Class CIM_IKEProposal


  extends CIM_SAProposal
IKEProposal contains the parameters necessary to drive the phase 1 IKE negotiation.
Details...
This class is not implemented.

Class Qualifiers

NameData TypeValueScopeFlavors
DescriptionstringIKEProposal contains the parameters necessary to drive the phase 1 IKE negotiation.None TRANSLATABLE= true
MappingStringsstringIPSP Policy Model.IETF|IKEProposalNone None
UMLPackagePathstringCIM::IPsecPolicyNone None
Versionstring2.8.0TOSUBCLASS= falseTRANSLATABLE= true

Local Class Properties

NameData TypeQualifiers
NameData TypeValueScopeFlavors
AuthenticationMethoduint16
DescriptionstringAuthenticationMethod is an enumeration that specifies the proposed authentication. The list of methods was generated from Appendix A of RFC2409. Note that the enumeration is different than the RFC list and aligns with the values in IKESAEndpoint.AuthenticationMethod. There is one change to the list - the value 65000 has special meaning. It is a special value that indicates that this particular proposal should be repeated once for each authentication method corresponding to credentials installed on the machine. For example, if the system has a pre-shared key and an public-key certificate, a proposal list would be constructed which includes a proposal that specifies a pre-shared key and a proposal for any of the public-key certificates.None TRANSLATABLE= true
MappingStringsstringIPSP Policy Model.IETF|IKEProposal.AuthenticationMethod, RFC2409.IETF|Appendix ANone None
ModelCorrespondencestringCIM_IKESAEndpoint.AuthenticationMethod, CIM_IKEProposal.OtherAuthenticationMethodNone None
ValueMapstring1, 2, 3, 4, 5, 6, 7..64999, 65000, 65001..65535None None
ValuesstringOther, Pre-shared Key, DSS Signatures, RSA Signatures, Encryption with RSA, Revised Encryption with RSA, DMTF/IANA Reserved, Any, Vendor ReservedNone TRANSLATABLE= true
Captionstring
DescriptionstringThe Caption property is a short textual description (one- line string) of the object.None TRANSLATABLE= true
MaxLenuint3264None None
ChangeableTypeuint16
DescriptionstringEnumeration indicating the type of setting. 0 "Not Changeable - Persistent" indicates the instance of SettingData represents primordial settings and shall not be modifiable. 1 "Changeable - Transient" indicates the SettingData represents modifiable settings that are not persisted. Establishing persistent settings from transient settings may be supported. 2 "Changeable - Persistent" indicates the SettingData represents a persistent configuration that may be modified. 3 "Not Changeable - Transient" indicates the SettingData represents a snapshot of the settings of the associated ManagedElement and is not persistent.None TRANSLATABLE= true
ExperimentalbooleantrueTOSUBCLASS= falseNone
ValueMapstring0, 1, 2, 3None None
ValuesstringNot Changeable - Persistent, Changeable - Transient, Changeable - Persistent, Not Changeable - TransientNone TRANSLATABLE= true
CipherAlgorithmuint16
DescriptionstringCipherAlgorithm is an enumeration that specifies the proposed encryption algorithm. The list of algorithms was generated from Appendix A of RFC2409. Note that the enumeration is different than the RFC list and aligns with the values in IKESAEndpoint.CipherAlgorithm.None TRANSLATABLE= true
MappingStringsstringIPSP Policy Model.IETF|IKEProposal.CipherAlgorithm, RFC2409.IETF|Appendix ANone None
ModelCorrespondencestringCIM_IKESAEndpoint.CipherAlgorithm, CIM_IKEProposal.OtherCipherAlgorithmNone None
ValueMapstring1, 2, 3, 4, 5, 6, 7, 8..65000, 65001..65535None None
ValuesstringOther, DES, IDEA, Blowfish, RC5, 3DES, CAST, DMTF/IANA Reserved, Vendor ReservedNone TRANSLATABLE= true
ConfigurationNamestring
DescriptionstringAn instance of CIM_SettingData may correspond to a well-known configuration that exists for an associated CIM_ManagedElement. If the ConfigurationName property is non-NULL, the instance of CIM_SettingData shall correspond to a well-known configuration for a Managed Element, the value of the ConfigurationName property shall be the name of the configuration, and the ChangeableType property shall have the value 0 or 2. A value of NULL for the ConfigurationName property shall mean that the instance of CIM_SettingData does not correspond to a well-known configuration for a Managed Element or that this information is unknown.None TRANSLATABLE= true
ExperimentalbooleantrueTOSUBCLASS= falseNone
Descriptionstring
DescriptionstringThe Description property provides a textual description of the object.None TRANSLATABLE= true
ElementNamestring
DescriptionstringThe user-friendly name for this instance of SettingData. In addition, the user-friendly name can be used as an index property for a search or query. (Note: The name does not have to be unique within a namespace.)None TRANSLATABLE= true
OverridestringElementNameTOSUBCLASS= falseNone
RequiredbooleantrueNone OVERRIDABLE= false
Generationuint64
DescriptionstringGeneration is an optional, monotonically increasing property that may be used to identify a particular generation of the resource represented by this class. If Generation is supported by the implementation, its value shall not be null. Except as otherwise specified, a value (including null) of Generation specified at creation time shall be replaced by null if Generation is not supported by the implementation or shall be a, (possibly different), non-null value if the implementation does support Generation. After creation and if supported, Generation shall be updated, at least once per access, whenever the represented resource is modified, regardless of the source of the modification. Note: the Generation value only needs to be updated once between references, even if the resource is updated many times. The key point is to assure that it will be different if there have been updates, not to count each update. Note: unless otherwise specified, the value of Generation within one instance is not required to be coordinated with the value of Generation in any other instance. Note:the semantics of the instance, (as defined by its creation class), define the underlying resource. That underlying resource may be a collection or aggregation of resources. And, in that case, the semantics of the instance further define when updates to constituent resources also require updates to the Generation of the collective resource. Default behavior of composite aggregations should be to update the Generation of the composite whenever the Generation of a component is updated. Subclasses may define additional requirements for updates on some or all of related instances. For a particular instance, the value of Generation may wrap through zero, but the elapsed time between wraps shall be greater than 10's of years. This class does not require Generation to be unique across instances of other classes nor across instances of the same class that have different keys. Generation shall be different across power cycles, resets, or reboots if any of those actions results in an update. Generation may be different across power cycles, resets, or reboots if those actions do not result in an update. If the Generation property of an instance is non-null, and if any attempt to update the instance includes the Generation property, then if it doesn't match the current value, the update shall fail. The usage of this property is intended to be further specified by applicable management profiles. Typically, a client will read the value of this property and then supply that value as input to an operation that modifies the instance in some means. This may be via an explicit parameter in an extrinsic method or via an embedded value in an extrinsic method or intrinsic operation. For example: a profile may require that an intrinsic instance modification supply the Generation property and that it must match for the modification to succeed.None TRANSLATABLE= true
ExperimentalbooleantrueTOSUBCLASS= falseNone
GroupIduint16
DescriptionstringThe property GroupId specifies the proposed phase 1 security association key exchange group. This property is ignored for all aggressive mode exchanges (IKEAction.ExchangeMode = 4). If the GroupID number is from the vendor-specific range (32768-65535), the property VendorID qualifies the group number. Well-known group identifiers from RFC2412, Appendix E, are: Group 1='768 bit prime', Group 2='1024 bit prime', Group 3 ='Elliptic Curve Group with 155 bit field element', Group 4= 'Large Elliptic Curve Group with 185 bit field element', and Group 5='1536 bit prime'.None TRANSLATABLE= true
MappingStringsstringIPSP Policy Model.IETF|IKEProposal.GroupID, RFC2412.IETF|Appendix ENone None
ModelCorrespondencestringCIM_IKESAEndpoint.GroupID, CIM_IKEProposal.VendorIDNone None
ValueMapstring0, 1, 2, 3, 4, 5, .., 0x8000..None None
ValuesstringNo Group/Non-Diffie-Hellman Exchange, DH-768 bit prime, DH-1024 bit prime, EC2N-155 bit field element, EC2N-185 bit field element, DH-1536 bit prime, Standard Group - Reserved, Vendor ReservedNone TRANSLATABLE= true
HashAlgorithmuint16
DescriptionstringHashAlgorithm is an enumeration that specifies the proposed hash function. The list of algorithms was generated from Appendix A of RFC2409. Note that the enumeration is different than the RFC list and aligns with the values in IKESAEndpoint.HashAlgorithm.None TRANSLATABLE= true
MappingStringsstringIPSP Policy Model.IETF|IKEProposal.HashAlgorithm, RFC2409.IETF|Appendix ANone None
ModelCorrespondencestringCIM_IKESAEndpoint.HashAlgorithm, CIM_IKEProposal.OtherHashAlgorithmNone None
ValueMapstring1, 2, 3, 4, 5..65000, 65001..65535None None
ValuesstringOther, MD5, SHA-1, Tiger, DMTF/IANA Reserved, Vendor ReservedNone TRANSLATABLE= true
InstanceIDstring
DescriptionstringWithin the scope of the instantiating Namespace, InstanceID opaquely and uniquely identifies an instance of this class. To ensure uniqueness within the NameSpace, the value of InstanceID should be constructed using the following "preferred" algorithm: <OrgID>:<LocalID> Where <OrgID> and <LocalID> are separated by a colon (:), and where <OrgID> must include a copyrighted, trademarked, or otherwise unique name that is owned by the business entity that is creating or defining the InstanceID or that is a registered ID assigned to the business entity by a recognized global authority. (This requirement is similar to the <Schema Name>_<Class Name> structure of Schema class names.) In addition, to ensure uniqueness, <OrgID> must not contain a colon (:). When using this algorithm, the first colon to appear in InstanceID must appear between <OrgID> and <LocalID>. <LocalID> is chosen by the business entity and should not be reused to identify different underlying (real-world) elements. If the above "preferred" algorithm is not used, the defining entity must assure that the resulting InstanceID is not reused across any InstanceIDs produced by this or other providers for the NameSpace of this instance. For DMTF-defined instances, the "preferred" algorithm must be used with the <OrgID> set to CIM.None TRANSLATABLE= true
KeybooleantrueNone OVERRIDABLE= false
OverridestringInstanceIDTOSUBCLASS= falseNone
MaxLifetimeKilobytesuint64
DescriptionstringMaxLifetimeKilobytes specifies the maximum kilobyte lifetime the IKE message sender proposes for an SA to be considered valid after it has been created. A value of zero (the default) indicates that there should be no maximum kilobyte lifetime. A non-zero value specifies the desired kilobyte lifetime.None TRANSLATABLE= true
MappingStringsstringIPSP Policy Model.IETF|IKEProposal.MaxLifetimeKilobytesNone None
ModelCorrespondencestringCIM_SecurityAssociationEndpoint.LifetimeKilobytesNone None
PUnitstringbyte * 10^3None None
UnitsstringKiloBytesNone TRANSLATABLE= true
MaxLifetimeSecondsuint64
DescriptionstringMaxLifetimeSeconds specifies the maximum time the IKE message sender proposes for an SA to be considered valid after it has been created. A value of zero indicates that the default of 8 hours be used. A non-zero value indicates the maximum seconds lifetime.None TRANSLATABLE= true
MappingStringsstringIPSP Policy Model.IETF|IKEProposal.MaxLifetimeSecondsNone None
ModelCorrespondencestringCIM_SecurityAssociationEndpoint.LifetimeSecondsNone None
PUnitstringsecondNone None
UnitsstringSecondsNone TRANSLATABLE= true
OtherAuthenticationMethodstring
DescriptionstringDescription of the method when the value 1 ("Other") is specified for the property, AuthenticationMethod.None TRANSLATABLE= true
ModelCorrespondencestringCIM_IKESAEndpoint.OtherAuthenticationMethod, CIM_IKEProposal.AuthenticationMethodNone None
OtherCipherAlgorithmstring
DescriptionstringDescription of the encryption algorithm when the value 1 ("Other") is specified for the property, CipherAlgorithm.None TRANSLATABLE= true
ModelCorrespondencestringCIM_IKESAEndpoint.OtherCipherAlgorithm, CIM_IKEProposal.CipherAlgorithmNone None
OtherHashAlgorithmstring
DescriptionstringDescription of the hash function when the value 1 ("Other") is specified for the property, HashAlgorithm.None TRANSLATABLE= true
ModelCorrespondencestringCIM_IKESAEndpoint.OtherHashAlgorithm, CIM_IKEProposal.HashAlgorithmNone None
VendorIDstring
DescriptionstringVendorID identifies the vendor when the value of GroupID is in the vendor-specific range, 32768 to 65535.None TRANSLATABLE= true
ModelCorrespondencestringCIM_IKESAEndpoint.VendorID, CIM_IKEProposal.GroupIdNone None

Copyright © 2008-2010 VMware, Inc. All rights reserved.