@pulumiverse/fortios
Version:
A Pulumi package for creating and managing Fortios resources. Based on terraform-provider-fortios: version v1.16.0
273 lines (272 loc) • 11.1 kB
TypeScript
import * as pulumi from "@pulumi/pulumi";
import * as inputs from "../types/input";
import * as outputs from "../types/output";
/**
* Configure an aggregate of IPsec tunnels.
*
* ## Example Usage
*
* ```typescript
* import * as pulumi from "@pulumi/pulumi";
* import * as fortios from "@pulumiverse/fortios";
*
* const trname1Phase1interface = new fortios.vpn.ipsec.Phase1interface("trname1Phase1interface", {
* acctVerify: "disable",
* addGwRoute: "disable",
* addRoute: "enable",
* assignIp: "enable",
* assignIpFrom: "range",
* authmethod: "psk",
* autoDiscoveryForwarder: "disable",
* autoDiscoveryPsk: "disable",
* autoDiscoveryReceiver: "disable",
* autoDiscoverySender: "disable",
* autoNegotiate: "enable",
* certIdValidation: "enable",
* childlessIke: "disable",
* clientAutoNegotiate: "disable",
* clientKeepAlive: "disable",
* defaultGw: "0.0.0.0",
* defaultGwPriority: 0,
* dhgrp: "14 5",
* digitalSignatureAuth: "disable",
* distance: 15,
* dnsMode: "manual",
* dpd: "on-demand",
* dpdRetrycount: 3,
* dpdRetryinterval: "20",
* eap: "disable",
* eapIdentity: "use-id-payload",
* encapLocalGw4: "0.0.0.0",
* encapLocalGw6: "::",
* encapRemoteGw4: "0.0.0.0",
* encapRemoteGw6: "::",
* encapsulation: "none",
* encapsulationAddress: "ike",
* enforceUniqueId: "disable",
* exchangeInterfaceIp: "disable",
* exchangeIpAddr4: "0.0.0.0",
* exchangeIpAddr6: "::",
* forticlientEnforcement: "disable",
* fragmentation: "enable",
* fragmentationMtu: 1200,
* groupAuthentication: "disable",
* haSyncEspSeqno: "enable",
* idleTimeout: "disable",
* idleTimeoutinterval: 15,
* ikeVersion: "1",
* includeLocalLan: "disable",
* "interface": "port3",
* ipVersion: "4",
* ipv4DnsServer1: "0.0.0.0",
* ipv4DnsServer2: "0.0.0.0",
* ipv4DnsServer3: "0.0.0.0",
* ipv4EndIp: "0.0.0.0",
* ipv4Netmask: "255.255.255.255",
* ipv4StartIp: "0.0.0.0",
* ipv4WinsServer1: "0.0.0.0",
* ipv4WinsServer2: "0.0.0.0",
* ipv6DnsServer1: "::",
* ipv6DnsServer2: "::",
* ipv6DnsServer3: "::",
* ipv6EndIp: "::",
* ipv6Prefix: 128,
* ipv6StartIp: "::",
* keepalive: 10,
* keylife: 86400,
* localGw: "0.0.0.0",
* localGw6: "::",
* localidType: "auto",
* meshSelectorType: "disable",
* mode: "main",
* modeCfg: "disable",
* monitorHoldDownDelay: 0,
* monitorHoldDownTime: "00:00",
* monitorHoldDownType: "immediate",
* monitorHoldDownWeekday: "sunday",
* nattraversal: "enable",
* negotiateTimeout: 30,
* netDevice: "disable",
* passiveMode: "disable",
* peertype: "any",
* ppk: "disable",
* priority: 0,
* proposal: "aes128-sha256 aes256-sha256 aes128-sha1 aes256-sha1",
* psksecret: "eweeeeeeeecee",
* reauth: "disable",
* rekey: "enable",
* remoteGw: "2.2.2.2",
* remoteGw6: "::",
* rsaSignatureFormat: "pkcs1",
* savePassword: "disable",
* sendCertChain: "enable",
* signatureHashAlg: "sha2-512 sha2-384 sha2-256 sha1",
* suiteB: "disable",
* tunnelSearch: "selectors",
* type: "static",
* unitySupport: "enable",
* wizardType: "custom",
* xauthtype: "disable",
* });
* const trname1Phase2interface = new fortios.vpn.ipsec.Phase2interface("trname1Phase2interface", {
* addRoute: "phase1",
* autoDiscoveryForwarder: "phase1",
* autoDiscoverySender: "phase1",
* autoNegotiate: "disable",
* dhcpIpsec: "disable",
* dhgrp: "14 5",
* dstAddrType: "subnet",
* dstEndIp6: "::",
* dstPort: 0,
* dstSubnet: "0.0.0.0 0.0.0.0",
* encapsulation: "tunnel-mode",
* keepalive: "disable",
* keylifeType: "seconds",
* keylifekbs: 5120,
* keylifeseconds: 43200,
* l2tp: "disable",
* pfs: "enable",
* phase1name: trname1Phase1interface.name,
* proposal: "aes128-sha1 aes256-sha1 aes128-sha256 aes256-sha256 aes128gcm aes256gcm chacha20poly1305",
* protocol: 0,
* replay: "enable",
* routeOverlap: "use-new",
* singleSource: "disable",
* srcAddrType: "subnet",
* srcEndIp6: "::",
* srcPort: 0,
* srcSubnet: "0.0.0.0 0.0.0.0",
* });
* const trname = new fortios.system.Ipsecaggregate("trname", {
* algorithm: "round-robin",
* members: [{
* tunnelName: trname1Phase1interface.name,
* }],
* });
* ```
*
* ## Import
*
* System IpsecAggregate can be imported using any of these accepted formats:
*
* ```sh
* $ pulumi import fortios:system/ipsecaggregate:Ipsecaggregate labelname {{name}}
* ```
*
* If you do not want to import arguments of block:
*
* $ export "FORTIOS_IMPORT_TABLE"="false"
*
* ```sh
* $ pulumi import fortios:system/ipsecaggregate:Ipsecaggregate labelname {{name}}
* ```
*
* $ unset "FORTIOS_IMPORT_TABLE"
*/
export declare class Ipsecaggregate extends pulumi.CustomResource {
/**
* Get an existing Ipsecaggregate resource's state with the given name, ID, and optional extra
* properties used to qualify the lookup.
*
* @param name The _unique_ name of the resulting resource.
* @param id The _unique_ provider ID of the resource to lookup.
* @param state Any extra arguments used during the lookup.
* @param opts Optional settings to control the behavior of the CustomResource.
*/
static get(name: string, id: pulumi.Input<pulumi.ID>, state?: IpsecaggregateState, opts?: pulumi.CustomResourceOptions): Ipsecaggregate;
/**
* Returns true if the given object is an instance of Ipsecaggregate. This is designed to work even
* when multiple copies of the Pulumi SDK have been loaded into the same process.
*/
static isInstance(obj: any): obj is Ipsecaggregate;
/**
* Frame distribution algorithm.
*/
readonly algorithm: pulumi.Output<string>;
/**
* Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
*/
readonly dynamicSortSubtable: pulumi.Output<string | undefined>;
/**
* Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwise, conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
*/
readonly getAllTables: pulumi.Output<string | undefined>;
/**
* Member tunnels of the aggregate. The structure of `member` block is documented below.
*/
readonly members: pulumi.Output<outputs.system.IpsecaggregateMember[]>;
/**
* IPsec aggregate name.
*/
readonly name: pulumi.Output<string>;
/**
* Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
*/
readonly vdomparam: pulumi.Output<string>;
/**
* Create a Ipsecaggregate resource with the given unique name, arguments, and options.
*
* @param name The _unique_ name of the resource.
* @param args The arguments to use to populate this resource's properties.
* @param opts A bag of options that control this resource's behavior.
*/
constructor(name: string, args: IpsecaggregateArgs, opts?: pulumi.CustomResourceOptions);
}
/**
* Input properties used for looking up and filtering Ipsecaggregate resources.
*/
export interface IpsecaggregateState {
/**
* Frame distribution algorithm.
*/
algorithm?: pulumi.Input<string>;
/**
* Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
*/
dynamicSortSubtable?: pulumi.Input<string>;
/**
* Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwise, conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
*/
getAllTables?: pulumi.Input<string>;
/**
* Member tunnels of the aggregate. The structure of `member` block is documented below.
*/
members?: pulumi.Input<pulumi.Input<inputs.system.IpsecaggregateMember>[]>;
/**
* IPsec aggregate name.
*/
name?: pulumi.Input<string>;
/**
* Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
*/
vdomparam?: pulumi.Input<string>;
}
/**
* The set of arguments for constructing a Ipsecaggregate resource.
*/
export interface IpsecaggregateArgs {
/**
* Frame distribution algorithm.
*/
algorithm?: pulumi.Input<string>;
/**
* Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
*/
dynamicSortSubtable?: pulumi.Input<string>;
/**
* Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwise, conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
*/
getAllTables?: pulumi.Input<string>;
/**
* Member tunnels of the aggregate. The structure of `member` block is documented below.
*/
members: pulumi.Input<pulumi.Input<inputs.system.IpsecaggregateMember>[]>;
/**
* IPsec aggregate name.
*/
name?: pulumi.Input<string>;
/**
* Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
*/
vdomparam?: pulumi.Input<string>;
}