Oracle Cloud Infrastructure
getIpsecConnectionTunnels
This data source provides the list of Ip Sec Connection Tunnels in Oracle Cloud Infrastructure Core service.
Lists the tunnel information for the specified IPSec connection.
Example Usage
using Pulumi;
using Oci = Pulumi.Oci;
class MyStack : Stack
{
public MyStack()
{
var testIpSecConnectionTunnels = Output.Create(Oci.Core.GetIpsecConnectionTunnels.InvokeAsync(new Oci.Core.GetIpsecConnectionTunnelsArgs
{
IpsecId = oci_core_ipsec.Test_ipsec.Id,
}));
}
}
package main
import (
"github.com/pulumi/pulumi-oci/sdk/go/oci/Core"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := Core.GetIpsecConnectionTunnels(ctx, &core.GetIpsecConnectionTunnelsArgs{
IpsecId: oci_core_ipsec.Test_ipsec.Id,
}, nil)
if err != nil {
return err
}
return nil
})
}
Coming soon!
import pulumi
import pulumi_oci as oci
test_ip_sec_connection_tunnels = oci.Core.get_ipsec_connection_tunnels(ipsec_id=oci_core_ipsec["test_ipsec"]["id"])
import * as pulumi from "@pulumi/pulumi";
import * as oci from "@pulumi/oci";
const testIpSecConnectionTunnels = oci.Core.getIpsecConnectionTunnels({
ipsecId: oci_core_ipsec.test_ipsec.id,
});
Coming soon!
Using getIpsecConnectionTunnels
Two invocation forms are available. The direct form accepts plain arguments and either blocks until the result value is available, or returns a Promise-wrapped result. The output form accepts Input-wrapped arguments and returns an Output-wrapped result.
function getIpsecConnectionTunnels(args: GetIpsecConnectionTunnelsArgs, opts?: InvokeOptions): Promise<GetIpsecConnectionTunnelsResult>
function getIpsecConnectionTunnelsOutput(args: GetIpsecConnectionTunnelsOutputArgs, opts?: InvokeOptions): Output<GetIpsecConnectionTunnelsResult>
def get_ipsec_connection_tunnels(filters: Optional[Sequence[_core.GetIpsecConnectionTunnelsFilter]] = None,
ipsec_id: Optional[str] = None,
opts: Optional[InvokeOptions] = None) -> GetIpsecConnectionTunnelsResult
def get_ipsec_connection_tunnels_output(filters: Optional[pulumi.Input[Sequence[pulumi.Input[_core.GetIpsecConnectionTunnelsFilterArgs]]]] = None,
ipsec_id: Optional[pulumi.Input[str]] = None,
opts: Optional[InvokeOptions] = None) -> Output[GetIpsecConnectionTunnelsResult]
func GetIpsecConnectionTunnels(ctx *Context, args *GetIpsecConnectionTunnelsArgs, opts ...InvokeOption) (*GetIpsecConnectionTunnelsResult, error)
func GetIpsecConnectionTunnelsOutput(ctx *Context, args *GetIpsecConnectionTunnelsOutputArgs, opts ...InvokeOption) GetIpsecConnectionTunnelsResultOutput
> Note: This function is named GetIpsecConnectionTunnels
in the Go SDK.
public static class GetIpsecConnectionTunnels
{
public static Task<GetIpsecConnectionTunnelsResult> InvokeAsync(GetIpsecConnectionTunnelsArgs args, InvokeOptions? opts = null)
public static Output<GetIpsecConnectionTunnelsResult> Invoke(GetIpsecConnectionTunnelsInvokeArgs args, InvokeOptions? opts = null)
}
public static CompletableFuture<GetIpsecConnectionTunnelsResult> getIpsecConnectionTunnels(GetIpsecConnectionTunnelsArgs args, InvokeOptions options)
// Output-based functions aren't available in Java yet
Fn::Invoke:
Function: oci:Core/getIpsecConnectionTunnels:getIpsecConnectionTunnels
Arguments:
# Arguments dictionary
The following arguments are supported:
- Ipsec
Id string The OCID of the IPSec connection.
- Filters
List<Get
Ipsec Connection Tunnels Filter>
- Ipsec
Id string The OCID of the IPSec connection.
- Filters
[]Get
Ipsec Connection Tunnels Filter
- ipsec
Id String The OCID of the IPSec connection.
- filters
List<Get
Ipsec Connection Tunnels Filter>
- ipsec
Id string The OCID of the IPSec connection.
- filters
Get
Ipsec Connection Tunnels Filter[]
- ipsec_
id str The OCID of the IPSec connection.
- filters
Get
Ipsec Connection Tunnels Filter]
- ipsec
Id String The OCID of the IPSec connection.
- filters List<Property Map>
getIpsecConnectionTunnels Result
The following output properties are available:
- Id string
The provider-assigned unique ID for this managed resource.
- Ip
Sec List<GetConnection Tunnels Ipsec Connection Tunnels Ip Sec Connection Tunnel> The list of ip_sec_connection_tunnels.
- Ipsec
Id string - Filters
List<Get
Ipsec Connection Tunnels Filter>
- Id string
The provider-assigned unique ID for this managed resource.
- Ip
Sec []GetConnection Tunnels Ipsec Connection Tunnels Ip Sec Connection Tunnel The list of ip_sec_connection_tunnels.
- Ipsec
Id string - Filters
[]Get
Ipsec Connection Tunnels Filter
- id String
The provider-assigned unique ID for this managed resource.
- ip
Sec List<GetConnection Tunnels Ipsec Connection Tunnels Ip Sec Connection Tunnel> The list of ip_sec_connection_tunnels.
- ipsec
Id String - filters
List<Get
Ipsec Connection Tunnels Filter>
- id string
The provider-assigned unique ID for this managed resource.
- ip
Sec GetConnection Tunnels Ipsec Connection Tunnels Ip Sec Connection Tunnel[] The list of ip_sec_connection_tunnels.
- ipsec
Id string - filters
Get
Ipsec Connection Tunnels Filter[]
- id str
The provider-assigned unique ID for this managed resource.
- ip_
sec_ Getconnection_ tunnels Ipsec Connection Tunnels Ip Sec Connection Tunnel] The list of ip_sec_connection_tunnels.
- ipsec_
id str - filters
Get
Ipsec Connection Tunnels Filter]
- id String
The provider-assigned unique ID for this managed resource.
- ip
Sec List<Property Map>Connection Tunnels The list of ip_sec_connection_tunnels.
- ipsec
Id String - filters List<Property Map>
Supporting Types
GetIpsecConnectionTunnelsFilter
GetIpsecConnectionTunnelsIpSecConnectionTunnel
- Bgp
Session List<GetInfos Ipsec Connection Tunnels Ip Sec Connection Tunnel Bgp Session Info> Information for establishing a BGP session for the IPSec tunnel.
- Compartment
Id string The OCID of the compartment containing the tunnel.
- Cpe
Ip string The IP address of the CPE device's VPN headend. Example:
203.0.113.22
- Display
Name string A user-friendly name. Does not have to be unique, and it's changeable. Avoid entering confidential information.
- Dpd
Mode string Dead peer detection (DPD) mode set on the Oracle side of the connection. This mode sets whether Oracle can only respond to a request from the CPE device to start DPD, or both respond to and initiate requests.
- Dpd
Timeout intIn Sec DPD timeout in seconds.
- Encryption
Domain List<GetConfigs Ipsec Connection Tunnels Ip Sec Connection Tunnel Encryption Domain Config> Configuration information used by the encryption domain policy.
- Id string
The OCID of the tunnel.
- Ike
Version string Internet Key Exchange protocol version.
- Nat
Translation stringEnabled By default (the
AUTO
setting), IKE sends packets with a source and destination port set to 500, and when it detects that the port used to forward packets has changed (most likely because a NAT device is between the CPE device and the Oracle VPN headend) it will try to negotiate the use of NAT-T.- Oracle
Can stringInitiate Indicates whether Oracle can only respond to a request to start an IPSec tunnel from the CPE device, or both respond to and initiate requests.
- Phase
One List<GetDetails Ipsec Connection Tunnels Ip Sec Connection Tunnel Phase One Detail> IPSec tunnel details specific to ISAKMP phase one.
- Phase
Two List<GetDetails Ipsec Connection Tunnels Ip Sec Connection Tunnel Phase Two Detail> IPsec tunnel detail information specific to phase two.
- Routing string
The type of routing used for this tunnel (BGP dynamic routing, static routing, or policy-based routing).
- State string
The tunnel's lifecycle state.
- Status string
The status of the tunnel based on IPSec protocol characteristics.
- Time
Created string The date and time the IPSec tunnel was created, in the format defined by RFC3339. Example:
2016-08-25T21:10:29.600Z
- Time
Status stringUpdated When the status of the IPSec tunnel last changed, in the format defined by RFC3339. Example:
2016-08-25T21:10:29.600Z
- Vpn
Ip string The IP address of the Oracle VPN headend for the connection. Example:
203.0.113.21
- Bgp
Session []GetInfos Ipsec Connection Tunnels Ip Sec Connection Tunnel Bgp Session Info Information for establishing a BGP session for the IPSec tunnel.
- Compartment
Id string The OCID of the compartment containing the tunnel.
- Cpe
Ip string The IP address of the CPE device's VPN headend. Example:
203.0.113.22
- Display
Name string A user-friendly name. Does not have to be unique, and it's changeable. Avoid entering confidential information.
- Dpd
Mode string Dead peer detection (DPD) mode set on the Oracle side of the connection. This mode sets whether Oracle can only respond to a request from the CPE device to start DPD, or both respond to and initiate requests.
- Dpd
Timeout intIn Sec DPD timeout in seconds.
- Encryption
Domain []GetConfigs Ipsec Connection Tunnels Ip Sec Connection Tunnel Encryption Domain Config Configuration information used by the encryption domain policy.
- Id string
The OCID of the tunnel.
- Ike
Version string Internet Key Exchange protocol version.
- Nat
Translation stringEnabled By default (the
AUTO
setting), IKE sends packets with a source and destination port set to 500, and when it detects that the port used to forward packets has changed (most likely because a NAT device is between the CPE device and the Oracle VPN headend) it will try to negotiate the use of NAT-T.- Oracle
Can stringInitiate Indicates whether Oracle can only respond to a request to start an IPSec tunnel from the CPE device, or both respond to and initiate requests.
- Phase
One []GetDetails Ipsec Connection Tunnels Ip Sec Connection Tunnel Phase One Detail IPSec tunnel details specific to ISAKMP phase one.
- Phase
Two []GetDetails Ipsec Connection Tunnels Ip Sec Connection Tunnel Phase Two Detail IPsec tunnel detail information specific to phase two.
- Routing string
The type of routing used for this tunnel (BGP dynamic routing, static routing, or policy-based routing).
- State string
The tunnel's lifecycle state.
- Status string
The status of the tunnel based on IPSec protocol characteristics.
- Time
Created string The date and time the IPSec tunnel was created, in the format defined by RFC3339. Example:
2016-08-25T21:10:29.600Z
- Time
Status stringUpdated When the status of the IPSec tunnel last changed, in the format defined by RFC3339. Example:
2016-08-25T21:10:29.600Z
- Vpn
Ip string The IP address of the Oracle VPN headend for the connection. Example:
203.0.113.21
- bgp
Session List<GetInfos Ipsec Connection Tunnels Ip Sec Connection Tunnel Bgp Session Info> Information for establishing a BGP session for the IPSec tunnel.
- compartment
Id String The OCID of the compartment containing the tunnel.
- cpe
Ip String The IP address of the CPE device's VPN headend. Example:
203.0.113.22
- display
Name String A user-friendly name. Does not have to be unique, and it's changeable. Avoid entering confidential information.
- dpd
Mode String Dead peer detection (DPD) mode set on the Oracle side of the connection. This mode sets whether Oracle can only respond to a request from the CPE device to start DPD, or both respond to and initiate requests.
- dpd
Timeout IntegerIn Sec DPD timeout in seconds.
- encryption
Domain List<GetConfigs Ipsec Connection Tunnels Ip Sec Connection Tunnel Encryption Domain Config> Configuration information used by the encryption domain policy.
- id String
The OCID of the tunnel.
- ike
Version String Internet Key Exchange protocol version.
- nat
Translation StringEnabled By default (the
AUTO
setting), IKE sends packets with a source and destination port set to 500, and when it detects that the port used to forward packets has changed (most likely because a NAT device is between the CPE device and the Oracle VPN headend) it will try to negotiate the use of NAT-T.- oracle
Can StringInitiate Indicates whether Oracle can only respond to a request to start an IPSec tunnel from the CPE device, or both respond to and initiate requests.
- phase
One List<GetDetails Ipsec Connection Tunnels Ip Sec Connection Tunnel Phase One Detail> IPSec tunnel details specific to ISAKMP phase one.
- phase
Two List<GetDetails Ipsec Connection Tunnels Ip Sec Connection Tunnel Phase Two Detail> IPsec tunnel detail information specific to phase two.
- routing String
The type of routing used for this tunnel (BGP dynamic routing, static routing, or policy-based routing).
- state String
The tunnel's lifecycle state.
- status String
The status of the tunnel based on IPSec protocol characteristics.
- time
Created String The date and time the IPSec tunnel was created, in the format defined by RFC3339. Example:
2016-08-25T21:10:29.600Z
- time
Status StringUpdated When the status of the IPSec tunnel last changed, in the format defined by RFC3339. Example:
2016-08-25T21:10:29.600Z
- vpn
Ip String The IP address of the Oracle VPN headend for the connection. Example:
203.0.113.21
- bgp
Session GetInfos Ipsec Connection Tunnels Ip Sec Connection Tunnel Bgp Session Info[] Information for establishing a BGP session for the IPSec tunnel.
- compartment
Id string The OCID of the compartment containing the tunnel.
- cpe
Ip string The IP address of the CPE device's VPN headend. Example:
203.0.113.22
- display
Name string A user-friendly name. Does not have to be unique, and it's changeable. Avoid entering confidential information.
- dpd
Mode string Dead peer detection (DPD) mode set on the Oracle side of the connection. This mode sets whether Oracle can only respond to a request from the CPE device to start DPD, or both respond to and initiate requests.
- dpd
Timeout numberIn Sec DPD timeout in seconds.
- encryption
Domain GetConfigs Ipsec Connection Tunnels Ip Sec Connection Tunnel Encryption Domain Config[] Configuration information used by the encryption domain policy.
- id string
The OCID of the tunnel.
- ike
Version string Internet Key Exchange protocol version.
- nat
Translation stringEnabled By default (the
AUTO
setting), IKE sends packets with a source and destination port set to 500, and when it detects that the port used to forward packets has changed (most likely because a NAT device is between the CPE device and the Oracle VPN headend) it will try to negotiate the use of NAT-T.- oracle
Can stringInitiate Indicates whether Oracle can only respond to a request to start an IPSec tunnel from the CPE device, or both respond to and initiate requests.
- phase
One GetDetails Ipsec Connection Tunnels Ip Sec Connection Tunnel Phase One Detail[] IPSec tunnel details specific to ISAKMP phase one.
- phase
Two GetDetails Ipsec Connection Tunnels Ip Sec Connection Tunnel Phase Two Detail[] IPsec tunnel detail information specific to phase two.
- routing string
The type of routing used for this tunnel (BGP dynamic routing, static routing, or policy-based routing).
- state string
The tunnel's lifecycle state.
- status string
The status of the tunnel based on IPSec protocol characteristics.
- time
Created string The date and time the IPSec tunnel was created, in the format defined by RFC3339. Example:
2016-08-25T21:10:29.600Z
- time
Status stringUpdated When the status of the IPSec tunnel last changed, in the format defined by RFC3339. Example:
2016-08-25T21:10:29.600Z
- vpn
Ip string The IP address of the Oracle VPN headend for the connection. Example:
203.0.113.21
- bgp_
session_ Getinfos Ipsec Connection Tunnels Ip Sec Connection Tunnel Bgp Session Info] Information for establishing a BGP session for the IPSec tunnel.
- compartment_
id str The OCID of the compartment containing the tunnel.
- cpe_
ip str The IP address of the CPE device's VPN headend. Example:
203.0.113.22
- display_
name str A user-friendly name. Does not have to be unique, and it's changeable. Avoid entering confidential information.
- dpd_
mode str Dead peer detection (DPD) mode set on the Oracle side of the connection. This mode sets whether Oracle can only respond to a request from the CPE device to start DPD, or both respond to and initiate requests.
- dpd_
timeout_ intin_ sec DPD timeout in seconds.
- encryption_
domain_ Getconfigs Ipsec Connection Tunnels Ip Sec Connection Tunnel Encryption Domain Config] Configuration information used by the encryption domain policy.
- id str
The OCID of the tunnel.
- ike_
version str Internet Key Exchange protocol version.
- nat_
translation_ strenabled By default (the
AUTO
setting), IKE sends packets with a source and destination port set to 500, and when it detects that the port used to forward packets has changed (most likely because a NAT device is between the CPE device and the Oracle VPN headend) it will try to negotiate the use of NAT-T.- oracle_
can_ strinitiate Indicates whether Oracle can only respond to a request to start an IPSec tunnel from the CPE device, or both respond to and initiate requests.
- phase_
one_ Getdetails Ipsec Connection Tunnels Ip Sec Connection Tunnel Phase One Detail] IPSec tunnel details specific to ISAKMP phase one.
- phase_
two_ Getdetails Ipsec Connection Tunnels Ip Sec Connection Tunnel Phase Two Detail] IPsec tunnel detail information specific to phase two.
- routing str
The type of routing used for this tunnel (BGP dynamic routing, static routing, or policy-based routing).
- state str
The tunnel's lifecycle state.
- status str
The status of the tunnel based on IPSec protocol characteristics.
- time_
created str The date and time the IPSec tunnel was created, in the format defined by RFC3339. Example:
2016-08-25T21:10:29.600Z
- time_
status_ strupdated When the status of the IPSec tunnel last changed, in the format defined by RFC3339. Example:
2016-08-25T21:10:29.600Z
- vpn_
ip str The IP address of the Oracle VPN headend for the connection. Example:
203.0.113.21
- bgp
Session List<Property Map>Infos Information for establishing a BGP session for the IPSec tunnel.
- compartment
Id String The OCID of the compartment containing the tunnel.
- cpe
Ip String The IP address of the CPE device's VPN headend. Example:
203.0.113.22
- display
Name String A user-friendly name. Does not have to be unique, and it's changeable. Avoid entering confidential information.
- dpd
Mode String Dead peer detection (DPD) mode set on the Oracle side of the connection. This mode sets whether Oracle can only respond to a request from the CPE device to start DPD, or both respond to and initiate requests.
- dpd
Timeout NumberIn Sec DPD timeout in seconds.
- encryption
Domain List<Property Map>Configs Configuration information used by the encryption domain policy.
- id String
The OCID of the tunnel.
- ike
Version String Internet Key Exchange protocol version.
- nat
Translation StringEnabled By default (the
AUTO
setting), IKE sends packets with a source and destination port set to 500, and when it detects that the port used to forward packets has changed (most likely because a NAT device is between the CPE device and the Oracle VPN headend) it will try to negotiate the use of NAT-T.- oracle
Can StringInitiate Indicates whether Oracle can only respond to a request to start an IPSec tunnel from the CPE device, or both respond to and initiate requests.
- phase
One List<Property Map>Details IPSec tunnel details specific to ISAKMP phase one.
- phase
Two List<Property Map>Details IPsec tunnel detail information specific to phase two.
- routing String
The type of routing used for this tunnel (BGP dynamic routing, static routing, or policy-based routing).
- state String
The tunnel's lifecycle state.
- status String
The status of the tunnel based on IPSec protocol characteristics.
- time
Created String The date and time the IPSec tunnel was created, in the format defined by RFC3339. Example:
2016-08-25T21:10:29.600Z
- time
Status StringUpdated When the status of the IPSec tunnel last changed, in the format defined by RFC3339. Example:
2016-08-25T21:10:29.600Z
- vpn
Ip String The IP address of the Oracle VPN headend for the connection. Example:
203.0.113.21
GetIpsecConnectionTunnelsIpSecConnectionTunnelBgpSessionInfo
- Bgp
Ipv6state string The state of the BGP IPv6 session.
- Bgp
State string The state of the BGP session.
- Customer
Bgp stringAsn If the tunnel's
routing
attribute is set toBGP
(see IPSecConnectionTunnel), this ASN is required and used for the tunnel's BGP session. This is the ASN of the network on the CPE end of the BGP session. Can be a 2-byte or 4-byte ASN. Uses "asplain" format.- Customer
Interface stringIp The IP address for the CPE end of the inside tunnel interface.
- Customer
Interface stringIpv6 The IPv6 address for the CPE end of the inside tunnel interface. This IP address is optional.
- Oracle
Bgp stringAsn The Oracle BGP ASN.
- Oracle
Interface stringIp The IP address for the Oracle end of the inside tunnel interface.
- Oracle
Interface stringIpv6 The IPv6 address for the Oracle end of the inside tunnel interface. This IP address is optional.
- Bgp
Ipv6state string The state of the BGP IPv6 session.
- Bgp
State string The state of the BGP session.
- Customer
Bgp stringAsn If the tunnel's
routing
attribute is set toBGP
(see IPSecConnectionTunnel), this ASN is required and used for the tunnel's BGP session. This is the ASN of the network on the CPE end of the BGP session. Can be a 2-byte or 4-byte ASN. Uses "asplain" format.- Customer
Interface stringIp The IP address for the CPE end of the inside tunnel interface.
- Customer
Interface stringIpv6 The IPv6 address for the CPE end of the inside tunnel interface. This IP address is optional.
- Oracle
Bgp stringAsn The Oracle BGP ASN.
- Oracle
Interface stringIp The IP address for the Oracle end of the inside tunnel interface.
- Oracle
Interface stringIpv6 The IPv6 address for the Oracle end of the inside tunnel interface. This IP address is optional.
- bgp
Ipv6state String The state of the BGP IPv6 session.
- bgp
State String The state of the BGP session.
- customer
Bgp StringAsn If the tunnel's
routing
attribute is set toBGP
(see IPSecConnectionTunnel), this ASN is required and used for the tunnel's BGP session. This is the ASN of the network on the CPE end of the BGP session. Can be a 2-byte or 4-byte ASN. Uses "asplain" format.- customer
Interface StringIp The IP address for the CPE end of the inside tunnel interface.
- customer
Interface StringIpv6 The IPv6 address for the CPE end of the inside tunnel interface. This IP address is optional.
- oracle
Bgp StringAsn The Oracle BGP ASN.
- oracle
Interface StringIp The IP address for the Oracle end of the inside tunnel interface.
- oracle
Interface StringIpv6 The IPv6 address for the Oracle end of the inside tunnel interface. This IP address is optional.
- bgp
Ipv6state string The state of the BGP IPv6 session.
- bgp
State string The state of the BGP session.
- customer
Bgp stringAsn If the tunnel's
routing
attribute is set toBGP
(see IPSecConnectionTunnel), this ASN is required and used for the tunnel's BGP session. This is the ASN of the network on the CPE end of the BGP session. Can be a 2-byte or 4-byte ASN. Uses "asplain" format.- customer
Interface stringIp The IP address for the CPE end of the inside tunnel interface.
- customer
Interface stringIpv6 The IPv6 address for the CPE end of the inside tunnel interface. This IP address is optional.
- oracle
Bgp stringAsn The Oracle BGP ASN.
- oracle
Interface stringIp The IP address for the Oracle end of the inside tunnel interface.
- oracle
Interface stringIpv6 The IPv6 address for the Oracle end of the inside tunnel interface. This IP address is optional.
- bgp_
ipv6state str The state of the BGP IPv6 session.
- bgp_
state str The state of the BGP session.
- customer_
bgp_ strasn If the tunnel's
routing
attribute is set toBGP
(see IPSecConnectionTunnel), this ASN is required and used for the tunnel's BGP session. This is the ASN of the network on the CPE end of the BGP session. Can be a 2-byte or 4-byte ASN. Uses "asplain" format.- customer_
interface_ strip The IP address for the CPE end of the inside tunnel interface.
- customer_
interface_ stripv6 The IPv6 address for the CPE end of the inside tunnel interface. This IP address is optional.
- oracle_
bgp_ strasn The Oracle BGP ASN.
- oracle_
interface_ strip The IP address for the Oracle end of the inside tunnel interface.
- oracle_
interface_ stripv6 The IPv6 address for the Oracle end of the inside tunnel interface. This IP address is optional.
- bgp
Ipv6state String The state of the BGP IPv6 session.
- bgp
State String The state of the BGP session.
- customer
Bgp StringAsn If the tunnel's
routing
attribute is set toBGP
(see IPSecConnectionTunnel), this ASN is required and used for the tunnel's BGP session. This is the ASN of the network on the CPE end of the BGP session. Can be a 2-byte or 4-byte ASN. Uses "asplain" format.- customer
Interface StringIp The IP address for the CPE end of the inside tunnel interface.
- customer
Interface StringIpv6 The IPv6 address for the CPE end of the inside tunnel interface. This IP address is optional.
- oracle
Bgp StringAsn The Oracle BGP ASN.
- oracle
Interface StringIp The IP address for the Oracle end of the inside tunnel interface.
- oracle
Interface StringIpv6 The IPv6 address for the Oracle end of the inside tunnel interface. This IP address is optional.
GetIpsecConnectionTunnelsIpSecConnectionTunnelEncryptionDomainConfig
- Cpe
Traffic List<string>Selectors Lists IPv4 or IPv6-enabled subnets in your on-premises network.
- Oracle
Traffic List<string>Selectors Lists IPv4 or IPv6-enabled subnets in your Oracle tenancy.
- Cpe
Traffic []stringSelectors Lists IPv4 or IPv6-enabled subnets in your on-premises network.
- Oracle
Traffic []stringSelectors Lists IPv4 or IPv6-enabled subnets in your Oracle tenancy.
- cpe
Traffic List<String>Selectors Lists IPv4 or IPv6-enabled subnets in your on-premises network.
- oracle
Traffic List<String>Selectors Lists IPv4 or IPv6-enabled subnets in your Oracle tenancy.
- cpe
Traffic string[]Selectors Lists IPv4 or IPv6-enabled subnets in your on-premises network.
- oracle
Traffic string[]Selectors Lists IPv4 or IPv6-enabled subnets in your Oracle tenancy.
- cpe_
traffic_ Sequence[str]selectors Lists IPv4 or IPv6-enabled subnets in your on-premises network.
- oracle_
traffic_ Sequence[str]selectors Lists IPv4 or IPv6-enabled subnets in your Oracle tenancy.
- cpe
Traffic List<String>Selectors Lists IPv4 or IPv6-enabled subnets in your on-premises network.
- oracle
Traffic List<String>Selectors Lists IPv4 or IPv6-enabled subnets in your Oracle tenancy.
GetIpsecConnectionTunnelsIpSecConnectionTunnelPhaseOneDetail
- Custom
Authentication stringAlgorithm Phase two authentication algorithm proposed during tunnel negotiation.
- Custom
Dh stringGroup The proposed custom Diffie-Hellman group.
- Custom
Encryption stringAlgorithm The proposed custom phase two encryption algorithm.
- Is
Custom boolPhase One Config Indicates whether custom phase one configuration is enabled. If this option is not enabled, default settings are proposed.
- Is
Ike boolEstablished Indicates whether IKE phase one is established.
- Lifetime string
The total configured lifetime of the IKE security association.
- Negotiated
Authentication stringAlgorithm The negotiated phase two authentication algorithm.
- Negotiated
Dh stringGroup The negotiated Diffie-Hellman group.
- Negotiated
Encryption stringAlgorithm The negotiated encryption algorithm.
- Remaining
Lifetime string The remaining lifetime before the key is refreshed.
- Remaining
Lifetime stringLast Retrieved The date and time the remaining lifetime was last retrieved, in the format defined by RFC3339. Example:
2016-08-25T21:10:29.600Z
- Custom
Authentication stringAlgorithm Phase two authentication algorithm proposed during tunnel negotiation.
- Custom
Dh stringGroup The proposed custom Diffie-Hellman group.
- Custom
Encryption stringAlgorithm The proposed custom phase two encryption algorithm.
- Is
Custom boolPhase One Config Indicates whether custom phase one configuration is enabled. If this option is not enabled, default settings are proposed.
- Is
Ike boolEstablished Indicates whether IKE phase one is established.
- Lifetime string
The total configured lifetime of the IKE security association.
- Negotiated
Authentication stringAlgorithm The negotiated phase two authentication algorithm.
- Negotiated
Dh stringGroup The negotiated Diffie-Hellman group.
- Negotiated
Encryption stringAlgorithm The negotiated encryption algorithm.
- Remaining
Lifetime string The remaining lifetime before the key is refreshed.
- Remaining
Lifetime stringLast Retrieved The date and time the remaining lifetime was last retrieved, in the format defined by RFC3339. Example:
2016-08-25T21:10:29.600Z
- custom
Authentication StringAlgorithm Phase two authentication algorithm proposed during tunnel negotiation.
- custom
Dh StringGroup The proposed custom Diffie-Hellman group.
- custom
Encryption StringAlgorithm The proposed custom phase two encryption algorithm.
- is
Custom BooleanPhase One Config Indicates whether custom phase one configuration is enabled. If this option is not enabled, default settings are proposed.
- is
Ike BooleanEstablished Indicates whether IKE phase one is established.
- lifetime String
The total configured lifetime of the IKE security association.
- negotiated
Authentication StringAlgorithm The negotiated phase two authentication algorithm.
- negotiated
Dh StringGroup The negotiated Diffie-Hellman group.
- negotiated
Encryption StringAlgorithm The negotiated encryption algorithm.
- remaining
Lifetime String The remaining lifetime before the key is refreshed.
- remaining
Lifetime StringLast Retrieved The date and time the remaining lifetime was last retrieved, in the format defined by RFC3339. Example:
2016-08-25T21:10:29.600Z
- custom
Authentication stringAlgorithm Phase two authentication algorithm proposed during tunnel negotiation.
- custom
Dh stringGroup The proposed custom Diffie-Hellman group.
- custom
Encryption stringAlgorithm The proposed custom phase two encryption algorithm.
- is
Custom booleanPhase One Config Indicates whether custom phase one configuration is enabled. If this option is not enabled, default settings are proposed.
- is
Ike booleanEstablished Indicates whether IKE phase one is established.
- lifetime string
The total configured lifetime of the IKE security association.
- negotiated
Authentication stringAlgorithm The negotiated phase two authentication algorithm.
- negotiated
Dh stringGroup The negotiated Diffie-Hellman group.
- negotiated
Encryption stringAlgorithm The negotiated encryption algorithm.
- remaining
Lifetime string The remaining lifetime before the key is refreshed.
- remaining
Lifetime stringLast Retrieved The date and time the remaining lifetime was last retrieved, in the format defined by RFC3339. Example:
2016-08-25T21:10:29.600Z
- custom_
authentication_ stralgorithm Phase two authentication algorithm proposed during tunnel negotiation.
- custom_
dh_ strgroup The proposed custom Diffie-Hellman group.
- custom_
encryption_ stralgorithm The proposed custom phase two encryption algorithm.
- is_
custom_ boolphase_ one_ config Indicates whether custom phase one configuration is enabled. If this option is not enabled, default settings are proposed.
- is_
ike_ boolestablished Indicates whether IKE phase one is established.
- lifetime str
The total configured lifetime of the IKE security association.
- negotiated_
authentication_ stralgorithm The negotiated phase two authentication algorithm.
- negotiated_
dh_ strgroup The negotiated Diffie-Hellman group.
- negotiated_
encryption_ stralgorithm The negotiated encryption algorithm.
- remaining_
lifetime str The remaining lifetime before the key is refreshed.
- remaining_
lifetime_ strlast_ retrieved The date and time the remaining lifetime was last retrieved, in the format defined by RFC3339. Example:
2016-08-25T21:10:29.600Z
- custom
Authentication StringAlgorithm Phase two authentication algorithm proposed during tunnel negotiation.
- custom
Dh StringGroup The proposed custom Diffie-Hellman group.
- custom
Encryption StringAlgorithm The proposed custom phase two encryption algorithm.
- is
Custom BooleanPhase One Config Indicates whether custom phase one configuration is enabled. If this option is not enabled, default settings are proposed.
- is
Ike BooleanEstablished Indicates whether IKE phase one is established.
- lifetime String
The total configured lifetime of the IKE security association.
- negotiated
Authentication StringAlgorithm The negotiated phase two authentication algorithm.
- negotiated
Dh StringGroup The negotiated Diffie-Hellman group.
- negotiated
Encryption StringAlgorithm The negotiated encryption algorithm.
- remaining
Lifetime String The remaining lifetime before the key is refreshed.
- remaining
Lifetime StringLast Retrieved The date and time the remaining lifetime was last retrieved, in the format defined by RFC3339. Example:
2016-08-25T21:10:29.600Z
GetIpsecConnectionTunnelsIpSecConnectionTunnelPhaseTwoDetail
- Custom
Authentication stringAlgorithm Phase two authentication algorithm proposed during tunnel negotiation.
- Custom
Encryption stringAlgorithm The proposed custom phase two encryption algorithm.
- Dh
Group string The proposed Diffie-Hellman group.
- Is
Custom boolPhase Two Config Indicates whether custom phase two configuration is enabled. If this option is not enabled, default settings are proposed.
- Is
Esp boolEstablished Indicates that ESP phase two is established.
- Is
Pfs boolEnabled Indicates that PFS (perfect forward secrecy) is enabled.
- Lifetime string
The total configured lifetime of the IKE security association.
- Negotiated
Authentication stringAlgorithm The negotiated phase two authentication algorithm.
- Negotiated
Dh stringGroup The negotiated Diffie-Hellman group.
- Negotiated
Encryption stringAlgorithm The negotiated encryption algorithm.
- Remaining
Lifetime string The remaining lifetime before the key is refreshed.
- Remaining
Lifetime stringLast Retrieved The date and time the remaining lifetime was last retrieved, in the format defined by RFC3339. Example:
2016-08-25T21:10:29.600Z
- Custom
Authentication stringAlgorithm Phase two authentication algorithm proposed during tunnel negotiation.
- Custom
Encryption stringAlgorithm The proposed custom phase two encryption algorithm.
- Dh
Group string The proposed Diffie-Hellman group.
- Is
Custom boolPhase Two Config Indicates whether custom phase two configuration is enabled. If this option is not enabled, default settings are proposed.
- Is
Esp boolEstablished Indicates that ESP phase two is established.
- Is
Pfs boolEnabled Indicates that PFS (perfect forward secrecy) is enabled.
- Lifetime string
The total configured lifetime of the IKE security association.
