IKE Tunnels with Byte Rate < 1024 Workspace
The IKE Tunnels with Byte Rate < 1024 workspace displays availability
and performance statistics for IKE tunnels with a byte rate of less
than 1024 bytes known to the IKE daemon for a specific stack. IKE
tunnels are used by a security endpoint (IKE daemon) to negotiate
dynamic IP tunnels. A low byte rate could be indicative of a problem
and this workspace allows users to examine information about IKE tunnels
with lower byte rates. This view may be used to see if there is a
large number of expired IKE tunnels using up system resources.
One way to display the IKE Tunnels workspace is to right-click
the IPSec Tunnels Navigator item for a specific
TCP/IP stack, select Workspaces and select the IKE Tunnels with Byte Rate < 1024 link.
Summary information is displayed in the IKE Tunnels With Byte Rate < 1024 Summary Table.
The IKE Tunnels Workspace contains the following views:
- IKE Tunnels with Percent Failed Activations > 0 Summary Table: Displays
performance and configuration information for IKE tunnels that are
experiencing failures when activating dynamic IP tunnels.
- Percent Failed Activations > 0: Shows IKE
tunnels that have experienced dynamic tunnel activation failures.
It is graphed as a bar chart where bars represent tunnel IDs and the
graph shows the percentage of dynamic tunnel activations that have
failed.
- Tunnel States: Shows the current number
of IKE tunnels in different states for the given TCP/IP stack. The
query for this view uses the IPSec Status attribute group instead
of the IKE Tunnels attribute group. The graph is a bar chart where:
- Yellow represents the number of tunnels
in Active state.
- Blue represents the number of tunnels in
In Progress state.
- Pink represents the number of tunnels in
Expired state.
- IKE Tunnels With Byte Rate < 1024 Summary Table: Provides
performance and configuration data about the IKE tunnels with the
least traffic during the last interval as known by the IKE daemon.
Each row in the table represents a single IKE tunnel.
IKE Tunnels with Percent Failed Activations > 0 Summary Table
The IKE Tunnels with Percent Failed Activations > 0 Summary Table
displays performance and configuration information for IKE tunnels
that are experiencing failures when activating dynamic IP tunnels.
For a complete list of the attributes available in the IKE Tunnels
with Percent Failed Activations > 0 Summary Table, and a brief description
of each, see the Internet Key Exchange (IKE) Tunnels Attributes help panel.
The following additional workspace can be accessed by clicking
the Link icon in the IKE Tunnels with Byte Rate <
1024 Summary Table:
- IKE Tunnels by Security Endpoint Workspace (default):
Navigates to the IKE Tunnels By Security Endpoint workspace and displays
the IKE tunnels matching the remote security endpoint of the IKE tunnels
you would like displayed. When you select the link to the IKE Tunnels
By Security Endpoint workspace, a dialog box prompts you to identify
the remote security endpoint of the tunnels you would like displayed.
This field is filled in by default with the value from the Remote
Security Endpoint column for the selected tunnel, but you can change
thisvalue to be any IPv4 or IPv6 address found in the TCP/IP stack.
Specify an IP address that has the same IP version as the selected
connection. If the Remote Security Endpoint column is blank, this
field is filled with an IP address that has a value of zero (0) for
all subnets at the address. Entries in the stored table are compared
to the values provided in the dialog box. All entries in the table
that match are displayed in the IKE Tunnels By Security Endpoint workspace.
See also:
IKE Tunnels With Byte Rate < 1024 Summary Table
The IKE Tunnels With Byte Rate < 1024 Summary Table provides
performance and configuration data about the IKE tunnels with the
least traffic during the last interval as known by the IKE daemon.
Each row in the table represents a single IKE tunnel.
For a complete list of the attributes available in the IKE Tunnels
With Byte Rate < 1024 Summary Table, and a brief description of
each, see the Internet Key Exchange (IKE) Tunnels Attributes help panel.
The following additional workspace can be accessed by clicking
the Link icon in the IKE Tunnels With Byte Rate <
1024 Summary Table:
- IKE Tunnels by Security Endpoint Workspace (default):
Navigates to the IKE Tunnels By Security Endpoint workspace and displays
the IKE tunnels matching the remote security endpoint of the IKE tunnels
you would like displayed. When you select the link to the IKE Tunnels
By Security Endpoint workspace, a dialog box prompts you to identify
the remote security endpoint of the tunnels you would like displayed.
This field is filled in by default with the value from the Remote
Security Endpoint column for the selected tunnel, but you can change
thisvalue to be any IPv4 or IPv6 address found in the TCP/IP stack.
Specify an IP address that has the same IP version as the selected
connection. If the Remote Security Endpoint column is blank, this
field is filled with an IP address that has a value of zero (0) for
all subnets at the address. Entries in the stored table are compared
to the values provided in the dialog box. All entries in the table
that match are displayed in the IKE Tunnels By Security Endpoint workspace.
See also: