Skip to content
Merged
Show file tree
Hide file tree
Changes from 8 commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
109 changes: 88 additions & 21 deletions src/Network/Network.Test/ScenarioTests/CortexTests.ps1
Original file line number Diff line number Diff line change
Expand Up @@ -711,12 +711,24 @@ function Test-CortexExpressRouteCRUD
Assert-AreEqual $virtualHubName $virtualHub.Name
Assert-AreEqual $virtualWan.Id $virtualhub.VirtualWan.Id

# Create the VpnServerConfiguration1 with VpnClient settings using New-AzVpnServerConfiguration
# Create a PolicyGroup1 Object
$policyGroup1 = New-Object -TypeName Microsoft.Azure.Commands.Network.Models.PSVpnServerConfigurationPolicyGroup
$policyGroup1.Name = "PolicyGroup1"
$policyGroup1.IsDefault = $False
$policyGroup1.Priority = 0
$policyGroupMember1 = New-Object -TypeName Microsoft.Azure.Commands.Network.Models.PSVpnServerConfigurationPolicyGroupMember
$policyGroupMember1.Name = "policyGroupMember1"
$policyGroupMember1.AttributeType = "AADGroupId"
$policyGroupMember1.AttributeValue = "41b23e61-6c1e-4545-b367-cd054e0ed4b5"
$policyGroup1.PolicyMembers = New-Object Microsoft.Azure.Commands.Network.Models.PSVpnServerConfigurationPolicyGroupMember[] 1
$policyGroup1.PolicyMembers[0] = $policyGroupMember1

# Create the VpnServerConfiguration1 with VpnClient settings (and child PolicyGroup1) using New-AzVpnServerConfiguration
$VpnServerConfigCertFilePath = Join-Path -Path $basedir -ChildPath "\ScenarioTests\Data\ApplicationGatewayAuthCert.cer"
$listOfCerts = New-Object "System.Collections.Generic.List[String]"
$listOfCerts.Add($VpnServerConfigCertFilePath)
$vpnclientipsecpolicy1 = New-AzVpnClientIpsecPolicy -IpsecEncryption AES256 -IpsecIntegrity SHA256 -SALifeTime 86471 -SADataSize 429496 -IkeEncryption AES256 -IkeIntegrity SHA384 -DhGroup DHGroup14 -PfsGroup PFS14
New-AzVpnServerConfiguration -Name $VpnServerConfiguration1Name -ResourceGroupName $rgName -VpnProtocol IkeV2 -VpnAuthenticationType Certificate -VpnClientRootCertificateFilesList $listOfCerts -VpnClientRevokedCertificateFilesList $listOfCerts -VpnClientIpsecPolicy $vpnclientipsecpolicy1 -Location $rglocation
New-AzVpnServerConfiguration -Name $VpnServerConfiguration1Name -ResourceGroupName $rgName -VpnProtocol IkeV2 -VpnAuthenticationType Certificate -VpnClientRootCertificateFilesList $listOfCerts -VpnClientRevokedCertificateFilesList $listOfCerts -VpnClientIpsecPolicy $vpnclientipsecpolicy1 -ConfigurationPolicyGroups $policyGroup1 -Location $rglocation

# Get created VpnServerConfiguration using Get-AzVpnServerConfiguration
$vpnServerConfig1 = Get-AzVpnServerConfiguration -ResourceGroupName $rgName -Name $VpnServerConfiguration1Name
Expand All @@ -729,6 +741,8 @@ function Test-CortexExpressRouteCRUD
$authenticationTypes = $vpnServerConfig1.VpnAuthenticationTypes
Assert-AreEqual 1 @($authenticationTypes).Count
Assert-AreEqual "Certificate" $authenticationTypes[0]
Assert-AreEqual 1 @($vpnServerConfig1.ConfigurationPolicyGroups).Count
Assert-AreEqual "PolicyGroup1" $vpnServerConfig1.ConfigurationPolicyGroups[0].Name

# Create the P2SVpnGateway using New-AzP2sVpnGateway
$vpnClientAddressSpaces = New-Object string[] 2
Expand All @@ -746,17 +760,17 @@ function Test-CortexExpressRouteCRUD
Assert-AreEqual $vpnServerConfig1.Id $P2SVpnGateway.VpnServerConfiguration.Id
Assert-AreEqual "Succeeded" $P2SVpnGateway.ProvisioningState
Assert-AreEqual 1 @($P2SVpnGateway.CustomDnsServers).Count
Assert-AreEqual "7.7.7.7" $P2SVpnGateway.CustomDnsServers[0]
Assert-AreEqual "7.7.7.7" $P2SVpnGateway.CustomDnsServers[0]
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
Assert-AreEqual "7.7.7.7" $P2SVpnGateway.CustomDnsServers[0]
Assert-AreEqual "7.7.7.7" $P2SVpnGateway.CustomDnsServers[0]

Assert-AreEqual $True $P2SVpnGateway.P2SConnectionConfigurations[0].EnableInternetSecurity
Assert-AreEqual $True $P2SVpnGateway.IsRoutingPreferenceInternet

$getPolicyGroup1 = Get-AzVpnServerConfigurationPolicyGroup -ResourceGroupName $rgName -ServerConfigurationName $VpnServerConfiguration1Name -Name "PolicyGroup1"
Assert-AreEqual $getPolicyGroup1.Id $vpnServerConfig1.ConfigurationPolicyGroups[0].Id

# Reset/Reboot the P2SVpnGateway using Reset-AzP2sVpnGateway
$job = Reset-AzP2sVpnGateway -P2SVpnGateway $P2SVpnGateway -AsJob
$job | Wait-Job
$actual = $job | Receive-Job

$P2SVpnGateway = Get-AzP2sVpnGateway -ResourceGroupName $rgName -Name $P2SvpnGatewayName
Assert-AreEqual "Succeeded" $P2SVpnGateway.ProvisioningState
$job = Reset-AzP2sVpnGateway -P2SVpnGateway $P2SVpnGateway -AsJob
$job | Wait-Job
$actual = $job | Receive-Job
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Please correct indents.


# Get all associated VpnServerConfigurations at Wan level using Get-AzVirtualWanVpnServerConfiguration
$associatedVpnServerConfigs = Get-AzVirtualWanVpnServerConfiguration -Name $virtualWanName -ResourceGroupName $rgName
Expand Down Expand Up @@ -789,14 +803,14 @@ function Test-CortexExpressRouteCRUD
$Secure_String_Pwd = ConvertTo-SecureString "TestRadiusServerPassword" -AsPlainText -Force
New-AzVpnServerConfiguration -Name $VpnServerConfiguration2Name -ResourceGroupName $rgName -VpnProtocol IkeV2 -VpnAuthenticationType Radius -RadiusServerAddress "TestRadiusServer" -RadiusServerSecret $Secure_String_Pwd -RadiusServerRootCertificateFilesList $listOfCerts -RadiusClientRootCertificateFilesList $listOfCerts -Location $rglocation

$vpnServerConfig2 = Get-AzVpnServerConfiguration -ResourceGroupName $rgName -Name $VpnServerConfiguration2Name
$vpnServerConfig2 = Get-AzVpnServerConfiguration -ResourceGroupName $rgName -Name $VpnServerConfiguration2Name
Assert-AreEqual "Succeeded" $vpnServerConfig2.ProvisioningState
Assert-AreEqual "TestRadiusServer" $vpnServerConfig2.RadiusServerAddress

# Create the VpnServerConfigurationMultiAuth with Radius and Certificate settings using New-AzVpnServerConfiguration
New-AzVpnServerConfiguration -Name $VpnServerConfigurationMultiAuthName -ResourceGroupName $rgName -VpnProtocol OpenVpn -VpnAuthenticationType Radius,Certificate -RadiusServerAddress "TestRadiusServer" -RadiusServerSecret $Secure_String_Pwd -RadiusServerRootCertificateFilesList $listOfCerts -RadiusClientRootCertificateFilesList $listOfCerts -VpnClientRootCertificateFilesList $listOfCerts -Location $rglocation

$vpnServerConfigMultiAuth = Get-AzVpnServerConfiguration -ResourceGroupName $rgName -Name $VpnServerConfigurationMultiAuthName
$vpnServerConfigMultiAuth = Get-AzVpnServerConfiguration -ResourceGroupName $rgName -Name $VpnServerConfigurationMultiAuthName
Assert-AreEqual "Succeeded" $vpnServerConfigMultiAuth.ProvisioningState
Assert-AreEqual "TestRadiusServer" $vpnServerConfigMultiAuth.RadiusServerAddress
$authenticationTypes = $vpnServerConfigMultiAuth.VpnAuthenticationTypes
Expand All @@ -807,19 +821,56 @@ function Test-CortexExpressRouteCRUD
Assert-NotNull $vpnServerConfigs
Assert-AreEqual 3 @($vpnServerConfigs).Count

# Update existing VpnServerConfiguration2 using Update-AzVpnServerConfiguration
Update-AzVpnServerConfiguration -Name $VpnServerConfiguration2Name -ResourceGroupName $rgName -RadiusServerAddress "TestRadiusServer1"
# Create a PolicyGroup2 Object
$policyGroup2= New-Object -TypeName Microsoft.Azure.Commands.Network.Models.PSVpnServerConfigurationPolicyGroup
$policyGroup2.Name = "PolicyGroup2"
$policyGroup2.IsDefault = $true
$policyGroup2.Priority = 0
$policyGroupMember2 = New-Object -TypeName Microsoft.Azure.Commands.Network.Models.PSVpnServerConfigurationPolicyGroupMember
$policyGroupMember2.Name = "policyGroupMember2"
$policyGroupMember2.AttributeType = "AADGroupId"
$policyGroupMember2.AttributeValue = "41b23e61-6c1e-4545-b367-cd054e0ed4b5"
$policyGroup2.PolicyMembers = New-Object Microsoft.Azure.Commands.Network.Models.PSVpnServerConfigurationPolicyGroupMember[] 1
$policyGroup2.PolicyMembers[0] = $policyGroupMember2

# Update existing VpnServerConfiguration2(adding child PolicyGroup2) using Update-AzVpnServerConfiguration
Update-AzVpnServerConfiguration -Name $VpnServerConfiguration2Name -ResourceGroupName $rgName -RadiusServerAddress "TestRadiusServer1" -ConfigurationPolicyGroups $policyGroup2
$VpnServerConfig2 = Get-AzVpnServerConfiguration -Name $VpnServerConfiguration2Name -ResourceGroupName $rgName
Assert-AreEqual $VpnServerConfiguration2Name $VpnServerConfig2.Name
Assert-AreEqual "TestRadiusServer1" $VpnServerConfig2.RadiusServerAddress

Assert-AreEqual 1 @($VpnServerConfig2.ConfigurationPolicyGroups).Count
Assert-AreEqual "PolicyGroup2" $VpnServerConfig2.ConfigurationPolicyGroups[0].Name
Assert-AreEqual 0 $VpnServerConfig2.ConfigurationPolicyGroups[0].Priority

# Delete VpnServerConfiguration2 child PolicyGroup2 using Remove-AzVpnServerConfigurationPolicyGroup
$delete = Remove-AzVpnServerConfigurationPolicyGroup -ResourceGroupName $rgName -ServerConfigurationName $VpnServerConfiguration2Name -Name "PolicyGroup2" -Force -PassThru
Assert-AreEqual $True $delete
$VpnServerConfig2 = Get-AzVpnServerConfiguration -ResourceGroupName $rgName -Name $VpnServerConfiguration2Name
Assert-AreEqual 0 @($VpnServerConfig2.ConfigurationPolicyGroups).Count

# Create PolicyGroup2 for VpnServerConfiguration2 using New-AzVpnServerConfigurationPolicyGroup
New-AzVpnServerConfigurationPolicyGroup -ResourceGroupName $rgName -ServerConfigurationName $VpnServerConfiguration2Name -Name "PolicyGroup2" -DefaultPolicyGroup -PolicyMember $policyGroupMember2
$getPolicyGroup2 = Get-AzVpnServerConfigurationPolicyGroup -ResourceGroupName $rgName -ServerConfigurationName $VpnServerConfiguration2Name -Name "PolicyGroup2"
Assert-AreEqual "PolicyGroup2" $getPolicyGroup2.Name
Assert-AreEqual $true $getPolicyGroup2.IsDefault
Assert-AreEqual 1 @($getPolicyGroup2.PolicyMembers).Count

$VpnServerConfig2 = Get-AzVpnServerConfiguration -ResourceGroupName $rgName -Name $VpnServerConfiguration2Name
Assert-AreEqual 1 @($VpnServerConfig2.ConfigurationPolicyGroups).Count

# Update PolicyGroup2 for VpnServerConfiguration2 using Update-AzVpnServerConfigurationPolicyGroup
Update-AzVpnServerConfigurationPolicyGroup -ResourceGroupName $rgName -ServerConfigurationName $VpnServerConfiguration2Name -Name "PolicyGroup2" -Priority 1
$getPolicyGroup2 = Get-AzVpnServerConfigurationPolicyGroup -ResourceGroupName $rgName -ServerConfigurationName $VpnServerConfiguration2Name -Name "PolicyGroup2"
Assert-AreEqual $true $getPolicyGroup2.IsDefault
Assert-AreEqual 1 $getPolicyGroup2.Priority

Update-AzVpnServerConfiguration -ResourceId $VpnServerConfig2.Id -RadiusServerAddress "TestRadiusServer2"
$VpnServerConfig2Get = Get-AzVpnServerConfiguration -ResourceGroupName $rgName -Name $VpnServerConfiguration2Name
Assert-AreEqual "TestRadiusServer2" $VpnServerConfig2Get.RadiusServerAddress

Update-AzVpnServerConfiguration -InputObject $VpnServerConfig2Get -RadiusServerAddress "TestRadiusServer3"
$VpnServerConfig2Get = Get-AzVpnServerConfiguration -ResourceGroupName $rgName -Name $VpnServerConfiguration2Name
Assert-AreEqual "TestRadiusServer3" $VpnServerConfig2Get.RadiusServerAddress
Assert-AreEqual "TestRadiusServer3" $VpnServerConfig2Get.RadiusServerAddress

# Update existing VpnServerConfigurationMultiAuth using Update-AzVpnServerConfiguration
Update-AzVpnServerConfiguration -Name $VpnServerConfigurationMultiAuthName -ResourceGroupName $rgName -VpnAuthenticationType Radius
Expand All @@ -841,29 +892,41 @@ function Test-CortexExpressRouteCRUD
$vpnClientAddressSpaces[1] = "192.168.4.0/24"
$updatedP2SVpnGateway = Update-AzP2sVpnGateway -ResourceGroupName $rgName -Name $P2SvpnGatewayName -VpnClientAddressPool $vpnClientAddressSpaces -CustomDnsServer 9.9.9.9 -DisableInternetSecurityFlag

$P2SVpnGateway = Get-AzP2sVpnGateway -ResourceGroupName $rgName -Name $P2SvpnGatewayName
$P2SVpnGateway = Get-AzP2sVpnGateway -ResourceGroupName $rgName -Name $P2SvpnGatewayName
Assert-AreEqual $P2SvpnGatewayName $P2SVpnGateway.Name
Assert-AreEqual "Succeeded" $P2SVpnGateway.ProvisioningState
Assert-AreEqual $vpnServerConfig1.Id $P2SVpnGateway.VpnServerConfiguration.Id
$setVpnClientAddressSpacesString = [system.String]::Join(" ", $vpnClientAddressSpaces)
Assert-AreEqual $setVpnClientAddressSpacesString $P2SVpnGateway.P2SConnectionConfigurations[0].VpnClientAddressPool.AddressPrefixes
Assert-AreEqual $setVpnClientAddressSpacesString $P2SVpnGateway.P2SConnectionConfigurations[0].VpnClientAddressPool.AddressPrefixes
Assert-AreEqual 1 @($P2SVpnGateway.CustomDnsServers).Count
Assert-AreEqual "9.9.9.9" $P2SVpnGateway.CustomDnsServers[0]
Assert-AreEqual "9.9.9.9" $P2SVpnGateway.CustomDnsServers[0]
Assert-AreEqual $false $P2SVpnGateway.P2SConnectionConfigurations[0].EnableInternetSecurity

# Update existing P2SVpnGateway to remove the CustomDnsServers & EnableInternetSecurityFlag
# Update existing P2SVpnGateway to remove the CustomDnsServers & EnableInternetSecurityFlag & adding new P2SConnectionConfiguration
$P2SVpnGateway = Get-AzP2sVpnGateway -ResourceGroupName $rgName -Name $P2SvpnGatewayName
Update-AzP2sVpnGateway -ResourceGroupName $rgName -Name $P2SvpnGatewayName -CustomDnsServer @() -EnableInternetSecurityFlag
$p2SConnectionConfigs = New-Object Microsoft.Azure.Commands.Network.Models.PSP2SConnectionConfiguration[] 2
$p2SConnectionConfigs[0] = $P2SVpnGateway.P2SConnectionConfigurations[0]
$p2SConnectionConfigs[1] = New-Object -TypeName Microsoft.Azure.Commands.Network.Models.PSP2SConnectionConfiguration
$p2SConnectionConfigs[1].Name = "P2SConnectionConfigNew"
$p2SConnectionConfigs[1].VpnClientAddressPool = New-Object -TypeName Microsoft.Azure.Commands.Network.Models.PSAddressSpace
$p2SConnectionConfigs[1].VpnClientAddressPool.AddressPrefixes = New-Object string[] 1
$p2SConnectionConfigs[1].VpnClientAddressPool.AddressPrefixes[0] = "192.168.5.0/24"
Update-AzP2sVpnGateway -ResourceGroupName $rgName -Name $P2SvpnGatewayName -CustomDnsServer @() -EnableInternetSecurityFlag -P2SConnectionConfiguration $p2SConnectionConfigs

$P2SVpnGateway = Get-AzP2sVpnGateway -ResourceGroupName $rgName -Name $P2SvpnGatewayName
Assert-AreEqual 0 @($P2SVpnGateway.CustomDnsServers).Count
Assert-AreEqual 2 @($P2SVpnGateway.P2SConnectionConfigurations).Count
Assert-AreEqual "P2SConnectionConfigDefault" $P2SVpnGateway.P2SConnectionConfigurations[0].Name
Assert-AreEqual $true $P2SVpnGateway.P2SConnectionConfigurations[0].EnableInternetSecurity
Assert-AreEqual "P2SConnectionConfigNew" $P2SVpnGateway.P2SConnectionConfigurations[1].Name
Assert-AreEqual $true $P2SVpnGateway.P2SConnectionConfigurations[1].EnableInternetSecurity

$associatedVpnServerConfigs = Get-AzVirtualWanVpnServerConfiguration -ResourceId $virtualWan.Id
Assert-NotNull $associatedVpnServerConfigs
Assert-AreEqual 1 @($associatedVpnServerConfigs.VpnServerConfigurationResourceIds).Count
Assert-AreEqual $vpnServerConfig1.Id $associatedVpnServerConfigs.VpnServerConfigurationResourceIds[0]

# Delete VpnServerConfiguration2 using Remove-AzVpnServerConfiguration
# Delete VpnServerConfiguration2 using Remove-AzVpnServerConfiguration
$delete = Remove-AzVpnServerConfiguration -InputObject $VpnServerConfig2Get -Force -PassThru
Assert-AreEqual $True $delete

Expand Down Expand Up @@ -911,6 +974,10 @@ function Test-CortexExpressRouteCRUD
Assert-NotNull $associatedVpnServerConfigs
Assert-AreEqual 0 @($associatedVpnServerConfigs.VpnServerConfigurationResourceIds).Count

# Verify that Get PolicyGroup1 works even after attached P2SVpnGateway was deleted.
$getPolicyGroup1 = Get-AzVpnServerConfigurationPolicyGroup -ResourceGroupName $rgName -ServerConfigurationName $VpnServerConfiguration1Name -Name "PolicyGroup1"
Assert-NotNull $getPolicyGroup1

# Delete VpnServerConfiguration1 using Remove-AzVpnServerConfiguration
$delete = Remove-AzVpnServerConfiguration -ResourceGroupName $rgName -Name $VpnServerConfiguration1Name -Force -PassThru
Assert-AreEqual $True $delete
Expand Down
10 changes: 6 additions & 4 deletions src/Network/Network/Az.Network.psd1
Original file line number Diff line number Diff line change
Expand Up @@ -436,10 +436,12 @@ CmdletsToExport = 'Add-AzApplicationGatewayAuthenticationCertificate',
'Get-AzVpnConnection', 'Update-AzVpnConnection',
'Remove-AzVpnConnection', 'New-AzVirtualHubVnetConnection',
'Get-AzVirtualHubVnetConnection',
'Remove-AzVirtualHubVnetConnection',
'Update-AzVirtualHubVnetConnection', 'Get-AzVpnServerConfiguration',
'New-AzVpnServerConfiguration', 'Remove-AzVpnServerConfiguration',
'Update-AzVpnServerConfiguration', 'Get-AzP2sVpnGateway',
'Remove-AzVirtualHubVnetConnection', 'Update-AzVirtualHubVnetConnection',
'Get-AzVpnServerConfiguration', 'New-AzVpnServerConfiguration',
'Remove-AzVpnServerConfiguration', 'Update-AzVpnServerConfiguration',
'Get-AzVpnServerConfigurationPolicyGroup',
'New-AzVpnServerConfigurationPolicyGroup', 'Remove-AzVpnServerConfigurationPolicyGroup',
'Update-AzVpnServerConfigurationPolicyGroup', 'Get-AzP2sVpnGateway',
'Disconnect-AzP2sVpnGatewayVpnConnection',
'Get-AzP2sVpnGatewayConnectionHealth',
'Get-AzP2sVpnGatewayDetailedConnectionHealth',
Expand Down
11 changes: 11 additions & 0 deletions src/Network/Network/ChangeLog.md
Original file line number Diff line number Diff line change
Expand Up @@ -19,6 +19,17 @@
--->

## Upcoming Release
* Multipool feature change: Updated cmdlets to add new optional property: `ConfigurationPolicyGroups` object for associating policy groups.
- `Update-AzVpnServerConfiguration`
- `New-AzVpnServerConfiguration`
* Multipool feature change: Updated cmdlets to add new optional property:`P2SConnectionConfiguration` object for specifying multiple Connection configurations.
- `Update-AzP2sVpnGateway`
- `New-AzP2sVpnGateway`
* Multipool feature change: Added new cmdlets to suppport CRUD of Configuration policy groups for VpnServerConfiguration.
- `Get-AzVpnServerConfigurationPolicyGroup`
- `New-AzVpnServerConfigurationPolicyGroup`
- `Update-AzVpnServerConfigurationPolicyGroup`
- `Remove-AzVpnServerConfigurationPolicyGroup`

## Version 4.14.0
* Used case-insensitive comparison for ResourceId (Set/New-NetworkWatcherFlowLog)
Expand Down
4 changes: 4 additions & 0 deletions src/Network/Network/Common/NetworkResourceManagerProfile.cs
Original file line number Diff line number Diff line change
Expand Up @@ -1217,6 +1217,8 @@ private static void Initialize()
// MNM to CNM
cfg.CreateMap<MNM.P2SVpnGateway, CNM.PSP2SVpnGateway>();
cfg.CreateMap<MNM.P2SConnectionConfiguration, CNM.PSP2SConnectionConfiguration>();
cfg.CreateMap<MNM.VpnServerConfigurationPolicyGroup, CNM.PSVpnServerConfigurationPolicyGroup>();
cfg.CreateMap<MNM.VpnServerConfigurationPolicyGroupMember, CNM.PSVpnServerConfigurationPolicyGroupMember>();
cfg.CreateMap<MNM.VpnClientConnectionHealth, CNM.PSVpnClientConnectionHealth>();
cfg.CreateMap<MNM.P2SVpnConnectionHealth, CNM.PSP2SVpnConnectionHealth>();
cfg.CreateMap<MNM.VpnProfileResponse, CNM.PSVpnProfileResponse>();
Expand All @@ -1233,6 +1235,8 @@ private static void Initialize()
// CNM to MNM
cfg.CreateMap<CNM.PSP2SVpnGateway, MNM.P2SVpnGateway>();
cfg.CreateMap<CNM.PSP2SConnectionConfiguration, MNM.P2SConnectionConfiguration>();
cfg.CreateMap<CNM.PSVpnServerConfigurationPolicyGroup, MNM.VpnServerConfigurationPolicyGroup>();
cfg.CreateMap<CNM.PSVpnServerConfigurationPolicyGroupMember, MNM.VpnServerConfigurationPolicyGroupMember>();
cfg.CreateMap<CNM.PSVpnClientConnectionHealth, MNM.VpnClientConnectionHealth>();
cfg.CreateMap<CNM.PSP2SVpnConnectionHealth, MNM.P2SVpnConnectionHealth>();
cfg.CreateMap<CNM.PSVpnProfileResponse, MNM.VpnProfileResponse>();
Expand Down
Loading