IKE Tunnels by Security Endpoint Workspace
The Internet Key Exchange (IKE) Tunnels by Security Endpoint workspace
displays availability and performance statistics for IKE tunnels known to
the IKE daemon for the specified remote security endpoint. IKE tunnels are
used by a security endpoint (IKE daemon) to negotiate dynamic IP tunnels.
One way to display the IKE Tunnels by Security Endpoint workspace is to
do the following:
- Right-click the IPSec Tunnels Navigator item for
a specific TCP/IP stack.
- Select Workspaces and select the IKE Tunnels link.
- Click the Link icon by one of the rows of the IKE Tunnels With Byte Rate >= 1024 summary table.
- Select the IKE Tunnels by Security Endpoint link.
Summary information is displayed in the IKE Tunnels By Security Endpoint.
The IKE Tunnels by Security Endpoint Workspace contains the following views:
- IKE Tunnels with Percent Failed Activations > 0 summary table: Displays performance
and configuration information for IKE tunnels that are experiencing failures
when activating dynamic IP tunnels.
- Percent Failed Activations > 0: Shows tunnels that
have experienced dynamic tunnel activation failures. It is graphed as a
bar chart where bars represent tunnel IDs and the graph shows the percentage
of dynamic tunnel activations that have failed.
- Tunnel States: Shows the current number of IKE tunnels
in different states for the given TCP/IP stack. The query for this view uses
the IPSec statistics table instead of the IKE Tunnels table. The graph is
a bar chart where:
- Yellow represents the number of tunnels in Active state.
- Blue represents the number of tunnels in In Progress state.
- Pink represents the number of tunnels in Expired state.
- IKE Tunnels By Security Endpoint: Provides
performance and configuration data about the IKE tunnels known to the IKE
daemon for the specified security endpoints.
IKE Tunnels with Percent Failed Activations > 0 summary table
The IKE Tunnels summary table displays performance and configuration information
for IKE tunnels that are experiencing failures when activating dynamic IP
tunnels.
For a complete list of the attributes available in the IKE Tunnels with
Percent Failed Activations > 0 summary table, and a brief description of each,
see the Internet Key Exchange (IKE) Tunnels Attributes help panel.
The following additional workspaces can be accessed by clicking on the Link icon in the IKE Tunnels with Percent Failed Activations
> 0 summary table:
- IKE Tunnels by Security Endpoint Workspace (default):
Navigates to the IKE Tunnels By Security Endpoint workspace and displays
the IKE tunnels matching the remote security endpoint of the IKE tunnels you
would like displayed. When you select the link to the IKE Tunnels By Security
Endpoint workspace, a dialog box prompts you to identify the remote security
endpoint of the tunnels you would like displayed. This value is requested:
.
- Remote Security Endpoint: The IP address of the remote security endpoint.
This may be an IPv4 address in dotted decimal notation or an IPv6 address
in colon hexadecimal notation
Entries in the stored table are compared to the values provided in the
dialog box. All entries in the table that match are displayed in the table
view requested.
IKE Tunnels By Security Endpoint
The IKE Tunnels By Security Endpoint table provides performance and configuration
data about the IKE tunnels known to the IKE daemon for the specified security
endpoints.
For a complete list of the attributes available in the IKE Tunnels By Security
Endpoint summary table, and a brief description of each, see the Internet Key Exchange (IKE) Tunnels Attributes help
panel.
See also: