{
  "openapi": "3.0.0",
  "info": {
    "title": "CISCO-IPSEC-MIB MIB API",
    "version": "1.0.0",
    "description": "The MIB module for modeling Cisco-specific \n    IPsec attributes\n    \n    Overview of Cisco IPsec MIB\n    \n    MIB description\n    \n    This MIB models the Cisco implementation-specific \n    attributes of a Cisco entity that implements IPsec. \n    This MIB is complementary to the standard IPsec MIB \n    proposed jointly by Tivoli and Cisco.\n    \n    The ciscoIPsec MIB provides the operational information \n    on Cisco's IPsec tunnelling implementation.  \n    The following entities are managed:\n    1) ISAKMP Group:\n    a) ISAKMP global parameters\n    b) ISAKMP Policy Table\n    \n    2) IPSec Group:\n    a) IPSec Global Parameters\n    b) IPSec Global Traffic Parameters\n    c) Cryptomap Group\n    - Cryptomap Set Table\n    - Cryptomap Table\n    - CryptomapSet Binding Table\n    \n    3) System Capacity & Capability Group:\n    a) Capacity Parameters\n    b) Capability Parameters\n    \n    4) Trap Control Group\n    5) Notifications Group\n\n⚠️ **IMPORTANT - MIB DATA ACCESS**:\nThis YANG model exists for SMIv2-to-YANG translation purposes, but MIB data on IOS-XE devices is primarily accessed via **SNMP protocol**, not RESTCONF.\n\n**RESTCONF Limitation**: Many MIB paths may return 404 errors via RESTCONF `/data` endpoints because the device exposes MIB data through SNMP, not the YANG datastore.\n\n**Recommended Access Methods**:\n- Use SNMP (v2c/v3) to query MIB data directly\n- Use NETCONF `<get>` operations for devices supporting YANG-modeled MIB access\n- Check device capabilities: some newer IOS-XE versions may support limited RESTCONF access to specific MIBs\n\n**YANG Model Purpose**: These YANG models define the structure of SNMP MIBs in YANG format for tooling compatibility, but do not guarantee RESTCONF data availability.\n\n\n**📊 YANG Tree:** [View CISCO-IPSEC-MIB structure](https://jeremycohoe.github.io/cisco-ios-xe-openapi-swagger/yang-trees/CISCO-IPSEC-MIB.html)",
    "contact": {
      "name": "Cisco DevNet",
      "url": "https://developer.cisco.com"
    },
    "x-yang-module": "CISCO-IPSEC-MIB",
    "x-model-type": "mib"
  },
  "servers": [
    {
      "url": "https://{device}/restconf",
      "description": "RESTCONF server",
      "variables": {
        "device": {
          "default": "10.1.1.1",
          "description": "Device hostname or IP address"
        }
      }
    }
  ],
  "paths": {
    "/data/CISCO-IPSEC-MIB:cipsIsakmpGroup": {
      "get": {
        "summary": "Get cipsIsakmpGroup data",
        "description": "Retrieve cipsIsakmpGroup operational data from MIB",
        "tags": [
          "CISCO-IPSEC-MIB"
        ],
        "responses": {
          "200": {
            "description": "Success",
            "content": {
              "application/yang-data+json": {
                "schema": {
                  "type": "object",
                  "description": "The value of this object is TRUE if ISAKMP\n          has been enabled on the managed entity. Otherise\n          the value of this object is FALSE.",
                  "properties": {
                    "cipsIsakmpEnabled": {
                      "type": "boolean",
                      "description": "The value of this object is TRUE if ISAKMP\n          has been enabled on the managed entity. Otherise\n          the value of this object is FALSE."
                    },
                    "cipsIsakmpIdentity": {
                      "type": "string",
                      "description": "The value of this object is shows the type of\n          identity used by the managed entity in ISAKMP\n          negotiations with another peer.",
                      "x-yang-type": "CISCO-IPSEC-MIB:IkeIdentityType"
                    },
                    "cipsIsakmpKeepaliveInterval": {
                      "type": "integer",
                      "description": "The value of this object is time interval in\n          seconds between successive ISAKMP keepalive\n          heartbeats issued to the peers to which IKE\n          tunnels have been setup.",
                      "minimum": -2147483648,
                      "maximum": 2147483647
                    },
                    "cipsNumIsakmpPolicies": {
                      "type": "integer",
                      "description": "The value of this object is the number of\n          ISAKMP policies that have been configured on the \n          managed entity.",
                      "minimum": -2147483648,
                      "maximum": 2147483647
                    }
                  }
                },
                "example": {
                  "CISCO-IPSEC-MIB:cipsIsakmpGroup": {
                    "cipsIsakmpEnabled": true,
                    "cipsIsakmpIdentity": "192.168.1.1",
                    "cipsIsakmpKeepaliveInterval": -2147483648,
                    "cipsNumIsakmpPolicies": -2147483648
                  }
                }
              }
            }
          },
          "403": {
            "description": "Forbidden — insufficient access rights (NACM)",
            "content": {
              "application/yang-data+json": {
                "schema": {
                  "$ref": "#/components/schemas/restconf-error"
                }
              }
            }
          }
        },
        "operationId": "get-cipsIsakmpGroup",
        "parameters": [
          {
            "name": "Accept",
            "in": "header",
            "required": false,
            "description": "RESTCONF response media type (RFC 8040)",
            "schema": {
              "type": "string",
              "default": "application/yang-data+json",
              "enum": [
                "application/yang-data+json",
                "application/yang-data+xml"
              ]
            }
          },
          {
            "name": "depth",
            "in": "query",
            "required": false,
            "description": "Limit the depth of returned sub-tree data (RFC 8040 Section 4.8.2). Use 'unbounded' for full depth.",
            "schema": {
              "type": "string",
              "default": "unbounded"
            }
          },
          {
            "name": "fields",
            "in": "query",
            "required": false,
            "description": "Select specific fields to return (RFC 8040 Section 4.8.3). Example: fields=name;status",
            "schema": {
              "type": "string"
            }
          },
          {
            "name": "content",
            "in": "query",
            "required": false,
            "description": "Filter by config state: 'config' (config true only), 'nonconfig' (config false only), or 'all'.",
            "schema": {
              "type": "string",
              "enum": [
                "config",
                "nonconfig",
                "all"
              ],
              "default": "all"
            }
          }
        ]
      },
      "x-yang-path": "/cipsIsakmpGroup",
      "x-restconf-kind": "container"
    },
    "/data/CISCO-IPSEC-MIB:cipsIPsecGlobals": {
      "get": {
        "summary": "Get cipsIPsecGlobals data",
        "description": "Retrieve cipsIPsecGlobals operational data from MIB",
        "tags": [
          "CISCO-IPSEC-MIB"
        ],
        "responses": {
          "200": {
            "description": "Success",
            "content": {
              "application/yang-data+json": {
                "schema": {
                  "type": "object",
                  "description": "The default lifetime (in seconds) assigned \n          to an SA as a global policy (maybe overridden \n          in specific cryptomap definitions).",
                  "properties": {
                    "cipsSALifetime": {
                      "type": "string",
                      "description": "The default lifetime (in seconds) assigned \n          to an SA as a global policy (maybe overridden \n          in specific cryptomap definitions).",
                      "x-yang-type": "CISCO-IPSEC-MIB:CIPsecLifetime"
                    },
                    "cipsSALifesize": {
                      "type": "string",
                      "description": "The default lifesize in KBytes assigned to an SA \n          as a global policy (unless overridden in cryptomap \n          definition)",
                      "x-yang-type": "CISCO-IPSEC-MIB:CIPsecLifesize"
                    },
                    "cipsNumStaticCryptomapSets": {
                      "type": "string",
                      "description": "The number of Cryptomap Sets that are are fully\n          configured. Statically defined cryptomap sets \n          are ones where the operator has fully specified\n          all the parameters required set up IPSec \n          Virtual Private Networks (VPNs).",
                      "x-yang-type": "CISCO-IPSEC-MIB:CIPsecNumCryptoMaps"
                    },
                    "cipsNumCETCryptomapSets": {
                      "type": "string",
                      "description": "The number of static Cryptomap Sets that have \n          at least one CET cryptomap element\n          as a member of the set.",
                      "x-yang-type": "CISCO-IPSEC-MIB:CIPsecNumCryptoMaps"
                    },
                    "cipsNumDynamicCryptomapSets": {
                      "type": "string",
                      "description": "The number of dynamic IPSec Policy templates\n          (called 'dynamic cryptomap templates') configured\n          on the managed entity.",
                      "x-yang-type": "CISCO-IPSEC-MIB:CIPsecNumCryptoMaps"
                    },
                    "cipsNumTEDCryptomapSets": {
                      "type": "string",
                      "description": "The number of static Cryptomap Sets that have \n          at least one dynamic cryptomap template \n          bound to them which has the Tunnel Endpoint Discovery\n          (TED) enabled.",
                      "x-yang-type": "CISCO-IPSEC-MIB:CIPsecNumCryptoMaps"
                    }
                  }
                },
                "example": {
                  "CISCO-IPSEC-MIB:cipsIPsecGlobals": {
                    "cipsSALifetime": "192.168.1.1",
                    "cipsSALifesize": "192.168.1.1",
                    "cipsNumStaticCryptomapSets": "192.168.1.1",
                    "cipsNumCETCryptomapSets": "192.168.1.1",
                    "cipsNumDynamicCryptomapSets": "192.168.1.1",
                    "cipsNumTEDCryptomapSets": "192.168.1.1"
                  }
                }
              }
            }
          },
          "403": {
            "description": "Forbidden — insufficient access rights (NACM)",
            "content": {
              "application/yang-data+json": {
                "schema": {
                  "$ref": "#/components/schemas/restconf-error"
                }
              }
            }
          }
        },
        "operationId": "get-cipsIPsecGlobals",
        "parameters": [
          {
            "name": "Accept",
            "in": "header",
            "required": false,
            "description": "RESTCONF response media type (RFC 8040)",
            "schema": {
              "type": "string",
              "default": "application/yang-data+json",
              "enum": [
                "application/yang-data+json",
                "application/yang-data+xml"
              ]
            }
          },
          {
            "name": "depth",
            "in": "query",
            "required": false,
            "description": "Limit the depth of returned sub-tree data (RFC 8040 Section 4.8.2). Use 'unbounded' for full depth.",
            "schema": {
              "type": "string",
              "default": "unbounded"
            }
          },
          {
            "name": "fields",
            "in": "query",
            "required": false,
            "description": "Select specific fields to return (RFC 8040 Section 4.8.3). Example: fields=name;status",
            "schema": {
              "type": "string"
            }
          },
          {
            "name": "content",
            "in": "query",
            "required": false,
            "description": "Filter by config state: 'config' (config true only), 'nonconfig' (config false only), or 'all'.",
            "schema": {
              "type": "string",
              "enum": [
                "config",
                "nonconfig",
                "all"
              ],
              "default": "all"
            }
          }
        ]
      },
      "x-yang-path": "/cipsIPsecGlobals",
      "x-restconf-kind": "container"
    },
    "/data/CISCO-IPSEC-MIB:cipsIPsecStatistics": {
      "get": {
        "summary": "Get cipsIPsecStatistics data",
        "description": "Retrieve cipsIPsecStatistics operational data from MIB",
        "tags": [
          "CISCO-IPSEC-MIB"
        ],
        "responses": {
          "200": {
            "description": "Success",
            "content": {
              "application/yang-data+json": {
                "schema": {
                  "type": "object",
                  "description": "The number of TED probes that were received by this \n          managed entity since bootup. Not affected by any \n          CLI operation.",
                  "properties": {
                    "cipsNumTEDProbesReceived": {
                      "type": "integer",
                      "description": "The number of TED probes that were received by this \n          managed entity since bootup. Not affected by any \n          CLI operation.",
                      "minimum": 0,
                      "maximum": 4294967295
                    },
                    "cipsNumTEDProbesSent": {
                      "type": "integer",
                      "description": "The number of TED probes that were dispatched by all\n          the dynamic cryptomaps in this managed entity since \n          bootup. Not affected by any CLI operation.",
                      "minimum": 0,
                      "maximum": 4294967295
                    },
                    "cipsNumTEDFailures": {
                      "type": "integer",
                      "description": "The number of TED probes that were dispatched by \n          the local entity and that failed to locate crypto \n          endpoint.  Not affected by any CLI operation.",
                      "minimum": 0,
                      "maximum": 4294967295
                    }
                  }
                },
                "example": {
                  "CISCO-IPSEC-MIB:cipsIPsecStatistics": {
                    "cipsNumTEDProbesReceived": 0,
                    "cipsNumTEDProbesSent": 0,
                    "cipsNumTEDFailures": 0
                  }
                }
              }
            }
          },
          "403": {
            "description": "Forbidden — insufficient access rights (NACM)",
            "content": {
              "application/yang-data+json": {
                "schema": {
                  "$ref": "#/components/schemas/restconf-error"
                }
              }
            }
          }
        },
        "operationId": "get-cipsIPsecStatistics",
        "parameters": [
          {
            "name": "Accept",
            "in": "header",
            "required": false,
            "description": "RESTCONF response media type (RFC 8040)",
            "schema": {
              "type": "string",
              "default": "application/yang-data+json",
              "enum": [
                "application/yang-data+json",
                "application/yang-data+xml"
              ]
            }
          },
          {
            "name": "depth",
            "in": "query",
            "required": false,
            "description": "Limit the depth of returned sub-tree data (RFC 8040 Section 4.8.2). Use 'unbounded' for full depth.",
            "schema": {
              "type": "string",
              "default": "unbounded"
            }
          },
          {
            "name": "fields",
            "in": "query",
            "required": false,
            "description": "Select specific fields to return (RFC 8040 Section 4.8.3). Example: fields=name;status",
            "schema": {
              "type": "string"
            }
          },
          {
            "name": "content",
            "in": "query",
            "required": false,
            "description": "Filter by config state: 'config' (config true only), 'nonconfig' (config false only), or 'all'.",
            "schema": {
              "type": "string",
              "enum": [
                "config",
                "nonconfig",
                "all"
              ],
              "default": "all"
            }
          }
        ]
      },
      "x-yang-path": "/cipsIPsecStatistics",
      "x-restconf-kind": "container"
    },
    "/data/CISCO-IPSEC-MIB:cipsSysCapacityGroup": {
      "get": {
        "summary": "Get cipsSysCapacityGroup data",
        "description": "Retrieve cipsSysCapacityGroup operational data from MIB",
        "tags": [
          "CISCO-IPSEC-MIB"
        ],
        "responses": {
          "200": {
            "description": "Success",
            "content": {
              "application/yang-data+json": {
                "schema": {
                  "type": "object",
                  "description": "The maximum number of IPsec Security Associations\n          that can be established on this managed entity.\n          If no theoretical limit exists, this\n          returns value 0.\n          \n          Not affected by any CLI operation.",
                  "properties": {
                    "cipsMaxSAs": {
                      "type": "integer",
                      "description": "The maximum number of IPsec Security Associations\n          that can be established on this managed entity.\n          If no theoretical limit exists, this\n          returns value 0.\n          \n          Not affected by any CLI operation.",
                      "minimum": -2147483648,
                      "maximum": 2147483647
                    },
                    "cips3DesCapable": {
                      "type": "boolean",
                      "description": "The value of this object is TRUE if the \n          managed entity has the hardware nad software \n          features to support 3DES encryption algorithm.\n          \n          Not affected by any CLI operation."
                    }
                  }
                },
                "example": {
                  "CISCO-IPSEC-MIB:cipsSysCapacityGroup": {
                    "cipsMaxSAs": -2147483648,
                    "cips3DesCapable": true
                  }
                }
              }
            }
          },
          "403": {
            "description": "Forbidden — insufficient access rights (NACM)",
            "content": {
              "application/yang-data+json": {
                "schema": {
                  "$ref": "#/components/schemas/restconf-error"
                }
              }
            }
          }
        },
        "operationId": "get-cipsSysCapacityGroup",
        "parameters": [
          {
            "name": "Accept",
            "in": "header",
            "required": false,
            "description": "RESTCONF response media type (RFC 8040)",
            "schema": {
              "type": "string",
              "default": "application/yang-data+json",
              "enum": [
                "application/yang-data+json",
                "application/yang-data+xml"
              ]
            }
          },
          {
            "name": "depth",
            "in": "query",
            "required": false,
            "description": "Limit the depth of returned sub-tree data (RFC 8040 Section 4.8.2). Use 'unbounded' for full depth.",
            "schema": {
              "type": "string",
              "default": "unbounded"
            }
          },
          {
            "name": "fields",
            "in": "query",
            "required": false,
            "description": "Select specific fields to return (RFC 8040 Section 4.8.3). Example: fields=name;status",
            "schema": {
              "type": "string"
            }
          },
          {
            "name": "content",
            "in": "query",
            "required": false,
            "description": "Filter by config state: 'config' (config true only), 'nonconfig' (config false only), or 'all'.",
            "schema": {
              "type": "string",
              "enum": [
                "config",
                "nonconfig",
                "all"
              ],
              "default": "all"
            }
          }
        ]
      },
      "x-yang-path": "/cipsSysCapacityGroup",
      "x-restconf-kind": "container"
    },
    "/data/CISCO-IPSEC-MIB:cipsTrapCntlGroup": {
      "get": {
        "summary": "Get cipsTrapCntlGroup data",
        "description": "Retrieve cipsTrapCntlGroup operational data from MIB",
        "tags": [
          "CISCO-IPSEC-MIB"
        ],
        "responses": {
          "200": {
            "description": "Success",
            "content": {
              "application/yang-data+json": {
                "schema": {
                  "type": "object",
                  "description": "This object defines the administrative state of \n          sending the IOS IPsec ISAKMP Policy Add trap.",
                  "properties": {
                    "cipsCntlIsakmpPolicyAdded": {
                      "type": "string",
                      "description": "This object defines the administrative state of \n          sending the IOS IPsec ISAKMP Policy Add trap.",
                      "x-yang-type": "CISCO-IPSEC-MIB:TrapStatus"
                    },
                    "cipsCntlIsakmpPolicyDeleted": {
                      "type": "string",
                      "description": "This object defines the administrative state of \n          sending the IOS IPsec ISAKMP Policy Delete trap.",
                      "x-yang-type": "CISCO-IPSEC-MIB:TrapStatus"
                    },
                    "cipsCntlCryptomapAdded": {
                      "type": "string",
                      "description": "This object defines the administrative state of \n          sending the IOS IPsec Cryptomap Add trap.",
                      "x-yang-type": "CISCO-IPSEC-MIB:TrapStatus"
                    },
                    "cipsCntlCryptomapDeleted": {
                      "type": "string",
                      "description": "This object defines the administrative state of \n          sending the IOS IPsec Cryptomap Delete trap.",
                      "x-yang-type": "CISCO-IPSEC-MIB:TrapStatus"
                    },
                    "cipsCntlCryptomapSetAttached": {
                      "type": "string",
                      "description": "This object defines the administrative state of \n          sending the IOS IPsec trap that is issued\n          when a cryptomap set is attached to an interface.",
                      "x-yang-type": "CISCO-IPSEC-MIB:TrapStatus"
                    },
                    "cipsCntlCryptomapSetDetached": {
                      "type": "string",
                      "description": "This object defines the administrative state of \n          sending the IOS IPsec trap that is issued\n          when a cryptomap set is detached from an interface.\n          to which it was earlier bound.",
                      "x-yang-type": "CISCO-IPSEC-MIB:TrapStatus"
                    },
                    "cipsCntlTooManySAs": {
                      "type": "string",
                      "description": "This object defines the administrative state of \n          sending the IOS IPsec trap that is issued\n          when the number of SAs crosses the maximum\n          number of SAs that may be supported on\n          the managed entity.",
                      "x-yang-type": "CISCO-IPSEC-MIB:TrapStatus"
                    }
                  }
                },
                "example": {
                  "CISCO-IPSEC-MIB:cipsTrapCntlGroup": {
                    "cipsCntlIsakmpPolicyAdded": "192.168.1.1",
                    "cipsCntlIsakmpPolicyDeleted": "192.168.1.1",
                    "cipsCntlCryptomapAdded": "192.168.1.1",
                    "cipsCntlCryptomapDeleted": "192.168.1.1",
                    "cipsCntlCryptomapSetAttached": "192.168.1.1",
                    "cipsCntlCryptomapSetDetached": "192.168.1.1",
                    "cipsCntlTooManySAs": "192.168.1.1"
                  }
                }
              }
            }
          },
          "403": {
            "description": "Forbidden — insufficient access rights (NACM)",
            "content": {
              "application/yang-data+json": {
                "schema": {
                  "$ref": "#/components/schemas/restconf-error"
                }
              }
            }
          }
        },
        "operationId": "get-cipsTrapCntlGroup",
        "parameters": [
          {
            "name": "Accept",
            "in": "header",
            "required": false,
            "description": "RESTCONF response media type (RFC 8040)",
            "schema": {
              "type": "string",
              "default": "application/yang-data+json",
              "enum": [
                "application/yang-data+json",
                "application/yang-data+xml"
              ]
            }
          },
          {
            "name": "depth",
            "in": "query",
            "required": false,
            "description": "Limit the depth of returned sub-tree data (RFC 8040 Section 4.8.2). Use 'unbounded' for full depth.",
            "schema": {
              "type": "string",
              "default": "unbounded"
            }
          },
          {
            "name": "fields",
            "in": "query",
            "required": false,
            "description": "Select specific fields to return (RFC 8040 Section 4.8.3). Example: fields=name;status",
            "schema": {
              "type": "string"
            }
          },
          {
            "name": "content",
            "in": "query",
            "required": false,
            "description": "Filter by config state: 'config' (config true only), 'nonconfig' (config false only), or 'all'.",
            "schema": {
              "type": "string",
              "enum": [
                "config",
                "nonconfig",
                "all"
              ],
              "default": "all"
            }
          }
        ]
      },
      "x-yang-path": "/cipsTrapCntlGroup",
      "x-restconf-kind": "container"
    },
    "/data/CISCO-IPSEC-MIB:cipsIsakmpPolicyTable": {
      "get": {
        "summary": "Get cipsIsakmpPolicyTable data",
        "description": "Retrieve cipsIsakmpPolicyTable operational data from MIB",
        "tags": [
          "CISCO-IPSEC-MIB"
        ],
        "responses": {
          "200": {
            "description": "Success",
            "content": {
              "application/yang-data+json": {
                "schema": {
                  "type": "object",
                  "description": "The table containing the list of all\n        ISAKMP policy entries configured by the operator.",
                  "properties": {
                    "cipsIsakmpPolicyEntry": {
                      "type": "array",
                      "description": "Each entry contains the attributes \n          associated with a single ISAKMP\n          Policy entry.",
                      "items": {
                        "type": "object",
                        "properties": {
                          "cipsIsakmpPolPriority": {
                            "type": "integer",
                            "description": "The priotity of this ISAKMP Policy entry.\n            This is also the index of this table.",
                            "minimum": -2147483648,
                            "maximum": 2147483647
                          },
                          "cipsIsakmpPolEncr": {
                            "type": "string",
                            "description": "The encryption transform specified by this \n            ISAKMP policy specification. The Internet Key Exchange\n            (IKE) tunnels setup using this policy item would\n            use the specified encryption transform to protect the\n            ISAKMP PDUs.",
                            "x-yang-type": "CISCO-IPSEC-MIB:EncryptAlgo"
                          },
                          "cipsIsakmpPolHash": {
                            "type": "string",
                            "description": "The hash transform specified by this \n            ISAKMP policy specification. The IKE tunnels\n            setup using this policy item would use the \n            specified hash transform to protect the\n            ISAKMP PDUs.",
                            "x-yang-type": "CISCO-IPSEC-MIB:IkeHashAlgo"
                          },
                          "cipsIsakmpPolAuth": {
                            "type": "string",
                            "description": "The peer authentication mthod specified by\n            this ISAKMP policy specification. If this policy\n            entity is selected for negotiation with a peer,\n            the local entity would authenticate the peer using \n            the method specified by this object.",
                            "x-yang-type": "CISCO-IPSEC-MIB:IkeAuthMethod"
                          },
                          "cipsIsakmpPolGroup": {
                            "type": "string",
                            "description": "This object specifies the Oakley group used \n            for Diffie Hellman exchange in the Main Mode. \n            If this policy item is selected to negotiate\n            Main Mode with an IKE peer, the local entity \n            chooses the group specified by this object to\n            perform Diffie Hellman exchange with the\n            peer.",
                            "x-yang-type": "CISCO-IPSEC-MIB:DiffHellmanGrp"
                          },
                          "cipsIsakmpPolLifetime": {
                            "type": "integer",
                            "description": "This object specifies the lifetime in seconds\n            of the IKE tunnels generated using this \n            policy specification.",
                            "minimum": -2147483648,
                            "maximum": 2147483647
                          }
                        }
                      }
                    }
                  }
                },
                "example": {
                  "CISCO-IPSEC-MIB:cipsIsakmpPolicyTable": {
                    "cipsIsakmpPolicyEntry": [
                      {
                        "cipsIsakmpPolPriority": -2147483648,
                        "cipsIsakmpPolEncr": "192.168.1.1",
                        "cipsIsakmpPolHash": "192.168.1.1",
                        "cipsIsakmpPolAuth": "192.168.1.1",
                        "cipsIsakmpPolGroup": "192.168.1.1",
                        "cipsIsakmpPolLifetime": -2147483648
                      },
                      {
                        "cipsIsakmpPolPriority": -2147483648,
                        "cipsIsakmpPolEncr": "192.168.1.1",
                        "cipsIsakmpPolHash": "192.168.1.1",
                        "cipsIsakmpPolAuth": "192.168.1.1",
                        "cipsIsakmpPolGroup": "192.168.1.1",
                        "cipsIsakmpPolLifetime": -2147483648
                      },
                      {
                        "cipsIsakmpPolPriority": -2147483648,
                        "cipsIsakmpPolEncr": "192.168.1.1",
                        "cipsIsakmpPolHash": "192.168.1.1",
                        "cipsIsakmpPolAuth": "192.168.1.1",
                        "cipsIsakmpPolGroup": "192.168.1.1",
                        "cipsIsakmpPolLifetime": -2147483648
                      }
                    ]
                  }
                }
              }
            }
          },
          "403": {
            "description": "Forbidden — insufficient access rights (NACM)",
            "content": {
              "application/yang-data+json": {
                "schema": {
                  "$ref": "#/components/schemas/restconf-error"
                }
              }
            }
          }
        },
        "operationId": "get-cipsIsakmpPolicyTable",
        "parameters": [
          {
            "name": "Accept",
            "in": "header",
            "required": false,
            "description": "RESTCONF response media type (RFC 8040)",
            "schema": {
              "type": "string",
              "default": "application/yang-data+json",
              "enum": [
                "application/yang-data+json",
                "application/yang-data+xml"
              ]
            }
          },
          {
            "name": "depth",
            "in": "query",
            "required": false,
            "description": "Limit the depth of returned sub-tree data (RFC 8040 Section 4.8.2). Use 'unbounded' for full depth.",
            "schema": {
              "type": "string",
              "default": "unbounded"
            }
          },
          {
            "name": "fields",
            "in": "query",
            "required": false,
            "description": "Select specific fields to return (RFC 8040 Section 4.8.3). Example: fields=name;status",
            "schema": {
              "type": "string"
            }
          },
          {
            "name": "content",
            "in": "query",
            "required": false,
            "description": "Filter by config state: 'config' (config true only), 'nonconfig' (config false only), or 'all'.",
            "schema": {
              "type": "string",
              "enum": [
                "config",
                "nonconfig",
                "all"
              ],
              "default": "all"
            }
          }
        ]
      },
      "x-yang-path": "/cipsIsakmpPolicyTable",
      "x-restconf-kind": "container"
    },
    "/data/CISCO-IPSEC-MIB:cipsIsakmpPolicyTable/cipsIsakmpPolicyEntry": {
      "get": {
        "summary": "Get cipsIsakmpPolicyEntry list",
        "description": "Retrieve list of cipsIsakmpPolicyEntry entries from MIB",
        "tags": [
          "CISCO-IPSEC-MIB"
        ],
        "responses": {
          "200": {
            "description": "Success",
            "content": {
              "application/yang-data+json": {
                "schema": {
                  "type": "array",
                  "description": "Each entry contains the attributes \n          associated with a single ISAKMP\n          Policy entry.",
                  "items": {
                    "type": "object",
                    "properties": {
                      "cipsIsakmpPolPriority": {
                        "type": "integer",
                        "description": "The priotity of this ISAKMP Policy entry.\n            This is also the index of this table.",
                        "minimum": -2147483648,
                        "maximum": 2147483647
                      },
                      "cipsIsakmpPolEncr": {
                        "type": "string",
                        "description": "The encryption transform specified by this \n            ISAKMP policy specification. The Internet Key Exchange\n            (IKE) tunnels setup using this policy item would\n            use the specified encryption transform to protect the\n            ISAKMP PDUs.",
                        "x-yang-type": "CISCO-IPSEC-MIB:EncryptAlgo"
                      },
                      "cipsIsakmpPolHash": {
                        "type": "string",
                        "description": "The hash transform specified by this \n            ISAKMP policy specification. The IKE tunnels\n            setup using this policy item would use the \n            specified hash transform to protect the\n            ISAKMP PDUs.",
                        "x-yang-type": "CISCO-IPSEC-MIB:IkeHashAlgo"
                      },
                      "cipsIsakmpPolAuth": {
                        "type": "string",
                        "description": "The peer authentication mthod specified by\n            this ISAKMP policy specification. If this policy\n            entity is selected for negotiation with a peer,\n            the local entity would authenticate the peer using \n            the method specified by this object.",
                        "x-yang-type": "CISCO-IPSEC-MIB:IkeAuthMethod"
                      },
                      "cipsIsakmpPolGroup": {
                        "type": "string",
                        "description": "This object specifies the Oakley group used \n            for Diffie Hellman exchange in the Main Mode. \n            If this policy item is selected to negotiate\n            Main Mode with an IKE peer, the local entity \n            chooses the group specified by this object to\n            perform Diffie Hellman exchange with the\n            peer.",
                        "x-yang-type": "CISCO-IPSEC-MIB:DiffHellmanGrp"
                      },
                      "cipsIsakmpPolLifetime": {
                        "type": "integer",
                        "description": "This object specifies the lifetime in seconds\n            of the IKE tunnels generated using this \n            policy specification.",
                        "minimum": -2147483648,
                        "maximum": 2147483647
                      }
                    }
                  }
                },
                "example": {
                  "CISCO-IPSEC-MIB:cipsIsakmpPolicyEntry": [
                    {
                      "cipsIsakmpPolPriority": -2147483648,
                      "cipsIsakmpPolEncr": "192.168.1.1",
                      "cipsIsakmpPolHash": "192.168.1.1",
                      "cipsIsakmpPolAuth": "192.168.1.1",
                      "cipsIsakmpPolGroup": "192.168.1.1",
                      "cipsIsakmpPolLifetime": -2147483648
                    }
                  ]
                }
              }
            }
          },
          "403": {
            "description": "Forbidden — insufficient access rights (NACM)",
            "content": {
              "application/yang-data+json": {
                "schema": {
                  "$ref": "#/components/schemas/restconf-error"
                }
              }
            }
          }
        },
        "operationId": "get-cipsIsakmpPolicyEntry",
        "parameters": [
          {
            "name": "Accept",
            "in": "header",
            "required": false,
            "description": "RESTCONF response media type (RFC 8040)",
            "schema": {
              "type": "string",
              "default": "application/yang-data+json",
              "enum": [
                "application/yang-data+json",
                "application/yang-data+xml"
              ]
            }
          },
          {
            "name": "depth",
            "in": "query",
            "required": false,
            "description": "Limit the depth of returned sub-tree data (RFC 8040 Section 4.8.2). Use 'unbounded' for full depth.",
            "schema": {
              "type": "string",
              "default": "unbounded"
            }
          },
          {
            "name": "fields",
            "in": "query",
            "required": false,
            "description": "Select specific fields to return (RFC 8040 Section 4.8.3). Example: fields=name;status",
            "schema": {
              "type": "string"
            }
          },
          {
            "name": "content",
            "in": "query",
            "required": false,
            "description": "Filter by config state: 'config' (config true only), 'nonconfig' (config false only), or 'all'.",
            "schema": {
              "type": "string",
              "enum": [
                "config",
                "nonconfig",
                "all"
              ],
              "default": "all"
            }
          }
        ]
      },
      "x-yang-path": "/cipsIsakmpPolicyTable/cipsIsakmpPolicyEntry",
      "x-restconf-kind": "container"
    },
    "/data/CISCO-IPSEC-MIB:cipsIsakmpPolicyTable/cipsIsakmpPolicyEntry={cipsIsakmpPolPriority}": {
      "get": {
        "summary": "Get cipsIsakmpPolicyEntry entry",
        "description": "Retrieve specific cipsIsakmpPolicyEntry entry by key from MIB",
        "tags": [
          "CISCO-IPSEC-MIB"
        ],
        "parameters": [
          {
            "name": "cipsIsakmpPolPriority",
            "in": "path",
            "required": true,
            "schema": {
              "type": "string"
            },
            "example": "1"
          },
          {
            "name": "Accept",
            "in": "header",
            "required": false,
            "description": "RESTCONF response media type (RFC 8040)",
            "schema": {
              "type": "string",
              "default": "application/yang-data+json",
              "enum": [
                "application/yang-data+json",
                "application/yang-data+xml"
              ]
            }
          },
          {
            "name": "depth",
            "in": "query",
            "required": false,
            "description": "Limit the depth of returned sub-tree data (RFC 8040 Section 4.8.2). Use 'unbounded' for full depth.",
            "schema": {
              "type": "string",
              "default": "unbounded"
            }
          },
          {
            "name": "fields",
            "in": "query",
            "required": false,
            "description": "Select specific fields to return (RFC 8040 Section 4.8.3). Example: fields=name;status",
            "schema": {
              "type": "string"
            }
          },
          {
            "name": "content",
            "in": "query",
            "required": false,
            "description": "Filter by config state: 'config' (config true only), 'nonconfig' (config false only), or 'all'.",
            "schema": {
              "type": "string",
              "enum": [
                "config",
                "nonconfig",
                "all"
              ],
              "default": "all"
            }
          }
        ],
        "responses": {
          "200": {
            "description": "Success",
            "content": {
              "application/yang-data+json": {
                "schema": {
                  "type": "object",
                  "properties": {
                    "cipsIsakmpPolPriority": {
                      "type": "integer",
                      "description": "The priotity of this ISAKMP Policy entry.\n            This is also the index of this table.",
                      "minimum": -2147483648,
                      "maximum": 2147483647
                    },
                    "cipsIsakmpPolEncr": {
                      "type": "string",
                      "description": "The encryption transform specified by this \n            ISAKMP policy specification. The Internet Key Exchange\n            (IKE) tunnels setup using this policy item would\n            use the specified encryption transform to protect the\n            ISAKMP PDUs.",
                      "x-yang-type": "CISCO-IPSEC-MIB:EncryptAlgo"
                    },
                    "cipsIsakmpPolHash": {
                      "type": "string",
                      "description": "The hash transform specified by this \n            ISAKMP policy specification. The IKE tunnels\n            setup using this policy item would use the \n            specified hash transform to protect the\n            ISAKMP PDUs.",
                      "x-yang-type": "CISCO-IPSEC-MIB:IkeHashAlgo"
                    },
                    "cipsIsakmpPolAuth": {
                      "type": "string",
                      "description": "The peer authentication mthod specified by\n            this ISAKMP policy specification. If this policy\n            entity is selected for negotiation with a peer,\n            the local entity would authenticate the peer using \n            the method specified by this object.",
                      "x-yang-type": "CISCO-IPSEC-MIB:IkeAuthMethod"
                    },
                    "cipsIsakmpPolGroup": {
                      "type": "string",
                      "description": "This object specifies the Oakley group used \n            for Diffie Hellman exchange in the Main Mode. \n            If this policy item is selected to negotiate\n            Main Mode with an IKE peer, the local entity \n            chooses the group specified by this object to\n            perform Diffie Hellman exchange with the\n            peer.",
                      "x-yang-type": "CISCO-IPSEC-MIB:DiffHellmanGrp"
                    },
                    "cipsIsakmpPolLifetime": {
                      "type": "integer",
                      "description": "This object specifies the lifetime in seconds\n            of the IKE tunnels generated using this \n            policy specification.",
                      "minimum": -2147483648,
                      "maximum": 2147483647
                    }
                  }
                },
                "example": {
                  "CISCO-IPSEC-MIB:cipsIsakmpPolicyEntry": {
                    "cipsIsakmpPolPriority": -2147483648,
                    "cipsIsakmpPolEncr": "192.168.1.1",
                    "cipsIsakmpPolHash": "192.168.1.1",
                    "cipsIsakmpPolAuth": "192.168.1.1",
                    "cipsIsakmpPolGroup": "192.168.1.1",
                    "cipsIsakmpPolLifetime": -2147483648
                  }
                }
              }
            }
          },
          "403": {
            "description": "Forbidden — insufficient access rights (NACM)",
            "content": {
              "application/yang-data+json": {
                "schema": {
                  "$ref": "#/components/schemas/restconf-error"
                }
              }
            }
          }
        },
        "operationId": "get-cipsIsakmpPolicyEntry-2"
      },
      "x-yang-path": "/cipsIsakmpPolicyTable/cipsIsakmpPolicyEntry={cipsIsakmpPolPriority}",
      "x-restconf-kind": "list-instance",
      "x-list-keys": [
        "cipsIsakmpPolPriority"
      ]
    },
    "/data/CISCO-IPSEC-MIB:cipsStaticCryptomapSetTable": {
      "get": {
        "summary": "Get cipsStaticCryptomapSetTable data",
        "description": "Retrieve cipsStaticCryptomapSetTable operational data from MIB",
        "tags": [
          "CISCO-IPSEC-MIB"
        ],
        "responses": {
          "200": {
            "description": "Success",
            "content": {
              "application/yang-data+json": {
                "schema": {
                  "type": "object",
                  "description": "The table containing the list of all\n        cryptomap sets that are fully specified\n        and are not wild-carded.\n        \n        The operator may include different types of\n        cryptomaps in such a set - manual, CET,\n        ISAKMP or dynamic.",
                  "properties": {
                    "cipsStaticCryptomapSetEntry": {
                      "type": "array",
                      "description": "Each entry contains the attributes \n          associated with a single static \n          cryptomap set.",
                      "items": {
                        "type": "object",
                        "properties": {
                          "cipsStaticCryptomapSetName": {
                            "type": "string",
                            "description": "The index of the static cryptomap table. The value \n            of the string is the name string assigned by the \n            operator in defining the cryptomap set.",
                            "x-yang-type": "snmpv2-tc:DisplayString"
                          },
                          "cipsStaticCryptomapSetSize": {
                            "type": "integer",
                            "description": "The total number of cryptomap entries contained in\n            this cryptomap set.",
                            "minimum": 0,
                            "maximum": 4294967295
                          },
                          "cipsStaticCryptomapSetNumIsakmp": {
                            "type": "integer",
                            "description": "The number of cryptomaps associated with this \n            cryptomap set that use ISAKMP protocol to do key\n            exchange.",
                            "minimum": 0,
                            "maximum": 4294967295
                          },
                          "cipsStaticCryptomapSetNumManual": {
                            "type": "integer",
                            "description": "The number of cryptomaps associated with this \n            cryptomap set that require the operator to manually\n            setup the keys and SPIs.",
                            "minimum": 0,
                            "maximum": 4294967295
                          },
                          "cipsStaticCryptomapSetNumCET": {
                            "type": "integer",
                            "description": "The number of cryptomaps of type 'ipsec-cisco' \n            associated with this cryptomap set. Such\n            cryptomap elements implement Cisco Encryption Technology\n            based Virtual Private Networks.",
                            "minimum": 0,
                            "maximum": 4294967295
                          },
                          "cipsStaticCryptomapSetNumDynamic": {
                            "type": "integer",
                            "description": "The number of dynamic cryptomap templates\n            linked to this cryptomap set.",
                            "minimum": 0,
                            "maximum": 4294967295
                          },
                          "cipsStaticCryptomapSetNumDisc": {
                            "type": "integer",
                            "description": "The number of dynamic cryptomap templates\n            linked to this cryptomap set that have Tunnel Endpoint\n            Discovery (TED) enabled.",
                            "minimum": 0,
                            "maximum": 4294967295
                          },
                          "cipsStaticCryptomapSetNumSAs": {
                            "type": "integer",
                            "description": "The number of and IPsec Security Associations\n            that are active and were setup using this cryptomap.",
                            "minimum": 0,
                            "maximum": 4294967295
                          }
                        }
                      }
                    }
                  }
                },
                "example": {
                  "CISCO-IPSEC-MIB:cipsStaticCryptomapSetTable": {
                    "cipsStaticCryptomapSetEntry": [
                      {
                        "cipsStaticCryptomapSetName": "192.168.1.1",
                        "cipsStaticCryptomapSetSize": 0,
                        "cipsStaticCryptomapSetNumIsakmp": 0,
                        "cipsStaticCryptomapSetNumManual": 0,
                        "cipsStaticCryptomapSetNumCET": 0,
                        "cipsStaticCryptomapSetNumDynamic": 0,
                        "cipsStaticCryptomapSetNumDisc": 0,
                        "cipsStaticCryptomapSetNumSAs": 0
                      },
                      {
                        "cipsStaticCryptomapSetName": "192.168.1.1",
                        "cipsStaticCryptomapSetSize": 0,
                        "cipsStaticCryptomapSetNumIsakmp": 0,
                        "cipsStaticCryptomapSetNumManual": 0,
                        "cipsStaticCryptomapSetNumCET": 0,
                        "cipsStaticCryptomapSetNumDynamic": 0,
                        "cipsStaticCryptomapSetNumDisc": 0,
                        "cipsStaticCryptomapSetNumSAs": 0
                      },
                      {
                        "cipsStaticCryptomapSetName": "192.168.1.1",
                        "cipsStaticCryptomapSetSize": 0,
                        "cipsStaticCryptomapSetNumIsakmp": 0,
                        "cipsStaticCryptomapSetNumManual": 0,
                        "cipsStaticCryptomapSetNumCET": 0,
                        "cipsStaticCryptomapSetNumDynamic": 0,
                        "cipsStaticCryptomapSetNumDisc": 0,
                        "cipsStaticCryptomapSetNumSAs": 0
                      }
                    ]
                  }
                }
              }
            }
          },
          "403": {
            "description": "Forbidden — insufficient access rights (NACM)",
            "content": {
              "application/yang-data+json": {
                "schema": {
                  "$ref": "#/components/schemas/restconf-error"
                }
              }
            }
          }
        },
        "operationId": "get-cipsStaticCryptomapSetTable",
        "parameters": [
          {
            "name": "Accept",
            "in": "header",
            "required": false,
            "description": "RESTCONF response media type (RFC 8040)",
            "schema": {
              "type": "string",
              "default": "application/yang-data+json",
              "enum": [
                "application/yang-data+json",
                "application/yang-data+xml"
              ]
            }
          },
          {
            "name": "depth",
            "in": "query",
            "required": false,
            "description": "Limit the depth of returned sub-tree data (RFC 8040 Section 4.8.2). Use 'unbounded' for full depth.",
            "schema": {
              "type": "string",
              "default": "unbounded"
            }
          },
          {
            "name": "fields",
            "in": "query",
            "required": false,
            "description": "Select specific fields to return (RFC 8040 Section 4.8.3). Example: fields=name;status",
            "schema": {
              "type": "string"
            }
          },
          {
            "name": "content",
            "in": "query",
            "required": false,
            "description": "Filter by config state: 'config' (config true only), 'nonconfig' (config false only), or 'all'.",
            "schema": {
              "type": "string",
              "enum": [
                "config",
                "nonconfig",
                "all"
              ],
              "default": "all"
            }
          }
        ]
      },
      "x-yang-path": "/cipsStaticCryptomapSetTable",
      "x-restconf-kind": "container"
    },
    "/data/CISCO-IPSEC-MIB:cipsStaticCryptomapSetTable/cipsStaticCryptomapSetEntry": {
      "get": {
        "summary": "Get cipsStaticCryptomapSetEntry list",
        "description": "Retrieve list of cipsStaticCryptomapSetEntry entries from MIB",
        "tags": [
          "CISCO-IPSEC-MIB"
        ],
        "responses": {
          "200": {
            "description": "Success",
            "content": {
              "application/yang-data+json": {
                "schema": {
                  "type": "array",
                  "description": "Each entry contains the attributes \n          associated with a single static \n          cryptomap set.",
                  "items": {
                    "type": "object",
                    "properties": {
                      "cipsStaticCryptomapSetName": {
                        "type": "string",
                        "description": "The index of the static cryptomap table. The value \n            of the string is the name string assigned by the \n            operator in defining the cryptomap set.",
                        "x-yang-type": "snmpv2-tc:DisplayString"
                      },
                      "cipsStaticCryptomapSetSize": {
                        "type": "integer",
                        "description": "The total number of cryptomap entries contained in\n            this cryptomap set.",
                        "minimum": 0,
                        "maximum": 4294967295
                      },
                      "cipsStaticCryptomapSetNumIsakmp": {
                        "type": "integer",
                        "description": "The number of cryptomaps associated with this \n            cryptomap set that use ISAKMP protocol to do key\n            exchange.",
                        "minimum": 0,
                        "maximum": 4294967295
                      },
                      "cipsStaticCryptomapSetNumManual": {
                        "type": "integer",
                        "description": "The number of cryptomaps associated with this \n            cryptomap set that require the operator to manually\n            setup the keys and SPIs.",
                        "minimum": 0,
                        "maximum": 4294967295
                      },
                      "cipsStaticCryptomapSetNumCET": {
                        "type": "integer",
                        "description": "The number of cryptomaps of type 'ipsec-cisco' \n            associated with this cryptomap set. Such\n            cryptomap elements implement Cisco Encryption Technology\n            based Virtual Private Networks.",
                        "minimum": 0,
                        "maximum": 4294967295
                      },
                      "cipsStaticCryptomapSetNumDynamic": {
                        "type": "integer",
                        "description": "The number of dynamic cryptomap templates\n            linked to this cryptomap set.",
                        "minimum": 0,
                        "maximum": 4294967295
                      },
                      "cipsStaticCryptomapSetNumDisc": {
                        "type": "integer",
                        "description": "The number of dynamic cryptomap templates\n            linked to this cryptomap set that have Tunnel Endpoint\n            Discovery (TED) enabled.",
                        "minimum": 0,
                        "maximum": 4294967295
                      },
                      "cipsStaticCryptomapSetNumSAs": {
                        "type": "integer",
                        "description": "The number of and IPsec Security Associations\n            that are active and were setup using this cryptomap.",
                        "minimum": 0,
                        "maximum": 4294967295
                      }
                    }
                  }
                },
                "example": {
                  "CISCO-IPSEC-MIB:cipsStaticCryptomapSetEntry": [
                    {
                      "cipsStaticCryptomapSetName": "192.168.1.1",
                      "cipsStaticCryptomapSetSize": 0,
                      "cipsStaticCryptomapSetNumIsakmp": 0,
                      "cipsStaticCryptomapSetNumManual": 0,
                      "cipsStaticCryptomapSetNumCET": 0,
                      "cipsStaticCryptomapSetNumDynamic": 0,
                      "cipsStaticCryptomapSetNumDisc": 0,
                      "cipsStaticCryptomapSetNumSAs": 0
                    }
                  ]
                }
              }
            }
          },
          "403": {
            "description": "Forbidden — insufficient access rights (NACM)",
            "content": {
              "application/yang-data+json": {
                "schema": {
                  "$ref": "#/components/schemas/restconf-error"
                }
              }
            }
          }
        },
        "operationId": "get-cipsStaticCryptomapSetEntry",
        "parameters": [
          {
            "name": "Accept",
            "in": "header",
            "required": false,
            "description": "RESTCONF response media type (RFC 8040)",
            "schema": {
              "type": "string",
              "default": "application/yang-data+json",
              "enum": [
                "application/yang-data+json",
                "application/yang-data+xml"
              ]
            }
          },
          {
            "name": "depth",
            "in": "query",
            "required": false,
            "description": "Limit the depth of returned sub-tree data (RFC 8040 Section 4.8.2). Use 'unbounded' for full depth.",
            "schema": {
              "type": "string",
              "default": "unbounded"
            }
          },
          {
            "name": "fields",
            "in": "query",
            "required": false,
            "description": "Select specific fields to return (RFC 8040 Section 4.8.3). Example: fields=name;status",
            "schema": {
              "type": "string"
            }
          },
          {
            "name": "content",
            "in": "query",
            "required": false,
            "description": "Filter by config state: 'config' (config true only), 'nonconfig' (config false only), or 'all'.",
            "schema": {
              "type": "string",
              "enum": [
                "config",
                "nonconfig",
                "all"
              ],
              "default": "all"
            }
          }
        ]
      },
      "x-yang-path": "/cipsStaticCryptomapSetTable/cipsStaticCryptomapSetEntry",
      "x-restconf-kind": "container"
    },
    "/data/CISCO-IPSEC-MIB:cipsStaticCryptomapSetTable/cipsStaticCryptomapSetEntry={cipsStaticCryptomapSetName}": {
      "get": {
        "summary": "Get cipsStaticCryptomapSetEntry entry",
        "description": "Retrieve specific cipsStaticCryptomapSetEntry entry by key from MIB",
        "tags": [
          "CISCO-IPSEC-MIB"
        ],
        "parameters": [
          {
            "name": "cipsStaticCryptomapSetName",
            "in": "path",
            "required": true,
            "schema": {
              "type": "string"
            },
            "example": "1"
          },
          {
            "name": "Accept",
            "in": "header",
            "required": false,
            "description": "RESTCONF response media type (RFC 8040)",
            "schema": {
              "type": "string",
              "default": "application/yang-data+json",
              "enum": [
                "application/yang-data+json",
                "application/yang-data+xml"
              ]
            }
          },
          {
            "name": "depth",
            "in": "query",
            "required": false,
            "description": "Limit the depth of returned sub-tree data (RFC 8040 Section 4.8.2). Use 'unbounded' for full depth.",
            "schema": {
              "type": "string",
              "default": "unbounded"
            }
          },
          {
            "name": "fields",
            "in": "query",
            "required": false,
            "description": "Select specific fields to return (RFC 8040 Section 4.8.3). Example: fields=name;status",
            "schema": {
              "type": "string"
            }
          },
          {
            "name": "content",
            "in": "query",
            "required": false,
            "description": "Filter by config state: 'config' (config true only), 'nonconfig' (config false only), or 'all'.",
            "schema": {
              "type": "string",
              "enum": [
                "config",
                "nonconfig",
                "all"
              ],
              "default": "all"
            }
          }
        ],
        "responses": {
          "200": {
            "description": "Success",
            "content": {
              "application/yang-data+json": {
                "schema": {
                  "type": "object",
                  "properties": {
                    "cipsStaticCryptomapSetName": {
                      "type": "string",
                      "description": "The index of the static cryptomap table. The value \n            of the string is the name string assigned by the \n            operator in defining the cryptomap set.",
                      "x-yang-type": "snmpv2-tc:DisplayString"
                    },
                    "cipsStaticCryptomapSetSize": {
                      "type": "integer",
                      "description": "The total number of cryptomap entries contained in\n            this cryptomap set.",
                      "minimum": 0,
                      "maximum": 4294967295
                    },
                    "cipsStaticCryptomapSetNumIsakmp": {
                      "type": "integer",
                      "description": "The number of cryptomaps associated with this \n            cryptomap set that use ISAKMP protocol to do key\n            exchange.",
                      "minimum": 0,
                      "maximum": 4294967295
                    },
                    "cipsStaticCryptomapSetNumManual": {
                      "type": "integer",
                      "description": "The number of cryptomaps associated with this \n            cryptomap set that require the operator to manually\n            setup the keys and SPIs.",
                      "minimum": 0,
                      "maximum": 4294967295
                    },
                    "cipsStaticCryptomapSetNumCET": {
                      "type": "integer",
                      "description": "The number of cryptomaps of type 'ipsec-cisco' \n            associated with this cryptomap set. Such\n            cryptomap elements implement Cisco Encryption Technology\n            based Virtual Private Networks.",
                      "minimum": 0,
                      "maximum": 4294967295
                    },
                    "cipsStaticCryptomapSetNumDynamic": {
                      "type": "integer",
                      "description": "The number of dynamic cryptomap templates\n            linked to this cryptomap set.",
                      "minimum": 0,
                      "maximum": 4294967295
                    },
                    "cipsStaticCryptomapSetNumDisc": {
                      "type": "integer",
                      "description": "The number of dynamic cryptomap templates\n            linked to this cryptomap set that have Tunnel Endpoint\n            Discovery (TED) enabled.",
                      "minimum": 0,
                      "maximum": 4294967295
                    },
                    "cipsStaticCryptomapSetNumSAs": {
                      "type": "integer",
                      "description": "The number of and IPsec Security Associations\n            that are active and were setup using this cryptomap.",
                      "minimum": 0,
                      "maximum": 4294967295
                    }
                  }
                },
                "example": {
                  "CISCO-IPSEC-MIB:cipsStaticCryptomapSetEntry": {
                    "cipsStaticCryptomapSetName": "192.168.1.1",
                    "cipsStaticCryptomapSetSize": 0,
                    "cipsStaticCryptomapSetNumIsakmp": 0,
                    "cipsStaticCryptomapSetNumManual": 0,
                    "cipsStaticCryptomapSetNumCET": 0,
                    "cipsStaticCryptomapSetNumDynamic": 0,
                    "cipsStaticCryptomapSetNumDisc": 0,
                    "cipsStaticCryptomapSetNumSAs": 0
                  }
                }
              }
            }
          },
          "403": {
            "description": "Forbidden — insufficient access rights (NACM)",
            "content": {
              "application/yang-data+json": {
                "schema": {
                  "$ref": "#/components/schemas/restconf-error"
                }
              }
            }
          }
        },
        "operationId": "get-cipsStaticCryptomapSetEntry-2"
      },
      "x-yang-path": "/cipsStaticCryptomapSetTable/cipsStaticCryptomapSetEntry={cipsStaticCryptomapSetName}",
      "x-restconf-kind": "list-instance",
      "x-list-keys": [
        "cipsStaticCryptomapSetName"
      ]
    },
    "/data/CISCO-IPSEC-MIB:cipsDynamicCryptomapSetTable": {
      "get": {
        "summary": "Get cipsDynamicCryptomapSetTable data",
        "description": "Retrieve cipsDynamicCryptomapSetTable operational data from MIB",
        "tags": [
          "CISCO-IPSEC-MIB"
        ],
        "responses": {
          "200": {
            "description": "Success",
            "content": {
              "application/yang-data+json": {
                "schema": {
                  "type": "object",
                  "description": "The table containing the list of all dynamic\n        cryptomaps that use IKE, defined on \n         the managed entity.",
                  "properties": {
                    "cipsDynamicCryptomapSetEntry": {
                      "type": "array",
                      "description": "Each entry contains the attributes associated\n          with a single dynamic cryptomap template.",
                      "items": {
                        "type": "object",
                        "properties": {
                          "cipsDynamicCryptomapSetName": {
                            "type": "string",
                            "description": "The index of the dynamic cryptomap table. \n            The value of the string is the one assigned \n            by the operator in defining the cryptomap set.",
                            "x-yang-type": "snmpv2-tc:DisplayString"
                          },
                          "cipsDynamicCryptomapSetSize": {
                            "type": "integer",
                            "description": "The number of cryptomap entries in this cryptomap.",
                            "minimum": 0,
                            "maximum": 4294967295
                          },
                          "cipsDynamicCryptomapSetNumAssoc": {
                            "type": "integer",
                            "description": "The number of static cryptomap sets with which\n            this dynamic cryptomap is associated.",
                            "minimum": 0,
                            "maximum": 4294967295
                          }
                        }
                      }
                    }
                  }
                },
                "example": {
                  "CISCO-IPSEC-MIB:cipsDynamicCryptomapSetTable": {
                    "cipsDynamicCryptomapSetEntry": [
                      {
                        "cipsDynamicCryptomapSetName": "192.168.1.1",
                        "cipsDynamicCryptomapSetSize": 0,
                        "cipsDynamicCryptomapSetNumAssoc": 0
                      },
                      {
                        "cipsDynamicCryptomapSetName": "192.168.1.1",
                        "cipsDynamicCryptomapSetSize": 0,
                        "cipsDynamicCryptomapSetNumAssoc": 0
                      },
                      {
                        "cipsDynamicCryptomapSetName": "192.168.1.1",
                        "cipsDynamicCryptomapSetSize": 0,
                        "cipsDynamicCryptomapSetNumAssoc": 0
                      }
                    ]
                  }
                }
              }
            }
          },
          "403": {
            "description": "Forbidden — insufficient access rights (NACM)",
            "content": {
              "application/yang-data+json": {
                "schema": {
                  "$ref": "#/components/schemas/restconf-error"
                }
              }
            }
          }
        },
        "operationId": "get-cipsDynamicCryptomapSetTable",
        "parameters": [
          {
            "name": "Accept",
            "in": "header",
            "required": false,
            "description": "RESTCONF response media type (RFC 8040)",
            "schema": {
              "type": "string",
              "default": "application/yang-data+json",
              "enum": [
                "application/yang-data+json",
                "application/yang-data+xml"
              ]
            }
          },
          {
            "name": "depth",
            "in": "query",
            "required": false,
            "description": "Limit the depth of returned sub-tree data (RFC 8040 Section 4.8.2). Use 'unbounded' for full depth.",
            "schema": {
              "type": "string",
              "default": "unbounded"
            }
          },
          {
            "name": "fields",
            "in": "query",
            "required": false,
            "description": "Select specific fields to return (RFC 8040 Section 4.8.3). Example: fields=name;status",
            "schema": {
              "type": "string"
            }
          },
          {
            "name": "content",
            "in": "query",
            "required": false,
            "description": "Filter by config state: 'config' (config true only), 'nonconfig' (config false only), or 'all'.",
            "schema": {
              "type": "string",
              "enum": [
                "config",
                "nonconfig",
                "all"
              ],
              "default": "all"
            }
          }
        ]
      },
      "x-yang-path": "/cipsDynamicCryptomapSetTable",
      "x-restconf-kind": "container"
    },
    "/data/CISCO-IPSEC-MIB:cipsDynamicCryptomapSetTable/cipsDynamicCryptomapSetEntry": {
      "get": {
        "summary": "Get cipsDynamicCryptomapSetEntry list",
        "description": "Retrieve list of cipsDynamicCryptomapSetEntry entries from MIB",
        "tags": [
          "CISCO-IPSEC-MIB"
        ],
        "responses": {
          "200": {
            "description": "Success",
            "content": {
              "application/yang-data+json": {
                "schema": {
                  "type": "array",
                  "description": "Each entry contains the attributes associated\n          with a single dynamic cryptomap template.",
                  "items": {
                    "type": "object",
                    "properties": {
                      "cipsDynamicCryptomapSetName": {
                        "type": "string",
                        "description": "The index of the dynamic cryptomap table. \n            The value of the string is the one assigned \n            by the operator in defining the cryptomap set.",
                        "x-yang-type": "snmpv2-tc:DisplayString"
                      },
                      "cipsDynamicCryptomapSetSize": {
                        "type": "integer",
                        "description": "The number of cryptomap entries in this cryptomap.",
                        "minimum": 0,
                        "maximum": 4294967295
                      },
                      "cipsDynamicCryptomapSetNumAssoc": {
                        "type": "integer",
                        "description": "The number of static cryptomap sets with which\n            this dynamic cryptomap is associated.",
                        "minimum": 0,
                        "maximum": 4294967295
                      }
                    }
                  }
                },
                "example": {
                  "CISCO-IPSEC-MIB:cipsDynamicCryptomapSetEntry": [
                    {
                      "cipsDynamicCryptomapSetName": "192.168.1.1",
                      "cipsDynamicCryptomapSetSize": 0,
                      "cipsDynamicCryptomapSetNumAssoc": 0
                    }
                  ]
                }
              }
            }
          },
          "403": {
            "description": "Forbidden — insufficient access rights (NACM)",
            "content": {
              "application/yang-data+json": {
                "schema": {
                  "$ref": "#/components/schemas/restconf-error"
                }
              }
            }
          }
        },
        "operationId": "get-cipsDynamicCryptomapSetEntry",
        "parameters": [
          {
            "name": "Accept",
            "in": "header",
            "required": false,
            "description": "RESTCONF response media type (RFC 8040)",
            "schema": {
              "type": "string",
              "default": "application/yang-data+json",
              "enum": [
                "application/yang-data+json",
                "application/yang-data+xml"
              ]
            }
          },
          {
            "name": "depth",
            "in": "query",
            "required": false,
            "description": "Limit the depth of returned sub-tree data (RFC 8040 Section 4.8.2). Use 'unbounded' for full depth.",
            "schema": {
              "type": "string",
              "default": "unbounded"
            }
          },
          {
            "name": "fields",
            "in": "query",
            "required": false,
            "description": "Select specific fields to return (RFC 8040 Section 4.8.3). Example: fields=name;status",
            "schema": {
              "type": "string"
            }
          },
          {
            "name": "content",
            "in": "query",
            "required": false,
            "description": "Filter by config state: 'config' (config true only), 'nonconfig' (config false only), or 'all'.",
            "schema": {
              "type": "string",
              "enum": [
                "config",
                "nonconfig",
                "all"
              ],
              "default": "all"
            }
          }
        ]
      },
      "x-yang-path": "/cipsDynamicCryptomapSetTable/cipsDynamicCryptomapSetEntry",
      "x-restconf-kind": "container"
    },
    "/data/CISCO-IPSEC-MIB:cipsDynamicCryptomapSetTable/cipsDynamicCryptomapSetEntry={cipsDynamicCryptomapSetName}": {
      "get": {
        "summary": "Get cipsDynamicCryptomapSetEntry entry",
        "description": "Retrieve specific cipsDynamicCryptomapSetEntry entry by key from MIB",
        "tags": [
          "CISCO-IPSEC-MIB"
        ],
        "parameters": [
          {
            "name": "cipsDynamicCryptomapSetName",
            "in": "path",
            "required": true,
            "schema": {
              "type": "string"
            },
            "example": "1"
          },
          {
            "name": "Accept",
            "in": "header",
            "required": false,
            "description": "RESTCONF response media type (RFC 8040)",
            "schema": {
              "type": "string",
              "default": "application/yang-data+json",
              "enum": [
                "application/yang-data+json",
                "application/yang-data+xml"
              ]
            }
          },
          {
            "name": "depth",
            "in": "query",
            "required": false,
            "description": "Limit the depth of returned sub-tree data (RFC 8040 Section 4.8.2). Use 'unbounded' for full depth.",
            "schema": {
              "type": "string",
              "default": "unbounded"
            }
          },
          {
            "name": "fields",
            "in": "query",
            "required": false,
            "description": "Select specific fields to return (RFC 8040 Section 4.8.3). Example: fields=name;status",
            "schema": {
              "type": "string"
            }
          },
          {
            "name": "content",
            "in": "query",
            "required": false,
            "description": "Filter by config state: 'config' (config true only), 'nonconfig' (config false only), or 'all'.",
            "schema": {
              "type": "string",
              "enum": [
                "config",
                "nonconfig",
                "all"
              ],
              "default": "all"
            }
          }
        ],
        "responses": {
          "200": {
            "description": "Success",
            "content": {
              "application/yang-data+json": {
                "schema": {
                  "type": "object",
                  "properties": {
                    "cipsDynamicCryptomapSetName": {
                      "type": "string",
                      "description": "The index of the dynamic cryptomap table. \n            The value of the string is the one assigned \n            by the operator in defining the cryptomap set.",
                      "x-yang-type": "snmpv2-tc:DisplayString"
                    },
                    "cipsDynamicCryptomapSetSize": {
                      "type": "integer",
                      "description": "The number of cryptomap entries in this cryptomap.",
                      "minimum": 0,
                      "maximum": 4294967295
                    },
                    "cipsDynamicCryptomapSetNumAssoc": {
                      "type": "integer",
                      "description": "The number of static cryptomap sets with which\n            this dynamic cryptomap is associated.",
                      "minimum": 0,
                      "maximum": 4294967295
                    }
                  }
                },
                "example": {
                  "CISCO-IPSEC-MIB:cipsDynamicCryptomapSetEntry": {
                    "cipsDynamicCryptomapSetName": "192.168.1.1",
                    "cipsDynamicCryptomapSetSize": 0,
                    "cipsDynamicCryptomapSetNumAssoc": 0
                  }
                }
              }
            }
          },
          "403": {
            "description": "Forbidden — insufficient access rights (NACM)",
            "content": {
              "application/yang-data+json": {
                "schema": {
                  "$ref": "#/components/schemas/restconf-error"
                }
              }
            }
          }
        },
        "operationId": "get-cipsDynamicCryptomapSetEntry-2"
      },
      "x-yang-path": "/cipsDynamicCryptomapSetTable/cipsDynamicCryptomapSetEntry={cipsDynamicCryptomapSetName}",
      "x-restconf-kind": "list-instance",
      "x-list-keys": [
        "cipsDynamicCryptomapSetName"
      ]
    },
    "/data/CISCO-IPSEC-MIB:cipsStaticCryptomapTable": {
      "get": {
        "summary": "Get cipsStaticCryptomapTable data",
        "description": "Retrieve cipsStaticCryptomapTable operational data from MIB",
        "tags": [
          "CISCO-IPSEC-MIB"
        ],
        "responses": {
          "200": {
            "description": "Success",
            "content": {
              "application/yang-data+json": {
                "schema": {
                  "type": "object",
                  "description": "The table ilisting the member cryptomaps\n        of the cryptomap sets that are configured\n        on the managed entity.",
                  "properties": {
                    "cipsStaticCryptomapEntry": {
                      "type": "array",
                      "description": "Each entry contains the attributes \n          associated with a single static \n          (fully specified) cryptomap entry.\n          This table does not include the members \n          of dynamic cryptomap sets that may be\n          linked with the parent static cryptomap set.",
                      "items": {
                        "type": "object",
                        "properties": {
                          "cipsStaticCryptomapSetName": {
                            "type": "string",
                            "description": "cipsStaticCryptomapSetName",
                            "x-yang-type": "leafref"
                          },
                          "cipsStaticCryptomapPriority": {
                            "type": "integer",
                            "description": "The priority of the cryptomap entry in the \n            cryptomap set. This is the second index component\n            of this table.",
                            "minimum": -2147483648,
                            "maximum": 2147483647
                          },
                          "cipsStaticCryptomapType": {
                            "type": "string",
                            "description": "The type of the cryptomap entry. This can be an ISAKMP\n            cryptomap, CET or manual. Dynamic cryptomaps are not\n            counted in this table.",
                            "x-yang-type": "CISCO-IPSEC-MIB:CryptomapType"
                          },
                          "cipsStaticCryptomapDescr": {
                            "type": "string",
                            "description": "The description string entered by the operatoir\n            while creating this cryptomap. The string generally\n            identifies a description and the purpose of this\n            policy.",
                            "x-yang-type": "snmpv2-tc:DisplayString"
                          },
                          "cipsStaticCryptomapPeer": {
                            "type": "string",
                            "description": "The IP address of the current peer associated with \n            this IPSec policy item. Traffic that is protected by\n            this cryptomap is protected by a tunnel that terminates\n            at the device whose IP address is specified by this\n            object.",
                            "x-yang-type": "CISCO-IPSEC-MIB:IPSIpAddress"
                          },
                          "cipsStaticCryptomapNumPeers": {
                            "type": "integer",
                            "description": "The number of peers associated with this cryptomap \n            entry. The peers other than the one identified by \n            'cipsStaticCryptomapPeer' are backup peers. \n            \n            Manual cryptomaps may have only one peer.",
                            "minimum": -2147483648,
                            "maximum": 2147483647
                          },
                          "cipsStaticCryptomapPfs": {
                            "type": "string",
                            "description": "This object identifies if the tunnels instantiated\n            due to this policy item should use Perfect Forward Secrecy \n            (PFS) and if so, what group of Oakley they should use.",
                            "x-yang-type": "CISCO-IPSEC-MIB:DiffHellmanGrp"
                          },
                          "cipsStaticCryptomapLifetime": {
                            "type": "integer",
                            "description": "This object identifies the lifetime of the IPSec\n            Security Associations (SA) created using this IPSec policy\n            entry. If this value is zero, the lifetime assumes the \n            value specified by the global lifetime parameter.",
                            "minimum": -2147483648,
                            "maximum": 2147483647
                          },
                          "cipsStaticCryptomapLifesize": {
                            "type": "integer",
                            "description": "This object identifies the lifesize (maximum traffic\n            in bytes that may be carried) of the IPSec SAs\n            created using this IPSec policy entry. \n            If this value is zero, the lifetime assumes the \n            value specified by the global lifesize parameter.",
                            "minimum": -2147483648,
                            "maximum": 2147483647
                          },
                          "cipsStaticCryptomapLevelHost": {
                            "type": "boolean",
                            "description": "This object identifies the granularity of the\n            IPSec SAs created using this IPSec policy entry. \n            If this value is TRUE, distinct SA bundles are created\n            for distinct hosts at the end of the application traffic."
                          }
                        }
                      }
                    }
                  }
                },
                "example": {
                  "CISCO-IPSEC-MIB:cipsStaticCryptomapTable": {
                    "cipsStaticCryptomapEntry": [
                      {
                        "cipsStaticCryptomapSetName": "192.168.1.1",
                        "cipsStaticCryptomapPriority": -2147483648,
                        "cipsStaticCryptomapType": "192.168.1.1",
                        "cipsStaticCryptomapDescr": "192.168.1.1",
                        "cipsStaticCryptomapPeer": "192.168.1.1",
                        "cipsStaticCryptomapNumPeers": -2147483648,
                        "cipsStaticCryptomapPfs": "192.168.1.1",
                        "cipsStaticCryptomapLifetime": -2147483648,
                        "cipsStaticCryptomapLifesize": -2147483648,
                        "cipsStaticCryptomapLevelHost": true
                      },
                      {
                        "cipsStaticCryptomapSetName": "192.168.1.1",
                        "cipsStaticCryptomapPriority": -2147483648,
                        "cipsStaticCryptomapType": "192.168.1.1",
                        "cipsStaticCryptomapDescr": "192.168.1.1",
                        "cipsStaticCryptomapPeer": "192.168.1.1",
                        "cipsStaticCryptomapNumPeers": -2147483648,
                        "cipsStaticCryptomapPfs": "192.168.1.1",
                        "cipsStaticCryptomapLifetime": -2147483648,
                        "cipsStaticCryptomapLifesize": -2147483648,
                        "cipsStaticCryptomapLevelHost": true
                      },
                      {
                        "cipsStaticCryptomapSetName": "192.168.1.1",
                        "cipsStaticCryptomapPriority": -2147483648,
                        "cipsStaticCryptomapType": "192.168.1.1",
                        "cipsStaticCryptomapDescr": "192.168.1.1",
                        "cipsStaticCryptomapPeer": "192.168.1.1",
                        "cipsStaticCryptomapNumPeers": -2147483648,
                        "cipsStaticCryptomapPfs": "192.168.1.1",
                        "cipsStaticCryptomapLifetime": -2147483648,
                        "cipsStaticCryptomapLifesize": -2147483648,
                        "cipsStaticCryptomapLevelHost": true
                      }
                    ]
                  }
                }
              }
            }
          },
          "403": {
            "description": "Forbidden — insufficient access rights (NACM)",
            "content": {
              "application/yang-data+json": {
                "schema": {
                  "$ref": "#/components/schemas/restconf-error"
                }
              }
            }
          }
        },
        "operationId": "get-cipsStaticCryptomapTable",
        "parameters": [
          {
            "name": "Accept",
            "in": "header",
            "required": false,
            "description": "RESTCONF response media type (RFC 8040)",
            "schema": {
              "type": "string",
              "default": "application/yang-data+json",
              "enum": [
                "application/yang-data+json",
                "application/yang-data+xml"
              ]
            }
          },
          {
            "name": "depth",
            "in": "query",
            "required": false,
            "description": "Limit the depth of returned sub-tree data (RFC 8040 Section 4.8.2). Use 'unbounded' for full depth.",
            "schema": {
              "type": "string",
              "default": "unbounded"
            }
          },
          {
            "name": "fields",
            "in": "query",
            "required": false,
            "description": "Select specific fields to return (RFC 8040 Section 4.8.3). Example: fields=name;status",
            "schema": {
              "type": "string"
            }
          },
          {
            "name": "content",
            "in": "query",
            "required": false,
            "description": "Filter by config state: 'config' (config true only), 'nonconfig' (config false only), or 'all'.",
            "schema": {
              "type": "string",
              "enum": [
                "config",
                "nonconfig",
                "all"
              ],
              "default": "all"
            }
          }
        ]
      },
      "x-yang-path": "/cipsStaticCryptomapTable",
      "x-restconf-kind": "container"
    },
    "/data/CISCO-IPSEC-MIB:cipsStaticCryptomapTable/cipsStaticCryptomapEntry": {
      "get": {
        "summary": "Get cipsStaticCryptomapEntry list",
        "description": "Retrieve list of cipsStaticCryptomapEntry entries from MIB",
        "tags": [
          "CISCO-IPSEC-MIB"
        ],
        "responses": {
          "200": {
            "description": "Success",
            "content": {
              "application/yang-data+json": {
                "schema": {
                  "type": "array",
                  "description": "Each entry contains the attributes \n          associated with a single static \n          (fully specified) cryptomap entry.\n          This table does not include the members \n          of dynamic cryptomap sets that may be\n          linked with the parent static cryptomap set.",
                  "items": {
                    "type": "object",
                    "properties": {
                      "cipsStaticCryptomapSetName": {
                        "type": "string",
                        "description": "cipsStaticCryptomapSetName",
                        "x-yang-type": "leafref"
                      },
                      "cipsStaticCryptomapPriority": {
                        "type": "integer",
                        "description": "The priority of the cryptomap entry in the \n            cryptomap set. This is the second index component\n            of this table.",
                        "minimum": -2147483648,
                        "maximum": 2147483647
                      },
                      "cipsStaticCryptomapType": {
                        "type": "string",
                        "description": "The type of the cryptomap entry. This can be an ISAKMP\n            cryptomap, CET or manual. Dynamic cryptomaps are not\n            counted in this table.",
                        "x-yang-type": "CISCO-IPSEC-MIB:CryptomapType"
                      },
                      "cipsStaticCryptomapDescr": {
                        "type": "string",
                        "description": "The description string entered by the operatoir\n            while creating this cryptomap. The string generally\n            identifies a description and the purpose of this\n            policy.",
                        "x-yang-type": "snmpv2-tc:DisplayString"
                      },
                      "cipsStaticCryptomapPeer": {
                        "type": "string",
                        "description": "The IP address of the current peer associated with \n            this IPSec policy item. Traffic that is protected by\n            this cryptomap is protected by a tunnel that terminates\n            at the device whose IP address is specified by this\n            object.",
                        "x-yang-type": "CISCO-IPSEC-MIB:IPSIpAddress"
                      },
                      "cipsStaticCryptomapNumPeers": {
                        "type": "integer",
                        "description": "The number of peers associated with this cryptomap \n            entry. The peers other than the one identified by \n            'cipsStaticCryptomapPeer' are backup peers. \n            \n            Manual cryptomaps may have only one peer.",
                        "minimum": -2147483648,
                        "maximum": 2147483647
                      },
                      "cipsStaticCryptomapPfs": {
                        "type": "string",
                        "description": "This object identifies if the tunnels instantiated\n            due to this policy item should use Perfect Forward Secrecy \n            (PFS) and if so, what group of Oakley they should use.",
                        "x-yang-type": "CISCO-IPSEC-MIB:DiffHellmanGrp"
                      },
                      "cipsStaticCryptomapLifetime": {
                        "type": "integer",
                        "description": "This object identifies the lifetime of the IPSec\n            Security Associations (SA) created using this IPSec policy\n            entry. If this value is zero, the lifetime assumes the \n            value specified by the global lifetime parameter.",
                        "minimum": -2147483648,
                        "maximum": 2147483647
                      },
                      "cipsStaticCryptomapLifesize": {
                        "type": "integer",
                        "description": "This object identifies the lifesize (maximum traffic\n            in bytes that may be carried) of the IPSec SAs\n            created using this IPSec policy entry. \n            If this value is zero, the lifetime assumes the \n            value specified by the global lifesize parameter.",
                        "minimum": -2147483648,
                        "maximum": 2147483647
                      },
                      "cipsStaticCryptomapLevelHost": {
                        "type": "boolean",
                        "description": "This object identifies the granularity of the\n            IPSec SAs created using this IPSec policy entry. \n            If this value is TRUE, distinct SA bundles are created\n            for distinct hosts at the end of the application traffic."
                      }
                    }
                  }
                },
                "example": {
                  "CISCO-IPSEC-MIB:cipsStaticCryptomapEntry": [
                    {
                      "cipsStaticCryptomapSetName": "192.168.1.1",
                      "cipsStaticCryptomapPriority": -2147483648,
                      "cipsStaticCryptomapType": "192.168.1.1",
                      "cipsStaticCryptomapDescr": "192.168.1.1",
                      "cipsStaticCryptomapPeer": "192.168.1.1",
                      "cipsStaticCryptomapNumPeers": -2147483648,
                      "cipsStaticCryptomapPfs": "192.168.1.1",
                      "cipsStaticCryptomapLifetime": -2147483648,
                      "cipsStaticCryptomapLifesize": -2147483648,
                      "cipsStaticCryptomapLevelHost": true
                    }
                  ]
                }
              }
            }
          },
          "403": {
            "description": "Forbidden — insufficient access rights (NACM)",
            "content": {
              "application/yang-data+json": {
                "schema": {
                  "$ref": "#/components/schemas/restconf-error"
                }
              }
            }
          }
        },
        "operationId": "get-cipsStaticCryptomapEntry",
        "parameters": [
          {
            "name": "Accept",
            "in": "header",
            "required": false,
            "description": "RESTCONF response media type (RFC 8040)",
            "schema": {
              "type": "string",
              "default": "application/yang-data+json",
              "enum": [
                "application/yang-data+json",
                "application/yang-data+xml"
              ]
            }
          },
          {
            "name": "depth",
            "in": "query",
            "required": false,
            "description": "Limit the depth of returned sub-tree data (RFC 8040 Section 4.8.2). Use 'unbounded' for full depth.",
            "schema": {
              "type": "string",
              "default": "unbounded"
            }
          },
          {
            "name": "fields",
            "in": "query",
            "required": false,
            "description": "Select specific fields to return (RFC 8040 Section 4.8.3). Example: fields=name;status",
            "schema": {
              "type": "string"
            }
          },
          {
            "name": "content",
            "in": "query",
            "required": false,
            "description": "Filter by config state: 'config' (config true only), 'nonconfig' (config false only), or 'all'.",
            "schema": {
              "type": "string",
              "enum": [
                "config",
                "nonconfig",
                "all"
              ],
              "default": "all"
            }
          }
        ]
      },
      "x-yang-path": "/cipsStaticCryptomapTable/cipsStaticCryptomapEntry",
      "x-restconf-kind": "container"
    },
    "/data/CISCO-IPSEC-MIB:cipsCryptomapSetIfTable": {
      "get": {
        "summary": "Get cipsCryptomapSetIfTable data",
        "description": "Retrieve cipsCryptomapSetIfTable operational data from MIB",
        "tags": [
          "CISCO-IPSEC-MIB"
        ],
        "responses": {
          "200": {
            "description": "Success",
            "content": {
              "application/yang-data+json": {
                "schema": {
                  "type": "object",
                  "description": "The table lists the binding of cryptomap sets\n        to the interfaces of the managed entity.",
                  "properties": {
                    "cipsCryptomapSetIfEntry": {
                      "type": "array",
                      "description": "Each entry contains the record of\n          the association between an interface\n          and a cryptomap set (static) that is defined\n          on the managed entity.\n          \n          Note that the cryptomap set identified in \n          this binding must static. Dynamic cryptomaps cannot\n          be bound to interfaces.",
                      "items": {
                        "type": "object",
                        "properties": {
                          "ifIndex": {
                            "type": "string",
                            "description": "ifIndex",
                            "x-yang-type": "leafref"
                          },
                          "cipsStaticCryptomapSetName": {
                            "type": "string",
                            "description": "cipsStaticCryptomapSetName",
                            "x-yang-type": "leafref"
                          },
                          "cipsCryptomapSetIfVirtual": {
                            "type": "boolean",
                            "description": "The value of this object identifies if the\n            interface to which the cryptomap set is attached\n            is a tunnel (such as a GRE or PPTP tunnel)."
                          },
                          "cipsCryptomapSetIfStatus": {
                            "type": "string",
                            "description": "This object identifies the status of the binding \n            of the specified cryptomap set with the specified\n            interface. The value when queried is always 'attached'. \n            When set to 'detached', the cryptomap set if detached \n            from the specified interface. The effect of this is same \n            as the CLI command\n            \n            \tconfig-if# no crypto map cryptomapSetName\n            \n            Setting the value to 'attached' will result in \n            SNMP General Error.",
                            "x-yang-type": "CISCO-IPSEC-MIB:CryptomapSetBindStatus"
                          }
                        }
                      }
                    }
                  }
                },
                "example": {
                  "CISCO-IPSEC-MIB:cipsCryptomapSetIfTable": {
                    "cipsCryptomapSetIfEntry": [
                      {
                        "ifIndex": "1",
                        "cipsStaticCryptomapSetName": "192.168.1.1",
                        "cipsCryptomapSetIfVirtual": true,
                        "cipsCryptomapSetIfStatus": "192.168.1.1"
                      },
                      {
                        "ifIndex": "2",
                        "cipsStaticCryptomapSetName": "192.168.1.1",
                        "cipsCryptomapSetIfVirtual": true,
                        "cipsCryptomapSetIfStatus": "192.168.1.1"
                      },
                      {
                        "ifIndex": "3",
                        "cipsStaticCryptomapSetName": "192.168.1.1",
                        "cipsCryptomapSetIfVirtual": true,
                        "cipsCryptomapSetIfStatus": "192.168.1.1"
                      }
                    ]
                  }
                }
              }
            }
          },
          "403": {
            "description": "Forbidden — insufficient access rights (NACM)",
            "content": {
              "application/yang-data+json": {
                "schema": {
                  "$ref": "#/components/schemas/restconf-error"
                }
              }
            }
          }
        },
        "operationId": "get-cipsCryptomapSetIfTable",
        "parameters": [
          {
            "name": "Accept",
            "in": "header",
            "required": false,
            "description": "RESTCONF response media type (RFC 8040)",
            "schema": {
              "type": "string",
              "default": "application/yang-data+json",
              "enum": [
                "application/yang-data+json",
                "application/yang-data+xml"
              ]
            }
          },
          {
            "name": "depth",
            "in": "query",
            "required": false,
            "description": "Limit the depth of returned sub-tree data (RFC 8040 Section 4.8.2). Use 'unbounded' for full depth.",
            "schema": {
              "type": "string",
              "default": "unbounded"
            }
          },
          {
            "name": "fields",
            "in": "query",
            "required": false,
            "description": "Select specific fields to return (RFC 8040 Section 4.8.3). Example: fields=name;status",
            "schema": {
              "type": "string"
            }
          },
          {
            "name": "content",
            "in": "query",
            "required": false,
            "description": "Filter by config state: 'config' (config true only), 'nonconfig' (config false only), or 'all'.",
            "schema": {
              "type": "string",
              "enum": [
                "config",
                "nonconfig",
                "all"
              ],
              "default": "all"
            }
          }
        ]
      },
      "x-yang-path": "/cipsCryptomapSetIfTable",
      "x-restconf-kind": "container"
    },
    "/data/CISCO-IPSEC-MIB:cipsCryptomapSetIfTable/cipsCryptomapSetIfEntry": {
      "get": {
        "summary": "Get cipsCryptomapSetIfEntry list",
        "description": "Retrieve list of cipsCryptomapSetIfEntry entries from MIB",
        "tags": [
          "CISCO-IPSEC-MIB"
        ],
        "responses": {
          "200": {
            "description": "Success",
            "content": {
              "application/yang-data+json": {
                "schema": {
                  "type": "array",
                  "description": "Each entry contains the record of\n          the association between an interface\n          and a cryptomap set (static) that is defined\n          on the managed entity.\n          \n          Note that the cryptomap set identified in \n          this binding must static. Dynamic cryptomaps cannot\n          be bound to interfaces.",
                  "items": {
                    "type": "object",
                    "properties": {
                      "ifIndex": {
                        "type": "string",
                        "description": "ifIndex",
                        "x-yang-type": "leafref"
                      },
                      "cipsStaticCryptomapSetName": {
                        "type": "string",
                        "description": "cipsStaticCryptomapSetName",
                        "x-yang-type": "leafref"
                      },
                      "cipsCryptomapSetIfVirtual": {
                        "type": "boolean",
                        "description": "The value of this object identifies if the\n            interface to which the cryptomap set is attached\n            is a tunnel (such as a GRE or PPTP tunnel)."
                      },
                      "cipsCryptomapSetIfStatus": {
                        "type": "string",
                        "description": "This object identifies the status of the binding \n            of the specified cryptomap set with the specified\n            interface. The value when queried is always 'attached'. \n            When set to 'detached', the cryptomap set if detached \n            from the specified interface. The effect of this is same \n            as the CLI command\n            \n            \tconfig-if# no crypto map cryptomapSetName\n            \n            Setting the value to 'attached' will result in \n            SNMP General Error.",
                        "x-yang-type": "CISCO-IPSEC-MIB:CryptomapSetBindStatus"
                      }
                    }
                  }
                },
                "example": {
                  "CISCO-IPSEC-MIB:cipsCryptomapSetIfEntry": [
                    {
                      "ifIndex": "example-string",
                      "cipsStaticCryptomapSetName": "192.168.1.1",
                      "cipsCryptomapSetIfVirtual": true,
                      "cipsCryptomapSetIfStatus": "192.168.1.1"
                    }
                  ]
                }
              }
            }
          },
          "403": {
            "description": "Forbidden — insufficient access rights (NACM)",
            "content": {
              "application/yang-data+json": {
                "schema": {
                  "$ref": "#/components/schemas/restconf-error"
                }
              }
            }
          }
        },
        "operationId": "get-cipsCryptomapSetIfEntry",
        "parameters": [
          {
            "name": "Accept",
            "in": "header",
            "required": false,
            "description": "RESTCONF response media type (RFC 8040)",
            "schema": {
              "type": "string",
              "default": "application/yang-data+json",
              "enum": [
                "application/yang-data+json",
                "application/yang-data+xml"
              ]
            }
          },
          {
            "name": "depth",
            "in": "query",
            "required": false,
            "description": "Limit the depth of returned sub-tree data (RFC 8040 Section 4.8.2). Use 'unbounded' for full depth.",
            "schema": {
              "type": "string",
              "default": "unbounded"
            }
          },
          {
            "name": "fields",
            "in": "query",
            "required": false,
            "description": "Select specific fields to return (RFC 8040 Section 4.8.3). Example: fields=name;status",
            "schema": {
              "type": "string"
            }
          },
          {
            "name": "content",
            "in": "query",
            "required": false,
            "description": "Filter by config state: 'config' (config true only), 'nonconfig' (config false only), or 'all'.",
            "schema": {
              "type": "string",
              "enum": [
                "config",
                "nonconfig",
                "all"
              ],
              "default": "all"
            }
          }
        ]
      },
      "x-yang-path": "/cipsCryptomapSetIfTable/cipsCryptomapSetIfEntry",
      "x-restconf-kind": "container"
    },
    "/data/CISCO-IPSEC-MIB:cipsIsakmpPolicyEntry": {
      "get": {
        "summary": "Get cipsIsakmpPolicyEntry list",
        "description": "Retrieve list of cipsIsakmpPolicyEntry entries from MIB",
        "tags": [
          "CISCO-IPSEC-MIB"
        ],
        "responses": {
          "200": {
            "description": "Success",
            "content": {
              "application/yang-data+json": {
                "schema": {
                  "type": "array",
                  "description": "Each entry contains the attributes \n          associated with a single ISAKMP\n          Policy entry.",
                  "items": {
                    "type": "object",
                    "properties": {
                      "cipsIsakmpPolPriority": {
                        "type": "integer",
                        "description": "The priotity of this ISAKMP Policy entry.\n            This is also the index of this table.",
                        "minimum": -2147483648,
                        "maximum": 2147483647
                      },
                      "cipsIsakmpPolEncr": {
                        "type": "string",
                        "description": "The encryption transform specified by this \n            ISAKMP policy specification. The Internet Key Exchange\n            (IKE) tunnels setup using this policy item would\n            use the specified encryption transform to protect the\n            ISAKMP PDUs.",
                        "x-yang-type": "CISCO-IPSEC-MIB:EncryptAlgo"
                      },
                      "cipsIsakmpPolHash": {
                        "type": "string",
                        "description": "The hash transform specified by this \n            ISAKMP policy specification. The IKE tunnels\n            setup using this policy item would use the \n            specified hash transform to protect the\n            ISAKMP PDUs.",
                        "x-yang-type": "CISCO-IPSEC-MIB:IkeHashAlgo"
                      },
                      "cipsIsakmpPolAuth": {
                        "type": "string",
                        "description": "The peer authentication mthod specified by\n            this ISAKMP policy specification. If this policy\n            entity is selected for negotiation with a peer,\n            the local entity would authenticate the peer using \n            the method specified by this object.",
                        "x-yang-type": "CISCO-IPSEC-MIB:IkeAuthMethod"
                      },
                      "cipsIsakmpPolGroup": {
                        "type": "string",
                        "description": "This object specifies the Oakley group used \n            for Diffie Hellman exchange in the Main Mode. \n            If this policy item is selected to negotiate\n            Main Mode with an IKE peer, the local entity \n            chooses the group specified by this object to\n            perform Diffie Hellman exchange with the\n            peer.",
                        "x-yang-type": "CISCO-IPSEC-MIB:DiffHellmanGrp"
                      },
                      "cipsIsakmpPolLifetime": {
                        "type": "integer",
                        "description": "This object specifies the lifetime in seconds\n            of the IKE tunnels generated using this \n            policy specification.",
                        "minimum": -2147483648,
                        "maximum": 2147483647
                      }
                    }
                  }
                },
                "example": {
                  "CISCO-IPSEC-MIB:cipsIsakmpPolicyEntry": [
                    {
                      "cipsIsakmpPolPriority": -2147483648,
                      "cipsIsakmpPolEncr": "192.168.1.1",
                      "cipsIsakmpPolHash": "192.168.1.1",
                      "cipsIsakmpPolAuth": "192.168.1.1",
                      "cipsIsakmpPolGroup": "192.168.1.1",
                      "cipsIsakmpPolLifetime": -2147483648
                    }
                  ]
                }
              }
            }
          },
          "403": {
            "description": "Forbidden — insufficient access rights (NACM)",
            "content": {
              "application/yang-data+json": {
                "schema": {
                  "$ref": "#/components/schemas/restconf-error"
                }
              }
            }
          }
        },
        "operationId": "get-cipsIsakmpPolicyEntry-3",
        "parameters": [
          {
            "name": "Accept",
            "in": "header",
            "required": false,
            "description": "RESTCONF response media type (RFC 8040)",
            "schema": {
              "type": "string",
              "default": "application/yang-data+json",
              "enum": [
                "application/yang-data+json",
                "application/yang-data+xml"
              ]
            }
          },
          {
            "name": "depth",
            "in": "query",
            "required": false,
            "description": "Limit the depth of returned sub-tree data (RFC 8040 Section 4.8.2). Use 'unbounded' for full depth.",
            "schema": {
              "type": "string",
              "default": "unbounded"
            }
          },
          {
            "name": "fields",
            "in": "query",
            "required": false,
            "description": "Select specific fields to return (RFC 8040 Section 4.8.3). Example: fields=name;status",
            "schema": {
              "type": "string"
            }
          },
          {
            "name": "content",
            "in": "query",
            "required": false,
            "description": "Filter by config state: 'config' (config true only), 'nonconfig' (config false only), or 'all'.",
            "schema": {
              "type": "string",
              "enum": [
                "config",
                "nonconfig",
                "all"
              ],
              "default": "all"
            }
          }
        ]
      },
      "x-yang-path": "/cipsIsakmpPolicyEntry",
      "x-restconf-kind": "container"
    },
    "/data/CISCO-IPSEC-MIB:cipsIsakmpPolicyEntry={cipsIsakmpPolPriority}": {
      "get": {
        "summary": "Get cipsIsakmpPolicyEntry entry",
        "description": "Retrieve specific cipsIsakmpPolicyEntry entry by key from MIB",
        "tags": [
          "CISCO-IPSEC-MIB"
        ],
        "parameters": [
          {
            "name": "cipsIsakmpPolPriority",
            "in": "path",
            "required": true,
            "schema": {
              "type": "string"
            },
            "example": "1"
          },
          {
            "name": "Accept",
            "in": "header",
            "required": false,
            "description": "RESTCONF response media type (RFC 8040)",
            "schema": {
              "type": "string",
              "default": "application/yang-data+json",
              "enum": [
                "application/yang-data+json",
                "application/yang-data+xml"
              ]
            }
          },
          {
            "name": "depth",
            "in": "query",
            "required": false,
            "description": "Limit the depth of returned sub-tree data (RFC 8040 Section 4.8.2). Use 'unbounded' for full depth.",
            "schema": {
              "type": "string",
              "default": "unbounded"
            }
          },
          {
            "name": "fields",
            "in": "query",
            "required": false,
            "description": "Select specific fields to return (RFC 8040 Section 4.8.3). Example: fields=name;status",
            "schema": {
              "type": "string"
            }
          },
          {
            "name": "content",
            "in": "query",
            "required": false,
            "description": "Filter by config state: 'config' (config true only), 'nonconfig' (config false only), or 'all'.",
            "schema": {
              "type": "string",
              "enum": [
                "config",
                "nonconfig",
                "all"
              ],
              "default": "all"
            }
          }
        ],
        "responses": {
          "200": {
            "description": "Success",
            "content": {
              "application/yang-data+json": {
                "schema": {
                  "type": "object",
                  "properties": {
                    "cipsIsakmpPolPriority": {
                      "type": "integer",
                      "description": "The priotity of this ISAKMP Policy entry.\n            This is also the index of this table.",
                      "minimum": -2147483648,
                      "maximum": 2147483647
                    },
                    "cipsIsakmpPolEncr": {
                      "type": "string",
                      "description": "The encryption transform specified by this \n            ISAKMP policy specification. The Internet Key Exchange\n            (IKE) tunnels setup using this policy item would\n            use the specified encryption transform to protect the\n            ISAKMP PDUs.",
                      "x-yang-type": "CISCO-IPSEC-MIB:EncryptAlgo"
                    },
                    "cipsIsakmpPolHash": {
                      "type": "string",
                      "description": "The hash transform specified by this \n            ISAKMP policy specification. The IKE tunnels\n            setup using this policy item would use the \n            specified hash transform to protect the\n            ISAKMP PDUs.",
                      "x-yang-type": "CISCO-IPSEC-MIB:IkeHashAlgo"
                    },
                    "cipsIsakmpPolAuth": {
                      "type": "string",
                      "description": "The peer authentication mthod specified by\n            this ISAKMP policy specification. If this policy\n            entity is selected for negotiation with a peer,\n            the local entity would authenticate the peer using \n            the method specified by this object.",
                      "x-yang-type": "CISCO-IPSEC-MIB:IkeAuthMethod"
                    },
                    "cipsIsakmpPolGroup": {
                      "type": "string",
                      "description": "This object specifies the Oakley group used \n            for Diffie Hellman exchange in the Main Mode. \n            If this policy item is selected to negotiate\n            Main Mode with an IKE peer, the local entity \n            chooses the group specified by this object to\n            perform Diffie Hellman exchange with the\n            peer.",
                      "x-yang-type": "CISCO-IPSEC-MIB:DiffHellmanGrp"
                    },
                    "cipsIsakmpPolLifetime": {
                      "type": "integer",
                      "description": "This object specifies the lifetime in seconds\n            of the IKE tunnels generated using this \n            policy specification.",
                      "minimum": -2147483648,
                      "maximum": 2147483647
                    }
                  }
                },
                "example": {
                  "CISCO-IPSEC-MIB:cipsIsakmpPolicyEntry": {
                    "cipsIsakmpPolPriority": -2147483648,
                    "cipsIsakmpPolEncr": "192.168.1.1",
                    "cipsIsakmpPolHash": "192.168.1.1",
                    "cipsIsakmpPolAuth": "192.168.1.1",
                    "cipsIsakmpPolGroup": "192.168.1.1",
                    "cipsIsakmpPolLifetime": -2147483648
                  }
                }
              }
            }
          },
          "403": {
            "description": "Forbidden — insufficient access rights (NACM)",
            "content": {
              "application/yang-data+json": {
                "schema": {
                  "$ref": "#/components/schemas/restconf-error"
                }
              }
            }
          }
        },
        "operationId": "get-cipsIsakmpPolicyEntry-4"
      },
      "x-yang-path": "/cipsIsakmpPolicyEntry={cipsIsakmpPolPriority}",
      "x-restconf-kind": "list-instance",
      "x-list-keys": [
        "cipsIsakmpPolPriority"
      ]
    },
    "/data/CISCO-IPSEC-MIB:cipsStaticCryptomapSetEntry": {
      "get": {
        "summary": "Get cipsStaticCryptomapSetEntry list",
        "description": "Retrieve list of cipsStaticCryptomapSetEntry entries from MIB",
        "tags": [
          "CISCO-IPSEC-MIB"
        ],
        "responses": {
          "200": {
            "description": "Success",
            "content": {
              "application/yang-data+json": {
                "schema": {
                  "type": "array",
                  "description": "Each entry contains the attributes \n          associated with a single static \n          cryptomap set.",
                  "items": {
                    "type": "object",
                    "properties": {
                      "cipsStaticCryptomapSetName": {
                        "type": "string",
                        "description": "The index of the static cryptomap table. The value \n            of the string is the name string assigned by the \n            operator in defining the cryptomap set.",
                        "x-yang-type": "snmpv2-tc:DisplayString"
                      },
                      "cipsStaticCryptomapSetSize": {
                        "type": "integer",
                        "description": "The total number of cryptomap entries contained in\n            this cryptomap set.",
                        "minimum": 0,
                        "maximum": 4294967295
                      },
                      "cipsStaticCryptomapSetNumIsakmp": {
                        "type": "integer",
                        "description": "The number of cryptomaps associated with this \n            cryptomap set that use ISAKMP protocol to do key\n            exchange.",
                        "minimum": 0,
                        "maximum": 4294967295
                      },
                      "cipsStaticCryptomapSetNumManual": {
                        "type": "integer",
                        "description": "The number of cryptomaps associated with this \n            cryptomap set that require the operator to manually\n            setup the keys and SPIs.",
                        "minimum": 0,
                        "maximum": 4294967295
                      },
                      "cipsStaticCryptomapSetNumCET": {
                        "type": "integer",
                        "description": "The number of cryptomaps of type 'ipsec-cisco' \n            associated with this cryptomap set. Such\n            cryptomap elements implement Cisco Encryption Technology\n            based Virtual Private Networks.",
                        "minimum": 0,
                        "maximum": 4294967295
                      },
                      "cipsStaticCryptomapSetNumDynamic": {
                        "type": "integer",
                        "description": "The number of dynamic cryptomap templates\n            linked to this cryptomap set.",
                        "minimum": 0,
                        "maximum": 4294967295
                      },
                      "cipsStaticCryptomapSetNumDisc": {
                        "type": "integer",
                        "description": "The number of dynamic cryptomap templates\n            linked to this cryptomap set that have Tunnel Endpoint\n            Discovery (TED) enabled.",
                        "minimum": 0,
                        "maximum": 4294967295
                      },
                      "cipsStaticCryptomapSetNumSAs": {
                        "type": "integer",
                        "description": "The number of and IPsec Security Associations\n            that are active and were setup using this cryptomap.",
                        "minimum": 0,
                        "maximum": 4294967295
                      }
                    }
                  }
                },
                "example": {
                  "CISCO-IPSEC-MIB:cipsStaticCryptomapSetEntry": [
                    {
                      "cipsStaticCryptomapSetName": "192.168.1.1",
                      "cipsStaticCryptomapSetSize": 0,
                      "cipsStaticCryptomapSetNumIsakmp": 0,
                      "cipsStaticCryptomapSetNumManual": 0,
                      "cipsStaticCryptomapSetNumCET": 0,
                      "cipsStaticCryptomapSetNumDynamic": 0,
                      "cipsStaticCryptomapSetNumDisc": 0,
                      "cipsStaticCryptomapSetNumSAs": 0
                    }
                  ]
                }
              }
            }
          },
          "403": {
            "description": "Forbidden — insufficient access rights (NACM)",
            "content": {
              "application/yang-data+json": {
                "schema": {
                  "$ref": "#/components/schemas/restconf-error"
                }
              }
            }
          }
        },
        "operationId": "get-cipsStaticCryptomapSetEntry-3",
        "parameters": [
          {
            "name": "Accept",
            "in": "header",
            "required": false,
            "description": "RESTCONF response media type (RFC 8040)",
            "schema": {
              "type": "string",
              "default": "application/yang-data+json",
              "enum": [
                "application/yang-data+json",
                "application/yang-data+xml"
              ]
            }
          },
          {
            "name": "depth",
            "in": "query",
            "required": false,
            "description": "Limit the depth of returned sub-tree data (RFC 8040 Section 4.8.2). Use 'unbounded' for full depth.",
            "schema": {
              "type": "string",
              "default": "unbounded"
            }
          },
          {
            "name": "fields",
            "in": "query",
            "required": false,
            "description": "Select specific fields to return (RFC 8040 Section 4.8.3). Example: fields=name;status",
            "schema": {
              "type": "string"
            }
          },
          {
            "name": "content",
            "in": "query",
            "required": false,
            "description": "Filter by config state: 'config' (config true only), 'nonconfig' (config false only), or 'all'.",
            "schema": {
              "type": "string",
              "enum": [
                "config",
                "nonconfig",
                "all"
              ],
              "default": "all"
            }
          }
        ]
      },
      "x-yang-path": "/cipsStaticCryptomapSetEntry",
      "x-restconf-kind": "container"
    },
    "/data/CISCO-IPSEC-MIB:cipsStaticCryptomapSetEntry={cipsStaticCryptomapSetName}": {
      "get": {
        "summary": "Get cipsStaticCryptomapSetEntry entry",
        "description": "Retrieve specific cipsStaticCryptomapSetEntry entry by key from MIB",
        "tags": [
          "CISCO-IPSEC-MIB"
        ],
        "parameters": [
          {
            "name": "cipsStaticCryptomapSetName",
            "in": "path",
            "required": true,
            "schema": {
              "type": "string"
            },
            "example": "1"
          },
          {
            "name": "Accept",
            "in": "header",
            "required": false,
            "description": "RESTCONF response media type (RFC 8040)",
            "schema": {
              "type": "string",
              "default": "application/yang-data+json",
              "enum": [
                "application/yang-data+json",
                "application/yang-data+xml"
              ]
            }
          },
          {
            "name": "depth",
            "in": "query",
            "required": false,
            "description": "Limit the depth of returned sub-tree data (RFC 8040 Section 4.8.2). Use 'unbounded' for full depth.",
            "schema": {
              "type": "string",
              "default": "unbounded"
            }
          },
          {
            "name": "fields",
            "in": "query",
            "required": false,
            "description": "Select specific fields to return (RFC 8040 Section 4.8.3). Example: fields=name;status",
            "schema": {
              "type": "string"
            }
          },
          {
            "name": "content",
            "in": "query",
            "required": false,
            "description": "Filter by config state: 'config' (config true only), 'nonconfig' (config false only), or 'all'.",
            "schema": {
              "type": "string",
              "enum": [
                "config",
                "nonconfig",
                "all"
              ],
              "default": "all"
            }
          }
        ],
        "responses": {
          "200": {
            "description": "Success",
            "content": {
              "application/yang-data+json": {
                "schema": {
                  "type": "object",
                  "properties": {
                    "cipsStaticCryptomapSetName": {
                      "type": "string",
                      "description": "The index of the static cryptomap table. The value \n            of the string is the name string assigned by the \n            operator in defining the cryptomap set.",
                      "x-yang-type": "snmpv2-tc:DisplayString"
                    },
                    "cipsStaticCryptomapSetSize": {
                      "type": "integer",
                      "description": "The total number of cryptomap entries contained in\n            this cryptomap set.",
                      "minimum": 0,
                      "maximum": 4294967295
                    },
                    "cipsStaticCryptomapSetNumIsakmp": {
                      "type": "integer",
                      "description": "The number of cryptomaps associated with this \n            cryptomap set that use ISAKMP protocol to do key\n            exchange.",
                      "minimum": 0,
                      "maximum": 4294967295
                    },
                    "cipsStaticCryptomapSetNumManual": {
                      "type": "integer",
                      "description": "The number of cryptomaps associated with this \n            cryptomap set that require the operator to manually\n            setup the keys and SPIs.",
                      "minimum": 0,
                      "maximum": 4294967295
                    },
                    "cipsStaticCryptomapSetNumCET": {
                      "type": "integer",
                      "description": "The number of cryptomaps of type 'ipsec-cisco' \n            associated with this cryptomap set. Such\n            cryptomap elements implement Cisco Encryption Technology\n            based Virtual Private Networks.",
                      "minimum": 0,
                      "maximum": 4294967295
                    },
                    "cipsStaticCryptomapSetNumDynamic": {
                      "type": "integer",
                      "description": "The number of dynamic cryptomap templates\n            linked to this cryptomap set.",
                      "minimum": 0,
                      "maximum": 4294967295
                    },
                    "cipsStaticCryptomapSetNumDisc": {
                      "type": "integer",
                      "description": "The number of dynamic cryptomap templates\n            linked to this cryptomap set that have Tunnel Endpoint\n            Discovery (TED) enabled.",
                      "minimum": 0,
                      "maximum": 4294967295
                    },
                    "cipsStaticCryptomapSetNumSAs": {
                      "type": "integer",
                      "description": "The number of and IPsec Security Associations\n            that are active and were setup using this cryptomap.",
                      "minimum": 0,
                      "maximum": 4294967295
                    }
                  }
                },
                "example": {
                  "CISCO-IPSEC-MIB:cipsStaticCryptomapSetEntry": {
                    "cipsStaticCryptomapSetName": "192.168.1.1",
                    "cipsStaticCryptomapSetSize": 0,
                    "cipsStaticCryptomapSetNumIsakmp": 0,
                    "cipsStaticCryptomapSetNumManual": 0,
                    "cipsStaticCryptomapSetNumCET": 0,
                    "cipsStaticCryptomapSetNumDynamic": 0,
                    "cipsStaticCryptomapSetNumDisc": 0,
                    "cipsStaticCryptomapSetNumSAs": 0
                  }
                }
              }
            }
          },
          "403": {
            "description": "Forbidden — insufficient access rights (NACM)",
            "content": {
              "application/yang-data+json": {
                "schema": {
                  "$ref": "#/components/schemas/restconf-error"
                }
              }
            }
          }
        },
        "operationId": "get-cipsStaticCryptomapSetEntry-4"
      },
      "x-yang-path": "/cipsStaticCryptomapSetEntry={cipsStaticCryptomapSetName}",
      "x-restconf-kind": "list-instance",
      "x-list-keys": [
        "cipsStaticCryptomapSetName"
      ]
    },
    "/data/CISCO-IPSEC-MIB:cipsDynamicCryptomapSetEntry": {
      "get": {
        "summary": "Get cipsDynamicCryptomapSetEntry list",
        "description": "Retrieve list of cipsDynamicCryptomapSetEntry entries from MIB",
        "tags": [
          "CISCO-IPSEC-MIB"
        ],
        "responses": {
          "200": {
            "description": "Success",
            "content": {
              "application/yang-data+json": {
                "schema": {
                  "type": "array",
                  "description": "Each entry contains the attributes associated\n          with a single dynamic cryptomap template.",
                  "items": {
                    "type": "object",
                    "properties": {
                      "cipsDynamicCryptomapSetName": {
                        "type": "string",
                        "description": "The index of the dynamic cryptomap table. \n            The value of the string is the one assigned \n            by the operator in defining the cryptomap set.",
                        "x-yang-type": "snmpv2-tc:DisplayString"
                      },
                      "cipsDynamicCryptomapSetSize": {
                        "type": "integer",
                        "description": "The number of cryptomap entries in this cryptomap.",
                        "minimum": 0,
                        "maximum": 4294967295
                      },
                      "cipsDynamicCryptomapSetNumAssoc": {
                        "type": "integer",
                        "description": "The number of static cryptomap sets with which\n            this dynamic cryptomap is associated.",
                        "minimum": 0,
                        "maximum": 4294967295
                      }
                    }
                  }
                },
                "example": {
                  "CISCO-IPSEC-MIB:cipsDynamicCryptomapSetEntry": [
                    {
                      "cipsDynamicCryptomapSetName": "192.168.1.1",
                      "cipsDynamicCryptomapSetSize": 0,
                      "cipsDynamicCryptomapSetNumAssoc": 0
                    }
                  ]
                }
              }
            }
          },
          "403": {
            "description": "Forbidden — insufficient access rights (NACM)",
            "content": {
              "application/yang-data+json": {
                "schema": {
                  "$ref": "#/components/schemas/restconf-error"
                }
              }
            }
          }
        },
        "operationId": "get-cipsDynamicCryptomapSetEntry-3",
        "parameters": [
          {
            "name": "Accept",
            "in": "header",
            "required": false,
            "description": "RESTCONF response media type (RFC 8040)",
            "schema": {
              "type": "string",
              "default": "application/yang-data+json",
              "enum": [
                "application/yang-data+json",
                "application/yang-data+xml"
              ]
            }
          },
          {
            "name": "depth",
            "in": "query",
            "required": false,
            "description": "Limit the depth of returned sub-tree data (RFC 8040 Section 4.8.2). Use 'unbounded' for full depth.",
            "schema": {
              "type": "string",
              "default": "unbounded"
            }
          },
          {
            "name": "fields",
            "in": "query",
            "required": false,
            "description": "Select specific fields to return (RFC 8040 Section 4.8.3). Example: fields=name;status",
            "schema": {
              "type": "string"
            }
          },
          {
            "name": "content",
            "in": "query",
            "required": false,
            "description": "Filter by config state: 'config' (config true only), 'nonconfig' (config false only), or 'all'.",
            "schema": {
              "type": "string",
              "enum": [
                "config",
                "nonconfig",
                "all"
              ],
              "default": "all"
            }
          }
        ]
      },
      "x-yang-path": "/cipsDynamicCryptomapSetEntry",
      "x-restconf-kind": "container"
    },
    "/data/CISCO-IPSEC-MIB:cipsDynamicCryptomapSetEntry={cipsDynamicCryptomapSetName}": {
      "get": {
        "summary": "Get cipsDynamicCryptomapSetEntry entry",
        "description": "Retrieve specific cipsDynamicCryptomapSetEntry entry by key from MIB",
        "tags": [
          "CISCO-IPSEC-MIB"
        ],
        "parameters": [
          {
            "name": "cipsDynamicCryptomapSetName",
            "in": "path",
            "required": true,
            "schema": {
              "type": "string"
            },
            "example": "1"
          },
          {
            "name": "Accept",
            "in": "header",
            "required": false,
            "description": "RESTCONF response media type (RFC 8040)",
            "schema": {
              "type": "string",
              "default": "application/yang-data+json",
              "enum": [
                "application/yang-data+json",
                "application/yang-data+xml"
              ]
            }
          },
          {
            "name": "depth",
            "in": "query",
            "required": false,
            "description": "Limit the depth of returned sub-tree data (RFC 8040 Section 4.8.2). Use 'unbounded' for full depth.",
            "schema": {
              "type": "string",
              "default": "unbounded"
            }
          },
          {
            "name": "fields",
            "in": "query",
            "required": false,
            "description": "Select specific fields to return (RFC 8040 Section 4.8.3). Example: fields=name;status",
            "schema": {
              "type": "string"
            }
          },
          {
            "name": "content",
            "in": "query",
            "required": false,
            "description": "Filter by config state: 'config' (config true only), 'nonconfig' (config false only), or 'all'.",
            "schema": {
              "type": "string",
              "enum": [
                "config",
                "nonconfig",
                "all"
              ],
              "default": "all"
            }
          }
        ],
        "responses": {
          "200": {
            "description": "Success",
            "content": {
              "application/yang-data+json": {
                "schema": {
                  "type": "object",
                  "properties": {
                    "cipsDynamicCryptomapSetName": {
                      "type": "string",
                      "description": "The index of the dynamic cryptomap table. \n            The value of the string is the one assigned \n            by the operator in defining the cryptomap set.",
                      "x-yang-type": "snmpv2-tc:DisplayString"
                    },
                    "cipsDynamicCryptomapSetSize": {
                      "type": "integer",
                      "description": "The number of cryptomap entries in this cryptomap.",
                      "minimum": 0,
                      "maximum": 4294967295
                    },
                    "cipsDynamicCryptomapSetNumAssoc": {
                      "type": "integer",
                      "description": "The number of static cryptomap sets with which\n            this dynamic cryptomap is associated.",
                      "minimum": 0,
                      "maximum": 4294967295
                    }
                  }
                },
                "example": {
                  "CISCO-IPSEC-MIB:cipsDynamicCryptomapSetEntry": {
                    "cipsDynamicCryptomapSetName": "192.168.1.1",
                    "cipsDynamicCryptomapSetSize": 0,
                    "cipsDynamicCryptomapSetNumAssoc": 0
                  }
                }
              }
            }
          },
          "403": {
            "description": "Forbidden — insufficient access rights (NACM)",
            "content": {
              "application/yang-data+json": {
                "schema": {
                  "$ref": "#/components/schemas/restconf-error"
                }
              }
            }
          }
        },
        "operationId": "get-cipsDynamicCryptomapSetEntry-4"
      },
      "x-yang-path": "/cipsDynamicCryptomapSetEntry={cipsDynamicCryptomapSetName}",
      "x-restconf-kind": "list-instance",
      "x-list-keys": [
        "cipsDynamicCryptomapSetName"
      ]
    },
    "/data/CISCO-IPSEC-MIB:cipsStaticCryptomapEntry": {
      "get": {
        "summary": "Get cipsStaticCryptomapEntry list",
        "description": "Retrieve list of cipsStaticCryptomapEntry entries from MIB",
        "tags": [
          "CISCO-IPSEC-MIB"
        ],
        "responses": {
          "200": {
            "description": "Success",
            "content": {
              "application/yang-data+json": {
                "schema": {
                  "type": "array",
                  "description": "Each entry contains the attributes \n          associated with a single static \n          (fully specified) cryptomap entry.\n          This table does not include the members \n          of dynamic cryptomap sets that may be\n          linked with the parent static cryptomap set.",
                  "items": {
                    "type": "object",
                    "properties": {
                      "cipsStaticCryptomapSetName": {
                        "type": "string",
                        "description": "cipsStaticCryptomapSetName",
                        "x-yang-type": "leafref"
                      },
                      "cipsStaticCryptomapPriority": {
                        "type": "integer",
                        "description": "The priority of the cryptomap entry in the \n            cryptomap set. This is the second index component\n            of this table.",
                        "minimum": -2147483648,
                        "maximum": 2147483647
                      },
                      "cipsStaticCryptomapType": {
                        "type": "string",
                        "description": "The type of the cryptomap entry. This can be an ISAKMP\n            cryptomap, CET or manual. Dynamic cryptomaps are not\n            counted in this table.",
                        "x-yang-type": "CISCO-IPSEC-MIB:CryptomapType"
                      },
                      "cipsStaticCryptomapDescr": {
                        "type": "string",
                        "description": "The description string entered by the operatoir\n            while creating this cryptomap. The string generally\n            identifies a description and the purpose of this\n            policy.",
                        "x-yang-type": "snmpv2-tc:DisplayString"
                      },
                      "cipsStaticCryptomapPeer": {
                        "type": "string",
                        "description": "The IP address of the current peer associated with \n            this IPSec policy item. Traffic that is protected by\n            this cryptomap is protected by a tunnel that terminates\n            at the device whose IP address is specified by this\n            object.",
                        "x-yang-type": "CISCO-IPSEC-MIB:IPSIpAddress"
                      },
                      "cipsStaticCryptomapNumPeers": {
                        "type": "integer",
                        "description": "The number of peers associated with this cryptomap \n            entry. The peers other than the one identified by \n            'cipsStaticCryptomapPeer' are backup peers. \n            \n            Manual cryptomaps may have only one peer.",
                        "minimum": -2147483648,
                        "maximum": 2147483647
                      },
                      "cipsStaticCryptomapPfs": {
                        "type": "string",
                        "description": "This object identifies if the tunnels instantiated\n            due to this policy item should use Perfect Forward Secrecy \n            (PFS) and if so, what group of Oakley they should use.",
                        "x-yang-type": "CISCO-IPSEC-MIB:DiffHellmanGrp"
                      },
                      "cipsStaticCryptomapLifetime": {
                        "type": "integer",
                        "description": "This object identifies the lifetime of the IPSec\n            Security Associations (SA) created using this IPSec policy\n            entry. If this value is zero, the lifetime assumes the \n            value specified by the global lifetime parameter.",
                        "minimum": -2147483648,
                        "maximum": 2147483647
                      },
                      "cipsStaticCryptomapLifesize": {
                        "type": "integer",
                        "description": "This object identifies the lifesize (maximum traffic\n            in bytes that may be carried) of the IPSec SAs\n            created using this IPSec policy entry. \n            If this value is zero, the lifetime assumes the \n            value specified by the global lifesize parameter.",
                        "minimum": -2147483648,
                        "maximum": 2147483647
                      },
                      "cipsStaticCryptomapLevelHost": {
                        "type": "boolean",
                        "description": "This object identifies the granularity of the\n            IPSec SAs created using this IPSec policy entry. \n            If this value is TRUE, distinct SA bundles are created\n            for distinct hosts at the end of the application traffic."
                      }
                    }
                  }
                },
                "example": {
                  "CISCO-IPSEC-MIB:cipsStaticCryptomapEntry": [
                    {
                      "cipsStaticCryptomapSetName": "192.168.1.1",
                      "cipsStaticCryptomapPriority": -2147483648,
                      "cipsStaticCryptomapType": "192.168.1.1",
                      "cipsStaticCryptomapDescr": "192.168.1.1",
                      "cipsStaticCryptomapPeer": "192.168.1.1",
                      "cipsStaticCryptomapNumPeers": -2147483648,
                      "cipsStaticCryptomapPfs": "192.168.1.1",
                      "cipsStaticCryptomapLifetime": -2147483648,
                      "cipsStaticCryptomapLifesize": -2147483648,
                      "cipsStaticCryptomapLevelHost": true
                    }
                  ]
                }
              }
            }
          },
          "403": {
            "description": "Forbidden — insufficient access rights (NACM)",
            "content": {
              "application/yang-data+json": {
                "schema": {
                  "$ref": "#/components/schemas/restconf-error"
                }
              }
            }
          }
        },
        "operationId": "get-cipsStaticCryptomapEntry-3",
        "parameters": [
          {
            "name": "Accept",
            "in": "header",
            "required": false,
            "description": "RESTCONF response media type (RFC 8040)",
            "schema": {
              "type": "string",
              "default": "application/yang-data+json",
              "enum": [
                "application/yang-data+json",
                "application/yang-data+xml"
              ]
            }
          },
          {
            "name": "depth",
            "in": "query",
            "required": false,
            "description": "Limit the depth of returned sub-tree data (RFC 8040 Section 4.8.2). Use 'unbounded' for full depth.",
            "schema": {
              "type": "string",
              "default": "unbounded"
            }
          },
          {
            "name": "fields",
            "in": "query",
            "required": false,
            "description": "Select specific fields to return (RFC 8040 Section 4.8.3). Example: fields=name;status",
            "schema": {
              "type": "string"
            }
          },
          {
            "name": "content",
            "in": "query",
            "required": false,
            "description": "Filter by config state: 'config' (config true only), 'nonconfig' (config false only), or 'all'.",
            "schema": {
              "type": "string",
              "enum": [
                "config",
                "nonconfig",
                "all"
              ],
              "default": "all"
            }
          }
        ]
      },
      "x-yang-path": "/cipsStaticCryptomapEntry",
      "x-restconf-kind": "container"
    },
    "/data/CISCO-IPSEC-MIB:cipsCryptomapSetIfEntry": {
      "get": {
        "summary": "Get cipsCryptomapSetIfEntry list",
        "description": "Retrieve list of cipsCryptomapSetIfEntry entries from MIB",
        "tags": [
          "CISCO-IPSEC-MIB"
        ],
        "responses": {
          "200": {
            "description": "Success",
            "content": {
              "application/yang-data+json": {
                "schema": {
                  "type": "array",
                  "description": "Each entry contains the record of\n          the association between an interface\n          and a cryptomap set (static) that is defined\n          on the managed entity.\n          \n          Note that the cryptomap set identified in \n          this binding must static. Dynamic cryptomaps cannot\n          be bound to interfaces.",
                  "items": {
                    "type": "object",
                    "properties": {
                      "ifIndex": {
                        "type": "string",
                        "description": "ifIndex",
                        "x-yang-type": "leafref"
                      },
                      "cipsStaticCryptomapSetName": {
                        "type": "string",
                        "description": "cipsStaticCryptomapSetName",
                        "x-yang-type": "leafref"
                      },
                      "cipsCryptomapSetIfVirtual": {
                        "type": "boolean",
                        "description": "The value of this object identifies if the\n            interface to which the cryptomap set is attached\n            is a tunnel (such as a GRE or PPTP tunnel)."
                      },
                      "cipsCryptomapSetIfStatus": {
                        "type": "string",
                        "description": "This object identifies the status of the binding \n            of the specified cryptomap set with the specified\n            interface. The value when queried is always 'attached'. \n            When set to 'detached', the cryptomap set if detached \n            from the specified interface. The effect of this is same \n            as the CLI command\n            \n            \tconfig-if# no crypto map cryptomapSetName\n            \n            Setting the value to 'attached' will result in \n            SNMP General Error.",
                        "x-yang-type": "CISCO-IPSEC-MIB:CryptomapSetBindStatus"
                      }
                    }
                  }
                },
                "example": {
                  "CISCO-IPSEC-MIB:cipsCryptomapSetIfEntry": [
                    {
                      "ifIndex": "example-string",
                      "cipsStaticCryptomapSetName": "192.168.1.1",
                      "cipsCryptomapSetIfVirtual": true,
                      "cipsCryptomapSetIfStatus": "192.168.1.1"
                    }
                  ]
                }
              }
            }
          },
          "403": {
            "description": "Forbidden — insufficient access rights (NACM)",
            "content": {
              "application/yang-data+json": {
                "schema": {
                  "$ref": "#/components/schemas/restconf-error"
                }
              }
            }
          }
        },
        "operationId": "get-cipsCryptomapSetIfEntry-3",
        "parameters": [
          {
            "name": "Accept",
            "in": "header",
            "required": false,
            "description": "RESTCONF response media type (RFC 8040)",
            "schema": {
              "type": "string",
              "default": "application/yang-data+json",
              "enum": [
                "application/yang-data+json",
                "application/yang-data+xml"
              ]
            }
          },
          {
            "name": "depth",
            "in": "query",
            "required": false,
            "description": "Limit the depth of returned sub-tree data (RFC 8040 Section 4.8.2). Use 'unbounded' for full depth.",
            "schema": {
              "type": "string",
              "default": "unbounded"
            }
          },
          {
            "name": "fields",
            "in": "query",
            "required": false,
            "description": "Select specific fields to return (RFC 8040 Section 4.8.3). Example: fields=name;status",
            "schema": {
              "type": "string"
            }
          },
          {
            "name": "content",
            "in": "query",
            "required": false,
            "description": "Filter by config state: 'config' (config true only), 'nonconfig' (config false only), or 'all'.",
            "schema": {
              "type": "string",
              "enum": [
                "config",
                "nonconfig",
                "all"
              ],
              "default": "all"
            }
          }
        ]
      },
      "x-yang-path": "/cipsCryptomapSetIfEntry",
      "x-restconf-kind": "container"
    },
    "/data/CISCO-IPSEC-MIB:cipsStaticCryptomapTable/cipsStaticCryptomapEntry={cipsStaticCryptomapSetName},{cipsStaticCryptomapPriority}": {
      "get": {
        "summary": "Get cipsStaticCryptomapEntry entry",
        "description": "Retrieve specific cipsStaticCryptomapEntry entry by key from MIB",
        "tags": [
          "CISCO-IPSEC-MIB"
        ],
        "parameters": [
          {
            "name": "cipsStaticCryptomapSetName",
            "in": "path",
            "required": true,
            "schema": {
              "type": "string"
            }
          },
          {
            "name": "cipsStaticCryptomapPriority",
            "in": "path",
            "required": true,
            "schema": {
              "type": "string"
            }
          },
          {
            "name": "Accept",
            "in": "header",
            "required": false,
            "description": "RESTCONF response media type (RFC 8040)",
            "schema": {
              "type": "string",
              "default": "application/yang-data+json",
              "enum": [
                "application/yang-data+json",
                "application/yang-data+xml"
              ]
            }
          },
          {
            "name": "depth",
            "in": "query",
            "required": false,
            "description": "Limit the depth of returned sub-tree data (RFC 8040 Section 4.8.2). Use 'unbounded' for full depth.",
            "schema": {
              "type": "string",
              "default": "unbounded"
            }
          },
          {
            "name": "fields",
            "in": "query",
            "required": false,
            "description": "Select specific fields to return (RFC 8040 Section 4.8.3). Example: fields=name;status",
            "schema": {
              "type": "string"
            }
          },
          {
            "name": "content",
            "in": "query",
            "required": false,
            "description": "Filter by config state: 'config' (config true only), 'nonconfig' (config false only), or 'all'.",
            "schema": {
              "type": "string",
              "enum": [
                "config",
                "nonconfig",
                "all"
              ],
              "default": "all"
            }
          }
        ],
        "responses": {
          "200": {
            "description": "Success",
            "content": {
              "application/yang-data+json": {
                "schema": {
                  "type": "object",
                  "properties": {
                    "cipsStaticCryptomapSetName": {
                      "type": "string",
                      "description": "cipsStaticCryptomapSetName",
                      "x-yang-type": "leafref"
                    },
                    "cipsStaticCryptomapPriority": {
                      "type": "integer",
                      "description": "The priority of the cryptomap entry in the \n            cryptomap set. This is the second index component\n            of this table.",
                      "minimum": -2147483648,
                      "maximum": 2147483647
                    },
                    "cipsStaticCryptomapType": {
                      "type": "string",
                      "description": "The type of the cryptomap entry. This can be an ISAKMP\n            cryptomap, CET or manual. Dynamic cryptomaps are not\n            counted in this table.",
                      "x-yang-type": "CISCO-IPSEC-MIB:CryptomapType"
                    },
                    "cipsStaticCryptomapDescr": {
                      "type": "string",
                      "description": "The description string entered by the operatoir\n            while creating this cryptomap. The string generally\n            identifies a description and the purpose of this\n            policy.",
                      "x-yang-type": "snmpv2-tc:DisplayString"
                    },
                    "cipsStaticCryptomapPeer": {
                      "type": "string",
                      "description": "The IP address of the current peer associated with \n            this IPSec policy item. Traffic that is protected by\n            this cryptomap is protected by a tunnel that terminates\n            at the device whose IP address is specified by this\n            object.",
                      "x-yang-type": "CISCO-IPSEC-MIB:IPSIpAddress"
                    },
                    "cipsStaticCryptomapNumPeers": {
                      "type": "integer",
                      "description": "The number of peers associated with this cryptomap \n            entry. The peers other than the one identified by \n            'cipsStaticCryptomapPeer' are backup peers. \n            \n            Manual cryptomaps may have only one peer.",
                      "minimum": -2147483648,
                      "maximum": 2147483647
                    },
                    "cipsStaticCryptomapPfs": {
                      "type": "string",
                      "description": "This object identifies if the tunnels instantiated\n            due to this policy item should use Perfect Forward Secrecy \n            (PFS) and if so, what group of Oakley they should use.",
                      "x-yang-type": "CISCO-IPSEC-MIB:DiffHellmanGrp"
                    },
                    "cipsStaticCryptomapLifetime": {
                      "type": "integer",
                      "description": "This object identifies the lifetime of the IPSec\n            Security Associations (SA) created using this IPSec policy\n            entry. If this value is zero, the lifetime assumes the \n            value specified by the global lifetime parameter.",
                      "minimum": -2147483648,
                      "maximum": 2147483647
                    },
                    "cipsStaticCryptomapLifesize": {
                      "type": "integer",
                      "description": "This object identifies the lifesize (maximum traffic\n            in bytes that may be carried) of the IPSec SAs\n            created using this IPSec policy entry. \n            If this value is zero, the lifetime assumes the \n            value specified by the global lifesize parameter.",
                      "minimum": -2147483648,
                      "maximum": 2147483647
                    },
                    "cipsStaticCryptomapLevelHost": {
                      "type": "boolean",
                      "description": "This object identifies the granularity of the\n            IPSec SAs created using this IPSec policy entry. \n            If this value is TRUE, distinct SA bundles are created\n            for distinct hosts at the end of the application traffic."
                    }
                  }
                },
                "example": {
                  "CISCO-IPSEC-MIB:cipsStaticCryptomapEntry": {
                    "cipsStaticCryptomapSetName": "192.168.1.1",
                    "cipsStaticCryptomapPriority": -2147483648,
                    "cipsStaticCryptomapType": "192.168.1.1",
                    "cipsStaticCryptomapDescr": "192.168.1.1",
                    "cipsStaticCryptomapPeer": "192.168.1.1",
                    "cipsStaticCryptomapNumPeers": -2147483648,
                    "cipsStaticCryptomapPfs": "192.168.1.1",
                    "cipsStaticCryptomapLifetime": -2147483648,
                    "cipsStaticCryptomapLifesize": -2147483648,
                    "cipsStaticCryptomapLevelHost": true
                  }
                }
              }
            }
          },
          "403": {
            "description": "Forbidden — insufficient access rights (NACM)",
            "content": {
              "application/yang-data+json": {
                "schema": {
                  "$ref": "#/components/schemas/restconf-error"
                }
              }
            }
          }
        },
        "operationId": "get-cipsStaticCryptomapEntry-2"
      },
      "x-yang-path": "/cipsStaticCryptomapTable/cipsStaticCryptomapEntry={cipsStaticCryptomapSetName cipsStaticCryptomapPriority}",
      "x-restconf-kind": "list-instance",
      "x-list-keys": [
        "cipsStaticCryptomapSetName cipsStaticCryptomapPriority"
      ]
    },
    "/data/CISCO-IPSEC-MIB:cipsCryptomapSetIfTable/cipsCryptomapSetIfEntry={ifIndex},{cipsStaticCryptomapSetName}": {
      "get": {
        "summary": "Get cipsCryptomapSetIfEntry entry",
        "description": "Retrieve specific cipsCryptomapSetIfEntry entry by key from MIB",
        "tags": [
          "CISCO-IPSEC-MIB"
        ],
        "parameters": [
          {
            "name": "ifIndex",
            "in": "path",
            "required": true,
            "schema": {
              "type": "string"
            }
          },
          {
            "name": "cipsStaticCryptomapSetName",
            "in": "path",
            "required": true,
            "schema": {
              "type": "string"
            }
          },
          {
            "name": "Accept",
            "in": "header",
            "required": false,
            "description": "RESTCONF response media type (RFC 8040)",
            "schema": {
              "type": "string",
              "default": "application/yang-data+json",
              "enum": [
                "application/yang-data+json",
                "application/yang-data+xml"
              ]
            }
          },
          {
            "name": "depth",
            "in": "query",
            "required": false,
            "description": "Limit the depth of returned sub-tree data (RFC 8040 Section 4.8.2). Use 'unbounded' for full depth.",
            "schema": {
              "type": "string",
              "default": "unbounded"
            }
          },
          {
            "name": "fields",
            "in": "query",
            "required": false,
            "description": "Select specific fields to return (RFC 8040 Section 4.8.3). Example: fields=name;status",
            "schema": {
              "type": "string"
            }
          },
          {
            "name": "content",
            "in": "query",
            "required": false,
            "description": "Filter by config state: 'config' (config true only), 'nonconfig' (config false only), or 'all'.",
            "schema": {
              "type": "string",
              "enum": [
                "config",
                "nonconfig",
                "all"
              ],
              "default": "all"
            }
          }
        ],
        "responses": {
          "200": {
            "description": "Success",
            "content": {
              "application/yang-data+json": {
                "schema": {
                  "type": "object",
                  "properties": {
                    "ifIndex": {
                      "type": "string",
                      "description": "ifIndex",
                      "x-yang-type": "leafref"
                    },
                    "cipsStaticCryptomapSetName": {
                      "type": "string",
                      "description": "cipsStaticCryptomapSetName",
                      "x-yang-type": "leafref"
                    },
                    "cipsCryptomapSetIfVirtual": {
                      "type": "boolean",
                      "description": "The value of this object identifies if the\n            interface to which the cryptomap set is attached\n            is a tunnel (such as a GRE or PPTP tunnel)."
                    },
                    "cipsCryptomapSetIfStatus": {
                      "type": "string",
                      "description": "This object identifies the status of the binding \n            of the specified cryptomap set with the specified\n            interface. The value when queried is always 'attached'. \n            When set to 'detached', the cryptomap set if detached \n            from the specified interface. The effect of this is same \n            as the CLI command\n            \n            \tconfig-if# no crypto map cryptomapSetName\n            \n            Setting the value to 'attached' will result in \n            SNMP General Error.",
                      "x-yang-type": "CISCO-IPSEC-MIB:CryptomapSetBindStatus"
                    }
                  }
                },
                "example": {
                  "CISCO-IPSEC-MIB:cipsCryptomapSetIfEntry": {
                    "ifIndex": "example-string",
                    "cipsStaticCryptomapSetName": "192.168.1.1",
                    "cipsCryptomapSetIfVirtual": true,
                    "cipsCryptomapSetIfStatus": "192.168.1.1"
                  }
                }
              }
            }
          },
          "403": {
            "description": "Forbidden — insufficient access rights (NACM)",
            "content": {
              "application/yang-data+json": {
                "schema": {
                  "$ref": "#/components/schemas/restconf-error"
                }
              }
            }
          }
        },
        "operationId": "get-cipsCryptomapSetIfEntry-2"
      },
      "x-yang-path": "/cipsCryptomapSetIfTable/cipsCryptomapSetIfEntry={ifIndex cipsStaticCryptomapSetName}",
      "x-restconf-kind": "list-instance",
      "x-list-keys": [
        "ifIndex cipsStaticCryptomapSetName"
      ]
    },
    "/data/CISCO-IPSEC-MIB:cipsStaticCryptomapEntry={cipsStaticCryptomapSetName},{cipsStaticCryptomapPriority}": {
      "get": {
        "summary": "Get cipsStaticCryptomapEntry entry",
        "description": "Retrieve specific cipsStaticCryptomapEntry entry by key from MIB",
        "tags": [
          "CISCO-IPSEC-MIB"
        ],
        "parameters": [
          {
            "name": "cipsStaticCryptomapSetName",
            "in": "path",
            "required": true,
            "schema": {
              "type": "string"
            }
          },
          {
            "name": "cipsStaticCryptomapPriority",
            "in": "path",
            "required": true,
            "schema": {
              "type": "string"
            }
          },
          {
            "name": "Accept",
            "in": "header",
            "required": false,
            "description": "RESTCONF response media type (RFC 8040)",
            "schema": {
              "type": "string",
              "default": "application/yang-data+json",
              "enum": [
                "application/yang-data+json",
                "application/yang-data+xml"
              ]
            }
          },
          {
            "name": "depth",
            "in": "query",
            "required": false,
            "description": "Limit the depth of returned sub-tree data (RFC 8040 Section 4.8.2). Use 'unbounded' for full depth.",
            "schema": {
              "type": "string",
              "default": "unbounded"
            }
          },
          {
            "name": "fields",
            "in": "query",
            "required": false,
            "description": "Select specific fields to return (RFC 8040 Section 4.8.3). Example: fields=name;status",
            "schema": {
              "type": "string"
            }
          },
          {
            "name": "content",
            "in": "query",
            "required": false,
            "description": "Filter by config state: 'config' (config true only), 'nonconfig' (config false only), or 'all'.",
            "schema": {
              "type": "string",
              "enum": [
                "config",
                "nonconfig",
                "all"
              ],
              "default": "all"
            }
          }
        ],
        "responses": {
          "200": {
            "description": "Success",
            "content": {
              "application/yang-data+json": {
                "schema": {
                  "type": "object",
                  "properties": {
                    "cipsStaticCryptomapSetName": {
                      "type": "string",
                      "description": "cipsStaticCryptomapSetName",
                      "x-yang-type": "leafref"
                    },
                    "cipsStaticCryptomapPriority": {
                      "type": "integer",
                      "description": "The priority of the cryptomap entry in the \n            cryptomap set. This is the second index component\n            of this table.",
                      "minimum": -2147483648,
                      "maximum": 2147483647
                    },
                    "cipsStaticCryptomapType": {
                      "type": "string",
                      "description": "The type of the cryptomap entry. This can be an ISAKMP\n            cryptomap, CET or manual. Dynamic cryptomaps are not\n            counted in this table.",
                      "x-yang-type": "CISCO-IPSEC-MIB:CryptomapType"
                    },
                    "cipsStaticCryptomapDescr": {
                      "type": "string",
                      "description": "The description string entered by the operatoir\n            while creating this cryptomap. The string generally\n            identifies a description and the purpose of this\n            policy.",
                      "x-yang-type": "snmpv2-tc:DisplayString"
                    },
                    "cipsStaticCryptomapPeer": {
                      "type": "string",
                      "description": "The IP address of the current peer associated with \n            this IPSec policy item. Traffic that is protected by\n            this cryptomap is protected by a tunnel that terminates\n            at the device whose IP address is specified by this\n            object.",
                      "x-yang-type": "CISCO-IPSEC-MIB:IPSIpAddress"
                    },
                    "cipsStaticCryptomapNumPeers": {
                      "type": "integer",
                      "description": "The number of peers associated with this cryptomap \n            entry. The peers other than the one identified by \n            'cipsStaticCryptomapPeer' are backup peers. \n            \n            Manual cryptomaps may have only one peer.",
                      "minimum": -2147483648,
                      "maximum": 2147483647
                    },
                    "cipsStaticCryptomapPfs": {
                      "type": "string",
                      "description": "This object identifies if the tunnels instantiated\n            due to this policy item should use Perfect Forward Secrecy \n            (PFS) and if so, what group of Oakley they should use.",
                      "x-yang-type": "CISCO-IPSEC-MIB:DiffHellmanGrp"
                    },
                    "cipsStaticCryptomapLifetime": {
                      "type": "integer",
                      "description": "This object identifies the lifetime of the IPSec\n            Security Associations (SA) created using this IPSec policy\n            entry. If this value is zero, the lifetime assumes the \n            value specified by the global lifetime parameter.",
                      "minimum": -2147483648,
                      "maximum": 2147483647
                    },
                    "cipsStaticCryptomapLifesize": {
                      "type": "integer",
                      "description": "This object identifies the lifesize (maximum traffic\n            in bytes that may be carried) of the IPSec SAs\n            created using this IPSec policy entry. \n            If this value is zero, the lifetime assumes the \n            value specified by the global lifesize parameter.",
                      "minimum": -2147483648,
                      "maximum": 2147483647
                    },
                    "cipsStaticCryptomapLevelHost": {
                      "type": "boolean",
                      "description": "This object identifies the granularity of the\n            IPSec SAs created using this IPSec policy entry. \n            If this value is TRUE, distinct SA bundles are created\n            for distinct hosts at the end of the application traffic."
                    }
                  }
                },
                "example": {
                  "CISCO-IPSEC-MIB:cipsStaticCryptomapEntry": {
                    "cipsStaticCryptomapSetName": "192.168.1.1",
                    "cipsStaticCryptomapPriority": -2147483648,
                    "cipsStaticCryptomapType": "192.168.1.1",
                    "cipsStaticCryptomapDescr": "192.168.1.1",
                    "cipsStaticCryptomapPeer": "192.168.1.1",
                    "cipsStaticCryptomapNumPeers": -2147483648,
                    "cipsStaticCryptomapPfs": "192.168.1.1",
                    "cipsStaticCryptomapLifetime": -2147483648,
                    "cipsStaticCryptomapLifesize": -2147483648,
                    "cipsStaticCryptomapLevelHost": true
                  }
                }
              }
            }
          },
          "403": {
            "description": "Forbidden — insufficient access rights (NACM)",
            "content": {
              "application/yang-data+json": {
                "schema": {
                  "$ref": "#/components/schemas/restconf-error"
                }
              }
            }
          }
        },
        "operationId": "get-cipsStaticCryptomapEntry-4"
      },
      "x-yang-path": "/cipsStaticCryptomapEntry={cipsStaticCryptomapSetName cipsStaticCryptomapPriority}",
      "x-restconf-kind": "list-instance",
      "x-list-keys": [
        "cipsStaticCryptomapSetName cipsStaticCryptomapPriority"
      ]
    },
    "/data/CISCO-IPSEC-MIB:cipsCryptomapSetIfEntry={ifIndex},{cipsStaticCryptomapSetName}": {
      "get": {
        "summary": "Get cipsCryptomapSetIfEntry entry",
        "description": "Retrieve specific cipsCryptomapSetIfEntry entry by key from MIB",
        "tags": [
          "CISCO-IPSEC-MIB"
        ],
        "parameters": [
          {
            "name": "ifIndex",
            "in": "path",
            "required": true,
            "schema": {
              "type": "string"
            }
          },
          {
            "name": "cipsStaticCryptomapSetName",
            "in": "path",
            "required": true,
            "schema": {
              "type": "string"
            }
          },
          {
            "name": "Accept",
            "in": "header",
            "required": false,
            "description": "RESTCONF response media type (RFC 8040)",
            "schema": {
              "type": "string",
              "default": "application/yang-data+json",
              "enum": [
                "application/yang-data+json",
                "application/yang-data+xml"
              ]
            }
          },
          {
            "name": "depth",
            "in": "query",
            "required": false,
            "description": "Limit the depth of returned sub-tree data (RFC 8040 Section 4.8.2). Use 'unbounded' for full depth.",
            "schema": {
              "type": "string",
              "default": "unbounded"
            }
          },
          {
            "name": "fields",
            "in": "query",
            "required": false,
            "description": "Select specific fields to return (RFC 8040 Section 4.8.3). Example: fields=name;status",
            "schema": {
              "type": "string"
            }
          },
          {
            "name": "content",
            "in": "query",
            "required": false,
            "description": "Filter by config state: 'config' (config true only), 'nonconfig' (config false only), or 'all'.",
            "schema": {
              "type": "string",
              "enum": [
                "config",
                "nonconfig",
                "all"
              ],
              "default": "all"
            }
          }
        ],
        "responses": {
          "200": {
            "description": "Success",
            "content": {
              "application/yang-data+json": {
                "schema": {
                  "type": "object",
                  "properties": {
                    "ifIndex": {
                      "type": "string",
                      "description": "ifIndex",
                      "x-yang-type": "leafref"
                    },
                    "cipsStaticCryptomapSetName": {
                      "type": "string",
                      "description": "cipsStaticCryptomapSetName",
                      "x-yang-type": "leafref"
                    },
                    "cipsCryptomapSetIfVirtual": {
                      "type": "boolean",
                      "description": "The value of this object identifies if the\n            interface to which the cryptomap set is attached\n            is a tunnel (such as a GRE or PPTP tunnel)."