- Negotiated
Authentication stringAlgorithm The negotiated phase two authentication algorithm.
- Negotiated
Dh stringGroup The negotiated Diffie-Hellman group.
- Negotiated
Encryption stringAlgorithm The negotiated encryption algorithm.
- Remaining
Lifetime string The remaining lifetime before the key is refreshed.
- Remaining
Lifetime stringLast Retrieved The date and time the remaining lifetime was last retrieved, in the format defined by RFC3339. Example:
2016-08-25T21:10:29.600Z
- custom
Authentication StringAlgorithm Phase two authentication algorithm proposed during tunnel negotiation.
- custom
Encryption StringAlgorithm The proposed custom phase two encryption algorithm.
- dh
Group String The proposed Diffie-Hellman group.
- is
Custom BooleanPhase Two Config Indicates whether custom phase two configuration is enabled. If this option is not enabled, default settings are proposed.
- is
Esp BooleanEstablished Indicates that ESP phase two is established.
- is
Pfs BooleanEnabled Indicates that PFS (perfect forward secrecy) is enabled.
- lifetime String
The total configured lifetime of the IKE security association.
- negotiated
Authentication StringAlgorithm The negotiated phase two authentication algorithm.
- negotiated
Dh StringGroup The negotiated Diffie-Hellman group.
- negotiated
Encryption StringAlgorithm The negotiated encryption algorithm.
- remaining
Lifetime String The remaining lifetime before the key is refreshed.
- remaining
Lifetime StringLast Retrieved The date and time the remaining lifetime was last retrieved, in the format defined by RFC3339. Example:
2016-08-25T21:10:29.600Z
- custom
Authentication stringAlgorithm Phase two authentication algorithm proposed during tunnel negotiation.
- custom
Encryption stringAlgorithm The proposed custom phase two encryption algorithm.
- dh
Group string The proposed Diffie-Hellman group.
- is
Custom booleanPhase Two Config Indicates whether custom phase two configuration is enabled. If this option is not enabled, default settings are proposed.
- is
Esp booleanEstablished Indicates that ESP phase two is established.
- is
Pfs booleanEnabled Indicates that PFS (perfect forward secrecy) is enabled.
- lifetime string
The total configured lifetime of the IKE security association.
- negotiated
Authentication stringAlgorithm The negotiated phase two authentication algorithm.
- negotiated
Dh stringGroup The negotiated Diffie-Hellman group.
- negotiated
Encryption stringAlgorithm The negotiated encryption algorithm.
- remaining
Lifetime string The remaining lifetime before the key is refreshed.
- remaining
Lifetime stringLast Retrieved The date and time the remaining lifetime was last retrieved, in the format defined by RFC3339. Example:
2016-08-25T21:10:29.600Z
- custom_
authentication_ stralgorithm Phase two authentication algorithm proposed during tunnel negotiation.
- custom_
encryption_ stralgorithm The proposed custom phase two encryption algorithm.
- dh_
group str The proposed Diffie-Hellman group.
- is_
custom_ boolphase_ two_ config Indicates whether custom phase two configuration is enabled. If this option is not enabled, default settings are proposed.
- is_
esp_ boolestablished Indicates that ESP phase two is established.
- is_
pfs_ boolenabled Indicates that PFS (perfect forward secrecy) is enabled.
- lifetime str
The total configured lifetime of the IKE security association.
- negotiated_
authentication_ stralgorithm The negotiated phase two authentication algorithm.
- negotiated_
dh_ strgroup The negotiated Diffie-Hellman group.
- negotiated_
encryption_ stralgorithm The negotiated encryption algorithm.
- remaining_
lifetime str The remaining lifetime before the key is refreshed.
- remaining_
lifetime_ strlast_ retrieved The date and time the remaining lifetime was last retrieved, in the format defined by RFC3339. Example:
2016-08-25T21:10:29.600Z
- custom
Authentication StringAlgorithm Phase two authentication algorithm proposed during tunnel negotiation.
- custom
Encryption StringAlgorithm The proposed custom phase two encryption algorithm.
- dh
Group String The proposed Diffie-Hellman group.
- is
Custom BooleanPhase Two Config Indicates whether custom phase two configuration is enabled. If this option is not enabled, default settings are proposed.
- is
Esp BooleanEstablished Indicates that ESP phase two is established.
- is
Pfs BooleanEnabled Indicates that PFS (perfect forward secrecy) is enabled.
- lifetime String
The total configured lifetime of the IKE security association.
- negotiated
Authentication StringAlgorithm The negotiated phase two authentication algorithm.
- negotiated
Dh StringGroup The negotiated Diffie-Hellman group.
- negotiated
Encryption StringAlgorithm The negotiated encryption algorithm.
- remaining
Lifetime String The remaining lifetime before the key is refreshed.
- remaining
Lifetime StringLast Retrieved The date and time the remaining lifetime was last retrieved, in the format defined by RFC3339. Example:
2016-08-25T21:10:29.600Z
Package Details
- Repository
- https://github.com/pulumi/pulumi-oci
- License
- Apache-2.0
- Notes
This Pulumi package is based on the
oci
Terraform Provider.