IKE Tunnels by Tunnel ID workspace
The IKE Tunnels by Tunnel ID workspace displays availability and
performance statistics for IKE tunnels with a tunnel ID that matches
the one passed by the link. IKE tunnels are used by a security endpoint
(IKE daemon) to negotiate dynamic IP tunnels.
To display the IKE Tunnels by Tunnel ID workspace, do the following:
- Right-click the IPSec Tunnels Navigator
item for a specific TCP/IP stack.
- Select Workspaces and select the Dynamic IP Tunnels link.
- Click the Link icon by one of the rows of
the Dynamic IP Tunnels With Byte Rate >= 2048 or Dynamic IP Tunnels With Byte Rate = 0 Summary tables.
- Select the IKE Tunnels by Tunnel ID link.
Summary information is displayed in the IKE Tunnels with Percent Failed Activations > 0 Summary table and the IKE Tunnels By Tunnel ID Summary table.
The IKE Tunnels by Tunnel ID workspace contains the following views:
- IKE Tunnels with Percent Failed Activations > 0 Summary table: Displays
performance and configuration information for IKE tunnels that are
experiencing failures when activating dynamic IP tunnels.
- Percent Failed Activations > 0: Shows tunnels
that have experienced dynamic tunnel activation failures. It is
graphed as a bar chart where bars represent tunnel IDs and the graph
shows the percentage of dynamic tunnel activations that have failed.
- Tunnel States: Shows the current number
of IKE tunnels in different states for the given TCP/IP stack. The
query for this view uses the IPSec Status attribute group instead
of the IKE Tunnels attribute group. The graph is a bar chart where:
- Yellow represents the number of tunnels
in an Active state.
- Blue represents the number of tunnels in
an In Progress state.
- Pink represents the number of tunnels in
an Expired state.
- IKE Tunnels By Tunnel ID Summary table: Displays
availability and performance statistics for IKE tunnels with a tunnel
ID that matches the one passed by the link. IKE tunnels are used by
a security endpoint (IKE daemon) to negotiate dynamic IP tunnels.
IKE Tunnels with Percent Failed Activations > 0 Summary table
The IKE Tunnels with Percent Failed Activations > 0 Summary table
displays performance and configuration information for IKE tunnels
that are experiencing failures when activating dynamic IP tunnels.
For a complete list of the attributes available in the IKE Tunnels
with Percent Failed Activations > 0 Summary table, and a brief description
of each, see the Internet Key Exchange (IKE) Tunnels Attributes help panel.
IKE Tunnels By Tunnel ID Summary table
The IKE Tunnels by Tunnel ID Summary table displays availability
and performance statistics for IKE tunnels with a tunnel ID that matches
the one passed by the link. IKE tunnels are used by a security endpoint
(IKE daemon) to negotiate dynamic IP tunnels.
For a complete list of the attributes available in the IKE Tunnels
by Tunnel ID Summary table, and a brief description of each, see the Internet Key Exchange (IKE) Tunnels Attributes help panel.
The following additional workspace can be accessed by clicking
the Link icon in the IKE Tunnels by Tunnel ID
Summary table:
- IKE Tunnels by Security Endpoint workspace (default):
Navigates to the IKE Tunnels By Security Endpoint workspace and displays
the IKE tunnels matching the remote security endpoint of the IKE tunnels
you would like displayed. When you select the link to the IKE Tunnels
By Security Endpoint workspace, a dialog box prompts you to identify
the remote security endpoint of the tunnels you would like displayed.
This field is filled in by default with the value from the Remote
Security Endpoint column for the selected tunnel, but you can change
this value to be any IPv4 or IPv6 address found in the TCP/IP stack.
Specify an IP address that has the same IP version as the selected
connection. If the Remote Security Endpoint column is blank, this
field is filled with an IP address that has a value of zero (0) for
all subnets at the address. Entries in the stored table are compared
to the values provided in the dialog box. All entries in the table
that match are displayed in the IKE Tunnels By Security Endpoint workspace.
See also: