fortios.system.Ipsecaggregate
Explore with Pulumi AI
Configure an aggregate of IPsec tunnels.
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as fortios from "@pulumiverse/fortios";
const trname1Phase1interface = new fortios.vpn.ipsec.Phase1interface("trname1Phase1interface", {
acctVerify: "disable",
addGwRoute: "disable",
addRoute: "enable",
assignIp: "enable",
assignIpFrom: "range",
authmethod: "psk",
autoDiscoveryForwarder: "disable",
autoDiscoveryPsk: "disable",
autoDiscoveryReceiver: "disable",
autoDiscoverySender: "disable",
autoNegotiate: "enable",
certIdValidation: "enable",
childlessIke: "disable",
clientAutoNegotiate: "disable",
clientKeepAlive: "disable",
defaultGw: "0.0.0.0",
defaultGwPriority: 0,
dhgrp: "14 5",
digitalSignatureAuth: "disable",
distance: 15,
dnsMode: "manual",
dpd: "on-demand",
dpdRetrycount: 3,
dpdRetryinterval: "20",
eap: "disable",
eapIdentity: "use-id-payload",
encapLocalGw4: "0.0.0.0",
encapLocalGw6: "::",
encapRemoteGw4: "0.0.0.0",
encapRemoteGw6: "::",
encapsulation: "none",
encapsulationAddress: "ike",
enforceUniqueId: "disable",
exchangeInterfaceIp: "disable",
exchangeIpAddr4: "0.0.0.0",
exchangeIpAddr6: "::",
forticlientEnforcement: "disable",
fragmentation: "enable",
fragmentationMtu: 1200,
groupAuthentication: "disable",
haSyncEspSeqno: "enable",
idleTimeout: "disable",
idleTimeoutinterval: 15,
ikeVersion: "1",
includeLocalLan: "disable",
"interface": "port3",
ipVersion: "4",
ipv4DnsServer1: "0.0.0.0",
ipv4DnsServer2: "0.0.0.0",
ipv4DnsServer3: "0.0.0.0",
ipv4EndIp: "0.0.0.0",
ipv4Netmask: "255.255.255.255",
ipv4StartIp: "0.0.0.0",
ipv4WinsServer1: "0.0.0.0",
ipv4WinsServer2: "0.0.0.0",
ipv6DnsServer1: "::",
ipv6DnsServer2: "::",
ipv6DnsServer3: "::",
ipv6EndIp: "::",
ipv6Prefix: 128,
ipv6StartIp: "::",
keepalive: 10,
keylife: 86400,
localGw: "0.0.0.0",
localGw6: "::",
localidType: "auto",
meshSelectorType: "disable",
mode: "main",
modeCfg: "disable",
monitorHoldDownDelay: 0,
monitorHoldDownTime: "00:00",
monitorHoldDownType: "immediate",
monitorHoldDownWeekday: "sunday",
nattraversal: "enable",
negotiateTimeout: 30,
netDevice: "disable",
passiveMode: "disable",
peertype: "any",
ppk: "disable",
priority: 0,
proposal: "aes128-sha256 aes256-sha256 aes128-sha1 aes256-sha1",
psksecret: "eweeeeeeeecee",
reauth: "disable",
rekey: "enable",
remoteGw: "2.2.2.2",
remoteGw6: "::",
rsaSignatureFormat: "pkcs1",
savePassword: "disable",
sendCertChain: "enable",
signatureHashAlg: "sha2-512 sha2-384 sha2-256 sha1",
suiteB: "disable",
tunnelSearch: "selectors",
type: "static",
unitySupport: "enable",
wizardType: "custom",
xauthtype: "disable",
});
const trname1Phase2interface = new fortios.vpn.ipsec.Phase2interface("trname1Phase2interface", {
addRoute: "phase1",
autoDiscoveryForwarder: "phase1",
autoDiscoverySender: "phase1",
autoNegotiate: "disable",
dhcpIpsec: "disable",
dhgrp: "14 5",
dstAddrType: "subnet",
dstEndIp6: "::",
dstPort: 0,
dstSubnet: "0.0.0.0 0.0.0.0",
encapsulation: "tunnel-mode",
keepalive: "disable",
keylifeType: "seconds",
keylifekbs: 5120,
keylifeseconds: 43200,
l2tp: "disable",
pfs: "enable",
phase1name: trname1Phase1interface.name,
proposal: "aes128-sha1 aes256-sha1 aes128-sha256 aes256-sha256 aes128gcm aes256gcm chacha20poly1305",
protocol: 0,
replay: "enable",
routeOverlap: "use-new",
singleSource: "disable",
srcAddrType: "subnet",
srcEndIp6: "::",
srcPort: 0,
srcSubnet: "0.0.0.0 0.0.0.0",
});
const trname = new fortios.system.Ipsecaggregate("trname", {
algorithm: "round-robin",
members: [{
tunnelName: trname1Phase1interface.name,
}],
});
import pulumi
import pulumiverse_fortios as fortios
trname1_phase1interface = fortios.vpn.ipsec.Phase1interface("trname1Phase1interface",
acct_verify="disable",
add_gw_route="disable",
add_route="enable",
assign_ip="enable",
assign_ip_from="range",
authmethod="psk",
auto_discovery_forwarder="disable",
auto_discovery_psk="disable",
auto_discovery_receiver="disable",
auto_discovery_sender="disable",
auto_negotiate="enable",
cert_id_validation="enable",
childless_ike="disable",
client_auto_negotiate="disable",
client_keep_alive="disable",
default_gw="0.0.0.0",
default_gw_priority=0,
dhgrp="14 5",
digital_signature_auth="disable",
distance=15,
dns_mode="manual",
dpd="on-demand",
dpd_retrycount=3,
dpd_retryinterval="20",
eap="disable",
eap_identity="use-id-payload",
encap_local_gw4="0.0.0.0",
encap_local_gw6="::",
encap_remote_gw4="0.0.0.0",
encap_remote_gw6="::",
encapsulation="none",
encapsulation_address="ike",
enforce_unique_id="disable",
exchange_interface_ip="disable",
exchange_ip_addr4="0.0.0.0",
exchange_ip_addr6="::",
forticlient_enforcement="disable",
fragmentation="enable",
fragmentation_mtu=1200,
group_authentication="disable",
ha_sync_esp_seqno="enable",
idle_timeout="disable",
idle_timeoutinterval=15,
ike_version="1",
include_local_lan="disable",
interface="port3",
ip_version="4",
ipv4_dns_server1="0.0.0.0",
ipv4_dns_server2="0.0.0.0",
ipv4_dns_server3="0.0.0.0",
ipv4_end_ip="0.0.0.0",
ipv4_netmask="255.255.255.255",
ipv4_start_ip="0.0.0.0",
ipv4_wins_server1="0.0.0.0",
ipv4_wins_server2="0.0.0.0",
ipv6_dns_server1="::",
ipv6_dns_server2="::",
ipv6_dns_server3="::",
ipv6_end_ip="::",
ipv6_prefix=128,
ipv6_start_ip="::",
keepalive=10,
keylife=86400,
local_gw="0.0.0.0",
local_gw6="::",
localid_type="auto",
mesh_selector_type="disable",
mode="main",
mode_cfg="disable",
monitor_hold_down_delay=0,
monitor_hold_down_time="00:00",
monitor_hold_down_type="immediate",
monitor_hold_down_weekday="sunday",
nattraversal="enable",
negotiate_timeout=30,
net_device="disable",
passive_mode="disable",
peertype="any",
ppk="disable",
priority=0,
proposal="aes128-sha256 aes256-sha256 aes128-sha1 aes256-sha1",
psksecret="eweeeeeeeecee",
reauth="disable",
rekey="enable",
remote_gw="2.2.2.2",
remote_gw6="::",
rsa_signature_format="pkcs1",
save_password="disable",
send_cert_chain="enable",
signature_hash_alg="sha2-512 sha2-384 sha2-256 sha1",
suite_b="disable",
tunnel_search="selectors",
type="static",
unity_support="enable",
wizard_type="custom",
xauthtype="disable")
trname1_phase2interface = fortios.vpn.ipsec.Phase2interface("trname1Phase2interface",
add_route="phase1",
auto_discovery_forwarder="phase1",
auto_discovery_sender="phase1",
auto_negotiate="disable",
dhcp_ipsec="disable",
dhgrp="14 5",
dst_addr_type="subnet",
dst_end_ip6="::",
dst_port=0,
dst_subnet="0.0.0.0 0.0.0.0",
encapsulation="tunnel-mode",
keepalive="disable",
keylife_type="seconds",
keylifekbs=5120,
keylifeseconds=43200,
l2tp="disable",
pfs="enable",
phase1name=trname1_phase1interface.name,
proposal="aes128-sha1 aes256-sha1 aes128-sha256 aes256-sha256 aes128gcm aes256gcm chacha20poly1305",
protocol=0,
replay="enable",
route_overlap="use-new",
single_source="disable",
src_addr_type="subnet",
src_end_ip6="::",
src_port=0,
src_subnet="0.0.0.0 0.0.0.0")
trname = fortios.system.Ipsecaggregate("trname",
algorithm="round-robin",
members=[fortios.system.IpsecaggregateMemberArgs(
tunnel_name=trname1_phase1interface.name,
)])
package main
import (
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
"github.com/pulumiverse/pulumi-fortios/sdk/go/fortios/system"
"github.com/pulumiverse/pulumi-fortios/sdk/go/fortios/vpn"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
trname1Phase1interface, err := vpn.NewPhase1interface(ctx, "trname1Phase1interface", &vpn.Phase1interfaceArgs{
AcctVerify: pulumi.String("disable"),
AddGwRoute: pulumi.String("disable"),
AddRoute: pulumi.String("enable"),
AssignIp: pulumi.String("enable"),
AssignIpFrom: pulumi.String("range"),
Authmethod: pulumi.String("psk"),
AutoDiscoveryForwarder: pulumi.String("disable"),
AutoDiscoveryPsk: pulumi.String("disable"),
AutoDiscoveryReceiver: pulumi.String("disable"),
AutoDiscoverySender: pulumi.String("disable"),
AutoNegotiate: pulumi.String("enable"),
CertIdValidation: pulumi.String("enable"),
ChildlessIke: pulumi.String("disable"),
ClientAutoNegotiate: pulumi.String("disable"),
ClientKeepAlive: pulumi.String("disable"),
DefaultGw: pulumi.String("0.0.0.0"),
DefaultGwPriority: pulumi.Int(0),
Dhgrp: pulumi.String("14 5"),
DigitalSignatureAuth: pulumi.String("disable"),
Distance: pulumi.Int(15),
DnsMode: pulumi.String("manual"),
Dpd: pulumi.String("on-demand"),
DpdRetrycount: pulumi.Int(3),
DpdRetryinterval: pulumi.String("20"),
Eap: pulumi.String("disable"),
EapIdentity: pulumi.String("use-id-payload"),
EncapLocalGw4: pulumi.String("0.0.0.0"),
EncapLocalGw6: pulumi.String("::"),
EncapRemoteGw4: pulumi.String("0.0.0.0"),
EncapRemoteGw6: pulumi.String("::"),
Encapsulation: pulumi.String("none"),
EncapsulationAddress: pulumi.String("ike"),
EnforceUniqueId: pulumi.String("disable"),
ExchangeInterfaceIp: pulumi.String("disable"),
ExchangeIpAddr4: pulumi.String("0.0.0.0"),
ExchangeIpAddr6: pulumi.String("::"),
ForticlientEnforcement: pulumi.String("disable"),
Fragmentation: pulumi.String("enable"),
FragmentationMtu: pulumi.Int(1200),
GroupAuthentication: pulumi.String("disable"),
HaSyncEspSeqno: pulumi.String("enable"),
IdleTimeout: pulumi.String("disable"),
IdleTimeoutinterval: pulumi.Int(15),
IkeVersion: pulumi.String("1"),
IncludeLocalLan: pulumi.String("disable"),
Interface: pulumi.String("port3"),
IpVersion: pulumi.String("4"),
Ipv4DnsServer1: pulumi.String("0.0.0.0"),
Ipv4DnsServer2: pulumi.String("0.0.0.0"),
Ipv4DnsServer3: pulumi.String("0.0.0.0"),
Ipv4EndIp: pulumi.String("0.0.0.0"),
Ipv4Netmask: pulumi.String("255.255.255.255"),
Ipv4StartIp: pulumi.String("0.0.0.0"),
Ipv4WinsServer1: pulumi.String("0.0.0.0"),
Ipv4WinsServer2: pulumi.String("0.0.0.0"),
Ipv6DnsServer1: pulumi.String("::"),
Ipv6DnsServer2: pulumi.String("::"),
Ipv6DnsServer3: pulumi.String("::"),
Ipv6EndIp: pulumi.String("::"),
Ipv6Prefix: pulumi.Int(128),
Ipv6StartIp: pulumi.String("::"),
Keepalive: pulumi.Int(10),
Keylife: pulumi.Int(86400),
LocalGw: pulumi.String("0.0.0.0"),
LocalGw6: pulumi.String("::"),
LocalidType: pulumi.String("auto"),
MeshSelectorType: pulumi.String("disable"),
Mode: pulumi.String("main"),
ModeCfg: pulumi.String("disable"),
MonitorHoldDownDelay: pulumi.Int(0),
MonitorHoldDownTime: pulumi.String("00:00"),
MonitorHoldDownType: pulumi.String("immediate"),
MonitorHoldDownWeekday: pulumi.String("sunday"),
Nattraversal: pulumi.String("enable"),
NegotiateTimeout: pulumi.Int(30),
NetDevice: pulumi.String("disable"),
PassiveMode: pulumi.String("disable"),
Peertype: pulumi.String("any"),
Ppk: pulumi.String("disable"),
Priority: pulumi.Int(0),
Proposal: pulumi.String("aes128-sha256 aes256-sha256 aes128-sha1 aes256-sha1"),
Psksecret: pulumi.String("eweeeeeeeecee"),
Reauth: pulumi.String("disable"),
Rekey: pulumi.String("enable"),
RemoteGw: pulumi.String("2.2.2.2"),
RemoteGw6: pulumi.String("::"),
RsaSignatureFormat: pulumi.String("pkcs1"),
SavePassword: pulumi.String("disable"),
SendCertChain: pulumi.String("enable"),
SignatureHashAlg: pulumi.String("sha2-512 sha2-384 sha2-256 sha1"),
SuiteB: pulumi.String("disable"),
TunnelSearch: pulumi.String("selectors"),
Type: pulumi.String("static"),
UnitySupport: pulumi.String("enable"),
WizardType: pulumi.String("custom"),
Xauthtype: pulumi.String("disable"),
})
if err != nil {
return err
}
_, err = vpn.NewPhase2interface(ctx, "trname1Phase2interface", &vpn.Phase2interfaceArgs{
AddRoute: pulumi.String("phase1"),
AutoDiscoveryForwarder: pulumi.String("phase1"),
AutoDiscoverySender: pulumi.String("phase1"),
AutoNegotiate: pulumi.String("disable"),
DhcpIpsec: pulumi.String("disable"),
Dhgrp: pulumi.String("14 5"),
DstAddrType: pulumi.String("subnet"),
DstEndIp6: pulumi.String("::"),
DstPort: pulumi.Int(0),
DstSubnet: pulumi.String("0.0.0.0 0.0.0.0"),
Encapsulation: pulumi.String("tunnel-mode"),
Keepalive: pulumi.String("disable"),
KeylifeType: pulumi.String("seconds"),
Keylifekbs: pulumi.Int(5120),
Keylifeseconds: pulumi.Int(43200),
L2tp: pulumi.String("disable"),
Pfs: pulumi.String("enable"),
Phase1name: trname1Phase1interface.Name,
Proposal: pulumi.String("aes128-sha1 aes256-sha1 aes128-sha256 aes256-sha256 aes128gcm aes256gcm chacha20poly1305"),
Protocol: pulumi.Int(0),
Replay: pulumi.String("enable"),
RouteOverlap: pulumi.String("use-new"),
SingleSource: pulumi.String("disable"),
SrcAddrType: pulumi.String("subnet"),
SrcEndIp6: pulumi.String("::"),
SrcPort: pulumi.Int(0),
SrcSubnet: pulumi.String("0.0.0.0 0.0.0.0"),
})
if err != nil {
return err
}
_, err = system.NewIpsecaggregate(ctx, "trname", &system.IpsecaggregateArgs{
Algorithm: pulumi.String("round-robin"),
Members: system.IpsecaggregateMemberArray{
&system.IpsecaggregateMemberArgs{
TunnelName: trname1Phase1interface.Name,
},
},
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Fortios = Pulumiverse.Fortios;
return await Deployment.RunAsync(() =>
{
var trname1Phase1interface = new Fortios.Vpn.Ipsec.Phase1interface("trname1Phase1interface", new()
{
AcctVerify = "disable",
AddGwRoute = "disable",
AddRoute = "enable",
AssignIp = "enable",
AssignIpFrom = "range",
Authmethod = "psk",
AutoDiscoveryForwarder = "disable",
AutoDiscoveryPsk = "disable",
AutoDiscoveryReceiver = "disable",
AutoDiscoverySender = "disable",
AutoNegotiate = "enable",
CertIdValidation = "enable",
ChildlessIke = "disable",
ClientAutoNegotiate = "disable",
ClientKeepAlive = "disable",
DefaultGw = "0.0.0.0",
DefaultGwPriority = 0,
Dhgrp = "14 5",
DigitalSignatureAuth = "disable",
Distance = 15,
DnsMode = "manual",
Dpd = "on-demand",
DpdRetrycount = 3,
DpdRetryinterval = "20",
Eap = "disable",
EapIdentity = "use-id-payload",
EncapLocalGw4 = "0.0.0.0",
EncapLocalGw6 = "::",
EncapRemoteGw4 = "0.0.0.0",
EncapRemoteGw6 = "::",
Encapsulation = "none",
EncapsulationAddress = "ike",
EnforceUniqueId = "disable",
ExchangeInterfaceIp = "disable",
ExchangeIpAddr4 = "0.0.0.0",
ExchangeIpAddr6 = "::",
ForticlientEnforcement = "disable",
Fragmentation = "enable",
FragmentationMtu = 1200,
GroupAuthentication = "disable",
HaSyncEspSeqno = "enable",
IdleTimeout = "disable",
IdleTimeoutinterval = 15,
IkeVersion = "1",
IncludeLocalLan = "disable",
Interface = "port3",
IpVersion = "4",
Ipv4DnsServer1 = "0.0.0.0",
Ipv4DnsServer2 = "0.0.0.0",
Ipv4DnsServer3 = "0.0.0.0",
Ipv4EndIp = "0.0.0.0",
Ipv4Netmask = "255.255.255.255",
Ipv4StartIp = "0.0.0.0",
Ipv4WinsServer1 = "0.0.0.0",
Ipv4WinsServer2 = "0.0.0.0",
Ipv6DnsServer1 = "::",
Ipv6DnsServer2 = "::",
Ipv6DnsServer3 = "::",
Ipv6EndIp = "::",
Ipv6Prefix = 128,
Ipv6StartIp = "::",
Keepalive = 10,
Keylife = 86400,
LocalGw = "0.0.0.0",
LocalGw6 = "::",
LocalidType = "auto",
MeshSelectorType = "disable",
Mode = "main",
ModeCfg = "disable",
MonitorHoldDownDelay = 0,
MonitorHoldDownTime = "00:00",
MonitorHoldDownType = "immediate",
MonitorHoldDownWeekday = "sunday",
Nattraversal = "enable",
NegotiateTimeout = 30,
NetDevice = "disable",
PassiveMode = "disable",
Peertype = "any",
Ppk = "disable",
Priority = 0,
Proposal = "aes128-sha256 aes256-sha256 aes128-sha1 aes256-sha1",
Psksecret = "eweeeeeeeecee",
Reauth = "disable",
Rekey = "enable",
RemoteGw = "2.2.2.2",
RemoteGw6 = "::",
RsaSignatureFormat = "pkcs1",
SavePassword = "disable",
SendCertChain = "enable",
SignatureHashAlg = "sha2-512 sha2-384 sha2-256 sha1",
SuiteB = "disable",
TunnelSearch = "selectors",
Type = "static",
UnitySupport = "enable",
WizardType = "custom",
Xauthtype = "disable",
});
var trname1Phase2interface = new Fortios.Vpn.Ipsec.Phase2interface("trname1Phase2interface", new()
{
AddRoute = "phase1",
AutoDiscoveryForwarder = "phase1",
AutoDiscoverySender = "phase1",
AutoNegotiate = "disable",
DhcpIpsec = "disable",
Dhgrp = "14 5",
DstAddrType = "subnet",
DstEndIp6 = "::",
DstPort = 0,
DstSubnet = "0.0.0.0 0.0.0.0",
Encapsulation = "tunnel-mode",
Keepalive = "disable",
KeylifeType = "seconds",
Keylifekbs = 5120,
Keylifeseconds = 43200,
L2tp = "disable",
Pfs = "enable",
Phase1name = trname1Phase1interface.Name,
Proposal = "aes128-sha1 aes256-sha1 aes128-sha256 aes256-sha256 aes128gcm aes256gcm chacha20poly1305",
Protocol = 0,
Replay = "enable",
RouteOverlap = "use-new",
SingleSource = "disable",
SrcAddrType = "subnet",
SrcEndIp6 = "::",
SrcPort = 0,
SrcSubnet = "0.0.0.0 0.0.0.0",
});
var trname = new Fortios.System.Ipsecaggregate("trname", new()
{
Algorithm = "round-robin",
Members = new[]
{
new Fortios.System.Inputs.IpsecaggregateMemberArgs
{
TunnelName = trname1Phase1interface.Name,
},
},
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.fortios.vpn.Phase1interface;
import com.pulumi.fortios.vpn.Phase1interfaceArgs;
import com.pulumi.fortios.vpn.Phase2interface;
import com.pulumi.fortios.vpn.Phase2interfaceArgs;
import com.pulumi.fortios.system.Ipsecaggregate;
import com.pulumi.fortios.system.IpsecaggregateArgs;
import com.pulumi.fortios.system.inputs.IpsecaggregateMemberArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var trname1Phase1interface = new Phase1interface("trname1Phase1interface", Phase1interfaceArgs.builder()
.acctVerify("disable")
.addGwRoute("disable")
.addRoute("enable")
.assignIp("enable")
.assignIpFrom("range")
.authmethod("psk")
.autoDiscoveryForwarder("disable")
.autoDiscoveryPsk("disable")
.autoDiscoveryReceiver("disable")
.autoDiscoverySender("disable")
.autoNegotiate("enable")
.certIdValidation("enable")
.childlessIke("disable")
.clientAutoNegotiate("disable")
.clientKeepAlive("disable")
.defaultGw("0.0.0.0")
.defaultGwPriority(0)
.dhgrp("14 5")
.digitalSignatureAuth("disable")
.distance(15)
.dnsMode("manual")
.dpd("on-demand")
.dpdRetrycount(3)
.dpdRetryinterval("20")
.eap("disable")
.eapIdentity("use-id-payload")
.encapLocalGw4("0.0.0.0")
.encapLocalGw6("::")
.encapRemoteGw4("0.0.0.0")
.encapRemoteGw6("::")
.encapsulation("none")
.encapsulationAddress("ike")
.enforceUniqueId("disable")
.exchangeInterfaceIp("disable")
.exchangeIpAddr4("0.0.0.0")
.exchangeIpAddr6("::")
.forticlientEnforcement("disable")
.fragmentation("enable")
.fragmentationMtu(1200)
.groupAuthentication("disable")
.haSyncEspSeqno("enable")
.idleTimeout("disable")
.idleTimeoutinterval(15)
.ikeVersion("1")
.includeLocalLan("disable")
.interface_("port3")
.ipVersion("4")
.ipv4DnsServer1("0.0.0.0")
.ipv4DnsServer2("0.0.0.0")
.ipv4DnsServer3("0.0.0.0")
.ipv4EndIp("0.0.0.0")
.ipv4Netmask("255.255.255.255")
.ipv4StartIp("0.0.0.0")
.ipv4WinsServer1("0.0.0.0")
.ipv4WinsServer2("0.0.0.0")
.ipv6DnsServer1("::")
.ipv6DnsServer2("::")
.ipv6DnsServer3("::")
.ipv6EndIp("::")
.ipv6Prefix(128)
.ipv6StartIp("::")
.keepalive(10)
.keylife(86400)
.localGw("0.0.0.0")
.localGw6("::")
.localidType("auto")
.meshSelectorType("disable")
.mode("main")
.modeCfg("disable")
.monitorHoldDownDelay(0)
.monitorHoldDownTime("00:00")
.monitorHoldDownType("immediate")
.monitorHoldDownWeekday("sunday")
.nattraversal("enable")
.negotiateTimeout(30)
.netDevice("disable")
.passiveMode("disable")
.peertype("any")
.ppk("disable")
.priority(0)
.proposal("aes128-sha256 aes256-sha256 aes128-sha1 aes256-sha1")
.psksecret("eweeeeeeeecee")
.reauth("disable")
.rekey("enable")
.remoteGw("2.2.2.2")
.remoteGw6("::")
.rsaSignatureFormat("pkcs1")
.savePassword("disable")
.sendCertChain("enable")
.signatureHashAlg("sha2-512 sha2-384 sha2-256 sha1")
.suiteB("disable")
.tunnelSearch("selectors")
.type("static")
.unitySupport("enable")
.wizardType("custom")
.xauthtype("disable")
.build());
var trname1Phase2interface = new Phase2interface("trname1Phase2interface", Phase2interfaceArgs.builder()
.addRoute("phase1")
.autoDiscoveryForwarder("phase1")
.autoDiscoverySender("phase1")
.autoNegotiate("disable")
.dhcpIpsec("disable")
.dhgrp("14 5")
.dstAddrType("subnet")
.dstEndIp6("::")
.dstPort(0)
.dstSubnet("0.0.0.0 0.0.0.0")
.encapsulation("tunnel-mode")
.keepalive("disable")
.keylifeType("seconds")
.keylifekbs(5120)
.keylifeseconds(43200)
.l2tp("disable")
.pfs("enable")
.phase1name(trname1Phase1interface.name())
.proposal("aes128-sha1 aes256-sha1 aes128-sha256 aes256-sha256 aes128gcm aes256gcm chacha20poly1305")
.protocol(0)
.replay("enable")
.routeOverlap("use-new")
.singleSource("disable")
.srcAddrType("subnet")
.srcEndIp6("::")
.srcPort(0)
.srcSubnet("0.0.0.0 0.0.0.0")
.build());
var trname = new Ipsecaggregate("trname", IpsecaggregateArgs.builder()
.algorithm("round-robin")
.members(IpsecaggregateMemberArgs.builder()
.tunnelName(trname1Phase1interface.name())
.build())
.build());
}
}
resources:
trname1Phase1interface:
type: fortios:vpn/ipsec:Phase1interface
properties:
acctVerify: disable
addGwRoute: disable
addRoute: enable
assignIp: enable
assignIpFrom: range
authmethod: psk
autoDiscoveryForwarder: disable
autoDiscoveryPsk: disable
autoDiscoveryReceiver: disable
autoDiscoverySender: disable
autoNegotiate: enable
certIdValidation: enable
childlessIke: disable
clientAutoNegotiate: disable
clientKeepAlive: disable
defaultGw: 0.0.0.0
defaultGwPriority: 0
dhgrp: 14 5
digitalSignatureAuth: disable
distance: 15
dnsMode: manual
dpd: on-demand
dpdRetrycount: 3
dpdRetryinterval: '20'
eap: disable
eapIdentity: use-id-payload
encapLocalGw4: 0.0.0.0
encapLocalGw6: '::'
encapRemoteGw4: 0.0.0.0
encapRemoteGw6: '::'
encapsulation: none
encapsulationAddress: ike
enforceUniqueId: disable
exchangeInterfaceIp: disable
exchangeIpAddr4: 0.0.0.0
exchangeIpAddr6: '::'
forticlientEnforcement: disable
fragmentation: enable
fragmentationMtu: 1200
groupAuthentication: disable
haSyncEspSeqno: enable
idleTimeout: disable
idleTimeoutinterval: 15
ikeVersion: '1'
includeLocalLan: disable
interface: port3
ipVersion: '4'
ipv4DnsServer1: 0.0.0.0
ipv4DnsServer2: 0.0.0.0
ipv4DnsServer3: 0.0.0.0
ipv4EndIp: 0.0.0.0
ipv4Netmask: 255.255.255.255
ipv4StartIp: 0.0.0.0
ipv4WinsServer1: 0.0.0.0
ipv4WinsServer2: 0.0.0.0
ipv6DnsServer1: '::'
ipv6DnsServer2: '::'
ipv6DnsServer3: '::'
ipv6EndIp: '::'
ipv6Prefix: 128
ipv6StartIp: '::'
keepalive: 10
keylife: 86400
localGw: 0.0.0.0
localGw6: '::'
localidType: auto
meshSelectorType: disable
mode: main
modeCfg: disable
monitorHoldDownDelay: 0
monitorHoldDownTime: 00:00
monitorHoldDownType: immediate
monitorHoldDownWeekday: sunday
nattraversal: enable
negotiateTimeout: 30
netDevice: disable
passiveMode: disable
peertype: any
ppk: disable
priority: 0
proposal: aes128-sha256 aes256-sha256 aes128-sha1 aes256-sha1
psksecret: eweeeeeeeecee
reauth: disable
rekey: enable
remoteGw: 2.2.2.2
remoteGw6: '::'
rsaSignatureFormat: pkcs1
savePassword: disable
sendCertChain: enable
signatureHashAlg: sha2-512 sha2-384 sha2-256 sha1
suiteB: disable
tunnelSearch: selectors
type: static
unitySupport: enable
wizardType: custom
xauthtype: disable
trname1Phase2interface:
type: fortios:vpn/ipsec:Phase2interface
properties:
addRoute: phase1
autoDiscoveryForwarder: phase1
autoDiscoverySender: phase1
autoNegotiate: disable
dhcpIpsec: disable
dhgrp: 14 5
dstAddrType: subnet
dstEndIp6: '::'
dstPort: 0
dstSubnet: 0.0.0.0 0.0.0.0
encapsulation: tunnel-mode
keepalive: disable
keylifeType: seconds
keylifekbs: 5120
keylifeseconds: 43200
l2tp: disable
pfs: enable
phase1name: ${trname1Phase1interface.name}
proposal: aes128-sha1 aes256-sha1 aes128-sha256 aes256-sha256 aes128gcm aes256gcm chacha20poly1305
protocol: 0
replay: enable
routeOverlap: use-new
singleSource: disable
srcAddrType: subnet
srcEndIp6: '::'
srcPort: 0
srcSubnet: 0.0.0.0 0.0.0.0
trname:
type: fortios:system:Ipsecaggregate
properties:
algorithm: round-robin
members:
- tunnelName: ${trname1Phase1interface.name}
Create Ipsecaggregate Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new Ipsecaggregate(name: string, args: IpsecaggregateArgs, opts?: CustomResourceOptions);
@overload
def Ipsecaggregate(resource_name: str,
args: IpsecaggregateArgs,
opts: Optional[ResourceOptions] = None)
@overload
def Ipsecaggregate(resource_name: str,
opts: Optional[ResourceOptions] = None,
members: Optional[Sequence[IpsecaggregateMemberArgs]] = None,
algorithm: Optional[str] = None,
dynamic_sort_subtable: Optional[str] = None,
get_all_tables: Optional[str] = None,
name: Optional[str] = None,
vdomparam: Optional[str] = None)
func NewIpsecaggregate(ctx *Context, name string, args IpsecaggregateArgs, opts ...ResourceOption) (*Ipsecaggregate, error)
public Ipsecaggregate(string name, IpsecaggregateArgs args, CustomResourceOptions? opts = null)
public Ipsecaggregate(String name, IpsecaggregateArgs args)
public Ipsecaggregate(String name, IpsecaggregateArgs args, CustomResourceOptions options)
type: fortios:system:Ipsecaggregate
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args IpsecaggregateArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args IpsecaggregateArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args IpsecaggregateArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args IpsecaggregateArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args IpsecaggregateArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var ipsecaggregateResource = new Fortios.System.Ipsecaggregate("ipsecaggregateResource", new()
{
Members = new[]
{
new Fortios.System.Inputs.IpsecaggregateMemberArgs
{
TunnelName = "string",
},
},
Algorithm = "string",
DynamicSortSubtable = "string",
GetAllTables = "string",
Name = "string",
Vdomparam = "string",
});
example, err := system.NewIpsecaggregate(ctx, "ipsecaggregateResource", &system.IpsecaggregateArgs{
Members: system.IpsecaggregateMemberArray{
&system.IpsecaggregateMemberArgs{
TunnelName: pulumi.String("string"),
},
},
Algorithm: pulumi.String("string"),
DynamicSortSubtable: pulumi.String("string"),
GetAllTables: pulumi.String("string"),
Name: pulumi.String("string"),
Vdomparam: pulumi.String("string"),
})
var ipsecaggregateResource = new Ipsecaggregate("ipsecaggregateResource", IpsecaggregateArgs.builder()
.members(IpsecaggregateMemberArgs.builder()
.tunnelName("string")
.build())
.algorithm("string")
.dynamicSortSubtable("string")
.getAllTables("string")
.name("string")
.vdomparam("string")
.build());
ipsecaggregate_resource = fortios.system.Ipsecaggregate("ipsecaggregateResource",
members=[{
"tunnel_name": "string",
}],
algorithm="string",
dynamic_sort_subtable="string",
get_all_tables="string",
name="string",
vdomparam="string")
const ipsecaggregateResource = new fortios.system.Ipsecaggregate("ipsecaggregateResource", {
members: [{
tunnelName: "string",
}],
algorithm: "string",
dynamicSortSubtable: "string",
getAllTables: "string",
name: "string",
vdomparam: "string",
});
type: fortios:system:Ipsecaggregate
properties:
algorithm: string
dynamicSortSubtable: string
getAllTables: string
members:
- tunnelName: string
name: string
vdomparam: string
Ipsecaggregate Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The Ipsecaggregate resource accepts the following input properties:
- Members
List<Pulumiverse.
Fortios. System. Inputs. Ipsecaggregate Member> - Member tunnels of the aggregate. The structure of
member
block is documented below. - Algorithm string
- Frame distribution algorithm.
- Dynamic
Sort stringSubtable - Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
- Get
All stringTables - Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwise, conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
- Name string
- IPsec aggregate name.
- Vdomparam string
- Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
- Members
[]Ipsecaggregate
Member Args - Member tunnels of the aggregate. The structure of
member
block is documented below. - Algorithm string
- Frame distribution algorithm.
- Dynamic
Sort stringSubtable - Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
- Get
All stringTables - Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwise, conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
- Name string
- IPsec aggregate name.
- Vdomparam string
- Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
- members
List<Ipsecaggregate
Member> - Member tunnels of the aggregate. The structure of
member
block is documented below. - algorithm String
- Frame distribution algorithm.
