Name | Data Type | Qualifiers |
Name | Data Type | Value | Scope | Flavors |
AuthenticationMethod | uint16 |
Description | string | AuthenticationMethod is an enumeration that specifies the proposed authentication. The list of methods was generated from Appendix A of RFC2409. Note that the enumeration is different than the RFC list and aligns with the values in IKESAEndpoint.AuthenticationMethod. There is one change to the list - the value 65000 has special meaning. It is a special value that indicates that this particular proposal should be repeated once for each authentication method corresponding to credentials installed on the machine. For example, if the system has a pre-shared key and an public-key certificate, a proposal list would be constructed which includes a proposal that specifies a pre-shared key and a proposal for any of the public-key certificates. | None | TRANSLATABLE= true |
MappingStrings | string | IPSP Policy Model.IETF|IKEProposal.AuthenticationMethod, RFC2409.IETF|Appendix A | None | None |
ModelCorrespondence | string | CIM_IKESAEndpoint.AuthenticationMethod, CIM_IKEProposal.OtherAuthenticationMethod | None | None |
ValueMap | string | 1, 2, 3, 4, 5, 6, 7..64999, 65000, 65001..65535 | None | None |
Values | string | Other, Pre-shared Key, DSS Signatures, RSA Signatures, Encryption with RSA, Revised Encryption with RSA, DMTF/IANA Reserved, Any, Vendor Reserved | None | TRANSLATABLE= true |
Caption | string |
Description | string | The Caption property is a short textual description (one- line string) of the object. | None | TRANSLATABLE= true |
MaxLen | uint32 | 64 | None | None |
CipherAlgorithm | uint16 |
Description | string | CipherAlgorithm is an enumeration that specifies the proposed encryption algorithm. The list of algorithms was generated from Appendix A of RFC2409. Note that the enumeration is different than the RFC list and aligns with the values in IKESAEndpoint.CipherAlgorithm. | None | TRANSLATABLE= true |
MappingStrings | string | IPSP Policy Model.IETF|IKEProposal.CipherAlgorithm, RFC2409.IETF|Appendix A | None | None |
ModelCorrespondence | string | CIM_IKESAEndpoint.CipherAlgorithm, CIM_IKEProposal.OtherCipherAlgorithm | None | None |
ValueMap | string | 1, 2, 3, 4, 5, 6, 7, 8..65000, 65001..65535 | None | None |
Values | string | Other, DES, IDEA, Blowfish, RC5, 3DES, CAST, DMTF/IANA Reserved, Vendor Reserved | None | TRANSLATABLE= true |
Description | string |
Description | string | The Description property provides a textual description of the object. | None | TRANSLATABLE= true |
ElementName | string |
Description | string | The user-friendly name for this instance of SettingData. In addition, the user-friendly name can be used as an index property for a search or query. (Note: The name does not have to be unique within a namespace.) | None | TRANSLATABLE= true |
Override | string | ElementName | TOSUBCLASS= false | None |
Required | boolean | true | None | OVERRIDABLE= false
|
GroupId | uint16 |
Description | string | The property GroupId specifies the proposed phase 1 security association key exchange group. This property is ignored for all aggressive mode exchanges (IKEAction.ExchangeMode = 4). If the GroupID number is from the vendor-specific range (32768-65535), the property VendorID qualifies the group number. Well-known group identifiers from RFC2412, Appendix E, are: Group 1='768 bit prime', Group 2='1024 bit prime', Group 3 ='Elliptic Curve Group with 155 bit field element', Group 4= 'Large Elliptic Curve Group with 185 bit field element', and Group 5='1536 bit prime'. | None | TRANSLATABLE= true |
MappingStrings | string | IPSP Policy Model.IETF|IKEProposal.GroupID, RFC2412.IETF|Appendix E | None | None |
ModelCorrespondence | string | CIM_IKESAEndpoint.GroupID, CIM_IKEProposal.VendorID | None | None |
ValueMap | string | 0, 1, 2, 3, 4, 5, .., 0x8000.. | None | None |
Values | string | No Group/Non-Diffie-Hellman Exchange, DH-768 bit prime, DH-1024 bit prime, EC2N-155 bit field element, EC2N-185 bit field element, DH-1536 bit prime, Standard Group - Reserved, Vendor Reserved | None | TRANSLATABLE= true |
HashAlgorithm | uint16 |
Description | string | HashAlgorithm is an enumeration that specifies the proposed hash function. The list of algorithms was generated from Appendix A of RFC2409. Note that the enumeration is different than the RFC list and aligns with the values in IKESAEndpoint.HashAlgorithm. | None | TRANSLATABLE= true |
MappingStrings | string | IPSP Policy Model.IETF|IKEProposal.HashAlgorithm, RFC2409.IETF|Appendix A | None | None |
ModelCorrespondence | string | CIM_IKESAEndpoint.HashAlgorithm, CIM_IKEProposal.OtherHashAlgorithm | None | None |
ValueMap | string | 1, 2, 3, 4, 5..65000, 65001..65535 | None | None |
Values | string | Other, MD5, SHA-1, Tiger, DMTF/IANA Reserved, Vendor Reserved | None | TRANSLATABLE= true |
InstanceID | string |
Description | string | Within the scope of the instantiating Namespace, InstanceID opaquely and uniquely identifies an instance of this class. To ensure uniqueness within the NameSpace, the value of InstanceID should be constructed using the following "preferred" algorithm:
<OrgID>:<LocalID>
Where <OrgID> and <LocalID> are separated by a colon (:), and where <OrgID> must include a copyrighted, trademarked, or otherwise unique name that is owned by the business entity that is creating or defining the InstanceID or that is a registered ID assigned to the business entity by a recognized global authority. (This requirement is similar to the <Schema Name>_<Class Name> structure of Schema class names.) In addition, to ensure uniqueness, <OrgID> must not contain a colon (:). When using this algorithm, the first colon to appear in InstanceID must appear between <OrgID> and <LocalID>.
