alibabacloud-vpc20160428 6.10.2__py3-none-any.whl → 6.10.3__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- alibabacloud_vpc20160428/__init__.py +1 -1
- alibabacloud_vpc20160428/client.py +7872 -3184
- alibabacloud_vpc20160428/models.py +607 -216
- {alibabacloud_vpc20160428-6.10.2.dist-info → alibabacloud_vpc20160428-6.10.3.dist-info}/METADATA +1 -1
- alibabacloud_vpc20160428-6.10.3.dist-info/RECORD +8 -0
- alibabacloud_vpc20160428-6.10.2.dist-info/RECORD +0 -8
- {alibabacloud_vpc20160428-6.10.2.dist-info → alibabacloud_vpc20160428-6.10.3.dist-info}/LICENSE +0 -0
- {alibabacloud_vpc20160428-6.10.2.dist-info → alibabacloud_vpc20160428-6.10.3.dist-info}/WHEEL +0 -0
- {alibabacloud_vpc20160428-6.10.2.dist-info → alibabacloud_vpc20160428-6.10.3.dist-info}/top_level.txt +0 -0
|
@@ -2596,7 +2596,10 @@ class AllocateIpv6InternetBandwidthRequest(TeaModel):
|
|
|
2596
2596
|
resource_owner_account: str = None,
|
|
2597
2597
|
resource_owner_id: int = None,
|
|
2598
2598
|
):
|
|
2599
|
-
# The Internet bandwidth of the IPv6
|
|
2599
|
+
# The Internet bandwidth of the IPv6 address. Unit: Mbit/s.
|
|
2600
|
+
#
|
|
2601
|
+
# * If you set **InternetChargeType** to **PayByTraffic**, valid values are **1** to **1000**.
|
|
2602
|
+
# * If you set **InternetChargeType** to **PayByBandwidth**, valid values are **1** to **2000**.
|
|
2600
2603
|
#
|
|
2601
2604
|
# This parameter is required.
|
|
2602
2605
|
self.bandwidth = bandwidth
|
|
@@ -5968,7 +5971,7 @@ class CheckVpnBgpEnabledRequest(TeaModel):
|
|
|
5968
5971
|
#
|
|
5969
5972
|
# You can use the client to generate the token, but you must make sure that the token is unique among different requests. The token can contain only ASCII characters.
|
|
5970
5973
|
#
|
|
5971
|
-
# >
|
|
5974
|
+
# > If you do not specify this parameter, the system automatically uses the **request ID** as the **client token**. The **request ID** may be different for each request.
|
|
5972
5975
|
self.client_token = client_token
|
|
5973
5976
|
self.owner_account = owner_account
|
|
5974
5977
|
# The region ID of the IPsec-VPN connection.
|
|
@@ -7572,11 +7575,14 @@ class CreateCustomerGatewayRequest(TeaModel):
|
|
|
7572
7575
|
resource_owner_id: int = None,
|
|
7573
7576
|
tags: List[CreateCustomerGatewayRequestTags] = None,
|
|
7574
7577
|
):
|
|
7575
|
-
# The autonomous system number (ASN) of the gateway device in
|
|
7578
|
+
# The autonomous system number (ASN) of the gateway device in your data center. This parameter is required If you want to use Border Gateway Protocol (BGP) for the IPsec-VPN connection. Valid values: 1 to 4294967295. 45104 is not supported.
|
|
7576
7579
|
#
|
|
7577
|
-
# **Asn** is a 4-byte number. You can enter
|
|
7580
|
+
# **Asn** is a 4-byte number. You can enter it in two segments and separate the first 16 bits from the following 16 bits with a period (.). Enter the number in each segment in decimal format.
|
|
7578
7581
|
#
|
|
7579
|
-
# For example, if you enter 123.456, the ASN is: 123 × 65536 + 456 = 8061384.
|
|
7582
|
+
# For example, if you enter 123.456, the ASN is 8061384. The ASN is calculated by using the following formula: 123 × 65536 + 456 = 8061384.
|
|
7583
|
+
#
|
|
7584
|
+
# > - We recommend that you use a private ASN to establish BGP connections to Alibaba Cloud. For information about the range of private ASNs, see the relevant documentation.
|
|
7585
|
+
# > - 45104 is a unique identifier assigned by IANA to Alibaba Cloud. It is used to identify Alibaba Cloud during route selection and data transmission over the Internet.
|
|
7580
7586
|
self.asn = asn
|
|
7581
7587
|
# The authentication key of the BGP routing protocol for the gateway device in the data center.
|
|
7582
7588
|
#
|
|
@@ -7592,7 +7598,18 @@ class CreateCustomerGatewayRequest(TeaModel):
|
|
|
7592
7598
|
#
|
|
7593
7599
|
# The description must be 1 to 100 characters in length, and cannot start with `http://` or `https://`.
|
|
7594
7600
|
self.description = description
|
|
7595
|
-
# The
|
|
7601
|
+
# The static IP address of the gateway device in the data center.
|
|
7602
|
+
#
|
|
7603
|
+
# * If you want to create a public IPsec-VPN connection, enter a public IP address.
|
|
7604
|
+
# * If you want to create a private IPsec-VPN connection, enter a private IP address.
|
|
7605
|
+
#
|
|
7606
|
+
# You cannot use the following IP addresses. Otherwise, a IPsec-VPN connection cannot be established:
|
|
7607
|
+
#
|
|
7608
|
+
# * 100.64.0.0~100.127.255.255
|
|
7609
|
+
# * 127.0.0.0~127.255.255.255
|
|
7610
|
+
# * 169.254.0.0~169.254.255.255
|
|
7611
|
+
# * 224.0.0.0~239.255.255.255
|
|
7612
|
+
# * 255.0.0.0~255.255.255.255
|
|
7596
7613
|
#
|
|
7597
7614
|
# This parameter is required.
|
|
7598
7615
|
self.ip_address = ip_address
|
|
@@ -7717,7 +7734,7 @@ class CreateCustomerGatewayResponseBody(TeaModel):
|
|
|
7717
7734
|
self.customer_gateway_id = customer_gateway_id
|
|
7718
7735
|
# The description of the customer gateway.
|
|
7719
7736
|
self.description = description
|
|
7720
|
-
# The
|
|
7737
|
+
# The static IP address of the gateway device in the on-premises data center.
|
|
7721
7738
|
self.ip_address = ip_address
|
|
7722
7739
|
# The name of the customer gateway.
|
|
7723
7740
|
self.name = name
|
|
@@ -10620,7 +10637,7 @@ class CreateHaVipRequest(TeaModel):
|
|
|
10620
10637
|
self.client_token = client_token
|
|
10621
10638
|
# The description of the HAVIP.
|
|
10622
10639
|
#
|
|
10623
|
-
# The description must be 1 to
|
|
10640
|
+
# The description must be 1 to 255 characters in length and cannot start with `http://` or `https://`.
|
|
10624
10641
|
self.description = description
|
|
10625
10642
|
# The IP address of the HAVIP.
|
|
10626
10643
|
#
|
|
@@ -12022,11 +12039,11 @@ class CreateIpsecServerRequest(TeaModel):
|
|
|
12022
12039
|
self.local_subnet = local_subnet
|
|
12023
12040
|
# The pre-shared key.
|
|
12024
12041
|
#
|
|
12025
|
-
# The pre-shared key is used for
|
|
12042
|
+
# The pre-shared key that is used for authentication between the IPsec-VPN server and the client. It must be 1 to 100 characters in length.
|
|
12026
12043
|
#
|
|
12027
|
-
# If you do not specify a pre-shared key, the system randomly generates a 16-
|
|
12044
|
+
# If you do not specify a pre-shared key, the system randomly generates a 16-bit string as the pre-shared key. You can call [ListIpsecServers](https://help.aliyun.com/document_detail/2794120.html) to query keys generated by the system.
|
|
12028
12045
|
#
|
|
12029
|
-
# >
|
|
12046
|
+
# > The pre-shared key of the IPsec server key must be the same as that of the client. Otherwise, the connection between the IPsec server and the client cannot be established.
|
|
12030
12047
|
self.psk = psk
|
|
12031
12048
|
# Indicates whether pre-shared key authentication is enabled. If you set the value to **true**, pre-shared key authentication is enabled.
|
|
12032
12049
|
#
|
|
@@ -12484,7 +12501,7 @@ class CreateIpv6EgressOnlyRuleRequest(TeaModel):
|
|
|
12484
12501
|
self.client_token = client_token
|
|
12485
12502
|
# The description of the egress-only rule.
|
|
12486
12503
|
#
|
|
12487
|
-
# The description must be
|
|
12504
|
+
# The description must be 0 to 256 characters in length and cannot start with `http://` or `https://`.
|
|
12488
12505
|
self.description = description
|
|
12489
12506
|
# The ID of the IPv6 address for which you want to create an egress-only rule.
|
|
12490
12507
|
#
|
|
@@ -12500,7 +12517,7 @@ class CreateIpv6EgressOnlyRuleRequest(TeaModel):
|
|
|
12500
12517
|
self.ipv_6gateway_id = ipv_6gateway_id
|
|
12501
12518
|
# The name of the egress-only rule.
|
|
12502
12519
|
#
|
|
12503
|
-
# The name must be
|
|
12520
|
+
# The name must be 0 to 128 characters in length and cannot start with `http://` or `https://`.
|
|
12504
12521
|
self.name = name
|
|
12505
12522
|
self.owner_account = owner_account
|
|
12506
12523
|
self.owner_id = owner_id
|
|
@@ -12711,11 +12728,11 @@ class CreateIpv6GatewayRequest(TeaModel):
|
|
|
12711
12728
|
self.client_token = client_token
|
|
12712
12729
|
# The description of the IPv6 gateway.
|
|
12713
12730
|
#
|
|
12714
|
-
# The description must be
|
|
12731
|
+
# The description must be 0 to 256 characters in length and cannot start with `http://` or `https://`.
|
|
12715
12732
|
self.description = description
|
|
12716
12733
|
# The name of the IPv6 gateway.
|
|
12717
12734
|
#
|
|
12718
|
-
# The name must be
|
|
12735
|
+
# The name must be 0 to 128 characters in length and cannot start with `http://` or `https://`.
|
|
12719
12736
|
self.name = name
|
|
12720
12737
|
self.owner_account = owner_account
|
|
12721
12738
|
self.owner_id = owner_id
|
|
@@ -17478,17 +17495,18 @@ class CreateSslVpnServerRequest(TeaModel):
|
|
|
17478
17495
|
self.cipher = cipher
|
|
17479
17496
|
# The client CIDR block.
|
|
17480
17497
|
#
|
|
17481
|
-
#
|
|
17498
|
+
# The CIDR block from which an IP address is allocated to the virtual network interface controller (NIC) of the client, rather than the private CIDR block.
|
|
17482
17499
|
#
|
|
17483
|
-
# If the client accesses the SSL server over an SSL-VPN connection, the VPN gateway assigns an IP address from the specified client CIDR block
|
|
17500
|
+
# If the client accesses the SSL server over an SSL-VPN connection, the VPN gateway assigns an IP address from the specified client CIDR block for the client to access cloud resources.
|
|
17484
17501
|
#
|
|
17485
17502
|
# Make sure that the number of IP addresses in the client CIDR block is at least four times the maximum number of SSL-VPN connections supported by the VPN gateway.
|
|
17486
17503
|
#
|
|
17487
17504
|
# <details>
|
|
17488
17505
|
# <summary>Click to view the reason.</summary>
|
|
17489
17506
|
#
|
|
17490
|
-
# For example, if you specify 192.168.0.0/24 as the client CIDR block, the system first divides a subnet CIDR block with a subnet mask of 30 from 192.168.0.0/24, such as 192.168.0.4/30. This subnet provides up to four IP addresses. Then, the system allocates an IP address from 192.168.0.4/30 to the client and uses the other three IP addresses to ensure network communication. In this case, one client consumes four IP addresses. Therefore, to ensure that an IP address is assigned to your client,
|
|
17507
|
+
# For example, if you specify 192.168.0.0/24 as the client CIDR block, the system first divides a subnet CIDR block with a subnet mask of 30 from 192.168.0.0/24, such as 192.168.0.4/30. This subnet provides up to four IP addresses. Then, the system allocates an IP address from 192.168.0.4/30 to the client and uses the other three IP addresses to ensure network communication. In this case, one client consumes four IP addresses. Therefore, to ensure that an IP address is assigned to your client, the number of IP addresses in the client CIDR block must be at least four times the maximum number of SSL-VPN connections supported by the VPN gateway with which the SSL server is associated.
|
|
17491
17508
|
# </details>
|
|
17509
|
+
#
|
|
17492
17510
|
# <details>
|
|
17493
17511
|
# <summary>Click to view the CIDR blocks that are not supported.</summary>
|
|
17494
17512
|
#
|
|
@@ -17501,6 +17519,7 @@ class CreateSslVpnServerRequest(TeaModel):
|
|
|
17501
17519
|
# <details>
|
|
17502
17520
|
# <summary>Click to view the recommended client CIDR blocks for different numbers of SSL-VPN connections.</summary>
|
|
17503
17521
|
#
|
|
17522
|
+
#
|
|
17504
17523
|
# * If the number of SSL-VPN connections is 5, we recommend that you specify a client CIDR block with a subnet mask that is less than or equal to 27 bits in length. Examples: 10.0.0.0/27 and 10.0.0.0/26.
|
|
17505
17524
|
# * If the number of SSL-VPN connections is 10, we recommend that you specify a client CIDR block with a subnet mask that is less than or equal to 26 bits in length. Examples: 10.0.0.0/26 and 10.0.0.0/25.
|
|
17506
17525
|
# * If the number of SSL-VPN connections is 20, we recommend that you specify a client CIDR block with a subnet mask that is less than or equal to 25 bits in length. Examples: 10.0.0.0/25 and 10.0.0.0/24.
|
|
@@ -17511,10 +17530,10 @@ class CreateSslVpnServerRequest(TeaModel):
|
|
|
17511
17530
|
# * If the number of SSL-VPN connections is 1,000, we recommend that you specify a client CIDR block with a subnet mask that is less than or equal to 20 bits in length. Examples: 10.0.0.0/20 and 10.0.0.0/19.
|
|
17512
17531
|
# </details>
|
|
17513
17532
|
#
|
|
17514
|
-
# >
|
|
17533
|
+
# > - The subnet mask of the client CIDR block must be 16 to 29 bits in length.
|
|
17515
17534
|
# > - Make sure that the client CIDR block does not overlap with the local CIDR block, the VPC CIDR block, or route CIDR blocks associated with the client.
|
|
17516
|
-
# > - We recommend that you use 10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16, or one of their subnets as the client CIDR block. If you want to specify a public CIDR block as the client CIDR block, you must specify the public CIDR block as the user CIDR block of the virtual private cloud (VPC). This way, the VPC can access the public CIDR block. For more information, see [VPC
|
|
17517
|
-
# > - After you create an SSL server, the system automatically adds routes that point to the client CIDR block to the VPC route table. Do not add routes that point to the client CIDR block
|
|
17535
|
+
# > - We recommend that you use 10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16, or one of their subnets as the client CIDR block. If you want to specify a public CIDR block as the client CIDR block, you must specify the public CIDR block as the user CIDR block of the virtual private cloud (VPC). This way, the VPC can access the public CIDR block. For more information, see [VPC FAQs](https://help.aliyun.com/document_detail/185311.html).
|
|
17536
|
+
# > - After you create an SSL server, the system automatically adds routes that point to the client CIDR block to the VPC route table. Do not manually add routes that point to the client CIDR block. Otherwise, SSL-VPN connections cannot work as expected.
|
|
17518
17537
|
#
|
|
17519
17538
|
# This parameter is required.
|
|
17520
17539
|
self.client_ip_pool = client_ip_pool
|
|
@@ -17549,7 +17568,7 @@ class CreateSslVpnServerRequest(TeaModel):
|
|
|
17549
17568
|
self.idaa_sregion_id = idaa_sregion_id
|
|
17550
17569
|
# The local CIDR block.
|
|
17551
17570
|
#
|
|
17552
|
-
#
|
|
17571
|
+
# The CIDR block that your client needs to access by using the SSL-VPN connection.
|
|
17553
17572
|
#
|
|
17554
17573
|
# This value can be the CIDR block of a VPC, a vSwitch, a data center that is connected to a VPC by using an Express Connect circuit, or an Alibaba Cloud service such as Object Storage Service (OSS).
|
|
17555
17574
|
#
|
|
@@ -19704,7 +19723,7 @@ class CreateVcoRouteEntryRequest(TeaModel):
|
|
|
19704
19723
|
# The tunneling protocol. Set the value to **Ipsec**, which specifies the IPsec tunneling protocol.
|
|
19705
19724
|
self.overlay_mode = overlay_mode
|
|
19706
19725
|
self.owner_account = owner_account
|
|
19707
|
-
# The ID of the
|
|
19726
|
+
# The region ID of the IPsec-VPN connection.
|
|
19708
19727
|
#
|
|
19709
19728
|
# You can call the [DescribeRegions](https://help.aliyun.com/document_detail/36063.html) operation to query the most recent region list.
|
|
19710
19729
|
#
|
|
@@ -21645,8 +21664,15 @@ class CreateVpnAttachmentRequestTunnelOptionsSpecificationTunnelBgpConfig(TeaMod
|
|
|
21645
21664
|
local_bgp_ip: str = None,
|
|
21646
21665
|
tunnel_cidr: str = None,
|
|
21647
21666
|
):
|
|
21667
|
+
# The ANS of the tunnel on the Alibaba Cloud side. Valid values: **1** to **4294967295**. Default value: **45104**.
|
|
21668
|
+
#
|
|
21669
|
+
# > We recommend that you use a private ASN to establish BGP connections to Alibaba Cloud. Refer to the relevant documentation for the private ASN range.
|
|
21648
21670
|
self.local_asn = local_asn
|
|
21671
|
+
# The BGP IP address of the tunnel on the Alibaba Cloud side. The address is an IP address that falls within the BGP CIDR block.
|
|
21649
21672
|
self.local_bgp_ip = local_bgp_ip
|
|
21673
|
+
# The BGP CIDR block of the tunnel. The CIDR block must fall into 169.254.0.0/16 and the mask of the CIDR block must be 30 bits in length. The CIDR block cannot be 169.254.0.0/30, 169.254.1.0/30, 169.254.2.0/30, 169.254.3.0/30, 169.254.4.0/30, 169.254.5.0/30, 169.254.6.0/30, or 169.254.169.252/30.
|
|
21674
|
+
#
|
|
21675
|
+
# > The two tunnels of an IPsec-VPN connection must use different CIDR blocks.
|
|
21650
21676
|
self.tunnel_cidr = tunnel_cidr
|
|
21651
21677
|
|
|
21652
21678
|
def validate(self):
|
|
@@ -21690,14 +21716,40 @@ class CreateVpnAttachmentRequestTunnelOptionsSpecificationTunnelIkeConfig(TeaMod
|
|
|
21690
21716
|
psk: str = None,
|
|
21691
21717
|
remote_id: str = None,
|
|
21692
21718
|
):
|
|
21719
|
+
# The authentication algorithm that is used in Phase 1 negotiations. Valid values: **md5**, **sha1**, **sha256**, **sha384**, and **sha512**. Default value: **sha1**.
|
|
21693
21720
|
self.ike_auth_alg = ike_auth_alg
|
|
21721
|
+
# The encryption algorithm that is used in Phase 1 negotiations. Valid values: **aes**, **aes192**, **aes256**, **des**, and **3des**. Default value: **aes**.
|
|
21694
21722
|
self.ike_enc_alg = ike_enc_alg
|
|
21723
|
+
# The SA lifetime as a result of Phase 1 negotiations. Unit: seconds.
|
|
21724
|
+
#
|
|
21725
|
+
# Valid values: **0** to **86400**. Default value: **86400**.
|
|
21695
21726
|
self.ike_lifetime = ike_lifetime
|
|
21727
|
+
# The negotiation mode of IKE. Valid values: **main** and **aggressive**. Default value: **main**.
|
|
21728
|
+
#
|
|
21729
|
+
# * **main:** This mode offers higher security during negotiations.
|
|
21730
|
+
# * **aggressive**: This mode is faster with a higher success rate.
|
|
21696
21731
|
self.ike_mode = ike_mode
|
|
21732
|
+
# The Diffie-Hellman key exchange algorithm that is used in Phase 1 negotiations. Default value: **group2**.\\
|
|
21733
|
+
# Valid values: **group1**, **group2**, **group5**, and **group14**.
|
|
21697
21734
|
self.ike_pfs = ike_pfs
|
|
21735
|
+
# The version of the IKE protocol. Valid values: **ikev1** and **ikev2**. Default value: **ikev2**.
|
|
21736
|
+
#
|
|
21737
|
+
# Compared with IKEv1, IKEv2 simplifies the SA negotiation process and provides better support for scenarios with multiple CIDR blocks.
|
|
21698
21738
|
self.ike_version = ike_version
|
|
21739
|
+
# The identifier of the tunnel on the Alibaba Cloud side, which is used in Phase 1 negotiations. The identifier cannot exceed 100 characters in length and cannot contain spaces. The default value is the IP address of the tunnel.
|
|
21740
|
+
#
|
|
21741
|
+
# **LocalId** supports fully qualified domain names (FQDNs). If you use an FQDN, we recommend that you set the negotiation mode to **aggressive**.
|
|
21699
21742
|
self.local_id = local_id
|
|
21743
|
+
# The pre-shared key that is used for identity authentication between the tunnel and the tunnel peer.
|
|
21744
|
+
#
|
|
21745
|
+
# * The key cannot contain spaces. The key must be 1 to 100 characters in length, and can contain digits, letters, and the following special characters: ``~!\\`@#$%^&*()_-+={}[]|;:\\",.<>/?``
|
|
21746
|
+
# * If you do not specify a pre-shared key, the system randomly generates a 16-bit string as the pre-shared key. You can call the [DescribeVpnAttachments](https://help.aliyun.com/document_detail/2526939.html) operation to query the pre-shared key that is automatically generated by the system.
|
|
21747
|
+
#
|
|
21748
|
+
# > The tunnel and the tunnel peer must use the same pre-shared key. Otherwise, the tunnel cannot be established.
|
|
21700
21749
|
self.psk = psk
|
|
21750
|
+
# The identifier of the tunnel peer, which is used in Phase 1 negotiations. The identifier cannot exceed 100 characters in length and cannot contain spaces. The default value is the IP address of the customer gateway that is associated with the tunnel.
|
|
21751
|
+
#
|
|
21752
|
+
# **RemoteId** supports FQDNs. If you use an FQDN, we recommend that you set the negotiation mode to **aggressive**.
|
|
21701
21753
|
self.remote_id = remote_id
|
|
21702
21754
|
|
|
21703
21755
|
def validate(self):
|
|
@@ -21760,9 +21812,19 @@ class CreateVpnAttachmentRequestTunnelOptionsSpecificationTunnelIpsecConfig(TeaM
|
|
|
21760
21812
|
ipsec_lifetime: int = None,
|
|
21761
21813
|
ipsec_pfs: str = None,
|
|
21762
21814
|
):
|
|
21815
|
+
# The authentication algorithm that is used in Phase 2 negotiations.
|
|
21816
|
+
#
|
|
21817
|
+
# Valid values: **md5**, **sha1**, **sha256**, **sha384**, and **sha512**. Default value: **sha1**.
|
|
21763
21818
|
self.ipsec_auth_alg = ipsec_auth_alg
|
|
21819
|
+
# The encryption algorithm that is used in Phase 2 negotiations. Valid values: **aes**, **aes192**, **aes256**, **des**, and **3des**. Default value: **aes**.
|
|
21764
21820
|
self.ipsec_enc_alg = ipsec_enc_alg
|
|
21821
|
+
# The SA lifetime as a result of Phase 2 negotiations. Unit: seconds.
|
|
21822
|
+
#
|
|
21823
|
+
# Valid values: **0** to **86400**. Default value: **86400**.
|
|
21765
21824
|
self.ipsec_lifetime = ipsec_lifetime
|
|
21825
|
+
# The Diffie-Hellman key exchange algorithm that is used in Phase 2 negotiations. Default value: **group2**.
|
|
21826
|
+
#
|
|
21827
|
+
# Valid values: **disabled**, **group1**, **group2**, **group5**, and **group14**.
|
|
21766
21828
|
self.ipsec_pfs = ipsec_pfs
|
|
21767
21829
|
|
|
21768
21830
|
def validate(self):
|
|
@@ -21808,12 +21870,32 @@ class CreateVpnAttachmentRequestTunnelOptionsSpecification(TeaModel):
|
|
|
21808
21870
|
tunnel_index: int = None,
|
|
21809
21871
|
tunnel_ipsec_config: CreateVpnAttachmentRequestTunnelOptionsSpecificationTunnelIpsecConfig = None,
|
|
21810
21872
|
):
|
|
21873
|
+
# The ID of the customer gateway that is associated with the tunnel.
|
|
21874
|
+
#
|
|
21875
|
+
# > This parameter is required when you create a dual-tunnel IPsec-VPN connection.
|
|
21811
21876
|
self.customer_gateway_id = customer_gateway_id
|
|
21877
|
+
# Specifies whether to enable the DPD feature for the tunnel. Valid values:
|
|
21878
|
+
#
|
|
21879
|
+
# * **true** (default): enables DPD. The initiator of the IPsec-VPN connection sends DPD packets to check the existence and availability of the peer. If no feedback is received from the peer within the specified period of time, the connection fails. In this case, ISAKMP SA and IPsec SA are deleted along with the security tunnel.
|
|
21880
|
+
# * **false**: disables DPD. The initiator of the IPsec-VPN connection does not send DPD packets.
|
|
21812
21881
|
self.enable_dpd = enable_dpd
|
|
21882
|
+
# Specifies whether to enable NAT traversal for the tunnel. Valid values:
|
|
21883
|
+
#
|
|
21884
|
+
# * **true** (default): enables NAT traversal. After NAT traversal is enabled, the initiator does not check the UDP ports during IKE negotiations and can automatically discover NAT gateway devices along the IPsec-VPN tunnel.
|
|
21885
|
+
# * **false**: disables NAT traversal.
|
|
21813
21886
|
self.enable_nat_traversal = enable_nat_traversal
|
|
21887
|
+
# The BGP configurations of the tunnel.
|
|
21888
|
+
#
|
|
21889
|
+
# > If you enable BGP for an IPsec-VPN connection, you must set **EnableTunnelsBgp** parameter to **true**.
|
|
21814
21890
|
self.tunnel_bgp_config = tunnel_bgp_config
|
|
21891
|
+
# The configurations of Phase 1 negotiations.
|
|
21815
21892
|
self.tunnel_ike_config = tunnel_ike_config
|
|
21893
|
+
# The order in which the tunnel was created.
|
|
21894
|
+
#
|
|
21895
|
+
# * **1**: Tunnel 1.
|
|
21896
|
+
# * **2**: Tunnel 2.
|
|
21816
21897
|
self.tunnel_index = tunnel_index
|
|
21898
|
+
# The configurations of Phase 2 negotiations.
|
|
21817
21899
|
self.tunnel_ipsec_config = tunnel_ipsec_config
|
|
21818
21900
|
|
|
21819
21901
|
def validate(self):
|
|
@@ -21900,22 +21982,24 @@ class CreateVpnAttachmentRequest(TeaModel):
|
|
|
21900
21982
|
# * **true** (default)
|
|
21901
21983
|
# * **false**\
|
|
21902
21984
|
self.auto_config_route = auto_config_route
|
|
21903
|
-
#
|
|
21985
|
+
# This parameter is supported when you create an IPsec-VPN connection in single-tunnel mode.
|
|
21986
|
+
#
|
|
21987
|
+
# BGP configuration:
|
|
21904
21988
|
#
|
|
21905
|
-
# * **BgpConfig.EnableBgp**: specifies whether to enable BGP. Valid values: **true** and **false
|
|
21989
|
+
# * **BgpConfig.EnableBgp**: specifies whether to enable BGP. Valid values: **true** and **false** (default).
|
|
21906
21990
|
#
|
|
21907
21991
|
# * **BgpConfig.LocalAsn**: the ASN on the Alibaba Cloud side. Valid values: **1** to **4294967295**. Default value: **45104**.
|
|
21908
21992
|
#
|
|
21909
|
-
# You can enter
|
|
21993
|
+
# You can enter a value in two segments separated by a period (.). Each segment is 16 bits in length. Enter the number in each segment in decimal format.
|
|
21910
21994
|
#
|
|
21911
|
-
# For example, if you enter 123.456, the ASN is: 123 × 65536 + 456 = 8061384.
|
|
21995
|
+
# For example, if you enter 123.456, the ASN is 8061384. The ASN is calculated by using the following formula: 123 × 65536 + 456 = 8061384.
|
|
21912
21996
|
#
|
|
21913
|
-
# * **BgpConfig.TunnelCidr**:
|
|
21997
|
+
# * **BgpConfig.TunnelCidr**: The CIDR block of the IPsec tunnel. The CIDR block must fall into 169.254.0.0/16 and the mask of the CIDR block must be 30 bits in length. The CIDR block cannot be 169.254.0.0/30, 169.254.1.0/30, 169.254.2.0/30, 169.254.3.0/30, 169.254.4.0/30, 169.254.5.0/30, 169.254.6.0/30, or 169.254.169.252/30.
|
|
21914
21998
|
#
|
|
21915
|
-
# * **LocalBgpIp
|
|
21999
|
+
# * **LocalBgpIp**: the BGP address on the Alibaba Cloud side. It must be an IP address that falls within the CIDR block of the IPsec tunnel.
|
|
21916
22000
|
#
|
|
21917
|
-
# >
|
|
21918
|
-
# >
|
|
22001
|
+
# > - Before you add BGP configurations, we recommend that you learn about how BGP works and the limits. For more information, see [Configure BGP dynamic routing](https://help.aliyun.com/document_detail/445767.html).
|
|
22002
|
+
# > - We recommend that you use a private ASN to establish BGP connections to Alibaba Cloud. Refer to the relevant documentation for the private ASN range.
|
|
21919
22003
|
self.bgp_config = bgp_config
|
|
21920
22004
|
# The client token that is used to ensure the idempotence of the request.
|
|
21921
22005
|
#
|
|
@@ -21924,30 +22008,43 @@ class CreateVpnAttachmentRequest(TeaModel):
|
|
|
21924
22008
|
# > If you do not specify this parameter, the system automatically uses the **request ID** as the **client token**. The **request ID** may be different for each request.
|
|
21925
22009
|
self.client_token = client_token
|
|
21926
22010
|
# The customer gateway ID.
|
|
22011
|
+
#
|
|
22012
|
+
# > This parameter is required only when you create a single-tunnel IPsec-VPN connection.
|
|
21927
22013
|
self.customer_gateway_id = customer_gateway_id
|
|
21928
22014
|
# Specifies whether to immediately start IPsec negotiations after the configuration takes effect. Valid values:
|
|
21929
22015
|
#
|
|
21930
22016
|
# * **true**: immediately starts IPsec negotiations after the configuration is complete.
|
|
21931
22017
|
# * **false** (default): starts IPsec negotiations when inbound traffic is received.
|
|
21932
22018
|
self.effect_immediately = effect_immediately
|
|
21933
|
-
#
|
|
22019
|
+
# This parameter is supported if you create an IPsec-VPN connection in single-tunnel mode.
|
|
21934
22020
|
#
|
|
21935
|
-
#
|
|
21936
|
-
#
|
|
22021
|
+
# Specifies whether to enable DPD. Valid values: Valid values:
|
|
22022
|
+
#
|
|
22023
|
+
# * **true** (default): enables DPD. The initiator of the IPsec-VPN connection sends DPD packets to check the existence and availability of the peer. If no feedback is received from the peer within the specified period of time, the connection fails. In this case, ISAKMP SA and IPsec SA are deleted along with the security tunnel.
|
|
22024
|
+
# * **false**: disables DPD. The initiator of the IPsec-VPN connection does not send DPD packets.
|
|
21937
22025
|
self.enable_dpd = enable_dpd
|
|
22026
|
+
# This parameter is supported if you create an IPsec-VPN connection in single-tunnel mode.
|
|
22027
|
+
#
|
|
21938
22028
|
# Specifies whether to enable NAT traversal. Valid values:
|
|
21939
22029
|
#
|
|
21940
|
-
# * **true** (default) After NAT traversal is enabled, the initiator does not check the UDP ports during IKE negotiations and can automatically discover NAT gateway devices along the VPN tunnel.
|
|
21941
|
-
# * **false
|
|
22030
|
+
# * **true** (default): enables NAT traversal. After NAT traversal is enabled, the initiator does not check the UDP ports during IKE negotiations and can automatically discover NAT gateway devices along the IPsec-VPN tunnel.
|
|
22031
|
+
# * **false**: disables NAT traversal.
|
|
21942
22032
|
self.enable_nat_traversal = enable_nat_traversal
|
|
22033
|
+
# This parameter is available if you create an IPsec-VPN connection in dual-tunnel mode.
|
|
22034
|
+
#
|
|
22035
|
+
# Specifies whether to enable the BGP feature for the tunnel. Valid values: **true** and **false**. Default value: false.
|
|
22036
|
+
#
|
|
22037
|
+
# > Before you add BGP configurations, we recommend that you learn about how BGP works and the limits. For more information, see [Configure BGP dynamic routing](https://help.aliyun.com/document_detail/445767.html)
|
|
21943
22038
|
self.enable_tunnels_bgp = enable_tunnels_bgp
|
|
21944
|
-
#
|
|
22039
|
+
# This parameter is supported if you create an IPsec-VPN connection in single-tunnel mode.
|
|
21945
22040
|
#
|
|
21946
|
-
#
|
|
22041
|
+
# The health check configurations:
|
|
22042
|
+
#
|
|
22043
|
+
# * **HealthCheckConfig.enable**: indicates whether the health check is enabled. Valid values: **true** and **false** (default).
|
|
21947
22044
|
#
|
|
21948
|
-
# * **HealthCheckConfig.dip**: the destination IP address configured for health checks. Enter the IP address
|
|
22045
|
+
# * **HealthCheckConfig.dip**: the destination IP address configured for health checks. Enter the IP address of the on-premises data center that the VPC can access through the IPsec connection.
|
|
21949
22046
|
#
|
|
21950
|
-
# * **HealthCheckConfig.sip**: the source IP address configured for health checks. Enter the IP address
|
|
22047
|
+
# * **HealthCheckConfig.sip**: the source IP address configured for health checks. Enter the IP address of the VPC that the on-premises data center can access through the IPsec connection.
|
|
21951
22048
|
#
|
|
21952
22049
|
# * **HealthCheckConfig.interval**: the time interval of health check retries. Unit: seconds. Default value: **3**.
|
|
21953
22050
|
#
|
|
@@ -21958,11 +22055,13 @@ class CreateVpnAttachmentRequest(TeaModel):
|
|
|
21958
22055
|
# * **revoke_route** (default): withdraws published routes.
|
|
21959
22056
|
# * **reserve_route**: does not withdraw published routes.
|
|
21960
22057
|
self.health_check_config = health_check_config
|
|
22058
|
+
# This parameter is supported if you create an IPsec-VPN connection in single-tunnel mode.
|
|
22059
|
+
#
|
|
21961
22060
|
# The configurations of Phase 1 negotiations:
|
|
21962
22061
|
#
|
|
21963
22062
|
# * **IkeConfig.Psk**: the pre-shared key that is used for identity authentication between the VPN gateway and the on-premises data center.
|
|
21964
22063
|
#
|
|
21965
|
-
# * The key must be 1 to 100 characters in length and can contain digits, letters, and the following special characters: ``~!`@#$%^&*()_-+={}[]|;:\\",.<>/?``
|
|
22064
|
+
# * The key cannot contain space characters. The key must be 1 to 100 characters in length, and can contain digits, letters, and the following special characters: ``~!`@#$%^&*()_-+={}[]|;:\\",.<>/?``
|
|
21966
22065
|
# * If you do not specify a pre-shared key, the system randomly generates a 16-bit string as the pre-shared key. You can call the [DescribeVpnConnection](https://help.aliyun.com/document_detail/2526951.html) operation to query the pre-shared key that is automatically generated by the system.
|
|
21967
22066
|
#
|
|
21968
22067
|
# > The pre-shared key of the IPsec-VPN connection must be the same as the authentication key of the on-premises data center. Otherwise, connections between the on-premises data center and the VPN gateway cannot be established.
|
|
@@ -21979,16 +22078,18 @@ class CreateVpnAttachmentRequest(TeaModel):
|
|
|
21979
22078
|
#
|
|
21980
22079
|
# * **IkeConfig.IkeLifetime**: the SA lifetime as a result of Phase 1 negotiations. Unit: seconds. Valid values: **0** to **86400**. Default value: **86400**.
|
|
21981
22080
|
#
|
|
21982
|
-
# * **IkeConfig.
|
|
22081
|
+
# * **IkeConfig.LocalId**: the identifier on the Alibaba Cloud side. The identifier cannot exceed 100 characters in length and cannot contain space characters. This parameter is empty by default.
|
|
21983
22082
|
#
|
|
21984
|
-
# * **IkeConfig.RemoteId**: the identifier on the data center side. The identifier cannot exceed 100 characters in length. The default value is the IP address of the customer gateway.
|
|
22083
|
+
# * **IkeConfig.RemoteId**: the identifier on the data center side. The identifier cannot exceed 100 characters in length and cannot contain space characters. The default value is the IP address of the customer gateway.
|
|
21985
22084
|
self.ike_config = ike_config
|
|
22085
|
+
# This parameter is supported if you create an IPsec-VPN connection in single-tunnel mode.
|
|
22086
|
+
#
|
|
21986
22087
|
# The configurations of Phase 2 negotiations:
|
|
21987
22088
|
#
|
|
21988
22089
|
# * **IpsecConfig.IpsecEncAlg**: the encryption algorithm that is used in Phase 2 negotiations. Valid values: **aes**, **aes192**, **aes256**, **des**, and **3des**. Default value: **aes**.
|
|
21989
22090
|
# * **IpsecConfig. IpsecAuthAlg**: the authentication algorithm that is used in Phase 2 negotiations. Valid values: **md5**, **sha1**, **sha256**, **sha384**, and **sha512**. Default value: **md5**.
|
|
21990
|
-
# * **IpsecConfig. IpsecPfs**:
|
|
21991
|
-
# * **
|
|
22091
|
+
# * **IpsecConfig. IpsecPfs**: The Diffie-Hellman key exchange algorithm used in the second phase negotiation. Valid values: **disabled**, **group1**, **group2**, **group5**, and **group14**. Default value: **group2**.
|
|
22092
|
+
# * **IkeConfig.IkeLifetime**: the SA lifetime determined by Phase 2 negotiations. Unit: seconds. Valid values: **0** to **86400**. Default value: **86400**.
|
|
21992
22093
|
self.ipsec_config = ipsec_config
|
|
21993
22094
|
# The CIDR block on the VPC side. The CIDR block is used in Phase 2 negotiations.
|
|
21994
22095
|
#
|
|
@@ -22043,6 +22144,10 @@ class CreateVpnAttachmentRequest(TeaModel):
|
|
|
22043
22144
|
#
|
|
22044
22145
|
# Each tag key corresponds to one tag value. You can specify up to 20 tag values in each call.
|
|
22045
22146
|
self.tags = tags
|
|
22147
|
+
# The tunnel configurations.
|
|
22148
|
+
#
|
|
22149
|
+
# * You can specify parameters in the **TunnelOptionsSpecification** array when you create an IPsec-VPN connection in dual tunnel mode.
|
|
22150
|
+
# * When you create a IPsec-VPN connection in dual-tunnel mode, you must add both tunnels to IPsec-VPN connection to ensure that the IPsec-VPN connection has connection redundancy. Each IPsec-VPN connection supports only two tunnels.
|
|
22046
22151
|
self.tunnel_options_specification = tunnel_options_specification
|
|
22047
22152
|
|
|
22048
22153
|
def validate(self):
|
|
@@ -22338,15 +22443,13 @@ class CreateVpnConnectionRequestTunnelOptionsSpecificationTunnelBgpConfig(TeaMod
|
|
|
22338
22443
|
):
|
|
22339
22444
|
# The autonomous system number (ASN) of the tunnel on the Alibaba Cloud side. Valid values: **1** to **4294967295**. Default value: **45104**.
|
|
22340
22445
|
#
|
|
22341
|
-
#
|
|
22342
|
-
#
|
|
22343
22446
|
# > - If you set **EnableTunnelsBgp** to **true**, you must set this parameter.
|
|
22344
|
-
# > - Before you add BGP configurations, we recommend that you learn about how BGP dynamic routing works and the limits. For more information, see [
|
|
22447
|
+
# > - Before you add BGP configurations, we recommend that you learn about how BGP dynamic routing works and the limits. For more information, see [Configure BGP dynamic routing](https://help.aliyun.com/document_detail/2638220.html).
|
|
22345
22448
|
# > - We recommend that you use a private ASN to establish BGP connections to Alibaba Cloud. For information about the range of private ASNs, see the relevant documentation.
|
|
22346
22449
|
self.local_asn = local_asn
|
|
22347
22450
|
# The BGP IP address of the tunnel on the Alibaba Cloud side. The address is an IP address that falls within the BGP CIDR block.
|
|
22348
22451
|
self.local_bgp_ip = local_bgp_ip
|
|
22349
|
-
# The BGP CIDR block of the tunnel. The CIDR block must fall within
|
|
22452
|
+
# The BGP CIDR block of the tunnel. The CIDR block must fall within 169.254.0.0/16 and the mask of the CIDR block must be 30 bits in length. The CIDR block cannot be 169.254.0.0/30, 169.254.1.0/30, 169.254.2.0/30, 169.254.3.0/30, 169.254.4.0/30, 169.254.5.0/30, 169.254.6.0/30, or 169.254.169.252/30.
|
|
22350
22453
|
#
|
|
22351
22454
|
# > The BGP CIDR block of each tunnel must be unique on a VPN gateway.
|
|
22352
22455
|
self.tunnel_cidr = tunnel_cidr
|
|
@@ -22400,14 +22503,14 @@ class CreateVpnConnectionRequestTunnelOptionsSpecificationTunnelIkeConfig(TeaMod
|
|
|
22400
22503
|
#
|
|
22401
22504
|
# Valid values: **aes**, **aes192**, **aes256**, **des**, and **3des**. Default value: **aes**.
|
|
22402
22505
|
self.ike_enc_alg = ike_enc_alg
|
|
22403
|
-
# The SA lifetime as a result of Phase 1 negotiations. Unit: seconds
|
|
22506
|
+
# The SA lifetime as a result of Phase 1 negotiations. Unit: seconds
|
|
22404
22507
|
#
|
|
22405
22508
|
# Valid values: **0** to **86400**. Default value: **86400**.
|
|
22406
22509
|
self.ike_lifetime = ike_lifetime
|
|
22407
22510
|
# The negotiation mode of IKE. Valid values: **main** and **aggressive**. Default value: **main**.
|
|
22408
22511
|
#
|
|
22409
22512
|
# * **main:** This mode offers higher security during negotiations.
|
|
22410
|
-
# * **aggressive
|
|
22513
|
+
# * **aggressive:** This mode is faster and has a higher success rate.
|
|
22411
22514
|
self.ike_mode = ike_mode
|
|
22412
22515
|
# The Diffie-Hellman key exchange algorithm that is used in Phase 1 negotiations. Default value: **group2**.\\
|
|
22413
22516
|
# Valid values: **group1**, **group2**, **group5**, and **group14**.
|
|
@@ -22416,18 +22519,18 @@ class CreateVpnConnectionRequestTunnelOptionsSpecificationTunnelIkeConfig(TeaMod
|
|
|
22416
22519
|
#
|
|
22417
22520
|
# Compared with IKEv1, IKEv2 simplifies the SA negotiation process and provides better support for scenarios with multiple CIDR blocks.
|
|
22418
22521
|
self.ike_version = ike_version
|
|
22419
|
-
# The identifier of the tunnel on the Alibaba Cloud side, which is used in Phase 1 negotiations.
|
|
22522
|
+
# The identifier of the tunnel on the Alibaba Cloud side, which is used in Phase 1 negotiations. The identifier cannot exceed 100 characters in length and cannot contain space characters. The default value is the IP address of the tunnel.
|
|
22420
22523
|
#
|
|
22421
22524
|
# **LocalId** supports fully qualified domain names (FQDNs). If you use an FQDN, we recommend that you set the negotiation mode to **aggressive**.
|
|
22422
22525
|
self.local_id = local_id
|
|
22423
22526
|
# The pre-shared key that is used for identity authentication between the tunnel and the tunnel peer.
|
|
22424
22527
|
#
|
|
22425
|
-
# * The key must be 1 to 100 characters in length and can contain digits, letters, and the following special characters: ``~!\\`@#$%^&*()_-+={}[]|;:\\",.<>/?``
|
|
22528
|
+
# * The key cannot contain spaces. The key must be 1 to 100 characters in length, and can contain digits, letters, and the following special characters: ``~!\\`@#$%^&*()_-+={}[]|;:\\",.<>/?``
|
|
22426
22529
|
# * If you do not specify a pre-shared key, the system randomly generates a 16-bit string as the pre-shared key. You can call the [DescribeVpnConnection](https://help.aliyun.com/document_detail/2526951.html) operation to query the pre-shared key that is automatically generated by the system.
|
|
22427
22530
|
#
|
|
22428
22531
|
# > The tunnel and the tunnel peer must use the same pre-shared key. Otherwise, the tunnel cannot be established.
|
|
22429
22532
|
self.psk = psk
|
|
22430
|
-
# The identifier of the tunnel peer, which is used in Phase 1 negotiations.
|
|
22533
|
+
# The identifier of the tunnel peer, which is used in Phase 1 negotiations. The identifier cannot exceed 100 characters in length and cannot contain space characters. The default value is the IP address of the customer gateway that is associated with the tunnel.
|
|
22431
22534
|
#
|
|
22432
22535
|
# **RemoteId** supports FQDNs. If you use an FQDN, we recommend that you set the negotiation mode to **aggressive**.
|
|
22433
22536
|
self.remote_id = remote_id
|
|
@@ -22500,7 +22603,7 @@ class CreateVpnConnectionRequestTunnelOptionsSpecificationTunnelIpsecConfig(TeaM
|
|
|
22500
22603
|
#
|
|
22501
22604
|
# Valid values: **aes**, **aes192**, **aes256**, **des**, and **3des**. Default value: **aes**.
|
|
22502
22605
|
self.ipsec_enc_alg = ipsec_enc_alg
|
|
22503
|
-
# The SA lifetime as a result of Phase 2 negotiations. Unit: seconds
|
|
22606
|
+
# The SA lifetime as a result of Phase 2 negotiations. Unit: seconds
|
|
22504
22607
|
#
|
|
22505
22608
|
# Valid values: **0** to **86400**. Default value: **86400**.
|
|
22506
22609
|
self.ipsec_lifetime = ipsec_lifetime
|
|
@@ -22574,7 +22677,7 @@ class CreateVpnConnectionRequestTunnelOptionsSpecification(TeaModel):
|
|
|
22574
22677
|
# * If the VPN gateway uses an SM certificate, this parameter is required.
|
|
22575
22678
|
# * If the VPN gateway does not use an SM certificate, leave this parameter empty.
|
|
22576
22679
|
self.remote_ca_certificate = remote_ca_certificate
|
|
22577
|
-
# The role of the tunnel. Valid values:
|
|
22680
|
+
# The role of the tunnel. Valid values:
|
|
22578
22681
|
#
|
|
22579
22682
|
# * **master**: The tunnel is an active tunnel.
|
|
22580
22683
|
# * **slave**: The tunnel is a standby tunnel.
|
|
@@ -22674,7 +22777,7 @@ class CreateVpnConnectionRequest(TeaModel):
|
|
|
22674
22777
|
# * **true** (default)
|
|
22675
22778
|
# * **false**\
|
|
22676
22779
|
self.auto_config_route = auto_config_route
|
|
22677
|
-
# This parameter is supported
|
|
22780
|
+
# This parameter is supported if you create an IPsec-VPN connection in single-tunnel mode.
|
|
22678
22781
|
#
|
|
22679
22782
|
# BGP configuration:
|
|
22680
22783
|
#
|
|
@@ -22686,14 +22789,14 @@ class CreateVpnConnectionRequest(TeaModel):
|
|
|
22686
22789
|
#
|
|
22687
22790
|
# For example, if you enter 123.456, the ASN is 8061384. The ASN is calculated by using the following formula: 123 × 65536 + 456 = 8061384.
|
|
22688
22791
|
#
|
|
22689
|
-
# * **BgpConfig.TunnelCidr**: The CIDR block of the IPsec tunnel. The CIDR block must
|
|
22792
|
+
# * **BgpConfig.TunnelCidr**: The CIDR block of the IPsec tunnel. The CIDR block must fall within 169.254.0.0/16 and the mask of the CIDR block must be 30 bits in length. The CIDR block cannot be 169.254.0.0/30, 169.254.1.0/30, 169.254.2.0/30, 169.254.3.0/30, 169.254.4.0/30, 169.254.5.0/30, 169.254.6.0/30, or 169.254.169.252/30.
|
|
22690
22793
|
#
|
|
22691
|
-
# >The CIDR block of the IPsec tunnel for each IPsec-VPN connection on a VPN gateway must be unique.
|
|
22794
|
+
# > The CIDR block of the IPsec tunnel for each IPsec-VPN connection on a VPN gateway must be unique.
|
|
22692
22795
|
#
|
|
22693
22796
|
# * **LocalBgpIp**: the BGP address on the Alibaba Cloud side. It must be an IP address that falls within the CIDR block of the IPsec tunnel.
|
|
22694
22797
|
#
|
|
22695
|
-
# >
|
|
22696
|
-
# >
|
|
22798
|
+
# > - Before you add BGP configurations, we recommend that you learn about how BGP works and the limits. For more information, see [Configure BGP dynamic routing](https://help.aliyun.com/document_detail/2638220.html).
|
|
22799
|
+
# > - We recommend that you use a private ASN to establish BGP connections to Alibaba Cloud. Refer to the relevant documentation for the private ASN range.
|
|
22697
22800
|
self.bgp_config = bgp_config
|
|
22698
22801
|
# The client token that is used to ensure the idempotence of the request.
|
|
22699
22802
|
#
|
|
@@ -22744,13 +22847,11 @@ class CreateVpnConnectionRequest(TeaModel):
|
|
|
22744
22847
|
#
|
|
22745
22848
|
# * **IkeConfig.Psk**: the pre-shared key that is used for identity authentication between the VPN gateway and the on-premises data center.
|
|
22746
22849
|
#
|
|
22747
|
-
# * The key must be 1 to 100 characters in length and can contain digits, letters, and the following special characters: ``~!\\`@#$%^&*()_-+={}[]|;:\\",.<>/?``
|
|
22850
|
+
# * The key cannot contain spaces. The key must be 1 to 100 characters in length, and can contain digits, letters, and the following special characters: ``~!\\`@#$%^&*()_-+={}[]|;:\\",.<>/?``
|
|
22748
22851
|
#
|
|
22749
22852
|
# * If you do not specify a pre-shared key, the system randomly generates a 16-bit string as the pre-shared key. You can call the [DescribeVpnConnection](https://help.aliyun.com/document_detail/2526951.html) operation to query the pre-shared key that is automatically generated by the system.
|
|
22750
22853
|
#
|
|
22751
|
-
#
|
|
22752
|
-
#
|
|
22753
|
-
# **Note** The pre-shared key of the IPsec-VPN connection must be the same as the authentication key of the on-premises data center. Otherwise, connections between the on-premises data center and the VPN gateway cannot be established.
|
|
22854
|
+
# > The pre-shared key of the IPsec-VPN connection must be the same as the authentication key of the on-premises data center. Otherwise, connections between the on-premises data center and the VPN gateway cannot be established.
|
|
22754
22855
|
#
|
|
22755
22856
|
# * **IkeConfig.IkeVersion**: the version of the Internet Key Exchange (IKE) protocol. Valid values: **ikev1** and **ikev2**. Default value: **ikev1**.
|
|
22756
22857
|
#
|
|
@@ -22759,7 +22860,7 @@ class CreateVpnConnectionRequest(TeaModel):
|
|
|
22759
22860
|
# * **IkeConfig.IkeMode**: the negotiation mode of IKE. Valid values: **main** and **aggressive**. Default value: **main**.
|
|
22760
22861
|
#
|
|
22761
22862
|
# * **main:** This mode offers higher security during negotiations.
|
|
22762
|
-
# * **aggressive
|
|
22863
|
+
# * **aggressive:** This mode is faster and has a higher success rate.
|
|
22763
22864
|
#
|
|
22764
22865
|
# * **IkeConfig.IkeEncAlg**: the encryption algorithm that is used in Phase 1 negotiations.
|
|
22765
22866
|
#
|
|
@@ -22771,11 +22872,11 @@ class CreateVpnConnectionRequest(TeaModel):
|
|
|
22771
22872
|
#
|
|
22772
22873
|
# * **IkeConfig.IkePfs**: the Diffie-Hellman key exchange algorithm that is used in Phase 1 negotiations. Valid values: **group1**, **group2**, **group5**, and **group14**. Default value: **group2**.
|
|
22773
22874
|
#
|
|
22774
|
-
# * **IkeConfig.IkeLifetime**: the SA lifetime as a result of Phase 1 negotiations. Unit: seconds
|
|
22875
|
+
# * **IkeConfig.IkeLifetime**: the SA lifetime as a result of Phase 1 negotiations. Unit: seconds Valid values: **0** to **86400**. Default value: **86400**.
|
|
22775
22876
|
#
|
|
22776
|
-
# * **IkeConfig.LocalId**: the identifier of the VPN gateway. It can
|
|
22877
|
+
# * **IkeConfig.LocalId**: the identifier of the VPN gateway. It can be up to 100 characters in length and cannot contain space characters. The default value is the IP address of the VPN gateway.
|
|
22777
22878
|
#
|
|
22778
|
-
# * **IkeConfig.RemoteId**: the identifier of the customer gateway. It can
|
|
22879
|
+
# * **IkeConfig.RemoteId**: the identifier of the customer gateway. It can be up to 100 characters in length and cannot contain space characters. The default value is the IP address of the customer gateway.
|
|
22779
22880
|
self.ike_config = ike_config
|
|
22780
22881
|
# This parameter is available if you create an IPsec-VPN connection in single-tunnel mode.
|
|
22781
22882
|
#
|
|
@@ -27282,7 +27383,16 @@ class DeleteIpv6GatewayRequest(TeaModel):
|
|
|
27282
27383
|
resource_owner_account: str = None,
|
|
27283
27384
|
resource_owner_id: int = None,
|
|
27284
27385
|
):
|
|
27386
|
+
# The client token that is used to ensure the idempotence of the request.
|
|
27387
|
+
#
|
|
27388
|
+
# You can use the client to generate the token, but you must make sure that the token is unique among different requests. The client token can contain only ASCII characters.
|
|
27389
|
+
#
|
|
27390
|
+
# > If you do not specify this parameter, the system automatically uses the **request ID** as the **client token**. The **request ID** may be different for each request.
|
|
27285
27391
|
self.client_token = client_token
|
|
27392
|
+
# Specifies whether to perform only a dry run, without performing the actual request. Valid values:
|
|
27393
|
+
#
|
|
27394
|
+
# * **true**: performs only a dry run. The system checks the request for potential issues, including missing parameter values, incorrect request syntax, and service limits. If the request fails the dry run, an error message is returned. If the request passes the dry run, the `DryRunOperation` error code is returned.
|
|
27395
|
+
# * **false** (default): performs a dry run and performs the actual request. If the request passes the dry run, a 2xx HTTP status code is returned and the operation is performed.
|
|
27286
27396
|
self.dry_run = dry_run
|
|
27287
27397
|
# The ID of the IPv6 gateway that you want to delete.
|
|
27288
27398
|
#
|
|
@@ -27427,7 +27537,12 @@ class DeleteIpv6InternetBandwidthRequest(TeaModel):
|
|
|
27427
27537
|
resource_owner_account: str = None,
|
|
27428
27538
|
resource_owner_id: int = None,
|
|
27429
27539
|
):
|
|
27540
|
+
# The client token that is used to ensure the idempotence of the request. You can use the client to generate the token, but you must make sure that the token is unique among different requests. The client token can contain only ASCII characters. If you do not specify this parameter, the system automatically uses the request ID as the client token. The request ID may be different for each request.
|
|
27430
27541
|
self.client_token = client_token
|
|
27542
|
+
# Specifies whether to perform only a dry run, without performing the actual request. Valid values:
|
|
27543
|
+
#
|
|
27544
|
+
# * **true**: performs only a dry run. The system checks the request for potential issues, including missing parameter values, incorrect request syntax, and service limits. If the request fails the dry run, an error message is returned. If the request passes the dry run, the `DryRunOperation` error code is returned.
|
|
27545
|
+
# * **false** (default): performs a dry run and performs the actual request. If the request passes the dry run, a 2xx HTTP status code is returned and the operation is performed.
|
|
27431
27546
|
self.dry_run = dry_run
|
|
27432
27547
|
# The ID of the IPv6 address.
|
|
27433
27548
|
#
|
|
@@ -30777,7 +30892,7 @@ class DeleteVcoRouteEntryRequest(TeaModel):
|
|
|
30777
30892
|
# The tunneling protocol. Set the value to **Ipsec**, which specifies the IPsec tunneling protocol.
|
|
30778
30893
|
self.overlay_mode = overlay_mode
|
|
30779
30894
|
self.owner_account = owner_account
|
|
30780
|
-
# The ID of the
|
|
30895
|
+
# The region ID of the IPsec-VPN connection.
|
|
30781
30896
|
#
|
|
30782
30897
|
# You can call the [DescribeRegions](https://help.aliyun.com/document_detail/36063.html) operation to query the most recent region list.
|
|
30783
30898
|
#
|
|
@@ -35084,9 +35199,9 @@ class DescribeCustomerGatewayResponseBodyTagsTag(TeaModel):
|
|
|
35084
35199
|
key: str = None,
|
|
35085
35200
|
value: str = None,
|
|
35086
35201
|
):
|
|
35087
|
-
# The
|
|
35202
|
+
# The tag key.
|
|
35088
35203
|
self.key = key
|
|
35089
|
-
# The
|
|
35204
|
+
# The tag value.
|
|
35090
35205
|
self.value = value
|
|
35091
35206
|
|
|
35092
35207
|
def validate(self):
|
|
@@ -35174,7 +35289,7 @@ class DescribeCustomerGatewayResponseBody(TeaModel):
|
|
|
35174
35289
|
self.customer_gateway_id = customer_gateway_id
|
|
35175
35290
|
# The description of the customer gateway.
|
|
35176
35291
|
self.description = description
|
|
35177
|
-
# The
|
|
35292
|
+
# The IP address of the gateway device in the data center.
|
|
35178
35293
|
self.ip_address = ip_address
|
|
35179
35294
|
# The name of the customer gateway.
|
|
35180
35295
|
self.name = name
|
|
@@ -36554,6 +36669,7 @@ class DescribeEipAddressesResponseBodyEipAddressesEipAddress(TeaModel):
|
|
|
36554
36669
|
second_limited: bool = None,
|
|
36555
36670
|
security_protection_types: DescribeEipAddressesResponseBodyEipAddressesEipAddressSecurityProtectionTypes = None,
|
|
36556
36671
|
segment_instance_id: str = None,
|
|
36672
|
+
service_id: int = None,
|
|
36557
36673
|
service_managed: int = None,
|
|
36558
36674
|
status: str = None,
|
|
36559
36675
|
tags: DescribeEipAddressesResponseBodyEipAddressesEipAddressTags = None,
|
|
@@ -36694,6 +36810,7 @@ class DescribeEipAddressesResponseBodyEipAddressesEipAddress(TeaModel):
|
|
|
36694
36810
|
#
|
|
36695
36811
|
# This value is returned only when you query contiguous EIPs.
|
|
36696
36812
|
self.segment_instance_id = segment_instance_id
|
|
36813
|
+
self.service_id = service_id
|
|
36697
36814
|
# Indicates whether the resource is created by the service account. Valid values:
|
|
36698
36815
|
#
|
|
36699
36816
|
# * **0**\
|
|
@@ -36806,6 +36923,8 @@ class DescribeEipAddressesResponseBodyEipAddressesEipAddress(TeaModel):
|
|
|
36806
36923
|
result['SecurityProtectionTypes'] = self.security_protection_types.to_map()
|
|
36807
36924
|
if self.segment_instance_id is not None:
|
|
36808
36925
|
result['SegmentInstanceId'] = self.segment_instance_id
|
|
36926
|
+
if self.service_id is not None:
|
|
36927
|
+
result['ServiceID'] = self.service_id
|
|
36809
36928
|
if self.service_managed is not None:
|
|
36810
36929
|
result['ServiceManaged'] = self.service_managed
|
|
36811
36930
|
if self.status is not None:
|
|
@@ -36894,6 +37013,8 @@ class DescribeEipAddressesResponseBodyEipAddressesEipAddress(TeaModel):
|
|
|
36894
37013
|
self.security_protection_types = temp_model.from_map(m['SecurityProtectionTypes'])
|
|
36895
37014
|
if m.get('SegmentInstanceId') is not None:
|
|
36896
37015
|
self.segment_instance_id = m.get('SegmentInstanceId')
|
|
37016
|
+
if m.get('ServiceID') is not None:
|
|
37017
|
+
self.service_id = m.get('ServiceID')
|
|
36897
37018
|
if m.get('ServiceManaged') is not None:
|
|
36898
37019
|
self.service_managed = m.get('ServiceManaged')
|
|
36899
37020
|
if m.get('Status') is not None:
|
|
@@ -44646,9 +44767,10 @@ class DescribeIpv6EgressOnlyRulesRequest(TeaModel):
|
|
|
44646
44767
|
):
|
|
44647
44768
|
# The ID of the instance that is associated with the IPv6 address to which the egress-only rule is applied.
|
|
44648
44769
|
self.instance_id = instance_id
|
|
44649
|
-
# The type of the instance to which you want to apply the egress-only rule.
|
|
44770
|
+
# The type of the instance to which you want to apply the egress-only rule. Valid values:
|
|
44650
44771
|
#
|
|
44651
|
-
#
|
|
44772
|
+
# * IPv6Address (default)
|
|
44773
|
+
# * IPv6Prefix
|
|
44652
44774
|
self.instance_type = instance_type
|
|
44653
44775
|
# The ID of the egress-only rule that you want to query.
|
|
44654
44776
|
self.ipv_6egress_only_rule_id = ipv_6egress_only_rule_id
|
|
@@ -44660,9 +44782,9 @@ class DescribeIpv6EgressOnlyRulesRequest(TeaModel):
|
|
|
44660
44782
|
self.name = name
|
|
44661
44783
|
self.owner_account = owner_account
|
|
44662
44784
|
self.owner_id = owner_id
|
|
44663
|
-
# The
|
|
44785
|
+
# The page number. Default value: **1**.
|
|
44664
44786
|
self.page_number = page_number
|
|
44665
|
-
# The number of entries
|
|
44787
|
+
# The number of entries per page. Maximum value: **50**. Default value: **10**.
|
|
44666
44788
|
self.page_size = page_size
|
|
44667
44789
|
# The ID of the region where the IPv6 gateway is deployed. You can call the [DescribeRegions](https://help.aliyun.com/document_detail/36063.html) operation to query the most recent region list.
|
|
44668
44790
|
#
|
|
@@ -54353,8 +54475,7 @@ class DescribeSslVpnClientCertsRequest(TeaModel):
|
|
|
54353
54475
|
self.region_id = region_id
|
|
54354
54476
|
# The ID of the resource group to which the SSL client certificate belongs.
|
|
54355
54477
|
#
|
|
54356
|
-
# The SSL client certificate
|
|
54357
|
-
# You can call the [DescribeSslVpnServers](https://help.aliyun.com/document_detail/2794078.html) operation to query the ID of the resource group to which the SSL server belongs.
|
|
54478
|
+
# The SSL client certificate and its associated SSL server belong to the same resource group. You can call the [DescribeSslVpnServers](https://help.aliyun.com/document_detail/2794078.html) operation to query the ID of the resource group to which the SSL server belongs.
|
|
54358
54479
|
self.resource_group_id = resource_group_id
|
|
54359
54480
|
self.resource_owner_account = resource_owner_account
|
|
54360
54481
|
self.resource_owner_id = resource_owner_id
|
|
@@ -54435,21 +54556,21 @@ class DescribeSslVpnClientCertsResponseBodySslVpnClientCertKeysSslVpnClientCertK
|
|
|
54435
54556
|
ssl_vpn_server_id: str = None,
|
|
54436
54557
|
status: str = None,
|
|
54437
54558
|
):
|
|
54438
|
-
# The timestamp
|
|
54559
|
+
# The timestamp generated when the SSL client certificate was created. Unit: milliseconds.
|
|
54439
54560
|
#
|
|
54440
|
-
# This value is a UNIX timestamp representing the number of milliseconds that have elapsed since
|
|
54561
|
+
# This value is a UNIX timestamp representing the number of milliseconds that have elapsed since January 1, 1970, 00:00:00 UTC.
|
|
54441
54562
|
self.create_time = create_time
|
|
54442
|
-
# The timestamp
|
|
54563
|
+
# The timestamp generated when the SSL client certificate expires. Unit: milliseconds.
|
|
54443
54564
|
#
|
|
54444
|
-
# This value is a UNIX timestamp representing the number of milliseconds that have elapsed since
|
|
54565
|
+
# This value is a UNIX timestamp representing the number of milliseconds that have elapsed since January 1, 1970, 00:00:00 UTC.
|
|
54445
54566
|
self.end_time = end_time
|
|
54446
54567
|
# The name of the SSL client certificate.
|
|
54447
54568
|
self.name = name
|
|
54448
|
-
# The region
|
|
54569
|
+
# The region ID of the SSL client certificate.
|
|
54449
54570
|
self.region_id = region_id
|
|
54450
54571
|
# The ID of the resource group to which the SSL client certificate belongs.
|
|
54451
54572
|
#
|
|
54452
|
-
# You can call the [ListResourceGroups](https://help.aliyun.com/document_detail/158855.html) operation to query
|
|
54573
|
+
# You can call the [ListResourceGroups](https://help.aliyun.com/document_detail/158855.html) operation to query resource groups.
|
|
54453
54574
|
self.resource_group_id = resource_group_id
|
|
54454
54575
|
# The ID of the SSL client certificate.
|
|
54455
54576
|
self.ssl_vpn_client_cert_id = ssl_vpn_client_cert_id
|
|
@@ -54457,7 +54578,7 @@ class DescribeSslVpnClientCertsResponseBodySslVpnClientCertKeysSslVpnClientCertK
|
|
|
54457
54578
|
self.ssl_vpn_server_id = ssl_vpn_server_id
|
|
54458
54579
|
# The status of the SSL client certificate. Valid values:
|
|
54459
54580
|
#
|
|
54460
|
-
# * **expiring-soon
|
|
54581
|
+
# * **expiring-soon**: The certificate expires in one week.
|
|
54461
54582
|
# * **normal**\
|
|
54462
54583
|
# * **expired**\
|
|
54463
54584
|
self.status = status
|
|
@@ -54956,11 +55077,9 @@ class DescribeSslVpnServersRequest(TeaModel):
|
|
|
54956
55077
|
#
|
|
54957
55078
|
# This parameter is required.
|
|
54958
55079
|
self.region_id = region_id
|
|
54959
|
-
# The
|
|
54960
|
-
#
|
|
54961
|
-
# The SSL server has the same resource group as its associated VPN gateway instance.
|
|
55080
|
+
# The resource group ID of the SSL server.
|
|
54962
55081
|
#
|
|
54963
|
-
# You can call the [DescribeVpnGateway](https://help.aliyun.com/document_detail/
|
|
55082
|
+
# The SSL server and its associated VPN gateway belong to the same resource group. You can call the [DescribeVpnGateway](https://help.aliyun.com/document_detail/2794055.html) operation to query the ID of the resource group to which the VPN gateway belongs.
|
|
54964
55083
|
self.resource_group_id = resource_group_id
|
|
54965
55084
|
self.resource_owner_account = resource_owner_account
|
|
54966
55085
|
self.resource_owner_id = resource_owner_id
|
|
@@ -55071,11 +55190,16 @@ class DescribeSslVpnServersResponseBodySslVpnServersSslVpnServer(TeaModel):
|
|
|
55071
55190
|
# * **true**\
|
|
55072
55191
|
# * **false** (default)
|
|
55073
55192
|
self.enable_multi_factor_auth = enable_multi_factor_auth
|
|
55193
|
+
# The ID of the IDaaS application.
|
|
55074
55194
|
self.idaa_sapplication_id = idaa_sapplication_id
|
|
55075
|
-
# The ID of the IDaaS instance.
|
|
55195
|
+
# The ID of the IDaaS EIAM instance.
|
|
55076
55196
|
self.idaa_sinstance_id = idaa_sinstance_id
|
|
55197
|
+
# The version of the IDaaS EIAM instance.
|
|
55198
|
+
#
|
|
55199
|
+
# * This parameter is returned only if the SSL server is associated with an IDaaS EIAM 2.0 instance. Only **EIAM 2.0** is returned.
|
|
55200
|
+
# * If the SSL server is associated with an IDaaS EIAM 1.0 instance, no value is returned.
|
|
55077
55201
|
self.idaa_sinstance_version = idaa_sinstance_version
|
|
55078
|
-
# The region ID of the IDaaS instance.
|
|
55202
|
+
# The region ID of the IDaaS EIAM instance.
|
|
55079
55203
|
self.idaa_sregion_id = idaa_sregion_id
|
|
55080
55204
|
# The public IP address of the VPN gateway.
|
|
55081
55205
|
self.internet_ip = internet_ip
|
|
@@ -55083,19 +55207,19 @@ class DescribeSslVpnServersResponseBodySslVpnServersSslVpnServer(TeaModel):
|
|
|
55083
55207
|
self.local_subnet = local_subnet
|
|
55084
55208
|
# The maximum number of connections.
|
|
55085
55209
|
self.max_connections = max_connections
|
|
55086
|
-
# The name of the SSL
|
|
55210
|
+
# The name of the SSL server.
|
|
55087
55211
|
self.name = name
|
|
55088
55212
|
# The port that is used by the SSL-VPN server.
|
|
55089
55213
|
self.port = port
|
|
55090
|
-
# The protocol that is used by the SSL
|
|
55214
|
+
# The protocol that is used by the SSL server.
|
|
55091
55215
|
self.proto = proto
|
|
55092
|
-
# The region ID of the SSL
|
|
55216
|
+
# The region ID of the SSL server.
|
|
55093
55217
|
self.region_id = region_id
|
|
55094
|
-
# The resource group ID of the SSL
|
|
55218
|
+
# The resource group ID of the SSL server.
|
|
55095
55219
|
#
|
|
55096
55220
|
# You can call the [ListResourceGroups](https://help.aliyun.com/document_detail/158855.html) operation to query resource groups.
|
|
55097
55221
|
self.resource_group_id = resource_group_id
|
|
55098
|
-
# The ID of the SSL
|
|
55222
|
+
# The ID of the SSL server.
|
|
55099
55223
|
self.ssl_vpn_server_id = ssl_vpn_server_id
|
|
55100
55224
|
# The ID of the VPN gateway.
|
|
55101
55225
|
self.vpn_gateway_id = vpn_gateway_id
|
|
@@ -55246,7 +55370,7 @@ class DescribeSslVpnServersResponseBody(TeaModel):
|
|
|
55246
55370
|
self.page_size = page_size
|
|
55247
55371
|
# The request ID.
|
|
55248
55372
|
self.request_id = request_id
|
|
55249
|
-
# The detailed information about the SSL-VPN
|
|
55373
|
+
# The detailed information about the SSL-VPN servers.
|
|
55250
55374
|
self.ssl_vpn_servers = ssl_vpn_servers
|
|
55251
55375
|
# The number of entries returned.
|
|
55252
55376
|
self.total_count = total_count
|
|
@@ -57807,6 +57931,10 @@ class DescribeVcoRouteEntriesResponseBodyVcoRouteEntries(TeaModel):
|
|
|
57807
57931
|
self.create_time = create_time
|
|
57808
57932
|
# The next hop of the route.
|
|
57809
57933
|
self.next_hop = next_hop
|
|
57934
|
+
# The list of next hops.
|
|
57935
|
+
#
|
|
57936
|
+
# > - This parameter is returned only by dual-tunnel IPsec connections.
|
|
57937
|
+
# > - This parameter is returned only when the tunnel status is **Phase 2 Negotiation Successful**.
|
|
57810
57938
|
self.next_hop_tunnel_id_list = next_hop_tunnel_id_list
|
|
57811
57939
|
# The destination CIDR block of the route.
|
|
57812
57940
|
self.route_dest = route_dest
|
|
@@ -57827,10 +57955,9 @@ class DescribeVcoRouteEntriesResponseBodyVcoRouteEntries(TeaModel):
|
|
|
57827
57955
|
self.state = state
|
|
57828
57956
|
# The ID of the IPsec-VPN connection.
|
|
57829
57957
|
self.vpn_connection_id = vpn_connection_id
|
|
57830
|
-
# The weight of the destination-based route.
|
|
57958
|
+
# The weight of the destination-based route.
|
|
57831
57959
|
#
|
|
57832
|
-
#
|
|
57833
|
-
# * **100**: a high priority
|
|
57960
|
+
# > The current parameter has no effect.
|
|
57834
57961
|
self.weight = weight
|
|
57835
57962
|
|
|
57836
57963
|
def validate(self):
|
|
@@ -57900,8 +58027,17 @@ class DescribeVcoRouteEntriesResponseBodyVpnRouteCounts(TeaModel):
|
|
|
57900
58027
|
route_entry_type: str = None,
|
|
57901
58028
|
source: str = None,
|
|
57902
58029
|
):
|
|
58030
|
+
# The number of route entries.
|
|
57903
58031
|
self.route_count = route_count
|
|
58032
|
+
# The route type. Valid values:
|
|
58033
|
+
#
|
|
58034
|
+
# * **custom**: destination-based route.
|
|
58035
|
+
# * **bgp**: BGP route.
|
|
57904
58036
|
self.route_entry_type = route_entry_type
|
|
58037
|
+
# The source of the BGP route. Valid values:
|
|
58038
|
+
#
|
|
58039
|
+
# * **CLOUD**: The current BGP route is learned by the IPsec connection from the transit router.
|
|
58040
|
+
# * **VPN_BGP**: The current BGP route is learned by the IPsec connection from the data center.
|
|
57905
58041
|
self.source = source
|
|
57906
58042
|
|
|
57907
58043
|
def validate(self):
|
|
@@ -57950,8 +58086,11 @@ class DescribeVcoRouteEntriesResponseBody(TeaModel):
|
|
|
57950
58086
|
self.request_id = request_id
|
|
57951
58087
|
# The number of entries returned.
|
|
57952
58088
|
self.total_count = total_count
|
|
57953
|
-
# The list of
|
|
58089
|
+
# The list of route entries.
|
|
57954
58090
|
self.vco_route_entries = vco_route_entries
|
|
58091
|
+
# The information on route entries of the dual-tunnel IPsec connection.
|
|
58092
|
+
#
|
|
58093
|
+
# > This parameter is returned only for IPsec connections in dual-tunnel mode.
|
|
57955
58094
|
self.vpn_route_counts = vpn_route_counts
|
|
57956
58095
|
|
|
57957
58096
|
def validate(self):
|
|
@@ -61351,7 +61490,9 @@ class DescribeVpnAttachmentsResponseBodyVpnAttachmentsTags(TeaModel):
|
|
|
61351
61490
|
key: str = None,
|
|
61352
61491
|
value: str = None,
|
|
61353
61492
|
):
|
|
61493
|
+
# The tag key of the IPsec-VPN connection.
|
|
61354
61494
|
self.key = key
|
|
61495
|
+
# The tag value of the IPsec-VPN connection.
|
|
61355
61496
|
self.value = value
|
|
61356
61497
|
|
|
61357
61498
|
def validate(self):
|
|
@@ -61404,7 +61545,16 @@ class DescribeVpnAttachmentsResponseBodyVpnAttachments(TeaModel):
|
|
|
61404
61545
|
self.instance_id = instance_id
|
|
61405
61546
|
# The name of the IPsec-VPN connection.
|
|
61406
61547
|
self.name = name
|
|
61548
|
+
# The system tags of the IPsec-VPN connection.
|
|
61549
|
+
#
|
|
61550
|
+
# You can check whether an IPsec-VPN connection supports BGP based on the system tags.
|
|
61551
|
+
#
|
|
61552
|
+
# **BGPSupport**: indicates whether the IPsec-VPN connection supports BGP.
|
|
61553
|
+
#
|
|
61554
|
+
# * **true**\
|
|
61555
|
+
# * **false**\
|
|
61407
61556
|
self.tag = tag
|
|
61557
|
+
# The list of tags to be added to the IPsec-VPN connection.
|
|
61408
61558
|
self.tags = tags
|
|
61409
61559
|
# The ID of the transit router with which the IPsec-VPN connection is associated.
|
|
61410
61560
|
self.transit_router_id = transit_router_id
|
|
@@ -62114,6 +62264,12 @@ class DescribeVpnConnectionResponseBodyTunnelOptionsSpecificationTunnelOptions(T
|
|
|
62114
62264
|
self.tunnel_id = tunnel_id
|
|
62115
62265
|
# The configuration of Phase 1 negotiations.
|
|
62116
62266
|
self.tunnel_ike_config = tunnel_ike_config
|
|
62267
|
+
# The order in which the tunnel is created.
|
|
62268
|
+
#
|
|
62269
|
+
# * **1**: Tunnel 1.
|
|
62270
|
+
# * **2**: Tunnel 2.
|
|
62271
|
+
#
|
|
62272
|
+
# > This parameter is returned only if the IPsec-VPN connection is associated with a transit router.
|
|
62117
62273
|
self.tunnel_index = tunnel_index
|
|
62118
62274
|
# The configurations of Phase 2 negotiations.
|
|
62119
62275
|
self.tunnel_ipsec_config = tunnel_ipsec_config
|
|
@@ -62534,9 +62690,9 @@ class DescribeVpnConnectionResponseBody(TeaModel):
|
|
|
62534
62690
|
self.transit_router_id = transit_router_id
|
|
62535
62691
|
# The name of the transit router.
|
|
62536
62692
|
self.transit_router_name = transit_router_name
|
|
62537
|
-
# The tunnel
|
|
62693
|
+
# The tunnel configurations of the IPsec-VPN connection.
|
|
62538
62694
|
#
|
|
62539
|
-
# Parameters in **TunnelOptionsSpecification** are returned only if you query IPsec-VPN
|
|
62695
|
+
# Parameters in **TunnelOptionsSpecification** are returned only if you query an IPsec-VPN connection in dual-tunnel mode.
|
|
62540
62696
|
self.tunnel_options_specification = tunnel_options_specification
|
|
62541
62697
|
# The health check information about the IPsec-VPN connection.
|
|
62542
62698
|
self.vco_health_check = vco_health_check
|
|
@@ -63063,9 +63219,9 @@ class DescribeVpnConnectionsRequest(TeaModel):
|
|
|
63063
63219
|
self.customer_gateway_id = customer_gateway_id
|
|
63064
63220
|
self.owner_account = owner_account
|
|
63065
63221
|
self.owner_id = owner_id
|
|
63066
|
-
# The number of the page to return. Default value: **1**.
|
|
63222
|
+
# The page number of the page to return. Default value: **1**.
|
|
63067
63223
|
self.page_number = page_number
|
|
63068
|
-
# The number of entries
|
|
63224
|
+
# The number of entries returned on each page. Default value: **10**. Valid values: **1** to **50**.
|
|
63069
63225
|
self.page_size = page_size
|
|
63070
63226
|
# The ID of the region where the IPsec-VPN connection is created.
|
|
63071
63227
|
#
|
|
@@ -63635,6 +63791,12 @@ class DescribeVpnConnectionsResponseBodyVpnConnectionsVpnConnectionTunnelOptions
|
|
|
63635
63791
|
self.tunnel_id = tunnel_id
|
|
63636
63792
|
# The configuration of Phase 1 negotiations.
|
|
63637
63793
|
self.tunnel_ike_config = tunnel_ike_config
|
|
63794
|
+
# The order in which the tunnel is created.
|
|
63795
|
+
#
|
|
63796
|
+
# * **1**: Tunnel 1.
|
|
63797
|
+
# * **2**: Tunnel 2.
|
|
63798
|
+
#
|
|
63799
|
+
# > This parameter is returned only if the IPsec-VPN connection is associated with a transit router.
|
|
63638
63800
|
self.tunnel_index = tunnel_index
|
|
63639
63801
|
# The configurations of Phase 2 negotiations.
|
|
63640
63802
|
self.tunnel_ipsec_config = tunnel_ipsec_config
|
|
@@ -64043,9 +64205,9 @@ class DescribeVpnConnectionsResponseBodyVpnConnectionsVpnConnection(TeaModel):
|
|
|
64043
64205
|
self.transit_router_id = transit_router_id
|
|
64044
64206
|
# The name of the transit router.
|
|
64045
64207
|
self.transit_router_name = transit_router_name
|
|
64046
|
-
# The tunnel
|
|
64208
|
+
# The tunnel configurations of the IPsec-VPN connection.
|
|
64047
64209
|
#
|
|
64048
|
-
# Parameters in **TunnelOptionsSpecification** are returned only if you query IPsec-VPN
|
|
64210
|
+
# Parameters in **TunnelOptionsSpecification** are returned only if you query an IPsec-VPN connection in dual-tunnel mode.
|
|
64049
64211
|
self.tunnel_options_specification = tunnel_options_specification
|
|
64050
64212
|
# The health check configuration of the IPsec-VPN connection.
|
|
64051
64213
|
self.vco_health_check = vco_health_check
|
|
@@ -64257,7 +64419,7 @@ class DescribeVpnConnectionsResponseBody(TeaModel):
|
|
|
64257
64419
|
self.request_id = request_id
|
|
64258
64420
|
# The total number of entries returned.
|
|
64259
64421
|
self.total_count = total_count
|
|
64260
|
-
# The information about the IPsec-VPN
|
|
64422
|
+
# The information about the IPsec-VPN connections.
|
|
64261
64423
|
self.vpn_connections = vpn_connections
|
|
64262
64424
|
|
|
64263
64425
|
def validate(self):
|
|
@@ -64353,18 +64515,18 @@ class DescribeVpnCrossAccountAuthorizationsRequest(TeaModel):
|
|
|
64353
64515
|
):
|
|
64354
64516
|
# The client token that is used to ensure the idempotence of the request.
|
|
64355
64517
|
#
|
|
64356
|
-
# You can use the client to generate the
|
|
64518
|
+
# You can use the client to generate the token, but you must make sure that the token is unique among different requests. The client token can contain only ASCII characters.
|
|
64357
64519
|
#
|
|
64358
|
-
# > If you do not
|
|
64520
|
+
# > If you do not specify this parameter, the system automatically uses the **request ID** as the **client token**. The **request ID** may be different for each request.
|
|
64359
64521
|
self.client_token = client_token
|
|
64360
64522
|
self.owner_account = owner_account
|
|
64361
|
-
# The
|
|
64523
|
+
# The page number. Default value: **1**.
|
|
64362
64524
|
self.page_number = page_number
|
|
64363
|
-
# The number of entries to return
|
|
64525
|
+
# The number of entries to return per page. Default value: **10**. Valid values: **1** to **50**.
|
|
64364
64526
|
self.page_size = page_size
|
|
64365
64527
|
# The ID of the region to which the IPsec-VPN connection belongs.
|
|
64366
64528
|
#
|
|
64367
|
-
# You can call the [DescribeRegions](https://help.aliyun.com/document_detail/36063.html) operation to query the
|
|
64529
|
+
# You can call the [DescribeRegions](https://help.aliyun.com/document_detail/36063.html) operation to query the region ID.
|
|
64368
64530
|
#
|
|
64369
64531
|
# This parameter is required.
|
|
64370
64532
|
self.region_id = region_id
|
|
@@ -64437,13 +64599,13 @@ class DescribeVpnCrossAccountAuthorizationsResponseBodyCrossAccountAuthorization
|
|
|
64437
64599
|
self.ali_uid = ali_uid
|
|
64438
64600
|
# The ID of the CEN instance.
|
|
64439
64601
|
self.bind_instance = bind_instance
|
|
64440
|
-
# The
|
|
64602
|
+
# The type of resource that can be associated with the IPsec-VPN connection.
|
|
64441
64603
|
#
|
|
64442
|
-
#
|
|
64604
|
+
# Only **CEN** can be returned, which indicates that the IPsec-VPN connection is authorized to be associated with the transit router of a Cloud Enterprise Network (CEN) instance that belongs to another Alibaba Cloud account.
|
|
64443
64605
|
self.bind_product = bind_product
|
|
64444
|
-
# The ID of the Alibaba Cloud account whose
|
|
64606
|
+
# The ID of the Alibaba Cloud account whose resources the IPsec-VPN connection is authorized to be associated with.
|
|
64445
64607
|
self.bind_uid = bind_uid
|
|
64446
|
-
# The
|
|
64608
|
+
# The time when the authorization for the IPsec-VPN connection was created.
|
|
64447
64609
|
#
|
|
64448
64610
|
# This value is a UNIX timestamp representing the number of milliseconds that have elapsed since the epoch time January 1, 1970, 00:00:00 UTC.
|
|
64449
64611
|
self.creation_time = creation_time
|
|
@@ -64501,11 +64663,11 @@ class DescribeVpnCrossAccountAuthorizationsResponseBody(TeaModel):
|
|
|
64501
64663
|
):
|
|
64502
64664
|
# The cross-account authorization information about the IPsec-VPN connection.
|
|
64503
64665
|
self.cross_account_authorizations = cross_account_authorizations
|
|
64504
|
-
# The page number
|
|
64666
|
+
# The page number.
|
|
64505
64667
|
self.page_number = page_number
|
|
64506
|
-
# The number of entries
|
|
64668
|
+
# The number of entries per page.
|
|
64507
64669
|
self.page_size = page_size
|
|
64508
|
-
# The ID
|
|
64670
|
+
# The request ID.
|
|
64509
64671
|
self.request_id = request_id
|
|
64510
64672
|
# The number of entries returned.
|
|
64511
64673
|
self.total_count = total_count
|
|
@@ -67045,9 +67207,7 @@ class DescribeVpnSslServerLogsResponseBody(TeaModel):
|
|
|
67045
67207
|
):
|
|
67046
67208
|
# The number of log entries.
|
|
67047
67209
|
self.count = count
|
|
67048
|
-
#
|
|
67049
|
-
#
|
|
67050
|
-
# Each item in the array is a log entry.
|
|
67210
|
+
# Log information list.
|
|
67051
67211
|
self.data = data
|
|
67052
67212
|
# Indicates whether the log is accurate. Valid values:
|
|
67053
67213
|
#
|
|
@@ -67818,10 +67978,10 @@ class DiagnoseVpnGatewayRequest(TeaModel):
|
|
|
67818
67978
|
#
|
|
67819
67979
|
# > If you do not specify this parameter, the system automatically uses the request ID as the client token. The request ID may be different for each request.
|
|
67820
67980
|
self.client_token = client_token
|
|
67821
|
-
#
|
|
67981
|
+
# Check the connectivity of the destination address. Valid values:
|
|
67822
67982
|
#
|
|
67823
|
-
# * **PrivateSourceIp**: the source IP address
|
|
67824
|
-
# * **PrivateDestinationIp**: the destination IP address
|
|
67983
|
+
# * **PrivateSourceIp**: the source IP address. The source IP address must be on the VPC side.
|
|
67984
|
+
# * **PrivateDestinationIp**: the destination IP address. The destination IP address must be on the data center side.
|
|
67825
67985
|
self.ipsec_extend_info = ipsec_extend_info
|
|
67826
67986
|
# The region ID of the VPN gateway.
|
|
67827
67987
|
#
|
|
@@ -67890,7 +68050,9 @@ class DiagnoseVpnGatewayResponseBody(TeaModel):
|
|
|
67890
68050
|
diagnose_id: str = None,
|
|
67891
68051
|
request_id: str = None,
|
|
67892
68052
|
):
|
|
67893
|
-
# The ID
|
|
68053
|
+
# The diagnostic ID.
|
|
68054
|
+
#
|
|
68055
|
+
# After a diagnostic ID is returned, you can call [GetVpnGatewayDiagnoseResult](https://help.aliyun.com/document_detail/2521963.html) to query the diagnostic report.
|
|
67894
68056
|
self.diagnose_id = diagnose_id
|
|
67895
68057
|
# The request ID.
|
|
67896
68058
|
self.request_id = request_id
|
|
@@ -75612,9 +75774,7 @@ class ListIpsecServerLogsResponseBody(TeaModel):
|
|
|
75612
75774
|
):
|
|
75613
75775
|
# The number of entries on the current page.
|
|
75614
75776
|
self.count = count
|
|
75615
|
-
#
|
|
75616
|
-
#
|
|
75617
|
-
# Each item in the array is a log entry.
|
|
75777
|
+
# Log information list.
|
|
75618
75778
|
self.data = data
|
|
75619
75779
|
# Indicates whether the log is accurate. Valid values:
|
|
75620
75780
|
#
|
|
@@ -86674,11 +86834,20 @@ class ModifyIpv6AddressAttributeRequest(TeaModel):
|
|
|
86674
86834
|
resource_owner_account: str = None,
|
|
86675
86835
|
resource_owner_id: int = None,
|
|
86676
86836
|
):
|
|
86837
|
+
# The client token that is used to ensure the idempotence of the request.
|
|
86838
|
+
#
|
|
86839
|
+
# You can use the client to generate the token, but you must make sure that the token is unique among different requests. The client token can contain only ASCII characters.
|
|
86840
|
+
#
|
|
86841
|
+
# > If you do not specify this parameter, the system automatically uses the **request ID** as the **client token**. The **request ID** may be different for each request.
|
|
86677
86842
|
self.client_token = client_token
|
|
86678
86843
|
# The description of the IPv6 address.
|
|
86679
86844
|
#
|
|
86680
|
-
#
|
|
86845
|
+
# The description must be 0 to 256 characters in length and cannot start with `http://` or `https://`.
|
|
86681
86846
|
self.description = description
|
|
86847
|
+
# Specifies whether to perform a dry run, without performing the actual request. Valid values:
|
|
86848
|
+
#
|
|
86849
|
+
# * **true**: performs only a dry run. The system checks the request for potential issues, including missing parameter values, incorrect request syntax, and service limits. If the request fails the dry run, an error message is returned. If the request passes the dry run, the `DryRunOperation` error code is returned.
|
|
86850
|
+
# * **false** (default): performs a dry run and performs the actual request. If the request passes the dry run, a 2xx HTTP status code is returned and the operation is performed.
|
|
86682
86851
|
self.dry_run = dry_run
|
|
86683
86852
|
# The ID of the IPv6 address.
|
|
86684
86853
|
#
|
|
@@ -86686,7 +86855,7 @@ class ModifyIpv6AddressAttributeRequest(TeaModel):
|
|
|
86686
86855
|
self.ipv_6address_id = ipv_6address_id
|
|
86687
86856
|
# The name of the IPv6 address.
|
|
86688
86857
|
#
|
|
86689
|
-
# The name must be
|
|
86858
|
+
# The name must be 0 to 128 characters in length and cannot start with `http://` or `https://`.
|
|
86690
86859
|
self.name = name
|
|
86691
86860
|
self.owner_account = owner_account
|
|
86692
86861
|
self.owner_id = owner_id
|
|
@@ -86836,9 +87005,20 @@ class ModifyIpv6GatewayAttributeRequest(TeaModel):
|
|
|
86836
87005
|
resource_owner_account: str = None,
|
|
86837
87006
|
resource_owner_id: int = None,
|
|
86838
87007
|
):
|
|
87008
|
+
# The client token that is used to ensure the idempotence of the request.
|
|
87009
|
+
#
|
|
87010
|
+
# You can use the client to generate the token, but you must make sure that the token is unique among different requests. The client token can contain only ASCII characters.
|
|
87011
|
+
#
|
|
87012
|
+
# > If you do not specify this parameter, the system automatically uses the **request ID** as the **client token**. The **request ID** may be different for each request.
|
|
86839
87013
|
self.client_token = client_token
|
|
86840
87014
|
# The description of the IPv6 gateway.
|
|
87015
|
+
#
|
|
87016
|
+
# The description must be 0 to 256 characters in length and cannot start with `http://` or `https://`.
|
|
86841
87017
|
self.description = description
|
|
87018
|
+
# Specifies whether to perform only a dry run, without performing the actual request. Valid values:
|
|
87019
|
+
#
|
|
87020
|
+
# * **true**: performs only a dry run. The system checks the request for potential issues, including invalid AccessKey pairs, unauthorized RAM users, and missing parameter values. If the request fails the dry run, an error message is returned. If the request passes dry run, the `DryRunOperation` error code is returned.
|
|
87021
|
+
# * **false**: sends the API request. After the request passes the check, a 2XX HTTP status code is returned and the gateway endpoint is associated with the route table. This is the default value.
|
|
86842
87022
|
self.dry_run = dry_run
|
|
86843
87023
|
# The ID of the IPv6 gateway that you want to modify.
|
|
86844
87024
|
#
|
|
@@ -86846,7 +87026,7 @@ class ModifyIpv6GatewayAttributeRequest(TeaModel):
|
|
|
86846
87026
|
self.ipv_6gateway_id = ipv_6gateway_id
|
|
86847
87027
|
# The name of the IPv6 gateway.
|
|
86848
87028
|
#
|
|
86849
|
-
#
|
|
87029
|
+
# The name must be 0 to 128 characters in length and cannot start with `http://` or `https://`.
|
|
86850
87030
|
self.name = name
|
|
86851
87031
|
self.owner_account = owner_account
|
|
86852
87032
|
self.owner_id = owner_id
|
|
@@ -89552,7 +89732,45 @@ class ModifySslVpnServerRequest(TeaModel):
|
|
|
89552
89732
|
# * **AES-256-CBC**\
|
|
89553
89733
|
# * **none**\
|
|
89554
89734
|
self.cipher = cipher
|
|
89555
|
-
# The client
|
|
89735
|
+
# The client CIDR block.
|
|
89736
|
+
#
|
|
89737
|
+
# The CIDR block from which an IP address is allocated to the virtual network interface controller (NIC) of the client, rather than the private CIDR block.
|
|
89738
|
+
#
|
|
89739
|
+
# If the client accesses the SSL server over an SSL-VPN connection, the VPN gateway assigns an IP address from the specified client CIDR block for the client to access cloud resources.
|
|
89740
|
+
#
|
|
89741
|
+
# Make sure that the number of IP addresses in the client CIDR block is at least four times the maximum number of SSL-VPN connections supported by the VPN gateway.
|
|
89742
|
+
#
|
|
89743
|
+
# <details>
|
|
89744
|
+
# <summary>Click to view the reason.</summary>
|
|
89745
|
+
#
|
|
89746
|
+
# For example, if you specify 192.168.0.0/24 as the client CIDR block, the system first divides a subnet CIDR block with a subnet mask of 30 from 192.168.0.0/24, such as 192.168.0.4/30. This subnet provides up to four IP addresses. Then, the system allocates an IP address from 192.168.0.4/30 to the client and uses the other three IP addresses to ensure network communication. In this case, one client consumes four IP addresses. Therefore, to ensure that an IP address is assigned to your client, the number of IP addresses in the client CIDR block must be at least four times the maximum number of SSL-VPN connections supported by the VPN gateway with which the SSL server is associated.
|
|
89747
|
+
# </details>
|
|
89748
|
+
# <details>
|
|
89749
|
+
# <summary>Click to view the CIDR blocks that are not supported.</summary>
|
|
89750
|
+
#
|
|
89751
|
+
# * 100.64.0.0~100.127.255.255
|
|
89752
|
+
# * 127.0.0.0~127.255.255.255
|
|
89753
|
+
# * 169.254.0.0~169.254.255.255
|
|
89754
|
+
# * 224.0.0.0~239.255.255.255
|
|
89755
|
+
# * 255.0.0.0~255.255.255.255
|
|
89756
|
+
# </details>
|
|
89757
|
+
# <details>
|
|
89758
|
+
# <summary>Click to view the recommended client CIDR blocks for different numbers of SSL-VPN connections.</summary>
|
|
89759
|
+
#
|
|
89760
|
+
# * If the number of SSL-VPN connections is 5, we recommend that you specify a client CIDR block with a subnet mask that is less than or equal to 27 bits in length. Examples: 10.0.0.0/27 and 10.0.0.0/26.
|
|
89761
|
+
# * If the number of SSL-VPN connections is 10, we recommend that you specify a client CIDR block with a subnet mask that is less than or equal to 26 bits in length. Examples: 10.0.0.0/26 and 10.0.0.0/25.
|
|
89762
|
+
# * If the number of SSL-VPN connections is 20, we recommend that you specify a client CIDR block with a subnet mask that is less than or equal to 25 bits in length. Examples: 10.0.0.0/25 and 10.0.0.0/24.
|
|
89763
|
+
# * If the number of SSL-VPN connections is 50, we recommend that you specify a client CIDR block with a subnet mask that is less than or equal to 24 bits in length. Examples: 10.0.0.0/24 and 10.0.0.0/23.
|
|
89764
|
+
# * If the number of SSL-VPN connections is 100, we recommend that you specify a client CIDR block with a subnet mask that is less than or equal to 23 bits in length. Examples: 10.0.0.0/23 and 10.0.0.0/22.
|
|
89765
|
+
# * If the number of SSL-VPN connections is 200, we recommend that you specify a client CIDR block with a subnet mask that is less than or equal to 22 bits in length. Examples: 10.0.0.0/22 and 10.0.0.0/21.
|
|
89766
|
+
# * If the number of SSL-VPN connections is 500, we recommend that you specify a client CIDR block with a subnet mask that is less than or equal to 21 bits in length. Examples: 10.0.0.0/21 and 10.0.0.0/20.
|
|
89767
|
+
# * If the number of SSL-VPN connections is 1,000, we recommend that you specify a client CIDR block with a subnet mask that is less than or equal to 20 bits in length. Examples: 10.0.0.0/20 and 10.0.0.0/19.
|
|
89768
|
+
# </details>
|
|
89769
|
+
#
|
|
89770
|
+
# > - The subnet mask of the client CIDR block must be 16 to 29 bits in length.
|
|
89771
|
+
# > - Make sure that the client CIDR block does not overlap with the local CIDR block, the VPC CIDR block, or route CIDR blocks associated with the client.
|
|
89772
|
+
# > - We recommend that you use 10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16, or one of their subnets as the client CIDR block. If you want to specify a public CIDR block as the client CIDR block, you must specify the public CIDR block as the user CIDR block of the virtual private cloud (VPC). This way, the VPC can access the public CIDR block. For more information, see [VPC FAQs](https://help.aliyun.com/document_detail/185311.html).
|
|
89773
|
+
# > - After you create an SSL server, the system automatically adds routes that point to the client CIDR block to the VPC route table. Do not manually add routes that point to the client CIDR block. Otherwise, SSL-VPN connections cannot work as expected.
|
|
89556
89774
|
self.client_ip_pool = client_ip_pool
|
|
89557
89775
|
# The client token that is used to ensure the idempotence of the request.
|
|
89558
89776
|
#
|
|
@@ -89565,13 +89783,14 @@ class ModifySslVpnServerRequest(TeaModel):
|
|
|
89565
89783
|
# * **true** (default)
|
|
89566
89784
|
# * **false**\
|
|
89567
89785
|
self.compress = compress
|
|
89568
|
-
# Specifies whether to enable two-factor authentication.
|
|
89786
|
+
# Specifies whether to enable two-factor authentication. To enable two-factor authentication, you need to specify **IDaaSInstanceId**, **IDaaSRegionId**, and **IDaaSApplicationId**. Valid values:
|
|
89569
89787
|
#
|
|
89570
|
-
# * **true
|
|
89571
|
-
# * **false
|
|
89788
|
+
# * **true**: enables the feature.
|
|
89789
|
+
# * **false**: disables the feature.
|
|
89572
89790
|
#
|
|
89573
|
-
# > -
|
|
89574
|
-
# > -
|
|
89791
|
+
# > - If you use two-factor authentication for the first time, you must first complete [authorization](https://ram.console.aliyun.com/role/authorization?request=%7B%22Services%22%3A%5B%7B%22Service%22%3A%22VPN%22%2C%22Roles%22%3A%5B%7B%22RoleName%22%3A%22AliyunVpnAccessingIdaasRole%22%2C%22TemplateId%22%3A%22IdaasRole%22%7D%5D%7D%5D%2C%22ReturnUrl%22%3A%22https%3A%2F%2Fvpc.console.aliyun.com%2Fsslvpn%2Fcn-shanghai%2Fvpn-servers%22%7D).
|
|
89792
|
+
# > - When you create an SSL server in the UAE (Dubai) region, we recommend that you associate the SSL server with an IDaaS EIAM 2.0 instance in Singapore to reduce latency.
|
|
89793
|
+
# > - IDaaS EIAM 1.0 instances are no longer available for purchase. If your Alibaba Cloud account has IDaaS EIAM 1.0 instances, the IDaaS EIAM 1.0 instances can be associated after two-factor authentication is enabled. If your Alibaba Cloud account does not have IDaaS EIAM 1.0 instances, only IDaaS EIAM 2.0 instances can be associated after two-factor authentication is enabled.
|
|
89575
89794
|
self.enable_multi_factor_auth = enable_multi_factor_auth
|
|
89576
89795
|
# The ID of the IDaaS application.
|
|
89577
89796
|
#
|
|
@@ -89582,7 +89801,18 @@ class ModifySslVpnServerRequest(TeaModel):
|
|
|
89582
89801
|
self.idaa_sinstance_id = idaa_sinstance_id
|
|
89583
89802
|
# The region ID of the IDaaS EIAM instance.
|
|
89584
89803
|
self.idaa_sregion_id = idaa_sregion_id
|
|
89585
|
-
# The CIDR block
|
|
89804
|
+
# The local CIDR block.
|
|
89805
|
+
#
|
|
89806
|
+
# The CIDR block that your client needs to access by using the SSL-VPN connection.
|
|
89807
|
+
#
|
|
89808
|
+
# This value can be the CIDR block of a VPC, a vSwitch, a data center that is connected to a VPC by using an Express Connect circuit, or an Alibaba Cloud service such as Object Storage Service (OSS).
|
|
89809
|
+
#
|
|
89810
|
+
# The subnet mask of the specified local CIDR block must be 8 to 32 bits in length. You cannot specify the following CIDR blocks as the local CIDR blocks:
|
|
89811
|
+
#
|
|
89812
|
+
# * 127.0.0.0~127.255.255.255
|
|
89813
|
+
# * 169.254.0.0~169.254.255.255
|
|
89814
|
+
# * 224.0.0.0~239.255.255.255
|
|
89815
|
+
# * 255.0.0.0~255.255.255.255
|
|
89586
89816
|
self.local_subnet = local_subnet
|
|
89587
89817
|
# The name of the SSL server.
|
|
89588
89818
|
#
|
|
@@ -89726,7 +89956,7 @@ class ModifySslVpnServerResponseBody(TeaModel):
|
|
|
89726
89956
|
):
|
|
89727
89957
|
# The encryption algorithm.
|
|
89728
89958
|
self.cipher = cipher
|
|
89729
|
-
# The client
|
|
89959
|
+
# The client CIDR block.
|
|
89730
89960
|
self.client_ip_pool = client_ip_pool
|
|
89731
89961
|
# Indicates whether data compression is enabled.
|
|
89732
89962
|
self.compress = compress
|
|
@@ -89750,7 +89980,7 @@ class ModifySslVpnServerResponseBody(TeaModel):
|
|
|
89750
89980
|
self.idaa_sinstance_version = idaa_sinstance_version
|
|
89751
89981
|
# The public IP address.
|
|
89752
89982
|
self.internet_ip = internet_ip
|
|
89753
|
-
# The CIDR block
|
|
89983
|
+
# The local CIDR block.
|
|
89754
89984
|
self.local_subnet = local_subnet
|
|
89755
89985
|
# The maximum number of connections.
|
|
89756
89986
|
self.max_connections = max_connections
|
|
@@ -89923,7 +90153,7 @@ class ModifyTunnelAttributeRequestTunnelOptionsSpecificationTunnelBgpConfig(TeaM
|
|
|
89923
90153
|
self.local_bgp_ip = local_bgp_ip
|
|
89924
90154
|
# The CIDR block of the tunnel.
|
|
89925
90155
|
#
|
|
89926
|
-
# The CIDR block must fall
|
|
90156
|
+
# The CIDR block must fall within the 169.254.0.0/16 range. The subnet mask of the CIDR block must be 30 bits in length.
|
|
89927
90157
|
self.tunnel_cidr = tunnel_cidr
|
|
89928
90158
|
|
|
89929
90159
|
def validate(self):
|
|
@@ -89974,28 +90204,28 @@ class ModifyTunnelAttributeRequestTunnelOptionsSpecificationTunnelIkeConfig(TeaM
|
|
|
89974
90204
|
self.ike_auth_alg = ike_auth_alg
|
|
89975
90205
|
# The encryption algorithm that is used in IKE Phase 1 negotiations.
|
|
89976
90206
|
#
|
|
89977
|
-
# * Valid values when the IPsec connection is attached to a standard VPN gateway: **aes**, **aes192**, **
|
|
89978
|
-
# *
|
|
90207
|
+
# * Valid values when the IPsec connection is attached to a standard VPN gateway: **aes**, **aes192**, **aes256**, **des**, and **3des**.
|
|
90208
|
+
# * If the IPsec connection is attached to a VPN gateway that uses an SM certificate, set the value to **sm4**.
|
|
89979
90209
|
self.ike_enc_alg = ike_enc_alg
|
|
89980
|
-
# The SA lifetime
|
|
90210
|
+
# The SA lifetime as a result of Phase 1 negotiations. Unit: seconds. Valid values: **0 to 86400**.
|
|
89981
90211
|
self.ike_lifetime = ike_lifetime
|
|
89982
|
-
# The
|
|
90212
|
+
# The negotiation mode of IKE. Valid values:
|
|
89983
90213
|
#
|
|
89984
90214
|
# * **main:** This mode offers higher security during negotiations.
|
|
89985
|
-
# * **aggressive
|
|
90215
|
+
# * **aggressive**: This mode is faster and has a higher success rate.
|
|
89986
90216
|
self.ike_mode = ike_mode
|
|
89987
|
-
# The Diffie-Hellman
|
|
90217
|
+
# The Diffie-Hellman key exchange algorithm that is used in Phase 1 negotiations. Valid values: **group1**, **group2**, **group5**, and **group14**.
|
|
89988
90218
|
self.ike_pfs = ike_pfs
|
|
89989
|
-
# The IKE
|
|
90219
|
+
# The version of the IKE protocol. Valid values: **ikev1** and **ikev2**.
|
|
89990
90220
|
self.ike_version = ike_version
|
|
89991
|
-
# The tunnel identifier. The identifier can be up to 100 characters in length, and supports
|
|
90221
|
+
# The tunnel identifier. The identifier can be up to 100 characters in length, and supports FQDNs and IP addresses. The default value is the IP address of the tunnel.
|
|
89992
90222
|
self.local_id = local_id
|
|
89993
90223
|
# The pre-shared key that is used to verify identities between the tunnel and peer.
|
|
89994
90224
|
#
|
|
89995
|
-
# *
|
|
89996
|
-
# * If you do not specify a pre-shared key, the system generates a
|
|
90225
|
+
# * The key must be 1 to 100 characters in length and can contain digits, letters, and the following special characters: ``~!`@#$%^&*()_-+={}[]|;:\\",.<>/?``
|
|
90226
|
+
# * If you do not specify a pre-shared key, the system randomly generates a 16-bit string as the pre-shared key. You can call the [DescribeVpnConnection](https://help.aliyun.com/document_detail/120374.html) operation to query the pre-shared key that is automatically generated by the system.
|
|
89997
90227
|
#
|
|
89998
|
-
# >
|
|
90228
|
+
# > The pre-shared key that is configured for the tunnel and the tunnel peer must be the same. Otherwise, the system cannot establish the tunnel.
|
|
89999
90229
|
self.psk = psk
|
|
90000
90230
|
# The peer identifier. The identifier can be up to 100 characters in length, and supports FQDNs and IP addresses. The default identifier is the IP address of the customer gateway associated with the tunnel.
|
|
90001
90231
|
self.remote_id = remote_id
|
|
@@ -90067,12 +90297,12 @@ class ModifyTunnelAttributeRequestTunnelOptionsSpecificationTunnelIpsecConfig(Te
|
|
|
90067
90297
|
self.ipsec_auth_alg = ipsec_auth_alg
|
|
90068
90298
|
# The encryption algorithm that is used in IPsec Phase 2 negotiations.
|
|
90069
90299
|
#
|
|
90070
|
-
# * Valid values when the IPsec connection is attached to a standard VPN gateway: **aes**, **aes192**, **
|
|
90071
|
-
# *
|
|
90300
|
+
# * Valid values when the IPsec connection is attached to a standard VPN gateway: **aes**, **aes192**, **aes256**, **des**, and **3des**.
|
|
90301
|
+
# * If the IPsec connection is attached to a VPN gateway that uses an SM certificate, set the value to **sm4**.
|
|
90072
90302
|
self.ipsec_enc_alg = ipsec_enc_alg
|
|
90073
|
-
# The SA lifetime
|
|
90303
|
+
# The SA lifetime as a result of Phase 2 negotiations. Unit: seconds. Valid values: **0 to 86400**.
|
|
90074
90304
|
self.ipsec_lifetime = ipsec_lifetime
|
|
90075
|
-
# The
|
|
90305
|
+
# The Diffie-Hellman key exchange algorithm that is used in Phase 2 negotiations. Valid values: **disabled**, **group1**, **group2**, **group5**, and **group14**.
|
|
90076
90306
|
self.ipsec_pfs = ipsec_pfs
|
|
90077
90307
|
|
|
90078
90308
|
def validate(self):
|
|
@@ -90119,15 +90349,15 @@ class ModifyTunnelAttributeRequestTunnelOptionsSpecification(TeaModel):
|
|
|
90119
90349
|
tunnel_ipsec_config: ModifyTunnelAttributeRequestTunnelOptionsSpecificationTunnelIpsecConfig = None,
|
|
90120
90350
|
):
|
|
90121
90351
|
self.customer_gateway_id = customer_gateway_id
|
|
90122
|
-
# Specifies whether to enable
|
|
90352
|
+
# Specifies whether to enable dead peer detection (DPD). Valid values: Valid values:
|
|
90123
90353
|
#
|
|
90124
|
-
# * **true
|
|
90354
|
+
# * **true** The IPsec initiator sends DPD packets to verify the existence and availability of the IPsec peer. If no response is received from the peer within a specified period of time, the IPsec peer is considered disconnected. Then, the ISAKMP SA, IPsec SA, and IPsec tunnel are deleted.
|
|
90125
90355
|
# * **false**: DPD is disabled. The IPsec initiator does not send DPD packets.
|
|
90126
90356
|
self.enable_dpd = enable_dpd
|
|
90127
90357
|
# Specifies whether to enable NAT traversal. Valid values:
|
|
90128
90358
|
#
|
|
90129
|
-
# * **true**: NAT traversal
|
|
90130
|
-
# * **false**: NAT traversal
|
|
90359
|
+
# * **true**: enables NAT traversal. After NAT traversal is enabled, the initiator does not check the UDP ports during IKE negotiations and can automatically discover NAT gateway devices along the IPsec-VPN tunnel.
|
|
90360
|
+
# * **false**: disables NAT traversal.
|
|
90131
90361
|
self.enable_nat_traversal = enable_nat_traversal
|
|
90132
90362
|
# The peer certificate authority (CA) certificate when you want to attach the IPsec connection to a virtual private network (VPN) gateway that uses a ShangMi (SM) certificate.
|
|
90133
90363
|
self.remote_ca_certificate = remote_ca_certificate
|
|
@@ -91190,7 +91420,7 @@ class ModifyVcoRouteEntryWeightRequest(TeaModel):
|
|
|
91190
91420
|
# The tunneling protocol. Set the value to **Ipsec**, which specifies the IPsec tunneling protocol.
|
|
91191
91421
|
self.overlay_mode = overlay_mode
|
|
91192
91422
|
self.owner_account = owner_account
|
|
91193
|
-
# The ID of the
|
|
91423
|
+
# The region ID of the IPsec-VPN connection.
|
|
91194
91424
|
#
|
|
91195
91425
|
# You can call the [DescribeRegions](https://help.aliyun.com/document_detail/36063.html) operation to query the most recent region list.
|
|
91196
91426
|
#
|
|
@@ -92139,8 +92369,15 @@ class ModifyVpnAttachmentAttributeRequestTunnelOptionsSpecificationTunnelBgpConf
|
|
|
92139
92369
|
local_bgp_ip: str = None,
|
|
92140
92370
|
tunnel_cidr: str = None,
|
|
92141
92371
|
):
|
|
92372
|
+
# The autonomous system number (ASN) of the tunnel on the Alibaba Cloud side. Valid values: **1** to **4294967295**. Default value: **45104**.
|
|
92373
|
+
#
|
|
92374
|
+
# > We recommend that you use a private ASN to establish BGP connections to Alibaba Cloud. Refer to the relevant documentation for the private ASN range.
|
|
92142
92375
|
self.local_asn = local_asn
|
|
92376
|
+
# The BGP IP address of the tunnel on the Alibaba Cloud side. The address is an IP address that falls within the BGP CIDR block.
|
|
92143
92377
|
self.local_bgp_ip = local_bgp_ip
|
|
92378
|
+
# The BGP CIDR block of the tunnel. The CIDR block must fall within 169.254.0.0/16 and the mask of the CIDR block must be 30 bits in length. The CIDR block cannot be 169.254.0.0/30, 169.254.1.0/30, 169.254.2.0/30, 169.254.3.0/30, 169.254.4.0/30, 169.254.5.0/30, 169.254.6.0/30, or 169.254.169.252/30.
|
|
92379
|
+
#
|
|
92380
|
+
# > The two tunnels of an IPsec connection must use different CIDR blocks.
|
|
92144
92381
|
self.tunnel_cidr = tunnel_cidr
|
|
92145
92382
|
|
|
92146
92383
|
def validate(self):
|
|
@@ -92184,14 +92421,39 @@ class ModifyVpnAttachmentAttributeRequestTunnelOptionsSpecificationTunnelIkeConf
|
|
|
92184
92421
|
psk: str = None,
|
|
92185
92422
|
remote_id: str = None,
|
|
92186
92423
|
):
|
|
92424
|
+
# The authentication algorithm that is used in Phase 1 negotiations. Valid values: **md5**, **sha1**, **sha256**, **sha384**, and **sha512**.
|
|
92187
92425
|
self.ike_auth_alg = ike_auth_alg
|
|
92426
|
+
# The encryption algorithm that is used in Phase 1 negotiations. Valid values: **aes**, **aes192**, **aes256**, **des**, and **3des**.
|
|
92188
92427
|
self.ike_enc_alg = ike_enc_alg
|
|
92428
|
+
# The SA lifetime as a result of Phase 1 negotiations. Unit: seconds.
|
|
92429
|
+
#
|
|
92430
|
+
# Valid values: **0** to **86400**.
|
|
92189
92431
|
self.ike_lifetime = ike_lifetime
|
|
92432
|
+
# The negotiation mode of IKE. Valid values: **main** and **aggressive**.
|
|
92433
|
+
#
|
|
92434
|
+
# * **main:** This mode offers higher security during negotiations.
|
|
92435
|
+
# * **aggressive**: This mode is faster with a higher success rate.
|
|
92190
92436
|
self.ike_mode = ike_mode
|
|
92437
|
+
# The Diffie-Hellman key exchange algorithm that is used in Phase 1 negotiations. Valid values: **group1**, **group2**, **group5**, and **group14**.
|
|
92191
92438
|
self.ike_pfs = ike_pfs
|
|
92439
|
+
# The version of the IKE protocol. Valid values: **ikev1** and **ikev2**.
|
|
92440
|
+
#
|
|
92441
|
+
# Compared with IKEv1, IKEv2 simplifies the SA negotiation process and provides better support for scenarios with multiple CIDR blocks.
|
|
92192
92442
|
self.ike_version = ike_version
|
|
92443
|
+
# The identifier of the tunnel on the Alibaba Cloud side, which is used in Phase 1 negotiations. The identifier cannot exceed 100 characters in length and cannot contain spaces.
|
|
92444
|
+
#
|
|
92445
|
+
# **LocalId** supports fully qualified domain names (FQDNs). If you use an FQDN, we recommend that you set the negotiation mode to **aggressive**.
|
|
92193
92446
|
self.local_id = local_id
|
|
92447
|
+
# The pre-shared key that is used for identity authentication between the tunnel and the tunnel peer.
|
|
92448
|
+
#
|
|
92449
|
+
# * The key must be 1 to 100 characters in length, and can contain digits, and letters. The key cannot contain spaces. ``~!\\`@#$%^&*()_-+={}[]|;:\\",.<>/?``
|
|
92450
|
+
# * If you do not specify a pre-shared key, the system randomly generates a 16-bit string as the pre-shared key. You can call the [DescribeVpnAttachments](https://help.aliyun.com/document_detail/2526939.html) operation to query the pre-shared key that is automatically generated by the system.
|
|
92451
|
+
#
|
|
92452
|
+
# > The tunnel and the tunnel peer must use the same pre-shared key. Otherwise, the tunnel cannot be established.
|
|
92194
92453
|
self.psk = psk
|
|
92454
|
+
# The identifier of the tunnel peer, which is used in Phase 1 negotiations. The identifier cannot exceed 100 characters in length and cannot contain spaces.
|
|
92455
|
+
#
|
|
92456
|
+
# **RemoteId** supports FQDNs. If you use an FQDN, we recommend that you set the negotiation mode to **aggressive**.
|
|
92195
92457
|
self.remote_id = remote_id
|
|
92196
92458
|
|
|
92197
92459
|
def validate(self):
|
|
@@ -92254,9 +92516,19 @@ class ModifyVpnAttachmentAttributeRequestTunnelOptionsSpecificationTunnelIpsecCo
|
|
|
92254
92516
|
ipsec_lifetime: int = None,
|
|
92255
92517
|
ipsec_pfs: str = None,
|
|
92256
92518
|
):
|
|
92519
|
+
# The authentication algorithm that is used in Phase 2 negotiations.
|
|
92520
|
+
#
|
|
92521
|
+
# Valid values: **md5**, **sha1**, **sha256**, **sha384**, and **sha512**.
|
|
92257
92522
|
self.ipsec_auth_alg = ipsec_auth_alg
|
|
92523
|
+
# The encryption algorithm that is used in Phase 2 negotiations. Valid values: **aes**, **aes192**, **aes256**, **des**, and **3des**.
|
|
92258
92524
|
self.ipsec_enc_alg = ipsec_enc_alg
|
|
92525
|
+
# The SA lifetime as a result of Phase 2 negotiations. Unit: seconds.
|
|
92526
|
+
#
|
|
92527
|
+
# Valid values: **0** to **86400**.
|
|
92259
92528
|
self.ipsec_lifetime = ipsec_lifetime
|
|
92529
|
+
# The Diffie-Hellman key exchange algorithm that is used in Phase 2 negotiations.
|
|
92530
|
+
#
|
|
92531
|
+
# Valid values: **disabled**, **group1**, **group2**, **group5**, and **group14**.
|
|
92260
92532
|
self.ipsec_pfs = ipsec_pfs
|
|
92261
92533
|
|
|
92262
92534
|
def validate(self):
|
|
@@ -92303,13 +92575,34 @@ class ModifyVpnAttachmentAttributeRequestTunnelOptionsSpecification(TeaModel):
|
|
|
92303
92575
|
tunnel_index: int = None,
|
|
92304
92576
|
tunnel_ipsec_config: ModifyVpnAttachmentAttributeRequestTunnelOptionsSpecificationTunnelIpsecConfig = None,
|
|
92305
92577
|
):
|
|
92578
|
+
# The ID of the customer gateway that is associated with the tunnel.
|
|
92579
|
+
#
|
|
92580
|
+
# > This parameter is only supported in dual-tunnel IPsec-VPN connections.
|
|
92306
92581
|
self.customer_gateway_id = customer_gateway_id
|
|
92582
|
+
# Specifies whether to enable the Dead Peer Detection (DPD) feature for the tunnel. Valid values:
|
|
92583
|
+
#
|
|
92584
|
+
# * **true**: enables DPD. The initiator of the IPsec-VPN connection sends DPD packets to check the existence and availability of the peer. If no feedback is received from the peer within the specified period of time, the connection fails. In this case, ISAKMP SA and IPsec SA are deleted along with the security tunnel.
|
|
92585
|
+
# * **false**: disables DPD. The initiator of the IPsec-VPN connection does not send DPD packets.
|
|
92307
92586
|
self.enable_dpd = enable_dpd
|
|
92587
|
+
# Specifies whether to enable NAT traversal for the tunnel. Valid values:
|
|
92588
|
+
#
|
|
92589
|
+
# * **true**: enables NAT traversal. After NAT traversal is enabled, the initiator does not check the UDP ports during IKE negotiations and can automatically discover NAT gateway devices along the IPsec-VPN tunnel.
|
|
92590
|
+
# * **false**: disables NAT traversal.
|
|
92308
92591
|
self.enable_nat_traversal = enable_nat_traversal
|
|
92592
|
+
# Add BGP configurations for the tunnel.
|
|
92593
|
+
#
|
|
92594
|
+
# > If you enable BGP for an IPsec-VPN connection, you must set **EnableTunnelsBgp** parameter to **true**.
|
|
92309
92595
|
self.tunnel_bgp_config = tunnel_bgp_config
|
|
92596
|
+
# The tunnel ID.
|
|
92310
92597
|
self.tunnel_id = tunnel_id
|
|
92598
|
+
# The configuration of Phase 1 negotiations.
|
|
92311
92599
|
self.tunnel_ike_config = tunnel_ike_config
|
|
92600
|
+
# The order in which the tunnel was created.
|
|
92601
|
+
#
|
|
92602
|
+
# * **1**: Tunnel 1.
|
|
92603
|
+
# * **2**: Tunnel 2.
|
|
92312
92604
|
self.tunnel_index = tunnel_index
|
|
92605
|
+
# The configuration of Phase 2 negotiations.
|
|
92313
92606
|
self.tunnel_ipsec_config = tunnel_ipsec_config
|
|
92314
92607
|
|
|
92315
92608
|
def validate(self):
|
|
@@ -92399,7 +92692,9 @@ class ModifyVpnAttachmentAttributeRequest(TeaModel):
|
|
|
92399
92692
|
# * **true**\
|
|
92400
92693
|
# * **false**\
|
|
92401
92694
|
self.auto_config_route = auto_config_route
|
|
92402
|
-
#
|
|
92695
|
+
# This parameter is supported if you modify the configurations of an IPsec-VPN connection in single-tunnel mode.
|
|
92696
|
+
#
|
|
92697
|
+
# BGP configuration:
|
|
92403
92698
|
#
|
|
92404
92699
|
# * **BgpConfig.EnableBgp**: specifies whether to enable BGP. Valid values:
|
|
92405
92700
|
#
|
|
@@ -92408,16 +92703,16 @@ class ModifyVpnAttachmentAttributeRequest(TeaModel):
|
|
|
92408
92703
|
#
|
|
92409
92704
|
# * **BgpConfig.LocalAsn**: the autonomous system number (ASN) on the Alibaba Cloud side. Valid values: **1** to **4294967295**.
|
|
92410
92705
|
#
|
|
92411
|
-
# You can enter
|
|
92706
|
+
# You can enter a value in two segments separated by a period (.). Each segment is 16 bits in length. Enter the number in each segment in decimal format.
|
|
92412
92707
|
#
|
|
92413
|
-
# For example, if you enter 123.456, the ASN is: 123 × 65536 + 456 = 8061384.
|
|
92708
|
+
# For example, if you enter 123.456, the ASN is 8061384. The ASN is calculated by using the following formula: 123 × 65536 + 456 = 8061384.
|
|
92414
92709
|
#
|
|
92415
|
-
# * **BgpConfig.TunnelCidr
|
|
92710
|
+
# * **BgpConfig.TunnelCidr**: The CIDR block of the IPsec tunnel. The CIDR block must fall into 169.254.0.0/16 and the mask of the CIDR block must be 30 bits in length. The CIDR block cannot be 169.254.0.0/30, 169.254.1.0/30, 169.254.2.0/30, 169.254.3.0/30, 169.254.4.0/30, 169.254.5.0/30, 169.254.6.0/30, or 169.254.169.252/30.
|
|
92416
92711
|
#
|
|
92417
|
-
# * **LocalBgpIp
|
|
92712
|
+
# * **LocalBgpIp**: the BGP address on the Alibaba Cloud side. It must be an IP address that falls within the CIDR block of the IPsec tunnel.
|
|
92418
92713
|
#
|
|
92419
|
-
# > - Before you
|
|
92420
|
-
# > - We recommend that you use a private ASN to establish
|
|
92714
|
+
# > - Before you add BGP configurations, we recommend that you learn about how BGP works and the limits. For more information, see [Configure BGP dynamic routing](https://help.aliyun.com/document_detail/445767.html).
|
|
92715
|
+
# > - We recommend that you use a private ASN to establish BGP connections to Alibaba Cloud. Refer to the relevant documentation for the private ASN range.
|
|
92421
92716
|
self.bgp_config = bgp_config
|
|
92422
92717
|
# The client token that is used to ensure the idempotence of the request.
|
|
92423
92718
|
#
|
|
@@ -92425,24 +92720,37 @@ class ModifyVpnAttachmentAttributeRequest(TeaModel):
|
|
|
92425
92720
|
#
|
|
92426
92721
|
# > If you do not specify this parameter, the system automatically uses the value of **RequestId** as the value of **ClientToken**. The **request ID** may be different for each request.
|
|
92427
92722
|
self.client_token = client_token
|
|
92428
|
-
# The customer
|
|
92723
|
+
# The customer gateways to be associated with the IPsec-VPN connections.
|
|
92724
|
+
#
|
|
92725
|
+
# > Only single-tunnel IPsec-VPN connections support this parameter.
|
|
92429
92726
|
self.customer_gateway_id = customer_gateway_id
|
|
92430
92727
|
# Specifies whether to immediately start IPsec negotiations after the configuration takes effect. Valid values:
|
|
92431
92728
|
#
|
|
92432
92729
|
# * **true**: immediately starts IPsec negotiations after the configuration is complete.
|
|
92433
92730
|
# * **false**: starts IPsec negotiations when inbound traffic is detected.
|
|
92434
92731
|
self.effect_immediately = effect_immediately
|
|
92435
|
-
#
|
|
92732
|
+
# This parameter is supported if you modify the configurations of an IPsec-VPN connection in single-tunnel mode.
|
|
92436
92733
|
#
|
|
92437
|
-
#
|
|
92438
|
-
#
|
|
92734
|
+
# Specifies whether to enable dead peer detection (DPD). Valid values:
|
|
92735
|
+
#
|
|
92736
|
+
# * **true**: enables DPD. The initiator of the IPsec-VPN connection sends DPD packets to check the existence and availability of the peer. If no feedback is received from the peer within the specified period of time, the connection fails. In this case, ISAKMP SA and IPsec SA are deleted, along with the security tunnel.
|
|
92737
|
+
# * **false**: disables DPD. The initiator of the IPsec-VPN connection does not send DPD packets.
|
|
92439
92738
|
self.enable_dpd = enable_dpd
|
|
92739
|
+
# This parameter is supported if you modify the configurations of an IPsec-VPN connection in single-tunnel mode.
|
|
92740
|
+
#
|
|
92440
92741
|
# Specifies whether to enable NAT traversal. Valid values:
|
|
92441
92742
|
#
|
|
92442
|
-
# * **true
|
|
92443
|
-
# * **false
|
|
92743
|
+
# * **true**: enables NAT traversal. After NAT traversal is enabled, the initiator does not check the UDP ports during IKE negotiations and can automatically discover NAT gateway devices along the IPsec-VPN tunnel.
|
|
92744
|
+
# * **false**: disables NAT traversal.
|
|
92444
92745
|
self.enable_nat_traversal = enable_nat_traversal
|
|
92746
|
+
# You can specify this parameter if you modify the configuration of a dual-tunnel IPsec-VPN connection.
|
|
92747
|
+
#
|
|
92748
|
+
# Specifies whether to enable the BGP feature for the tunnel. Valid values: **true** and **false**.
|
|
92749
|
+
#
|
|
92750
|
+
# > Before you add BGP configurations, we recommend that you learn about how BGP works and the limits. For more information, see [Configure BGP dynamic routing](https://help.aliyun.com/document_detail/445767.html).
|
|
92445
92751
|
self.enable_tunnels_bgp = enable_tunnels_bgp
|
|
92752
|
+
# This parameter is supported if you modify the configurations of an IPsec-VPN connection in single-tunnel mode.
|
|
92753
|
+
#
|
|
92446
92754
|
# The health check configurations:
|
|
92447
92755
|
#
|
|
92448
92756
|
# * **HealthCheckConfig.enable**: specifies whether to enable the health check feature. Valid values:
|
|
@@ -92450,9 +92758,9 @@ class ModifyVpnAttachmentAttributeRequest(TeaModel):
|
|
|
92450
92758
|
# * **true**\
|
|
92451
92759
|
# * **false**\
|
|
92452
92760
|
#
|
|
92453
|
-
# * **HealthCheckConfig.dip**: the destination IP address
|
|
92761
|
+
# * **HealthCheckConfig.dip**: the destination IP address configured for health checks. Specify the IP address of the data center with which the VPC can access through the IPsec-VPN connection.
|
|
92454
92762
|
#
|
|
92455
|
-
# * **HealthCheckConfig.sip**: the source IP address
|
|
92763
|
+
# * **HealthCheckConfig.sip**: the source IP address configured for health checks. The IP address of the VPC with which the data center can access through the IPsec-VPN connection.
|
|
92456
92764
|
#
|
|
92457
92765
|
# * **HealthCheckConfig.interval**: the interval between two consecutive health checks. Unit: seconds.
|
|
92458
92766
|
#
|
|
@@ -92463,37 +92771,41 @@ class ModifyVpnAttachmentAttributeRequest(TeaModel):
|
|
|
92463
92771
|
# * **revoke_route**\
|
|
92464
92772
|
# * **reserve_route**\
|
|
92465
92773
|
self.health_check_config = health_check_config
|
|
92774
|
+
# This parameter is supported if you modify the configurations of an IPsec-VPN connection in single-tunnel mode.
|
|
92775
|
+
#
|
|
92466
92776
|
# The configuration of Phase 1 negotiations:
|
|
92467
92777
|
#
|
|
92468
|
-
# * **IkeConfig.Psk**: The pre-shared key that is used for authentication between the
|
|
92778
|
+
# * **IkeConfig.Psk**: The pre-shared key that is used for identity authentication between the Alibaba Cloud IPsec connection and the on-premises data center.
|
|
92469
92779
|
#
|
|
92470
|
-
# * The
|
|
92471
|
-
# * If you do not specify a pre-shared key, the system generates a
|
|
92780
|
+
# * The key must be 1 to 100 characters in length, and can contain digits, and letters. The key cannot contain spaces. ``~!`@#$%^&*()_-+={}[]|;:\\",.<>/?``
|
|
92781
|
+
# * If you do not specify a pre-shared key, the system randomly generates a 16-bit string as the pre-shared key. You can call the [DescribeVpnConnection](https://help.aliyun.com/document_detail/120374.html) operation to query the pre-shared key that is automatically generated by the system.
|
|
92472
92782
|
#
|
|
92473
|
-
# >The pre-shared key of the IPsec-VPN connection must be the same as the authentication key of the data center. Otherwise,
|
|
92783
|
+
# > The pre-shared key of the IPsec-VPN connection must be the same as the authentication key of the on-premises data center. Otherwise, connections between the on-premises data center and the VPN gateway cannot be established.
|
|
92474
92784
|
#
|
|
92475
|
-
# * **IkeConfig.IkeVersion**: the Internet Key Exchange (IKE)
|
|
92785
|
+
# * **IkeConfig.IkeVersion**: the version of the Internet Key Exchange (IKE) protocol. Valid values: **ikev1** and **ikev2**.
|
|
92476
92786
|
#
|
|
92477
92787
|
# * **IkeConfig.IkeMode**: the negotiation mode. Valid values: **main** and **aggressive**.
|
|
92478
92788
|
#
|
|
92479
|
-
# * **IkeConfig.IkeEncAlg
|
|
92789
|
+
# * **IkeConfig.IkeEncAlg:** the encryption algorithm that is used in Phase 1 negotiations. Valid values: **aes**, **aes192**, **aes256**, **des**, and **3des**.
|
|
92480
92790
|
#
|
|
92481
92791
|
# * **IkeConfig.IkeAuthAlg**: the authentication algorithm that is used in Phase 1 negotiations. Valid values: **md5**, **sha1**, **sha256**, **sha384**, and **sha512**.
|
|
92482
92792
|
#
|
|
92483
|
-
# * **IkeConfig.IkePfs**: the Diffie-Hellman
|
|
92793
|
+
# * **IkeConfig.IkePfs**: the Diffie-Hellman key exchange algorithm that is used in Phase 1 negotiations. Valid values: **group1**, **group2**, **group5**, and **group14**.
|
|
92484
92794
|
#
|
|
92485
|
-
# * **IkeConfig.IkeLifetime**: the
|
|
92795
|
+
# * **IkeConfig.IkeLifetime**: the SA lifetime as a result of Phase 1 negotiations. Unit: seconds. Valid values: **0** to **86400**.
|
|
92486
92796
|
#
|
|
92487
|
-
# * **IkeConfig.
|
|
92797
|
+
# * **IkeConfig.LocalId**: the identifier on the Alibaba Cloud side. The identifier cannot exceed 100 characters in length and cannot contain spaces.
|
|
92488
92798
|
#
|
|
92489
|
-
# * **IkeConfig.RemoteId**: the identifier of the
|
|
92799
|
+
# * **IkeConfig.RemoteId**: the identifier of the data center. It cannot exceed 100 characters in length and cannot contain spaces.
|
|
92490
92800
|
self.ike_config = ike_config
|
|
92801
|
+
# This parameter is supported if you modify the configurations of an IPsec-VPN connection in single-tunnel mode.
|
|
92802
|
+
#
|
|
92491
92803
|
# The configuration of Phase 2 negotiations:
|
|
92492
92804
|
#
|
|
92493
92805
|
# * **IpsecConfig.IpsecEncAlg:** the encryption algorithm that is used in Phase 2 negotiations. Valid values: **aes**, **aes192**, **aes256**, **des**, and **3des**.
|
|
92494
92806
|
# * **IpsecConfig. IpsecAuthAlg:** the authentication algorithm that is used in Phase 2 negotiations. Valid values: **md5**, **sha1**, **sha256**, **sha384**, and **sha512**.
|
|
92495
|
-
# * **IpsecConfig. IpsecPfs:** the
|
|
92496
|
-
# * **
|
|
92807
|
+
# * **IpsecConfig. IpsecPfs:** the Diffie-Hellman key exchange algorithm that is used in Phase 2 negotiations. Valid values: **disabled**, **group1**, **group2**, **group5**, and **group14**.
|
|
92808
|
+
# * **IkeConfig.IkeLifetime**: the SA lifetime determined by Phase 2 negotiations. Unit: seconds. Valid values: **0** to **86400**.
|
|
92497
92809
|
self.ipsec_config = ipsec_config
|
|
92498
92810
|
# The CIDR block of the virtual private cloud (VPC) that communicates with the data center. The CIDR block is used in Phase 2 negotiations.
|
|
92499
92811
|
#
|
|
@@ -92533,6 +92845,9 @@ class ModifyVpnAttachmentAttributeRequest(TeaModel):
|
|
|
92533
92845
|
self.remote_subnet = remote_subnet
|
|
92534
92846
|
self.resource_owner_account = resource_owner_account
|
|
92535
92847
|
self.resource_owner_id = resource_owner_id
|
|
92848
|
+
# The tunnel configurations.
|
|
92849
|
+
#
|
|
92850
|
+
# You can specify parameters in the **TunnelOptionsSpecification** array when you modify the configurations of an IPsec-VPN connection in dual-tunnel mode. You can modify the configurations of the two tunnels of the IPsec-VPN connection.
|
|
92536
92851
|
self.tunnel_options_specification = tunnel_options_specification
|
|
92537
92852
|
# The ID of the IPsec-VPN connection.
|
|
92538
92853
|
#
|
|
@@ -92670,17 +92985,25 @@ class ModifyVpnAttachmentAttributeResponseBodyIkeConfig(TeaModel):
|
|
|
92670
92985
|
self.ike_enc_alg = ike_enc_alg
|
|
92671
92986
|
# The SA lifetime that is determined by Phase 1 negotiations. Unit: seconds.
|
|
92672
92987
|
self.ike_lifetime = ike_lifetime
|
|
92673
|
-
# The negotiation mode.
|
|
92988
|
+
# The IKE negotiation mode.
|
|
92989
|
+
#
|
|
92990
|
+
# * **main:** This mode offers higher security during negotiations.
|
|
92991
|
+
# * **aggressive**: This mode is faster with a higher success rate.
|
|
92674
92992
|
self.ike_mode = ike_mode
|
|
92675
92993
|
# The DH key exchange algorithm that is used in Phase 1 negotiations.
|
|
92676
92994
|
self.ike_pfs = ike_pfs
|
|
92677
92995
|
# The version of the IKE protocol.
|
|
92996
|
+
#
|
|
92997
|
+
# * **ikev1**\
|
|
92998
|
+
# * **ikev2**\
|
|
92999
|
+
#
|
|
93000
|
+
# Compared with IKEv1, IKEv2 simplifies the SA negotiation process and provides better support for scenarios with multiple CIDR blocks.
|
|
92678
93001
|
self.ike_version = ike_version
|
|
92679
93002
|
# The identifier of the IPsec-VPN connection on the Alibaba Cloud side.
|
|
92680
93003
|
self.local_id = local_id
|
|
92681
|
-
#
|
|
93004
|
+
# Enter a pre-shared key that is used for identity authentication between Alibaba Cloud and the data center.
|
|
92682
93005
|
#
|
|
92683
|
-
# > The pre-shared key of the IPsec-VPN connection must be the same as the authentication key of the data center. Otherwise,
|
|
93006
|
+
# > The pre-shared key of the IPsec-VPN connection must be the same as the authentication key of the on-premises data center. Otherwise, connections between the on-premises data center and Alibaba Cloud cannot be established.
|
|
92684
93007
|
self.psk = psk
|
|
92685
93008
|
# The identifier of the IPsec-VPN connection on the data center side.
|
|
92686
93009
|
self.remote_id = remote_id
|
|
@@ -92795,10 +93118,15 @@ class ModifyVpnAttachmentAttributeResponseBodyTunnelOptionsSpecificationTunnelBg
|
|
|
92795
93118
|
peer_bgp_ip: str = None,
|
|
92796
93119
|
tunnel_cidr: str = None,
|
|
92797
93120
|
):
|
|
93121
|
+
# The ASN on the Alibaba Cloud side.
|
|
92798
93122
|
self.local_asn = local_asn
|
|
93123
|
+
# The BGP IP address of the tunnel on the Alibaba Cloud side.
|
|
92799
93124
|
self.local_bgp_ip = local_bgp_ip
|
|
93125
|
+
# The ASN of the tunnel peer.
|
|
92800
93126
|
self.peer_asn = peer_asn
|
|
93127
|
+
# The BGP IP address of the tunnel peer.
|
|
92801
93128
|
self.peer_bgp_ip = peer_bgp_ip
|
|
93129
|
+
# The BGP CIDR block of the tunnel.
|
|
92802
93130
|
self.tunnel_cidr = tunnel_cidr
|
|
92803
93131
|
|
|
92804
93132
|
def validate(self):
|
|
@@ -92850,14 +93178,26 @@ class ModifyVpnAttachmentAttributeResponseBodyTunnelOptionsSpecificationTunnelIk
|
|
|
92850
93178
|
psk: str = None,
|
|
92851
93179
|
remote_id: str = None,
|
|
92852
93180
|
):
|
|
93181
|
+
# The authentication algorithm in the IKE phase.
|
|
92853
93182
|
self.ike_auth_alg = ike_auth_alg
|
|
93183
|
+
# The encryption algorithm in the IKE phase.
|
|
92854
93184
|
self.ike_enc_alg = ike_enc_alg
|
|
93185
|
+
# The lifetime in the IKE phase. Unit: seconds.
|
|
92855
93186
|
self.ike_lifetime = ike_lifetime
|
|
93187
|
+
# The negotiation mode of IKE. Valid values:
|
|
93188
|
+
#
|
|
93189
|
+
# * **main:** This mode offers higher security during negotiations.
|
|
93190
|
+
# * **aggressive**: This mode is faster with a higher success rate.
|
|
92856
93191
|
self.ike_mode = ike_mode
|
|
93192
|
+
# The Diffie-Hellman (DH) group in the IKE phase.
|
|
92857
93193
|
self.ike_pfs = ike_pfs
|
|
93194
|
+
# The version of the IKE protocol.
|
|
92858
93195
|
self.ike_version = ike_version
|
|
93196
|
+
# The identifier of the tunnel on the Alibaba Cloud side.
|
|
92859
93197
|
self.local_id = local_id
|
|
93198
|
+
# The pre-shared key.
|
|
92860
93199
|
self.psk = psk
|
|
93200
|
+
# The peer identifier.
|
|
92861
93201
|
self.remote_id = remote_id
|
|
92862
93202
|
|
|
92863
93203
|
def validate(self):
|
|
@@ -92920,9 +93260,13 @@ class ModifyVpnAttachmentAttributeResponseBodyTunnelOptionsSpecificationTunnelIp
|
|
|
92920
93260
|
ipsec_lifetime: int = None,
|
|
92921
93261
|
ipsec_pfs: str = None,
|
|
92922
93262
|
):
|
|
93263
|
+
# The authentication algorithm in the IPsec phase.
|
|
92923
93264
|
self.ipsec_auth_alg = ipsec_auth_alg
|
|
93265
|
+
# The encryption algorithm in the IPsec phase.
|
|
92924
93266
|
self.ipsec_enc_alg = ipsec_enc_alg
|
|
93267
|
+
# The lifetime in the IPsec phase. Unit: seconds.
|
|
92925
93268
|
self.ipsec_lifetime = ipsec_lifetime
|
|
93269
|
+
# The DH group in the IPsec phase.
|
|
92926
93270
|
self.ipsec_pfs = ipsec_pfs
|
|
92927
93271
|
|
|
92928
93272
|
def validate(self):
|
|
@@ -92972,16 +93316,43 @@ class ModifyVpnAttachmentAttributeResponseBodyTunnelOptionsSpecification(TeaMode
|
|
|
92972
93316
|
tunnel_index: int = None,
|
|
92973
93317
|
tunnel_ipsec_config: ModifyVpnAttachmentAttributeResponseBodyTunnelOptionsSpecificationTunnelIpsecConfig = None,
|
|
92974
93318
|
):
|
|
93319
|
+
# The ID of the customer gateway that is associated with the tunnel.
|
|
92975
93320
|
self.customer_gateway_id = customer_gateway_id
|
|
93321
|
+
# Whether the DPD feature is enabled for the tunnel.
|
|
93322
|
+
#
|
|
93323
|
+
# * **true**: The feature is enabled.
|
|
93324
|
+
# * **false**: The feature is disabled.
|
|
92976
93325
|
self.enable_dpd = enable_dpd
|
|
93326
|
+
# Indicates whether traversal feature is enabled for the tunnel. Valid values:
|
|
93327
|
+
#
|
|
93328
|
+
# * **true**: The feature is enabled.
|
|
93329
|
+
# * **false**: The feature is disabled.
|
|
92977
93330
|
self.enable_nat_traversal = enable_nat_traversal
|
|
93331
|
+
# The IP address on the Alibaba Cloud side.
|
|
92978
93332
|
self.internet_ip = internet_ip
|
|
93333
|
+
# The tunnel role. Valid values:
|
|
93334
|
+
#
|
|
93335
|
+
# * **master**: The tunnel is an active tunnel.
|
|
93336
|
+
# * **slave**: The tunnel is a standby tunnel.
|
|
92979
93337
|
self.role = role
|
|
93338
|
+
# The status of the tunnel. Valid values:
|
|
93339
|
+
#
|
|
93340
|
+
# * **active**: The tunnel is active.
|
|
93341
|
+
# * **updating**: The tunnel is being updated.
|
|
93342
|
+
# * **deleting:** The tunnel is being deleted.
|
|
92980
93343
|
self.state = state
|
|
93344
|
+
# BGP configuration.
|
|
92981
93345
|
self.tunnel_bgp_config = tunnel_bgp_config
|
|
93346
|
+
# The tunnel ID.
|
|
92982
93347
|
self.tunnel_id = tunnel_id
|
|
93348
|
+
# The configurations of Phase 1 negotiations.
|
|
92983
93349
|
self.tunnel_ike_config = tunnel_ike_config
|
|
93350
|
+
# The order in which the tunnel was created.
|
|
93351
|
+
#
|
|
93352
|
+
# * **1**: Tunnel 1.
|
|
93353
|
+
# * **2**: Tunnel 2.
|
|
92984
93354
|
self.tunnel_index = tunnel_index
|
|
93355
|
+
# The configurations of Phase 2 negotiations.
|
|
92985
93356
|
self.tunnel_ipsec_config = tunnel_ipsec_config
|
|
92986
93357
|
|
|
92987
93358
|
def validate(self):
|
|
@@ -93238,6 +93609,8 @@ class ModifyVpnAttachmentAttributeResponseBody(TeaModel):
|
|
|
93238
93609
|
# This value is a UNIX timestamp representing the number of milliseconds that have elapsed since the epoch time January 1, 1970, 00:00:00 UTC.
|
|
93239
93610
|
self.create_time = create_time
|
|
93240
93611
|
# The ID of the customer gateway associated with the IPsec-VPN connection.
|
|
93612
|
+
#
|
|
93613
|
+
# This parameter is returned only for single-tunnel IPsec-VPN connections.
|
|
93241
93614
|
self.customer_gateway_id = customer_gateway_id
|
|
93242
93615
|
# The description of the IPsec-VPN connection.
|
|
93243
93616
|
self.description = description
|
|
@@ -93246,22 +93619,36 @@ class ModifyVpnAttachmentAttributeResponseBody(TeaModel):
|
|
|
93246
93619
|
# * **true**\
|
|
93247
93620
|
# * **false**\
|
|
93248
93621
|
self.effect_immediately = effect_immediately
|
|
93249
|
-
# Indicates whether the DPD feature is enabled for the IPsec-VPN connection.
|
|
93622
|
+
# Indicates whether the DPD feature is enabled for the IPsec-VPN connection.
|
|
93250
93623
|
#
|
|
93251
|
-
# * **true
|
|
93252
|
-
# * **false
|
|
93624
|
+
# * **true**: The feature is enabled.
|
|
93625
|
+
# * **false**: The feature is disabled.
|
|
93626
|
+
#
|
|
93627
|
+
# This parameter is returned only for single-tunnel IPsec-VPN connections.
|
|
93253
93628
|
self.enable_dpd = enable_dpd
|
|
93254
|
-
#
|
|
93629
|
+
# Specifies whether to enable NAT traversal for the IPsec-VPN connection.
|
|
93255
93630
|
#
|
|
93256
|
-
# * **true
|
|
93257
|
-
# * **false
|
|
93631
|
+
# * **true**: The feature is enabled.
|
|
93632
|
+
# * **false**: The feature is disabled.
|
|
93633
|
+
#
|
|
93634
|
+
# This parameter is returned only for single-tunnel IPsec-VPN connections.
|
|
93258
93635
|
self.enable_nat_traversal = enable_nat_traversal
|
|
93636
|
+
# Specifies whether to enable Border Gateway Protocol (BGP) for tunnels.
|
|
93637
|
+
#
|
|
93638
|
+
# * **true**: The feature is enabled.
|
|
93639
|
+
# * **false**: The feature is disabled.
|
|
93640
|
+
#
|
|
93641
|
+
# This parameter is returned only by dual-tunnel IPsec-VPN connections.
|
|
93259
93642
|
self.enable_tunnels_bgp = enable_tunnels_bgp
|
|
93260
93643
|
# The configuration of Phase 1 negotiations.
|
|
93644
|
+
#
|
|
93645
|
+
# **IkeConfig** parameters are returned only for single-tunnel IPsec-VPN connections.
|
|
93261
93646
|
self.ike_config = ike_config
|
|
93262
93647
|
# The configuration of Phase 2 negotiations.
|
|
93648
|
+
#
|
|
93649
|
+
# **IpsecConfig** parameters are returned only for single-tunnel IPsec-VPN connections.
|
|
93263
93650
|
self.ipsec_config = ipsec_config
|
|
93264
|
-
# The CIDR block
|
|
93651
|
+
# The CIDR block on the Alibaba Cloud side that communicates with the on-premises data center is required, such as CIDR blocks of VPCs.
|
|
93265
93652
|
self.local_subnet = local_subnet
|
|
93266
93653
|
# The name of the IPsec-VPN connection.
|
|
93267
93654
|
self.name = name
|
|
@@ -93270,7 +93657,7 @@ class ModifyVpnAttachmentAttributeResponseBody(TeaModel):
|
|
|
93270
93657
|
# * **public**: an encrypted connection over the Internet
|
|
93271
93658
|
# * **private**: an encrypted connection over private networks
|
|
93272
93659
|
self.network_type = network_type
|
|
93273
|
-
# The CIDR block of the data center with
|
|
93660
|
+
# The CIDR block of the on-premises data center that communicates with Alibaba Cloud is required.
|
|
93274
93661
|
self.remote_subnet = remote_subnet
|
|
93275
93662
|
# The request ID.
|
|
93276
93663
|
self.request_id = request_id
|
|
@@ -93289,14 +93676,23 @@ class ModifyVpnAttachmentAttributeResponseBody(TeaModel):
|
|
|
93289
93676
|
# * **ipsec_sa_not_established**: Phase 2 negotiations failed.
|
|
93290
93677
|
# * **ipsec_sa_established**: Phase 2 negotiations succeeded.
|
|
93291
93678
|
self.status = status
|
|
93679
|
+
# The tunnel configurations of the IPsec-VPN connection.
|
|
93680
|
+
#
|
|
93681
|
+
# **TunnelOptionsSpecification** parameters are returned only for dual-tunnel IPsec-VPN connections.
|
|
93292
93682
|
self.tunnel_options_specification = tunnel_options_specification
|
|
93293
|
-
# The health check
|
|
93683
|
+
# The health check configurations of the IPsec-VPN connection.
|
|
93684
|
+
#
|
|
93685
|
+
# **VcoHealthCheck** parameters are returned only for single-tunnel IPsec-VPC connections.
|
|
93294
93686
|
self.vco_health_check = vco_health_check
|
|
93295
|
-
# The BGP
|
|
93687
|
+
# The BGP configurations of the IPsec-VPN connection.
|
|
93688
|
+
#
|
|
93689
|
+
# **VpnBgpConfig** parameters are returned only for single-tunnel IPsec-VPN connections.
|
|
93296
93690
|
self.vpn_bgp_config = vpn_bgp_config
|
|
93297
93691
|
# The ID of the IPsec-VPN connection.
|
|
93298
93692
|
self.vpn_connection_id = vpn_connection_id
|
|
93299
|
-
# The ID of the VPN gateway associated with the IPsec-VPN connection.
|
|
93693
|
+
# The ID of the VPN gateway that is associated with the IPsec-VPN connection.
|
|
93694
|
+
#
|
|
93695
|
+
# **vpn-not-exist**: The IPsec-VPN connection is not associated with a VPN Gateway.
|
|
93300
93696
|
self.vpn_gateway_id = vpn_gateway_id
|
|
93301
93697
|
|
|
93302
93698
|
def validate(self):
|
|
@@ -93884,9 +94280,7 @@ class ModifyVpnConnectionAttributeRequest(TeaModel):
|
|
|
93884
94280
|
# * The key cannot contain space characters. The key must be 1 to 100 characters in length, and can contain digits, letters, and the following special characters: ``~!`@#$%^&*()_-+={}[]|;:\\",.<>/?``
|
|
93885
94281
|
# * If you do not specify a pre-shared key, the system randomly generates a 16-bit string as the pre-shared key. You can call the [DescribeVpnConnection](https://help.aliyun.com/document_detail/2526951.html) operation to query the pre-shared key that is automatically generated by the system.
|
|
93886
94282
|
#
|
|
93887
|
-
#
|
|
93888
|
-
#
|
|
93889
|
-
# **Description** The pre-shared key of the IPsec-VPN connection must be the same as the authentication key of the on-premises data center. Otherwise, connections between the on-premises data center and the VPN gateway cannot be established.
|
|
94283
|
+
# > The pre-shared key of the IPsec-VPN connection must be the same as the authentication key of the on-premises data center. Otherwise, connections between the on-premises data center and the VPN gateway cannot be established.
|
|
93890
94284
|
#
|
|
93891
94285
|
# * **IkeConfig.IkeVersion**: the version of the Internet Key Exchange (IKE) protocol. Valid values: **ikev1** and **ikev2**.
|
|
93892
94286
|
#
|
|
@@ -94983,9 +95377,9 @@ class ModifyVpnGatewayAttributeRequest(TeaModel):
|
|
|
94983
95377
|
#
|
|
94984
95378
|
# > If you do not specify this parameter, the system automatically uses the request ID as the client token. The request ID may be different for each request.
|
|
94985
95379
|
self.client_token = client_token
|
|
94986
|
-
# The new description of the VPN
|
|
95380
|
+
# The new description of the VPN connection.
|
|
94987
95381
|
#
|
|
94988
|
-
# The description must be 1 to 100 characters in length
|
|
95382
|
+
# The description must be 1 to 100 characters in length.
|
|
94989
95383
|
self.description = description
|
|
94990
95384
|
# The new name of the VPN gateway.
|
|
94991
95385
|
#
|
|
@@ -95124,15 +95518,12 @@ class ModifyVpnGatewayAttributeResponseBody(TeaModel):
|
|
|
95124
95518
|
self.internet_ip = internet_ip
|
|
95125
95519
|
# The IP address of the VPN gateway.
|
|
95126
95520
|
#
|
|
95127
|
-
# This parameter is returned only
|
|
95521
|
+
# This parameter is returned only if the VPN gateway supports IPsec-VPN connections in single-tunnel mode.
|
|
95128
95522
|
self.intranet_ip = intranet_ip
|
|
95129
95523
|
# The name of the VPN gateway.
|
|
95130
95524
|
self.name = name
|
|
95131
95525
|
# The request ID.
|
|
95132
95526
|
self.request_id = request_id
|
|
95133
|
-
# VPN网关实例所属的资源组ID。
|
|
95134
|
-
#
|
|
95135
|
-
# 您可以调用[ListResourceGroups](https://help.aliyun.com/document_detail/158855.html)接口查询资源组信息。
|
|
95136
95527
|
self.resource_group_id = resource_group_id
|
|
95137
95528
|
# The maximum bandwidth of the VPN gateway. Unit: Mbit/s.
|
|
95138
95529
|
self.spec = spec
|
|
@@ -103184,11 +103575,11 @@ class UpdateIpsecServerRequest(TeaModel):
|
|
|
103184
103575
|
self.local_subnet = local_subnet
|
|
103185
103576
|
# The pre-shared key.
|
|
103186
103577
|
#
|
|
103187
|
-
# The pre-shared key that is used for authentication between the IPsec
|
|
103578
|
+
# The pre-shared key that is used for authentication between the IPsec server and the client. The key must be 1 to 100 characters in length.
|
|
103188
103579
|
#
|
|
103189
103580
|
# You can call [ListIpsecServers](https://help.aliyun.com/document_detail/2794120.html) to query keys generated by the system.
|
|
103190
103581
|
#
|
|
103191
|
-
# >
|
|
103582
|
+
# > The pre-shared key of the IPsec server key must be the same as that of the client. Otherwise, the connection between the IPsec server and the client cannot be established.
|
|
103192
103583
|
self.psk = psk
|
|
103193
103584
|
# Specifies whether to enable pre-shared key authentication. If you set the value to **true**, pre-shared key authentication is enabled.
|
|
103194
103585
|
self.psk_enabled = psk_enabled
|