transform specified by this
        ISAKMP policy specification. The IKE tunnels
        setup using this policy item would use the
        specified hash transform to protect the
        ISAKMP PDUs.
       | 
    
    
      | cipsIsakmpPolAuth | 
      .1.3.6.1.4.1.9.10.62.1.1.5.1.4 | 
    
    
      | 
        The peer authentication mthod specified by
        this ISAKMP policy specification. If this policy
        entity is selected for negotiation with a peer,
        the local entity would authenticate the peer using
        the method specified by this object.
       | 
    
    
      | cipsIsakmpPolGroup | 
      .1.3.6.1.4.1.9.10.62.1.1.5.1.5 | 
    
    
      | 
        This object specifies the Oakley group used
        for Diffie Hellman exchange in the Main Mode.
        If this policy item is selected to negotiate
        Main Mode with an IKE peer, the local entity
        chooses the group specified by this object to
        perform Diffie Hellman exchange with the
        peer.
       | 
    
    
      | cipsIsakmpPolLifetime | 
      .1.3.6.1.4.1.9.10.62.1.1.5.1.6 | 
    
    
      | 
        This object specifies the lifetime in seconds
        of the IKE tunnels generated using this
        policy specification.
       | 
    
    
      | cipsStaticCryptomapSetName | 
      .1.3.6.1.4.1.9.10.62.1.2.3.1.1.1 | 
    
    
      | 
        The index of the static cryptomap table. The value
        of the string is the name string assigned by the
        operator in defining the cryptomap set.
       | 
    
    
      | cipsStaticCryptomapSetSize | 
      .1.3.6.1.4.1.9.10.62.1.2.3.1.1.2 | 
    
    
      | 
        The total number of cryptomap entries contained in
        this cryptomap set.
        
       | 
    
    
      | cipsStaticCryptomapSetNumIsakmp | 
      .1.3.6.1.4.1.9.10.62.1.2.3.1.1.3 | 
    
    
      | 
        The number of cryptomaps associated with this
        cryptomap set that use ISAKMP protocol to do key
        exchange.
       | 
    
    
      | cipsStaticCryptomapSetNumManual | 
      .1.3.6.1.4.1.9.10.62.1.2.3.1.1.4 | 
    
    
      | 
        The number of cryptomaps associated with this
        cryptomap set that require the operator to manually
        setup the keys and SPIs.
       | 
    
    
      | cipsStaticCryptomapSetNumCET | 
      .1.3.6.1.4.1.9.10.62.1.2.3.1.1.5 | 
    
    
      | 
        The number of cryptomaps of type 'ipsec-cisco'
        associated with this cryptomap set. Such
        cryptomap elements implement Cisco Encryption Technology
        based Virtual Private Networks.
       | 
    
    
      | cipsStaticCryptomapSetNumDynamic | 
      .1.3.6.1.4.1.9.10.62.1.2.3.1.1.6 | 
    
    
      | 
        The number of dynamic cryptomap templates
        linked to this cryptomap set.
       | 
    
    
      | cipsStaticCryptomapSetNumDisc | 
      .1.3.6.1.4.1.9.10.62.1.2.3.1.1.7 | 
    
    
      | 
        The number of dynamic cryptomap templates
        linked to this cryptomap set that have Tunnel Endpoint
        Discovery (TED) enabled.
       | 
    
    
      | cipsStaticCryptomapSetNumSAs | 
      .1.3.6.1.4.1.9.10.62.1.2.3.1.1.8 | 
    
    
      | 
        The number of and IPsec Security Associations
        that are active and were setup using this cryptomap.  
       | 
    
    
      | cipsDynamicCryptomapSetName | 
      .1.3.6.1.4.1.9.10.62.1.2.3.2.1.1 | 
    
    
      | 
        The index of the dynamic cryptomap table.
        The value of the string is the one assigned
        by the operator in defining the cryptomap set.
       | 
    
    
      | cipsDynamicCryptomapSetSize | 
      .1.3.6.1.4.1.9.10.62.1.2.3.2.1.2 | 
    
    
      | 
        The number of cryptomap entries in this cryptomap.
       | 
    
    
      | cipsDynamicCryptomapSetNumAssoc | 
      .1.3.6.1.4.1.9.10.62.1.2.3.2.1.3 | 
    
    
      | 
        The number of static cryptomap sets with which
        this dynamic cryptomap is associated.  
       | 
    
