Options
All
  • Public
  • Public/Protected
  • All
Menu

Namespace IPSecConnectionTunnel

Information about a single IPSec tunnel in an IPSec connection. This object does not include the tunnel's shared secret (pre-shared key), which is found in the IPSecConnectionTunnelSharedSecret object.

Properties

Optional associatedVirtualCircuits

associatedVirtualCircuits: Array<string>

The list of virtual circuit OCIDs over which your network can reach this tunnel.

Optional bgpSessionInfo

bgpSessionInfo: model.BgpSessionInfo

compartmentId

compartmentId: string

The OCID of the compartment containing the tunnel.

Optional cpeIp

cpeIp: undefined | string

The IP address of the CPE device's VPN headend.

Example: {@code 203.0.113.22}

Optional displayName

displayName: undefined | string

A user-friendly name. Does not have to be unique, and it's changeable. Avoid entering confidential information.

Optional dpdMode

dpdMode: DpdMode

Dead peer detection (DPD) mode set on the Oracle side of the connection. This mode sets whether Oracle can only respond to a request from the CPE device to start DPD, or both respond to and initiate requests.

Optional dpdTimeoutInSec

dpdTimeoutInSec: undefined | number

DPD timeout in seconds. Note: Numbers greater than Number.MAX_SAFE_INTEGER will result in rounding issues.

Optional encryptionDomainConfig

encryptionDomainConfig: model.EncryptionDomainConfig

id

id: string

The OCID of the tunnel.

Optional ikeVersion

ikeVersion: IkeVersion

Internet Key Exchange protocol version.

lifecycleState

lifecycleState: LifecycleState

The tunnel's lifecycle state.

Optional natTranslationEnabled

natTranslationEnabled: NatTranslationEnabled

By default (the {@code AUTO} setting), IKE sends packets with a source and destination port set to 500, and when it detects that the port used to forward packets has changed (most likely because a NAT device is between the CPE device and the Oracle VPN headend) it will try to negotiate the use of NAT-T.

The {@code ENABLED} option sets the IKE protocol to use port 4500 instead of 500 and forces encapsulating traffic with the ESP protocol inside UDP packets.

The {@code DISABLED} option directs IKE to completely refuse to negotiate NAT-T even if it senses there may be a NAT device in use.

.

Optional oracleCanInitiate

oracleCanInitiate: OracleCanInitiate

Indicates whether Oracle can only respond to a request to start an IPSec tunnel from the CPE device, or both respond to and initiate requests.

Optional phaseOneDetails

phaseOneDetails: model.TunnelPhaseOneDetails

Optional phaseTwoDetails

phaseTwoDetails: model.TunnelPhaseTwoDetails

Optional routing

routing: Routing

The type of routing used for this tunnel (BGP dynamic routing, static routing, or policy-based routing).

Optional status

status: Status

The status of the tunnel based on IPSec protocol characteristics.

Optional timeCreated

timeCreated: Date

The date and time the IPSec tunnel was created, in the format defined by RFC3339.

Example: {@code 2016-08-25T21:10:29.600Z}

Optional timeStatusUpdated

timeStatusUpdated: Date

When the status of the IPSec tunnel last changed, in the format defined by RFC3339.

Example: {@code 2016-08-25T21:10:29.600Z}

Optional vpnIp

vpnIp: undefined | string

The IP address of the Oracle VPN headend for the connection.

Example: {@code 203.0.113.21}

Functions

getDeserializedJsonObj

getJsonObj