IKE Tunnels Workspace
The Internet Key Exchange (IKE) Tunnels workspace displays availability
and performance statistics for IKE tunnels known to the IKE daemon for a specific
stack. IKE tunnels are used by a security endpoint (IKE daemon) to negotiate
dynamic IP tunnels. Since there could be thousands of IKE tunnels this workspace
has a predefined default filter when initially opened. The query used to
initially open the workspace will request IKE tunnels with a byte rate >=
1024.
One way to display the IKE Tunnels workspace, right-click the IPSec Tunnels Navigator item for a specific TCP/IP stack is to select Workspaces and select the IKE Tunnels link.
Summary information is displayed in the IKE Tunnels With Byte Rate >= 1024 summary table.
The IKE Tunnels Workspace contains the following views:
- IKE Tunnels With Percent Failed Activations > 0 summary table: Displays performance
and configuration information for IKE tunnels that are experiencing failures
when activating dynamic IP tunnels. No links are available from this view.
- Percent Failed Activations > 0: Shows IKE tunnels
that have experienced dynamic tunnel activation failures. This bar chart
shows the percentage of dynamic tunnel activations that have failed by Tunnel
ID.
- Tunnel States: Shows the current number of IKE tunnels
in different states for the given TCP/IP stack. The query for this view uses
the IPSec statistics table instead of the IKE Tunnels table. The graph is
a bar chart where:
- Yellow represents the number of tunnels in an Active state.
- Blue represents the number of tunnels in an In Progress state.
- Pink represents the number of tunnels in an Expired state.
- IKE Tunnels With Byte Rate >= 1024 summary table: Displays performance
and configuration data about the IKE tunnels with a byte rate greater than
or equal to 1024. Each row in the table represents a single IKE tunnel. The
data in this table can be filtered based on criteria that you provide.
IKE Tunnels With Percent Failed Activations > 0 summary table
The IKE Tunnels with Percent Failed Activations > 0 summary table displays
performance and configuration information for IKE tunnels that are experiencing
failures when activating dynamic IP tunnels.
For a complete list of the attributes available in the IKE Tunnels summary
tables, and a brief description of each, see the Internet Key Exchange (IKE) Tunnels Attributes help
panel.
IKE Tunnels With Byte Rate >= 1024 summary table
The IKE Tunnels With Byte Rate >= 1024 summary table displays performance
and configuration data about the IKE tunnels with a byte rate greater than
or equal to 1024. Each row in the table represents a single IKE tunnel. The
data in this table can be filtered based on criteria that you provide.
For a complete list of the attributes available in the IKE Tunnels With
Byte Rate >= 1024 summary table, and a brief description of each, see the Internet Key Exchange (IKE) Tunnels Attributes help panel.
The following additional workspace can be accessed by clicking the Link icon in the IKE Tunnels With Byte Rate >= 1024 summary
table:
- IKE Tunnels by Security Endpoint Workspace (default):
Navigates to the IKE Tunnels By Security Endpoint workspace and displays
the IKE tunnels matching the remote security endpoint of the IKE tunnels you
would like displayed. When you select the link to the IKE Tunnels By Security
Endpoint workspace, a dialog box prompts you to identify the remote security
endpoint of the tunnels you would like displayed. This field is filled in
by default with the value from the Remote Security Endpoint column for the
selected tunnel, but you can change this value to be any IPv4 or IPv6 address
found in the TCP/IP stack. Specify an IP address that has the same IP version
as the selected connection. If the Remote Security Endpoint column is blank,
this field is filled with an IP address that has a value of zero (0) for all
subnets at the address. Entries in the stored table are compared to the values
provided in the dialog box. All entries in the table that match are displayed
in the IKE Tunnels By Security Endpoint workspace.
See also: