IKE Tunnels workspace
The Internet Key Exchange (IKE) Tunnels workspace displays availability
and performance statistics for IKE tunnels known to the IKE daemon
for a specific stack. IKE tunnels are used by a security endpoint
(IKE daemon) to negotiate dynamic IP tunnels. Since there could be
thousands of IKE tunnels this workspace has a predefined default filter
when initially opened. The query used to initially open the workspace
will request IKE tunnels with a byte rate >= 1024.
One way to display the IKE Tunnels workspace, right-click the IPSec Tunnels Navigator item for a specific TCP/IP
stack is to select Workspaces and select the IKE Tunnels link.
Summary information is displayed in the IKE Tunnels With Byte Rate >= 1024 Summary table.
The IKE Tunnels workspace contains the following views:
- IKE Tunnels With Percent Failed Activations > 0 Summary table: Displays
performance and configuration information for IKE tunnels that are
experiencing failures when activating dynamic IP tunnels. No links
are available from this view.
- Percent Failed Activations > 0: Shows IKE
tunnels that have experienced dynamic tunnel activation failures.
This bar chart shows the percentage of dynamic tunnel activations
that have failed by Tunnel ID.
- Tunnel States: Shows the current number
of IKE tunnels in different states for the given TCP/IP stack. The
query for this view uses the IPSec Status attribute group instead
of the IKE Tunnels attribute group. The graph is a bar chart where:
- Yellow represents the number of tunnels
in an Active state.
- Blue represents the number of tunnels in
an In Progress state.
- Pink represents the number of tunnels in
an Expired state.
- IKE Tunnels With Byte Rate >= 1024 Summary table: Displays
performance and configuration data about the IKE tunnels with a byte
rate greater than or equal to 1024. Each row in the table represents
a single IKE tunnel. The data in this table can be filtered based
on criteria that you provide.
IKE Tunnels With Percent Failed Activations > 0 Summary table
The IKE Tunnels with Percent Failed Activations > 0 Summary table
displays performance and configuration information for IKE tunnels
that are experiencing failures when activating dynamic IP tunnels.
For a complete list of the attributes available in the IKE Tunnels
Summary tables, and a brief description of each, see the Internet Key Exchange (IKE) Tunnels Attributes help panel.
IKE Tunnels With Byte Rate >= 1024 Summary table
The IKE Tunnels With Byte Rate >= 1024 Summary table displays performance
and configuration data about the IKE tunnels with a byte rate greater
than or equal to 1024. Each row in the table represents a single
IKE tunnel. The data in this table can be filtered based on criteria
that you provide.
For a complete list of the attributes available in the IKE Tunnels
With Byte Rate >= 1024 Summary table, and a brief description of each,
see the Internet Key Exchange (IKE) Tunnels Attributes help panel.
The following additional workspace can be accessed by clicking
the Link icon in the IKE Tunnels With Byte Rate
>= 1024 Summary table:
- IKE Tunnels by Security Endpoint workspace (default):
Navigates to the IKE Tunnels By Security Endpoint workspace and displays
the IKE tunnels matching the remote security endpoint of the IKE tunnels
you would like displayed. When you select the link to the IKE Tunnels
By Security Endpoint workspace, a dialog box prompts you to identify
the remote security endpoint of the tunnels you would like displayed.
This field is filled in by default with the value from the Remote
Security Endpoint column for the selected tunnel, but you can change
this value to be any IPv4 or IPv6 address found in the TCP/IP stack.
Specify an IP address that has the same IP version as the selected
connection. If the Remote Security Endpoint column is blank, this
field is filled with an IP address that has a value of zero (0) for
all subnets at the address. Entries in the stored table are compared
to the values provided in the dialog box. All entries in the table
that match are displayed in the IKE Tunnels By Security Endpoint workspace.
See also: