vpSecurityIpcompCorTable - VPN Policies Security Ipcomp Cor Table - ibm-vpnpolicy

MIBs list

With IPHost Network Monitor you can run simple snmp requests against a IBM device in your network.

vpSecurityIpcompCorTable

VPN Policies Security Ipcomp Cor Table
1.3.6.1.4.1.2.6.119.4.15.4.4.9

The Security IPCOMP Transform Correlation Table. This table can be used to correlate Security Proposals with IPCOMP Transforms. A Security Proposal may be associated with one or more IPCOMP Transforms.

Back to ibm-vpnpolicy MIB page.

IPHost Network monitor allows you to monitor vpSecurityIpcompCorTable on IBM device via the SNMP protocol. Download IPHost Network Monitor (500 monitors for 30 days, 50 monitors free forever) to start monitoring IBM computers right now.

MIBs list