IKE Tunnels by Security Endpoint Workspace
The Internet Key Exchange (IKE) Tunnels by Security Endpoint workspace
displays availability and performance statistics for IKE tunnels known
to the IKE daemon for the specified remote security endpoint. IKE
tunnels are used by a security endpoint (IKE daemon) to negotiate
dynamic IP tunnels.
One way to display the IKE Tunnels by Security Endpoint workspace
is to do the following:
- Right-click the IPSec Tunnels Navigator
item for a specific TCP/IP stack.
- Select Workspaces and select the IKE Tunnels link.
- Click the Link icon by one of the rows of
the IKE Tunnels With Byte Rate >= 1024 Summary
Table.
- Select the IKE Tunnels by Security Endpoint link.
Summary information is displayed in the IKE Tunnels By Security Endpoint Summary Table.
The IKE Tunnels by Security Endpoint Workspace contains the following
views:
- IKE Tunnels with Percent Failed Activations > 0 Summary Table: Displays
performance and configuration information for IKE tunnels that are
experiencing failures when activating dynamic IP tunnels.
- Percent Failed Activations > 0: Shows tunnels
that have experienced dynamic tunnel activation failures. It is
graphed as a bar chart where bars represent tunnel IDs and the graph
shows the percentage of dynamic tunnel activations that have failed.
- Tunnel States: Shows the current number
of IKE tunnels in different states for the given TCP/IP stack. The
query for this view uses the IPSec Status attribute group instead
of the IKE Tunnels attribute group. The graph is a bar chart where:
- Yellow represents the number of tunnels
in Active state.
- Blue represents the number of tunnels in
In Progress state.
- Pink represents the number of tunnels in
Expired state.
- IKE Tunnels By Security Endpoint Summary Table: Provides
performance and configuration data about the IKE tunnels known to
the IKE daemon for the specified security endpoints.
IKE Tunnels with Percent Failed Activations > 0 Summary Table
The IKE Tunnels Summary Table displays performance and configuration
information for IKE tunnels that are experiencing failures when activating
dynamic IP tunnels.
For a complete list of the attributes available in the IKE Tunnels
with Percent Failed Activations > 0 Summary Table, and a brief description
of each, see the Internet Key Exchange (IKE) Tunnels Attributes help panel.
The following additional workspaces can be accessed by clicking
on the Link icon in the IKE Tunnels with Percent
Failed Activations > 0 Summary Table:
- IKE Tunnels by Security Endpoint Workspace (default):
Navigates to the IKE Tunnels By Security Endpoint workspace and displays
the IKE tunnels matching the remote security endpoint of the IKE tunnels
you would like displayed. When you select the link to the IKE Tunnels
By Security Endpoint workspace, a dialog box prompts you to identify
the remote security endpoint of the tunnels you would like displayed.
This value is requested:
- Remote Security Endpoint: The IP address of the remote security
endpoint. This may be an IPv4 address in dotted decimal notation or
an IPv6 address in colon hexadecimal notation
Entries in the stored table are compared to the values provided
in the dialog box. All entries in the table that match are displayed
in the table view requested.
IKE Tunnels By Security Endpoint Summary Table
The IKE Tunnels By Security Endpoint Summary Table provides performance
and configuration data about the IKE tunnels known to the IKE daemon
for the specified security endpoints.
For a complete list of the attributes available in the IKE Tunnels
By Security Endpoint Summary Table, and a brief description of each,
see the Internet Key Exchange (IKE) Tunnels Attributes help panel.
See also: