Update Ip Sec Vpn Tunnel Connection Properties
Updates the connection properties for a given IPSec VPN Tunnel configured on an Edge Gateway.
externalNetworkId
tunnelId
externalNetworkId
tunnelId
{
"securityType": "string",
"ikeConfiguration": {
"ikeVersion": "string",
"dhGroups": [
"string"
],
"digestAlgorithms": [
"string"
],
"encryptionAlgorithms": [
"string"
],
"saLifeTime": 0
},
"tunnelConfiguration": {
"perfectForwardSecrecyActive": false,
"dfPolicy": "string",
"dhGroups": [
"string"
],
"digestAlgorithms": [
"string"
],
"encryptionAlgorithms": [
"string"
],
"saLifeTime": 0
},
"dpdProbeInterval": 0
}
This is the security type used for the IPSec Tunnel. If nothing is specified, this will be set to 'DEFAULT' in which the default settings in NSX will be used. If 'CUSTOM' is specified, then ike, tunnel, and dpd configurations can be set.
This configuration captures the IKE and phase one negotiation parameters. This configuration can be set for peering properly with remote peers.
This configuration captures phase two negotiation parameters and tunnel properties.
Specifies the Dead Peer Detection Profile. This configuration determines the number of seconds to wait in time between probes to detect if an IPSec peer is alive or not. The minimum is 3 seconds, and the maximum is 60 seconds. If unset, the system default of 60 seconds will be used.
The request have been accepted and the task to monitor the request is in the Location header.
Invalid configuration.
{
"minorErrorCode": "string",
"message": "string",
"stackTrace": "string"
}
minorErrorCode
message
stackTrace