#[non_exhaustive]
pub struct ModifyVpnTunnelOptionsSpecification {
Show 20 fields pub tunnel_inside_cidr: Option<String>, pub tunnel_inside_ipv6_cidr: Option<String>, pub pre_shared_key: Option<String>, pub phase1_lifetime_seconds: Option<i32>, pub phase2_lifetime_seconds: Option<i32>, pub rekey_margin_time_seconds: Option<i32>, pub rekey_fuzz_percentage: Option<i32>, pub replay_window_size: Option<i32>, pub dpd_timeout_seconds: Option<i32>, pub dpd_timeout_action: Option<String>, pub phase1_encryption_algorithms: Option<Vec<Phase1EncryptionAlgorithmsRequestListValue>>, pub phase2_encryption_algorithms: Option<Vec<Phase2EncryptionAlgorithmsRequestListValue>>, pub phase1_integrity_algorithms: Option<Vec<Phase1IntegrityAlgorithmsRequestListValue>>, pub phase2_integrity_algorithms: Option<Vec<Phase2IntegrityAlgorithmsRequestListValue>>, pub phase1_dh_group_numbers: Option<Vec<Phase1DhGroupNumbersRequestListValue>>, pub phase2_dh_group_numbers: Option<Vec<Phase2DhGroupNumbersRequestListValue>>, pub ike_versions: Option<Vec<IkeVersionsRequestListValue>>, pub startup_action: Option<String>, pub log_options: Option<VpnTunnelLogOptionsSpecification>, pub enable_tunnel_lifecycle_control: Option<bool>,
}
Expand description

The Amazon Web Services Site-to-Site VPN tunnel options to modify.

Fields (Non-exhaustive)§

This struct is marked as non-exhaustive
Non-exhaustive structs could have additional fields added in future. Therefore, non-exhaustive structs cannot be constructed in external crates using the traditional Struct { .. } syntax; cannot be matched against without a wildcard ..; and struct update syntax will not work.
§tunnel_inside_cidr: Option<String>

The range of inside IPv4 addresses for the tunnel. Any specified CIDR blocks must be unique across all VPN connections that use the same virtual private gateway.

Constraints: A size /30 CIDR block from the 169.254.0.0/16 range. The following CIDR blocks are reserved and cannot be used:

  • 169.254.0.0/30

  • 169.254.1.0/30

  • 169.254.2.0/30

  • 169.254.3.0/30

  • 169.254.4.0/30

  • 169.254.5.0/30

  • 169.254.169.252/30

§tunnel_inside_ipv6_cidr: Option<String>

The range of inside IPv6 addresses for the tunnel. Any specified CIDR blocks must be unique across all VPN connections that use the same transit gateway.

Constraints: A size /126 CIDR block from the local fd00::/8 range.

§pre_shared_key: Option<String>

The pre-shared key (PSK) to establish initial authentication between the virtual private gateway and the customer gateway.

Constraints: Allowed characters are alphanumeric characters, periods (.), and underscores (_). Must be between 8 and 64 characters in length and cannot start with zero (0).

§phase1_lifetime_seconds: Option<i32>

The lifetime for phase 1 of the IKE negotiation, in seconds.

Constraints: A value between 900 and 28,800.

Default: 28800

§phase2_lifetime_seconds: Option<i32>

The lifetime for phase 2 of the IKE negotiation, in seconds.

Constraints: A value between 900 and 3,600. The value must be less than the value for Phase1LifetimeSeconds.

Default: 3600

§rekey_margin_time_seconds: Option<i32>

The margin time, in seconds, before the phase 2 lifetime expires, during which the Amazon Web Services side of the VPN connection performs an IKE rekey. The exact time of the rekey is randomly selected based on the value for RekeyFuzzPercentage.

Constraints: A value between 60 and half of Phase2LifetimeSeconds.

Default: 540

§rekey_fuzz_percentage: Option<i32>

The percentage of the rekey window (determined by RekeyMarginTimeSeconds) during which the rekey time is randomly selected.

Constraints: A value between 0 and 100.

Default: 100

§replay_window_size: Option<i32>

The number of packets in an IKE replay window.

Constraints: A value between 64 and 2048.

Default: 1024

§dpd_timeout_seconds: Option<i32>

The number of seconds after which a DPD timeout occurs.

Constraints: A value greater than or equal to 30.

Default: 30

§dpd_timeout_action: Option<String>

The action to take after DPD timeout occurs. Specify restart to restart the IKE initiation. Specify clear to end the IKE session.

Valid Values: clear | none | restart

Default: clear

§phase1_encryption_algorithms: Option<Vec<Phase1EncryptionAlgorithmsRequestListValue>>

One or more encryption algorithms that are permitted for the VPN tunnel for phase 1 IKE negotiations.

Valid values: AES128 | AES256 | AES128-GCM-16 | AES256-GCM-16

§phase2_encryption_algorithms: Option<Vec<Phase2EncryptionAlgorithmsRequestListValue>>

One or more encryption algorithms that are permitted for the VPN tunnel for phase 2 IKE negotiations.

Valid values: AES128 | AES256 | AES128-GCM-16 | AES256-GCM-16

§phase1_integrity_algorithms: Option<Vec<Phase1IntegrityAlgorithmsRequestListValue>>

One or more integrity algorithms that are permitted for the VPN tunnel for phase 1 IKE negotiations.

Valid values: SHA1 | SHA2-256 | SHA2-384 | SHA2-512

§phase2_integrity_algorithms: Option<Vec<Phase2IntegrityAlgorithmsRequestListValue>>

One or more integrity algorithms that are permitted for the VPN tunnel for phase 2 IKE negotiations.

Valid values: SHA1 | SHA2-256 | SHA2-384 | SHA2-512

§phase1_dh_group_numbers: Option<Vec<Phase1DhGroupNumbersRequestListValue>>

One or more Diffie-Hellman group numbers that are permitted for the VPN tunnel for phase 1 IKE negotiations.

Valid values: 2 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24

§phase2_dh_group_numbers: Option<Vec<Phase2DhGroupNumbersRequestListValue>>

One or more Diffie-Hellman group numbers that are permitted for the VPN tunnel for phase 2 IKE negotiations.

Valid values: 2 | 5 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24

§ike_versions: Option<Vec<IkeVersionsRequestListValue>>

The IKE versions that are permitted for the VPN tunnel.

Valid values: ikev1 | ikev2

§startup_action: Option<String>

The action to take when the establishing the tunnel for the VPN connection. By default, your customer gateway device must initiate the IKE negotiation and bring up the tunnel. Specify start for Amazon Web Services to initiate the IKE negotiation.

Valid Values: add | start

Default: add

§log_options: Option<VpnTunnelLogOptionsSpecification>

Options for logging VPN tunnel activity.

§enable_tunnel_lifecycle_control: Option<bool>

Turn on or off tunnel endpoint lifecycle control feature.

Implementations§

source§

impl ModifyVpnTunnelOptionsSpecification

source

pub fn tunnel_inside_cidr(&self) -> Option<&str>

The range of inside IPv4 addresses for the tunnel. Any specified CIDR blocks must be unique across all VPN connections that use the same virtual private gateway.

Constraints: A size /30 CIDR block from the 169.254.0.0/16 range. The following CIDR blocks are reserved and cannot be used:

  • 169.254.0.0/30

  • 169.254.1.0/30

  • 169.254.2.0/30

  • 169.254.3.0/30

  • 169.254.4.0/30

  • 169.254.5.0/30

  • 169.254.169.252/30

source

pub fn tunnel_inside_ipv6_cidr(&self) -> Option<&str>

The range of inside IPv6 addresses for the tunnel. Any specified CIDR blocks must be unique across all VPN connections that use the same transit gateway.

Constraints: A size /126 CIDR block from the local fd00::/8 range.

source

pub fn pre_shared_key(&self) -> Option<&str>

The pre-shared key (PSK) to establish initial authentication between the virtual private gateway and the customer gateway.

Constraints: Allowed characters are alphanumeric characters, periods (.), and underscores (_). Must be between 8 and 64 characters in length and cannot start with zero (0).

source

pub fn phase1_lifetime_seconds(&self) -> Option<i32>

The lifetime for phase 1 of the IKE negotiation, in seconds.

Constraints: A value between 900 and 28,800.

Default: 28800

source

pub fn phase2_lifetime_seconds(&self) -> Option<i32>

The lifetime for phase 2 of the IKE negotiation, in seconds.

Constraints: A value between 900 and 3,600. The value must be less than the value for Phase1LifetimeSeconds.

Default: 3600

source

pub fn rekey_margin_time_seconds(&self) -> Option<i32>

The margin time, in seconds, before the phase 2 lifetime expires, during which the Amazon Web Services side of the VPN connection performs an IKE rekey. The exact time of the rekey is randomly selected based on the value for RekeyFuzzPercentage.

Constraints: A value between 60 and half of Phase2LifetimeSeconds.

Default: 540

source

pub fn rekey_fuzz_percentage(&self) -> Option<i32>

The percentage of the rekey window (determined by RekeyMarginTimeSeconds) during which the rekey time is randomly selected.

Constraints: A value between 0 and 100.

Default: 100

source

pub fn replay_window_size(&self) -> Option<i32>

The number of packets in an IKE replay window.

Constraints: A value between 64 and 2048.

Default: 1024

source

pub fn dpd_timeout_seconds(&self) -> Option<i32>

The number of seconds after which a DPD timeout occurs.

Constraints: A value greater than or equal to 30.

Default: 30

source

pub fn dpd_timeout_action(&self) -> Option<&str>

The action to take after DPD timeout occurs. Specify restart to restart the IKE initiation. Specify clear to end the IKE session.

Valid Values: clear | none | restart

Default: clear

source

pub fn phase1_encryption_algorithms( &self ) -> Option<&[Phase1EncryptionAlgorithmsRequestListValue]>

One or more encryption algorithms that are permitted for the VPN tunnel for phase 1 IKE negotiations.

Valid values: AES128 | AES256 | AES128-GCM-16 | AES256-GCM-16

source

pub fn phase2_encryption_algorithms( &self ) -> Option<&[Phase2EncryptionAlgorithmsRequestListValue]>

One or more encryption algorithms that are permitted for the VPN tunnel for phase 2 IKE negotiations.

Valid values: AES128 | AES256 | AES128-GCM-16 | AES256-GCM-16

source

pub fn phase1_integrity_algorithms( &self ) -> Option<&[Phase1IntegrityAlgorithmsRequestListValue]>

One or more integrity algorithms that are permitted for the VPN tunnel for phase 1 IKE negotiations.

Valid values: SHA1 | SHA2-256 | SHA2-384 | SHA2-512

source

pub fn phase2_integrity_algorithms( &self ) -> Option<&[Phase2IntegrityAlgorithmsRequestListValue]>

One or more integrity algorithms that are permitted for the VPN tunnel for phase 2 IKE negotiations.

Valid values: SHA1 | SHA2-256 | SHA2-384 | SHA2-512

source

pub fn phase1_dh_group_numbers( &self ) -> Option<&[Phase1DhGroupNumbersRequestListValue]>

One or more Diffie-Hellman group numbers that are permitted for the VPN tunnel for phase 1 IKE negotiations.

Valid values: 2 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24

source

pub fn phase2_dh_group_numbers( &self ) -> Option<&[Phase2DhGroupNumbersRequestListValue]>

One or more Diffie-Hellman group numbers that are permitted for the VPN tunnel for phase 2 IKE negotiations.

Valid values: 2 | 5 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24

source

pub fn ike_versions(&self) -> Option<&[IkeVersionsRequestListValue]>

The IKE versions that are permitted for the VPN tunnel.

Valid values: ikev1 | ikev2

source

pub fn startup_action(&self) -> Option<&str>

The action to take when the establishing the tunnel for the VPN connection. By default, your customer gateway device must initiate the IKE negotiation and bring up the tunnel. Specify start for Amazon Web Services to initiate the IKE negotiation.

Valid Values: add | start

Default: add

source

pub fn log_options(&self) -> Option<&VpnTunnelLogOptionsSpecification>

Options for logging VPN tunnel activity.

source

pub fn enable_tunnel_lifecycle_control(&self) -> Option<bool>

Turn on or off tunnel endpoint lifecycle control feature.

source§

impl ModifyVpnTunnelOptionsSpecification

source

pub fn builder() -> ModifyVpnTunnelOptionsSpecificationBuilder

Creates a new builder-style object to manufacture ModifyVpnTunnelOptionsSpecification.

Trait Implementations§

source§

impl Clone for ModifyVpnTunnelOptionsSpecification

source§

fn clone(&self) -> ModifyVpnTunnelOptionsSpecification

Returns a copy of the value. Read more
1.0.0 · source§

fn clone_from(&mut self, source: &Self)

Performs copy-assignment from source. Read more
source§

impl Debug for ModifyVpnTunnelOptionsSpecification

source§

fn fmt(&self, f: &mut Formatter<'_>) -> Result

Formats the value using the given formatter. Read more
source§

impl PartialEq<ModifyVpnTunnelOptionsSpecification> for ModifyVpnTunnelOptionsSpecification

source§

fn eq(&self, other: &ModifyVpnTunnelOptionsSpecification) -> bool

This method tests for self and other values to be equal, and is used by ==.
1.0.0 · source§

fn ne(&self, other: &Rhs) -> bool

This method tests for !=. The default implementation is almost always sufficient, and should not be overridden without very good reason.
source§

impl StructuralPartialEq for ModifyVpnTunnelOptionsSpecification

Auto Trait Implementations§

Blanket Implementations§

source§

impl<T> Any for Twhere T: 'static + ?Sized,

source§

fn type_id(&self) -> TypeId

Gets the TypeId of self. Read more
source§

impl<T> Borrow<T> for Twhere T: ?Sized,

source§

fn borrow(&self) -> &T

Immutably borrows from an owned value. Read more
source§

impl<T> BorrowMut<T> for Twhere T: ?Sized,

source§

fn borrow_mut(&mut self) -> &mut T

Mutably borrows from an owned value. Read more
source§

impl<T> From<T> for T

source§

fn from(t: T) -> T

Returns the argument unchanged.

source§

impl<T> Instrument for T

source§

fn instrument(self, span: Span) -> Instrumented<Self>

Instruments this type with the provided Span, returning an Instrumented wrapper. Read more
source§

fn in_current_span(self) -> Instrumented<Self>

Instruments this type with the current Span, returning an Instrumented wrapper. Read more
source§

impl<T, U> Into<U> for Twhere U: From<T>,

source§

fn into(self) -> U

Calls U::from(self).

That is, this conversion is whatever the implementation of From<T> for U chooses to do.

source§

impl<T> Same<T> for T

§

type Output = T

Should always be Self
source§

impl<T> ToOwned for Twhere T: Clone,

§

type Owned = T

The resulting type after obtaining ownership.
source§

fn to_owned(&self) -> T

Creates owned data from borrowed data, usually by cloning. Read more
source§

fn clone_into(&self, target: &mut T)

Uses borrowed data to replace owned data, usually by cloning. Read more
source§

impl<T, U> TryFrom<U> for Twhere U: Into<T>,

§

type Error = Infallible

The type returned in the event of a conversion error.
source§

fn try_from(value: U) -> Result<T, <T as TryFrom<U>>::Error>

Performs the conversion.
source§

impl<T, U> TryInto<U> for Twhere U: TryFrom<T>,

§

type Error = <U as TryFrom<T>>::Error

The type returned in the event of a conversion error.
source§

fn try_into(self) -> Result<U, <U as TryFrom<T>>::Error>

Performs the conversion.
source§

impl<T> WithSubscriber for T

source§

fn with_subscriber<S>(self, subscriber: S) -> WithDispatch<Self>where S: Into<Dispatch>,

Attaches the provided Subscriber to this type, returning a WithDispatch wrapper. Read more
source§

fn with_current_subscriber(self) -> WithDispatch<Self>

Attaches the current default Subscriber to this type, returning a WithDispatch wrapper. Read more