meraki.organizations.ApplianceVpnThirdPartyVpnpeers
Explore with Pulumi AI
Example Usage
Coming soon!
Coming soon!
Coming soon!
Coming soon!
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.meraki.organizations.ApplianceVpnThirdPartyVpnpeers;
import com.pulumi.meraki.organizations.ApplianceVpnThirdPartyVpnpeersArgs;
import com.pulumi.meraki.organizations.inputs.ApplianceVpnThirdPartyVpnpeersPeerArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var example = new ApplianceVpnThirdPartyVpnpeers("example", ApplianceVpnThirdPartyVpnpeersArgs.builder()
.organizationId("string")
.peers(ApplianceVpnThirdPartyVpnpeersPeerArgs.builder()
.ike_version("2")
.ipsec_policies(%!v(PANIC=Format method: runtime error: invalid memory address or nil pointer dereference))
.ipsec_policies_preset("default")
.local_id("myMXId@meraki.com")
.name("Peer Name")
.network_tags("none")
.private_subnets(
"192.168.1.0/24",
"192.168.128.0/24")
.public_ip("123.123.123.1")
.remote_id("miles@meraki.com")
.secret("Sample Password")
.build())
.build());
ctx.export("merakiOrganizationsApplianceVpnThirdPartyVpnpeersExample", example);
}
}
resources:
example:
type: meraki:organizations:ApplianceVpnThirdPartyVpnpeers
properties:
organizationId: string
peers:
- ike_version: '2'
ipsec_policies:
childAuthAlgo:
- sha1
childCipherAlgo:
- aes128
childLifetime: 28800
childPfsGroup:
- disabled
ikeAuthAlgo:
- sha1
ikeCipherAlgo:
- tripledes
ikeDiffieHellmanGroup:
- group2
ikeLifetime: 28800
ikePrfAlgo:
- prfsha1
ipsec_policies_preset: default
local_id: myMXId@meraki.com
name: Peer Name
network_tags:
- none
private_subnets:
- 192.168.1.0/24
- 192.168.128.0/24
public_ip: 123.123.123.1
remote_id: miles@meraki.com
secret: Sample Password
outputs:
merakiOrganizationsApplianceVpnThirdPartyVpnpeersExample: ${example}
Create ApplianceVpnThirdPartyVpnpeers Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new ApplianceVpnThirdPartyVpnpeers(name: string, args: ApplianceVpnThirdPartyVpnpeersArgs, opts?: CustomResourceOptions);
@overload
def ApplianceVpnThirdPartyVpnpeers(resource_name: str,
args: ApplianceVpnThirdPartyVpnpeersArgs,
opts: Optional[ResourceOptions] = None)
@overload
def ApplianceVpnThirdPartyVpnpeers(resource_name: str,
opts: Optional[ResourceOptions] = None,
organization_id: Optional[str] = None,
peers: Optional[Sequence[ApplianceVpnThirdPartyVpnpeersPeerArgs]] = None)
func NewApplianceVpnThirdPartyVpnpeers(ctx *Context, name string, args ApplianceVpnThirdPartyVpnpeersArgs, opts ...ResourceOption) (*ApplianceVpnThirdPartyVpnpeers, error)
public ApplianceVpnThirdPartyVpnpeers(string name, ApplianceVpnThirdPartyVpnpeersArgs args, CustomResourceOptions? opts = null)
public ApplianceVpnThirdPartyVpnpeers(String name, ApplianceVpnThirdPartyVpnpeersArgs args)
public ApplianceVpnThirdPartyVpnpeers(String name, ApplianceVpnThirdPartyVpnpeersArgs args, CustomResourceOptions options)
type: meraki:organizations:ApplianceVpnThirdPartyVpnpeers
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args ApplianceVpnThirdPartyVpnpeersArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args ApplianceVpnThirdPartyVpnpeersArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args ApplianceVpnThirdPartyVpnpeersArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args ApplianceVpnThirdPartyVpnpeersArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args ApplianceVpnThirdPartyVpnpeersArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var applianceVpnThirdPartyVpnpeersResource = new Meraki.Organizations.ApplianceVpnThirdPartyVpnpeers("applianceVpnThirdPartyVpnpeersResource", new()
{
OrganizationId = "string",
Peers = new[]
{
new Meraki.Organizations.Inputs.ApplianceVpnThirdPartyVpnpeersPeerArgs
{
IkeVersion = "string",
IpsecPolicies = new Meraki.Organizations.Inputs.ApplianceVpnThirdPartyVpnpeersPeerIpsecPoliciesArgs
{
ChildAuthAlgos = new[]
{
"string",
},
ChildCipherAlgos = new[]
{
"string",
},
ChildLifetime = 0,
ChildPfsGroups = new[]
{
"string",
},
IkeAuthAlgos = new[]
{
"string",
},
IkeCipherAlgos = new[]
{
"string",
},
IkeDiffieHellmanGroups = new[]
{
"string",
},
IkeLifetime = 0,
IkePrfAlgos = new[]
{
"string",
},
},
IpsecPoliciesPreset = "string",
LocalId = "string",
Name = "string",
NetworkTags = new[]
{
"string",
},
PrivateSubnets = new[]
{
"string",
},
PublicIp = "string",
RemoteId = "string",
Secret = "string",
},
},
});
example, err := organizations.NewApplianceVpnThirdPartyVpnpeers(ctx, "applianceVpnThirdPartyVpnpeersResource", &organizations.ApplianceVpnThirdPartyVpnpeersArgs{
OrganizationId: pulumi.String("string"),
Peers: organizations.ApplianceVpnThirdPartyVpnpeersPeerArray{
&organizations.ApplianceVpnThirdPartyVpnpeersPeerArgs{
IkeVersion: pulumi.String("string"),
IpsecPolicies: &organizations.ApplianceVpnThirdPartyVpnpeersPeerIpsecPoliciesArgs{
ChildAuthAlgos: pulumi.StringArray{
pulumi.String("string"),
},
ChildCipherAlgos: pulumi.StringArray{
pulumi.String("string"),
},
ChildLifetime: pulumi.Int(0),
ChildPfsGroups: pulumi.StringArray{
pulumi.String("string"),
},
IkeAuthAlgos: pulumi.StringArray{
pulumi.String("string"),
},
IkeCipherAlgos: pulumi.StringArray{
pulumi.String("string"),
},
IkeDiffieHellmanGroups: pulumi.StringArray{