    
      | cipsStaticCryptomapPriority | 
      .1.3.6.1.4.1.9.10.62.1.2.3.3.1.1 | 
    
    
      | 
        The priority of the cryptomap entry in the
        cryptomap set. This is the second index component
        of this table.
       | 
    
    
      | cipsStaticCryptomapType | 
      .1.3.6.1.4.1.9.10.62.1.2.3.3.1.2 | 
    
    
      | 
        The type of the cryptomap entry. This can be an ISAKMP
        cryptomap, CET or manual. Dynamic cryptomaps are not
        counted in this table.
       | 
    
    
      | cipsStaticCryptomapDescr | 
      .1.3.6.1.4.1.9.10.62.1.2.3.3.1.3 | 
    
    
      | 
        The description string entered by the operatoir
        while creating this cryptomap. The string generally
        identifies a description and the purpose of this
        policy.
       | 
    
    
      | cipsStaticCryptomapPeer | 
      .1.3.6.1.4.1.9.10.62.1.2.3.3.1.4 | 
    
    
      | 
        The IP address of the current peer associated with
        this IPSec policy item. Traffic that is protected by
        this cryptomap is protected by a tunnel that terminates
        at the device whose IP address is specified by this
        object.
       | 
    
    
      | cipsStaticCryptomapNumPeers | 
      .1.3.6.1.4.1.9.10.62.1.2.3.3.1.5 | 
    
    
      | 
        The number of peers associated with this cryptomap
        entry. The peers other than the one identified by
        'cipsStaticCryptomapPeer' are backup peers.
        Manual cryptomaps may have only one peer.
       | 
    
    
      | cipsStaticCryptomapPfs | 
      .1.3.6.1.4.1.9.10.62.1.2.3.3.1.6 | 
    
    
      | 
        This object identifies if the tunnels instantiated
        due to this policy item should use Perfect Forward Secrecy
        (PFS) and if so, what group of Oakley they should use.
       | 
    
    
      | cipsStaticCryptomapLifetime | 
      .1.3.6.1.4.1.9.10.62.1.2.3.3.1.7 | 
    
    
      | 
        This object identifies the lifetime of the IPSec
        Security Associations (SA) created using this IPSec policy
        entry. If this value is zero, the lifetime assumes the
        value specified by the global lifetime parameter.
       | 
    
    
      | cipsStaticCryptomapLifesize | 
      .1.3.6.1.4.1.9.10.62.1.2.3.3.1.8 | 
    
    
      | 
        This object identifies the lifesize (maximum traffic
        in bytes that may be carried) of the IPSec SAs
        created using this IPSec policy entry.
        If this value is zero, the lifetime assumes the
        value specified by the global lifesize parameter.
       | 
    
    
      | cipsStaticCryptomapLevelHost | 
      .1.3.6.1.4.1.9.10.62.1.2.3.3.1.9 | 
    
    
      | 
        This object identifies the granularity of the
        IPSec SAs created using this IPSec policy entry.
        If this value is TRUE, distinct SA bundles are created
        for distinct hosts at the end of the application traffic.
       | 
    
    
      | cipsCryptomapSetIfVirtual | 
      .1.3.6.1.4.1.9.10.62.1.2.3.4.1.1 | 
    
    
      | 
        The value of this object identifies if the
        interface to which the cryptomap set is attached
        is a tunnel (such as a GRE or PPTP tunnel).
       | 
    
    
      | cipsCryptomapSetIfStatus | 
      .1.3.6.1.4.1.9.10.62.1.2.3.4.1.2 | 
    
    
      | 
        This object identifies the status of the binding
        of the specified cryptomap set with the specified
        interface. The value when queried is always 'attached'.
        When set to 'detached', the cryptomap set if detached
        from the specified interface. The effect of this is same
        as the CLI command
        config-if# no crypto map cryptomapSetName
        Setting the value to 'attached' will result in
        SNMP General Error.
       | 
    
  
  
    
      | cipsIsakmpPolicyAdded | 
      .1.3.6.1.4.1.9.10.62.2.0.1 | 
    
    
      | 
        This trap is generated when a new ISAKMP
        policy element is defined on the managed entity.
        The context of the event includes the updated
        number of ISAKMP policy elements currently available.
       | 
    
    
      | cipsIsakmpPolicyDeleted | 
      .1.3.6.1.4.1.9.10.62.2.0.2 | 
    
    
      | 
        This trap is generated when an existing ISAKMP
        policy element is deleted on the managed entity.
        The context of the event includes the updated
        number of ISAKMP policy elements currently available.
       | 
    
    
      | cipsCryptomapAdded | 
      .1.3.6.1.4.1.9.10.62.2.0.3 | 
    
    
      | 
        This trap is generated when a new cryptomap is
        added to the specified cryptomap set.
       | 
    
    
      | cipsCryptomapDeleted | 
      .1.3.6.1.4.1.9.10.62.2.0.4 | 
    
    
      | 
        This trap is generated when a cryptomap is
        removed from the specified cryptomap set.
       | 
    
    
      | cipsCryptomapSetAttached | 
      .1.3.6.1.4.1.9.10.62.2.0.5 | 
    
    
      | 
        A cryptomap set must be attached to an interface
        of the device in order for it to be operational.
        This trap is generated when the cryptomap set
        attached to an active interface of the managed entity.
        The context of the notification includes:
        Size of the attached cryptomap set,
        Number of ISAKMP cryptomaps in the set and
        Number of Dynamic cryptomaps in the set.
       | 
    
    
      | cipsCryptomapSetDetached | 
      .1.3.6.1.4.1.9.10.62.2.0.6 | 
    
    
      | 
        This trap is generated when a cryptomap set is
        detached from an interafce to which it was
        bound earlier. The context of the event identifies the
        size of the cryptomap set.
       | 
    
    
      | cipsTooManySAs | 
      .1.3.6.1.4.1.9.10.62.2.0.7 | 
    
    
      | 
        This trap is generated when a new SA is attempted
        to be setup while the number of currently active SAs
        equals the maximum configurable.  The variables are:
        cipsMaxSAs
       | 
    
  
  
    
      | cipsMIBConfIsakmpGroup | 
      .1.3.6.1.4.1.9.10.62.3.2.1 | 
    
    
      | 
        A collection of objects providing Global
        ISAKMP policy monitoring capability to a
        Cisco IPsec capable VPN router.
       | 
    
    
      | cipsMIBConfIPSecGlobalsGroup | 
      .1.3.6.1.4.1.9.10.62.3.2.2 | 
    
    
      | 
        A collection of objects providing Global
        IPSec policy monitoring capability to a
        Cisco IPsec capable VPN router.
       | 
    
    
      | cipsMIBConfCapacityGroup | 
      .1.3.6.1.4.1.9.10.62.3.2.3 | 
    
    
      | 
        A collection of objects providing IPsec
        System Capacity monitoring capability to
        a Cisco IPsec capable VPN router.
       | 
    
    
      | cipsMIBStaticCryptomapGroup | 
      .1.3.6.1.4.1.9.10.62.3.2.4 | 
    
    
      | 
        A collection of objects instrumenting
        the properties of the Static (fully specified)
        Cryptomap Sets on an IPsec-capable
        IOS router.
       | 
    
    
      | cipsMIBMandatoryNotifCntlGroup | 
      .1.3.6.1.4.1.9.10.62.3.2.7 | 
    
    
      | 
        A collection of objects providing IPsec
        Notification capability to a IPsec-capable
        IOS router. It is mandatory to implement
        this set of objects pertaining to
        IOS notifications about IPSec activity.
       | 
    
    
      | cipsMIBManualCryptomapGroup | 
      .1.3.6.1.4.1.9.10.62.3.2.5 | 
    
    
      | 
        A collection of objects instrumenting
        the properties of the Manual Cryptomap entries
        on a Cisco IPsec capable IOS router.
       | 
    
    
      | cipsMIBDynamicCryptomapGroup | 
      .1.3.6.1.4.1.9.10.62.3.2.6 | 
    
    
      | 
        A collection of objects instrumenting
        the properties of the Dynamic Cryptomap group
        on a Cisco IPsec capable IOS router.
       |