Viewing docs for Cisco Meraki v0.4.6
published on Thursday, Feb 26, 2026 by Pulumi
published on Thursday, Feb 26, 2026 by Pulumi
Viewing docs for Cisco Meraki v0.4.6
published on Thursday, Feb 26, 2026 by Pulumi
published on Thursday, Feb 26, 2026 by Pulumi
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as meraki from "@pulumi/meraki";
const example = meraki.organizations.getApplianceVpnThirdPartyVpnpeers({
organizationId: "string",
});
export const merakiOrganizationsApplianceVpnThirdPartyVpnpeersExample = example.then(example => example.item);
import pulumi
import pulumi_meraki as meraki
example = meraki.organizations.get_appliance_vpn_third_party_vpnpeers(organization_id="string")
pulumi.export("merakiOrganizationsApplianceVpnThirdPartyVpnpeersExample", example.item)
package main
import (
"github.com/pulumi/pulumi-meraki/sdk/go/meraki/organizations"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
example, err := organizations.LookupApplianceVpnThirdPartyVpnpeers(ctx, &organizations.LookupApplianceVpnThirdPartyVpnpeersArgs{
OrganizationId: "string",
}, nil)
if err != nil {
return err
}
ctx.Export("merakiOrganizationsApplianceVpnThirdPartyVpnpeersExample", example.Item)
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Meraki = Pulumi.Meraki;
return await Deployment.RunAsync(() =>
{
var example = Meraki.Organizations.GetApplianceVpnThirdPartyVpnpeers.Invoke(new()
{
OrganizationId = "string",
});
return new Dictionary<string, object?>
{
["merakiOrganizationsApplianceVpnThirdPartyVpnpeersExample"] = example.Apply(getApplianceVpnThirdPartyVpnpeersResult => getApplianceVpnThirdPartyVpnpeersResult.Item),
};
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.meraki.organizations.OrganizationsFunctions;
import com.pulumi.meraki.organizations.inputs.GetApplianceVpnThirdPartyVpnpeersArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
final var example = OrganizationsFunctions.getApplianceVpnThirdPartyVpnpeers(GetApplianceVpnThirdPartyVpnpeersArgs.builder()
.organizationId("string")
.build());
ctx.export("merakiOrganizationsApplianceVpnThirdPartyVpnpeersExample", example.item());
}
}
variables:
example:
fn::invoke:
function: meraki:organizations:getApplianceVpnThirdPartyVpnpeers
arguments:
organizationId: string
outputs:
merakiOrganizationsApplianceVpnThirdPartyVpnpeersExample: ${example.item}
Using getApplianceVpnThirdPartyVpnpeers
Two invocation forms are available. The direct form accepts plain arguments and either blocks until the result value is available, or returns a Promise-wrapped result. The output form accepts Input-wrapped arguments and returns an Output-wrapped result.
function getApplianceVpnThirdPartyVpnpeers(args: GetApplianceVpnThirdPartyVpnpeersArgs, opts?: InvokeOptions): Promise<GetApplianceVpnThirdPartyVpnpeersResult>
function getApplianceVpnThirdPartyVpnpeersOutput(args: GetApplianceVpnThirdPartyVpnpeersOutputArgs, opts?: InvokeOptions): Output<GetApplianceVpnThirdPartyVpnpeersResult>def get_appliance_vpn_third_party_vpnpeers(organization_id: Optional[str] = None,
opts: Optional[InvokeOptions] = None) -> GetApplianceVpnThirdPartyVpnpeersResult
def get_appliance_vpn_third_party_vpnpeers_output(organization_id: Optional[pulumi.Input[str]] = None,
opts: Optional[InvokeOptions] = None) -> Output[GetApplianceVpnThirdPartyVpnpeersResult]func LookupApplianceVpnThirdPartyVpnpeers(ctx *Context, args *LookupApplianceVpnThirdPartyVpnpeersArgs, opts ...InvokeOption) (*LookupApplianceVpnThirdPartyVpnpeersResult, error)
func LookupApplianceVpnThirdPartyVpnpeersOutput(ctx *Context, args *LookupApplianceVpnThirdPartyVpnpeersOutputArgs, opts ...InvokeOption) LookupApplianceVpnThirdPartyVpnpeersResultOutput> Note: This function is named LookupApplianceVpnThirdPartyVpnpeers in the Go SDK.
public static class GetApplianceVpnThirdPartyVpnpeers
{
public static Task<GetApplianceVpnThirdPartyVpnpeersResult> InvokeAsync(GetApplianceVpnThirdPartyVpnpeersArgs args, InvokeOptions? opts = null)
public static Output<GetApplianceVpnThirdPartyVpnpeersResult> Invoke(GetApplianceVpnThirdPartyVpnpeersInvokeArgs args, InvokeOptions? opts = null)
}public static CompletableFuture<GetApplianceVpnThirdPartyVpnpeersResult> getApplianceVpnThirdPartyVpnpeers(GetApplianceVpnThirdPartyVpnpeersArgs args, InvokeOptions options)
public static Output<GetApplianceVpnThirdPartyVpnpeersResult> getApplianceVpnThirdPartyVpnpeers(GetApplianceVpnThirdPartyVpnpeersArgs args, InvokeOptions options)
fn::invoke:
function: meraki:organizations/getApplianceVpnThirdPartyVpnpeers:getApplianceVpnThirdPartyVpnpeers
arguments:
# arguments dictionaryThe following arguments are supported:
- Organization
Id string - organizationId path parameter. Organization ID
- Organization
Id string - organizationId path parameter. Organization ID
- organization
Id String - organizationId path parameter. Organization ID
- organization
Id string - organizationId path parameter. Organization ID
- organization_
id str - organizationId path parameter. Organization ID
- organization
Id String - organizationId path parameter. Organization ID
getApplianceVpnThirdPartyVpnpeers Result
The following output properties are available:
- Id string
- The provider-assigned unique ID for this managed resource.
- Item
Get
Appliance Vpn Third Party Vpnpeers Item - Organization
Id string - organizationId path parameter. Organization ID
- Id string
- The provider-assigned unique ID for this managed resource.
- Item
Get
Appliance Vpn Third Party Vpnpeers Item - Organization
Id string - organizationId path parameter. Organization ID
- id String
- The provider-assigned unique ID for this managed resource.
- item
Get
Appliance Vpn Third Party Vpnpeers Item - organization
Id String - organizationId path parameter. Organization ID
- id string
- The provider-assigned unique ID for this managed resource.
- item
Get
Appliance Vpn Third Party Vpnpeers Item - organization
Id string - organizationId path parameter. Organization ID
- id str
- The provider-assigned unique ID for this managed resource.
- item
Get
Appliance Vpn Third Party Vpnpeers Item - organization_
id str - organizationId path parameter. Organization ID
- id String
- The provider-assigned unique ID for this managed resource.
- item Property Map
- organization
Id String - organizationId path parameter. Organization ID
Supporting Types
GetApplianceVpnThirdPartyVpnpeersItem
- Peers
List<Get
Appliance Vpn Third Party Vpnpeers Item Peer> - The list of VPN peers
- Peers
[]Get
Appliance Vpn Third Party Vpnpeers Item Peer - The list of VPN peers
- peers
List<Get
Appliance Vpn Third Party Vpnpeers Item Peer> - The list of VPN peers
- peers
Get
Appliance Vpn Third Party Vpnpeers Item Peer[] - The list of VPN peers
- peers
Sequence[Get
Appliance Vpn Third Party Vpnpeers Item Peer] - The list of VPN peers
- peers List<Property Map>
- The list of VPN peers
GetApplianceVpnThirdPartyVpnpeersItemPeer
- Ike
Version string - [optional] The IKE version to be used for the IPsec VPN peer configuration. Defaults to '1' when omitted.
- Ipsec
Policies GetAppliance Vpn Third Party Vpnpeers Item Peer Ipsec Policies - Custom IPSec policies for the VPN peer. If not included and a preset has not been chosen, the default preset for IPSec policies will be used.
- Ipsec
Policies stringPreset - One of the following available presets: 'default', 'aws', 'azure'. If this is provided, the 'ipsecPolicies' parameter is ignored.
- Local
Id string - [optional] The local ID is used to identify the MX to the peer. This will apply to all MXs this peer applies to.
- Name string
- The name of the VPN peer
- List<string>
- A list of network tags that will connect with this peer. Use ['all'] for all networks. Use ['none'] for no networks. If not included, the default is ['all'].
- Private
Subnets List<string> - The list of the private subnets of the VPN peer
- Public
Ip string - [optional] The public IP of the VPN peer
- Remote
Id string - [optional] The remote ID is used to identify the connecting VPN peer. This can either be a valid IPv4 Address, FQDN or User FQDN.
- Secret string
- The shared secret with the VPN peer
- Ike
Version string - [optional] The IKE version to be used for the IPsec VPN peer configuration. Defaults to '1' when omitted.
- Ipsec
Policies GetAppliance Vpn Third Party Vpnpeers Item Peer Ipsec Policies - Custom IPSec policies for the VPN peer. If not included and a preset has not been chosen, the default preset for IPSec policies will be used.
- Ipsec
Policies stringPreset - One of the following available presets: 'default', 'aws', 'azure'. If this is provided, the 'ipsecPolicies' parameter is ignored.
- Local
Id string - [optional] The local ID is used to identify the MX to the peer. This will apply to all MXs this peer applies to.
- Name string
- The name of the VPN peer
- []string
- A list of network tags that will connect with this peer. Use ['all'] for all networks. Use ['none'] for no networks. If not included, the default is ['all'].
- Private
Subnets []string - The list of the private subnets of the VPN peer
- Public
Ip string - [optional] The public IP of the VPN peer
- Remote
Id string - [optional] The remote ID is used to identify the connecting VPN peer. This can either be a valid IPv4 Address, FQDN or User FQDN.
- Secret string
- The shared secret with the VPN peer
- ike
Version String - [optional] The IKE version to be used for the IPsec VPN peer configuration. Defaults to '1' when omitted.
- ipsec
Policies GetAppliance Vpn Third Party Vpnpeers Item Peer Ipsec Policies - Custom IPSec policies for the VPN peer. If not included and a preset has not been chosen, the default preset for IPSec policies will be used.
- ipsec
Policies StringPreset - One of the following available presets: 'default', 'aws', 'azure'. If this is provided, the 'ipsecPolicies' parameter is ignored.
- local
Id String - [optional] The local ID is used to identify the MX to the peer. This will apply to all MXs this peer applies to.
- name String
- The name of the VPN peer
- List<String>
- A list of network tags that will connect with this peer. Use ['all'] for all networks. Use ['none'] for no networks. If not included, the default is ['all'].
- private
Subnets List<String> - The list of the private subnets of the VPN peer
- public
Ip String - [optional] The public IP of the VPN peer
- remote
Id String - [optional] The remote ID is used to identify the connecting VPN peer. This can either be a valid IPv4 Address, FQDN or User FQDN.
- secret String
- The shared secret with the VPN peer
- ike
Version string - [optional] The IKE version to be used for the IPsec VPN peer configuration. Defaults to '1' when omitted.
- ipsec
Policies GetAppliance Vpn Third Party Vpnpeers Item Peer Ipsec Policies - Custom IPSec policies for the VPN peer. If not included and a preset has not been chosen, the default preset for IPSec policies will be used.
- ipsec
Policies stringPreset - One of the following available presets: 'default', 'aws', 'azure'. If this is provided, the 'ipsecPolicies' parameter is ignored.
- local
Id string - [optional] The local ID is used to identify the MX to the peer. This will apply to all MXs this peer applies to.
- name string
- The name of the VPN peer
- string[]
- A list of network tags that will connect with this peer. Use ['all'] for all networks. Use ['none'] for no networks. If not included, the default is ['all'].
- private
Subnets string[] - The list of the private subnets of the VPN peer
- public
Ip string - [optional] The public IP of the VPN peer
- remote
Id string - [optional] The remote ID is used to identify the connecting VPN peer. This can either be a valid IPv4 Address, FQDN or User FQDN.
- secret string
- The shared secret with the VPN peer
- ike_
version str - [optional] The IKE version to be used for the IPsec VPN peer configuration. Defaults to '1' when omitted.
- ipsec_
policies GetAppliance Vpn Third Party Vpnpeers Item Peer Ipsec Policies - Custom IPSec policies for the VPN peer. If not included and a preset has not been chosen, the default preset for IPSec policies will be used.
- ipsec_
policies_ strpreset - One of the following available presets: 'default', 'aws', 'azure'. If this is provided, the 'ipsecPolicies' parameter is ignored.
- local_
id str - [optional] The local ID is used to identify the MX to the peer. This will apply to all MXs this peer applies to.
- name str
- The name of the VPN peer
- Sequence[str]
- A list of network tags that will connect with this peer. Use ['all'] for all networks. Use ['none'] for no networks. If not included, the default is ['all'].
- private_
subnets Sequence[str] - The list of the private subnets of the VPN peer
- public_
ip str - [optional] The public IP of the VPN peer
- remote_
id str - [optional] The remote ID is used to identify the connecting VPN peer. This can either be a valid IPv4 Address, FQDN or User FQDN.
- secret str
- The shared secret with the VPN peer
- ike
Version String - [optional] The IKE version to be used for the IPsec VPN peer configuration. Defaults to '1' when omitted.
- ipsec
Policies Property Map - Custom IPSec policies for the VPN peer. If not included and a preset has not been chosen, the default preset for IPSec policies will be used.
- ipsec
Policies StringPreset - One of the following available presets: 'default', 'aws', 'azure'. If this is provided, the 'ipsecPolicies' parameter is ignored.
- local
Id String - [optional] The local ID is used to identify the MX to the peer. This will apply to all MXs this peer applies to.
- name String
- The name of the VPN peer
- List<String>
- A list of network tags that will connect with this peer. Use ['all'] for all networks. Use ['none'] for no networks. If not included, the default is ['all'].
- private
Subnets List<String> - The list of the private subnets of the VPN peer
- public
Ip String - [optional] The public IP of the VPN peer
- remote
Id String - [optional] The remote ID is used to identify the connecting VPN peer. This can either be a valid IPv4 Address, FQDN or User FQDN.
- secret String
- The shared secret with the VPN peer
GetApplianceVpnThirdPartyVpnpeersItemPeerIpsecPolicies
- Child
Auth List<string>Algos - This is the authentication algorithms to be used in Phase 2. The value should be an array with one of the following algorithms: 'sha256', 'sha1', 'md5'
- Child
Cipher List<string>Algos - This is the cipher algorithms to be used in Phase 2. The value should be an array with one or more of the following algorithms: 'aes256', 'aes192', 'aes128', 'tripledes', 'des', 'null'
- Child
Lifetime int - The lifetime of the Phase 2 SA in seconds.
- Child
Pfs List<string>Groups - This is the Diffie-Hellman group to be used for Perfect Forward Secrecy in Phase 2. The value should be an array with one of the following values: 'disabled','group14', 'group5', 'group2', 'group1'
- Ike
Auth List<string>Algos - This is the authentication algorithm to be used in Phase 1. The value should be an array with one of the following algorithms: 'sha256', 'sha1', 'md5'
- Ike
Cipher List<string>Algos - This is the cipher algorithm to be used in Phase 1. The value should be an array with one of the following algorithms: 'aes256', 'aes192', 'aes128', 'tripledes', 'des'
- Ike
Diffie List<string>Hellman Groups - This is the Diffie-Hellman group to be used in Phase 1. The value should be an array with one of the following algorithms: 'group14', 'group5', 'group2', 'group1'
- Ike
Lifetime int - The lifetime of the Phase 1 SA in seconds.
- Ike
Prf List<string>Algos - [optional] This is the pseudo-random function to be used in IKE_SA. The value should be an array with one of the following algorithms: 'prfsha256', 'prfsha1', 'prfmd5', 'default'. The 'default' option can be used to default to the Authentication algorithm.
- Child
Auth []stringAlgos - This is the authentication algorithms to be used in Phase 2. The value should be an array with one of the following algorithms: 'sha256', 'sha1', 'md5'
- Child
Cipher []stringAlgos - This is the cipher algorithms to be used in Phase 2. The value should be an array with one or more of the following algorithms: 'aes256', 'aes192', 'aes128', 'tripledes', 'des', 'null'
- Child
Lifetime int - The lifetime of the Phase 2 SA in seconds.
- Child
Pfs []stringGroups - This is the Diffie-Hellman group to be used for Perfect Forward Secrecy in Phase 2. The value should be an array with one of the following values: 'disabled','group14', 'group5', 'group2', 'group1'
- Ike
Auth []stringAlgos - This is the authentication algorithm to be used in Phase 1. The value should be an array with one of the following algorithms: 'sha256', 'sha1', 'md5'
- Ike
Cipher []stringAlgos - This is the cipher algorithm to be used in Phase 1. The value should be an array with one of the following algorithms: 'aes256', 'aes192', 'aes128', 'tripledes', 'des'
- Ike
Diffie []stringHellman Groups - This is the Diffie-Hellman group to be used in Phase 1. The value should be an array with one of the following algorithms: 'group14', 'group5', 'group2', 'group1'
- Ike
Lifetime int - The lifetime of the Phase 1 SA in seconds.
- Ike
Prf []stringAlgos - [optional] This is the pseudo-random function to be used in IKE_SA. The value should be an array with one of the following algorithms: 'prfsha256', 'prfsha1', 'prfmd5', 'default'. The 'default' option can be used to default to the Authentication algorithm.
- child
Auth List<String>Algos - This is the authentication algorithms to be used in Phase 2. The value should be an array with one of the following algorithms: 'sha256', 'sha1', 'md5'
- child
Cipher List<String>Algos - This is the cipher algorithms to be used in Phase 2. The value should be an array with one or more of the following algorithms: 'aes256', 'aes192', 'aes128', 'tripledes', 'des', 'null'
- child
Lifetime Integer - The lifetime of the Phase 2 SA in seconds.
- child
Pfs List<String>Groups - This is the Diffie-Hellman group to be used for Perfect Forward Secrecy in Phase 2. The value should be an array with one of the following values: 'disabled','group14', 'group5', 'group2', 'group1'
- ike
Auth List<String>Algos - This is the authentication algorithm to be used in Phase 1. The value should be an array with one of the following algorithms: 'sha256', 'sha1', 'md5'
- ike
Cipher List<String>Algos - This is the cipher algorithm to be used in Phase 1. The value should be an array with one of the following algorithms: 'aes256', 'aes192', 'aes128', 'tripledes', 'des'
- ike
Diffie List<String>Hellman Groups - This is the Diffie-Hellman group to be used in Phase 1. The value should be an array with one of the following algorithms: 'group14', 'group5', 'group2', 'group1'
- ike
Lifetime Integer - The lifetime of the Phase 1 SA in seconds.
- ike
Prf List<String>Algos - [optional] This is the pseudo-random function to be used in IKE_SA. The value should be an array with one of the following algorithms: 'prfsha256', 'prfsha1', 'prfmd5', 'default'. The 'default' option can be used to default to the Authentication algorithm.
- child
Auth string[]Algos - This is the authentication algorithms to be used in Phase 2. The value should be an array with one of the following algorithms: 'sha256', 'sha1', 'md5'
- child
Cipher string[]Algos - This is the cipher algorithms to be used in Phase 2. The value should be an array with one or more of the following algorithms: 'aes256', 'aes192', 'aes128', 'tripledes', 'des', 'null'
- child
Lifetime number - The lifetime of the Phase 2 SA in seconds.
- child
Pfs string[]Groups - This is the Diffie-Hellman group to be used for Perfect Forward Secrecy in Phase 2. The value should be an array with one of the following values: 'disabled','group14', 'group5', 'group2', 'group1'
- ike
Auth string[]Algos - This is the authentication algorithm to be used in Phase 1. The value should be an array with one of the following algorithms: 'sha256', 'sha1', 'md5'
- ike
Cipher string[]Algos - This is the cipher algorithm to be used in Phase 1. The value should be an array with one of the following algorithms: 'aes256', 'aes192', 'aes128', 'tripledes', 'des'
- ike
Diffie string[]Hellman Groups - This is the Diffie-Hellman group to be used in Phase 1. The value should be an array with one of the following algorithms: 'group14', 'group5', 'group2', 'group1'
- ike
Lifetime number - The lifetime of the Phase 1 SA in seconds.
- ike
Prf string[]Algos - [optional] This is the pseudo-random function to be used in IKE_SA. The value should be an array with one of the following algorithms: 'prfsha256', 'prfsha1', 'prfmd5', 'default'. The 'default' option can be used to default to the Authentication algorithm.
- child_
auth_ Sequence[str]algos - This is the authentication algorithms to be used in Phase 2. The value should be an array with one of the following algorithms: 'sha256', 'sha1', 'md5'
- child_
cipher_ Sequence[str]algos - This is the cipher algorithms to be used in Phase 2. The value should be an array with one or more of the following algorithms: 'aes256', 'aes192', 'aes128', 'tripledes', 'des', 'null'
- child_
lifetime int - The lifetime of the Phase 2 SA in seconds.
- child_
pfs_ Sequence[str]groups - This is the Diffie-Hellman group to be used for Perfect Forward Secrecy in Phase 2. The value should be an array with one of the following values: 'disabled','group14', 'group5', 'group2', 'group1'
- ike_
auth_ Sequence[str]algos - This is the authentication algorithm to be used in Phase 1. The value should be an array with one of the following algorithms: 'sha256', 'sha1', 'md5'
- ike_
cipher_ Sequence[str]algos - This is the cipher algorithm to be used in Phase 1. The value should be an array with one of the following algorithms: 'aes256', 'aes192', 'aes128', 'tripledes', 'des'
- ike_
diffie_ Sequence[str]hellman_ groups - This is the Diffie-Hellman group to be used in Phase 1. The value should be an array with one of the following algorithms: 'group14', 'group5', 'group2', 'group1'
- ike_
lifetime int - The lifetime of the Phase 1 SA in seconds.
- ike_
prf_ Sequence[str]algos - [optional] This is the pseudo-random function to be used in IKE_SA. The value should be an array with one of the following algorithms: 'prfsha256', 'prfsha1', 'prfmd5', 'default'. The 'default' option can be used to default to the Authentication algorithm.
- child
Auth List<String>Algos - This is the authentication algorithms to be used in Phase 2. The value should be an array with one of the following algorithms: 'sha256', 'sha1', 'md5'
- child
Cipher List<String>Algos - This is the cipher algorithms to be used in Phase 2. The value should be an array with one or more of the following algorithms: 'aes256', 'aes192', 'aes128', 'tripledes', 'des', 'null'
- child
Lifetime Number - The lifetime of the Phase 2 SA in seconds.
- child
Pfs List<String>Groups - This is the Diffie-Hellman group to be used for Perfect Forward Secrecy in Phase 2. The value should be an array with one of the following values: 'disabled','group14', 'group5', 'group2', 'group1'
- ike
Auth List<String>Algos - This is the authentication algorithm to be used in Phase 1. The value should be an array with one of the following algorithms: 'sha256', 'sha1', 'md5'
- ike
Cipher List<String>Algos - This is the cipher algorithm to be used in Phase 1. The value should be an array with one of the following algorithms: 'aes256', 'aes192', 'aes128', 'tripledes', 'des'
- ike
Diffie List<String>Hellman Groups - This is the Diffie-Hellman group to be used in Phase 1. The value should be an array with one of the following algorithms: 'group14', 'group5', 'group2', 'group1'
- ike
Lifetime Number - The lifetime of the Phase 1 SA in seconds.
- ike
Prf List<String>Algos - [optional] This is the pseudo-random function to be used in IKE_SA. The value should be an array with one of the following algorithms: 'prfsha256', 'prfsha1', 'prfmd5', 'default'. The 'default' option can be used to default to the Authentication algorithm.
Package Details
- Repository
- meraki pulumi/pulumi-meraki
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
merakiTerraform Provider.
Viewing docs for Cisco Meraki v0.4.6
published on Thursday, Feb 26, 2026 by Pulumi
published on Thursday, Feb 26, 2026 by Pulumi
