Cisco Meraki v0.4.1 published on Saturday, Mar 15, 2025 by Pulumi
meraki.organizations.getApplianceVpnThirdPartyVpnpeers
Explore with Pulumi AI
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as meraki from "@pulumi/meraki";
const example = meraki.organizations.getApplianceVpnThirdPartyVpnpeers({
    organizationId: "string",
});
export const merakiOrganizationsApplianceVpnThirdPartyVpnpeersExample = example.then(example => example.item);
import pulumi
import pulumi_meraki as meraki
example = meraki.organizations.get_appliance_vpn_third_party_vpnpeers(organization_id="string")
pulumi.export("merakiOrganizationsApplianceVpnThirdPartyVpnpeersExample", example.item)
package main
import (
	"github.com/pulumi/pulumi-meraki/sdk/go/meraki/organizations"
	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
	pulumi.Run(func(ctx *pulumi.Context) error {
		example, err := organizations.LookupApplianceVpnThirdPartyVpnpeers(ctx, &organizations.LookupApplianceVpnThirdPartyVpnpeersArgs{
			OrganizationId: "string",
		}, nil)
		if err != nil {
			return err
		}
		ctx.Export("merakiOrganizationsApplianceVpnThirdPartyVpnpeersExample", example.Item)
		return nil
	})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Meraki = Pulumi.Meraki;
return await Deployment.RunAsync(() => 
{
    var example = Meraki.Organizations.GetApplianceVpnThirdPartyVpnpeers.Invoke(new()
    {
        OrganizationId = "string",
    });
    return new Dictionary<string, object?>
    {
        ["merakiOrganizationsApplianceVpnThirdPartyVpnpeersExample"] = example.Apply(getApplianceVpnThirdPartyVpnpeersResult => getApplianceVpnThirdPartyVpnpeersResult.Item),
    };
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.meraki.organizations.OrganizationsFunctions;
import com.pulumi.meraki.organizations.inputs.GetApplianceVpnThirdPartyVpnpeersArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
    public static void main(String[] args) {
        Pulumi.run(App::stack);
    }
    public static void stack(Context ctx) {
        final var example = OrganizationsFunctions.getApplianceVpnThirdPartyVpnpeers(GetApplianceVpnThirdPartyVpnpeersArgs.builder()
            .organizationId("string")
            .build());
        ctx.export("merakiOrganizationsApplianceVpnThirdPartyVpnpeersExample", example.applyValue(getApplianceVpnThirdPartyVpnpeersResult -> getApplianceVpnThirdPartyVpnpeersResult.item()));
    }
}
variables:
  example:
    fn::invoke:
      function: meraki:organizations:getApplianceVpnThirdPartyVpnpeers
      arguments:
        organizationId: string
outputs:
  merakiOrganizationsApplianceVpnThirdPartyVpnpeersExample: ${example.item}
Using getApplianceVpnThirdPartyVpnpeers
Two invocation forms are available. The direct form accepts plain arguments and either blocks until the result value is available, or returns a Promise-wrapped result. The output form accepts Input-wrapped arguments and returns an Output-wrapped result.
function getApplianceVpnThirdPartyVpnpeers(args: GetApplianceVpnThirdPartyVpnpeersArgs, opts?: InvokeOptions): Promise<GetApplianceVpnThirdPartyVpnpeersResult>
function getApplianceVpnThirdPartyVpnpeersOutput(args: GetApplianceVpnThirdPartyVpnpeersOutputArgs, opts?: InvokeOptions): Output<GetApplianceVpnThirdPartyVpnpeersResult>def get_appliance_vpn_third_party_vpnpeers(organization_id: Optional[str] = None,
                                           opts: Optional[InvokeOptions] = None) -> GetApplianceVpnThirdPartyVpnpeersResult
def get_appliance_vpn_third_party_vpnpeers_output(organization_id: Optional[pulumi.Input[str]] = None,
                                           opts: Optional[InvokeOptions] = None) -> Output[GetApplianceVpnThirdPartyVpnpeersResult]func LookupApplianceVpnThirdPartyVpnpeers(ctx *Context, args *LookupApplianceVpnThirdPartyVpnpeersArgs, opts ...InvokeOption) (*LookupApplianceVpnThirdPartyVpnpeersResult, error)
func LookupApplianceVpnThirdPartyVpnpeersOutput(ctx *Context, args *LookupApplianceVpnThirdPartyVpnpeersOutputArgs, opts ...InvokeOption) LookupApplianceVpnThirdPartyVpnpeersResultOutput> Note: This function is named LookupApplianceVpnThirdPartyVpnpeers in the Go SDK.
public static class GetApplianceVpnThirdPartyVpnpeers 
{
    public static Task<GetApplianceVpnThirdPartyVpnpeersResult> InvokeAsync(GetApplianceVpnThirdPartyVpnpeersArgs args, InvokeOptions? opts = null)
    public static Output<GetApplianceVpnThirdPartyVpnpeersResult> Invoke(GetApplianceVpnThirdPartyVpnpeersInvokeArgs args, InvokeOptions? opts = null)
}public static CompletableFuture<GetApplianceVpnThirdPartyVpnpeersResult> getApplianceVpnThirdPartyVpnpeers(GetApplianceVpnThirdPartyVpnpeersArgs args, InvokeOptions options)
public static Output<GetApplianceVpnThirdPartyVpnpeersResult> getApplianceVpnThirdPartyVpnpeers(GetApplianceVpnThirdPartyVpnpeersArgs args, InvokeOptions options)
fn::invoke:
  function: meraki:organizations/getApplianceVpnThirdPartyVpnpeers:getApplianceVpnThirdPartyVpnpeers
  arguments:
    # arguments dictionaryThe following arguments are supported:
- OrganizationId string
- organizationId path parameter. Organization ID
- OrganizationId string
- organizationId path parameter. Organization ID
- organizationId String
- organizationId path parameter. Organization ID
- organizationId string
- organizationId path parameter. Organization ID
- organization_id str
- organizationId path parameter. Organization ID
- organizationId String
- organizationId path parameter. Organization ID
getApplianceVpnThirdPartyVpnpeers Result
The following output properties are available:
- Id string
- The provider-assigned unique ID for this managed resource.
- Item
GetAppliance Vpn Third Party Vpnpeers Item 
- OrganizationId string
- organizationId path parameter. Organization ID
- Id string
- The provider-assigned unique ID for this managed resource.
- Item
GetAppliance Vpn Third Party Vpnpeers Item 
- OrganizationId string
- organizationId path parameter. Organization ID
- id String
- The provider-assigned unique ID for this managed resource.
- item
GetAppliance Vpn Third Party Vpnpeers Item 
- organizationId String
- organizationId path parameter. Organization ID
- id string
- The provider-assigned unique ID for this managed resource.
- item
GetAppliance Vpn Third Party Vpnpeers Item 
- organizationId string
- organizationId path parameter. Organization ID
- id str
- The provider-assigned unique ID for this managed resource.
- item
GetAppliance Vpn Third Party Vpnpeers Item 
- organization_id str
- organizationId path parameter. Organization ID
- id String
- The provider-assigned unique ID for this managed resource.
- item Property Map
- organizationId String
- organizationId path parameter. Organization ID
Supporting Types
GetApplianceVpnThirdPartyVpnpeersItem      
- Peers
List<GetAppliance Vpn Third Party Vpnpeers Item Peer> 
- The list of VPN peers
- Peers
[]GetAppliance Vpn Third Party Vpnpeers Item Peer 
- The list of VPN peers
- peers
List<GetAppliance Vpn Third Party Vpnpeers Item Peer> 
- The list of VPN peers
- peers
GetAppliance Vpn Third Party Vpnpeers Item Peer[] 
- The list of VPN peers
- peers
Sequence[GetAppliance Vpn Third Party Vpnpeers Item Peer] 
- The list of VPN peers
- peers List<Property Map>
- The list of VPN peers
GetApplianceVpnThirdPartyVpnpeersItemPeer       
- IkeVersion string
- [optional] The IKE version to be used for the IPsec VPN peer configuration. Defaults to '1' when omitted.
- IpsecPolicies GetAppliance Vpn Third Party Vpnpeers Item Peer Ipsec Policies 
- Custom IPSec policies for the VPN peer. If not included and a preset has not been chosen, the default preset for IPSec policies will be used.
- IpsecPolicies stringPreset 
- One of the following available presets: 'default', 'aws', 'azure'. If this is provided, the 'ipsecPolicies' parameter is ignored.
- LocalId string
- [optional] The local ID is used to identify the MX to the peer. This will apply to all MXs this peer applies to.
- Name string
- The name of the VPN peer
- List<string>
- A list of network tags that will connect with this peer. Use ['all'] for all networks. Use ['none'] for no networks. If not included, the default is ['all'].
- PrivateSubnets List<string>
- The list of the private subnets of the VPN peer
- PublicIp string
- [optional] The public IP of the VPN peer
- RemoteId string
- [optional] The remote ID is used to identify the connecting VPN peer. This can either be a valid IPv4 Address, FQDN or User FQDN.
- Secret string
- The shared secret with the VPN peer
- IkeVersion string
- [optional] The IKE version to be used for the IPsec VPN peer configuration. Defaults to '1' when omitted.
- IpsecPolicies GetAppliance Vpn Third Party Vpnpeers Item Peer Ipsec Policies 
- Custom IPSec policies for the VPN peer. If not included and a preset has not been chosen, the default preset for IPSec policies will be used.
- IpsecPolicies stringPreset 
- One of the following available presets: 'default', 'aws', 'azure'. If this is provided, the 'ipsecPolicies' parameter is ignored.
- LocalId string
- [optional] The local ID is used to identify the MX to the peer. This will apply to all MXs this peer applies to.
- Name string
- The name of the VPN peer
- []string
- A list of network tags that will connect with this peer. Use ['all'] for all networks. Use ['none'] for no networks. If not included, the default is ['all'].
- PrivateSubnets []string
- The list of the private subnets of the VPN peer
- PublicIp string
- [optional] The public IP of the VPN peer
- RemoteId string
- [optional] The remote ID is used to identify the connecting VPN peer. This can either be a valid IPv4 Address, FQDN or User FQDN.
- Secret string
- The shared secret with the VPN peer
- ikeVersion String
- [optional] The IKE version to be used for the IPsec VPN peer configuration. Defaults to '1' when omitted.
- ipsecPolicies GetAppliance Vpn Third Party Vpnpeers Item Peer Ipsec Policies 
- Custom IPSec policies for the VPN peer. If not included and a preset has not been chosen, the default preset for IPSec policies will be used.
- ipsecPolicies StringPreset 
- One of the following available presets: 'default', 'aws', 'azure'. If this is provided, the 'ipsecPolicies' parameter is ignored.
- localId String
- [optional] The local ID is used to identify the MX to the peer. This will apply to all MXs this peer applies to.
- name String
- The name of the VPN peer
- List<String>
- A list of network tags that will connect with this peer. Use ['all'] for all networks. Use ['none'] for no networks. If not included, the default is ['all'].
- privateSubnets List<String>
- The list of the private subnets of the VPN peer
- publicIp String
- [optional] The public IP of the VPN peer
- remoteId String
- [optional] The remote ID is used to identify the connecting VPN peer. This can either be a valid IPv4 Address, FQDN or User FQDN.
- secret String
- The shared secret with the VPN peer
- ikeVersion string
- [optional] The IKE version to be used for the IPsec VPN peer configuration. Defaults to '1' when omitted.
- ipsecPolicies GetAppliance Vpn Third Party Vpnpeers Item Peer Ipsec Policies 
- Custom IPSec policies for the VPN peer. If not included and a preset has not been chosen, the default preset for IPSec policies will be used.
- ipsecPolicies stringPreset 
- One of the following available presets: 'default', 'aws', 'azure'. If this is provided, the 'ipsecPolicies' parameter is ignored.
- localId string
- [optional] The local ID is used to identify the MX to the peer. This will apply to all MXs this peer applies to.
- name string
- The name of the VPN peer
- string[]
- A list of network tags that will connect with this peer. Use ['all'] for all networks. Use ['none'] for no networks. If not included, the default is ['all'].
- privateSubnets string[]
- The list of the private subnets of the VPN peer
- publicIp string
- [optional] The public IP of the VPN peer
- remoteId string
- [optional] The remote ID is used to identify the connecting VPN peer. This can either be a valid IPv4 Address, FQDN or User FQDN.
- secret string
- The shared secret with the VPN peer
- ike_version str
- [optional] The IKE version to be used for the IPsec VPN peer configuration. Defaults to '1' when omitted.
- ipsec_policies GetAppliance Vpn Third Party Vpnpeers Item Peer Ipsec Policies 
- Custom IPSec policies for the VPN peer. If not included and a preset has not been chosen, the default preset for IPSec policies will be used.
- ipsec_policies_ strpreset 
- One of the following available presets: 'default', 'aws', 'azure'. If this is provided, the 'ipsecPolicies' parameter is ignored.
- local_id str
- [optional] The local ID is used to identify the MX to the peer. This will apply to all MXs this peer applies to.
- name str
- The name of the VPN peer
- Sequence[str]
- A list of network tags that will connect with this peer. Use ['all'] for all networks. Use ['none'] for no networks. If not included, the default is ['all'].
- private_subnets Sequence[str]
- The list of the private subnets of the VPN peer
- public_ip str
- [optional] The public IP of the VPN peer
- remote_id str
- [optional] The remote ID is used to identify the connecting VPN peer. This can either be a valid IPv4 Address, FQDN or User FQDN.
- secret str
- The shared secret with the VPN peer
- ikeVersion String
- [optional] The IKE version to be used for the IPsec VPN peer configuration. Defaults to '1' when omitted.
- ipsecPolicies Property Map
- Custom IPSec policies for the VPN peer. If not included and a preset has not been chosen, the default preset for IPSec policies will be used.
- ipsecPolicies StringPreset 
- One of the following available presets: 'default', 'aws', 'azure'. If this is provided, the 'ipsecPolicies' parameter is ignored.
- localId String
- [optional] The local ID is used to identify the MX to the peer. This will apply to all MXs this peer applies to.
- name String
- The name of the VPN peer
- List<String>
- A list of network tags that will connect with this peer. Use ['all'] for all networks. Use ['none'] for no networks. If not included, the default is ['all'].
- privateSubnets List<String>
- The list of the private subnets of the VPN peer
- publicIp String
- [optional] The public IP of the VPN peer
- remoteId String
- [optional] The remote ID is used to identify the connecting VPN peer. This can either be a valid IPv4 Address, FQDN or User FQDN.
- secret String
- The shared secret with the VPN peer
GetApplianceVpnThirdPartyVpnpeersItemPeerIpsecPolicies         
- ChildAuth List<string>Algos 
- This is the authentication algorithms to be used in Phase 2. The value should be an array with one of the following algorithms: 'sha256', 'sha1', 'md5'
- ChildCipher List<string>Algos 
- This is the cipher algorithms to be used in Phase 2. The value should be an array with one or more of the following algorithms: 'aes256', 'aes192', 'aes128', 'tripledes', 'des', 'null'
- ChildLifetime int
- The lifetime of the Phase 2 SA in seconds.
- ChildPfs List<string>Groups 
- This is the Diffie-Hellman group to be used for Perfect Forward Secrecy in Phase 2. The value should be an array with one of the following values: 'disabled','group14', 'group5', 'group2', 'group1'
- IkeAuth List<string>Algos 
- This is the authentication algorithm to be used in Phase 1. The value should be an array with one of the following algorithms: 'sha256', 'sha1', 'md5'
- IkeCipher List<string>Algos 
- This is the cipher algorithm to be used in Phase 1. The value should be an array with one of the following algorithms: 'aes256', 'aes192', 'aes128', 'tripledes', 'des'
- IkeDiffie List<string>Hellman Groups 
- This is the Diffie-Hellman group to be used in Phase 1. The value should be an array with one of the following algorithms: 'group14', 'group5', 'group2', 'group1'
- IkeLifetime int
- The lifetime of the Phase 1 SA in seconds.
- IkePrf List<string>Algos 
- [optional] This is the pseudo-random function to be used in IKE_SA. The value should be an array with one of the following algorithms: 'prfsha256', 'prfsha1', 'prfmd5', 'default'. The 'default' option can be used to default to the Authentication algorithm.
- ChildAuth []stringAlgos 
- This is the authentication algorithms to be used in Phase 2. The value should be an array with one of the following algorithms: 'sha256', 'sha1', 'md5'
- ChildCipher []stringAlgos 
- This is the cipher algorithms to be used in Phase 2. The value should be an array with one or more of the following algorithms: 'aes256', 'aes192', 'aes128', 'tripledes', 'des', 'null'
- ChildLifetime int
- The lifetime of the Phase 2 SA in seconds.
- ChildPfs []stringGroups 
- This is the Diffie-Hellman group to be used for Perfect Forward Secrecy in Phase 2. The value should be an array with one of the following values: 'disabled','group14', 'group5', 'group2', 'group1'
- IkeAuth []stringAlgos 
- This is the authentication algorithm to be used in Phase 1. The value should be an array with one of the following algorithms: 'sha256', 'sha1', 'md5'
- IkeCipher []stringAlgos 
- This is the cipher algorithm to be used in Phase 1. The value should be an array with one of the following algorithms: 'aes256', 'aes192', 'aes128', 'tripledes', 'des'
- IkeDiffie []stringHellman Groups 
- This is the Diffie-Hellman group to be used in Phase 1. The value should be an array with one of the following algorithms: 'group14', 'group5', 'group2', 'group1'
- IkeLifetime int
- The lifetime of the Phase 1 SA in seconds.
- IkePrf []stringAlgos 
- [optional] This is the pseudo-random function to be used in IKE_SA. The value should be an array with one of the following algorithms: 'prfsha256', 'prfsha1', 'prfmd5', 'default'. The 'default' option can be used to default to the Authentication algorithm.
- childAuth List<String>Algos 
- This is the authentication algorithms to be used in Phase 2. The value should be an array with one of the following algorithms: 'sha256', 'sha1', 'md5'
- childCipher List<String>Algos 
- This is the cipher algorithms to be used in Phase 2. The value should be an array with one or more of the following algorithms: 'aes256', 'aes192', 'aes128', 'tripledes', 'des', 'null'
- childLifetime Integer
- The lifetime of the Phase 2 SA in seconds.
- childPfs List<String>Groups 
- This is the Diffie-Hellman group to be used for Perfect Forward Secrecy in Phase 2. The value should be an array with one of the following values: 'disabled','group14', 'group5', 'group2', 'group1'
- ikeAuth List<String>Algos 
- This is the authentication algorithm to be used in Phase 1. The value should be an array with one of the following algorithms: 'sha256', 'sha1', 'md5'
- ikeCipher List<String>Algos 
- This is the cipher algorithm to be used in Phase 1. The value should be an array with one of the following algorithms: 'aes256', 'aes192', 'aes128', 'tripledes', 'des'
- ikeDiffie List<String>Hellman Groups 
- This is the Diffie-Hellman group to be used in Phase 1. The value should be an array with one of the following algorithms: 'group14', 'group5', 'group2', 'group1'
- ikeLifetime Integer
- The lifetime of the Phase 1 SA in seconds.
- ikePrf List<String>Algos 
- [optional] This is the pseudo-random function to be used in IKE_SA. The value should be an array with one of the following algorithms: 'prfsha256', 'prfsha1', 'prfmd5', 'default'. The 'default' option can be used to default to the Authentication algorithm.
- childAuth string[]Algos 
- This is the authentication algorithms to be used in Phase 2. The value should be an array with one of the following algorithms: 'sha256', 'sha1', 'md5'
- childCipher string[]Algos 
- This is the cipher algorithms to be used in Phase 2. The value should be an array with one or more of the following algorithms: 'aes256', 'aes192', 'aes128', 'tripledes', 'des', 'null'
- childLifetime number
- The lifetime of the Phase 2 SA in seconds.
- childPfs string[]Groups 
- This is the Diffie-Hellman group to be used for Perfect Forward Secrecy in Phase 2. The value should be an array with one of the following values: 'disabled','group14', 'group5', 'group2', 'group1'
- ikeAuth string[]Algos 
- This is the authentication algorithm to be used in Phase 1. The value should be an array with one of the following algorithms: 'sha256', 'sha1', 'md5'
- ikeCipher string[]Algos 
- This is the cipher algorithm to be used in Phase 1. The value should be an array with one of the following algorithms: 'aes256', 'aes192', 'aes128', 'tripledes', 'des'
- ikeDiffie string[]Hellman Groups 
- This is the Diffie-Hellman group to be used in Phase 1. The value should be an array with one of the following algorithms: 'group14', 'group5', 'group2', 'group1'
- ikeLifetime number
- The lifetime of the Phase 1 SA in seconds.
- ikePrf string[]Algos 
- [optional] This is the pseudo-random function to be used in IKE_SA. The value should be an array with one of the following algorithms: 'prfsha256', 'prfsha1', 'prfmd5', 'default'. The 'default' option can be used to default to the Authentication algorithm.
- child_auth_ Sequence[str]algos 
- This is the authentication algorithms to be used in Phase 2. The value should be an array with one of the following algorithms: 'sha256', 'sha1', 'md5'
- child_cipher_ Sequence[str]algos 
- This is the cipher algorithms to be used in Phase 2. The value should be an array with one or more of the following algorithms: 'aes256', 'aes192', 'aes128', 'tripledes', 'des', 'null'
- child_lifetime int
- The lifetime of the Phase 2 SA in seconds.
- child_pfs_ Sequence[str]groups 
- This is the Diffie-Hellman group to be used for Perfect Forward Secrecy in Phase 2. The value should be an array with one of the following values: 'disabled','group14', 'group5', 'group2', 'group1'
- ike_auth_ Sequence[str]algos 
- This is the authentication algorithm to be used in Phase 1. The value should be an array with one of the following algorithms: 'sha256', 'sha1', 'md5'
- ike_cipher_ Sequence[str]algos 
- This is the cipher algorithm to be used in Phase 1. The value should be an array with one of the following algorithms: 'aes256', 'aes192', 'aes128', 'tripledes', 'des'
- ike_diffie_ Sequence[str]hellman_ groups 
- This is the Diffie-Hellman group to be used in Phase 1. The value should be an array with one of the following algorithms: 'group14', 'group5', 'group2', 'group1'
- ike_lifetime int
- The lifetime of the Phase 1 SA in seconds.
- ike_prf_ Sequence[str]algos 
- [optional] This is the pseudo-random function to be used in IKE_SA. The value should be an array with one of the following algorithms: 'prfsha256', 'prfsha1', 'prfmd5', 'default'. The 'default' option can be used to default to the Authentication algorithm.
- childAuth List<String>Algos 
- This is the authentication algorithms to be used in Phase 2. The value should be an array with one of the following algorithms: 'sha256', 'sha1', 'md5'
- childCipher List<String>Algos 
- This is the cipher algorithms to be used in Phase 2. The value should be an array with one or more of the following algorithms: 'aes256', 'aes192', 'aes128', 'tripledes', 'des', 'null'
- childLifetime Number
- The lifetime of the Phase 2 SA in seconds.
- childPfs List<String>Groups 
- This is the Diffie-Hellman group to be used for Perfect Forward Secrecy in Phase 2. The value should be an array with one of the following values: 'disabled','group14', 'group5', 'group2', 'group1'
- ikeAuth List<String>Algos 
- This is the authentication algorithm to be used in Phase 1. The value should be an array with one of the following algorithms: 'sha256', 'sha1', 'md5'
- ikeCipher List<String>Algos 
- This is the cipher algorithm to be used in Phase 1. The value should be an array with one of the following algorithms: 'aes256', 'aes192', 'aes128', 'tripledes', 'des'
- ikeDiffie List<String>Hellman Groups 
- This is the Diffie-Hellman group to be used in Phase 1. The value should be an array with one of the following algorithms: 'group14', 'group5', 'group2', 'group1'
- ikeLifetime Number
- The lifetime of the Phase 1 SA in seconds.
- ikePrf List<String>Algos 
- [optional] This is the pseudo-random function to be used in IKE_SA. The value should be an array with one of the following algorithms: 'prfsha256', 'prfsha1', 'prfmd5', 'default'. The 'default' option can be used to default to the Authentication algorithm.
Package Details
- Repository
- meraki pulumi/pulumi-meraki
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the merakiTerraform Provider.
