From 0643ae70f59b28cb0661454981c0620da2bb93a5 Mon Sep 17 00:00:00 2001 From: tickerguy Date: Wed, 19 Oct 2022 12:39:32 -0400 Subject: [PATCH 01/63] Update BridgeUnix.c On FreeBSD the stock code will attempt to expand the interface MTU any time a packet is to be sent that exceeds the current MTU. This results in a down/up on the interface that is wildly disruptive to existing services on that adapter and, eventually, is likely to run into MTU limits and start logging failures, even with jumbo-frame capable adapters. Thus if compiling on a FreeBSD machine disable this capability. Tested against 12.3-STABLE and 13.1-STABLE on v4.38-9760 from the FreeBSD ports tree but likely applies here as well; see bug report https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=267178 --- src/Cedar/BridgeUnix.c | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/src/Cedar/BridgeUnix.c b/src/Cedar/BridgeUnix.c index d5890cba..ce2b1ffc 100644 --- a/src/Cedar/BridgeUnix.c +++ b/src/Cedar/BridgeUnix.c @@ -805,7 +805,12 @@ bool EthIsChangeMtuSupported(ETH *e) return false; } +// FreeBSD seriously dislikes MTU changes; disable if compiled on that platform +#ifndef __FreeBSD__ return true; +#else + return false; +#endif #else // defined(UNIX_LINUX) || defined(UNIX_BSD) || defined(UNIX_SOLARIS) return false; #endif // defined(UNIX_LINUX) || defined(UNIX_BSD) || defined(UNIX_SOLARIS) From 36505e3896d9ac1beef0e591017d742463a61ad6 Mon Sep 17 00:00:00 2001 From: Roel van de Wiel Date: Wed, 10 May 2023 15:09:57 +0200 Subject: [PATCH 02/63] Changed 'settng' to 'setting' and regenerated the RPC docs --- .../vpnserver-jsonrpc-clients/README.html | 198 ++++++++-------- .../vpnserver-jsonrpc-clients/README.md | 214 +++++++++--------- .../rpc-stubs/JsonRpc.cs | 4 +- .../rpc-stubs/VPNServerRpc.cs | 12 +- .../rpc-stubs/VPNServerRpcTypes.cs | 4 +- .../sample/Main.cs | 4 +- .../sample/VpnServerRpcTest.cs | 28 +-- .../dist/sample.js | 24 +- .../dist/vpnrpc.d.ts | 4 +- .../dist/vpnrpc.js | 8 +- .../src/sample.ts | 28 +-- .../src/vpnrpc.ts | 12 +- .../sample.ts | 28 +-- .../vpnrpc.ts | 12 +- .../VpnServerRpc/VPNServerRpc.cs | 8 +- .../VpnServerRpcTest/VpnServerRpcTest.cs | 24 +- src/Cedar/Admin.c | 8 +- src/bin/hamcore/vpnserver_api_doc.html | 196 ++++++++-------- .../admin/default/out_webpack/bundle.js | 2 +- 19 files changed, 409 insertions(+), 409 deletions(-) diff --git a/developer_tools/vpnserver-jsonrpc-clients/README.html b/developer_tools/vpnserver-jsonrpc-clients/README.html index 637f0c6b..2d41f959 100644 --- a/developer_tools/vpnserver-jsonrpc-clients/README.html +++ b/developer_tools/vpnserver-jsonrpc-clients/README.html @@ -216,8 +216,8 @@ All APIs are based on the JSON-R
  • GetSpecialListener - Get Current Setting of the VPN over ICMP / VPN over DNS Function
  • GetAzureStatus - Show the current status of VPN Azure function
  • SetAzureStatus - Enable / Disable VPN Azure Function
  • -
  • GetDDnsInternetSettng - Get the Proxy Settings for Connecting to the DDNS server
  • -
  • SetDDnsInternetSettng - Set the Proxy Settings for Connecting to the DDNS server
  • +
  • GetDDnsInternetSetting - Get the Proxy Settings for Connecting to the DDNS server
  • +
  • SetDDnsInternetSetting - Set the Proxy Settings for Connecting to the DDNS server
  • SetVgsConfig - Set the VPN Gate Server Configuration
  • GetVgsConfig - Get the VPN Gate Server Configuration
  • @@ -305,7 +305,7 @@ All APIs are based on the JSON-R "ServerBuildInt_u32": 0, "ServerHostName_str": "serverhostname", "ServerType_u32": 0, - "ServerBuildDate_dt": "2020-08-01T12:24:36.123", + "ServerBuildDate_dt": "2024-08-01T12:24:36.123", "ServerFamilyName_str": "serverfamilyname", "OsType_u32": 0, "OsServicePack_u32": 0, @@ -460,9 +460,9 @@ All APIs are based on the JSON-R "Send.BroadcastCount_u64": 0, "Send.UnicastBytes_u64": 0, "Send.UnicastCount_u64": 0, - "CurrentTime_dt": "2020-08-01T12:24:36.123", + "CurrentTime_dt": "2024-08-01T12:24:36.123", "CurrentTick_u64": 0, - "StartTime_dt": "2020-08-01T12:24:36.123", + "StartTime_dt": "2024-08-01T12:24:36.123", "TotalMemory_u64": 0, "UsedMemory_u64": 0, "FreeMemory_u64": 0, @@ -1136,7 +1136,7 @@ All APIs are based on the JSON-R "result": { "Id_u32": 0, "Controller_bool": false, - "ConnectedTime_dt": "2020-08-01T12:24:36.123", + "ConnectedTime_dt": "2024-08-01T12:24:36.123", "Ip_ip": "192.168.0.1", "Hostname_str": "hostname", "Point_u32": 0, @@ -1283,7 +1283,7 @@ All APIs are based on the JSON-R { "Id_u32": 0, "Controller_bool": false, - "ConnectedTime_dt": "2020-08-01T12:24:36.123", + "ConnectedTime_dt": "2024-08-01T12:24:36.123", "Ip_ip": "192.168.0.1", "Hostname_str": "hostname", "Point_u32": 0, @@ -1296,7 +1296,7 @@ All APIs are based on the JSON-R { "Id_u32": 0, "Controller_bool": false, - "ConnectedTime_dt": "2020-08-01T12:24:36.123", + "ConnectedTime_dt": "2024-08-01T12:24:36.123", "Ip_ip": "192.168.0.1", "Hostname_str": "hostname", "Point_u32": 0, @@ -1309,7 +1309,7 @@ All APIs are based on the JSON-R { "Id_u32": 0, "Controller_bool": false, - "ConnectedTime_dt": "2020-08-01T12:24:36.123", + "ConnectedTime_dt": "2024-08-01T12:24:36.123", "Ip_ip": "192.168.0.1", "Hostname_str": "hostname", "Point_u32": 0, @@ -1422,9 +1422,9 @@ All APIs are based on the JSON-R "Port_u32": 0, "Online_bool": false, "LastError_u32": 0, - "StartedTime_dt": "2020-08-01T12:24:36.123", - "FirstConnectedTime_dt": "2020-08-01T12:24:36.123", - "CurrentConnectedTime_dt": "2020-08-01T12:24:36.123", + "StartedTime_dt": "2024-08-01T12:24:36.123", + "FirstConnectedTime_dt": "2024-08-01T12:24:36.123", + "CurrentConnectedTime_dt": "2024-08-01T12:24:36.123", "NumTry_u32": 0, "NumConnected_u32": 0, "NumFailed_u32": 0 @@ -1918,9 +1918,9 @@ All APIs are based on the JSON-R "NumSessions_u32": 0, "NumMacTables_u32": 0, "NumIpTables_u32": 0, - "LastCommTime_dt": "2020-08-01T12:24:36.123", - "LastLoginTime_dt": "2020-08-01T12:24:36.123", - "CreatedTime_dt": "2020-08-01T12:24:36.123", + "LastCommTime_dt": "2024-08-01T12:24:36.123", + "LastLoginTime_dt": "2024-08-01T12:24:36.123", + "CreatedTime_dt": "2024-08-01T12:24:36.123", "NumLogin_u32": 0, "IsTrafficFilled_bool": false, "Ex.Recv.BroadcastBytes_u64": 0, @@ -1941,9 +1941,9 @@ All APIs are based on the JSON-R "NumSessions_u32": 0, "NumMacTables_u32": 0, "NumIpTables_u32": 0, - "LastCommTime_dt": "2020-08-01T12:24:36.123", - "LastLoginTime_dt": "2020-08-01T12:24:36.123", - "CreatedTime_dt": "2020-08-01T12:24:36.123", + "LastCommTime_dt": "2024-08-01T12:24:36.123", + "LastLoginTime_dt": "2024-08-01T12:24:36.123", + "CreatedTime_dt": "2024-08-01T12:24:36.123", "NumLogin_u32": 0, "IsTrafficFilled_bool": false, "Ex.Recv.BroadcastBytes_u64": 0, @@ -1964,9 +1964,9 @@ All APIs are based on the JSON-R "NumSessions_u32": 0, "NumMacTables_u32": 0, "NumIpTables_u32": 0, - "LastCommTime_dt": "2020-08-01T12:24:36.123", - "LastLoginTime_dt": "2020-08-01T12:24:36.123", - "CreatedTime_dt": "2020-08-01T12:24:36.123", + "LastCommTime_dt": "2024-08-01T12:24:36.123", + "LastLoginTime_dt": "2024-08-01T12:24:36.123", + "CreatedTime_dt": "2024-08-01T12:24:36.123", "NumLogin_u32": 0, "IsTrafficFilled_bool": false, "Ex.Recv.BroadcastBytes_u64": 0, @@ -2309,7 +2309,7 @@ All APIs are based on the JSON-R "Hostname_str": "hostname", "Ip_ip": "192.168.0.1", "Port_u32": 0, - "ConnectedTime_dt": "2020-08-01T12:24:36.123", + "ConnectedTime_dt": "2024-08-01T12:24:36.123", "Type_u32": 0 }, { @@ -2317,7 +2317,7 @@ All APIs are based on the JSON-R "Hostname_str": "hostname", "Ip_ip": "192.168.0.1", "Port_u32": 0, - "ConnectedTime_dt": "2020-08-01T12:24:36.123", + "ConnectedTime_dt": "2024-08-01T12:24:36.123", "Type_u32": 0 }, { @@ -2325,7 +2325,7 @@ All APIs are based on the JSON-R "Hostname_str": "hostname", "Ip_ip": "192.168.0.1", "Port_u32": 0, - "ConnectedTime_dt": "2020-08-01T12:24:36.123", + "ConnectedTime_dt": "2024-08-01T12:24:36.123", "Type_u32": 0 } ] @@ -2450,7 +2450,7 @@ All APIs are based on the JSON-R "Hostname_str": "hostname", "Ip_ip": "192.168.0.1", "Port_u32": 0, - "ConnectedTime_dt": "2020-08-01T12:24:36.123", + "ConnectedTime_dt": "2024-08-01T12:24:36.123", "ServerStr_str": "serverstr", "ServerVer_u32": 0, "ServerBuild_u32": 0, @@ -2620,9 +2620,9 @@ All APIs are based on the JSON-R "Send.UnicastBytes_u64": 0, "Send.UnicastCount_u64": 0, "SecureNATEnabled_bool": false, - "LastCommTime_dt": "2020-08-01T12:24:36.123", - "LastLoginTime_dt": "2020-08-01T12:24:36.123", - "CreatedTime_dt": "2020-08-01T12:24:36.123", + "LastCommTime_dt": "2024-08-01T12:24:36.123", + "LastLoginTime_dt": "2024-08-01T12:24:36.123", + "CreatedTime_dt": "2024-08-01T12:24:36.123", "NumLogin_u32": 0 } } @@ -2992,19 +2992,19 @@ All APIs are based on the JSON-R "Key_u32": 0, "SubjectName_utf": "subjectname", "IssuerName_utf": "issuername", - "Expires_dt": "2020-08-01T12:24:36.123" + "Expires_dt": "2024-08-01T12:24:36.123" }, { "Key_u32": 0, "SubjectName_utf": "subjectname", "IssuerName_utf": "issuername", - "Expires_dt": "2020-08-01T12:24:36.123" + "Expires_dt": "2024-08-01T12:24:36.123" }, { "Key_u32": 0, "SubjectName_utf": "subjectname", "IssuerName_utf": "issuername", - "Expires_dt": "2020-08-01T12:24:36.123" + "Expires_dt": "2024-08-01T12:24:36.123" } ] } @@ -4348,7 +4348,7 @@ All APIs are based on the JSON-R "Online_bool": false, "Connected_bool": false, "LastError_u32": 0, - "ConnectedTime_dt": "2020-08-01T12:24:36.123", + "ConnectedTime_dt": "2024-08-01T12:24:36.123", "Hostname_str": "hostname", "TargetHubName_str": "targethubname" }, @@ -4357,7 +4357,7 @@ All APIs are based on the JSON-R "Online_bool": false, "Connected_bool": false, "LastError_u32": 0, - "ConnectedTime_dt": "2020-08-01T12:24:36.123", + "ConnectedTime_dt": "2024-08-01T12:24:36.123", "Hostname_str": "hostname", "TargetHubName_str": "targethubname" }, @@ -4366,7 +4366,7 @@ All APIs are based on the JSON-R "Online_bool": false, "Connected_bool": false, "LastError_u32": 0, - "ConnectedTime_dt": "2020-08-01T12:24:36.123", + "ConnectedTime_dt": "2024-08-01T12:24:36.123", "Hostname_str": "hostname", "TargetHubName_str": "targethubname" } @@ -4668,9 +4668,9 @@ All APIs are based on the JSON-R "ServerProductBuild_u32": 0, "ServerX_bin": "SGVsbG8gV29ybGQ=", "ClientX_bin": "SGVsbG8gV29ybGQ=", - "StartTime_dt": "2020-08-01T12:24:36.123", - "FirstConnectionEstablisiedTime_dt": "2020-08-01T12:24:36.123", - "CurrentConnectionEstablishTime_dt": "2020-08-01T12:24:36.123", + "StartTime_dt": "2024-08-01T12:24:36.123", + "FirstConnectionEstablisiedTime_dt": "2024-08-01T12:24:36.123", + "CurrentConnectionEstablishTime_dt": "2024-08-01T12:24:36.123", "NumConnectionsEatablished_u32": 0, "HalfConnection_bool": false, "QoS_bool": false, @@ -5996,7 +5996,7 @@ All APIs are based on the JSON-R "Name_str": "name", "Realname_utf": "realname", "Note_utf": "note", - "ExpireTime_dt": "2020-08-01T12:24:36.123", + "ExpireTime_dt": "2024-08-01T12:24:36.123", "AuthType_u32": 0, "Auth_Password_str": "auth_password", "UserX_bin": "SGVsbG8gV29ybGQ=", @@ -6057,9 +6057,9 @@ All APIs are based on the JSON-R "GroupName_str": "groupname", "Realname_utf": "realname", "Note_utf": "note", - "CreatedTime_dt": "2020-08-01T12:24:36.123", - "UpdatedTime_dt": "2020-08-01T12:24:36.123", - "ExpireTime_dt": "2020-08-01T12:24:36.123", + "CreatedTime_dt": "2024-08-01T12:24:36.123", + "UpdatedTime_dt": "2024-08-01T12:24:36.123", + "ExpireTime_dt": "2024-08-01T12:24:36.123", "AuthType_u32": 0, "Auth_Password_str": "auth_password", "UserX_bin": "SGVsbG8gV29ybGQ=", @@ -6247,7 +6247,7 @@ All APIs are based on the JSON-R Send.UnicastCount_u64 number (uint64) -Unicast count (Send) +Unicast bytes (Send) UsePolicy_bool @@ -6467,7 +6467,7 @@ All APIs are based on the JSON-R "GroupName_str": "groupname", "Realname_utf": "realname", "Note_utf": "note", - "ExpireTime_dt": "2020-08-01T12:24:36.123", + "ExpireTime_dt": "2024-08-01T12:24:36.123", "AuthType_u32": 0, "Auth_Password_str": "auth_password", "UserX_bin": "SGVsbG8gV29ybGQ=", @@ -6528,9 +6528,9 @@ All APIs are based on the JSON-R "GroupName_str": "groupname", "Realname_utf": "realname", "Note_utf": "note", - "CreatedTime_dt": "2020-08-01T12:24:36.123", - "UpdatedTime_dt": "2020-08-01T12:24:36.123", - "ExpireTime_dt": "2020-08-01T12:24:36.123", + "CreatedTime_dt": "2024-08-01T12:24:36.123", + "UpdatedTime_dt": "2024-08-01T12:24:36.123", + "ExpireTime_dt": "2024-08-01T12:24:36.123", "AuthType_u32": 0, "Auth_Password_str": "auth_password", "UserX_bin": "SGVsbG8gV29ybGQ=", @@ -6948,9 +6948,9 @@ All APIs are based on the JSON-R "GroupName_str": "groupname", "Realname_utf": "realname", "Note_utf": "note", - "CreatedTime_dt": "2020-08-01T12:24:36.123", - "UpdatedTime_dt": "2020-08-01T12:24:36.123", - "ExpireTime_dt": "2020-08-01T12:24:36.123", + "CreatedTime_dt": "2024-08-01T12:24:36.123", + "UpdatedTime_dt": "2024-08-01T12:24:36.123", + "ExpireTime_dt": "2024-08-01T12:24:36.123", "AuthType_u32": 0, "Auth_Password_str": "auth_password", "UserX_bin": "SGVsbG8gV29ybGQ=", @@ -7419,11 +7419,11 @@ All APIs are based on the JSON-R "Note_utf": "note", "AuthType_u32": 0, "NumLogin_u32": 0, - "LastLoginTime_dt": "2020-08-01T12:24:36.123", + "LastLoginTime_dt": "2024-08-01T12:24:36.123", "DenyAccess_bool": false, "IsTrafficFilled_bool": false, "IsExpiresFilled_bool": false, - "Expires_dt": "2020-08-01T12:24:36.123", + "Expires_dt": "2024-08-01T12:24:36.123", "Ex.Recv.BroadcastBytes_u64": 0, "Ex.Recv.BroadcastCount_u64": 0, "Ex.Recv.UnicastBytes_u64": 0, @@ -7440,11 +7440,11 @@ All APIs are based on the JSON-R "Note_utf": "note", "AuthType_u32": 0, "NumLogin_u32": 0, - "LastLoginTime_dt": "2020-08-01T12:24:36.123", + "LastLoginTime_dt": "2024-08-01T12:24:36.123", "DenyAccess_bool": false, "IsTrafficFilled_bool": false, "IsExpiresFilled_bool": false, - "Expires_dt": "2020-08-01T12:24:36.123", + "Expires_dt": "2024-08-01T12:24:36.123", "Ex.Recv.BroadcastBytes_u64": 0, "Ex.Recv.BroadcastCount_u64": 0, "Ex.Recv.UnicastBytes_u64": 0, @@ -7461,11 +7461,11 @@ All APIs are based on the JSON-R "Note_utf": "note", "AuthType_u32": 0, "NumLogin_u32": 0, - "LastLoginTime_dt": "2020-08-01T12:24:36.123", + "LastLoginTime_dt": "2024-08-01T12:24:36.123", "DenyAccess_bool": false, "IsTrafficFilled_bool": false, "IsExpiresFilled_bool": false, - "Expires_dt": "2020-08-01T12:24:36.123", + "Expires_dt": "2024-08-01T12:24:36.123", "Ex.Recv.BroadcastBytes_u64": 0, "Ex.Recv.BroadcastCount_u64": 0, "Ex.Recv.UnicastBytes_u64": 0, @@ -8907,8 +8907,8 @@ All APIs are based on the JSON-R "Client_MonitorMode_bool": false, "VLanId_u32": 0, "UniqueId_bin": "SGVsbG8gV29ybGQ=", - "CreatedTime_dt": "2020-08-01T12:24:36.123", - "LastCommTime_dt": "2020-08-01T12:24:36.123" + "CreatedTime_dt": "2024-08-01T12:24:36.123", + "LastCommTime_dt": "2024-08-01T12:24:36.123" }, { "Name_str": "name", @@ -8929,8 +8929,8 @@ All APIs are based on the JSON-R "Client_MonitorMode_bool": false, "VLanId_u32": 0, "UniqueId_bin": "SGVsbG8gV29ybGQ=", - "CreatedTime_dt": "2020-08-01T12:24:36.123", - "LastCommTime_dt": "2020-08-01T12:24:36.123" + "CreatedTime_dt": "2024-08-01T12:24:36.123", + "LastCommTime_dt": "2024-08-01T12:24:36.123" }, { "Name_str": "name", @@ -8951,8 +8951,8 @@ All APIs are based on the JSON-R "Client_MonitorMode_bool": false, "VLanId_u32": 0, "UniqueId_bin": "SGVsbG8gV29ybGQ=", - "CreatedTime_dt": "2020-08-01T12:24:36.123", - "LastCommTime_dt": "2020-08-01T12:24:36.123" + "CreatedTime_dt": "2024-08-01T12:24:36.123", + "LastCommTime_dt": "2024-08-01T12:24:36.123" } ] } @@ -9117,9 +9117,9 @@ All APIs are based on the JSON-R "ServerProductName_str": "serverproductname", "ServerProductVer_u32": 0, "ServerProductBuild_u32": 0, - "StartTime_dt": "2020-08-01T12:24:36.123", - "FirstConnectionEstablisiedTime_dt": "2020-08-01T12:24:36.123", - "CurrentConnectionEstablishTime_dt": "2020-08-01T12:24:36.123", + "StartTime_dt": "2024-08-01T12:24:36.123", + "FirstConnectionEstablisiedTime_dt": "2024-08-01T12:24:36.123", + "CurrentConnectionEstablishTime_dt": "2024-08-01T12:24:36.123", "NumConnectionsEatablished_u32": 0, "HalfConnection_bool": false, "QoS_bool": false, @@ -9496,8 +9496,8 @@ All APIs are based on the JSON-R "Key_u32": 0, "SessionName_str": "sessionname", "MacAddress_bin": "SGVsbG8gV29ybGQ=", - "CreatedTime_dt": "2020-08-01T12:24:36.123", - "UpdatedTime_dt": "2020-08-01T12:24:36.123", + "CreatedTime_dt": "2024-08-01T12:24:36.123", + "UpdatedTime_dt": "2024-08-01T12:24:36.123", "RemoteItem_bool": false, "RemoteHostname_str": "remotehostname", "VlanId_u32": 0 @@ -9506,8 +9506,8 @@ All APIs are based on the JSON-R "Key_u32": 0, "SessionName_str": "sessionname", "MacAddress_bin": "SGVsbG8gV29ybGQ=", - "CreatedTime_dt": "2020-08-01T12:24:36.123", - "UpdatedTime_dt": "2020-08-01T12:24:36.123", + "CreatedTime_dt": "2024-08-01T12:24:36.123", + "UpdatedTime_dt": "2024-08-01T12:24:36.123", "RemoteItem_bool": false, "RemoteHostname_str": "remotehostname", "VlanId_u32": 0 @@ -9516,8 +9516,8 @@ All APIs are based on the JSON-R "Key_u32": 0, "SessionName_str": "sessionname", "MacAddress_bin": "SGVsbG8gV29ybGQ=", - "CreatedTime_dt": "2020-08-01T12:24:36.123", - "UpdatedTime_dt": "2020-08-01T12:24:36.123", + "CreatedTime_dt": "2024-08-01T12:24:36.123", + "UpdatedTime_dt": "2024-08-01T12:24:36.123", "RemoteItem_bool": false, "RemoteHostname_str": "remotehostname", "VlanId_u32": 0 @@ -9663,8 +9663,8 @@ All APIs are based on the JSON-R "SessionName_str": "sessionname", "IpAddress_ip": "192.168.0.1", "DhcpAllocated_bool": false, - "CreatedTime_dt": "2020-08-01T12:24:36.123", - "UpdatedTime_dt": "2020-08-01T12:24:36.123", + "CreatedTime_dt": "2024-08-01T12:24:36.123", + "UpdatedTime_dt": "2024-08-01T12:24:36.123", "RemoteItem_bool": false, "RemoteHostname_str": "remotehostname" }, @@ -9673,8 +9673,8 @@ All APIs are based on the JSON-R "SessionName_str": "sessionname", "IpAddress_ip": "192.168.0.1", "DhcpAllocated_bool": false, - "CreatedTime_dt": "2020-08-01T12:24:36.123", - "UpdatedTime_dt": "2020-08-01T12:24:36.123", + "CreatedTime_dt": "2024-08-01T12:24:36.123", + "UpdatedTime_dt": "2024-08-01T12:24:36.123", "RemoteItem_bool": false, "RemoteHostname_str": "remotehostname" }, @@ -9683,8 +9683,8 @@ All APIs are based on the JSON-R "SessionName_str": "sessionname", "IpAddress_ip": "192.168.0.1", "DhcpAllocated_bool": false, - "CreatedTime_dt": "2020-08-01T12:24:36.123", - "UpdatedTime_dt": "2020-08-01T12:24:36.123", + "CreatedTime_dt": "2024-08-01T12:24:36.123", + "UpdatedTime_dt": "2024-08-01T12:24:36.123", "RemoteItem_bool": false, "RemoteHostname_str": "remotehostname" } @@ -10376,8 +10376,8 @@ All APIs are based on the JSON-R "DestIp_ip": "192.168.0.1", "DestHost_str": "desthost", "DestPort_u32": 0, - "CreatedTime_dt": "2020-08-01T12:24:36.123", - "LastCommTime_dt": "2020-08-01T12:24:36.123", + "CreatedTime_dt": "2024-08-01T12:24:36.123", + "LastCommTime_dt": "2024-08-01T12:24:36.123", "SendSize_u64": 0, "RecvSize_u64": 0, "TcpStatus_u32": 0 @@ -10391,8 +10391,8 @@ All APIs are based on the JSON-R "DestIp_ip": "192.168.0.1", "DestHost_str": "desthost", "DestPort_u32": 0, - "CreatedTime_dt": "2020-08-01T12:24:36.123", - "LastCommTime_dt": "2020-08-01T12:24:36.123", + "CreatedTime_dt": "2024-08-01T12:24:36.123", + "LastCommTime_dt": "2024-08-01T12:24:36.123", "SendSize_u64": 0, "RecvSize_u64": 0, "TcpStatus_u32": 0 @@ -10406,8 +10406,8 @@ All APIs are based on the JSON-R "DestIp_ip": "192.168.0.1", "DestHost_str": "desthost", "DestPort_u32": 0, - "CreatedTime_dt": "2020-08-01T12:24:36.123", - "LastCommTime_dt": "2020-08-01T12:24:36.123", + "CreatedTime_dt": "2024-08-01T12:24:36.123", + "LastCommTime_dt": "2024-08-01T12:24:36.123", "SendSize_u64": 0, "RecvSize_u64": 0, "TcpStatus_u32": 0 @@ -10527,8 +10527,8 @@ All APIs are based on the JSON-R "DhcpTable": [ { "Id_u32": 0, - "LeasedTime_dt": "2020-08-01T12:24:36.123", - "ExpireTime_dt": "2020-08-01T12:24:36.123", + "LeasedTime_dt": "2024-08-01T12:24:36.123", + "ExpireTime_dt": "2024-08-01T12:24:36.123", "MacAddress_bin": "SGVsbG8gV29ybGQ=", "IpAddress_ip": "192.168.0.1", "Mask_u32": 0, @@ -10536,8 +10536,8 @@ All APIs are based on the JSON-R }, { "Id_u32": 0, - "LeasedTime_dt": "2020-08-01T12:24:36.123", - "ExpireTime_dt": "2020-08-01T12:24:36.123", + "LeasedTime_dt": "2024-08-01T12:24:36.123", + "ExpireTime_dt": "2024-08-01T12:24:36.123", "MacAddress_bin": "SGVsbG8gV29ybGQ=", "IpAddress_ip": "192.168.0.1", "Mask_u32": 0, @@ -10545,8 +10545,8 @@ All APIs are based on the JSON-R }, { "Id_u32": 0, - "LeasedTime_dt": "2020-08-01T12:24:36.123", - "ExpireTime_dt": "2020-08-01T12:24:36.123", + "LeasedTime_dt": "2024-08-01T12:24:36.123", + "ExpireTime_dt": "2024-08-01T12:24:36.123", "MacAddress_bin": "SGVsbG8gV29ybGQ=", "IpAddress_ip": "192.168.0.1", "Mask_u32": 0, @@ -13090,19 +13090,19 @@ All APIs are based on the JSON-R "ServerName_str": "servername", "FilePath_str": "filepath", "FileSize_u32": 0, - "UpdatedTime_dt": "2020-08-01T12:24:36.123" + "UpdatedTime_dt": "2024-08-01T12:24:36.123" }, { "ServerName_str": "servername", "FilePath_str": "filepath", "FileSize_u32": 0, - "UpdatedTime_dt": "2020-08-01T12:24:36.123" + "UpdatedTime_dt": "2024-08-01T12:24:36.123" }, { "ServerName_str": "servername", "FilePath_str": "filepath", "FileSize_u32": 0, - "UpdatedTime_dt": "2020-08-01T12:24:36.123" + "UpdatedTime_dt": "2024-08-01T12:24:36.123" } ] } @@ -14508,15 +14508,15 @@ All APIs are based on the JSON-R
    -

    -

    "GetDDnsInternetSettng" RPC API - Get the Proxy Settings for Connecting to the DDNS server

    +

    +

    "GetDDnsInternetSetting" RPC API - Get the Proxy Settings for Connecting to the DDNS server

    Description

    Get the Proxy Settings for Connecting to the DDNS server.

    Input JSON-RPC Format

    {
       "jsonrpc": "2.0",
       "id": "rpc_call_id",
    -  "method": "GetDDnsInternetSettng",
    +  "method": "GetDDnsInternetSetting",
       "params": {}
     }
     
    @@ -14571,15 +14571,15 @@ All APIs are based on the JSON-R
    -

    -

    "SetDDnsInternetSettng" RPC API - Set the Proxy Settings for Connecting to the DDNS server

    +

    +

    "SetDDnsInternetSetting" RPC API - Set the Proxy Settings for Connecting to the DDNS server

    Description

    Set the Proxy Settings for Connecting to the DDNS server.

    Input JSON-RPC Format

    {
       "jsonrpc": "2.0",
       "id": "rpc_call_id",
    -  "method": "SetDDnsInternetSettng",
    +  "method": "SetDDnsInternetSetting",
       "params": {
         "ProxyType_u32": 0,
         "ProxyHostName_str": "proxyhostname",
    @@ -14640,8 +14640,8 @@ All APIs are based on the JSON-R
     
     
     
    -

    Automatically generated at 2019-07-10 14:36:11 by vpnserver-jsonrpc-codegen.
    -Copyright (c) 2014-2019
    SoftEther VPN Project under the Apache License 2.0.

    +

    Automatically generated at 2023-05-10 14:43:37 by vpnserver-jsonrpc-codegen.
    +Copyright (c) 2014-2023 SoftEther VPN Project under the Apache License 2.0.

    diff --git a/developer_tools/vpnserver-jsonrpc-clients/README.md b/developer_tools/vpnserver-jsonrpc-clients/README.md index 22866867..1ea33f9f 100644 --- a/developer_tools/vpnserver-jsonrpc-clients/README.md +++ b/developer_tools/vpnserver-jsonrpc-clients/README.md @@ -208,8 +208,8 @@ Value | Description - [GetSpecialListener - Get Current Setting of the VPN over ICMP / VPN over DNS Function](#getspeciallistener) - [GetAzureStatus - Show the current status of VPN Azure function](#getazurestatus) - [SetAzureStatus - Enable / Disable VPN Azure Function](#setazurestatus) -- [GetDDnsInternetSettng - Get the Proxy Settings for Connecting to the DDNS server](#getddnsinternetsettng) -- [SetDDnsInternetSettng - Set the Proxy Settings for Connecting to the DDNS server](#setddnsinternetsettng) +- [GetDDnsInternetSetting - Get the Proxy Settings for Connecting to the DDNS server](#getddnsinternetsetting) +- [SetDDnsInternetSetting - Set the Proxy Settings for Connecting to the DDNS server](#setddnsinternetsetting) - [SetVgsConfig - Set the VPN Gate Server Configuration](#setvgsconfig) - [GetVgsConfig - Get the VPN Gate Server Configuration](#getvgsconfig) @@ -283,7 +283,7 @@ Get server information. This allows you to obtain the server information of the "ServerBuildInt_u32": 0, "ServerHostName_str": "serverhostname", "ServerType_u32": 0, - "ServerBuildDate_dt": "2020-08-01T12:24:36.123", + "ServerBuildDate_dt": "2024-08-01T12:24:36.123", "ServerFamilyName_str": "serverfamilyname", "OsType_u32": 0, "OsServicePack_u32": 0, @@ -368,9 +368,9 @@ Get Current Server Status. This allows you to obtain in real-time the current st "Send.BroadcastCount_u64": 0, "Send.UnicastBytes_u64": 0, "Send.UnicastCount_u64": 0, - "CurrentTime_dt": "2020-08-01T12:24:36.123", + "CurrentTime_dt": "2024-08-01T12:24:36.123", "CurrentTick_u64": 0, - "StartTime_dt": "2020-08-01T12:24:36.123", + "StartTime_dt": "2024-08-01T12:24:36.123", "TotalMemory_u64": 0, "UsedMemory_u64": 0, "FreeMemory_u64": 0, @@ -768,7 +768,7 @@ Get Cluster Member Information. When the VPN Server is operating as a cluster co "result": { "Id_u32": 0, "Controller_bool": false, - "ConnectedTime_dt": "2020-08-01T12:24:36.123", + "ConnectedTime_dt": "2024-08-01T12:24:36.123", "Ip_ip": "192.168.0.1", "Hostname_str": "hostname", "Point_u32": 0, @@ -849,7 +849,7 @@ Get List of Cluster Members. Use this API when the VPN Server is operating as a { "Id_u32": 0, "Controller_bool": false, - "ConnectedTime_dt": "2020-08-01T12:24:36.123", + "ConnectedTime_dt": "2024-08-01T12:24:36.123", "Ip_ip": "192.168.0.1", "Hostname_str": "hostname", "Point_u32": 0, @@ -862,7 +862,7 @@ Get List of Cluster Members. Use this API when the VPN Server is operating as a { "Id_u32": 0, "Controller_bool": false, - "ConnectedTime_dt": "2020-08-01T12:24:36.123", + "ConnectedTime_dt": "2024-08-01T12:24:36.123", "Ip_ip": "192.168.0.1", "Hostname_str": "hostname", "Point_u32": 0, @@ -875,7 +875,7 @@ Get List of Cluster Members. Use this API when the VPN Server is operating as a { "Id_u32": 0, "Controller_bool": false, - "ConnectedTime_dt": "2020-08-01T12:24:36.123", + "ConnectedTime_dt": "2024-08-01T12:24:36.123", "Ip_ip": "192.168.0.1", "Hostname_str": "hostname", "Point_u32": 0, @@ -934,9 +934,9 @@ Get Connection Status to Cluster Controller. Use this API when the VPN Server is "Port_u32": 0, "Online_bool": false, "LastError_u32": 0, - "StartedTime_dt": "2020-08-01T12:24:36.123", - "FirstConnectedTime_dt": "2020-08-01T12:24:36.123", - "CurrentConnectedTime_dt": "2020-08-01T12:24:36.123", + "StartedTime_dt": "2024-08-01T12:24:36.123", + "FirstConnectedTime_dt": "2024-08-01T12:24:36.123", + "CurrentConnectedTime_dt": "2024-08-01T12:24:36.123", "NumTry_u32": 0, "NumConnected_u32": 0, "NumFailed_u32": 0 @@ -1278,9 +1278,9 @@ Get List of Virtual Hubs. Use this to get a list of existing Virtual Hubs on the "NumSessions_u32": 0, "NumMacTables_u32": 0, "NumIpTables_u32": 0, - "LastCommTime_dt": "2020-08-01T12:24:36.123", - "LastLoginTime_dt": "2020-08-01T12:24:36.123", - "CreatedTime_dt": "2020-08-01T12:24:36.123", + "LastCommTime_dt": "2024-08-01T12:24:36.123", + "LastLoginTime_dt": "2024-08-01T12:24:36.123", + "CreatedTime_dt": "2024-08-01T12:24:36.123", "NumLogin_u32": 0, "IsTrafficFilled_bool": false, "Ex.Recv.BroadcastBytes_u64": 0, @@ -1301,9 +1301,9 @@ Get List of Virtual Hubs. Use this to get a list of existing Virtual Hubs on the "NumSessions_u32": 0, "NumMacTables_u32": 0, "NumIpTables_u32": 0, - "LastCommTime_dt": "2020-08-01T12:24:36.123", - "LastLoginTime_dt": "2020-08-01T12:24:36.123", - "CreatedTime_dt": "2020-08-01T12:24:36.123", + "LastCommTime_dt": "2024-08-01T12:24:36.123", + "LastLoginTime_dt": "2024-08-01T12:24:36.123", + "CreatedTime_dt": "2024-08-01T12:24:36.123", "NumLogin_u32": 0, "IsTrafficFilled_bool": false, "Ex.Recv.BroadcastBytes_u64": 0, @@ -1324,9 +1324,9 @@ Get List of Virtual Hubs. Use this to get a list of existing Virtual Hubs on the "NumSessions_u32": 0, "NumMacTables_u32": 0, "NumIpTables_u32": 0, - "LastCommTime_dt": "2020-08-01T12:24:36.123", - "LastLoginTime_dt": "2020-08-01T12:24:36.123", - "CreatedTime_dt": "2020-08-01T12:24:36.123", + "LastCommTime_dt": "2024-08-01T12:24:36.123", + "LastLoginTime_dt": "2024-08-01T12:24:36.123", + "CreatedTime_dt": "2024-08-01T12:24:36.123", "NumLogin_u32": 0, "IsTrafficFilled_bool": false, "Ex.Recv.BroadcastBytes_u64": 0, @@ -1525,7 +1525,7 @@ Get List of TCP Connections Connecting to the VPN Server. Use this to get a list "Hostname_str": "hostname", "Ip_ip": "192.168.0.1", "Port_u32": 0, - "ConnectedTime_dt": "2020-08-01T12:24:36.123", + "ConnectedTime_dt": "2024-08-01T12:24:36.123", "Type_u32": 0 }, { @@ -1533,7 +1533,7 @@ Get List of TCP Connections Connecting to the VPN Server. Use this to get a list "Hostname_str": "hostname", "Ip_ip": "192.168.0.1", "Port_u32": 0, - "ConnectedTime_dt": "2020-08-01T12:24:36.123", + "ConnectedTime_dt": "2024-08-01T12:24:36.123", "Type_u32": 0 }, { @@ -1541,7 +1541,7 @@ Get List of TCP Connections Connecting to the VPN Server. Use this to get a list "Hostname_str": "hostname", "Ip_ip": "192.168.0.1", "Port_u32": 0, - "ConnectedTime_dt": "2020-08-01T12:24:36.123", + "ConnectedTime_dt": "2024-08-01T12:24:36.123", "Type_u32": 0 } ] @@ -1626,7 +1626,7 @@ Get Information of TCP Connections Connecting to the VPN Server. Use this to get "Hostname_str": "hostname", "Ip_ip": "192.168.0.1", "Port_u32": 0, - "ConnectedTime_dt": "2020-08-01T12:24:36.123", + "ConnectedTime_dt": "2024-08-01T12:24:36.123", "ServerStr_str": "serverstr", "ServerVer_u32": 0, "ServerBuild_u32": 0, @@ -1736,9 +1736,9 @@ Get Current Status of Virtual Hub. Use this to get the current status of the Vir "Send.UnicastBytes_u64": 0, "Send.UnicastCount_u64": 0, "SecureNATEnabled_bool": false, - "LastCommTime_dt": "2020-08-01T12:24:36.123", - "LastLoginTime_dt": "2020-08-01T12:24:36.123", - "CreatedTime_dt": "2020-08-01T12:24:36.123", + "LastCommTime_dt": "2024-08-01T12:24:36.123", + "LastLoginTime_dt": "2024-08-01T12:24:36.123", + "CreatedTime_dt": "2024-08-01T12:24:36.123", "NumLogin_u32": 0 } } @@ -1948,19 +1948,19 @@ Get List of Trusted CA Certificates. Here you can manage the certificate authori "Key_u32": 0, "SubjectName_utf": "subjectname", "IssuerName_utf": "issuername", - "Expires_dt": "2020-08-01T12:24:36.123" + "Expires_dt": "2024-08-01T12:24:36.123" }, { "Key_u32": 0, "SubjectName_utf": "subjectname", "IssuerName_utf": "issuername", - "Expires_dt": "2020-08-01T12:24:36.123" + "Expires_dt": "2024-08-01T12:24:36.123" }, { "Key_u32": 0, "SubjectName_utf": "subjectname", "IssuerName_utf": "issuername", - "Expires_dt": "2020-08-01T12:24:36.123" + "Expires_dt": "2024-08-01T12:24:36.123" } ] } @@ -2210,7 +2210,7 @@ Name | Type | Description `NoUdpAcceleration_bool` | `boolean` | Client Option Parameters: Do not use UDP acceleration mode if the value is true `AuthType_u32` | `number` (enum) | Authentication type
    Values:
    `0`: Anonymous authentication
    `1`: SHA-0 hashed password authentication
    `2`: Plain password authentication
    `3`: Certificate authentication `Username_str` | `string` (ASCII) | User name -`HashedPassword_bin` | `string` (Base64 binary) | SHA-0 Hashed password. Valid only if ClientAuth_AuthType_u32 == SHA0_Hashed_Password (1). The SHA-0 hashed password must be caluclated by the SHA0(password_ascii_string + UpperCase(username_ascii_string)). +`HashedPassword_bin` | `string` (Base64 binary) | SHA-0 Hashed password. Valid only if ClientAuth_AuthType_u32 == SHA0_Hashed_Password (1). The SHA-0 hashed password must be caluclated by the SHA0(UpperCase(username_ascii_string) + password_ascii_string). `PlainPassword_str` | `string` (ASCII) | Plaintext Password. Valid only if ClientAuth_AuthType_u32 == PlainPassword (2). `ClientX_bin` | `string` (Base64 binary) | Client certificate. Valid only if ClientAuth_AuthType_u32 == Cert (3). `ClientK_bin` | `string` (Base64 binary) | Client private key of the certificate. Valid only if ClientAuth_AuthType_u32 == Cert (3). @@ -2537,7 +2537,7 @@ Name | Type | Description `NoUdpAcceleration_bool` | `boolean` | Client Option Parameters: Do not use UDP acceleration mode if the value is true `AuthType_u32` | `number` (enum) | Authentication type
    Values:
    `0`: Anonymous authentication
    `1`: SHA-0 hashed password authentication
    `2`: Plain password authentication
    `3`: Certificate authentication `Username_str` | `string` (ASCII) | User name -`HashedPassword_bin` | `string` (Base64 binary) | SHA-0 Hashed password. Valid only if ClientAuth_AuthType_u32 == SHA0_Hashed_Password (1). The SHA-0 hashed password must be caluclated by the SHA0(password_ascii_string + UpperCase(username_ascii_string)). +`HashedPassword_bin` | `string` (Base64 binary) | SHA-0 Hashed password. Valid only if ClientAuth_AuthType_u32 == SHA0_Hashed_Password (1). The SHA-0 hashed password must be caluclated by the SHA0(UpperCase(username_ascii_string) + password_ascii_string). `PlainPassword_str` | `string` (ASCII) | Plaintext Password. Valid only if ClientAuth_AuthType_u32 == PlainPassword (2). `ClientX_bin` | `string` (Base64 binary) | Client certificate. Valid only if ClientAuth_AuthType_u32 == Cert (3). `ClientK_bin` | `string` (Base64 binary) | Client private key of the certificate. Valid only if ClientAuth_AuthType_u32 == Cert (3). @@ -2600,7 +2600,7 @@ Get List of Cascade Connections. Use this to get a list of Cascade Connections t "Online_bool": false, "Connected_bool": false, "LastError_u32": 0, - "ConnectedTime_dt": "2020-08-01T12:24:36.123", + "ConnectedTime_dt": "2024-08-01T12:24:36.123", "Hostname_str": "hostname", "TargetHubName_str": "targethubname" }, @@ -2609,7 +2609,7 @@ Get List of Cascade Connections. Use this to get a list of Cascade Connections t "Online_bool": false, "Connected_bool": false, "LastError_u32": 0, - "ConnectedTime_dt": "2020-08-01T12:24:36.123", + "ConnectedTime_dt": "2024-08-01T12:24:36.123", "Hostname_str": "hostname", "TargetHubName_str": "targethubname" }, @@ -2618,7 +2618,7 @@ Get List of Cascade Connections. Use this to get a list of Cascade Connections t "Online_bool": false, "Connected_bool": false, "LastError_u32": 0, - "ConnectedTime_dt": "2020-08-01T12:24:36.123", + "ConnectedTime_dt": "2024-08-01T12:24:36.123", "Hostname_str": "hostname", "TargetHubName_str": "targethubname" } @@ -2834,9 +2834,9 @@ Get Current Cascade Connection Status. When a Cascade Connection registered on t "ServerProductBuild_u32": 0, "ServerX_bin": "SGVsbG8gV29ybGQ=", "ClientX_bin": "SGVsbG8gV29ybGQ=", - "StartTime_dt": "2020-08-01T12:24:36.123", - "FirstConnectionEstablisiedTime_dt": "2020-08-01T12:24:36.123", - "CurrentConnectionEstablishTime_dt": "2020-08-01T12:24:36.123", + "StartTime_dt": "2024-08-01T12:24:36.123", + "FirstConnectionEstablisiedTime_dt": "2024-08-01T12:24:36.123", + "CurrentConnectionEstablishTime_dt": "2024-08-01T12:24:36.123", "NumConnectionsEatablished_u32": 0, "HalfConnection_bool": false, "QoS_bool": false, @@ -3566,7 +3566,7 @@ Create a user. Use this to create a new user in the security account database of "Name_str": "name", "Realname_utf": "realname", "Note_utf": "note", - "ExpireTime_dt": "2020-08-01T12:24:36.123", + "ExpireTime_dt": "2024-08-01T12:24:36.123", "AuthType_u32": 0, "Auth_Password_str": "auth_password", "UserX_bin": "SGVsbG8gV29ybGQ=", @@ -3629,9 +3629,9 @@ Create a user. Use this to create a new user in the security account database of "GroupName_str": "groupname", "Realname_utf": "realname", "Note_utf": "note", - "CreatedTime_dt": "2020-08-01T12:24:36.123", - "UpdatedTime_dt": "2020-08-01T12:24:36.123", - "ExpireTime_dt": "2020-08-01T12:24:36.123", + "CreatedTime_dt": "2024-08-01T12:24:36.123", + "UpdatedTime_dt": "2024-08-01T12:24:36.123", + "ExpireTime_dt": "2024-08-01T12:24:36.123", "AuthType_u32": 0, "Auth_Password_str": "auth_password", "UserX_bin": "SGVsbG8gV29ybGQ=", @@ -3779,7 +3779,7 @@ Change User Settings. Use this to change user settings that is registered on the "GroupName_str": "groupname", "Realname_utf": "realname", "Note_utf": "note", - "ExpireTime_dt": "2020-08-01T12:24:36.123", + "ExpireTime_dt": "2024-08-01T12:24:36.123", "AuthType_u32": 0, "Auth_Password_str": "auth_password", "UserX_bin": "SGVsbG8gV29ybGQ=", @@ -3842,9 +3842,9 @@ Change User Settings. Use this to change user settings that is registered on the "GroupName_str": "groupname", "Realname_utf": "realname", "Note_utf": "note", - "CreatedTime_dt": "2020-08-01T12:24:36.123", - "UpdatedTime_dt": "2020-08-01T12:24:36.123", - "ExpireTime_dt": "2020-08-01T12:24:36.123", + "CreatedTime_dt": "2024-08-01T12:24:36.123", + "UpdatedTime_dt": "2024-08-01T12:24:36.123", + "ExpireTime_dt": "2024-08-01T12:24:36.123", "AuthType_u32": 0, "Auth_Password_str": "auth_password", "UserX_bin": "SGVsbG8gV29ybGQ=", @@ -4004,9 +4004,9 @@ Get User Settings. Use this to get user settings information that is registered "GroupName_str": "groupname", "Realname_utf": "realname", "Note_utf": "note", - "CreatedTime_dt": "2020-08-01T12:24:36.123", - "UpdatedTime_dt": "2020-08-01T12:24:36.123", - "ExpireTime_dt": "2020-08-01T12:24:36.123", + "CreatedTime_dt": "2024-08-01T12:24:36.123", + "UpdatedTime_dt": "2024-08-01T12:24:36.123", + "ExpireTime_dt": "2024-08-01T12:24:36.123", "AuthType_u32": 0, "Auth_Password_str": "auth_password", "UserX_bin": "SGVsbG8gV29ybGQ=", @@ -4207,11 +4207,11 @@ Get List of Users. Use this to get a list of users that are registered on the se "Note_utf": "note", "AuthType_u32": 0, "NumLogin_u32": 0, - "LastLoginTime_dt": "2020-08-01T12:24:36.123", + "LastLoginTime_dt": "2024-08-01T12:24:36.123", "DenyAccess_bool": false, "IsTrafficFilled_bool": false, "IsExpiresFilled_bool": false, - "Expires_dt": "2020-08-01T12:24:36.123", + "Expires_dt": "2024-08-01T12:24:36.123", "Ex.Recv.BroadcastBytes_u64": 0, "Ex.Recv.BroadcastCount_u64": 0, "Ex.Recv.UnicastBytes_u64": 0, @@ -4228,11 +4228,11 @@ Get List of Users. Use this to get a list of users that are registered on the se "Note_utf": "note", "AuthType_u32": 0, "NumLogin_u32": 0, - "LastLoginTime_dt": "2020-08-01T12:24:36.123", + "LastLoginTime_dt": "2024-08-01T12:24:36.123", "DenyAccess_bool": false, "IsTrafficFilled_bool": false, "IsExpiresFilled_bool": false, - "Expires_dt": "2020-08-01T12:24:36.123", + "Expires_dt": "2024-08-01T12:24:36.123", "Ex.Recv.BroadcastBytes_u64": 0, "Ex.Recv.BroadcastCount_u64": 0, "Ex.Recv.UnicastBytes_u64": 0, @@ -4249,11 +4249,11 @@ Get List of Users. Use this to get a list of users that are registered on the se "Note_utf": "note", "AuthType_u32": 0, "NumLogin_u32": 0, - "LastLoginTime_dt": "2020-08-01T12:24:36.123", + "LastLoginTime_dt": "2024-08-01T12:24:36.123", "DenyAccess_bool": false, "IsTrafficFilled_bool": false, "IsExpiresFilled_bool": false, - "Expires_dt": "2020-08-01T12:24:36.123", + "Expires_dt": "2024-08-01T12:24:36.123", "Ex.Recv.BroadcastBytes_u64": 0, "Ex.Recv.BroadcastCount_u64": 0, "Ex.Recv.UnicastBytes_u64": 0, @@ -4605,14 +4605,14 @@ Name | Type | Description `Name_str` | `string` (ASCII) | The group name `Realname_utf` | `string` (UTF8) | Optional real name (full name) of the group, allow using any Unicode characters `Note_utf` | `string` (UTF8) | Optional, specify a description of the group -`Recv.BroadcastBytes_u64` | `number` (uint64) | Broadcast bytes (Recv) -`Recv.BroadcastCount_u64` | `number` (uint64) | Number of broadcast packets (Recv) -`Recv.UnicastBytes_u64` | `number` (uint64) | Unicast bytes (Recv) -`Recv.UnicastCount_u64` | `number` (uint64) | Unicast count (Recv) -`Send.BroadcastBytes_u64` | `number` (uint64) | Broadcast bytes (Send) -`Send.BroadcastCount_u64` | `number` (uint64) | Number of broadcast packets (Send) +`Recv.BroadcastBytes_u64` | `number` (uint64) | Number of broadcast packets (Recv) +`Recv.BroadcastCount_u64` | `number` (uint64) | Broadcast bytes (Recv) +`Recv.UnicastBytes_u64` | `number` (uint64) | Unicast count (Recv) +`Recv.UnicastCount_u64` | `number` (uint64) | Unicast bytes (Recv) +`Send.BroadcastBytes_u64` | `number` (uint64) | Number of broadcast packets (Send) +`Send.BroadcastCount_u64` | `number` (uint64) | Broadcast bytes (Send) `Send.UnicastBytes_u64` | `number` (uint64) | Unicast bytes (Send) -`Send.UnicastCount_u64` | `number` (uint64) | Unicast count (Send) +`Send.UnicastCount_u64` | `number` (uint64) | Unicast bytes (Send) `UsePolicy_bool` | `boolean` | The flag whether to use security policy `policy:Access_bool` | `boolean` | Security policy: Allow Access. The users, which this policy value is true, have permission to make VPN connection to VPN Server. `policy:DHCPFilter_bool` | `boolean` | Security policy: Filter DHCP Packets (IPv4). All IPv4 DHCP packets in sessions defined this policy will be filtered. @@ -4939,8 +4939,8 @@ Get List of Connected VPN Sessions. Use this to get a list of the sessions conne "Client_MonitorMode_bool": false, "VLanId_u32": 0, "UniqueId_bin": "SGVsbG8gV29ybGQ=", - "CreatedTime_dt": "2020-08-01T12:24:36.123", - "LastCommTime_dt": "2020-08-01T12:24:36.123" + "CreatedTime_dt": "2024-08-01T12:24:36.123", + "LastCommTime_dt": "2024-08-01T12:24:36.123" }, { "Name_str": "name", @@ -4961,8 +4961,8 @@ Get List of Connected VPN Sessions. Use this to get a list of the sessions conne "Client_MonitorMode_bool": false, "VLanId_u32": 0, "UniqueId_bin": "SGVsbG8gV29ybGQ=", - "CreatedTime_dt": "2020-08-01T12:24:36.123", - "LastCommTime_dt": "2020-08-01T12:24:36.123" + "CreatedTime_dt": "2024-08-01T12:24:36.123", + "LastCommTime_dt": "2024-08-01T12:24:36.123" }, { "Name_str": "name", @@ -4983,8 +4983,8 @@ Get List of Connected VPN Sessions. Use this to get a list of the sessions conne "Client_MonitorMode_bool": false, "VLanId_u32": 0, "UniqueId_bin": "SGVsbG8gV29ybGQ=", - "CreatedTime_dt": "2020-08-01T12:24:36.123", - "LastCommTime_dt": "2020-08-01T12:24:36.123" + "CreatedTime_dt": "2024-08-01T12:24:36.123", + "LastCommTime_dt": "2024-08-01T12:24:36.123" } ] } @@ -5059,9 +5059,9 @@ Get Session Status. Use this to specify a session currently connected to the cur "ServerProductName_str": "serverproductname", "ServerProductVer_u32": 0, "ServerProductBuild_u32": 0, - "StartTime_dt": "2020-08-01T12:24:36.123", - "FirstConnectionEstablisiedTime_dt": "2020-08-01T12:24:36.123", - "CurrentConnectionEstablishTime_dt": "2020-08-01T12:24:36.123", + "StartTime_dt": "2024-08-01T12:24:36.123", + "FirstConnectionEstablisiedTime_dt": "2024-08-01T12:24:36.123", + "CurrentConnectionEstablishTime_dt": "2024-08-01T12:24:36.123", "NumConnectionsEatablished_u32": 0, "HalfConnection_bool": false, "QoS_bool": false, @@ -5222,8 +5222,8 @@ Get the MAC Address Table Database. Use this to get the MAC address table databa "Key_u32": 0, "SessionName_str": "sessionname", "MacAddress_bin": "SGVsbG8gV29ybGQ=", - "CreatedTime_dt": "2020-08-01T12:24:36.123", - "UpdatedTime_dt": "2020-08-01T12:24:36.123", + "CreatedTime_dt": "2024-08-01T12:24:36.123", + "UpdatedTime_dt": "2024-08-01T12:24:36.123", "RemoteItem_bool": false, "RemoteHostname_str": "remotehostname", "VlanId_u32": 0 @@ -5232,8 +5232,8 @@ Get the MAC Address Table Database. Use this to get the MAC address table databa "Key_u32": 0, "SessionName_str": "sessionname", "MacAddress_bin": "SGVsbG8gV29ybGQ=", - "CreatedTime_dt": "2020-08-01T12:24:36.123", - "UpdatedTime_dt": "2020-08-01T12:24:36.123", + "CreatedTime_dt": "2024-08-01T12:24:36.123", + "UpdatedTime_dt": "2024-08-01T12:24:36.123", "RemoteItem_bool": false, "RemoteHostname_str": "remotehostname", "VlanId_u32": 0 @@ -5242,8 +5242,8 @@ Get the MAC Address Table Database. Use this to get the MAC address table databa "Key_u32": 0, "SessionName_str": "sessionname", "MacAddress_bin": "SGVsbG8gV29ybGQ=", - "CreatedTime_dt": "2020-08-01T12:24:36.123", - "UpdatedTime_dt": "2020-08-01T12:24:36.123", + "CreatedTime_dt": "2024-08-01T12:24:36.123", + "UpdatedTime_dt": "2024-08-01T12:24:36.123", "RemoteItem_bool": false, "RemoteHostname_str": "remotehostname", "VlanId_u32": 0 @@ -5337,8 +5337,8 @@ Get the IP Address Table Database. Use this to get the IP address table database "SessionName_str": "sessionname", "IpAddress_ip": "192.168.0.1", "DhcpAllocated_bool": false, - "CreatedTime_dt": "2020-08-01T12:24:36.123", - "UpdatedTime_dt": "2020-08-01T12:24:36.123", + "CreatedTime_dt": "2024-08-01T12:24:36.123", + "UpdatedTime_dt": "2024-08-01T12:24:36.123", "RemoteItem_bool": false, "RemoteHostname_str": "remotehostname" }, @@ -5347,8 +5347,8 @@ Get the IP Address Table Database. Use this to get the IP address table database "SessionName_str": "sessionname", "IpAddress_ip": "192.168.0.1", "DhcpAllocated_bool": false, - "CreatedTime_dt": "2020-08-01T12:24:36.123", - "UpdatedTime_dt": "2020-08-01T12:24:36.123", + "CreatedTime_dt": "2024-08-01T12:24:36.123", + "UpdatedTime_dt": "2024-08-01T12:24:36.123", "RemoteItem_bool": false, "RemoteHostname_str": "remotehostname" }, @@ -5357,8 +5357,8 @@ Get the IP Address Table Database. Use this to get the IP address table database "SessionName_str": "sessionname", "IpAddress_ip": "192.168.0.1", "DhcpAllocated_bool": false, - "CreatedTime_dt": "2020-08-01T12:24:36.123", - "UpdatedTime_dt": "2020-08-01T12:24:36.123", + "CreatedTime_dt": "2024-08-01T12:24:36.123", + "UpdatedTime_dt": "2024-08-01T12:24:36.123", "RemoteItem_bool": false, "RemoteHostname_str": "remotehostname" } @@ -5778,8 +5778,8 @@ Get Virtual NAT Function Session Table of SecureNAT Function. Use this to get th "DestIp_ip": "192.168.0.1", "DestHost_str": "desthost", "DestPort_u32": 0, - "CreatedTime_dt": "2020-08-01T12:24:36.123", - "LastCommTime_dt": "2020-08-01T12:24:36.123", + "CreatedTime_dt": "2024-08-01T12:24:36.123", + "LastCommTime_dt": "2024-08-01T12:24:36.123", "SendSize_u64": 0, "RecvSize_u64": 0, "TcpStatus_u32": 0 @@ -5793,8 +5793,8 @@ Get Virtual NAT Function Session Table of SecureNAT Function. Use this to get th "DestIp_ip": "192.168.0.1", "DestHost_str": "desthost", "DestPort_u32": 0, - "CreatedTime_dt": "2020-08-01T12:24:36.123", - "LastCommTime_dt": "2020-08-01T12:24:36.123", + "CreatedTime_dt": "2024-08-01T12:24:36.123", + "LastCommTime_dt": "2024-08-01T12:24:36.123", "SendSize_u64": 0, "RecvSize_u64": 0, "TcpStatus_u32": 0 @@ -5808,8 +5808,8 @@ Get Virtual NAT Function Session Table of SecureNAT Function. Use this to get th "DestIp_ip": "192.168.0.1", "DestHost_str": "desthost", "DestPort_u32": 0, - "CreatedTime_dt": "2020-08-01T12:24:36.123", - "LastCommTime_dt": "2020-08-01T12:24:36.123", + "CreatedTime_dt": "2024-08-01T12:24:36.123", + "LastCommTime_dt": "2024-08-01T12:24:36.123", "SendSize_u64": 0, "RecvSize_u64": 0, "TcpStatus_u32": 0 @@ -5867,8 +5867,8 @@ Get Virtual DHCP Server Function Lease Table of SecureNAT Function. Use this to "DhcpTable": [ { "Id_u32": 0, - "LeasedTime_dt": "2020-08-01T12:24:36.123", - "ExpireTime_dt": "2020-08-01T12:24:36.123", + "LeasedTime_dt": "2024-08-01T12:24:36.123", + "ExpireTime_dt": "2024-08-01T12:24:36.123", "MacAddress_bin": "SGVsbG8gV29ybGQ=", "IpAddress_ip": "192.168.0.1", "Mask_u32": 0, @@ -5876,8 +5876,8 @@ Get Virtual DHCP Server Function Lease Table of SecureNAT Function. Use this to }, { "Id_u32": 0, - "LeasedTime_dt": "2020-08-01T12:24:36.123", - "ExpireTime_dt": "2020-08-01T12:24:36.123", + "LeasedTime_dt": "2024-08-01T12:24:36.123", + "ExpireTime_dt": "2024-08-01T12:24:36.123", "MacAddress_bin": "SGVsbG8gV29ybGQ=", "IpAddress_ip": "192.168.0.1", "Mask_u32": 0, @@ -5885,8 +5885,8 @@ Get Virtual DHCP Server Function Lease Table of SecureNAT Function. Use this to }, { "Id_u32": 0, - "LeasedTime_dt": "2020-08-01T12:24:36.123", - "ExpireTime_dt": "2020-08-01T12:24:36.123", + "LeasedTime_dt": "2024-08-01T12:24:36.123", + "ExpireTime_dt": "2024-08-01T12:24:36.123", "MacAddress_bin": "SGVsbG8gV29ybGQ=", "IpAddress_ip": "192.168.0.1", "Mask_u32": 0, @@ -7642,19 +7642,19 @@ Get List of Log Files. Use this to display a list of log files outputted by the "ServerName_str": "servername", "FilePath_str": "filepath", "FileSize_u32": 0, - "UpdatedTime_dt": "2020-08-01T12:24:36.123" + "UpdatedTime_dt": "2024-08-01T12:24:36.123" }, { "ServerName_str": "servername", "FilePath_str": "filepath", "FileSize_u32": 0, - "UpdatedTime_dt": "2020-08-01T12:24:36.123" + "UpdatedTime_dt": "2024-08-01T12:24:36.123" }, { "ServerName_str": "servername", "FilePath_str": "filepath", "FileSize_u32": 0, - "UpdatedTime_dt": "2020-08-01T12:24:36.123" + "UpdatedTime_dt": "2024-08-01T12:24:36.123" } ] } @@ -8642,8 +8642,8 @@ Name | Type | Description `IsConnected_bool` | `boolean` | Whether connection to VPN Azure Cloud Server is established *** - -## "GetDDnsInternetSettng" RPC API - Get the Proxy Settings for Connecting to the DDNS server + +## "GetDDnsInternetSetting" RPC API - Get the Proxy Settings for Connecting to the DDNS server ### Description Get the Proxy Settings for Connecting to the DDNS server. @@ -8652,7 +8652,7 @@ Get the Proxy Settings for Connecting to the DDNS server. { "jsonrpc": "2.0", "id": "rpc_call_id", - "method": "GetDDnsInternetSettng", + "method": "GetDDnsInternetSetting", "params": {} } ``` @@ -8683,8 +8683,8 @@ Name | Type | Description `ProxyPassword_str` | `string` (ASCII) | Proxy server password *** - -## "SetDDnsInternetSettng" RPC API - Set the Proxy Settings for Connecting to the DDNS server + +## "SetDDnsInternetSetting" RPC API - Set the Proxy Settings for Connecting to the DDNS server ### Description Set the Proxy Settings for Connecting to the DDNS server. @@ -8693,7 +8693,7 @@ Set the Proxy Settings for Connecting to the DDNS server. { "jsonrpc": "2.0", "id": "rpc_call_id", - "method": "SetDDnsInternetSettng", + "method": "SetDDnsInternetSetting", "params": { "ProxyType_u32": 0, "ProxyHostName_str": "proxyhostname", @@ -8730,6 +8730,6 @@ Name | Type | Description `ProxyPassword_str` | `string` (ASCII) | Proxy server password *** -Automatically generated at 2019-07-10 14:36:11 by vpnserver-jsonrpc-codegen. -Copyright (c) 2014-2019 [SoftEther VPN Project](https://www.softether.org/) under the Apache License 2.0. +Automatically generated at 2023-05-10 14:43:37 by vpnserver-jsonrpc-codegen. +Copyright (c) 2014-2023 [SoftEther VPN Project](https://www.softether.org/) under the Apache License 2.0. diff --git a/developer_tools/vpnserver-jsonrpc-clients/vpnserver-jsonrpc-client-csharp/rpc-stubs/JsonRpc.cs b/developer_tools/vpnserver-jsonrpc-clients/vpnserver-jsonrpc-client-csharp/rpc-stubs/JsonRpc.cs index 8263a325..e8764013 100644 --- a/developer_tools/vpnserver-jsonrpc-clients/vpnserver-jsonrpc-client-csharp/rpc-stubs/JsonRpc.cs +++ b/developer_tools/vpnserver-jsonrpc-clients/vpnserver-jsonrpc-client-csharp/rpc-stubs/JsonRpc.cs @@ -2,10 +2,10 @@ // // JsonRpc.cs - JSON-RPC Client Utility Functions // -// Automatically generated at 2019-07-10 14:36:11 by vpnserver-jsonrpc-codegen +// Automatically generated at 2023-05-10 14:43:37 by vpnserver-jsonrpc-codegen // // Licensed under the Apache License 2.0 -// Copyright (c) 2014-2019 SoftEther VPN Project +// Copyright (c) 2014-2023 SoftEther VPN Project using System; using System.IO; diff --git a/developer_tools/vpnserver-jsonrpc-clients/vpnserver-jsonrpc-client-csharp/rpc-stubs/VPNServerRpc.cs b/developer_tools/vpnserver-jsonrpc-clients/vpnserver-jsonrpc-client-csharp/rpc-stubs/VPNServerRpc.cs index e4a0b895..d3d56c44 100644 --- a/developer_tools/vpnserver-jsonrpc-clients/vpnserver-jsonrpc-client-csharp/rpc-stubs/VPNServerRpc.cs +++ b/developer_tools/vpnserver-jsonrpc-clients/vpnserver-jsonrpc-client-csharp/rpc-stubs/VPNServerRpc.cs @@ -2,10 +2,10 @@ // // VPNServerRpc.cs - SoftEther VPN Server's JSON-RPC Stubs // -// Automatically generated at 2019-07-10 14:36:11 by vpnserver-jsonrpc-codegen +// Automatically generated at 2023-05-10 14:43:37 by vpnserver-jsonrpc-codegen // // Licensed under the Apache License 2.0 -// Copyright (c) 2014-2019 SoftEther VPN Project +// Copyright (c) 2014-2023 SoftEther VPN Project using System.Threading.Tasks; using SoftEther.JsonRpc; @@ -1357,22 +1357,22 @@ namespace SoftEther.VPNServerRpc /// /// Get the Proxy Settings for Connecting to the DDNS server (Async mode). /// - public async Task GetDDnsInternetSettngAsync() => await CallAsync("GetDDnsInternetSettng", new VpnInternetSetting()); + public async Task GetDDnsInternetSettingAsync() => await CallAsync("GetDDnsInternetSetting", new VpnInternetSetting()); /// /// Get the Proxy Settings for Connecting to the DDNS server (Async mode). /// - public VpnInternetSetting GetDDnsInternetSettng() => GetDDnsInternetSettngAsync().Result; + public VpnInternetSetting GetDDnsInternetSetting() => GetDDnsInternetSettingAsync().Result; /// /// Set the Proxy Settings for Connecting to the DDNS server (Async mode). /// - public async Task SetDDnsInternetSettngAsync(VpnInternetSetting input_param) => await CallAsync("SetDDnsInternetSettng", input_param); + public async Task SetDDnsInternetSettingAsync(VpnInternetSetting input_param) => await CallAsync("SetDDnsInternetSetting", input_param); /// /// Set the Proxy Settings for Connecting to the DDNS server (Sync mode). /// - public VpnInternetSetting SetDDnsInternetSettng(VpnInternetSetting input_param) => SetDDnsInternetSettngAsync(input_param).Result; + public VpnInternetSetting SetDDnsInternetSetting(VpnInternetSetting input_param) => SetDDnsInternetSettingAsync(input_param).Result; /// /// Set the VPN Gate Server Configuration (Async mode). This API is valid for Win32 binary distribution of the Stable Edition of SoftEther VPN Server. diff --git a/developer_tools/vpnserver-jsonrpc-clients/vpnserver-jsonrpc-client-csharp/rpc-stubs/VPNServerRpcTypes.cs b/developer_tools/vpnserver-jsonrpc-clients/vpnserver-jsonrpc-client-csharp/rpc-stubs/VPNServerRpcTypes.cs index 27f224cf..995228b9 100644 --- a/developer_tools/vpnserver-jsonrpc-clients/vpnserver-jsonrpc-client-csharp/rpc-stubs/VPNServerRpcTypes.cs +++ b/developer_tools/vpnserver-jsonrpc-clients/vpnserver-jsonrpc-client-csharp/rpc-stubs/VPNServerRpcTypes.cs @@ -2,10 +2,10 @@ // // VPNServerRpcTypes.cs - Data Type Definition for SoftEther VPN Server JSON-RPC Stubs // -// Automatically generated at 2019-07-10 14:36:11 by vpnserver-jsonrpc-codegen +// Automatically generated at 2023-05-10 14:43:37 by vpnserver-jsonrpc-codegen // // Licensed under the Apache License 2.0 -// Copyright (c) 2014-2019 SoftEther VPN Project +// Copyright (c) 2014-2023 SoftEther VPN Project using System; using Newtonsoft.Json; diff --git a/developer_tools/vpnserver-jsonrpc-clients/vpnserver-jsonrpc-client-csharp/sample/Main.cs b/developer_tools/vpnserver-jsonrpc-clients/vpnserver-jsonrpc-client-csharp/sample/Main.cs index 1021e12b..14d01937 100644 --- a/developer_tools/vpnserver-jsonrpc-clients/vpnserver-jsonrpc-client-csharp/sample/Main.cs +++ b/developer_tools/vpnserver-jsonrpc-clients/vpnserver-jsonrpc-client-csharp/sample/Main.cs @@ -2,10 +2,10 @@ // // Program.cs - The Main() entry point // -// Automatically generated at 2019-07-10 14:36:11 by vpnserver-jsonrpc-codegen +// Automatically generated at 2023-05-10 14:43:37 by vpnserver-jsonrpc-codegen // // Licensed under the Apache License 2.0 -// Copyright (c) 2014-2019 SoftEther VPN Project +// Copyright (c) 2014-2023 SoftEther VPN Project class Program { diff --git a/developer_tools/vpnserver-jsonrpc-clients/vpnserver-jsonrpc-client-csharp/sample/VpnServerRpcTest.cs b/developer_tools/vpnserver-jsonrpc-clients/vpnserver-jsonrpc-client-csharp/sample/VpnServerRpcTest.cs index d9ab15f3..8bb9c52a 100644 --- a/developer_tools/vpnserver-jsonrpc-clients/vpnserver-jsonrpc-client-csharp/sample/VpnServerRpcTest.cs +++ b/developer_tools/vpnserver-jsonrpc-clients/vpnserver-jsonrpc-client-csharp/sample/VpnServerRpcTest.cs @@ -5,10 +5,10 @@ // This sample code shows how to call all available RPC functions. // You can copy and paste test code to write your own C# codes. // -// Automatically generated at 2019-07-10 14:36:11 by vpnserver-jsonrpc-codegen +// Automatically generated at 2023-05-10 14:43:37 by vpnserver-jsonrpc-codegen // // Licensed under the Apache License 2.0 -// Copyright (c) 2014-2019 SoftEther VPN Project +// Copyright (c) 2014-2023 SoftEther VPN Project using System; using SoftEther.VPNServerRpc; @@ -255,8 +255,8 @@ class VPNRPCTest Test_GetOpenVpnSstpConfig(); Test_GetDDnsClientStatus(); - Test_SetDDnsInternetSettng(); - Test_GetDDnsInternetSettng(); + Test_SetDDnsInternetSetting(); + Test_GetDDnsInternetSetting(); Test_ChangeDDnsClientHostname(); Test_RegenerateServerCert(); @@ -3641,27 +3641,27 @@ class VPNRPCTest } /// - /// API test for 'GetDDnsInternetSettng', Get DDNS proxy configuration + /// API test for 'GetDDnsInternetSetting', Get DDNS proxy configuration /// - public void Test_GetDDnsInternetSettng() + public void Test_GetDDnsInternetSetting() { - Console.WriteLine("Begin: Test_GetDDnsInternetSettng"); + Console.WriteLine("Begin: Test_GetDDnsInternetSetting"); - VpnInternetSetting out_internet_setting = api.GetDDnsInternetSettng(); + VpnInternetSetting out_internet_setting = api.GetDDnsInternetSetting(); print_object(out_internet_setting); - Console.WriteLine("End: Test_GetDDnsInternetSettng"); + Console.WriteLine("End: Test_GetDDnsInternetSetting"); Console.WriteLine("-----"); Console.WriteLine(); } /// - /// API test for 'SetDDnsInternetSettng', Set DDNS proxy configuration + /// API test for 'SetDDnsInternetSetting', Set DDNS proxy configuration /// - public void Test_SetDDnsInternetSettng() + public void Test_SetDDnsInternetSetting() { - Console.WriteLine("Begin: Test_SetDDnsInternetSettng"); + Console.WriteLine("Begin: Test_SetDDnsInternetSetting"); VpnInternetSetting in_internet_setting = new VpnInternetSetting() { @@ -3671,11 +3671,11 @@ class VPNRPCTest ProxyUsername_str = "neko", ProxyPassword_str = "dog", }; - VpnInternetSetting out_internet_setting = api.SetDDnsInternetSettng(in_internet_setting); + VpnInternetSetting out_internet_setting = api.SetDDnsInternetSetting(in_internet_setting); print_object(out_internet_setting); - Console.WriteLine("End: Test_SetDDnsInternetSettng"); + Console.WriteLine("End: Test_SetDDnsInternetSetting"); Console.WriteLine("-----"); Console.WriteLine(); } diff --git a/developer_tools/vpnserver-jsonrpc-clients/vpnserver-jsonrpc-client-nodejs-package/dist/sample.js b/developer_tools/vpnserver-jsonrpc-clients/vpnserver-jsonrpc-client-nodejs-package/dist/sample.js index dd3db357..4cf85de6 100644 --- a/developer_tools/vpnserver-jsonrpc-clients/vpnserver-jsonrpc-client-nodejs-package/dist/sample.js +++ b/developer_tools/vpnserver-jsonrpc-clients/vpnserver-jsonrpc-client-nodejs-package/dist/sample.js @@ -560,10 +560,10 @@ function Test_All() { return [4 /*yield*/, Test_GetDDnsClientStatus()]; case 157: _x.sent(); - return [4 /*yield*/, Test_SetDDnsInternetSettng()]; + return [4 /*yield*/, Test_SetDDnsInternetSetting()]; case 158: _x.sent(); - return [4 /*yield*/, Test_GetDDnsInternetSettng()]; + return [4 /*yield*/, Test_GetDDnsInternetSetting()]; case 159: _x.sent(); return [4 /*yield*/, Test_ChangeDDnsClientHostname()]; @@ -4047,19 +4047,19 @@ function Test_SetAzureStatus() { }); }); } -/** API test for 'GetDDnsInternetSettng', Get DDNS proxy configuration */ -function Test_GetDDnsInternetSettng() { +/** API test for 'GetDDnsInternetSetting', Get DDNS proxy configuration */ +function Test_GetDDnsInternetSetting() { return __awaiter(this, void 0, void 0, function () { var out_internet_setting; return __generator(this, function (_a) { switch (_a.label) { case 0: - console.log("Begin: Test_GetDDnsInternetSettng"); - return [4 /*yield*/, api.GetDDnsInternetSettng()]; + console.log("Begin: Test_GetDDnsInternetSetting"); + return [4 /*yield*/, api.GetDDnsInternetSetting()]; case 1: out_internet_setting = _a.sent(); console.log(out_internet_setting); - console.log("End: Test_GetDDnsInternetSettng"); + console.log("End: Test_GetDDnsInternetSetting"); console.log("-----"); console.log(); return [2 /*return*/]; @@ -4067,14 +4067,14 @@ function Test_GetDDnsInternetSettng() { }); }); } -/** API test for 'SetDDnsInternetSettng', Set DDNS proxy configuration */ -function Test_SetDDnsInternetSettng() { +/** API test for 'SetDDnsInternetSetting', Set DDNS proxy configuration */ +function Test_SetDDnsInternetSetting() { return __awaiter(this, void 0, void 0, function () { var in_internet_setting, out_internet_setting; return __generator(this, function (_a) { switch (_a.label) { case 0: - console.log("Begin: Test_SetDDnsInternetSettng"); + console.log("Begin: Test_SetDDnsInternetSetting"); in_internet_setting = new VPN.VpnInternetSetting({ ProxyType_u32: VPN.VpnRpcProxyType.Direct, ProxyHostName_str: "1.2.3.4", @@ -4082,11 +4082,11 @@ function Test_SetDDnsInternetSettng() { ProxyUsername_str: "neko", ProxyPassword_str: "dog" }); - return [4 /*yield*/, api.SetDDnsInternetSettng(in_internet_setting)]; + return [4 /*yield*/, api.SetDDnsInternetSetting(in_internet_setting)]; case 1: out_internet_setting = _a.sent(); console.log(out_internet_setting); - console.log("End: Test_SetDDnsInternetSettng"); + console.log("End: Test_SetDDnsInternetSetting"); console.log("-----"); console.log(); return [2 /*return*/]; diff --git a/developer_tools/vpnserver-jsonrpc-clients/vpnserver-jsonrpc-client-nodejs-package/dist/vpnrpc.d.ts b/developer_tools/vpnserver-jsonrpc-clients/vpnserver-jsonrpc-client-nodejs-package/dist/vpnrpc.d.ts index 6b839ce9..9ccc0ae9 100644 --- a/developer_tools/vpnserver-jsonrpc-clients/vpnserver-jsonrpc-client-nodejs-package/dist/vpnrpc.d.ts +++ b/developer_tools/vpnserver-jsonrpc-clients/vpnserver-jsonrpc-client-nodejs-package/dist/vpnrpc.d.ts @@ -278,9 +278,9 @@ export declare class VpnServerRpc { /** Enable / Disable VPN Azure Function. Enable or disable the VPN Azure function. VPN Azure makes it easier to establish a VPN Session from your home PC to your office PC. While a VPN connection is established, you can access to any other servers on the private network of your company. You don't need a global IP address on the office PC (VPN Server). It can work behind firewalls or NATs. No network administrator's configuration required. You can use the built-in SSTP-VPN Client of Windows in your home PC. VPN Azure is a cloud VPN service operated by SoftEther Corporation. VPN Azure is free of charge and available to anyone. Visit http://www.vpnazure.net/ to see details and how-to-use instructions. The VPN Azure hostname is same to the hostname of the Dynamic DNS setting, but altering the domain suffix to "vpnazure.net". To change the hostname use the ChangeDDnsClientHostname API. To call this API, you must have VPN Server administrator privileges. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */ SetAzureStatus: (in_param: VpnRpcAzureStatus) => Promise; /** Get the Proxy Settings for Connecting to the DDNS server. */ - GetDDnsInternetSettng: () => Promise; + GetDDnsInternetSetting: () => Promise; /** Set the Proxy Settings for Connecting to the DDNS server. */ - SetDDnsInternetSettng: (in_param: VpnInternetSetting) => Promise; + SetDDnsInternetSetting: (in_param: VpnInternetSetting) => Promise; /** Set the VPN Gate Server Configuration. This API is valid for Win32 binary distribution of the Stable Edition of SoftEther VPN Server. */ SetVgsConfig: (in_param: VpnVgsConfig) => Promise; /** Get the VPN Gate Server Configuration. This API is valid for Win32 binary distribution of the Stable Edition of SoftEther VPN Server. */ diff --git a/developer_tools/vpnserver-jsonrpc-clients/vpnserver-jsonrpc-client-nodejs-package/dist/vpnrpc.js b/developer_tools/vpnserver-jsonrpc-clients/vpnserver-jsonrpc-client-nodejs-package/dist/vpnrpc.js index eac8ab09..8dc8ea70 100644 --- a/developer_tools/vpnserver-jsonrpc-clients/vpnserver-jsonrpc-client-nodejs-package/dist/vpnrpc.js +++ b/developer_tools/vpnserver-jsonrpc-clients/vpnserver-jsonrpc-client-nodejs-package/dist/vpnrpc.js @@ -599,12 +599,12 @@ var VpnServerRpc = /** @class */ (function () { return _this.CallAsync("SetAzureStatus", in_param); }; /** Get the Proxy Settings for Connecting to the DDNS server. */ - this.GetDDnsInternetSettng = function () { - return _this.CallAsync("GetDDnsInternetSettng", new VpnInternetSetting()); + this.GetDDnsInternetSetting = function () { + return _this.CallAsync("GetDDnsInternetSetting", new VpnInternetSetting()); }; /** Set the Proxy Settings for Connecting to the DDNS server. */ - this.SetDDnsInternetSettng = function (in_param) { - return _this.CallAsync("SetDDnsInternetSettng", in_param); + this.SetDDnsInternetSetting = function (in_param) { + return _this.CallAsync("SetDDnsInternetSetting", in_param); }; /** Set the VPN Gate Server Configuration. This API is valid for Win32 binary distribution of the Stable Edition of SoftEther VPN Server. */ this.SetVgsConfig = function (in_param) { diff --git a/developer_tools/vpnserver-jsonrpc-clients/vpnserver-jsonrpc-client-nodejs-package/src/sample.ts b/developer_tools/vpnserver-jsonrpc-clients/vpnserver-jsonrpc-client-nodejs-package/src/sample.ts index ddb69314..ec8e8568 100644 --- a/developer_tools/vpnserver-jsonrpc-clients/vpnserver-jsonrpc-client-nodejs-package/src/sample.ts +++ b/developer_tools/vpnserver-jsonrpc-clients/vpnserver-jsonrpc-client-nodejs-package/src/sample.ts @@ -2,13 +2,13 @@ // Runs on both web browsers and Node.js // // sample.ts -// Automatically generated at 2019-07-10 14:36:11 by vpnserver-jsonrpc-codegen +// Automatically generated at 2023-05-10 14:43:37 by vpnserver-jsonrpc-codegen // // This sample code shows how to call all available RPC functions. // You can copy and paste test code to write your own web browser TypeScript / JavaScript codes. // // Licensed under the Apache License 2.0 -// Copyright (c) 2014-2019 SoftEther VPN Project +// Copyright (c) 2014-2023 SoftEther VPN Project // On the web browser uncomment below imports as necessary to support old browsers. // import "core-js/es6/promise"; @@ -216,8 +216,8 @@ async function Test_All(): Promise await Test_SetOpenVpnSstpConfig(); await Test_GetOpenVpnSstpConfig(); await Test_GetDDnsClientStatus(); - await Test_SetDDnsInternetSettng(); - await Test_GetDDnsInternetSettng(); + await Test_SetDDnsInternetSetting(); + await Test_GetDDnsInternetSetting(); await Test_ChangeDDnsClientHostname(); await Test_RegenerateServerCert(); await Test_MakeOpenVpnConfigFile(); @@ -2624,21 +2624,21 @@ async function Test_SetAzureStatus(): Promise console.log(); } -/** API test for 'GetDDnsInternetSettng', Get DDNS proxy configuration */ -async function Test_GetDDnsInternetSettng(): Promise +/** API test for 'GetDDnsInternetSetting', Get DDNS proxy configuration */ +async function Test_GetDDnsInternetSetting(): Promise { - console.log("Begin: Test_GetDDnsInternetSettng"); - let out_internet_setting: VPN.VpnInternetSetting = await api.GetDDnsInternetSettng(); + console.log("Begin: Test_GetDDnsInternetSetting"); + let out_internet_setting: VPN.VpnInternetSetting = await api.GetDDnsInternetSetting(); console.log(out_internet_setting); - console.log("End: Test_GetDDnsInternetSettng"); + console.log("End: Test_GetDDnsInternetSetting"); console.log("-----"); console.log(); } -/** API test for 'SetDDnsInternetSettng', Set DDNS proxy configuration */ -async function Test_SetDDnsInternetSettng(): Promise +/** API test for 'SetDDnsInternetSetting', Set DDNS proxy configuration */ +async function Test_SetDDnsInternetSetting(): Promise { - console.log("Begin: Test_SetDDnsInternetSettng"); + console.log("Begin: Test_SetDDnsInternetSetting"); let in_internet_setting: VPN.VpnInternetSetting = new VPN.VpnInternetSetting( { ProxyType_u32: VPN.VpnRpcProxyType.Direct, @@ -2647,9 +2647,9 @@ async function Test_SetDDnsInternetSettng(): Promise ProxyUsername_str: "neko", ProxyPassword_str: "dog", }); - let out_internet_setting: VPN.VpnInternetSetting = await api.SetDDnsInternetSettng(in_internet_setting); + let out_internet_setting: VPN.VpnInternetSetting = await api.SetDDnsInternetSetting(in_internet_setting); console.log(out_internet_setting); - console.log("End: Test_SetDDnsInternetSettng"); + console.log("End: Test_SetDDnsInternetSetting"); console.log("-----"); console.log(); } diff --git a/developer_tools/vpnserver-jsonrpc-clients/vpnserver-jsonrpc-client-nodejs-package/src/vpnrpc.ts b/developer_tools/vpnserver-jsonrpc-clients/vpnserver-jsonrpc-client-nodejs-package/src/vpnrpc.ts index 1774bbd6..552f62bf 100644 --- a/developer_tools/vpnserver-jsonrpc-clients/vpnserver-jsonrpc-client-nodejs-package/src/vpnrpc.ts +++ b/developer_tools/vpnserver-jsonrpc-clients/vpnserver-jsonrpc-client-nodejs-package/src/vpnrpc.ts @@ -1,10 +1,10 @@ // SoftEther VPN Server JSON-RPC Stub code for TypeScript // // vpnrpc.ts -// Automatically generated at 2019-07-10 14:36:11 by vpnserver-jsonrpc-codegen +// Automatically generated at 2023-05-10 14:43:37 by vpnserver-jsonrpc-codegen // // Licensed under the Apache License 2.0 -// Copyright (c) 2014-2019 SoftEther VPN Project +// Copyright (c) 2014-2023 SoftEther VPN Project // Trivial utility codes @@ -856,15 +856,15 @@ export class VpnServerRpc } /** Get the Proxy Settings for Connecting to the DDNS server. */ - public GetDDnsInternetSettng = (): Promise => + public GetDDnsInternetSetting = (): Promise => { - return this.CallAsync("GetDDnsInternetSettng", new VpnInternetSetting()); + return this.CallAsync("GetDDnsInternetSetting", new VpnInternetSetting()); } /** Set the Proxy Settings for Connecting to the DDNS server. */ - public SetDDnsInternetSettng = (in_param: VpnInternetSetting): Promise => + public SetDDnsInternetSetting = (in_param: VpnInternetSetting): Promise => { - return this.CallAsync("SetDDnsInternetSettng", in_param); + return this.CallAsync("SetDDnsInternetSetting", in_param); } /** Set the VPN Gate Server Configuration. This API is valid for Win32 binary distribution of the Stable Edition of SoftEther VPN Server. */ diff --git a/developer_tools/vpnserver-jsonrpc-clients/vpnserver-jsonrpc-client-typescript/sample.ts b/developer_tools/vpnserver-jsonrpc-clients/vpnserver-jsonrpc-client-typescript/sample.ts index ddb69314..ec8e8568 100644 --- a/developer_tools/vpnserver-jsonrpc-clients/vpnserver-jsonrpc-client-typescript/sample.ts +++ b/developer_tools/vpnserver-jsonrpc-clients/vpnserver-jsonrpc-client-typescript/sample.ts @@ -2,13 +2,13 @@ // Runs on both web browsers and Node.js // // sample.ts -// Automatically generated at 2019-07-10 14:36:11 by vpnserver-jsonrpc-codegen +// Automatically generated at 2023-05-10 14:43:37 by vpnserver-jsonrpc-codegen // // This sample code shows how to call all available RPC functions. // You can copy and paste test code to write your own web browser TypeScript / JavaScript codes. // // Licensed under the Apache License 2.0 -// Copyright (c) 2014-2019 SoftEther VPN Project +// Copyright (c) 2014-2023 SoftEther VPN Project // On the web browser uncomment below imports as necessary to support old browsers. // import "core-js/es6/promise"; @@ -216,8 +216,8 @@ async function Test_All(): Promise await Test_SetOpenVpnSstpConfig(); await Test_GetOpenVpnSstpConfig(); await Test_GetDDnsClientStatus(); - await Test_SetDDnsInternetSettng(); - await Test_GetDDnsInternetSettng(); + await Test_SetDDnsInternetSetting(); + await Test_GetDDnsInternetSetting(); await Test_ChangeDDnsClientHostname(); await Test_RegenerateServerCert(); await Test_MakeOpenVpnConfigFile(); @@ -2624,21 +2624,21 @@ async function Test_SetAzureStatus(): Promise console.log(); } -/** API test for 'GetDDnsInternetSettng', Get DDNS proxy configuration */ -async function Test_GetDDnsInternetSettng(): Promise +/** API test for 'GetDDnsInternetSetting', Get DDNS proxy configuration */ +async function Test_GetDDnsInternetSetting(): Promise { - console.log("Begin: Test_GetDDnsInternetSettng"); - let out_internet_setting: VPN.VpnInternetSetting = await api.GetDDnsInternetSettng(); + console.log("Begin: Test_GetDDnsInternetSetting"); + let out_internet_setting: VPN.VpnInternetSetting = await api.GetDDnsInternetSetting(); console.log(out_internet_setting); - console.log("End: Test_GetDDnsInternetSettng"); + console.log("End: Test_GetDDnsInternetSetting"); console.log("-----"); console.log(); } -/** API test for 'SetDDnsInternetSettng', Set DDNS proxy configuration */ -async function Test_SetDDnsInternetSettng(): Promise +/** API test for 'SetDDnsInternetSetting', Set DDNS proxy configuration */ +async function Test_SetDDnsInternetSetting(): Promise { - console.log("Begin: Test_SetDDnsInternetSettng"); + console.log("Begin: Test_SetDDnsInternetSetting"); let in_internet_setting: VPN.VpnInternetSetting = new VPN.VpnInternetSetting( { ProxyType_u32: VPN.VpnRpcProxyType.Direct, @@ -2647,9 +2647,9 @@ async function Test_SetDDnsInternetSettng(): Promise ProxyUsername_str: "neko", ProxyPassword_str: "dog", }); - let out_internet_setting: VPN.VpnInternetSetting = await api.SetDDnsInternetSettng(in_internet_setting); + let out_internet_setting: VPN.VpnInternetSetting = await api.SetDDnsInternetSetting(in_internet_setting); console.log(out_internet_setting); - console.log("End: Test_SetDDnsInternetSettng"); + console.log("End: Test_SetDDnsInternetSetting"); console.log("-----"); console.log(); } diff --git a/developer_tools/vpnserver-jsonrpc-clients/vpnserver-jsonrpc-client-typescript/vpnrpc.ts b/developer_tools/vpnserver-jsonrpc-clients/vpnserver-jsonrpc-client-typescript/vpnrpc.ts index 1774bbd6..552f62bf 100644 --- a/developer_tools/vpnserver-jsonrpc-clients/vpnserver-jsonrpc-client-typescript/vpnrpc.ts +++ b/developer_tools/vpnserver-jsonrpc-clients/vpnserver-jsonrpc-client-typescript/vpnrpc.ts @@ -1,10 +1,10 @@ // SoftEther VPN Server JSON-RPC Stub code for TypeScript // // vpnrpc.ts -// Automatically generated at 2019-07-10 14:36:11 by vpnserver-jsonrpc-codegen +// Automatically generated at 2023-05-10 14:43:37 by vpnserver-jsonrpc-codegen // // Licensed under the Apache License 2.0 -// Copyright (c) 2014-2019 SoftEther VPN Project +// Copyright (c) 2014-2023 SoftEther VPN Project // Trivial utility codes @@ -856,15 +856,15 @@ export class VpnServerRpc } /** Get the Proxy Settings for Connecting to the DDNS server. */ - public GetDDnsInternetSettng = (): Promise => + public GetDDnsInternetSetting = (): Promise => { - return this.CallAsync("GetDDnsInternetSettng", new VpnInternetSetting()); + return this.CallAsync("GetDDnsInternetSetting", new VpnInternetSetting()); } /** Set the Proxy Settings for Connecting to the DDNS server. */ - public SetDDnsInternetSettng = (in_param: VpnInternetSetting): Promise => + public SetDDnsInternetSetting = (in_param: VpnInternetSetting): Promise => { - return this.CallAsync("SetDDnsInternetSettng", in_param); + return this.CallAsync("SetDDnsInternetSetting", in_param); } /** Set the VPN Gate Server Configuration. This API is valid for Win32 binary distribution of the Stable Edition of SoftEther VPN Server. */ diff --git a/developer_tools/vpnserver-jsonrpc-codegen/VpnServerRpc/VPNServerRpc.cs b/developer_tools/vpnserver-jsonrpc-codegen/VpnServerRpc/VPNServerRpc.cs index 63da0e6d..06e06658 100644 --- a/developer_tools/vpnserver-jsonrpc-codegen/VpnServerRpc/VPNServerRpc.cs +++ b/developer_tools/vpnserver-jsonrpc-codegen/VpnServerRpc/VPNServerRpc.cs @@ -1357,22 +1357,22 @@ namespace SoftEther.VPNServerRpc /// /// Get the Proxy Settings for Connecting to the DDNS server (Async mode). /// - public async Task GetDDnsInternetSettngAsync() => await CallAsync("GetDDnsInternetSettng", new VpnInternetSetting()); + public async Task GetDDnsInternetSettingAsync() => await CallAsync("GetDDnsInternetSetting", new VpnInternetSetting()); /// /// Get the Proxy Settings for Connecting to the DDNS server (Async mode). /// - public VpnInternetSetting GetDDnsInternetSettng() => GetDDnsInternetSettngAsync().Result; + public VpnInternetSetting GetDDnsInternetSetting() => GetDDnsInternetSettingAsync().Result; /// /// Set the Proxy Settings for Connecting to the DDNS server (Async mode). /// - public async Task SetDDnsInternetSettngAsync(VpnInternetSetting input_param) => await CallAsync("SetDDnsInternetSettng", input_param); + public async Task SetDDnsInternetSettingAsync(VpnInternetSetting input_param) => await CallAsync("SetDDnsInternetSetting", input_param); /// /// Set the Proxy Settings for Connecting to the DDNS server (Sync mode). /// - public VpnInternetSetting SetDDnsInternetSettng(VpnInternetSetting input_param) => SetDDnsInternetSettngAsync(input_param).Result; + public VpnInternetSetting SetDDnsInternetSetting(VpnInternetSetting input_param) => SetDDnsInternetSettingAsync(input_param).Result; /// /// Set the VPN Gate Server Configuration (Async mode). This API is valid for Win32 binary distribution of the Stable Edition of SoftEther VPN Server. diff --git a/developer_tools/vpnserver-jsonrpc-codegen/VpnServerRpcTest/VpnServerRpcTest.cs b/developer_tools/vpnserver-jsonrpc-codegen/VpnServerRpcTest/VpnServerRpcTest.cs index b407750f..a3fe751b 100644 --- a/developer_tools/vpnserver-jsonrpc-codegen/VpnServerRpcTest/VpnServerRpcTest.cs +++ b/developer_tools/vpnserver-jsonrpc-codegen/VpnServerRpcTest/VpnServerRpcTest.cs @@ -255,8 +255,8 @@ class VPNRPCTest Test_GetOpenVpnSstpConfig(); Test_GetDDnsClientStatus(); - Test_SetDDnsInternetSettng(); - Test_GetDDnsInternetSettng(); + Test_SetDDnsInternetSetting(); + Test_GetDDnsInternetSetting(); Test_ChangeDDnsClientHostname(); Test_RegenerateServerCert(); @@ -3641,27 +3641,27 @@ class VPNRPCTest } /// - /// API test for 'GetDDnsInternetSettng', Get DDNS proxy configuration + /// API test for 'GetDDnsInternetSetting', Get DDNS proxy configuration /// - public void Test_GetDDnsInternetSettng() + public void Test_GetDDnsInternetSetting() { - Console.WriteLine("Begin: Test_GetDDnsInternetSettng"); + Console.WriteLine("Begin: Test_GetDDnsInternetSetting"); - VpnInternetSetting out_internet_setting = api.GetDDnsInternetSettng(); + VpnInternetSetting out_internet_setting = api.GetDDnsInternetSetting(); print_object(out_internet_setting); - Console.WriteLine("End: Test_GetDDnsInternetSettng"); + Console.WriteLine("End: Test_GetDDnsInternetSetting"); Console.WriteLine("-----"); Console.WriteLine(); } /// - /// API test for 'SetDDnsInternetSettng', Set DDNS proxy configuration + /// API test for 'SetDDnsInternetSetting', Set DDNS proxy configuration /// - public void Test_SetDDnsInternetSettng() + public void Test_SetDDnsInternetSetting() { - Console.WriteLine("Begin: Test_SetDDnsInternetSettng"); + Console.WriteLine("Begin: Test_SetDDnsInternetSetting"); VpnInternetSetting in_internet_setting = new VpnInternetSetting() { @@ -3671,11 +3671,11 @@ class VPNRPCTest ProxyUsername_str = "neko", ProxyPassword_str = "dog", }; - VpnInternetSetting out_internet_setting = api.SetDDnsInternetSettng(in_internet_setting); + VpnInternetSetting out_internet_setting = api.SetDDnsInternetSetting(in_internet_setting); print_object(out_internet_setting); - Console.WriteLine("End: Test_SetDDnsInternetSettng"); + Console.WriteLine("End: Test_SetDDnsInternetSetting"); Console.WriteLine("-----"); Console.WriteLine(); } diff --git a/src/Cedar/Admin.c b/src/Cedar/Admin.c index 85f9bd9b..db14932e 100644 --- a/src/Cedar/Admin.c +++ b/src/Cedar/Admin.c @@ -1644,8 +1644,8 @@ PACK *AdminDispatch(RPC *rpc, char *name, PACK *p) DECLARE_RPC("GetSpecialListener", RPC_SPECIAL_LISTENER, StGetSpecialListener, InRpcSpecialListener, OutRpcSpecialListener) DECLARE_RPC("GetAzureStatus", RPC_AZURE_STATUS, StGetAzureStatus, InRpcAzureStatus, OutRpcAzureStatus) DECLARE_RPC("SetAzureStatus", RPC_AZURE_STATUS, StSetAzureStatus, InRpcAzureStatus, OutRpcAzureStatus) - DECLARE_RPC("GetDDnsInternetSettng", INTERNET_SETTING, StGetDDnsInternetSetting, InRpcInternetSetting, OutRpcInternetSetting) - DECLARE_RPC("SetDDnsInternetSettng", INTERNET_SETTING, StSetDDnsInternetSetting, InRpcInternetSetting, OutRpcInternetSetting) + DECLARE_RPC("GetDDnsInternetSetting", INTERNET_SETTING, StGetDDnsInternetSetting, InRpcInternetSetting, OutRpcInternetSetting) + DECLARE_RPC("SetDDnsInternetSetting", INTERNET_SETTING, StSetDDnsInternetSetting, InRpcInternetSetting, OutRpcInternetSetting) // RPC function declaration: till here @@ -1831,8 +1831,8 @@ DECLARE_SC("SetSpecialListener", RPC_SPECIAL_LISTENER, ScSetSpecialListener, InR DECLARE_SC("GetSpecialListener", RPC_SPECIAL_LISTENER, ScGetSpecialListener, InRpcSpecialListener, OutRpcSpecialListener) DECLARE_SC("GetAzureStatus", RPC_AZURE_STATUS, ScGetAzureStatus, InRpcAzureStatus, OutRpcAzureStatus) DECLARE_SC("SetAzureStatus", RPC_AZURE_STATUS, ScSetAzureStatus, InRpcAzureStatus, OutRpcAzureStatus) -DECLARE_SC("GetDDnsInternetSettng", INTERNET_SETTING, ScGetDDnsInternetSetting, InRpcInternetSetting, OutRpcInternetSetting) -DECLARE_SC("SetDDnsInternetSettng", INTERNET_SETTING, ScSetDDnsInternetSetting, InRpcInternetSetting, OutRpcInternetSetting) +DECLARE_SC("GetDDnsInternetSetting", INTERNET_SETTING, ScGetDDnsInternetSetting, InRpcInternetSetting, OutRpcInternetSetting) +DECLARE_SC("SetDDnsInternetSetting", INTERNET_SETTING, ScSetDDnsInternetSetting, InRpcInternetSetting, OutRpcInternetSetting) // RPC call function declaration: till here // Setting VPN Gate Server Configuration diff --git a/src/bin/hamcore/vpnserver_api_doc.html b/src/bin/hamcore/vpnserver_api_doc.html index 1735667e..cfd3926d 100644 --- a/src/bin/hamcore/vpnserver_api_doc.html +++ b/src/bin/hamcore/vpnserver_api_doc.html @@ -216,8 +216,8 @@ All APIs are based on the JSON-R
  • GetSpecialListener - Get Current Setting of the VPN over ICMP / VPN over DNS Function
  • GetAzureStatus - Show the current status of VPN Azure function
  • SetAzureStatus - Enable / Disable VPN Azure Function
  • -
  • GetDDnsInternetSettng - Get the Proxy Settings for Connecting to the DDNS server
  • -
  • SetDDnsInternetSettng - Set the Proxy Settings for Connecting to the DDNS server
  • +
  • GetDDnsInternetSetting - Get the Proxy Settings for Connecting to the DDNS server
  • +
  • SetDDnsInternetSetting - Set the Proxy Settings for Connecting to the DDNS server
  • SetVgsConfig - Set the VPN Gate Server Configuration
  • GetVgsConfig - Get the VPN Gate Server Configuration
  • @@ -305,7 +305,7 @@ All APIs are based on the JSON-R "ServerBuildInt_u32": 0, "ServerHostName_str": "serverhostname", "ServerType_u32": 0, - "ServerBuildDate_dt": "2020-08-01T12:24:36.123", + "ServerBuildDate_dt": "2024-08-01T12:24:36.123", "ServerFamilyName_str": "serverfamilyname", "OsType_u32": 0, "OsServicePack_u32": 0, @@ -460,9 +460,9 @@ All APIs are based on the JSON-R "Send.BroadcastCount_u64": 0, "Send.UnicastBytes_u64": 0, "Send.UnicastCount_u64": 0, - "CurrentTime_dt": "2020-08-01T12:24:36.123", + "CurrentTime_dt": "2024-08-01T12:24:36.123", "CurrentTick_u64": 0, - "StartTime_dt": "2020-08-01T12:24:36.123", + "StartTime_dt": "2024-08-01T12:24:36.123", "TotalMemory_u64": 0, "UsedMemory_u64": 0, "FreeMemory_u64": 0, @@ -1136,7 +1136,7 @@ All APIs are based on the JSON-R "result": { "Id_u32": 0, "Controller_bool": false, - "ConnectedTime_dt": "2020-08-01T12:24:36.123", + "ConnectedTime_dt": "2024-08-01T12:24:36.123", "Ip_ip": "192.168.0.1", "Hostname_str": "hostname", "Point_u32": 0, @@ -1283,7 +1283,7 @@ All APIs are based on the JSON-R { "Id_u32": 0, "Controller_bool": false, - "ConnectedTime_dt": "2020-08-01T12:24:36.123", + "ConnectedTime_dt": "2024-08-01T12:24:36.123", "Ip_ip": "192.168.0.1", "Hostname_str": "hostname", "Point_u32": 0, @@ -1296,7 +1296,7 @@ All APIs are based on the JSON-R { "Id_u32": 0, "Controller_bool": false, - "ConnectedTime_dt": "2020-08-01T12:24:36.123", + "ConnectedTime_dt": "2024-08-01T12:24:36.123", "Ip_ip": "192.168.0.1", "Hostname_str": "hostname", "Point_u32": 0, @@ -1309,7 +1309,7 @@ All APIs are based on the JSON-R { "Id_u32": 0, "Controller_bool": false, - "ConnectedTime_dt": "2020-08-01T12:24:36.123", + "ConnectedTime_dt": "2024-08-01T12:24:36.123", "Ip_ip": "192.168.0.1", "Hostname_str": "hostname", "Point_u32": 0, @@ -1422,9 +1422,9 @@ All APIs are based on the JSON-R "Port_u32": 0, "Online_bool": false, "LastError_u32": 0, - "StartedTime_dt": "2020-08-01T12:24:36.123", - "FirstConnectedTime_dt": "2020-08-01T12:24:36.123", - "CurrentConnectedTime_dt": "2020-08-01T12:24:36.123", + "StartedTime_dt": "2024-08-01T12:24:36.123", + "FirstConnectedTime_dt": "2024-08-01T12:24:36.123", + "CurrentConnectedTime_dt": "2024-08-01T12:24:36.123", "NumTry_u32": 0, "NumConnected_u32": 0, "NumFailed_u32": 0 @@ -1918,9 +1918,9 @@ All APIs are based on the JSON-R "NumSessions_u32": 0, "NumMacTables_u32": 0, "NumIpTables_u32": 