1. Packages
  2. Fortios
  3. API Docs
  4. system
  5. Ipsecaggregate
Fortios v0.0.5 published on Tuesday, Apr 9, 2024 by pulumiverse

fortios.system.Ipsecaggregate

Explore with Pulumi AI

fortios logo
Fortios v0.0.5 published on Tuesday, Apr 9, 2024 by pulumiverse

    Configure an aggregate of IPsec tunnels.

    Example Usage

    import * as pulumi from "@pulumi/pulumi";
    import * as fortios from "@pulumiverse/fortios";
    
    const trname1Phase1interface = new fortios.vpn.ipsec.Phase1interface("trname1Phase1interface", {
        acctVerify: "disable",
        addGwRoute: "disable",
        addRoute: "enable",
        assignIp: "enable",
        assignIpFrom: "range",
        authmethod: "psk",
        autoDiscoveryForwarder: "disable",
        autoDiscoveryPsk: "disable",
        autoDiscoveryReceiver: "disable",
        autoDiscoverySender: "disable",
        autoNegotiate: "enable",
        certIdValidation: "enable",
        childlessIke: "disable",
        clientAutoNegotiate: "disable",
        clientKeepAlive: "disable",
        defaultGw: "0.0.0.0",
        defaultGwPriority: 0,
        dhgrp: "14 5",
        digitalSignatureAuth: "disable",
        distance: 15,
        dnsMode: "manual",
        dpd: "on-demand",
        dpdRetrycount: 3,
        dpdRetryinterval: "20",
        eap: "disable",
        eapIdentity: "use-id-payload",
        encapLocalGw4: "0.0.0.0",
        encapLocalGw6: "::",
        encapRemoteGw4: "0.0.0.0",
        encapRemoteGw6: "::",
        encapsulation: "none",
        encapsulationAddress: "ike",
        enforceUniqueId: "disable",
        exchangeInterfaceIp: "disable",
        exchangeIpAddr4: "0.0.0.0",
        exchangeIpAddr6: "::",
        forticlientEnforcement: "disable",
        fragmentation: "enable",
        fragmentationMtu: 1200,
        groupAuthentication: "disable",
        haSyncEspSeqno: "enable",
        idleTimeout: "disable",
        idleTimeoutinterval: 15,
        ikeVersion: "1",
        includeLocalLan: "disable",
        "interface": "port3",
        ipVersion: "4",
        ipv4DnsServer1: "0.0.0.0",
        ipv4DnsServer2: "0.0.0.0",
        ipv4DnsServer3: "0.0.0.0",
        ipv4EndIp: "0.0.0.0",
        ipv4Netmask: "255.255.255.255",
        ipv4StartIp: "0.0.0.0",
        ipv4WinsServer1: "0.0.0.0",
        ipv4WinsServer2: "0.0.0.0",
        ipv6DnsServer1: "::",
        ipv6DnsServer2: "::",
        ipv6DnsServer3: "::",
        ipv6EndIp: "::",
        ipv6Prefix: 128,
        ipv6StartIp: "::",
        keepalive: 10,
        keylife: 86400,
        localGw: "0.0.0.0",
        localGw6: "::",
        localidType: "auto",
        meshSelectorType: "disable",
        mode: "main",
        modeCfg: "disable",
        monitorHoldDownDelay: 0,
        monitorHoldDownTime: "00:00",
        monitorHoldDownType: "immediate",
        monitorHoldDownWeekday: "sunday",
        nattraversal: "enable",
        negotiateTimeout: 30,
        netDevice: "disable",
        passiveMode: "disable",
        peertype: "any",
        ppk: "disable",
        priority: 0,
        proposal: "aes128-sha256 aes256-sha256 aes128-sha1 aes256-sha1",
        psksecret: "eweeeeeeeecee",
        reauth: "disable",
        rekey: "enable",
        remoteGw: "2.2.2.2",
        remoteGw6: "::",
        rsaSignatureFormat: "pkcs1",
        savePassword: "disable",
        sendCertChain: "enable",
        signatureHashAlg: "sha2-512 sha2-384 sha2-256 sha1",
        suiteB: "disable",
        tunnelSearch: "selectors",
        type: "static",
        unitySupport: "enable",
        wizardType: "custom",
        xauthtype: "disable",
    });
    const trname1Phase2interface = new fortios.vpn.ipsec.Phase2interface("trname1Phase2interface", {
        addRoute: "phase1",
        autoDiscoveryForwarder: "phase1",
        autoDiscoverySender: "phase1",
        autoNegotiate: "disable",
        dhcpIpsec: "disable",
        dhgrp: "14 5",
        dstAddrType: "subnet",
        dstEndIp6: "::",
        dstPort: 0,
        dstSubnet: "0.0.0.0 0.0.0.0",
        encapsulation: "tunnel-mode",
        keepalive: "disable",
        keylifeType: "seconds",
        keylifekbs: 5120,
        keylifeseconds: 43200,
        l2tp: "disable",
        pfs: "enable",
        phase1name: trname1Phase1interface.name,
        proposal: "aes128-sha1 aes256-sha1 aes128-sha256 aes256-sha256 aes128gcm aes256gcm chacha20poly1305",
        protocol: 0,
        replay: "enable",
        routeOverlap: "use-new",
        singleSource: "disable",
        srcAddrType: "subnet",
        srcEndIp6: "::",
        srcPort: 0,
        srcSubnet: "0.0.0.0 0.0.0.0",
    });
    const trname = new fortios.system.Ipsecaggregate("trname", {
        algorithm: "round-robin",
        members: [{
            tunnelName: trname1Phase1interface.name,
        }],
    });
    
    import pulumi
    import pulumiverse_fortios as fortios
    
    trname1_phase1interface = fortios.vpn.ipsec.Phase1interface("trname1Phase1interface",
        acct_verify="disable",
        add_gw_route="disable",
        add_route="enable",
        assign_ip="enable",
        assign_ip_from="range",
        authmethod="psk",
        auto_discovery_forwarder="disable",
        auto_discovery_psk="disable",
        auto_discovery_receiver="disable",
        auto_discovery_sender="disable",
        auto_negotiate="enable",
        cert_id_validation="enable",
        childless_ike="disable",
        client_auto_negotiate="disable",
        client_keep_alive="disable",
        default_gw="0.0.0.0",
        default_gw_priority=0,
        dhgrp="14 5",
        digital_signature_auth="disable",
        distance=15,
        dns_mode="manual",
        dpd="on-demand",
        dpd_retrycount=3,
        dpd_retryinterval="20",
        eap="disable",
        eap_identity="use-id-payload",
        encap_local_gw4="0.0.0.0",
        encap_local_gw6="::",
        encap_remote_gw4="0.0.0.0",
        encap_remote_gw6="::",
        encapsulation="none",
        encapsulation_address="ike",
        enforce_unique_id="disable",
        exchange_interface_ip="disable",
        exchange_ip_addr4="0.0.0.0",
        exchange_ip_addr6="::",
        forticlient_enforcement="disable",
        fragmentation="enable",
        fragmentation_mtu=1200,
        group_authentication="disable",
        ha_sync_esp_seqno="enable",
        idle_timeout="disable",
        idle_timeoutinterval=15,
        ike_version="1",
        include_local_lan="disable",
        interface="port3",
        ip_version="4",
        ipv4_dns_server1="0.0.0.0",
        ipv4_dns_server2="0.0.0.0",
        ipv4_dns_server3="0.0.0.0",
        ipv4_end_ip="0.0.0.0",
        ipv4_netmask="255.255.255.255",
        ipv4_start_ip="0.0.0.0",
        ipv4_wins_server1="0.0.0.0",
        ipv4_wins_server2="0.0.0.0",
        ipv6_dns_server1="::",
        ipv6_dns_server2="::",
        ipv6_dns_server3="::",
        ipv6_end_ip="::",
        ipv6_prefix=128,
        ipv6_start_ip="::",
        keepalive=10,
        keylife=86400,
        local_gw="0.0.0.0",
        local_gw6="::",
        localid_type="auto",
        mesh_selector_type="disable",
        mode="main",
        mode_cfg="disable",
        monitor_hold_down_delay=0,
        monitor_hold_down_time="00:00",
        monitor_hold_down_type="immediate",
        monitor_hold_down_weekday="sunday",
        nattraversal="enable",
        negotiate_timeout=30,
        net_device="disable",
        passive_mode="disable",
        peertype="any",
        ppk="disable",
        priority=0,
        proposal="aes128-sha256 aes256-sha256 aes128-sha1 aes256-sha1",
        psksecret="eweeeeeeeecee",
        reauth="disable",
        rekey="enable",
        remote_gw="2.2.2.2",
        remote_gw6="::",
        rsa_signature_format="pkcs1",
        save_password="disable",
        send_cert_chain="enable",
        signature_hash_alg="sha2-512 sha2-384 sha2-256 sha1",
        suite_b="disable",
        tunnel_search="selectors",
        type="static",
        unity_support="enable",
        wizard_type="custom",
        xauthtype="disable")
    trname1_phase2interface = fortios.vpn.ipsec.Phase2interface("trname1Phase2interface",
        add_route="phase1",
        auto_discovery_forwarder="phase1",
        auto_discovery_sender="phase1",
        auto_negotiate="disable",
        dhcp_ipsec="disable",
        dhgrp="14 5",
        dst_addr_type="subnet",
        dst_end_ip6="::",
        dst_port=0,
        dst_subnet="0.0.0.0 0.0.0.0",
        encapsulation="tunnel-mode",
        keepalive="disable",
        keylife_type="seconds",
        keylifekbs=5120,
        keylifeseconds=43200,
        l2tp="disable",
        pfs="enable",
        phase1name=trname1_phase1interface.name,
        proposal="aes128-sha1 aes256-sha1 aes128-sha256 aes256-sha256 aes128gcm aes256gcm chacha20poly1305",
        protocol=0,
        replay="enable",
        route_overlap="use-new",
        single_source="disable",
        src_addr_type="subnet",
        src_end_ip6="::",
        src_port=0,
        src_subnet="0.0.0.0 0.0.0.0")
    trname = fortios.system.Ipsecaggregate("trname",
        algorithm="round-robin",
        members=[fortios.system.IpsecaggregateMemberArgs(
            tunnel_name=trname1_phase1interface.name,
        )])
    
    package main
    
    import (
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    	"github.com/pulumiverse/pulumi-fortios/sdk/go/fortios/system"
    	"github.com/pulumiverse/pulumi-fortios/sdk/go/fortios/vpn"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		trname1Phase1interface, err := vpn.NewPhase1interface(ctx, "trname1Phase1interface", &vpn.Phase1interfaceArgs{
    			AcctVerify:             pulumi.String("disable"),
    			AddGwRoute:             pulumi.String("disable"),
    			AddRoute:               pulumi.String("enable"),
    			AssignIp:               pulumi.String("enable"),
    			AssignIpFrom:           pulumi.String("range"),
    			Authmethod:             pulumi.String("psk"),
    			AutoDiscoveryForwarder: pulumi.String("disable"),
    			AutoDiscoveryPsk:       pulumi.String("disable"),
    			AutoDiscoveryReceiver:  pulumi.String("disable"),
    			AutoDiscoverySender:    pulumi.String("disable"),
    			AutoNegotiate:          pulumi.String("enable"),
    			CertIdValidation:       pulumi.String("enable"),
    			ChildlessIke:           pulumi.String("disable"),
    			ClientAutoNegotiate:    pulumi.String("disable"),
    			ClientKeepAlive:        pulumi.String("disable"),
    			DefaultGw:              pulumi.String("0.0.0.0"),
    			DefaultGwPriority:      pulumi.Int(0),
    			Dhgrp:                  pulumi.String("14 5"),
    			DigitalSignatureAuth:   pulumi.String("disable"),
    			Distance:               pulumi.Int(15),
    			DnsMode:                pulumi.String("manual"),
    			Dpd:                    pulumi.String("on-demand"),
    			DpdRetrycount:          pulumi.Int(3),
    			DpdRetryinterval:       pulumi.String("20"),
    			Eap:                    pulumi.String("disable"),
    			EapIdentity:            pulumi.String("use-id-payload"),
    			EncapLocalGw4:          pulumi.String("0.0.0.0"),
    			EncapLocalGw6:          pulumi.String("::"),
    			EncapRemoteGw4:         pulumi.String("0.0.0.0"),
    			EncapRemoteGw6:         pulumi.String("::"),
    			Encapsulation:          pulumi.String("none"),
    			EncapsulationAddress:   pulumi.String("ike"),
    			EnforceUniqueId:        pulumi.String("disable"),
    			ExchangeInterfaceIp:    pulumi.String("disable"),
    			ExchangeIpAddr4:        pulumi.String("0.0.0.0"),
    			ExchangeIpAddr6:        pulumi.String("::"),
    			ForticlientEnforcement: pulumi.String("disable"),
    			Fragmentation:          pulumi.String("enable"),
    			FragmentationMtu:       pulumi.Int(1200),
    			GroupAuthentication:    pulumi.String("disable"),
    			HaSyncEspSeqno:         pulumi.String("enable"),
    			IdleTimeout:            pulumi.String("disable"),
    			IdleTimeoutinterval:    pulumi.Int(15),
    			IkeVersion:             pulumi.String("1"),
    			IncludeLocalLan:        pulumi.String("disable"),
    			Interface:              pulumi.String("port3"),
    			IpVersion:              pulumi.String("4"),
    			Ipv4DnsServer1:         pulumi.String("0.0.0.0"),
    			Ipv4DnsServer2:         pulumi.String("0.0.0.0"),
    			Ipv4DnsServer3:         pulumi.String("0.0.0.0"),
    			Ipv4EndIp:              pulumi.String("0.0.0.0"),
    			Ipv4Netmask:            pulumi.String("255.255.255.255"),
    			Ipv4StartIp:            pulumi.String("0.0.0.0"),
    			Ipv4WinsServer1:        pulumi.String("0.0.0.0"),
    			Ipv4WinsServer2:        pulumi.String("0.0.0.0"),
    			Ipv6DnsServer1:         pulumi.String("::"),
    			Ipv6DnsServer2:         pulumi.String("::"),
    			Ipv6DnsServer3:         pulumi.String("::"),
    			Ipv6EndIp:              pulumi.String("::"),
    			Ipv6Prefix:             pulumi.Int(128),
    			Ipv6StartIp:            pulumi.String("::"),
    			Keepalive:              pulumi.Int(10),
    			Keylife:                pulumi.Int(86400),
    			LocalGw:                pulumi.String("0.0.0.0"),
    			LocalGw6:               pulumi.String("::"),
    			LocalidType:            pulumi.String("auto"),
    			MeshSelectorType:       pulumi.String("disable"),
    			Mode:                   pulumi.String("main"),
    			ModeCfg:                pulumi.String("disable"),
    			MonitorHoldDownDelay:   pulumi.Int(0),
    			MonitorHoldDownTime:    pulumi.String("00:00"),
    			MonitorHoldDownType:    pulumi.String("immediate"),
    			MonitorHoldDownWeekday: pulumi.String("sunday"),
    			Nattraversal:           pulumi.String("enable"),
    			NegotiateTimeout:       pulumi.Int(30),
    			NetDevice:              pulumi.String("disable"),
    			PassiveMode:            pulumi.String("disable"),
    			Peertype:               pulumi.String("any"),
    			Ppk:                    pulumi.String("disable"),
    			Priority:               pulumi.Int(0),
    			Proposal:               pulumi.String("aes128-sha256 aes256-sha256 aes128-sha1 aes256-sha1"),
    			Psksecret:              pulumi.String("eweeeeeeeecee"),
    			Reauth:                 pulumi.String("disable"),
    			Rekey:                  pulumi.String("enable"),
    			RemoteGw:               pulumi.String("2.2.2.2"),
    			RemoteGw6:              pulumi.String("::"),
    			RsaSignatureFormat:     pulumi.String("pkcs1"),
    			SavePassword:           pulumi.String("disable"),
    			SendCertChain:          pulumi.String("enable"),
    			SignatureHashAlg:       pulumi.String("sha2-512 sha2-384 sha2-256 sha1"),
    			SuiteB:                 pulumi.String("disable"),
    			TunnelSearch:           pulumi.String("selectors"),
    			Type:                   pulumi.String("static"),
    			UnitySupport:           pulumi.String("enable"),
    			WizardType:             pulumi.String("custom"),
    			Xauthtype:              pulumi.String("disable"),
    		})
    		if err != nil {
    			return err
    		}
    		_, err = vpn.NewPhase2interface(ctx, "trname1Phase2interface", &vpn.Phase2interfaceArgs{
    			AddRoute:               pulumi.String("phase1"),
    			AutoDiscoveryForwarder: pulumi.String("phase1"),
    			AutoDiscoverySender:    pulumi.String("phase1"),
    			AutoNegotiate:          pulumi.String("disable"),
    			DhcpIpsec:              pulumi.String("disable"),
    			Dhgrp:                  pulumi.String("14 5"),
    			DstAddrType:            pulumi.String("subnet"),
    			DstEndIp6:              pulumi.String("::"),
    			DstPort:                pulumi.Int(0),
    			DstSubnet:              pulumi.String("0.0.0.0 0.0.0.0"),
    			Encapsulation:          pulumi.String("tunnel-mode"),
    			Keepalive:              pulumi.String("disable"),
    			KeylifeType:            pulumi.String("seconds"),
    			Keylifekbs:             pulumi.Int(5120),
    			Keylifeseconds:         pulumi.Int(43200),
    			L2tp:                   pulumi.String("disable"),
    			Pfs:                    pulumi.String("enable"),
    			Phase1name:             trname1Phase1interface.Name,
    			Proposal:               pulumi.String("aes128-sha1 aes256-sha1 aes128-sha256 aes256-sha256 aes128gcm aes256gcm chacha20poly1305"),
    			Protocol:               pulumi.Int(0),
    			Replay:                 pulumi.String("enable"),
    			RouteOverlap:           pulumi.String("use-new"),
    			SingleSource:           pulumi.String("disable"),
    			SrcAddrType:            pulumi.String("subnet"),
    			SrcEndIp6:              pulumi.String("::"),
    			SrcPort:                pulumi.Int(0),
    			SrcSubnet:              pulumi.String("0.0.0.0 0.0.0.0"),
    		})
    		if err != nil {
    			return err
    		}
    		_, err = system.NewIpsecaggregate(ctx, "trname", &system.IpsecaggregateArgs{
    			Algorithm: pulumi.String("round-robin"),
    			Members: system.IpsecaggregateMemberArray{
    				&system.IpsecaggregateMemberArgs{
    					TunnelName: trname1Phase1interface.Name,
    				},
    			},
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Fortios = Pulumiverse.Fortios;
    
    return await Deployment.RunAsync(() => 
    {
        var trname1Phase1interface = new Fortios.Vpn.Ipsec.Phase1interface("trname1Phase1interface", new()
        {
            AcctVerify = "disable",
            AddGwRoute = "disable",
            AddRoute = "enable",
            AssignIp = "enable",
            AssignIpFrom = "range",
            Authmethod = "psk",
            AutoDiscoveryForwarder = "disable",
            AutoDiscoveryPsk = "disable",
            AutoDiscoveryReceiver = "disable",
            AutoDiscoverySender = "disable",
            AutoNegotiate = "enable",
            CertIdValidation = "enable",
            ChildlessIke = "disable",
            ClientAutoNegotiate = "disable",
            ClientKeepAlive = "disable",
            DefaultGw = "0.0.0.0",
            DefaultGwPriority = 0,
            Dhgrp = "14 5",
            DigitalSignatureAuth = "disable",
            Distance = 15,
            DnsMode = "manual",
            Dpd = "on-demand",
            DpdRetrycount = 3,
            DpdRetryinterval = "20",
            Eap = "disable",
            EapIdentity = "use-id-payload",
            EncapLocalGw4 = "0.0.0.0",
            EncapLocalGw6 = "::",
            EncapRemoteGw4 = "0.0.0.0",
            EncapRemoteGw6 = "::",
            Encapsulation = "none",
            EncapsulationAddress = "ike",
            EnforceUniqueId = "disable",
            ExchangeInterfaceIp = "disable",
            ExchangeIpAddr4 = "0.0.0.0",
            ExchangeIpAddr6 = "::",
            ForticlientEnforcement = "disable",
            Fragmentation = "enable",
            FragmentationMtu = 1200,
            GroupAuthentication = "disable",
            HaSyncEspSeqno = "enable",
            IdleTimeout = "disable",
            IdleTimeoutinterval = 15,
            IkeVersion = "1",
            IncludeLocalLan = "disable",
            Interface = "port3",
            IpVersion = "4",
            Ipv4DnsServer1 = "0.0.0.0",
            Ipv4DnsServer2 = "0.0.0.0",
            Ipv4DnsServer3 = "0.0.0.0",
            Ipv4EndIp = "0.0.0.0",
            Ipv4Netmask = "255.255.255.255",
            Ipv4StartIp = "0.0.0.0",
            Ipv4WinsServer1 = "0.0.0.0",
            Ipv4WinsServer2 = "0.0.0.0",
            Ipv6DnsServer1 = "::",
            Ipv6DnsServer2 = "::",
            Ipv6DnsServer3 = "::",
            Ipv6EndIp = "::",
            Ipv6Prefix = 128,
            Ipv6StartIp = "::",
            Keepalive = 10,
            Keylife = 86400,
            LocalGw = "0.0.0.0",
            LocalGw6 = "::",
            LocalidType = "auto",
            MeshSelectorType = "disable",
            Mode = "main",
            ModeCfg = "disable",
            MonitorHoldDownDelay = 0,
            MonitorHoldDownTime = "00:00",
            MonitorHoldDownType = "immediate",
            MonitorHoldDownWeekday = "sunday",
            Nattraversal = "enable",
            NegotiateTimeout = 30,
            NetDevice = "disable",
            PassiveMode = "disable",
            Peertype = "any",
            Ppk = "disable",
            Priority = 0,
            Proposal = "aes128-sha256 aes256-sha256 aes128-sha1 aes256-sha1",
            Psksecret = "eweeeeeeeecee",
            Reauth = "disable",
            Rekey = "enable",
            RemoteGw = "2.2.2.2",
            RemoteGw6 = "::",
            RsaSignatureFormat = "pkcs1",
            SavePassword = "disable",
            SendCertChain = "enable",
            SignatureHashAlg = "sha2-512 sha2-384 sha2-256 sha1",
            SuiteB = "disable",
            TunnelSearch = "selectors",
            Type = "static",
            UnitySupport = "enable",
            WizardType = "custom",
            Xauthtype = "disable",
        });
    
        var trname1Phase2interface = new Fortios.Vpn.Ipsec.Phase2interface("trname1Phase2interface", new()
        {
            AddRoute = "phase1",
            AutoDiscoveryForwarder = "phase1",
            AutoDiscoverySender = "phase1",
            AutoNegotiate = "disable",
            DhcpIpsec = "disable",
            Dhgrp = "14 5",
            DstAddrType = "subnet",
            DstEndIp6 = "::",
            DstPort = 0,
            DstSubnet = "0.0.0.0 0.0.0.0",
            Encapsulation = "tunnel-mode",
            Keepalive = "disable",
            KeylifeType = "seconds",
            Keylifekbs = 5120,
            Keylifeseconds = 43200,
            L2tp = "disable",
            Pfs = "enable",
            Phase1name = trname1Phase1interface.Name,
            Proposal = "aes128-sha1 aes256-sha1 aes128-sha256 aes256-sha256 aes128gcm aes256gcm chacha20poly1305",
            Protocol = 0,
            Replay = "enable",
            RouteOverlap = "use-new",
            SingleSource = "disable",
            SrcAddrType = "subnet",
            SrcEndIp6 = "::",
            SrcPort = 0,
            SrcSubnet = "0.0.0.0 0.0.0.0",
        });
    
        var trname = new Fortios.System.Ipsecaggregate("trname", new()
        {
            Algorithm = "round-robin",
            Members = new[]
            {
                new Fortios.System.Inputs.IpsecaggregateMemberArgs
                {
                    TunnelName = trname1Phase1interface.Name,
                },
            },
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.fortios.vpn.Phase1interface;
    import com.pulumi.fortios.vpn.Phase1interfaceArgs;
    import com.pulumi.fortios.vpn.Phase2interface;
    import com.pulumi.fortios.vpn.Phase2interfaceArgs;
    import com.pulumi.fortios.system.Ipsecaggregate;
    import com.pulumi.fortios.system.IpsecaggregateArgs;
    import com.pulumi.fortios.system.inputs.IpsecaggregateMemberArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            var trname1Phase1interface = new Phase1interface("trname1Phase1interface", Phase1interfaceArgs.builder()        
                .acctVerify("disable")
                .addGwRoute("disable")
                .addRoute("enable")
                .assignIp("enable")
                .assignIpFrom("range")
                .authmethod("psk")
                .autoDiscoveryForwarder("disable")
                .autoDiscoveryPsk("disable")
                .autoDiscoveryReceiver("disable")
                .autoDiscoverySender("disable")
                .autoNegotiate("enable")
                .certIdValidation("enable")
                .childlessIke("disable")
                .clientAutoNegotiate("disable")
                .clientKeepAlive("disable")
                .defaultGw("0.0.0.0")
                .defaultGwPriority(0)
                .dhgrp("14 5")
                .digitalSignatureAuth("disable")
                .distance(15)
                .dnsMode("manual")
                .dpd("on-demand")
                .dpdRetrycount(3)
                .dpdRetryinterval("20")
                .eap("disable")
                .eapIdentity("use-id-payload")
                .encapLocalGw4("0.0.0.0")
                .encapLocalGw6("::")
                .encapRemoteGw4("0.0.0.0")
                .encapRemoteGw6("::")
                .encapsulation("none")
                .encapsulationAddress("ike")
                .enforceUniqueId("disable")
                .exchangeInterfaceIp("disable")
                .exchangeIpAddr4("0.0.0.0")
                .exchangeIpAddr6("::")
                .forticlientEnforcement("disable")
                .fragmentation("enable")
                .fragmentationMtu(1200)
                .groupAuthentication("disable")
                .haSyncEspSeqno("enable")
                .idleTimeout("disable")
                .idleTimeoutinterval(15)
                .ikeVersion("1")
                .includeLocalLan("disable")
                .interface_("port3")
                .ipVersion("4")
                .ipv4DnsServer1("0.0.0.0")
                .ipv4DnsServer2("0.0.0.0")
                .ipv4DnsServer3("0.0.0.0")
                .ipv4EndIp("0.0.0.0")
                .ipv4Netmask("255.255.255.255")
                .ipv4StartIp("0.0.0.0")
                .ipv4WinsServer1("0.0.0.0")
                .ipv4WinsServer2("0.0.0.0")
                .ipv6DnsServer1("::")
                .ipv6DnsServer2("::")
                .ipv6DnsServer3("::")
                .ipv6EndIp("::")
                .ipv6Prefix(128)
                .ipv6StartIp("::")
                .keepalive(10)
                .keylife(86400)
                .localGw("0.0.0.0")
                .localGw6("::")
                .localidType("auto")
                .meshSelectorType("disable")
                .mode("main")
                .modeCfg("disable")
                .monitorHoldDownDelay(0)
                .monitorHoldDownTime("00:00")
                .monitorHoldDownType("immediate")
                .monitorHoldDownWeekday("sunday")
                .nattraversal("enable")
                .negotiateTimeout(30)
                .netDevice("disable")
                .passiveMode("disable")
                .peertype("any")
                .ppk("disable")
                .priority(0)
                .proposal("aes128-sha256 aes256-sha256 aes128-sha1 aes256-sha1")
                .psksecret("eweeeeeeeecee")
                .reauth("disable")
                .rekey("enable")
                .remoteGw("2.2.2.2")
                .remoteGw6("::")
                .rsaSignatureFormat("pkcs1")
                .savePassword("disable")
                .sendCertChain("enable")
                .signatureHashAlg("sha2-512 sha2-384 sha2-256 sha1")
                .suiteB("disable")
                .tunnelSearch("selectors")
                .type("static")
                .unitySupport("enable")
                .wizardType("custom")
                .xauthtype("disable")
                .build());
    
            var trname1Phase2interface = new Phase2interface("trname1Phase2interface", Phase2interfaceArgs.builder()        
                .addRoute("phase1")
                .autoDiscoveryForwarder("phase1")
                .autoDiscoverySender("phase1")
                .autoNegotiate("disable")
                .dhcpIpsec("disable")
                .dhgrp("14 5")
                .dstAddrType("subnet")
                .dstEndIp6("::")
                .dstPort(0)
                .dstSubnet("0.0.0.0 0.0.0.0")
                .encapsulation("tunnel-mode")
                .keepalive("disable")
                .keylifeType("seconds")
                .keylifekbs(5120)
                .keylifeseconds(43200)
                .l2tp("disable")
                .pfs("enable")
                .phase1name(trname1Phase1interface.name())
                .proposal("aes128-sha1 aes256-sha1 aes128-sha256 aes256-sha256 aes128gcm aes256gcm chacha20poly1305")
                .protocol(0)
                .replay("enable")
                .routeOverlap("use-new")
                .singleSource("disable")
                .srcAddrType("subnet")
                .srcEndIp6("::")
                .srcPort(0)
                .srcSubnet("0.0.0.0 0.0.0.0")
                .build());
    
            var trname = new Ipsecaggregate("trname", IpsecaggregateArgs.builder()        
                .algorithm("round-robin")
                .members(IpsecaggregateMemberArgs.builder()
                    .tunnelName(trname1Phase1interface.name())
                    .build())
                .build());
    
        }
    }
    
    resources:
      trname1Phase1interface:
        type: fortios:vpn/ipsec:Phase1interface
        properties:
          acctVerify: disable
          addGwRoute: disable
          addRoute: enable
          assignIp: enable
          assignIpFrom: range
          authmethod: psk
          autoDiscoveryForwarder: disable
          autoDiscoveryPsk: disable
          autoDiscoveryReceiver: disable
          autoDiscoverySender: disable
          autoNegotiate: enable
          certIdValidation: enable
          childlessIke: disable
          clientAutoNegotiate: disable
          clientKeepAlive: disable
          defaultGw: 0.0.0.0
          defaultGwPriority: 0
          dhgrp: 14 5
          digitalSignatureAuth: disable
          distance: 15
          dnsMode: manual
          dpd: on-demand
          dpdRetrycount: 3
          dpdRetryinterval: '20'
          eap: disable
          eapIdentity: use-id-payload
          encapLocalGw4: 0.0.0.0
          encapLocalGw6: '::'
          encapRemoteGw4: 0.0.0.0
          encapRemoteGw6: '::'
          encapsulation: none
          encapsulationAddress: ike
          enforceUniqueId: disable
          exchangeInterfaceIp: disable
          exchangeIpAddr4: 0.0.0.0
          exchangeIpAddr6: '::'
          forticlientEnforcement: disable
          fragmentation: enable
          fragmentationMtu: 1200
          groupAuthentication: disable
          haSyncEspSeqno: enable
          idleTimeout: disable
          idleTimeoutinterval: 15
          ikeVersion: '1'
          includeLocalLan: disable
          interface: port3
          ipVersion: '4'
          ipv4DnsServer1: 0.0.0.0
          ipv4DnsServer2: 0.0.0.0
          ipv4DnsServer3: 0.0.0.0
          ipv4EndIp: 0.0.0.0
          ipv4Netmask: 255.255.255.255
          ipv4StartIp: 0.0.0.0
          ipv4WinsServer1: 0.0.0.0
          ipv4WinsServer2: 0.0.0.0
          ipv6DnsServer1: '::'
          ipv6DnsServer2: '::'
          ipv6DnsServer3: '::'
          ipv6EndIp: '::'
          ipv6Prefix: 128
          ipv6StartIp: '::'
          keepalive: 10
          keylife: 86400
          localGw: 0.0.0.0
          localGw6: '::'
          localidType: auto
          meshSelectorType: disable
          mode: main
          modeCfg: disable
          monitorHoldDownDelay: 0
          monitorHoldDownTime: 00:00
          monitorHoldDownType: immediate
          monitorHoldDownWeekday: sunday
          nattraversal: enable
          negotiateTimeout: 30
          netDevice: disable
          passiveMode: disable
          peertype: any
          ppk: disable
          priority: 0
          proposal: aes128-sha256 aes256-sha256 aes128-sha1 aes256-sha1
          psksecret: eweeeeeeeecee
          reauth: disable
          rekey: enable
          remoteGw: 2.2.2.2
          remoteGw6: '::'
          rsaSignatureFormat: pkcs1
          savePassword: disable
          sendCertChain: enable
          signatureHashAlg: sha2-512 sha2-384 sha2-256 sha1
          suiteB: disable
          tunnelSearch: selectors
          type: static
          unitySupport: enable
          wizardType: custom
          xauthtype: disable
      trname1Phase2interface:
        type: fortios:vpn/ipsec:Phase2interface
        properties:
          addRoute: phase1
          autoDiscoveryForwarder: phase1
          autoDiscoverySender: phase1
          autoNegotiate: disable
          dhcpIpsec: disable
          dhgrp: 14 5
          dstAddrType: subnet
          dstEndIp6: '::'
          dstPort: 0
          dstSubnet: 0.0.0.0 0.0.0.0
          encapsulation: tunnel-mode
          keepalive: disable
          keylifeType: seconds
          keylifekbs: 5120
          keylifeseconds: 43200
          l2tp: disable
          pfs: enable
          phase1name: ${trname1Phase1interface.name}
          proposal: aes128-sha1 aes256-sha1 aes128-sha256 aes256-sha256 aes128gcm aes256gcm chacha20poly1305
          protocol: 0
          replay: enable
          routeOverlap: use-new
          singleSource: disable
          srcAddrType: subnet
          srcEndIp6: '::'
          srcPort: 0
          srcSubnet: 0.0.0.0 0.0.0.0
      trname:
        type: fortios:system:Ipsecaggregate
        properties:
          algorithm: round-robin
          members:
            - tunnelName: ${trname1Phase1interface.name}
    

    Create Ipsecaggregate Resource

    Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.

    Constructor syntax

    new Ipsecaggregate(name: string, args: IpsecaggregateArgs, opts?: CustomResourceOptions);
    @overload
    def Ipsecaggregate(resource_name: str,
                       args: IpsecaggregateArgs,
                       opts: Optional[ResourceOptions] = None)
    
    @overload
    def Ipsecaggregate(resource_name: str,
                       opts: Optional[ResourceOptions] = None,
                       members: Optional[Sequence[IpsecaggregateMemberArgs]] = None,
                       algorithm: Optional[str] = None,
                       dynamic_sort_subtable: Optional[str] = None,
                       get_all_tables: Optional[str] = None,
                       name: Optional[str] = None,
                       vdomparam: Optional[str] = None)
    func NewIpsecaggregate(ctx *Context, name string, args IpsecaggregateArgs, opts ...ResourceOption) (*Ipsecaggregate, error)
    public Ipsecaggregate(string name, IpsecaggregateArgs args, CustomResourceOptions? opts = null)
    public Ipsecaggregate(String name, IpsecaggregateArgs args)
    public Ipsecaggregate(String name, IpsecaggregateArgs args, CustomResourceOptions options)
    
    type: fortios:system:Ipsecaggregate
    properties: # The arguments to resource properties.
    options: # Bag of options to control resource's behavior.
    
    

    Parameters

    name string
    The unique name of the resource.
    args IpsecaggregateArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    resource_name str
    The unique name of the resource.
    args IpsecaggregateArgs
    The arguments to resource properties.
    opts ResourceOptions
    Bag of options to control resource's behavior.
    ctx Context
    Context object for the current deployment.
    name string
    The unique name of the resource.
    args IpsecaggregateArgs
    The arguments to resource properties.
    opts ResourceOption
    Bag of options to control resource's behavior.
    name string
    The unique name of the resource.
    args IpsecaggregateArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    name String
    The unique name of the resource.
    args IpsecaggregateArgs
    The arguments to resource properties.
    options CustomResourceOptions
    Bag of options to control resource's behavior.

    Constructor example

    The following reference example uses placeholder values for all input properties.

    var ipsecaggregateResource = new Fortios.System.Ipsecaggregate("ipsecaggregateResource", new()
    {
        Members = new[]
        {
            new Fortios.System.Inputs.IpsecaggregateMemberArgs
            {
                TunnelName = "string",
            },
        },
        Algorithm = "string",
        DynamicSortSubtable = "string",
        GetAllTables = "string",
        Name = "string",
        Vdomparam = "string",
    });
    
    example, err := system.NewIpsecaggregate(ctx, "ipsecaggregateResource", &system.IpsecaggregateArgs{
    	Members: system.IpsecaggregateMemberArray{
    		&system.IpsecaggregateMemberArgs{
    			TunnelName: pulumi.String("string"),
    		},
    	},
    	Algorithm:           pulumi.String("string"),
    	DynamicSortSubtable: pulumi.String("string"),
    	GetAllTables:        pulumi.String("string"),
    	Name:                pulumi.String("string"),
    	Vdomparam:           pulumi.String("string"),
    })
    
    var ipsecaggregateResource = new Ipsecaggregate("ipsecaggregateResource", IpsecaggregateArgs.builder()
        .members(IpsecaggregateMemberArgs.builder()
            .tunnelName("string")
            .build())
        .algorithm("string")
        .dynamicSortSubtable("string")
        .getAllTables("string")
        .name("string")
        .vdomparam("string")
        .build());
    
    ipsecaggregate_resource = fortios.system.Ipsecaggregate("ipsecaggregateResource",
        members=[fortios.system.IpsecaggregateMemberArgs(
            tunnel_name="string",
        )],
        algorithm="string",
        dynamic_sort_subtable="string",
        get_all_tables="string",
        name="string",
        vdomparam="string")
    
    const ipsecaggregateResource = new fortios.system.Ipsecaggregate("ipsecaggregateResource", {
        members: [{
            tunnelName: "string",
        }],
        algorithm: "string",
        dynamicSortSubtable: "string",
        getAllTables: "string",
        name: "string",
        vdomparam: "string",
    });
    
    type: fortios:system:Ipsecaggregate
    properties:
        algorithm: string
        dynamicSortSubtable: string
        getAllTables: string
        members:
            - tunnelName: string
        name: string
        vdomparam: string
    

    Ipsecaggregate Resource Properties

    To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

    Inputs

    The Ipsecaggregate resource accepts the following input properties:

    Members List<Pulumiverse.Fortios.System.Inputs.IpsecaggregateMember>
    Member tunnels of the aggregate. The structure of member block is documented below.
    Algorithm string
    Frame distribution algorithm.
    DynamicSortSubtable string
    Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
    GetAllTables string
    Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwish conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
    Name string
    IPsec aggregate name.
    Vdomparam string
    Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
    Members []IpsecaggregateMemberArgs
    Member tunnels of the aggregate. The structure of member block is documented below.
    Algorithm string
    Frame distribution algorithm.
    DynamicSortSubtable string
    Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
    GetAllTables string
    Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwish conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
    Name string
    IPsec aggregate name.
    Vdomparam string
    Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
    members List<IpsecaggregateMember>
    Member tunnels of the aggregate. The structure of member block is documented below.
    algorithm String
    Frame distribution algorithm.
    dynamicSortSubtable String
    Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
    getAllTables String
    Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwish conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
    name String
    IPsec aggregate name.
    vdomparam String
    Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
    members IpsecaggregateMember[]
    Member tunnels of the aggregate. The structure of member block is documented below.
    algorithm string
    Frame distribution algorithm.
    dynamicSortSubtable string
    Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
    getAllTables string
    Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwish conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
    name string
    IPsec aggregate name.
    vdomparam string
    Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
    members Sequence[IpsecaggregateMemberArgs]
    Member tunnels of the aggregate. The structure of member block is documented below.
    algorithm str
    Frame distribution algorithm.
    dynamic_sort_subtable str
    Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
    get_all_tables str
    Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwish conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
    name str
    IPsec aggregate name.
    vdomparam str
    Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
    members List<Property Map>
    Member tunnels of the aggregate. The structure of member block is documented below.
    algorithm String
    Frame distribution algorithm.
    dynamicSortSubtable String
    Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
    getAllTables String
    Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwish conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
    name String
    IPsec aggregate name.
    vdomparam String
    Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.

    Outputs

    All input properties are implicitly available as output properties. Additionally, the Ipsecaggregate resource produces the following output properties:

    Id string
    The provider-assigned unique ID for this managed resource.
    Id string
    The provider-assigned unique ID for this managed resource.
    id String
    The provider-assigned unique ID for this managed resource.
    id string
    The provider-assigned unique ID for this managed resource.
    id str
    The provider-assigned unique ID for this managed resource.
    id String
    The provider-assigned unique ID for this managed resource.

    Look up Existing Ipsecaggregate Resource

    Get an existing Ipsecaggregate resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

    public static get(name: string, id: Input<ID>, state?: IpsecaggregateState, opts?: CustomResourceOptions): Ipsecaggregate
    @staticmethod
    def get(resource_name: str,
            id: str,
            opts: Optional[ResourceOptions] = None,
            algorithm: Optional[str] = None,
            dynamic_sort_subtable: Optional[str] = None,
            get_all_tables: Optional[str] = None,
            members: Optional[Sequence[IpsecaggregateMemberArgs]] = None,
            name: Optional[str] = None,
            vdomparam: Optional[str] = None) -> Ipsecaggregate
    func GetIpsecaggregate(ctx *Context, name string, id IDInput, state *IpsecaggregateState, opts ...ResourceOption) (*Ipsecaggregate, error)
    public static Ipsecaggregate Get(string name, Input<string> id, IpsecaggregateState? state, CustomResourceOptions? opts = null)
    public static Ipsecaggregate get(String name, Output<String> id, IpsecaggregateState state, CustomResourceOptions options)
    Resource lookup is not supported in YAML
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    resource_name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    The following state arguments are supported:
    Algorithm string
    Frame distribution algorithm.
    DynamicSortSubtable string
    Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
    GetAllTables string
    Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwish conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
    Members List<Pulumiverse.Fortios.System.Inputs.IpsecaggregateMember>
    Member tunnels of the aggregate. The structure of member block is documented below.
    Name string
    IPsec aggregate name.
    Vdomparam string
    Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
    Algorithm string
    Frame distribution algorithm.
    DynamicSortSubtable string
    Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
    GetAllTables string
    Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwish conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
    Members []IpsecaggregateMemberArgs
    Member tunnels of the aggregate. The structure of member block is documented below.
    Name string
    IPsec aggregate name.
    Vdomparam string
    Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
    algorithm String
    Frame distribution algorithm.
    dynamicSortSubtable String
    Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
    getAllTables String
    Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwish conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
    members List<IpsecaggregateMember>
    Member tunnels of the aggregate. The structure of member block is documented below.
    name String
    IPsec aggregate name.
    vdomparam String
    Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
    algorithm string
    Frame distribution algorithm.
    dynamicSortSubtable string
    Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
    getAllTables string
    Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwish conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
    members IpsecaggregateMember[]
    Member tunnels of the aggregate. The structure of member block is documented below.
    name string
    IPsec aggregate name.
    vdomparam string
    Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
    algorithm str
    Frame distribution algorithm.
    dynamic_sort_subtable str
    Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
    get_all_tables str
    Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwish conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
    members Sequence[IpsecaggregateMemberArgs]
    Member tunnels of the aggregate. The structure of member block is documented below.
    name str
    IPsec aggregate name.
    vdomparam str
    Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
    algorithm String
    Frame distribution algorithm.
    dynamicSortSubtable String
    Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
    getAllTables String
    Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwish conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
    members List<Property Map>
    Member tunnels of the aggregate. The structure of member block is documented below.
    name String
    IPsec aggregate name.
    vdomparam String
    Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.

    Supporting Types

    IpsecaggregateMember, IpsecaggregateMemberArgs

    TunnelName string
    Tunnel name.
    TunnelName string
    Tunnel name.
    tunnelName String
    Tunnel name.
    tunnelName string
    Tunnel name.
    tunnel_name str
    Tunnel name.
    tunnelName String
    Tunnel name.

    Import

    System IpsecAggregate can be imported using any of these accepted formats:

    $ pulumi import fortios:system/ipsecaggregate:Ipsecaggregate labelname {{name}}
    

    If you do not want to import arguments of block:

    $ export “FORTIOS_IMPORT_TABLE”=“false”

    $ pulumi import fortios:system/ipsecaggregate:Ipsecaggregate labelname {{name}}
    

    $ unset “FORTIOS_IMPORT_TABLE”

    To learn more about importing existing cloud resources, see Importing resources.

    Package Details

    Repository
    fortios pulumiverse/pulumi-fortios
    License
    Apache-2.0
    Notes
    This Pulumi package is based on the fortios Terraform Provider.
    fortios logo
    Fortios v0.0.5 published on Tuesday, Apr 9, 2024 by pulumiverse