Get Ip Sec Vpn Tunnel Default Connection Properties
Retrieves the default connection properties that are used for a given IPSec Tunnel in NSX-T when security type is default, or is unspecified.
externalNetworkId
externalNetworkId
OK
{
"securityType": "string",
"ikeConfiguration": {
"ikeVersion": "string",
"dhGroups": [
"string"
],
"digestAlgorithms": [
"string"
],
"encryptionAlgorithms": [
"string"
],
"saLifeTime": 0
},
"tunnelConfiguration": {
"perfectForwardSecrecyActive": false,
"dfPolicy": "string",
"dhGroups": [
"string"
],
"digestAlgorithms": [
"string"
],
"encryptionAlgorithms": [
"string"
],
"saLifeTime": 0
},
"dpdProbeInterval": 0
}
This is the security type used for the IPSec Tunnel. If nothing is specified, this will be set to 'DEFAULT' in which the default settings in NSX will be used. If 'CUSTOM' is specified, then ike, tunnel, and dpd configurations can be set.
This configuration captures the IKE and phase one negotiation parameters. This configuration can be set for peering properly with remote peers.
This configuration captures phase two negotiation parameters and tunnel properties.
Specifies the Dead Peer Detection Profile. This configuration determines the number of seconds to wait in time between probes to detect if an IPSec peer is alive or not. The minimum is 3 seconds, and the maximum is 60 seconds. If unset, the system default of 60 seconds will be used.
The specified resource was not found
{
"minorErrorCode": "string",
"message": "string",
"stackTrace": "string"
}
minorErrorCode
message
stackTrace