#[non_exhaustive]
pub struct ModifyClientVpnEndpointInput {
Show 14 fields pub client_vpn_endpoint_id: Option<String>, pub server_certificate_arn: Option<String>, pub connection_log_options: Option<ConnectionLogOptions>, pub dns_servers: Option<DnsServersOptionsModifyStructure>, pub vpn_port: Option<i32>, pub description: Option<String>, pub split_tunnel: Option<bool>, pub dry_run: Option<bool>, pub security_group_ids: Option<Vec<String>>, pub vpc_id: Option<String>, pub self_service_portal: Option<SelfServicePortal>, pub client_connect_options: Option<ClientConnectOptions>, pub session_timeout_hours: Option<i32>, pub client_login_banner_options: Option<ClientLoginBannerOptions>,
}

Fields (Non-exhaustive)§

This struct is marked as non-exhaustive
Non-exhaustive structs could have additional fields added in future. Therefore, non-exhaustive structs cannot be constructed in external crates using the traditional Struct { .. } syntax; cannot be matched against without a wildcard ..; and struct update syntax will not work.
§client_vpn_endpoint_id: Option<String>

The ID of the Client VPN endpoint to modify.

§server_certificate_arn: Option<String>

The ARN of the server certificate to be used. The server certificate must be provisioned in Certificate Manager (ACM).

§connection_log_options: Option<ConnectionLogOptions>

Information about the client connection logging options.

If you enable client connection logging, data about client connections is sent to a Cloudwatch Logs log stream. The following information is logged:

  • Client connection requests

  • Client connection results (successful and unsuccessful)

  • Reasons for unsuccessful client connection requests

  • Client connection termination time

§dns_servers: Option<DnsServersOptionsModifyStructure>

Information about the DNS servers to be used by Client VPN connections. A Client VPN endpoint can have up to two DNS servers.

§vpn_port: Option<i32>

The port number to assign to the Client VPN endpoint for TCP and UDP traffic.

Valid Values: 443 | 1194

Default Value: 443

§description: Option<String>

A brief description of the Client VPN endpoint.

§split_tunnel: Option<bool>

Indicates whether the VPN is split-tunnel.

For information about split-tunnel VPN endpoints, see Split-tunnel Client VPN endpoint in the Client VPN Administrator Guide.

§dry_run: Option<bool>

Checks whether you have the required permissions for the action, without actually making the request, and provides an error response. If you have the required permissions, the error response is DryRunOperation. Otherwise, it is UnauthorizedOperation.

§security_group_ids: Option<Vec<String>>

The IDs of one or more security groups to apply to the target network.

§vpc_id: Option<String>

The ID of the VPC to associate with the Client VPN endpoint.

§self_service_portal: Option<SelfServicePortal>

Specify whether to enable the self-service portal for the Client VPN endpoint.

§client_connect_options: Option<ClientConnectOptions>

The options for managing connection authorization for new client connections.

§session_timeout_hours: Option<i32>

The maximum VPN session duration time in hours.

Valid values: 8 | 10 | 12 | 24

Default value: 24

§client_login_banner_options: Option<ClientLoginBannerOptions>

Options for enabling a customizable text banner that will be displayed on Amazon Web Services provided clients when a VPN session is established.

Implementations§

source§

impl ModifyClientVpnEndpointInput

source

pub fn client_vpn_endpoint_id(&self) -> Option<&str>

The ID of the Client VPN endpoint to modify.

source

pub fn server_certificate_arn(&self) -> Option<&str>

The ARN of the server certificate to be used. The server certificate must be provisioned in Certificate Manager (ACM).

source

pub fn connection_log_options(&self) -> Option<&ConnectionLogOptions>

Information about the client connection logging options.

If you enable client connection logging, data about client connections is sent to a Cloudwatch Logs log stream. The following information is logged:

  • Client connection requests

  • Client connection results (successful and unsuccessful)

  • Reasons for unsuccessful client connection requests

  • Client connection termination time

source

pub fn dns_servers(&self) -> Option<&DnsServersOptionsModifyStructure>

Information about the DNS servers to be used by Client VPN connections. A Client VPN endpoint can have up to two DNS servers.

source

pub fn vpn_port(&self) -> Option<i32>

The port number to assign to the Client VPN endpoint for TCP and UDP traffic.

Valid Values: 443 | 1194

Default Value: 443

source

pub fn description(&self) -> Option<&str>

A brief description of the Client VPN endpoint.

source

pub fn split_tunnel(&self) -> Option<bool>

Indicates whether the VPN is split-tunnel.

For information about split-tunnel VPN endpoints, see Split-tunnel Client VPN endpoint in the Client VPN Administrator Guide.

source

pub fn dry_run(&self) -> Option<bool>

Checks whether you have the required permissions for the action, without actually making the request, and provides an error response. If you have the required permissions, the error response is DryRunOperation. Otherwise, it is UnauthorizedOperation.

source

pub fn security_group_ids(&self) -> Option<&[String]>

The IDs of one or more security groups to apply to the target network.

source

pub fn vpc_id(&self) -> Option<&str>

The ID of the VPC to associate with the Client VPN endpoint.

source

pub fn self_service_portal(&self) -> Option<&SelfServicePortal>

Specify whether to enable the self-service portal for the Client VPN endpoint.

source

pub fn client_connect_options(&self) -> Option<&ClientConnectOptions>

The options for managing connection authorization for new client connections.

source

pub fn session_timeout_hours(&self) -> Option<i32>

The maximum VPN session duration time in hours.

Valid values: 8 | 10 | 12 | 24

Default value: 24

source

pub fn client_login_banner_options(&self) -> Option<&ClientLoginBannerOptions>

Options for enabling a customizable text banner that will be displayed on Amazon Web Services provided clients when a VPN session is established.

source§

impl ModifyClientVpnEndpointInput

source

pub fn builder() -> ModifyClientVpnEndpointInputBuilder

Creates a new builder-style object to manufacture ModifyClientVpnEndpointInput.

Trait Implementations§

source§

impl Clone for ModifyClientVpnEndpointInput

source§

fn clone(&self) -> ModifyClientVpnEndpointInput

Returns a copy of the value. Read more
1.0.0 · source§

fn clone_from(&mut self, source: &Self)

Performs copy-assignment from source. Read more
source§

impl Debug for ModifyClientVpnEndpointInput

source§

fn fmt(&self, f: &mut Formatter<'_>) -> Result

Formats the value using the given formatter. Read more
source§

impl PartialEq<ModifyClientVpnEndpointInput> for ModifyClientVpnEndpointInput

source§

fn eq(&self, other: &ModifyClientVpnEndpointInput) -> bool

This method tests for self and other values to be equal, and is used by ==.
1.0.0 · source§

fn ne(&self, other: &Rhs) -> bool

This method tests for !=. The default implementation is almost always sufficient, and should not be overridden without very good reason.
source§

impl StructuralPartialEq for ModifyClientVpnEndpointInput

Auto Trait Implementations§

Blanket Implementations§

source§

impl<T> Any for Twhere T: 'static + ?Sized,

source§

fn type_id(&self) -> TypeId

Gets the TypeId of self. Read more
source§

impl<T> Borrow<T> for Twhere T: ?Sized,

source§

fn borrow(&self) -> &T

Immutably borrows from an owned value. Read more
source§

impl<T> BorrowMut<T> for Twhere T: ?Sized,

source§

fn borrow_mut(&mut self) -> &mut T

Mutably borrows from an owned value. Read more
source§

impl<T> From<T> for T

source§

fn from(t: T) -> T

Returns the argument unchanged.

source§

impl<T> Instrument for T

source§

fn instrument(self, span: Span) -> Instrumented<Self>

Instruments this type with the provided Span, returning an Instrumented wrapper. Read more
source§

fn in_current_span(self) -> Instrumented<Self>

Instruments this type with the current Span, returning an Instrumented wrapper. Read more
source§

impl<T, U> Into<U> for Twhere U: From<T>,

source§

fn into(self) -> U

Calls U::from(self).

That is, this conversion is whatever the implementation of From<T> for U chooses to do.

source§

impl<T> Same<T> for T

§

type Output = T

Should always be Self
source§

impl<T> ToOwned for Twhere T: Clone,

§

type Owned = T

The resulting type after obtaining ownership.
source§

fn to_owned(&self) -> T

Creates owned data from borrowed data, usually by cloning. Read more
source§

fn clone_into(&self, target: &mut T)

Uses borrowed data to replace owned data, usually by cloning. Read more
source§

impl<T, U> TryFrom<U> for Twhere U: Into<T>,

§

type Error = Infallible

The type returned in the event of a conversion error.
source§

fn try_from(value: U) -> Result<T, <T as TryFrom<U>>::Error>

Performs the conversion.
source§

impl<T, U> TryInto<U> for Twhere U: TryFrom<T>,

§

type Error = <U as TryFrom<T>>::Error

The type returned in the event of a conversion error.
source§

fn try_into(self) -> Result<U, <U as TryFrom<T>>::Error>

Performs the conversion.
source§

impl<T> WithSubscriber for T

source§

fn with_subscriber<S>(self, subscriber: S) -> WithDispatch<Self>where S: Into<Dispatch>,

Attaches the provided Subscriber to this type, returning a WithDispatch wrapper. Read more
source§

fn with_current_subscriber(self) -> WithDispatch<Self>

Attaches the current default Subscriber to this type, returning a WithDispatch wrapper. Read more