1. Packages
  2. Fortios
  3. API Docs
  4. system
  5. Ipsecaggregate
Fortios v0.0.6 published on Tuesday, Jul 9, 2024 by pulumiverse

fortios.system.Ipsecaggregate

Explore with Pulumi AI

Configure an aggregate of IPsec tunnels.

Example Usage

import * as pulumi from "@pulumi/pulumi";
import * as fortios from "@pulumiverse/fortios";

const trname1Phase1interface = new fortios.vpn.ipsec.Phase1interface("trname1Phase1interface", {
    acctVerify: "disable",
    addGwRoute: "disable",
    addRoute: "enable",
    assignIp: "enable",
    assignIpFrom: "range",
    authmethod: "psk",
    autoDiscoveryForwarder: "disable",
    autoDiscoveryPsk: "disable",
    autoDiscoveryReceiver: "disable",
    autoDiscoverySender: "disable",
    autoNegotiate: "enable",
    certIdValidation: "enable",
    childlessIke: "disable",
    clientAutoNegotiate: "disable",
    clientKeepAlive: "disable",
    defaultGw: "0.0.0.0",
    defaultGwPriority: 0,
    dhgrp: "14 5",
    digitalSignatureAuth: "disable",
    distance: 15,
    dnsMode: "manual",
    dpd: "on-demand",
    dpdRetrycount: 3,
    dpdRetryinterval: "20",
    eap: "disable",
    eapIdentity: "use-id-payload",
    encapLocalGw4: "0.0.0.0",
    encapLocalGw6: "::",
    encapRemoteGw4: "0.0.0.0",
    encapRemoteGw6: "::",
    encapsulation: "none",
    encapsulationAddress: "ike",
    enforceUniqueId: "disable",
    exchangeInterfaceIp: "disable",
    exchangeIpAddr4: "0.0.0.0",
    exchangeIpAddr6: "::",
    forticlientEnforcement: "disable",
    fragmentation: "enable",
    fragmentationMtu: 1200,
    groupAuthentication: "disable",
    haSyncEspSeqno: "enable",
    idleTimeout: "disable",
    idleTimeoutinterval: 15,
    ikeVersion: "1",
    includeLocalLan: "disable",
    "interface": "port3",
    ipVersion: "4",
    ipv4DnsServer1: "0.0.0.0",
    ipv4DnsServer2: "0.0.0.0",
    ipv4DnsServer3: "0.0.0.0",
    ipv4EndIp: "0.0.0.0",
    ipv4Netmask: "255.255.255.255",
    ipv4StartIp: "0.0.0.0",
    ipv4WinsServer1: "0.0.0.0",
    ipv4WinsServer2: "0.0.0.0",
    ipv6DnsServer1: "::",
    ipv6DnsServer2: "::",
    ipv6DnsServer3: "::",
    ipv6EndIp: "::",
    ipv6Prefix: 128,
    ipv6StartIp: "::",
    keepalive: 10,
    keylife: 86400,
    localGw: "0.0.0.0",
    localGw6: "::",
    localidType: "auto",
    meshSelectorType: "disable",
    mode: "main",
    modeCfg: "disable",
    monitorHoldDownDelay: 0,
    monitorHoldDownTime: "00:00",
    monitorHoldDownType: "immediate",
    monitorHoldDownWeekday: "sunday",
    nattraversal: "enable",
    negotiateTimeout: 30,
    netDevice: "disable",
    passiveMode: "disable",
    peertype: "any",
    ppk: "disable",
    priority: 0,
    proposal: "aes128-sha256 aes256-sha256 aes128-sha1 aes256-sha1",
    psksecret: "eweeeeeeeecee",
    reauth: "disable",
    rekey: "enable",
    remoteGw: "2.2.2.2",
    remoteGw6: "::",
    rsaSignatureFormat: "pkcs1",
    savePassword: "disable",
    sendCertChain: "enable",
    signatureHashAlg: "sha2-512 sha2-384 sha2-256 sha1",
    suiteB: "disable",
    tunnelSearch: "selectors",
    type: "static",
    unitySupport: "enable",
    wizardType: "custom",
    xauthtype: "disable",
});
const trname1Phase2interface = new fortios.vpn.ipsec.Phase2interface("trname1Phase2interface", {
    addRoute: "phase1",
    autoDiscoveryForwarder: "phase1",
    autoDiscoverySender: "phase1",
    autoNegotiate: "disable",
    dhcpIpsec: "disable",
    dhgrp: "14 5",
    dstAddrType: "subnet",
    dstEndIp6: "::",
    dstPort: 0,
    dstSubnet: "0.0.0.0 0.0.0.0",
    encapsulation: "tunnel-mode",
    keepalive: "disable",
    keylifeType: "seconds",
    keylifekbs: 5120,
    keylifeseconds: 43200,
    l2tp: "disable",
    pfs: "enable",
    phase1name: trname1Phase1interface.name,
    proposal: "aes128-sha1 aes256-sha1 aes128-sha256 aes256-sha256 aes128gcm aes256gcm chacha20poly1305",
    protocol: 0,
    replay: "enable",
    routeOverlap: "use-new",
    singleSource: "disable",
    srcAddrType: "subnet",
    srcEndIp6: "::",
    srcPort: 0,
    srcSubnet: "0.0.0.0 0.0.0.0",
});
const trname = new fortios.system.Ipsecaggregate("trname", {
    algorithm: "round-robin",
    members: [{
        tunnelName: trname1Phase1interface.name,
    }],
});
Copy
import pulumi
import pulumiverse_fortios as fortios

trname1_phase1interface = fortios.vpn.ipsec.Phase1interface("trname1Phase1interface",
    acct_verify="disable",
    add_gw_route="disable",
    add_route="enable",
    assign_ip="enable",
    assign_ip_from="range",
    authmethod="psk",
    auto_discovery_forwarder="disable",
    auto_discovery_psk="disable",
    auto_discovery_receiver="disable",
    auto_discovery_sender="disable",
    auto_negotiate="enable",
    cert_id_validation="enable",
    childless_ike="disable",
    client_auto_negotiate="disable",
    client_keep_alive="disable",
    default_gw="0.0.0.0",
    default_gw_priority=0,
    dhgrp="14 5",
    digital_signature_auth="disable",
    distance=15,
    dns_mode="manual",
    dpd="on-demand",
    dpd_retrycount=3,
    dpd_retryinterval="20",
    eap="disable",
    eap_identity="use-id-payload",
    encap_local_gw4="0.0.0.0",
    encap_local_gw6="::",
    encap_remote_gw4="0.0.0.0",
    encap_remote_gw6="::",
    encapsulation="none",
    encapsulation_address="ike",
    enforce_unique_id="disable",
    exchange_interface_ip="disable",
    exchange_ip_addr4="0.0.0.0",
    exchange_ip_addr6="::",
    forticlient_enforcement="disable",
    fragmentation="enable",
    fragmentation_mtu=1200,
    group_authentication="disable",
    ha_sync_esp_seqno="enable",
    idle_timeout="disable",
    idle_timeoutinterval=15,
    ike_version="1",
    include_local_lan="disable",
    interface="port3",
    ip_version="4",
    ipv4_dns_server1="0.0.0.0",
    ipv4_dns_server2="0.0.0.0",
    ipv4_dns_server3="0.0.0.0",
    ipv4_end_ip="0.0.0.0",
    ipv4_netmask="255.255.255.255",
    ipv4_start_ip="0.0.0.0",
    ipv4_wins_server1="0.0.0.0",
    ipv4_wins_server2="0.0.0.0",
    ipv6_dns_server1="::",
    ipv6_dns_server2="::",
    ipv6_dns_server3="::",
    ipv6_end_ip="::",
    ipv6_prefix=128,
    ipv6_start_ip="::",
    keepalive=10,
    keylife=86400,
    local_gw="0.0.0.0",
    local_gw6="::",
    localid_type="auto",
    mesh_selector_type="disable",
    mode="main",
    mode_cfg="disable",
    monitor_hold_down_delay=0,
    monitor_hold_down_time="00:00",
    monitor_hold_down_type="immediate",
    monitor_hold_down_weekday="sunday",
    nattraversal="enable",
    negotiate_timeout=30,
    net_device="disable",
    passive_mode="disable",
    peertype="any",
    ppk="disable",
    priority=0,
    proposal="aes128-sha256 aes256-sha256 aes128-sha1 aes256-sha1",
    psksecret="eweeeeeeeecee",
    reauth="disable",
    rekey="enable",
    remote_gw="2.2.2.2",
    remote_gw6="::",
    rsa_signature_format="pkcs1",
    save_password="disable",
    send_cert_chain="enable",
    signature_hash_alg="sha2-512 sha2-384 sha2-256 sha1",
    suite_b="disable",
    tunnel_search="selectors",
    type="static",
    unity_support="enable",
    wizard_type="custom",
    xauthtype="disable")
trname1_phase2interface = fortios.vpn.ipsec.Phase2interface("trname1Phase2interface",
    add_route="phase1",
    auto_discovery_forwarder="phase1",
    auto_discovery_sender="phase1",
    auto_negotiate="disable",
    dhcp_ipsec="disable",
    dhgrp="14 5",
    dst_addr_type="subnet",
    dst_end_ip6="::",
    dst_port=0,
    dst_subnet="0.0.0.0 0.0.0.0",
    encapsulation="tunnel-mode",
    keepalive="disable",
    keylife_type="seconds",
    keylifekbs=5120,
    keylifeseconds=43200,
    l2tp="disable",
    pfs="enable",
    phase1name=trname1_phase1interface.name,
    proposal="aes128-sha1 aes256-sha1 aes128-sha256 aes256-sha256 aes128gcm aes256gcm chacha20poly1305",
    protocol=0,
    replay="enable",
    route_overlap="use-new",
    single_source="disable",
    src_addr_type="subnet",
    src_end_ip6="::",
    src_port=0,
    src_subnet="0.0.0.0 0.0.0.0")
trname = fortios.system.Ipsecaggregate("trname",
    algorithm="round-robin",
    members=[fortios.system.IpsecaggregateMemberArgs(
        tunnel_name=trname1_phase1interface.name,
    )])
Copy
package main

import (
	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
	"github.com/pulumiverse/pulumi-fortios/sdk/go/fortios/system"
	"github.com/pulumiverse/pulumi-fortios/sdk/go/fortios/vpn"
)

func main() {
	pulumi.Run(func(ctx *pulumi.Context) error {
		trname1Phase1interface, err := vpn.NewPhase1interface(ctx, "trname1Phase1interface", &vpn.Phase1interfaceArgs{
			AcctVerify:             pulumi.String("disable"),
			AddGwRoute:             pulumi.String("disable"),
			AddRoute:               pulumi.String("enable"),
			AssignIp:               pulumi.String("enable"),
			AssignIpFrom:           pulumi.String("range"),
			Authmethod:             pulumi.String("psk"),
			AutoDiscoveryForwarder: pulumi.String("disable"),
			AutoDiscoveryPsk:       pulumi.String("disable"),
			AutoDiscoveryReceiver:  pulumi.String("disable"),
			AutoDiscoverySender:    pulumi.String("disable"),
			AutoNegotiate:          pulumi.String("enable"),
			CertIdValidation:       pulumi.String("enable"),
			ChildlessIke:           pulumi.String("disable"),
			ClientAutoNegotiate:    pulumi.String("disable"),
			ClientKeepAlive:        pulumi.String("disable"),
			DefaultGw:              pulumi.String("0.0.0.0"),
			DefaultGwPriority:      pulumi.Int(0),
			Dhgrp:                  pulumi.String("14 5"),
			DigitalSignatureAuth:   pulumi.String("disable"),
			Distance:               pulumi.Int(15),
			DnsMode:                pulumi.String("manual"),
			Dpd:                    pulumi.String("on-demand"),
			DpdRetrycount:          pulumi.Int(3),
			DpdRetryinterval:       pulumi.String("20"),
			Eap:                    pulumi.String("disable"),
			EapIdentity:            pulumi.String("use-id-payload"),
			EncapLocalGw4:          pulumi.String("0.0.0.0"),
			EncapLocalGw6:          pulumi.String("::"),
			EncapRemoteGw4:         pulumi.String("0.0.0.0"),
			EncapRemoteGw6:         pulumi.String("::"),
			Encapsulation:          pulumi.String("none"),
			EncapsulationAddress:   pulumi.String("ike"),
			EnforceUniqueId:        pulumi.String("disable"),
			ExchangeInterfaceIp:    pulumi.String("disable"),
			ExchangeIpAddr4:        pulumi.String("0.0.0.0"),
			ExchangeIpAddr6:        pulumi.String("::"),
			ForticlientEnforcement: pulumi.String("disable"),
			Fragmentation:          pulumi.String("enable"),
			FragmentationMtu:       pulumi.Int(1200),
			GroupAuthentication:    pulumi.String("disable"),
			HaSyncEspSeqno:         pulumi.String("enable"),
			IdleTimeout:            pulumi.String("disable"),
			IdleTimeoutinterval:    pulumi.Int(15),
			IkeVersion:             pulumi.String("1"),
			IncludeLocalLan:        pulumi.String("disable"),
			Interface:              pulumi.String("port3"),
			IpVersion:              pulumi.String("4"),
			Ipv4DnsServer1:         pulumi.String("0.0.0.0"),
			Ipv4DnsServer2:         pulumi.String("0.0.0.0"),
			Ipv4DnsServer3:         pulumi.String("0.0.0.0"),
			Ipv4EndIp:              pulumi.String("0.0.0.0"),
			Ipv4Netmask:            pulumi.String("255.255.255.255"),
			Ipv4StartIp:            pulumi.String("0.0.0.0"),
			Ipv4WinsServer1:        pulumi.String("0.0.0.0"),
			Ipv4WinsServer2:        pulumi.String("0.0.0.0"),
			Ipv6DnsServer1:         pulumi.String("::"),
			Ipv6DnsServer2:         pulumi.String("::"),
			Ipv6DnsServer3:         pulumi.String("::"),
			Ipv6EndIp:              pulumi.String("::"),
			Ipv6Prefix:             pulumi.Int(128),
			Ipv6StartIp:            pulumi.String("::"),
			Keepalive:              pulumi.Int(10),
			Keylife:                pulumi.Int(86400),
			LocalGw:                pulumi.String("0.0.0.0"),
			LocalGw6:               pulumi.String("::"),
			LocalidType:            pulumi.String("auto"),
			MeshSelectorType:       pulumi.String("disable"),
			Mode:                   pulumi.String("main"),
			ModeCfg:                pulumi.String("disable"),
			MonitorHoldDownDelay:   pulumi.Int(0),
			MonitorHoldDownTime:    pulumi.String("00:00"),
			MonitorHoldDownType:    pulumi.String("immediate"),
			MonitorHoldDownWeekday: pulumi.String("sunday"),
			Nattraversal:           pulumi.String("enable"),
			NegotiateTimeout:       pulumi.Int(30),
			NetDevice:              pulumi.String("disable"),
			PassiveMode:            pulumi.String("disable"),
			Peertype:               pulumi.String("any"),
			Ppk:                    pulumi.String("disable"),
			Priority:               pulumi.Int(0),
			Proposal:               pulumi.String("aes128-sha256 aes256-sha256 aes128-sha1 aes256-sha1"),
			Psksecret:              pulumi.String("eweeeeeeeecee"),
			Reauth:                 pulumi.String("disable"),
			Rekey:                  pulumi.String("enable"),
			RemoteGw:               pulumi.String("2.2.2.2"),
			RemoteGw6:              pulumi.String("::"),
			RsaSignatureFormat:     pulumi.String("pkcs1"),
			SavePassword:           pulumi.String("disable"),
			SendCertChain:          pulumi.String("enable"),
			SignatureHashAlg:       pulumi.String("sha2-512 sha2-384 sha2-256 sha1"),
			SuiteB:                 pulumi.String("disable"),
			TunnelSearch:           pulumi.String("selectors"),
			Type:                   pulumi.String("static"),
			UnitySupport:           pulumi.String("enable"),
			WizardType:             pulumi.String("custom"),
			Xauthtype:              pulumi.String("disable"),
		})
		if err != nil {
			return err
		}
		_, err = vpn.NewPhase2interface(ctx, "trname1Phase2interface", &vpn.Phase2interfaceArgs{
			AddRoute:               pulumi.String("phase1"),
			AutoDiscoveryForwarder: pulumi.String("phase1"),
			AutoDiscoverySender:    pulumi.String("phase1"),
			AutoNegotiate:          pulumi.String("disable"),
			DhcpIpsec:              pulumi.String("disable"),
			Dhgrp:                  pulumi.String("14 5"),
			DstAddrType:            pulumi.String("subnet"),
			DstEndIp6:              pulumi.String("::"),
			DstPort:                pulumi.Int(0),
			DstSubnet:              pulumi.String("0.0.0.0 0.0.0.0"),
			Encapsulation:          pulumi.String("tunnel-mode"),
			Keepalive:              pulumi.String("disable"),
			KeylifeType:            pulumi.String("seconds"),
			Keylifekbs:             pulumi.Int(5120),
			Keylifeseconds:         pulumi.Int(43200),
			L2tp:                   pulumi.String("disable"),
			Pfs:                    pulumi.String("enable"),
			Phase1name:             trname1Phase1interface.Name,
			Proposal:               pulumi.String("aes128-sha1 aes256-sha1 aes128-sha256 aes256-sha256 aes128gcm aes256gcm chacha20poly1305"),
			Protocol:               pulumi.Int(0),
			Replay:                 pulumi.String("enable"),
			RouteOverlap:           pulumi.String("use-new"),
			SingleSource:           pulumi.String("disable"),
			SrcAddrType:            pulumi.String("subnet"),
			SrcEndIp6:              pulumi.String("::"),
			SrcPort:                pulumi.Int(0),
			SrcSubnet:              pulumi.String("0.0.0.0 0.0.0.0"),
		})
		if err != nil {
			return err
		}
		_, err = system.NewIpsecaggregate(ctx, "trname", &system.IpsecaggregateArgs{
			Algorithm: pulumi.String("round-robin"),
			Members: system.IpsecaggregateMemberArray{
				&system.IpsecaggregateMemberArgs{
					TunnelName: trname1Phase1interface.Name,
				},
			},
		})
		if err != nil {
			return err
		}
		return nil
	})
}
Copy
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Fortios = Pulumiverse.Fortios;

return await Deployment.RunAsync(() => 
{
    var trname1Phase1interface = new Fortios.Vpn.Ipsec.Phase1interface("trname1Phase1interface", new()
    {
        AcctVerify = "disable",
        AddGwRoute = "disable",
        AddRoute = "enable",
        AssignIp = "enable",
        AssignIpFrom = "range",
        Authmethod = "psk",
        AutoDiscoveryForwarder = "disable",
        AutoDiscoveryPsk = "disable",
        AutoDiscoveryReceiver = "disable",
        AutoDiscoverySender = "disable",
        AutoNegotiate = "enable",
        CertIdValidation = "enable",
        ChildlessIke = "disable",
        ClientAutoNegotiate = "disable",
        ClientKeepAlive = "disable",
        DefaultGw = "0.0.0.0",
        DefaultGwPriority = 0,
        Dhgrp = "14 5",
        DigitalSignatureAuth = "disable",
        Distance = 15,
        DnsMode = "manual",
        Dpd = "on-demand",
        DpdRetrycount = 3,
        DpdRetryinterval = "20",
        Eap = "disable",
        EapIdentity = "use-id-payload",
        EncapLocalGw4 = "0.0.0.0",
        EncapLocalGw6 = "::",
        EncapRemoteGw4 = "0.0.0.0",
        EncapRemoteGw6 = "::",
        Encapsulation = "none",
        EncapsulationAddress = "ike",
        EnforceUniqueId = "disable",
        ExchangeInterfaceIp = "disable",
        ExchangeIpAddr4 = "0.0.0.0",
        ExchangeIpAddr6 = "::",
        ForticlientEnforcement = "disable",
        Fragmentation = "enable",
        FragmentationMtu = 1200,
        GroupAuthentication = "disable",
        HaSyncEspSeqno = "enable",
        IdleTimeout = "disable",
        IdleTimeoutinterval = 15,
        IkeVersion = "1",
        IncludeLocalLan = "disable",
        Interface = "port3",
        IpVersion = "4",
        Ipv4DnsServer1 = "0.0.0.0",
        Ipv4DnsServer2 = "0.0.0.0",
        Ipv4DnsServer3 = "0.0.0.0",
        Ipv4EndIp = "0.0.0.0",
        Ipv4Netmask = "255.255.255.255",
        Ipv4StartIp = "0.0.0.0",
        Ipv4WinsServer1 = "0.0.0.0",
        Ipv4WinsServer2 = "0.0.0.0",
        Ipv6DnsServer1 = "::",
        Ipv6DnsServer2 = "::",
        Ipv6DnsServer3 = "::",
        Ipv6EndIp = "::",
        Ipv6Prefix = 128,
        Ipv6StartIp = "::",
        Keepalive = 10,
        Keylife = 86400,
        LocalGw = "0.0.0.0",
        LocalGw6 = "::",
        LocalidType = "auto",
        MeshSelectorType = "disable",
        Mode = "main",
        ModeCfg = "disable",
        MonitorHoldDownDelay = 0,
        MonitorHoldDownTime = "00:00",
        MonitorHoldDownType = "immediate",
        MonitorHoldDownWeekday = "sunday",
        Nattraversal = "enable",
        NegotiateTimeout = 30,
        NetDevice = "disable",
        PassiveMode = "disable",
        Peertype = "any",
        Ppk = "disable",
        Priority = 0,
        Proposal = "aes128-sha256 aes256-sha256 aes128-sha1 aes256-sha1",
        Psksecret = "eweeeeeeeecee",
        Reauth = "disable",
        Rekey = "enable",
        RemoteGw = "2.2.2.2",
        RemoteGw6 = "::",
        RsaSignatureFormat = "pkcs1",
        SavePassword = "disable",
        SendCertChain = "enable",
        SignatureHashAlg = "sha2-512 sha2-384 sha2-256 sha1",
        SuiteB = "disable",
        TunnelSearch = "selectors",
        Type = "static",
        UnitySupport = "enable",
        WizardType = "custom",
        Xauthtype = "disable",
    });

    var trname1Phase2interface = new Fortios.Vpn.Ipsec.Phase2interface("trname1Phase2interface", new()
    {
        AddRoute = "phase1",
        AutoDiscoveryForwarder = "phase1",
        AutoDiscoverySender = "phase1",
        AutoNegotiate = "disable",
        DhcpIpsec = "disable",
        Dhgrp = "14 5",
        DstAddrType = "subnet",
        DstEndIp6 = "::",
        DstPort = 0,
        DstSubnet = "0.0.0.0 0.0.0.0",
        Encapsulation = "tunnel-mode",
        Keepalive = "disable",
        KeylifeType = "seconds",
        Keylifekbs = 5120,
        Keylifeseconds = 43200,
        L2tp = "disable",
        Pfs = "enable",
        Phase1name = trname1Phase1interface.Name,
        Proposal = "aes128-sha1 aes256-sha1 aes128-sha256 aes256-sha256 aes128gcm aes256gcm chacha20poly1305",
        Protocol = 0,
        Replay = "enable",
        RouteOverlap = "use-new",
        SingleSource = "disable",
        SrcAddrType = "subnet",
        SrcEndIp6 = "::",
        SrcPort = 0,
        SrcSubnet = "0.0.0.0 0.0.0.0",
    });

    var trname = new Fortios.System.Ipsecaggregate("trname", new()
    {
        Algorithm = "round-robin",
        Members = new[]
        {
            new Fortios.System.Inputs.IpsecaggregateMemberArgs
            {
                TunnelName = trname1Phase1interface.Name,
            },
        },
    });

});
Copy
package generated_program;

import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.fortios.vpn.Phase1interface;
import com.pulumi.fortios.vpn.Phase1interfaceArgs;
import com.pulumi.fortios.vpn.Phase2interface;
import com.pulumi.fortios.vpn.Phase2interfaceArgs;
import com.pulumi.fortios.system.Ipsecaggregate;
import com.pulumi.fortios.system.IpsecaggregateArgs;
import com.pulumi.fortios.system.inputs.IpsecaggregateMemberArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;

public class App {
    public static void main(String[] args) {
        Pulumi.run(App::stack);
    }

    public static void stack(Context ctx) {
        var trname1Phase1interface = new Phase1interface("trname1Phase1interface", Phase1interfaceArgs.builder()
            .acctVerify("disable")
            .addGwRoute("disable")
            .addRoute("enable")
            .assignIp("enable")
            .assignIpFrom("range")
            .authmethod("psk")
            .autoDiscoveryForwarder("disable")
            .autoDiscoveryPsk("disable")
            .autoDiscoveryReceiver("disable")
            .autoDiscoverySender("disable")
            .autoNegotiate("enable")
            .certIdValidation("enable")
            .childlessIke("disable")
            .clientAutoNegotiate("disable")
            .clientKeepAlive("disable")
            .defaultGw("0.0.0.0")
            .defaultGwPriority(0)
            .dhgrp("14 5")
            .digitalSignatureAuth("disable")
            .distance(15)
            .dnsMode("manual")
            .dpd("on-demand")
            .dpdRetrycount(3)
            .dpdRetryinterval("20")
            .eap("disable")
            .eapIdentity("use-id-payload")
            .encapLocalGw4("0.0.0.0")
            .encapLocalGw6("::")
            .encapRemoteGw4("0.0.0.0")
            .encapRemoteGw6("::")
            .encapsulation("none")
            .encapsulationAddress("ike")
            .enforceUniqueId("disable")
            .exchangeInterfaceIp("disable")
            .exchangeIpAddr4("0.0.0.0")
            .exchangeIpAddr6("::")
            .forticlientEnforcement("disable")
            .fragmentation("enable")
            .fragmentationMtu(1200)
            .groupAuthentication("disable")
            .haSyncEspSeqno("enable")
            .idleTimeout("disable")
            .idleTimeoutinterval(15)
            .ikeVersion("1")
            .includeLocalLan("disable")
            .interface_("port3")
            .ipVersion("4")
            .ipv4DnsServer1("0.0.0.0")
            .ipv4DnsServer2("0.0.0.0")
            .ipv4DnsServer3("0.0.0.0")
            .ipv4EndIp("0.0.0.0")
            .ipv4Netmask("255.255.255.255")
            .ipv4StartIp("0.0.0.0")
            .ipv4WinsServer1("0.0.0.0")
            .ipv4WinsServer2("0.0.0.0")
            .ipv6DnsServer1("::")
            .ipv6DnsServer2("::")
            .ipv6DnsServer3("::")
            .ipv6EndIp("::")
            .ipv6Prefix(128)
            .ipv6StartIp("::")
            .keepalive(10)
            .keylife(86400)
            .localGw("0.0.0.0")
            .localGw6("::")
            .localidType("auto")
            .meshSelectorType("disable")
            .mode("main")
            .modeCfg("disable")
            .monitorHoldDownDelay(0)
            .monitorHoldDownTime("00:00")
            .monitorHoldDownType("immediate")
            .monitorHoldDownWeekday("sunday")
            .nattraversal("enable")
            .negotiateTimeout(30)
            .netDevice("disable")
            .passiveMode("disable")
            .peertype("any")
            .ppk("disable")
            .priority(0)
            .proposal("aes128-sha256 aes256-sha256 aes128-sha1 aes256-sha1")
            .psksecret("eweeeeeeeecee")
            .reauth("disable")
            .rekey("enable")
            .remoteGw("2.2.2.2")
            .remoteGw6("::")
            .rsaSignatureFormat("pkcs1")
            .savePassword("disable")
            .sendCertChain("enable")
            .signatureHashAlg("sha2-512 sha2-384 sha2-256 sha1")
            .suiteB("disable")
            .tunnelSearch("selectors")
            .type("static")
            .unitySupport("enable")
            .wizardType("custom")
            .xauthtype("disable")
            .build());

        var trname1Phase2interface = new Phase2interface("trname1Phase2interface", Phase2interfaceArgs.builder()
            .addRoute("phase1")
            .autoDiscoveryForwarder("phase1")
            .autoDiscoverySender("phase1")
            .autoNegotiate("disable")
            .dhcpIpsec("disable")
            .dhgrp("14 5")
            .dstAddrType("subnet")
            .dstEndIp6("::")
            .dstPort(0)
            .dstSubnet("0.0.0.0 0.0.0.0")
            .encapsulation("tunnel-mode")
            .keepalive("disable")
            .keylifeType("seconds")
            .keylifekbs(5120)
            .keylifeseconds(43200)
            .l2tp("disable")
            .pfs("enable")
            .phase1name(trname1Phase1interface.name())
            .proposal("aes128-sha1 aes256-sha1 aes128-sha256 aes256-sha256 aes128gcm aes256gcm chacha20poly1305")
            .protocol(0)
            .replay("enable")
            .routeOverlap("use-new")
            .singleSource("disable")
            .srcAddrType("subnet")
            .srcEndIp6("::")
            .srcPort(0)
            .srcSubnet("0.0.0.0 0.0.0.0")
            .build());

        var trname = new Ipsecaggregate("trname", IpsecaggregateArgs.builder()
            .algorithm("round-robin")
            .members(IpsecaggregateMemberArgs.builder()
                .tunnelName(trname1Phase1interface.name())
                .build())
            .build());

    }
}
Copy
resources:
  trname1Phase1interface:
    type: fortios:vpn/ipsec:Phase1interface
    properties:
      acctVerify: disable
      addGwRoute: disable
      addRoute: enable
      assignIp: enable
      assignIpFrom: range
      authmethod: psk
      autoDiscoveryForwarder: disable
      autoDiscoveryPsk: disable
      autoDiscoveryReceiver: disable
      autoDiscoverySender: disable
      autoNegotiate: enable
      certIdValidation: enable
      childlessIke: disable
      clientAutoNegotiate: disable
      clientKeepAlive: disable
      defaultGw: 0.0.0.0
      defaultGwPriority: 0
      dhgrp: 14 5
      digitalSignatureAuth: disable
      distance: 15
      dnsMode: manual
      dpd: on-demand
      dpdRetrycount: 3
      dpdRetryinterval: '20'
      eap: disable
      eapIdentity: use-id-payload
      encapLocalGw4: 0.0.0.0
      encapLocalGw6: '::'
      encapRemoteGw4: 0.0.0.0
      encapRemoteGw6: '::'
      encapsulation: none
      encapsulationAddress: ike
      enforceUniqueId: disable
      exchangeInterfaceIp: disable
      exchangeIpAddr4: 0.0.0.0
      exchangeIpAddr6: '::'
      forticlientEnforcement: disable
      fragmentation: enable
      fragmentationMtu: 1200
      groupAuthentication: disable
      haSyncEspSeqno: enable
      idleTimeout: disable
      idleTimeoutinterval: 15
      ikeVersion: '1'
      includeLocalLan: disable
      interface: port3
      ipVersion: '4'
      ipv4DnsServer1: 0.0.0.0
      ipv4DnsServer2: 0.0.0.0
      ipv4DnsServer3: 0.0.0.0
      ipv4EndIp: 0.0.0.0
      ipv4Netmask: 255.255.255.255
      ipv4StartIp: 0.0.0.0
      ipv4WinsServer1: 0.0.0.0
      ipv4WinsServer2: 0.0.0.0
      ipv6DnsServer1: '::'
      ipv6DnsServer2: '::'
      ipv6DnsServer3: '::'
      ipv6EndIp: '::'
      ipv6Prefix: 128
      ipv6StartIp: '::'
      keepalive: 10
      keylife: 86400
      localGw: 0.0.0.0
      localGw6: '::'
      localidType: auto
      meshSelectorType: disable
      mode: main
      modeCfg: disable
      monitorHoldDownDelay: 0
      monitorHoldDownTime: 00:00
      monitorHoldDownType: immediate
      monitorHoldDownWeekday: sunday
      nattraversal: enable
      negotiateTimeout: 30
      netDevice: disable
      passiveMode: disable
      peertype: any
      ppk: disable
      priority: 0
      proposal: aes128-sha256 aes256-sha256 aes128-sha1 aes256-sha1
      psksecret: eweeeeeeeecee
      reauth: disable
      rekey: enable
      remoteGw: 2.2.2.2
      remoteGw6: '::'
      rsaSignatureFormat: pkcs1
      savePassword: disable
      sendCertChain: enable
      signatureHashAlg: sha2-512 sha2-384 sha2-256 sha1
      suiteB: disable
      tunnelSearch: selectors
      type: static
      unitySupport: enable
      wizardType: custom
      xauthtype: disable
  trname1Phase2interface:
    type: fortios:vpn/ipsec:Phase2interface
    properties:
      addRoute: phase1
      autoDiscoveryForwarder: phase1
      autoDiscoverySender: phase1
      autoNegotiate: disable
      dhcpIpsec: disable
      dhgrp: 14 5
      dstAddrType: subnet
      dstEndIp6: '::'
      dstPort: 0
      dstSubnet: 0.0.0.0 0.0.0.0
      encapsulation: tunnel-mode
      keepalive: disable
      keylifeType: seconds
      keylifekbs: 5120
      keylifeseconds: 43200
      l2tp: disable
      pfs: enable
      phase1name: ${trname1Phase1interface.name}
      proposal: aes128-sha1 aes256-sha1 aes128-sha256 aes256-sha256 aes128gcm aes256gcm chacha20poly1305
      protocol: 0
      replay: enable
      routeOverlap: use-new
      singleSource: disable
      srcAddrType: subnet
      srcEndIp6: '::'
      srcPort: 0
      srcSubnet: 0.0.0.0 0.0.0.0
  trname:
    type: fortios:system:Ipsecaggregate
    properties:
      algorithm: round-robin
      members:
        - tunnelName: ${trname1Phase1interface.name}
Copy

Create Ipsecaggregate Resource

Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.

Constructor syntax

new Ipsecaggregate(name: string, args: IpsecaggregateArgs, opts?: CustomResourceOptions);
@overload
def Ipsecaggregate(resource_name: str,
                   args: IpsecaggregateArgs,
                   opts: Optional[ResourceOptions] = None)

@overload
def Ipsecaggregate(resource_name: str,
                   opts: Optional[ResourceOptions] = None,
                   members: Optional[Sequence[IpsecaggregateMemberArgs]] = None,
                   algorithm: Optional[str] = None,
                   dynamic_sort_subtable: Optional[str] = None,
                   get_all_tables: Optional[str] = None,
                   name: Optional[str] = None,
                   vdomparam: Optional[str] = None)
func NewIpsecaggregate(ctx *Context, name string, args IpsecaggregateArgs, opts ...ResourceOption) (*Ipsecaggregate, error)
public Ipsecaggregate(string name, IpsecaggregateArgs args, CustomResourceOptions? opts = null)
public Ipsecaggregate(String name, IpsecaggregateArgs args)
public Ipsecaggregate(String name, IpsecaggregateArgs args, CustomResourceOptions options)
type: fortios:system:Ipsecaggregate
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.

Parameters

name This property is required. string
The unique name of the resource.
args This property is required. IpsecaggregateArgs
The arguments to resource properties.
opts CustomResourceOptions
Bag of options to control resource's behavior.
resource_name This property is required. str
The unique name of the resource.
args This property is required. IpsecaggregateArgs
The arguments to resource properties.
opts ResourceOptions
Bag of options to control resource's behavior.
ctx Context
Context object for the current deployment.
name This property is required. string
The unique name of the resource.
args This property is required. IpsecaggregateArgs
The arguments to resource properties.
opts ResourceOption
Bag of options to control resource's behavior.
name This property is required. string
The unique name of the resource.
args This property is required. IpsecaggregateArgs
The arguments to resource properties.
opts CustomResourceOptions
Bag of options to control resource's behavior.
name This property is required. String
The unique name of the resource.
args This property is required. IpsecaggregateArgs
The arguments to resource properties.
options CustomResourceOptions
Bag of options to control resource's behavior.

Constructor example

The following reference example uses placeholder values for all input properties.

var ipsecaggregateResource = new Fortios.System.Ipsecaggregate("ipsecaggregateResource", new()
{
    Members = new[]
    {
        new Fortios.System.Inputs.IpsecaggregateMemberArgs
        {
            TunnelName = "string",
        },
    },
    Algorithm = "string",
    DynamicSortSubtable = "string",
    GetAllTables = "string",
    Name = "string",
    Vdomparam = "string",
});
Copy
example, err := system.NewIpsecaggregate(ctx, "ipsecaggregateResource", &system.IpsecaggregateArgs{
	Members: system.IpsecaggregateMemberArray{
		&system.IpsecaggregateMemberArgs{
			TunnelName: pulumi.String("string"),
		},
	},
	Algorithm:           pulumi.String("string"),
	DynamicSortSubtable: pulumi.String("string"),
	GetAllTables:        pulumi.String("string"),
	Name:                pulumi.String("string"),
	Vdomparam:           pulumi.String("string"),
})
Copy
var ipsecaggregateResource = new Ipsecaggregate("ipsecaggregateResource", IpsecaggregateArgs.builder()
    .members(IpsecaggregateMemberArgs.builder()
        .tunnelName("string")
        .build())
    .algorithm("string")
    .dynamicSortSubtable("string")
    .getAllTables("string")
    .name("string")
    .vdomparam("string")
    .build());
Copy
ipsecaggregate_resource = fortios.system.Ipsecaggregate("ipsecaggregateResource",
    members=[{
        "tunnel_name": "string",
    }],
    algorithm="string",
    dynamic_sort_subtable="string",
    get_all_tables="string",
    name="string",
    vdomparam="string")
Copy
const ipsecaggregateResource = new fortios.system.Ipsecaggregate("ipsecaggregateResource", {
    members: [{
        tunnelName: "string",
    }],
    algorithm: "string",
    dynamicSortSubtable: "string",
    getAllTables: "string",
    name: "string",
    vdomparam: "string",
});
Copy
type: fortios:system:Ipsecaggregate
properties:
    algorithm: string
    dynamicSortSubtable: string
    getAllTables: string
    members:
        - tunnelName: string
    name: string
    vdomparam: string
Copy

Ipsecaggregate Resource Properties

To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

Inputs

In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.

The Ipsecaggregate resource accepts the following input properties:

Members This property is required. List<Pulumiverse.Fortios.System.Inputs.IpsecaggregateMember>
Member tunnels of the aggregate. The structure of member block is documented below.
Algorithm string
Frame distribution algorithm.
DynamicSortSubtable string
Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
GetAllTables string
Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwise, conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
Name Changes to this property will trigger replacement. string
IPsec aggregate name.
Vdomparam Changes to this property will trigger replacement. string
Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
Members This property is required. []IpsecaggregateMemberArgs
Member tunnels of the aggregate. The structure of member block is documented below.
Algorithm string
Frame distribution algorithm.
DynamicSortSubtable string
Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
GetAllTables string
Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwise, conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
Name Changes to this property will trigger replacement. string
IPsec aggregate name.
Vdomparam Changes to this property will trigger replacement. string
Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
members This property is required. List<IpsecaggregateMember>
Member tunnels of the aggregate. The structure of member block is documented below.
algorithm String
Frame distribution algorithm.
dynamicSortSubtable String
Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
getAllTables String
Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwise, conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
name Changes to this property will trigger replacement. String
IPsec aggregate name.
vdomparam Changes to this property will trigger replacement. String
Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
members This property is required. IpsecaggregateMember[]
Member tunnels of the aggregate. The structure of member block is documented below.
algorithm string
Frame distribution algorithm.
dynamicSortSubtable string
Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
getAllTables string
Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwise, conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
name Changes to this property will trigger replacement. string
IPsec aggregate name.
vdomparam Changes to this property will trigger replacement. string
Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
members This property is required. Sequence[IpsecaggregateMemberArgs]
Member tunnels of the aggregate. The structure of member block is documented below.
algorithm str
Frame distribution algorithm.
dynamic_sort_subtable str
Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
get_all_tables str
Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwise, conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
name Changes to this property will trigger replacement. str
IPsec aggregate name.
vdomparam Changes to this property will trigger replacement. str
Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
members This property is required. List<Property Map>
Member tunnels of the aggregate. The structure of member block is documented below.
algorithm String
Frame distribution algorithm.
dynamicSortSubtable String
Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
getAllTables String
Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwise, conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
name Changes to this property will trigger replacement. String
IPsec aggregate name.
vdomparam Changes to this property will trigger replacement. String
Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.

Outputs

All input properties are implicitly available as output properties. Additionally, the Ipsecaggregate resource produces the following output properties:

Id string
The provider-assigned unique ID for this managed resource.
Id string
The provider-assigned unique ID for this managed resource.
id String
The provider-assigned unique ID for this managed resource.
id string
The provider-assigned unique ID for this managed resource.
id str
The provider-assigned unique ID for this managed resource.
id String
The provider-assigned unique ID for this managed resource.

Look up Existing Ipsecaggregate Resource

Get an existing Ipsecaggregate resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

public static get(name: string, id: Input<ID>, state?: IpsecaggregateState, opts?: CustomResourceOptions): Ipsecaggregate
@staticmethod
def get(resource_name: str,
        id: str,
        opts: Optional[ResourceOptions] = None,
        algorithm: Optional[str] = None,
        dynamic_sort_subtable: Optional[str] = None,
        get_all_tables: Optional[str] = None,
        members: Optional[Sequence[IpsecaggregateMemberArgs]] = None,
        name: Optional[str] = None,
        vdomparam: Optional[str] = None) -> Ipsecaggregate
func GetIpsecaggregate(ctx *Context, name string, id IDInput, state *IpsecaggregateState, opts ...ResourceOption) (*Ipsecaggregate, error)
public static Ipsecaggregate Get(string name, Input<string> id, IpsecaggregateState? state, CustomResourceOptions? opts = null)
public static Ipsecaggregate get(String name, Output<String> id, IpsecaggregateState state, CustomResourceOptions options)
resources:  _:    type: fortios:system:Ipsecaggregate    get:      id: ${id}
name This property is required.
The unique name of the resulting resource.
id This property is required.
The unique provider ID of the resource to lookup.
state
Any extra arguments used during the lookup.
opts
A bag of options that control this resource's behavior.
resource_name This property is required.
The unique name of the resulting resource.
id This property is required.
The unique provider ID of the resource to lookup.
name This property is required.
The unique name of the resulting resource.
id This property is required.
The unique provider ID of the resource to lookup.
state
Any extra arguments used during the lookup.
opts
A bag of options that control this resource's behavior.
name This property is required.
The unique name of the resulting resource.
id This property is required.
The unique provider ID of the resource to lookup.
state
Any extra arguments used during the lookup.
opts
A bag of options that control this resource's behavior.
name This property is required.
The unique name of the resulting resource.
id This property is required.
The unique provider ID of the resource to lookup.
state
Any extra arguments used during the lookup.
opts
A bag of options that control this resource's behavior.
The following state arguments are supported:
Algorithm string
Frame distribution algorithm.
DynamicSortSubtable string
Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
GetAllTables string
Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwise, conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
Members List<Pulumiverse.Fortios.System.Inputs.IpsecaggregateMember>
Member tunnels of the aggregate. The structure of member block is documented below.
Name Changes to this property will trigger replacement. string
IPsec aggregate name.
Vdomparam Changes to this property will trigger replacement. string
Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
Algorithm string
Frame distribution algorithm.
DynamicSortSubtable string
Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
GetAllTables string
Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwise, conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
Members []IpsecaggregateMemberArgs
Member tunnels of the aggregate. The structure of member block is documented below.
Name Changes to this property will trigger replacement. string
IPsec aggregate name.
Vdomparam Changes to this property will trigger replacement. string
Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
algorithm String
Frame distribution algorithm.
dynamicSortSubtable String
Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
getAllTables String
Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwise, conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
members List<IpsecaggregateMember>
Member tunnels of the aggregate. The structure of member block is documented below.
name Changes to this property will trigger replacement. String
IPsec aggregate name.
vdomparam Changes to this property will trigger replacement. String
Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
algorithm string
Frame distribution algorithm.
dynamicSortSubtable string
Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
getAllTables string
Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwise, conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
members IpsecaggregateMember[]
Member tunnels of the aggregate. The structure of member block is documented below.
name Changes to this property will trigger replacement. string
IPsec aggregate name.
vdomparam Changes to this property will trigger replacement. string
Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
algorithm str
Frame distribution algorithm.
dynamic_sort_subtable str
Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
get_all_tables str
Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwise, conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
members Sequence[IpsecaggregateMemberArgs]
Member tunnels of the aggregate. The structure of member block is documented below.
name Changes to this property will trigger replacement. str
IPsec aggregate name.
vdomparam Changes to this property will trigger replacement. str
Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
algorithm String
Frame distribution algorithm.
dynamicSortSubtable String
Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
getAllTables String
Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwise, conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
members List<Property Map>
Member tunnels of the aggregate. The structure of member block is documented below.
name Changes to this property will trigger replacement. String
IPsec aggregate name.
vdomparam Changes to this property will trigger replacement. String
Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.

Supporting Types

IpsecaggregateMember
, IpsecaggregateMemberArgs

TunnelName string
Tunnel name.
TunnelName string
Tunnel name.
tunnelName String
Tunnel name.
tunnelName string
Tunnel name.
tunnel_name str
Tunnel name.
tunnelName String
Tunnel name.

Import

System IpsecAggregate can be imported using any of these accepted formats:

$ pulumi import fortios:system/ipsecaggregate:Ipsecaggregate labelname {{name}}
Copy

If you do not want to import arguments of block:

$ export “FORTIOS_IMPORT_TABLE”=“false”

$ pulumi import fortios:system/ipsecaggregate:Ipsecaggregate labelname {{name}}
Copy

$ unset “FORTIOS_IMPORT_TABLE”

To learn more about importing existing cloud resources, see Importing resources.

Package Details

Repository
fortios pulumiverse/pulumi-fortios
License
Apache-2.0
Notes
This Pulumi package is based on the fortios Terraform Provider.