pulumi.String("string"),
},
IkeLifetime: pulumi.Int(0),
IkePrfAlgos: pulumi.StringArray{
pulumi.String("string"),
},
},
IpsecPoliciesPreset: pulumi.String("string"),
LocalId: pulumi.String("string"),
Name: pulumi.String("string"),
NetworkTags: pulumi.StringArray{
pulumi.String("string"),
},
PrivateSubnets: pulumi.StringArray{
pulumi.String("string"),
},
PublicIp: pulumi.String("string"),
RemoteId: pulumi.String("string"),
Secret: pulumi.String("string"),
},
},
})
var applianceVpnThirdPartyVpnpeersResource = new ApplianceVpnThirdPartyVpnpeers("applianceVpnThirdPartyVpnpeersResource", ApplianceVpnThirdPartyVpnpeersArgs.builder()
.organizationId("string")
.peers(ApplianceVpnThirdPartyVpnpeersPeerArgs.builder()
.ikeVersion("string")
.ipsecPolicies(ApplianceVpnThirdPartyVpnpeersPeerIpsecPoliciesArgs.builder()
.childAuthAlgos("string")
.childCipherAlgos("string")
.childLifetime(0)
.childPfsGroups("string")
.ikeAuthAlgos("string")
.ikeCipherAlgos("string")
.ikeDiffieHellmanGroups("string")
.ikeLifetime(0)
.ikePrfAlgos("string")
.build())
.ipsecPoliciesPreset("string")
.localId("string")
.name("string")
.networkTags("string")
.privateSubnets("string")
.publicIp("string")
.remoteId("string")
.secret("string")
.build())
.build());
appliance_vpn_third_party_vpnpeers_resource = meraki.organizations.ApplianceVpnThirdPartyVpnpeers("applianceVpnThirdPartyVpnpeersResource",
organization_id="string",
peers=[{
"ike_version": "string",
"ipsec_policies": {
"child_auth_algos": ["string"],
"child_cipher_algos": ["string"],
"child_lifetime": 0,
"child_pfs_groups": ["string"],
"ike_auth_algos": ["string"],
"ike_cipher_algos": ["string"],
"ike_diffie_hellman_groups": ["string"],
"ike_lifetime": 0,
"ike_prf_algos": ["string"],
},
"ipsec_policies_preset": "string",
"local_id": "string",
"name": "string",
"network_tags": ["string"],
"private_subnets": ["string"],
"public_ip": "string",
"remote_id": "string",
"secret": "string",
}])
const applianceVpnThirdPartyVpnpeersResource = new meraki.organizations.ApplianceVpnThirdPartyVpnpeers("applianceVpnThirdPartyVpnpeersResource", {
organizationId: "string",
peers: [{
ikeVersion: "string",
ipsecPolicies: {
childAuthAlgos: ["string"],
childCipherAlgos: ["string"],
childLifetime: 0,
childPfsGroups: ["string"],
ikeAuthAlgos: ["string"],
ikeCipherAlgos: ["string"],
ikeDiffieHellmanGroups: ["string"],
ikeLifetime: 0,
ikePrfAlgos: ["string"],
},
ipsecPoliciesPreset: "string",
localId: "string",
name: "string",
networkTags: ["string"],
privateSubnets: ["string"],
publicIp: "string",
remoteId: "string",
secret: "string",
}],
});
type: meraki:organizations:ApplianceVpnThirdPartyVpnpeers
properties:
organizationId: string
peers:
- ikeVersion: string
ipsecPolicies:
childAuthAlgos:
- string
childCipherAlgos:
- string
childLifetime: 0
childPfsGroups:
- string
ikeAuthAlgos:
- string
ikeCipherAlgos:
- string
ikeDiffieHellmanGroups:
- string
ikeLifetime: 0
ikePrfAlgos:
- string
ipsecPoliciesPreset: string
localId: string
name: string
networkTags:
- string
privateSubnets:
- string
publicIp: string
remoteId: string
secret: string
ApplianceVpnThirdPartyVpnpeers Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The ApplianceVpnThirdPartyVpnpeers resource accepts the following input properties:
- Organization
Id string - organizationId path parameter. Organization ID
- Peers
List<Appliance
Vpn Third Party Vpnpeers Peer> - The list of VPN peers
- Organization
Id string - organizationId path parameter. Organization ID
- Peers
[]Appliance
Vpn Third Party Vpnpeers Peer Args - The list of VPN peers
- organization
Id String - organizationId path parameter. Organization ID
- peers
List<Appliance
Vpn Third Party Vpnpeers Peer> - The list of VPN peers
- organization
Id string - organizationId path parameter. Organization ID
- peers
Appliance
Vpn Third Party Vpnpeers Peer[] - The list of VPN peers
- organization_
id str - organizationId path parameter. Organization ID
- peers
Sequence[Appliance
Vpn Third Party Vpnpeers Peer Args] - The list of VPN peers
- organization
Id String - organizationId path parameter. Organization ID
- peers List<Property Map>
- The list of VPN peers
Outputs
All input properties are implicitly available as output properties. Additionally, the ApplianceVpnThirdPartyVpnpeers resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- Peers
Responses List<ApplianceVpn Third Party Vpnpeers Peers Response> - The list of VPN peers
- Id string
- The provider-assigned unique ID for this managed resource.
- Peers
Responses []ApplianceVpn Third Party Vpnpeers Peers Response - The list of VPN peers
- id String
- The provider-assigned unique ID for this managed resource.
- peers
Responses List<ApplianceVpn Third Party Vpnpeers Peers Response> - The list of VPN peers
- id string
- The provider-assigned unique ID for this managed resource.
- peers
Responses ApplianceVpn Third Party Vpnpeers Peers Response[] - The list of VPN peers
- id str
- The provider-assigned unique ID for this managed resource.
- peers_
responses Sequence[ApplianceVpn Third Party Vpnpeers Peers Response] - The list of VPN peers
- id String
- The provider-assigned unique ID for this managed resource.
