IKE Tunnels by Tunnel ID Workspace
The IKE Tunnels by Tunnel ID workspace displays availability and performance
statistics for IKE tunnels with a tunnel ID that matches the one passed by
the link. IKE tunnels are used by a security endpoint (IKE daemon) to negotiate
dynamic IP tunnels.
To display the IKE Tunnels by Tunnel ID workspace, do the following:
- Right-click the IPSec Tunnels Navigator item for
a specific TCP/IP stack.
- Select Workspaces and select the Dynamic IP Tunnels link.
- Click the Link icon by one of the rows of the Dynamic IP Tunnels With Byte Rate >= 2048 or Dynamic IP Tunnels With Byte Rate = 0 summary tables.
- Select the IKE Tunnels by Tunnel ID link.
Summary information is displayed in the IKE Tunnels with Percent Failed Activations > 0 summary table and
the IKE Tunnels By Tunnel ID summary table.
The IKE Tunnels by Tunnel ID Workspace contains the following views:
- IKE Tunnels with Percent Failed Activations > 0 summary table: Displays performance
and configuration information for IKE tunnels that are experiencing failures
when activating dynamic IP tunnels.
- Percent Failed Activations > 0: Shows tunnels that
have experienced dynamic tunnel activation failures. It is graphed as a
bar chart where bars represent tunnel IDs and the graph shows the percentage
of dynamic tunnel activations that have failed.
- Tunnel States: Shows the current number of IKE tunnels
in different states for the given TCP/IP stack. The query for this view uses
the IPSec statistics table instead of the IKE Tunnels table. The graph is
a bar chart where:
- Yellow represents the number of tunnels in an Active state.
- Blue represents the number of tunnels in an In Progress state.
- Pink represents the number of tunnels in an Expired state.
- IKE Tunnels By Tunnel ID summary table: Displays
availability and performance statistics for IKE tunnels with a tunnel ID that
matches the one passed by the link. IKE tunnels are used by a security endpoint
(IKE daemon) to negotiate dynamic IP tunnels.
IKE Tunnels with Percent Failed Activations > 0 summary table
The IKE Tunnels with Percent Failed Activations > 0 summary table displays
performance and configuration information for IKE tunnels that are experiencing
failures when activating dynamic IP tunnels.
For a complete list of the attributes available in the IKE Tunnels with
Percent Failed Activations > 0 summary table, and a brief description of each,
see the Internet Key Exchange (IKE) Tunnels Attributes help panel.
IKE Tunnels By Tunnel ID summary table
The IKE Tunnels by Tunnel ID summary table displays availability and performance
statistics for IKE tunnels with a tunnel ID that matches the one passed by
the link. IKE tunnels are used by a security endpoint (IKE daemon) to negotiate
dynamic IP tunnels.
For a complete list of the attributes available in the IKE Tunnels by Tunnel
ID summary table, and a brief description of each, see the Internet Key Exchange (IKE) Tunnels Attributes help
panel.
The following additional workspace can be accessed by clicking the Link icon in the IKE Tunnels by Tunnel ID summary table:
- IKE Tunnels by Security Endpoint Workspace (default):
Navigates to the IKE Tunnels By Security Endpoint workspace and displays
the IKE tunnels matching the remote security endpoint of the IKE tunnels you
would like displayed. When you select the link to the IKE Tunnels By Security
Endpoint workspace, a dialog box prompts you to identify the remote security
endpoint of the tunnels you would like displayed. This field is filled in
by default with the value from the Remote Security Endpoint column for the
selected tunnel, but you can change this value to be any IPv4 or IPv6 address
found in the TCP/IP stack. Specify an IP address that has the same IP version
as the selected connection. If the Remote Security Endpoint column is blank,
this field is filled with an IP address that has a value of zero (0) for all
subnets at the address. Entries in the stored table are compared to the values
provided in the dialog box. All entries in the table that match are displayed
in the IKE Tunnels By Security Endpoint workspace.
See also: