IKE Tunnels by Security Endpoint workspace

The Internet Key Exchange (IKE) Tunnels by Security Endpoint workspace displays availability and performance statistics for IKE tunnels known to the IKE daemon for the specified remote security endpoint. IKE tunnels are used by a security endpoint (IKE daemon) to negotiate dynamic IP tunnels.

One way to display the IKE Tunnels by Security Endpoint workspace is to do the following:

  1. Right-click the IPSec Tunnels Navigator item for a specific TCP/IP stack.
  2. Select Workspaces and select the IKE Tunnels link.
  3. Click the Link icon by one of the rows of the IKE Tunnels With Byte Rate >= 1024 Summary table.
  4. Select the IKE Tunnels by Security Endpoint link.

Summary information is displayed in the IKE Tunnels By Security Endpoint Summary table.

The IKE Tunnels by Security Endpoint workspace contains the following views:

IKE Tunnels with Percent Failed Activations > 0 Summary table

The IKE Tunnels Summary table displays performance and configuration information for IKE tunnels that are experiencing failures when activating dynamic IP tunnels.

For a complete list of the attributes available in the IKE Tunnels with Percent Failed Activations > 0 Summary table, and a brief description of each, see the Internet Key Exchange (IKE) Tunnels Attributes help panel.

The following additional workspaces can be accessed by clicking on the Link icon in the IKE Tunnels with Percent Failed Activations > 0 Summary table:

IKE Tunnels By Security Endpoint Summary table

The IKE Tunnels By Security Endpoint Summary table provides performance and configuration data about the IKE tunnels known to the IKE daemon for the specified security endpoints.

For a complete list of the attributes available in the IKE Tunnels By Security Endpoint Summary table, and a brief description of each, see the Internet Key Exchange (IKE) Tunnels Attributes help panel.

See also: