/**
* Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
* SPDX-License-Identifier: Apache-2.0.
*/
#pragma once
#include The Amazon Web Services Site-to-Site VPN tunnel options to
* modify.See Also:
AWS
* API Reference
The range of inside IPv4 addresses for the tunnel. Any specified CIDR blocks * must be unique across all VPN connections that use the same virtual private * gateway.
Constraints: A size /30 CIDR block from the
* 169.254.0.0/16
range. The following CIDR blocks are reserved and
* cannot be used:
169.254.0.0/30
169.254.1.0/30
169.254.2.0/30
*
169.254.3.0/30
* 169.254.4.0/30
169.254.5.0/30
169.254.169.252/30
The range of inside IPv4 addresses for the tunnel. Any specified CIDR blocks * must be unique across all VPN connections that use the same virtual private * gateway.
Constraints: A size /30 CIDR block from the
* 169.254.0.0/16
range. The following CIDR blocks are reserved and
* cannot be used:
169.254.0.0/30
169.254.1.0/30
169.254.2.0/30
*
169.254.3.0/30
* 169.254.4.0/30
169.254.5.0/30
169.254.169.252/30
The range of inside IPv4 addresses for the tunnel. Any specified CIDR blocks * must be unique across all VPN connections that use the same virtual private * gateway.
Constraints: A size /30 CIDR block from the
* 169.254.0.0/16
range. The following CIDR blocks are reserved and
* cannot be used:
169.254.0.0/30
169.254.1.0/30
169.254.2.0/30
*
169.254.3.0/30
* 169.254.4.0/30
169.254.5.0/30
169.254.169.252/30
The range of inside IPv4 addresses for the tunnel. Any specified CIDR blocks * must be unique across all VPN connections that use the same virtual private * gateway.
Constraints: A size /30 CIDR block from the
* 169.254.0.0/16
range. The following CIDR blocks are reserved and
* cannot be used:
169.254.0.0/30
169.254.1.0/30
169.254.2.0/30
*
169.254.3.0/30
* 169.254.4.0/30
169.254.5.0/30
169.254.169.252/30
The range of inside IPv4 addresses for the tunnel. Any specified CIDR blocks * must be unique across all VPN connections that use the same virtual private * gateway.
Constraints: A size /30 CIDR block from the
* 169.254.0.0/16
range. The following CIDR blocks are reserved and
* cannot be used:
169.254.0.0/30
169.254.1.0/30
169.254.2.0/30
*
169.254.3.0/30
* 169.254.4.0/30
169.254.5.0/30
169.254.169.252/30
The range of inside IPv4 addresses for the tunnel. Any specified CIDR blocks * must be unique across all VPN connections that use the same virtual private * gateway.
Constraints: A size /30 CIDR block from the
* 169.254.0.0/16
range. The following CIDR blocks are reserved and
* cannot be used:
169.254.0.0/30
169.254.1.0/30
169.254.2.0/30
*
169.254.3.0/30
* 169.254.4.0/30
169.254.5.0/30
169.254.169.252/30
The range of inside IPv4 addresses for the tunnel. Any specified CIDR blocks * must be unique across all VPN connections that use the same virtual private * gateway.
Constraints: A size /30 CIDR block from the
* 169.254.0.0/16
range. The following CIDR blocks are reserved and
* cannot be used:
169.254.0.0/30
169.254.1.0/30
169.254.2.0/30
*
169.254.3.0/30
* 169.254.4.0/30
169.254.5.0/30
169.254.169.252/30
The range of inside IPv4 addresses for the tunnel. Any specified CIDR blocks * must be unique across all VPN connections that use the same virtual private * gateway.
Constraints: A size /30 CIDR block from the
* 169.254.0.0/16
range. The following CIDR blocks are reserved and
* cannot be used:
169.254.0.0/30
169.254.1.0/30
169.254.2.0/30
*
169.254.3.0/30
* 169.254.4.0/30
169.254.5.0/30
169.254.169.252/30
The range of inside IPv6 addresses for the tunnel. Any specified CIDR blocks * must be unique across all VPN connections that use the same transit gateway.
*Constraints: A size /126 CIDR block from the local fd00::/8
* range.
The range of inside IPv6 addresses for the tunnel. Any specified CIDR blocks * must be unique across all VPN connections that use the same transit gateway.
*Constraints: A size /126 CIDR block from the local fd00::/8
* range.
The range of inside IPv6 addresses for the tunnel. Any specified CIDR blocks * must be unique across all VPN connections that use the same transit gateway.
*Constraints: A size /126 CIDR block from the local fd00::/8
* range.
The range of inside IPv6 addresses for the tunnel. Any specified CIDR blocks * must be unique across all VPN connections that use the same transit gateway.
*Constraints: A size /126 CIDR block from the local fd00::/8
* range.
The range of inside IPv6 addresses for the tunnel. Any specified CIDR blocks * must be unique across all VPN connections that use the same transit gateway.
*Constraints: A size /126 CIDR block from the local fd00::/8
* range.
The range of inside IPv6 addresses for the tunnel. Any specified CIDR blocks * must be unique across all VPN connections that use the same transit gateway.
*Constraints: A size /126 CIDR block from the local fd00::/8
* range.
The range of inside IPv6 addresses for the tunnel. Any specified CIDR blocks * must be unique across all VPN connections that use the same transit gateway.
*Constraints: A size /126 CIDR block from the local fd00::/8
* range.
The range of inside IPv6 addresses for the tunnel. Any specified CIDR blocks * must be unique across all VPN connections that use the same transit gateway.
*Constraints: A size /126 CIDR block from the local fd00::/8
* range.
The pre-shared key (PSK) to establish initial authentication between the * virtual private gateway and the customer gateway.
Constraints: Allowed * characters are alphanumeric characters, periods (.), and underscores (_). Must * be between 8 and 64 characters in length and cannot start with zero (0).
*/ inline const Aws::String& GetPreSharedKey() const{ return m_preSharedKey; } /** *The pre-shared key (PSK) to establish initial authentication between the * virtual private gateway and the customer gateway.
Constraints: Allowed * characters are alphanumeric characters, periods (.), and underscores (_). Must * be between 8 and 64 characters in length and cannot start with zero (0).
*/ inline bool PreSharedKeyHasBeenSet() const { return m_preSharedKeyHasBeenSet; } /** *The pre-shared key (PSK) to establish initial authentication between the * virtual private gateway and the customer gateway.
Constraints: Allowed * characters are alphanumeric characters, periods (.), and underscores (_). Must * be between 8 and 64 characters in length and cannot start with zero (0).
*/ inline void SetPreSharedKey(const Aws::String& value) { m_preSharedKeyHasBeenSet = true; m_preSharedKey = value; } /** *The pre-shared key (PSK) to establish initial authentication between the * virtual private gateway and the customer gateway.
Constraints: Allowed * characters are alphanumeric characters, periods (.), and underscores (_). Must * be between 8 and 64 characters in length and cannot start with zero (0).
*/ inline void SetPreSharedKey(Aws::String&& value) { m_preSharedKeyHasBeenSet = true; m_preSharedKey = std::move(value); } /** *The pre-shared key (PSK) to establish initial authentication between the * virtual private gateway and the customer gateway.
Constraints: Allowed * characters are alphanumeric characters, periods (.), and underscores (_). Must * be between 8 and 64 characters in length and cannot start with zero (0).
*/ inline void SetPreSharedKey(const char* value) { m_preSharedKeyHasBeenSet = true; m_preSharedKey.assign(value); } /** *The pre-shared key (PSK) to establish initial authentication between the * virtual private gateway and the customer gateway.
Constraints: Allowed * characters are alphanumeric characters, periods (.), and underscores (_). Must * be between 8 and 64 characters in length and cannot start with zero (0).
*/ inline ModifyVpnTunnelOptionsSpecification& WithPreSharedKey(const Aws::String& value) { SetPreSharedKey(value); return *this;} /** *The pre-shared key (PSK) to establish initial authentication between the * virtual private gateway and the customer gateway.
Constraints: Allowed * characters are alphanumeric characters, periods (.), and underscores (_). Must * be between 8 and 64 characters in length and cannot start with zero (0).
*/ inline ModifyVpnTunnelOptionsSpecification& WithPreSharedKey(Aws::String&& value) { SetPreSharedKey(std::move(value)); return *this;} /** *The pre-shared key (PSK) to establish initial authentication between the * virtual private gateway and the customer gateway.
Constraints: Allowed * characters are alphanumeric characters, periods (.), and underscores (_). Must * be between 8 and 64 characters in length and cannot start with zero (0).
*/ inline ModifyVpnTunnelOptionsSpecification& WithPreSharedKey(const char* value) { SetPreSharedKey(value); return *this;} /** *The lifetime for phase 1 of the IKE negotiation, in seconds.
*Constraints: A value between 900 and 28,800.
Default:
* 28800
The lifetime for phase 1 of the IKE negotiation, in seconds.
*Constraints: A value between 900 and 28,800.
Default:
* 28800
The lifetime for phase 1 of the IKE negotiation, in seconds.
*Constraints: A value between 900 and 28,800.
Default:
* 28800
The lifetime for phase 1 of the IKE negotiation, in seconds.
*Constraints: A value between 900 and 28,800.
Default:
* 28800
The lifetime for phase 2 of the IKE negotiation, in seconds.
*Constraints: A value between 900 and 3,600. The value must be less than the
* value for Phase1LifetimeSeconds
.
Default: 3600
*
The lifetime for phase 2 of the IKE negotiation, in seconds.
*Constraints: A value between 900 and 3,600. The value must be less than the
* value for Phase1LifetimeSeconds
.
Default: 3600
*
The lifetime for phase 2 of the IKE negotiation, in seconds.
*Constraints: A value between 900 and 3,600. The value must be less than the
* value for Phase1LifetimeSeconds
.
Default: 3600
*
The lifetime for phase 2 of the IKE negotiation, in seconds.
*Constraints: A value between 900 and 3,600. The value must be less than the
* value for Phase1LifetimeSeconds
.
Default: 3600
*
The margin time, in seconds, before the phase 2 lifetime expires, during
* which the Amazon Web Services side of the VPN connection performs an IKE rekey.
* The exact time of the rekey is randomly selected based on the value for
* RekeyFuzzPercentage
.
Constraints: A value between 60 and
* half of Phase2LifetimeSeconds
.
Default: 540
*
The margin time, in seconds, before the phase 2 lifetime expires, during
* which the Amazon Web Services side of the VPN connection performs an IKE rekey.
* The exact time of the rekey is randomly selected based on the value for
* RekeyFuzzPercentage
.
Constraints: A value between 60 and
* half of Phase2LifetimeSeconds
.
Default: 540
*
The margin time, in seconds, before the phase 2 lifetime expires, during
* which the Amazon Web Services side of the VPN connection performs an IKE rekey.
* The exact time of the rekey is randomly selected based on the value for
* RekeyFuzzPercentage
.
Constraints: A value between 60 and
* half of Phase2LifetimeSeconds
.
Default: 540
*
The margin time, in seconds, before the phase 2 lifetime expires, during
* which the Amazon Web Services side of the VPN connection performs an IKE rekey.
* The exact time of the rekey is randomly selected based on the value for
* RekeyFuzzPercentage
.
Constraints: A value between 60 and
* half of Phase2LifetimeSeconds
.
Default: 540
*
The percentage of the rekey window (determined by
* RekeyMarginTimeSeconds
) during which the rekey time is randomly
* selected.
Constraints: A value between 0 and 100.
Default:
* 100
The percentage of the rekey window (determined by
* RekeyMarginTimeSeconds
) during which the rekey time is randomly
* selected.
Constraints: A value between 0 and 100.
Default:
* 100
The percentage of the rekey window (determined by
* RekeyMarginTimeSeconds
) during which the rekey time is randomly
* selected.
Constraints: A value between 0 and 100.
Default:
* 100
The percentage of the rekey window (determined by
* RekeyMarginTimeSeconds
) during which the rekey time is randomly
* selected.
Constraints: A value between 0 and 100.
Default:
* 100
The number of packets in an IKE replay window.
Constraints: A value * between 64 and 2048.
Default: 1024
The number of packets in an IKE replay window.
Constraints: A value * between 64 and 2048.
Default: 1024
The number of packets in an IKE replay window.
Constraints: A value * between 64 and 2048.
Default: 1024
The number of packets in an IKE replay window.
Constraints: A value * between 64 and 2048.
Default: 1024
The number of seconds after which a DPD timeout occurs.
Constraints: A * value greater than or equal to 30.
Default: 30
The number of seconds after which a DPD timeout occurs.
Constraints: A * value greater than or equal to 30.
Default: 30
The number of seconds after which a DPD timeout occurs.
Constraints: A * value greater than or equal to 30.
Default: 30
The number of seconds after which a DPD timeout occurs.
Constraints: A * value greater than or equal to 30.
Default: 30
The action to take after DPD timeout occurs. Specify restart
to
* restart the IKE initiation. Specify clear
to end the IKE
* session.
Valid Values: clear
| none
|
* restart
Default: clear
The action to take after DPD timeout occurs. Specify restart
to
* restart the IKE initiation. Specify clear
to end the IKE
* session.
Valid Values: clear
| none
|
* restart
Default: clear
The action to take after DPD timeout occurs. Specify restart
to
* restart the IKE initiation. Specify clear
to end the IKE
* session.
Valid Values: clear
| none
|
* restart
Default: clear
The action to take after DPD timeout occurs. Specify restart
to
* restart the IKE initiation. Specify clear
to end the IKE
* session.
Valid Values: clear
| none
|
* restart
Default: clear
The action to take after DPD timeout occurs. Specify restart
to
* restart the IKE initiation. Specify clear
to end the IKE
* session.
Valid Values: clear
| none
|
* restart
Default: clear
The action to take after DPD timeout occurs. Specify restart
to
* restart the IKE initiation. Specify clear
to end the IKE
* session.
Valid Values: clear
| none
|
* restart
Default: clear
The action to take after DPD timeout occurs. Specify restart
to
* restart the IKE initiation. Specify clear
to end the IKE
* session.
Valid Values: clear
| none
|
* restart
Default: clear
The action to take after DPD timeout occurs. Specify restart
to
* restart the IKE initiation. Specify clear
to end the IKE
* session.
Valid Values: clear
| none
|
* restart
Default: clear
One or more encryption algorithms that are permitted for the VPN tunnel for * phase 1 IKE negotiations.
Valid values: AES128
|
* AES256
| AES128-GCM-16
| AES256-GCM-16
*
One or more encryption algorithms that are permitted for the VPN tunnel for * phase 1 IKE negotiations.
Valid values: AES128
|
* AES256
| AES128-GCM-16
| AES256-GCM-16
*
One or more encryption algorithms that are permitted for the VPN tunnel for * phase 1 IKE negotiations.
Valid values: AES128
|
* AES256
| AES128-GCM-16
| AES256-GCM-16
*
One or more encryption algorithms that are permitted for the VPN tunnel for * phase 1 IKE negotiations.
Valid values: AES128
|
* AES256
| AES128-GCM-16
| AES256-GCM-16
*
One or more encryption algorithms that are permitted for the VPN tunnel for * phase 1 IKE negotiations.
Valid values: AES128
|
* AES256
| AES128-GCM-16
| AES256-GCM-16
*
One or more encryption algorithms that are permitted for the VPN tunnel for * phase 1 IKE negotiations.
Valid values: AES128
|
* AES256
| AES128-GCM-16
| AES256-GCM-16
*
One or more encryption algorithms that are permitted for the VPN tunnel for * phase 1 IKE negotiations.
Valid values: AES128
|
* AES256
| AES128-GCM-16
| AES256-GCM-16
*
One or more encryption algorithms that are permitted for the VPN tunnel for * phase 1 IKE negotiations.
Valid values: AES128
|
* AES256
| AES128-GCM-16
| AES256-GCM-16
*
One or more encryption algorithms that are permitted for the VPN tunnel for * phase 2 IKE negotiations.
Valid values: AES128
|
* AES256
| AES128-GCM-16
| AES256-GCM-16
*
One or more encryption algorithms that are permitted for the VPN tunnel for * phase 2 IKE negotiations.
Valid values: AES128
|
* AES256
| AES128-GCM-16
| AES256-GCM-16
*
One or more encryption algorithms that are permitted for the VPN tunnel for * phase 2 IKE negotiations.
Valid values: AES128
|
* AES256
| AES128-GCM-16
| AES256-GCM-16
*
One or more encryption algorithms that are permitted for the VPN tunnel for * phase 2 IKE negotiations.
Valid values: AES128
|
* AES256
| AES128-GCM-16
| AES256-GCM-16
*
One or more encryption algorithms that are permitted for the VPN tunnel for * phase 2 IKE negotiations.
Valid values: AES128
|
* AES256
| AES128-GCM-16
| AES256-GCM-16
*
One or more encryption algorithms that are permitted for the VPN tunnel for * phase 2 IKE negotiations.
Valid values: AES128
|
* AES256
| AES128-GCM-16
| AES256-GCM-16
*
One or more encryption algorithms that are permitted for the VPN tunnel for * phase 2 IKE negotiations.
Valid values: AES128
|
* AES256
| AES128-GCM-16
| AES256-GCM-16
*
One or more encryption algorithms that are permitted for the VPN tunnel for * phase 2 IKE negotiations.
Valid values: AES128
|
* AES256
| AES128-GCM-16
| AES256-GCM-16
*
One or more integrity algorithms that are permitted for the VPN tunnel for * phase 1 IKE negotiations.
Valid values: SHA1
|
* SHA2-256
| SHA2-384
| SHA2-512
One or more integrity algorithms that are permitted for the VPN tunnel for * phase 1 IKE negotiations.
Valid values: SHA1
|
* SHA2-256
| SHA2-384
| SHA2-512
One or more integrity algorithms that are permitted for the VPN tunnel for * phase 1 IKE negotiations.
Valid values: SHA1
|
* SHA2-256
| SHA2-384
| SHA2-512
One or more integrity algorithms that are permitted for the VPN tunnel for * phase 1 IKE negotiations.
Valid values: SHA1
|
* SHA2-256
| SHA2-384
| SHA2-512
One or more integrity algorithms that are permitted for the VPN tunnel for * phase 1 IKE negotiations.
Valid values: SHA1
|
* SHA2-256
| SHA2-384
| SHA2-512
One or more integrity algorithms that are permitted for the VPN tunnel for * phase 1 IKE negotiations.
Valid values: SHA1
|
* SHA2-256
| SHA2-384
| SHA2-512
One or more integrity algorithms that are permitted for the VPN tunnel for * phase 1 IKE negotiations.
Valid values: SHA1
|
* SHA2-256
| SHA2-384
| SHA2-512
One or more integrity algorithms that are permitted for the VPN tunnel for * phase 1 IKE negotiations.
Valid values: SHA1
|
* SHA2-256
| SHA2-384
| SHA2-512
One or more integrity algorithms that are permitted for the VPN tunnel for * phase 2 IKE negotiations.
Valid values: SHA1
|
* SHA2-256
| SHA2-384
| SHA2-512
One or more integrity algorithms that are permitted for the VPN tunnel for * phase 2 IKE negotiations.
Valid values: SHA1
|
* SHA2-256
| SHA2-384
| SHA2-512
One or more integrity algorithms that are permitted for the VPN tunnel for * phase 2 IKE negotiations.
Valid values: SHA1
|
* SHA2-256
| SHA2-384
| SHA2-512
One or more integrity algorithms that are permitted for the VPN tunnel for * phase 2 IKE negotiations.
Valid values: SHA1
|
* SHA2-256
| SHA2-384
| SHA2-512
One or more integrity algorithms that are permitted for the VPN tunnel for * phase 2 IKE negotiations.
Valid values: SHA1
|
* SHA2-256
| SHA2-384
| SHA2-512
One or more integrity algorithms that are permitted for the VPN tunnel for * phase 2 IKE negotiations.
Valid values: SHA1
|
* SHA2-256
| SHA2-384
| SHA2-512
One or more integrity algorithms that are permitted for the VPN tunnel for * phase 2 IKE negotiations.
Valid values: SHA1
|
* SHA2-256
| SHA2-384
| SHA2-512
One or more integrity algorithms that are permitted for the VPN tunnel for * phase 2 IKE negotiations.
Valid values: SHA1
|
* SHA2-256
| SHA2-384
| SHA2-512
One or more Diffie-Hellman group numbers that are permitted for the VPN * tunnel for phase 1 IKE negotiations.
Valid values: 2
|
* 14
| 15
| 16
| 17
|
* 18
| 19
| 20
| 21
|
* 22
| 23
| 24
One or more Diffie-Hellman group numbers that are permitted for the VPN * tunnel for phase 1 IKE negotiations.
Valid values: 2
|
* 14
| 15
| 16
| 17
|
* 18
| 19
| 20
| 21
|
* 22
| 23
| 24
One or more Diffie-Hellman group numbers that are permitted for the VPN * tunnel for phase 1 IKE negotiations.
Valid values: 2
|
* 14
| 15
| 16
| 17
|
* 18
| 19
| 20
| 21
|
* 22
| 23
| 24
One or more Diffie-Hellman group numbers that are permitted for the VPN * tunnel for phase 1 IKE negotiations.
Valid values: 2
|
* 14
| 15
| 16
| 17
|
* 18
| 19
| 20
| 21
|
* 22
| 23
| 24
One or more Diffie-Hellman group numbers that are permitted for the VPN * tunnel for phase 1 IKE negotiations.
Valid values: 2
|
* 14
| 15
| 16
| 17
|
* 18
| 19
| 20
| 21
|
* 22
| 23
| 24
One or more Diffie-Hellman group numbers that are permitted for the VPN * tunnel for phase 1 IKE negotiations.
Valid values: 2
|
* 14
| 15
| 16
| 17
|
* 18
| 19
| 20
| 21
|
* 22
| 23
| 24
One or more Diffie-Hellman group numbers that are permitted for the VPN * tunnel for phase 1 IKE negotiations.
Valid values: 2
|
* 14
| 15
| 16
| 17
|
* 18
| 19
| 20
| 21
|
* 22
| 23
| 24
One or more Diffie-Hellman group numbers that are permitted for the VPN * tunnel for phase 1 IKE negotiations.
Valid values: 2
|
* 14
| 15
| 16
| 17
|
* 18
| 19
| 20
| 21
|
* 22
| 23
| 24
One or more Diffie-Hellman group numbers that are permitted for the VPN * tunnel for phase 2 IKE negotiations.
Valid values: 2
|
* 5
| 14
| 15
| 16
|
* 17
| 18
| 19
| 20
|
* 21
| 22
| 23
| 24
One or more Diffie-Hellman group numbers that are permitted for the VPN * tunnel for phase 2 IKE negotiations.
Valid values: 2
|
* 5
| 14
| 15
| 16
|
* 17
| 18
| 19
| 20
|
* 21
| 22
| 23
| 24
One or more Diffie-Hellman group numbers that are permitted for the VPN * tunnel for phase 2 IKE negotiations.
Valid values: 2
|
* 5
| 14
| 15
| 16
|
* 17
| 18
| 19
| 20
|
* 21
| 22
| 23
| 24
One or more Diffie-Hellman group numbers that are permitted for the VPN * tunnel for phase 2 IKE negotiations.
Valid values: 2
|
* 5
| 14
| 15
| 16
|
* 17
| 18
| 19
| 20
|
* 21
| 22
| 23
| 24
One or more Diffie-Hellman group numbers that are permitted for the VPN * tunnel for phase 2 IKE negotiations.
Valid values: 2
|
* 5
| 14
| 15
| 16
|
* 17
| 18
| 19
| 20
|
* 21
| 22
| 23
| 24
One or more Diffie-Hellman group numbers that are permitted for the VPN * tunnel for phase 2 IKE negotiations.
Valid values: 2
|
* 5
| 14
| 15
| 16
|
* 17
| 18
| 19
| 20
|
* 21
| 22
| 23
| 24
One or more Diffie-Hellman group numbers that are permitted for the VPN * tunnel for phase 2 IKE negotiations.
Valid values: 2
|
* 5
| 14
| 15
| 16
|
* 17
| 18
| 19
| 20
|
* 21
| 22
| 23
| 24
One or more Diffie-Hellman group numbers that are permitted for the VPN * tunnel for phase 2 IKE negotiations.
Valid values: 2
|
* 5
| 14
| 15
| 16
|
* 17
| 18
| 19
| 20
|
* 21
| 22
| 23
| 24
The IKE versions that are permitted for the VPN tunnel.
Valid values:
* ikev1
| ikev2
The IKE versions that are permitted for the VPN tunnel.
Valid values:
* ikev1
| ikev2
The IKE versions that are permitted for the VPN tunnel.
Valid values:
* ikev1
| ikev2
The IKE versions that are permitted for the VPN tunnel.
Valid values:
* ikev1
| ikev2
The IKE versions that are permitted for the VPN tunnel.
Valid values:
* ikev1
| ikev2
The IKE versions that are permitted for the VPN tunnel.
Valid values:
* ikev1
| ikev2
The IKE versions that are permitted for the VPN tunnel.
Valid values:
* ikev1
| ikev2
The IKE versions that are permitted for the VPN tunnel.
Valid values:
* ikev1
| ikev2
The action to take when the establishing the tunnel for the VPN connection.
* By default, your customer gateway device must initiate the IKE negotiation and
* bring up the tunnel. Specify start
for Amazon Web Services to
* initiate the IKE negotiation.
Valid Values: add
|
* start
Default: add
The action to take when the establishing the tunnel for the VPN connection.
* By default, your customer gateway device must initiate the IKE negotiation and
* bring up the tunnel. Specify start
for Amazon Web Services to
* initiate the IKE negotiation.
Valid Values: add
|
* start
Default: add
The action to take when the establishing the tunnel for the VPN connection.
* By default, your customer gateway device must initiate the IKE negotiation and
* bring up the tunnel. Specify start
for Amazon Web Services to
* initiate the IKE negotiation.
Valid Values: add
|
* start
Default: add
The action to take when the establishing the tunnel for the VPN connection.
* By default, your customer gateway device must initiate the IKE negotiation and
* bring up the tunnel. Specify start
for Amazon Web Services to
* initiate the IKE negotiation.
Valid Values: add
|
* start
Default: add
The action to take when the establishing the tunnel for the VPN connection.
* By default, your customer gateway device must initiate the IKE negotiation and
* bring up the tunnel. Specify start
for Amazon Web Services to
* initiate the IKE negotiation.
Valid Values: add
|
* start
Default: add
The action to take when the establishing the tunnel for the VPN connection.