- peers
Responses List<Property Map> - The list of VPN peers
Look up Existing ApplianceVpnThirdPartyVpnpeers Resource
Get an existing ApplianceVpnThirdPartyVpnpeers resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: ApplianceVpnThirdPartyVpnpeersState, opts?: CustomResourceOptions): ApplianceVpnThirdPartyVpnpeers
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
organization_id: Optional[str] = None,
peers: Optional[Sequence[ApplianceVpnThirdPartyVpnpeersPeerArgs]] = None,
peers_responses: Optional[Sequence[ApplianceVpnThirdPartyVpnpeersPeersResponseArgs]] = None) -> ApplianceVpnThirdPartyVpnpeers
func GetApplianceVpnThirdPartyVpnpeers(ctx *Context, name string, id IDInput, state *ApplianceVpnThirdPartyVpnpeersState, opts ...ResourceOption) (*ApplianceVpnThirdPartyVpnpeers, error)
public static ApplianceVpnThirdPartyVpnpeers Get(string name, Input<string> id, ApplianceVpnThirdPartyVpnpeersState? state, CustomResourceOptions? opts = null)
public static ApplianceVpnThirdPartyVpnpeers get(String name, Output<String> id, ApplianceVpnThirdPartyVpnpeersState state, CustomResourceOptions options)
Resource lookup is not supported in YAML
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Organization
Id string - organizationId path parameter. Organization ID
- Peers
List<Appliance
Vpn Third Party Vpnpeers Peer> - The list of VPN peers
- Peers
Responses List<ApplianceVpn Third Party Vpnpeers Peers Response> - The list of VPN peers
- Organization
Id string - organizationId path parameter. Organization ID
- Peers
[]Appliance
Vpn Third Party Vpnpeers Peer Args - The list of VPN peers
- Peers
Responses []ApplianceVpn Third Party Vpnpeers Peers Response Args - The list of VPN peers
- organization
Id String - organizationId path parameter. Organization ID
- peers
List<Appliance
Vpn Third Party Vpnpeers Peer> - The list of VPN peers
- peers
Responses List<ApplianceVpn Third Party Vpnpeers Peers Response> - The list of VPN peers
- organization
Id string - organizationId path parameter. Organization ID
- peers
Appliance
Vpn Third Party Vpnpeers Peer[] - The list of VPN peers
- peers
Responses ApplianceVpn Third Party Vpnpeers Peers Response[] - The list of VPN peers
- organization_
id str - organizationId path parameter. Organization ID
- peers
Sequence[Appliance
Vpn Third Party Vpnpeers Peer Args] - The list of VPN peers
- peers_
responses Sequence[ApplianceVpn Third Party Vpnpeers Peers Response Args] - The list of VPN peers
- organization
Id String - organizationId path parameter. Organization ID
- peers List<Property Map>
- The list of VPN peers
- peers
Responses List<Property Map> - The list of VPN peers
Supporting Types
ApplianceVpnThirdPartyVpnpeersPeer, ApplianceVpnThirdPartyVpnpeersPeerArgs
- Ike
Version string - [optional] The IKE version to be used for the IPsec VPN peer configuration. Defaults to '1' when omitted.
- Ipsec
Policies ApplianceVpn Third Party Vpnpeers Peer Ipsec Policies - Custom IPSec policies for the VPN peer. If not included and a preset has not been chosen, the default preset for IPSec policies will be used.
- Ipsec
Policies stringPreset - One of the following available presets: 'default', 'aws', 'azure'. If this is provided, the 'ipsecPolicies' parameter is ignored.
- Local
Id string - [optional] The local ID is used to identify the MX to the peer. This will apply to all MXs this peer applies to.
- Name string
- The name of the VPN peer
- List<string>
- A list of network tags that will connect with this peer. Use ['all'] for all networks. Use ['none'] for no networks. If not included, the default is ['all'].
- Private
Subnets List<string> - The list of the private subnets of the VPN peer
- Public
Ip string - [optional] The public IP of the VPN peer
- Remote
Id string - [optional] The remote ID is used to identify the connecting VPN peer. This can either be a valid IPv4 Address, FQDN or User FQDN.
- Secret string
- The shared secret with the VPN peer
- Ike
Version string - [optional] The IKE version to be used for the IPsec VPN peer configuration. Defaults to '1' when omitted.
- Ipsec
Policies ApplianceVpn Third Party Vpnpeers Peer Ipsec Policies - Custom IPSec policies for the VPN peer. If not included and a preset has not been chosen, the default preset for IPSec policies will be used.
- Ipsec
Policies stringPreset - One of the following available presets: 'default', 'aws', 'azure'. If this is provided, the 'ipsecPolicies' parameter is ignored.
- Local
Id string - [optional] The local ID is used to identify the MX to the peer. This will apply to all MXs this peer applies to.
- Name string
- The name of the VPN peer
- []string
- A list of network tags that will connect with this peer. Use ['all'] for all networks. Use ['none'] for no networks. If not included, the default is ['all'].
- Private
Subnets []string - The list of the private subnets of the VPN peer
- Public
Ip string - [optional] The public IP of the VPN peer
- Remote
Id string - [optional] The remote ID is used to identify the connecting VPN peer. This can either be a valid IPv4 Address, FQDN or User FQDN.
- Secret string
- The shared secret with the VPN peer
- ike
Version String - [optional] The IKE version to be used for the IPsec VPN peer configuration. Defaults to '1' when omitted.
- ipsec
Policies ApplianceVpn Third Party Vpnpeers Peer Ipsec Policies - Custom IPSec policies for the VPN peer. If not included and a preset has not been chosen, the default preset for IPSec policies will be used.
- ipsec
Policies StringPreset - One of the following available presets: 'default', 'aws', 'azure'. If this is provided, the 'ipsecPolicies' parameter is ignored.
- local
Id String - [optional] The local ID is used to identify the MX to the peer. This will apply to all MXs this peer applies to.
- name String
- The name of the VPN peer
- List<String>
- A list of network tags that will connect with this peer. Use ['all'] for all networks. Use ['none'] for no networks. If not included, the default is ['all'].
- private
Subnets List<String> - The list of the private subnets of the VPN peer
- public
Ip String - [optional] The public IP of the VPN peer
- remote
Id String - [optional] The remote ID is used to identify the connecting VPN peer. This can either be a valid IPv4 Address, FQDN or User FQDN.
- secret String
- The shared secret with the VPN peer
- ike
Version string - [optional] The IKE version to be used for the IPsec VPN peer configuration. Defaults to '1' when omitted.
- ipsec
Policies ApplianceVpn Third Party Vpnpeers Peer Ipsec Policies - Custom IPSec policies for the VPN peer. If not included and a preset has not been chosen, the default preset for IPSec policies will be used.
- ipsec
Policies stringPreset - One of the following available presets: 'default', 'aws', 'azure'. If this is provided, the 'ipsecPolicies' parameter is ignored.
- local
Id string - [optional] The local ID is used to identify the MX to the peer. This will apply to all MXs this peer applies to.
- name string
- The name of the VPN peer
- string[]
- A list of network tags that will connect with this peer. Use ['all'] for all networks. Use ['none'] for no networks. If not included, the default is ['all'].
- private
Subnets string[] - The list of the private subnets of the VPN peer
- public
Ip string - [optional] The public IP of the VPN peer
- remote
Id string - [optional] The remote ID is used to identify the connecting VPN peer. This can either be a valid IPv4 Address, FQDN or User FQDN.
- secret string
- The shared secret with the VPN peer
- ike_
version str - [optional] The IKE version to be used for the IPsec VPN peer configuration. Defaults to '1' when omitted.
- ipsec_
policies ApplianceVpn Third Party Vpnpeers Peer Ipsec Policies - Custom IPSec policies for the VPN peer. If not included and a preset has not been chosen, the default preset for IPSec policies will be used.
- ipsec_
policies_ strpreset - One of the following available presets: 'default', 'aws', 'azure'. If this is provided, the 'ipsecPolicies' parameter is ignored.
- local_
id str - [optional] The local ID is used to identify the MX to the peer. This will apply to all MXs this peer applies to.
- name str
- The name of the VPN peer
- Sequence[str]
- A list of network tags that will connect with this peer. Use ['all'] for all networks. Use ['none'] for no networks. If not included, the default is ['all'].
- private_
subnets Sequence[str] - The list of the private subnets of the VPN peer
- public_
ip str - [optional] The public IP of the VPN peer
- remote_
id str - [optional] The remote ID is used to identify the connecting VPN peer. This can either be a valid IPv4 Address, FQDN or User FQDN.
- secret str
- The shared secret with the VPN peer
- ike
Version String - [optional] The IKE version to be used for the IPsec VPN peer configuration. Defaults to '1' when omitted.
- ipsec
Policies Property Map - Custom IPSec policies for the VPN peer. If not included and a preset has not been chosen, the default preset for IPSec policies will be used.
- ipsec
Policies StringPreset - One of the following available presets: 'default', 'aws', 'azure'. If this is provided, the 'ipsecPolicies' parameter is ignored.
- local
Id String - [optional] The local ID is used to identify the MX to the peer. This will apply to all MXs this peer applies to.
- name String
- The name of the VPN peer
- List<String>
- A list of network tags that will connect with this peer. Use ['all'] for all networks. Use ['none'] for no networks. If not included, the default is ['all'].
- private
Subnets List<String> - The list of the private subnets of the VPN peer
- public
Ip String - [optional] The public IP of the VPN peer
- remote
Id String - [optional] The remote ID is used to identify the connecting VPN peer. This can either be a valid IPv4 Address, FQDN or User FQDN.
- secret String
- The shared secret with the VPN peer
ApplianceVpnThirdPartyVpnpeersPeerIpsecPolicies, ApplianceVpnThirdPartyVpnpeersPeerIpsecPoliciesArgs
- Child
Auth List<string>Algos - This is the authentication algorithms to be used in Phase 2. The value should be an array with one of the following algorithms: 'sha256', 'sha1', 'md5'
- Child
Cipher List<string>Algos - This is the cipher algorithms to be used in Phase 2. The value should be an array with one or more of the following algorithms: 'aes256', 'aes192', 'aes128', 'tripledes', 'des', 'null'
- Child
Lifetime int - The lifetime of the Phase 2 SA in seconds.
- Child
Pfs List<string>Groups - This is the Diffie-Hellman group to be used for Perfect Forward Secrecy in Phase 2. The value should be an array with one of the following values: 'disabled','group14', 'group5', 'group2', 'group1'
- Ike
Auth List<string>Algos - This is the authentication algorithm to be used in Phase 1. The value should be an array with one of the following algorithms: 'sha256', 'sha1', 'md5'
- Ike
Cipher List<string>Algos - This is the cipher algorithm to be used in Phase 1. The value should be an array with one of the following algorithms: 'aes256', 'aes192', 'aes128', 'tripledes', 'des'
- Ike
Diffie List<string>Hellman Groups - This is the Diffie-Hellman group to be used in Phase 1. The value should be an array with one of the following algorithms: 'group14', 'group5', 'group2', 'group1'
- Ike
Lifetime int - The lifetime of the Phase 1 SA in seconds.
- Ike
Prf List<string>Algos - [optional] This is the pseudo-random function to be used in IKE_SA. The value should be an array with one of the following algorithms: 'prfsha256', 'prfsha1', 'prfmd5', 'default'. The 'default' option can be used to default to the Authentication algorithm.
- Child
Auth []stringAlgos - This is the authentication algorithms to be used in Phase 2. The value should be an array with one of the following algorithms: 'sha256', 'sha1', 'md5'
- Child
Cipher []stringAlgos - This is the cipher algorithms to be used in Phase 2. The value should be an array with one or more of the following algorithms: 'aes256', 'aes192', 'aes128', 'tripledes', 'des', 'null'
- Child
Lifetime int - The lifetime of the Phase 2 SA in seconds.
- Child
Pfs []stringGroups - This is the Diffie-Hellman group to be used for Perfect Forward Secrecy in Phase 2. The value should be an array with one of the following values: 'disabled','group14', 'group5', 'group2', 'group1'
- Ike
Auth []stringAlgos - This is the authentication algorithm to be used in Phase 1. The value should be an array with one of the following algorithms: 'sha256', 'sha1', 'md5'
- Ike
Cipher []stringAlgos - This is the cipher algorithm to be used in Phase 1. The value should be an array with one of the following algorithms: 'aes256', 'aes192', 'aes128', 'tripledes', 'des'
- Ike
Diffie []stringHellman Groups - This is the Diffie-Hellman group to be used in Phase 1. The value should be an array with one of the following algorithms: 'group14', 'group5', 'group2', 'group1'
- Ike
Lifetime int - The lifetime of the Phase 1 SA in seconds.
- Ike
Prf []stringAlgos - [optional] This is the pseudo-random function to be used in IKE_SA. The value should be an array with one of the following algorithms: 'prfsha256', 'prfsha1', 'prfmd5', 'default'. The 'default' option can be used to default to the Authentication algorithm.
- child
Auth List<String>Algos - This is the authentication algorithms to be used in Phase 2. The value should be an array with one of the following algorithms: 'sha256', 'sha1', 'md5'
- child
Cipher List<String>Algos - This is the cipher algorithms to be used in Phase 2. The value should be an array with one or more of the following algorithms: 'aes256', 'aes192', 'aes128', 'tripledes', 'des', 'null'
- child
Lifetime Integer - The lifetime of the Phase 2 SA in seconds.
- child
Pfs List<String>Groups - This is the Diffie-Hellman group to be used for Perfect Forward Secrecy in Phase 2. The value should be an array with one of the following values: 'disabled','group14', 'group5', 'group2', 'group1'
- ike
Auth List<String>Algos - This is the authentication algorithm to be used in Phase 1. The value should be an array with one of the following algorithms: 'sha256', 'sha1', 'md5'
- ike
Cipher List<String>Algos - This is the cipher algorithm to be used in Phase 1. The value should be an array with one of the following algorithms: 'aes256', 'aes192', 'aes128', 'tripledes', 'des'
- ike
Diffie List<String>Hellman Groups - This is the Diffie-Hellman group to be used in Phase 1. The value should be an array with one of the following algorithms: 'group14', 'group5', 'group2', 'group1'
- ike
Lifetime Integer - The lifetime of the Phase 1 SA in seconds.
- ike
Prf List<String>Algos - [optional] This is the pseudo-random function to be used in IKE_SA. The value should be an array with one of the following algorithms: 'prfsha256', 'prfsha1', 'prfmd5', 'default'. The 'default' option can be used to default to the Authentication algorithm.
- child
Auth string[]Algos - This is the authentication algorithms to be used in Phase 2. The value should be an array with one of the following algorithms: 'sha256', 'sha1', 'md5'
- child
Cipher string[]Algos - This is the cipher algorithms to be used in Phase 2. The value should be an array with one or more of the following algorithms: 'aes256', 'aes192', 'aes128', 'tripledes', 'des', 'null'
- child
Lifetime number - The lifetime of the Phase 2 SA in seconds.
- child
Pfs string[]Groups - This is the Diffie-Hellman group to be used for Perfect Forward Secrecy in Phase 2. The value should be an array with one of the following values: 'disabled','group14', 'group5', 'group2', 'group1'
- ike
Auth string[]Algos - This is the authentication algorithm to be used in Phase 1. The value should be an array with one of the following algorithms: 'sha256', 'sha1', 'md5'
- ike
Cipher string[]Algos - This is the cipher algorithm to be used in Phase 1. The value should be an array with one of the following algorithms: 'aes256', 'aes192', 'aes128', 'tripledes', 'des'
- ike
Diffie string[]Hellman Groups - This is the Diffie-Hellman group to be used in Phase 1. The value should be an array with one of the following algorithms: 'group14', 'group5', 'group2', 'group1'
- ike
Lifetime number - The lifetime of the Phase 1 SA in seconds.
- ike
Prf string[]Algos - [optional] This is the pseudo-random function to be used in IKE_SA. The value should be an array with one of the following algorithms: 'prfsha256', 'prfsha1', 'prfmd5', 'default'. The 'default' option can be used to default to the Authentication algorithm.
- child_
auth_ Sequence[str]algos - This is the authentication algorithms to be used in Phase 2. The value should be an array with one of the following algorithms: 'sha256', 'sha1', 'md5'
- child_
cipher_ Sequence[str]algos - This is the cipher algorithms to be used in Phase 2. The value should be an array with one or more of the following algorithms: 'aes256', 'aes192', 'aes128', 'tripledes', 'des', 'null'
- child_
lifetime int - The lifetime of the Phase 2 SA in seconds.
- child_
pfs_ Sequence[str]groups - This is the Diffie-Hellman group to be used for Perfect Forward Secrecy in Phase 2. The value should be an array with one of the following values: 'disabled','group14', 'group5', 'group2', 'group1'
- ike_
auth_ Sequence[str]algos - This is the authentication algorithm to be used in Phase 1. The value should be an array with one of the following algorithms: 'sha256', 'sha1', 'md5'
- ike_
cipher_ Sequence[str]algos - This is the cipher algorithm to be used in Phase 1. The value should be an array with one of the following algorithms: 'aes256', 'aes192', 'aes128', 'tripledes', 'des'
- ike_
diffie_ Sequence[str]hellman_ groups - This is the Diffie-Hellman group to be used in Phase 1. The value should be an array with one of the following algorithms: 'group14', 'group5', 'group2', 'group1'
- ike_
lifetime int - The lifetime of the Phase 1 SA in seconds.
- ike_
prf_ Sequence[str]algos - [optional] This is the pseudo-random function to be used in IKE_SA. The value should be an array with one of the following algorithms: 'prfsha256', 'prfsha1', 'prfmd5', 'default'. The 'default' option can be used to default to the Authentication algorithm.
- child
Auth List<String>Algos - This is the authentication algorithms to be used in Phase 2. The value should be an array with one of the following algorithms: 'sha256', 'sha1', 'md5'
- child
Cipher List<String>Algos - This is the cipher algorithms to be used in Phase 2. The value should be an array with one or more of the following algorithms: 'aes256', 'aes192', 'aes128', 'tripledes', 'des', 'null'
- child
Lifetime Number - The lifetime of the Phase 2 SA in seconds.
- child
Pfs List<String>Groups - This is the Diffie-Hellman group to be used for Perfect Forward Secrecy in Phase 2. The value should be an array with one of the following values: 'disabled','group14', 'group5', 'group2', 'group1'
- ike
Auth List<String>Algos - This is the authentication algorithm to be used in Phase 1. The value should be an array with one of the following algorithms: 'sha256', 'sha1', 'md5'
- ike
Cipher List<String>Algos - This is the cipher algorithm to be used in Phase 1. The value should be an array with one of the following algorithms: 'aes256', 'aes192', 'aes128', 'tripledes', 'des'
- ike
Diffie List<String>Hellman Groups - This is the Diffie-Hellman group to be used in Phase 1. The value should be an array with one of the following algorithms: 'group14', 'group5', 'group2', 'group1'
- ike
Lifetime Number - The lifetime of the Phase 1 SA in seconds.
- ike
Prf List<String>Algos - [optional] This is the pseudo-random function to be used in IKE_SA. The value should be an array with one of the following algorithms: 'prfsha256', 'prfsha1', 'prfmd5', 'default'. The 'default' option can be used to default to the Authentication algorithm.
ApplianceVpnThirdPartyVpnpeersPeersResponse, ApplianceVpnThirdPartyVpnpeersPeersResponseArgs
- Ike
Version string - [optional] The IKE version to be used for the IPsec VPN peer configuration. Defaults to '1' when omitted.
- Ipsec
Policies ApplianceVpn Third Party Vpnpeers Peers Response Ipsec Policies - Custom IPSec policies for the VPN peer. If not included and a preset has not been chosen, the default preset for IPSec policies will be used.
- Ipsec
Policies stringPreset - One of the following available presets: 'default', 'aws', 'azure'. If this is provided, the 'ipsecPolicies' parameter is ignored.
- Local
Id string - [optional] The local ID is used to identify the MX to the peer. This will apply to all MXs this peer applies to.
- Name string
- The name of the VPN peer
- List<string>
- A list of network tags that will connect with this peer. Use ['all'] for all networks. Use ['none'] for no networks. If not included, the default is ['all'].
- Private
Subnets List<string> - The list of the private subnets of the VPN peer
- Public
Ip string - [optional] The public IP of the VPN peer
- Remote
Id string - [optional] The remote ID is used to identify the connecting VPN peer. This can either be a valid IPv4 Address, FQDN or User FQDN.
- Secret string
- The shared secret with the VPN peer
- Ike
Version string - [optional] The IKE version to be used for the IPsec VPN peer configuration. Defaults to '1' when omitted.
- Ipsec
Policies ApplianceVpn Third Party Vpnpeers Peers Response Ipsec Policies - Custom IPSec policies for the VPN peer. If not included and a preset has not been chosen, the default preset for IPSec policies will be used.
- Ipsec
Policies stringPreset - One of the following available presets: 'default', 'aws', 'azure'. If this is provided, the 'ipsecPolicies' parameter is ignored.
- Local
Id string - [optional] The local ID is used to identify the MX to the peer. This will apply to all MXs this peer applies to.
- Name string
- The name of the VPN peer
- []string
- A list of network tags that will connect with this peer. Use ['all'] for all networks. Use ['none'] for no networks. If not included, the default is ['all'].
- Private
Subnets []string - The list of the private subnets of the VPN peer
- Public
Ip string - [optional] The public IP of the VPN peer
- Remote
Id string - [optional] The remote ID is used to identify the connecting VPN peer. This can either be a valid IPv4 Address, FQDN or User FQDN.
- Secret string
- The shared secret with the VPN peer
- ike
Version String - [optional] The IKE version to be used for the IPsec VPN peer configuration. Defaults to '1' when omitted.
- ipsec
Policies ApplianceVpn Third Party Vpnpeers Peers Response Ipsec Policies - Custom IPSec policies for the VPN peer. If not included and a preset has not been chosen, the default preset for IPSec policies will be used.
- ipsec
Policies StringPreset - One of the following available presets: 'default', 'aws', 'azure'. If this is provided, the 'ipsecPolicies' parameter is ignored.
- local
Id String - [optional] The local ID is used to identify the MX to the peer. This will apply to all MXs this peer applies to.
- name String
- The name of the VPN peer
- List<String>
- A list of network tags that will connect with this peer. Use ['all'] for all networks. Use ['none'] for no networks. If not included, the default is ['all'].
- private
Subnets List<String> - The list of the private subnets of the VPN peer
- public
Ip String - [optional] The public IP of the VPN peer
- remote
Id String - [optional] The remote ID is used to identify the connecting VPN peer. This can either be a valid IPv4 Address, FQDN or User FQDN.
- secret String
- The shared secret with the VPN peer
- ike
Version string - [optional] The IKE version to be used for the IPsec VPN peer configuration. Defaults to '1' when omitted.
- ipsec
Policies ApplianceVpn Third Party Vpnpeers Peers Response Ipsec Policies - Custom IPSec policies for the VPN peer. If not included and a preset has not been chosen, the default preset for IPSec policies will be used.
- ipsec
Policies stringPreset - One of the following available presets: 'default', 'aws', 'azure'. If this is provided, the 'ipsecPolicies' parameter is ignored.
- local
Id string - [optional] The local ID is used to identify the MX to the peer. This will apply to all MXs this peer applies to.
- name string
- The name of the VPN peer
- string[]
- A list of network tags that will connect with this peer. Use ['all'] for all networks. Use ['none'] for no networks. If not included, the default is ['all'].
- private
Subnets string[] - The list of the private subnets of the VPN peer
- public
Ip string - [optional] The public IP of the VPN peer
- remote
Id string - [optional] The remote ID is used to identify the connecting VPN peer. This can either be a valid IPv4 Address, FQDN or User FQDN.
- secret string
- The shared secret with the VPN peer
- ike_
version str - [optional] The IKE version to be used for the IPsec VPN peer configuration. Defaults to '1' when omitted.
- ipsec_
policies ApplianceVpn Third Party Vpnpeers Peers Response Ipsec Policies - Custom IPSec policies for the VPN peer. If not included and a preset has not been chosen, the default preset for IPSec policies will be used.
- ipsec_
policies_ strpreset - One of the following available presets: 'default', 'aws', 'azure'. If this is provided, the 'ipsecPolicies' parameter is ignored.
- local_
id str - [optional] The local ID is used to identify the MX to the peer. This will apply to all MXs this peer applies to.
- name str
- The name of the VPN peer
- Sequence[str]
- A list of network tags that will connect with this peer. Use ['all'] for all networks. Use ['none'] for no networks. If not included, the default is ['all'].
- private_
subnets Sequence[str] - The list of the private subnets of the VPN peer
- public_
ip str - [optional] The public IP of the VPN peer
- remote_
id str - [optional] The remote ID is used to identify the connecting VPN peer. This can either be a valid IPv4 Address, FQDN or User FQDN.
- secret str
- The shared secret with the VPN peer
- ike
Version String - [optional] The IKE version to be used for the IPsec VPN peer configuration. Defaults to '1' when omitted.
- ipsec
Policies Property Map - Custom IPSec policies for the VPN peer. If not included and a preset has not been chosen, the default preset for IPSec policies will be used.
- ipsec
Policies StringPreset - One of the following available presets: 'default', 'aws', 'azure'. If this is provided, the 'ipsecPolicies' parameter is ignored.
- local
Id String - [optional] The local ID is used to identify the MX to the peer. This will apply to all MXs this peer applies to.
- name String
- The name of the VPN peer
- List<String>
- A list of network tags that will connect with this peer. Use ['all'] for all networks. Use ['none'] for no networks. If not included, the default is ['all'].
- private
Subnets List<String> - The list of the private subnets of the VPN peer
- public
Ip String - [optional] The public IP of the VPN peer
- remote
Id String - [optional] The remote ID is used to identify the connecting VPN peer. This can either be a valid IPv4 Address, FQDN or User FQDN.
- secret String
- The shared secret with the VPN peer
ApplianceVpnThirdPartyVpnpeersPeersResponseIpsecPolicies, ApplianceVpnThirdPartyVpnpeersPeersResponseIpsecPoliciesArgs
- Child
Auth List<string>Algos - This is the authentication algorithms to be used in Phase 2. The value should be an array with one of the following algorithms: 'sha256', 'sha1', 'md5'
- Child
Cipher List<string>Algos - This is the cipher algorithms to be used in Phase 2. The value should be an array with one or more of the following algorithms: 'aes256', 'aes192', 'aes128', 'tripledes', 'des', 'null'
- Child
Lifetime int - The lifetime of the Phase 2 SA in seconds.
- Child
Pfs List<string>Groups - This is the Diffie-Hellman group to be used for Perfect Forward Secrecy in Phase 2. The value should be an array with one of the following values: 'disabled','group14', 'group5', 'group2', 'group1'
- Ike
Auth List<string>Algos - This is the authentication algorithm to be used in Phase 1. The value should be an array with one of the following algorithms: 'sha256', 'sha1', 'md5'
- Ike
Cipher List<string>Algos - This is the cipher algorithm to be used in Phase 1. The value should be an array with one of the following algorithms: 'aes256', 'aes192', 'aes128', 'tripledes', 'des'
- Ike
Diffie List<string>Hellman Groups - This is the Diffie-Hellman group to be used in Phase 1. The value should be an array with one of the following algorithms: 'group14', 'group5', 'group2', 'group1'
- Ike
Lifetime int - The lifetime of the Phase 1 SA in seconds.
- Ike
Prf List<string>Algos - [optional] This is the pseudo-random function to be used in IKE_SA. The value should be an array with one of the following algorithms: 'prfsha256', 'prfsha1', 'prfmd5', 'default'. The 'default' option can be used to default to the Authentication algorithm.
- Child
Auth []stringAlgos - This is the authentication algorithms to be used in Phase 2. The value should be an array with one of the following algorithms: 'sha256', 'sha1', 'md5'
- Child
Cipher []stringAlgos - This is the cipher algorithms to be used in Phase 2. The value should be an array with one or more of the following algorithms: 'aes256', 'aes192', 'aes128', 'tripledes', 'des', 'null'
- Child
Lifetime int - The lifetime of the Phase 2 SA in seconds.
- Child
Pfs []stringGroups - This is the Diffie-Hellman group to be used for Perfect Forward Secrecy in Phase 2. The value should be an array with one of the following values: 'disabled','group14', 'group5', 'group2', 'group1'
- Ike
Auth []stringAlgos - This is the authentication algorithm to be used in Phase 1. The value should be an array with one of the following algorithms: 'sha256', 'sha1', 'md5'
- Ike
Cipher []stringAlgos - This is the cipher algorithm to be used in Phase 1. The value should be an array with one of the following algorithms: 'aes256', 'aes192', 'aes128', 'tripledes', 'des'
- Ike
Diffie []stringHellman Groups - This is the Diffie-Hellman group to be used in Phase 1. The value should be an array with one of the following algorithms: 'group14', 'group5', 'group2', 'group1'
- Ike
Lifetime int - The lifetime of the Phase 1 SA in seconds.
- Ike
Prf []stringAlgos - [optional] This is the pseudo-random function to be used in IKE_SA. The value should be an array with one of the following algorithms: 'prfsha256', 'prfsha1', 'prfmd5', 'default'. The 'default' option can be used to default to the Authentication algorithm.
- child
Auth List<String>Algos - This is the authentication algorithms to be used in Phase 2. The value should be an array with one of the following algorithms: 'sha256', 'sha1', 'md5'
- child
Cipher List<String>Algos - This is the cipher algorithms to be used in Phase 2. The value should be an array with one or more of the following algorithms: 'aes256', 'aes192', 'aes128', 'tripledes', 'des', 'null'
- child
Lifetime Integer - The lifetime of the Phase 2 SA in seconds.