0, - "LastCommTime_dt": "2020-08-01T12:24:36.123", - "LastLoginTime_dt": "2020-08-01T12:24:36.123", - "CreatedTime_dt": "2020-08-01T12:24:36.123", + "LastCommTime_dt": "2024-08-01T12:24:36.123", + "LastLoginTime_dt": "2024-08-01T12:24:36.123", + "CreatedTime_dt": "2024-08-01T12:24:36.123", "NumLogin_u32": 0, "IsTrafficFilled_bool": false, "Ex.Recv.BroadcastBytes_u64": 0, @@ -1941,9 +1941,9 @@ All APIs are based on the JSON-R "NumSessions_u32": 0, "NumMacTables_u32": 0, "NumIpTables_u32": 0, - "LastCommTime_dt": "2020-08-01T12:24:36.123", - "LastLoginTime_dt": "2020-08-01T12:24:36.123", - "CreatedTime_dt": "2020-08-01T12:24:36.123", + "LastCommTime_dt": "2024-08-01T12:24:36.123", + "LastLoginTime_dt": "2024-08-01T12:24:36.123", + "CreatedTime_dt": "2024-08-01T12:24:36.123", "NumLogin_u32": 0, "IsTrafficFilled_bool": false, "Ex.Recv.BroadcastBytes_u64": 0, @@ -1964,9 +1964,9 @@ All APIs are based on the JSON-R "NumSessions_u32": 0, "NumMacTables_u32": 0, "NumIpTables_u32": 0, - "LastCommTime_dt": "2020-08-01T12:24:36.123", - "LastLoginTime_dt": "2020-08-01T12:24:36.123", - "CreatedTime_dt": "2020-08-01T12:24:36.123", + "LastCommTime_dt": "2024-08-01T12:24:36.123", + "LastLoginTime_dt": "2024-08-01T12:24:36.123", + "CreatedTime_dt": "2024-08-01T12:24:36.123", "NumLogin_u32": 0, "IsTrafficFilled_bool": false, "Ex.Recv.BroadcastBytes_u64": 0, @@ -2309,7 +2309,7 @@ All APIs are based on the JSON-R "Hostname_str": "hostname", "Ip_ip": "192.168.0.1", "Port_u32": 0, - "ConnectedTime_dt": "2020-08-01T12:24:36.123", + "ConnectedTime_dt": "2024-08-01T12:24:36.123", "Type_u32": 0 }, { @@ -2317,7 +2317,7 @@ All APIs are based on the JSON-R "Hostname_str": "hostname", "Ip_ip": "192.168.0.1", "Port_u32": 0, - "ConnectedTime_dt": "2020-08-01T12:24:36.123", + "ConnectedTime_dt": "2024-08-01T12:24:36.123", "Type_u32": 0 }, { @@ -2325,7 +2325,7 @@ All APIs are based on the JSON-R "Hostname_str": "hostname", "Ip_ip": "192.168.0.1", "Port_u32": 0, - "ConnectedTime_dt": "2020-08-01T12:24:36.123", + "ConnectedTime_dt": "2024-08-01T12:24:36.123", "Type_u32": 0 } ] @@ -2450,7 +2450,7 @@ All APIs are based on the JSON-R "Hostname_str": "hostname", "Ip_ip": "192.168.0.1", "Port_u32": 0, - "ConnectedTime_dt": "2020-08-01T12:24:36.123", + "ConnectedTime_dt": "2024-08-01T12:24:36.123", "ServerStr_str": "serverstr", "ServerVer_u32": 0, "ServerBuild_u32": 0, @@ -2620,9 +2620,9 @@ All APIs are based on the JSON-R "Send.UnicastBytes_u64": 0, "Send.UnicastCount_u64": 0, "SecureNATEnabled_bool": false, - "LastCommTime_dt": "2020-08-01T12:24:36.123", - "LastLoginTime_dt": "2020-08-01T12:24:36.123", - "CreatedTime_dt": "2020-08-01T12:24:36.123", + "LastCommTime_dt": "2024-08-01T12:24:36.123", + "LastLoginTime_dt": "2024-08-01T12:24:36.123", + "CreatedTime_dt": "2024-08-01T12:24:36.123", "NumLogin_u32": 0 } } @@ -2992,19 +2992,19 @@ All APIs are based on the JSON-R "Key_u32": 0, "SubjectName_utf": "subjectname", "IssuerName_utf": "issuername", - "Expires_dt": "2020-08-01T12:24:36.123" + "Expires_dt": "2024-08-01T12:24:36.123" }, { "Key_u32": 0, "SubjectName_utf": "subjectname", "IssuerName_utf": "issuername", - "Expires_dt": "2020-08-01T12:24:36.123" + "Expires_dt": "2024-08-01T12:24:36.123" }, { "Key_u32": 0, "SubjectName_utf": "subjectname", "IssuerName_utf": "issuername", - "Expires_dt": "2020-08-01T12:24:36.123" + "Expires_dt": "2024-08-01T12:24:36.123" } ] } @@ -4348,7 +4348,7 @@ All APIs are based on the JSON-R "Online_bool": false, "Connected_bool": false, "LastError_u32": 0, - "ConnectedTime_dt": "2020-08-01T12:24:36.123", + "ConnectedTime_dt": "2024-08-01T12:24:36.123", "Hostname_str": "hostname", "TargetHubName_str": "targethubname" }, @@ -4357,7 +4357,7 @@ All APIs are based on the JSON-R "Online_bool": false, "Connected_bool": false, "LastError_u32": 0, - "ConnectedTime_dt": "2020-08-01T12:24:36.123", + "ConnectedTime_dt": "2024-08-01T12:24:36.123", "Hostname_str": "hostname", "TargetHubName_str": "targethubname" }, @@ -4366,7 +4366,7 @@ All APIs are based on the JSON-R "Online_bool": false, "Connected_bool": false, "LastError_u32": 0, - "ConnectedTime_dt": "2020-08-01T12:24:36.123", + "ConnectedTime_dt": "2024-08-01T12:24:36.123", "Hostname_str": "hostname", "TargetHubName_str": "targethubname" } @@ -4668,9 +4668,9 @@ All APIs are based on the JSON-R "ServerProductBuild_u32": 0, "ServerX_bin": "SGVsbG8gV29ybGQ=", "ClientX_bin": "SGVsbG8gV29ybGQ=", - "StartTime_dt": "2020-08-01T12:24:36.123", - "FirstConnectionEstablisiedTime_dt": "2020-08-01T12:24:36.123", - "CurrentConnectionEstablishTime_dt": "2020-08-01T12:24:36.123", + "StartTime_dt": "2024-08-01T12:24:36.123", + "FirstConnectionEstablisiedTime_dt": "2024-08-01T12:24:36.123", + "CurrentConnectionEstablishTime_dt": "2024-08-01T12:24:36.123", "NumConnectionsEatablished_u32": 0, "HalfConnection_bool": false, "QoS_bool": false, @@ -5996,7 +5996,7 @@ All APIs are based on the JSON-R "Name_str": "name", "Realname_utf": "realname", "Note_utf": "note", - "ExpireTime_dt": "2020-08-01T12:24:36.123", + "ExpireTime_dt": "2024-08-01T12:24:36.123", "AuthType_u32": 0, "Auth_Password_str": "auth_password", "UserX_bin": "SGVsbG8gV29ybGQ=", @@ -6057,9 +6057,9 @@ All APIs are based on the JSON-R "GroupName_str": "groupname", "Realname_utf": "realname", "Note_utf": "note", - "CreatedTime_dt": "2020-08-01T12:24:36.123", - "UpdatedTime_dt": "2020-08-01T12:24:36.123", - "ExpireTime_dt": "2020-08-01T12:24:36.123", + "CreatedTime_dt": "2024-08-01T12:24:36.123", + "UpdatedTime_dt": "2024-08-01T12:24:36.123", + "ExpireTime_dt": "2024-08-01T12:24:36.123", "AuthType_u32": 0, "Auth_Password_str": "auth_password", "UserX_bin": "SGVsbG8gV29ybGQ=", @@ -6467,7 +6467,7 @@ All APIs are based on the JSON-R "GroupName_str": "groupname", "Realname_utf": "realname", "Note_utf": "note", - "ExpireTime_dt": "2020-08-01T12:24:36.123", + "ExpireTime_dt": "2024-08-01T12:24:36.123", "AuthType_u32": 0, "Auth_Password_str": "auth_password", "UserX_bin": "SGVsbG8gV29ybGQ=", @@ -6528,9 +6528,9 @@ All APIs are based on the JSON-R "GroupName_str": "groupname", "Realname_utf": "realname", "Note_utf": "note", - "CreatedTime_dt": "2020-08-01T12:24:36.123", - "UpdatedTime_dt": "2020-08-01T12:24:36.123", - "ExpireTime_dt": "2020-08-01T12:24:36.123", + "CreatedTime_dt": "2024-08-01T12:24:36.123", + "UpdatedTime_dt": "2024-08-01T12:24:36.123", + "ExpireTime_dt": "2024-08-01T12:24:36.123", "AuthType_u32": 0, "Auth_Password_str": "auth_password", "UserX_bin": "SGVsbG8gV29ybGQ=", @@ -6948,9 +6948,9 @@ All APIs are based on the JSON-R "GroupName_str": "groupname", "Realname_utf": "realname", "Note_utf": "note", - "CreatedTime_dt": "2020-08-01T12:24:36.123", - "UpdatedTime_dt": "2020-08-01T12:24:36.123", - "ExpireTime_dt": "2020-08-01T12:24:36.123", + "CreatedTime_dt": "2024-08-01T12:24:36.123", + "UpdatedTime_dt": "2024-08-01T12:24:36.123", + "ExpireTime_dt": "2024-08-01T12:24:36.123", "AuthType_u32": 0, "Auth_Password_str": "auth_password", "UserX_bin": "SGVsbG8gV29ybGQ=", @@ -7419,11 +7419,11 @@ All APIs are based on the JSON-R "Note_utf": "note", "AuthType_u32": 0, "NumLogin_u32": 0, - "LastLoginTime_dt": "2020-08-01T12:24:36.123", + "LastLoginTime_dt": "2024-08-01T12:24:36.123", "DenyAccess_bool": false, "IsTrafficFilled_bool": false, "IsExpiresFilled_bool": false, - "Expires_dt": "2020-08-01T12:24:36.123", + "Expires_dt": "2024-08-01T12:24:36.123", "Ex.Recv.BroadcastBytes_u64": 0, "Ex.Recv.BroadcastCount_u64": 0, "Ex.Recv.UnicastBytes_u64": 0, @@ -7440,11 +7440,11 @@ All APIs are based on the JSON-R "Note_utf": "note", "AuthType_u32": 0, "NumLogin_u32": 0, - "LastLoginTime_dt": "2020-08-01T12:24:36.123", + "LastLoginTime_dt": "2024-08-01T12:24:36.123", "DenyAccess_bool": false, "IsTrafficFilled_bool": false, "IsExpiresFilled_bool": false, - "Expires_dt": "2020-08-01T12:24:36.123", + "Expires_dt": "2024-08-01T12:24:36.123", "Ex.Recv.BroadcastBytes_u64": 0, "Ex.Recv.BroadcastCount_u64": 0, "Ex.Recv.UnicastBytes_u64": 0, @@ -7461,11 +7461,11 @@ All APIs are based on the JSON-R "Note_utf": "note", "AuthType_u32": 0, "NumLogin_u32": 0, - "LastLoginTime_dt": "2020-08-01T12:24:36.123", + "LastLoginTime_dt": "2024-08-01T12:24:36.123", "DenyAccess_bool": false, "IsTrafficFilled_bool": false, "IsExpiresFilled_bool": false, - "Expires_dt": "2020-08-01T12:24:36.123", + "Expires_dt": "2024-08-01T12:24:36.123", "Ex.Recv.BroadcastBytes_u64": 0, "Ex.Recv.BroadcastCount_u64": 0, "Ex.Recv.UnicastBytes_u64": 0, @@ -8907,8 +8907,8 @@ All APIs are based on the JSON-R "Client_MonitorMode_bool": false, "VLanId_u32": 0, "UniqueId_bin": "SGVsbG8gV29ybGQ=", - "CreatedTime_dt": "2020-08-01T12:24:36.123", - "LastCommTime_dt": "2020-08-01T12:24:36.123" + "CreatedTime_dt": "2024-08-01T12:24:36.123", + "LastCommTime_dt": "2024-08-01T12:24:36.123" }, { "Name_str": "name", @@ -8929,8 +8929,8 @@ All APIs are based on the JSON-R "Client_MonitorMode_bool": false, "VLanId_u32": 0, "UniqueId_bin": "SGVsbG8gV29ybGQ=", - "CreatedTime_dt": "2020-08-01T12:24:36.123", - "LastCommTime_dt": "2020-08-01T12:24:36.123" + "CreatedTime_dt": "2024-08-01T12:24:36.123", + "LastCommTime_dt": "2024-08-01T12:24:36.123" }, { "Name_str": "name", @@ -8951,8 +8951,8 @@ All APIs are based on the JSON-R "Client_MonitorMode_bool": false, "VLanId_u32": 0, "UniqueId_bin": "SGVsbG8gV29ybGQ=", - "CreatedTime_dt": "2020-08-01T12:24:36.123", - "LastCommTime_dt": "2020-08-01T12:24:36.123" + "CreatedTime_dt": "2024-08-01T12:24:36.123", + "LastCommTime_dt": "2024-08-01T12:24:36.123" } ] } @@ -9117,9 +9117,9 @@ All APIs are based on the JSON-R "ServerProductName_str": "serverproductname", "ServerProductVer_u32": 0, "ServerProductBuild_u32": 0, - "StartTime_dt": "2020-08-01T12:24:36.123", - "FirstConnectionEstablisiedTime_dt": "2020-08-01T12:24:36.123", - "CurrentConnectionEstablishTime_dt": "2020-08-01T12:24:36.123", + "StartTime_dt": "2024-08-01T12:24:36.123", + "FirstConnectionEstablisiedTime_dt": "2024-08-01T12:24:36.123", + "CurrentConnectionEstablishTime_dt": "2024-08-01T12:24:36.123", "NumConnectionsEatablished_u32": 0, "HalfConnection_bool": false, "QoS_bool": false, @@ -9496,8 +9496,8 @@ All APIs are based on the JSON-R "Key_u32": 0, "SessionName_str": "sessionname", "MacAddress_bin": "SGVsbG8gV29ybGQ=", - "CreatedTime_dt": "2020-08-01T12:24:36.123", - "UpdatedTime_dt": "2020-08-01T12:24:36.123", + "CreatedTime_dt": "2024-08-01T12:24:36.123", + "UpdatedTime_dt": "2024-08-01T12:24:36.123", "RemoteItem_bool": false, "RemoteHostname_str": "remotehostname", "VlanId_u32": 0 @@ -9506,8 +9506,8 @@ All APIs are based on the JSON-R "Key_u32": 0, "SessionName_str": "sessionname", "MacAddress_bin": "SGVsbG8gV29ybGQ=", - "CreatedTime_dt": "2020-08-01T12:24:36.123", - "UpdatedTime_dt": "2020-08-01T12:24:36.123", + "CreatedTime_dt": "2024-08-01T12:24:36.123", + "UpdatedTime_dt": "2024-08-01T12:24:36.123", "RemoteItem_bool": false, "RemoteHostname_str": "remotehostname", "VlanId_u32": 0 @@ -9516,8 +9516,8 @@ All APIs are based on the JSON-R "Key_u32": 0, "SessionName_str": "sessionname", "MacAddress_bin": "SGVsbG8gV29ybGQ=", - "CreatedTime_dt": "2020-08-01T12:24:36.123", - "UpdatedTime_dt": "2020-08-01T12:24:36.123", + "CreatedTime_dt": "2024-08-01T12:24:36.123", + "UpdatedTime_dt": "2024-08-01T12:24:36.123", "RemoteItem_bool": false, "RemoteHostname_str": "remotehostname", "VlanId_u32": 0 @@ -9663,8 +9663,8 @@ All APIs are based on the JSON-R "SessionName_str": "sessionname", "IpAddress_ip": "192.168.0.1", "DhcpAllocated_bool": false, - "CreatedTime_dt": "2020-08-01T12:24:36.123", - "UpdatedTime_dt": "2020-08-01T12:24:36.123", + "CreatedTime_dt": "2024-08-01T12:24:36.123", + "UpdatedTime_dt": "2024-08-01T12:24:36.123", "RemoteItem_bool": false, "RemoteHostname_str": "remotehostname" }, @@ -9673,8 +9673,8 @@ All APIs are based on the JSON-R "SessionName_str": "sessionname", "IpAddress_ip": "192.168.0.1", "DhcpAllocated_bool": false, - "CreatedTime_dt": "2020-08-01T12:24:36.123", - "UpdatedTime_dt": "2020-08-01T12:24:36.123", + "CreatedTime_dt": "2024-08-01T12:24:36.123", + "UpdatedTime_dt": "2024-08-01T12:24:36.123", "RemoteItem_bool": false, "RemoteHostname_str": "remotehostname" }, @@ -9683,8 +9683,8 @@ All APIs are based on the JSON-R "SessionName_str": "sessionname", "IpAddress_ip": "192.168.0.1", "DhcpAllocated_bool": false, - "CreatedTime_dt": "2020-08-01T12:24:36.123", - "UpdatedTime_dt": "2020-08-01T12:24:36.123", + "CreatedTime_dt": "2024-08-01T12:24:36.123", + "UpdatedTime_dt": "2024-08-01T12:24:36.123", "RemoteItem_bool": false, "RemoteHostname_str": "remotehostname" } @@ -10376,8 +10376,8 @@ All APIs are based on the JSON-R "DestIp_ip": "192.168.0.1", "DestHost_str": "desthost", "DestPort_u32": 0, - "CreatedTime_dt": "2020-08-01T12:24:36.123", - "LastCommTime_dt": "2020-08-01T12:24:36.123", + "CreatedTime_dt": "2024-08-01T12:24:36.123", + "LastCommTime_dt": "2024-08-01T12:24:36.123", "SendSize_u64": 0, "RecvSize_u64": 0, "TcpStatus_u32": 0 @@ -10391,8 +10391,8 @@ All APIs are based on the JSON-R "DestIp_ip": "192.168.0.1", "DestHost_str": "desthost", "DestPort_u32": 0, - "CreatedTime_dt": "2020-08-01T12:24:36.123", - "LastCommTime_dt": "2020-08-01T12:24:36.123", + "CreatedTime_dt": "2024-08-01T12:24:36.123", + "LastCommTime_dt": "2024-08-01T12:24:36.123", "SendSize_u64": 0, "RecvSize_u64": 0, "TcpStatus_u32": 0 @@ -10406,8 +10406,8 @@ All APIs are based on the JSON-R "DestIp_ip": "192.168.0.1", "DestHost_str": "desthost", "DestPort_u32": 0, - "CreatedTime_dt": "2020-08-01T12:24:36.123", - "LastCommTime_dt": "2020-08-01T12:24:36.123", + "CreatedTime_dt": "2024-08-01T12:24:36.123", + "LastCommTime_dt": "2024-08-01T12:24:36.123", "SendSize_u64": 0, "RecvSize_u64": 0, "TcpStatus_u32": 0 @@ -10527,8 +10527,8 @@ All APIs are based on the JSON-R "DhcpTable": [ { "Id_u32": 0, - "LeasedTime_dt": "2020-08-01T12:24:36.123", - "ExpireTime_dt": "2020-08-01T12:24:36.123", + "LeasedTime_dt": "2024-08-01T12:24:36.123", + "ExpireTime_dt": "2024-08-01T12:24:36.123", "MacAddress_bin": "SGVsbG8gV29ybGQ=", "IpAddress_ip": "192.168.0.1", "Mask_u32": 0, @@ -10536,8 +10536,8 @@ All APIs are based on the JSON-R }, { "Id_u32": 0, - "LeasedTime_dt": "2020-08-01T12:24:36.123", - "ExpireTime_dt": "2020-08-01T12:24:36.123", + "LeasedTime_dt": "2024-08-01T12:24:36.123", + "ExpireTime_dt": "2024-08-01T12:24:36.123", "MacAddress_bin": "SGVsbG8gV29ybGQ=", "IpAddress_ip": "192.168.0.1", "Mask_u32": 0, @@ -10545,8 +10545,8 @@ All APIs are based on the JSON-R }, { "Id_u32": 0, - "LeasedTime_dt": "2020-08-01T12:24:36.123", - "ExpireTime_dt": "2020-08-01T12:24:36.123", + "LeasedTime_dt": "2024-08-01T12:24:36.123", + "ExpireTime_dt": "2024-08-01T12:24:36.123", "MacAddress_bin": "SGVsbG8gV29ybGQ=", "IpAddress_ip": "192.168.0.1", "Mask_u32": 0, @@ -13090,19 +13090,19 @@ All APIs are based on the JSON-R "ServerName_str": "servername", "FilePath_str": "filepath", "FileSize_u32": 0, - "UpdatedTime_dt": "2020-08-01T12:24:36.123" + "UpdatedTime_dt": "2024-08-01T12:24:36.123" }, { "ServerName_str": "servername", "FilePath_str": "filepath", "FileSize_u32": 0, - "UpdatedTime_dt": "2020-08-01T12:24:36.123" + "UpdatedTime_dt": "2024-08-01T12:24:36.123" }, { "ServerName_str": "servername", "FilePath_str": "filepath", "FileSize_u32": 0, - "UpdatedTime_dt": "2020-08-01T12:24:36.123" + "UpdatedTime_dt": "2024-08-01T12:24:36.123" } ] } @@ -14508,15 +14508,15 @@ All APIs are based on the JSON-R
    -

