DOS Attacks Blocked Table .............................................................................................................B-12
VPN MIB Tables ...........................................................................................................................................B-12
etsysVpnIkePeer Table ....................................................................................................................B-13
etsysVpnIkeProposal Table ..............................................................................................................B-14
etsysVpnIpsecPolicy Table...............................................................................................................B-14
etsysVpnIntfPolicy Table ..................................................................................................................B-14
etsysVpnIpsecProposal Table ..........................................................................................................B-16
etsysVpnAhTransform Table ............................................................................................................B-16
etsysVpnEspTransform Table ..........................................................................................................B-17
Host Resources MIB Objects .......................................................................................................................B-18
Enterasys Syslog Client MIB ........................................................................................................................B-22
xxvi
Need help?
Do you have a question about the Security Router X-PeditionTM and is the answer not in the manual?