Alibaba Cloud v3.77.0 published on Friday, May 2, 2025 by Pulumi
alicloud.vpn.getGatewayVpnAttachments
Explore with Pulumi AI
This data source provides Vpn Gateway Vpn Attachment available to the user.What is Vpn Attachment
NOTE: Available since v1.245.0.
Using getGatewayVpnAttachments
Two invocation forms are available. The direct form accepts plain arguments and either blocks until the result value is available, or returns a Promise-wrapped result. The output form accepts Input-wrapped arguments and returns an Output-wrapped result.
function getGatewayVpnAttachments(args: GetGatewayVpnAttachmentsArgs, opts?: InvokeOptions): Promise<GetGatewayVpnAttachmentsResult>
function getGatewayVpnAttachmentsOutput(args: GetGatewayVpnAttachmentsOutputArgs, opts?: InvokeOptions): Output<GetGatewayVpnAttachmentsResult>
def get_gateway_vpn_attachments(ids: Optional[Sequence[str]] = None,
name_regex: Optional[str] = None,
output_file: Optional[str] = None,
page_number: Optional[int] = None,
page_size: Optional[int] = None,
status: Optional[str] = None,
opts: Optional[InvokeOptions] = None) -> GetGatewayVpnAttachmentsResult
def get_gateway_vpn_attachments_output(ids: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
name_regex: Optional[pulumi.Input[str]] = None,
output_file: Optional[pulumi.Input[str]] = None,
page_number: Optional[pulumi.Input[int]] = None,
page_size: Optional[pulumi.Input[int]] = None,
status: Optional[pulumi.Input[str]] = None,
opts: Optional[InvokeOptions] = None) -> Output[GetGatewayVpnAttachmentsResult]
func GetGatewayVpnAttachments(ctx *Context, args *GetGatewayVpnAttachmentsArgs, opts ...InvokeOption) (*GetGatewayVpnAttachmentsResult, error)
func GetGatewayVpnAttachmentsOutput(ctx *Context, args *GetGatewayVpnAttachmentsOutputArgs, opts ...InvokeOption) GetGatewayVpnAttachmentsResultOutput
> Note: This function is named GetGatewayVpnAttachments
in the Go SDK.
public static class GetGatewayVpnAttachments
{
public static Task<GetGatewayVpnAttachmentsResult> InvokeAsync(GetGatewayVpnAttachmentsArgs args, InvokeOptions? opts = null)
public static Output<GetGatewayVpnAttachmentsResult> Invoke(GetGatewayVpnAttachmentsInvokeArgs args, InvokeOptions? opts = null)
}
public static CompletableFuture<GetGatewayVpnAttachmentsResult> getGatewayVpnAttachments(GetGatewayVpnAttachmentsArgs args, InvokeOptions options)
public static Output<GetGatewayVpnAttachmentsResult> getGatewayVpnAttachments(GetGatewayVpnAttachmentsArgs args, InvokeOptions options)
fn::invoke:
function: alicloud:vpn/getGatewayVpnAttachments:getGatewayVpnAttachments
arguments:
# arguments dictionary
The following arguments are supported:
- Ids List<string>
- A list of Vpn Attachment IDs.
- Name
Regex string - A regex string to filter results by Group Metric Rule name.
- Output
File string - File name where to save data source results (after running
pulumi preview
). - Page
Number int - Current page number.
- Page
Size int - Number of records per page.
- Status string
- The status of the resource. Valid values:
init
,active
,attaching
,attached
,detaching
,financialLocked
,provisioning
,updating
,upgrading
,deleted
.
- Ids []string
- A list of Vpn Attachment IDs.
- Name
Regex string - A regex string to filter results by Group Metric Rule name.
- Output
File string - File name where to save data source results (after running
pulumi preview
). - Page
Number int - Current page number.
- Page
Size int - Number of records per page.
- Status string
- The status of the resource. Valid values:
init
,active
,attaching
,attached
,detaching
,financialLocked
,provisioning
,updating
,upgrading
,deleted
.
- ids List<String>
- A list of Vpn Attachment IDs.
- name
Regex String - A regex string to filter results by Group Metric Rule name.
- output
File String - File name where to save data source results (after running
pulumi preview
). - page
Number Integer - Current page number.
- page
Size Integer - Number of records per page.
- status String
- The status of the resource. Valid values:
init
,active
,attaching
,attached
,detaching
,financialLocked
,provisioning
,updating
,upgrading
,deleted
.
- ids string[]
- A list of Vpn Attachment IDs.
- name
Regex string - A regex string to filter results by Group Metric Rule name.
- output
File string - File name where to save data source results (after running
pulumi preview
). - page
Number number - Current page number.
- page
Size number - Number of records per page.
- status string
- The status of the resource. Valid values:
init
,active
,attaching
,attached
,detaching
,financialLocked
,provisioning
,updating
,upgrading
,deleted
.
- ids Sequence[str]
- A list of Vpn Attachment IDs.
- name_
regex str - A regex string to filter results by Group Metric Rule name.
- output_
file str - File name where to save data source results (after running
pulumi preview
). - page_
number int - Current page number.
- page_
size int - Number of records per page.
- status str
- The status of the resource. Valid values:
init
,active
,attaching
,attached
,detaching
,financialLocked
,provisioning
,updating
,upgrading
,deleted
.
- ids List<String>
- A list of Vpn Attachment IDs.
- name
Regex String - A regex string to filter results by Group Metric Rule name.
- output
File String - File name where to save data source results (after running
pulumi preview
). - page
Number Number - Current page number.
- page
Size Number - Number of records per page.
- status String
- The status of the resource. Valid values:
init
,active
,attaching
,attached
,detaching
,financialLocked
,provisioning
,updating
,upgrading
,deleted
.
getGatewayVpnAttachments Result
The following output properties are available:
- Attachments
List<Pulumi.
Ali Cloud. Vpn. Outputs. Get Gateway Vpn Attachments Attachment> - A list of Vpn Attachment Entries. Each element contains the following attributes:
- Id string
- The provider-assigned unique ID for this managed resource.
- Ids List<string>
- A list of Vpn Attachment IDs.
- Names List<string>
- A list of name of Vpn Attachments.
- Name
Regex string - Output
File string - Page
Number int - Page
Size int - Status string
- The negotiation status of Tunnel. - ike_sa_not_established: Phase 1 negotiations failed.- ike_sa_established: Phase 1 negotiations succeeded.- ipsec_sa_not_established: Phase 2 negotiations failed.- ipsec_sa_established: Phase 2 negotiations succeeded.
- Attachments
[]Get
Gateway Vpn Attachments Attachment - A list of Vpn Attachment Entries. Each element contains the following attributes:
- Id string
- The provider-assigned unique ID for this managed resource.
- Ids []string
- A list of Vpn Attachment IDs.
- Names []string
- A list of name of Vpn Attachments.
- Name
Regex string - Output
File string - Page
Number int - Page
Size int - Status string
- The negotiation status of Tunnel. - ike_sa_not_established: Phase 1 negotiations failed.- ike_sa_established: Phase 1 negotiations succeeded.- ipsec_sa_not_established: Phase 2 negotiations failed.- ipsec_sa_established: Phase 2 negotiations succeeded.
- attachments
List<Get
Gateway Vpn Attachments Attachment> - A list of Vpn Attachment Entries. Each element contains the following attributes:
- id String
- The provider-assigned unique ID for this managed resource.
- ids List<String>
- A list of Vpn Attachment IDs.
- names List<String>
- A list of name of Vpn Attachments.
- name
Regex String - output
File String - page
Number Integer - page
Size Integer - status String
- The negotiation status of Tunnel. - ike_sa_not_established: Phase 1 negotiations failed.- ike_sa_established: Phase 1 negotiations succeeded.- ipsec_sa_not_established: Phase 2 negotiations failed.- ipsec_sa_established: Phase 2 negotiations succeeded.
- attachments
Get
Gateway Vpn Attachments Attachment[] - A list of Vpn Attachment Entries. Each element contains the following attributes:
- id string
- The provider-assigned unique ID for this managed resource.
- ids string[]
- A list of Vpn Attachment IDs.
- names string[]
- A list of name of Vpn Attachments.
- name
Regex string - output
File string - page
Number number - page
Size number - status string
- The negotiation status of Tunnel. - ike_sa_not_established: Phase 1 negotiations failed.- ike_sa_established: Phase 1 negotiations succeeded.- ipsec_sa_not_established: Phase 2 negotiations failed.- ipsec_sa_established: Phase 2 negotiations succeeded.
- attachments
Sequence[Get
Gateway Vpn Attachments Attachment] - A list of Vpn Attachment Entries. Each element contains the following attributes:
- id str
- The provider-assigned unique ID for this managed resource.
- ids Sequence[str]
- A list of Vpn Attachment IDs.
- names Sequence[str]
- A list of name of Vpn Attachments.
- name_
regex str - output_
file str - page_
number int - page_
size int - status str
- The negotiation status of Tunnel. - ike_sa_not_established: Phase 1 negotiations failed.- ike_sa_established: Phase 1 negotiations succeeded.- ipsec_sa_not_established: Phase 2 negotiations failed.- ipsec_sa_established: Phase 2 negotiations succeeded.
- attachments List<Property Map>
- A list of Vpn Attachment Entries. Each element contains the following attributes:
- id String
- The provider-assigned unique ID for this managed resource.
- ids List<String>
- A list of Vpn Attachment IDs.
- names List<String>
- A list of name of Vpn Attachments.
- name
Regex String - output
File String - page
Number Number - page
Size Number - status String
- The negotiation status of Tunnel. - ike_sa_not_established: Phase 1 negotiations failed.- ike_sa_established: Phase 1 negotiations succeeded.- ipsec_sa_not_established: Phase 2 negotiations failed.- ipsec_sa_established: Phase 2 negotiations succeeded.
Supporting Types
GetGatewayVpnAttachmentsAttachment
- Attach
Type string - attach type- CEN: indicates that the IPsec-VPN connection is associated with a transit router of a Cloud Enterprise Network (CEN) instance.- NO_ASSOCIATED: indicates that the IPsec-VPN connection is not associated with any resource.
- Bgp
Configs List<Pulumi.Ali Cloud. Vpn. Inputs. Get Gateway Vpn Attachments Attachment Bgp Config> - Bgp configuration information.- This parameter is supported when you create an vpn attachment in single-tunnel mode.
- Connection
Status string - IPsec connection status- ike_sa_not_established: Phase 1 negotiations failed.- ike_sa_established: Phase 1 negotiations succeeded.- ipsec_sa_not_established: Phase 2 negotiations failed.- ipsec_sa_established: Phase 2 negotiations succeeded.
- Create
Time string - The creation time of the resource
- Customer
Gateway stringId - The ID of the user gateway associated with the tunnel.> This parameter is required when creating a dual-tunnel mode IPsec-VPN connection.
- Effect
Immediately bool - Specifies whether to immediately start IPsec negotiations after the configuration takes effect. Valid values:- true: immediately starts IPsec negotiations after the configuration is complete.- false (default): starts IPsec negotiations when inbound traffic is received.
- Enable
Dpd bool - Whether the DPD (peer alive detection) function is enabled for the tunnel. Value:-true (default): enable the DPD function. IPsec initiator will send DPD message to check whether the peer device is alive. If the peer device does not receive a correct response within the set time, it is considered that the peer has been disconnected. IPsec will delete ISAKMP SA and the corresponding IPsec SA, and the security tunnel will also be deleted.-false: If the DPD function is disabled, the IPsec initiator does not send DPD detection packets.
- Enable
Nat boolTraversal - Whether the NAT crossing function is enabled for the tunnel. Value:-true (default): Enables the NAT Traversal function. When enabled, the IKE negotiation process deletes the verification process of the UDP port number and realizes the discovery function of the NAT gateway device in the tunnel.-false: does not enable the NAT Traversal function.
- Enable
Tunnels boolBgp - You can configure this parameter when you create a vpn attachment in dual-tunnel mode.Whether to enable the BGP function for the tunnel. Value: true or false (default).> before adding BGP configuration, we recommend that you understand the working mechanism and usage restrictions of the BGP dynamic routing function.
- Health
Check List<Pulumi.Configs Ali Cloud. Vpn. Inputs. Get Gateway Vpn Attachments Attachment Health Check Config> - This parameter is supported if you create an vpn attachment in single-tunnel mode.Health check configuration information.
- Id string
- The ID of the resource supplied above.
- Ike
Configs List<Pulumi.Ali Cloud. Vpn. Inputs. Get Gateway Vpn Attachments Attachment Ike Config> - The configurations of Phase 1 negotiations. - This parameter is supported if you create an vpn attachment in single-tunnel mode.
- Internet
Ip string - The local internet IP in Tunnel.
- Ipsec
Configs List<Pulumi.Ali Cloud. Vpn. Inputs. Get Gateway Vpn Attachments Attachment Ipsec Config> - Configuration negotiated in the second stage. - This parameter is supported if you create an vpn attachment in single-tunnel mode.
- Local
Subnet string - The CIDR block on the VPC side. The CIDR block is used in Phase 2 negotiations.Separate multiple CIDR blocks with commas (,). Example: 192.168.1.0/24,192.168.2.0/24.The following routing modes are supported:- If you set LocalSubnet and RemoteSubnet to 0.0.0.0/0, the routing mode of the IPsec-VPN connection is set to Destination Routing Mode.- If you set LocalSubnet and RemoteSubnet to specific CIDR blocks, the routing mode of the IPsec-VPN connection is set to Protected Data Flows.
- Network
Type string - network type- public (default)- private
- Remote
Subnet string - The CIDR block on the data center side. This CIDR block is used in Phase 2 negotiations.Separate multiple CIDR blocks with commas (,). Example: 192.168.3.0/24,192.168.4.0/24.The following routing modes are supported:- If you set LocalSubnet and RemoteSubnet to 0.0.0.0/0, the routing mode of the IPsec-VPN connection is set to Destination Routing Mode.- If you set LocalSubnet and RemoteSubnet to specific CIDR blocks, the routing mode of the IPsec-VPN connection is set to Protected Data Flows.
- Resource
Group stringId - The ID of the resource group
- Status string
- The status of the resource. Valid values:
init
,active
,attaching
,attached
,detaching
,financialLocked
,provisioning
,updating
,upgrading
,deleted
. - Dictionary<string, string>
- Tags
- Tunnel
Options List<Pulumi.Specifications Ali Cloud. Vpn. Inputs. Get Gateway Vpn Attachments Attachment Tunnel Options Specification> - Configure the tunnel.-You can configure parameters in the tunnel_options_specification array when you create a vpn attachment in dual-tunnel mode.-When creating a vpn attachment in dual-tunnel mode, you must add both tunnels for the vpn attachment to ensure that the vpn attachment has link redundancy. Only two tunnels can be added to a vpn attachment.
- Vpn
Attachment stringName - vpn attachment name
- Vpn
Connection stringId - The first ID of the resource
- Attach
Type string - attach type- CEN: indicates that the IPsec-VPN connection is associated with a transit router of a Cloud Enterprise Network (CEN) instance.- NO_ASSOCIATED: indicates that the IPsec-VPN connection is not associated with any resource.
- Bgp
Configs []GetGateway Vpn Attachments Attachment Bgp Config - Bgp configuration information.- This parameter is supported when you create an vpn attachment in single-tunnel mode.
- Connection
Status string - IPsec connection status- ike_sa_not_established: Phase 1 negotiations failed.- ike_sa_established: Phase 1 negotiations succeeded.- ipsec_sa_not_established: Phase 2 negotiations failed.- ipsec_sa_established: Phase 2 negotiations succeeded.
- Create
Time string - The creation time of the resource
- Customer
Gateway stringId - The ID of the user gateway associated with the tunnel.> This parameter is required when creating a dual-tunnel mode IPsec-VPN connection.
- Effect
Immediately bool - Specifies whether to immediately start IPsec negotiations after the configuration takes effect. Valid values:- true: immediately starts IPsec negotiations after the configuration is complete.- false (default): starts IPsec negotiations when inbound traffic is received.
- Enable
Dpd bool - Whether the DPD (peer alive detection) function is enabled for the tunnel. Value:-true (default): enable the DPD function. IPsec initiator will send DPD message to check whether the peer device is alive. If the peer device does not receive a correct response within the set time, it is considered that the peer has been disconnected. IPsec will delete ISAKMP SA and the corresponding IPsec SA, and the security tunnel will also be deleted.-false: If the DPD function is disabled, the IPsec initiator does not send DPD detection packets.
- Enable
Nat boolTraversal - Whether the NAT crossing function is enabled for the tunnel. Value:-true (default): Enables the NAT Traversal function. When enabled, the IKE negotiation process deletes the verification process of the UDP port number and realizes the discovery function of the NAT gateway device in the tunnel.-false: does not enable the NAT Traversal function.
- Enable
Tunnels boolBgp - You can configure this parameter when you create a vpn attachment in dual-tunnel mode.Whether to enable the BGP function for the tunnel. Value: true or false (default).> before adding BGP configuration, we recommend that you understand the working mechanism and usage restrictions of the BGP dynamic routing function.
- Health
Check []GetConfigs Gateway Vpn Attachments Attachment Health Check Config - This parameter is supported if you create an vpn attachment in single-tunnel mode.Health check configuration information.
- Id string
- The ID of the resource supplied above.
- Ike
Configs []GetGateway Vpn Attachments Attachment Ike Config - The configurations of Phase 1 negotiations. - This parameter is supported if you create an vpn attachment in single-tunnel mode.
- Internet
Ip string - The local internet IP in Tunnel.
- Ipsec
Configs []GetGateway Vpn Attachments Attachment Ipsec Config - Configuration negotiated in the second stage. - This parameter is supported if you create an vpn attachment in single-tunnel mode.
- Local
Subnet string - The CIDR block on the VPC side. The CIDR block is used in Phase 2 negotiations.Separate multiple CIDR blocks with commas (,). Example: 192.168.1.0/24,192.168.2.0/24.The following routing modes are supported:- If you set LocalSubnet and RemoteSubnet to 0.0.0.0/0, the routing mode of the IPsec-VPN connection is set to Destination Routing Mode.- If you set LocalSubnet and RemoteSubnet to specific CIDR blocks, the routing mode of the IPsec-VPN connection is set to Protected Data Flows.
- Network
Type string - network type- public (default)- private
- Remote
Subnet string - The CIDR block on the data center side. This CIDR block is used in Phase 2 negotiations.Separate multiple CIDR blocks with commas (,). Example: 192.168.3.0/24,192.168.4.0/24.The following routing modes are supported:- If you set LocalSubnet and RemoteSubnet to 0.0.0.0/0, the routing mode of the IPsec-VPN connection is set to Destination Routing Mode.- If you set LocalSubnet and RemoteSubnet to specific CIDR blocks, the routing mode of the IPsec-VPN connection is set to Protected Data Flows.
- Resource
Group stringId - The ID of the resource group
- Status string
- The status of the resource. Valid values:
init
,active
,attaching
,attached
,detaching
,financialLocked
,provisioning
,updating
,upgrading
,deleted
. - map[string]string
- Tags
- Tunnel
Options []GetSpecifications Gateway Vpn Attachments Attachment Tunnel Options Specification - Configure the tunnel.-You can configure parameters in the tunnel_options_specification array when you create a vpn attachment in dual-tunnel mode.-When creating a vpn attachment in dual-tunnel mode, you must add both tunnels for the vpn attachment to ensure that the vpn attachment has link redundancy. Only two tunnels can be added to a vpn attachment.
- Vpn
Attachment stringName - vpn attachment name
- Vpn
Connection stringId - The first ID of the resource
- attach
Type String - attach type- CEN: indicates that the IPsec-VPN connection is associated with a transit router of a Cloud Enterprise Network (CEN) instance.- NO_ASSOCIATED: indicates that the IPsec-VPN connection is not associated with any resource.
- bgp
Configs List<GetGateway Vpn Attachments Attachment Bgp Config> - Bgp configuration information.- This parameter is supported when you create an vpn attachment in single-tunnel mode.
- connection
Status String - IPsec connection status- ike_sa_not_established: Phase 1 negotiations failed.- ike_sa_established: Phase 1 negotiations succeeded.- ipsec_sa_not_established: Phase 2 negotiations failed.- ipsec_sa_established: Phase 2 negotiations succeeded.
- create
Time String - The creation time of the resource
- customer
Gateway StringId - The ID of the user gateway associated with the tunnel.> This parameter is required when creating a dual-tunnel mode IPsec-VPN connection.
- effect
Immediately Boolean - Specifies whether to immediately start IPsec negotiations after the configuration takes effect. Valid values:- true: immediately starts IPsec negotiations after the configuration is complete.- false (default): starts IPsec negotiations when inbound traffic is received.
- enable
Dpd Boolean - Whether the DPD (peer alive detection) function is enabled for the tunnel. Value:-true (default): enable the DPD function. IPsec initiator will send DPD message to check whether the peer device is alive. If the peer device does not receive a correct response within the set time, it is considered that the peer has been disconnected. IPsec will delete ISAKMP SA and the corresponding IPsec SA, and the security tunnel will also be deleted.-false: If the DPD function is disabled, the IPsec initiator does not send DPD detection packets.
- enable
Nat BooleanTraversal - Whether the NAT crossing function is enabled for the tunnel. Value:-true (default): Enables the NAT Traversal function. When enabled, the IKE negotiation process deletes the verification process of the UDP port number and realizes the discovery function of the NAT gateway device in the tunnel.-false: does not enable the NAT Traversal function.
- enable
Tunnels BooleanBgp - You can configure this parameter when you create a vpn attachment in dual-tunnel mode.Whether to enable the BGP function for the tunnel. Value: true or false (default).> before adding BGP configuration, we recommend that you understand the working mechanism and usage restrictions of the BGP dynamic routing function.
- health
Check List<GetConfigs Gateway Vpn Attachments Attachment Health Check Config> - This parameter is supported if you create an vpn attachment in single-tunnel mode.Health check configuration information.
- id String
- The ID of the resource supplied above.
- ike
Configs List<GetGateway Vpn Attachments Attachment Ike Config> - The configurations of Phase 1 negotiations. - This parameter is supported if you create an vpn attachment in single-tunnel mode.
- internet
Ip String - The local internet IP in Tunnel.
- ipsec
Configs List<GetGateway Vpn Attachments Attachment Ipsec Config> - Configuration negotiated in the second stage. - This parameter is supported if you create an vpn attachment in single-tunnel mode.
- local
Subnet String - The CIDR block on the VPC side. The CIDR block is used in Phase 2 negotiations.Separate multiple CIDR blocks with commas (,). Example: 192.168.1.0/24,192.168.2.0/24.The following routing modes are supported:- If you set LocalSubnet and RemoteSubnet to 0.0.0.0/0, the routing mode of the IPsec-VPN connection is set to Destination Routing Mode.- If you set LocalSubnet and RemoteSubnet to specific CIDR blocks, the routing mode of the IPsec-VPN connection is set to Protected Data Flows.
- network
Type String - network type- public (default)- private
- remote
Subnet String - The CIDR block on the data center side. This CIDR block is used in Phase 2 negotiations.Separate multiple CIDR blocks with commas (,). Example: 192.168.3.0/24,192.168.4.0/24.The following routing modes are supported:- If you set LocalSubnet and RemoteSubnet to 0.0.0.0/0, the routing mode of the IPsec-VPN connection is set to Destination Routing Mode.- If you set LocalSubnet and RemoteSubnet to specific CIDR blocks, the routing mode of the IPsec-VPN connection is set to Protected Data Flows.
- resource
Group StringId - The ID of the resource group
- status String
- The status of the resource. Valid values:
init
,active
,attaching
,attached
,detaching
,financialLocked
,provisioning
,updating
,upgrading
,deleted
. - Map<String,String>
- Tags
- tunnel
Options List<GetSpecifications Gateway Vpn Attachments Attachment Tunnel Options Specification> - Configure the tunnel.-You can configure parameters in the tunnel_options_specification array when you create a vpn attachment in dual-tunnel mode.-When creating a vpn attachment in dual-tunnel mode, you must add both tunnels for the vpn attachment to ensure that the vpn attachment has link redundancy. Only two tunnels can be added to a vpn attachment.
- vpn
Attachment StringName - vpn attachment name
- vpn
Connection StringId - The first ID of the resource
- attach
Type string - attach type- CEN: indicates that the IPsec-VPN connection is associated with a transit router of a Cloud Enterprise Network (CEN) instance.- NO_ASSOCIATED: indicates that the IPsec-VPN connection is not associated with any resource.
- bgp
Configs GetGateway Vpn Attachments Attachment Bgp Config[] - Bgp configuration information.- This parameter is supported when you create an vpn attachment in single-tunnel mode.
- connection
Status string - IPsec connection status- ike_sa_not_established: Phase 1 negotiations failed.- ike_sa_established: Phase 1 negotiations succeeded.- ipsec_sa_not_established: Phase 2 negotiations failed.- ipsec_sa_established: Phase 2 negotiations succeeded.
- create
Time string - The creation time of the resource
- customer
Gateway stringId - The ID of the user gateway associated with the tunnel.> This parameter is required when creating a dual-tunnel mode IPsec-VPN connection.
- effect
Immediately boolean - Specifies whether to immediately start IPsec negotiations after the configuration takes effect. Valid values:- true: immediately starts IPsec negotiations after the configuration is complete.- false (default): starts IPsec negotiations when inbound traffic is received.
- enable
Dpd boolean - Whether the DPD (peer alive detection) function is enabled for the tunnel. Value:-true (default): enable the DPD function. IPsec initiator will send DPD message to check whether the peer device is alive. If the peer device does not receive a correct response within the set time, it is considered that the peer has been disconnected. IPsec will delete ISAKMP SA and the corresponding IPsec SA, and the security tunnel will also be deleted.-false: If the DPD function is disabled, the IPsec initiator does not send DPD detection packets.
- enable
Nat booleanTraversal - Whether the NAT crossing function is enabled for the tunnel. Value:-true (default): Enables the NAT Traversal function. When enabled, the IKE negotiation process deletes the verification process of the UDP port number and realizes the discovery function of the NAT gateway device in the tunnel.-false: does not enable the NAT Traversal function.
- enable
Tunnels booleanBgp - You can configure this parameter when you create a vpn attachment in dual-tunnel mode.Whether to enable the BGP function for the tunnel. Value: true or false (default).> before adding BGP configuration, we recommend that you understand the working mechanism and usage restrictions of the BGP dynamic routing function.
- health
Check GetConfigs Gateway Vpn Attachments Attachment Health Check Config[] - This parameter is supported if you create an vpn attachment in single-tunnel mode.Health check configuration information.
- id string
- The ID of the resource supplied above.
- ike
Configs GetGateway Vpn Attachments Attachment Ike Config[] - The configurations of Phase 1 negotiations. - This parameter is supported if you create an vpn attachment in single-tunnel mode.
- internet
Ip string - The local internet IP in Tunnel.
- ipsec
Configs GetGateway Vpn Attachments Attachment Ipsec Config[] - Configuration negotiated in the second stage. - This parameter is supported if you create an vpn attachment in single-tunnel mode.
- local
Subnet string - The CIDR block on the VPC side. The CIDR block is used in Phase 2 negotiations.Separate multiple CIDR blocks with commas (,). Example: 192.168.1.0/24,192.168.2.0/24.The following routing modes are supported:- If you set LocalSubnet and RemoteSubnet to 0.0.0.0/0, the routing mode of the IPsec-VPN connection is set to Destination Routing Mode.- If you set LocalSubnet and RemoteSubnet to specific CIDR blocks, the routing mode of the IPsec-VPN connection is set to Protected Data Flows.
- network
Type string - network type- public (default)- private
- remote
Subnet string - The CIDR block on the data center side. This CIDR block is used in Phase 2 negotiations.Separate multiple CIDR blocks with commas (,). Example: 192.168.3.0/24,192.168.4.0/24.The following routing modes are supported:- If you set LocalSubnet and RemoteSubnet to 0.0.0.0/0, the routing mode of the IPsec-VPN connection is set to Destination Routing Mode.- If you set LocalSubnet and RemoteSubnet to specific CIDR blocks, the routing mode of the IPsec-VPN connection is set to Protected Data Flows.
- resource
Group stringId - The ID of the resource group
- status string
- The status of the resource. Valid values:
init
,active
,attaching
,attached
,detaching
,financialLocked
,provisioning
,updating
,upgrading
,deleted
. - {[key: string]: string}
- Tags
- tunnel
Options GetSpecifications Gateway Vpn Attachments Attachment Tunnel Options Specification[] - Configure the tunnel.-You can configure parameters in the tunnel_options_specification array when you create a vpn attachment in dual-tunnel mode.-When creating a vpn attachment in dual-tunnel mode, you must add both tunnels for the vpn attachment to ensure that the vpn attachment has link redundancy. Only two tunnels can be added to a vpn attachment.
- vpn
Attachment stringName - vpn attachment name
- vpn
Connection stringId - The first ID of the resource
- attach_
type str - attach type- CEN: indicates that the IPsec-VPN connection is associated with a transit router of a Cloud Enterprise Network (CEN) instance.- NO_ASSOCIATED: indicates that the IPsec-VPN connection is not associated with any resource.
- bgp_
configs Sequence[GetGateway Vpn Attachments Attachment Bgp Config] - Bgp configuration information.- This parameter is supported when you create an vpn attachment in single-tunnel mode.
- connection_
status str - IPsec connection status- ike_sa_not_established: Phase 1 negotiations failed.- ike_sa_established: Phase 1 negotiations succeeded.- ipsec_sa_not_established: Phase 2 negotiations failed.- ipsec_sa_established: Phase 2 negotiations succeeded.
- create_
time str - The creation time of the resource
- customer_
gateway_ strid - The ID of the user gateway associated with the tunnel.> This parameter is required when creating a dual-tunnel mode IPsec-VPN connection.
- effect_
immediately bool - Specifies whether to immediately start IPsec negotiations after the configuration takes effect. Valid values:- true: immediately starts IPsec negotiations after the configuration is complete.- false (default): starts IPsec negotiations when inbound traffic is received.
- enable_
dpd bool - Whether the DPD (peer alive detection) function is enabled for the tunnel. Value:-true (default): enable the DPD function. IPsec initiator will send DPD message to check whether the peer device is alive. If the peer device does not receive a correct response within the set time, it is considered that the peer has been disconnected. IPsec will delete ISAKMP SA and the corresponding IPsec SA, and the security tunnel will also be deleted.-false: If the DPD function is disabled, the IPsec initiator does not send DPD detection packets.
- enable_
nat_ booltraversal - Whether the NAT crossing function is enabled for the tunnel. Value:-true (default): Enables the NAT Traversal function. When enabled, the IKE negotiation process deletes the verification process of the UDP port number and realizes the discovery function of the NAT gateway device in the tunnel.-false: does not enable the NAT Traversal function.
- enable_
tunnels_ boolbgp - You can configure this parameter when you create a vpn attachment in dual-tunnel mode.Whether to enable the BGP function for the tunnel. Value: true or false (default).> before adding BGP configuration, we recommend that you understand the working mechanism and usage restrictions of the BGP dynamic routing function.
- health_
check_ Sequence[Getconfigs Gateway Vpn Attachments Attachment Health Check Config] - This parameter is supported if you create an vpn attachment in single-tunnel mode.Health check configuration information.
- id str
- The ID of the resource supplied above.
- ike_
configs Sequence[GetGateway Vpn Attachments Attachment Ike Config] - The configurations of Phase 1 negotiations. - This parameter is supported if you create an vpn attachment in single-tunnel mode.
- internet_
ip str - The local internet IP in Tunnel.
- ipsec_
configs Sequence[GetGateway Vpn Attachments Attachment Ipsec Config] - Configuration negotiated in the second stage. - This parameter is supported if you create an vpn attachment in single-tunnel mode.
- local_
subnet str - The CIDR block on the VPC side. The CIDR block is used in Phase 2 negotiations.Separate multiple CIDR blocks with commas (,). Example: 192.168.1.0/24,192.168.2.0/24.The following routing modes are supported:- If you set LocalSubnet and RemoteSubnet to 0.0.0.0/0, the routing mode of the IPsec-VPN connection is set to Destination Routing Mode.- If you set LocalSubnet and RemoteSubnet to specific CIDR blocks, the routing mode of the IPsec-VPN connection is set to Protected Data Flows.
- network_
type str - network type- public (default)- private
- remote_
subnet str - The CIDR block on the data center side. This CIDR block is used in Phase 2 negotiations.Separate multiple CIDR blocks with commas (,). Example: 192.168.3.0/24,192.168.4.0/24.The following routing modes are supported:- If you set LocalSubnet and RemoteSubnet to 0.0.0.0/0, the routing mode of the IPsec-VPN connection is set to Destination Routing Mode.- If you set LocalSubnet and RemoteSubnet to specific CIDR blocks, the routing mode of the IPsec-VPN connection is set to Protected Data Flows.
- resource_
group_ strid - The ID of the resource group
- status str
- The status of the resource. Valid values:
init
,active
,attaching
,attached
,detaching
,financialLocked
,provisioning
,updating
,upgrading
,deleted
. - Mapping[str, str]
- Tags
- tunnel_
options_ Sequence[Getspecifications Gateway Vpn Attachments Attachment Tunnel Options Specification] - Configure the tunnel.-You can configure parameters in the tunnel_options_specification array when you create a vpn attachment in dual-tunnel mode.-When creating a vpn attachment in dual-tunnel mode, you must add both tunnels for the vpn attachment to ensure that the vpn attachment has link redundancy. Only two tunnels can be added to a vpn attachment.
- vpn_
attachment_ strname - vpn attachment name
- vpn_
connection_ strid - The first ID of the resource
- attach
Type String - attach type- CEN: indicates that the IPsec-VPN connection is associated with a transit router of a Cloud Enterprise Network (CEN) instance.- NO_ASSOCIATED: indicates that the IPsec-VPN connection is not associated with any resource.
- bgp
Configs List<Property Map> - Bgp configuration information.- This parameter is supported when you create an vpn attachment in single-tunnel mode.
- connection
Status String - IPsec connection status- ike_sa_not_established: Phase 1 negotiations failed.- ike_sa_established: Phase 1 negotiations succeeded.- ipsec_sa_not_established: Phase 2 negotiations failed.- ipsec_sa_established: Phase 2 negotiations succeeded.
- create
Time String - The creation time of the resource
- customer
Gateway StringId - The ID of the user gateway associated with the tunnel.> This parameter is required when creating a dual-tunnel mode IPsec-VPN connection.
- effect
Immediately Boolean - Specifies whether to immediately start IPsec negotiations after the configuration takes effect. Valid values:- true: immediately starts IPsec negotiations after the configuration is complete.- false (default): starts IPsec negotiations when inbound traffic is received.
- enable
Dpd Boolean - Whether the DPD (peer alive detection) function is enabled for the tunnel. Value:-true (default): enable the DPD function. IPsec initiator will send DPD message to check whether the peer device is alive. If the peer device does not receive a correct response within the set time, it is considered that the peer has been disconnected. IPsec will delete ISAKMP SA and the corresponding IPsec SA, and the security tunnel will also be deleted.-false: If the DPD function is disabled, the IPsec initiator does not send DPD detection packets.
- enable
Nat BooleanTraversal - Whether the NAT crossing function is enabled for the tunnel. Value:-true (default): Enables the NAT Traversal function. When enabled, the IKE negotiation process deletes the verification process of the UDP port number and realizes the discovery function of the NAT gateway device in the tunnel.-false: does not enable the NAT Traversal function.
- enable
Tunnels BooleanBgp - You can configure this parameter when you create a vpn attachment in dual-tunnel mode.Whether to enable the BGP function for the tunnel. Value: true or false (default).> before adding BGP configuration, we recommend that you understand the working mechanism and usage restrictions of the BGP dynamic routing function.
- health
Check List<Property Map>Configs - This parameter is supported if you create an vpn attachment in single-tunnel mode.Health check configuration information.
- id String
- The ID of the resource supplied above.
- ike
Configs List<Property Map> - The configurations of Phase 1 negotiations. - This parameter is supported if you create an vpn attachment in single-tunnel mode.
- internet
Ip String - The local internet IP in Tunnel.
- ipsec
Configs List<Property Map> - Configuration negotiated in the second stage. - This parameter is supported if you create an vpn attachment in single-tunnel mode.
- local
Subnet String - The CIDR block on the VPC side. The CIDR block is used in Phase 2 negotiations.Separate multiple CIDR blocks with commas (,). Example: 192.168.1.0/24,192.168.2.0/24.The following routing modes are supported:- If you set LocalSubnet and RemoteSubnet to 0.0.0.0/0, the routing mode of the IPsec-VPN connection is set to Destination Routing Mode.- If you set LocalSubnet and RemoteSubnet to specific CIDR blocks, the routing mode of the IPsec-VPN connection is set to Protected Data Flows.
- network
Type String - network type- public (default)- private
- remote
Subnet String - The CIDR block on the data center side. This CIDR block is used in Phase 2 negotiations.Separate multiple CIDR blocks with commas (,). Example: 192.168.3.0/24,192.168.4.0/24.The following routing modes are supported:- If you set LocalSubnet and RemoteSubnet to 0.0.0.0/0, the routing mode of the IPsec-VPN connection is set to Destination Routing Mode.- If you set LocalSubnet and RemoteSubnet to specific CIDR blocks, the routing mode of the IPsec-VPN connection is set to Protected Data Flows.
- resource
Group StringId - The ID of the resource group
- status String
- The status of the resource. Valid values:
init
,active
,attaching
,attached
,detaching
,financialLocked
,provisioning
,updating
,upgrading
,deleted
. - Map<String>
- Tags
- tunnel
Options List<Property Map>Specifications - Configure the tunnel.-You can configure parameters in the tunnel_options_specification array when you create a vpn attachment in dual-tunnel mode.-When creating a vpn attachment in dual-tunnel mode, you must add both tunnels for the vpn attachment to ensure that the vpn attachment has link redundancy. Only two tunnels can be added to a vpn attachment.
- vpn
Attachment StringName - vpn attachment name
- vpn
Connection StringId - The first ID of the resource
GetGatewayVpnAttachmentsAttachmentBgpConfig
- Local
Asn int - The number of the local (Alibaba Cloud) autonomous system of the tunnel. The value range of the autonomous system number is 1 to 4294967295. Default value: 45104.> We recommend that you use the private number of the autonomous system number to establish a BGP connection with Alibaba Cloud. The private number range of the autonomous system number please consult the document yourself.
- Local
Bgp stringIp - The local BGP address of the tunnel (on the Alibaba Cloud side). This address is an IP address in the BGP network segment.
- Status string
- The status of the resource. Valid values:
init
,active
,attaching
,attached
,detaching
,financialLocked
,provisioning
,updating
,upgrading
,deleted
. - Tunnel
Cidr string - The BGP network segment of the tunnel. The network segment must be a network segment with a mask length of 30 in 169.254.0.0/16, and cannot be 169.254.0.0/30, 169.254.1.0/30, 169.254.2.0/30, 169.254.3.0/30, 169.254.4.0/30, 169.254.5.0/30, 169.254.6.0/30, and 169.254.169.252/30.> the network segments of two tunnels under an IPsec connection cannot be the same.
- Local
Asn int - The number of the local (Alibaba Cloud) autonomous system of the tunnel. The value range of the autonomous system number is 1 to 4294967295. Default value: 45104.> We recommend that you use the private number of the autonomous system number to establish a BGP connection with Alibaba Cloud. The private number range of the autonomous system number please consult the document yourself.
- Local
Bgp stringIp - The local BGP address of the tunnel (on the Alibaba Cloud side). This address is an IP address in the BGP network segment.
- Status string
- The status of the resource. Valid values:
init
,active
,attaching
,attached
,detaching
,financialLocked
,provisioning
,updating
,upgrading
,deleted
. - Tunnel
Cidr string - The BGP network segment of the tunnel. The network segment must be a network segment with a mask length of 30 in 169.254.0.0/16, and cannot be 169.254.0.0/30, 169.254.1.0/30, 169.254.2.0/30, 169.254.3.0/30, 169.254.4.0/30, 169.254.5.0/30, 169.254.6.0/30, and 169.254.169.252/30.> the network segments of two tunnels under an IPsec connection cannot be the same.
- local
Asn Integer - The number of the local (Alibaba Cloud) autonomous system of the tunnel. The value range of the autonomous system number is 1 to 4294967295. Default value: 45104.> We recommend that you use the private number of the autonomous system number to establish a BGP connection with Alibaba Cloud. The private number range of the autonomous system number please consult the document yourself.
- local
Bgp StringIp - The local BGP address of the tunnel (on the Alibaba Cloud side). This address is an IP address in the BGP network segment.
- status String
- The status of the resource. Valid values:
init
,active
,attaching
,attached
,detaching
,financialLocked
,provisioning
,updating
,upgrading
,deleted
. - tunnel
Cidr String - The BGP network segment of the tunnel. The network segment must be a network segment with a mask length of 30 in 169.254.0.0/16, and cannot be 169.254.0.0/30, 169.254.1.0/30, 169.254.2.0/30, 169.254.3.0/30, 169.254.4.0/30, 169.254.5.0/30, 169.254.6.0/30, and 169.254.169.252/30.> the network segments of two tunnels under an IPsec connection cannot be the same.
- local
Asn number - The number of the local (Alibaba Cloud) autonomous system of the tunnel. The value range of the autonomous system number is 1 to 4294967295. Default value: 45104.> We recommend that you use the private number of the autonomous system number to establish a BGP connection with Alibaba Cloud. The private number range of the autonomous system number please consult the document yourself.
- local
Bgp stringIp - The local BGP address of the tunnel (on the Alibaba Cloud side). This address is an IP address in the BGP network segment.
- status string
- The status of the resource. Valid values:
init
,active
,attaching
,attached
,detaching
,financialLocked
,provisioning
,updating
,upgrading
,deleted
. - tunnel
Cidr string - The BGP network segment of the tunnel. The network segment must be a network segment with a mask length of 30 in 169.254.0.0/16, and cannot be 169.254.0.0/30, 169.254.1.0/30, 169.254.2.0/30, 169.254.3.0/30, 169.254.4.0/30, 169.254.5.0/30, 169.254.6.0/30, and 169.254.169.252/30.> the network segments of two tunnels under an IPsec connection cannot be the same.
- local_
asn int - The number of the local (Alibaba Cloud) autonomous system of the tunnel. The value range of the autonomous system number is 1 to 4294967295. Default value: 45104.> We recommend that you use the private number of the autonomous system number to establish a BGP connection with Alibaba Cloud. The private number range of the autonomous system number please consult the document yourself.
- local_
bgp_ strip - The local BGP address of the tunnel (on the Alibaba Cloud side). This address is an IP address in the BGP network segment.
- status str
- The status of the resource. Valid values:
init
,active
,attaching
,attached
,detaching
,financialLocked
,provisioning
,updating
,upgrading
,deleted
. - tunnel_
cidr str - The BGP network segment of the tunnel. The network segment must be a network segment with a mask length of 30 in 169.254.0.0/16, and cannot be 169.254.0.0/30, 169.254.1.0/30, 169.254.2.0/30, 169.254.3.0/30, 169.254.4.0/30, 169.254.5.0/30, 169.254.6.0/30, and 169.254.169.252/30.> the network segments of two tunnels under an IPsec connection cannot be the same.
- local
Asn Number - The number of the local (Alibaba Cloud) autonomous system of the tunnel. The value range of the autonomous system number is 1 to 4294967295. Default value: 45104.> We recommend that you use the private number of the autonomous system number to establish a BGP connection with Alibaba Cloud. The private number range of the autonomous system number please consult the document yourself.
- local
Bgp StringIp - The local BGP address of the tunnel (on the Alibaba Cloud side). This address is an IP address in the BGP network segment.
- status String
- The status of the resource. Valid values:
init
,active
,attaching
,attached
,detaching
,financialLocked
,provisioning
,updating
,upgrading
,deleted
. - tunnel
Cidr String - The BGP network segment of the tunnel. The network segment must be a network segment with a mask length of 30 in 169.254.0.0/16, and cannot be 169.254.0.0/30, 169.254.1.0/30, 169.254.2.0/30, 169.254.3.0/30, 169.254.4.0/30, 169.254.5.0/30, 169.254.6.0/30, and 169.254.169.252/30.> the network segments of two tunnels under an IPsec connection cannot be the same.
GetGatewayVpnAttachmentsAttachmentHealthCheckConfig
- Dip string
- Target IP.
- Enable bool
- Whether health check is enabled:-false: not enabled. -true: enabled.
- Interval int
- The health check retry interval, in seconds.
- Policy string
- Whether to revoke the published route when the health check fails- revoke_route(default): withdraws published routes.- reserve_route: does not withdraw published routes.
- Retry int
- Number of retries for health check.
- Sip string
- SOURCE IP.
- Status string
- The status of the resource. Valid values:
init
,active
,attaching
,attached
,detaching
,financialLocked
,provisioning
,updating
,upgrading
,deleted
.
- Dip string
- Target IP.
- Enable bool
- Whether health check is enabled:-false: not enabled. -true: enabled.
- Interval int
- The health check retry interval, in seconds.
- Policy string
- Whether to revoke the published route when the health check fails- revoke_route(default): withdraws published routes.- reserve_route: does not withdraw published routes.
- Retry int
- Number of retries for health check.
- Sip string
- SOURCE IP.
- Status string
- The status of the resource. Valid values:
init
,active
,attaching
,attached
,detaching
,financialLocked
,provisioning
,updating
,upgrading
,deleted
.
- dip String
- Target IP.
- enable Boolean
- Whether health check is enabled:-false: not enabled. -true: enabled.
- interval Integer
- The health check retry interval, in seconds.
- policy String
- Whether to revoke the published route when the health check fails- revoke_route(default): withdraws published routes.- reserve_route: does not withdraw published routes.
- retry Integer
- Number of retries for health check.
- sip String
- SOURCE IP.
- status String
- The status of the resource. Valid values:
init
,active
,attaching
,attached
,detaching
,financialLocked
,provisioning
,updating
,upgrading
,deleted
.
- dip string
- Target IP.
- enable boolean
- Whether health check is enabled:-false: not enabled. -true: enabled.
- interval number
- The health check retry interval, in seconds.
- policy string
- Whether to revoke the published route when the health check fails- revoke_route(default): withdraws published routes.- reserve_route: does not withdraw published routes.
- retry number
- Number of retries for health check.
- sip string
- SOURCE IP.
- status string
- The status of the resource. Valid values:
init
,active
,attaching
,attached
,detaching
,financialLocked
,provisioning
,updating
,upgrading
,deleted
.
- dip str
- Target IP.
- enable bool
- Whether health check is enabled:-false: not enabled. -true: enabled.
- interval int
- The health check retry interval, in seconds.
- policy str
- Whether to revoke the published route when the health check fails- revoke_route(default): withdraws published routes.- reserve_route: does not withdraw published routes.
- retry int
- Number of retries for health check.
- sip str
- SOURCE IP.
- status str
- The status of the resource. Valid values:
init
,active
,attaching
,attached
,detaching
,financialLocked
,provisioning
,updating
,upgrading
,deleted
.
- dip String
- Target IP.
- enable Boolean
- Whether health check is enabled:-false: not enabled. -true: enabled.
- interval Number
- The health check retry interval, in seconds.
- policy String
- Whether to revoke the published route when the health check fails- revoke_route(default): withdraws published routes.- reserve_route: does not withdraw published routes.
- retry Number
- Number of retries for health check.
- sip String
- SOURCE IP.
- status String
- The status of the resource. Valid values:
init
,active
,attaching
,attached
,detaching
,financialLocked
,provisioning
,updating
,upgrading
,deleted
.
GetGatewayVpnAttachmentsAttachmentIkeConfig
- Ike
Auth stringAlg - The authentication algorithm negotiated in the first stage. Values: md5, sha1, sha256, sha384, sha512. Default value: sha1.
- Ike
Enc stringAlg - The encryption algorithm negotiated in the first stage. Value: aes, aes192, aes256, des, or 3des. Default value: aes.
- Ike
Lifetime int - The life cycle of SA negotiated in the first stage. Unit: seconds.Value range: 0 to 86400. Default value: 86400.
- Ike
Mode string - IKE version of the negotiation mode. Value: main or aggressive. Default value: main.-main: main mode, high security during negotiation.-aggressive: Savage mode, fast negotiation and high negotiation success rate.
- Ike
Pfs string - The first stage negotiates the Diffie-Hellman key exchange algorithm used. Default value: group2.Values: group1, group2, group5, group14.
- Ike
Version string - Version of the IKE protocol. Value: ikev1 or ikev2. Default value: ikev2.Compared with IKEv1, IKEv2 simplifies the SA negotiation process and provides better support for multiple network segments.
- Local
Id string - The identifier of the local end of the tunnel (Alibaba Cloud side), which is used for the first phase of negotiation. The length is limited to 100 characters and cannot contain spaces. The default value is the IP address of the tunnel.LocalId supports the FQDN format. If you use the FQDN format, we recommend that you select aggressive (barbaric mode) as the negotiation mode.
- Psk string
- The pre-shared key is used for identity authentication between the tunnel and the tunnel peer.-The key can be 1 to 100 characters in length. It supports numbers, upper and lower case English letters, and characters on the right. It cannot contain spaces. '''~! '@#$%^& *()_-+ ={}[]|;:',./? '''-If you do not specify a pre-shared key, the system randomly generates a 16-bit string as the pre-shared key. > The pre-shared key of the tunnel and the tunnel peer must be the same, otherwise the system cannot establish the tunnel normally.
- Remote
Id string - Identifier of the tunnel peer, which is used for the first-stage negotiation. The length is limited to 100 characters and cannot contain spaces. The default value is the IP address of the user gateway associated with the tunnel.- RemoteId supports the FQDN format. If you use the FQDN format, we recommend that you select aggressive (barbaric mode) as the negotiation mode.
- Ike
Auth stringAlg - The authentication algorithm negotiated in the first stage. Values: md5, sha1, sha256, sha384, sha512. Default value: sha1.
- Ike
Enc stringAlg - The encryption algorithm negotiated in the first stage. Value: aes, aes192, aes256, des, or 3des. Default value: aes.
- Ike
Lifetime int - The life cycle of SA negotiated in the first stage. Unit: seconds.Value range: 0 to 86400. Default value: 86400.
- Ike
Mode string - IKE version of the negotiation mode. Value: main or aggressive. Default value: main.-main: main mode, high security during negotiation.-aggressive: Savage mode, fast negotiation and high negotiation success rate.
- Ike
Pfs string - The first stage negotiates the Diffie-Hellman key exchange algorithm used. Default value: group2.Values: group1, group2, group5, group14.
- Ike
Version string - Version of the IKE protocol. Value: ikev1 or ikev2. Default value: ikev2.Compared with IKEv1, IKEv2 simplifies the SA negotiation process and provides better support for multiple network segments.
- Local
Id string - The identifier of the local end of the tunnel (Alibaba Cloud side), which is used for the first phase of negotiation. The length is limited to 100 characters and cannot contain spaces. The default value is the IP address of the tunnel.LocalId supports the FQDN format. If you use the FQDN format, we recommend that you select aggressive (barbaric mode) as the negotiation mode.
- Psk string
- The pre-shared key is used for identity authentication between the tunnel and the tunnel peer.-The key can be 1 to 100 characters in length. It supports numbers, upper and lower case English letters, and characters on the right. It cannot contain spaces. '''~! '@#$%^& *()_-+ ={}[]|;:',./? '''-If you do not specify a pre-shared key, the system randomly generates a 16-bit string as the pre-shared key. > The pre-shared key of the tunnel and the tunnel peer must be the same, otherwise the system cannot establish the tunnel normally.
- Remote
Id string - Identifier of the tunnel peer, which is used for the first-stage negotiation. The length is limited to 100 characters and cannot contain spaces. The default value is the IP address of the user gateway associated with the tunnel.- RemoteId supports the FQDN format. If you use the FQDN format, we recommend that you select aggressive (barbaric mode) as the negotiation mode.
- ike
Auth StringAlg - The authentication algorithm negotiated in the first stage. Values: md5, sha1, sha256, sha384, sha512. Default value: sha1.
- ike
Enc StringAlg - The encryption algorithm negotiated in the first stage. Value: aes, aes192, aes256, des, or 3des. Default value: aes.
- ike
Lifetime Integer - The life cycle of SA negotiated in the first stage. Unit: seconds.Value range: 0 to 86400. Default value: 86400.
- ike
Mode String - IKE version of the negotiation mode. Value: main or aggressive. Default value: main.-main: main mode, high security during negotiation.-aggressive: Savage mode, fast negotiation and high negotiation success rate.
- ike
Pfs String - The first stage negotiates the Diffie-Hellman key exchange algorithm used. Default value: group2.Values: group1, group2, group5, group14.
- ike
Version String - Version of the IKE protocol. Value: ikev1 or ikev2. Default value: ikev2.Compared with IKEv1, IKEv2 simplifies the SA negotiation process and provides better support for multiple network segments.
- local
Id String - The identifier of the local end of the tunnel (Alibaba Cloud side), which is used for the first phase of negotiation. The length is limited to 100 characters and cannot contain spaces. The default value is the IP address of the tunnel.LocalId supports the FQDN format. If you use the FQDN format, we recommend that you select aggressive (barbaric mode) as the negotiation mode.
- psk String
- The pre-shared key is used for identity authentication between the tunnel and the tunnel peer.-The key can be 1 to 100 characters in length. It supports numbers, upper and lower case English letters, and characters on the right. It cannot contain spaces. '''~! '@#$%^& *()_-+ ={}[]|;:',./? '''-If you do not specify a pre-shared key, the system randomly generates a 16-bit string as the pre-shared key. > The pre-shared key of the tunnel and the tunnel peer must be the same, otherwise the system cannot establish the tunnel normally.
- remote
Id String - Identifier of the tunnel peer, which is used for the first-stage negotiation. The length is limited to 100 characters and cannot contain spaces. The default value is the IP address of the user gateway associated with the tunnel.- RemoteId supports the FQDN format. If you use the FQDN format, we recommend that you select aggressive (barbaric mode) as the negotiation mode.
- ike
Auth stringAlg - The authentication algorithm negotiated in the first stage. Values: md5, sha1, sha256, sha384, sha512. Default value: sha1.
- ike
Enc stringAlg - The encryption algorithm negotiated in the first stage. Value: aes, aes192, aes256, des, or 3des. Default value: aes.
- ike
Lifetime number - The life cycle of SA negotiated in the first stage. Unit: seconds.Value range: 0 to 86400. Default value: 86400.
- ike
Mode string - IKE version of the negotiation mode. Value: main or aggressive. Default value: main.-main: main mode, high security during negotiation.-aggressive: Savage mode, fast negotiation and high negotiation success rate.
- ike
Pfs string - The first stage negotiates the Diffie-Hellman key exchange algorithm used. Default value: group2.Values: group1, group2, group5, group14.
- ike
Version string - Version of the IKE protocol. Value: ikev1 or ikev2. Default value: ikev2.Compared with IKEv1, IKEv2 simplifies the SA negotiation process and provides better support for multiple network segments.
- local
Id string - The identifier of the local end of the tunnel (Alibaba Cloud side), which is used for the first phase of negotiation. The length is limited to 100 characters and cannot contain spaces. The default value is the IP address of the tunnel.LocalId supports the FQDN format. If you use the FQDN format, we recommend that you select aggressive (barbaric mode) as the negotiation mode.
- psk string
- The pre-shared key is used for identity authentication between the tunnel and the tunnel peer.-The key can be 1 to 100 characters in length. It supports numbers, upper and lower case English letters, and characters on the right. It cannot contain spaces. '''~! '@#$%^& *()_-+ ={}[]|;:',./? '''-If you do not specify a pre-shared key, the system randomly generates a 16-bit string as the pre-shared key. > The pre-shared key of the tunnel and the tunnel peer must be the same, otherwise the system cannot establish the tunnel normally.
- remote
Id string - Identifier of the tunnel peer, which is used for the first-stage negotiation. The length is limited to 100 characters and cannot contain spaces. The default value is the IP address of the user gateway associated with the tunnel.- RemoteId supports the FQDN format. If you use the FQDN format, we recommend that you select aggressive (barbaric mode) as the negotiation mode.
- ike_
auth_ stralg - The authentication algorithm negotiated in the first stage. Values: md5, sha1, sha256, sha384, sha512. Default value: sha1.
- ike_
enc_ stralg - The encryption algorithm negotiated in the first stage. Value: aes, aes192, aes256, des, or 3des. Default value: aes.
- ike_
lifetime int - The life cycle of SA negotiated in the first stage. Unit: seconds.Value range: 0 to 86400. Default value: 86400.
- ike_
mode str - IKE version of the negotiation mode. Value: main or aggressive. Default value: main.-main: main mode, high security during negotiation.-aggressive: Savage mode, fast negotiation and high negotiation success rate.
- ike_
pfs str - The first stage negotiates the Diffie-Hellman key exchange algorithm used. Default value: group2.Values: group1, group2, group5, group14.
- ike_
version str - Version of the IKE protocol. Value: ikev1 or ikev2. Default value: ikev2.Compared with IKEv1, IKEv2 simplifies the SA negotiation process and provides better support for multiple network segments.
- local_
id str - The identifier of the local end of the tunnel (Alibaba Cloud side), which is used for the first phase of negotiation. The length is limited to 100 characters and cannot contain spaces. The default value is the IP address of the tunnel.LocalId supports the FQDN format. If you use the FQDN format, we recommend that you select aggressive (barbaric mode) as the negotiation mode.
- psk str
- The pre-shared key is used for identity authentication between the tunnel and the tunnel peer.-The key can be 1 to 100 characters in length. It supports numbers, upper and lower case English letters, and characters on the right. It cannot contain spaces. '''~! '@#$%^& *()_-+ ={}[]|;:',./? '''-If you do not specify a pre-shared key, the system randomly generates a 16-bit string as the pre-shared key. > The pre-shared key of the tunnel and the tunnel peer must be the same, otherwise the system cannot establish the tunnel normally.
- remote_
id str - Identifier of the tunnel peer, which is used for the first-stage negotiation. The length is limited to 100 characters and cannot contain spaces. The default value is the IP address of the user gateway associated with the tunnel.- RemoteId supports the FQDN format. If you use the FQDN format, we recommend that you select aggressive (barbaric mode) as the negotiation mode.
- ike
Auth StringAlg - The authentication algorithm negotiated in the first stage. Values: md5, sha1, sha256, sha384, sha512. Default value: sha1.
- ike
Enc StringAlg - The encryption algorithm negotiated in the first stage. Value: aes, aes192, aes256, des, or 3des. Default value: aes.
- ike
Lifetime Number - The life cycle of SA negotiated in the first stage. Unit: seconds.Value range: 0 to 86400. Default value: 86400.
- ike
Mode String - IKE version of the negotiation mode. Value: main or aggressive. Default value: main.-main: main mode, high security during negotiation.-aggressive: Savage mode, fast negotiation and high negotiation success rate.
- ike
Pfs String - The first stage negotiates the Diffie-Hellman key exchange algorithm used. Default value: group2.Values: group1, group2, group5, group14.
- ike
Version String - Version of the IKE protocol. Value: ikev1 or ikev2. Default value: ikev2.Compared with IKEv1, IKEv2 simplifies the SA negotiation process and provides better support for multiple network segments.
- local
Id String - The identifier of the local end of the tunnel (Alibaba Cloud side), which is used for the first phase of negotiation. The length is limited to 100 characters and cannot contain spaces. The default value is the IP address of the tunnel.LocalId supports the FQDN format. If you use the FQDN format, we recommend that you select aggressive (barbaric mode) as the negotiation mode.
- psk String
- The pre-shared key is used for identity authentication between the tunnel and the tunnel peer.-The key can be 1 to 100 characters in length. It supports numbers, upper and lower case English letters, and characters on the right. It cannot contain spaces. '''~! '@#$%^& *()_-+ ={}[]|;:',./? '''-If you do not specify a pre-shared key, the system randomly generates a 16-bit string as the pre-shared key. > The pre-shared key of the tunnel and the tunnel peer must be the same, otherwise the system cannot establish the tunnel normally.
- remote
Id String - Identifier of the tunnel peer, which is used for the first-stage negotiation. The length is limited to 100 characters and cannot contain spaces. The default value is the IP address of the user gateway associated with the tunnel.- RemoteId supports the FQDN format. If you use the FQDN format, we recommend that you select aggressive (barbaric mode) as the negotiation mode.
GetGatewayVpnAttachmentsAttachmentIpsecConfig
- Ipsec
Auth stringAlg - The second stage negotiated authentication algorithm.Values: md5, sha1, sha256, sha384, sha512. Default value: sha1.
- Ipsec
Enc stringAlg - The encryption algorithm negotiated in the second stage. Value: aes, aes192, aes256, des, or 3des. Default value: aes.
- Ipsec
Lifetime int - The life cycle of SA negotiated in the second stage. Unit: seconds.Value range: 0 to 86400. Default value: 86400.
- Ipsec
Pfs string - The second stage negotiates the Diffie-Hellman key exchange algorithm used. Default value: group2.Values: disabled, group1, group2, group5, group14.
- Ipsec
Auth stringAlg - The second stage negotiated authentication algorithm.Values: md5, sha1, sha256, sha384, sha512. Default value: sha1.
- Ipsec
Enc stringAlg - The encryption algorithm negotiated in the second stage. Value: aes, aes192, aes256, des, or 3des. Default value: aes.
- Ipsec
Lifetime int - The life cycle of SA negotiated in the second stage. Unit: seconds.Value range: 0 to 86400. Default value: 86400.
- Ipsec
Pfs string - The second stage negotiates the Diffie-Hellman key exchange algorithm used. Default value: group2.Values: disabled, group1, group2, group5, group14.
- ipsec
Auth StringAlg - The second stage negotiated authentication algorithm.Values: md5, sha1, sha256, sha384, sha512. Default value: sha1.
- ipsec
Enc StringAlg - The encryption algorithm negotiated in the second stage. Value: aes, aes192, aes256, des, or 3des. Default value: aes.
- ipsec
Lifetime Integer - The life cycle of SA negotiated in the second stage. Unit: seconds.Value range: 0 to 86400. Default value: 86400.
- ipsec
Pfs String - The second stage negotiates the Diffie-Hellman key exchange algorithm used. Default value: group2.Values: disabled, group1, group2, group5, group14.
- ipsec
Auth stringAlg - The second stage negotiated authentication algorithm.Values: md5, sha1, sha256, sha384, sha512. Default value: sha1.
- ipsec
Enc stringAlg - The encryption algorithm negotiated in the second stage. Value: aes, aes192, aes256, des, or 3des. Default value: aes.
- ipsec
Lifetime number - The life cycle of SA negotiated in the second stage. Unit: seconds.Value range: 0 to 86400. Default value: 86400.
- ipsec
Pfs string - The second stage negotiates the Diffie-Hellman key exchange algorithm used. Default value: group2.Values: disabled, group1, group2, group5, group14.
- ipsec_
auth_ stralg - The second stage negotiated authentication algorithm.Values: md5, sha1, sha256, sha384, sha512. Default value: sha1.
- ipsec_
enc_ stralg - The encryption algorithm negotiated in the second stage. Value: aes, aes192, aes256, des, or 3des. Default value: aes.
- ipsec_
lifetime int - The life cycle of SA negotiated in the second stage. Unit: seconds.Value range: 0 to 86400. Default value: 86400.
- ipsec_
pfs str - The second stage negotiates the Diffie-Hellman key exchange algorithm used. Default value: group2.Values: disabled, group1, group2, group5, group14.
- ipsec
Auth StringAlg - The second stage negotiated authentication algorithm.Values: md5, sha1, sha256, sha384, sha512. Default value: sha1.
- ipsec
Enc StringAlg - The encryption algorithm negotiated in the second stage. Value: aes, aes192, aes256, des, or 3des. Default value: aes.
- ipsec
Lifetime Number - The life cycle of SA negotiated in the second stage. Unit: seconds.Value range: 0 to 86400. Default value: 86400.
- ipsec
Pfs String - The second stage negotiates the Diffie-Hellman key exchange algorithm used. Default value: group2.Values: disabled, group1, group2, group5, group14.
GetGatewayVpnAttachmentsAttachmentTunnelOptionsSpecification
- Customer
Gateway stringId - The ID of the user gateway associated with the tunnel.> This parameter is required when creating a dual-tunnel mode IPsec-VPN connection.
- Enable
Dpd bool - Whether the DPD (peer alive detection) function is enabled for the tunnel. Value:-true (default): enable the DPD function. IPsec initiator will send DPD message to check whether the peer device is alive. If the peer device does not receive a correct response within the set time, it is considered that the peer has been disconnected. IPsec will delete ISAKMP SA and the corresponding IPsec SA, and the security tunnel will also be deleted.-false: If the DPD function is disabled, the IPsec initiator does not send DPD detection packets.
- Enable
Nat boolTraversal - Whether the NAT crossing function is enabled for the tunnel. Value:-true (default): Enables the NAT Traversal function. When enabled, the IKE negotiation process deletes the verification process of the UDP port number and realizes the discovery function of the NAT gateway device in the tunnel.-false: does not enable the NAT Traversal function.
- Internet
Ip string - The local internet IP in Tunnel.
- Role string
- The role of Tunnel.
- State string
- The state of Tunnel.
- Status string
- The status of the resource. Valid values:
init
,active
,attaching
,attached
,detaching
,financialLocked
,provisioning
,updating
,upgrading
,deleted
. - Tunnel
Bgp Pulumi.Config Ali Cloud. Vpn. Inputs. Get Gateway Vpn Attachments Attachment Tunnel Options Specification Tunnel Bgp Config - Add the BGP configuration for the tunnel.> After you enable the BGP function for IPsec connections (that is, specify EnableTunnelsBgp as true), you must configure this parameter.
- Tunnel
Id string - The tunnel ID of IPsec-VPN connection.
- Tunnel
Ike Pulumi.Config Ali Cloud. Vpn. Inputs. Get Gateway Vpn Attachments Attachment Tunnel Options Specification Tunnel Ike Config - Configuration information for the first phase negotiation.
- Tunnel
Index int - The order in which the tunnel was created.-1: First tunnel.-2: The second tunnel.
- Tunnel
Ipsec Pulumi.Config Ali Cloud. Vpn. Inputs. Get Gateway Vpn Attachments Attachment Tunnel Options Specification Tunnel Ipsec Config - Configuration information for the second-stage negotiation.
- Zone
No string - The zoneNo of tunnel.
- Customer
Gateway stringId - The ID of the user gateway associated with the tunnel.> This parameter is required when creating a dual-tunnel mode IPsec-VPN connection.
- Enable
Dpd bool - Whether the DPD (peer alive detection) function is enabled for the tunnel. Value:-true (default): enable the DPD function. IPsec initiator will send DPD message to check whether the peer device is alive. If the peer device does not receive a correct response within the set time, it is considered that the peer has been disconnected. IPsec will delete ISAKMP SA and the corresponding IPsec SA, and the security tunnel will also be deleted.-false: If the DPD function is disabled, the IPsec initiator does not send DPD detection packets.
- Enable
Nat boolTraversal - Whether the NAT crossing function is enabled for the tunnel. Value:-true (default): Enables the NAT Traversal function. When enabled, the IKE negotiation process deletes the verification process of the UDP port number and realizes the discovery function of the NAT gateway device in the tunnel.-false: does not enable the NAT Traversal function.
- Internet
Ip string - The local internet IP in Tunnel.
- Role string
- The role of Tunnel.
- State string
- The state of Tunnel.
- Status string
- The status of the resource. Valid values:
init
,active
,attaching
,attached
,detaching
,financialLocked
,provisioning
,updating
,upgrading
,deleted
. - Tunnel
Bgp GetConfig Gateway Vpn Attachments Attachment Tunnel Options Specification Tunnel Bgp Config - Add the BGP configuration for the tunnel.> After you enable the BGP function for IPsec connections (that is, specify EnableTunnelsBgp as true), you must configure this parameter.
- Tunnel
Id string - The tunnel ID of IPsec-VPN connection.
- Tunnel
Ike GetConfig Gateway Vpn Attachments Attachment Tunnel Options Specification Tunnel Ike Config - Configuration information for the first phase negotiation.
- Tunnel
Index int - The order in which the tunnel was created.-1: First tunnel.-2: The second tunnel.
- Tunnel
Ipsec GetConfig Gateway Vpn Attachments Attachment Tunnel Options Specification Tunnel Ipsec Config - Configuration information for the second-stage negotiation.
- Zone
No string - The zoneNo of tunnel.
- customer
Gateway StringId - The ID of the user gateway associated with the tunnel.> This parameter is required when creating a dual-tunnel mode IPsec-VPN connection.
- enable
Dpd Boolean - Whether the DPD (peer alive detection) function is enabled for the tunnel. Value:-true (default): enable the DPD function. IPsec initiator will send DPD message to check whether the peer device is alive. If the peer device does not receive a correct response within the set time, it is considered that the peer has been disconnected. IPsec will delete ISAKMP SA and the corresponding IPsec SA, and the security tunnel will also be deleted.-false: If the DPD function is disabled, the IPsec initiator does not send DPD detection packets.
- enable
Nat BooleanTraversal - Whether the NAT crossing function is enabled for the tunnel. Value:-true (default): Enables the NAT Traversal function. When enabled, the IKE negotiation process deletes the verification process of the UDP port number and realizes the discovery function of the NAT gateway device in the tunnel.-false: does not enable the NAT Traversal function.
- internet
Ip String - The local internet IP in Tunnel.
- role String
- The role of Tunnel.
- state String
- The state of Tunnel.
- status String
- The status of the resource. Valid values:
init
,active
,attaching
,attached
,detaching
,financialLocked
,provisioning
,updating
,upgrading
,deleted
. - tunnel
Bgp GetConfig Gateway Vpn Attachments Attachment Tunnel Options Specification Tunnel Bgp Config - Add the BGP configuration for the tunnel.> After you enable the BGP function for IPsec connections (that is, specify EnableTunnelsBgp as true), you must configure this parameter.
- tunnel
Id String - The tunnel ID of IPsec-VPN connection.
- tunnel
Ike GetConfig Gateway Vpn Attachments Attachment Tunnel Options Specification Tunnel Ike Config - Configuration information for the first phase negotiation.
- tunnel
Index Integer - The order in which the tunnel was created.-1: First tunnel.-2: The second tunnel.
- tunnel
Ipsec GetConfig Gateway Vpn Attachments Attachment Tunnel Options Specification Tunnel Ipsec Config - Configuration information for the second-stage negotiation.
- zone
No String - The zoneNo of tunnel.
- customer
Gateway stringId - The ID of the user gateway associated with the tunnel.> This parameter is required when creating a dual-tunnel mode IPsec-VPN connection.
- enable
Dpd boolean - Whether the DPD (peer alive detection) function is enabled for the tunnel. Value:-true (default): enable the DPD function. IPsec initiator will send DPD message to check whether the peer device is alive. If the peer device does not receive a correct response within the set time, it is considered that the peer has been disconnected. IPsec will delete ISAKMP SA and the corresponding IPsec SA, and the security tunnel will also be deleted.-false: If the DPD function is disabled, the IPsec initiator does not send DPD detection packets.
- enable
Nat booleanTraversal - Whether the NAT crossing function is enabled for the tunnel. Value:-true (default): Enables the NAT Traversal function. When enabled, the IKE negotiation process deletes the verification process of the UDP port number and realizes the discovery function of the NAT gateway device in the tunnel.-false: does not enable the NAT Traversal function.
- internet
Ip string - The local internet IP in Tunnel.
- role string
- The role of Tunnel.
- state string
- The state of Tunnel.
- status string
- The status of the resource. Valid values:
init
,active
,attaching
,attached
,detaching
,financialLocked
,provisioning
,updating
,upgrading
,deleted
. - tunnel
Bgp GetConfig Gateway Vpn Attachments Attachment Tunnel Options Specification Tunnel Bgp Config - Add the BGP configuration for the tunnel.> After you enable the BGP function for IPsec connections (that is, specify EnableTunnelsBgp as true), you must configure this parameter.
- tunnel
Id string - The tunnel ID of IPsec-VPN connection.
- tunnel
Ike GetConfig Gateway Vpn Attachments Attachment Tunnel Options Specification Tunnel Ike Config - Configuration information for the first phase negotiation.
- tunnel
Index number - The order in which the tunnel was created.-1: First tunnel.-2: The second tunnel.
- tunnel
Ipsec GetConfig Gateway Vpn Attachments Attachment Tunnel Options Specification Tunnel Ipsec Config - Configuration information for the second-stage negotiation.
- zone
No string - The zoneNo of tunnel.
- customer_
gateway_ strid - The ID of the user gateway associated with the tunnel.> This parameter is required when creating a dual-tunnel mode IPsec-VPN connection.
- enable_
dpd bool - Whether the DPD (peer alive detection) function is enabled for the tunnel. Value:-true (default): enable the DPD function. IPsec initiator will send DPD message to check whether the peer device is alive. If the peer device does not receive a correct response within the set time, it is considered that the peer has been disconnected. IPsec will delete ISAKMP SA and the corresponding IPsec SA, and the security tunnel will also be deleted.-false: If the DPD function is disabled, the IPsec initiator does not send DPD detection packets.
- enable_
nat_ booltraversal - Whether the NAT crossing function is enabled for the tunnel. Value:-true (default): Enables the NAT Traversal function. When enabled, the IKE negotiation process deletes the verification process of the UDP port number and realizes the discovery function of the NAT gateway device in the tunnel.-false: does not enable the NAT Traversal function.
- internet_
ip str - The local internet IP in Tunnel.
- role str
- The role of Tunnel.
- state str
- The state of Tunnel.
- status str
- The status of the resource. Valid values:
init
,active
,attaching
,attached
,detaching
,financialLocked
,provisioning
,updating
,upgrading
,deleted
. - tunnel_
bgp_ Getconfig Gateway Vpn Attachments Attachment Tunnel Options Specification Tunnel Bgp Config - Add the BGP configuration for the tunnel.> After you enable the BGP function for IPsec connections (that is, specify EnableTunnelsBgp as true), you must configure this parameter.
- tunnel_
id str - The tunnel ID of IPsec-VPN connection.
- tunnel_
ike_ Getconfig Gateway Vpn Attachments Attachment Tunnel Options Specification Tunnel Ike Config - Configuration information for the first phase negotiation.
- tunnel_
index int - The order in which the tunnel was created.-1: First tunnel.-2: The second tunnel.
- tunnel_
ipsec_ Getconfig Gateway Vpn Attachments Attachment Tunnel Options Specification Tunnel Ipsec Config - Configuration information for the second-stage negotiation.
- zone_
no str - The zoneNo of tunnel.
- customer
Gateway StringId - The ID of the user gateway associated with the tunnel.> This parameter is required when creating a dual-tunnel mode IPsec-VPN connection.
- enable
Dpd Boolean - Whether the DPD (peer alive detection) function is enabled for the tunnel. Value:-true (default): enable the DPD function. IPsec initiator will send DPD message to check whether the peer device is alive. If the peer device does not receive a correct response within the set time, it is considered that the peer has been disconnected. IPsec will delete ISAKMP SA and the corresponding IPsec SA, and the security tunnel will also be deleted.-false: If the DPD function is disabled, the IPsec initiator does not send DPD detection packets.
- enable
Nat BooleanTraversal - Whether the NAT crossing function is enabled for the tunnel. Value:-true (default): Enables the NAT Traversal function. When enabled, the IKE negotiation process deletes the verification process of the UDP port number and realizes the discovery function of the NAT gateway device in the tunnel.-false: does not enable the NAT Traversal function.
- internet
Ip String - The local internet IP in Tunnel.
- role String
- The role of Tunnel.
- state String
- The state of Tunnel.
- status String
- The status of the resource. Valid values:
init
,active
,attaching
,attached
,detaching
,financialLocked
,provisioning
,updating
,upgrading
,deleted
. - tunnel
Bgp Property MapConfig - Add the BGP configuration for the tunnel.> After you enable the BGP function for IPsec connections (that is, specify EnableTunnelsBgp as true), you must configure this parameter.
- tunnel
Id String - The tunnel ID of IPsec-VPN connection.
- tunnel
Ike Property MapConfig - Configuration information for the first phase negotiation.
- tunnel
Index Number - The order in which the tunnel was created.-1: First tunnel.-2: The second tunnel.
- tunnel
Ipsec Property MapConfig - Configuration information for the second-stage negotiation.
- zone
No String - The zoneNo of tunnel.
GetGatewayVpnAttachmentsAttachmentTunnelOptionsSpecificationTunnelBgpConfig
- Bgp
Status string - BGP status.
- Local
Asn int - The number of the local (Alibaba Cloud) autonomous system of the tunnel. The value range of the autonomous system number is 1 to 4294967295. Default value: 45104.> We recommend that you use the private number of the autonomous system number to establish a BGP connection with Alibaba Cloud. The private number range of the autonomous system number please consult the document yourself.
- Local
Bgp stringIp - The local BGP address of the tunnel (on the Alibaba Cloud side). This address is an IP address in the BGP network segment.
- Peer
Asn string - Peer asn.
- Peer
Bgp stringIp - Peer bgp ip.
- Tunnel
Cidr string - The BGP network segment of the tunnel. The network segment must be a network segment with a mask length of 30 in 169.254.0.0/16, and cannot be 169.254.0.0/30, 169.254.1.0/30, 169.254.2.0/30, 169.254.3.0/30, 169.254.4.0/30, 169.254.5.0/30, 169.254.6.0/30, and 169.254.169.252/30.> the network segments of two tunnels under an IPsec connection cannot be the same.
- Bgp
Status string - BGP status.
- Local
Asn int - The number of the local (Alibaba Cloud) autonomous system of the tunnel. The value range of the autonomous system number is 1 to 4294967295. Default value: 45104.> We recommend that you use the private number of the autonomous system number to establish a BGP connection with Alibaba Cloud. The private number range of the autonomous system number please consult the document yourself.
- Local
Bgp stringIp - The local BGP address of the tunnel (on the Alibaba Cloud side). This address is an IP address in the BGP network segment.
- Peer
Asn string - Peer asn.
- Peer
Bgp stringIp - Peer bgp ip.
- Tunnel
Cidr string - The BGP network segment of the tunnel. The network segment must be a network segment with a mask length of 30 in 169.254.0.0/16, and cannot be 169.254.0.0/30, 169.254.1.0/30, 169.254.2.0/30, 169.254.3.0/30, 169.254.4.0/30, 169.254.5.0/30, 169.254.6.0/30, and 169.254.169.252/30.> the network segments of two tunnels under an IPsec connection cannot be the same.
- bgp
Status String - BGP status.
- local
Asn Integer - The number of the local (Alibaba Cloud) autonomous system of the tunnel. The value range of the autonomous system number is 1 to 4294967295. Default value: 45104.> We recommend that you use the private number of the autonomous system number to establish a BGP connection with Alibaba Cloud. The private number range of the autonomous system number please consult the document yourself.
- local
Bgp StringIp - The local BGP address of the tunnel (on the Alibaba Cloud side). This address is an IP address in the BGP network segment.
- peer
Asn String - Peer asn.
- peer
Bgp StringIp - Peer bgp ip.
- tunnel
Cidr String - The BGP network segment of the tunnel. The network segment must be a network segment with a mask length of 30 in 169.254.0.0/16, and cannot be 169.254.0.0/30, 169.254.1.0/30, 169.254.2.0/30, 169.254.3.0/30, 169.254.4.0/30, 169.254.5.0/30, 169.254.6.0/30, and 169.254.169.252/30.> the network segments of two tunnels under an IPsec connection cannot be the same.
- bgp
Status string - BGP status.
- local
Asn number - The number of the local (Alibaba Cloud) autonomous system of the tunnel. The value range of the autonomous system number is 1 to 4294967295. Default value: 45104.> We recommend that you use the private number of the autonomous system number to establish a BGP connection with Alibaba Cloud. The private number range of the autonomous system number please consult the document yourself.
- local
Bgp stringIp - The local BGP address of the tunnel (on the Alibaba Cloud side). This address is an IP address in the BGP network segment.
- peer
Asn string - Peer asn.
- peer
Bgp stringIp - Peer bgp ip.
- tunnel
Cidr string - The BGP network segment of the tunnel. The network segment must be a network segment with a mask length of 30 in 169.254.0.0/16, and cannot be 169.254.0.0/30, 169.254.1.0/30, 169.254.2.0/30, 169.254.3.0/30, 169.254.4.0/30, 169.254.5.0/30, 169.254.6.0/30, and 169.254.169.252/30.> the network segments of two tunnels under an IPsec connection cannot be the same.
- bgp_
status str - BGP status.
- local_
asn int - The number of the local (Alibaba Cloud) autonomous system of the tunnel. The value range of the autonomous system number is 1 to 4294967295. Default value: 45104.> We recommend that you use the private number of the autonomous system number to establish a BGP connection with Alibaba Cloud. The private number range of the autonomous system number please consult the document yourself.
- local_
bgp_ strip - The local BGP address of the tunnel (on the Alibaba Cloud side). This address is an IP address in the BGP network segment.
- peer_
asn str - Peer asn.
- peer_
bgp_ strip - Peer bgp ip.
- tunnel_
cidr str - The BGP network segment of the tunnel. The network segment must be a network segment with a mask length of 30 in 169.254.0.0/16, and cannot be 169.254.0.0/30, 169.254.1.0/30, 169.254.2.0/30, 169.254.3.0/30, 169.254.4.0/30, 169.254.5.0/30, 169.254.6.0/30, and 169.254.169.252/30.> the network segments of two tunnels under an IPsec connection cannot be the same.
- bgp
Status String - BGP status.
- local
Asn Number - The number of the local (Alibaba Cloud) autonomous system of the tunnel. The value range of the autonomous system number is 1 to 4294967295. Default value: 45104.> We recommend that you use the private number of the autonomous system number to establish a BGP connection with Alibaba Cloud. The private number range of the autonomous system number please consult the document yourself.
- local
Bgp StringIp - The local BGP address of the tunnel (on the Alibaba Cloud side). This address is an IP address in the BGP network segment.
- peer
Asn String - Peer asn.
- peer
Bgp StringIp - Peer bgp ip.
- tunnel
Cidr String - The BGP network segment of the tunnel. The network segment must be a network segment with a mask length of 30 in 169.254.0.0/16, and cannot be 169.254.0.0/30, 169.254.1.0/30, 169.254.2.0/30, 169.254.3.0/30, 169.254.4.0/30, 169.254.5.0/30, 169.254.6.0/30, and 169.254.169.252/30.> the network segments of two tunnels under an IPsec connection cannot be the same.
GetGatewayVpnAttachmentsAttachmentTunnelOptionsSpecificationTunnelIkeConfig
- Ike
Auth stringAlg - The authentication algorithm negotiated in the first stage. Values: md5, sha1, sha256, sha384, sha512. Default value: sha1.
- Ike
Enc stringAlg - The encryption algorithm negotiated in the first stage. Value: aes, aes192, aes256, des, or 3des. Default value: aes.
- Ike
Lifetime int - The life cycle of SA negotiated in the first stage. Unit: seconds.Value range: 0 to 86400. Default value: 86400.
- Ike
Mode string - IKE version of the negotiation mode. Value: main or aggressive. Default value: main.-main: main mode, high security during negotiation.-aggressive: Savage mode, fast negotiation and high negotiation success rate.
- Ike
Pfs string - The first stage negotiates the Diffie-Hellman key exchange algorithm used. Default value: group2.Values: group1, group2, group5, group14.
- Ike
Version string - Version of the IKE protocol. Value: ikev1 or ikev2. Default value: ikev2.Compared with IKEv1, IKEv2 simplifies the SA negotiation process and provides better support for multiple network segments.
- Local
Id string - The identifier of the local end of the tunnel (Alibaba Cloud side), which is used for the first phase of negotiation. The length is limited to 100 characters and cannot contain spaces. The default value is the IP address of the tunnel.LocalId supports the FQDN format. If you use the FQDN format, we recommend that you select aggressive (barbaric mode) as the negotiation mode.
- Psk string
- The pre-shared key is used for identity authentication between the tunnel and the tunnel peer.-The key can be 1 to 100 characters in length. It supports numbers, upper and lower case English letters, and characters on the right. It cannot contain spaces. '''~! '@#$%^& *()_-+ ={}[]|;:',./? '''-If you do not specify a pre-shared key, the system randomly generates a 16-bit string as the pre-shared key. > The pre-shared key of the tunnel and the tunnel peer must be the same, otherwise the system cannot establish the tunnel normally.
- Remote
Id string - Identifier of the tunnel peer, which is used for the first-stage negotiation. The length is limited to 100 characters and cannot contain spaces. The default value is the IP address of the user gateway associated with the tunnel.- RemoteId supports the FQDN format. If you use the FQDN format, we recommend that you select aggressive (barbaric mode) as the negotiation mode.
- Ike
Auth stringAlg - The authentication algorithm negotiated in the first stage. Values: md5, sha1, sha256, sha384, sha512. Default value: sha1.
- Ike
Enc stringAlg - The encryption algorithm negotiated in the first stage. Value: aes, aes192, aes256, des, or 3des. Default value: aes.
- Ike
Lifetime int - The life cycle of SA negotiated in the first stage. Unit: seconds.Value range: 0 to 86400. Default value: 86400.
- Ike
Mode string - IKE version of the negotiation mode. Value: main or aggressive. Default value: main.-main: main mode, high security during negotiation.-aggressive: Savage mode, fast negotiation and high negotiation success rate.
- Ike
Pfs string - The first stage negotiates the Diffie-Hellman key exchange algorithm used. Default value: group2.Values: group1, group2, group5, group14.
- Ike
Version string - Version of the IKE protocol. Value: ikev1 or ikev2. Default value: ikev2.Compared with IKEv1, IKEv2 simplifies the SA negotiation process and provides better support for multiple network segments.
- Local
Id string - The identifier of the local end of the tunnel (Alibaba Cloud side), which is used for the first phase of negotiation. The length is limited to 100 characters and cannot contain spaces. The default value is the IP address of the tunnel.LocalId supports the FQDN format. If you use the FQDN format, we recommend that you select aggressive (barbaric mode) as the negotiation mode.
- Psk string
- The pre-shared key is used for identity authentication between the tunnel and the tunnel peer.-The key can be 1 to 100 characters in length. It supports numbers, upper and lower case English letters, and characters on the right. It cannot contain spaces. '''~! '@#$%^& *()_-+ ={}[]|;:',./? '''-If you do not specify a pre-shared key, the system randomly generates a 16-bit string as the pre-shared key. > The pre-shared key of the tunnel and the tunnel peer must be the same, otherwise the system cannot establish the tunnel normally.
- Remote
Id string - Identifier of the tunnel peer, which is used for the first-stage negotiation. The length is limited to 100 characters and cannot contain spaces. The default value is the IP address of the user gateway associated with the tunnel.- RemoteId supports the FQDN format. If you use the FQDN format, we recommend that you select aggressive (barbaric mode) as the negotiation mode.
- ike
Auth StringAlg - The authentication algorithm negotiated in the first stage. Values: md5, sha1, sha256, sha384, sha512. Default value: sha1.
- ike
Enc StringAlg - The encryption algorithm negotiated in the first stage. Value: aes, aes192, aes256, des, or 3des. Default value: aes.
- ike
Lifetime Integer - The life cycle of SA negotiated in the first stage. Unit: seconds.Value range: 0 to 86400. Default value: 86400.
- ike
Mode String - IKE version of the negotiation mode. Value: main or aggressive. Default value: main.-main: main mode, high security during negotiation.-aggressive: Savage mode, fast negotiation and high negotiation success rate.
- ike
Pfs String - The first stage negotiates the Diffie-Hellman key exchange algorithm used. Default value: group2.Values: group1, group2, group5, group14.
- ike
Version String - Version of the IKE protocol. Value: ikev1 or ikev2. Default value: ikev2.Compared with IKEv1, IKEv2 simplifies the SA negotiation process and provides better support for multiple network segments.
- local
Id String - The identifier of the local end of the tunnel (Alibaba Cloud side), which is used for the first phase of negotiation. The length is limited to 100 characters and cannot contain spaces. The default value is the IP address of the tunnel.LocalId supports the FQDN format. If you use the FQDN format, we recommend that you select aggressive (barbaric mode) as the negotiation mode.
- psk String
- The pre-shared key is used for identity authentication between the tunnel and the tunnel peer.-The key can be 1 to 100 characters in length. It supports numbers, upper and lower case English letters, and characters on the right. It cannot contain spaces. '''~! '@#$%^& *()_-+ ={}[]|;:',./? '''-If you do not specify a pre-shared key, the system randomly generates a 16-bit string as the pre-shared key. > The pre-shared key of the tunnel and the tunnel peer must be the same, otherwise the system cannot establish the tunnel normally.
- remote
Id String - Identifier of the tunnel peer, which is used for the first-stage negotiation. The length is limited to 100 characters and cannot contain spaces. The default value is the IP address of the user gateway associated with the tunnel.- RemoteId supports the FQDN format. If you use the FQDN format, we recommend that you select aggressive (barbaric mode) as the negotiation mode.
- ike
Auth stringAlg - The authentication algorithm negotiated in the first stage. Values: md5, sha1, sha256, sha384, sha512. Default value: sha1.
- ike
Enc stringAlg - The encryption algorithm negotiated in the first stage. Value: aes, aes192, aes256, des, or 3des. Default value: aes.
- ike
Lifetime number - The life cycle of SA negotiated in the first stage. Unit: seconds.Value range: 0 to 86400. Default value: 86400.
- ike
Mode string - IKE version of the negotiation mode. Value: main or aggressive. Default value: main.-main: main mode, high security during negotiation.-aggressive: Savage mode, fast negotiation and high negotiation success rate.
- ike
Pfs string - The first stage negotiates the Diffie-Hellman key exchange algorithm used. Default value: group2.Values: group1, group2, group5, group14.
- ike
Version string - Version of the IKE protocol. Value: ikev1 or ikev2. Default value: ikev2.Compared with IKEv1, IKEv2 simplifies the SA negotiation process and provides better support for multiple network segments.
- local
Id string - The identifier of the local end of the tunnel (Alibaba Cloud side), which is used for the first phase of negotiation. The length is limited to 100 characters and cannot contain spaces. The default value is the IP address of the tunnel.LocalId supports the FQDN format. If you use the FQDN format, we recommend that you select aggressive (barbaric mode) as the negotiation mode.
- psk string
- The pre-shared key is used for identity authentication between the tunnel and the tunnel peer.-The key can be 1 to 100 characters in length. It supports numbers, upper and lower case English letters, and characters on the right. It cannot contain spaces. '''~! '@#$%^& *()_-+ ={}[]|;:',./? '''-If you do not specify a pre-shared key, the system randomly generates a 16-bit string as the pre-shared key. > The pre-shared key of the tunnel and the tunnel peer must be the same, otherwise the system cannot establish the tunnel normally.
- remote
Id string - Identifier of the tunnel peer, which is used for the first-stage negotiation. The length is limited to 100 characters and cannot contain spaces. The default value is the IP address of the user gateway associated with the tunnel.- RemoteId supports the FQDN format. If you use the FQDN format, we recommend that you select aggressive (barbaric mode) as the negotiation mode.
- ike_
auth_ stralg - The authentication algorithm negotiated in the first stage. Values: md5, sha1, sha256, sha384, sha512. Default value: sha1.
- ike_
enc_ stralg - The encryption algorithm negotiated in the first stage. Value: aes, aes192, aes256, des, or 3des. Default value: aes.
- ike_
lifetime int - The life cycle of SA negotiated in the first stage. Unit: seconds.Value range: 0 to 86400. Default value: 86400.
- ike_
mode str - IKE version of the negotiation mode. Value: main or aggressive. Default value: main.-main: main mode, high security during negotiation.-aggressive: Savage mode, fast negotiation and high negotiation success rate.
- ike_
pfs str - The first stage negotiates the Diffie-Hellman key exchange algorithm used. Default value: group2.Values: group1, group2, group5, group14.
- ike_
version str - Version of the IKE protocol. Value: ikev1 or ikev2. Default value: ikev2.Compared with IKEv1, IKEv2 simplifies the SA negotiation process and provides better support for multiple network segments.
- local_
id str - The identifier of the local end of the tunnel (Alibaba Cloud side), which is used for the first phase of negotiation. The length is limited to 100 characters and cannot contain spaces. The default value is the IP address of the tunnel.LocalId supports the FQDN format. If you use the FQDN format, we recommend that you select aggressive (barbaric mode) as the negotiation mode.
- psk str
- The pre-shared key is used for identity authentication between the tunnel and the tunnel peer.-The key can be 1 to 100 characters in length. It supports numbers, upper and lower case English letters, and characters on the right. It cannot contain spaces. '''~! '@#$%^& *()_-+ ={}[]|;:',./? '''-If you do not specify a pre-shared key, the system randomly generates a 16-bit string as the pre-shared key. > The pre-shared key of the tunnel and the tunnel peer must be the same, otherwise the system cannot establish the tunnel normally.
- remote_
id str - Identifier of the tunnel peer, which is used for the first-stage negotiation. The length is limited to 100 characters and cannot contain spaces. The default value is the IP address of the user gateway associated with the tunnel.- RemoteId supports the FQDN format. If you use the FQDN format, we recommend that you select aggressive (barbaric mode) as the negotiation mode.
- ike
Auth StringAlg - The authentication algorithm negotiated in the first stage. Values: md5, sha1, sha256, sha384, sha512. Default value: sha1.
- ike
Enc StringAlg - The encryption algorithm negotiated in the first stage. Value: aes, aes192, aes256, des, or 3des. Default value: aes.
- ike
Lifetime Number - The life cycle of SA negotiated in the first stage. Unit: seconds.Value range: 0 to 86400. Default value: 86400.
- ike
Mode String - IKE version of the negotiation mode. Value: main or aggressive. Default value: main.-main: main mode, high security during negotiation.-aggressive: Savage mode, fast negotiation and high negotiation success rate.
- ike
Pfs String - The first stage negotiates the Diffie-Hellman key exchange algorithm used. Default value: group2.Values: group1, group2, group5, group14.
- ike
Version String - Version of the IKE protocol. Value: ikev1 or ikev2. Default value: ikev2.Compared with IKEv1, IKEv2 simplifies the SA negotiation process and provides better support for multiple network segments.
- local
Id String - The identifier of the local end of the tunnel (Alibaba Cloud side), which is used for the first phase of negotiation. The length is limited to 100 characters and cannot contain spaces. The default value is the IP address of the tunnel.LocalId supports the FQDN format. If you use the FQDN format, we recommend that you select aggressive (barbaric mode) as the negotiation mode.
- psk String
- The pre-shared key is used for identity authentication between the tunnel and the tunnel peer.-The key can be 1 to 100 characters in length. It supports numbers, upper and lower case English letters, and characters on the right. It cannot contain spaces. '''~! '@#$%^& *()_-+ ={}[]|;:',./? '''-If you do not specify a pre-shared key, the system randomly generates a 16-bit string as the pre-shared key. > The pre-shared key of the tunnel and the tunnel peer must be the same, otherwise the system cannot establish the tunnel normally.
- remote
Id String - Identifier of the tunnel peer, which is used for the first-stage negotiation. The length is limited to 100 characters and cannot contain spaces. The default value is the IP address of the user gateway associated with the tunnel.- RemoteId supports the FQDN format. If you use the FQDN format, we recommend that you select aggressive (barbaric mode) as the negotiation mode.
GetGatewayVpnAttachmentsAttachmentTunnelOptionsSpecificationTunnelIpsecConfig
- Ipsec
Auth stringAlg - The second stage negotiated authentication algorithm.Values: md5, sha1, sha256, sha384, sha512. Default value: sha1.
- Ipsec
Enc stringAlg - The encryption algorithm negotiated in the second stage. Value: aes, aes192, aes256, des, or 3des. Default value: aes.
- Ipsec
Lifetime int - The life cycle of SA negotiated in the second stage. Unit: seconds.Value range: 0 to 86400. Default value: 86400.
- Ipsec
Pfs string - The second stage negotiates the Diffie-Hellman key exchange algorithm used. Default value: group2.Values: disabled, group1, group2, group5, group14.
- Ipsec
Auth stringAlg - The second stage negotiated authentication algorithm.Values: md5, sha1, sha256, sha384, sha512. Default value: sha1.
- Ipsec
Enc stringAlg - The encryption algorithm negotiated in the second stage. Value: aes, aes192, aes256, des, or 3des. Default value: aes.
- Ipsec
Lifetime int - The life cycle of SA negotiated in the second stage. Unit: seconds.Value range: 0 to 86400. Default value: 86400.
- Ipsec
Pfs string - The second stage negotiates the Diffie-Hellman key exchange algorithm used. Default value: group2.Values: disabled, group1, group2, group5, group14.
- ipsec
Auth StringAlg - The second stage negotiated authentication algorithm.Values: md5, sha1, sha256, sha384, sha512. Default value: sha1.
- ipsec
Enc StringAlg - The encryption algorithm negotiated in the second stage. Value: aes, aes192, aes256, des, or 3des. Default value: aes.
- ipsec
Lifetime Integer - The life cycle of SA negotiated in the second stage. Unit: seconds.Value range: 0 to 86400. Default value: 86400.
- ipsec
Pfs String - The second stage negotiates the Diffie-Hellman key exchange algorithm used. Default value: group2.Values: disabled, group1, group2, group5, group14.
- ipsec
Auth stringAlg - The second stage negotiated authentication algorithm.Values: md5, sha1, sha256, sha384, sha512. Default value: sha1.
- ipsec
Enc stringAlg - The encryption algorithm negotiated in the second stage. Value: aes, aes192, aes256, des, or 3des. Default value: aes.
- ipsec
Lifetime number - The life cycle of SA negotiated in the second stage. Unit: seconds.Value range: 0 to 86400. Default value: 86400.
- ipsec
Pfs string - The second stage negotiates the Diffie-Hellman key exchange algorithm used. Default value: group2.Values: disabled, group1, group2, group5, group14.
- ipsec_
auth_ stralg - The second stage negotiated authentication algorithm.Values: md5, sha1, sha256, sha384, sha512. Default value: sha1.
- ipsec_
enc_ stralg - The encryption algorithm negotiated in the second stage. Value: aes, aes192, aes256, des, or 3des. Default value: aes.
- ipsec_
lifetime int - The life cycle of SA negotiated in the second stage. Unit: seconds.Value range: 0 to 86400. Default value: 86400.
- ipsec_
pfs str - The second stage negotiates the Diffie-Hellman key exchange algorithm used. Default value: group2.Values: disabled, group1, group2, group5, group14.
- ipsec
Auth StringAlg - The second stage negotiated authentication algorithm.Values: md5, sha1, sha256, sha384, sha512. Default value: sha1.
- ipsec
Enc StringAlg - The encryption algorithm negotiated in the second stage. Value: aes, aes192, aes256, des, or 3des. Default value: aes.
- ipsec
Lifetime Number - The life cycle of SA negotiated in the second stage. Unit: seconds.Value range: 0 to 86400. Default value: 86400.
- ipsec
Pfs String - The second stage negotiates the Diffie-Hellman key exchange algorithm used. Default value: group2.Values: disabled, group1, group2, group5, group14.
Package Details
- Repository
- Alibaba Cloud pulumi/pulumi-alicloud
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
alicloud
Terraform Provider.