fortios.system.Ipsecaggregate
Explore with Pulumi AI
Configure an aggregate of IPsec tunnels.
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as fortios from "@pulumiverse/fortios";
const trname1Phase1interface = new fortios.vpn.ipsec.Phase1interface("trname1Phase1interface", {
    acctVerify: "disable",
    addGwRoute: "disable",
    addRoute: "enable",
    assignIp: "enable",
    assignIpFrom: "range",
    authmethod: "psk",
    autoDiscoveryForwarder: "disable",
    autoDiscoveryPsk: "disable",
    autoDiscoveryReceiver: "disable",
    autoDiscoverySender: "disable",
    autoNegotiate: "enable",
    certIdValidation: "enable",
    childlessIke: "disable",
    clientAutoNegotiate: "disable",
    clientKeepAlive: "disable",
    defaultGw: "0.0.0.0",
    defaultGwPriority: 0,
    dhgrp: "14 5",
    digitalSignatureAuth: "disable",
    distance: 15,
    dnsMode: "manual",
    dpd: "on-demand",
    dpdRetrycount: 3,
    dpdRetryinterval: "20",
    eap: "disable",
    eapIdentity: "use-id-payload",
    encapLocalGw4: "0.0.0.0",
    encapLocalGw6: "::",
    encapRemoteGw4: "0.0.0.0",
    encapRemoteGw6: "::",
    encapsulation: "none",
    encapsulationAddress: "ike",
    enforceUniqueId: "disable",
    exchangeInterfaceIp: "disable",
    exchangeIpAddr4: "0.0.0.0",
    exchangeIpAddr6: "::",
    forticlientEnforcement: "disable",
    fragmentation: "enable",
    fragmentationMtu: 1200,
    groupAuthentication: "disable",
    haSyncEspSeqno: "enable",
    idleTimeout: "disable",
    idleTimeoutinterval: 15,
    ikeVersion: "1",
    includeLocalLan: "disable",
    "interface": "port3",
    ipVersion: "4",
    ipv4DnsServer1: "0.0.0.0",
    ipv4DnsServer2: "0.0.0.0",
    ipv4DnsServer3: "0.0.0.0",
    ipv4EndIp: "0.0.0.0",
    ipv4Netmask: "255.255.255.255",
    ipv4StartIp: "0.0.0.0",
    ipv4WinsServer1: "0.0.0.0",
    ipv4WinsServer2: "0.0.0.0",
    ipv6DnsServer1: "::",
    ipv6DnsServer2: "::",
    ipv6DnsServer3: "::",
    ipv6EndIp: "::",
    ipv6Prefix: 128,
    ipv6StartIp: "::",
    keepalive: 10,
    keylife: 86400,
    localGw: "0.0.0.0",
    localGw6: "::",
    localidType: "auto",
    meshSelectorType: "disable",
    mode: "main",
    modeCfg: "disable",
    monitorHoldDownDelay: 0,
    monitorHoldDownTime: "00:00",
    monitorHoldDownType: "immediate",
    monitorHoldDownWeekday: "sunday",
    nattraversal: "enable",
    negotiateTimeout: 30,
    netDevice: "disable",
    passiveMode: "disable",
    peertype: "any",
    ppk: "disable",
    priority: 0,
    proposal: "aes128-sha256 aes256-sha256 aes128-sha1 aes256-sha1",
    psksecret: "eweeeeeeeecee",
    reauth: "disable",
    rekey: "enable",
    remoteGw: "2.2.2.2",
    remoteGw6: "::",
    rsaSignatureFormat: "pkcs1",
    savePassword: "disable",
    sendCertChain: "enable",
    signatureHashAlg: "sha2-512 sha2-384 sha2-256 sha1",
    suiteB: "disable",
    tunnelSearch: "selectors",
    type: "static",
    unitySupport: "enable",
    wizardType: "custom",
    xauthtype: "disable",
});
const trname1Phase2interface = new fortios.vpn.ipsec.Phase2interface("trname1Phase2interface", {
    addRoute: "phase1",
    autoDiscoveryForwarder: "phase1",
    autoDiscoverySender: "phase1",
    autoNegotiate: "disable",
    dhcpIpsec: "disable",
    dhgrp: "14 5",
    dstAddrType: "subnet",
    dstEndIp6: "::",
    dstPort: 0,
    dstSubnet: "0.0.0.0 0.0.0.0",
    encapsulation: "tunnel-mode",
    keepalive: "disable",
    keylifeType: "seconds",
    keylifekbs: 5120,
    keylifeseconds: 43200,
    l2tp: "disable",
    pfs: "enable",
    phase1name: trname1Phase1interface.name,
    proposal: "aes128-sha1 aes256-sha1 aes128-sha256 aes256-sha256 aes128gcm aes256gcm chacha20poly1305",
    protocol: 0,
    replay: "enable",
    routeOverlap: "use-new",
    singleSource: "disable",
    srcAddrType: "subnet",
    srcEndIp6: "::",
    srcPort: 0,
    srcSubnet: "0.0.0.0 0.0.0.0",
});
const trname = new fortios.system.Ipsecaggregate("trname", {
    algorithm: "round-robin",
    members: [{
        tunnelName: trname1Phase1interface.name,
    }],
});
import pulumi
import pulumiverse_fortios as fortios
trname1_phase1interface = fortios.vpn.ipsec.Phase1interface("trname1Phase1interface",
    acct_verify="disable",
    add_gw_route="disable",
    add_route="enable",
    assign_ip="enable",
    assign_ip_from="range",
    authmethod="psk",
    auto_discovery_forwarder="disable",
    auto_discovery_psk="disable",
    auto_discovery_receiver="disable",
    auto_discovery_sender="disable",
    auto_negotiate="enable",
    cert_id_validation="enable",
    childless_ike="disable",
    client_auto_negotiate="disable",
    client_keep_alive="disable",
    default_gw="0.0.0.0",
    default_gw_priority=0,
    dhgrp="14 5",
    digital_signature_auth="disable",
    distance=15,
    dns_mode="manual",
    dpd="on-demand",
    dpd_retrycount=3,
    dpd_retryinterval="20",
    eap="disable",
    eap_identity="use-id-payload",
    encap_local_gw4="0.0.0.0",
    encap_local_gw6="::",
    encap_remote_gw4="0.0.0.0",
    encap_remote_gw6="::",
    encapsulation="none",
    encapsulation_address="ike",
    enforce_unique_id="disable",
    exchange_interface_ip="disable",
    exchange_ip_addr4="0.0.0.0",
    exchange_ip_addr6="::",
    forticlient_enforcement="disable",
    fragmentation="enable",
    fragmentation_mtu=1200,
    group_authentication="disable",
    ha_sync_esp_seqno="enable",
    idle_timeout="disable",
    idle_timeoutinterval=15,
    ike_version="1",
    include_local_lan="disable",
    interface="port3",
    ip_version="4",
    ipv4_dns_server1="0.0.0.0",
    ipv4_dns_server2="0.0.0.0",
    ipv4_dns_server3="0.0.0.0",
    ipv4_end_ip="0.0.0.0",
    ipv4_netmask="255.255.255.255",
    ipv4_start_ip="0.0.0.0",
    ipv4_wins_server1="0.0.0.0",
    ipv4_wins_server2="0.0.0.0",
    ipv6_dns_server1="::",
    ipv6_dns_server2="::",
    ipv6_dns_server3="::",
    ipv6_end_ip="::",
    ipv6_prefix=128,
    ipv6_start_ip="::",
    keepalive=10,
    keylife=86400,
    local_gw="0.0.0.0",
    local_gw6="::",
    localid_type="auto",
    mesh_selector_type="disable",
    mode="main",
    mode_cfg="disable",
    monitor_hold_down_delay=0,
    monitor_hold_down_time="00:00",
    monitor_hold_down_type="immediate",
    monitor_hold_down_weekday="sunday",
    nattraversal="enable",
    negotiate_timeout=30,
    net_device="disable",
    passive_mode="disable",
    peertype="any",
    ppk="disable",
    priority=0,
    proposal="aes128-sha256 aes256-sha256 aes128-sha1 aes256-sha1",
    psksecret="eweeeeeeeecee",
    reauth="disable",
    rekey="enable",
    remote_gw="2.2.2.2",
    remote_gw6="::",
    rsa_signature_format="pkcs1",
    save_password="disable",
    send_cert_chain="enable",
    signature_hash_alg="sha2-512 sha2-384 sha2-256 sha1",
    suite_b="disable",
    tunnel_search="selectors",
    type="static",
    unity_support="enable",
    wizard_type="custom",
    xauthtype="disable")
trname1_phase2interface = fortios.vpn.ipsec.Phase2interface("trname1Phase2interface",
    add_route="phase1",
    auto_discovery_forwarder="phase1",
    auto_discovery_sender="phase1",
    auto_negotiate="disable",
    dhcp_ipsec="disable",
    dhgrp="14 5",
    dst_addr_type="subnet",
    dst_end_ip6="::",
    dst_port=0,
    dst_subnet="0.0.0.0 0.0.0.0",
    encapsulation="tunnel-mode",
    keepalive="disable",
    keylife_type="seconds",
    keylifekbs=5120,
    keylifeseconds=43200,
    l2tp="disable",
    pfs="enable",
    phase1name=trname1_phase1interface.name,
    proposal="aes128-sha1 aes256-sha1 aes128-sha256 aes256-sha256 aes128gcm aes256gcm chacha20poly1305",
    protocol=0,
    replay="enable",
    route_overlap="use-new",
    single_source="disable",
    src_addr_type="subnet",
    src_end_ip6="::",
    src_port=0,
    src_subnet="0.0.0.0 0.0.0.0")
trname = fortios.system.Ipsecaggregate("trname",
    algorithm="round-robin",
    members=[fortios.system.IpsecaggregateMemberArgs(
        tunnel_name=trname1_phase1interface.name,
    )])
package main
import (
	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
	"github.com/pulumiverse/pulumi-fortios/sdk/go/fortios/system"
	"github.com/pulumiverse/pulumi-fortios/sdk/go/fortios/vpn"
)
func main() {
	pulumi.Run(func(ctx *pulumi.Context) error {
		trname1Phase1interface, err := vpn.NewPhase1interface(ctx, "trname1Phase1interface", &vpn.Phase1interfaceArgs{
			AcctVerify:             pulumi.String("disable"),
			AddGwRoute:             pulumi.String("disable"),
			AddRoute:               pulumi.String("enable"),
			AssignIp:               pulumi.String("enable"),
			AssignIpFrom:           pulumi.String("range"),
			Authmethod:             pulumi.String("psk"),
			AutoDiscoveryForwarder: pulumi.String("disable"),
			AutoDiscoveryPsk:       pulumi.String("disable"),
			AutoDiscoveryReceiver:  pulumi.String("disable"),
			AutoDiscoverySender:    pulumi.String("disable"),
			AutoNegotiate:          pulumi.String("enable"),
			CertIdValidation:       pulumi.String("enable"),
			ChildlessIke:           pulumi.String("disable"),
			ClientAutoNegotiate:    pulumi.String("disable"),
			ClientKeepAlive:        pulumi.String("disable"),
			DefaultGw:              pulumi.String("0.0.0.0"),
			DefaultGwPriority:      pulumi.Int(0),
			Dhgrp:                  pulumi.String("14 5"),
			DigitalSignatureAuth:   pulumi.String("disable"),
			Distance:               pulumi.Int(15),
			DnsMode:                pulumi.String("manual"),
			Dpd:                    pulumi.String("on-demand"),
			DpdRetrycount:          pulumi.Int(3),
			DpdRetryinterval:       pulumi.String("20"),
			Eap:                    pulumi.String("disable"),
			EapIdentity:            pulumi.String("use-id-payload"),
			EncapLocalGw4:          pulumi.String("0.0.0.0"),
			EncapLocalGw6:          pulumi.String("::"),
			EncapRemoteGw4:         pulumi.String("0.0.0.0"),
			EncapRemoteGw6:         pulumi.String("::"),
			Encapsulation:          pulumi.String("none"),
			EncapsulationAddress:   pulumi.String("ike"),
			EnforceUniqueId:        pulumi.String("disable"),
			ExchangeInterfaceIp:    pulumi.String("disable"),
			ExchangeIpAddr4:        pulumi.String("0.0.0.0"),
			ExchangeIpAddr6:        pulumi.String("::"),
			ForticlientEnforcement: pulumi.String("disable"),
			Fragmentation:          pulumi.String("enable"),
			FragmentationMtu:       pulumi.Int(1200),
			GroupAuthentication:    pulumi.String("disable"),
			HaSyncEspSeqno:         pulumi.String("enable"),
			IdleTimeout:            pulumi.String("disable"),
			IdleTimeoutinterval:    pulumi.Int(15),
			IkeVersion:             pulumi.String("1"),
			IncludeLocalLan:        pulumi.String("disable"),
			Interface:              pulumi.String("port3"),
			IpVersion:              pulumi.String("4"),
			Ipv4DnsServer1:         pulumi.String("0.0.0.0"),
			Ipv4DnsServer2:         pulumi.String("0.0.0.0"),
			Ipv4DnsServer3:         pulumi.String("0.0.0.0"),
			Ipv4EndIp:              pulumi.String("0.0.0.0"),
			Ipv4Netmask:            pulumi.String("255.255.255.255"),
			Ipv4StartIp:            pulumi.String("0.0.0.0"),
			Ipv4WinsServer1:        pulumi.String("0.0.0.0"),
			Ipv4WinsServer2:        pulumi.String("0.0.0.0"),
			Ipv6DnsServer1:         pulumi.String("::"),
			Ipv6DnsServer2:         pulumi.String("::"),
			Ipv6DnsServer3:         pulumi.String("::"),
			Ipv6EndIp:              pulumi.String("::"),
			Ipv6Prefix:             pulumi.Int(128),
			Ipv6StartIp:            pulumi.String("::"),
			Keepalive:              pulumi.Int(10),
			Keylife:                pulumi.Int(86400),
			LocalGw:                pulumi.String("0.0.0.0"),
			LocalGw6:               pulumi.String("::"),
			LocalidType:            pulumi.String("auto"),
			MeshSelectorType:       pulumi.String("disable"),
			Mode:                   pulumi.String("main"),
			ModeCfg:                pulumi.String("disable"),
			MonitorHoldDownDelay:   pulumi.Int(0),
			MonitorHoldDownTime:    pulumi.String("00:00"),
			MonitorHoldDownType:    pulumi.String("immediate"),
			MonitorHoldDownWeekday: pulumi.String("sunday"),
			Nattraversal:           pulumi.String("enable"),
			NegotiateTimeout:       pulumi.Int(30),
			NetDevice:              pulumi.String("disable"),
			PassiveMode:            pulumi.String("disable"),
			Peertype:               pulumi.String("any"),
			Ppk:                    pulumi.String("disable"),
			Priority:               pulumi.Int(0),
			Proposal:               pulumi.String("aes128-sha256 aes256-sha256 aes128-sha1 aes256-sha1"),
			Psksecret:              pulumi.String("eweeeeeeeecee"),
			Reauth:                 pulumi.String("disable"),
			Rekey:                  pulumi.String("enable"),
			RemoteGw:               pulumi.String("2.2.2.2"),
			RemoteGw6:              pulumi.String("::"),
			RsaSignatureFormat:     pulumi.String("pkcs1"),
			SavePassword:           pulumi.String("disable"),
			SendCertChain:          pulumi.String("enable"),
			SignatureHashAlg:       pulumi.String("sha2-512 sha2-384 sha2-256 sha1"),
			SuiteB:                 pulumi.String("disable"),
			TunnelSearch:           pulumi.String("selectors"),
			Type:                   pulumi.String("static"),
			UnitySupport:           pulumi.String("enable"),
			WizardType:             pulumi.String("custom"),
			Xauthtype:              pulumi.String("disable"),
		})
		if err != nil {
			return err
		}
		_, err = vpn.NewPhase2interface(ctx, "trname1Phase2interface", &vpn.Phase2interfaceArgs{
			AddRoute:               pulumi.String("phase1"),
			AutoDiscoveryForwarder: pulumi.String("phase1"),
			AutoDiscoverySender:    pulumi.String("phase1"),
			AutoNegotiate:          pulumi.String("disable"),
			DhcpIpsec:              pulumi.String("disable"),
			Dhgrp:                  pulumi.String("14 5"),
			DstAddrType:            pulumi.String("subnet"),
			DstEndIp6:              pulumi.String("::"),
			DstPort:                pulumi.Int(0),
			DstSubnet:              pulumi.String("0.0.0.0 0.0.0.0"),
			Encapsulation:          pulumi.String("tunnel-mode"),
			Keepalive:              pulumi.String("disable"),
			KeylifeType:            pulumi.String("seconds"),
			Keylifekbs:             pulumi.Int(5120),
			Keylifeseconds:         pulumi.Int(43200),
			L2tp:                   pulumi.String("disable"),
			Pfs:                    pulumi.String("enable"),
			Phase1name:             trname1Phase1interface.Name,
			Proposal:               pulumi.String("aes128-sha1 aes256-sha1 aes128-sha256 aes256-sha256 aes128gcm aes256gcm chacha20poly1305"),
			Protocol:               pulumi.Int(0),
			Replay:                 pulumi.String("enable"),
			RouteOverlap:           pulumi.String("use-new"),
			SingleSource:           pulumi.String("disable"),
			SrcAddrType:            pulumi.String("subnet"),
			SrcEndIp6:              pulumi.String("::"),
			SrcPort:                pulumi.Int(0),
			SrcSubnet:              pulumi.String("0.0.0.0 0.0.0.0"),
		})
		if err != nil {
			return err
		}
		_, err = system.NewIpsecaggregate(ctx, "trname", &system.IpsecaggregateArgs{
			Algorithm: pulumi.String("round-robin"),
			Members: system.IpsecaggregateMemberArray{
				&system.IpsecaggregateMemberArgs{
					TunnelName: trname1Phase1interface.Name,
				},
			},
		})
		if err != nil {
			return err
		}
		return nil
	})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Fortios = Pulumiverse.Fortios;
return await Deployment.RunAsync(() => 
{
    var trname1Phase1interface = new Fortios.Vpn.Ipsec.Phase1interface("trname1Phase1interface", new()
    {
        AcctVerify = "disable",
        AddGwRoute = "disable",
        AddRoute = "enable",
        AssignIp = "enable",
        AssignIpFrom = "range",
        Authmethod = "psk",
        AutoDiscoveryForwarder = "disable",
        AutoDiscoveryPsk = "disable",
        AutoDiscoveryReceiver = "disable",
        AutoDiscoverySender = "disable",
        AutoNegotiate = "enable",
        CertIdValidation = "enable",
        ChildlessIke = "disable",
        ClientAutoNegotiate = "disable",
        ClientKeepAlive = "disable",
        DefaultGw = "0.0.0.0",
        DefaultGwPriority = 0,
        Dhgrp = "14 5",
        DigitalSignatureAuth = "disable",
        Distance = 15,
        DnsMode = "manual",
        Dpd = "on-demand",
        DpdRetrycount = 3,
        DpdRetryinterval = "20",
        Eap = "disable",
        EapIdentity = "use-id-payload",
        EncapLocalGw4 = "0.0.0.0",
        EncapLocalGw6 = "::",
        EncapRemoteGw4 = "0.0.0.0",
        EncapRemoteGw6 = "::",
        Encapsulation = "none",
        EncapsulationAddress = "ike",
        EnforceUniqueId = "disable",
        ExchangeInterfaceIp = "disable",
        ExchangeIpAddr4 = "0.0.0.0",
        ExchangeIpAddr6 = "::",
        ForticlientEnforcement = "disable",
        Fragmentation = "enable",
        FragmentationMtu = 1200,
        GroupAuthentication = "disable",
        HaSyncEspSeqno = "enable",
        IdleTimeout = "disable",
        IdleTimeoutinterval = 15,
        IkeVersion = "1",
        IncludeLocalLan = "disable",
        Interface = "port3",
        IpVersion = "4",
        Ipv4DnsServer1 = "0.0.0.0",
        Ipv4DnsServer2 = "0.0.0.0",
        Ipv4DnsServer3 = "0.0.0.0",
        Ipv4EndIp = "0.0.0.0",
        Ipv4Netmask = "255.255.255.255",
        Ipv4StartIp = "0.0.0.0",
        Ipv4WinsServer1 = "0.0.0.0",
        Ipv4WinsServer2 = "0.0.0.0",
        Ipv6DnsServer1 = "::",
        Ipv6DnsServer2 = "::",
        Ipv6DnsServer3 = "::",
        Ipv6EndIp = "::",
        Ipv6Prefix = 128,
        Ipv6StartIp = "::",
        Keepalive = 10,
        Keylife = 86400,
        LocalGw = "0.0.0.0",
        LocalGw6 = "::",
        LocalidType = "auto",
        MeshSelectorType = "disable",
        Mode = "main",
        ModeCfg = "disable",
        MonitorHoldDownDelay = 0,
        MonitorHoldDownTime = "00:00",
        MonitorHoldDownType = "immediate",
        MonitorHoldDownWeekday = "sunday",
        Nattraversal = "enable",
        NegotiateTimeout = 30,
        NetDevice = "disable",
        PassiveMode = "disable",
        Peertype = "any",
        Ppk = "disable",
        Priority = 0,
        Proposal = "aes128-sha256 aes256-sha256 aes128-sha1 aes256-sha1",
        Psksecret = "eweeeeeeeecee",
        Reauth = "disable",
        Rekey = "enable",
        RemoteGw = "2.2.2.2",
        RemoteGw6 = "::",
        RsaSignatureFormat = "pkcs1",
        SavePassword = "disable",
        SendCertChain = "enable",
        SignatureHashAlg = "sha2-512 sha2-384 sha2-256 sha1",
        SuiteB = "disable",
        TunnelSearch = "selectors",
        Type = "static",
        UnitySupport = "enable",
        WizardType = "custom",
        Xauthtype = "disable",
    });
    var trname1Phase2interface = new Fortios.Vpn.Ipsec.Phase2interface("trname1Phase2interface", new()
    {
        AddRoute = "phase1",
        AutoDiscoveryForwarder = "phase1",
        AutoDiscoverySender = "phase1",
        AutoNegotiate = "disable",
        DhcpIpsec = "disable",
        Dhgrp = "14 5",
        DstAddrType = "subnet",
        DstEndIp6 = "::",
        DstPort = 0,
        DstSubnet = "0.0.0.0 0.0.0.0",
        Encapsulation = "tunnel-mode",
        Keepalive = "disable",
        KeylifeType = "seconds",
        Keylifekbs = 5120,
        Keylifeseconds = 43200,
        L2tp = "disable",
        Pfs = "enable",
        Phase1name = trname1Phase1interface.Name,
        Proposal = "aes128-sha1 aes256-sha1 aes128-sha256 aes256-sha256 aes128gcm aes256gcm chacha20poly1305",
        Protocol = 0,
        Replay = "enable",
        RouteOverlap = "use-new",
        SingleSource = "disable",
        SrcAddrType = "subnet",
        SrcEndIp6 = "::",
        SrcPort = 0,
        SrcSubnet = "0.0.0.0 0.0.0.0",
    });
    var trname = new Fortios.System.Ipsecaggregate("trname", new()
    {
        Algorithm = "round-robin",
        Members = new[]
        {
            new Fortios.System.Inputs.IpsecaggregateMemberArgs
            {
                TunnelName = trname1Phase1interface.Name,
            },
        },
    });
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.fortios.vpn.Phase1interface;
import com.pulumi.fortios.vpn.Phase1interfaceArgs;
import com.pulumi.fortios.vpn.Phase2interface;
import com.pulumi.fortios.vpn.Phase2interfaceArgs;
import com.pulumi.fortios.system.Ipsecaggregate;
import com.pulumi.fortios.system.IpsecaggregateArgs;
import com.pulumi.fortios.system.inputs.IpsecaggregateMemberArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
    public static void main(String[] args) {
        Pulumi.run(App::stack);
    }
    public static void stack(Context ctx) {
        var trname1Phase1interface = new Phase1interface("trname1Phase1interface", Phase1interfaceArgs.builder()
            .acctVerify("disable")
            .addGwRoute("disable")
            .addRoute("enable")
            .assignIp("enable")
            .assignIpFrom("range")
            .authmethod("psk")
            .autoDiscoveryForwarder("disable")
            .autoDiscoveryPsk("disable")
            .autoDiscoveryReceiver("disable")
            .autoDiscoverySender("disable")
            .autoNegotiate("enable")
            .certIdValidation("enable")
            .childlessIke("disable")
            .clientAutoNegotiate("disable")
            .clientKeepAlive("disable")
            .defaultGw("0.0.0.0")
            .defaultGwPriority(0)
            .dhgrp("14 5")
            .digitalSignatureAuth("disable")
            .distance(15)
            .dnsMode("manual")
            .dpd("on-demand")
            .dpdRetrycount(3)
            .dpdRetryinterval("20")
            .eap("disable")
            .eapIdentity("use-id-payload")
            .encapLocalGw4("0.0.0.0")
            .encapLocalGw6("::")
            .encapRemoteGw4("0.0.0.0")
            .encapRemoteGw6("::")
            .encapsulation("none")
            .encapsulationAddress("ike")
            .enforceUniqueId("disable")
            .exchangeInterfaceIp("disable")
            .exchangeIpAddr4("0.0.0.0")
            .exchangeIpAddr6("::")
            .forticlientEnforcement("disable")
            .fragmentation("enable")
            .fragmentationMtu(1200)
            .groupAuthentication("disable")
            .haSyncEspSeqno("enable")
            .idleTimeout("disable")
            .idleTimeoutinterval(15)
            .ikeVersion("1")
            .includeLocalLan("disable")
            .interface_("port3")
            .ipVersion("4")
            .ipv4DnsServer1("0.0.0.0")
            .ipv4DnsServer2("0.0.0.0")
            .ipv4DnsServer3("0.0.0.0")
            .ipv4EndIp("0.0.0.0")
            .ipv4Netmask("255.255.255.255")
            .ipv4StartIp("0.0.0.0")
            .ipv4WinsServer1("0.0.0.0")
            .ipv4WinsServer2("0.0.0.0")
            .ipv6DnsServer1("::")
            .ipv6DnsServer2("::")
            .ipv6DnsServer3("::")
            .ipv6EndIp("::")
            .ipv6Prefix(128)
            .ipv6StartIp("::")
            .keepalive(10)
            .keylife(86400)
            .localGw("0.0.0.0")
            .localGw6("::")
            .localidType("auto")
            .meshSelectorType("disable")
            .mode("main")
            .modeCfg("disable")
            .monitorHoldDownDelay(0)
            .monitorHoldDownTime("00:00")
            .monitorHoldDownType("immediate")
            .monitorHoldDownWeekday("sunday")
            .nattraversal("enable")
            .negotiateTimeout(30)
            .netDevice("disable")
            .passiveMode("disable")
            .peertype("any")
            .ppk("disable")
            .priority(0)
            .proposal("aes128-sha256 aes256-sha256 aes128-sha1 aes256-sha1")
            .psksecret("eweeeeeeeecee")
            .reauth("disable")
            .rekey("enable")
            .remoteGw("2.2.2.2")
            .remoteGw6("::")
            .rsaSignatureFormat("pkcs1")
            .savePassword("disable")
            .sendCertChain("enable")
            .signatureHashAlg("sha2-512 sha2-384 sha2-256 sha1")
            .suiteB("disable")
            .tunnelSearch("selectors")
            .type("static")
            .unitySupport("enable")
            .wizardType("custom")
            .xauthtype("disable")
            .build());
        var trname1Phase2interface = new Phase2interface("trname1Phase2interface", Phase2interfaceArgs.builder()
            .addRoute("phase1")
            .autoDiscoveryForwarder("phase1")
            .autoDiscoverySender("phase1")
            .autoNegotiate("disable")
            .dhcpIpsec("disable")
            .dhgrp("14 5")
            .dstAddrType("subnet")
            .dstEndIp6("::")
            .dstPort(0)
            .dstSubnet("0.0.0.0 0.0.0.0")
            .encapsulation("tunnel-mode")
            .keepalive("disable")
            .keylifeType("seconds")
            .keylifekbs(5120)
            .keylifeseconds(43200)
            .l2tp("disable")
            .pfs("enable")
            .phase1name(trname1Phase1interface.name())
            .proposal("aes128-sha1 aes256-sha1 aes128-sha256 aes256-sha256 aes128gcm aes256gcm chacha20poly1305")
            .protocol(0)
            .replay("enable")
            .routeOverlap("use-new")
            .singleSource("disable")
            .srcAddrType("subnet")
            .srcEndIp6("::")
            .srcPort(0)
            .srcSubnet("0.0.0.0 0.0.0.0")
            .build());
        var trname = new Ipsecaggregate("trname", IpsecaggregateArgs.builder()
            .algorithm("round-robin")
            .members(IpsecaggregateMemberArgs.builder()
                .tunnelName(trname1Phase1interface.name())
                .build())
            .build());
    }
}
resources:
  trname1Phase1interface:
    type: fortios:vpn/ipsec:Phase1interface
    properties:
      acctVerify: disable
      addGwRoute: disable
      addRoute: enable
      assignIp: enable
      assignIpFrom: range
      authmethod: psk
      autoDiscoveryForwarder: disable
      autoDiscoveryPsk: disable
      autoDiscoveryReceiver: disable
      autoDiscoverySender: disable
      autoNegotiate: enable
      certIdValidation: enable
      childlessIke: disable
      clientAutoNegotiate: disable
      clientKeepAlive: disable
      defaultGw: 0.0.0.0
      defaultGwPriority: 0
      dhgrp: 14 5
      digitalSignatureAuth: disable
      distance: 15
      dnsMode: manual
      dpd: on-demand
      dpdRetrycount: 3
      dpdRetryinterval: '20'
      eap: disable
      eapIdentity: use-id-payload
      encapLocalGw4: 0.0.0.0
      encapLocalGw6: '::'
      encapRemoteGw4: 0.0.0.0
      encapRemoteGw6: '::'
      encapsulation: none
      encapsulationAddress: ike
      enforceUniqueId: disable
      exchangeInterfaceIp: disable
      exchangeIpAddr4: 0.0.0.0
      exchangeIpAddr6: '::'
      forticlientEnforcement: disable
      fragmentation: enable
      fragmentationMtu: 1200
      groupAuthentication: disable
      haSyncEspSeqno: enable
      idleTimeout: disable
      idleTimeoutinterval: 15
      ikeVersion: '1'
      includeLocalLan: disable
      interface: port3
      ipVersion: '4'
      ipv4DnsServer1: 0.0.0.0
      ipv4DnsServer2: 0.0.0.0
      ipv4DnsServer3: 0.0.0.0
      ipv4EndIp: 0.0.0.0
      ipv4Netmask: 255.255.255.255
      ipv4StartIp: 0.0.0.0
      ipv4WinsServer1: 0.0.0.0
      ipv4WinsServer2: 0.0.0.0
      ipv6DnsServer1: '::'
      ipv6DnsServer2: '::'
      ipv6DnsServer3: '::'
      ipv6EndIp: '::'
      ipv6Prefix: 128
      ipv6StartIp: '::'
      keepalive: 10
      keylife: 86400
      localGw: 0.0.0.0
      localGw6: '::'
      localidType: auto
      meshSelectorType: disable
      mode: main
      modeCfg: disable
      monitorHoldDownDelay: 0
      monitorHoldDownTime: 00:00
      monitorHoldDownType: immediate
      monitorHoldDownWeekday: sunday
      nattraversal: enable
      negotiateTimeout: 30
      netDevice: disable
      passiveMode: disable
      peertype: any
      ppk: disable
      priority: 0
      proposal: aes128-sha256 aes256-sha256 aes128-sha1 aes256-sha1
      psksecret: eweeeeeeeecee
      reauth: disable
      rekey: enable
      remoteGw: 2.2.2.2
      remoteGw6: '::'
      rsaSignatureFormat: pkcs1
      savePassword: disable
      sendCertChain: enable
      signatureHashAlg: sha2-512 sha2-384 sha2-256 sha1
      suiteB: disable
      tunnelSearch: selectors
      type: static
      unitySupport: enable
      wizardType: custom
      xauthtype: disable
  trname1Phase2interface:
    type: fortios:vpn/ipsec:Phase2interface
    properties:
      addRoute: phase1
      autoDiscoveryForwarder: phase1
      autoDiscoverySender: phase1
      autoNegotiate: disable
      dhcpIpsec: disable
      dhgrp: 14 5
      dstAddrType: subnet
      dstEndIp6: '::'
      dstPort: 0
      dstSubnet: 0.0.0.0 0.0.0.0
      encapsulation: tunnel-mode
      keepalive: disable
      keylifeType: seconds
      keylifekbs: 5120
      keylifeseconds: 43200
      l2tp: disable
      pfs: enable
      phase1name: ${trname1Phase1interface.name}
      proposal: aes128-sha1 aes256-sha1 aes128-sha256 aes256-sha256 aes128gcm aes256gcm chacha20poly1305
      protocol: 0
      replay: enable
      routeOverlap: use-new
      singleSource: disable
      srcAddrType: subnet
      srcEndIp6: '::'
      srcPort: 0
      srcSubnet: 0.0.0.0 0.0.0.0
  trname:
    type: fortios:system:Ipsecaggregate
    properties:
      algorithm: round-robin
      members:
        - tunnelName: ${trname1Phase1interface.name}
Create Ipsecaggregate Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new Ipsecaggregate(name: string, args: IpsecaggregateArgs, opts?: CustomResourceOptions);@overload
def Ipsecaggregate(resource_name: str,
                   args: IpsecaggregateArgs,
                   opts: Optional[ResourceOptions] = None)
@overload
def Ipsecaggregate(resource_name: str,
                   opts: Optional[ResourceOptions] = None,
                   members: Optional[Sequence[IpsecaggregateMemberArgs]] = None,
                   algorithm: Optional[str] = None,
                   dynamic_sort_subtable: Optional[str] = None,
                   get_all_tables: Optional[str] = None,
                   name: Optional[str] = None,
                   vdomparam: Optional[str] = None)func NewIpsecaggregate(ctx *Context, name string, args IpsecaggregateArgs, opts ...ResourceOption) (*Ipsecaggregate, error)public Ipsecaggregate(string name, IpsecaggregateArgs args, CustomResourceOptions? opts = null)
public Ipsecaggregate(String name, IpsecaggregateArgs args)
public Ipsecaggregate(String name, IpsecaggregateArgs args, CustomResourceOptions options)
type: fortios:system:Ipsecaggregate
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args IpsecaggregateArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args IpsecaggregateArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args IpsecaggregateArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args IpsecaggregateArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args IpsecaggregateArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var ipsecaggregateResource = new Fortios.System.Ipsecaggregate("ipsecaggregateResource", new()
{
    Members = new[]
    {
        new Fortios.System.Inputs.IpsecaggregateMemberArgs
        {
            TunnelName = "string",
        },
    },
    Algorithm = "string",
    DynamicSortSubtable = "string",
    GetAllTables = "string",
    Name = "string",
    Vdomparam = "string",
});
example, err := system.NewIpsecaggregate(ctx, "ipsecaggregateResource", &system.IpsecaggregateArgs{
	Members: system.IpsecaggregateMemberArray{
		&system.IpsecaggregateMemberArgs{
			TunnelName: pulumi.String("string"),
		},
	},
	Algorithm:           pulumi.String("string"),
	DynamicSortSubtable: pulumi.String("string"),
	GetAllTables:        pulumi.String("string"),
	Name:                pulumi.String("string"),
	Vdomparam:           pulumi.String("string"),
})
var ipsecaggregateResource = new Ipsecaggregate("ipsecaggregateResource", IpsecaggregateArgs.builder()
    .members(IpsecaggregateMemberArgs.builder()
        .tunnelName("string")
        .build())
    .algorithm("string")
    .dynamicSortSubtable("string")
    .getAllTables("string")
    .name("string")
    .vdomparam("string")
    .build());
ipsecaggregate_resource = fortios.system.Ipsecaggregate("ipsecaggregateResource",
    members=[{
        "tunnel_name": "string",
    }],
    algorithm="string",
    dynamic_sort_subtable="string",
    get_all_tables="string",
    name="string",
    vdomparam="string")
const ipsecaggregateResource = new fortios.system.Ipsecaggregate("ipsecaggregateResource", {
    members: [{
        tunnelName: "string",
    }],
    algorithm: "string",
    dynamicSortSubtable: "string",
    getAllTables: "string",
    name: "string",
    vdomparam: "string",
});
type: fortios:system:Ipsecaggregate
properties:
    algorithm: string
    dynamicSortSubtable: string
    getAllTables: string
    members:
        - tunnelName: string
    name: string
    vdomparam: string
Ipsecaggregate Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The Ipsecaggregate resource accepts the following input properties:
- Members
List<Pulumiverse.Fortios. System. Inputs. Ipsecaggregate Member> 
- Member tunnels of the aggregate. The structure of memberblock is documented below.
- Algorithm string
- Frame distribution algorithm.
- DynamicSort stringSubtable 
- Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
- GetAll stringTables 
- Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwise, conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
- Name string
- IPsec aggregate name.
- Vdomparam string
- Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
- Members
[]IpsecaggregateMember Args 
- Member tunnels of the aggregate. The structure of memberblock is documented below.
- Algorithm string
- Frame distribution algorithm.
- DynamicSort stringSubtable 
- Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
- GetAll stringTables 
- Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwise, conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
- Name string
- IPsec aggregate name.
- Vdomparam string
- Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
- members
List<IpsecaggregateMember> 
- Member tunnels of the aggregate. The structure of memberblock is documented below.
- algorithm String
- Frame distribution algorithm.
- dynamicSort StringSubtable 
- Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
- getAll StringTables 
- Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwise, conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
- name String
- IPsec aggregate name.
- vdomparam String
- Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
- members
IpsecaggregateMember[] 
- Member tunnels of the aggregate. The structure of memberblock is documented below.
- algorithm string
- Frame distribution algorithm.
- dynamicSort stringSubtable 
- Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
- getAll stringTables 
- Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwise, conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
- name string
- IPsec aggregate name.
- vdomparam string
- Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
- members
Sequence[IpsecaggregateMember Args] 
- Member tunnels of the aggregate. The structure of memberblock is documented below.
- algorithm str
- Frame distribution algorithm.
- dynamic_sort_ strsubtable 
- Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
- get_all_ strtables 
- Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwise, conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
- name str
- IPsec aggregate name.
- vdomparam str
- Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
- members List<Property Map>
- Member tunnels of the aggregate. The structure of memberblock is documented below.
- algorithm String
- Frame distribution algorithm.
- dynamicSort StringSubtable 
- Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
- getAll StringTables 
- Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwise, conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
- name String
- IPsec aggregate name.
- vdomparam String
- Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
Outputs
All input properties are implicitly available as output properties. Additionally, the Ipsecaggregate resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- Id string
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
- id string
- The provider-assigned unique ID for this managed resource.
- id str
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
Look up Existing Ipsecaggregate Resource
Get an existing Ipsecaggregate resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: IpsecaggregateState, opts?: CustomResourceOptions): Ipsecaggregate@staticmethod
def get(resource_name: str,
        id: str,
        opts: Optional[ResourceOptions] = None,
        algorithm: Optional[str] = None,
        dynamic_sort_subtable: Optional[str] = None,
        get_all_tables: Optional[str] = None,
        members: Optional[Sequence[IpsecaggregateMemberArgs]] = None,
        name: Optional[str] = None,
        vdomparam: Optional[str] = None) -> Ipsecaggregatefunc GetIpsecaggregate(ctx *Context, name string, id IDInput, state *IpsecaggregateState, opts ...ResourceOption) (*Ipsecaggregate, error)public static Ipsecaggregate Get(string name, Input<string> id, IpsecaggregateState? state, CustomResourceOptions? opts = null)public static Ipsecaggregate get(String name, Output<String> id, IpsecaggregateState state, CustomResourceOptions options)resources:  _:    type: fortios:system:Ipsecaggregate    get:      id: ${id}- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Algorithm string
- Frame distribution algorithm.
- DynamicSort stringSubtable 
- Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
- GetAll stringTables 
- Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwise, conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
- Members
List<Pulumiverse.Fortios. System. Inputs. Ipsecaggregate Member> 
- Member tunnels of the aggregate. The structure of memberblock is documented below.
- Name string
- IPsec aggregate name.
- Vdomparam string
- Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
- Algorithm string
- Frame distribution algorithm.
- DynamicSort stringSubtable 
- Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
- GetAll stringTables 
- Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwise, conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
- Members
[]IpsecaggregateMember Args 
- Member tunnels of the aggregate. The structure of memberblock is documented below.
- Name string
- IPsec aggregate name.
- Vdomparam string
- Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
- algorithm String
- Frame distribution algorithm.
- dynamicSort StringSubtable 
- Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
- getAll StringTables 
- Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwise, conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
- members
List<IpsecaggregateMember> 
- Member tunnels of the aggregate. The structure of memberblock is documented below.
- name String
- IPsec aggregate name.
- vdomparam String
- Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
- algorithm string
- Frame distribution algorithm.
- dynamicSort stringSubtable 
- Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
- getAll stringTables 
- Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwise, conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
- members
IpsecaggregateMember[] 
- Member tunnels of the aggregate. The structure of memberblock is documented below.
- name string
- IPsec aggregate name.
- vdomparam string
- Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
- algorithm str
- Frame distribution algorithm.
- dynamic_sort_ strsubtable 
- Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
- get_all_ strtables 
- Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwise, conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
- members
Sequence[IpsecaggregateMember Args] 
- Member tunnels of the aggregate. The structure of memberblock is documented below.
- name str
- IPsec aggregate name.
- vdomparam str
- Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
- algorithm String
- Frame distribution algorithm.
- dynamicSort StringSubtable 
- Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
- getAll StringTables 
- Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwise, conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
- members List<Property Map>
- Member tunnels of the aggregate. The structure of memberblock is documented below.
- name String
- IPsec aggregate name.
- vdomparam String
- Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
Supporting Types
IpsecaggregateMember, IpsecaggregateMemberArgs    
- TunnelName string
- Tunnel name.
- TunnelName string
- Tunnel name.
- tunnelName String
- Tunnel name.
- tunnelName string
- Tunnel name.
- tunnel_name str
- Tunnel name.
- tunnelName String
- Tunnel name.
Import
System IpsecAggregate can be imported using any of these accepted formats:
$ pulumi import fortios:system/ipsecaggregate:Ipsecaggregate labelname {{name}}
If you do not want to import arguments of block:
$ export “FORTIOS_IMPORT_TABLE”=“false”
$ pulumi import fortios:system/ipsecaggregate:Ipsecaggregate labelname {{name}}
$ unset “FORTIOS_IMPORT_TABLE”
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- fortios pulumiverse/pulumi-fortios
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the fortiosTerraform Provider.
