alibabacloud-vpc20160428 6.10.2__py3-none-any.whl → 6.10.3__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -2596,7 +2596,10 @@ class AllocateIpv6InternetBandwidthRequest(TeaModel):
2596
2596
  resource_owner_account: str = None,
2597
2597
  resource_owner_id: int = None,
2598
2598
  ):
2599
- # The Internet bandwidth of the IPv6 gateway. Unit: Mbit/s. Valid values: **1 to 5000**.
2599
+ # The Internet bandwidth of the IPv6 address. Unit: Mbit/s.
2600
+ #
2601
+ # * If you set **InternetChargeType** to **PayByTraffic**, valid values are **1** to **1000**.
2602
+ # * If you set **InternetChargeType** to **PayByBandwidth**, valid values are **1** to **2000**.
2600
2603
  #
2601
2604
  # This parameter is required.
2602
2605
  self.bandwidth = bandwidth
@@ -5968,7 +5971,7 @@ class CheckVpnBgpEnabledRequest(TeaModel):
5968
5971
  #
5969
5972
  # You can use the client to generate the token, but you must make sure that the token is unique among different requests. The token can contain only ASCII characters.
5970
5973
  #
5971
- # > If you do not specify this parameter, the system automatically uses the **request ID** as the **client token**. The **request ID** may be different for each request.
5974
+ # > If you do not specify this parameter, the system automatically uses the **request ID** as the **client token**. The **request ID** may be different for each request.
5972
5975
  self.client_token = client_token
5973
5976
  self.owner_account = owner_account
5974
5977
  # The region ID of the IPsec-VPN connection.
@@ -7572,11 +7575,14 @@ class CreateCustomerGatewayRequest(TeaModel):
7572
7575
  resource_owner_id: int = None,
7573
7576
  tags: List[CreateCustomerGatewayRequestTags] = None,
7574
7577
  ):
7575
- # The autonomous system number (ASN) of the gateway device in the data center.
7578
+ # The autonomous system number (ASN) of the gateway device in your data center. This parameter is required If you want to use Border Gateway Protocol (BGP) for the IPsec-VPN connection. Valid values: 1 to 4294967295. 45104 is not supported.
7576
7579
  #
7577
- # **Asn** is a 4-byte number. You can enter the number in two segments and separate the first 16 bits from the following 16 bits with a period (.). Enter the number in each segment in the decimal format.
7580
+ # **Asn** is a 4-byte number. You can enter it in two segments and separate the first 16 bits from the following 16 bits with a period (.). Enter the number in each segment in decimal format.
7578
7581
  #
7579
- # For example, if you enter 123.456, the ASN is: 123 × 65536 + 456 = 8061384.
7582
+ # For example, if you enter 123.456, the ASN is 8061384. The ASN is calculated by using the following formula: 123 × 65536 + 456 = 8061384.
7583
+ #
7584
+ # > - We recommend that you use a private ASN to establish BGP connections to Alibaba Cloud. For information about the range of private ASNs, see the relevant documentation.
7585
+ # > - 45104 is a unique identifier assigned by IANA to Alibaba Cloud. It is used to identify Alibaba Cloud during route selection and data transmission over the Internet.
7580
7586
  self.asn = asn
7581
7587
  # The authentication key of the BGP routing protocol for the gateway device in the data center.
7582
7588
  #
@@ -7592,7 +7598,18 @@ class CreateCustomerGatewayRequest(TeaModel):
7592
7598
  #
7593
7599
  # The description must be 1 to 100 characters in length, and cannot start with `http://` or `https://`.
7594
7600
  self.description = description
7595
- # The public IP address of the gateway device in the data center.
7601
+ # The static IP address of the gateway device in the data center.
7602
+ #
7603
+ # * If you want to create a public IPsec-VPN connection, enter a public IP address.
7604
+ # * If you want to create a private IPsec-VPN connection, enter a private IP address.
7605
+ #
7606
+ # You cannot use the following IP addresses. Otherwise, a IPsec-VPN connection cannot be established:
7607
+ #
7608
+ # * 100.64.0.0~100.127.255.255
7609
+ # * 127.0.0.0~127.255.255.255
7610
+ # * 169.254.0.0~169.254.255.255
7611
+ # * 224.0.0.0~239.255.255.255
7612
+ # * 255.0.0.0~255.255.255.255
7596
7613
  #
7597
7614
  # This parameter is required.
7598
7615
  self.ip_address = ip_address
@@ -7717,7 +7734,7 @@ class CreateCustomerGatewayResponseBody(TeaModel):
7717
7734
  self.customer_gateway_id = customer_gateway_id
7718
7735
  # The description of the customer gateway.
7719
7736
  self.description = description
7720
- # The public IP address of the gateway device in the data center.
7737
+ # The static IP address of the gateway device in the on-premises data center.
7721
7738
  self.ip_address = ip_address
7722
7739
  # The name of the customer gateway.
7723
7740
  self.name = name
@@ -10620,7 +10637,7 @@ class CreateHaVipRequest(TeaModel):
10620
10637
  self.client_token = client_token
10621
10638
  # The description of the HAVIP.
10622
10639
  #
10623
- # The description must be 1 to 256 characters in length and cannot start with `http://` or `https://`.
10640
+ # The description must be 1 to 255 characters in length and cannot start with `http://` or `https://`.
10624
10641
  self.description = description
10625
10642
  # The IP address of the HAVIP.
10626
10643
  #
@@ -12022,11 +12039,11 @@ class CreateIpsecServerRequest(TeaModel):
12022
12039
  self.local_subnet = local_subnet
12023
12040
  # The pre-shared key.
12024
12041
  #
12025
- # The pre-shared key is used for identity authentication between the IPsec server and the client. The key must be 1 to 100 characters in length.
12042
+ # The pre-shared key that is used for authentication between the IPsec-VPN server and the client. It must be 1 to 100 characters in length.
12026
12043
  #
12027
- # If you do not specify a pre-shared key, the system randomly generates a 16-character string as the pre-shared key. You can call the [ListIpsecServers](https://help.aliyun.com/document_detail/2794120.html) operation to query the pre-shared keys that are generated by the system.
12044
+ # If you do not specify a pre-shared key, the system randomly generates a 16-bit string as the pre-shared key. You can call [ListIpsecServers](https://help.aliyun.com/document_detail/2794120.html) to query keys generated by the system.
12028
12045
  #
12029
- # > The pre-shared key of the IPsec server must be the same as the client key. Otherwise, the IPsec server cannot be connected to the client.
12046
+ # > The pre-shared key of the IPsec server key must be the same as that of the client. Otherwise, the connection between the IPsec server and the client cannot be established.
12030
12047
  self.psk = psk
12031
12048
  # Indicates whether pre-shared key authentication is enabled. If you set the value to **true**, pre-shared key authentication is enabled.
12032
12049
  #
@@ -12484,7 +12501,7 @@ class CreateIpv6EgressOnlyRuleRequest(TeaModel):
12484
12501
  self.client_token = client_token
12485
12502
  # The description of the egress-only rule.
12486
12503
  #
12487
- # The description must be 2 to 256 characters in length and cannot start with `http://` or `https://`.
12504
+ # The description must be 0 to 256 characters in length and cannot start with `http://` or `https://`.
12488
12505
  self.description = description
12489
12506
  # The ID of the IPv6 address for which you want to create an egress-only rule.
12490
12507
  #
@@ -12500,7 +12517,7 @@ class CreateIpv6EgressOnlyRuleRequest(TeaModel):
12500
12517
  self.ipv_6gateway_id = ipv_6gateway_id
12501
12518
  # The name of the egress-only rule.
12502
12519
  #
12503
- # The name must be 2 to 128 characters in length, and can contain letters, digits, underscores (_), and hyphens (-). The name must start with a letter but cannot start with `http://` or `https://`.
12520
+ # The name must be 0 to 128 characters in length and cannot start with `http://` or `https://`.
12504
12521
  self.name = name
12505
12522
  self.owner_account = owner_account
12506
12523
  self.owner_id = owner_id
@@ -12711,11 +12728,11 @@ class CreateIpv6GatewayRequest(TeaModel):
12711
12728
  self.client_token = client_token
12712
12729
  # The description of the IPv6 gateway.
12713
12730
  #
12714
- # The description must be 2 to 256 characters in length and cannot start with `http://` or `https://`.
12731
+ # The description must be 0 to 256 characters in length and cannot start with `http://` or `https://`.
12715
12732
  self.description = description
12716
12733
  # The name of the IPv6 gateway.
12717
12734
  #
12718
- # The name must be 2 to 128 characters in length, and can contain letters, digits, underscores (_), and hyphens (-). The name must start with a letter but cannot start with `http://` or `https://`.
12735
+ # The name must be 0 to 128 characters in length and cannot start with `http://` or `https://`.
12719
12736
  self.name = name
12720
12737
  self.owner_account = owner_account
12721
12738
  self.owner_id = owner_id
@@ -17478,17 +17495,18 @@ class CreateSslVpnServerRequest(TeaModel):
17478
17495
  self.cipher = cipher
17479
17496
  # The client CIDR block.
17480
17497
  #
17481
- # It is the CIDR block from which an IP address is allocated to the virtual network interface controller (NIC) of the client. It is not the private CIDR block of the client.
17498
+ # The CIDR block from which an IP address is allocated to the virtual network interface controller (NIC) of the client, rather than the private CIDR block.
17482
17499
  #
17483
- # If the client accesses the SSL server over an SSL-VPN connection, the VPN gateway assigns an IP address from the specified client CIDR block to the client. The client uses the assigned IP address to access cloud resources.
17500
+ # If the client accesses the SSL server over an SSL-VPN connection, the VPN gateway assigns an IP address from the specified client CIDR block for the client to access cloud resources.
17484
17501
  #
17485
17502
  # Make sure that the number of IP addresses in the client CIDR block is at least four times the maximum number of SSL-VPN connections supported by the VPN gateway.
17486
17503
  #
17487
17504
  # <details>
17488
17505
  # <summary>Click to view the reason.</summary>
17489
17506
  #
17490
- # For example, if you specify 192.168.0.0/24 as the client CIDR block, the system first divides a subnet CIDR block with a subnet mask of 30 from 192.168.0.0/24, such as 192.168.0.4/30. This subnet provides up to four IP addresses. Then, the system allocates an IP address from 192.168.0.4/30 to the client and uses the other three IP addresses to ensure network communication. In this case, one client consumes four IP addresses. Therefore, to ensure that an IP address is assigned to your client, you must make sure that the number of IP addresses in the client CIDR block is at least four times the maximum number of SSL-VPN connections supported by the VPN gateway with which the SSL server is associated.
17507
+ # For example, if you specify 192.168.0.0/24 as the client CIDR block, the system first divides a subnet CIDR block with a subnet mask of 30 from 192.168.0.0/24, such as 192.168.0.4/30. This subnet provides up to four IP addresses. Then, the system allocates an IP address from 192.168.0.4/30 to the client and uses the other three IP addresses to ensure network communication. In this case, one client consumes four IP addresses. Therefore, to ensure that an IP address is assigned to your client, the number of IP addresses in the client CIDR block must be at least four times the maximum number of SSL-VPN connections supported by the VPN gateway with which the SSL server is associated.
17491
17508
  # </details>
17509
+ #
17492
17510
  # <details>
17493
17511
  # <summary>Click to view the CIDR blocks that are not supported.</summary>
17494
17512
  #
@@ -17501,6 +17519,7 @@ class CreateSslVpnServerRequest(TeaModel):
17501
17519
  # <details>
17502
17520
  # <summary>Click to view the recommended client CIDR blocks for different numbers of SSL-VPN connections.</summary>
17503
17521
  #
17522
+ #
17504
17523
  # * If the number of SSL-VPN connections is 5, we recommend that you specify a client CIDR block with a subnet mask that is less than or equal to 27 bits in length. Examples: 10.0.0.0/27 and 10.0.0.0/26.
17505
17524
  # * If the number of SSL-VPN connections is 10, we recommend that you specify a client CIDR block with a subnet mask that is less than or equal to 26 bits in length. Examples: 10.0.0.0/26 and 10.0.0.0/25.
17506
17525
  # * If the number of SSL-VPN connections is 20, we recommend that you specify a client CIDR block with a subnet mask that is less than or equal to 25 bits in length. Examples: 10.0.0.0/25 and 10.0.0.0/24.
@@ -17511,10 +17530,10 @@ class CreateSslVpnServerRequest(TeaModel):
17511
17530
  # * If the number of SSL-VPN connections is 1,000, we recommend that you specify a client CIDR block with a subnet mask that is less than or equal to 20 bits in length. Examples: 10.0.0.0/20 and 10.0.0.0/19.
17512
17531
  # </details>
17513
17532
  #
17514
- # > - The subnet mask of the client CIDR block must be 16 to 29 bits in length.
17533
+ # > - The subnet mask of the client CIDR block must be 16 to 29 bits in length.
17515
17534
  # > - Make sure that the client CIDR block does not overlap with the local CIDR block, the VPC CIDR block, or route CIDR blocks associated with the client.
17516
- # > - We recommend that you use 10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16, or one of their subnets as the client CIDR block. If you want to specify a public CIDR block as the client CIDR block, you must specify the public CIDR block as the user CIDR block of the virtual private cloud (VPC). This way, the VPC can access the public CIDR block. For more information, see [VPC FAQ](https://help.aliyun.com/document_detail/185311.html).
17517
- # > - After you create an SSL server, the system automatically adds routes that point to the client CIDR block to the VPC route table. Do not add routes that point to the client CIDR block to the VPC route table again. Otherwise, SSL-VPN connections cannot work as expected.
17535
+ # > - We recommend that you use 10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16, or one of their subnets as the client CIDR block. If you want to specify a public CIDR block as the client CIDR block, you must specify the public CIDR block as the user CIDR block of the virtual private cloud (VPC). This way, the VPC can access the public CIDR block. For more information, see [VPC FAQs](https://help.aliyun.com/document_detail/185311.html).
17536
+ # > - After you create an SSL server, the system automatically adds routes that point to the client CIDR block to the VPC route table. Do not manually add routes that point to the client CIDR block. Otherwise, SSL-VPN connections cannot work as expected.
17518
17537
  #
17519
17538
  # This parameter is required.
17520
17539
  self.client_ip_pool = client_ip_pool
@@ -17549,7 +17568,7 @@ class CreateSslVpnServerRequest(TeaModel):
17549
17568
  self.idaa_sregion_id = idaa_sregion_id
17550
17569
  # The local CIDR block.
17551
17570
  #
17552
- # It is the CIDR block that your client needs to access by using the SSL-VPN connection.
17571
+ # The CIDR block that your client needs to access by using the SSL-VPN connection.
17553
17572
  #
17554
17573
  # This value can be the CIDR block of a VPC, a vSwitch, a data center that is connected to a VPC by using an Express Connect circuit, or an Alibaba Cloud service such as Object Storage Service (OSS).
17555
17574
  #
@@ -19704,7 +19723,7 @@ class CreateVcoRouteEntryRequest(TeaModel):
19704
19723
  # The tunneling protocol. Set the value to **Ipsec**, which specifies the IPsec tunneling protocol.
19705
19724
  self.overlay_mode = overlay_mode
19706
19725
  self.owner_account = owner_account
19707
- # The ID of the region where the IPsec-VPN connection is established.
19726
+ # The region ID of the IPsec-VPN connection.
19708
19727
  #
19709
19728
  # You can call the [DescribeRegions](https://help.aliyun.com/document_detail/36063.html) operation to query the most recent region list.
19710
19729
  #
@@ -21645,8 +21664,15 @@ class CreateVpnAttachmentRequestTunnelOptionsSpecificationTunnelBgpConfig(TeaMod
21645
21664
  local_bgp_ip: str = None,
21646
21665
  tunnel_cidr: str = None,
21647
21666
  ):
21667
+ # The ANS of the tunnel on the Alibaba Cloud side. Valid values: **1** to **4294967295**. Default value: **45104**.
21668
+ #
21669
+ # > We recommend that you use a private ASN to establish BGP connections to Alibaba Cloud. Refer to the relevant documentation for the private ASN range.
21648
21670
  self.local_asn = local_asn
21671
+ # The BGP IP address of the tunnel on the Alibaba Cloud side. The address is an IP address that falls within the BGP CIDR block.
21649
21672
  self.local_bgp_ip = local_bgp_ip
21673
+ # The BGP CIDR block of the tunnel. The CIDR block must fall into 169.254.0.0/16 and the mask of the CIDR block must be 30 bits in length. The CIDR block cannot be 169.254.0.0/30, 169.254.1.0/30, 169.254.2.0/30, 169.254.3.0/30, 169.254.4.0/30, 169.254.5.0/30, 169.254.6.0/30, or 169.254.169.252/30.
21674
+ #
21675
+ # > The two tunnels of an IPsec-VPN connection must use different CIDR blocks.
21650
21676
  self.tunnel_cidr = tunnel_cidr
21651
21677
 
21652
21678
  def validate(self):
@@ -21690,14 +21716,40 @@ class CreateVpnAttachmentRequestTunnelOptionsSpecificationTunnelIkeConfig(TeaMod
21690
21716
  psk: str = None,
21691
21717
  remote_id: str = None,
21692
21718
  ):
21719
+ # The authentication algorithm that is used in Phase 1 negotiations. Valid values: **md5**, **sha1**, **sha256**, **sha384**, and **sha512**. Default value: **sha1**.
21693
21720
  self.ike_auth_alg = ike_auth_alg
21721
+ # The encryption algorithm that is used in Phase 1 negotiations. Valid values: **aes**, **aes192**, **aes256**, **des**, and **3des**. Default value: **aes**.
21694
21722
  self.ike_enc_alg = ike_enc_alg
21723
+ # The SA lifetime as a result of Phase 1 negotiations. Unit: seconds.
21724
+ #
21725
+ # Valid values: **0** to **86400**. Default value: **86400**.
21695
21726
  self.ike_lifetime = ike_lifetime
21727
+ # The negotiation mode of IKE. Valid values: **main** and **aggressive**. Default value: **main**.
21728
+ #
21729
+ # * **main:** This mode offers higher security during negotiations.
21730
+ # * **aggressive**: This mode is faster with a higher success rate.
21696
21731
  self.ike_mode = ike_mode
21732
+ # The Diffie-Hellman key exchange algorithm that is used in Phase 1 negotiations. Default value: **group2**.\\
21733
+ # Valid values: **group1**, **group2**, **group5**, and **group14**.
21697
21734
  self.ike_pfs = ike_pfs
21735
+ # The version of the IKE protocol. Valid values: **ikev1** and **ikev2**. Default value: **ikev2**.
21736
+ #
21737
+ # Compared with IKEv1, IKEv2 simplifies the SA negotiation process and provides better support for scenarios with multiple CIDR blocks.
21698
21738
  self.ike_version = ike_version
21739
+ # The identifier of the tunnel on the Alibaba Cloud side, which is used in Phase 1 negotiations. The identifier cannot exceed 100 characters in length and cannot contain spaces. The default value is the IP address of the tunnel.
21740
+ #
21741
+ # **LocalId** supports fully qualified domain names (FQDNs). If you use an FQDN, we recommend that you set the negotiation mode to **aggressive**.
21699
21742
  self.local_id = local_id
21743
+ # The pre-shared key that is used for identity authentication between the tunnel and the tunnel peer.
21744
+ #
21745
+ # * The key cannot contain spaces. The key must be 1 to 100 characters in length, and can contain digits, letters, and the following special characters: ``~!\\`@#$%^&*()_-+={}[]|;:\\",.<>/?``
21746
+ # * If you do not specify a pre-shared key, the system randomly generates a 16-bit string as the pre-shared key. You can call the [DescribeVpnAttachments](https://help.aliyun.com/document_detail/2526939.html) operation to query the pre-shared key that is automatically generated by the system.
21747
+ #
21748
+ # > The tunnel and the tunnel peer must use the same pre-shared key. Otherwise, the tunnel cannot be established.
21700
21749
  self.psk = psk
21750
+ # The identifier of the tunnel peer, which is used in Phase 1 negotiations. The identifier cannot exceed 100 characters in length and cannot contain spaces. The default value is the IP address of the customer gateway that is associated with the tunnel.
21751
+ #
21752
+ # **RemoteId** supports FQDNs. If you use an FQDN, we recommend that you set the negotiation mode to **aggressive**.
21701
21753
  self.remote_id = remote_id
21702
21754
 
21703
21755
  def validate(self):
@@ -21760,9 +21812,19 @@ class CreateVpnAttachmentRequestTunnelOptionsSpecificationTunnelIpsecConfig(TeaM
21760
21812
  ipsec_lifetime: int = None,
21761
21813
  ipsec_pfs: str = None,
21762
21814
  ):
21815
+ # The authentication algorithm that is used in Phase 2 negotiations.
21816
+ #
21817
+ # Valid values: **md5**, **sha1**, **sha256**, **sha384**, and **sha512**. Default value: **sha1**.
21763
21818
  self.ipsec_auth_alg = ipsec_auth_alg
21819
+ # The encryption algorithm that is used in Phase 2 negotiations. Valid values: **aes**, **aes192**, **aes256**, **des**, and **3des**. Default value: **aes**.
21764
21820
  self.ipsec_enc_alg = ipsec_enc_alg
21821
+ # The SA lifetime as a result of Phase 2 negotiations. Unit: seconds.
21822
+ #
21823
+ # Valid values: **0** to **86400**. Default value: **86400**.
21765
21824
  self.ipsec_lifetime = ipsec_lifetime
21825
+ # The Diffie-Hellman key exchange algorithm that is used in Phase 2 negotiations. Default value: **group2**.
21826
+ #
21827
+ # Valid values: **disabled**, **group1**, **group2**, **group5**, and **group14**.
21766
21828
  self.ipsec_pfs = ipsec_pfs
21767
21829
 
21768
21830
  def validate(self):
@@ -21808,12 +21870,32 @@ class CreateVpnAttachmentRequestTunnelOptionsSpecification(TeaModel):
21808
21870
  tunnel_index: int = None,
21809
21871
  tunnel_ipsec_config: CreateVpnAttachmentRequestTunnelOptionsSpecificationTunnelIpsecConfig = None,
21810
21872
  ):
21873
+ # The ID of the customer gateway that is associated with the tunnel.
21874
+ #
21875
+ # > This parameter is required when you create a dual-tunnel IPsec-VPN connection.
21811
21876
  self.customer_gateway_id = customer_gateway_id
21877
+ # Specifies whether to enable the DPD feature for the tunnel. Valid values:
21878
+ #
21879
+ # * **true** (default): enables DPD. The initiator of the IPsec-VPN connection sends DPD packets to check the existence and availability of the peer. If no feedback is received from the peer within the specified period of time, the connection fails. In this case, ISAKMP SA and IPsec SA are deleted along with the security tunnel.
21880
+ # * **false**: disables DPD. The initiator of the IPsec-VPN connection does not send DPD packets.
21812
21881
  self.enable_dpd = enable_dpd
21882
+ # Specifies whether to enable NAT traversal for the tunnel. Valid values:
21883
+ #
21884
+ # * **true** (default): enables NAT traversal. After NAT traversal is enabled, the initiator does not check the UDP ports during IKE negotiations and can automatically discover NAT gateway devices along the IPsec-VPN tunnel.
21885
+ # * **false**: disables NAT traversal.
21813
21886
  self.enable_nat_traversal = enable_nat_traversal
21887
+ # The BGP configurations of the tunnel.
21888
+ #
21889
+ # > If you enable BGP for an IPsec-VPN connection, you must set **EnableTunnelsBgp** parameter to **true**.
21814
21890
  self.tunnel_bgp_config = tunnel_bgp_config
21891
+ # The configurations of Phase 1 negotiations.
21815
21892
  self.tunnel_ike_config = tunnel_ike_config
21893
+ # The order in which the tunnel was created.
21894
+ #
21895
+ # * **1**: Tunnel 1.
21896
+ # * **2**: Tunnel 2.
21816
21897
  self.tunnel_index = tunnel_index
21898
+ # The configurations of Phase 2 negotiations.
21817
21899
  self.tunnel_ipsec_config = tunnel_ipsec_config
21818
21900
 
21819
21901
  def validate(self):
@@ -21900,22 +21982,24 @@ class CreateVpnAttachmentRequest(TeaModel):
21900
21982
  # * **true** (default)
21901
21983
  # * **false**\
21902
21984
  self.auto_config_route = auto_config_route
21903
- # The Border Gateway Protocol (BGP) configurations:
21985
+ # This parameter is supported when you create an IPsec-VPN connection in single-tunnel mode.
21986
+ #
21987
+ # BGP configuration:
21904
21988
  #
21905
- # * **BgpConfig.EnableBgp**: specifies whether to enable BGP. Valid values: **true** and **false**. Default value: false.
21989
+ # * **BgpConfig.EnableBgp**: specifies whether to enable BGP. Valid values: **true** and **false** (default).
21906
21990
  #
21907
21991
  # * **BgpConfig.LocalAsn**: the ASN on the Alibaba Cloud side. Valid values: **1** to **4294967295**. Default value: **45104**.
21908
21992
  #
21909
- # You can enter the ASN in two segments. Separate the first 16 bits of the ASN from the remaining 16 bits with a period (.). Enter the number in each segment in decimal format.
21993
+ # You can enter a value in two segments separated by a period (.). Each segment is 16 bits in length. Enter the number in each segment in decimal format.
21910
21994
  #
21911
- # For example, if you enter 123.456, the ASN is: 123 × 65536 + 456 = 8061384.
21995
+ # For example, if you enter 123.456, the ASN is 8061384. The ASN is calculated by using the following formula: 123 × 65536 + 456 = 8061384.
21912
21996
  #
21913
- # * **BgpConfig.TunnelCidr**: the CIDR block of the IPsec tunnel. The CIDR block falls within 169.254.0.0/16. The subnet mask of the CIDR block must be 30 bits in length.
21997
+ # * **BgpConfig.TunnelCidr**: The CIDR block of the IPsec tunnel. The CIDR block must fall into 169.254.0.0/16 and the mask of the CIDR block must be 30 bits in length. The CIDR block cannot be 169.254.0.0/30, 169.254.1.0/30, 169.254.2.0/30, 169.254.3.0/30, 169.254.4.0/30, 169.254.5.0/30, 169.254.6.0/30, or 169.254.169.252/30.
21914
21998
  #
21915
- # * **LocalBgpIp:** the BGP IP address on the Alibaba Cloud side. This IP address must fall within the CIDR block range of the IPsec tunnel.
21999
+ # * **LocalBgpIp**: the BGP address on the Alibaba Cloud side. It must be an IP address that falls within the CIDR block of the IPsec tunnel.
21916
22000
  #
21917
- # > * Before you configure BGP, we recommend that you learn about how BGP works and the limits. For more information, see [BGP dynamic routing ](https://help.aliyun.com/document_detail/170235.html).
21918
- # > * We recommend that you use a private ASN to establish a connection with Alibaba Cloud over BGP. Refer to the relevant documentation for the private ASN range.
22001
+ # > - Before you add BGP configurations, we recommend that you learn about how BGP works and the limits. For more information, see [Configure BGP dynamic routing](https://help.aliyun.com/document_detail/445767.html).
22002
+ # > - We recommend that you use a private ASN to establish BGP connections to Alibaba Cloud. Refer to the relevant documentation for the private ASN range.
21919
22003
  self.bgp_config = bgp_config
21920
22004
  # The client token that is used to ensure the idempotence of the request.
21921
22005
  #
@@ -21924,30 +22008,43 @@ class CreateVpnAttachmentRequest(TeaModel):
21924
22008
  # > If you do not specify this parameter, the system automatically uses the **request ID** as the **client token**. The **request ID** may be different for each request.
21925
22009
  self.client_token = client_token
21926
22010
  # The customer gateway ID.
22011
+ #
22012
+ # > This parameter is required only when you create a single-tunnel IPsec-VPN connection.
21927
22013
  self.customer_gateway_id = customer_gateway_id
21928
22014
  # Specifies whether to immediately start IPsec negotiations after the configuration takes effect. Valid values:
21929
22015
  #
21930
22016
  # * **true**: immediately starts IPsec negotiations after the configuration is complete.
21931
22017
  # * **false** (default): starts IPsec negotiations when inbound traffic is received.
21932
22018
  self.effect_immediately = effect_immediately
21933
- # Specifies whether to enable the dead peer detection (DPD) feature. Valid values:
22019
+ # This parameter is supported if you create an IPsec-VPN connection in single-tunnel mode.
21934
22020
  #
21935
- # * **true** (default) The initiator of the IPsec-VPN connection sends DPD packets to verify the existence and availability of the peer. If no response is received from the peer within a specified period of time, the connection fails. ISAKMP SAs and IPsec SAs are deleted. The IPsec tunnel is also deleted.
21936
- # * **false**\
22021
+ # Specifies whether to enable DPD. Valid values: Valid values:
22022
+ #
22023
+ # * **true** (default): enables DPD. The initiator of the IPsec-VPN connection sends DPD packets to check the existence and availability of the peer. If no feedback is received from the peer within the specified period of time, the connection fails. In this case, ISAKMP SA and IPsec SA are deleted along with the security tunnel.
22024
+ # * **false**: disables DPD. The initiator of the IPsec-VPN connection does not send DPD packets.
21937
22025
  self.enable_dpd = enable_dpd
22026
+ # This parameter is supported if you create an IPsec-VPN connection in single-tunnel mode.
22027
+ #
21938
22028
  # Specifies whether to enable NAT traversal. Valid values:
21939
22029
  #
21940
- # * **true** (default) After NAT traversal is enabled, the initiator does not check the UDP ports during IKE negotiations and can automatically discover NAT gateway devices along the VPN tunnel.
21941
- # * **false**\
22030
+ # * **true** (default): enables NAT traversal. After NAT traversal is enabled, the initiator does not check the UDP ports during IKE negotiations and can automatically discover NAT gateway devices along the IPsec-VPN tunnel.
22031
+ # * **false**: disables NAT traversal.
21942
22032
  self.enable_nat_traversal = enable_nat_traversal
22033
+ # This parameter is available if you create an IPsec-VPN connection in dual-tunnel mode.
22034
+ #
22035
+ # Specifies whether to enable the BGP feature for the tunnel. Valid values: **true** and **false**. Default value: false.
22036
+ #
22037
+ # > Before you add BGP configurations, we recommend that you learn about how BGP works and the limits. For more information, see [Configure BGP dynamic routing](https://help.aliyun.com/document_detail/445767.html)
21943
22038
  self.enable_tunnels_bgp = enable_tunnels_bgp
21944
- # The health check configuration:
22039
+ # This parameter is supported if you create an IPsec-VPN connection in single-tunnel mode.
21945
22040
  #
21946
- # * **HealthCheckConfig.enable**: specifies whether to enable health checks. Valid values: **true** and **false**. Default value: false.
22041
+ # The health check configurations:
22042
+ #
22043
+ # * **HealthCheckConfig.enable**: indicates whether the health check is enabled. Valid values: **true** and **false** (default).
21947
22044
  #
21948
- # * **HealthCheckConfig.dip**: the destination IP address configured for health checks. Enter the IP address on the data center side that the VPC can communicate with through the IPsec-VPN connection.
22045
+ # * **HealthCheckConfig.dip**: the destination IP address configured for health checks. Enter the IP address of the on-premises data center that the VPC can access through the IPsec connection.
21949
22046
  #
21950
- # * **HealthCheckConfig.sip**: the source IP address configured for health checks. Enter the IP address on the VPC side that the data center can communicate with through the IPsec-VPN connection.
22047
+ # * **HealthCheckConfig.sip**: the source IP address configured for health checks. Enter the IP address of the VPC that the on-premises data center can access through the IPsec connection.
21951
22048
  #
21952
22049
  # * **HealthCheckConfig.interval**: the time interval of health check retries. Unit: seconds. Default value: **3**.
21953
22050
  #
@@ -21958,11 +22055,13 @@ class CreateVpnAttachmentRequest(TeaModel):
21958
22055
  # * **revoke_route** (default): withdraws published routes.
21959
22056
  # * **reserve_route**: does not withdraw published routes.
21960
22057
  self.health_check_config = health_check_config
22058
+ # This parameter is supported if you create an IPsec-VPN connection in single-tunnel mode.
22059
+ #
21961
22060
  # The configurations of Phase 1 negotiations:
21962
22061
  #
21963
22062
  # * **IkeConfig.Psk**: the pre-shared key that is used for identity authentication between the VPN gateway and the on-premises data center.
21964
22063
  #
21965
- # * The key must be 1 to 100 characters in length and can contain digits, letters, and the following special characters: ``~!`@#$%^&*()_-+={}[]|;:\\",.<>/?``
22064
+ # * The key cannot contain space characters. The key must be 1 to 100 characters in length, and can contain digits, letters, and the following special characters: ``~!`@#$%^&*()_-+={}[]|;:\\",.<>/?``
21966
22065
  # * If you do not specify a pre-shared key, the system randomly generates a 16-bit string as the pre-shared key. You can call the [DescribeVpnConnection](https://help.aliyun.com/document_detail/2526951.html) operation to query the pre-shared key that is automatically generated by the system.
21967
22066
  #
21968
22067
  # > The pre-shared key of the IPsec-VPN connection must be the same as the authentication key of the on-premises data center. Otherwise, connections between the on-premises data center and the VPN gateway cannot be established.
@@ -21979,16 +22078,18 @@ class CreateVpnAttachmentRequest(TeaModel):
21979
22078
  #
21980
22079
  # * **IkeConfig.IkeLifetime**: the SA lifetime as a result of Phase 1 negotiations. Unit: seconds. Valid values: **0** to **86400**. Default value: **86400**.
21981
22080
  #
21982
- # * **IkeConfig.LocalIdIPsec**: the identifier on the Alibaba Cloud side. The identifier cannot exceed 100 characters in length. This parameter is left empty by default.
22081
+ # * **IkeConfig.LocalId**: the identifier on the Alibaba Cloud side. The identifier cannot exceed 100 characters in length and cannot contain space characters. This parameter is empty by default.
21983
22082
  #
21984
- # * **IkeConfig.RemoteId**: the identifier on the data center side. The identifier cannot exceed 100 characters in length. The default value is the IP address of the customer gateway.
22083
+ # * **IkeConfig.RemoteId**: the identifier on the data center side. The identifier cannot exceed 100 characters in length and cannot contain space characters. The default value is the IP address of the customer gateway.
21985
22084
  self.ike_config = ike_config
22085
+ # This parameter is supported if you create an IPsec-VPN connection in single-tunnel mode.
22086
+ #
21986
22087
  # The configurations of Phase 2 negotiations:
21987
22088
  #
21988
22089
  # * **IpsecConfig.IpsecEncAlg**: the encryption algorithm that is used in Phase 2 negotiations. Valid values: **aes**, **aes192**, **aes256**, **des**, and **3des**. Default value: **aes**.
21989
22090
  # * **IpsecConfig. IpsecAuthAlg**: the authentication algorithm that is used in Phase 2 negotiations. Valid values: **md5**, **sha1**, **sha256**, **sha384**, and **sha512**. Default value: **md5**.
21990
- # * **IpsecConfig. IpsecPfs**: the Diffie-Hellman key exchange algorithm that is used in Phase 2 negotiations. Valid values: **disabled**, **group1**, **group2**, **group5**, and **group14**. Default value: **group2**.
21991
- # * **IpsecConfig. IpsecLifetime**: the SA lifetime that is determined by Phase 2 negotiations. Unit: seconds. Valid values: **0** to **86400**. Default value: **86400**.
22091
+ # * **IpsecConfig. IpsecPfs**: The Diffie-Hellman key exchange algorithm used in the second phase negotiation. Valid values: **disabled**, **group1**, **group2**, **group5**, and **group14**. Default value: **group2**.
22092
+ # * **IkeConfig.IkeLifetime**: the SA lifetime determined by Phase 2 negotiations. Unit: seconds. Valid values: **0** to **86400**. Default value: **86400**.
21992
22093
  self.ipsec_config = ipsec_config
21993
22094
  # The CIDR block on the VPC side. The CIDR block is used in Phase 2 negotiations.
21994
22095
  #
@@ -22043,6 +22144,10 @@ class CreateVpnAttachmentRequest(TeaModel):
22043
22144
  #
22044
22145
  # Each tag key corresponds to one tag value. You can specify up to 20 tag values in each call.
22045
22146
  self.tags = tags
22147
+ # The tunnel configurations.
22148
+ #
22149
+ # * You can specify parameters in the **TunnelOptionsSpecification** array when you create an IPsec-VPN connection in dual tunnel mode.
22150
+ # * When you create a IPsec-VPN connection in dual-tunnel mode, you must add both tunnels to IPsec-VPN connection to ensure that the IPsec-VPN connection has connection redundancy. Each IPsec-VPN connection supports only two tunnels.
22046
22151
  self.tunnel_options_specification = tunnel_options_specification
22047
22152
 
22048
22153
  def validate(self):
@@ -22338,15 +22443,13 @@ class CreateVpnConnectionRequestTunnelOptionsSpecificationTunnelBgpConfig(TeaMod
22338
22443
  ):
22339
22444
  # The autonomous system number (ASN) of the tunnel on the Alibaba Cloud side. Valid values: **1** to **4294967295**. Default value: **45104**.
22340
22445
  #
22341
- #
22342
- #
22343
22446
  # > - If you set **EnableTunnelsBgp** to **true**, you must set this parameter.
22344
- # > - Before you add BGP configurations, we recommend that you learn about how BGP dynamic routing works and the limits. For more information, see [VPN Gateway supports BGP dynamic routing](https://help.aliyun.com/document_detail/170235.html).
22447
+ # > - Before you add BGP configurations, we recommend that you learn about how BGP dynamic routing works and the limits. For more information, see [Configure BGP dynamic routing](https://help.aliyun.com/document_detail/2638220.html).
22345
22448
  # > - We recommend that you use a private ASN to establish BGP connections to Alibaba Cloud. For information about the range of private ASNs, see the relevant documentation.
22346
22449
  self.local_asn = local_asn
22347
22450
  # The BGP IP address of the tunnel on the Alibaba Cloud side. The address is an IP address that falls within the BGP CIDR block.
22348
22451
  self.local_bgp_ip = local_bgp_ip
22349
- # The BGP CIDR block of the tunnel. The CIDR block must fall within the 169.254.0.0/16 range. The subnet mask of the CIDR block must be 30 bits in length.
22452
+ # The BGP CIDR block of the tunnel. The CIDR block must fall within 169.254.0.0/16 and the mask of the CIDR block must be 30 bits in length. The CIDR block cannot be 169.254.0.0/30, 169.254.1.0/30, 169.254.2.0/30, 169.254.3.0/30, 169.254.4.0/30, 169.254.5.0/30, 169.254.6.0/30, or 169.254.169.252/30.
22350
22453
  #
22351
22454
  # > The BGP CIDR block of each tunnel must be unique on a VPN gateway.
22352
22455
  self.tunnel_cidr = tunnel_cidr
@@ -22400,14 +22503,14 @@ class CreateVpnConnectionRequestTunnelOptionsSpecificationTunnelIkeConfig(TeaMod
22400
22503
  #
22401
22504
  # Valid values: **aes**, **aes192**, **aes256**, **des**, and **3des**. Default value: **aes**.
22402
22505
  self.ike_enc_alg = ike_enc_alg
22403
- # The SA lifetime as a result of Phase 1 negotiations. Unit: seconds.
22506
+ # The SA lifetime as a result of Phase 1 negotiations. Unit: seconds
22404
22507
  #
22405
22508
  # Valid values: **0** to **86400**. Default value: **86400**.
22406
22509
  self.ike_lifetime = ike_lifetime
22407
22510
  # The negotiation mode of IKE. Valid values: **main** and **aggressive**. Default value: **main**.
22408
22511
  #
22409
22512
  # * **main:** This mode offers higher security during negotiations.
22410
- # * **aggressive**: This mode supports faster negotiations and a higher success rate.
22513
+ # * **aggressive:** This mode is faster and has a higher success rate.
22411
22514
  self.ike_mode = ike_mode
22412
22515
  # The Diffie-Hellman key exchange algorithm that is used in Phase 1 negotiations. Default value: **group2**.\\
22413
22516
  # Valid values: **group1**, **group2**, **group5**, and **group14**.
@@ -22416,18 +22519,18 @@ class CreateVpnConnectionRequestTunnelOptionsSpecificationTunnelIkeConfig(TeaMod
22416
22519
  #
22417
22520
  # Compared with IKEv1, IKEv2 simplifies the SA negotiation process and provides better support for scenarios with multiple CIDR blocks.
22418
22521
  self.ike_version = ike_version
22419
- # The identifier of the tunnel on the Alibaba Cloud side, which is used in Phase 1 negotiations. It can contain at most 100 characters. The default value is the IP address of the tunnel.
22522
+ # The identifier of the tunnel on the Alibaba Cloud side, which is used in Phase 1 negotiations. The identifier cannot exceed 100 characters in length and cannot contain space characters. The default value is the IP address of the tunnel.
22420
22523
  #
22421
22524
  # **LocalId** supports fully qualified domain names (FQDNs). If you use an FQDN, we recommend that you set the negotiation mode to **aggressive**.
22422
22525
  self.local_id = local_id
22423
22526
  # The pre-shared key that is used for identity authentication between the tunnel and the tunnel peer.
22424
22527
  #
22425
- # * The key must be 1 to 100 characters in length and can contain digits, letters, and the following special characters: ``~!\\`@#$%^&*()_-+={}[]|;:\\",.<>/?``
22528
+ # * The key cannot contain spaces. The key must be 1 to 100 characters in length, and can contain digits, letters, and the following special characters: ``~!\\`@#$%^&*()_-+={}[]|;:\\",.<>/?``
22426
22529
  # * If you do not specify a pre-shared key, the system randomly generates a 16-bit string as the pre-shared key. You can call the [DescribeVpnConnection](https://help.aliyun.com/document_detail/2526951.html) operation to query the pre-shared key that is automatically generated by the system.
22427
22530
  #
22428
22531
  # > The tunnel and the tunnel peer must use the same pre-shared key. Otherwise, the tunnel cannot be established.
22429
22532
  self.psk = psk
22430
- # The identifier of the tunnel peer, which is used in Phase 1 negotiations. It can contain at most 100 characters. The default value is the IP address of the customer gateway that is associated with the tunnel.
22533
+ # The identifier of the tunnel peer, which is used in Phase 1 negotiations. The identifier cannot exceed 100 characters in length and cannot contain space characters. The default value is the IP address of the customer gateway that is associated with the tunnel.
22431
22534
  #
22432
22535
  # **RemoteId** supports FQDNs. If you use an FQDN, we recommend that you set the negotiation mode to **aggressive**.
22433
22536
  self.remote_id = remote_id
@@ -22500,7 +22603,7 @@ class CreateVpnConnectionRequestTunnelOptionsSpecificationTunnelIpsecConfig(TeaM
22500
22603
  #
22501
22604
  # Valid values: **aes**, **aes192**, **aes256**, **des**, and **3des**. Default value: **aes**.
22502
22605
  self.ipsec_enc_alg = ipsec_enc_alg
22503
- # The SA lifetime as a result of Phase 2 negotiations. Unit: seconds.
22606
+ # The SA lifetime as a result of Phase 2 negotiations. Unit: seconds
22504
22607
  #
22505
22608
  # Valid values: **0** to **86400**. Default value: **86400**.
22506
22609
  self.ipsec_lifetime = ipsec_lifetime
@@ -22574,7 +22677,7 @@ class CreateVpnConnectionRequestTunnelOptionsSpecification(TeaModel):
22574
22677
  # * If the VPN gateway uses an SM certificate, this parameter is required.
22575
22678
  # * If the VPN gateway does not use an SM certificate, leave this parameter empty.
22576
22679
  self.remote_ca_certificate = remote_ca_certificate
22577
- # The role of the tunnel. Valid values: Valid values:
22680
+ # The role of the tunnel. Valid values:
22578
22681
  #
22579
22682
  # * **master**: The tunnel is an active tunnel.
22580
22683
  # * **slave**: The tunnel is a standby tunnel.
@@ -22674,7 +22777,7 @@ class CreateVpnConnectionRequest(TeaModel):
22674
22777
  # * **true** (default)
22675
22778
  # * **false**\
22676
22779
  self.auto_config_route = auto_config_route
22677
- # This parameter is supported when you create an IPsec-VPN connection in single-tunnel mode.
22780
+ # This parameter is supported if you create an IPsec-VPN connection in single-tunnel mode.
22678
22781
  #
22679
22782
  # BGP configuration:
22680
22783
  #
@@ -22686,14 +22789,14 @@ class CreateVpnConnectionRequest(TeaModel):
22686
22789
  #
22687
22790
  # For example, if you enter 123.456, the ASN is 8061384. The ASN is calculated by using the following formula: 123 × 65536 + 456 = 8061384.
22688
22791
  #
22689
- # * **BgpConfig.TunnelCidr**: The CIDR block of the IPsec tunnel. The CIDR block must belong to 169.254.0.0/16 and the subnet mask is 30 bits in length.
22792
+ # * **BgpConfig.TunnelCidr**: The CIDR block of the IPsec tunnel. The CIDR block must fall within 169.254.0.0/16 and the mask of the CIDR block must be 30 bits in length. The CIDR block cannot be 169.254.0.0/30, 169.254.1.0/30, 169.254.2.0/30, 169.254.3.0/30, 169.254.4.0/30, 169.254.5.0/30, 169.254.6.0/30, or 169.254.169.252/30.
22690
22793
  #
22691
- # >The CIDR block of the IPsec tunnel for each IPsec-VPN connection on a VPN gateway must be unique.
22794
+ # > The CIDR block of the IPsec tunnel for each IPsec-VPN connection on a VPN gateway must be unique.
22692
22795
  #
22693
22796
  # * **LocalBgpIp**: the BGP address on the Alibaba Cloud side. It must be an IP address that falls within the CIDR block of the IPsec tunnel.
22694
22797
  #
22695
- # > * Before you add BGP configurations, we recommend that you learn about how BGP works and the limits. For more information, see [VPN Gateway supports BGP dynamic routing](https://help.aliyun.com/document_detail/170235.html).
22696
- # > * We recommend that you use private ASN to establish BGP connections to Alibaba Cloud. Refer to the relevant documentation for the private ASN range.
22798
+ # > - Before you add BGP configurations, we recommend that you learn about how BGP works and the limits. For more information, see [Configure BGP dynamic routing](https://help.aliyun.com/document_detail/2638220.html).
22799
+ # > - We recommend that you use a private ASN to establish BGP connections to Alibaba Cloud. Refer to the relevant documentation for the private ASN range.
22697
22800
  self.bgp_config = bgp_config
22698
22801
  # The client token that is used to ensure the idempotence of the request.
22699
22802
  #
@@ -22744,13 +22847,11 @@ class CreateVpnConnectionRequest(TeaModel):
22744
22847
  #
22745
22848
  # * **IkeConfig.Psk**: the pre-shared key that is used for identity authentication between the VPN gateway and the on-premises data center.
22746
22849
  #
22747
- # * The key must be 1 to 100 characters in length and can contain digits, letters, and the following special characters: ``~!\\`@#$%^&*()_-+={}[]|;:\\",.<>/?``
22850
+ # * The key cannot contain spaces. The key must be 1 to 100 characters in length, and can contain digits, letters, and the following special characters: ``~!\\`@#$%^&*()_-+={}[]|;:\\",.<>/?``
22748
22851
  #
22749
22852
  # * If you do not specify a pre-shared key, the system randomly generates a 16-bit string as the pre-shared key. You can call the [DescribeVpnConnection](https://help.aliyun.com/document_detail/2526951.html) operation to query the pre-shared key that is automatically generated by the system.
22750
22853
  #
22751
- # **\
22752
- #
22753
- # **Note** The pre-shared key of the IPsec-VPN connection must be the same as the authentication key of the on-premises data center. Otherwise, connections between the on-premises data center and the VPN gateway cannot be established.
22854
+ # > The pre-shared key of the IPsec-VPN connection must be the same as the authentication key of the on-premises data center. Otherwise, connections between the on-premises data center and the VPN gateway cannot be established.
22754
22855
  #
22755
22856
  # * **IkeConfig.IkeVersion**: the version of the Internet Key Exchange (IKE) protocol. Valid values: **ikev1** and **ikev2**. Default value: **ikev1**.
22756
22857
  #
@@ -22759,7 +22860,7 @@ class CreateVpnConnectionRequest(TeaModel):
22759
22860
  # * **IkeConfig.IkeMode**: the negotiation mode of IKE. Valid values: **main** and **aggressive**. Default value: **main**.
22760
22861
  #
22761
22862
  # * **main:** This mode offers higher security during negotiations.
22762
- # * **aggressive**: This mode supports faster negotiations and a higher success rate.
22863
+ # * **aggressive:** This mode is faster and has a higher success rate.
22763
22864
  #
22764
22865
  # * **IkeConfig.IkeEncAlg**: the encryption algorithm that is used in Phase 1 negotiations.
22765
22866
  #
@@ -22771,11 +22872,11 @@ class CreateVpnConnectionRequest(TeaModel):
22771
22872
  #
22772
22873
  # * **IkeConfig.IkePfs**: the Diffie-Hellman key exchange algorithm that is used in Phase 1 negotiations. Valid values: **group1**, **group2**, **group5**, and **group14**. Default value: **group2**.
22773
22874
  #
22774
- # * **IkeConfig.IkeLifetime**: the SA lifetime as a result of Phase 1 negotiations. Unit: seconds. Valid values: **0** to **86400**. Default value: **86400**.
22875
+ # * **IkeConfig.IkeLifetime**: the SA lifetime as a result of Phase 1 negotiations. Unit: seconds Valid values: **0** to **86400**. Default value: **86400**.
22775
22876
  #
22776
- # * **IkeConfig.LocalId**: the identifier of the VPN gateway. It can contain at most 100 characters. The default value is the IP address of the VPN gateway.
22877
+ # * **IkeConfig.LocalId**: the identifier of the VPN gateway. It can be up to 100 characters in length and cannot contain space characters. The default value is the IP address of the VPN gateway.
22777
22878
  #
22778
- # * **IkeConfig.RemoteId**: the identifier of the customer gateway. It can contain at most 100 characters. The default value is the IP address of the customer gateway.
22879
+ # * **IkeConfig.RemoteId**: the identifier of the customer gateway. It can be up to 100 characters in length and cannot contain space characters. The default value is the IP address of the customer gateway.
22779
22880
  self.ike_config = ike_config
22780
22881
  # This parameter is available if you create an IPsec-VPN connection in single-tunnel mode.
22781
22882
  #
@@ -27282,7 +27383,16 @@ class DeleteIpv6GatewayRequest(TeaModel):
27282
27383
  resource_owner_account: str = None,
27283
27384
  resource_owner_id: int = None,
27284
27385
  ):
27386
+ # The client token that is used to ensure the idempotence of the request.
27387
+ #
27388
+ # You can use the client to generate the token, but you must make sure that the token is unique among different requests. The client token can contain only ASCII characters.
27389
+ #
27390
+ # > If you do not specify this parameter, the system automatically uses the **request ID** as the **client token**. The **request ID** may be different for each request.
27285
27391
  self.client_token = client_token
27392
+ # Specifies whether to perform only a dry run, without performing the actual request. Valid values:
27393
+ #
27394
+ # * **true**: performs only a dry run. The system checks the request for potential issues, including missing parameter values, incorrect request syntax, and service limits. If the request fails the dry run, an error message is returned. If the request passes the dry run, the `DryRunOperation` error code is returned.
27395
+ # * **false** (default): performs a dry run and performs the actual request. If the request passes the dry run, a 2xx HTTP status code is returned and the operation is performed.
27286
27396
  self.dry_run = dry_run
27287
27397
  # The ID of the IPv6 gateway that you want to delete.
27288
27398
  #
@@ -27427,7 +27537,12 @@ class DeleteIpv6InternetBandwidthRequest(TeaModel):
27427
27537
  resource_owner_account: str = None,
27428
27538
  resource_owner_id: int = None,
27429
27539
  ):
27540
+ # The client token that is used to ensure the idempotence of the request. You can use the client to generate the token, but you must make sure that the token is unique among different requests. The client token can contain only ASCII characters. If you do not specify this parameter, the system automatically uses the request ID as the client token. The request ID may be different for each request.
27430
27541
  self.client_token = client_token
27542
+ # Specifies whether to perform only a dry run, without performing the actual request. Valid values:
27543
+ #
27544
+ # * **true**: performs only a dry run. The system checks the request for potential issues, including missing parameter values, incorrect request syntax, and service limits. If the request fails the dry run, an error message is returned. If the request passes the dry run, the `DryRunOperation` error code is returned.
27545
+ # * **false** (default): performs a dry run and performs the actual request. If the request passes the dry run, a 2xx HTTP status code is returned and the operation is performed.
27431
27546
  self.dry_run = dry_run
27432
27547
  # The ID of the IPv6 address.
27433
27548
  #
@@ -30777,7 +30892,7 @@ class DeleteVcoRouteEntryRequest(TeaModel):
30777
30892
  # The tunneling protocol. Set the value to **Ipsec**, which specifies the IPsec tunneling protocol.
30778
30893
  self.overlay_mode = overlay_mode
30779
30894
  self.owner_account = owner_account
30780
- # The ID of the region where the IPsec-VPN connection is established.
30895
+ # The region ID of the IPsec-VPN connection.
30781
30896
  #
30782
30897
  # You can call the [DescribeRegions](https://help.aliyun.com/document_detail/36063.html) operation to query the most recent region list.
30783
30898
  #
@@ -35084,9 +35199,9 @@ class DescribeCustomerGatewayResponseBodyTagsTag(TeaModel):
35084
35199
  key: str = None,
35085
35200
  value: str = None,
35086
35201
  ):
35087
- # The key of tag N.
35202
+ # The tag key.
35088
35203
  self.key = key
35089
- # The value of tag N.
35204
+ # The tag value.
35090
35205
  self.value = value
35091
35206
 
35092
35207
  def validate(self):
@@ -35174,7 +35289,7 @@ class DescribeCustomerGatewayResponseBody(TeaModel):
35174
35289
  self.customer_gateway_id = customer_gateway_id
35175
35290
  # The description of the customer gateway.
35176
35291
  self.description = description
35177
- # The public IP address of the gateway device in the data center.
35292
+ # The IP address of the gateway device in the data center.
35178
35293
  self.ip_address = ip_address
35179
35294
  # The name of the customer gateway.
35180
35295
  self.name = name
@@ -36554,6 +36669,7 @@ class DescribeEipAddressesResponseBodyEipAddressesEipAddress(TeaModel):
36554
36669
  second_limited: bool = None,
36555
36670
  security_protection_types: DescribeEipAddressesResponseBodyEipAddressesEipAddressSecurityProtectionTypes = None,
36556
36671
  segment_instance_id: str = None,
36672
+ service_id: int = None,
36557
36673
  service_managed: int = None,
36558
36674
  status: str = None,
36559
36675
  tags: DescribeEipAddressesResponseBodyEipAddressesEipAddressTags = None,
@@ -36694,6 +36810,7 @@ class DescribeEipAddressesResponseBodyEipAddressesEipAddress(TeaModel):
36694
36810
  #
36695
36811
  # This value is returned only when you query contiguous EIPs.
36696
36812
  self.segment_instance_id = segment_instance_id
36813
+ self.service_id = service_id
36697
36814
  # Indicates whether the resource is created by the service account. Valid values:
36698
36815
  #
36699
36816
  # * **0**\
@@ -36806,6 +36923,8 @@ class DescribeEipAddressesResponseBodyEipAddressesEipAddress(TeaModel):
36806
36923
  result['SecurityProtectionTypes'] = self.security_protection_types.to_map()
36807
36924
  if self.segment_instance_id is not None:
36808
36925
  result['SegmentInstanceId'] = self.segment_instance_id
36926
+ if self.service_id is not None:
36927
+ result['ServiceID'] = self.service_id
36809
36928
  if self.service_managed is not None:
36810
36929
  result['ServiceManaged'] = self.service_managed
36811
36930
  if self.status is not None:
@@ -36894,6 +37013,8 @@ class DescribeEipAddressesResponseBodyEipAddressesEipAddress(TeaModel):
36894
37013
  self.security_protection_types = temp_model.from_map(m['SecurityProtectionTypes'])
36895
37014
  if m.get('SegmentInstanceId') is not None:
36896
37015
  self.segment_instance_id = m.get('SegmentInstanceId')
37016
+ if m.get('ServiceID') is not None:
37017
+ self.service_id = m.get('ServiceID')
36897
37018
  if m.get('ServiceManaged') is not None:
36898
37019
  self.service_managed = m.get('ServiceManaged')
36899
37020
  if m.get('Status') is not None:
@@ -44646,9 +44767,10 @@ class DescribeIpv6EgressOnlyRulesRequest(TeaModel):
44646
44767
  ):
44647
44768
  # The ID of the instance that is associated with the IPv6 address to which the egress-only rule is applied.
44648
44769
  self.instance_id = instance_id
44649
- # The type of the instance to which you want to apply the egress-only rule. Set the value to
44770
+ # The type of the instance to which you want to apply the egress-only rule. Valid values:
44650
44771
  #
44651
- # **Ipv6Address**, which specifies that the egress-only rule applies to an IPv6 address.
44772
+ # * IPv6Address (default)
44773
+ # * IPv6Prefix
44652
44774
  self.instance_type = instance_type
44653
44775
  # The ID of the egress-only rule that you want to query.
44654
44776
  self.ipv_6egress_only_rule_id = ipv_6egress_only_rule_id
@@ -44660,9 +44782,9 @@ class DescribeIpv6EgressOnlyRulesRequest(TeaModel):
44660
44782
  self.name = name
44661
44783
  self.owner_account = owner_account
44662
44784
  self.owner_id = owner_id
44663
- # The number of the page to return. Default value: **1**.
44785
+ # The page number. Default value: **1**.
44664
44786
  self.page_number = page_number
44665
- # The number of entries to return on each page. Maximum value: **50**. Default value: **10**.
44787
+ # The number of entries per page. Maximum value: **50**. Default value: **10**.
44666
44788
  self.page_size = page_size
44667
44789
  # The ID of the region where the IPv6 gateway is deployed. You can call the [DescribeRegions](https://help.aliyun.com/document_detail/36063.html) operation to query the most recent region list.
44668
44790
  #
@@ -54353,8 +54475,7 @@ class DescribeSslVpnClientCertsRequest(TeaModel):
54353
54475
  self.region_id = region_id
54354
54476
  # The ID of the resource group to which the SSL client certificate belongs.
54355
54477
  #
54356
- # The SSL client certificate is the same as the resource group of the SSL server associated with it.
54357
- # You can call the [DescribeSslVpnServers](https://help.aliyun.com/document_detail/2794078.html) operation to query the ID of the resource group to which the SSL server belongs.
54478
+ # The SSL client certificate and its associated SSL server belong to the same resource group. You can call the [DescribeSslVpnServers](https://help.aliyun.com/document_detail/2794078.html) operation to query the ID of the resource group to which the SSL server belongs.
54358
54479
  self.resource_group_id = resource_group_id
54359
54480
  self.resource_owner_account = resource_owner_account
54360
54481
  self.resource_owner_id = resource_owner_id
@@ -54435,21 +54556,21 @@ class DescribeSslVpnClientCertsResponseBodySslVpnClientCertKeysSslVpnClientCertK
54435
54556
  ssl_vpn_server_id: str = None,
54436
54557
  status: str = None,
54437
54558
  ):
54438
- # The timestamp that indicates when the SSL client certificate was created. Unit: millisecond.
54559
+ # The timestamp generated when the SSL client certificate was created. Unit: milliseconds.
54439
54560
  #
54440
- # This value is a UNIX timestamp representing the number of milliseconds that have elapsed since the epoch time January 1, 1970, 00:00:00 UTC.
54561
+ # This value is a UNIX timestamp representing the number of milliseconds that have elapsed since January 1, 1970, 00:00:00 UTC.
54441
54562
  self.create_time = create_time
54442
- # The timestamp that indicates when the SSL client certificate expires. Unit: millisecond.
54563
+ # The timestamp generated when the SSL client certificate expires. Unit: milliseconds.
54443
54564
  #
54444
- # This value is a UNIX timestamp representing the number of milliseconds that have elapsed since the epoch time January 1, 1970, 00:00:00 UTC.
54565
+ # This value is a UNIX timestamp representing the number of milliseconds that have elapsed since January 1, 1970, 00:00:00 UTC.
54445
54566
  self.end_time = end_time
54446
54567
  # The name of the SSL client certificate.
54447
54568
  self.name = name
54448
- # The region where the SSL client certificate is created.
54569
+ # The region ID of the SSL client certificate.
54449
54570
  self.region_id = region_id
54450
54571
  # The ID of the resource group to which the SSL client certificate belongs.
54451
54572
  #
54452
- # You can call the [ListResourceGroups](https://help.aliyun.com/document_detail/158855.html) operation to query the resource group information.
54573
+ # You can call the [ListResourceGroups](https://help.aliyun.com/document_detail/158855.html) operation to query resource groups.
54453
54574
  self.resource_group_id = resource_group_id
54454
54575
  # The ID of the SSL client certificate.
54455
54576
  self.ssl_vpn_client_cert_id = ssl_vpn_client_cert_id
@@ -54457,7 +54578,7 @@ class DescribeSslVpnClientCertsResponseBodySslVpnClientCertKeysSslVpnClientCertK
54457
54578
  self.ssl_vpn_server_id = ssl_vpn_server_id
54458
54579
  # The status of the SSL client certificate. Valid values:
54459
54580
  #
54460
- # * **expiring-soon**\
54581
+ # * **expiring-soon**: The certificate expires in one week.
54461
54582
  # * **normal**\
54462
54583
  # * **expired**\
54463
54584
  self.status = status
@@ -54956,11 +55077,9 @@ class DescribeSslVpnServersRequest(TeaModel):
54956
55077
  #
54957
55078
  # This parameter is required.
54958
55079
  self.region_id = region_id
54959
- # The ID of the resource group to which the SSL server belongs.
54960
- #
54961
- # The SSL server has the same resource group as its associated VPN gateway instance.
55080
+ # The resource group ID of the SSL server.
54962
55081
  #
54963
- # You can call the [DescribeVpnGateway](https://help.aliyun.com/document_detail/2526915.html) operation to query the ID of the resource group to which the VPN gateway instance belongs.
55082
+ # The SSL server and its associated VPN gateway belong to the same resource group. You can call the [DescribeVpnGateway](https://help.aliyun.com/document_detail/2794055.html) operation to query the ID of the resource group to which the VPN gateway belongs.
54964
55083
  self.resource_group_id = resource_group_id
54965
55084
  self.resource_owner_account = resource_owner_account
54966
55085
  self.resource_owner_id = resource_owner_id
@@ -55071,11 +55190,16 @@ class DescribeSslVpnServersResponseBodySslVpnServersSslVpnServer(TeaModel):
55071
55190
  # * **true**\
55072
55191
  # * **false** (default)
55073
55192
  self.enable_multi_factor_auth = enable_multi_factor_auth
55193
+ # The ID of the IDaaS application.
55074
55194
  self.idaa_sapplication_id = idaa_sapplication_id
55075
- # The ID of the IDaaS instance.
55195
+ # The ID of the IDaaS EIAM instance.
55076
55196
  self.idaa_sinstance_id = idaa_sinstance_id
55197
+ # The version of the IDaaS EIAM instance.
55198
+ #
55199
+ # * This parameter is returned only if the SSL server is associated with an IDaaS EIAM 2.0 instance. Only **EIAM 2.0** is returned.
55200
+ # * If the SSL server is associated with an IDaaS EIAM 1.0 instance, no value is returned.
55077
55201
  self.idaa_sinstance_version = idaa_sinstance_version
55078
- # The region ID of the IDaaS instance.
55202
+ # The region ID of the IDaaS EIAM instance.
55079
55203
  self.idaa_sregion_id = idaa_sregion_id
55080
55204
  # The public IP address of the VPN gateway.
55081
55205
  self.internet_ip = internet_ip
@@ -55083,19 +55207,19 @@ class DescribeSslVpnServersResponseBodySslVpnServersSslVpnServer(TeaModel):
55083
55207
  self.local_subnet = local_subnet
55084
55208
  # The maximum number of connections.
55085
55209
  self.max_connections = max_connections
55086
- # The name of the SSL-VPN server.
55210
+ # The name of the SSL server.
55087
55211
  self.name = name
55088
55212
  # The port that is used by the SSL-VPN server.
55089
55213
  self.port = port
55090
- # The protocol that is used by the SSL-VPN server.
55214
+ # The protocol that is used by the SSL server.
55091
55215
  self.proto = proto
55092
- # The region ID of the SSL-VPN server.
55216
+ # The region ID of the SSL server.
55093
55217
  self.region_id = region_id
55094
- # The resource group ID of the SSL-VPN server.
55218
+ # The resource group ID of the SSL server.
55095
55219
  #
55096
55220
  # You can call the [ListResourceGroups](https://help.aliyun.com/document_detail/158855.html) operation to query resource groups.
55097
55221
  self.resource_group_id = resource_group_id
55098
- # The ID of the SSL-VPN server.
55222
+ # The ID of the SSL server.
55099
55223
  self.ssl_vpn_server_id = ssl_vpn_server_id
55100
55224
  # The ID of the VPN gateway.
55101
55225
  self.vpn_gateway_id = vpn_gateway_id
@@ -55246,7 +55370,7 @@ class DescribeSslVpnServersResponseBody(TeaModel):
55246
55370
  self.page_size = page_size
55247
55371
  # The request ID.
55248
55372
  self.request_id = request_id
55249
- # The detailed information about the SSL-VPN server.
55373
+ # The detailed information about the SSL-VPN servers.
55250
55374
  self.ssl_vpn_servers = ssl_vpn_servers
55251
55375
  # The number of entries returned.
55252
55376
  self.total_count = total_count
@@ -57807,6 +57931,10 @@ class DescribeVcoRouteEntriesResponseBodyVcoRouteEntries(TeaModel):
57807
57931
  self.create_time = create_time
57808
57932
  # The next hop of the route.
57809
57933
  self.next_hop = next_hop
57934
+ # The list of next hops.
57935
+ #
57936
+ # > - This parameter is returned only by dual-tunnel IPsec connections.
57937
+ # > - This parameter is returned only when the tunnel status is **Phase 2 Negotiation Successful**.
57810
57938
  self.next_hop_tunnel_id_list = next_hop_tunnel_id_list
57811
57939
  # The destination CIDR block of the route.
57812
57940
  self.route_dest = route_dest
@@ -57827,10 +57955,9 @@ class DescribeVcoRouteEntriesResponseBodyVcoRouteEntries(TeaModel):
57827
57955
  self.state = state
57828
57956
  # The ID of the IPsec-VPN connection.
57829
57957
  self.vpn_connection_id = vpn_connection_id
57830
- # The weight of the destination-based route. Valid values:
57958
+ # The weight of the destination-based route.
57831
57959
  #
57832
- # * **0**: a low priority
57833
- # * **100**: a high priority
57960
+ # > The current parameter has no effect.
57834
57961
  self.weight = weight
57835
57962
 
57836
57963
  def validate(self):
@@ -57900,8 +58027,17 @@ class DescribeVcoRouteEntriesResponseBodyVpnRouteCounts(TeaModel):
57900
58027
  route_entry_type: str = None,
57901
58028
  source: str = None,
57902
58029
  ):
58030
+ # The number of route entries.
57903
58031
  self.route_count = route_count
58032
+ # The route type. Valid values:
58033
+ #
58034
+ # * **custom**: destination-based route.
58035
+ # * **bgp**: BGP route.
57904
58036
  self.route_entry_type = route_entry_type
58037
+ # The source of the BGP route. Valid values:
58038
+ #
58039
+ # * **CLOUD**: The current BGP route is learned by the IPsec connection from the transit router.
58040
+ # * **VPN_BGP**: The current BGP route is learned by the IPsec connection from the data center.
57905
58041
  self.source = source
57906
58042
 
57907
58043
  def validate(self):
@@ -57950,8 +58086,11 @@ class DescribeVcoRouteEntriesResponseBody(TeaModel):
57950
58086
  self.request_id = request_id
57951
58087
  # The number of entries returned.
57952
58088
  self.total_count = total_count
57953
- # The list of routes.
58089
+ # The list of route entries.
57954
58090
  self.vco_route_entries = vco_route_entries
58091
+ # The information on route entries of the dual-tunnel IPsec connection.
58092
+ #
58093
+ # > This parameter is returned only for IPsec connections in dual-tunnel mode.
57955
58094
  self.vpn_route_counts = vpn_route_counts
57956
58095
 
57957
58096
  def validate(self):
@@ -61351,7 +61490,9 @@ class DescribeVpnAttachmentsResponseBodyVpnAttachmentsTags(TeaModel):
61351
61490
  key: str = None,
61352
61491
  value: str = None,
61353
61492
  ):
61493
+ # The tag key of the IPsec-VPN connection.
61354
61494
  self.key = key
61495
+ # The tag value of the IPsec-VPN connection.
61355
61496
  self.value = value
61356
61497
 
61357
61498
  def validate(self):
@@ -61404,7 +61545,16 @@ class DescribeVpnAttachmentsResponseBodyVpnAttachments(TeaModel):
61404
61545
  self.instance_id = instance_id
61405
61546
  # The name of the IPsec-VPN connection.
61406
61547
  self.name = name
61548
+ # The system tags of the IPsec-VPN connection.
61549
+ #
61550
+ # You can check whether an IPsec-VPN connection supports BGP based on the system tags.
61551
+ #
61552
+ # **BGPSupport**: indicates whether the IPsec-VPN connection supports BGP.
61553
+ #
61554
+ # * **true**\
61555
+ # * **false**\
61407
61556
  self.tag = tag
61557
+ # The list of tags to be added to the IPsec-VPN connection.
61408
61558
  self.tags = tags
61409
61559
  # The ID of the transit router with which the IPsec-VPN connection is associated.
61410
61560
  self.transit_router_id = transit_router_id
@@ -62114,6 +62264,12 @@ class DescribeVpnConnectionResponseBodyTunnelOptionsSpecificationTunnelOptions(T
62114
62264
  self.tunnel_id = tunnel_id
62115
62265
  # The configuration of Phase 1 negotiations.
62116
62266
  self.tunnel_ike_config = tunnel_ike_config
62267
+ # The order in which the tunnel is created.
62268
+ #
62269
+ # * **1**: Tunnel 1.
62270
+ # * **2**: Tunnel 2.
62271
+ #
62272
+ # > This parameter is returned only if the IPsec-VPN connection is associated with a transit router.
62117
62273
  self.tunnel_index = tunnel_index
62118
62274
  # The configurations of Phase 2 negotiations.
62119
62275
  self.tunnel_ipsec_config = tunnel_ipsec_config
@@ -62534,9 +62690,9 @@ class DescribeVpnConnectionResponseBody(TeaModel):
62534
62690
  self.transit_router_id = transit_router_id
62535
62691
  # The name of the transit router.
62536
62692
  self.transit_router_name = transit_router_name
62537
- # The tunnel configuration of the IPsec-VPN connection.
62693
+ # The tunnel configurations of the IPsec-VPN connection.
62538
62694
  #
62539
- # Parameters in **TunnelOptionsSpecification** are returned only if you query IPsec-VPN connections in dual-tunnel mode.
62695
+ # Parameters in **TunnelOptionsSpecification** are returned only if you query an IPsec-VPN connection in dual-tunnel mode.
62540
62696
  self.tunnel_options_specification = tunnel_options_specification
62541
62697
  # The health check information about the IPsec-VPN connection.
62542
62698
  self.vco_health_check = vco_health_check
@@ -63063,9 +63219,9 @@ class DescribeVpnConnectionsRequest(TeaModel):
63063
63219
  self.customer_gateway_id = customer_gateway_id
63064
63220
  self.owner_account = owner_account
63065
63221
  self.owner_id = owner_id
63066
- # The number of the page to return. Default value: **1**.
63222
+ # The page number of the page to return. Default value: **1**.
63067
63223
  self.page_number = page_number
63068
- # The number of entries to return on each page. Default value: **10**. Valid values: **1** to **50**.
63224
+ # The number of entries returned on each page. Default value: **10**. Valid values: **1** to **50**.
63069
63225
  self.page_size = page_size
63070
63226
  # The ID of the region where the IPsec-VPN connection is created.
63071
63227
  #
@@ -63635,6 +63791,12 @@ class DescribeVpnConnectionsResponseBodyVpnConnectionsVpnConnectionTunnelOptions
63635
63791
  self.tunnel_id = tunnel_id
63636
63792
  # The configuration of Phase 1 negotiations.
63637
63793
  self.tunnel_ike_config = tunnel_ike_config
63794
+ # The order in which the tunnel is created.
63795
+ #
63796
+ # * **1**: Tunnel 1.
63797
+ # * **2**: Tunnel 2.
63798
+ #
63799
+ # > This parameter is returned only if the IPsec-VPN connection is associated with a transit router.
63638
63800
  self.tunnel_index = tunnel_index
63639
63801
  # The configurations of Phase 2 negotiations.
63640
63802
  self.tunnel_ipsec_config = tunnel_ipsec_config
@@ -64043,9 +64205,9 @@ class DescribeVpnConnectionsResponseBodyVpnConnectionsVpnConnection(TeaModel):
64043
64205
  self.transit_router_id = transit_router_id
64044
64206
  # The name of the transit router.
64045
64207
  self.transit_router_name = transit_router_name
64046
- # The tunnel configuration of the IPsec-VPN connection.
64208
+ # The tunnel configurations of the IPsec-VPN connection.
64047
64209
  #
64048
- # Parameters in **TunnelOptionsSpecification** are returned only if you query IPsec-VPN connections in dual-tunnel mode.
64210
+ # Parameters in **TunnelOptionsSpecification** are returned only if you query an IPsec-VPN connection in dual-tunnel mode.
64049
64211
  self.tunnel_options_specification = tunnel_options_specification
64050
64212
  # The health check configuration of the IPsec-VPN connection.
64051
64213
  self.vco_health_check = vco_health_check
@@ -64257,7 +64419,7 @@ class DescribeVpnConnectionsResponseBody(TeaModel):
64257
64419
  self.request_id = request_id
64258
64420
  # The total number of entries returned.
64259
64421
  self.total_count = total_count
64260
- # The information about the IPsec-VPN connection.
64422
+ # The information about the IPsec-VPN connections.
64261
64423
  self.vpn_connections = vpn_connections
64262
64424
 
64263
64425
  def validate(self):
@@ -64353,18 +64515,18 @@ class DescribeVpnCrossAccountAuthorizationsRequest(TeaModel):
64353
64515
  ):
64354
64516
  # The client token that is used to ensure the idempotence of the request.
64355
64517
  #
64356
- # You can use the client to generate the value, but you must make sure that it is unique among different requests. ClientToken can contain only ASCII characters.
64518
+ # You can use the client to generate the token, but you must make sure that the token is unique among different requests. The client token can contain only ASCII characters.
64357
64519
  #
64358
- # > If you do not set this parameter, the system automatically uses **RequestId** as **ClientToken**. **RequestId** of each API request may be different.
64520
+ # > If you do not specify this parameter, the system automatically uses the **request ID** as the **client token**. The **request ID** may be different for each request.
64359
64521
  self.client_token = client_token
64360
64522
  self.owner_account = owner_account
64361
- # The number of the page to return. Default value: **1**.
64523
+ # The page number. Default value: **1**.
64362
64524
  self.page_number = page_number
64363
- # The number of entries to return on each page. Default value: **10**. Valid values: **1** to **50**.
64525
+ # The number of entries to return per page. Default value: **10**. Valid values: **1** to **50**.
64364
64526
  self.page_size = page_size
64365
64527
  # The ID of the region to which the IPsec-VPN connection belongs.
64366
64528
  #
64367
- # You can call the [DescribeRegions](https://help.aliyun.com/document_detail/36063.html) operation to query the most recent region list.
64529
+ # You can call the [DescribeRegions](https://help.aliyun.com/document_detail/36063.html) operation to query the region ID.
64368
64530
  #
64369
64531
  # This parameter is required.
64370
64532
  self.region_id = region_id
@@ -64437,13 +64599,13 @@ class DescribeVpnCrossAccountAuthorizationsResponseBodyCrossAccountAuthorization
64437
64599
  self.ali_uid = ali_uid
64438
64600
  # The ID of the CEN instance.
64439
64601
  self.bind_instance = bind_instance
64440
- # The resource type of the authorization.
64602
+ # The type of resource that can be associated with the IPsec-VPN connection.
64441
64603
  #
64442
- # The value is set to **CEN**, which indicates that the IPsec-VPN connection can be associated with a transit router of a Cloud Enterprise Network (CEN) instance that belongs to another Alibaba Cloud account.
64604
+ # Only **CEN** can be returned, which indicates that the IPsec-VPN connection is authorized to be associated with the transit router of a Cloud Enterprise Network (CEN) instance that belongs to another Alibaba Cloud account.
64443
64605
  self.bind_product = bind_product
64444
- # The ID of the Alibaba Cloud account whose resource the IPsec-VPN connection can be associated with.
64606
+ # The ID of the Alibaba Cloud account whose resources the IPsec-VPN connection is authorized to be associated with.
64445
64607
  self.bind_uid = bind_uid
64446
- # The timestamp when the authorization for the IPsec-VPN connection was created.
64608
+ # The time when the authorization for the IPsec-VPN connection was created.
64447
64609
  #
64448
64610
  # This value is a UNIX timestamp representing the number of milliseconds that have elapsed since the epoch time January 1, 1970, 00:00:00 UTC.
64449
64611
  self.creation_time = creation_time
@@ -64501,11 +64663,11 @@ class DescribeVpnCrossAccountAuthorizationsResponseBody(TeaModel):
64501
64663
  ):
64502
64664
  # The cross-account authorization information about the IPsec-VPN connection.
64503
64665
  self.cross_account_authorizations = cross_account_authorizations
64504
- # The page number of the returned page.
64666
+ # The page number.
64505
64667
  self.page_number = page_number
64506
- # The number of entries returned per page.
64668
+ # The number of entries per page.
64507
64669
  self.page_size = page_size
64508
- # The ID of the request.
64670
+ # The request ID.
64509
64671
  self.request_id = request_id
64510
64672
  # The number of entries returned.
64511
64673
  self.total_count = total_count
@@ -67045,9 +67207,7 @@ class DescribeVpnSslServerLogsResponseBody(TeaModel):
67045
67207
  ):
67046
67208
  # The number of log entries.
67047
67209
  self.count = count
67048
- # An array of strings.
67049
- #
67050
- # Each item in the array is a log entry.
67210
+ # Log information list.
67051
67211
  self.data = data
67052
67212
  # Indicates whether the log is accurate. Valid values:
67053
67213
  #
@@ -67818,10 +67978,10 @@ class DiagnoseVpnGatewayRequest(TeaModel):
67818
67978
  #
67819
67979
  # > If you do not specify this parameter, the system automatically uses the request ID as the client token. The request ID may be different for each request.
67820
67980
  self.client_token = client_token
67821
- # The configuration when you check the connectivity of the IPsec-VPN connection. Valid values:
67981
+ # Check the connectivity of the destination address. Valid values:
67822
67982
  #
67823
- # * **PrivateSourceIp**: the source IP address used when you check the connectivity of the IPsec-VPN connection. The source IP address must be on the VPC side.
67824
- # * **PrivateDestinationIp**: the destination IP address used when you check the connectivity of the IPsec-VPN connection. The destination IP address must be on the data center side.
67983
+ # * **PrivateSourceIp**: the source IP address. The source IP address must be on the VPC side.
67984
+ # * **PrivateDestinationIp**: the destination IP address. The destination IP address must be on the data center side.
67825
67985
  self.ipsec_extend_info = ipsec_extend_info
67826
67986
  # The region ID of the VPN gateway.
67827
67987
  #
@@ -67890,7 +68050,9 @@ class DiagnoseVpnGatewayResponseBody(TeaModel):
67890
68050
  diagnose_id: str = None,
67891
68051
  request_id: str = None,
67892
68052
  ):
67893
- # The ID of the diagnostic.
68053
+ # The diagnostic ID.
68054
+ #
68055
+ # After a diagnostic ID is returned, you can call [GetVpnGatewayDiagnoseResult](https://help.aliyun.com/document_detail/2521963.html) to query the diagnostic report.
67894
68056
  self.diagnose_id = diagnose_id
67895
68057
  # The request ID.
67896
68058
  self.request_id = request_id
@@ -75612,9 +75774,7 @@ class ListIpsecServerLogsResponseBody(TeaModel):
75612
75774
  ):
75613
75775
  # The number of entries on the current page.
75614
75776
  self.count = count
75615
- # An array of strings.
75616
- #
75617
- # Each item in the array is a log entry.
75777
+ # Log information list.
75618
75778
  self.data = data
75619
75779
  # Indicates whether the log is accurate. Valid values:
75620
75780
  #
@@ -86674,11 +86834,20 @@ class ModifyIpv6AddressAttributeRequest(TeaModel):
86674
86834
  resource_owner_account: str = None,
86675
86835
  resource_owner_id: int = None,
86676
86836
  ):
86837
+ # The client token that is used to ensure the idempotence of the request.
86838
+ #
86839
+ # You can use the client to generate the token, but you must make sure that the token is unique among different requests. The client token can contain only ASCII characters.
86840
+ #
86841
+ # > If you do not specify this parameter, the system automatically uses the **request ID** as the **client token**. The **request ID** may be different for each request.
86677
86842
  self.client_token = client_token
86678
86843
  # The description of the IPv6 address.
86679
86844
  #
86680
- # It must be 2 to 256 characters in length, and can contain letters, digits, periods (.), underscores (_), and hyphens (-). It must start with a letter. The name must start with a letter and cannot start with `http://` or `https://`.
86845
+ # The description must be 0 to 256 characters in length and cannot start with `http://` or `https://`.
86681
86846
  self.description = description
86847
+ # Specifies whether to perform a dry run, without performing the actual request. Valid values:
86848
+ #
86849
+ # * **true**: performs only a dry run. The system checks the request for potential issues, including missing parameter values, incorrect request syntax, and service limits. If the request fails the dry run, an error message is returned. If the request passes the dry run, the `DryRunOperation` error code is returned.
86850
+ # * **false** (default): performs a dry run and performs the actual request. If the request passes the dry run, a 2xx HTTP status code is returned and the operation is performed.
86682
86851
  self.dry_run = dry_run
86683
86852
  # The ID of the IPv6 address.
86684
86853
  #
@@ -86686,7 +86855,7 @@ class ModifyIpv6AddressAttributeRequest(TeaModel):
86686
86855
  self.ipv_6address_id = ipv_6address_id
86687
86856
  # The name of the IPv6 address.
86688
86857
  #
86689
- # The name must be 2 to 128 characters in length, and can contain letters, digits, periods (.), underscores (_), and hyphens (-). The name must start with a letter. The name must start with a letter and cannot start with `http://` or `https://`.
86858
+ # The name must be 0 to 128 characters in length and cannot start with `http://` or `https://`.
86690
86859
  self.name = name
86691
86860
  self.owner_account = owner_account
86692
86861
  self.owner_id = owner_id
@@ -86836,9 +87005,20 @@ class ModifyIpv6GatewayAttributeRequest(TeaModel):
86836
87005
  resource_owner_account: str = None,
86837
87006
  resource_owner_id: int = None,
86838
87007
  ):
87008
+ # The client token that is used to ensure the idempotence of the request.
87009
+ #
87010
+ # You can use the client to generate the token, but you must make sure that the token is unique among different requests. The client token can contain only ASCII characters.
87011
+ #
87012
+ # > If you do not specify this parameter, the system automatically uses the **request ID** as the **client token**. The **request ID** may be different for each request.
86839
87013
  self.client_token = client_token
86840
87014
  # The description of the IPv6 gateway.
87015
+ #
87016
+ # The description must be 0 to 256 characters in length and cannot start with `http://` or `https://`.
86841
87017
  self.description = description
87018
+ # Specifies whether to perform only a dry run, without performing the actual request. Valid values:
87019
+ #
87020
+ # * **true**: performs only a dry run. The system checks the request for potential issues, including invalid AccessKey pairs, unauthorized RAM users, and missing parameter values. If the request fails the dry run, an error message is returned. If the request passes dry run, the `DryRunOperation` error code is returned.
87021
+ # * **false**: sends the API request. After the request passes the check, a 2XX HTTP status code is returned and the gateway endpoint is associated with the route table. This is the default value.
86842
87022
  self.dry_run = dry_run
86843
87023
  # The ID of the IPv6 gateway that you want to modify.
86844
87024
  #
@@ -86846,7 +87026,7 @@ class ModifyIpv6GatewayAttributeRequest(TeaModel):
86846
87026
  self.ipv_6gateway_id = ipv_6gateway_id
86847
87027
  # The name of the IPv6 gateway.
86848
87028
  #
86849
- # It must be 2 to 256 characters in length, and can contain letters, digits, periods (.), underscores (_), and hyphens (-). It must start with a letter. The name must start with a letter and cannot start with `http://` or `https://`.
87029
+ # The name must be 0 to 128 characters in length and cannot start with `http://` or `https://`.
86850
87030
  self.name = name
86851
87031
  self.owner_account = owner_account
86852
87032
  self.owner_id = owner_id
@@ -89552,7 +89732,45 @@ class ModifySslVpnServerRequest(TeaModel):
89552
89732
  # * **AES-256-CBC**\
89553
89733
  # * **none**\
89554
89734
  self.cipher = cipher
89555
- # The client IP address pool.
89735
+ # The client CIDR block.
89736
+ #
89737
+ # The CIDR block from which an IP address is allocated to the virtual network interface controller (NIC) of the client, rather than the private CIDR block.
89738
+ #
89739
+ # If the client accesses the SSL server over an SSL-VPN connection, the VPN gateway assigns an IP address from the specified client CIDR block for the client to access cloud resources.
89740
+ #
89741
+ # Make sure that the number of IP addresses in the client CIDR block is at least four times the maximum number of SSL-VPN connections supported by the VPN gateway.
89742
+ #
89743
+ # <details>
89744
+ # <summary>Click to view the reason.</summary>
89745
+ #
89746
+ # For example, if you specify 192.168.0.0/24 as the client CIDR block, the system first divides a subnet CIDR block with a subnet mask of 30 from 192.168.0.0/24, such as 192.168.0.4/30. This subnet provides up to four IP addresses. Then, the system allocates an IP address from 192.168.0.4/30 to the client and uses the other three IP addresses to ensure network communication. In this case, one client consumes four IP addresses. Therefore, to ensure that an IP address is assigned to your client, the number of IP addresses in the client CIDR block must be at least four times the maximum number of SSL-VPN connections supported by the VPN gateway with which the SSL server is associated.
89747
+ # </details>
89748
+ # <details>
89749
+ # <summary>Click to view the CIDR blocks that are not supported.</summary>
89750
+ #
89751
+ # * 100.64.0.0~100.127.255.255
89752
+ # * 127.0.0.0~127.255.255.255
89753
+ # * 169.254.0.0~169.254.255.255
89754
+ # * 224.0.0.0~239.255.255.255
89755
+ # * 255.0.0.0~255.255.255.255
89756
+ # </details>
89757
+ # <details>
89758
+ # <summary>Click to view the recommended client CIDR blocks for different numbers of SSL-VPN connections.</summary>
89759
+ #
89760
+ # * If the number of SSL-VPN connections is 5, we recommend that you specify a client CIDR block with a subnet mask that is less than or equal to 27 bits in length. Examples: 10.0.0.0/27 and 10.0.0.0/26.
89761
+ # * If the number of SSL-VPN connections is 10, we recommend that you specify a client CIDR block with a subnet mask that is less than or equal to 26 bits in length. Examples: 10.0.0.0/26 and 10.0.0.0/25.
89762
+ # * If the number of SSL-VPN connections is 20, we recommend that you specify a client CIDR block with a subnet mask that is less than or equal to 25 bits in length. Examples: 10.0.0.0/25 and 10.0.0.0/24.
89763
+ # * If the number of SSL-VPN connections is 50, we recommend that you specify a client CIDR block with a subnet mask that is less than or equal to 24 bits in length. Examples: 10.0.0.0/24 and 10.0.0.0/23.
89764
+ # * If the number of SSL-VPN connections is 100, we recommend that you specify a client CIDR block with a subnet mask that is less than or equal to 23 bits in length. Examples: 10.0.0.0/23 and 10.0.0.0/22.
89765
+ # * If the number of SSL-VPN connections is 200, we recommend that you specify a client CIDR block with a subnet mask that is less than or equal to 22 bits in length. Examples: 10.0.0.0/22 and 10.0.0.0/21.
89766
+ # * If the number of SSL-VPN connections is 500, we recommend that you specify a client CIDR block with a subnet mask that is less than or equal to 21 bits in length. Examples: 10.0.0.0/21 and 10.0.0.0/20.
89767
+ # * If the number of SSL-VPN connections is 1,000, we recommend that you specify a client CIDR block with a subnet mask that is less than or equal to 20 bits in length. Examples: 10.0.0.0/20 and 10.0.0.0/19.
89768
+ # </details>
89769
+ #
89770
+ # > - The subnet mask of the client CIDR block must be 16 to 29 bits in length.
89771
+ # > - Make sure that the client CIDR block does not overlap with the local CIDR block, the VPC CIDR block, or route CIDR blocks associated with the client.
89772
+ # > - We recommend that you use 10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16, or one of their subnets as the client CIDR block. If you want to specify a public CIDR block as the client CIDR block, you must specify the public CIDR block as the user CIDR block of the virtual private cloud (VPC). This way, the VPC can access the public CIDR block. For more information, see [VPC FAQs](https://help.aliyun.com/document_detail/185311.html).
89773
+ # > - After you create an SSL server, the system automatically adds routes that point to the client CIDR block to the VPC route table. Do not manually add routes that point to the client CIDR block. Otherwise, SSL-VPN connections cannot work as expected.
89556
89774
  self.client_ip_pool = client_ip_pool
89557
89775
  # The client token that is used to ensure the idempotence of the request.
89558
89776
  #
@@ -89565,13 +89783,14 @@ class ModifySslVpnServerRequest(TeaModel):
89565
89783
  # * **true** (default)
89566
89784
  # * **false**\
89567
89785
  self.compress = compress
89568
- # Specifies whether to enable two-factor authentication. If you enable two-factor authentication, you must also specify an IDaaS EIAM instance ID and an IDaaS application ID. Valid values:
89786
+ # Specifies whether to enable two-factor authentication. To enable two-factor authentication, you need to specify **IDaaSInstanceId**, **IDaaSRegionId**, and **IDaaSApplicationId**. Valid values:
89569
89787
  #
89570
- # * **true**\
89571
- # * **false**\
89788
+ # * **true**: enables the feature.
89789
+ # * **false**: disables the feature.
89572
89790
  #
89573
- # > - If you use two-factor authentication for the first time, you must first complete [authorization](https://ram.console.aliyun.com/role/authorization?request=%7B%22Services%22%3A%5B%7B%22Service%22%3A%22VPN%22%2C%22Roles%22%3A%5B%7B%22RoleName%22%3A%22AliyunVpnAccessingIdaasRole%22%2C%22TemplateId%22%3A%22IdaasRole%22%7D%5D%7D%5D%2C%22ReturnUrl%22%3A%22https%3A%2F%2Fvpc.console.aliyun.com%2Fsslvpn%2Fcn-shanghai%2Fvpn-servers%22%7D).
89574
- # > - IDaaS EIAM 1.0 instances are no longer for purchase. If your Alibaba Cloud account has IDaaS EIAM 1.0 instances, the IDaaS EIAM 1.0 instances can be associated after two-factor authentication is enabled. If your Alibaba Cloud account does not have IDaaS EIAM 1.0 instances, only IDaaS EIAM 2.0 instances can be associated after two-factor authentication is enabled.
89791
+ # > - If you use two-factor authentication for the first time, you must first complete [authorization](https://ram.console.aliyun.com/role/authorization?request=%7B%22Services%22%3A%5B%7B%22Service%22%3A%22VPN%22%2C%22Roles%22%3A%5B%7B%22RoleName%22%3A%22AliyunVpnAccessingIdaasRole%22%2C%22TemplateId%22%3A%22IdaasRole%22%7D%5D%7D%5D%2C%22ReturnUrl%22%3A%22https%3A%2F%2Fvpc.console.aliyun.com%2Fsslvpn%2Fcn-shanghai%2Fvpn-servers%22%7D).
89792
+ # > - When you create an SSL server in the UAE (Dubai) region, we recommend that you associate the SSL server with an IDaaS EIAM 2.0 instance in Singapore to reduce latency.
89793
+ # > - IDaaS EIAM 1.0 instances are no longer available for purchase. If your Alibaba Cloud account has IDaaS EIAM 1.0 instances, the IDaaS EIAM 1.0 instances can be associated after two-factor authentication is enabled. If your Alibaba Cloud account does not have IDaaS EIAM 1.0 instances, only IDaaS EIAM 2.0 instances can be associated after two-factor authentication is enabled.
89575
89794
  self.enable_multi_factor_auth = enable_multi_factor_auth
89576
89795
  # The ID of the IDaaS application.
89577
89796
  #
@@ -89582,7 +89801,18 @@ class ModifySslVpnServerRequest(TeaModel):
89582
89801
  self.idaa_sinstance_id = idaa_sinstance_id
89583
89802
  # The region ID of the IDaaS EIAM instance.
89584
89803
  self.idaa_sregion_id = idaa_sregion_id
89585
- # The CIDR block of the client.
89804
+ # The local CIDR block.
89805
+ #
89806
+ # The CIDR block that your client needs to access by using the SSL-VPN connection.
89807
+ #
89808
+ # This value can be the CIDR block of a VPC, a vSwitch, a data center that is connected to a VPC by using an Express Connect circuit, or an Alibaba Cloud service such as Object Storage Service (OSS).
89809
+ #
89810
+ # The subnet mask of the specified local CIDR block must be 8 to 32 bits in length. You cannot specify the following CIDR blocks as the local CIDR blocks:
89811
+ #
89812
+ # * 127.0.0.0~127.255.255.255
89813
+ # * 169.254.0.0~169.254.255.255
89814
+ # * 224.0.0.0~239.255.255.255
89815
+ # * 255.0.0.0~255.255.255.255
89586
89816
  self.local_subnet = local_subnet
89587
89817
  # The name of the SSL server.
89588
89818
  #
@@ -89726,7 +89956,7 @@ class ModifySslVpnServerResponseBody(TeaModel):
89726
89956
  ):
89727
89957
  # The encryption algorithm.
89728
89958
  self.cipher = cipher
89729
- # The client IP address pool.
89959
+ # The client CIDR block.
89730
89960
  self.client_ip_pool = client_ip_pool
89731
89961
  # Indicates whether data compression is enabled.
89732
89962
  self.compress = compress
@@ -89750,7 +89980,7 @@ class ModifySslVpnServerResponseBody(TeaModel):
89750
89980
  self.idaa_sinstance_version = idaa_sinstance_version
89751
89981
  # The public IP address.
89752
89982
  self.internet_ip = internet_ip
89753
- # The CIDR block of the client.
89983
+ # The local CIDR block.
89754
89984
  self.local_subnet = local_subnet
89755
89985
  # The maximum number of connections.
89756
89986
  self.max_connections = max_connections
@@ -89923,7 +90153,7 @@ class ModifyTunnelAttributeRequestTunnelOptionsSpecificationTunnelBgpConfig(TeaM
89923
90153
  self.local_bgp_ip = local_bgp_ip
89924
90154
  # The CIDR block of the tunnel.
89925
90155
  #
89926
- # The CIDR block must fall into 169.254.0.0/16. The subnet mask of the CIDR block must be 30 bits in length.
90156
+ # The CIDR block must fall within the 169.254.0.0/16 range. The subnet mask of the CIDR block must be 30 bits in length.
89927
90157
  self.tunnel_cidr = tunnel_cidr
89928
90158
 
89929
90159
  def validate(self):
@@ -89974,28 +90204,28 @@ class ModifyTunnelAttributeRequestTunnelOptionsSpecificationTunnelIkeConfig(TeaM
89974
90204
  self.ike_auth_alg = ike_auth_alg
89975
90205
  # The encryption algorithm that is used in IKE Phase 1 negotiations.
89976
90206
  #
89977
- # * Valid values when the IPsec connection is attached to a standard VPN gateway: **aes**, **aes192**, **sha256**, **des**, and **3des**.
89978
- # * Valid values when the IPsec connection is attached to a VPN gateway that uses an SM certificate: **sm4**.
90207
+ # * Valid values when the IPsec connection is attached to a standard VPN gateway: **aes**, **aes192**, **aes256**, **des**, and **3des**.
90208
+ # * If the IPsec connection is attached to a VPN gateway that uses an SM certificate, set the value to **sm4**.
89979
90209
  self.ike_enc_alg = ike_enc_alg
89980
- # The SA lifetime that is used in IKE Phase 1 negotiations. Unit: seconds. Valid values: **0 to 86400**.
90210
+ # The SA lifetime as a result of Phase 1 negotiations. Unit: seconds. Valid values: **0 to 86400**.
89981
90211
  self.ike_lifetime = ike_lifetime
89982
- # The IKE negotiation mode. Valid values:
90212
+ # The negotiation mode of IKE. Valid values:
89983
90213
  #
89984
90214
  # * **main:** This mode offers higher security during negotiations.
89985
- # * **aggressive:** This mode is faster and has a higher success rate.
90215
+ # * **aggressive**: This mode is faster and has a higher success rate.
89986
90216
  self.ike_mode = ike_mode
89987
- # The Diffie-Hellman (DH) key exchange algorithm that is used in IKE Phase 1 negotiations. Valid values: **group1**, **group2**, **group5**, and **group14**.
90217
+ # The Diffie-Hellman key exchange algorithm that is used in Phase 1 negotiations. Valid values: **group1**, **group2**, **group5**, and **group14**.
89988
90218
  self.ike_pfs = ike_pfs
89989
- # The IKE version. Valid values: **ikev1** and **ikev2**.
90219
+ # The version of the IKE protocol. Valid values: **ikev1** and **ikev2**.
89990
90220
  self.ike_version = ike_version
89991
- # The tunnel identifier. The identifier can be up to 100 characters in length, and supports fully qualified domain names (FQDNs) and IP addresses. The default identifier is the tunnel IP address.
90221
+ # The tunnel identifier. The identifier can be up to 100 characters in length, and supports FQDNs and IP addresses. The default value is the IP address of the tunnel.
89992
90222
  self.local_id = local_id
89993
90223
  # The pre-shared key that is used to verify identities between the tunnel and peer.
89994
90224
  #
89995
- # * It must be 1 to 100 characters in length, and can contain letters, digits, and the following characters: ``~!`@#$%^&*()_-+={}[]|;:\\",.<>/?``
89996
- # * If you do not specify a pre-shared key, the system generates a random 16-character string as the pre-shared key. You can call the [DescribeVpnConnection](https://help.aliyun.com/document_detail/120374.html) operation to query the pre-shared key that is generated by the system.
90225
+ # * The key must be 1 to 100 characters in length and can contain digits, letters, and the following special characters: ``~!`@#$%^&*()_-+={}[]|;:\\",.<>/?``
90226
+ # * If you do not specify a pre-shared key, the system randomly generates a 16-bit string as the pre-shared key. You can call the [DescribeVpnConnection](https://help.aliyun.com/document_detail/120374.html) operation to query the pre-shared key that is automatically generated by the system.
89997
90227
  #
89998
- # > The pre-shared key that is configured for the tunnel and the tunnel peer must be the same. Otherwise, the system cannot establish the tunnel.
90228
+ # > The pre-shared key that is configured for the tunnel and the tunnel peer must be the same. Otherwise, the system cannot establish the tunnel.
89999
90229
  self.psk = psk
90000
90230
  # The peer identifier. The identifier can be up to 100 characters in length, and supports FQDNs and IP addresses. The default identifier is the IP address of the customer gateway associated with the tunnel.
90001
90231
  self.remote_id = remote_id
@@ -90067,12 +90297,12 @@ class ModifyTunnelAttributeRequestTunnelOptionsSpecificationTunnelIpsecConfig(Te
90067
90297
  self.ipsec_auth_alg = ipsec_auth_alg
90068
90298
  # The encryption algorithm that is used in IPsec Phase 2 negotiations.
90069
90299
  #
90070
- # * Valid values when the IPsec connection is attached to a standard VPN gateway: **aes**, **aes192**, **sha256**, **des**, and **3des**.
90071
- # * Valid values when the IPsec connection is attached to a VPN gateway that uses an SM certificate: **sm4**.
90300
+ # * Valid values when the IPsec connection is attached to a standard VPN gateway: **aes**, **aes192**, **aes256**, **des**, and **3des**.
90301
+ # * If the IPsec connection is attached to a VPN gateway that uses an SM certificate, set the value to **sm4**.
90072
90302
  self.ipsec_enc_alg = ipsec_enc_alg
90073
- # The SA lifetime that is used in IPsec Phase 2 negotiations. Unit: seconds. Valid values: **0 to 86400**.
90303
+ # The SA lifetime as a result of Phase 2 negotiations. Unit: seconds. Valid values: **0 to 86400**.
90074
90304
  self.ipsec_lifetime = ipsec_lifetime
90075
- # The DH key exchange algorithm that is used in IPsec Phase 2 negotiations. Valid values: **disabled**, **group1**, **group2**, **group5**, and **group14**.
90305
+ # The Diffie-Hellman key exchange algorithm that is used in Phase 2 negotiations. Valid values: **disabled**, **group1**, **group2**, **group5**, and **group14**.
90076
90306
  self.ipsec_pfs = ipsec_pfs
90077
90307
 
90078
90308
  def validate(self):
@@ -90119,15 +90349,15 @@ class ModifyTunnelAttributeRequestTunnelOptionsSpecification(TeaModel):
90119
90349
  tunnel_ipsec_config: ModifyTunnelAttributeRequestTunnelOptionsSpecificationTunnelIpsecConfig = None,
90120
90350
  ):
90121
90351
  self.customer_gateway_id = customer_gateway_id
90122
- # Specifies whether to enable the dead peer detection (DPD) feature. Valid values:
90352
+ # Specifies whether to enable dead peer detection (DPD). Valid values: Valid values:
90123
90353
  #
90124
- # * **true**: DPD is enabled. The IPsec initiator sends DPD packets to verify the existence and availability of the IPsec peer. If no response is received from the peer within a specified period of time, the IPsec peer is considered disconnected. Then, the ISAKMP SA, IPsec SA, and IPsec tunnel are deleted.
90354
+ # * **true** The IPsec initiator sends DPD packets to verify the existence and availability of the IPsec peer. If no response is received from the peer within a specified period of time, the IPsec peer is considered disconnected. Then, the ISAKMP SA, IPsec SA, and IPsec tunnel are deleted.
90125
90355
  # * **false**: DPD is disabled. The IPsec initiator does not send DPD packets.
90126
90356
  self.enable_dpd = enable_dpd
90127
90357
  # Specifies whether to enable NAT traversal. Valid values:
90128
90358
  #
90129
- # * **true**: NAT traversal is enabled. After NAT traversal is enabled, the initiator does not check the UDP ports during Internet Key Exchange (IKE) negotiations and can automatically discover NAT gateway devices along the IPsec-VPN tunnel.
90130
- # * **false**: NAT traversal is disabled.
90359
+ # * **true**: enables NAT traversal. After NAT traversal is enabled, the initiator does not check the UDP ports during IKE negotiations and can automatically discover NAT gateway devices along the IPsec-VPN tunnel.
90360
+ # * **false**: disables NAT traversal.
90131
90361
  self.enable_nat_traversal = enable_nat_traversal
90132
90362
  # The peer certificate authority (CA) certificate when you want to attach the IPsec connection to a virtual private network (VPN) gateway that uses a ShangMi (SM) certificate.
90133
90363
  self.remote_ca_certificate = remote_ca_certificate
@@ -91190,7 +91420,7 @@ class ModifyVcoRouteEntryWeightRequest(TeaModel):
91190
91420
  # The tunneling protocol. Set the value to **Ipsec**, which specifies the IPsec tunneling protocol.
91191
91421
  self.overlay_mode = overlay_mode
91192
91422
  self.owner_account = owner_account
91193
- # The ID of the region where the IPsec-VPN connection is established.
91423
+ # The region ID of the IPsec-VPN connection.
91194
91424
  #
91195
91425
  # You can call the [DescribeRegions](https://help.aliyun.com/document_detail/36063.html) operation to query the most recent region list.
91196
91426
  #
@@ -92139,8 +92369,15 @@ class ModifyVpnAttachmentAttributeRequestTunnelOptionsSpecificationTunnelBgpConf
92139
92369
  local_bgp_ip: str = None,
92140
92370
  tunnel_cidr: str = None,
92141
92371
  ):
92372
+ # The autonomous system number (ASN) of the tunnel on the Alibaba Cloud side. Valid values: **1** to **4294967295**. Default value: **45104**.
92373
+ #
92374
+ # > We recommend that you use a private ASN to establish BGP connections to Alibaba Cloud. Refer to the relevant documentation for the private ASN range.
92142
92375
  self.local_asn = local_asn
92376
+ # The BGP IP address of the tunnel on the Alibaba Cloud side. The address is an IP address that falls within the BGP CIDR block.
92143
92377
  self.local_bgp_ip = local_bgp_ip
92378
+ # The BGP CIDR block of the tunnel. The CIDR block must fall within 169.254.0.0/16 and the mask of the CIDR block must be 30 bits in length. The CIDR block cannot be 169.254.0.0/30, 169.254.1.0/30, 169.254.2.0/30, 169.254.3.0/30, 169.254.4.0/30, 169.254.5.0/30, 169.254.6.0/30, or 169.254.169.252/30.
92379
+ #
92380
+ # > The two tunnels of an IPsec connection must use different CIDR blocks.
92144
92381
  self.tunnel_cidr = tunnel_cidr
92145
92382
 
92146
92383
  def validate(self):
@@ -92184,14 +92421,39 @@ class ModifyVpnAttachmentAttributeRequestTunnelOptionsSpecificationTunnelIkeConf
92184
92421
  psk: str = None,
92185
92422
  remote_id: str = None,
92186
92423
  ):
92424
+ # The authentication algorithm that is used in Phase 1 negotiations. Valid values: **md5**, **sha1**, **sha256**, **sha384**, and **sha512**.
92187
92425
  self.ike_auth_alg = ike_auth_alg
92426
+ # The encryption algorithm that is used in Phase 1 negotiations. Valid values: **aes**, **aes192**, **aes256**, **des**, and **3des**.
92188
92427
  self.ike_enc_alg = ike_enc_alg
92428
+ # The SA lifetime as a result of Phase 1 negotiations. Unit: seconds.
92429
+ #
92430
+ # Valid values: **0** to **86400**.
92189
92431
  self.ike_lifetime = ike_lifetime
92432
+ # The negotiation mode of IKE. Valid values: **main** and **aggressive**.
92433
+ #
92434
+ # * **main:** This mode offers higher security during negotiations.
92435
+ # * **aggressive**: This mode is faster with a higher success rate.
92190
92436
  self.ike_mode = ike_mode
92437
+ # The Diffie-Hellman key exchange algorithm that is used in Phase 1 negotiations. Valid values: **group1**, **group2**, **group5**, and **group14**.
92191
92438
  self.ike_pfs = ike_pfs
92439
+ # The version of the IKE protocol. Valid values: **ikev1** and **ikev2**.
92440
+ #
92441
+ # Compared with IKEv1, IKEv2 simplifies the SA negotiation process and provides better support for scenarios with multiple CIDR blocks.
92192
92442
  self.ike_version = ike_version
92443
+ # The identifier of the tunnel on the Alibaba Cloud side, which is used in Phase 1 negotiations. The identifier cannot exceed 100 characters in length and cannot contain spaces.
92444
+ #
92445
+ # **LocalId** supports fully qualified domain names (FQDNs). If you use an FQDN, we recommend that you set the negotiation mode to **aggressive**.
92193
92446
  self.local_id = local_id
92447
+ # The pre-shared key that is used for identity authentication between the tunnel and the tunnel peer.
92448
+ #
92449
+ # * The key must be 1 to 100 characters in length, and can contain digits, and letters. The key cannot contain spaces. ``~!\\`@#$%^&*()_-+={}[]|;:\\",.<>/?``
92450
+ # * If you do not specify a pre-shared key, the system randomly generates a 16-bit string as the pre-shared key. You can call the [DescribeVpnAttachments](https://help.aliyun.com/document_detail/2526939.html) operation to query the pre-shared key that is automatically generated by the system.
92451
+ #
92452
+ # > The tunnel and the tunnel peer must use the same pre-shared key. Otherwise, the tunnel cannot be established.
92194
92453
  self.psk = psk
92454
+ # The identifier of the tunnel peer, which is used in Phase 1 negotiations. The identifier cannot exceed 100 characters in length and cannot contain spaces.
92455
+ #
92456
+ # **RemoteId** supports FQDNs. If you use an FQDN, we recommend that you set the negotiation mode to **aggressive**.
92195
92457
  self.remote_id = remote_id
92196
92458
 
92197
92459
  def validate(self):
@@ -92254,9 +92516,19 @@ class ModifyVpnAttachmentAttributeRequestTunnelOptionsSpecificationTunnelIpsecCo
92254
92516
  ipsec_lifetime: int = None,
92255
92517
  ipsec_pfs: str = None,
92256
92518
  ):
92519
+ # The authentication algorithm that is used in Phase 2 negotiations.
92520
+ #
92521
+ # Valid values: **md5**, **sha1**, **sha256**, **sha384**, and **sha512**.
92257
92522
  self.ipsec_auth_alg = ipsec_auth_alg
92523
+ # The encryption algorithm that is used in Phase 2 negotiations. Valid values: **aes**, **aes192**, **aes256**, **des**, and **3des**.
92258
92524
  self.ipsec_enc_alg = ipsec_enc_alg
92525
+ # The SA lifetime as a result of Phase 2 negotiations. Unit: seconds.
92526
+ #
92527
+ # Valid values: **0** to **86400**.
92259
92528
  self.ipsec_lifetime = ipsec_lifetime
92529
+ # The Diffie-Hellman key exchange algorithm that is used in Phase 2 negotiations.
92530
+ #
92531
+ # Valid values: **disabled**, **group1**, **group2**, **group5**, and **group14**.
92260
92532
  self.ipsec_pfs = ipsec_pfs
92261
92533
 
92262
92534
  def validate(self):
@@ -92303,13 +92575,34 @@ class ModifyVpnAttachmentAttributeRequestTunnelOptionsSpecification(TeaModel):
92303
92575
  tunnel_index: int = None,
92304
92576
  tunnel_ipsec_config: ModifyVpnAttachmentAttributeRequestTunnelOptionsSpecificationTunnelIpsecConfig = None,
92305
92577
  ):
92578
+ # The ID of the customer gateway that is associated with the tunnel.
92579
+ #
92580
+ # > This parameter is only supported in dual-tunnel IPsec-VPN connections.
92306
92581
  self.customer_gateway_id = customer_gateway_id
92582
+ # Specifies whether to enable the Dead Peer Detection (DPD) feature for the tunnel. Valid values:
92583
+ #
92584
+ # * **true**: enables DPD. The initiator of the IPsec-VPN connection sends DPD packets to check the existence and availability of the peer. If no feedback is received from the peer within the specified period of time, the connection fails. In this case, ISAKMP SA and IPsec SA are deleted along with the security tunnel.
92585
+ # * **false**: disables DPD. The initiator of the IPsec-VPN connection does not send DPD packets.
92307
92586
  self.enable_dpd = enable_dpd
92587
+ # Specifies whether to enable NAT traversal for the tunnel. Valid values:
92588
+ #
92589
+ # * **true**: enables NAT traversal. After NAT traversal is enabled, the initiator does not check the UDP ports during IKE negotiations and can automatically discover NAT gateway devices along the IPsec-VPN tunnel.
92590
+ # * **false**: disables NAT traversal.
92308
92591
  self.enable_nat_traversal = enable_nat_traversal
92592
+ # Add BGP configurations for the tunnel.
92593
+ #
92594
+ # > If you enable BGP for an IPsec-VPN connection, you must set **EnableTunnelsBgp** parameter to **true**.
92309
92595
  self.tunnel_bgp_config = tunnel_bgp_config
92596
+ # The tunnel ID.
92310
92597
  self.tunnel_id = tunnel_id
92598
+ # The configuration of Phase 1 negotiations.
92311
92599
  self.tunnel_ike_config = tunnel_ike_config
92600
+ # The order in which the tunnel was created.
92601
+ #
92602
+ # * **1**: Tunnel 1.
92603
+ # * **2**: Tunnel 2.
92312
92604
  self.tunnel_index = tunnel_index
92605
+ # The configuration of Phase 2 negotiations.
92313
92606
  self.tunnel_ipsec_config = tunnel_ipsec_config
92314
92607
 
92315
92608
  def validate(self):
@@ -92399,7 +92692,9 @@ class ModifyVpnAttachmentAttributeRequest(TeaModel):
92399
92692
  # * **true**\
92400
92693
  # * **false**\
92401
92694
  self.auto_config_route = auto_config_route
92402
- # The Border Gateway Protocol (BGP) configuration:
92695
+ # This parameter is supported if you modify the configurations of an IPsec-VPN connection in single-tunnel mode.
92696
+ #
92697
+ # BGP configuration:
92403
92698
  #
92404
92699
  # * **BgpConfig.EnableBgp**: specifies whether to enable BGP. Valid values:
92405
92700
  #
@@ -92408,16 +92703,16 @@ class ModifyVpnAttachmentAttributeRequest(TeaModel):
92408
92703
  #
92409
92704
  # * **BgpConfig.LocalAsn**: the autonomous system number (ASN) on the Alibaba Cloud side. Valid values: **1** to **4294967295**.
92410
92705
  #
92411
- # You can enter the ASN in two segments. Separate the first 16 bits of the ASN from the remaining 16 bits with a period (.). Enter the number in each segment in decimal format.
92706
+ # You can enter a value in two segments separated by a period (.). Each segment is 16 bits in length. Enter the number in each segment in decimal format.
92412
92707
  #
92413
- # For example, if you enter 123.456, the ASN is: 123 × 65536 + 456 = 8061384.
92708
+ # For example, if you enter 123.456, the ASN is 8061384. The ASN is calculated by using the following formula: 123 × 65536 + 456 = 8061384.
92414
92709
  #
92415
- # * **BgpConfig.TunnelCidr:** the CIDR block of the IPsec tunnel. The CIDR block falls within 169.254.0.0/16. The subnet mask of the CIDR block must be 30 bits in length.
92710
+ # * **BgpConfig.TunnelCidr**: The CIDR block of the IPsec tunnel. The CIDR block must fall into 169.254.0.0/16 and the mask of the CIDR block must be 30 bits in length. The CIDR block cannot be 169.254.0.0/30, 169.254.1.0/30, 169.254.2.0/30, 169.254.3.0/30, 169.254.4.0/30, 169.254.5.0/30, 169.254.6.0/30, or 169.254.169.252/30.
92416
92711
  #
92417
- # * **LocalBgpIp:** the BGP IP address on the Alibaba Cloud side. This IP address must fall within the CIDR block of the IPsec tunnel.
92712
+ # * **LocalBgpIp**: the BGP address on the Alibaba Cloud side. It must be an IP address that falls within the CIDR block of the IPsec tunnel.
92418
92713
  #
92419
- # > - Before you configure BGP, we recommend that you learn how BGP dynamic routing works and the limits of using BGP dynamic routing. For more information, see [BGP dynamic routing ](https://help.aliyun.com/document_detail/170235.html).
92420
- # > - We recommend that you use a private ASN to establish a connection with Alibaba Cloud over BGP. Refer to the relevant documentation for the private ASN range.
92714
+ # > - Before you add BGP configurations, we recommend that you learn about how BGP works and the limits. For more information, see [Configure BGP dynamic routing](https://help.aliyun.com/document_detail/445767.html).
92715
+ # > - We recommend that you use a private ASN to establish BGP connections to Alibaba Cloud. Refer to the relevant documentation for the private ASN range.
92421
92716
  self.bgp_config = bgp_config
92422
92717
  # The client token that is used to ensure the idempotence of the request.
92423
92718
  #
@@ -92425,24 +92720,37 @@ class ModifyVpnAttachmentAttributeRequest(TeaModel):
92425
92720
  #
92426
92721
  # > If you do not specify this parameter, the system automatically uses the value of **RequestId** as the value of **ClientToken**. The **request ID** may be different for each request.
92427
92722
  self.client_token = client_token
92428
- # The customer gateway associated with the IPsec-VPN connection.
92723
+ # The customer gateways to be associated with the IPsec-VPN connections.
92724
+ #
92725
+ # > Only single-tunnel IPsec-VPN connections support this parameter.
92429
92726
  self.customer_gateway_id = customer_gateway_id
92430
92727
  # Specifies whether to immediately start IPsec negotiations after the configuration takes effect. Valid values:
92431
92728
  #
92432
92729
  # * **true**: immediately starts IPsec negotiations after the configuration is complete.
92433
92730
  # * **false**: starts IPsec negotiations when inbound traffic is detected.
92434
92731
  self.effect_immediately = effect_immediately
92435
- # Specifies whether to enable the dead peer detection (DPD) feature. Valid values:
92732
+ # This parameter is supported if you modify the configurations of an IPsec-VPN connection in single-tunnel mode.
92436
92733
  #
92437
- # * **true**: enables the DPD feature. The initiator of the IPsec-VPN connection sends DPD packets to check the existence and availability of the peer. If no feedback is received from the peer within a specific period of time, the connection fails. Then, the ISAKMP SA, IPsec SA, and IPsec tunnel are deleted.
92438
- # * **false**: disables the DPD feature. The initiator of the IPsec-VPN connection does not send DPD packets.
92734
+ # Specifies whether to enable dead peer detection (DPD). Valid values:
92735
+ #
92736
+ # * **true**: enables DPD. The initiator of the IPsec-VPN connection sends DPD packets to check the existence and availability of the peer. If no feedback is received from the peer within the specified period of time, the connection fails. In this case, ISAKMP SA and IPsec SA are deleted, along with the security tunnel.
92737
+ # * **false**: disables DPD. The initiator of the IPsec-VPN connection does not send DPD packets.
92439
92738
  self.enable_dpd = enable_dpd
92739
+ # This parameter is supported if you modify the configurations of an IPsec-VPN connection in single-tunnel mode.
92740
+ #
92440
92741
  # Specifies whether to enable NAT traversal. Valid values:
92441
92742
  #
92442
- # * **true** After NAT traversal is enabled, the initiator does not check the UDP ports during IKE negotiations and can automatically discover NAT gateway devices along the IPsec tunnel.
92443
- # * **false**\
92743
+ # * **true**: enables NAT traversal. After NAT traversal is enabled, the initiator does not check the UDP ports during IKE negotiations and can automatically discover NAT gateway devices along the IPsec-VPN tunnel.
92744
+ # * **false**: disables NAT traversal.
92444
92745
  self.enable_nat_traversal = enable_nat_traversal
92746
+ # You can specify this parameter if you modify the configuration of a dual-tunnel IPsec-VPN connection.
92747
+ #
92748
+ # Specifies whether to enable the BGP feature for the tunnel. Valid values: **true** and **false**.
92749
+ #
92750
+ # > Before you add BGP configurations, we recommend that you learn about how BGP works and the limits. For more information, see [Configure BGP dynamic routing](https://help.aliyun.com/document_detail/445767.html).
92445
92751
  self.enable_tunnels_bgp = enable_tunnels_bgp
92752
+ # This parameter is supported if you modify the configurations of an IPsec-VPN connection in single-tunnel mode.
92753
+ #
92446
92754
  # The health check configurations:
92447
92755
  #
92448
92756
  # * **HealthCheckConfig.enable**: specifies whether to enable the health check feature. Valid values:
@@ -92450,9 +92758,9 @@ class ModifyVpnAttachmentAttributeRequest(TeaModel):
92450
92758
  # * **true**\
92451
92759
  # * **false**\
92452
92760
  #
92453
- # * **HealthCheckConfig.dip**: the destination IP address that is used for health checks. Enter the IP address on the data center side that the VPC can communicate with through the IPsec-VPN connection.
92761
+ # * **HealthCheckConfig.dip**: the destination IP address configured for health checks. Specify the IP address of the data center with which the VPC can access through the IPsec-VPN connection.
92454
92762
  #
92455
- # * **HealthCheckConfig.sip**: the source IP address that is used for health checks. Enter the IP address on the VPC side that the data center can communicate with through the IPsec-VPN connection.
92763
+ # * **HealthCheckConfig.sip**: the source IP address configured for health checks. The IP address of the VPC with which the data center can access through the IPsec-VPN connection.
92456
92764
  #
92457
92765
  # * **HealthCheckConfig.interval**: the interval between two consecutive health checks. Unit: seconds.
92458
92766
  #
@@ -92463,37 +92771,41 @@ class ModifyVpnAttachmentAttributeRequest(TeaModel):
92463
92771
  # * **revoke_route**\
92464
92772
  # * **reserve_route**\
92465
92773
  self.health_check_config = health_check_config
92774
+ # This parameter is supported if you modify the configurations of an IPsec-VPN connection in single-tunnel mode.
92775
+ #
92466
92776
  # The configuration of Phase 1 negotiations:
92467
92777
  #
92468
- # * **IkeConfig.Psk**: The pre-shared key that is used for authentication between the VPN gateway and the data center.
92778
+ # * **IkeConfig.Psk**: The pre-shared key that is used for identity authentication between the Alibaba Cloud IPsec connection and the on-premises data center.
92469
92779
  #
92470
- # * The pre-shared key must be 1 to 100 characters in length and can contain letters, digits, and the following characters: ``~ ! ` @ # $ % ^ & * () _ - + = {} [] | ; : \\" , . < > / ?``
92471
- # * If you do not specify a pre-shared key, the system generates a random 16-character string as the pre-shared key. You can call the [DescribeVpnConnection](https://help.aliyun.com/document_detail/120374.html) operation to query the pre-shared key that is generated by the system.
92780
+ # * The key must be 1 to 100 characters in length, and can contain digits, and letters. The key cannot contain spaces. ``~!`@#$%^&*()_-+={}[]|;:\\",.<>/?``
92781
+ # * If you do not specify a pre-shared key, the system randomly generates a 16-bit string as the pre-shared key. You can call the [DescribeVpnConnection](https://help.aliyun.com/document_detail/120374.html) operation to query the pre-shared key that is automatically generated by the system.
92472
92782
  #
92473
- # >The pre-shared key of the IPsec-VPN connection must be the same as the authentication key of the data center. Otherwise, you cannot establish a connection between the data center and the VPN gateway.
92783
+ # > The pre-shared key of the IPsec-VPN connection must be the same as the authentication key of the on-premises data center. Otherwise, connections between the on-premises data center and the VPN gateway cannot be established.
92474
92784
  #
92475
- # * **IkeConfig.IkeVersion**: the Internet Key Exchange (IKE) version. Valid values: **ikev1** and **ikev2**.
92785
+ # * **IkeConfig.IkeVersion**: the version of the Internet Key Exchange (IKE) protocol. Valid values: **ikev1** and **ikev2**.
92476
92786
  #
92477
92787
  # * **IkeConfig.IkeMode**: the negotiation mode. Valid values: **main** and **aggressive**.
92478
92788
  #
92479
- # * **IkeConfig.IkeEncAlg**: the encryption algorithm that is used in Phase 1 negotiations. Valid values: **aes**, **aes192**, **aes256**, **des**, and **3des**.
92789
+ # * **IkeConfig.IkeEncAlg:** the encryption algorithm that is used in Phase 1 negotiations. Valid values: **aes**, **aes192**, **aes256**, **des**, and **3des**.
92480
92790
  #
92481
92791
  # * **IkeConfig.IkeAuthAlg**: the authentication algorithm that is used in Phase 1 negotiations. Valid values: **md5**, **sha1**, **sha256**, **sha384**, and **sha512**.
92482
92792
  #
92483
- # * **IkeConfig.IkePfs**: the Diffie-Hellman (DH) key exchange algorithm that is used in Phase 1 negotiations. Valid values: **group1**, **group2**, **group5**, and **group14**.
92793
+ # * **IkeConfig.IkePfs**: the Diffie-Hellman key exchange algorithm that is used in Phase 1 negotiations. Valid values: **group1**, **group2**, **group5**, and **group14**.
92484
92794
  #
92485
- # * **IkeConfig.IkeLifetime**: the security association (SA) lifetime determined by Phase 1 negotiations. Unit: seconds. Valid values: **0** to **86400**.
92795
+ # * **IkeConfig.IkeLifetime**: the SA lifetime as a result of Phase 1 negotiations. Unit: seconds. Valid values: **0** to **86400**.
92486
92796
  #
92487
- # * **IkeConfig.LocalIdIPsec**: the identifier of the IPsec-VPN connection on the Alibaba Cloud side. The identifier can be up to 100 characters in length.
92797
+ # * **IkeConfig.LocalId**: the identifier on the Alibaba Cloud side. The identifier cannot exceed 100 characters in length and cannot contain spaces.
92488
92798
  #
92489
- # * **IkeConfig.RemoteId**: the identifier of the IPsec-VPN connection on the data center side. The identifier can be up to 100 characters in length.
92799
+ # * **IkeConfig.RemoteId**: the identifier of the data center. It cannot exceed 100 characters in length and cannot contain spaces.
92490
92800
  self.ike_config = ike_config
92801
+ # This parameter is supported if you modify the configurations of an IPsec-VPN connection in single-tunnel mode.
92802
+ #
92491
92803
  # The configuration of Phase 2 negotiations:
92492
92804
  #
92493
92805
  # * **IpsecConfig.IpsecEncAlg:** the encryption algorithm that is used in Phase 2 negotiations. Valid values: **aes**, **aes192**, **aes256**, **des**, and **3des**.
92494
92806
  # * **IpsecConfig. IpsecAuthAlg:** the authentication algorithm that is used in Phase 2 negotiations. Valid values: **md5**, **sha1**, **sha256**, **sha384**, and **sha512**.
92495
- # * **IpsecConfig. IpsecPfs:** the DH key exchange algorithm that is used in Phase 2 negotiations. Valid values: **disabled**, **group1**, **group2**, **group5**, and **group14**.
92496
- # * **IpsecConfig. IpsecLifetime**: the SA lifetime determined by Phase 2 negotiations. Unit: seconds. Valid values: **0** to **86400**.
92807
+ # * **IpsecConfig. IpsecPfs:** the Diffie-Hellman key exchange algorithm that is used in Phase 2 negotiations. Valid values: **disabled**, **group1**, **group2**, **group5**, and **group14**.
92808
+ # * **IkeConfig.IkeLifetime**: the SA lifetime determined by Phase 2 negotiations. Unit: seconds. Valid values: **0** to **86400**.
92497
92809
  self.ipsec_config = ipsec_config
92498
92810
  # The CIDR block of the virtual private cloud (VPC) that communicates with the data center. The CIDR block is used in Phase 2 negotiations.
92499
92811
  #
@@ -92533,6 +92845,9 @@ class ModifyVpnAttachmentAttributeRequest(TeaModel):
92533
92845
  self.remote_subnet = remote_subnet
92534
92846
  self.resource_owner_account = resource_owner_account
92535
92847
  self.resource_owner_id = resource_owner_id
92848
+ # The tunnel configurations.
92849
+ #
92850
+ # You can specify parameters in the **TunnelOptionsSpecification** array when you modify the configurations of an IPsec-VPN connection in dual-tunnel mode. You can modify the configurations of the two tunnels of the IPsec-VPN connection.
92536
92851
  self.tunnel_options_specification = tunnel_options_specification
92537
92852
  # The ID of the IPsec-VPN connection.
92538
92853
  #
@@ -92670,17 +92985,25 @@ class ModifyVpnAttachmentAttributeResponseBodyIkeConfig(TeaModel):
92670
92985
  self.ike_enc_alg = ike_enc_alg
92671
92986
  # The SA lifetime that is determined by Phase 1 negotiations. Unit: seconds.
92672
92987
  self.ike_lifetime = ike_lifetime
92673
- # The negotiation mode.
92988
+ # The IKE negotiation mode.
92989
+ #
92990
+ # * **main:** This mode offers higher security during negotiations.
92991
+ # * **aggressive**: This mode is faster with a higher success rate.
92674
92992
  self.ike_mode = ike_mode
92675
92993
  # The DH key exchange algorithm that is used in Phase 1 negotiations.
92676
92994
  self.ike_pfs = ike_pfs
92677
92995
  # The version of the IKE protocol.
92996
+ #
92997
+ # * **ikev1**\
92998
+ # * **ikev2**\
92999
+ #
93000
+ # Compared with IKEv1, IKEv2 simplifies the SA negotiation process and provides better support for scenarios with multiple CIDR blocks.
92678
93001
  self.ike_version = ike_version
92679
93002
  # The identifier of the IPsec-VPN connection on the Alibaba Cloud side.
92680
93003
  self.local_id = local_id
92681
- # The pre-shared key that is used for identity authentication between the VPN gateway and the data center.
93004
+ # Enter a pre-shared key that is used for identity authentication between Alibaba Cloud and the data center.
92682
93005
  #
92683
- # > The pre-shared key of the IPsec-VPN connection must be the same as the authentication key of the data center. Otherwise, you cannot establish a connection between the data center and the VPN gateway.
93006
+ # > The pre-shared key of the IPsec-VPN connection must be the same as the authentication key of the on-premises data center. Otherwise, connections between the on-premises data center and Alibaba Cloud cannot be established.
92684
93007
  self.psk = psk
92685
93008
  # The identifier of the IPsec-VPN connection on the data center side.
92686
93009
  self.remote_id = remote_id
@@ -92795,10 +93118,15 @@ class ModifyVpnAttachmentAttributeResponseBodyTunnelOptionsSpecificationTunnelBg
92795
93118
  peer_bgp_ip: str = None,
92796
93119
  tunnel_cidr: str = None,
92797
93120
  ):
93121
+ # The ASN on the Alibaba Cloud side.
92798
93122
  self.local_asn = local_asn
93123
+ # The BGP IP address of the tunnel on the Alibaba Cloud side.
92799
93124
  self.local_bgp_ip = local_bgp_ip
93125
+ # The ASN of the tunnel peer.
92800
93126
  self.peer_asn = peer_asn
93127
+ # The BGP IP address of the tunnel peer.
92801
93128
  self.peer_bgp_ip = peer_bgp_ip
93129
+ # The BGP CIDR block of the tunnel.
92802
93130
  self.tunnel_cidr = tunnel_cidr
92803
93131
 
92804
93132
  def validate(self):
@@ -92850,14 +93178,26 @@ class ModifyVpnAttachmentAttributeResponseBodyTunnelOptionsSpecificationTunnelIk
92850
93178
  psk: str = None,
92851
93179
  remote_id: str = None,
92852
93180
  ):
93181
+ # The authentication algorithm in the IKE phase.
92853
93182
  self.ike_auth_alg = ike_auth_alg
93183
+ # The encryption algorithm in the IKE phase.
92854
93184
  self.ike_enc_alg = ike_enc_alg
93185
+ # The lifetime in the IKE phase. Unit: seconds.
92855
93186
  self.ike_lifetime = ike_lifetime
93187
+ # The negotiation mode of IKE. Valid values:
93188
+ #
93189
+ # * **main:** This mode offers higher security during negotiations.
93190
+ # * **aggressive**: This mode is faster with a higher success rate.
92856
93191
  self.ike_mode = ike_mode
93192
+ # The Diffie-Hellman (DH) group in the IKE phase.
92857
93193
  self.ike_pfs = ike_pfs
93194
+ # The version of the IKE protocol.
92858
93195
  self.ike_version = ike_version
93196
+ # The identifier of the tunnel on the Alibaba Cloud side.
92859
93197
  self.local_id = local_id
93198
+ # The pre-shared key.
92860
93199
  self.psk = psk
93200
+ # The peer identifier.
92861
93201
  self.remote_id = remote_id
92862
93202
 
92863
93203
  def validate(self):
@@ -92920,9 +93260,13 @@ class ModifyVpnAttachmentAttributeResponseBodyTunnelOptionsSpecificationTunnelIp
92920
93260
  ipsec_lifetime: int = None,
92921
93261
  ipsec_pfs: str = None,
92922
93262
  ):
93263
+ # The authentication algorithm in the IPsec phase.
92923
93264
  self.ipsec_auth_alg = ipsec_auth_alg
93265
+ # The encryption algorithm in the IPsec phase.
92924
93266
  self.ipsec_enc_alg = ipsec_enc_alg
93267
+ # The lifetime in the IPsec phase. Unit: seconds.
92925
93268
  self.ipsec_lifetime = ipsec_lifetime
93269
+ # The DH group in the IPsec phase.
92926
93270
  self.ipsec_pfs = ipsec_pfs
92927
93271
 
92928
93272
  def validate(self):
@@ -92972,16 +93316,43 @@ class ModifyVpnAttachmentAttributeResponseBodyTunnelOptionsSpecification(TeaMode
92972
93316
  tunnel_index: int = None,
92973
93317
  tunnel_ipsec_config: ModifyVpnAttachmentAttributeResponseBodyTunnelOptionsSpecificationTunnelIpsecConfig = None,
92974
93318
  ):
93319
+ # The ID of the customer gateway that is associated with the tunnel.
92975
93320
  self.customer_gateway_id = customer_gateway_id
93321
+ # Whether the DPD feature is enabled for the tunnel.
93322
+ #
93323
+ # * **true**: The feature is enabled.
93324
+ # * **false**: The feature is disabled.
92976
93325
  self.enable_dpd = enable_dpd
93326
+ # Indicates whether traversal feature is enabled for the tunnel. Valid values:
93327
+ #
93328
+ # * **true**: The feature is enabled.
93329
+ # * **false**: The feature is disabled.
92977
93330
  self.enable_nat_traversal = enable_nat_traversal
93331
+ # The IP address on the Alibaba Cloud side.
92978
93332
  self.internet_ip = internet_ip
93333
+ # The tunnel role. Valid values:
93334
+ #
93335
+ # * **master**: The tunnel is an active tunnel.
93336
+ # * **slave**: The tunnel is a standby tunnel.
92979
93337
  self.role = role
93338
+ # The status of the tunnel. Valid values:
93339
+ #
93340
+ # * **active**: The tunnel is active.
93341
+ # * **updating**: The tunnel is being updated.
93342
+ # * **deleting:** The tunnel is being deleted.
92980
93343
  self.state = state
93344
+ # BGP configuration.
92981
93345
  self.tunnel_bgp_config = tunnel_bgp_config
93346
+ # The tunnel ID.
92982
93347
  self.tunnel_id = tunnel_id
93348
+ # The configurations of Phase 1 negotiations.
92983
93349
  self.tunnel_ike_config = tunnel_ike_config
93350
+ # The order in which the tunnel was created.
93351
+ #
93352
+ # * **1**: Tunnel 1.
93353
+ # * **2**: Tunnel 2.
92984
93354
  self.tunnel_index = tunnel_index
93355
+ # The configurations of Phase 2 negotiations.
92985
93356
  self.tunnel_ipsec_config = tunnel_ipsec_config
92986
93357
 
92987
93358
  def validate(self):
@@ -93238,6 +93609,8 @@ class ModifyVpnAttachmentAttributeResponseBody(TeaModel):
93238
93609
  # This value is a UNIX timestamp representing the number of milliseconds that have elapsed since the epoch time January 1, 1970, 00:00:00 UTC.
93239
93610
  self.create_time = create_time
93240
93611
  # The ID of the customer gateway associated with the IPsec-VPN connection.
93612
+ #
93613
+ # This parameter is returned only for single-tunnel IPsec-VPN connections.
93241
93614
  self.customer_gateway_id = customer_gateway_id
93242
93615
  # The description of the IPsec-VPN connection.
93243
93616
  self.description = description
@@ -93246,22 +93619,36 @@ class ModifyVpnAttachmentAttributeResponseBody(TeaModel):
93246
93619
  # * **true**\
93247
93620
  # * **false**\
93248
93621
  self.effect_immediately = effect_immediately
93249
- # Indicates whether the DPD feature is enabled for the IPsec-VPN connection. Valid values:
93622
+ # Indicates whether the DPD feature is enabled for the IPsec-VPN connection.
93250
93623
  #
93251
- # * **true**\
93252
- # * **false**\
93624
+ # * **true**: The feature is enabled.
93625
+ # * **false**: The feature is disabled.
93626
+ #
93627
+ # This parameter is returned only for single-tunnel IPsec-VPN connections.
93253
93628
  self.enable_dpd = enable_dpd
93254
- # Indicates whether NAT traversal is enabled for the IPsec-VPN connection. Valid values:
93629
+ # Specifies whether to enable NAT traversal for the IPsec-VPN connection.
93255
93630
  #
93256
- # * **true**\
93257
- # * **false**\
93631
+ # * **true**: The feature is enabled.
93632
+ # * **false**: The feature is disabled.
93633
+ #
93634
+ # This parameter is returned only for single-tunnel IPsec-VPN connections.
93258
93635
  self.enable_nat_traversal = enable_nat_traversal
93636
+ # Specifies whether to enable Border Gateway Protocol (BGP) for tunnels.
93637
+ #
93638
+ # * **true**: The feature is enabled.
93639
+ # * **false**: The feature is disabled.
93640
+ #
93641
+ # This parameter is returned only by dual-tunnel IPsec-VPN connections.
93259
93642
  self.enable_tunnels_bgp = enable_tunnels_bgp
93260
93643
  # The configuration of Phase 1 negotiations.
93644
+ #
93645
+ # **IkeConfig** parameters are returned only for single-tunnel IPsec-VPN connections.
93261
93646
  self.ike_config = ike_config
93262
93647
  # The configuration of Phase 2 negotiations.
93648
+ #
93649
+ # **IpsecConfig** parameters are returned only for single-tunnel IPsec-VPN connections.
93263
93650
  self.ipsec_config = ipsec_config
93264
- # The CIDR block of the VPC with which the data center can communicate.
93651
+ # The CIDR block on the Alibaba Cloud side that communicates with the on-premises data center is required, such as CIDR blocks of VPCs.
93265
93652
  self.local_subnet = local_subnet
93266
93653
  # The name of the IPsec-VPN connection.
93267
93654
  self.name = name
@@ -93270,7 +93657,7 @@ class ModifyVpnAttachmentAttributeResponseBody(TeaModel):
93270
93657
  # * **public**: an encrypted connection over the Internet
93271
93658
  # * **private**: an encrypted connection over private networks
93272
93659
  self.network_type = network_type
93273
- # The CIDR block of the data center with which the VPC can communicate.
93660
+ # The CIDR block of the on-premises data center that communicates with Alibaba Cloud is required.
93274
93661
  self.remote_subnet = remote_subnet
93275
93662
  # The request ID.
93276
93663
  self.request_id = request_id
@@ -93289,14 +93676,23 @@ class ModifyVpnAttachmentAttributeResponseBody(TeaModel):
93289
93676
  # * **ipsec_sa_not_established**: Phase 2 negotiations failed.
93290
93677
  # * **ipsec_sa_established**: Phase 2 negotiations succeeded.
93291
93678
  self.status = status
93679
+ # The tunnel configurations of the IPsec-VPN connection.
93680
+ #
93681
+ # **TunnelOptionsSpecification** parameters are returned only for dual-tunnel IPsec-VPN connections.
93292
93682
  self.tunnel_options_specification = tunnel_options_specification
93293
- # The health check configuration of the IPsec-VPN connection.
93683
+ # The health check configurations of the IPsec-VPN connection.
93684
+ #
93685
+ # **VcoHealthCheck** parameters are returned only for single-tunnel IPsec-VPC connections.
93294
93686
  self.vco_health_check = vco_health_check
93295
- # The BGP configuration of the IPsec-VPN connection.
93687
+ # The BGP configurations of the IPsec-VPN connection.
93688
+ #
93689
+ # **VpnBgpConfig** parameters are returned only for single-tunnel IPsec-VPN connections.
93296
93690
  self.vpn_bgp_config = vpn_bgp_config
93297
93691
  # The ID of the IPsec-VPN connection.
93298
93692
  self.vpn_connection_id = vpn_connection_id
93299
- # The ID of the VPN gateway associated with the IPsec-VPN connection.
93693
+ # The ID of the VPN gateway that is associated with the IPsec-VPN connection.
93694
+ #
93695
+ # **vpn-not-exist**: The IPsec-VPN connection is not associated with a VPN Gateway.
93300
93696
  self.vpn_gateway_id = vpn_gateway_id
93301
93697
 
93302
93698
  def validate(self):
@@ -93884,9 +94280,7 @@ class ModifyVpnConnectionAttributeRequest(TeaModel):
93884
94280
  # * The key cannot contain space characters. The key must be 1 to 100 characters in length, and can contain digits, letters, and the following special characters: ``~!`@#$%^&*()_-+={}[]|;:\\",.<>/?``
93885
94281
  # * If you do not specify a pre-shared key, the system randomly generates a 16-bit string as the pre-shared key. You can call the [DescribeVpnConnection](https://help.aliyun.com/document_detail/2526951.html) operation to query the pre-shared key that is automatically generated by the system.
93886
94282
  #
93887
- # **\
93888
- #
93889
- # **Description** The pre-shared key of the IPsec-VPN connection must be the same as the authentication key of the on-premises data center. Otherwise, connections between the on-premises data center and the VPN gateway cannot be established.
94283
+ # > The pre-shared key of the IPsec-VPN connection must be the same as the authentication key of the on-premises data center. Otherwise, connections between the on-premises data center and the VPN gateway cannot be established.
93890
94284
  #
93891
94285
  # * **IkeConfig.IkeVersion**: the version of the Internet Key Exchange (IKE) protocol. Valid values: **ikev1** and **ikev2**.
93892
94286
  #
@@ -94983,9 +95377,9 @@ class ModifyVpnGatewayAttributeRequest(TeaModel):
94983
95377
  #
94984
95378
  # > If you do not specify this parameter, the system automatically uses the request ID as the client token. The request ID may be different for each request.
94985
95379
  self.client_token = client_token
94986
- # The new description of the VPN gateway.
95380
+ # The new description of the VPN connection.
94987
95381
  #
94988
- # The description must be 1 to 100 characters in length and cannot start with `http://` or `https://`.
95382
+ # The description must be 1 to 100 characters in length.
94989
95383
  self.description = description
94990
95384
  # The new name of the VPN gateway.
94991
95385
  #
@@ -95124,15 +95518,12 @@ class ModifyVpnGatewayAttributeResponseBody(TeaModel):
95124
95518
  self.internet_ip = internet_ip
95125
95519
  # The IP address of the VPN gateway.
95126
95520
  #
95127
- # This parameter is returned only when the VPN gateway is a private VPN gateway and supports only the single-tunnel mode.
95521
+ # This parameter is returned only if the VPN gateway supports IPsec-VPN connections in single-tunnel mode.
95128
95522
  self.intranet_ip = intranet_ip
95129
95523
  # The name of the VPN gateway.
95130
95524
  self.name = name
95131
95525
  # The request ID.
95132
95526
  self.request_id = request_id
95133
- # VPN网关实例所属的资源组ID。
95134
- #
95135
- # 您可以调用[ListResourceGroups](https://help.aliyun.com/document_detail/158855.html)接口查询资源组信息。
95136
95527
  self.resource_group_id = resource_group_id
95137
95528
  # The maximum bandwidth of the VPN gateway. Unit: Mbit/s.
95138
95529
  self.spec = spec
@@ -103184,11 +103575,11 @@ class UpdateIpsecServerRequest(TeaModel):
103184
103575
  self.local_subnet = local_subnet
103185
103576
  # The pre-shared key.
103186
103577
  #
103187
- # The pre-shared key that is used for authentication between the IPsec-VPN server and the client. It must be 1 to 100 characters in length.
103578
+ # The pre-shared key that is used for authentication between the IPsec server and the client. The key must be 1 to 100 characters in length.
103188
103579
  #
103189
103580
  # You can call [ListIpsecServers](https://help.aliyun.com/document_detail/2794120.html) to query keys generated by the system.
103190
103581
  #
103191
- # > The pre-shared key of the IPsec server key must be the same as that of the client. Otherwise, the connection between the IPsec server and the client cannot be established.
103582
+ # > The pre-shared key of the IPsec server key must be the same as that of the client. Otherwise, the connection between the IPsec server and the client cannot be established.
103192
103583
  self.psk = psk
103193
103584
  # Specifies whether to enable pre-shared key authentication. If you set the value to **true**, pre-shared key authentication is enabled.
103194
103585
  self.psk_enabled = psk_enabled