Modifies the configuration of an IPsec-VPN connection.
Usage notes
-
If you want to modify a dual-tunnel IPsec-VPN connection, call the
ModifyVpnConnectionAttribute
operation, which also supports the following optional parameters:ClientToken, Name, LocalSubnet, RemoteSubnet, EffectImmediately, AutoConfigRoute, TunnelOptionsSpecification, and EnableTunnelsBgp.
-
If you want to modify a single-tunnel IPsec-VPN connection, you can call the
ModifyVpnConnectionAttribute
operation, which also supports the following optional parameters:ClientToken, Name, LocalSubnet, RemoteSubnet, EffectImmediately, IkeConfig, IpsecConfig, HealthCheckConfig, AutoConfigRoute, EnableDpd, EnableNatTraversal, BgpConfig, and RemoteCaCertificate.
-
ModifyVpnConnectionAttribute is an asynchronous operation. After a request is sent, the system returns a request ID and runs the task in the background. You can call the DescribeVpnGateway operation to query the status of a VPN gateway. The status of the VPN gateway indicates whether the IPsec-VPN connection is modified.
- If the VPN gateway is in the updating state, the IPsec-VPN connection is being modified.
- If the VPN gateway is in the active state, the IPsec-VPN connection is modified.
- You cannot call the ModifyVpnConnectionAttribute operation again on the same VPN gateway to modify the configuration of an IPsec-VPN connection before the previous operation is complete.
Debugging
Request parameters
Parameter |
Type |
Required |
Example |
Description |
Action | String | Yes | ModifyVpnConnectionAttribute | The operation that you want to perform. Set the value to ModifyVpnConnectionAttribute. |
RegionId | String | Yes | cn-shanghai | The region ID of the IPsec-VPN connection. You can call the DescribeRegions operation to query the IDs of available regions. |
ClientToken | String | No | 02fb3da4-130e-11e9-8e44-0016e04115b | The client token that is used to ensure the idempotence of the request. You can use the client to generate the token, but you must make sure that the token is unique among different requests. The token can contain only ASCII characters. Note
If you do not specify this parameter, the system automatically uses the request ID as the client token. The request ID may be different for each request. |
VpnConnectionId | String | Yes | vco-bp1bbi27hojx80nck**** | The ID of the IPsec-VPN connection. |
Name | String | No | nametest | The name of the IPsec-VPN connection. The name must be 1 to 100 characters in length, and cannot start with |
LocalSubnet | String | No | 10.1.1.0/24,10.1.2.0/24 | The CIDR block on the virtual private cloud (VPC) side. The CIDR block is used in Phase 2 negotiations. Separate CIDR blocks with commas (,). Example: 192.168.1.0/24,192.168.2.0/24. The following routing modes are supported:
|
RemoteSubnet | String | No | 10.2.1.0/24,10.2.2.0/24 | The CIDR block on the data center side. This CIDR block is used in Phase 2 negotiations. Separate CIDR blocks with commas (,). Example: 192.168.3.0/24,192.168.4.0/24. The following routing modes are supported:
|
EffectImmediately | Boolean | No | false | Specifies whether to immediately start IPsec negotiations. Valid values:
|
IkeConfig | String | No | {"Psk":"pgw6dy7d1i8i****","IkeVersion":"ikev1","IkeMode":"main","IkeEncAlg":"aes","IkeAuthAlg":"sha1","IkePfs":"group2","IkeLifetime":86400,"LocalId":"116.64.XX.XX","RemoteId":"139.18.XX.XX"} | This parameter is supported by single-tunnel IPsec-VPN connections. The configurations of Phase 1 negotiations:
|
IpsecConfig | String | No | {"IpsecEncAlg":"aes","IpsecAuthAlg":"sha1","IpsecPfs":"group2","IpsecLifetime":86400} | This parameter is supported by single-tunnel IPsec-VPN connections. The configurations of Phase 2 negotiations:
|
HealthCheckConfig | String | No | {"enable":"true","dip":"192.168.1.1","sip":"10.1.1.1","interval":"3","retry":"3"} | This parameter is supported by single-tunnel IPsec-VPN connections. The health check configuration:
|
AutoConfigRoute | Boolean | No | true | Specifies whether to automatically advertise routes. Valid values:
|
EnableDpd | Boolean | No | true | This parameter is supported by single-tunnel IPsec-VPN connections. Specifies whether to enable the dead peer detection (DPD) feature. Valid values:
|
EnableNatTraversal | Boolean | No | true | This parameter is supported by single-tunnel IPsec-VPN connections. Indicates whether NAT traversal is enabled. Valid values:
|
BgpConfig | String | No | {"EnableBgp":"true","LocalAsn":"65530","TunnelCidr":"169.254.11.0/30","LocalBgpIp":"169.254.11.1"} | This parameter is supported by single-tunnel IPsec-VPN connections. The Border Gateway Protocol (BGP) configuration:
Note
|
RemoteCaCertificate | String | No | -----BEGIN CERTIFICATE----- MIIB7zCCAZW**** -----END CERTIFICATE----- | This parameter is supported by single-tunnel IPsec-VPN connections. If the VPN gateway uses a ShangMi (SM) certificate, you can modify the CA certificate used by the IPsec peer. If the VPN gateway does not use an SM certificate, this parameter is not supported. |
TunnelOptionsSpecification.N.TunnelId | String | No | tun-opsqc4d97wni27**** | TunnelOptionsSpecification parameters are supported by dual-tunnel IPsec-VPN gateways. You can modify both the active and standby tunnels of the IPsec-VPN connection. The tunnel ID. |
TunnelOptionsSpecification.N.EnableDpd | Boolean | No | true | Specifies whether to enable DPD for the tunnel. Valid values:
|
TunnelOptionsSpecification.N.EnableNatTraversal | Boolean | No | true | Specifies whether to enable NAT traversal for the tunnel. Valid values:
|
TunnelOptionsSpecification.N.RemoteCaCertificate | String | No | -----BEGIN CERTIFICATE----- MIIB7zCCAZW**** -----END CERTIFICATE----- | If the VPN gateway uses an SM certificate, you can modify the CA certificate used by the IPsec peer. If the VPN gateway does not use an SM certificate, this parameter is not supported. |
TunnelOptionsSpecification.N.TunnelBgpConfig.LocalAsn | Long | No | 65530 | The local ASN (Alibaba Cloud side). Valid values: 1 to 4294967295. Default value: 45104. Note
|
TunnelOptionsSpecification.N.TunnelBgpConfig.LocalBgpIp | String | No | 169.254.10.1 | The local BGP address (Alibaba Cloud side). The BGP address is an IP address that falls into the BGP CIDR block. |
TunnelOptionsSpecification.N.TunnelBgpConfig.TunnelCidr | String | No | 169.254.10.0/30 | The BGP CIDR block. The CIDR block must fall within 169.254.0.0/16. The subnet mask of the CIDR block must be 30 bits in length. Note
The BGP CIDR block of each tunnel on a VPN gateway must be unique. |
TunnelOptionsSpecification.N.TunnelIkeConfig.IkeAuthAlg | String | No | md5 | The authentication algorithm that is used in Phase 1 negotiations. Valid values: md5, sha1, sha256, sha384, and sha512. |
TunnelOptionsSpecification.N.TunnelIkeConfig.IkeEncAlg | String | No | aes | The encryption algorithm that is used in Phase 1 negotiations. Valid values: aes, aes192, aes256, des, and 3des. |
TunnelOptionsSpecification.N.TunnelIkeConfig.IkeLifetime | Long | No | 86400 | The SA lifetime that is determined by Phase 1 negotiations. Unit: seconds. Valid values: 0 to 86400. |
TunnelOptionsSpecification.N.TunnelIkeConfig.IkeMode | String | No | main | The IKE negotiation mode. Valid values:
|
TunnelOptionsSpecification.N.TunnelIkeConfig.IkePfs | String | No | group2 | The DH key exchange algorithm that is used in Phase 1 negotiations. Valid values: group1, group2, group5, and group14. |
TunnelOptionsSpecification.N.TunnelIkeConfig.IkeVersion | String | No | ikev1 | The version of the IKE protocol. Valid values: ikev1 and ikev2. Compared with IKEv1, IKEv2 simplifies the SA negotiation process and is more suitable for scenarios in which multiple CIDR blocks are used. |
TunnelOptionsSpecification.N.TunnelIkeConfig.LocalId | String | No | 47.21.XX.XX | The local identifier (Alibaba Cloud side) used for Phase 1 negotiation. The identifier cannot exceed 100 characters in length. The default identifier is the tunnel IP address. You can set LocalId to a fully qualified domain name (FQDN). In this case, we recommend that you set Negotiation Mode to aggressive. |
TunnelOptionsSpecification.N.TunnelIkeConfig.Psk | String | No | 123456**** | The pre-shared key that is used for authentication between the tunnel and peer.
Note
Make sure that the tunnels and peers use the same pre-shared key. Otherwise, tunnel communication cannot be established. |
TunnelOptionsSpecification.N.TunnelIkeConfig.RemoteId | String | No | 47.42.XX.XX | The peer identifier used for Phase 1 negotiation. The identifier cannot exceed 100 characters in length. The default identifier is the IP address of the customer gateway. You can set RemoteId to an FQDN. In this case, we recommend that you set Negotiation Mode to aggressive. |
TunnelOptionsSpecification.N.TunnelIpsecConfig.IpsecAuthAlg | String | No | md5 | The authentication algorithm that was used in Phase 2 negotiations. Valid values: md5, sha1, sha256, sha384, and sha512. |
TunnelOptionsSpecification.N.TunnelIpsecConfig.IpsecEncAlg | String | No | aes | The encryption algorithm that is used in Phase 2 negotiations. Valid values: aes, aes192, aes256, des, and 3des. |
TunnelOptionsSpecification.N.TunnelIpsecConfig.IpsecLifetime | Integer | No | 86400 | The SA lifetime that is determined by Phase 2 negotiations. Unit: seconds. Valid values: 0 to 86400. |
TunnelOptionsSpecification.N.TunnelIpsecConfig.IpsecPfs | String | No | group2 | The DH key exchange algorithm that is used in Phase 2 negotiations. Valid values: disabled, group1, group2, group5, and group14. |
EnableTunnelsBgp | Boolean | No | true | This parameter is supported by dual-tunnel IPsec-VPN connections. Specifies whether to enable BGP for the tunnel. Valid values: true and false. |
Response parameters
Parameter |
Type |
Example |
Description |
EnableNatTraversal | Boolean | true | Indicates whether NAT traversal is enabled for the IPsec-VPN connection. Valid values:
This parameter is returned only for single-tunnel IPsec-VPN connections. |
CreateTime | Long | 1492753817000 | The timestamp generated when the IPsec-VPN connection was established. Unit: milliseconds. This value is a UNIX timestamp representing the number of milliseconds that have elapsed since the epoch time January 1, 1970, 00:00:00 UTC. |
EffectImmediately | Boolean | false | Indicates whether IPsec negotiations immediately start after the configuration takes effect. Valid values:
|
VpnGatewayId | String | vpn-bp1q8bgx4xnkm2ogj**** | The ID of the VPN gateway. |
LocalSubnet | String | 10.1.1.0/24,10.1.2.0/24 | The CIDR block on the VPC side. |
RequestId | String | 7DB79D0C-5F27-4AB5-995B-79BE55102F90 | The request ID. |
VpnConnectionId | String | vco-bp1bbi27hojx80nck**** | The ID of the IPsec-VPN connection. |
Description | String | description | The description of the IPsec-VPN connection. |
RemoteSubnet | String | 10.2.1.0/24,10.2.2.0/24 | The CIDR block on the data center side. |
CustomerGatewayId | String | cgw-p0w2jemrcj5u61un8**** | The ID of the customer gateway that is associated with the IPsec-VPN connection. This parameter is returned only for single-tunnel IPsec-VPN connections. |
Name | String | nametest | The name of the IPsec-VPN connection. |
EnableDpd | Boolean | true | Indicates whether dead peer detection (DPD) is enabled for the IPsec-VPN connection. Valid values:
This parameter is returned only for single-tunnel IPsec-VPN connections. |
IkeConfig | Object | The configuration of Phase 1 negotiations. IkeConfig parameters are returned only for single-tunnel IPsec-VPN connections. |
|
RemoteId | String | 139.18.XX.XX | The identifier on the data center side. The default value is the IP address of the customer gateway. The value can be a FQDN or an IP address. |
IkeLifetime | Long | 86400 | The lifetime in the IKE phase. Unit: seconds. |
IkeEncAlg | String | aes | The encryption algorithm in the IKE phase. |
LocalId | String | 116.64.XX.XX | The identifier on the VPC side. The default value is the IP address of the VPN gateway. The value can be an FQDN or an IP address. |
IkeMode | String | main | The IKE negotiation mode.
|
IkeVersion | String | ikev1 | The version of the IKE protocol.
Compared with IKEv1, IKEv2 simplifies the SA negotiation process and is more suitable for scenarios in which multiple CIDR blocks are used. |
IkePfs | String | group2 | The DH group in the IKE phase. |
Psk | String | pgw6dy7d1i8i**** | The pre-shared key. |
IkeAuthAlg | String | sha1 | The algorithm in the IKE phase. |
IpsecConfig | Object | The configuration of Phase 2 negotiations. IpsecConfig parameters are returned only for single-tunnel IPsec-VPN connections. |
|
IpsecAuthAlg | String | sha1 | The authentication algorithm in the IPsec phase. |
IpsecLifetime | Long | 86400 | The lifetime in the IPsec phase. Unit: seconds. |
IpsecEncAlg | String | aes | The encryption algorithm in the IPsec phase. |
IpsecPfs | String | group2 | The DH group in the IPsec phase. |
VcoHealthCheck | Object | The health check configurations. VcoHealthCheck parameters are returned only for single-tunnel IPsec-VPN connections. |
|
Dip | String | 192.168.1.1 | The destination IP address. |
Interval | Integer | 3 | The interval between two consecutive health checks. Unit: seconds. |
Retry | Integer | 3 | The maximum number of health check retries. |
Sip | String | 10.1.1.1 | The source IP address for health checks. |
Enable | String | true | Indicates whether the health check feature is enabled for the IPsec-VPN connection.
|
VpnBgpConfig | Object | The BGP configuration. VpnBgpConfig parameters are returned only for single-tunnel IPsec-VPN connections. |
|
Status | String | success | The negotiation status of BGP. Valid values:
|
PeerBgpIp | String | 169.254.11.2 | The BGP IP address of the data center. |
TunnelCidr | String | 169.254.11.0/30 | The BGP CIDR block of the IPsec-VPN connection. |
EnableBgp | String | true | Indicates whether BGP is enabled.
|
LocalBgpIp | String | 169.254.11.1 | The BGP IP address of Alibaba Cloud. |
PeerAsn | Integer | 65531 | The ASN on the data center side. |
LocalAsn | Integer | 65530 | The ASN of Alibaba Cloud. |
TunnelOptionsSpecification | Array of TunnelOptions | The tunnel configurations of the IPsec-VPN connection. TunnelOptionsSpecification parameters are returned only for dual-tunnel IPsec-VPN connections. |
|
TunnelOptions | |||
CustomerGatewayId | String | cgw-p0wy363lucf1uyae8**** | The ID of the customer gateway that is associated with the tunnel. |
EnableDpd | Boolean | true | Indicates whether DPD is enabled for the tunnel. Valid values:
|
EnableNatTraversal | Boolean | true | Indicates whether NAT traversal is enabled for the tunnel. Valid values:
|
InternetIp | String | 47.21.XX.XX | The IP address on the Alibaba Cloud side. |
RemoteCaCertificate | String | -----BEGIN CERTIFICATE----- MIIB7zCCAZW**** -----END CERTIFICATE----- | The CA certificate used by the IPsec peer. This parameter is returned only by VPN gateways that use SM certificates. |
Role | String | master | The tunnel role. Valid values:
|
State | String | active | The tunnel status. Valid values:
|
TunnelBgpConfig | Object | The BGP configurations. |
|
LocalAsn | Long | 65530 | The local ASN (Alibaba Cloud side). |
LocalBgpIp | String | 169.254.10.1 | The local BGP address (Alibaba Cloud side). |
PeerAsn | Long | 65531 | The peer ASN. |
PeerBgpIp | String | 169.254.10.2 | The peer BGP address. |
TunnelCidr | String | 169.254.10.0/30 | The BGP CIDR block of the tunnel. |
TunnelId | String | tun-opsqc4d97wni27**** | The tunnel ID. |
TunnelIkeConfig | Object | The configuration of Phase 1 negotiations. |
|
IkeAuthAlg | String | sha1 | The algorithm in the IKE phase. |
IkeEncAlg | String | aes | The encryption algorithm in the IKE phase. |
IkeLifetime | Long | 86400 | The lifetime in the IKE phase. Unit: seconds. |
IkeMode | String | main | The IKE negotiation mode.
|
IkePfs | String | group2 | The DH group in the IKE phase. |
IkeVersion | String | ikev1 | The version of the IKE protocol. |
LocalId | String | 47.21.XX.XX | The local identifier (Alibaba Cloud side). |
Psk | String | 123456**** | The pre-shared key. |
RemoteId | String | 47.42.XX.XX | The peer identifier. |
TunnelIpsecConfig | Object | The configuration of Phase 2 negotiations. |
|
IpsecAuthAlg | String | sha1 | The authentication algorithm in the IPsec phase. |
IpsecEncAlg | String | aes | The encryption algorithm in the IPsec phase. |
IpsecLifetime | Long | 86400 | The lifetime in the IPsec phase. Unit: seconds. |
IpsecPfs | String | group2 | The DH group in the IPsec phase. |
ZoneNo | String | ap-southeast-5a | The zone of the tunnel. |
EnableTunnelsBgp | Boolean | true | Indicates whether BGP is enabled for the tunnel. Valid values:
This parameter is returned only by dual-tunnel IPsec-VPN connections. |
Examples
Sample requests
http(s)://[Endpoint]/?Action=ModifyVpnConnectionAttribute
&RegionId= cn-shanghai
&ClientToken=02fb3da4-130e-11e9-8e44-0016e04115b
&VpnConnectionId=vco-bp1bbi27hojx80nck****
&Name=nametest
&LocalSubnet=10.1.1.0/24,10.1.2.0/24
&RemoteSubnet=10.2.1.0/24,10.2.2.0/24
&EffectImmediately=false
&IkeConfig={"Psk":"pgw6dy7d1i8i****","IkeVersion":"ikev1","IkeMode":"main","IkeEncAlg":"aes","IkeAuthAlg":"sha1","IkePfs":"group2","IkeLifetime":86400,"LocalId":"116.64.XX.XX","RemoteId":"139.18.XX.XX"}
&IpsecConfig={"IpsecEncAlg":"aes","IpsecAuthAlg":"sha1","IpsecPfs":"group2","IpsecLifetime":86400}
&HealthCheckConfig={"enable":"true","dip":"192.168.1.1","sip":"10.1.1.1","interval":"3","retry":"3"}
&AutoConfigRoute=true
&EnableDpd=true
&EnableNatTraversal=true
&BgpConfig={"EnableBgp":"true","LocalAsn":"65530","TunnelCidr":"169.254.11.0/30","LocalBgpIp":"169.254.11.1"}
&<Common request parameters>
Sample success responses
XML format
HTTP/1.1 200 OK
Content-Type:application/xml
<ModifyVpnConnectionAttributeResponse>
<EnableNatTraversal>true</EnableNatTraversal>
<CreateTime>1492753817000</CreateTime>
<EffectImmediately>false</EffectImmediately>
<VpnGatewayId>vpn-bp1q8bgx4xnkm2ogj****</VpnGatewayId>
<LocalSubnet>10.1.1.0/24,10.1.2.0/24</LocalSubnet>
<RequestId>7DB79D0C-5F27-4AB5-995B-79BE55102F90</RequestId>
<VpnConnectionId>vco-bp1bbi27hojx80nck****</VpnConnectionId>
<Description>description</Description>
<RemoteSubnet>10.2.1.0/24,10.2.2.0/24</RemoteSubnet>
<CustomerGatewayId>cgw-p0w2jemrcj5u61un8****</CustomerGatewayId>
<Name>nametest</Name>
<EnableDpd>true</EnableDpd>
<IkeConfig>
<RemoteId>139.18.XX.XX</RemoteId>
<IkeLifetime>86400</IkeLifetime>
<IkeEncAlg>aes</IkeEncAlg>
<LocalId>116.64.XX.XX</LocalId>
<IkeMode>main</IkeMode>
<IkeVersion>ikev1</IkeVersion>
<IkePfs>group2</IkePfs>
<Psk>pgw6dy7d1i8i****</Psk>
<IkeAuthAlg>sha1</IkeAuthAlg>
</IkeConfig>
<IpsecConfig>
<IpsecAuthAlg>sha1</IpsecAuthAlg>
<IpsecLifetime>86400</IpsecLifetime>
<IpsecEncAlg>aes</IpsecEncAlg>
<IpsecPfs>group2</IpsecPfs>
</IpsecConfig>
<VcoHealthCheck>
<Dip>192.168.1.1</Dip>
<Interval>3</Interval>
<Retry>3</Retry>
<Sip>10.1.1.1</Sip>
<Enable>true</Enable>
</VcoHealthCheck>
<VpnBgpConfig>
<Status>success</Status>
<PeerBgpIp>169.254.11.2</PeerBgpIp>
<TunnelCidr>169.254.11.0/30</TunnelCidr>
<EnableBgp>true</EnableBgp>
<LocalBgpIp>169.254.11.1</LocalBgpIp>
<PeerAsn>65531</PeerAsn>
<LocalAsn>65530</LocalAsn>
</VpnBgpConfig>
</ModifyVpnConnectionAttributeResponse>
JSON
format
HTTP/1.1 200 OK
Content-Type:application/json
{
"EnableNatTraversal" : true,
"CreateTime" : 1492753817000,
"EffectImmediately" : false,
"VpnGatewayId" : "vpn-bp1q8bgx4xnkm2ogj****",
"LocalSubnet" : "10.1.1.0/24,10.1.2.0/24",
"RequestId" : "7DB79D0C-5F27-4AB5-995B-79BE55102F90",
"VpnConnectionId" : "vco-bp1bbi27hojx80nck****",
"Description" : "description",
"RemoteSubnet" : "10.2.1.0/24,10.2.2.0/24",
"CustomerGatewayId" : "cgw-p0w2jemrcj5u61un8****",
"Name" : "nametest",
"EnableDpd" : true,
"IkeConfig" : {
"RemoteId" : "139.18.XX.XX",
"IkeLifetime" : 86400,
"IkeEncAlg" : "aes",
"LocalId" : "116.64.XX.XX",
"IkeMode" : "main",
"IkeVersion" : "ikev1",
"IkePfs" : "group2",
"Psk" : "pgw6dy7d1i8i****",
"IkeAuthAlg" : "sha1"
},
"IpsecConfig" : {
"IpsecAuthAlg" : "sha1",
"IpsecLifetime" : 86400,
"IpsecEncAlg" : "aes",
"IpsecPfs" : "group2"
},
"VcoHealthCheck" : {
"Dip" : "192.168.1.1",
"Interval" : 3,
"Retry" : 3,
"Sip" : "10.1.1.1",
"Enable" : "true"
},
"VpnBgpConfig" : {
"Status" : "success",
"PeerBgpIp" : "169.254.11.2",
"TunnelCidr" : "169.254.11.0/30",
"EnableBgp" : "true",
"LocalBgpIp" : "169.254.11.1",
"PeerAsn" : 65531,
"LocalAsn" : 65530
}
}
Error codes
HttpCode |
Error code |
Error message |
Description |
400 | VpnGateway.Configuring | The specified service is configuring. | The operation is not allowed when the specified service is being configured. Try again later. |
400 | VpnGateway.FinancialLocked | The specified service is financial locked. | The service is suspended due to overdue payments. Top up your account first. |
400 | InvalidName | The name is not valid | The format of the name is invalid. |
400 | VpnRouteEntry.AlreadyExists | The specified route entry is already exist. | The route already exists. |
400 | VpnRouteEntry.Conflict | The specified route entry has conflict. | The specified route conflicts with an existing route. |
400 | NotSupportVpnConnectionParameter.IpsecPfs | The specified vpn connection ipsec Ipsec Pfs is not support. | The PFS parameter set for the IPsec-VPN connection is not supported. |
400 | NotSupportVpnConnectionParameter.IpsecAuthAlg | The specified vpn connection ipsec Auth Alg is not support. | The specified authentication algorithm in the IPsec connection is not supported. |
400 | VpnRouteEntry.ConflictSSL | The specified route entry has conflict with SSL client. | The route conflicts with the SSL client. |
400 | VpnRouteEntry.BackupRoute | Validate backup route entry failed. | Active/standby routes failed authentication. |
400 | VpnRouteEntry.InvalidWeight | Invalid route entry weight value. | The specified weight of the route is invalid. |
400 | QuotaExceeded.PBR | The policy-based routes has reached the upper limit. | The number of policy-based routes has reached the upper limit. |
400 | OperationUnsupported.SetDPD | Current version of the VPN does not support setting DPD. | The current version of the VPN gateway does not support DPD. |
400 | OperationUnsupported.SetNatTraversal | Current version of the VPN does not support setting NAT traversal. | The current version of the VPN gateway does not support NAT traversal. |
400 | QuotaExceeded.PolicyBasedRoute | The maximum number of policy-based routes is exceeded. Existing routes: %s. Routes to be created: %s. Maximum routes: %s. | The number of policy-based routes reaches the upper limit. The maximum number of routes that you can create is %s. The number of existing routes is %s. You are creating %s routes. |
400 | MissingParameter.TunnelCidr | The parameter TunnelCidr is mandatory when BGP is enabled. | You must specify the tunnel CIDR block when you enable BGP. |
400 | OperationUnsupported.EnableBgp | Current version of the VPN does not support enable BGP. | The current version of the VPN gateway does not support BGP. |
400 | MissingParam.CustomerGatewayAsn | Asn of customer gateway is mandatory when BGP is enabled. | The ASN of the customer gateway cannot be empty when you enable BGP. |
400 | IllegalParam.LocalAsn | The specified LocalAsn is invalid. | The local ASN is invalid. |
400 | IllegalParam.BgpConfig | The specified BgpConfig is invalid. | The BGP configuration is invalid. |
400 | IllegalParam.EnableBgp | VPN connection must enable BGP when VPN gateway has enabled BGP. | The IPsec-VPN connection must use BGP if BGP is enabled for the VPN gateway. |
400 | IllegalParam.TunnelCidr | The specified TunnelCidr is invalid. | TunnelCidr is set to an invalid value. |
400 | InvalidLocalBgpIp.Malformed | The specified LocalBgpIp is malformed. | The local BGP IP address is in an abnormal state. |
400 | IllegalParam.LocalBgpIp | The specified LocalBgpIp is invalid. | The local BGP IP address is invalid. |
400 | IllegalParam.LocalSubnet | The specified "LocalSubnet" (%s) is invalid. | LocalSubnet (%s) is set to an invalid value. |
400 | IllegalParam.RemoteSubnet | The specified "RemoteSubnet" (%s) is invalid. | RemoteSubnet is set to an invalid value. |
400 | OperationFailed.CenLevelNotSupport | When the VPC to which the VPN gateway belongs is attached to a FULL-mode CEN, the VPN gateway cannot enable BGP. | You cannot enable BGP for the VPN gateway when the FULL mode is enabled for the Cloud Enterprise Network (CEN) instance to which the VPC of the VPN gateway is attached. |
400 | InvalidTunnelCidr.Malformed | The specified TunnelCidr is malformed. | The specified tunnel CIDR block is invalid. |
400 | CustomerGateway.ConflictRouteEntry | The specified customer gateway has conflict with route entry. | The customer gateway conflicts with the current routes. |
400 | VpnTask.CONFLICT | Vpn task has conflict. | The VPN operation is conflicting. Try again later. |
403 | Forbbiden.SubUser | User not authorized to operate on the specified resource as your account is created by another user. | You are unauthorized to perform this operation on the specified resource. You can apply for the required permissions and try again. |
403 | Forbidden | User not authorized to operate on the specified resource. | You are unauthorized to perform this operation on the specified resource. You can apply for the required permissions and try again. |
404 | InvalidVpnConnectionInstanceId.NotFound | The specified vpn connection instance id does not exist. | The specified IPsec connection does not exist. Check whether the ID of the IPsec connection is valid. |
500 | OperationFailed.RouteConflictWithIPsecServer | Operation failed because the specified route conflicts with IPsec server. | The route conflicts with the IPsec server. |
For a list of error codes, see Service error codes.