azure.network.getGatewayConnection
Use this data source to access information about an existing Virtual Network Gateway Connection.
Example Usage
using System.Collections.Generic;
using Pulumi;
using Azure = Pulumi.Azure;
return await Deployment.RunAsync(() =>
{
var example = Azure.Network.GetGatewayConnection.Invoke(new()
{
Name = "production",
ResourceGroupName = "networking",
});
return new Dictionary<string, object?>
{
["virtualNetworkGatewayConnectionId"] = example.Apply(getGatewayConnectionResult => getGatewayConnectionResult.Id),
};
});
package main
import (
"github.com/pulumi/pulumi-azure/sdk/v5/go/azure/network"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
example, err := network.GetGatewayConnection(ctx, &network.GetGatewayConnectionArgs{
Name: "production",
ResourceGroupName: "networking",
}, nil)
if err != nil {
return err
}
ctx.Export("virtualNetworkGatewayConnectionId", example.Id)
return nil
})
}
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.azure.network.NetworkFunctions;
import com.pulumi.azure.network.inputs.GetGatewayConnectionArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
final var example = NetworkFunctions.getGatewayConnection(GetGatewayConnectionArgs.builder()
.name("production")
.resourceGroupName("networking")
.build());
ctx.export("virtualNetworkGatewayConnectionId", example.applyValue(getGatewayConnectionResult -> getGatewayConnectionResult.id()));
}
}
import pulumi
import pulumi_azure as azure
example = azure.network.get_gateway_connection(name="production",
resource_group_name="networking")
pulumi.export("virtualNetworkGatewayConnectionId", example.id)
import * as pulumi from "@pulumi/pulumi";
import * as azure from "@pulumi/azure";
const example = azure.network.getGatewayConnection({
name: "production",
resourceGroupName: "networking",
});
export const virtualNetworkGatewayConnectionId = example.then(example => example.id);
variables:
example:
fn::invoke:
Function: azure:network:getGatewayConnection
Arguments:
name: production
resourceGroupName: networking
outputs:
virtualNetworkGatewayConnectionId: ${example.id}
Using getGatewayConnection
Two invocation forms are available. The direct form accepts plain arguments and either blocks until the result value is available, or returns a Promise-wrapped result. The output form accepts Input-wrapped arguments and returns an Output-wrapped result.
function getGatewayConnection(args: GetGatewayConnectionArgs, opts?: InvokeOptions): Promise<GetGatewayConnectionResult>
function getGatewayConnectionOutput(args: GetGatewayConnectionOutputArgs, opts?: InvokeOptions): Output<GetGatewayConnectionResult>
def get_gateway_connection(name: Optional[str] = None,
resource_group_name: Optional[str] = None,
opts: Optional[InvokeOptions] = None) -> GetGatewayConnectionResult
def get_gateway_connection_output(name: Optional[pulumi.Input[str]] = None,
resource_group_name: Optional[pulumi.Input[str]] = None,
opts: Optional[InvokeOptions] = None) -> Output[GetGatewayConnectionResult]
func GetGatewayConnection(ctx *Context, args *GetGatewayConnectionArgs, opts ...InvokeOption) (*GetGatewayConnectionResult, error)
func GetGatewayConnectionOutput(ctx *Context, args *GetGatewayConnectionOutputArgs, opts ...InvokeOption) GetGatewayConnectionResultOutput
> Note: This function is named GetGatewayConnection
in the Go SDK.
public static class GetGatewayConnection
{
public static Task<GetGatewayConnectionResult> InvokeAsync(GetGatewayConnectionArgs args, InvokeOptions? opts = null)
public static Output<GetGatewayConnectionResult> Invoke(GetGatewayConnectionInvokeArgs args, InvokeOptions? opts = null)
}
public static CompletableFuture<GetGatewayConnectionResult> getGatewayConnection(GetGatewayConnectionArgs args, InvokeOptions options)
// Output-based functions aren't available in Java yet
fn::invoke:
function: azure:network/getGatewayConnection:getGatewayConnection
arguments:
# arguments dictionary
The following arguments are supported:
- Name string
Specifies the name of the Virtual Network Gateway Connection.
- Resource
Group stringName Specifies the name of the resource group the Virtual Network Gateway Connection is located in.
- Name string
Specifies the name of the Virtual Network Gateway Connection.
- Resource
Group stringName Specifies the name of the resource group the Virtual Network Gateway Connection is located in.
- name String
Specifies the name of the Virtual Network Gateway Connection.
- resource
Group StringName Specifies the name of the resource group the Virtual Network Gateway Connection is located in.
- name string
Specifies the name of the Virtual Network Gateway Connection.
- resource
Group stringName Specifies the name of the resource group the Virtual Network Gateway Connection is located in.
- name str
Specifies the name of the Virtual Network Gateway Connection.
- resource_
group_ strname Specifies the name of the resource group the Virtual Network Gateway Connection is located in.
- name String
Specifies the name of the Virtual Network Gateway Connection.
- resource
Group StringName Specifies the name of the resource group the Virtual Network Gateway Connection is located in.
getGatewayConnection Result
The following output properties are available:
- string
The authorization key associated with the Express Route Circuit. This field is present only if the type is an ExpressRoute connection.
- Connection
Protocol string - Dpd
Timeout intSeconds The dead peer detection timeout of this connection in seconds.
- Egress
Bytes intTransferred - Enable
Bgp bool If
true
, BGP (Border Gateway Protocol) is enabled for this connection.- Express
Route stringCircuit Id The ID of the Express Route Circuit (i.e. when
type
isExpressRoute
).- Express
Route boolGateway Bypass If
true
, data packets will bypass ExpressRoute Gateway for data forwarding. This is only valid for ExpressRoute connections.- Id string
The provider-assigned unique ID for this managed resource.
- Ingress
Bytes intTransferred - Ipsec
Policies List<GetGateway Connection Ipsec Policy> (Optional) A
ipsec_policy
block which is documented below. Only a single policy can be defined for a connection. For details on custom policies refer to the relevant section in the Azure documentation.- Local
Azure boolIp Address Enabled Use private local Azure IP for the connection.
- Local
Network stringGateway Id The ID of the local network gateway when a Site-to-Site connection (i.e. when
type
isIPsec
).- Location string
The location/region where the connection is located.
- Name string
- Peer
Virtual stringNetwork Gateway Id The ID of the peer virtual network gateway when a VNet-to-VNet connection (i.e. when
type
isVnet2Vnet
).- Resource
Group stringName - Resource
Guid string - Routing
Weight int The routing weight.
- string
The shared IPSec key.
- Dictionary<string, string>
A mapping of tags to assign to the resource.
- Traffic
Selector List<GetPolicies Gateway Connection Traffic Selector Policy> One or more
traffic_selector_policy
blocks which are documented below. Atraffic_selector_policy
allows to specify a traffic selector policy proposal to be used in a virtual network gateway connection. For details about traffic selectors refer to the relevant section in the Azure documentation.- Type string
The type of connection. Valid options are
IPsec
(Site-to-Site),ExpressRoute
(ExpressRoute), andVnet2Vnet
(VNet-to-VNet).- Use
Policy boolBased Traffic Selectors If
true
, policy-based traffic selectors are enabled for this connection. Enabling policy-based traffic selectors requires anipsec_policy
block.- Virtual
Network stringGateway Id The ID of the Virtual Network Gateway in which the connection is created.
- string
The authorization key associated with the Express Route Circuit. This field is present only if the type is an ExpressRoute connection.
- Connection
Protocol string - Dpd
Timeout intSeconds The dead peer detection timeout of this connection in seconds.
- Egress
Bytes intTransferred - Enable
Bgp bool If
true
, BGP (Border Gateway Protocol) is enabled for this connection.- Express
Route stringCircuit Id The ID of the Express Route Circuit (i.e. when
type
isExpressRoute
).- Express
Route boolGateway Bypass If
true
, data packets will bypass ExpressRoute Gateway for data forwarding. This is only valid for ExpressRoute connections.- Id string
The provider-assigned unique ID for this managed resource.
- Ingress
Bytes intTransferred - Ipsec
Policies []GetGateway Connection Ipsec Policy (Optional) A
ipsec_policy
block which is documented below. Only a single policy can be defined for a connection. For details on custom policies refer to the relevant section in the Azure documentation.- Local
Azure boolIp Address Enabled Use private local Azure IP for the connection.
- Local
Network stringGateway Id The ID of the local network gateway when a Site-to-Site connection (i.e. when
type
isIPsec
).- Location string
The location/region where the connection is located.
- Name string
- Peer
Virtual stringNetwork Gateway Id The ID of the peer virtual network gateway when a VNet-to-VNet connection (i.e. when
type
isVnet2Vnet
).- Resource
Group stringName - Resource
Guid string - Routing
Weight int The routing weight.
- string
The shared IPSec key.
- map[string]string
A mapping of tags to assign to the resource.
- Traffic
Selector []GetPolicies Gateway Connection Traffic Selector Policy One or more
traffic_selector_policy
blocks which are documented below. Atraffic_selector_policy
allows to specify a traffic selector policy proposal to be used in a virtual network gateway connection. For details about traffic selectors refer to the relevant section in the Azure documentation.- Type string
The type of connection. Valid options are
IPsec
(Site-to-Site),ExpressRoute
(ExpressRoute), andVnet2Vnet
(VNet-to-VNet).- Use
Policy boolBased Traffic Selectors If
true
, policy-based traffic selectors are enabled for this connection. Enabling policy-based traffic selectors requires anipsec_policy
block.- Virtual
Network stringGateway Id The ID of the Virtual Network Gateway in which the connection is created.
- String
The authorization key associated with the Express Route Circuit. This field is present only if the type is an ExpressRoute connection.
- connection
Protocol String - dpd
Timeout IntegerSeconds The dead peer detection timeout of this connection in seconds.
- egress
Bytes IntegerTransferred - enable
Bgp Boolean If
true
, BGP (Border Gateway Protocol) is enabled for this connection.- express
Route StringCircuit Id The ID of the Express Route Circuit (i.e. when
type
isExpressRoute
).- express
Route BooleanGateway Bypass If
true
, data packets will bypass ExpressRoute Gateway for data forwarding. This is only valid for ExpressRoute connections.- id String
The provider-assigned unique ID for this managed resource.
- ingress
Bytes IntegerTransferred - ipsec
Policies List<GetGateway Connection Ipsec Policy> (Optional) A
ipsec_policy
block which is documented below. Only a single policy can be defined for a connection. For details on custom policies refer to the relevant section in the Azure documentation.- local
Azure BooleanIp Address Enabled Use private local Azure IP for the connection.
- local
Network StringGateway Id The ID of the local network gateway when a Site-to-Site connection (i.e. when
type
isIPsec
).- location String
The location/region where the connection is located.
- name String
- peer
Virtual StringNetwork Gateway Id The ID of the peer virtual network gateway when a VNet-to-VNet connection (i.e. when
type
isVnet2Vnet
).- resource
Group StringName - resource
Guid String - routing
Weight Integer The routing weight.
- String
The shared IPSec key.
- Map<String,String>
A mapping of tags to assign to the resource.
- traffic
Selector List<GetPolicies Gateway Connection Traffic Selector Policy> One or more
traffic_selector_policy
blocks which are documented below. Atraffic_selector_policy
allows to specify a traffic selector policy proposal to be used in a virtual network gateway connection. For details about traffic selectors refer to the relevant section in the Azure documentation.- type String
The type of connection. Valid options are
IPsec
(Site-to-Site),ExpressRoute
(ExpressRoute), andVnet2Vnet
(VNet-to-VNet).- use
Policy BooleanBased Traffic Selectors If
true
, policy-based traffic selectors are enabled for this connection. Enabling policy-based traffic selectors requires anipsec_policy
block.- virtual
Network StringGateway Id The ID of the Virtual Network Gateway in which the connection is created.
- string
The authorization key associated with the Express Route Circuit. This field is present only if the type is an ExpressRoute connection.
- connection
Protocol string - dpd
Timeout numberSeconds The dead peer detection timeout of this connection in seconds.
- egress
Bytes numberTransferred - enable
Bgp boolean If
true
, BGP (Border Gateway Protocol) is enabled for this connection.- express
Route stringCircuit Id The ID of the Express Route Circuit (i.e. when
type
isExpressRoute
).- express
Route booleanGateway Bypass If
true
, data packets will bypass ExpressRoute Gateway for data forwarding. This is only valid for ExpressRoute connections.- id string
The provider-assigned unique ID for this managed resource.
- ingress
Bytes numberTransferred - ipsec
Policies GetGateway Connection Ipsec Policy[] (Optional) A
ipsec_policy
block which is documented below. Only a single policy can be defined for a connection. For details on custom policies refer to the relevant section in the Azure documentation.- local
Azure booleanIp Address Enabled Use private local Azure IP for the connection.
- local
Network stringGateway Id The ID of the local network gateway when a Site-to-Site connection (i.e. when
type
isIPsec
).- location string
The location/region where the connection is located.
- name string
- peer
Virtual stringNetwork Gateway Id The ID of the peer virtual network gateway when a VNet-to-VNet connection (i.e. when
type
isVnet2Vnet
).- resource
Group stringName - resource
Guid string - routing
Weight number The routing weight.
- string
The shared IPSec key.
- {[key: string]: string}
A mapping of tags to assign to the resource.
- traffic
Selector GetPolicies Gateway Connection Traffic Selector Policy[] One or more
traffic_selector_policy
blocks which are documented below. Atraffic_selector_policy
allows to specify a traffic selector policy proposal to be used in a virtual network gateway connection. For details about traffic selectors refer to the relevant section in the Azure documentation.- type string
The type of connection. Valid options are
IPsec
(Site-to-Site),ExpressRoute
(ExpressRoute), andVnet2Vnet
(VNet-to-VNet).- use
Policy booleanBased Traffic Selectors If
true
, policy-based traffic selectors are enabled for this connection. Enabling policy-based traffic selectors requires anipsec_policy
block.- virtual
Network stringGateway Id The ID of the Virtual Network Gateway in which the connection is created.
- str
The authorization key associated with the Express Route Circuit. This field is present only if the type is an ExpressRoute connection.
- connection_
protocol str - dpd_
timeout_ intseconds The dead peer detection timeout of this connection in seconds.
- egress_
bytes_ inttransferred - enable_
bgp bool If
true
, BGP (Border Gateway Protocol) is enabled for this connection.- express_
route_ strcircuit_ id The ID of the Express Route Circuit (i.e. when
type
isExpressRoute
).- express_
route_ boolgateway_ bypass If
true
, data packets will bypass ExpressRoute Gateway for data forwarding. This is only valid for ExpressRoute connections.- id str
The provider-assigned unique ID for this managed resource.
- ingress_
bytes_ inttransferred - ipsec_
policies Sequence[GetGateway Connection Ipsec Policy] (Optional) A
ipsec_policy
block which is documented below. Only a single policy can be defined for a connection. For details on custom policies refer to the relevant section in the Azure documentation.- local_
azure_ boolip_ address_ enabled Use private local Azure IP for the connection.
- local_
network_ strgateway_ id The ID of the local network gateway when a Site-to-Site connection (i.e. when
type
isIPsec
).- location str
The location/region where the connection is located.
- name str
- peer_
virtual_ strnetwork_ gateway_ id The ID of the peer virtual network gateway when a VNet-to-VNet connection (i.e. when
type
isVnet2Vnet
).- resource_
group_ strname - resource_
guid str - routing_
weight int The routing weight.
- str
The shared IPSec key.
- Mapping[str, str]
A mapping of tags to assign to the resource.
- traffic_
selector_ Sequence[Getpolicies Gateway Connection Traffic Selector Policy] One or more
traffic_selector_policy
blocks which are documented below. Atraffic_selector_policy
allows to specify a traffic selector policy proposal to be used in a virtual network gateway connection. For details about traffic selectors refer to the relevant section in the Azure documentation.- type str
The type of connection. Valid options are
IPsec
(Site-to-Site),ExpressRoute
(ExpressRoute), andVnet2Vnet
(VNet-to-VNet).- use_
policy_ boolbased_ traffic_ selectors If
true
, policy-based traffic selectors are enabled for this connection. Enabling policy-based traffic selectors requires anipsec_policy
block.- virtual_
network_ strgateway_ id The ID of the Virtual Network Gateway in which the connection is created.
- String
The authorization key associated with the Express Route Circuit. This field is present only if the type is an ExpressRoute connection.
- connection
Protocol String - dpd
Timeout NumberSeconds The dead peer detection timeout of this connection in seconds.
- egress
Bytes NumberTransferred - enable
Bgp Boolean If
true
, BGP (Border Gateway Protocol) is enabled for this connection.- express
Route StringCircuit Id The ID of the Express Route Circuit (i.e. when
type
isExpressRoute
).- express
Route BooleanGateway Bypass If
true
, data packets will bypass ExpressRoute Gateway for data forwarding. This is only valid for ExpressRoute connections.- id String
The provider-assigned unique ID for this managed resource.
- ingress
Bytes NumberTransferred - ipsec
Policies List<Property Map> (Optional) A
ipsec_policy
block which is documented below. Only a single policy can be defined for a connection. For details on custom policies refer to the relevant section in the Azure documentation.- local
Azure BooleanIp Address Enabled Use private local Azure IP for the connection.
- local
Network StringGateway Id The ID of the local network gateway when a Site-to-Site connection (i.e. when
type
isIPsec
).- location String
The location/region where the connection is located.
- name String
- peer
Virtual StringNetwork Gateway Id The ID of the peer virtual network gateway when a VNet-to-VNet connection (i.e. when
type
isVnet2Vnet
).- resource
Group StringName - resource
Guid String - routing
Weight Number The routing weight.
- String
The shared IPSec key.
- Map<String>
A mapping of tags to assign to the resource.
- traffic
Selector List<Property Map>Policies One or more
traffic_selector_policy
blocks which are documented below. Atraffic_selector_policy
allows to specify a traffic selector policy proposal to be used in a virtual network gateway connection. For details about traffic selectors refer to the relevant section in the Azure documentation.- type String
The type of connection. Valid options are
IPsec
(Site-to-Site),ExpressRoute
(ExpressRoute), andVnet2Vnet
(VNet-to-VNet).- use
Policy BooleanBased Traffic Selectors If
true
, policy-based traffic selectors are enabled for this connection. Enabling policy-based traffic selectors requires anipsec_policy
block.- virtual
Network StringGateway Id The ID of the Virtual Network Gateway in which the connection is created.
Supporting Types
GetGatewayConnectionIpsecPolicy
- Dh
Group string The DH group used in IKE phase 1 for initial SA. Valid options are
DHGroup1
,DHGroup14
,DHGroup2
,DHGroup2048
,DHGroup24
,ECP256
,ECP384
, orNone
.- Ike
Encryption string The IKE encryption algorithm. Valid options are
AES128
,AES192
,AES256
,DES
, orDES3
.- Ike
Integrity string The IKE integrity algorithm. Valid options are
MD5
,SHA1
,SHA256
, orSHA384
.- Ipsec
Encryption string The IPSec encryption algorithm. Valid options are
AES128
,AES192
,AES256
,DES
,DES3
,GCMAES128
,GCMAES192
,GCMAES256
, orNone
.- Ipsec
Integrity string The IPSec integrity algorithm. Valid options are
GCMAES128
,GCMAES192
,GCMAES256
,MD5
,SHA1
, orSHA256
.- Pfs
Group string The DH group used in IKE phase 2 for new child SA. Valid options are
ECP256
,ECP384
,PFS1
,PFS2
,PFS2048
,PFS24
, orNone
.- Sa
Datasize int The IPSec SA payload size in KB. Must be at least
1024
KB.- Sa
Lifetime int The IPSec SA lifetime in seconds. Must be at least
300
seconds.
- Dh
Group string The DH group used in IKE phase 1 for initial SA. Valid options are
DHGroup1
,DHGroup14
,DHGroup2
,DHGroup2048
,DHGroup24
,ECP256
,ECP384
, orNone
.- Ike
Encryption string The IKE encryption algorithm. Valid options are
AES128
,AES192
,AES256
,DES
, orDES3
.- Ike
Integrity string The IKE integrity algorithm. Valid options are
MD5
,SHA1
,SHA256
, orSHA384
.- Ipsec
Encryption string The IPSec encryption algorithm. Valid options are
AES128
,AES192
,AES256
,DES
,DES3
,GCMAES128
,GCMAES192
,GCMAES256
, orNone
.- Ipsec
Integrity string The IPSec integrity algorithm. Valid options are
GCMAES128
,GCMAES192
,GCMAES256
,MD5
,SHA1
, orSHA256
.- Pfs
Group string The DH group used in IKE phase 2 for new child SA. Valid options are
ECP256
,ECP384
,PFS1
,PFS2
,PFS2048
,PFS24
, orNone
.- Sa
Datasize int The IPSec SA payload size in KB. Must be at least
1024
KB.- Sa
Lifetime int The IPSec SA lifetime in seconds. Must be at least
300
seconds.
- dh
Group String The DH group used in IKE phase 1 for initial SA. Valid options are
DHGroup1
,DHGroup14
,DHGroup2
,DHGroup2048
,DHGroup24
,ECP256
,ECP384
, orNone
.- ike
Encryption String The IKE encryption algorithm. Valid options are
AES128
,AES192
,AES256
,DES
, orDES3
.- ike
Integrity String The IKE integrity algorithm. Valid options are
MD5
,SHA1
,SHA256
, orSHA384
.- ipsec
Encryption String The IPSec encryption algorithm. Valid options are
AES128
,AES192
,AES256
,DES
,DES3
,GCMAES128
,GCMAES192
,GCMAES256
, orNone
.- ipsec
Integrity String The IPSec integrity algorithm. Valid options are
GCMAES128
,GCMAES192
,GCMAES256
,MD5
,SHA1
, orSHA256
.- pfs
Group String The DH group used in IKE phase 2 for new child SA. Valid options are
ECP256
,ECP384
,PFS1
,PFS2
,PFS2048
,PFS24
, orNone
.- sa
Datasize Integer The IPSec SA payload size in KB. Must be at least
1024
KB.- sa
Lifetime Integer The IPSec SA lifetime in seconds. Must be at least
300
seconds.
- dh
Group string The DH group used in IKE phase 1 for initial SA. Valid options are
DHGroup1
,DHGroup14
,DHGroup2
,DHGroup2048
,DHGroup24
,ECP256
,ECP384
, orNone
.- ike
Encryption string The IKE encryption algorithm. Valid options are
AES128
,AES192
,AES256
,DES
, orDES3
.- ike
Integrity string The IKE integrity algorithm. Valid options are
MD5
,SHA1
,SHA256
, orSHA384
.- ipsec
Encryption string The IPSec encryption algorithm. Valid options are
AES128
,AES192
,AES256
,DES
,DES3
,GCMAES128
,GCMAES192
,GCMAES256
, orNone
.- ipsec
Integrity string The IPSec integrity algorithm. Valid options are
GCMAES128
,GCMAES192
,GCMAES256
,MD5
,SHA1
, orSHA256
.- pfs
Group string The DH group used in IKE phase 2 for new child SA. Valid options are
ECP256
,ECP384
,PFS1
,PFS2
,PFS2048
,PFS24
, orNone
.- sa
Datasize number The IPSec SA payload size in KB. Must be at least
1024
KB.- sa
Lifetime number The IPSec SA lifetime in seconds. Must be at least
300
seconds.
- dh_
group str The DH group used in IKE phase 1 for initial SA. Valid options are
DHGroup1
,DHGroup14
,DHGroup2
,DHGroup2048
,DHGroup24
,ECP256
,ECP384
, orNone
.- ike_
encryption str The IKE encryption algorithm. Valid options are
AES128
,AES192
,AES256
,DES
, orDES3
.- ike_
integrity str The IKE integrity algorithm. Valid options are
MD5
,SHA1
,SHA256
, orSHA384
.- ipsec_
encryption str The IPSec encryption algorithm. Valid options are
AES128
,AES192
,AES256
,DES
,DES3
,GCMAES128
,GCMAES192
,GCMAES256
, orNone
.- ipsec_
integrity str The IPSec integrity algorithm. Valid options are
GCMAES128
,GCMAES192
,GCMAES256
,MD5
,SHA1
, orSHA256
.- pfs_
group str The DH group used in IKE phase 2 for new child SA. Valid options are
ECP256
,ECP384
,PFS1
,PFS2
,PFS2048
,PFS24
, orNone
.- sa_
datasize int The IPSec SA payload size in KB. Must be at least
1024
KB.- sa_
lifetime int The IPSec SA lifetime in seconds. Must be at least
300
seconds.
- dh
Group String The DH group used in IKE phase 1 for initial SA. Valid options are
DHGroup1
,DHGroup14
,DHGroup2
,DHGroup2048
,DHGroup24
,ECP256
,ECP384
, orNone
.- ike
Encryption String The IKE encryption algorithm. Valid options are
AES128
,AES192
,AES256
,DES
, orDES3
.- ike
Integrity String The IKE integrity algorithm. Valid options are
MD5
,SHA1
,SHA256
, orSHA384
.- ipsec
Encryption String The IPSec encryption algorithm. Valid options are
AES128
,AES192
,AES256
,DES
,DES3
,GCMAES128
,GCMAES192
,GCMAES256
, orNone
.- ipsec
Integrity String The IPSec integrity algorithm. Valid options are
GCMAES128
,GCMAES192
,GCMAES256
,MD5
,SHA1
, orSHA256
.- pfs
Group String The DH group used in IKE phase 2 for new child SA. Valid options are
ECP256
,ECP384
,PFS1
,PFS2
,PFS2048
,PFS24
, orNone
.- sa
Datasize Number The IPSec SA payload size in KB. Must be at least
1024
KB.- sa
Lifetime Number The IPSec SA lifetime in seconds. Must be at least
300
seconds.
GetGatewayConnectionTrafficSelectorPolicy
- Local
Address List<string>Cidrs List of local CIDRs.
- Remote
Address List<string>Cidrs List of remote CIDRs.
- Local
Address []stringCidrs List of local CIDRs.
- Remote
Address []stringCidrs List of remote CIDRs.
- local
Address List<String>Cidrs List of local CIDRs.
- remote
Address List<String>Cidrs List of remote CIDRs.
- local
Address string[]Cidrs List of local CIDRs.
- remote
Address string[]Cidrs List of remote CIDRs.
- local_
address_ Sequence[str]cidrs List of local CIDRs.
- remote_
address_ Sequence[str]cidrs List of remote CIDRs.
- local
Address List<String>Cidrs List of local CIDRs.
- remote
Address List<String>Cidrs List of remote CIDRs.
Package Details
- Repository
- Azure Classic pulumi/pulumi-azure
- License
- Apache-2.0
- Notes
This Pulumi package is based on the
azurerm
Terraform Provider.