* By default, your customer gateway device must initiate the IKE negotiation and
* bring up the tunnel. Specify start
for Amazon Web Services to
* initiate the IKE negotiation.
Valid Values: add
|
* start
Default: add
The action to take when the establishing the tunnel for the VPN connection.
* By default, your customer gateway device must initiate the IKE negotiation and
* bring up the tunnel. Specify start
for Amazon Web Services to
* initiate the IKE negotiation.
Valid Values: add
|
* start
Default: add
The action to take when the establishing the tunnel for the VPN connection.
* By default, your customer gateway device must initiate the IKE negotiation and
* bring up the tunnel. Specify start
for Amazon Web Services to
* initiate the IKE negotiation.
Valid Values: add
|
* start
Default: add
Options for logging VPN tunnel activity.
*/ inline const VpnTunnelLogOptionsSpecification& GetLogOptions() const{ return m_logOptions; } /** *Options for logging VPN tunnel activity.
*/ inline bool LogOptionsHasBeenSet() const { return m_logOptionsHasBeenSet; } /** *Options for logging VPN tunnel activity.
*/ inline void SetLogOptions(const VpnTunnelLogOptionsSpecification& value) { m_logOptionsHasBeenSet = true; m_logOptions = value; } /** *Options for logging VPN tunnel activity.
*/ inline void SetLogOptions(VpnTunnelLogOptionsSpecification&& value) { m_logOptionsHasBeenSet = true; m_logOptions = std::move(value); } /** *Options for logging VPN tunnel activity.
*/ inline ModifyVpnTunnelOptionsSpecification& WithLogOptions(const VpnTunnelLogOptionsSpecification& value) { SetLogOptions(value); return *this;} /** *Options for logging VPN tunnel activity.
*/ inline ModifyVpnTunnelOptionsSpecification& WithLogOptions(VpnTunnelLogOptionsSpecification&& value) { SetLogOptions(std::move(value)); return *this;} /** *Turn on or off tunnel endpoint lifecycle control feature.
*/ inline bool GetEnableTunnelLifecycleControl() const{ return m_enableTunnelLifecycleControl; } /** *Turn on or off tunnel endpoint lifecycle control feature.
*/ inline bool EnableTunnelLifecycleControlHasBeenSet() const { return m_enableTunnelLifecycleControlHasBeenSet; } /** *Turn on or off tunnel endpoint lifecycle control feature.
*/ inline void SetEnableTunnelLifecycleControl(bool value) { m_enableTunnelLifecycleControlHasBeenSet = true; m_enableTunnelLifecycleControl = value; } /** *Turn on or off tunnel endpoint lifecycle control feature.
*/ inline ModifyVpnTunnelOptionsSpecification& WithEnableTunnelLifecycleControl(bool value) { SetEnableTunnelLifecycleControl(value); return *this;} private: Aws::String m_tunnelInsideCidr; bool m_tunnelInsideCidrHasBeenSet = false; Aws::String m_tunnelInsideIpv6Cidr; bool m_tunnelInsideIpv6CidrHasBeenSet = false; Aws::String m_preSharedKey; bool m_preSharedKeyHasBeenSet = false; int m_phase1LifetimeSeconds; bool m_phase1LifetimeSecondsHasBeenSet = false; int m_phase2LifetimeSeconds; bool m_phase2LifetimeSecondsHasBeenSet = false; int m_rekeyMarginTimeSeconds; bool m_rekeyMarginTimeSecondsHasBeenSet = false; int m_rekeyFuzzPercentage; bool m_rekeyFuzzPercentageHasBeenSet = false; int m_replayWindowSize; bool m_replayWindowSizeHasBeenSet = false; int m_dPDTimeoutSeconds; bool m_dPDTimeoutSecondsHasBeenSet = false; Aws::String m_dPDTimeoutAction; bool m_dPDTimeoutActionHasBeenSet = false; Aws::Vector