A flag used to specify when advanced configurations, complex configurations that require manual setup, are being applied to network devices for a network tunnel. When the flag is set to true (1), a network tunnel cannot be configured through the management portal nor the API.
Type:
int
The remote end of a network tunnel. This end of the network tunnel resides on an outside network and will be sending and receiving the IPSec packets.
Type:
string
The local end of a network tunnel. This end of the network tunnel resides on the SoftLayer networks and allows access to remote end of the tunnel to subnets on SoftLayer networks.
Type:
string
The date a network tunnel was last modified.
NOTE: This date should NOT be used to determine when the network tunnel configurations were last applied to the network device.
Authentication used to generate keys for protecting the negotiations for a network tunnel.
Type:
string
Determines the strength of the key used in the key exchange process. The higher the group number the stronger the key is and the more secure it is. However, processing time will increase as the strength of the key increases. Both peers in the must use the Diffie-Hellman Group.
Type:
int
Encryption used to generate keys for protecting the negotiations for a network tunnel.
Type:
string
Amount of time (in seconds) allowed to pass before the encryption key expires. A new key is generated without interrupting service. Valid times are from 120 to 172800 seconds.
Type:
int
The authentication used in phase 2 proposal negotiation process.
Type:
string
Determines the strength of the key used in the key exchange process. The higher the group number the stronger the key is and the more secure it is. However, processing time will increase as the strength of the key increases. Both peers must use the Diffie-Hellman Group.
Type:
int
Amount of time (in seconds) allowed to pass before the encryption key expires. A new key is generated without interrupting service. Valid times are from 120 to 172800 seconds.
Type:
int
Determines if the generated keys are made from previous keys. When PFS is specified, a Diffie-Hellman exchange occurs each time a new security association is negotiated.
Type:
int
A key used so that peers authenticate each other. This key is hashed by using the phase one encryption and phase one authentication.
Type:
string
A network tunnel’s address translations.
Type:
SoftLayer_Network_Tunnel_Module_Context_Address_Translation[]
Subnets that provide access to SoftLayer services such as the management portal and the SoftLayer API.
Type:
SoftLayer_Network_Subnet[]
Remote subnets that are allowed access through a network tunnel.
Type:
SoftLayer_Network_Customer_Subnet[]
The datacenter location for one end of the network tunnel that allows access to account’s private subnets.
Type:
SoftLayer_Location
Private subnets that can be accessed through the network tunnel.
Type:
SoftLayer_Network_Subnet[]
Service subnets that can be access through the network tunnel.
Type:
SoftLayer_Network_Subnet[]
Subnets used for a network tunnel’s address translations.
Type:
SoftLayer_Network_Subnet[]
A count of subnets that provide access to SoftLayer services such as the management portal and the SoftLayer API.
Type:
unsignedLong
A count of remote subnets that are allowed access through a network tunnel.
Type:
unsignedLong
A count of private subnets that can be accessed through the network tunnel.
Type:
unsignedLong
A count of service subnets that can be access through the network tunnel.
Type:
unsignedLong
A count of subnets used for a network tunnel’s address translations.
Type:
unsignedLong