                    },
                    "cipsCryptomapSetIfStatus": {
                      "type": "string",
                      "description": "This object identifies the status of the binding \n            of the specified cryptomap set with the specified\n            interface. The value when queried is always 'attached'. \n            When set to 'detached', the cryptomap set if detached \n            from the specified interface. The effect of this is same \n            as the CLI command\n            \n            \tconfig-if# no crypto map cryptomapSetName\n            \n            Setting the value to 'attached' will result in \n            SNMP General Error.",
                      "x-yang-type": "CISCO-IPSEC-MIB:CryptomapSetBindStatus"
                    }
                  }
                },
                "example": {
                  "CISCO-IPSEC-MIB:cipsCryptomapSetIfEntry": {
                    "ifIndex": "example-string",
                    "cipsStaticCryptomapSetName": "192.168.1.1",
                    "cipsCryptomapSetIfVirtual": true,
                    "cipsCryptomapSetIfStatus": "192.168.1.1"
                  }
                }
              }
            }
          },
          "403": {
            "description": "Forbidden — insufficient access rights (NACM)",
            "content": {
              "application/yang-data+json": {
                "schema": {
                  "$ref": "#/components/schemas/restconf-error"
                }
              }
            }
          }
        },
        "operationId": "get-cipsCryptomapSetIfEntry-4"
      },
      "x-yang-path": "/cipsCryptomapSetIfEntry={ifIndex cipsStaticCryptomapSetName}",
      "x-restconf-kind": "list-instance",
      "x-list-keys": [
        "ifIndex cipsStaticCryptomapSetName"
      ]
    }
  },
  "components": {
    "schemas": {
      "CISCO-IPSEC-MIB_CISCO-IPSEC-MIB": {
        "type": "object",
        "description": "The value of this object is TRUE if ISAKMP\n          has been enabled on the managed entity. Otherise\n          the value of this object is FALSE.",
        "properties": {
          "cipsIsakmpPolicyEntry": {
            "type": "array",
            "description": "Each entry contains the attributes \n          associated with a single ISAKMP\n          Policy entry.",
            "items": {
              "type": "object",
              "properties": {
                "cipsIsakmpPolPriority": {
                  "type": "integer",
                  "description": "The priotity of this ISAKMP Policy entry.\n            This is also the index of this table.",
                  "minimum": -2147483648,
                  "maximum": 2147483647,
                  "readOnly": true
                },
                "cipsIsakmpPolEncr": {
                  "type": "string",
                  "description": "The encryption transform specified by this \n            ISAKMP policy specification. The Internet Key Exchange\n            (IKE) tunnels setup using this policy item would\n            use the specified encryption transform to protect the\n            ISAKMP PDUs.",
                  "x-yang-type": "CISCO-IPSEC-MIB:EncryptAlgo",
                  "readOnly": true
                },
                "cipsIsakmpPolHash": {
                  "type": "string",
                  "description": "The hash transform specified by this \n            ISAKMP policy specification. The IKE tunnels\n            setup using this policy item would use the \n            specified hash transform to protect the\n            ISAKMP PDUs.",
                  "x-yang-type": "CISCO-IPSEC-MIB:IkeHashAlgo",
                  "readOnly": true
                },
                "cipsIsakmpPolAuth": {
                  "type": "string",
                  "description": "The peer authentication mthod specified by\n            this ISAKMP policy specification. If this policy\n            entity is selected for negotiation with a peer,\n            the local entity would authenticate the peer using \n            the method specified by this object.",
                  "x-yang-type": "CISCO-IPSEC-MIB:IkeAuthMethod",
                  "readOnly": true
                },
                "cipsIsakmpPolGroup": {
                  "type": "string",
                  "description": "This object specifies the Oakley group used \n            for Diffie Hellman exchange in the Main Mode. \n            If this policy item is selected to negotiate\n            Main Mode with an IKE peer, the local entity \n            chooses the group specified by this object to\n            perform Diffie Hellman exchange with the\n            peer.",
                  "x-yang-type": "CISCO-IPSEC-MIB:DiffHellmanGrp",
                  "readOnly": true
                },
                "cipsIsakmpPolLifetime": {
                  "type": "integer",
                  "description": "This object specifies the lifetime in seconds\n            of the IKE tunnels generated using this \n            policy specification.",
                  "minimum": -2147483648,
                  "maximum": 2147483647,
                  "readOnly": true
                }
              }
            },
            "readOnly": true
          },
          "cipsStaticCryptomapSetEntry": {
            "type": "array",
            "description": "Each entry contains the attributes \n          associated with a single static \n          cryptomap set.",
            "items": {
              "type": "object",
              "properties": {
                "cipsStaticCryptomapSetName": {
                  "type": "string",
                  "description": "The index of the static cryptomap table. The value \n            of the string is the name string assigned by the \n            operator in defining the cryptomap set.",
                  "x-yang-type": "snmpv2-tc:DisplayString",
                  "readOnly": true
                },
                "cipsStaticCryptomapSetSize": {
                  "type": "integer",
                  "description": "The total number of cryptomap entries contained in\n            this cryptomap set.",
                  "minimum": 0,
                  "maximum": 4294967295,
                  "readOnly": true
                },
                "cipsStaticCryptomapSetNumIsakmp": {
                  "type": "integer",
                  "description": "The number of cryptomaps associated with this \n            cryptomap set that use ISAKMP protocol to do key\n            exchange.",
                  "minimum": 0,
                  "maximum": 4294967295,
                  "readOnly": true
                },
                "cipsStaticCryptomapSetNumManual": {
                  "type": "integer",
                  "description": "The number of cryptomaps associated with this \n            cryptomap set that require the operator to manually\n            setup the keys and SPIs.",
                  "minimum": 0,
                  "maximum": 4294967295,
                  "readOnly": true
                },
                "cipsStaticCryptomapSetNumCET": {
                  "type": "integer",
                  "description": "The number of cryptomaps of type 'ipsec-cisco' \n            associated with this cryptomap set. Such\n            cryptomap elements implement Cisco Encryption Technology\n            based Virtual Private Networks.",
                  "minimum": 0,
                  "maximum": 4294967295,
                  "readOnly": true
                },
                "cipsStaticCryptomapSetNumDynamic": {
                  "type": "integer",
                  "description": "The number of dynamic cryptomap templates\n            linked to this cryptomap set.",
                  "minimum": 0,
                  "maximum": 4294967295,
                  "readOnly": true
                },
                "cipsStaticCryptomapSetNumDisc": {
                  "type": "integer",
                  "description": "The number of dynamic cryptomap templates\n            linked to this cryptomap set that have Tunnel Endpoint\n            Discovery (TED) enabled.",
                  "minimum": 0,
                  "maximum": 4294967295,
                  "readOnly": true
                },
                "cipsStaticCryptomapSetNumSAs": {
                  "type": "integer",
                  "description": "The number of and IPsec Security Associations\n            that are active and were setup using this cryptomap.",
                  "minimum": 0,
                  "maximum": 4294967295,
                  "readOnly": true
                }
              }
            },
            "readOnly": true
          },
          "cipsDynamicCryptomapSetEntry": {
            "type": "array",
            "description": "Each entry contains the attributes associated\n          with a single dynamic cryptomap template.",
            "items": {
              "type": "object",
              "properties": {
                "cipsDynamicCryptomapSetName": {
                  "type": "string",
                  "description": "The index of the dynamic cryptomap table. \n            The value of the string is the one assigned \n            by the operator in defining the cryptomap set.",
                  "x-yang-type": "snmpv2-tc:DisplayString",
                  "readOnly": true
                },
                "cipsDynamicCryptomapSetSize": {
                  "type": "integer",
                  "description": "The number of cryptomap entries in this cryptomap.",
                  "minimum": 0,
                  "maximum": 4294967295,
                  "readOnly": true
                },
                "cipsDynamicCryptomapSetNumAssoc": {
                  "type": "integer",
                  "description": "The number of static cryptomap sets with which\n            this dynamic cryptomap is associated.",
                  "minimum": 0,
                  "maximum": 4294967295,
                  "readOnly": true
                }
              }
            },
            "readOnly": true
          },
          "cipsStaticCryptomapEntry": {
            "type": "array",
            "description": "Each entry contains the attributes \n          associated with a single static \n          (fully specified) cryptomap entry.\n          This table does not include the members \n          of dynamic cryptomap sets that may be\n          linked with the parent static cryptomap set.",
            "items": {
              "type": "object",
              "properties": {
                "cipsStaticCryptomapSetName": {
                  "type": "string",
                  "description": "cipsStaticCryptomapSetName",
                  "x-yang-type": "leafref",
                  "readOnly": true
                },
                "cipsStaticCryptomapPriority": {
                  "type": "integer",
                  "description": "The priority of the cryptomap entry in the \n            cryptomap set. This is the second index component\n            of this table.",
                  "minimum": -2147483648,
                  "maximum": 2147483647,
                  "readOnly": true
                },
                "cipsStaticCryptomapType": {
                  "type": "string",
                  "description": "The type of the cryptomap entry. This can be an ISAKMP\n            cryptomap, CET or manual. Dynamic cryptomaps are not\n            counted in this table.",
                  "x-yang-type": "CISCO-IPSEC-MIB:CryptomapType",
                  "readOnly": true
                },
                "cipsStaticCryptomapDescr": {
                  "type": "string",
                  "description": "The description string entered by the operatoir\n            while creating this cryptomap. The string generally\n            identifies a description and the purpose of this\n            policy.",
                  "x-yang-type": "snmpv2-tc:DisplayString",
                  "readOnly": true
                },
                "cipsStaticCryptomapPeer": {
                  "type": "string",
                  "description": "The IP address of the current peer associated with \n            this IPSec policy item. Traffic that is protected by\n            this cryptomap is protected by a tunnel that terminates\n            at the device whose IP address is specified by this\n            object.",
                  "x-yang-type": "CISCO-IPSEC-MIB:IPSIpAddress",
                  "readOnly": true
                },
                "cipsStaticCryptomapNumPeers": {
                  "type": "integer",
                  "description": "The number of peers associated with this cryptomap \n            entry. The peers other than the one identified by \n            'cipsStaticCryptomapPeer' are backup peers. \n            \n            Manual cryptomaps may have only one peer.",
                  "minimum": -2147483648,
                  "maximum": 2147483647,
                  "readOnly": true
                },
                "cipsStaticCryptomapPfs": {
                  "type": "string",
                  "description": "This object identifies if the tunnels instantiated\n            due to this policy item should use Perfect Forward Secrecy \n            (PFS) and if so, what group of Oakley they should use.",
                  "x-yang-type": "CISCO-IPSEC-MIB:DiffHellmanGrp",
                  "readOnly": true
                },
                "cipsStaticCryptomapLifetime": {
                  "type": "integer",
                  "description": "This object identifies the lifetime of the IPSec\n            Security Associations (SA) created using this IPSec policy\n            entry. If this value is zero, the lifetime assumes the \n            value specified by the global lifetime parameter.",
                  "minimum": -2147483648,
                  "maximum": 2147483647,
                  "readOnly": true
                },
                "cipsStaticCryptomapLifesize": {
                  "type": "integer",
                  "description": "This object identifies the lifesize (maximum traffic\n            in bytes that may be carried) of the IPSec SAs\n            created using this IPSec policy entry. \n            If this value is zero, the lifetime assumes the \n            value specified by the global lifesize parameter.",
                  "minimum": -2147483648,
                  "maximum": 2147483647,
                  "readOnly": true
                },
                "cipsStaticCryptomapLevelHost": {
                  "type": "boolean",
                  "description": "This object identifies the granularity of the\n            IPSec SAs created using this IPSec policy entry. \n            If this value is TRUE, distinct SA bundles are created\n            for distinct hosts at the end of the application traffic.",
                  "readOnly": true
                }
              }
            },
            "readOnly": true
          },
          "cipsCryptomapSetIfEntry": {
            "type": "array",
            "description": "Each entry contains the record of\n          the association between an interface\n          and a cryptomap set (static) that is defined\n          on the managed entity.\n          \n          Note that the cryptomap set identified in \n          this binding must static. Dynamic cryptomaps cannot\n          be bound to interfaces.",
            "items": {
              "type": "object",
              "properties": {
                "ifIndex": {
                  "type": "string",
                  "description": "ifIndex",
                  "x-yang-type": "leafref",
                  "readOnly": true
                },
                "cipsStaticCryptomapSetName": {
                  "type": "string",
                  "description": "cipsStaticCryptomapSetName",
                  "x-yang-type": "leafref",
                  "readOnly": true
                },
                "cipsCryptomapSetIfVirtual": {
                  "type": "boolean",
                  "description": "The value of this object identifies if the\n            interface to which the cryptomap set is attached\n            is a tunnel (such as a GRE or PPTP tunnel).",
                  "readOnly": true
                },
                "cipsCryptomapSetIfStatus": {
                  "type": "string",
                  "description": "This object identifies the status of the binding \n            of the specified cryptomap set with the specified\n            interface. The value when queried is always 'attached'. \n            When set to 'detached', the cryptomap set if detached \n            from the specified interface. The effect of this is same \n            as the CLI command\n            \n            \tconfig-if# no crypto map cryptomapSetName\n            \n            Setting the value to 'attached' will result in \n            SNMP General Error.",
                  "x-yang-type": "CISCO-IPSEC-MIB:CryptomapSetBindStatus",
                  "readOnly": true
                }
              }
            },
            "readOnly": true
          },
          "cipsIsakmpGroup": {
            "type": "object",
            "description": "The value of this object is TRUE if ISAKMP\n          has been enabled on the managed entity. Otherise\n          the value of this object is FALSE.",
            "properties": {
              "cipsIsakmpEnabled": {
                "type": "boolean",
                "description": "The value of this object is TRUE if ISAKMP\n          has been enabled on the managed entity. Otherise\n          the value of this object is FALSE.",
                "readOnly": true
              },
              "cipsIsakmpIdentity": {
                "type": "string",
                "description": "The value of this object is shows the type of\n          identity used by the managed entity in ISAKMP\n          negotiations with another peer.",
                "x-yang-type": "CISCO-IPSEC-MIB:IkeIdentityType",
                "readOnly": true
              },
              "cipsIsakmpKeepaliveInterval": {
                "type": "integer",
                "description": "The value of this object is time interval in\n          seconds between successive ISAKMP keepalive\n          heartbeats issued to the peers to which IKE\n          tunnels have been setup.",
                "minimum": -2147483648,
                "maximum": 2147483647,
                "readOnly": true
              },
              "cipsNumIsakmpPolicies": {
                "type": "integer",
                "description": "The value of this object is the number of\n          ISAKMP policies that have been configured on the \n          managed entity.",
                "minimum": -2147483648,
                "maximum": 2147483647,
                "readOnly": true
              }
            },
            "readOnly": true
          },
          "cipsIPsecGlobals": {
            "type": "object",
            "description": "The default lifetime (in seconds) assigned \n          to an SA as a global policy (maybe overridden \n          in specific cryptomap definitions).",
            "properties": {
              "cipsSALifetime": {
                "type": "string",
                "description": "The default lifetime (in seconds) assigned \n          to an SA as a global policy (maybe overridden \n          in specific cryptomap definitions).",
                "x-yang-type": "CISCO-IPSEC-MIB:CIPsecLifetime",
                "readOnly": true
              },
              "cipsSALifesize": {
                "type": "string",
                "description": "The default lifesize in KBytes assigned to an SA \n          as a global policy (unless overridden in cryptomap \n          definition)",
                "x-yang-type": "CISCO-IPSEC-MIB:CIPsecLifesize",
                "readOnly": true
              },
              "cipsNumStaticCryptomapSets": {
                "type": "string",
                "description": "The number of Cryptomap Sets that are are fully\n          configured. Statically defined cryptomap sets \n          are ones where the operator has fully specified\n          all the parameters required set up IPSec \n          Virtual Private Networks (VPNs).",
                "x-yang-type": "CISCO-IPSEC-MIB:CIPsecNumCryptoMaps",
                "readOnly": true
              },
              "cipsNumCETCryptomapSets": {
                "type": "string",
                "description": "The number of static Cryptomap Sets that have \n          at least one CET cryptomap element\n          as a member of the set.",
                "x-yang-type": "CISCO-IPSEC-MIB:CIPsecNumCryptoMaps",
                "readOnly": true
              },
              "cipsNumDynamicCryptomapSets": {
                "type": "string",
                "description": "The number of dynamic IPSec Policy templates\n          (called 'dynamic cryptomap templates') configured\n          on the managed entity.",
                "x-yang-type": "CISCO-IPSEC-MIB:CIPsecNumCryptoMaps",
                "readOnly": true
              },
              "cipsNumTEDCryptomapSets": {
                "type": "string",
                "description": "The number of static Cryptomap Sets that have \n          at least one dynamic cryptomap template \n          bound to them which has the Tunnel Endpoint Discovery\n          (TED) enabled.",
                "x-yang-type": "CISCO-IPSEC-MIB:CIPsecNumCryptoMaps",
                "readOnly": true
              }
            },
            "readOnly": true
          },
          "cipsIPsecStatistics": {
            "type": "object",
            "description": "The number of TED probes that were received by this \n          managed entity since bootup. Not affected by any \n          CLI operation.",
            "properties": {
              "cipsNumTEDProbesReceived": {
                "type": "integer",
                "description": "The number of TED probes that were received by this \n          managed entity since bootup. Not affected by any \n          CLI operation.",
                "minimum": 0,
                "maximum": 4294967295,
                "readOnly": true
              },
              "cipsNumTEDProbesSent": {
                "type": "integer",
                "description": "The number of TED probes that were dispatched by all\n          the dynamic cryptomaps in this managed entity since \n          bootup. Not affected by any CLI operation.",
                "minimum": 0,
                "maximum": 4294967295,
                "readOnly": true
              },
              "cipsNumTEDFailures": {
                "type": "integer",
                "description": "The number of TED probes that were dispatched by \n          the local entity and that failed to locate crypto \n          endpoint.  Not affected by any CLI operation.",
                "minimum": 0,
                "maximum": 4294967295,
                "readOnly": true
              }
            },
            "readOnly": true
          },
          "cipsSysCapacityGroup": {
            "type": "object",
            "description": "The maximum number of IPsec Security Associations\n          that can be established on this managed entity.\n          If no theoretical limit exists, this\n          returns value 0.\n          \n          Not affected by any CLI operation.",
            "properties": {
              "cipsMaxSAs": {
                "type": "integer",
                "description": "The maximum number of IPsec Security Associations\n          that can be established on this managed entity.\n          If no theoretical limit exists, this\n          returns value 0.\n          \n          Not affected by any CLI operation.",
                "minimum": -2147483648,
                "maximum": 2147483647,
                "readOnly": true
              },
              "cips3DesCapable": {
                "type": "boolean",
                "description": "The value of this object is TRUE if the \n          managed entity has the hardware nad software \n          features to support 3DES encryption algorithm.\n          \n          Not affected by any CLI operation.",
                "readOnly": true
              }
            },
            "readOnly": true
          },
          "cipsTrapCntlGroup": {
            "type": "object",
            "description": "This object defines the administrative state of \n          sending the IOS IPsec ISAKMP Policy Add trap.",
            "properties": {
              "cipsCntlIsakmpPolicyAdded": {
                "type": "string",
                "description": "This object defines the administrative state of \n          sending the IOS IPsec ISAKMP Policy Add trap.",
                "x-yang-type": "CISCO-IPSEC-MIB:TrapStatus",
                "readOnly": true
              },
              "cipsCntlIsakmpPolicyDeleted": {
                "type": "string",
                "description": "This object defines the administrative state of \n          sending the IOS IPsec ISAKMP Policy Delete trap.",
                "x-yang-type": "CISCO-IPSEC-MIB:TrapStatus",
                "readOnly": true
              },
              "cipsCntlCryptomapAdded": {
                "type": "string",
                "description": "This object defines the administrative state of \n          sending the IOS IPsec Cryptomap Add trap.",
                "x-yang-type": "CISCO-IPSEC-MIB:TrapStatus",
                "readOnly": true
              },
              "cipsCntlCryptomapDeleted": {
                "type": "string",
                "description": "This object defines the administrative state of \n          sending the IOS IPsec Cryptomap Delete trap.",
                "x-yang-type": "CISCO-IPSEC-MIB:TrapStatus",
                "readOnly": true
              },
              "cipsCntlCryptomapSetAttached": {
                "type": "string",
                "description": "This object defines the administrative state of \n          sending the IOS IPsec trap that is issued\n          when a cryptomap set is attached to an interface.",
                "x-yang-type": "CISCO-IPSEC-MIB:TrapStatus",
                "readOnly": true
              },
              "cipsCntlCryptomapSetDetached": {
                "type": "string",
                "description": "This object defines the administrative state of \n          sending the IOS IPsec trap that is issued\n          when a cryptomap set is detached from an interface.\n          to which it was earlier bound.",
                "x-yang-type": "CISCO-IPSEC-MIB:TrapStatus",
                "readOnly": true
              },
              "cipsCntlTooManySAs": {
                "type": "string",
                "description": "This object defines the administrative state of \n          sending the IOS IPsec trap that is issued\n          when the number of SAs crosses the maximum\n          number of SAs that may be supported on\n          the managed entity.",
                "x-yang-type": "CISCO-IPSEC-MIB:TrapStatus",
                "readOnly": true
              }
            },
            "readOnly": true
          },
          "cipsIsakmpPolicyTable": {
            "type": "object",
            "description": "The table containing the list of all\n        ISAKMP policy entries configured by the operator.",
            "properties": {
              "cipsIsakmpPolicyEntry": {
                "type": "array",
                "description": "Each entry contains the attributes \n          associated with a single ISAKMP\n          Policy entry.",
                "items": {
                  "type": "object",
                  "properties": {
                    "cipsIsakmpPolPriority": {
                      "type": "integer",
                      "description": "The priotity of this ISAKMP Policy entry.\n            This is also the index of this table.",
                      "minimum": -2147483648,
                      "maximum": 2147483647,
                      "readOnly": true
                    },
                    "cipsIsakmpPolEncr": {
                      "type": "string",
                      "description": "The encryption transform specified by this \n            ISAKMP policy specification. The Internet Key Exchange\n            (IKE) tunnels setup using this policy item would\n            use the specified encryption transform to protect the\n            ISAKMP PDUs.",
                      "x-yang-type": "CISCO-IPSEC-MIB:EncryptAlgo",
                      "readOnly": true
                    },
                    "cipsIsakmpPolHash": {
                      "type": "string",
                      "description": "The hash transform specified by this \n            ISAKMP policy specification. The IKE tunnels\n            setup using this policy item would use the \n            specified hash transform to protect the\n            ISAKMP PDUs.",
                      "x-yang-type": "CISCO-IPSEC-MIB:IkeHashAlgo",
                      "readOnly": true
                    },
                    "cipsIsakmpPolAuth": {
                      "type": "string",
                      "description": "The peer authentication mthod specified by\n            this ISAKMP policy specification. If this policy\n            entity is selected for negotiation with a peer,\n            the local entity would authenticate the peer using \n            the method specified by this object.",
                      "x-yang-type": "CISCO-IPSEC-MIB:IkeAuthMethod",
                      "readOnly": true
                    },
                    "cipsIsakmpPolGroup": {
                      "type": "string",
                      "description": "This object specifies the Oakley group used \n            for Diffie Hellman exchange in the Main Mode. \n            If this policy item is selected to negotiate\n            Main Mode with an IKE peer, the local entity \n            chooses the group specified by this object to\n            perform Diffie Hellman exchange with the\n            peer.",
                      "x-yang-type": "CISCO-IPSEC-MIB:DiffHellmanGrp",
                      "readOnly": true
                    },
                    "cipsIsakmpPolLifetime": {
                      "type": "integer",
                      "description": "This object specifies the lifetime in seconds\n            of the IKE tunnels generated using this \n            policy specification.",
                      "minimum": -2147483648,
                      "maximum": 2147483647,
                      "readOnly": true
                    }
                  }
                },
                "readOnly": true
              }
            },
            "readOnly": true
          },
          "cipsStaticCryptomapSetTable": {
            "type": "object",
            "description": "The table containing the list of all\n        cryptomap sets that are fully specified\n        and are not wild-carded.\n        \n        The operator may include different types of\n        cryptomaps in such a set - manual, CET,\n        ISAKMP or dynamic.",
            "properties": {
              "cipsStaticCryptomapSetEntry": {
                "type": "array",
                "description": "Each entry contains the attributes \n          associated with a single static \n          cryptomap set.",
                "items": {
                  "type": "object",
                  "properties": {
                    "cipsStaticCryptomapSetName": {
                      "type": "string",
                      "description": "The index of the static cryptomap table. The value \n            of the string is the name string assigned by the \n            operator in defining the cryptomap set.",
                      "x-yang-type": "snmpv2-tc:DisplayString",
                      "readOnly": true
                    },
                    "cipsStaticCryptomapSetSize": {
                      "type": "integer",
                      "description": "The total number of cryptomap entries contained in\n            this cryptomap set.",
                      "minimum": 0,
                      "maximum": 4294967295,
                      "readOnly": true
                    },
                    "cipsStaticCryptomapSetNumIsakmp": {
                      "type": "integer",
                      "description": "The number of cryptomaps associated with this \n            cryptomap set that use ISAKMP protocol to do key\n            exchange.",
                      "minimum": 0,
                      "maximum": 4294967295,
                      "readOnly": true
                    },
                    "cipsStaticCryptomapSetNumManual": {
                      "type": "integer",
                      "description": "The number of cryptomaps associated with this \n            cryptomap set that require the operator to manually\n            setup the keys and SPIs.",
                      "minimum": 0,
                      "maximum": 4294967295,
                      "readOnly": true
                    },
                    "cipsStaticCryptomapSetNumCET": {
                      "type": "integer",
                      "description": "The number of cryptomaps of type 'ipsec-cisco' \n            associated with this cryptomap set. Such\n            cryptomap elements implement Cisco Encryption Technology\n            based Virtual Private Networks.",
                      "minimum": 0,
                      "maximum": 4294967295,
                      "readOnly": true
                    },
                    "cipsStaticCryptomapSetNumDynamic": {
                      "type": "integer",
                      "description": "The number of dynamic cryptomap templates\n            linked to this cryptomap set.",
                      "minimum": 0,
                      "maximum": 4294967295,
                      "readOnly": true
                    },
                    "cipsStaticCryptomapSetNumDisc": {
                      "type": "integer",
                      "description": "The number of dynamic cryptomap templates\n            linked to this cryptomap set that have Tunnel Endpoint\n            Discovery (TED) enabled.",
                      "minimum": 0,
                      "maximum": 4294967295,
                      "readOnly": true
                    },
                    "cipsStaticCryptomapSetNumSAs": {
                      "type": "integer",
                      "description": "The number of and IPsec Security Associations\n            that are active and were setup using this cryptomap.",
                      "minimum": 0,
                      "maximum": 4294967295,
                      "readOnly": true
                    }
                  }
                },
                "readOnly": true
              }
            },
            "readOnly": true
          },
          "cipsDynamicCryptomapSetTable": {
            "type": "object",
            "description": "The table containing the list of all dynamic\n        cryptomaps that use IKE, defined on \n         the managed entity.",
            "properties": {
              "cipsDynamicCryptomapSetEntry": {
                "type": "array",
                "description": "Each entry contains the attributes associated\n          with a single dynamic cryptomap template.",
                "items": {
                  "type": "object",
                  "properties": {
                    "cipsDynamicCryptomapSetName": {
                      "type": "string",
                      "description": "The index of the dynamic cryptomap table. \n            The value of the string is the one assigned \n            by the operator in defining the cryptomap set.",
                      "x-yang-type": "snmpv2-tc:DisplayString",
                      "readOnly": true
                    },
                    "cipsDynamicCryptomapSetSize": {
                      "type": "integer",
                      "description": "The number of cryptomap entries in this cryptomap.",
                      "minimum": 0,
                      "maximum": 4294967295,
                      "readOnly": true
                    },
                    "cipsDynamicCryptomapSetNumAssoc": {
                      "type": "integer",
                      "description": "The number of static cryptomap sets with which\n            this dynamic cryptomap is associated.",
                      "minimum": 0,
                      "maximum": 4294967295,
                      "readOnly": true
                    }
                  }
                },
                "readOnly": true
              }
            },
            "readOnly": true
          },
          "cipsStaticCryptomapTable": {
            "type": "object",
            "description": "The table ilisting the member cryptomaps\n        of the cryptomap sets that are configured\n        on the managed entity.",
            "properties": {
              "cipsStaticCryptomapEntry": {
                "type": "array",
                "description": "Each entry contains the attributes \n          associated with a single static \n          (fully specified) cryptomap entry.\n          This table does not include the members \n          of dynamic cryptomap sets that may be\n          linked with the parent static cryptomap set.",
                "items": {
                  "type": "object",
                  "properties": {
                    "cipsStaticCryptomapSetName": {
                      "type": "string",
                      "description": "cipsStaticCryptomapSetName",
                      "x-yang-type": "leafref",
                      "readOnly": true
                    },
                    "cipsStaticCryptomapPriority": {
                      "type": "integer",
                      "description": "The priority of the cryptomap entry in the \n            cryptomap set. This is the second index component\n            of this table.",
                      "minimum": -2147483648,
                      "maximum": 2147483647,
                      "readOnly": true
                    },
                    "cipsStaticCryptomapType": {
                      "type": "string",
                      "description": "The type of the cryptomap entry. This can be an ISAKMP\n            cryptomap, CET or manual. Dynamic cryptomaps are not\n            counted in this table.",
                      "x-yang-type": "CISCO-IPSEC-MIB:CryptomapType",
                      "readOnly": true
                    },
                    "cipsStaticCryptomapDescr": {
                      "type": "string",
                      "description": "The description string entered by the operatoir\n            while creating this cryptomap. The string generally\n            identifies a description and the purpose of this\n            policy.",
                      "x-yang-type": "snmpv2-tc:DisplayString",
                      "readOnly": true
                    },
                    "cipsStaticCryptomapPeer": {
                      "type": "string",
                      "description": "The IP address of the current peer associated with \n            this IPSec policy item. Traffic that is protected by\n            this cryptomap is protected by a tunnel that terminates\n            at the device whose IP address is specified by this\n            object.",
                      "x-yang-type": "CISCO-IPSEC-MIB:IPSIpAddress",
                      "readOnly": true
                    },
                    "cipsStaticCryptomapNumPeers": {
                      "type": "integer",
                      "description": "The number of peers associated with this cryptomap \n            entry. The peers other than the one identified by \n            'cipsStaticCryptomapPeer' are backup peers. \n            \n            Manual cryptomaps may have only one peer.",
                      "minimum": -2147483648,
                      "maximum": 2147483647,
                      "readOnly": true
                    },
                    "cipsStaticCryptomapPfs": {
                      "type": "string",
                      "description": "This object identifies if the tunnels instantiated\n            due to this policy item should use Perfect Forward Secrecy \n            (PFS) and if so, what group of Oakley they should use.",
                      "x-yang-type": "CISCO-IPSEC-MIB:DiffHellmanGrp",
                      "readOnly": true
                    },
                    "cipsStaticCryptomapLifetime": {
                      "type": "integer",
                      "description": "This object identifies the lifetime of the IPSec\n            Security Associations (SA) created using this IPSec policy\n            entry. If this value is zero, the lifetime assumes the \n            value specified by the global lifetime parameter.",
                      "minimum": -2147483648,
                      "maximum": 2147483647,
                      "readOnly": true
                    },
                    "cipsStaticCryptomapLifesize": {
                      "type": "integer",
                      "description": "This object identifies the lifesize (maximum traffic\n            in bytes that may be carried) of the IPSec SAs\n            created using this IPSec policy entry. \n            If this value is zero, the lifetime assumes the \n            value specified by the global lifesize parameter.",
                      "minimum": -2147483648,
                      "maximum": 2147483647,
                      "readOnly": true
                    },
                    "cipsStaticCryptomapLevelHost": {
                      "type": "boolean",
                      "description": "This object identifies the granularity of the\n            IPSec SAs created using this IPSec policy entry. \n            If this value is TRUE, distinct SA bundles are created\n            for distinct hosts at the end of the application traffic.",
                      "readOnly": true
                    }
                  }
                },
                "readOnly": true
              }
            },
            "readOnly": true
          },
          "cipsCryptomapSetIfTable": {
            "type": "object",
            "description": "The table lists the binding of cryptomap sets\n        to the interfaces of the managed entity.",
            "properties": {
              "cipsCryptomapSetIfEntry": {
                "type": "array",
                "description": "Each entry contains the record of\n          the association between an interface\n          and a cryptomap set (static) that is defined\n          on the managed entity.\n          \n          Note that the cryptomap set identified in \n          this binding must static. Dynamic cryptomaps cannot\n          be bound to interfaces.",
                "items": {
                  "type": "object",
                  "properties": {
                    "ifIndex": {
                      "type": "string",
                      "description": "ifIndex",
                      "x-yang-type": "leafref",
                      "readOnly": true
                    },
                    "cipsStaticCryptomapSetName": {
                      "type": "string",
                      "description": "cipsStaticCryptomapSetName",
                      "x-yang-type": "leafref",
                      "readOnly": true
                    },
                    "cipsCryptomapSetIfVirtual": {
                      "type": "boolean",
                      "description": "The value of this object identifies if the\n            interface to which the cryptomap set is attached\n            is a tunnel (such as a GRE or PPTP tunnel).",
                      "readOnly": true
                    },
                    "cipsCryptomapSetIfStatus": {
                      "type": "string",
                      "description": "This object identifies the status of the binding \n            of the specified cryptomap set with the specified\n            interface. The value when queried is always 'attached'. \n            When set to 'detached', the cryptomap set if detached \n            from the specified interface. The effect of this is same \n            as the CLI command\n            \n            \tconfig-if# no crypto map cryptomapSetName\n            \n            Setting the value to 'attached' will result in \n            SNMP General Error.",
                      "x-yang-type": "CISCO-IPSEC-MIB:CryptomapSetBindStatus",
                      "readOnly": true
                    }
                  }
                },
                "readOnly": true
              }
            },
            "readOnly": true
          }
        }
      },
      "CISCO-IPSEC-MIB_object-1": {
        "type": "object",
        "description": "object-1",
        "properties": {
          "cipsMaxSAs": {
            "type": "string",
            "description": "cipsMaxSAs",
            "x-yang-type": "leafref",
            "readOnly": true
          }
        }
      },
      "CISCO-IPSEC-MIB_object-2": {
        "type": "object",
        "description": "object-2",
        "properties": {
          "cipsStaticCryptomapSetName": {
            "type": "string",
            "description": "cipsStaticCryptomapSetName",
            "x-yang-type": "leafref",
            "readOnly": true
          },
          "cipsStaticCryptomapSetNumIsakmp": {
            "type": "string",
            "description": "cipsStaticCryptomapSetNumIsakmp",
            "x-yang-type": "leafref",
            "readOnly": true
          }
        }
      },
      "CISCO-IPSEC-MIB_object-3": {
        "type": "object",
        "description": "object-3",
        "properties": {
          "cipsStaticCryptomapSetName": {
            "type": "string",
            "description": "cipsStaticCryptomapSetName",
            "x-yang-type": "leafref",
            "readOnly": true
          },
          "cipsStaticCryptomapSetNumDynamic": {
            "type": "string",
            "description": "cipsStaticCryptomapSetNumDynamic",
            "x-yang-type": "leafref",
            "readOnly": true
          }
        }
      },
      "CISCO-IPSEC-MIB_cipsIsakmpPolicyEntry": {
        "type": "array",
        "description": "Each entry contains the attributes \n          associated with a single ISAKMP\n          Policy entry.",
        "items": {
          "type": "object",
          "properties": {
            "cipsIsakmpPolPriority": {
              "type": "integer",
              "description": "The priotity of this ISAKMP Policy entry.\n            This is also the index of this table.",
              "minimum": -2147483648,
              "maximum": 2147483647,
              "readOnly": true
            },
            "cipsIsakmpPolEncr": {
              "type": "string",
              "description": "The encryption transform specified by this \n            ISAKMP policy specification. The Internet Key Exchange\n            (IKE) tunnels setup using this policy item would\n            use the specified encryption transform to protect the\n            ISAKMP PDUs.",
              "x-yang-type": "CISCO-IPSEC-MIB:EncryptAlgo",
              "readOnly": true
            },
            "cipsIsakmpPolHash": {
              "type": "string",
              "description": "The hash transform specified by this \n            ISAKMP policy specification. The IKE tunnels\n            setup using this policy item would use the \n            specified hash transform to protect the\n            ISAKMP PDUs.",
              "x-yang-type": "CISCO-IPSEC-MIB:IkeHashAlgo",
              "readOnly": true
            },
            "cipsIsakmpPolAuth": {
              "type": "string",
              "description": "The peer authentication mthod specified by\n            this ISAKMP policy specification. If this policy\n            entity is selected for negotiation with a peer,\n            the local entity would authenticate the peer using \n            the method specified by this object.",
              "x-yang-type": "CISCO-IPSEC-MIB:IkeAuthMethod",
              "readOnly": true
            },
            "cipsIsakmpPolGroup": {
              "type": "string",
              "description": "This object specifies the Oakley group used \n            for Diffie Hellman exchange in the Main Mode. \n            If this policy item is selected to negotiate\n            Main Mode with an IKE peer, the local entity \n            chooses the group specified by this object to\n            perform Diffie Hellman exchange with the\n            peer.",
              "x-yang-type": "CISCO-IPSEC-MIB:DiffHellmanGrp",
              "readOnly": true
            },
            "cipsIsakmpPolLifetime": {
              "type": "integer",
              "description": "This object specifies the lifetime in seconds\n            of the IKE tunnels generated using this \n            policy specification.",
              "minimum": -2147483648,
              "maximum": 2147483647,
              "readOnly": true
            }
          }
        }
      },
      "CISCO-IPSEC-MIB_cipsStaticCryptomapSetEntry": {
        "type": "array",
        "description": "Each entry contains the attributes \n          associated with a single static \n          cryptomap set.",
        "items": {
          "type": "object",
          "properties": {
            "cipsStaticCryptomapSetName": {
              "type": "string",
              "description": "The index of the static cryptomap table. The value \n            of the string is the name string assigned by the \n            operator in defining the cryptomap set.",
              "x-yang-type": "snmpv2-tc:DisplayString",
              "readOnly": true
            },
            "cipsStaticCryptomapSetSize": {
              "type": "integer",
              "description": "The total number of cryptomap entries contained in\n            this cryptomap set.",
              "minimum": 0,
              "maximum": 4294967295,
              "readOnly": true
            },
            "cipsStaticCryptomapSetNumIsakmp": {
              "type": "integer",
              "description": "The number of cryptomaps associated with this \n            cryptomap set that use ISAKMP protocol to do key\n            exchange.",
              "minimum": 0,
              "maximum": 4294967295,
              "readOnly": true
            },
            "cipsStaticCryptomapSetNumManual": {
              "type": "integer",
              "description": "The number of cryptomaps associated with this \n            cryptomap set that require the operator to manually\n            setup the keys and SPIs.",
              "minimum": 0,
              "maximum": 4294967295,
              "readOnly": true
            },
            "cipsStaticCryptomapSetNumCET": {
              "type": "integer",
              "description": "The number of cryptomaps of type 'ipsec-cisco' \n            associated with this cryptomap set. Such\n            cryptomap elements implement Cisco Encryption Technology\n            based Virtual Private Networks.",
              "minimum": 0,
              "maximum": 4294967295,
              "readOnly": true
            },
            "cipsStaticCryptomapSetNumDynamic": {
              "type": "integer",
              "description": "The number of dynamic cryptomap templates\n            linked to this cryptomap set.",
              "minimum": 0,
              "maximum": 4294967295,
              "readOnly": true
            },
            "cipsStaticCryptomapSetNumDisc": {
              "type": "integer",
              "description": "The number of dynamic cryptomap templates\n            linked to this cryptomap set that have Tunnel Endpoint\n            Discovery (TED) enabled.",
              "minimum": 0,
              "maximum": 4294967295,
              "readOnly": true
            },
            "cipsStaticCryptomapSetNumSAs": {
              "type": "integer",
              "description": "The number of and IPsec Security Associations\n            that are active and were setup using this cryptomap.",
              "minimum": 0,
              "maximum": 4294967295,
              "readOnly": true
            }
          }
        }
      },
      "CISCO-IPSEC-MIB_cipsDynamicCryptomapSetEntry": {
        "type": "array",
        "description": "Each entry contains the attributes associated\n          with a single dynamic cryptomap template.",
        "items": {
          "type": "object",
          "properties": {
            "cipsDynamicCryptomapSetName": {
              "type": "string",
              "description": "The index of the dynamic cryptomap table. \n            The value of the string is the one assigned \n            by the operator in defining the cryptomap set.",
              "x-yang-type": "snmpv2-tc:DisplayString",
              "readOnly": true
            },
            "cipsDynamicCryptomapSetSize": {
              "type": "integer",
              "description": "The number of cryptomap entries in this cryptomap.",
              "minimum": 0,
              "maximum": 4294967295,
              "readOnly": true
            },
            "cipsDynamicCryptomapSetNumAssoc": {
              "type": "integer",
              "description": "The number of static cryptomap sets with which\n            this dynamic cryptomap is associated.",
              "minimum": 0,
              "maximum": 4294967295,
              "readOnly": true
            }
          }
        }
      },
      "CISCO-IPSEC-MIB_cipsStaticCryptomapEntry": {
        "type": "array",
        "description": "Each entry contains the attributes \n          associated with a single static \n          (fully specified) cryptomap entry.\n          This table does not include the members \n          of dynamic cryptomap sets that may be\n          linked with the parent static cryptomap set.",
        "items": {
          "type": "object",
          "properties": {
            "cipsStaticCryptomapSetName": {
              "type": "string",
              "description": "cipsStaticCryptomapSetName",
              "x-yang-type": "leafref",
              "readOnly": true
            },
            "cipsStaticCryptomapPriority": {
              "type": "integer",
              "description": "The priority of the cryptomap entry in the \n            cryptomap set. This is the second index component\n            of this table.",
              "minimum": -2147483648,
              "maximum": 2147483647,
              "readOnly": true
            },
            "cipsStaticCryptomapType": {
              "type": "string",
              "description": "The type of the cryptomap entry. This can be an ISAKMP\n            cryptomap, CET or manual. Dynamic cryptomaps are not\n            counted in this table.",
              "x-yang-type": "CISCO-IPSEC-MIB:CryptomapType",
              "readOnly": true
            },
            "cipsStaticCryptomapDescr": {
              "type": "string",
              "description": "The description string entered by the operatoir\n            while creating this cryptomap. The string generally\n            identifies a description and the purpose of this\n            policy.",
              "x-yang-type": "snmpv2-tc:DisplayString",
              "readOnly": true
            },
            "cipsStaticCryptomapPeer": {
              "type": "string",
              "description": "The IP address of the current peer associated with \n            this IPSec policy item. Traffic that is protected by\n            this cryptomap is protected by a tunnel that terminates\n            at the device whose IP address is specified by this\n            object.",
              "x-yang-type": "CISCO-IPSEC-MIB:IPSIpAddress",
              "readOnly": true
            },
            "cipsStaticCryptomapNumPeers": {
              "type": "integer",
              "description": "The number of peers associated with this cryptomap \n            entry. The peers other than the one identified by \n            'cipsStaticCryptomapPeer' are backup peers. \n            \n            Manual cryptomaps may have only one peer.",
              "minimum": -2147483648,
              "maximum": 2147483647,
              "readOnly": true
            },
            "cipsStaticCryptomapPfs": {
              "type": "string",
              "description": "This object identifies if the tunnels instantiated\n            due to this policy item should use Perfect Forward Secrecy \n            (PFS) and if so, what group of Oakley they should use.",
              "x-yang-type": "CISCO-IPSEC-MIB:DiffHellmanGrp",
              "readOnly": true
            },
            "cipsStaticCryptomapLifetime": {
              "type": "integer",
              "description": "This object identifies the lifetime of the IPSec\n            Security Associations (SA) created using this IPSec policy\n            entry. If this value is zero, the lifetime assumes the \n            value specified by the global lifetime parameter.",
              "minimum": -2147483648,
              "maximum": 2147483647,
              "readOnly": true
            },
            "cipsStaticCryptomapLifesize": {
              "type": "integer",
              "description": "This object identifies the lifesize (maximum traffic\n            in bytes that may be carried) of the IPSec SAs\n            created using this IPSec policy entry. \n            If this value is zero, the lifetime assumes the \n            value specified by the global lifesize parameter.",
              "minimum": -2147483648,
              "maximum": 2147483647,
              "readOnly": true
            },
            "cipsStaticCryptomapLevelHost": {
              "type": "boolean",
              "description": "This object identifies the granularity of the\n            IPSec SAs created using this IPSec policy entry. \n            If this value is TRUE, distinct SA bundles are created\n            for distinct hosts at the end of the application traffic.",
              "readOnly": true
            }
          }
        }
      },
      "CISCO-IPSEC-MIB_cipsCryptomapSetIfEntry": {
        "type": "array",
        "description": "Each entry contains the record of\n          the association between an interface\n          and a cryptomap set (static) that is defined\n          on the managed entity.\n          \n          Note that the cryptomap set identified in \n          this binding must static. Dynamic cryptomaps cannot\n          be bound to interfaces.",
        "items": {
          "type": "object",
          "properties": {
            "ifIndex": {
              "type": "string",
              "description": "ifIndex",
              "x-yang-type": "leafref",
              "readOnly": true
            },
            "cipsStaticCryptomapSetName": {
              "type": "string",
              "description": "cipsStaticCryptomapSetName",
              "x-yang-type": "leafref",
              "readOnly": true
            },
            "cipsCryptomapSetIfVirtual": {
              "type": "boolean",
              "description": "The value of this object identifies if the\n            interface to which the cryptomap set is attached\n            is a tunnel (such as a GRE or PPTP tunnel).",
              "readOnly": true
            },
            "cipsCryptomapSetIfStatus": {
              "type": "string",
              "description": "This object identifies the status of the binding \n            of the specified cryptomap set with the specified\n            interface. The value when queried is always 'attached'. \n            When set to 'detached', the cryptomap set if detached \n            from the specified interface. The effect of this is same \n            as the CLI command\n            \n            \tconfig-if# no crypto map cryptomapSetName\n            \n            Setting the value to 'attached' will result in \n            SNMP General Error.",
              "x-yang-type": "CISCO-IPSEC-MIB:CryptomapSetBindStatus",
              "readOnly": true
            }
          }
        }
      },
      "restconf-error": {
        "type": "object",
        "description": "Standard RESTCONF error response (RFC 8040 Section 7.1)",
        "properties": {
          "ietf-restconf:errors": {
            "type": "object",
            "properties": {
              "error": {
                "type": "array",
                "items": {
                  "type": "object",
                  "properties": {
                    "error-type": {
                      "type": "string",
                      "enum": [
                        "transport",
                        "rpc",
                        "protocol",
                        "application"
                      ],
                      "description": "Layer where the error occurred"
                    },
                    "error-tag": {
                      "type": "string",
                      "description": "Enumerated error tag (e.g. invalid-value, data-missing, access-denied)"
                    },
                    "error-severity": {
                      "type": "string",
                      "enum": [
                        "error",
                        "warning"
                      ],
                      "description": "Error severity"
                    },
                    "error-app-tag": {
                      "type": "string",
                      "description": "Application-specific error tag"
                    },
                    "error-path": {
                      "type": "string",
                      "description": "YANG instance-identifier of the error node"
                    },
                    "error-message": {
                      "type": "string",
                      "description": "Human-readable error description"
                    }
                  },
                  "required": [
                    "error-type",
                    "error-tag"
                  ]
                }
              }
            }
          }
        },
        "example": {
          "ietf-restconf:errors": {
            "error": [
              {
                "error-type": "protocol",
                "error-tag": "invalid-value",
                "error-severity": "error",
                "error-message": "Invalid input parameter"
              }
            ]
          }
        }
      }
    },
    "securitySchemes": {
      "basicAuth": {
        "type": "http",
        "scheme": "basic"
      }
    }
  },
  "security": [
    {
      "basicAuth": []
    }
  ],
  "tags": [
    {
      "name": "CISCO-IPSEC-MIB",
      "description": "MIB operations for CISCO-IPSEC-MIB"
    }
  ],
  "externalDocs": {
    "description": "Cisco SNMP Object Navigator",
    "url": "https://snmp.cloudapps.cisco.com/Support/IOS/do/BrowseMIB.do"
  }
}