- child
Pfs List<String>Groups - This is the Diffie-Hellman group to be used for Perfect Forward Secrecy in Phase 2. The value should be an array with one of the following values: 'disabled','group14', 'group5', 'group2', 'group1'
- ike
Auth List<String>Algos - This is the authentication algorithm to be used in Phase 1. The value should be an array with one of the following algorithms: 'sha256', 'sha1', 'md5'
- ike
Cipher List<String>Algos - This is the cipher algorithm to be used in Phase 1. The value should be an array with one of the following algorithms: 'aes256', 'aes192', 'aes128', 'tripledes', 'des'
- ike
Diffie List<String>Hellman Groups - This is the Diffie-Hellman group to be used in Phase 1. The value should be an array with one of the following algorithms: 'group14', 'group5', 'group2', 'group1'
- ike
Lifetime Integer - The lifetime of the Phase 1 SA in seconds.
- ike
Prf List<String>Algos - [optional] This is the pseudo-random function to be used in IKE_SA. The value should be an array with one of the following algorithms: 'prfsha256', 'prfsha1', 'prfmd5', 'default'. The 'default' option can be used to default to the Authentication algorithm.
- child
Auth string[]Algos - This is the authentication algorithms to be used in Phase 2. The value should be an array with one of the following algorithms: 'sha256', 'sha1', 'md5'
- child
Cipher string[]Algos - This is the cipher algorithms to be used in Phase 2. The value should be an array with one or more of the following algorithms: 'aes256', 'aes192', 'aes128', 'tripledes', 'des', 'null'
- child
Lifetime number - The lifetime of the Phase 2 SA in seconds.
- child
Pfs string[]Groups - This is the Diffie-Hellman group to be used for Perfect Forward Secrecy in Phase 2. The value should be an array with one of the following values: 'disabled','group14', 'group5', 'group2', 'group1'
- ike
Auth string[]Algos - This is the authentication algorithm to be used in Phase 1. The value should be an array with one of the following algorithms: 'sha256', 'sha1', 'md5'
- ike
Cipher string[]Algos - This is the cipher algorithm to be used in Phase 1. The value should be an array with one of the following algorithms: 'aes256', 'aes192', 'aes128', 'tripledes', 'des'
- ike
Diffie string[]Hellman Groups - This is the Diffie-Hellman group to be used in Phase 1. The value should be an array with one of the following algorithms: 'group14', 'group5', 'group2', 'group1'
- ike
Lifetime number - The lifetime of the Phase 1 SA in seconds.
- ike
Prf string[]Algos - [optional] This is the pseudo-random function to be used in IKE_SA. The value should be an array with one of the following algorithms: 'prfsha256', 'prfsha1', 'prfmd5', 'default'. The 'default' option can be used to default to the Authentication algorithm.
- child_
auth_ Sequence[str]algos - This is the authentication algorithms to be used in Phase 2. The value should be an array with one of the following algorithms: 'sha256', 'sha1', 'md5'
- child_
cipher_ Sequence[str]algos - This is the cipher algorithms to be used in Phase 2. The value should be an array with one or more of the following algorithms: 'aes256', 'aes192', 'aes128', 'tripledes', 'des', 'null'
- child_
lifetime int - The lifetime of the Phase 2 SA in seconds.
- child_
pfs_ Sequence[str]groups - This is the Diffie-Hellman group to be used for Perfect Forward Secrecy in Phase 2. The value should be an array with one of the following values: 'disabled','group14', 'group5', 'group2', 'group1'
- ike_
auth_ Sequence[str]algos - This is the authentication algorithm to be used in Phase 1. The value should be an array with one of the following algorithms: 'sha256', 'sha1', 'md5'
- ike_
cipher_ Sequence[str]algos - This is the cipher algorithm to be used in Phase 1. The value should be an array with one of the following algorithms: 'aes256', 'aes192', 'aes128', 'tripledes', 'des'
- ike_
diffie_ Sequence[str]hellman_ groups - This is the Diffie-Hellman group to be used in Phase 1. The value should be an array with one of the following algorithms: 'group14', 'group5', 'group2', 'group1'
- ike_
lifetime int - The lifetime of the Phase 1 SA in seconds.
- ike_
prf_ Sequence[str]algos - [optional] This is the pseudo-random function to be used in IKE_SA. The value should be an array with one of the following algorithms: 'prfsha256', 'prfsha1', 'prfmd5', 'default'. The 'default' option can be used to default to the Authentication algorithm.
- child
Auth List<String>Algos - This is the authentication algorithms to be used in Phase 2. The value should be an array with one of the following algorithms: 'sha256', 'sha1', 'md5'
- child
Cipher List<String>Algos - This is the cipher algorithms to be used in Phase 2. The value should be an array with one or more of the following algorithms: 'aes256', 'aes192', 'aes128', 'tripledes', 'des', 'null'
- child
Lifetime Number - The lifetime of the Phase 2 SA in seconds.
- child
Pfs List<String>Groups - This is the Diffie-Hellman group to be used for Perfect Forward Secrecy in Phase 2. The value should be an array with one of the following values: 'disabled','group14', 'group5', 'group2', 'group1'
- ike
Auth List<String>Algos - This is the authentication algorithm to be used in Phase 1. The value should be an array with one of the following algorithms: 'sha256', 'sha1', 'md5'
- ike
Cipher List<String>Algos - This is the cipher algorithm to be used in Phase 1. The value should be an array with one of the following algorithms: 'aes256', 'aes192', 'aes128', 'tripledes', 'des'
- ike
Diffie List<String>Hellman Groups - This is the Diffie-Hellman group to be used in Phase 1. The value should be an array with one of the following algorithms: 'group14', 'group5', 'group2', 'group1'
- ike
Lifetime Number - The lifetime of the Phase 1 SA in seconds.
- ike
Prf List<String>Algos - [optional] This is the pseudo-random function to be used in IKE_SA. The value should be an array with one of the following algorithms: 'prfsha256', 'prfsha1', 'prfmd5', 'default'. The 'default' option can be used to default to the Authentication algorithm.
Import
$ pulumi import meraki:organizations/applianceVpnThirdPartyVpnpeers:ApplianceVpnThirdPartyVpnpeers example "organization_id"
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- meraki pulumi/pulumi-meraki
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
meraki
Terraform Provider.