KN3 ZERT IPSec Summary attributes

Use the zERT aggregation IPSec statistics to display data about IPSec security sessions.

Application Name The job name associated with the application address space that opened and bound the socket. A valid value is a string of up to 8 characters.

Client IP Address The client IP address. A valid value is a string of up to 45 characters.

Collection Time The time and date of the data sampling. This time is displayed in the following format:

mm/dd/yy hh:mm:ss (Tivoli Enterprise Portal) or yy/mm/dd hh:mm:ss (3270)

Where:

This time is stored as a string no longer than 16 characters in the format CYYMMDDHHMMSSmmm (as in 1020315064501000 for 03/15/02 06:45:01) where:

IKE Tunnel Authentication Algorithm The IKE tunnel authentication algorithm. A valid value is an integer. Values appear on the workspace as follows:

IKE Tunnel Diffie-Hellman Group The diffie-hellman group that is used to generate the keying material for this IKE tunnel. A valid value is an integer. Values appear on the workspace as follows:

IKE Tunnel Encryption Algorithm The IKE tunnel encryption algorithm. A valid value is an integer. Values appear on the workspace as follows:

IKE Tunnel Local Auth Method The IKE tunnel local authentication method. A valid value is an integer. Values appear on the workspace as follows:

IKE Tunnel Local Endpoint The IKE tunnel local endpoint. A valid value is a string of up to 39 characters.

IKE Tunnel Pseudo-Random Function The pseudo-random function that is used for seeding keying material. A valid value is an integer. Values appear on the workspace as follows:

IKE Tunnel Remote Auth Method The IKE tunnel remote authentication method. A valid value is an integer. Values appear on the workspace as follows:

IKE Tunnel Remote Endpoint The IKE tunnel remote endpoint. A valid value is a string of up to 39 characters.

IKE Version The IKE protocol in use. The value has the format Major.Minor. A valid value is a string of up to 5 characters.

Interval Length The length of time of the data sampling. This time is displayed in the following format: hh:mm:ss Where: hh=Hour mm=Minute ss=Seconds A valid value is a string of up to 8 characters.

IPSec Authentication Algorithm The tunnel authentication algorithm. A valid value is an integer. Values appear on the workspace as follows:

IPSec Authentication Protocol The protocol that is used for message authentication. A valid value is an integer. Values appear on the workspace as follows:

IPSec Encapsulation Mode The tunnel encapsulation mode. A valid value is an integer. Values appear on the workspace as follows:

Local IKE Cert Digest Method The local IKE certificate digest algorithm. A valid value is an integer. Values appear on the workspace as follows:

Local IKE Cert Encryption Method The local IKE certificate encryption method. A valid value is an integer. Values appear on the workspace as follows:

Local IKE Cert Signature Method The local IKE certificate signature method. A valid value is an integer. Values appear on the workspace as follows:

Local IKE Certificate Key Length The local IKE certificate key length. A valid value is an integer.

Local IKE Certificate Key Type The local IKE certificate key type. A valid value is an integer. Values appear on the workspace as follows:

Origin Node The unique identifier for the TCP/IP stack being displayed. A valid value is a string of up to 32 characters.

Perfect Foward Secrecy Group The diffie-hellman group that is used for perfect forward secrecy. A valid value is an integer. Values appear on the workspace as follows:

Port Range End The ending value for the server port range. A valid value is an integer.

Port Range Start The starting value for the server port range. A valid value is an integer.

Protocol The IP protocol value. A valid value is an integer. Values appear on the workspace as follows:

Remote IKE Cert Digest Method The remote IKE certificate digest algorithm. A valid value is an integer. Values appear on the workspace as follows:

Remote IKE Cert Encryption Method The remote IKE certificate encryption method. A valid value is an integer. Values appear on the workspace as follows:

Remote IKE Cert Signature Method The remote IKE certificate signature method. A valid value is an integer. Values appear on the workspace as follows:

Remote IKE Certificate Key Length The remote IKE certificate key length. A valid value is an integer.

Remote IKE Certificate Key Type The remote IKE certificate key type. A valid value is an integer. Values appear on the workspace as follows:

Server IP Address The server IP address. A valid value is a string of up to 45 characters.

Session ID The session identifier that uniquely identifies a security session based on the server and client endpoints plus the significant security attributes for the session. A valid value is a string of up to 42 characters.

Sysplex Name The name of the sysplex that this LPAR is a member of. A valid value is a string of up to 8 characters.

System ID The System Management Facility (SMF) system identifier for the z/OS system where the OMEGAMON for Networks monitoring agent collected the data. A valid value is a string of up to 4 characters.

TCPIP STC Name The TCP/IP started task name. A valid value is a string of up to 8 characters.

Tunnel Encryption Algorithm The tunnel encryption algorithms. A valid value is an integer. Values appear on the workspace as follows: