CIM211 Class Declaration
CIM_IKEProposal

Table of Contents:
Class Hierarchy
Class Attributes
Class Qualifiers
Properties
Methods
Associations in which the class can participate
Sub Profiling Summary

Class Hierarchy

CIM_IKEProposal --> CIM_SAProposal --> CIM_ScopedSettingData --> CIM_SettingData --> CIM_ManagedElement --> [top]

Class Attributes

Class Declaration Attributes
NameValue
SUPERCLASSCIM_SAProposal
NAMECIM_IKEProposal

Class Qualifiers

Class CIM_IKEProposal Qualifiers
NameTypeValueFrom Class
Versionstring2.8.0 CIM_IKEProposal
DescriptionstringIKEProposal contains the parameters necessary to drive the phase 1 IKE negotiation. CIM_IKEProposal
MappingStringsstringIPSP Policy Model.IETF|IKEProposal CIM_IKEProposal
DescriptionstringSAProposal is a base class defining the common properties of, and anchoring common associations for, IPsec phase 1 and phase 2 proposals. It is defined as a kind of ScopedSettingData (scoped by a ComputerSystem or AdminDomain), since its subclasses define sets of IPsec properties that MUST be applied together, if negotiated. This subclassing is different than that defined in IETF ’ s IPSP Policy draft - where it is subclassed from Policy. The definition as SettingData is more consistent with the application of the properties as a set, to the negotiated Security Association. To indicate that ’ this ’ proposaltransform is negotiated for a Security Association, use the ElementSettingData to associate the proposal and the SA. CIM_SAProposal
MappingStringsstringIPSP Policy Model.IETF|SAProposal CIM_SAProposal
DescriptionstringThe ScopedSettingData class represents the general concept of SettingData, which is scoped or contained by a ManagedElement (that is, settings that are specifically defined for a system, device, and so on). ScopedSettingData is tied to a ManagedElement using the ScopedSetting association. Note that the cardinality of the ManagedElement reference is Min(1), Max(1). This cardinality mandates the instantiation of the ScopedSetting association for the referenced instance of ScopedSettingData. ScopedSetting describes the existence requirements and context for the referenced instance of ManagedElement. Specifically, the ManagedElement must exist and it provides the context for the ScopedSettingData. CIM_ScopedSettingData
DescriptionstringThe SettingData class represents configuration-related and operational parameters for one or more ManagedElements. A ManagedElement can have multiple SettingData objects associated with it. The current operational values for the parameters of the element are reflected by properties in the Element itself or by properties in its associations. These properties do not have to be the same values that are present in the SettingData object. For example, a modem might have a SettingData baud rate of 56Kb/sec but be operating at 19.2Kb/sec. Note: The CIM_SettingData class is very similar to CIM_Setting, yet both classes are present in the model because many implementations have successfully used CIM_Setting. However, issues have arisen that could not be resolved without defining a new class. Therefore, until a new major release occurs, both classes will exist in the model. Refer to the Core White Paper for additional information. SettingData instances can be aggregated together into higher- level SettingData objects using ConcreteComponent associations. CIM_SettingData
DescriptionstringManagedElement is an abstract class that provides a common superclass (or top of the inheritance tree) for the non-association classes in the CIM Schema. CIM_ManagedElement

Properties

Properties
NameTypeValueQualifiersClassOrigin
MaxLifetimeSecondsuint64 Description
Units
MappingStrings
ModelCorrespondence
CIM_IKEProposal
MaxLifetimeKilobytesuint64 Description
Units
MappingStrings
ModelCorrespondence
CIM_IKEProposal
CipherAlgorithmuint16 Description
ValueMap
Values
MappingStrings
ModelCorrespondence
CIM_IKEProposal
OtherCipherAlgorithmstring Description
ModelCorrespondence
CIM_IKEProposal
HashAlgorithmuint16 Description
ValueMap
Values
MappingStrings
ModelCorrespondence
CIM_IKEProposal
OtherHashAlgorithmstring Description
ModelCorrespondence
CIM_IKEProposal
AuthenticationMethoduint16 Description
ValueMap
Values
MappingStrings
ModelCorrespondence
CIM_IKEProposal
OtherAuthenticationMethodstring Description
ModelCorrespondence
CIM_IKEProposal
GroupIduint16 Description
ValueMap
Values
MappingStrings
ModelCorrespondence
CIM_IKEProposal
VendorIDstring Description
ModelCorrespondence
CIM_IKEProposal
InstanceIDstring Key
Description
CIM_SettingData
ElementNamestring Required
Override
Description
CIM_SettingData
Captionstring Description
MaxLen
CIM_ManagedElement
Descriptionstring Description CIM_ManagedElement

Property Qualifiers

Property MaxLifetimeSeconds Qualifiers
NameTypeValueFrom Class
DescriptionstringMaxLifetimeSeconds specifies the maximum time the IKE message sender proposes for an SA to be considered valid after it has been created. A value of zero indicates that the default of 8 hours be used. A non-zero value indicates the maximum seconds lifetime. CIM_IKEProposal
UnitsstringSeconds CIM_IKEProposal
MappingStringsstringIPSP Policy Model.IETF|IKEProposal.MaxLifetimeSeconds CIM_IKEProposal
ModelCorrespondencestringCIM_SecurityAssociationEndpoint.LifetimeSeconds CIM_IKEProposal

Property MaxLifetimeKilobytes Qualifiers
NameTypeValueFrom Class
DescriptionstringMaxLifetimeKilobytes specifies the maximum kilobyte lifetime the IKE message sender proposes for an SA to be considered valid after it has been created. A value of zero (the default) indicates that there should be no maximum kilobyte lifetime. A non-zero value specifies the desired kilobyte lifetime. CIM_IKEProposal
UnitsstringKiloBytes CIM_IKEProposal
MappingStringsstringIPSP Policy Model.IETF|IKEProposal.MaxLifetimeKilobytes CIM_IKEProposal
ModelCorrespondencestringCIM_SecurityAssociationEndpoint.LifetimeKilobytes CIM_IKEProposal

Property CipherAlgorithm Qualifiers
NameTypeValueFrom Class
DescriptionstringCipherAlgorithm is an enumeration that specifies the proposed encryption algorithm. The list of algorithms was generated from Appendix A of RFC2409. Note that the enumeration is different than the RFC list and aligns with the values in IKESAEndpoint.CipherAlgorithm. CIM_IKEProposal
ValueMapstring
[See below.]
CIM_IKEProposal
ValuesstringOther
DES
IDEA
Blowfish
RC5
3DES
CAST
DMTF/IANA Reserved
Vendor Reserved
CIM_IKEProposal
MappingStringsstringIPSP Policy Model.IETF|IKEProposal.CipherAlgorithm
RFC2409.IETF|Appendix A
CIM_IKEProposal
ModelCorrespondencestringCIM_IKESAEndpoint.CipherAlgorithm
CIM_IKEProposal.OtherCipherAlgorithm
CIM_IKEProposal

NameValue
1Other
2DES
3IDEA
4Blowfish
5RC5
63DES
7CAST
8..65000DMTF/IANA Reserved
65001..65535Vendor Reserved
Property OtherCipherAlgorithm Qualifiers
NameTypeValueFrom Class
DescriptionstringDescription of the encryption algorithm when the value 1 ( " Other " ) is specified for the property, CipherAlgorithm. CIM_IKEProposal
ModelCorrespondencestringCIM_IKESAEndpoint.OtherCipherAlgorithm
CIM_IKEProposal.CipherAlgorithm
CIM_IKEProposal

Property HashAlgorithm Qualifiers
NameTypeValueFrom Class
DescriptionstringHashAlgorithm is an enumeration that specifies the proposed hash function. The list of algorithms was generated from Appendix A of RFC2409. Note that the enumeration is different than the RFC list and aligns with the values in IKESAEndpoint.HashAlgorithm. CIM_IKEProposal
ValueMapstring
[See below.]
CIM_IKEProposal
ValuesstringOther
MD5
SHA-1
Tiger
DMTF/IANA Reserved
Vendor Reserved
CIM_IKEProposal
MappingStringsstringIPSP Policy Model.IETF|IKEProposal.HashAlgorithm
RFC2409.IETF|Appendix A
CIM_IKEProposal
ModelCorrespondencestringCIM_IKESAEndpoint.HashAlgorithm
CIM_IKEProposal.OtherHashAlgorithm
CIM_IKEProposal

NameValue
1Other
2MD5
3SHA-1
4Tiger
5..65000DMTF/IANA Reserved
65001..65535Vendor Reserved
Property OtherHashAlgorithm Qualifiers
NameTypeValueFrom Class
DescriptionstringDescription of the hash function when the value 1 ( " Other " ) is specified for the property, HashAlgorithm. CIM_IKEProposal
ModelCorrespondencestringCIM_IKESAEndpoint.OtherHashAlgorithm
CIM_IKEProposal.HashAlgorithm
CIM_IKEProposal

Property AuthenticationMethod Qualifiers
NameTypeValueFrom Class
DescriptionstringAuthenticationMethod is an enumeration that specifies the proposed authentication. The list of methods was generated from Appendix A of RFC2409. Note that the enumeration is different than the RFC list and aligns with the values in IKESAEndpoint.AuthenticationMethod. There is one change to the list - the value 65000 has special meaning. It is a special value that indicates that this particular proposal should be repeated once for each authentication method corresponding to credentials installed on the machine. For example, if the system has a pre-shared key and an public-key certificate, a proposal list would be constructed which includes a proposal that specifies a pre-shared key and a proposal for any of the public-key certificates. CIM_IKEProposal
ValueMapstring
[See below.]
CIM_IKEProposal
ValuesstringOther
Pre-shared Key
DSS Signatures
RSA Signatures
Encryption with RSA
Revised Encryption with RSA
DMTF/IANA Reserved
Any
Vendor Reserved
CIM_IKEProposal
MappingStringsstringIPSP Policy Model.IETF|IKEProposal.AuthenticationMethod
RFC2409.IETF|Appendix A
CIM_IKEProposal
ModelCorrespondencestringCIM_IKESAEndpoint.AuthenticationMethod
CIM_IKEProposal.OtherAuthenticationMethod
CIM_IKEProposal

NameValue
1Other
2Pre-shared Key
3DSS Signatures
4RSA Signatures
5Encryption with RSA
6Revised Encryption with RSA
7..64999DMTF/IANA Reserved
65000Any
65001..65535Vendor Reserved
Property OtherAuthenticationMethod Qualifiers
NameTypeValueFrom Class
DescriptionstringDescription of the method when the value 1 ( " Other " ) is specified for the property, AuthenticationMethod. CIM_IKEProposal
ModelCorrespondencestringCIM_IKESAEndpoint.OtherAuthenticationMethod
CIM_IKEProposal.AuthenticationMethod
CIM_IKEProposal

Property GroupId Qualifiers
NameTypeValueFrom Class
DescriptionstringThe property GroupId specifies the proposed phase 1 security association key exchange group. This property is ignored for all aggressive mode exchanges (IKEAction.ExchangeMode = 4). If the GroupID number is from the vendor-specific range (32768-65535), the property VendorID qualifies the group number. Well-known group identifiers from RFC2412, Appendix E, are: Group 1= ’ 768 bit prime ’ , Group 2= ’ 1024 bit prime ’ , Group 3 = ’ Elliptic Curve Group with 155 bit field element ’ , Group 4= ’ Large Elliptic Curve Group with 185 bit field element ’ , and Group 5= ’ 1536 bit prime ’ . CIM_IKEProposal
ValueMapstring
[See below.]
CIM_IKEProposal
ValuesstringNo Group/Non-Diffie-Hellman Exchange
DH-768 bit prime
DH-1024 bit prime
EC2N-155 bit field element
EC2N-185 bit field element
DH-1536 bit prime
Standard Group - Reserved
Vendor Reserved
CIM_IKEProposal
MappingStringsstringIPSP Policy Model.IETF|IKEProposal.GroupID
RFC2412.IETF|Appendix E
CIM_IKEProposal
ModelCorrespondencestringCIM_IKESAEndpoint.GroupID
CIM_IKEProposal.VendorID
CIM_IKEProposal

