Class isis:DTEp (CONCRETE)

Class ID:2765
Class Label: Discovered Tunnel Endpoint
Encrypted: false - Exportable: false - Persistent: true - Configurable: false - Subject to Quota: Disabled - Abstraction Layer: Concrete Model - APIC NX Processing: Disabled
Write Access: [NON CONFIGURABLE]
Read Access: [access-connectivity, access-protocol, admin, fabric-connectivity, fabric-protocol, tenant-connectivity, tenant-ext-protocol, tenant-protocol]
Creatable/Deletable: no (see Container Mos for details)
Semantic Scope: Fabric
Semantic Scope Evaluation Rule: Parent
Monitoring Policy Source: Parent
Monitoring Flags : [ IsObservable: false, HasStats: false, HasFaults: false, HasHealth: false, HasEventRules: false ]

The discovered IP security (IPsec) endpoints. The deployment of IPsec with Internet Key Exchange (IKE) requires the configuration of a crypto map for every peer which identifies the endpoint to which a secure tunnel is to be established.

Naming Rules
RN FORMAT: dtep-{[id]}

    [1] PREFIX=dtep- PROPERTY = id




DN FORMAT: 

[0] topology/pod-{id}/node-{id}/sys/isis/inst-{name}/dom-{name}/lvl-{type}/db-{type}/dtep-{[id]}

[1] sys/isis/inst-{name}/dom-{name}/lvl-{type}/db-{type}/dtep-{[id]}

[2] topology/pod-{id}/node-{id}/sys/isis/inst-{name}/dom-{name}/db-{type}/dtep-{[id]}

[3] sys/isis/inst-{name}/dom-{name}/db-{type}/dtep-{[id]}

                


Diagram

Super Mo: tunnel:DEp,
Container Mos: isis:Db (deletable:no),


Containers Hierarchies
[V] top:Root  This class represents the root element in the object hierarchy. All managed objects in the system are descendants of the Root element.
 ├
[V] fabric:Topology The root for IFC topology.
 
 ├
[V] fabric:Pod A pod.
 
 
 ├
[V] fabric:Node The root node for the APIC.
 
 
 
 ├
[V] top:System The APIC uses a policy model to combine data into a health score. Health scores can be aggregated for a variety of areas such as for the infrastructure, applications, or services. The category health score is calculated using a Lp -Norm formula. The health score penalty equals 100 minus the health score. The health score penalty represents the overall health score penalties of a set of MOs that belong to a given category and are children or direc...
 
 
 
 
 ├
[V] isis:Entity IS-IS control plane entity information.
 
 
 
 
 
 ├
[V] isis:Inst Per- IS-IS instance information.
 
 
 
 
 
 
 ├
[V] isis:Dom The IS-IS domain (vrf) information.
 
 
 
 
 
 
 
 ├
[V] isis:DomLvl The IS-IS Domain level VRF information.
 
 
 
 
 
 
 
 
 ├
[V] isis:Db The IS-IS database information.
 
 
 
 
 
 
 
 
 
 ├
[V] isis:DTEp The discovered IP security (IPsec) endpoints. The deployment of IPsec with Internet Key Exchange (IKE) requires the configuration of a crypto map for every peer which identifies the endpoint to which a secure tunnel is to be established.
[V] top:Root  This class represents the root element in the object hierarchy. All managed objects in the system are descendants of the Root element.
 ├
[V] top:System The APIC uses a policy model to combine data into a health score. Health scores can be aggregated for a variety of areas such as for the infrastructure, applications, or services. The category health score is calculated using a Lp -Norm formula. The health score penalty equals 100 minus the health score. The health score penalty represents the overall health score penalties of a set of MOs that belong to a given category and are children or direc...
 
 ├
[V] isis:Entity IS-IS control plane entity information.
 
 
 ├
[V] isis:Inst Per- IS-IS instance information.
 
 
 
 ├
[V] isis:Dom The IS-IS domain (vrf) information.
 
 
 
 
 ├
[V] isis:DomLvl The IS-IS Domain level VRF information.
 
 
 
 
 
 ├
[V] isis:Db The IS-IS database information.
 
 
 
 
 
 
 ├
[V] isis:DTEp The discovered IP security (IPsec) endpoints. The deployment of IPsec with Internet Key Exchange (IKE) requires the configuration of a crypto map for every peer which identifies the endpoint to which a secure tunnel is to be established.
[V] top:Root  This class represents the root element in the object hierarchy. All managed objects in the system are descendants of the Root element.
 ├
[V] fabric:Topology The root for IFC topology.
 
 ├
[V] fabric:Pod A pod.
 
 
 ├
[V] fabric:Node The root node for the APIC.
 
 
 
 ├
[V] top:System The APIC uses a policy model to combine data into a health score. Health scores can be aggregated for a variety of areas such as for the infrastructure, applications, or services. The category health score is calculated using a Lp -Norm formula. The health score penalty equals 100 minus the health score. The health score penalty represents the overall health score penalties of a set of MOs that belong to a given category and are children or direc...
 
 
 
 
 ├
[V] isis:Entity IS-IS control plane entity information.
 
 
 
 
 
 ├
[V] isis:Inst Per- IS-IS instance information.
 
 
 
 
 
 
 ├
[V] isis:Dom The IS-IS domain (vrf) information.
 
 
 
 
 
 
 
 ├
[V] isis:Db The IS-IS database information.
 
 
 
 
 
 
 
 
 ├
[V] isis:DTEp The discovered IP security (IPsec) endpoints. The deployment of IPsec with Internet Key Exchange (IKE) requires the configuration of a crypto map for every peer which identifies the endpoint to which a secure tunnel is to be established.
[V] top:Root  This class represents the root element in the object hierarchy. All managed objects in the system are descendants of the Root element.
 ├
[V] top:System The APIC uses a policy model to combine data into a health score. Health scores can be aggregated for a variety of areas such as for the infrastructure, applications, or services. The category health score is calculated using a Lp -Norm formula. The health score penalty equals 100 minus the health score. The health score penalty represents the overall health score penalties of a set of MOs that belong to a given category and are children or direc...
 
 ├
[V] isis:Entity IS-IS control plane entity information.
 
 
 ├
[V] isis:Inst Per- IS-IS instance information.
 
 
 
 ├
[V] isis:Dom The IS-IS domain (vrf) information.
 
 
 
 
 ├
[V] isis:Db The IS-IS database information.
 
 
 
 
 
 ├
[V] isis:DTEp The discovered IP security (IPsec) endpoints. The deployment of IPsec with Internet Key Exchange (IKE) requires the configuration of a crypto map for every peer which identifies the endpoint to which a secure tunnel is to be established.


Contained Hierarchy
[V] isis:DTEp The discovered IP security (IPsec) endpoints. The deployment of IPsec with Internet Key Exchange (IKE) requires the configuration of a crypto map for every peer which identifies the endpoint to which a secure tunnel is to be established.


Inheritance
[V] nw:Item Ignore.
 ├
[V] nw:Conn A connection abstraction.
 
 ├
[V] nw:Ep A static endpoint.
 
 
 ├
[V] nw:ConnEp A connection endpoint abstraction.
 
 
 
 ├
[V] tunnel:Ep An abstraction of a tunnel endpoint.
 
 
 
 
 ├
[V] tunnel:DEp A discovered tunnel endpoint.
 
 
 
 
 
 ├
[V] isis:DTEp The discovered IP security (IPsec) endpoints. The deployment of IPsec with Internet Key Exchange (IKE) requires the configuration of a crypto map for every peer which identifies the endpoint to which a secure tunnel is to be established.


Events
                


Faults
                


Fsms
                


Properties Summary
Defined in: isis:DTEp
tunnel:EpId
          address:Ip
id  (isis:DTEp:id)
           Overrides:tunnel:Ep:id
           The tunnel endpoint identifier.
Defined in: tunnel:Ep
tunnel:EncapT
          scalar:Enum8
encapt  (tunnel:Ep:encapt)
          
top:NodeRole
          scalar:Enum8
role  (tunnel:Ep:role)
           The remote end point role type.
tunnel:EpT
          scalar:Bitmask32
type  (tunnel:Ep:type)
           The specific type of the routed vlan interface.
Defined in: nw:Ep
naming:Name
          string:Basic
name  (nw:Ep:name)
           Overrides:nw:Conn:name
           The name of the object.
Defined in: mo:Modifiable
mo:TStamp
          scalar:Date
modTs  (mo:Modifiable:modTs)
           The time when this object was last modified.
Defined in: mo:TopProps
mo:ModificationChildAction
          scalar:Bitmask32
childAction  (mo:TopProps:childAction)
           Delete or ignore. For internal use only.
reference:BinRef dn  (mo:TopProps:dn)
           A tag or metadata is a non-hierarchical keyword or term assigned to the fabric module.
reference:BinRN rn  (mo:TopProps:rn)
           Identifies an object from its siblings within the context of its parent object. The distinguished name contains a sequence of relative names.
mo:ModificationStatus
          scalar:Bitmask32
status  (mo:TopProps:status)
           The upgrade status. This property is for internal use only.
Properties Detail

childAction

Type: mo:ModificationChildAction
Primitive Type: scalar:Bitmask32

Units: null
Encrypted: false
Access: implicit
Category: TopLevelChildAction
    Comments:
Delete or ignore. For internal use only.
Constants
deleteAll 16384u deleteAll NO COMMENTS
ignore 4096u ignore NO COMMENTS
deleteNonPresent 8192u deleteNonPresent NO COMMENTS
DEFAULT 0 --- This type is used to





dn

Type: reference:BinRef

Units: null
Encrypted: false
Access: implicit
Category: TopLevelDn
    Comments:
A tag or metadata is a non-hierarchical keyword or term assigned to the fabric module.



encapt

Type: tunnel:EncapT
Primitive Type: scalar:Enum8

Units: null
Encrypted: false
Access: implicit
Category: TopLevelRegular
    Comments:
Constants
unknown 0 unknown Unknown
vxlan 1 VXLAN encap vxlan
ivxlan 2 iVXLAN encap ivxlan
nvgre 3 NV-GRE encap nvgre
DEFAULT ivxlan(2) iVXLAN encap ivxlan





id

Type: tunnel:EpId
Primitive Type: address:Ip

Overrides:tunnel:Ep:id
Units: null Encrypted: false Naming Property -- [NAMING RULES] Access: naming Category: TopLevelRegular
    Comments:
The tunnel endpoint identifier.



modTs

Type: mo:TStamp
Primitive Type: scalar:Date

Units: null
Encrypted: false
Access: implicit
Category: TopLevelRegular
    Comments:
The time when this object was last modified.
Constants
never 0ull never NO COMMENTS
DEFAULT never(0ull) never NO COMMENTS





name

Type: naming:Name
Primitive Type: string:Basic

Overrides:nw:Conn:name
Units: null Encrypted: false Access: admin Category: TopLevelRegular
    Comments:
The name of the object.



rn

Type: reference:BinRN

Units: null
Encrypted: false
Access: implicit
Category: TopLevelRn
    Comments:
Identifies an object from its siblings within the context of its parent object. The distinguished name contains a sequence of relative names.



role

Type: top:NodeRole
Primitive Type: scalar:Enum8

Units: null
Encrypted: false
Access: implicit
Category: TopLevelRegular
    Comments:
The remote end point role type.
Constants
unsupported 0 unknown NO COMMENTS
controller 1 controller Controller
leaf 2 leaf Leaf
spine 3 spine Spine
vleaf 4 vleaf vLeaf
vip 5 vip VPC IP address
protection-chain 6 protection-chain Protection chain IP
DEFAULT unsupported(0) unknown NO COMMENTS





status

Type: mo:ModificationStatus
Primitive Type: scalar:Bitmask32

Units: null
Encrypted: false
Access: implicit
Category: TopLevelStatus
    Comments:
The upgrade status. This property is for internal use only.
Constants
created 2u created In a setter method: specifies that an object should be created. An error is returned if the object already exists.
In the return value of a setter method: indicates that an object has been created.
modified 4u modified In a setter method: specifies that an object should be modified
In the return value of a setter method: indicates that an object has been modified.
deleted 8u deleted In a setter method: specifies that an object should be deleted.
In the return value of a setter method: indicates that an object has been deleted.
DEFAULT 0 --- This type controls the life cycle of objects passed in the XML API.

When used in a setter method (such as configConfMo), the ModificationStatus specifies whether an object should be created, modified, deleted or removed.
In the return value of a setter method, the ModificationStatus indicates the actual operation that was performed. For example, the ModificationStatus is set to "created" if the object was created. The ModificationStatus is not set if the object was neither created, modified, deleted or removed.

When invoking a setter method, the ModificationStatus is optional:
If a setter method such as configConfMo is invoked and the ModificationStatus is not set, the system automatically determines if the object should be created or modified.






type

Type: tunnel:EpT
Primitive Type: scalar:Bitmask32

Units: null
Encrypted: false
Access: implicit
Category: TopLevelRegular
    Comments:
The specific type of the routed vlan interface.
Constants
learn-disabled 1024u Learn Disabled Learn Disabled
ivleaf 1048576u ivleaf ivleaf
underlay-mcast 128u Underlay Multicast Underlay Muticast Interface used for multicast routing
vpod-mcast-hrep 131072u Vpod Leaf Multicast VPOD mcast
rl-mcast-hrep 16384u Remote Leaf Multicast RL mcast
multidomain-remote-dp-tep 16777216u SDA Remote Tunnels dynamically created on Campus BLs Multidomain Remote TEP dynamicall created by BGP when EVPN routes are learnt against the given Tunnel Endpoint.
proxy-acast-mac 16u Proxy Anycast MAC Ep Proxy anycast mac tunnel endpoint
physical 1u Physical Ep Physical endpoint
rl-ss 2048u Remote Leaf Shared Service Tunnel to remote leaf's tep for shared service
rl-routable 2097152u RL Routable RL Routable
dci-ucast 256u Remote Pod Dci Unicast Tunnel to remote pod's dci ucast tep
rl-direct 262144u RL direct switching RL Direct
virtual 2u Virtual Ep Virtual endpoint
rl-vpc 32768u Remote Leaf VPC Tunnel to RL VPC peer
fabric-ext 32u Fabric External Fabric external mode
multidomain-anycast-v4-tep 33554432u Local Loopback tunnel allocated from rtep pool created on Campus BLs All local v4 endpoints hosted on MDP leafs point towards this tunnel
non-fabric-golf 4096u Non Fabric Golf Non Fabric Golf
multidomain-ext-tep 4194304u Local Loopback Tunenl allocated from POD tep pool to support SDA integration CS-TEP loopback (allocated on Spines in POD which has Campus BLs) Value comes from POD TEP Pool. All Campus endpoints are learnt against this tunnel. This tunnel will be created as DCI tunnel internally to achieve VNID/SCLASS translations. Only one CS-TEP per site.
proxy-acast-v4 4u Proxy Anycast IPv4 Ep Proxy anycast v4 tunnel endpoint
dci-mcast-hrep 512u Remote Site Dci Mcast Tunnel to remote site's dci mcast tep
rl-direct-pod 524288u RL direct switching interpod RL Direct Pod
non-fabric-untrusted 64u Non Fabric Untrusted Node Non Fabric Untrusted nodes
vpod-ucast 65536u Vpod Leaf Unicast VPOD ucast
multidomain-anycast-v6-tep 67108864u Local Loopback tunnel allocated from rtep pool created on Campus BLs All local v6 endpoints hosted on MDP leafs point towards this tunnel
rl-ucast 8192u Remote Leaf Unicast RL ucast
multidomain-int-tep 8388608u Local Loopback tunnel allocated from POD tep pool to support SDA integration IS-TEP loopback (allocated on Spines in POD which has Campus BLs) Value comes from POD TEP Pool. Traffic from Campus entering the Campus BLs are redirected to this tunnel. This tunnel will also be created as DCI tunnel internally to trigger VNID/SCLASS translations. Only one IS-TEP per site.
proxy-acast-v6 8u Proxy Anycast IPv6 Ep Proxy anycast v6 tunnel endpoint
DEFAULT physical(1u) Physical Ep Physical endpoint