Troubleshooting guide

Appendix A: State Tables for VPN-1/FireWall-1 4.0 What are State Tables?
Advanced Technical Reference Guide 4.1 June 2000 139
VPN tables.......................................................................................................................................................153
Encryption tables ..........................................................................................................................................153
decryption_pending table..........................................................................................................................153
encryption_requests table.........................................................................................................................153
rejected_encryptions table........................................................................................................................154
rdp_table table ..........................................................................................................................................154
cryptlog_table table...................................................................................................................................154
SKIP tables...................................................................................................................................................154
skip_connections table..............................................................................................................................154
skip_key_requests table ...........................................................................................................................155
skip_table table .........................................................................................................................................155
skip_keyid table ........................................................................................................................................155
IKE tables .....................................................................................................................................................156
ISAKMP_ESP_table table.........................................................................................................................156
ISAKMP_AH_table table...........................................................................................................................156
IPSec tables..................................................................................................................................................156
manual_table table....................................................................................................................................156
SA_requests table.....................................................................................................................................156
SPI_table table..........................................................................................................................................157
SecuRemote — client side tables.................................................................................................................157
enc_timer table .............................................................................................................................................157
userc_topology table ....................................................................................................................................157
userc_session table......................................................................................................................................158
userc_encapsulating_gateways table ..........................................................................................................158
userc_request table ......................................................................................................................................159
SecuRemote — server side tables ...............................................................................................................159
userc_rules table ..........................................................................................................................................159
userc_encapsulating_clients table ...............................................................................................................160
userc_dont_trap table...................................................................................................................................160
userc_bind table ...........................................................................................................................................161
IPSEC_userc_dont_trap_table table............................................................................................................161
userc_request_extended table .....................................................................................................................162
userc_resolved_gw table..............................................................................................................................162
userc_DNS_A table......................................................................................................................................162
userc_DNS_PTR table .................................................................................................................................162
userc_encrypt_DNS table.............................................................................................................................162
Security servers and authentication tables.................................................................................................162
auth_services table.......................................................................................................................................162
client_auth table ...........................................................................................................................................162
client_was_auth table...................................................................................................................................163
proxied_conns table .....................................................................................................................................163
autoclntauth_fold table .................................................................................................................................164
session_auth table........................................................................................................................................164
session_requests table.................................................................................................................................165
Load balancing tables ...................................................................................................................................165
check_alive table ..........................................................................................................................................165
logical_requests table...................................................................................................................................165
logical_servers_table table...........................................................................................................................166
logical_servers_list_table table.....................................................................................................................166
logical_cache_table table .............................................................................................................................167