1 L2TP-MIB DEFINITIONS ::= BEGIN
4 Integer32, Unsigned32, Counter32, Gauge32,
5 Counter64, transmission, MODULE-IDENTITY,
6 OBJECT-TYPE, NOTIFICATION-TYPE
8 TEXTUAL-CONVENTION, RowStatus, TruthValue,
12 FROM SNMP-FRAMEWORK-MIB
13 OBJECT-GROUP, MODULE-COMPLIANCE, NOTIFICATION-GROUP
19 LAST-UPDATED "200208230000Z" -- 23 August 2002
20 ORGANIZATION "IETF L2TP Working Group"
23 Postal: Occam Networks
25 Santa Barbara, CA, 93117
27 Email: evan@occamnetworks.com
33 Postal: Black Storm Networks
37 Email: pcalhoun@bstormnetworks.com
40 Postal: DoubleWide Software, Inc.
45 Email: ross@doublewidesoft.com
47 Layer Two Tunneling Protocol Extensions WG
48 Working Group Area: Internet
49 Working Group Name: l2tpext
50 General Discussion: l2tp@l2tp.net"
53 "The MIB module that describes managed objects of
54 general use by the Layer Two Transport Protocol."
58 REVISION "200208230000Z" -- 23 August 2002
60 "First revision, published as RFC 3371."
62 ::= { transmission 95 }
65 -- Textual Conventions
68 L2tpMilliSeconds ::= TEXTUAL-CONVENTION
72 "A period of time measured in units of .001 of seconds
73 when used in conjunction with the DISPLAY-HINT will
74 show seconds and fractions of second with a resolution
76 SYNTAX Integer32 (0..2147483646)
79 -- Definitions of significant branches
84 l2tpNotifications OBJECT IDENTIFIER ::= { l2tp 0 }
85 l2tpObjects OBJECT IDENTIFIER ::= { l2tp 1 }
86 l2tpTransports OBJECT IDENTIFIER ::= { l2tp 3 }
87 l2tpConformance OBJECT IDENTIFIER ::= { l2tp 4 }
90 -- Definitions of significant branches under l2tpObjects
92 l2tpScalar OBJECT IDENTIFIER ::= { l2tpObjects 1 }
93 l2tpConfig OBJECT IDENTIFIER ::= { l2tpScalar 1 }
94 l2tpStats OBJECT IDENTIFIER ::= { l2tpScalar 2 }
97 -- Definitions of significant branches under l2tpTransports
99 -- Note that future transports of L2TP (e.g.: Frame relay)
100 -- should create their own branch under l2tpTransports.
102 l2tpTransportIpUdp OBJECT IDENTIFIER ::= { l2tpTransports 1 }
103 l2tpIpUdpObjects OBJECT IDENTIFIER ::= { l2tpTransportIpUdp 1 }
104 l2tpIpUdpTraps OBJECT IDENTIFIER ::= { l2tpTransportIpUdp 2 }
107 -- The L2TP Scalar Configuration Group
109 -- This group of objects is used to manage configuration
110 -- of the L2TP protocol environment.
112 l2tpAdminState OBJECT-TYPE
117 MAX-ACCESS read-write
120 "This object defines the administrative state of
121 the L2TP protocol. Setting this object to
122 'disabled' causes all tunnels to be immediately
123 disconnected and no further tunnels to be either
124 initiated or accepted. The value of this object
125 must be maintained in non-volatile memory."
128 l2tpDrainTunnels OBJECT-TYPE
130 MAX-ACCESS read-write
136 "Setting this object to 'true' will prevent any new
137 tunnels and/or sessions to be either initiated or
138 accepted but does NOT disconnect any active
139 tunnels/sessions. Setting this object to true(1)
140 causes all domains and their respective tunnels
141 to transition to the draining state. Note that
142 when this occurs the 'xxxDraining' status objects
143 of the domains and their tunnels should reflect
144 that they are 'draining'. Setting this object has
145 no affect on the domains or their tunnels
146 'xxxDrainTunnels' configuration objects. To cancel
147 a drain this object should be set to false(2).
148 The object l2tpDrainingTunnels reflects
149 the current L2TP draining state. The value of
150 this object must be maintained in non-volatile
155 -- The L2TP Scalar Status and Statistics Group
157 -- This group of objects describe the current state and
158 -- statistics of L2TP.
160 l2tpProtocolVersions OBJECT-TYPE
161 SYNTAX OCTET STRING (SIZE(2..256))
165 "Vector of supported L2TP protocol version and
166 revision numbers. Supported versions are identified
167 via a two octet pairing where the first octet indicates
168 the version and the second octet contains the revision."
171 l2tpVendorName OBJECT-TYPE
172 SYNTAX SnmpAdminString
176 "This object identifies the Vendor name of the L2TP
180 l2tpFirmwareRev OBJECT-TYPE
188 "This object defines the firmware revision for the
189 L2TP protocol stack."
192 l2tpDrainingTunnels OBJECT-TYPE
197 "This object indicates if the local L2TP is draining
198 off sessions from all tunnels."
202 -- The L2TP Domain Configuration Table
205 l2tpDomainConfigTable OBJECT-TYPE
206 SYNTAX SEQUENCE OF L2tpDomainConfigEntry
207 MAX-ACCESS not-accessible
210 "The L2TP Domain configuration table. This table
211 contains objects that can be used to configure
212 the operational characteristics of a tunnel
213 domain. There is a 1-1 correspondence between
214 conceptual rows of this table and conceptual
215 rows of the l2tpDomainStatsTable."
216 ::= { l2tpObjects 2 }
218 l2tpDomainConfigEntry OBJECT-TYPE
219 SYNTAX L2tpDomainConfigEntry
220 MAX-ACCESS not-accessible
223 "An L2TP Domain configuration entry. An entry in this
224 table may correspond to a single endpoint or a group
225 of tunnel endpoints."
226 INDEX { l2tpDomainConfigId }
227 ::= { l2tpDomainConfigTable 1 }
229 L2tpDomainConfigEntry ::=
233 l2tpDomainConfigAdminState
238 l2tpDomainConfigDrainTunnels
242 l2tpDomainConfigSecret
244 l2tpDomainConfigTunnelSecurity
246 l2tpDomainConfigTunnelHelloInt
248 l2tpDomainConfigTunnelIdleTO
250 l2tpDomainConfigControlRWS
252 l2tpDomainConfigControlMaxRetx
254 l2tpDomainConfigControlMaxRetxTO
256 l2tpDomainConfigPayloadSeq
258 l2tpDomainConfigReassemblyTO
260 l2tpDomainConfigProxyPPPAuth
262 l2tpDomainConfigStorageType
264 l2tpDomainConfigStatus
268 l2tpDomainConfigId OBJECT-TYPE
269 SYNTAX SnmpAdminString (SIZE (1..80))
270 MAX-ACCESS not-accessible
273 "The identifier, usually in the form of a Domain
274 Name (full or partial), describing a single tunnel
275 endpoint or a domain of tunnel endpoints. This is
276 typically used as a 'handle' to identify the
277 tunnel configuration requirements for both incoming
278 and outgoing tunnel connection attempts. Both the
279 LAC and LNS could use information provided in the
280 Host Name AVP attribute however the tunnel initiator
281 could use other means not specified to identify
282 the domain's tunnel configuration requirements.
283 For example; three rows in this table have
284 l2tpDomainConfigId values of 'lac1.isp.com',
288 'isp.com' and 'com'. A tunnel endpoint then identifies
289 itself as 'lac1.isp.com' which would match the
290 'lac1.isp.com' entry in this table. A second tunnel
291 endpoint then identifies itself as 'lac2.isp.com'.
292 This endpoint is then associated with the 'isp.com'
293 entry of this table."
294 ::= { l2tpDomainConfigEntry 1 }
296 l2tpDomainConfigAdminState OBJECT-TYPE
301 MAX-ACCESS read-create
304 "This object defines the administrative state of this
305 tunnel domain. Setting this object to disabled(2)
306 causes all tunnels to be immediately disconnected
307 and no further tunnels to be either initiated or
308 accepted. Note that all columnar objects corresponding
309 to this conceptual row cannot be modified when
310 the administrative state is enabled EXCEPT those
311 objects which specifically state otherwise."
313 ::= { l2tpDomainConfigEntry 2 }
315 l2tpDomainConfigDrainTunnels OBJECT-TYPE
317 MAX-ACCESS read-create
320 "Setting this object to 'true' will prevent any new
321 tunnels and/or sessions from being either initiated
322 or accepted but does NOT disconnect any active
323 tunnels/sessions for this tunnel domain. Setting
324 this object to true(1) causes all tunnels within
325 this domain to transition to the draining state.
326 Note that when this occurs the
327 l2tpTunnelStatsDrainingTunnel status objects of
328 all of this domain's tunnels should reflect that
329 they are 'draining'. Setting this object has no
330 effect on this domain's associated tunnels
331 l2tpTunnelConfigDrainTunnel configuration objects.
332 To cancel a drain this object should be set to
333 false(2). Setting this object to false(2) when
334 the L2TP object l2tpDrainTunnels is true(1) has
335 no affect, all domains and their tunnels will
341 ::= { l2tpDomainConfigEntry 3 }
343 l2tpDomainConfigAuth OBJECT-TYPE
349 MAX-ACCESS read-create
352 "This object describes how tunnel peers belonging
353 to this domain are to be authenticated. The value
354 simple(2) indicates that peers are authenticated
355 simply by their host name as described in the Host
356 Name AVP. The value challenge(3) indicates that
357 all peers are challenged to prove their identification.
358 This mechanism is described in the L2TP protocol."
359 REFERENCE "RFC 2661 Section 5.1"
361 ::= { l2tpDomainConfigEntry 4 }
363 l2tpDomainConfigSecret OBJECT-TYPE
364 SYNTAX SnmpAdminString (SIZE (0..255))
365 MAX-ACCESS read-create
368 "This object is used to configure the shared secret
369 used during the tunnel authentication phase of
370 tunnel establishment. This object MUST be accessible
371 only via requests using both authentication and
372 privacy. The agent MUST report an empty string in
373 response to get, get-next and get-bulk requests."
374 ::= { l2tpDomainConfigEntry 5 }
376 l2tpDomainConfigTunnelSecurity OBJECT-TYPE
382 MAX-ACCESS read-create
385 "This object defines whether this tunnel domain
386 requires that all tunnels are to be secured. The
390 value of ipsec(3) indicates that all tunnel packets,
391 control and session, have IP Security headers. The
392 type of IP Security headers (AH, ESP etc) and how
393 they are further described is outside the scope of
396 ::= { l2tpDomainConfigEntry 6 }
398 l2tpDomainConfigTunnelHelloInt OBJECT-TYPE
399 SYNTAX Integer32 (0..3600)
401 MAX-ACCESS read-create
404 "This object defines the interval in which Hello
405 (or keep-alive) packets are to be sent by local
406 peers belonging to this tunnel domain. The value
407 zero effectively disables the sending of Hello
408 packets. This object may be modified when the
409 administrative state is enabled for this conceptual
412 ::= { l2tpDomainConfigEntry 7 }
414 l2tpDomainConfigTunnelIdleTO OBJECT-TYPE
415 SYNTAX Integer32 (-1..86400)
417 MAX-ACCESS read-create
420 "This object defines the period of time that an
421 established tunnel belonging to this tunnel
422 domain with no active sessions will wait before
423 disconnecting the tunnel. A value of zero indicates
424 that the tunnel will disconnect immediately after the
425 last session disconnects. A value of -1 leaves the
426 tunnel up indefinitely. This object may be modified
427 when the administrative state is enabled for this
430 ::= { l2tpDomainConfigEntry 8 }
432 l2tpDomainConfigControlRWS OBJECT-TYPE
433 SYNTAX Integer32 (1..65535)
434 MAX-ACCESS read-create
437 "This object defines the control channel receive
441 window size for tunnels belonging to this domain. It
442 specifies the maximum number of packets the tunnel
443 peer belonging to this domain can send without waiting
444 for an acknowledgement from this peer."
446 ::= { l2tpDomainConfigEntry 9 }
448 l2tpDomainConfigControlMaxRetx OBJECT-TYPE
449 SYNTAX Integer32 (0..32)
450 MAX-ACCESS read-create
453 "This object defines the maximum number of retransmissions
454 which the L2TP stack will attempt for tunnels belonging
455 to this domain before assuming that the peer is no
458 ::= { l2tpDomainConfigEntry 10 }
460 l2tpDomainConfigControlMaxRetxTO OBJECT-TYPE
461 SYNTAX Integer32 (1..32)
463 MAX-ACCESS read-create
466 "This object defines the maximum retransmission timeout
467 interval which the L2TP stack will wait for tunnels
468 belonging to this domain before retransmitting a
469 control packet that has not been acknowledged."
471 ::= { l2tpDomainConfigEntry 11 }
473 l2tpDomainConfigPayloadSeq OBJECT-TYPE
479 MAX-ACCESS read-create
482 "This object determines whether or not session payload
483 packets will be requested to be sent with sequence
484 numbers from tunnel peers belonging to this domain.
485 The value onDemand(1) allows the L2TP implementation
486 to initiate payload sequencing when necessary based
487 on local information (e.g: during LCP/NCP negotiations
488 or for CCP). The value never(2) indicates that L2TP
492 will never initiate sequencing but will do sequencing
493 if asked. The value always(3) indicates that L2TP
494 will send the Sequencing Required AVP during session
497 ::= { l2tpDomainConfigEntry 12 }
499 l2tpDomainConfigReassemblyTO OBJECT-TYPE
500 SYNTAX L2tpMilliSeconds
501 MAX-ACCESS read-create
504 "This object defines the number of milliseconds that
505 local peers of this tunnel domain will wait before
506 processing payload packets that were received out of
507 sequence (which are waiting for the packet(s) to put
508 them in sequence). A low value increases the chance
509 of delayed packets to be discarded (which MAY cause
510 the PPP decompression engine to reset) while a high
511 value may cause more queuing and possibly degrade
512 throughput if packets are truly lost. The default
513 value for this object is zero which will result in
514 all delayed packets being lost."
516 ::= { l2tpDomainConfigEntry 13 }
518 l2tpDomainConfigProxyPPPAuth OBJECT-TYPE
520 MAX-ACCESS read-create
523 "This object is used to configure the sending
524 or acceptance of the PPP Proxy Authentication
525 AVP's on the LAC or LNS."
527 ::= { l2tpDomainConfigEntry 14 }
529 l2tpDomainConfigStorageType OBJECT-TYPE
531 MAX-ACCESS read-create
534 "The storage type for this conceptual row.
536 Conceptual rows having the value 'permanent' must
537 allow write-access at a minimum to:
539 - l2tpDomainConfigAdminState and
543 l2tpDomainConfigDrainTunnels at all times
544 - l2tpDomainConfigSecret if l2tpDomainConfigAuth
545 has been configured as 'challenge'
547 It is an implementation issue to decide if a SET for
548 a readOnly or permanent row is accepted at all. In some
549 contexts this may make sense, in others it may not. If
550 a SET for a readOnly or permanent row is not accepted
551 at all, then a 'wrongValue' error must be returned."
552 ::= { l2tpDomainConfigEntry 15 }
554 l2tpDomainConfigStatus OBJECT-TYPE
556 MAX-ACCESS read-create
559 "The status of this Domain entry. Columnar objects
560 corresponding to this conceptual row may be modified
561 according to their description clauses when this
562 RowStatus object is 'active'."
563 ::= { l2tpDomainConfigEntry 16 }
566 -- The L2TP Domain Status and Statistics Table
569 l2tpDomainStatsTable OBJECT-TYPE
570 SYNTAX SEQUENCE OF L2tpDomainStatsEntry
571 MAX-ACCESS not-accessible
574 "The L2TP Domain Status and Statistics table. This
575 table contains objects that can be used to describe
576 the current status and statistics of a tunnel domain.
577 There is a 1-1 correspondence between conceptual
578 rows of this table and conceptual rows of the
579 l2tpDomainConfigTable."
580 ::= { l2tpObjects 3 }
582 l2tpDomainStatsEntry OBJECT-TYPE
583 SYNTAX L2tpDomainStatsEntry
584 MAX-ACCESS not-accessible
587 "An L2TP Domain Stats entry. An entry in this table
588 may correspond to a single endpoint or a group of
590 AUGMENTS { l2tpDomainConfigEntry }
594 ::= { l2tpDomainStatsTable 1 }
596 L2tpDomainStatsEntry ::=
598 l2tpDomainStatsTotalTunnels
600 l2tpDomainStatsFailedTunnels
602 l2tpDomainStatsFailedAuths
604 l2tpDomainStatsActiveTunnels
606 l2tpDomainStatsTotalSessions
608 l2tpDomainStatsFailedSessions
610 l2tpDomainStatsActiveSessions
612 l2tpDomainStatsDrainingTunnels
614 l2tpDomainStatsControlRxOctets
616 l2tpDomainStatsControlRxPkts
618 l2tpDomainStatsControlTxOctets
620 l2tpDomainStatsControlTxPkts
622 l2tpDomainStatsPayloadRxOctets
624 l2tpDomainStatsPayloadRxPkts
626 l2tpDomainStatsPayloadRxDiscs
628 l2tpDomainStatsPayloadTxOctets
630 l2tpDomainStatsPayloadTxPkts
632 l2tpDomainStatsControlHCRxOctets
634 l2tpDomainStatsControlHCRxPkts
636 l2tpDomainStatsControlHCTxOctets
638 l2tpDomainStatsControlHCTxPkts
640 l2tpDomainStatsPayloadHCRxOctets
645 l2tpDomainStatsPayloadHCRxPkts
647 l2tpDomainStatsPayloadHCRxDiscs
649 l2tpDomainStatsPayloadHCTxOctets
651 l2tpDomainStatsPayloadHCTxPkts
655 l2tpDomainStatsTotalTunnels OBJECT-TYPE
660 "This object returns the total number of tunnels
661 that have successfully reached the established
662 state for this tunnel domain."
663 ::= { l2tpDomainStatsEntry 1 }
665 l2tpDomainStatsFailedTunnels OBJECT-TYPE
670 "This object returns the number of tunnels that
671 failed (eg: connection timeout, unsupported
672 or malformed AVP's etc) to reach the established
673 state for this tunnel domain."
674 ::= { l2tpDomainStatsEntry 2 }
676 l2tpDomainStatsFailedAuths OBJECT-TYPE
681 "This object returns the number of failed tunnel
682 connection attempts for this domain because the
683 tunnel peer failed authentication."
684 ::= { l2tpDomainStatsEntry 3 }
686 l2tpDomainStatsActiveTunnels OBJECT-TYPE
691 "This object returns the number of tunnels that
692 are currently active for this domain."
696 ::= { l2tpDomainStatsEntry 4 }
698 l2tpDomainStatsTotalSessions OBJECT-TYPE
703 "This object returns the total number of sessions
704 that have successfully reached the established
705 state for this tunnel domain."
706 ::= { l2tpDomainStatsEntry 5 }
708 l2tpDomainStatsFailedSessions OBJECT-TYPE
713 "This object returns the number of sessions that
714 failed (eg: connection timeout, unsupported
715 or malformed AVP's etc) to reach the established
716 state for this tunnel domain."
717 ::= { l2tpDomainStatsEntry 6 }
719 l2tpDomainStatsActiveSessions OBJECT-TYPE
724 "This object returns the number of sessions that
725 are currently active for this domain."
726 ::= { l2tpDomainStatsEntry 7 }
728 l2tpDomainStatsDrainingTunnels OBJECT-TYPE
733 "This object indicates if this domain is draining
734 off sessions from all tunnels."
735 ::= { l2tpDomainStatsEntry 8 }
737 l2tpDomainStatsControlRxOctets OBJECT-TYPE
742 "This object returns the number of control channel
743 octets received for this tunnel domain."
747 ::= { l2tpDomainStatsEntry 9 }
749 l2tpDomainStatsControlRxPkts OBJECT-TYPE
754 "This object returns the number of control packets
755 received for this tunnel domain."
756 ::= { l2tpDomainStatsEntry 10 }
758 l2tpDomainStatsControlTxOctets OBJECT-TYPE
763 "This object returns the number of control channel
764 octets that were transmitted to tunnel endpoints
766 ::= { l2tpDomainStatsEntry 11 }
768 l2tpDomainStatsControlTxPkts OBJECT-TYPE
773 "This object returns the number of control packets
774 that were transmitted to tunnel endpoints for
776 ::= { l2tpDomainStatsEntry 12 }
778 l2tpDomainStatsPayloadRxOctets OBJECT-TYPE
783 "This object returns the number of payload channel
784 octets that were received for this tunnel domain."
785 ::= { l2tpDomainStatsEntry 13 }
787 l2tpDomainStatsPayloadRxPkts OBJECT-TYPE
792 "This object returns the number of payload packets
793 that were received for this tunnel domain."
794 ::= { l2tpDomainStatsEntry 14 }
798 l2tpDomainStatsPayloadRxDiscs OBJECT-TYPE
803 "This object returns the number of received payload
804 packets that were discarded by this tunnel domain."
805 ::= { l2tpDomainStatsEntry 15 }
807 l2tpDomainStatsPayloadTxOctets OBJECT-TYPE
812 "This object returns the number of payload channel
813 octets that were transmitted to tunnel peers
814 within this tunnel domain."
815 ::= { l2tpDomainStatsEntry 16 }
817 l2tpDomainStatsPayloadTxPkts OBJECT-TYPE
822 "This object returns the number of payload packets
823 that were transmitted to tunnel peers within
825 ::= { l2tpDomainStatsEntry 17 }
828 -- High Capacity Counter objects. These objects are all
829 -- 64 bit versions of the above 32-bit counters. These
830 -- objects all have the same basic semantics as their
831 -- 32-bit counterparts, however, their syntax has been
832 -- extended to 64 bits.
835 l2tpDomainStatsControlHCRxOctets OBJECT-TYPE
840 "This object is a 64-bit version of
841 l2tpDomainStatsControlRxOctets."
842 ::= { l2tpDomainStatsEntry 18 }
844 l2tpDomainStatsControlHCRxPkts OBJECT-TYPE
852 "This object is a 64-bit version of
853 l2tpDomainStatsControlRxPkts."
854 ::= { l2tpDomainStatsEntry 19 }
856 l2tpDomainStatsControlHCTxOctets OBJECT-TYPE
861 "This object is a 64-bit version of
862 l2tpDomainStatsControlTxOctets."
863 ::= { l2tpDomainStatsEntry 20 }
865 l2tpDomainStatsControlHCTxPkts OBJECT-TYPE
870 "This object is a 64-bit version of
871 l2tpDomainStatsControlTxPkts."
872 ::= { l2tpDomainStatsEntry 21 }
874 l2tpDomainStatsPayloadHCRxOctets OBJECT-TYPE
879 "This object is a 64-bit version of
880 l2tpDomainStatsPayloadRxOctets."
881 ::= { l2tpDomainStatsEntry 22 }
883 l2tpDomainStatsPayloadHCRxPkts OBJECT-TYPE
888 "This object is a 64-bit version of
889 l2tpDomainStatsPayloadRxPkts."
890 ::= { l2tpDomainStatsEntry 23 }
892 l2tpDomainStatsPayloadHCRxDiscs OBJECT-TYPE
900 "This object is a 64-bit version of
901 l2tpDomainStatsPayloadRxDiscs."
902 ::= { l2tpDomainStatsEntry 24 }
904 l2tpDomainStatsPayloadHCTxOctets OBJECT-TYPE
909 "This object is a 64-bit version of
910 l2tpDomainStatsPayloadTxOctets."
911 ::= { l2tpDomainStatsEntry 25 }
913 l2tpDomainStatsPayloadHCTxPkts OBJECT-TYPE
918 "This object is a 64-bit version of
919 l2tpDomainStatsPayloadTxPkts."
920 ::= { l2tpDomainStatsEntry 26 }
923 -- The L2TP Tunnel Configuration Table
926 l2tpTunnelConfigTable OBJECT-TYPE
927 SYNTAX SEQUENCE OF L2tpTunnelConfigEntry
928 MAX-ACCESS not-accessible
931 "The L2TP tunnel configuration table. This
932 table contains objects that can be used to
933 (re)configure the operational characteristics
934 of a single L2TP tunnel. There is a 1-1
935 correspondence between conceptual rows of
936 this table and conceptual rows of the
937 l2tpTunnelStatsTable. Entries in this table
938 have the same persistency characteristics as
939 that of the tunnelConfigTable."
941 ::= { l2tpObjects 4 }
943 l2tpTunnelConfigEntry OBJECT-TYPE
944 SYNTAX L2tpTunnelConfigEntry
945 MAX-ACCESS not-accessible
951 "A L2TP tunnel interface configuration entry.
952 Entries in this table come and go as a result
953 of protocol interactions or on management
954 operations. The latter occurs when a row is
955 instantiated in the tunnelConfigTable row
956 and the encapsulation method is 'l2tp'."
958 INDEX { l2tpTunnelConfigIfIndex }
959 ::= { l2tpTunnelConfigTable 1 }
961 L2tpTunnelConfigEntry ::=
963 l2tpTunnelConfigIfIndex
965 l2tpTunnelConfigDomainId
969 l2tpTunnelConfigSecret
971 l2tpTunnelConfigSecurity
973 l2tpTunnelConfigHelloInterval
975 l2tpTunnelConfigIdleTimeout
977 l2tpTunnelConfigControlRWS
979 l2tpTunnelConfigControlMaxRetx
981 l2tpTunnelConfigControlMaxRetxTO
983 l2tpTunnelConfigPayloadSeq
985 l2tpTunnelConfigReassemblyTO
987 l2tpTunnelConfigTransport
989 l2tpTunnelConfigDrainTunnel
991 l2tpTunnelConfigProxyPPPAuth
995 l2tpTunnelConfigIfIndex OBJECT-TYPE
996 SYNTAX InterfaceIndex
997 MAX-ACCESS not-accessible
1003 "This value for this object is equal to the value
1004 of ifIndex of the Interfaces MIB for tunnel
1005 interfaces of type L2TP."
1006 ::= { l2tpTunnelConfigEntry 1 }
1008 l2tpTunnelConfigDomainId OBJECT-TYPE
1009 SYNTAX SnmpAdminString (SIZE (1..80))
1010 MAX-ACCESS read-write
1013 "The tunnel domain that this tunnel belongs
1014 to. A LNS tunnel endpoint will typically inherit
1015 this value from the endpoint domain table. A
1016 LAC may be provided with this information during
1017 tunnel setup. When a zero length string is returned
1018 this tunnel does not belong belong to any particular
1020 ::= { l2tpTunnelConfigEntry 2 }
1022 l2tpTunnelConfigAuth OBJECT-TYPE
1028 MAX-ACCESS read-write
1031 "This object describes how L2TP tunnel peers are
1032 to be authenticated. The value 'simple' indicates
1033 that peers are authenticated simply by their host
1034 name as described in the Host Name AVP. The value
1035 'challenge' indicates that all peers are challenged
1036 to prove their identification. This mechanism is
1037 described in the L2TP protocol. This object cannot
1038 be modified when the tunnel is in a connecting or
1041 ::= { l2tpTunnelConfigEntry 3 }
1043 l2tpTunnelConfigSecret OBJECT-TYPE
1044 SYNTAX SnmpAdminString (SIZE (0..255))
1045 MAX-ACCESS read-write
1048 "This object is used to configure the shared secret
1049 used during the tunnel authentication phase of
1053 tunnel establishment. This object cannot be modified
1054 when the tunnel is in a connecting or connected
1055 state. This object MUST be accessible only via
1056 requests using both authentication and privacy.
1057 The agent MUST report an empty string in response
1058 to get, get-next and get-bulk requests."
1059 ::= { l2tpTunnelConfigEntry 4 }
1061 l2tpTunnelConfigSecurity OBJECT-TYPE
1067 MAX-ACCESS read-write
1070 "This object defines whether this tunnel is to be
1071 secured. The value of 'ipSec' indicates that all
1072 tunnel packets, control and session, have IP
1073 Security headers. The type of IP Security headers
1074 (AH, ESP etc) and how they are further described
1075 is outside the scope of this document. This object
1076 cannot be modified when the tunnel is in a connecting
1077 or connected state."
1079 ::= { l2tpTunnelConfigEntry 5 }
1081 l2tpTunnelConfigHelloInterval OBJECT-TYPE
1082 SYNTAX Integer32 (0..3600)
1084 MAX-ACCESS read-write
1087 "This object defines the interval in which Hello
1088 (or keep-alive) packets are to be sent to the
1089 tunnel peer. The value zero effectively disables
1090 the sending of Hello packets. Modifications to this
1091 object have immediate effect."
1093 ::= { l2tpTunnelConfigEntry 6 }
1095 l2tpTunnelConfigIdleTimeout OBJECT-TYPE
1096 SYNTAX Integer32 (-1..86400)
1098 MAX-ACCESS read-write
1104 "This object defines the period of time that an
1105 established tunnel with no sessions will wait
1106 before disconnecting the tunnel. A value of
1107 zero indicates that the tunnel will disconnect
1108 immediately after the last session disconnects.
1109 A value of -1 leaves the tunnel up indefinitely.
1110 Modifications to this object have immediate
1113 ::= { l2tpTunnelConfigEntry 7 }
1115 l2tpTunnelConfigControlRWS OBJECT-TYPE
1116 SYNTAX Integer32 (1..65535)
1117 MAX-ACCESS read-write
1120 "This object defines the control channel receive
1121 window size. It specifies the maximum number of
1122 packets the tunnel peer can send without waiting
1123 for an acknowledgement from this peer. This object
1124 cannot be modified when the tunnel is in a con-
1125 necting or connected state."
1127 ::= { l2tpTunnelConfigEntry 8 }
1129 l2tpTunnelConfigControlMaxRetx OBJECT-TYPE
1130 SYNTAX Integer32 (0..32)
1131 MAX-ACCESS read-write
1134 "This object defines the number of retransmissions
1135 which the tunnel will attempt before assuming that
1136 the peer is no longer responding. A value of zero
1137 indicates that this peer will not attempt to
1138 retransmit an unacknowledged control packet.
1139 Modifications to this object have immediate
1142 ::= { l2tpTunnelConfigEntry 9 }
1144 l2tpTunnelConfigControlMaxRetxTO OBJECT-TYPE
1145 SYNTAX Integer32 (1..32)
1147 MAX-ACCESS read-write
1150 "This object defines the maximum retransmission timeout
1151 interval which the tunnel will wait before retrans-
1155 mitting a control packet that has not been acknowledged.
1156 Modifications to this object have immediate effect."
1158 ::= { l2tpTunnelConfigEntry 10 }
1160 l2tpTunnelConfigPayloadSeq OBJECT-TYPE
1166 MAX-ACCESS read-write
1169 "This object determines whether or not session payload
1170 packets will be requested to be sent with sequence
1171 numbers from tunnel peers belonging to this domain.
1172 The value onDemand(1) allows the L2TP implementation
1173 to initiate payload sequencing when necessary based
1174 on local information (e.g: during LCP/NCP negotiations
1175 or for CCP). The value never(2) indicates that L2TP
1176 will never initiate sequencing but will do sequencing
1177 if asked. The value always(3) indicates that L2TP
1178 will send the Sequencing Required AVP during session
1179 establishment. Modifications to this object have
1182 ::= { l2tpTunnelConfigEntry 11 }
1184 l2tpTunnelConfigReassemblyTO OBJECT-TYPE
1185 SYNTAX L2tpMilliSeconds
1186 MAX-ACCESS read-write
1189 "This object defines the number of milliseconds that
1190 this tunnel will wait before processing payload packets
1191 that were received out of sequence (which are waiting
1192 for the packet(s) to put them in sequence). A low value
1193 increases the chance of delayed packets to be discarded
1194 (which MAY cause the PPP decompression engine to
1195 reset) while a high value may cause more queuing and
1196 possibly degrade throughput if packets are truly lost.
1197 The default value for this object is zero which will
1198 result in all delayed packets being lost. Modifications
1199 to this object have immediate effect."
1201 ::= { l2tpTunnelConfigEntry 12 }
1206 l2tpTunnelConfigTransport OBJECT-TYPE
1214 MAX-ACCESS read-write
1217 "This object defines the underlying transport media
1218 that is in use for this tunnel entry. Different tunnel
1219 transports may define MIB extensions to the L2TP tunnel
1220 table to realize the transport layer. For example if the
1221 value of this object is 'udpIp' then the value of ifIndex
1222 for this table may be used to determine state from the
1223 l2tpUdpStatsTable. This object cannot be modified when
1224 the tunnel is in a connecting or connected state."
1225 ::= { l2tpTunnelConfigEntry 13 }
1227 l2tpTunnelConfigDrainTunnel OBJECT-TYPE
1229 MAX-ACCESS read-write
1232 "Setting this object to 'true' will prevent any new
1233 session from being either initiated or accepted but
1234 does NOT disconnect any active sessions for this
1235 tunnel. Note that when this occurs the
1236 l2tpTunnelStatsDrainingTunnel status object of
1237 this tunnel should reflect that it is 'draining'.
1238 To cancel a drain this object should be set to
1239 false(2). Setting this object to false(2) when
1240 the L2TP objects l2tpDrainTunnels or
1241 l2tpDomainConfigDrainTunnels is true(1) has
1242 no affect, this tunnels will continue to drain."
1244 ::= { l2tpTunnelConfigEntry 14 }
1246 l2tpTunnelConfigProxyPPPAuth OBJECT-TYPE
1248 MAX-ACCESS read-write
1251 "This object is used to configure the sending
1252 or acceptance of the session PPP Proxy
1253 Authentication AVP's on the LAC or LNS."
1258 ::= { l2tpTunnelConfigEntry 15 }
1261 -- The L2TP Tunnel Status and Statisticss Table
1265 l2tpTunnelStatsTable OBJECT-TYPE
1266 SYNTAX SEQUENCE OF L2tpTunnelStatsEntry
1267 MAX-ACCESS not-accessible
1270 "The L2TP tunnel status and statistics table. This
1271 table contains objects that can be used to describe
1272 the current status and statistics of a single L2TP
1273 tunnel. There is a 1-1 correspondence between
1274 conceptual rows of this table and conceptual rows of
1275 the l2tpTunnelConfigTable."
1276 ::= { l2tpObjects 5 }
1278 l2tpTunnelStatsEntry OBJECT-TYPE
1279 SYNTAX L2tpTunnelStatsEntry
1280 MAX-ACCESS not-accessible
1283 "An L2TP tunnel interface stats entry."
1284 AUGMENTS { l2tpTunnelConfigEntry }
1285 ::= { l2tpTunnelStatsTable 1 }
1287 L2tpTunnelStatsEntry ::=
1289 l2tpTunnelStatsLocalTID
1291 l2tpTunnelStatsRemoteTID
1293 l2tpTunnelStatsState
1295 l2tpTunnelStatsInitiated
1297 l2tpTunnelStatsRemoteHostName
1299 l2tpTunnelStatsRemoteVendorName
1301 l2tpTunnelStatsRemoteFirmwareRev
1303 l2tpTunnelStatsRemoteProtocolVer
1308 l2tpTunnelStatsInitialRemoteRWS
1310 l2tpTunnelStatsBearerCaps
1312 l2tpTunnelStatsFramingCaps
1314 l2tpTunnelStatsControlRxPkts
1316 l2tpTunnelStatsControlRxZLB
1318 l2tpTunnelStatsControlOutOfSeq
1320 l2tpTunnelStatsControlOutOfWin
1322 l2tpTunnelStatsControlTxPkts
1324 l2tpTunnelStatsControlTxZLB
1326 l2tpTunnelStatsControlAckTO
1328 l2tpTunnelStatsCurrentRemoteRWS
1330 l2tpTunnelStatsTxSeq
1332 l2tpTunnelStatsTxSeqAck
1334 l2tpTunnelStatsRxSeq
1336 l2tpTunnelStatsRxSeqAck
1338 l2tpTunnelStatsTotalSessions
1340 l2tpTunnelStatsFailedSessions
1342 l2tpTunnelStatsActiveSessions
1344 l2tpTunnelStatsLastResultCode
1346 l2tpTunnelStatsLastErrorCode
1348 l2tpTunnelStatsLastErrorMessage
1350 l2tpTunnelStatsDrainingTunnel
1354 l2tpTunnelStatsLocalTID OBJECT-TYPE
1355 SYNTAX Integer32 (0..65535)
1359 MAX-ACCESS read-only
1362 "This object contains the local tunnel Identifier."
1363 REFERENCE "RFC 2661, Section 3.1"
1364 ::= { l2tpTunnelStatsEntry 1 }
1366 l2tpTunnelStatsRemoteTID OBJECT-TYPE
1367 SYNTAX Integer32 (0..65535)
1368 MAX-ACCESS read-only
1371 "This object contains the remote tunnel Identifier."
1372 REFERENCE "RFC 2661, Section 3.1"
1373 ::= { l2tpTunnelStatsEntry 2 }
1375 l2tpTunnelStatsState OBJECT-TYPE
1378 tunnelConnecting(2),
1379 tunnelEstablished(3),
1380 tunnelDisconnecting(4)
1382 MAX-ACCESS read-only
1385 "This field contains the current state of the
1387 ::= { l2tpTunnelStatsEntry 3 }
1389 l2tpTunnelStatsInitiated OBJECT-TYPE
1394 MAX-ACCESS read-only
1397 "This object indicates whether the tunnel was
1398 initiated locally or by the remote tunnel peer."
1399 ::= { l2tpTunnelStatsEntry 4 }
1401 l2tpTunnelStatsRemoteHostName OBJECT-TYPE
1402 SYNTAX SnmpAdminString
1403 MAX-ACCESS read-only
1406 "This object contains the host name as discovered
1410 during the tunnel establishment phase (via the Host
1411 Name AVP) of the L2TP peer. If the tunnel is idle
1412 this object should maintain its value from the last
1413 time it was connected."
1414 ::= { l2tpTunnelStatsEntry 5 }
1416 l2tpTunnelStatsRemoteVendorName OBJECT-TYPE
1417 SYNTAX SnmpAdminString
1418 MAX-ACCESS read-only
1421 "This object identifies the vendor name of the peer's
1422 L2TP implementation. If the tunnel is idle this
1423 object should maintain its value from the last time
1425 ::= { l2tpTunnelStatsEntry 6 }
1427 l2tpTunnelStatsRemoteFirmwareRev OBJECT-TYPE
1429 MAX-ACCESS read-only
1432 "This object contains the tunnel peer's firmware
1433 revision number. If the tunnel is idle this object
1434 should maintain its value from the last time it
1436 ::= { l2tpTunnelStatsEntry 7 }
1438 l2tpTunnelStatsRemoteProtocolVer OBJECT-TYPE
1439 SYNTAX OCTET STRING (SIZE(2))
1440 MAX-ACCESS read-only
1443 "This object describes the protocol version and
1444 revision of the tunnel peers implementation. The
1445 first octet contains the protocol version. The
1446 second octet contains the protocol revision."
1447 ::= { l2tpTunnelStatsEntry 8 }
1449 l2tpTunnelStatsInitialRemoteRWS OBJECT-TYPE
1450 SYNTAX Integer32 (0..65535)
1451 MAX-ACCESS read-only
1454 "This object contains the initial remote peer's
1455 receive window size as indicated by the tunnel peer
1456 (in the RWS AVP) during the tunnel establishment
1457 phase. If the tunnel is idle this object should
1461 maintain its value from the last time it was
1463 ::= { l2tpTunnelStatsEntry 9 }
1465 l2tpTunnelStatsBearerCaps OBJECT-TYPE
1472 MAX-ACCESS read-only
1475 "This object describes the Bearer Capabilities of
1476 the tunnel peer. If the tunnel is idle this object
1477 should maintain its value from the last time it was
1479 ::= { l2tpTunnelStatsEntry 10 }
1481 l2tpTunnelStatsFramingCaps OBJECT-TYPE
1488 MAX-ACCESS read-only
1491 "This object describes the Framing Capabilities of
1492 the tunnel peer. If the tunnel is idle this object
1493 should maintain its value from the last time it was
1495 ::= { l2tpTunnelStatsEntry 11 }
1497 l2tpTunnelStatsControlRxPkts OBJECT-TYPE
1499 MAX-ACCESS read-only
1502 "This object contains the number of control packets
1503 received on the tunnel."
1504 ::= { l2tpTunnelStatsEntry 12 }
1506 l2tpTunnelStatsControlRxZLB OBJECT-TYPE
1508 MAX-ACCESS read-only
1514 "This object returns a count of the number of Zero
1515 Length Body control packet acknowledgement packets
1516 that were received."
1517 ::= { l2tpTunnelStatsEntry 13 }
1519 l2tpTunnelStatsControlOutOfSeq OBJECT-TYPE
1521 MAX-ACCESS read-only
1524 "This object returns a count of the number of
1525 control packets that were not received in the
1526 correct order (as per the sequence number)
1527 on this tunnel including out of window
1529 ::= { l2tpTunnelStatsEntry 14 }
1531 l2tpTunnelStatsControlOutOfWin OBJECT-TYPE
1533 MAX-ACCESS read-only
1536 "This object contains the number of control
1537 packets that were received outside of the
1538 offered receive window. It is implementation
1539 specific as to whether these packets are queued
1541 ::= { l2tpTunnelStatsEntry 15 }
1543 l2tpTunnelStatsControlTxPkts OBJECT-TYPE
1545 MAX-ACCESS read-only
1548 "This object contains the number of control
1549 packets that were transmitted to the tunnel
1551 ::= { l2tpTunnelStatsEntry 16 }
1553 l2tpTunnelStatsControlTxZLB OBJECT-TYPE
1555 MAX-ACCESS read-only
1558 "This object contains the number of Zero Length
1559 Body control packets transmitted to the tunnel
1564 ::= { l2tpTunnelStatsEntry 17 }
1566 l2tpTunnelStatsControlAckTO OBJECT-TYPE
1568 MAX-ACCESS read-only
1571 "This object returns a count of the number of
1572 control packet timeouts due to the lack of a
1573 timely acknowledgement from the tunnel peer."
1574 ::= { l2tpTunnelStatsEntry 18 }
1576 l2tpTunnelStatsCurrentRemoteRWS OBJECT-TYPE
1577 SYNTAX Gauge32 (0..65535)
1578 MAX-ACCESS read-only
1581 "This object contains the current remote receive
1582 window size as determined by the local flow
1583 control mechanism employed."
1584 ::= { l2tpTunnelStatsEntry 19 }
1586 l2tpTunnelStatsTxSeq OBJECT-TYPE
1587 SYNTAX Integer32 (0..65535)
1588 MAX-ACCESS read-only
1591 "This object contains the next send sequence number
1592 for the control channel."
1593 ::= { l2tpTunnelStatsEntry 20 }
1595 l2tpTunnelStatsTxSeqAck OBJECT-TYPE
1596 SYNTAX Integer32 (0..65535)
1597 MAX-ACCESS read-only
1600 "This object contains the send sequence number that
1601 the tunnel peer has acknowledged for the control
1602 channel. The flow control state can be determined
1603 by subtracting the l2tpTunnelStatsTxSeq from
1604 l2tpTunnelStatsTxSeqAck and comparing this value
1605 to l2tpTunnelStatsCurrentRemoteRWS (taking into
1606 consideration sequence number wraps)."
1607 ::= { l2tpTunnelStatsEntry 21 }
1609 l2tpTunnelStatsRxSeq OBJECT-TYPE
1610 SYNTAX Integer32 (0..65535)
1614 MAX-ACCESS read-only
1617 "This object contains the next receive sequence
1618 number expected to be received on this control
1620 ::= { l2tpTunnelStatsEntry 22 }
1622 l2tpTunnelStatsRxSeqAck OBJECT-TYPE
1623 SYNTAX Integer32 (0..65535)
1624 MAX-ACCESS read-only
1627 "This object contains the last receive sequence
1628 number that was acknowledged back to the tunnel
1629 peer for the control channel."
1630 ::= { l2tpTunnelStatsEntry 23 }
1632 l2tpTunnelStatsTotalSessions OBJECT-TYPE
1634 MAX-ACCESS read-only
1637 "This object contains the total number of sessions
1638 that this tunnel has successfully connected through
1639 to its tunnel peer since this tunnel was created."
1640 ::= { l2tpTunnelStatsEntry 24 }
1642 l2tpTunnelStatsFailedSessions OBJECT-TYPE
1644 MAX-ACCESS read-only
1647 "This object contains the total number of sessions
1648 that were initiated but failed to reach the
1650 ::= { l2tpTunnelStatsEntry 25 }
1652 l2tpTunnelStatsActiveSessions OBJECT-TYPE
1654 MAX-ACCESS read-only
1657 "This object contains the total number of sessions
1658 in the established state for this tunnel."
1659 ::= { l2tpTunnelStatsEntry 26 }
1661 l2tpTunnelStatsLastResultCode OBJECT-TYPE
1665 SYNTAX Integer32 (0..65535)
1666 MAX-ACCESS read-only
1669 "This object contains the last value of the result
1670 code as described in the Result Code AVP which
1671 caused the tunnel to disconnect."
1672 ::= { l2tpTunnelStatsEntry 27 }
1674 l2tpTunnelStatsLastErrorCode OBJECT-TYPE
1675 SYNTAX Integer32 (0..65535)
1676 MAX-ACCESS read-only
1679 "This object contains the last value of the error
1680 code as described in the Result Code AVP which
1681 caused the tunnel to disconnect."
1682 ::= { l2tpTunnelStatsEntry 28 }
1684 l2tpTunnelStatsLastErrorMessage OBJECT-TYPE
1685 SYNTAX SnmpAdminString
1686 MAX-ACCESS read-only
1689 "This object contains the last value of the optional
1690 message as described in the Result Code AVP which
1691 caused the tunnel to disconnect."
1692 ::= { l2tpTunnelStatsEntry 29 }
1694 l2tpTunnelStatsDrainingTunnel OBJECT-TYPE
1696 MAX-ACCESS read-only
1699 "This object indicates if this tunnel is draining
1700 off sessions. This object will return false(2) when
1701 the tunnel is not draining sessions or after the
1702 last session has disconnected when the tunnel is in
1703 the draining state."
1704 ::= { l2tpTunnelStatsEntry 30 }
1707 -- { l2tpObjects 6 } reserved for future use
1711 -- The L2TP Session Status and Statistics Table
1716 l2tpSessionStatsTable OBJECT-TYPE
1717 SYNTAX SEQUENCE OF L2tpSessionStatsEntry
1718 MAX-ACCESS not-accessible
1721 "The L2TP session status and statistics table. This
1722 table contains the objects that can be used to
1723 describe the current status and statistics of a
1724 single L2TP tunneled session."
1725 ::= { l2tpObjects 7 }
1727 l2tpSessionStatsEntry OBJECT-TYPE
1728 SYNTAX L2tpSessionStatsEntry
1729 MAX-ACCESS not-accessible
1732 "An L2TP session interface stats entry."
1733 INDEX { l2tpSessionStatsTunnelIfIndex,
1734 l2tpSessionStatsLocalSID }
1735 ::= { l2tpSessionStatsTable 1 }
1737 L2tpSessionStatsEntry ::=
1739 l2tpSessionStatsTunnelIfIndex
1741 l2tpSessionStatsIfIndex
1743 l2tpSessionStatsLocalSID
1745 l2tpSessionStatsRemoteSID
1747 l2tpSessionStatsUserName
1749 l2tpSessionStatsState
1751 l2tpSessionStatsCallType
1753 l2tpSessionStatsCallSerialNumber
1755 l2tpSessionStatsTxConnectSpeed
1757 l2tpSessionStatsRxConnectSpeed
1759 l2tpSessionStatsCallBearerType
1761 l2tpSessionStatsFramingType
1763 l2tpSessionStatsPhysChanId
1768 l2tpSessionStatsDNIS
1770 l2tpSessionStatsCLID
1772 l2tpSessionStatsSubAddress
1774 l2tpSessionStatsPrivateGroupID
1776 l2tpSessionStatsProxyLcp
1778 l2tpSessionStatsAuthMethod
1780 l2tpSessionStatsSequencingState
1782 l2tpSessionStatsOutSequence
1784 l2tpSessionStatsReassemblyTO
1786 l2tpSessionStatsTxSeq
1788 l2tpSessionStatsRxSeq
1792 l2tpSessionStatsTunnelIfIndex OBJECT-TYPE
1793 SYNTAX InterfaceIndex
1794 MAX-ACCESS not-accessible
1797 "This object identifies the session's associated
1798 L2TP tunnel ifIndex value."
1799 ::= { l2tpSessionStatsEntry 1 }
1801 l2tpSessionStatsIfIndex OBJECT-TYPE
1802 SYNTAX InterfaceIndex
1803 MAX-ACCESS read-only
1806 "This object identifies the ifIndex value of the
1807 interface from which PPP packets are being tunneled.
1808 For example this could be a DS0 ifIndex on a
1809 LAC or it would be the PPP ifIndex on the LNS."
1810 ::= { l2tpSessionStatsEntry 2 }
1812 l2tpSessionStatsLocalSID OBJECT-TYPE
1813 SYNTAX Integer32 (1..65535)
1814 MAX-ACCESS not-accessible
1820 "This object contains the local assigned session
1821 identifier for this session."
1822 REFERENCE "RFC 2661, Section 3.1"
1823 ::= { l2tpSessionStatsEntry 3 }
1825 l2tpSessionStatsRemoteSID OBJECT-TYPE
1826 SYNTAX Integer32 (0..65535)
1827 MAX-ACCESS read-only
1830 "This object contains the remote assigned session
1831 identifier for this session. When a session is
1832 starting this value may be zero until the remote
1833 tunnel endpoint has responded."
1834 REFERENCE "RFC 2661, Section 3.1"
1835 ::= { l2tpSessionStatsEntry 4 }
1837 l2tpSessionStatsUserName OBJECT-TYPE
1838 SYNTAX SnmpAdminString
1839 MAX-ACCESS read-only
1842 "This object identifies the peer session name on
1843 this interface. This is typically the login name
1844 of the remote user. If the user name is unknown to
1845 the local tunnel peer then this object will contain
1847 ::= { l2tpSessionStatsEntry 5 }
1849 l2tpSessionStatsState OBJECT-TYPE
1852 sessionConnecting(2),
1853 sessionEstablished(3),
1854 sessionDisconnecting(4)
1856 MAX-ACCESS read-only
1859 "This object contains the current state of the
1861 ::= { l2tpSessionStatsEntry 6 }
1863 l2tpSessionStatsCallType OBJECT-TYPE
1873 MAX-ACCESS read-only
1876 "This object indicates the type of call and the
1877 role this tunnel peer is providing for this
1878 session. For example, lacIncoming(1) indicates
1879 that this tunnel peer is acting as a LAC and
1880 generated a Incoming-Call-Request to the tunnel
1881 peer (the LNS). Note that tunnel peers can be
1882 both LAC and LNS simultaneously."
1883 ::= { l2tpSessionStatsEntry 7 }
1885 l2tpSessionStatsCallSerialNumber OBJECT-TYPE
1887 MAX-ACCESS read-only
1890 "This object contains the serial number that has
1891 been assigned to this session."
1892 ::= { l2tpSessionStatsEntry 8 }
1894 l2tpSessionStatsTxConnectSpeed OBJECT-TYPE
1896 UNITS "bits per second"
1897 MAX-ACCESS read-only
1900 "This object returns the last known transmit
1901 baud rate for this session."
1902 ::= { l2tpSessionStatsEntry 9 }
1904 l2tpSessionStatsRxConnectSpeed OBJECT-TYPE
1906 UNITS "bits per second"
1907 MAX-ACCESS read-only
1910 "This object returns the last known receive
1911 baud rate for this session established."
1912 ::= { l2tpSessionStatsEntry 10 }
1914 l2tpSessionStatsCallBearerType OBJECT-TYPE
1923 MAX-ACCESS read-only
1926 "This object describes the bearer type of this
1928 ::= { l2tpSessionStatsEntry 11 }
1930 l2tpSessionStatsFramingType OBJECT-TYPE
1936 MAX-ACCESS read-only
1939 "This object describes the framing type of this
1941 ::= { l2tpSessionStatsEntry 12 }
1943 l2tpSessionStatsPhysChanId OBJECT-TYPE
1945 MAX-ACCESS read-only
1948 "This object contains the physical channel
1949 identifier for the session."
1950 ::= { l2tpSessionStatsEntry 13 }
1952 l2tpSessionStatsDNIS OBJECT-TYPE
1953 SYNTAX SnmpAdminString
1954 MAX-ACCESS read-only
1957 "This object identifies the Dialed Number
1958 Information String that the LAC obtained from
1959 the network for the session. If no DNIS was
1960 provided then a null string will be returned."
1961 ::= { l2tpSessionStatsEntry 14 }
1963 l2tpSessionStatsCLID OBJECT-TYPE
1964 SYNTAX SnmpAdminString
1965 MAX-ACCESS read-only
1971 "This object identifies the Calling Line ID
1972 that the LAC obtained from the network for
1973 the session. If no CLID was provided then a
1974 null string will be returned."
1975 ::= { l2tpSessionStatsEntry 15 }
1977 l2tpSessionStatsSubAddress OBJECT-TYPE
1978 SYNTAX SnmpAdminString
1979 MAX-ACCESS read-only
1982 "This object identifies the Sub Address that
1983 the LAC obtained from the network for the
1984 session. If no Sub Address was provided then
1985 a null string will be returned."
1986 ::= { l2tpSessionStatsEntry 16 }
1988 l2tpSessionStatsPrivateGroupID OBJECT-TYPE
1989 SYNTAX SnmpAdminString
1990 MAX-ACCESS read-only
1993 "This object identifies the Private Group
1994 Identifier used for this tunneled session.
1995 If no Private Group Identifier was provided
1996 then a null string will be returned."
1997 ::= { l2tpSessionStatsEntry 17 }
1999 l2tpSessionStatsProxyLcp OBJECT-TYPE
2001 MAX-ACCESS read-only
2004 "Indicates whether the LAC performed proxy LCP
2006 ::= { l2tpSessionStatsEntry 18 }
2008 l2tpSessionStatsAuthMethod OBJECT-TYPE
2022 MAX-ACCESS read-only
2025 "This object contains the proxy authentication
2026 method employed by the LAC for the session. If
2027 l2tpSessionProxyLcp is false(2) this object
2028 should not be interpreted."
2029 ::= { l2tpSessionStatsEntry 19 }
2031 l2tpSessionStatsSequencingState OBJECT-TYPE
2038 MAX-ACCESS read-only
2041 "This object defines which tunnel peers have
2042 requested payload sequencing. The value of
2043 both(4) indicates that both peers have requested
2044 payload sequencing."
2045 ::= { l2tpSessionStatsEntry 20 }
2047 l2tpSessionStatsOutSequence OBJECT-TYPE
2049 MAX-ACCESS read-only
2052 "This object returns the total number of packets
2053 received for this session which were received out
2055 ::= { l2tpSessionStatsEntry 21 }
2057 l2tpSessionStatsReassemblyTO OBJECT-TYPE
2059 MAX-ACCESS read-only
2062 "This object returns the number of reassembly
2063 timeouts that have occurred for this session."
2064 ::= { l2tpSessionStatsEntry 22 }
2066 l2tpSessionStatsTxSeq OBJECT-TYPE
2067 SYNTAX Integer32 (0..65535)
2068 MAX-ACCESS read-only
2074 "This object contains the next send sequence number
2075 for for this session."
2076 ::= { l2tpSessionStatsEntry 23 }
2078 l2tpSessionStatsRxSeq OBJECT-TYPE
2079 SYNTAX Integer32 (0..65535)
2080 MAX-ACCESS read-only
2083 "This object contains the next receive sequence
2084 number expected to be received on this session."
2085 ::= { l2tpSessionStatsEntry 24 }
2088 -- The L2TP Tunnel Mapping Table
2091 l2tpTunnelMapTable OBJECT-TYPE
2092 SYNTAX SEQUENCE OF L2tpTunnelMapEntry
2093 MAX-ACCESS not-accessible
2096 "The L2TP Tunnel index mapping table. This table
2097 is intended to assist management applications
2098 to quickly determine what the ifIndex value is
2099 for a given local tunnel identifier."
2100 ::= { l2tpObjects 8 }
2102 l2tpTunnelMapEntry OBJECT-TYPE
2103 SYNTAX L2tpTunnelMapEntry
2104 MAX-ACCESS not-accessible
2107 "An L2TP tunnel index map entry."
2108 INDEX { l2tpTunnelMapLocalTID }
2109 ::= { l2tpTunnelMapTable 1 }
2111 L2tpTunnelMapEntry ::=
2113 l2tpTunnelMapLocalTID
2115 l2tpTunnelMapIfIndex
2119 l2tpTunnelMapLocalTID OBJECT-TYPE
2120 SYNTAX Integer32 (1..65535)
2124 MAX-ACCESS not-accessible
2127 "This object contains the local tunnel Identifier."
2128 REFERENCE "RFC 2661, Section 3.1"
2129 ::= { l2tpTunnelMapEntry 1 }
2131 l2tpTunnelMapIfIndex OBJECT-TYPE
2132 SYNTAX InterfaceIndex
2133 MAX-ACCESS read-only
2136 "This value for this object is equal to the value
2137 of ifIndex of the Interfaces MIB for tunnel
2138 interfaces of type L2TP."
2139 ::= { l2tpTunnelMapEntry 2 }
2142 -- The L2TP Session Mapping Table
2145 l2tpSessionMapTable OBJECT-TYPE
2146 SYNTAX SEQUENCE OF L2tpSessionMapEntry
2147 MAX-ACCESS not-accessible
2150 "The L2TP Session index mapping table. This table
2151 is intended to assist management applications
2152 to map interfaces to a tunnel and session
2154 ::= { l2tpObjects 9 }
2156 l2tpSessionMapEntry OBJECT-TYPE
2157 SYNTAX L2tpSessionMapEntry
2158 MAX-ACCESS not-accessible
2161 "An L2TP Session index map entry."
2162 INDEX { l2tpSessionMapIfIndex }
2163 ::= { l2tpSessionMapTable 1 }
2165 L2tpSessionMapEntry ::=
2167 l2tpSessionMapIfIndex
2169 l2tpSessionMapTunnelIfIndex
2171 l2tpSessionMapLocalSID
2176 l2tpSessionMapStatus
2180 l2tpSessionMapIfIndex OBJECT-TYPE
2181 SYNTAX InterfaceIndex
2182 MAX-ACCESS not-accessible
2185 "This object identifies the ifIndex value of the
2186 interface which is receiving or sending its packets
2187 over an L2TP tunnel. For example this could be a DS0
2188 ifIndex on a LAC or a PPP ifIndex on the LNS."
2189 ::= { l2tpSessionMapEntry 1 }
2191 l2tpSessionMapTunnelIfIndex OBJECT-TYPE
2192 SYNTAX InterfaceIndex
2193 MAX-ACCESS read-create
2196 "This object identifies the sessions associated
2197 L2TP tunnel ifIndex value. When this object is
2198 set it provides a binding between a particular
2199 interface identified by l2tpSessionMapIfIndex
2200 to a particular tunnel."
2201 ::= { l2tpSessionMapEntry 2 }
2203 l2tpSessionMapLocalSID OBJECT-TYPE
2204 SYNTAX Integer32 (1..65535)
2205 MAX-ACCESS read-only
2208 "This object contains the local assigned session
2209 identifier for this session."
2210 REFERENCE "RFC 2661, Section 3.1"
2211 ::= { l2tpSessionMapEntry 3 }
2213 l2tpSessionMapStatus OBJECT-TYPE
2215 MAX-ACCESS read-create
2218 "The status of this session map entry."
2219 ::= { l2tpSessionMapEntry 4 }
2222 -- { l2tpIpUdpObjects 1 } reserved for future use
2227 -- The L2TP UDP/IP Transport Status and Statistics Table
2230 l2tpUdpStatsTable OBJECT-TYPE
2231 SYNTAX SEQUENCE OF L2tpUdpStatsEntry
2232 MAX-ACCESS not-accessible
2235 "The L2TP UDP/IP transport stats table. This table
2236 contains objects that can be used to describe the
2237 current status and statistics of the UDP/IP L2TP
2239 ::= { l2tpIpUdpObjects 2 }
2241 l2tpUdpStatsEntry OBJECT-TYPE
2242 SYNTAX L2tpUdpStatsEntry
2243 MAX-ACCESS not-accessible
2246 "An L2TP UDP/IP transport stats entry."
2247 INDEX { l2tpUdpStatsIfIndex }
2248 ::= { l2tpUdpStatsTable 1 }
2250 L2tpUdpStatsEntry ::=
2254 l2tpUdpStatsPeerPort
2256 l2tpUdpStatsLocalPort
2260 l2tpUdpStatsIfIndex OBJECT-TYPE
2261 SYNTAX InterfaceIndex
2262 MAX-ACCESS not-accessible
2265 "This value for this object is equal to the
2266 value of ifIndex of the Interfaces MIB for
2267 tunnel interfaces of type L2TP and which have
2268 a L2TP transport of UDP/IP."
2269 ::= { l2tpUdpStatsEntry 1 }
2271 l2tpUdpStatsPeerPort OBJECT-TYPE
2272 SYNTAX Integer32 (0..65535)
2273 MAX-ACCESS read-only
2279 "This object reflects the peer's UDP port number
2280 used for this tunnel. When not known a value of
2281 zero should be returned."
2282 ::= { l2tpUdpStatsEntry 2 }
2284 l2tpUdpStatsLocalPort OBJECT-TYPE
2285 SYNTAX Integer32 (0..65535)
2286 MAX-ACCESS read-only
2289 "This object reflects the local UDP port number
2290 that this tunnel is bound to."
2291 ::= { l2tpUdpStatsEntry 3 }
2294 -- Definition of generic L2TP notifications
2297 l2tpTunnelAuthFailure NOTIFICATION-TYPE
2299 l2tpTunnelStatsInitiated,
2300 l2tpTunnelStatsRemoteHostName
2304 "A l2tpTunnelAuthFailure trap signifies that an
2305 attempt to establish a tunnel to a remote peer
2306 has failed authentication."
2307 ::= { l2tpNotifications 1 }
2310 -- conformance information
2313 l2tpGroups OBJECT IDENTIFIER ::= { l2tpConformance 1 }
2314 l2tpCompliances OBJECT IDENTIFIER ::= { l2tpConformance 2 }
2317 -- compliance statements
2320 l2tpMIBFullCompliance MODULE-COMPLIANCE
2323 "When this MIB is implemented with support for
2324 read-create and read-write, then such an
2328 implementation can claim full compliance. Such
2329 an implementation can then be both monitored
2330 and configured with this MIB."
2332 MODULE -- this module
2334 -- unconditionally mandatory groups
2340 -- conditionally mandatory groups
2341 GROUP l2tpIpUdpGroup
2343 "This group is mandatory for implementations that
2344 support L2TP over UDP/IP."
2347 GROUP l2tpDomainGroup
2349 "This group is optional for L2TP devices that
2350 group tunnel endpoints into tunnel domains."
2352 -- optional Mapping Group
2353 GROUP l2tpMappingGroup
2355 "This group is optional for L2TP devices that
2356 provide index mapping."
2358 -- optional Security Group
2359 GROUP l2tpSecurityGroup
2361 "This group is optional for SNMP agents which support
2362 both authentication and privacy of SNMP messages for
2363 the management of L2TP keys."
2365 -- optional High Capacity Group
2366 GROUP l2tpHCPacketGroup
2368 "This group is mandatory for implementations that
2369 support the l2tpDomainGroup AND could potentially
2370 overflow the L2TP Domain 32-bit counters is less
2373 ::= { l2tpCompliances 1 }
2375 l2tpMIBReadOnlyCompliance MODULE-COMPLIANCE
2381 "When this MIB is implemented without support for
2382 read-create and read-write (i.e. in read-only mode),
2383 then such an implementation can claim read-only
2384 compliance. Such an implementation can then be
2385 monitored but can not be configured with this MIB."
2387 MODULE -- this module
2389 -- unconditionally mandatory groups
2396 OBJECT l2tpAdminState
2397 MIN-ACCESS read-only
2399 "Write access is not required."
2401 OBJECT l2tpDrainTunnels
2402 MIN-ACCESS read-only
2404 "Write access is not required."
2406 OBJECT l2tpTunnelConfigDomainId
2407 MIN-ACCESS read-only
2409 "Write access is not required."
2411 OBJECT l2tpTunnelConfigHelloInterval
2412 MIN-ACCESS read-only
2414 "Write access is not required."
2416 OBJECT l2tpTunnelConfigIdleTimeout
2417 MIN-ACCESS read-only
2419 "Write access is not required."
2421 OBJECT l2tpTunnelConfigControlRWS
2422 MIN-ACCESS read-only
2424 "Write access is not required."
2426 OBJECT l2tpTunnelConfigControlMaxRetx
2430 MIN-ACCESS read-only
2432 "Write access is not required."
2434 OBJECT l2tpTunnelConfigControlMaxRetxTO
2435 MIN-ACCESS read-only
2437 "Write access is not required."
2439 OBJECT l2tpTunnelConfigPayloadSeq
2440 MIN-ACCESS read-only
2442 "Write access is not required."
2444 OBJECT l2tpTunnelConfigReassemblyTO
2445 MIN-ACCESS read-only
2447 "Write access is not required."
2449 OBJECT l2tpTunnelConfigTransport
2450 MIN-ACCESS read-only
2452 "Write access is not required."
2454 OBJECT l2tpTunnelConfigDrainTunnel
2455 MIN-ACCESS read-only
2457 "Write access is not required."
2459 OBJECT l2tpTunnelConfigProxyPPPAuth
2460 MIN-ACCESS read-only
2462 "Write access is not required."
2464 -- conditionally mandatory groups
2465 GROUP l2tpIpUdpGroup
2467 "This group is mandatory for implementations that
2468 support L2TP over UDP/IP."
2471 GROUP l2tpDomainGroup
2473 "This group is optional for L2TP devices that
2474 group tunnel endpoints into tunnel domains."
2476 OBJECT l2tpDomainConfigAdminState
2477 MIN-ACCESS read-only
2482 "Write access is not required."
2484 OBJECT l2tpDomainConfigDrainTunnels
2485 MIN-ACCESS read-only
2487 "Write access is not required."
2489 OBJECT l2tpDomainConfigTunnelHelloInt
2490 MIN-ACCESS read-only
2492 "Write access is not required."
2494 OBJECT l2tpDomainConfigTunnelIdleTO
2495 MIN-ACCESS read-only
2497 "Write access is not required."
2499 OBJECT l2tpDomainConfigControlRWS
2500 MIN-ACCESS read-only
2502 "Write access is not required."
2504 OBJECT l2tpDomainConfigControlMaxRetx
2505 MIN-ACCESS read-only
2507 "Write access is not required."
2509 OBJECT l2tpDomainConfigControlMaxRetxTO
2510 MIN-ACCESS read-only
2512 "Write access is not required."
2514 OBJECT l2tpDomainConfigPayloadSeq
2515 MIN-ACCESS read-only
2517 "Write access is not required."
2519 OBJECT l2tpDomainConfigReassemblyTO
2520 MIN-ACCESS read-only
2522 "Write access is not required."
2524 OBJECT l2tpDomainConfigProxyPPPAuth
2525 MIN-ACCESS read-only
2527 "Write access is not required."
2532 OBJECT l2tpDomainConfigStorageType
2533 MIN-ACCESS read-only
2535 "Write access is not required."
2537 OBJECT l2tpDomainConfigStatus
2538 MIN-ACCESS read-only
2540 "Write access is not required."
2542 -- optional Mapping Group
2543 GROUP l2tpMappingGroup
2545 "This group is optional for L2TP devices that
2546 provide index mapping."
2548 OBJECT l2tpSessionMapTunnelIfIndex
2549 MIN-ACCESS read-only
2551 "Write access is not required."
2553 OBJECT l2tpSessionMapStatus
2554 MIN-ACCESS read-only
2556 "Write access is not required."
2558 -- optional Security Group
2559 GROUP l2tpSecurityGroup
2561 "This group is optional for SNMP agents which support
2562 both authentication and privacy of SNMP messages for
2563 the management of L2TP keys."
2565 OBJECT l2tpDomainConfigAuth
2566 MIN-ACCESS read-only
2568 "Write access is not required."
2570 OBJECT l2tpDomainConfigSecret
2571 MIN-ACCESS read-only
2573 "Write access is not required."
2575 OBJECT l2tpDomainConfigTunnelSecurity
2576 MIN-ACCESS read-only
2578 "Write access is not required."
2583 OBJECT l2tpTunnelConfigAuth
2584 MIN-ACCESS read-only
2586 "Write access is not required."
2588 OBJECT l2tpTunnelConfigSecret
2589 MIN-ACCESS read-only
2591 "Write access is not required."
2593 OBJECT l2tpTunnelConfigSecurity
2594 MIN-ACCESS read-only
2596 "Write access is not required."
2598 -- optional High Capacity Group
2599 GROUP l2tpHCPacketGroup
2601 "This group is mandatory for implementations that
2602 support the l2tpDomainGroup AND could potentially
2603 overflow the L2TP Domain 32-bit counters is less
2606 ::= { l2tpCompliances 2 }
2608 -- units of conformance
2610 l2tpConfigGroup OBJECT-GROUP
2614 l2tpTunnelConfigDomainId,
2615 l2tpTunnelConfigHelloInterval,
2616 l2tpTunnelConfigIdleTimeout,
2617 l2tpTunnelConfigControlRWS,
2618 l2tpTunnelConfigControlMaxRetx,
2619 l2tpTunnelConfigControlMaxRetxTO,
2620 l2tpTunnelConfigPayloadSeq,
2621 l2tpTunnelConfigReassemblyTO,
2622 l2tpTunnelConfigTransport,
2623 l2tpTunnelConfigDrainTunnel,
2624 l2tpTunnelConfigProxyPPPAuth
2628 "A collection of objects providing configuration
2629 information of the L2TP protocol, tunnels and
2634 ::= { l2tpGroups 1 }
2636 l2tpStatsGroup OBJECT-GROUP
2638 l2tpProtocolVersions,
2641 l2tpDrainingTunnels,
2642 l2tpTunnelStatsLocalTID,
2643 l2tpTunnelStatsRemoteTID,
2644 l2tpTunnelStatsState,
2645 l2tpTunnelStatsInitiated,
2646 l2tpTunnelStatsRemoteHostName,
2647 l2tpTunnelStatsRemoteVendorName,
2648 l2tpTunnelStatsRemoteFirmwareRev,
2649 l2tpTunnelStatsRemoteProtocolVer,
2650 l2tpTunnelStatsInitialRemoteRWS,
2651 l2tpTunnelStatsBearerCaps,
2652 l2tpTunnelStatsFramingCaps,
2653 l2tpTunnelStatsControlRxPkts,
2654 l2tpTunnelStatsControlRxZLB,
2655 l2tpTunnelStatsControlOutOfSeq,
2656 l2tpTunnelStatsControlOutOfWin,
2657 l2tpTunnelStatsControlTxPkts,
2658 l2tpTunnelStatsControlTxZLB,
2659 l2tpTunnelStatsControlAckTO,
2660 l2tpTunnelStatsCurrentRemoteRWS,
2661 l2tpTunnelStatsTxSeq,
2662 l2tpTunnelStatsTxSeqAck,
2663 l2tpTunnelStatsRxSeq,
2664 l2tpTunnelStatsRxSeqAck,
2665 l2tpTunnelStatsTotalSessions,
2666 l2tpTunnelStatsFailedSessions,
2667 l2tpTunnelStatsActiveSessions,
2668 l2tpTunnelStatsLastResultCode,
2669 l2tpTunnelStatsLastErrorCode,
2670 l2tpTunnelStatsLastErrorMessage,
2671 l2tpTunnelStatsDrainingTunnel,
2672 l2tpSessionStatsIfIndex,
2673 l2tpSessionStatsRemoteSID,
2674 l2tpSessionStatsUserName,
2675 l2tpSessionStatsState,
2676 l2tpSessionStatsCallType,
2677 l2tpSessionStatsCallSerialNumber,
2678 l2tpSessionStatsTxConnectSpeed,
2679 l2tpSessionStatsRxConnectSpeed,
2680 l2tpSessionStatsCallBearerType,
2681 l2tpSessionStatsFramingType,
2685 l2tpSessionStatsPhysChanId,
2686 l2tpSessionStatsDNIS,
2687 l2tpSessionStatsCLID,
2688 l2tpSessionStatsSubAddress,
2689 l2tpSessionStatsPrivateGroupID,
2690 l2tpSessionStatsProxyLcp,
2691 l2tpSessionStatsAuthMethod,
2692 l2tpSessionStatsSequencingState,
2693 l2tpSessionStatsOutSequence,
2694 l2tpSessionStatsReassemblyTO,
2695 l2tpSessionStatsTxSeq,
2696 l2tpSessionStatsRxSeq
2700 "A collection of objects providing status and
2701 statistics of the L2TP protocol, tunnels and
2703 ::= { l2tpGroups 2 }
2705 l2tpIpUdpGroup OBJECT-GROUP
2707 l2tpUdpStatsPeerPort,
2708 l2tpUdpStatsLocalPort
2712 "A collection of objects providing status and
2713 statistics of the L2TP UDP/IP transport layer."
2714 ::= { l2tpGroups 3 }
2716 l2tpDomainGroup OBJECT-GROUP
2718 l2tpDomainConfigAdminState,
2719 l2tpDomainConfigDrainTunnels,
2720 l2tpDomainConfigTunnelHelloInt,
2721 l2tpDomainConfigTunnelIdleTO,
2722 l2tpDomainConfigControlRWS,
2723 l2tpDomainConfigControlMaxRetx,
2724 l2tpDomainConfigControlMaxRetxTO,
2725 l2tpDomainConfigPayloadSeq,
2726 l2tpDomainConfigReassemblyTO,
2727 l2tpDomainConfigProxyPPPAuth,
2728 l2tpDomainConfigStorageType,
2729 l2tpDomainConfigStatus,
2730 l2tpDomainStatsTotalTunnels,
2731 l2tpDomainStatsFailedTunnels,
2732 l2tpDomainStatsFailedAuths,
2736 l2tpDomainStatsActiveTunnels,
2737 l2tpDomainStatsTotalSessions,
2738 l2tpDomainStatsFailedSessions,
2739 l2tpDomainStatsActiveSessions,
2740 l2tpDomainStatsDrainingTunnels,
2741 l2tpDomainStatsControlRxOctets,
2742 l2tpDomainStatsControlRxPkts,
2743 l2tpDomainStatsControlTxOctets,
2744 l2tpDomainStatsControlTxPkts,
2745 l2tpDomainStatsPayloadRxOctets,
2746 l2tpDomainStatsPayloadRxPkts,
2747 l2tpDomainStatsPayloadRxDiscs,
2748 l2tpDomainStatsPayloadTxOctets,
2749 l2tpDomainStatsPayloadTxPkts
2753 "A collection of objects providing configuration,
2754 status and statistics of L2TP tunnel domains."
2755 ::= { l2tpGroups 4 }
2757 l2tpMappingGroup OBJECT-GROUP
2759 l2tpTunnelMapIfIndex,
2760 l2tpSessionMapTunnelIfIndex,
2761 l2tpSessionMapLocalSID,
2762 l2tpSessionMapStatus
2766 "A collection of objects providing index mapping."
2767 ::= { l2tpGroups 5 }
2769 l2tpSecurityGroup OBJECT-GROUP
2771 l2tpDomainConfigAuth,
2772 l2tpDomainConfigSecret,
2773 l2tpDomainConfigTunnelSecurity,
2774 l2tpTunnelConfigAuth,
2775 l2tpTunnelConfigSecret,
2776 l2tpTunnelConfigSecurity
2780 "A collection of objects providing L2TP security
2782 ::= { l2tpGroups 6 }
2787 l2tpTrapGroup NOTIFICATION-GROUP
2789 l2tpTunnelAuthFailure
2793 "A collection of L2TP trap events as specified
2794 in NOTIFICATION-TYPE constructs."
2795 ::= { l2tpGroups 7 }
2797 l2tpHCPacketGroup OBJECT-GROUP
2799 l2tpDomainStatsControlHCRxOctets,
2800 l2tpDomainStatsControlHCRxPkts,
2801 l2tpDomainStatsControlHCTxOctets,
2802 l2tpDomainStatsControlHCTxPkts,
2803 l2tpDomainStatsPayloadHCRxOctets,
2804 l2tpDomainStatsPayloadHCRxPkts,
2805 l2tpDomainStatsPayloadHCRxDiscs,
2806 l2tpDomainStatsPayloadHCTxOctets,
2807 l2tpDomainStatsPayloadHCTxPkts
2811 "A collection of objects providing High Capacity
2812 64-bit counter objects."
2813 ::= { l2tpGroups 8 }