<LocalID> is chosen by the business entity and should not be reused to identify different underlying (real-world) elements. If the above "preferred" algorithm is not used, the defining entity must assure that the resulting InstanceID is not reused across any InstanceIDs produced by this or other providers for the NameSpace of this instance.
For DMTF-defined instances, the "preferred" algorithm must be used with the <OrgID> set to CIM. | None | TRANSLATABLE= true |
Key | boolean | true | None | OVERRIDABLE= false
|
Override | string | InstanceID | TOSUBCLASS= false | None |
MaxLifetimeKilobytes | uint64 |
Description | string | MaxLifetimeKilobytes specifies the maximum kilobyte lifetime the IKE message sender proposes for an SA to be considered valid after it has been created. A value of zero (the default) indicates that there should be no maximum kilobyte lifetime. A non-zero value specifies the desired kilobyte lifetime. | None | TRANSLATABLE= true |
MappingStrings | string | IPSP Policy Model.IETF|IKEProposal.MaxLifetimeKilobytes | None | None |
ModelCorrespondence | string | CIM_SecurityAssociationEndpoint.LifetimeKilobytes | None | None |
PUnit | string | byte * 10^3 | None | None |
Units | string | KiloBytes | None | TRANSLATABLE= true |
MaxLifetimeSeconds | uint64 |
Description | string | MaxLifetimeSeconds specifies the maximum time the IKE message sender proposes for an SA to be considered valid after it has been created. A value of zero indicates that the default of 8 hours be used. A non-zero value indicates the maximum seconds lifetime. | None | TRANSLATABLE= true |
MappingStrings | string | IPSP Policy Model.IETF|IKEProposal.MaxLifetimeSeconds | None | None |
ModelCorrespondence | string | CIM_SecurityAssociationEndpoint.LifetimeSeconds | None | None |
PUnit | string | second | None | None |
Units | string | Seconds | None | TRANSLATABLE= true |
OtherAuthenticationMethod | string |
Description | string | Description of the method when the value 1 ("Other") is specified for the property, AuthenticationMethod. | None | TRANSLATABLE= true |
ModelCorrespondence | string | CIM_IKESAEndpoint.OtherAuthenticationMethod, CIM_IKEProposal.AuthenticationMethod | None | None |
OtherCipherAlgorithm | string |
Description | string | Description of the encryption algorithm when the value 1 ("Other") is specified for the property, CipherAlgorithm. | None | TRANSLATABLE= true |
ModelCorrespondence | string | CIM_IKESAEndpoint.OtherCipherAlgorithm, CIM_IKEProposal.CipherAlgorithm | None | None |
OtherHashAlgorithm | string |
Description | string | Description of the hash function when the value 1 ("Other") is specified for the property, HashAlgorithm. | None | TRANSLATABLE= true |
ModelCorrespondence | string | CIM_IKESAEndpoint.OtherHashAlgorithm, CIM_IKEProposal.HashAlgorithm | None | None |
VendorID | string |
Description | string | VendorID identifies the vendor when the value of GroupID is in the vendor-specific range, 32768 to 65535. | None | TRANSLATABLE= true |
ModelCorrespondence | string | CIM_IKESAEndpoint.VendorID, CIM_IKEProposal.GroupId | None | None |
Copyright © 2008-2009 VMware, Inc. All rights reserved.