NameValue
0No Group/Non-Diffie-Hellman Exchange
1DH-768 bit prime
2DH-1024 bit prime
3EC2N-155 bit field element
4EC2N-185 bit field element
5DH-1536 bit prime
..Standard Group - Reserved
0x8000..Vendor Reserved
Property VendorID Qualifiers
NameTypeValueFrom Class
DescriptionstringVendorID identifies the vendor when the value of GroupID is in the vendor-specific range, 32768 to 65535. CIM_IKEProposal
ModelCorrespondencestringCIM_IKESAEndpoint.VendorID
CIM_IKEProposal.GroupId
CIM_IKEProposal

Property InstanceID Qualifiers
NameTypeValueFrom Class
Keybooleantrue CIM_SettingData
DescriptionstringWithin the scope of the instantiating Namespace, InstanceID opaquely and uniquely identifies an instance of this class. To ensure uniqueness within the NameSpace, the value of InstanceID should be constructed using the following " preferred " algorithm: < OrgID > : < LocalID > Where < OrgID > and < LocalID > are separated by a colon (:), and where < OrgID > must include a copyrighted, trademarked, or otherwise unique name that is owned by the business entity that is creating or defining the InstanceID or that is a registered ID assigned to the business entity by a recognized global authority. (This requirement is similar to the < Schema Name > _ < Class Name > structure of Schema class names.) In addition, to ensure uniqueness, < OrgID > must not contain a colon (:). When using this algorithm, the first colon to appear in InstanceID must appear between < OrgID > and < LocalID > . < LocalID > is chosen by the business entity and should not be reused to identify different underlying (real-world) elements. If the above " preferred " algorithm is not used, the defining entity must assure that the resulting InstanceID is not reused across any InstanceIDs produced by this or other providers for the NameSpace of this instance. For DMTF-defined instances, the " preferred " algorithm must be used with the < OrgID > set to CIM. CIM_SettingData

Property ElementName Qualifiers
NameTypeValueFrom Class
Requiredbooleantrue CIM_SettingData
OverridestringElementName CIM_SettingData
DescriptionstringThe user-friendly name for this instance of SettingData. In addition, the user-friendly name can be used as an index property for a search or query. (Note: The name does not have to be unique within a namespace.) CIM_SettingData

Property Caption Qualifiers
NameTypeValueFrom Class
DescriptionstringThe Caption property is a short textual description (one- line string) of the object. CIM_ManagedElement
MaxLenuint3264 CIM_ManagedElement

Property Description Qualifiers
NameTypeValueFrom Class
DescriptionstringThe Description property provides a textual description of the object. CIM_ManagedElement

Property ElementName Qualifiers
NameTypeValueFrom Class
DescriptionstringA user-friendly name for the object. This property allows each instance to define a user-friendly name in addition to its key properties, identity data, and description information. Note that the Name property of ManagedSystemElement is also defined as a user-friendly name. But, it is often subclassed to be a Key. It is not reasonable that the same property can convey both identity and a user-friendly name, without inconsistencies. Where Name exists and is not a Key (such as for instances of LogicalDevice), the same information can be present in both the Name and ElementName properties. CIM_ManagedElement

Methods

Method Qualifiers

Parameters

Parameter Qualifiers

Associations this class can participate in

Association
Class
Reference
Class
Role
CIM_ContainedProposalCIM_SAProposalPartComponent
CIM_ScopedSettingCIM_ScopedSettingDataDependent
CIM_SettingAssociatedToCapabilitiesCIM_SettingDataDependent
CIM_ElementSettingDataCIM_SettingDataSettingData
CIM_ComponentCIM_ManagedElementGroupComponent
CIM_ComponentCIM_ManagedElementPartComponent
CIM_ConcreteComponentCIM_ManagedElementGroupComponent
CIM_ConcreteComponentCIM_ManagedElementPartComponent
CIM_CredentialContextCIM_ManagedElementElementProvidingContext
CIM_DefaultElementCapabilitiesCIM_ManagedElementManagedElement
CIM_DependencyCIM_ManagedElementAntecedent
CIM_DependencyCIM_ManagedElementDependent
CIM_HostedDependencyCIM_ManagedElementAntecedent
CIM_HostedDependencyCIM_ManagedElementDependent
CIM_ScopedSettingCIM_ManagedElementAntecedent
CIM_MetricDefForMECIM_ManagedElementAntecedent
CIM_MetricForMECIM_ManagedElementAntecedent
CIM_RelatedElementCausingErrorCIM_ManagedElementDependent
CIM_RelatedElementCausingErrorCIM_ManagedElementAntecedent
CIM_SparedCIM_ManagedElementAntecedent
CIM_SparedCIM_ManagedElementDependent
CIM_ConcreteDependencyCIM_ManagedElementAntecedent
CIM_ConcreteDependencyCIM_ManagedElementDependent
CIM_ElementAsUserCIM_ManagedElementAntecedent
CIM_RecordAppliesToElementCIM_ManagedElementDependent
CIM_AuthenticationTargetCIM_ManagedElementDependent
CIM_AuthorizationSubjectCIM_ManagedElementDependent
CIM_AuthorizationTargetCIM_ManagedElementDependent
CIM_ElementSoftwareIdentityCIM_ManagedElementDependent
CIM_IsSpareCIM_ManagedElementAntecedent
CIM_ProvidesServiceToElementCIM_ManagedElementDependent
CIM_ElementCapabilitiesCIM_ManagedElementManagedElement
CIM_IdentityContextCIM_ManagedElementElementProvidingContext
CIM_LogicalIdentityCIM_ManagedElementSystemElement
CIM_LogicalIdentityCIM_ManagedElementSameElement
CIM_ConcreteIdentityCIM_ManagedElementSystemElement
CIM_ConcreteIdentityCIM_ManagedElementSameElement
CIM_SWRManageableAspectCIM_ManagedElementSystemElement
CIM_MemberOfCollectionCIM_ManagedElementMember
CIM_MemberPrincipalCIM_ManagedElementMember
CIM_ElementInPolicyRoleCollectionCIM_ManagedElementMember
CIM_OwningCollectionElementCIM_ManagedElementOwningElement
CIM_ParametersForMethodCIM_ManagedElementTheMethod
CIM_ParameterValueSourcesCIM_ManagedElementValueSource
CIM_PolicySetAppliesToElementCIM_ManagedElementManagedElement
CIM_AuthorizationRuleAppliesToTargetCIM_ManagedElementManagedElement
CIM_RoleLimitedToTargetCIM_ManagedElementTargetElement
CIM_StatisticsCIM_ManagedElementElement
CIM_SynchronizedCIM_ManagedElementSystemElement
CIM_SynchronizedCIM_ManagedElementSyncedElement
CIM_StorageSynchronizedCIM_ManagedElementSystemElement
CIM_StorageSynchronizedCIM_ManagedElementSyncedElement
CIM_AssignedIdentityCIM_ManagedElementManagedElement
CIM_AuthorizedSubjectCIM_ManagedElementPrivilegedElement
CIM_AuthorizedTargetCIM_ManagedElementTargetElement
CIM_ElementConformsToProfileCIM_ManagedElementManagedElement
CIM_ElementLocationCIM_ManagedElementElement
CIM_ElementProfileCIM_ManagedElementManagedElement
CIM_ElementSecuritySensitivityCIM_ManagedElementManagedElement
CIM_ElementSettingDataCIM_ManagedElementManagedElement
CIM_ElementStatisticalDataCIM_ManagedElementManagedElement
CIM_OwningJobElementCIM_ManagedElementOwningElement
CIM_AffectedJobElementCIM_ManagedElementAffectedElement
CIM_ServiceAffectsElementCIM_ManagedElementAffectedElement
CIM_ServiceAvailableToElementCIM_ManagedElementUserOfService
CIM_SAPAvailableForElementCIM_ManagedElementManagedElement
CIM_ManagementSAPCIM_ManagedElementManagedElement