- dynamic
Sort StringSubtable - Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
- get
All StringTables - Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwise, conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
- name String
- IPsec aggregate name.
- vdomparam String
- Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
- members
Ipsecaggregate
Member[] - Member tunnels of the aggregate. The structure of
member
block is documented below. - algorithm string
- Frame distribution algorithm.
- dynamic
Sort stringSubtable - Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
- get
All stringTables - Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwise, conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
- name string
- IPsec aggregate name.
- vdomparam string
- Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
- members
Sequence[Ipsecaggregate
Member Args] - Member tunnels of the aggregate. The structure of
member
block is documented below. - algorithm str
- Frame distribution algorithm.
- dynamic_
sort_ strsubtable - Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
- get_
all_ strtables - Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwise, conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
- name str
- IPsec aggregate name.
- vdomparam str
- Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
- members List<Property Map>
- Member tunnels of the aggregate. The structure of
member
block is documented below. - algorithm String
- Frame distribution algorithm.
- dynamic
Sort StringSubtable - Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
- get
All StringTables - Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwise, conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
- name String
- IPsec aggregate name.
- vdomparam String
- Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
Outputs
All input properties are implicitly available as output properties. Additionally, the Ipsecaggregate resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- Id string
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
- id string
- The provider-assigned unique ID for this managed resource.
- id str
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
Look up Existing Ipsecaggregate Resource
Get an existing Ipsecaggregate resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: IpsecaggregateState, opts?: CustomResourceOptions): Ipsecaggregate
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
algorithm: Optional[str] = None,
dynamic_sort_subtable: Optional[str] = None,
get_all_tables: Optional[str] = None,
members: Optional[Sequence[IpsecaggregateMemberArgs]] = None,
name: Optional[str] = None,
vdomparam: Optional[str] = None) -> Ipsecaggregate
func GetIpsecaggregate(ctx *Context, name string, id IDInput, state *IpsecaggregateState, opts ...ResourceOption) (*Ipsecaggregate, error)
public static Ipsecaggregate Get(string name, Input<string> id, IpsecaggregateState? state, CustomResourceOptions? opts = null)
public static Ipsecaggregate get(String name, Output<String> id, IpsecaggregateState state, CustomResourceOptions options)
Resource lookup is not supported in YAML
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Algorithm string
- Frame distribution algorithm.
- Dynamic
Sort stringSubtable - Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
- Get
All stringTables - Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwise, conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
- Members
List<Pulumiverse.
Fortios. System. Inputs. Ipsecaggregate Member> - Member tunnels of the aggregate. The structure of
member
block is documented below. - Name string
- IPsec aggregate name.
- Vdomparam string
- Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
- Algorithm string
- Frame distribution algorithm.
- Dynamic
Sort stringSubtable - Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
- Get
All stringTables - Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwise, conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
- Members
[]Ipsecaggregate
Member Args - Member tunnels of the aggregate. The structure of
member
block is documented below. - Name string
- IPsec aggregate name.
- Vdomparam string
- Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
- algorithm String
- Frame distribution algorithm.
- dynamic
Sort StringSubtable - Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
- get
All StringTables - Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwise, conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
- members
List<Ipsecaggregate
Member> - Member tunnels of the aggregate. The structure of
member
block is documented below. - name String
- IPsec aggregate name.
- vdomparam String
- Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
- algorithm string
- Frame distribution algorithm.
- dynamic
Sort stringSubtable - Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
- get
All stringTables - Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwise, conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
- members
Ipsecaggregate
Member[] - Member tunnels of the aggregate. The structure of
member
block is documented below. - name string
- IPsec aggregate name.
- vdomparam string
- Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
- algorithm str
- Frame distribution algorithm.
- dynamic_
sort_ strsubtable - Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
- get_
all_ strtables - Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwise, conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
- members
Sequence[Ipsecaggregate
Member Args] - Member tunnels of the aggregate. The structure of
member
block is documented below. - name str
- IPsec aggregate name.
- vdomparam str
- Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
- algorithm String
- Frame distribution algorithm.
- dynamic
Sort StringSubtable - Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
- get
All StringTables - Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwise, conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
- members List<Property Map>
- Member tunnels of the aggregate. The structure of
member
block is documented below. - name String
- IPsec aggregate name.
- vdomparam String
- Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
Supporting Types
IpsecaggregateMember, IpsecaggregateMemberArgs
- Tunnel
Name string - Tunnel name.
- Tunnel
Name string - Tunnel name.
- tunnel
Name String - Tunnel name.
- tunnel
Name string - Tunnel name.
- tunnel_
name str - Tunnel name.
- tunnel
Name String - Tunnel name.
Import
System IpsecAggregate can be imported using any of these accepted formats:
$ pulumi import fortios:system/ipsecaggregate:Ipsecaggregate labelname {{name}}
If you do not want to import arguments of block:
$ export “FORTIOS_IMPORT_TABLE”=“false”
$ pulumi import fortios:system/ipsecaggregate:Ipsecaggregate labelname {{name}}
$ unset “FORTIOS_IMPORT_TABLE”
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- fortios pulumiverse/pulumi-fortios
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
fortios
Terraform Provider.