Forum Discussion
Hi Deckel,
Form the error message, it seems to indicate that the tunnel ID is not valid.
Just to check, you have referenced the API Configuration (Mutation) details: https://api.catonetworks.com/documentation/#mutation-sites.updateIpsecIkeV2SiteGeneralDetails , right? ___
Would you like to review the tunnelId details? ___
Here is a reference: https://api.catonetworks.com/documentation/#mutation-sites.updateIpsecIkeV2SiteTunnels
Cheers
- Deckel1 month ago
Joining the Conversation
Hi,
not sure I follow.
I am not using the API direct.
The Cato Terraform provider is being used.
cato_ipsec_site | Resources | catonetworks/cato | Terraform | Terraform Registry
"tunnel_id" is listed there as a read-only item.
In my understanding, the tunnel_id will be provided after deployment.
This is the output of what will be changes by terraform:
# cato_ipsec_site.Vienna will be updated in-place ~ resource "cato_ipsec_site" "Vienna" { id = "170369" ~ ipsec = { ~ primary = { + tunnels = [ + { + psk = "abcABC1234567!!" + tunnel_id = (known after apply) }, ] # (1 unchanged attribute hidden) } # (6 unchanged attributes hidden)It seems to me that the terraform provider isn´t supporting ipsec tunnels with destination type FQDN.
I can nowhere find an example for that type of setup.
All I can find is with destination_type set to IPv4. Which then requires selecting a POP.
Thanks,
Christian