Options
All
  • Public
  • Public/Protected
  • All
Menu

Namespace UpdateIPSecConnectionTunnelDetails

Properties

Optional bgpSessionConfig

bgpSessionConfig: model.UpdateIPSecTunnelBgpSessionDetails

Optional displayName

displayName: undefined | string

A user-friendly name. Does not have to be unique, and it's changeable. Avoid entering confidential information.

Optional dpdConfig

dpdConfig: model.DpdConfig

Optional encryptionDomainConfig

encryptionDomainConfig: model.UpdateIPSecTunnelEncryptionDomainDetails

Optional ikeVersion

ikeVersion: IkeVersion

Internet Key Exchange protocol version.

Optional natTranslationEnabled

natTranslationEnabled: NatTranslationEnabled

By default (the {@code AUTO} setting), IKE sends packets with a source and destination port set to 500, and when it detects that the port used to forward packets has changed (most likely because a NAT device is between the CPE device and the Oracle VPN headend) it will try to negotiate the use of NAT-T.

The {@code ENABLED} option sets the IKE protocol to use port 4500 instead of 500 and forces encapsulating traffic with the ESP protocol inside UDP packets.

The {@code DISABLED} option directs IKE to completely refuse to negotiate NAT-T even if it senses there may be a NAT device in use.

Optional oracleInitiation

oracleInitiation: OracleInitiation

Indicates whether the Oracle end of the IPSec connection is able to initiate starting up the IPSec tunnel.

Optional phaseOneConfig

phaseOneConfig: model.PhaseOneConfigDetails

Optional phaseTwoConfig

phaseTwoConfig: model.PhaseTwoConfigDetails

Optional routing

routing: Routing

The type of routing to use for this tunnel (BGP dynamic routing, static routing, or policy-based routing).

Functions

getDeserializedJsonObj

getJsonObj