1. Packages
  2. Nsxt Provider
  3. API Docs
  4. PolicyIpsecVpnSession
nsxt 3.8.0 published on Monday, Apr 14, 2025 by vmware

nsxt.PolicyIpsecVpnSession

Explore with Pulumi AI

Create PolicyIpsecVpnSession Resource

Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.

Constructor syntax

new PolicyIpsecVpnSession(name: string, args: PolicyIpsecVpnSessionArgs, opts?: CustomResourceOptions);
@overload
def PolicyIpsecVpnSession(resource_name: str,
                          args: PolicyIpsecVpnSessionArgs,
                          opts: Optional[ResourceOptions] = None)

@overload
def PolicyIpsecVpnSession(resource_name: str,
                          opts: Optional[ResourceOptions] = None,
                          local_endpoint_path: Optional[str] = None,
                          peer_address: Optional[str] = None,
                          vpn_type: Optional[str] = None,
                          service_path: Optional[str] = None,
                          peer_id: Optional[str] = None,
                          display_name: Optional[str] = None,
                          ike_profile_path: Optional[str] = None,
                          policy_ipsec_vpn_session_id: Optional[str] = None,
                          max_segment_size: Optional[float] = None,
                          ip_addresses: Optional[Sequence[str]] = None,
                          compliance_suite: Optional[str] = None,
                          authentication_mode: Optional[str] = None,
                          enabled: Optional[bool] = None,
                          dpd_profile_path: Optional[str] = None,
                          direction: Optional[str] = None,
                          nsx_id: Optional[str] = None,
                          prefix_length: Optional[float] = None,
                          psk: Optional[str] = None,
                          rules: Optional[Sequence[PolicyIpsecVpnSessionRuleArgs]] = None,
                          description: Optional[str] = None,
                          tags: Optional[Sequence[PolicyIpsecVpnSessionTagArgs]] = None,
                          tunnel_profile_path: Optional[str] = None,
                          connection_initiation_mode: Optional[str] = None)
func NewPolicyIpsecVpnSession(ctx *Context, name string, args PolicyIpsecVpnSessionArgs, opts ...ResourceOption) (*PolicyIpsecVpnSession, error)
public PolicyIpsecVpnSession(string name, PolicyIpsecVpnSessionArgs args, CustomResourceOptions? opts = null)
public PolicyIpsecVpnSession(String name, PolicyIpsecVpnSessionArgs args)
public PolicyIpsecVpnSession(String name, PolicyIpsecVpnSessionArgs args, CustomResourceOptions options)
type: nsxt:PolicyIpsecVpnSession
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.

Parameters

name This property is required. string
The unique name of the resource.
args This property is required. PolicyIpsecVpnSessionArgs
The arguments to resource properties.
opts CustomResourceOptions
Bag of options to control resource's behavior.
resource_name This property is required. str
The unique name of the resource.
args This property is required. PolicyIpsecVpnSessionArgs
The arguments to resource properties.
opts ResourceOptions
Bag of options to control resource's behavior.
ctx Context
Context object for the current deployment.
name This property is required. string
The unique name of the resource.
args This property is required. PolicyIpsecVpnSessionArgs
The arguments to resource properties.
opts ResourceOption
Bag of options to control resource's behavior.
name This property is required. string
The unique name of the resource.
args This property is required. PolicyIpsecVpnSessionArgs
The arguments to resource properties.
opts CustomResourceOptions
Bag of options to control resource's behavior.
name This property is required. String
The unique name of the resource.
args This property is required. PolicyIpsecVpnSessionArgs
The arguments to resource properties.
options CustomResourceOptions
Bag of options to control resource's behavior.

Constructor example

The following reference example uses placeholder values for all input properties.

var policyIpsecVpnSessionResource = new Nsxt.PolicyIpsecVpnSession("policyIpsecVpnSessionResource", new()
{
    LocalEndpointPath = "string",
    PeerAddress = "string",
    VpnType = "string",
    ServicePath = "string",
    PeerId = "string",
    DisplayName = "string",
    IkeProfilePath = "string",
    PolicyIpsecVpnSessionId = "string",
    MaxSegmentSize = 0,
    IpAddresses = new[]
    {
        "string",
    },
    ComplianceSuite = "string",
    AuthenticationMode = "string",
    Enabled = false,
    DpdProfilePath = "string",
    Direction = "string",
    NsxId = "string",
    PrefixLength = 0,
    Psk = "string",
    Rules = new[]
    {
        new Nsxt.Inputs.PolicyIpsecVpnSessionRuleArgs
        {
            Action = "string",
            Destinations = new[]
            {
                "string",
            },
            NsxId = "string",
            Sources = new[]
            {
                "string",
            },
        },
    },
    Description = "string",
    Tags = new[]
    {
        new Nsxt.Inputs.PolicyIpsecVpnSessionTagArgs
        {
            Scope = "string",
            Tag = "string",
        },
    },
    TunnelProfilePath = "string",
    ConnectionInitiationMode = "string",
});
Copy
example, err := nsxt.NewPolicyIpsecVpnSession(ctx, "policyIpsecVpnSessionResource", &nsxt.PolicyIpsecVpnSessionArgs{
LocalEndpointPath: pulumi.String("string"),
PeerAddress: pulumi.String("string"),
VpnType: pulumi.String("string"),
ServicePath: pulumi.String("string"),
PeerId: pulumi.String("string"),
DisplayName: pulumi.String("string"),
IkeProfilePath: pulumi.String("string"),
PolicyIpsecVpnSessionId: pulumi.String("string"),
MaxSegmentSize: pulumi.Float64(0),
IpAddresses: pulumi.StringArray{
pulumi.String("string"),
},
ComplianceSuite: pulumi.String("string"),
AuthenticationMode: pulumi.String("string"),
Enabled: pulumi.Bool(false),
DpdProfilePath: pulumi.String("string"),
Direction: pulumi.String("string"),
NsxId: pulumi.String("string"),
PrefixLength: pulumi.Float64(0),
Psk: pulumi.String("string"),
Rules: .PolicyIpsecVpnSessionRuleArray{
&.PolicyIpsecVpnSessionRuleArgs{
Action: pulumi.String("string"),
Destinations: pulumi.StringArray{
pulumi.String("string"),
},
NsxId: pulumi.String("string"),
Sources: pulumi.StringArray{
pulumi.String("string"),
},
},
},
Description: pulumi.String("string"),
Tags: .PolicyIpsecVpnSessionTagArray{
&.PolicyIpsecVpnSessionTagArgs{
Scope: pulumi.String("string"),
Tag: pulumi.String("string"),
},
},
TunnelProfilePath: pulumi.String("string"),
ConnectionInitiationMode: pulumi.String("string"),
})
Copy
var policyIpsecVpnSessionResource = new PolicyIpsecVpnSession("policyIpsecVpnSessionResource", PolicyIpsecVpnSessionArgs.builder()
    .localEndpointPath("string")
    .peerAddress("string")
    .vpnType("string")
    .servicePath("string")
    .peerId("string")
    .displayName("string")
    .ikeProfilePath("string")
    .policyIpsecVpnSessionId("string")
    .maxSegmentSize(0)
    .ipAddresses("string")
    .complianceSuite("string")
    .authenticationMode("string")
    .enabled(false)
    .dpdProfilePath("string")
    .direction("string")
    .nsxId("string")
    .prefixLength(0)
    .psk("string")
    .rules(PolicyIpsecVpnSessionRuleArgs.builder()
        .action("string")
        .destinations("string")
        .nsxId("string")
        .sources("string")
        .build())
    .description("string")
    .tags(PolicyIpsecVpnSessionTagArgs.builder()
        .scope("string")
        .tag("string")
        .build())
    .tunnelProfilePath("string")
    .connectionInitiationMode("string")
    .build());
Copy
policy_ipsec_vpn_session_resource = nsxt.PolicyIpsecVpnSession("policyIpsecVpnSessionResource",
    local_endpoint_path="string",
    peer_address="string",
    vpn_type="string",
    service_path="string",
    peer_id="string",
    display_name="string",
    ike_profile_path="string",
    policy_ipsec_vpn_session_id="string",
    max_segment_size=0,
    ip_addresses=["string"],
    compliance_suite="string",
    authentication_mode="string",
    enabled=False,
    dpd_profile_path="string",
    direction="string",
    nsx_id="string",
    prefix_length=0,
    psk="string",
    rules=[{
        "action": "string",
        "destinations": ["string"],
        "nsx_id": "string",
        "sources": ["string"],
    }],
    description="string",
    tags=[{
        "scope": "string",
        "tag": "string",
    }],
    tunnel_profile_path="string",
    connection_initiation_mode="string")
Copy
const policyIpsecVpnSessionResource = new nsxt.PolicyIpsecVpnSession("policyIpsecVpnSessionResource", {
    localEndpointPath: "string",
    peerAddress: "string",
    vpnType: "string",
    servicePath: "string",
    peerId: "string",
    displayName: "string",
    ikeProfilePath: "string",
    policyIpsecVpnSessionId: "string",
    maxSegmentSize: 0,
    ipAddresses: ["string"],
    complianceSuite: "string",
    authenticationMode: "string",
    enabled: false,
    dpdProfilePath: "string",
    direction: "string",
    nsxId: "string",
    prefixLength: 0,
    psk: "string",
    rules: [{
        action: "string",
        destinations: ["string"],
        nsxId: "string",
        sources: ["string"],
    }],
    description: "string",
    tags: [{
        scope: "string",
        tag: "string",
    }],
    tunnelProfilePath: "string",
    connectionInitiationMode: "string",
});
Copy
type: nsxt:PolicyIpsecVpnSession
properties:
    authenticationMode: string
    complianceSuite: string
    connectionInitiationMode: string
    description: string
    direction: string
    displayName: string
    dpdProfilePath: string
    enabled: false
    ikeProfilePath: string
    ipAddresses:
        - string
    localEndpointPath: string
    maxSegmentSize: 0
    nsxId: string
    peerAddress: string
    peerId: string
    policyIpsecVpnSessionId: string
    prefixLength: 0
    psk: string
    rules:
        - action: string
          destinations:
            - string
          nsxId: string
          sources:
            - string
    servicePath: string
    tags:
        - scope: string
          tag: string
    tunnelProfilePath: string
    vpnType: string
Copy

PolicyIpsecVpnSession Resource Properties

To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

Inputs

In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.

The PolicyIpsecVpnSession resource accepts the following input properties:

DisplayName This property is required. string
Display name of the resource.
LocalEndpointPath This property is required. string
Policy path referencing Local endpoint. In VMC, Local Endpoints are pre-configured the user can refer to their path using data nsxt.PolicyIpsecVpnLocalEndpoint and using the "Private IP1" or "Public IP1" values to refer to the private and public endpoints respectively. Note that if authentication_mode is CERTIFICATE, then the local_endpoint must be configured with certificate_path and trust_ca_paths.
PeerAddress This property is required. string
Public IPV4 address of the remote device terminating the VPN connection.
PeerId This property is required. string
Peer ID to uniquely identify the peer site. The peer ID is the public IP address of the remote device terminating the VPN tunnel. When NAT is configured for the peer, enter the private IP address of the peer.
ServicePath This property is required. string
The path of the IPSec VPN service for the VPN session.
VpnType This property is required. string
RouteBased or PolicyBased. Policy Based VPN requires to define protect rules that match local and peer subnets. IPSec security association is negotiated for each pair of local and peer subnet. For PolicyBased Session, rule must be specified with sources, destination and action. A Route Based VPN is more flexible, more powerful and recommended over policy based VPN. IP Tunnel port is created and all traffic routed via tunnel port is protected. Routes can be configured statically or can be learned through BGP. A route based VPN is a must for establishing redundant VPN session to remote site. For RouteBased VPN session, ip_addresses and prefix_length must be specified to create the tunnel interface and its subnet.
AuthenticationMode string
Peer authentication mode. PSK - In this mode a secret key shared between local and peer sites is to be used for authentication. The secret key can be a string with a maximum length of 128 characters. CERTIFICATE - In this mode a certificate defined at the global level is to be used for authentication. If user wants to configure compliance_suite, then the authentication_mode can only be CERTIFICATE.
ComplianceSuite string
Compliance suite. Value is one of CNSA, SUITE_B_GCM_128, SUITE_B_GCM_256, PRIME, FOUNDATION, FIPS, None.
ConnectionInitiationMode string
Connection initiation mode used by local endpoint to establish ike connection with peer site. INITIATOR - In this mode local endpoint initiates tunnel setup and will also respond to incoming tunnel setup requests from peer gateway. RESPOND_ONLY - In this mode, local endpoint shall only respond to incoming tunnel setup requests. It shall not initiate the tunnel setup. ON_DEMAND - In this mode local endpoint will initiate tunnel creation once first packet matching the policy rule is received and will also respond to incoming initiation request.
Description string
Description of the resource.
Direction string
The traffic direction apply to the MSS clamping. Value is one of NONE, INBOUND_CONNECTION, OUTBOUND_CONNECTION AND BOTH.
DpdProfilePath string
Policy path referencing Dead Peer Detection (DPD) profile. Default is set to system default profile.
Enabled bool
Boolean. Enable/Disable IPsec VPN session. Default is "true" (session enabled).
IkeProfilePath string
Policy path referencing IKE profile. Note that if user wants to create session with compliance_suite, then this field should not be configured, the provider will use the default Profile for each compliance suite type.
IpAddresses List<string>
IP Tunnel interface (commonly referred as VTI) ip_addresses. Only applied for Route Based VPN Session.
MaxSegmentSize double
Maximum amount of data the host will accept in a TCP segment. Value is an int between 108 and 8860. If not specified then the value would be the automatic calculated MSS value.
NsxId string
The NSX ID of this resource. If set, this ID will be used to create the resource.
PolicyIpsecVpnSessionId string
ID of the resource.
PrefixLength double
Subnet Prefix Length. Only applied for Route Based VPN Session.
Psk string
IPSec Pre-shared key. Maximum length of this field is 128 characters.
Rules List<PolicyIpsecVpnSessionRule>
Bypass rules for this IPSec VPN Session. Only applicable to PolicyBased VPN Session.
Tags List<PolicyIpsecVpnSessionTag>
A list of scope + tag pairs to associate with this resource.
TunnelProfilePath string
Policy path referencing Tunnel profile to be used. Note that if user wants to create session with compliance_suite, then this field should not be configured, the provider will use the default Profile for each compliance suite type.
DisplayName This property is required. string
Display name of the resource.
LocalEndpointPath This property is required. string
Policy path referencing Local endpoint. In VMC, Local Endpoints are pre-configured the user can refer to their path using data nsxt.PolicyIpsecVpnLocalEndpoint and using the "Private IP1" or "Public IP1" values to refer to the private and public endpoints respectively. Note that if authentication_mode is CERTIFICATE, then the local_endpoint must be configured with certificate_path and trust_ca_paths.
PeerAddress This property is required. string
Public IPV4 address of the remote device terminating the VPN connection.
PeerId This property is required. string
Peer ID to uniquely identify the peer site. The peer ID is the public IP address of the remote device terminating the VPN tunnel. When NAT is configured for the peer, enter the private IP address of the peer.
ServicePath This property is required. string
The path of the IPSec VPN service for the VPN session.
VpnType This property is required. string
RouteBased or PolicyBased. Policy Based VPN requires to define protect rules that match local and peer subnets. IPSec security association is negotiated for each pair of local and peer subnet. For PolicyBased Session, rule must be specified with sources, destination and action. A Route Based VPN is more flexible, more powerful and recommended over policy based VPN. IP Tunnel port is created and all traffic routed via tunnel port is protected. Routes can be configured statically or can be learned through BGP. A route based VPN is a must for establishing redundant VPN session to remote site. For RouteBased VPN session, ip_addresses and prefix_length must be specified to create the tunnel interface and its subnet.
AuthenticationMode string
Peer authentication mode. PSK - In this mode a secret key shared between local and peer sites is to be used for authentication. The secret key can be a string with a maximum length of 128 characters. CERTIFICATE - In this mode a certificate defined at the global level is to be used for authentication. If user wants to configure compliance_suite, then the authentication_mode can only be CERTIFICATE.
ComplianceSuite string
Compliance suite. Value is one of CNSA, SUITE_B_GCM_128, SUITE_B_GCM_256, PRIME, FOUNDATION, FIPS, None.
ConnectionInitiationMode string
Connection initiation mode used by local endpoint to establish ike connection with peer site. INITIATOR - In this mode local endpoint initiates tunnel setup and will also respond to incoming tunnel setup requests from peer gateway. RESPOND_ONLY - In this mode, local endpoint shall only respond to incoming tunnel setup requests. It shall not initiate the tunnel setup. ON_DEMAND - In this mode local endpoint will initiate tunnel creation once first packet matching the policy rule is received and will also respond to incoming initiation request.
Description string
Description of the resource.
Direction string
The traffic direction apply to the MSS clamping. Value is one of NONE, INBOUND_CONNECTION, OUTBOUND_CONNECTION AND BOTH.
DpdProfilePath string
Policy path referencing Dead Peer Detection (DPD) profile. Default is set to system default profile.
Enabled bool
Boolean. Enable/Disable IPsec VPN session. Default is "true" (session enabled).
IkeProfilePath string
Policy path referencing IKE profile. Note that if user wants to create session with compliance_suite, then this field should not be configured, the provider will use the default Profile for each compliance suite type.
IpAddresses []string
IP Tunnel interface (commonly referred as VTI) ip_addresses. Only applied for Route Based VPN Session.
MaxSegmentSize float64
Maximum amount of data the host will accept in a TCP segment. Value is an int between 108 and 8860. If not specified then the value would be the automatic calculated MSS value.
NsxId string
The NSX ID of this resource. If set, this ID will be used to create the resource.
PolicyIpsecVpnSessionId string
ID of the resource.
PrefixLength float64
Subnet Prefix Length. Only applied for Route Based VPN Session.
Psk string
IPSec Pre-shared key. Maximum length of this field is 128 characters.
Rules []PolicyIpsecVpnSessionRuleArgs
Bypass rules for this IPSec VPN Session. Only applicable to PolicyBased VPN Session.
Tags []PolicyIpsecVpnSessionTagArgs
A list of scope + tag pairs to associate with this resource.
TunnelProfilePath string
Policy path referencing Tunnel profile to be used. Note that if user wants to create session with compliance_suite, then this field should not be configured, the provider will use the default Profile for each compliance suite type.
displayName This property is required. String
Display name of the resource.
localEndpointPath This property is required. String
Policy path referencing Local endpoint. In VMC, Local Endpoints are pre-configured the user can refer to their path using data nsxt.PolicyIpsecVpnLocalEndpoint and using the "Private IP1" or "Public IP1" values to refer to the private and public endpoints respectively. Note that if authentication_mode is CERTIFICATE, then the local_endpoint must be configured with certificate_path and trust_ca_paths.
peerAddress This property is required. String
Public IPV4 address of the remote device terminating the VPN connection.
peerId This property is required. String
Peer ID to uniquely identify the peer site. The peer ID is the public IP address of the remote device terminating the VPN tunnel. When NAT is configured for the peer, enter the private IP address of the peer.
servicePath This property is required. String
The path of the IPSec VPN service for the VPN session.
vpnType This property is required. String
RouteBased or PolicyBased. Policy Based VPN requires to define protect rules that match local and peer subnets. IPSec security association is negotiated for each pair of local and peer subnet. For PolicyBased Session, rule must be specified with sources, destination and action. A Route Based VPN is more flexible, more powerful and recommended over policy based VPN. IP Tunnel port is created and all traffic routed via tunnel port is protected. Routes can be configured statically or can be learned through BGP. A route based VPN is a must for establishing redundant VPN session to remote site. For RouteBased VPN session, ip_addresses and prefix_length must be specified to create the tunnel interface and its subnet.
authenticationMode String
Peer authentication mode. PSK - In this mode a secret key shared between local and peer sites is to be used for authentication. The secret key can be a string with a maximum length of 128 characters. CERTIFICATE - In this mode a certificate defined at the global level is to be used for authentication. If user wants to configure compliance_suite, then the authentication_mode can only be CERTIFICATE.
complianceSuite String
Compliance suite. Value is one of CNSA, SUITE_B_GCM_128, SUITE_B_GCM_256, PRIME, FOUNDATION, FIPS, None.
connectionInitiationMode String
Connection initiation mode used by local endpoint to establish ike connection with peer site. INITIATOR - In this mode local endpoint initiates tunnel setup and will also respond to incoming tunnel setup requests from peer gateway. RESPOND_ONLY - In this mode, local endpoint shall only respond to incoming tunnel setup requests. It shall not initiate the tunnel setup. ON_DEMAND - In this mode local endpoint will initiate tunnel creation once first packet matching the policy rule is received and will also respond to incoming initiation request.
description String
Description of the resource.
direction String
The traffic direction apply to the MSS clamping. Value is one of NONE, INBOUND_CONNECTION, OUTBOUND_CONNECTION AND BOTH.
dpdProfilePath String
Policy path referencing Dead Peer Detection (DPD) profile. Default is set to system default profile.
enabled Boolean
Boolean. Enable/Disable IPsec VPN session. Default is "true" (session enabled).
ikeProfilePath String
Policy path referencing IKE profile. Note that if user wants to create session with compliance_suite, then this field should not be configured, the provider will use the default Profile for each compliance suite type.
ipAddresses List<String>
IP Tunnel interface (commonly referred as VTI) ip_addresses. Only applied for Route Based VPN Session.
maxSegmentSize Double
Maximum amount of data the host will accept in a TCP segment. Value is an int between 108 and 8860. If not specified then the value would be the automatic calculated MSS value.
nsxId String
The NSX ID of this resource. If set, this ID will be used to create the resource.
policyIpsecVpnSessionId String
ID of the resource.
prefixLength Double
Subnet Prefix Length. Only applied for Route Based VPN Session.
psk String
IPSec Pre-shared key. Maximum length of this field is 128 characters.
rules List<PolicyIpsecVpnSessionRule>
Bypass rules for this IPSec VPN Session. Only applicable to PolicyBased VPN Session.
tags List<PolicyIpsecVpnSessionTag>
A list of scope + tag pairs to associate with this resource.
tunnelProfilePath String
Policy path referencing Tunnel profile to be used. Note that if user wants to create session with compliance_suite, then this field should not be configured, the provider will use the default Profile for each compliance suite type.
displayName This property is required. string
Display name of the resource.
localEndpointPath This property is required. string
Policy path referencing Local endpoint. In VMC, Local Endpoints are pre-configured the user can refer to their path using data nsxt.PolicyIpsecVpnLocalEndpoint and using the "Private IP1" or "Public IP1" values to refer to the private and public endpoints respectively. Note that if authentication_mode is CERTIFICATE, then the local_endpoint must be configured with certificate_path and trust_ca_paths.
peerAddress This property is required. string
Public IPV4 address of the remote device terminating the VPN connection.
peerId This property is required. string
Peer ID to uniquely identify the peer site. The peer ID is the public IP address of the remote device terminating the VPN tunnel. When NAT is configured for the peer, enter the private IP address of the peer.
servicePath This property is required. string
The path of the IPSec VPN service for the VPN session.
vpnType This property is required. string
RouteBased or PolicyBased. Policy Based VPN requires to define protect rules that match local and peer subnets. IPSec security association is negotiated for each pair of local and peer subnet. For PolicyBased Session, rule must be specified with sources, destination and action. A Route Based VPN is more flexible, more powerful and recommended over policy based VPN. IP Tunnel port is created and all traffic routed via tunnel port is protected. Routes can be configured statically or can be learned through BGP. A route based VPN is a must for establishing redundant VPN session to remote site. For RouteBased VPN session, ip_addresses and prefix_length must be specified to create the tunnel interface and its subnet.
authenticationMode string
Peer authentication mode. PSK - In this mode a secret key shared between local and peer sites is to be used for authentication. The secret key can be a string with a maximum length of 128 characters. CERTIFICATE - In this mode a certificate defined at the global level is to be used for authentication. If user wants to configure compliance_suite, then the authentication_mode can only be CERTIFICATE.
complianceSuite string
Compliance suite. Value is one of CNSA, SUITE_B_GCM_128, SUITE_B_GCM_256, PRIME, FOUNDATION, FIPS, None.
connectionInitiationMode string
Connection initiation mode used by local endpoint to establish ike connection with peer site. INITIATOR - In this mode local endpoint initiates tunnel setup and will also respond to incoming tunnel setup requests from peer gateway. RESPOND_ONLY - In this mode, local endpoint shall only respond to incoming tunnel setup requests. It shall not initiate the tunnel setup. ON_DEMAND - In this mode local endpoint will initiate tunnel creation once first packet matching the policy rule is received and will also respond to incoming initiation request.
description string
Description of the resource.
direction string
The traffic direction apply to the MSS clamping. Value is one of NONE, INBOUND_CONNECTION, OUTBOUND_CONNECTION AND BOTH.
dpdProfilePath string
Policy path referencing Dead Peer Detection (DPD) profile. Default is set to system default profile.
enabled boolean
Boolean. Enable/Disable IPsec VPN session. Default is "true" (session enabled).
ikeProfilePath string
Policy path referencing IKE profile. Note that if user wants to create session with compliance_suite, then this field should not be configured, the provider will use the default Profile for each compliance suite type.
ipAddresses string[]
IP Tunnel interface (commonly referred as VTI) ip_addresses. Only applied for Route Based VPN Session.
maxSegmentSize number
Maximum amount of data the host will accept in a TCP segment. Value is an int between 108 and 8860. If not specified then the value would be the automatic calculated MSS value.
nsxId string
The NSX ID of this resource. If set, this ID will be used to create the resource.
policyIpsecVpnSessionId string
ID of the resource.
prefixLength number
Subnet Prefix Length. Only applied for Route Based VPN Session.
psk string
IPSec Pre-shared key. Maximum length of this field is 128 characters.
rules PolicyIpsecVpnSessionRule[]
Bypass rules for this IPSec VPN Session. Only applicable to PolicyBased VPN Session.
tags PolicyIpsecVpnSessionTag[]
A list of scope + tag pairs to associate with this resource.
tunnelProfilePath string
Policy path referencing Tunnel profile to be used. Note that if user wants to create session with compliance_suite, then this field should not be configured, the provider will use the default Profile for each compliance suite type.
display_name This property is required. str
Display name of the resource.
local_endpoint_path This property is required. str
Policy path referencing Local endpoint. In VMC, Local Endpoints are pre-configured the user can refer to their path using data nsxt.PolicyIpsecVpnLocalEndpoint and using the "Private IP1" or "Public IP1" values to refer to the private and public endpoints respectively. Note that if authentication_mode is CERTIFICATE, then the local_endpoint must be configured with certificate_path and trust_ca_paths.
peer_address This property is required. str
Public IPV4 address of the remote device terminating the VPN connection.
peer_id This property is required. str
Peer ID to uniquely identify the peer site. The peer ID is the public IP address of the remote device terminating the VPN tunnel. When NAT is configured for the peer, enter the private IP address of the peer.
service_path This property is required. str
The path of the IPSec VPN service for the VPN session.
vpn_type This property is required. str
RouteBased or PolicyBased. Policy Based VPN requires to define protect rules that match local and peer subnets. IPSec security association is negotiated for each pair of local and peer subnet. For PolicyBased Session, rule must be specified with sources, destination and action. A Route Based VPN is more flexible, more powerful and recommended over policy based VPN. IP Tunnel port is created and all traffic routed via tunnel port is protected. Routes can be configured statically or can be learned through BGP. A route based VPN is a must for establishing redundant VPN session to remote site. For RouteBased VPN session, ip_addresses and prefix_length must be specified to create the tunnel interface and its subnet.
authentication_mode str
Peer authentication mode. PSK - In this mode a secret key shared between local and peer sites is to be used for authentication. The secret key can be a string with a maximum length of 128 characters. CERTIFICATE - In this mode a certificate defined at the global level is to be used for authentication. If user wants to configure compliance_suite, then the authentication_mode can only be CERTIFICATE.
compliance_suite str
Compliance suite. Value is one of CNSA, SUITE_B_GCM_128, SUITE_B_GCM_256, PRIME, FOUNDATION, FIPS, None.
connection_initiation_mode str
Connection initiation mode used by local endpoint to establish ike connection with peer site. INITIATOR - In this mode local endpoint initiates tunnel setup and will also respond to incoming tunnel setup requests from peer gateway. RESPOND_ONLY - In this mode, local endpoint shall only respond to incoming tunnel setup requests. It shall not initiate the tunnel setup. ON_DEMAND - In this mode local endpoint will initiate tunnel creation once first packet matching the policy rule is received and will also respond to incoming initiation request.
description str
Description of the resource.
direction str
The traffic direction apply to the MSS clamping. Value is one of NONE, INBOUND_CONNECTION, OUTBOUND_CONNECTION AND BOTH.
dpd_profile_path str
Policy path referencing Dead Peer Detection (DPD) profile. Default is set to system default profile.
enabled bool
Boolean. Enable/Disable IPsec VPN session. Default is "true" (session enabled).
ike_profile_path str
Policy path referencing IKE profile. Note that if user wants to create session with compliance_suite, then this field should not be configured, the provider will use the default Profile for each compliance suite type.
ip_addresses Sequence[str]
IP Tunnel interface (commonly referred as VTI) ip_addresses. Only applied for Route Based VPN Session.
max_segment_size float
Maximum amount of data the host will accept in a TCP segment. Value is an int between 108 and 8860. If not specified then the value would be the automatic calculated MSS value.
nsx_id str
The NSX ID of this resource. If set, this ID will be used to create the resource.
policy_ipsec_vpn_session_id str
ID of the resource.
prefix_length float
Subnet Prefix Length. Only applied for Route Based VPN Session.
psk str
IPSec Pre-shared key. Maximum length of this field is 128 characters.
rules Sequence[PolicyIpsecVpnSessionRuleArgs]
Bypass rules for this IPSec VPN Session. Only applicable to PolicyBased VPN Session.
tags Sequence[PolicyIpsecVpnSessionTagArgs]
A list of scope + tag pairs to associate with this resource.
tunnel_profile_path str
Policy path referencing Tunnel profile to be used. Note that if user wants to create session with compliance_suite, then this field should not be configured, the provider will use the default Profile for each compliance suite type.
displayName This property is required. String
Display name of the resource.
localEndpointPath This property is required. String
Policy path referencing Local endpoint. In VMC, Local Endpoints are pre-configured the user can refer to their path using data nsxt.PolicyIpsecVpnLocalEndpoint and using the "Private IP1" or "Public IP1" values to refer to the private and public endpoints respectively. Note that if authentication_mode is CERTIFICATE, then the local_endpoint must be configured with certificate_path and trust_ca_paths.
peerAddress This property is required. String
Public IPV4 address of the remote device terminating the VPN connection.
peerId This property is required. String
Peer ID to uniquely identify the peer site. The peer ID is the public IP address of the remote device terminating the VPN tunnel. When NAT is configured for the peer, enter the private IP address of the peer.
servicePath This property is required. String
The path of the IPSec VPN service for the VPN session.
vpnType This property is required. String
RouteBased or PolicyBased. Policy Based VPN requires to define protect rules that match local and peer subnets. IPSec security association is negotiated for each pair of local and peer subnet. For PolicyBased Session, rule must be specified with sources, destination and action. A Route Based VPN is more flexible, more powerful and recommended over policy based VPN. IP Tunnel port is created and all traffic routed via tunnel port is protected. Routes can be configured statically or can be learned through BGP. A route based VPN is a must for establishing redundant VPN session to remote site. For RouteBased VPN session, ip_addresses and prefix_length must be specified to create the tunnel interface and its subnet.
authenticationMode String
Peer authentication mode. PSK - In this mode a secret key shared between local and peer sites is to be used for authentication. The secret key can be a string with a maximum length of 128 characters. CERTIFICATE - In this mode a certificate defined at the global level is to be used for authentication. If user wants to configure compliance_suite, then the authentication_mode can only be CERTIFICATE.
complianceSuite String
Compliance suite. Value is one of CNSA, SUITE_B_GCM_128, SUITE_B_GCM_256, PRIME, FOUNDATION, FIPS, None.
connectionInitiationMode String
Connection initiation mode used by local endpoint to establish ike connection with peer site. INITIATOR - In this mode local endpoint initiates tunnel setup and will also respond to incoming tunnel setup requests from peer gateway. RESPOND_ONLY - In this mode, local endpoint shall only respond to incoming tunnel setup requests. It shall not initiate the tunnel setup. ON_DEMAND - In this mode local endpoint will initiate tunnel creation once first packet matching the policy rule is received and will also respond to incoming initiation request.
description String
Description of the resource.
direction String
The traffic direction apply to the MSS clamping. Value is one of NONE, INBOUND_CONNECTION, OUTBOUND_CONNECTION AND BOTH.
dpdProfilePath String
Policy path referencing Dead Peer Detection (DPD) profile. Default is set to system default profile.
enabled Boolean
Boolean. Enable/Disable IPsec VPN session. Default is "true" (session enabled).
ikeProfilePath String
Policy path referencing IKE profile. Note that if user wants to create session with compliance_suite, then this field should not be configured, the provider will use the default Profile for each compliance suite type.
ipAddresses List<String>
IP Tunnel interface (commonly referred as VTI) ip_addresses. Only applied for Route Based VPN Session.
maxSegmentSize Number
Maximum amount of data the host will accept in a TCP segment. Value is an int between 108 and 8860. If not specified then the value would be the automatic calculated MSS value.
nsxId String
The NSX ID of this resource. If set, this ID will be used to create the resource.
policyIpsecVpnSessionId String
ID of the resource.
prefixLength Number
Subnet Prefix Length. Only applied for Route Based VPN Session.
psk String
IPSec Pre-shared key. Maximum length of this field is 128 characters.
rules List<Property Map>
Bypass rules for this IPSec VPN Session. Only applicable to PolicyBased VPN Session.
tags List<Property Map>
A list of scope + tag pairs to associate with this resource.
tunnelProfilePath String
Policy path referencing Tunnel profile to be used. Note that if user wants to create session with compliance_suite, then this field should not be configured, the provider will use the default Profile for each compliance suite type.

Outputs

All input properties are implicitly available as output properties. Additionally, the PolicyIpsecVpnSession resource produces the following output properties:

Id string
The provider-assigned unique ID for this managed resource.
Path string
The NSX path of the policy resource.
Revision double
Indicates current revision number of the object as seen by NSX-T API server. This attribute can be useful for debugging.
Id string
The provider-assigned unique ID for this managed resource.
Path string
The NSX path of the policy resource.
Revision float64
Indicates current revision number of the object as seen by NSX-T API server. This attribute can be useful for debugging.
id String
The provider-assigned unique ID for this managed resource.
path String
The NSX path of the policy resource.
revision Double
Indicates current revision number of the object as seen by NSX-T API server. This attribute can be useful for debugging.
id string
The provider-assigned unique ID for this managed resource.
path string
The NSX path of the policy resource.
revision number
Indicates current revision number of the object as seen by NSX-T API server. This attribute can be useful for debugging.
id str
The provider-assigned unique ID for this managed resource.
path str
The NSX path of the policy resource.
revision float
Indicates current revision number of the object as seen by NSX-T API server. This attribute can be useful for debugging.
id String
The provider-assigned unique ID for this managed resource.
path String
The NSX path of the policy resource.
revision Number
Indicates current revision number of the object as seen by NSX-T API server. This attribute can be useful for debugging.

Look up Existing PolicyIpsecVpnSession Resource

Get an existing PolicyIpsecVpnSession resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

public static get(name: string, id: Input<ID>, state?: PolicyIpsecVpnSessionState, opts?: CustomResourceOptions): PolicyIpsecVpnSession
@staticmethod
def get(resource_name: str,
        id: str,
        opts: Optional[ResourceOptions] = None,
        authentication_mode: Optional[str] = None,
        compliance_suite: Optional[str] = None,
        connection_initiation_mode: Optional[str] = None,
        description: Optional[str] = None,
        direction: Optional[str] = None,
        display_name: Optional[str] = None,
        dpd_profile_path: Optional[str] = None,
        enabled: Optional[bool] = None,
        ike_profile_path: Optional[str] = None,
        ip_addresses: Optional[Sequence[str]] = None,
        local_endpoint_path: Optional[str] = None,
        max_segment_size: Optional[float] = None,
        nsx_id: Optional[str] = None,
        path: Optional[str] = None,
        peer_address: Optional[str] = None,
        peer_id: Optional[str] = None,
        policy_ipsec_vpn_session_id: Optional[str] = None,
        prefix_length: Optional[float] = None,
        psk: Optional[str] = None,
        revision: Optional[float] = None,
        rules: Optional[Sequence[PolicyIpsecVpnSessionRuleArgs]] = None,
        service_path: Optional[str] = None,
        tags: Optional[Sequence[PolicyIpsecVpnSessionTagArgs]] = None,
        tunnel_profile_path: Optional[str] = None,
        vpn_type: Optional[str] = None) -> PolicyIpsecVpnSession
func GetPolicyIpsecVpnSession(ctx *Context, name string, id IDInput, state *PolicyIpsecVpnSessionState, opts ...ResourceOption) (*PolicyIpsecVpnSession, error)
public static PolicyIpsecVpnSession Get(string name, Input<string> id, PolicyIpsecVpnSessionState? state, CustomResourceOptions? opts = null)
public static PolicyIpsecVpnSession get(String name, Output<String> id, PolicyIpsecVpnSessionState state, CustomResourceOptions options)
resources:  _:    type: nsxt:PolicyIpsecVpnSession    get:      id: ${id}
name This property is required.
The unique name of the resulting resource.
id This property is required.
The unique provider ID of the resource to lookup.
state
Any extra arguments used during the lookup.
opts
A bag of options that control this resource's behavior.
resource_name This property is required.
The unique name of the resulting resource.
id This property is required.
The unique provider ID of the resource to lookup.
name This property is required.
The unique name of the resulting resource.
id This property is required.
The unique provider ID of the resource to lookup.
state
Any extra arguments used during the lookup.
opts
A bag of options that control this resource's behavior.
name This property is required.
The unique name of the resulting resource.
id This property is required.
The unique provider ID of the resource to lookup.
state
Any extra arguments used during the lookup.
opts
A bag of options that control this resource's behavior.
name This property is required.
The unique name of the resulting resource.
id This property is required.
The unique provider ID of the resource to lookup.
state
Any extra arguments used during the lookup.
opts
A bag of options that control this resource's behavior.
The following state arguments are supported:
AuthenticationMode string
Peer authentication mode. PSK - In this mode a secret key shared between local and peer sites is to be used for authentication. The secret key can be a string with a maximum length of 128 characters. CERTIFICATE - In this mode a certificate defined at the global level is to be used for authentication. If user wants to configure compliance_suite, then the authentication_mode can only be CERTIFICATE.
ComplianceSuite string
Compliance suite. Value is one of CNSA, SUITE_B_GCM_128, SUITE_B_GCM_256, PRIME, FOUNDATION, FIPS, None.
ConnectionInitiationMode string
Connection initiation mode used by local endpoint to establish ike connection with peer site. INITIATOR - In this mode local endpoint initiates tunnel setup and will also respond to incoming tunnel setup requests from peer gateway. RESPOND_ONLY - In this mode, local endpoint shall only respond to incoming tunnel setup requests. It shall not initiate the tunnel setup. ON_DEMAND - In this mode local endpoint will initiate tunnel creation once first packet matching the policy rule is received and will also respond to incoming initiation request.
Description string
Description of the resource.
Direction string
The traffic direction apply to the MSS clamping. Value is one of NONE, INBOUND_CONNECTION, OUTBOUND_CONNECTION AND BOTH.
DisplayName string
Display name of the resource.
DpdProfilePath string
Policy path referencing Dead Peer Detection (DPD) profile. Default is set to system default profile.
Enabled bool
Boolean. Enable/Disable IPsec VPN session. Default is "true" (session enabled).
IkeProfilePath string
Policy path referencing IKE profile. Note that if user wants to create session with compliance_suite, then this field should not be configured, the provider will use the default Profile for each compliance suite type.
IpAddresses List<string>
IP Tunnel interface (commonly referred as VTI) ip_addresses. Only applied for Route Based VPN Session.
LocalEndpointPath string
Policy path referencing Local endpoint. In VMC, Local Endpoints are pre-configured the user can refer to their path using data nsxt.PolicyIpsecVpnLocalEndpoint and using the "Private IP1" or "Public IP1" values to refer to the private and public endpoints respectively. Note that if authentication_mode is CERTIFICATE, then the local_endpoint must be configured with certificate_path and trust_ca_paths.
MaxSegmentSize double
Maximum amount of data the host will accept in a TCP segment. Value is an int between 108 and 8860. If not specified then the value would be the automatic calculated MSS value.
NsxId string
The NSX ID of this resource. If set, this ID will be used to create the resource.
Path string
The NSX path of the policy resource.
PeerAddress string
Public IPV4 address of the remote device terminating the VPN connection.
PeerId string
Peer ID to uniquely identify the peer site. The peer ID is the public IP address of the remote device terminating the VPN tunnel. When NAT is configured for the peer, enter the private IP address of the peer.
PolicyIpsecVpnSessionId string
ID of the resource.
PrefixLength double
Subnet Prefix Length. Only applied for Route Based VPN Session.
Psk string
IPSec Pre-shared key. Maximum length of this field is 128 characters.
Revision double
Indicates current revision number of the object as seen by NSX-T API server. This attribute can be useful for debugging.
Rules List<PolicyIpsecVpnSessionRule>
Bypass rules for this IPSec VPN Session. Only applicable to PolicyBased VPN Session.
ServicePath string
The path of the IPSec VPN service for the VPN session.
Tags List<PolicyIpsecVpnSessionTag>
A list of scope + tag pairs to associate with this resource.
TunnelProfilePath string
Policy path referencing Tunnel profile to be used. Note that if user wants to create session with compliance_suite, then this field should not be configured, the provider will use the default Profile for each compliance suite type.
VpnType string
RouteBased or PolicyBased. Policy Based VPN requires to define protect rules that match local and peer subnets. IPSec security association is negotiated for each pair of local and peer subnet. For PolicyBased Session, rule must be specified with sources, destination and action. A Route Based VPN is more flexible, more powerful and recommended over policy based VPN. IP Tunnel port is created and all traffic routed via tunnel port is protected. Routes can be configured statically or can be learned through BGP. A route based VPN is a must for establishing redundant VPN session to remote site. For RouteBased VPN session, ip_addresses and prefix_length must be specified to create the tunnel interface and its subnet.
AuthenticationMode string
Peer authentication mode. PSK - In this mode a secret key shared between local and peer sites is to be used for authentication. The secret key can be a string with a maximum length of 128 characters. CERTIFICATE - In this mode a certificate defined at the global level is to be used for authentication. If user wants to configure compliance_suite, then the authentication_mode can only be CERTIFICATE.
ComplianceSuite string
Compliance suite. Value is one of CNSA, SUITE_B_GCM_128, SUITE_B_GCM_256, PRIME, FOUNDATION, FIPS, None.
ConnectionInitiationMode string
Connection initiation mode used by local endpoint to establish ike connection with peer site. INITIATOR - In this mode local endpoint initiates tunnel setup and will also respond to incoming tunnel setup requests from peer gateway. RESPOND_ONLY - In this mode, local endpoint shall only respond to incoming tunnel setup requests. It shall not initiate the tunnel setup. ON_DEMAND - In this mode local endpoint will initiate tunnel creation once first packet matching the policy rule is received and will also respond to incoming initiation request.
Description string
Description of the resource.
Direction string
The traffic direction apply to the MSS clamping. Value is one of NONE, INBOUND_CONNECTION, OUTBOUND_CONNECTION AND BOTH.
DisplayName string
Display name of the resource.
DpdProfilePath string
Policy path referencing Dead Peer Detection (DPD) profile. Default is set to system default profile.
Enabled bool
Boolean. Enable/Disable IPsec VPN session. Default is "true" (session enabled).
IkeProfilePath string
Policy path referencing IKE profile. Note that if user wants to create session with compliance_suite, then this field should not be configured, the provider will use the default Profile for each compliance suite type.
IpAddresses []string
IP Tunnel interface (commonly referred as VTI) ip_addresses. Only applied for Route Based VPN Session.
LocalEndpointPath string
Policy path referencing Local endpoint. In VMC, Local Endpoints are pre-configured the user can refer to their path using data nsxt.PolicyIpsecVpnLocalEndpoint and using the "Private IP1" or "Public IP1" values to refer to the private and public endpoints respectively. Note that if authentication_mode is CERTIFICATE, then the local_endpoint must be configured with certificate_path and trust_ca_paths.
MaxSegmentSize float64
Maximum amount of data the host will accept in a TCP segment. Value is an int between 108 and 8860. If not specified then the value would be the automatic calculated MSS value.
NsxId string
The NSX ID of this resource. If set, this ID will be used to create the resource.
Path string
The NSX path of the policy resource.
PeerAddress string
Public IPV4 address of the remote device terminating the VPN connection.
PeerId string
Peer ID to uniquely identify the peer site. The peer ID is the public IP address of the remote device terminating the VPN tunnel. When NAT is configured for the peer, enter the private IP address of the peer.
PolicyIpsecVpnSessionId string
ID of the resource.
PrefixLength float64
Subnet Prefix Length. Only applied for Route Based VPN Session.
Psk string
IPSec Pre-shared key. Maximum length of this field is 128 characters.
Revision float64
Indicates current revision number of the object as seen by NSX-T API server. This attribute can be useful for debugging.
Rules []PolicyIpsecVpnSessionRuleArgs
Bypass rules for this IPSec VPN Session. Only applicable to PolicyBased VPN Session.
ServicePath string
The path of the IPSec VPN service for the VPN session.
Tags []PolicyIpsecVpnSessionTagArgs
A list of scope + tag pairs to associate with this resource.
TunnelProfilePath string
Policy path referencing Tunnel profile to be used. Note that if user wants to create session with compliance_suite, then this field should not be configured, the provider will use the default Profile for each compliance suite type.
VpnType string
RouteBased or PolicyBased. Policy Based VPN requires to define protect rules that match local and peer subnets. IPSec security association is negotiated for each pair of local and peer subnet. For PolicyBased Session, rule must be specified with sources, destination and action. A Route Based VPN is more flexible, more powerful and recommended over policy based VPN. IP Tunnel port is created and all traffic routed via tunnel port is protected. Routes can be configured statically or can be learned through BGP. A route based VPN is a must for establishing redundant VPN session to remote site. For RouteBased VPN session, ip_addresses and prefix_length must be specified to create the tunnel interface and its subnet.
authenticationMode String
Peer authentication mode. PSK - In this mode a secret key shared between local and peer sites is to be used for authentication. The secret key can be a string with a maximum length of 128 characters. CERTIFICATE - In this mode a certificate defined at the global level is to be used for authentication. If user wants to configure compliance_suite, then the authentication_mode can only be CERTIFICATE.
complianceSuite String
Compliance suite. Value is one of CNSA, SUITE_B_GCM_128, SUITE_B_GCM_256, PRIME, FOUNDATION, FIPS, None.
connectionInitiationMode String
Connection initiation mode used by local endpoint to establish ike connection with peer site. INITIATOR - In this mode local endpoint initiates tunnel setup and will also respond to incoming tunnel setup requests from peer gateway. RESPOND_ONLY - In this mode, local endpoint shall only respond to incoming tunnel setup requests. It shall not initiate the tunnel setup. ON_DEMAND - In this mode local endpoint will initiate tunnel creation once first packet matching the policy rule is received and will also respond to incoming initiation request.
description String
Description of the resource.
direction String
The traffic direction apply to the MSS clamping. Value is one of NONE, INBOUND_CONNECTION, OUTBOUND_CONNECTION AND BOTH.
displayName String
Display name of the resource.
dpdProfilePath String
Policy path referencing Dead Peer Detection (DPD) profile. Default is set to system default profile.
enabled Boolean
Boolean. Enable/Disable IPsec VPN session. Default is "true" (session enabled).
ikeProfilePath String
Policy path referencing IKE profile. Note that if user wants to create session with compliance_suite, then this field should not be configured, the provider will use the default Profile for each compliance suite type.
ipAddresses List<String>
IP Tunnel interface (commonly referred as VTI) ip_addresses. Only applied for Route Based VPN Session.
localEndpointPath String
Policy path referencing Local endpoint. In VMC, Local Endpoints are pre-configured the user can refer to their path using data nsxt.PolicyIpsecVpnLocalEndpoint and using the "Private IP1" or "Public IP1" values to refer to the private and public endpoints respectively. Note that if authentication_mode is CERTIFICATE, then the local_endpoint must be configured with certificate_path and trust_ca_paths.
maxSegmentSize Double
Maximum amount of data the host will accept in a TCP segment. Value is an int between 108 and 8860. If not specified then the value would be the automatic calculated MSS value.
nsxId String
The NSX ID of this resource. If set, this ID will be used to create the resource.
path String
The NSX path of the policy resource.
peerAddress String
Public IPV4 address of the remote device terminating the VPN connection.
peerId String
Peer ID to uniquely identify the peer site. The peer ID is the public IP address of the remote device terminating the VPN tunnel. When NAT is configured for the peer, enter the private IP address of the peer.
policyIpsecVpnSessionId String
ID of the resource.
prefixLength Double
Subnet Prefix Length. Only applied for Route Based VPN Session.
psk String
IPSec Pre-shared key. Maximum length of this field is 128 characters.
revision Double
Indicates current revision number of the object as seen by NSX-T API server. This attribute can be useful for debugging.
rules List<PolicyIpsecVpnSessionRule>
Bypass rules for this IPSec VPN Session. Only applicable to PolicyBased VPN Session.
servicePath String
The path of the IPSec VPN service for the VPN session.
tags List<PolicyIpsecVpnSessionTag>
A list of scope + tag pairs to associate with this resource.
tunnelProfilePath String
Policy path referencing Tunnel profile to be used. Note that if user wants to create session with compliance_suite, then this field should not be configured, the provider will use the default Profile for each compliance suite type.
vpnType String
RouteBased or PolicyBased. Policy Based VPN requires to define protect rules that match local and peer subnets. IPSec security association is negotiated for each pair of local and peer subnet. For PolicyBased Session, rule must be specified with sources, destination and action. A Route Based VPN is more flexible, more powerful and recommended over policy based VPN. IP Tunnel port is created and all traffic routed via tunnel port is protected. Routes can be configured statically or can be learned through BGP. A route based VPN is a must for establishing redundant VPN session to remote site. For RouteBased VPN session, ip_addresses and prefix_length must be specified to create the tunnel interface and its subnet.
authenticationMode string
Peer authentication mode. PSK - In this mode a secret key shared between local and peer sites is to be used for authentication. The secret key can be a string with a maximum length of 128 characters. CERTIFICATE - In this mode a certificate defined at the global level is to be used for authentication. If user wants to configure compliance_suite, then the authentication_mode can only be CERTIFICATE.
complianceSuite string
Compliance suite. Value is one of CNSA, SUITE_B_GCM_128, SUITE_B_GCM_256, PRIME, FOUNDATION, FIPS, None.
connectionInitiationMode string
Connection initiation mode used by local endpoint to establish ike connection with peer site. INITIATOR - In this mode local endpoint initiates tunnel setup and will also respond to incoming tunnel setup requests from peer gateway. RESPOND_ONLY - In this mode, local endpoint shall only respond to incoming tunnel setup requests. It shall not initiate the tunnel setup. ON_DEMAND - In this mode local endpoint will initiate tunnel creation once first packet matching the policy rule is received and will also respond to incoming initiation request.
description string
Description of the resource.
direction string
The traffic direction apply to the MSS clamping. Value is one of NONE, INBOUND_CONNECTION, OUTBOUND_CONNECTION AND BOTH.
displayName string
Display name of the resource.
dpdProfilePath string
Policy path referencing Dead Peer Detection (DPD) profile. Default is set to system default profile.
enabled boolean
Boolean. Enable/Disable IPsec VPN session. Default is "true" (session enabled).
ikeProfilePath string
Policy path referencing IKE profile. Note that if user wants to create session with compliance_suite, then this field should not be configured, the provider will use the default Profile for each compliance suite type.
ipAddresses string[]
IP Tunnel interface (commonly referred as VTI) ip_addresses. Only applied for Route Based VPN Session.
localEndpointPath string
Policy path referencing Local endpoint. In VMC, Local Endpoints are pre-configured the user can refer to their path using data nsxt.PolicyIpsecVpnLocalEndpoint and using the "Private IP1" or "Public IP1" values to refer to the private and public endpoints respectively. Note that if authentication_mode is CERTIFICATE, then the local_endpoint must be configured with certificate_path and trust_ca_paths.
maxSegmentSize number
Maximum amount of data the host will accept in a TCP segment. Value is an int between 108 and 8860. If not specified then the value would be the automatic calculated MSS value.
nsxId string
The NSX ID of this resource. If set, this ID will be used to create the resource.
path string
The NSX path of the policy resource.
peerAddress string
Public IPV4 address of the remote device terminating the VPN connection.
peerId string
Peer ID to uniquely identify the peer site. The peer ID is the public IP address of the remote device terminating the VPN tunnel. When NAT is configured for the peer, enter the private IP address of the peer.
policyIpsecVpnSessionId string
ID of the resource.
prefixLength number
Subnet Prefix Length. Only applied for Route Based VPN Session.
psk string
IPSec Pre-shared key. Maximum length of this field is 128 characters.
revision number
Indicates current revision number of the object as seen by NSX-T API server. This attribute can be useful for debugging.
rules PolicyIpsecVpnSessionRule[]
Bypass rules for this IPSec VPN Session. Only applicable to PolicyBased VPN Session.
servicePath string
The path of the IPSec VPN service for the VPN session.
tags PolicyIpsecVpnSessionTag[]
A list of scope + tag pairs to associate with this resource.
tunnelProfilePath string
Policy path referencing Tunnel profile to be used. Note that if user wants to create session with compliance_suite, then this field should not be configured, the provider will use the default Profile for each compliance suite type.
vpnType string
RouteBased or PolicyBased. Policy Based VPN requires to define protect rules that match local and peer subnets. IPSec security association is negotiated for each pair of local and peer subnet. For PolicyBased Session, rule must be specified with sources, destination and action. A Route Based VPN is more flexible, more powerful and recommended over policy based VPN. IP Tunnel port is created and all traffic routed via tunnel port is protected. Routes can be configured statically or can be learned through BGP. A route based VPN is a must for establishing redundant VPN session to remote site. For RouteBased VPN session, ip_addresses and prefix_length must be specified to create the tunnel interface and its subnet.
authentication_mode str
Peer authentication mode. PSK - In this mode a secret key shared between local and peer sites is to be used for authentication. The secret key can be a string with a maximum length of 128 characters. CERTIFICATE - In this mode a certificate defined at the global level is to be used for authentication. If user wants to configure compliance_suite, then the authentication_mode can only be CERTIFICATE.
compliance_suite str
Compliance suite. Value is one of CNSA, SUITE_B_GCM_128, SUITE_B_GCM_256, PRIME, FOUNDATION, FIPS, None.
connection_initiation_mode str
Connection initiation mode used by local endpoint to establish ike connection with peer site. INITIATOR - In this mode local endpoint initiates tunnel setup and will also respond to incoming tunnel setup requests from peer gateway. RESPOND_ONLY - In this mode, local endpoint shall only respond to incoming tunnel setup requests. It shall not initiate the tunnel setup. ON_DEMAND - In this mode local endpoint will initiate tunnel creation once first packet matching the policy rule is received and will also respond to incoming initiation request.
description str
Description of the resource.
direction str
The traffic direction apply to the MSS clamping. Value is one of NONE, INBOUND_CONNECTION, OUTBOUND_CONNECTION AND BOTH.
display_name str
Display name of the resource.
dpd_profile_path str
Policy path referencing Dead Peer Detection (DPD) profile. Default is set to system default profile.
enabled bool
Boolean. Enable/Disable IPsec VPN session. Default is "true" (session enabled).
ike_profile_path str
Policy path referencing IKE profile. Note that if user wants to create session with compliance_suite, then this field should not be configured, the provider will use the default Profile for each compliance suite type.
ip_addresses Sequence[str]
IP Tunnel interface (commonly referred as VTI) ip_addresses. Only applied for Route Based VPN Session.
local_endpoint_path str
Policy path referencing Local endpoint. In VMC, Local Endpoints are pre-configured the user can refer to their path using data nsxt.PolicyIpsecVpnLocalEndpoint and using the "Private IP1" or "Public IP1" values to refer to the private and public endpoints respectively. Note that if authentication_mode is CERTIFICATE, then the local_endpoint must be configured with certificate_path and trust_ca_paths.
max_segment_size float
Maximum amount of data the host will accept in a TCP segment. Value is an int between 108 and 8860. If not specified then the value would be the automatic calculated MSS value.
nsx_id str
The NSX ID of this resource. If set, this ID will be used to create the resource.
path str
The NSX path of the policy resource.
peer_address str
Public IPV4 address of the remote device terminating the VPN connection.
peer_id str
Peer ID to uniquely identify the peer site. The peer ID is the public IP address of the remote device terminating the VPN tunnel. When NAT is configured for the peer, enter the private IP address of the peer.
policy_ipsec_vpn_session_id str
ID of the resource.
prefix_length float
Subnet Prefix Length. Only applied for Route Based VPN Session.
psk str
IPSec Pre-shared key. Maximum length of this field is 128 characters.
revision float
Indicates current revision number of the object as seen by NSX-T API server. This attribute can be useful for debugging.
rules Sequence[PolicyIpsecVpnSessionRuleArgs]
Bypass rules for this IPSec VPN Session. Only applicable to PolicyBased VPN Session.
service_path str
The path of the IPSec VPN service for the VPN session.
tags Sequence[PolicyIpsecVpnSessionTagArgs]
A list of scope + tag pairs to associate with this resource.
tunnel_profile_path str
Policy path referencing Tunnel profile to be used. Note that if user wants to create session with compliance_suite, then this field should not be configured, the provider will use the default Profile for each compliance suite type.
vpn_type str
RouteBased or PolicyBased. Policy Based VPN requires to define protect rules that match local and peer subnets. IPSec security association is negotiated for each pair of local and peer subnet. For PolicyBased Session, rule must be specified with sources, destination and action. A Route Based VPN is more flexible, more powerful and recommended over policy based VPN. IP Tunnel port is created and all traffic routed via tunnel port is protected. Routes can be configured statically or can be learned through BGP. A route based VPN is a must for establishing redundant VPN session to remote site. For RouteBased VPN session, ip_addresses and prefix_length must be specified to create the tunnel interface and its subnet.
authenticationMode String
Peer authentication mode. PSK - In this mode a secret key shared between local and peer sites is to be used for authentication. The secret key can be a string with a maximum length of 128 characters. CERTIFICATE - In this mode a certificate defined at the global level is to be used for authentication. If user wants to configure compliance_suite, then the authentication_mode can only be CERTIFICATE.
complianceSuite String
Compliance suite. Value is one of CNSA, SUITE_B_GCM_128, SUITE_B_GCM_256, PRIME, FOUNDATION, FIPS, None.
connectionInitiationMode String
Connection initiation mode used by local endpoint to establish ike connection with peer site. INITIATOR - In this mode local endpoint initiates tunnel setup and will also respond to incoming tunnel setup requests from peer gateway. RESPOND_ONLY - In this mode, local endpoint shall only respond to incoming tunnel setup requests. It shall not initiate the tunnel setup. ON_DEMAND - In this mode local endpoint will initiate tunnel creation once first packet matching the policy rule is received and will also respond to incoming initiation request.
description String
Description of the resource.
direction String
The traffic direction apply to the MSS clamping. Value is one of NONE, INBOUND_CONNECTION, OUTBOUND_CONNECTION AND BOTH.
displayName String
Display name of the resource.
dpdProfilePath String
Policy path referencing Dead Peer Detection (DPD) profile. Default is set to system default profile.
enabled Boolean
Boolean. Enable/Disable IPsec VPN session. Default is "true" (session enabled).
ikeProfilePath String
Policy path referencing IKE profile. Note that if user wants to create session with compliance_suite, then this field should not be configured, the provider will use the default Profile for each compliance suite type.
ipAddresses List<String>
IP Tunnel interface (commonly referred as VTI) ip_addresses. Only applied for Route Based VPN Session.
localEndpointPath String
Policy path referencing Local endpoint. In VMC, Local Endpoints are pre-configured the user can refer to their path using data nsxt.PolicyIpsecVpnLocalEndpoint and using the "Private IP1" or "Public IP1" values to refer to the private and public endpoints respectively. Note that if authentication_mode is CERTIFICATE, then the local_endpoint must be configured with certificate_path and trust_ca_paths.
maxSegmentSize Number
Maximum amount of data the host will accept in a TCP segment. Value is an int between 108 and 8860. If not specified then the value would be the automatic calculated MSS value.
nsxId String
The NSX ID of this resource. If set, this ID will be used to create the resource.
path String
The NSX path of the policy resource.
peerAddress String
Public IPV4 address of the remote device terminating the VPN connection.
peerId String
Peer ID to uniquely identify the peer site. The peer ID is the public IP address of the remote device terminating the VPN tunnel. When NAT is configured for the peer, enter the private IP address of the peer.
policyIpsecVpnSessionId String
ID of the resource.
prefixLength Number
Subnet Prefix Length. Only applied for Route Based VPN Session.
psk String
IPSec Pre-shared key. Maximum length of this field is 128 characters.
revision Number
Indicates current revision number of the object as seen by NSX-T API server. This attribute can be useful for debugging.
rules List<Property Map>
Bypass rules for this IPSec VPN Session. Only applicable to PolicyBased VPN Session.
servicePath String
The path of the IPSec VPN service for the VPN session.
tags List<Property Map>
A list of scope + tag pairs to associate with this resource.
tunnelProfilePath String
Policy path referencing Tunnel profile to be used. Note that if user wants to create session with compliance_suite, then this field should not be configured, the provider will use the default Profile for each compliance suite type.
vpnType String
RouteBased or PolicyBased. Policy Based VPN requires to define protect rules that match local and peer subnets. IPSec security association is negotiated for each pair of local and peer subnet. For PolicyBased Session, rule must be specified with sources, destination and action. A Route Based VPN is more flexible, more powerful and recommended over policy based VPN. IP Tunnel port is created and all traffic routed via tunnel port is protected. Routes can be configured statically or can be learned through BGP. A route based VPN is a must for establishing redundant VPN session to remote site. For RouteBased VPN session, ip_addresses and prefix_length must be specified to create the tunnel interface and its subnet.

Supporting Types

PolicyIpsecVpnSessionRule
, PolicyIpsecVpnSessionRuleArgs

Action string
PROTECT or BYPASS. Default is PROTECT.
Destinations List<string>
List of distination subnets. Subnet format is ipv4 CIDR.
NsxId string
The NSX ID of this resource. If set, this ID will be used to create the resource.
Sources List<string>
List of source subnets. Subnet format is ipv4 CIDR.
Action string
PROTECT or BYPASS. Default is PROTECT.
Destinations []string
List of distination subnets. Subnet format is ipv4 CIDR.
NsxId string
The NSX ID of this resource. If set, this ID will be used to create the resource.
Sources []string
List of source subnets. Subnet format is ipv4 CIDR.
action String
PROTECT or BYPASS. Default is PROTECT.
destinations List<String>
List of distination subnets. Subnet format is ipv4 CIDR.
nsxId String
The NSX ID of this resource. If set, this ID will be used to create the resource.
sources List<String>
List of source subnets. Subnet format is ipv4 CIDR.
action string
PROTECT or BYPASS. Default is PROTECT.
destinations string[]
List of distination subnets. Subnet format is ipv4 CIDR.
nsxId string
The NSX ID of this resource. If set, this ID will be used to create the resource.
sources string[]
List of source subnets. Subnet format is ipv4 CIDR.
action str
PROTECT or BYPASS. Default is PROTECT.
destinations Sequence[str]
List of distination subnets. Subnet format is ipv4 CIDR.
nsx_id str
The NSX ID of this resource. If set, this ID will be used to create the resource.
sources Sequence[str]
List of source subnets. Subnet format is ipv4 CIDR.
action String
PROTECT or BYPASS. Default is PROTECT.
destinations List<String>
List of distination subnets. Subnet format is ipv4 CIDR.
nsxId String
The NSX ID of this resource. If set, this ID will be used to create the resource.
sources List<String>
List of source subnets. Subnet format is ipv4 CIDR.

PolicyIpsecVpnSessionTag
, PolicyIpsecVpnSessionTagArgs

Scope string
Tag string
A list of scope + tag pairs to associate with this resource.
Scope string
Tag string
A list of scope + tag pairs to associate with this resource.
scope String
tag String
A list of scope + tag pairs to associate with this resource.
scope string
tag string
A list of scope + tag pairs to associate with this resource.
scope str
tag str
A list of scope + tag pairs to associate with this resource.
scope String
tag String
A list of scope + tag pairs to associate with this resource.

Package Details

Repository
nsxt vmware/terraform-provider-nsxt
License
Notes
This Pulumi package is based on the nsxt Terraform Provider.