Get one IPSec Redundant tunnel
  • 22 Nov 2023
  • 1 Minute to read
  • Contributors

    Get one IPSec Redundant tunnel


      Article Summary

      Get
      /v2/networks/{networkId}/tunnels/ipsec/redundant/{tunnelId}

      Required permissions: ["network:read"]

      Security
      Http
      Type bearer
      Path parameters
      networkId
      stringRequired
      tunnelId
      stringRequired
      Responses
      200

      Success

      Expand All
      object
      createdAt
      string (date-time)

      The date when this record was created.

      updatedAt
      string (date-time)

      The date of last update of the record.

      tunnelName
      string

      The name of the tunnel

      Max length15
      Min length3
      Pattern^[a-zA-Z0-9]*$
      regionID
      string
      tunnel1
      object
      passphrase
      string
      Pattern^[a-zA-Z1-9._][a-zA-Z0-9._]{7,63}$
      p81GWinternalIP
      string (ipv4)
      remoteGWinernalIP
      string (ipv4)
      remotePublicIP
      string (ipv4)
      remoteASN
      integer
      remoteID
      OneOf
      string
      string
      string
      string
      Pattern^[a-zA-Z0-9]{3,25}$
      gatewayID
      string
      tunnelID
      string
      tunnel2
      object
      passphrase
      string
      Pattern^[a-zA-Z1-9._][a-zA-Z0-9._]{7,63}$
      p81GWinternalIP
      string (ipv4)
      remoteGWinernalIP
      string (ipv4)
      remotePublicIP
      string (ipv4)
      remoteASN
      integer
      remoteID
      OneOf
      string
      string
      string
      string
      Pattern^[a-zA-Z0-9]{3,25}$
      gatewayID
      string
      tunnelID
      string
      sharedSettings
      object (IPSecSharedSettings)
      p81GatewaySubnets
      Array of string
      string
      remoteGatewaySubnets
      Array of string
      string
      advancedSettings
      object (IPSecAdvancedSettings)
      keyExchange
      string
      Valid values[ "ikev1", "ikev2" ]
      ikeLifeTime
      string
      Pattern^((1[0-9]|[2-9][0-9]|[1-9][0-9]{2,3}|[1-7][0-9]{4}|8[0-5][0-9]{3}|86[0-3][0-9]{2}|86400)s)|(([1-9]|[1-9][0-9]|[1-9][0-9][0-9]|1[0-3][0-9][0-9]|14[0-3][0-9]|1440)m)|(([1-9]|1[0-9]|2[0-4])h)$
      lifetime
      string
      Pattern^((1[0-9]|[2-9][0-9]|[1-9][0-9]{2,3}|[1-7][0-9]{4}|8[0-5][0-9]{3}|86[0-3][0-9]{2}|86400)s)|(([1-9]|[1-9][0-9]|[1-9][0-9][0-9]|1[0-3][0-9][0-9]|14[0-3][0-9]|1440)m)|(([1-9]|1[0-9]|2[0-4])h)$
      dpdDelay
      string
      Pattern^([5-9]|[1-5][0-9]|60)s$
      dpdTimeout
      string
      Pattern^([5-9]|[1-5][0-9]|60)s$
      phase1
      object (IPSecPhase)
      auth
      Array of string
      string
      Valid values[ "3des", "blowfish128", "blowfish192", "blowfish256", "aes128", "aes192", "aes256" ]
      encryption
      Array of string
      string
      Valid values[ "md5", "sha1", "sha384", "sha256", "sha512" ]
      dh
      Array of integer

      Diffie Helman encryption

      integer
      Valid values[ 2, 5, 14, 19, 20, 21 ]
      phase2
      object (IPSecPhase)
      auth
      Array of string
      string
      Valid values[ "3des", "blowfish128", "blowfish192", "blowfish256", "aes128", "aes192", "aes256" ]
      encryption
      Array of string
      string
      Valid values[ "md5", "sha1", "sha384", "sha256", "sha512" ]
      dh
      Array of integer

      Diffie Helman encryption

      integer
      Valid values[ 2, 5, 14, 19, 20, 21 ]
      401

      Unauthorized

      object
      id
      string
      message
      string
      403

      Forbidden

      object
      id
      string
      message
      string
      404

      Resource not found

      object
      id
      string
      message
      string

      Was this article helpful?