Struct aws_sdk_ec2::model::VpnTunnelOptionsSpecification
source · [−]#[non_exhaustive]pub struct VpnTunnelOptionsSpecification {Show 18 fields
pub tunnel_inside_cidr: Option<String>,
pub tunnel_inside_ipv6_cidr: Option<String>,
pub pre_shared_key: Option<String>,
pub phase1_lifetime_seconds: Option<i32>,
pub phase2_lifetime_seconds: Option<i32>,
pub rekey_margin_time_seconds: Option<i32>,
pub rekey_fuzz_percentage: Option<i32>,
pub replay_window_size: Option<i32>,
pub dpd_timeout_seconds: Option<i32>,
pub dpd_timeout_action: Option<String>,
pub phase1_encryption_algorithms: Option<Vec<Phase1EncryptionAlgorithmsRequestListValue>>,
pub phase2_encryption_algorithms: Option<Vec<Phase2EncryptionAlgorithmsRequestListValue>>,
pub phase1_integrity_algorithms: Option<Vec<Phase1IntegrityAlgorithmsRequestListValue>>,
pub phase2_integrity_algorithms: Option<Vec<Phase2IntegrityAlgorithmsRequestListValue>>,
pub phase1_dh_group_numbers: Option<Vec<Phase1DhGroupNumbersRequestListValue>>,
pub phase2_dh_group_numbers: Option<Vec<Phase2DhGroupNumbersRequestListValue>>,
pub ike_versions: Option<Vec<IkeVersionsRequestListValue>>,
pub startup_action: Option<String>,
}
Expand description
The tunnel options for a single VPN tunnel.
Fields (Non-exhaustive)
This struct is marked as non-exhaustive
Struct { .. }
syntax; cannot be matched against without a wildcard ..
; and struct update syntax will not work.tunnel_inside_cidr: Option<String>
The range of inside IPv4 addresses for the tunnel. Any specified CIDR blocks must be unique across all VPN connections that use the same virtual private gateway.
Constraints: A size /30 CIDR block from the 169.254.0.0/16
range. The following CIDR blocks are reserved and cannot be used:
-
169.254.0.0/30
-
169.254.1.0/30
-
169.254.2.0/30
-
169.254.3.0/30
-
169.254.4.0/30
-
169.254.5.0/30
-
169.254.169.252/30
tunnel_inside_ipv6_cidr: Option<String>
The range of inside IPv6 addresses for the tunnel. Any specified CIDR blocks must be unique across all VPN connections that use the same transit gateway.
Constraints: A size /126 CIDR block from the local fd00::/8
range.
The pre-shared key (PSK) to establish initial authentication between the virtual private gateway and customer gateway.
Constraints: Allowed characters are alphanumeric characters, periods (.), and underscores (_). Must be between 8 and 64 characters in length and cannot start with zero (0).
phase1_lifetime_seconds: Option<i32>
The lifetime for phase 1 of the IKE negotiation, in seconds.
Constraints: A value between 900 and 28,800.
Default: 28800
phase2_lifetime_seconds: Option<i32>
The lifetime for phase 2 of the IKE negotiation, in seconds.
Constraints: A value between 900 and 3,600. The value must be less than the value for Phase1LifetimeSeconds
.
Default: 3600
rekey_margin_time_seconds: Option<i32>
The margin time, in seconds, before the phase 2 lifetime expires, during which the Amazon Web Services side of the VPN connection performs an IKE rekey. The exact time of the rekey is randomly selected based on the value for RekeyFuzzPercentage
.
Constraints: A value between 60 and half of Phase2LifetimeSeconds
.
Default: 540
rekey_fuzz_percentage: Option<i32>
The percentage of the rekey window (determined by RekeyMarginTimeSeconds
) during which the rekey time is randomly selected.
Constraints: A value between 0 and 100.
Default: 100
replay_window_size: Option<i32>
The number of packets in an IKE replay window.
Constraints: A value between 64 and 2048.
Default: 1024
dpd_timeout_seconds: Option<i32>
The number of seconds after which a DPD timeout occurs.
Constraints: A value greater than or equal to 30.
Default: 30
dpd_timeout_action: Option<String>
The action to take after DPD timeout occurs. Specify restart
to restart the IKE initiation. Specify clear
to end the IKE session.
Valid Values: clear
| none
| restart
Default: clear
phase1_encryption_algorithms: Option<Vec<Phase1EncryptionAlgorithmsRequestListValue>>
One or more encryption algorithms that are permitted for the VPN tunnel for phase 1 IKE negotiations.
Valid values: AES128
| AES256
| AES128-GCM-16
| AES256-GCM-16
phase2_encryption_algorithms: Option<Vec<Phase2EncryptionAlgorithmsRequestListValue>>
One or more encryption algorithms that are permitted for the VPN tunnel for phase 2 IKE negotiations.
Valid values: AES128
| AES256
| AES128-GCM-16
| AES256-GCM-16
phase1_integrity_algorithms: Option<Vec<Phase1IntegrityAlgorithmsRequestListValue>>
One or more integrity algorithms that are permitted for the VPN tunnel for phase 1 IKE negotiations.
Valid values: SHA1
| SHA2-256
| SHA2-384
| SHA2-512
phase2_integrity_algorithms: Option<Vec<Phase2IntegrityAlgorithmsRequestListValue>>
One or more integrity algorithms that are permitted for the VPN tunnel for phase 2 IKE negotiations.
Valid values: SHA1
| SHA2-256
| SHA2-384
| SHA2-512
phase1_dh_group_numbers: Option<Vec<Phase1DhGroupNumbersRequestListValue>>
One or more Diffie-Hellman group numbers that are permitted for the VPN tunnel for phase 1 IKE negotiations.
Valid values: 2
| 14
| 15
| 16
| 17
| 18
| 19
| 20
| 21
| 22
| 23
| 24
phase2_dh_group_numbers: Option<Vec<Phase2DhGroupNumbersRequestListValue>>
One or more Diffie-Hellman group numbers that are permitted for the VPN tunnel for phase 2 IKE negotiations.
Valid values: 2
| 5
| 14
| 15
| 16
| 17
| 18
| 19
| 20
| 21
| 22
| 23
| 24
ike_versions: Option<Vec<IkeVersionsRequestListValue>>
The IKE versions that are permitted for the VPN tunnel.
Valid values: ikev1
| ikev2
startup_action: Option<String>
The action to take when the establishing the tunnel for the VPN connection. By default, your customer gateway device must initiate the IKE negotiation and bring up the tunnel. Specify start
for Amazon Web Services to initiate the IKE negotiation.
Valid Values: add
| start
Default: add
Implementations
sourceimpl VpnTunnelOptionsSpecification
impl VpnTunnelOptionsSpecification
sourcepub fn tunnel_inside_cidr(&self) -> Option<&str>
pub fn tunnel_inside_cidr(&self) -> Option<&str>
The range of inside IPv4 addresses for the tunnel. Any specified CIDR blocks must be unique across all VPN connections that use the same virtual private gateway.
Constraints: A size /30 CIDR block from the 169.254.0.0/16
range. The following CIDR blocks are reserved and cannot be used:
-
169.254.0.0/30
-
169.254.1.0/30
-
169.254.2.0/30
-
169.254.3.0/30
-
169.254.4.0/30
-
169.254.5.0/30
-
169.254.169.252/30
sourcepub fn tunnel_inside_ipv6_cidr(&self) -> Option<&str>
pub fn tunnel_inside_ipv6_cidr(&self) -> Option<&str>
The range of inside IPv6 addresses for the tunnel. Any specified CIDR blocks must be unique across all VPN connections that use the same transit gateway.
Constraints: A size /126 CIDR block from the local fd00::/8
range.
The pre-shared key (PSK) to establish initial authentication between the virtual private gateway and customer gateway.
Constraints: Allowed characters are alphanumeric characters, periods (.), and underscores (_). Must be between 8 and 64 characters in length and cannot start with zero (0).
sourcepub fn phase1_lifetime_seconds(&self) -> Option<i32>
pub fn phase1_lifetime_seconds(&self) -> Option<i32>
The lifetime for phase 1 of the IKE negotiation, in seconds.
Constraints: A value between 900 and 28,800.
Default: 28800
sourcepub fn phase2_lifetime_seconds(&self) -> Option<i32>
pub fn phase2_lifetime_seconds(&self) -> Option<i32>
The lifetime for phase 2 of the IKE negotiation, in seconds.
Constraints: A value between 900 and 3,600. The value must be less than the value for Phase1LifetimeSeconds
.
Default: 3600
sourcepub fn rekey_margin_time_seconds(&self) -> Option<i32>
pub fn rekey_margin_time_seconds(&self) -> Option<i32>
The margin time, in seconds, before the phase 2 lifetime expires, during which the Amazon Web Services side of the VPN connection performs an IKE rekey. The exact time of the rekey is randomly selected based on the value for RekeyFuzzPercentage
.
Constraints: A value between 60 and half of Phase2LifetimeSeconds
.
Default: 540
sourcepub fn rekey_fuzz_percentage(&self) -> Option<i32>
pub fn rekey_fuzz_percentage(&self) -> Option<i32>
The percentage of the rekey window (determined by RekeyMarginTimeSeconds
) during which the rekey time is randomly selected.
Constraints: A value between 0 and 100.
Default: 100
sourcepub fn replay_window_size(&self) -> Option<i32>
pub fn replay_window_size(&self) -> Option<i32>
The number of packets in an IKE replay window.
Constraints: A value between 64 and 2048.
Default: 1024
sourcepub fn dpd_timeout_seconds(&self) -> Option<i32>
pub fn dpd_timeout_seconds(&self) -> Option<i32>
The number of seconds after which a DPD timeout occurs.
Constraints: A value greater than or equal to 30.
Default: 30
sourcepub fn dpd_timeout_action(&self) -> Option<&str>
pub fn dpd_timeout_action(&self) -> Option<&str>
The action to take after DPD timeout occurs. Specify restart
to restart the IKE initiation. Specify clear
to end the IKE session.
Valid Values: clear
| none
| restart
Default: clear
sourcepub fn phase1_encryption_algorithms(
&self
) -> Option<&[Phase1EncryptionAlgorithmsRequestListValue]>
pub fn phase1_encryption_algorithms(
&self
) -> Option<&[Phase1EncryptionAlgorithmsRequestListValue]>
One or more encryption algorithms that are permitted for the VPN tunnel for phase 1 IKE negotiations.
Valid values: AES128
| AES256
| AES128-GCM-16
| AES256-GCM-16
sourcepub fn phase2_encryption_algorithms(
&self
) -> Option<&[Phase2EncryptionAlgorithmsRequestListValue]>
pub fn phase2_encryption_algorithms(
&self
) -> Option<&[Phase2EncryptionAlgorithmsRequestListValue]>
One or more encryption algorithms that are permitted for the VPN tunnel for phase 2 IKE negotiations.
Valid values: AES128
| AES256
| AES128-GCM-16
| AES256-GCM-16
sourcepub fn phase1_integrity_algorithms(
&self
) -> Option<&[Phase1IntegrityAlgorithmsRequestListValue]>
pub fn phase1_integrity_algorithms(
&self
) -> Option<&[Phase1IntegrityAlgorithmsRequestListValue]>
One or more integrity algorithms that are permitted for the VPN tunnel for phase 1 IKE negotiations.
Valid values: SHA1
| SHA2-256
| SHA2-384
| SHA2-512
sourcepub fn phase2_integrity_algorithms(
&self
) -> Option<&[Phase2IntegrityAlgorithmsRequestListValue]>
pub fn phase2_integrity_algorithms(
&self
) -> Option<&[Phase2IntegrityAlgorithmsRequestListValue]>
One or more integrity algorithms that are permitted for the VPN tunnel for phase 2 IKE negotiations.
Valid values: SHA1
| SHA2-256
| SHA2-384
| SHA2-512
sourcepub fn phase1_dh_group_numbers(
&self
) -> Option<&[Phase1DhGroupNumbersRequestListValue]>
pub fn phase1_dh_group_numbers(
&self
) -> Option<&[Phase1DhGroupNumbersRequestListValue]>
One or more Diffie-Hellman group numbers that are permitted for the VPN tunnel for phase 1 IKE negotiations.
Valid values: 2
| 14
| 15
| 16
| 17
| 18
| 19
| 20
| 21
| 22
| 23
| 24
sourcepub fn phase2_dh_group_numbers(
&self
) -> Option<&[Phase2DhGroupNumbersRequestListValue]>
pub fn phase2_dh_group_numbers(
&self
) -> Option<&[Phase2DhGroupNumbersRequestListValue]>
One or more Diffie-Hellman group numbers that are permitted for the VPN tunnel for phase 2 IKE negotiations.
Valid values: 2
| 5
| 14
| 15
| 16
| 17
| 18
| 19
| 20
| 21
| 22
| 23
| 24
sourcepub fn ike_versions(&self) -> Option<&[IkeVersionsRequestListValue]>
pub fn ike_versions(&self) -> Option<&[IkeVersionsRequestListValue]>
The IKE versions that are permitted for the VPN tunnel.
Valid values: ikev1
| ikev2
sourcepub fn startup_action(&self) -> Option<&str>
pub fn startup_action(&self) -> Option<&str>
The action to take when the establishing the tunnel for the VPN connection. By default, your customer gateway device must initiate the IKE negotiation and bring up the tunnel. Specify start
for Amazon Web Services to initiate the IKE negotiation.
Valid Values: add
| start
Default: add
sourceimpl VpnTunnelOptionsSpecification
impl VpnTunnelOptionsSpecification
sourcepub fn builder() -> Builder
pub fn builder() -> Builder
Creates a new builder-style object to manufacture VpnTunnelOptionsSpecification
.
Trait Implementations
sourceimpl Clone for VpnTunnelOptionsSpecification
impl Clone for VpnTunnelOptionsSpecification
sourcefn clone(&self) -> VpnTunnelOptionsSpecification
fn clone(&self) -> VpnTunnelOptionsSpecification
Returns a copy of the value. Read more
1.0.0 · sourcefn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
Performs copy-assignment from source
. Read more
sourceimpl Debug for VpnTunnelOptionsSpecification
impl Debug for VpnTunnelOptionsSpecification
sourceimpl PartialEq<VpnTunnelOptionsSpecification> for VpnTunnelOptionsSpecification
impl PartialEq<VpnTunnelOptionsSpecification> for VpnTunnelOptionsSpecification
sourcefn eq(&self, other: &VpnTunnelOptionsSpecification) -> bool
fn eq(&self, other: &VpnTunnelOptionsSpecification) -> bool
This method tests for self
and other
values to be equal, and is used
by ==
. Read more
sourcefn ne(&self, other: &VpnTunnelOptionsSpecification) -> bool
fn ne(&self, other: &VpnTunnelOptionsSpecification) -> bool
This method tests for !=
.
impl StructuralPartialEq for VpnTunnelOptionsSpecification
Auto Trait Implementations
impl RefUnwindSafe for VpnTunnelOptionsSpecification
impl Send for VpnTunnelOptionsSpecification
impl Sync for VpnTunnelOptionsSpecification
impl Unpin for VpnTunnelOptionsSpecification
impl UnwindSafe for VpnTunnelOptionsSpecification
Blanket Implementations
sourceimpl<T> BorrowMut<T> for T where
T: ?Sized,
impl<T> BorrowMut<T> for T where
T: ?Sized,
const: unstable · sourcefn borrow_mut(&mut self) -> &mut T
fn borrow_mut(&mut self) -> &mut T
Mutably borrows from an owned value. Read more
sourceimpl<T> Instrument for T
impl<T> Instrument for T
sourcefn instrument(self, span: Span) -> Instrumented<Self>
fn instrument(self, span: Span) -> Instrumented<Self>
sourcefn in_current_span(self) -> Instrumented<Self>
fn in_current_span(self) -> Instrumented<Self>
sourceimpl<T> WithSubscriber for T
impl<T> WithSubscriber for T
sourcefn with_subscriber<S>(self, subscriber: S) -> WithDispatch<Self> where
S: Into<Dispatch>,
fn with_subscriber<S>(self, subscriber: S) -> WithDispatch<Self> where
S: Into<Dispatch>,
Attaches the provided Subscriber
to this type, returning a
WithDispatch
wrapper. Read more
sourcefn with_current_subscriber(self) -> WithDispatch<Self>
fn with_current_subscriber(self) -> WithDispatch<Self>
Attaches the current default Subscriber
to this type, returning a
WithDispatch
wrapper. Read more