    -

    "GetDDnsInternetSettng" RPC API - Get the Proxy Settings for Connecting to the DDNS server

    +

    +

    "GetDDnsInternetSetting" RPC API - Get the Proxy Settings for Connecting to the DDNS server

    Description

    Get the Proxy Settings for Connecting to the DDNS server.

    Input JSON-RPC Format

    {
       "jsonrpc": "2.0",
       "id": "rpc_call_id",
    -  "method": "GetDDnsInternetSettng",
    +  "method": "GetDDnsInternetSetting",
       "params": {}
     }
     
    @@ -14571,15 +14571,15 @@ All APIs are based on the JSON-R
    -

    -

    "SetDDnsInternetSettng" RPC API - Set the Proxy Settings for Connecting to the DDNS server

    +

    +

    "SetDDnsInternetSetting" RPC API - Set the Proxy Settings for Connecting to the DDNS server

    Description

    Set the Proxy Settings for Connecting to the DDNS server.

    Input JSON-RPC Format

    {
       "jsonrpc": "2.0",
       "id": "rpc_call_id",
    -  "method": "SetDDnsInternetSettng",
    +  "method": "SetDDnsInternetSetting",
       "params": {
         "ProxyType_u32": 0,
         "ProxyHostName_str": "proxyhostname",
    @@ -14640,8 +14640,8 @@ All APIs are based on the JSON-R
     
     
     
    -

    Automatically generated at 2019-07-10 14:36:11 by vpnserver-jsonrpc-codegen.
    -Copyright (c) 2014-2019
    SoftEther VPN Project under the Apache License 2.0.

    +

    Automatically generated at 2023-05-10 14:43:37 by vpnserver-jsonrpc-codegen.
    +Copyright (c) 2014-2023 SoftEther VPN Project under the Apache License 2.0.

    diff --git a/src/bin/hamcore/wwwroot/admin/default/out_webpack/bundle.js b/src/bin/hamcore/wwwroot/admin/default/out_webpack/bundle.js index a2a06fdf..2fc795a2 100644 --- a/src/bin/hamcore/wwwroot/admin/default/out_webpack/bundle.js +++ b/src/bin/hamcore/wwwroot/admin/default/out_webpack/bundle.js @@ -2058,7 +2058,7 @@ eval("/* WEBPACK VAR INJECTION */(function(global) {\n/**\n * Module exports.\n /***/ (function(module, exports, __webpack_require__) { "use strict"; -eval("/* WEBPACK VAR INJECTION */(function(Buffer) {\r\n// SoftEther VPN Server JSON-RPC Stub code for TypeScript\r\n// \r\n// vpnrpc.ts\r\n// Automatically generated at 2019-05-29 18:21:39 by vpnserver-jsonrpc-codegen\r\n//\r\n// Licensed under the Apache License 2.0\r\n// Copyright (c) 2014-2019 SoftEther VPN Project\r\nvar __extends = (this && this.__extends) || (function () {\r\n var extendStatics = function (d, b) {\r\n extendStatics = Object.setPrototypeOf ||\r\n ({ __proto__: [] } instanceof Array && function (d, b) { d.__proto__ = b; }) ||\r\n function (d, b) { for (var p in b) if (b.hasOwnProperty(p)) d[p] = b[p]; };\r\n return extendStatics(d, b);\r\n };\r\n return function (d, b) {\r\n extendStatics(d, b);\r\n function __() { this.constructor = d; }\r\n d.prototype = b === null ? Object.create(b) : (__.prototype = b.prototype, new __());\r\n };\r\n})();\r\nvar __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) {\r\n return new (P || (P = Promise))(function (resolve, reject) {\r\n function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } }\r\n function rejected(value) { try { step(generator[\"throw\"](value)); } catch (e) { reject(e); } }\r\n function step(result) { result.done ? resolve(result.value) : new P(function (resolve) { resolve(result.value); }).then(fulfilled, rejected); }\r\n step((generator = generator.apply(thisArg, _arguments || [])).next());\r\n });\r\n};\r\nvar __generator = (this && this.__generator) || function (thisArg, body) {\r\n var _ = { label: 0, sent: function() { if (t[0] & 1) throw t[1]; return t[1]; }, trys: [], ops: [] }, f, y, t, g;\r\n return g = { next: verb(0), \"throw\": verb(1), \"return\": verb(2) }, typeof Symbol === \"function\" && (g[Symbol.iterator] = function() { return this; }), g;\r\n function verb(n) { return function (v) { return step([n, v]); }; }\r\n function step(op) {\r\n if (f) throw new TypeError(\"Generator is already executing.\");\r\n while (_) try {\r\n if (f = 1, y && (t = op[0] & 2 ? y[\"return\"] : op[0] ? y[\"throw\"] || ((t = y[\"return\"]) && t.call(y), 0) : y.next) && !(t = t.call(y, op[1])).done) return t;\r\n if (y = 0, t) op = [op[0] & 2, t.value];\r\n switch (op[0]) {\r\n case 0: case 1: t = op; break;\r\n case 4: _.label++; return { value: op[1], done: false };\r\n case 5: _.label++; y = op[1]; op = [0]; continue;\r\n case 7: op = _.ops.pop(); _.trys.pop(); continue;\r\n default:\r\n if (!(t = _.trys, t = t.length > 0 && t[t.length - 1]) && (op[0] === 6 || op[0] === 2)) { _ = 0; continue; }\r\n if (op[0] === 3 && (!t || (op[1] > t[0] && op[1] < t[3]))) { _.label = op[1]; break; }\r\n if (op[0] === 6 && _.label < t[1]) { _.label = t[1]; t = op; break; }\r\n if (t && _.label < t[2]) { _.label = t[2]; _.ops.push(op); break; }\r\n if (t[2]) _.ops.pop();\r\n _.trys.pop(); continue;\r\n }\r\n op = body.call(thisArg, _);\r\n } catch (e) { op = [6, e]; y = 0; } finally { f = t = 0; }\r\n if (op[0] & 5) throw op[1]; return { value: op[0] ? op[1] : void 0, done: true };\r\n }\r\n};\r\nexports.__esModule = true;\r\n// Trivial utility codes\r\nvar is_node_js = (typeof navigator === \"undefined\") || navigator.userAgent.indexOf(\"Node.js\") !== -1 || navigator.userAgent.indexOf(\"jsdom\") !== -1;\r\nfunction is_null(obj) {\r\n return (typeof obj === \"undefined\") || (obj === null);\r\n}\r\nvar debug_mode = false;\r\n/** VPN Server RPC Stubs */\r\nvar VpnServerRpc = /** @class */ (function () {\r\n /**\r\n * Constructor of the VpnServerRpc class\r\n * @param vpnserver_hostname The hostname or IP address of the destination VPN Server. In the web browser you can specify null if you want to connect to the server itself.\r\n * @param vpnserver_port The port number of the destination VPN Server. In the web browser you can specify null if you want to connect to the server itself.\r\n * @param hubname The name of the Virtual Hub if you want to connect to the VPN Server as a Virtual Hub Admin Mode. Specify null if you want to connect to the VPN Server as the Entire VPN Server Admin Mode.\r\n * @param password Specify the administration password. This value is valid only if vpnserver_hostname is sepcified.\r\n * @param nodejs_https_client_reject_untrusted_server_cert In Node.js set this true to check the SSL server certificate on the destination VPN Server. Set this false to ignore the SSL server certification.\r\n */\r\n function VpnServerRpc(vpnserver_hostname, vpnserver_port, hubname, password, nodejs_https_client_reject_untrusted_server_cert) {\r\n var _this = this;\r\n // --- Stubs ---\r\n /** Test RPC function. Input any integer value to the IntValue_u32 field. Then the server will convert the integer to the string, and return the string in the StrValue_str field. */\r\n this.Test = function (in_param) {\r\n return _this.CallAsync(\"Test\", in_param);\r\n };\r\n /** Get server information. This allows you to obtain the server information of the currently connected VPN Server or VPN Bridge. Included in the server information are the version number, build number and build information. You can also obtain information on the current server operation mode and the information of operating system that the server is operating on. */\r\n this.GetServerInfo = function () {\r\n return _this.CallAsync(\"GetServerInfo\", new VpnRpcServerInfo());\r\n };\r\n /** Get Current Server Status. This allows you to obtain in real-time the current status of the currently connected VPN Server or VPN Bridge. You can get statistical information on data communication and the number of different kinds of objects that exist on the server. You can get information on how much memory is being used on the current computer by the OS. */\r\n this.GetServerStatus = function () {\r\n return _this.CallAsync(\"GetServerStatus\", new VpnRpcServerStatus());\r\n };\r\n /** Create New TCP Listener. This allows you to create a new TCP Listener on the server. By creating the TCP Listener the server starts listening for a connection from clients at the specified TCP/IP port number. A TCP Listener that has been created can be deleted by the DeleteListener API. You can also get a list of TCP Listeners currently registered by using the EnumListener API. To execute this API, you must have VPN Server administrator privileges. */\r\n this.CreateListener = function (in_param) {\r\n return _this.CallAsync(\"CreateListener\", in_param);\r\n };\r\n /** Get List of TCP Listeners. This allows you to get a list of TCP listeners registered on the current server. You can obtain information on whether the various TCP listeners have a status of operating or error. To call this API, you must have VPN Server administrator privileges. */\r\n this.EnumListener = function () {\r\n return _this.CallAsync(\"EnumListener\", new VpnRpcListenerList());\r\n };\r\n /** Delete TCP Listener. This allows you to delete a TCP Listener that's registered on the server. When the TCP Listener is in a state of operation, the listener will automatically be deleted when its operation stops. You can also get a list of TCP Listeners currently registered by using the EnumListener API. To call this API, you must have VPN Server administrator privileges. */\r\n this.DeleteListener = function (in_param) {\r\n return _this.CallAsync(\"DeleteListener\", in_param);\r\n };\r\n /** Enable / Disable TCP Listener. This starts or stops the operation of TCP Listeners registered on the current server. You can also get a list of TCP Listeners currently registered by using the EnumListener API. To call this API, you must have VPN Server administrator privileges. */\r\n this.EnableListener = function (in_param) {\r\n return _this.CallAsync(\"EnableListener\", in_param);\r\n };\r\n /** Set VPN Server Administrator Password. This sets the VPN Server administrator password. You can specify the password as a parameter. To call this API, you must have VPN Server administrator privileges. */\r\n this.SetServerPassword = function (in_param) {\r\n return _this.CallAsync(\"SetServerPassword\", in_param);\r\n };\r\n /** Set the VPN Server clustering configuration. Use this to set the VPN Server type as Standalone Server, Cluster Controller Server or Cluster Member Server. Standalone server means a VPN Server that does not belong to any cluster in its current state. When VPN Server is installed, by default it will be in standalone server mode. Unless you have particular plans to configure a cluster, we recommend the VPN Server be operated in standalone mode. A cluster controller is the central computer of all member servers of a cluster in the case where a clustering environment is made up of multiple VPN Servers. Multiple cluster members can be added to the cluster as required. A cluster requires one computer to serve this role. The other cluster member servers that are configured in the same cluster begin operation as a cluster member by connecting to the cluster controller. To call this API, you must have VPN Server administrator privileges. Also, when this API is executed, VPN Server will automatically restart. This API cannot be called on VPN Bridge. */\r\n this.SetFarmSetting = function (in_param) {\r\n return _this.CallAsync(\"SetFarmSetting\", in_param);\r\n };\r\n /** Get Clustering Configuration of Current VPN Server. You can use this to acquire the clustering configuration of the current VPN Server. To call this API, you must have VPN Server administrator privileges. */\r\n this.GetFarmSetting = function () {\r\n return _this.CallAsync(\"GetFarmSetting\", new VpnRpcFarm());\r\n };\r\n /** Get Cluster Member Information. When the VPN Server is operating as a cluster controller, you can get information on cluster member servers on that cluster by specifying the IDs of the member servers. You can get the following information about the specified cluster member server: Server Type, Time Connection has been Established, IP Address, Host Name, Points, Public Port List, Number of Operating Virtual Hubs, First Virtual Hub, Number of Sessions and Number of TCP Connections. This API cannot be invoked on VPN Bridge. */\r\n this.GetFarmInfo = function (in_param) {\r\n return _this.CallAsync(\"GetFarmInfo\", in_param);\r\n };\r\n /** Get List of Cluster Members. Use this API when the VPN Server is operating as a cluster controller to get a list of the cluster member servers on the same cluster, including the cluster controller itself. For each member, the following information is also listed: Type, Connection Start, Host Name, Points, Number of Session, Number of TCP Connections, Number of Operating Virtual Hubs, Using Client Connection License and Using Bridge Connection License. This API cannot be invoked on VPN Bridge. */\r\n this.EnumFarmMember = function () {\r\n return _this.CallAsync(\"EnumFarmMember\", new VpnRpcEnumFarm());\r\n };\r\n /** Get Connection Status to Cluster Controller. Use this API when the VPN Server is operating as a cluster controller to get the status of connection to the cluster controller. You can get the following information: Controller IP Address, Port Number, Connection Status, Connection Start Time, First Connection Established Time, Current Connection Established Time, Number of Connection Attempts, Number of Successful Connections, Number of Failed Connections. This API cannot be invoked on VPN Bridge. */\r\n this.GetFarmConnectionStatus = function () {\r\n return _this.CallAsync(\"GetFarmConnectionStatus\", new VpnRpcFarmConnectionStatus());\r\n };\r\n /** Set SSL Certificate and Private Key of VPN Server. You can set the SSL certificate that the VPN Server provides to the connected client and the private key for that certificate. The certificate must be in X.509 format and the private key must be Base 64 encoded format. To call this API, you must have VPN Server administrator privileges. */\r\n this.SetServerCert = function (in_param) {\r\n return _this.CallAsync(\"SetServerCert\", in_param);\r\n };\r\n /** Get SSL Certificate and Private Key of VPN Server. Use this to get the SSL certificate private key that the VPN Server provides to the connected client. To call this API, you must have VPN Server administrator privileges. */\r\n this.GetServerCert = function () {\r\n return _this.CallAsync(\"GetServerCert\", new VpnRpcKeyPair());\r\n };\r\n /** Get the Encrypted Algorithm Used for VPN Communication. Use this API to get the current setting of the algorithm used for the electronic signature and encrypted for SSL connection to be used for communication between the VPN Server and the connected client and the list of algorithms that can be used on the VPN Server. */\r\n this.GetServerCipher = function () {\r\n return _this.CallAsync(\"GetServerCipher\", new VpnRpcStr());\r\n };\r\n /** Set the Encrypted Algorithm Used for VPN Communication. Use this API to set the algorithm used for the electronic signature and encrypted for SSL connections to be used for communication between the VPN Server and the connected client. By specifying the algorithm name, the specified algorithm will be used later between the VPN Client and VPN Bridge connected to this server and the data will be encrypted. To call this API, you must have VPN Server administrator privileges. */\r\n this.SetServerCipher = function (in_param) {\r\n return _this.CallAsync(\"SetServerCipher\", in_param);\r\n };\r\n /** Create New Virtual Hub. Use this to create a new Virtual Hub on the VPN Server. The created Virtual Hub will begin operation immediately. When the VPN Server is operating on a cluster, this API is only valid for the cluster controller. Also, the new Virtual Hub will operate as a dynamic Virtual Hub. You can change it to a static Virtual Hub by using the SetHub API. To get a list of Virtual Hubs that are already on the VPN Server, use the EnumHub API. To call this API, you must have VPN Server administrator privileges. Also, this API does not operate on VPN Servers that are operating as a VPN Bridge or cluster member. */\r\n this.CreateHub = function (in_param) {\r\n return _this.CallAsync(\"CreateHub\", in_param);\r\n };\r\n /** Set the Virtual Hub configuration. You can call this API to change the configuration of the specified Virtual Hub. You can set the Virtual Hub online or offline. You can set the maximum number of sessions that can be concurrently connected to the Virtual Hub that is currently being managed. You can set the Virtual Hub administrator password. You can set other parameters for the Virtual Hub. Before call this API, you need to obtain the latest state of the Virtual Hub by using the GetHub API. */\r\n this.SetHub = function (in_param) {\r\n return _this.CallAsync(\"SetHub\", in_param);\r\n };\r\n /** Get the Virtual Hub configuration. You can call this API to get the current configuration of the specified Virtual Hub. To change the configuration of the Virtual Hub, call the SetHub API. */\r\n this.GetHub = function (in_param) {\r\n return _this.CallAsync(\"GetHub\", in_param);\r\n };\r\n /** Get List of Virtual Hubs. Use this to get a list of existing Virtual Hubs on the VPN Server. For each Virtual Hub, you can get the following information: Virtual Hub Name, Status, Type, Number of Users, Number of Groups, Number of Sessions, Number of MAC Tables, Number of IP Tables, Number of Logins, Last Login, and Last Communication. Note that when connecting in Virtual Hub Admin Mode, if in the options of a Virtual Hub that you do not have administrator privileges for, the option Don't Enumerate this Virtual Hub for Anonymous Users is enabled then that Virtual Hub will not be enumerated. If you are connected in Server Admin Mode, then the list of all Virtual Hubs will be displayed. When connecting to and managing a non-cluster-controller cluster member of a clustering environment, only the Virtual Hub currently being hosted by that VPN Server will be displayed. When connecting to a cluster controller for administration purposes, all the Virtual Hubs will be displayed. */\r\n this.EnumHub = function () {\r\n return _this.CallAsync(\"EnumHub\", new VpnRpcEnumHub());\r\n };\r\n /** Delete Virtual Hub. Use this to delete an existing Virtual Hub on the VPN Server. If you delete the Virtual Hub, all sessions that are currently connected to the Virtual Hub will be disconnected and new sessions will be unable to connect to the Virtual Hub. Also, this will also delete all the Hub settings, user objects, group objects, certificates and Cascade Connections. Once you delete the Virtual Hub, it cannot be recovered. To call this API, you must have VPN Server administrator privileges. Also, this API does not operate on VPN Servers that are operating as a VPN Bridge or cluster member. */\r\n this.DeleteHub = function (in_param) {\r\n return _this.CallAsync(\"DeleteHub\", in_param);\r\n };\r\n /** Get Setting of RADIUS Server Used for User Authentication. Use this to get the current settings for the RADIUS server used when a user connects to the currently managed Virtual Hub using RADIUS Server Authentication Mode. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n this.GetHubRadius = function (in_param) {\r\n return _this.CallAsync(\"GetHubRadius\", in_param);\r\n };\r\n /** Set RADIUS Server to use for User Authentication. To accept users to the currently managed Virtual Hub in RADIUS server authentication mode, you can specify an external RADIUS server that confirms the user name and password. (You can specify multiple hostname by splitting with comma or semicolon.) The RADIUS server must be set to receive requests from IP addresses of this VPN Server. Also, authentication by Password Authentication Protocol (PAP) must be enabled. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n this.SetHubRadius = function (in_param) {\r\n return _this.CallAsync(\"SetHubRadius\", in_param);\r\n };\r\n /** Get List of TCP Connections Connecting to the VPN Server. Use this to get a list of TCP/IP connections that are currently connecting to the VPN Server. It does not display the TCP connections that have been established as VPN sessions. To get the list of TCP/IP connections that have been established as VPN sessions, you can use the EnumSession API. You can get the following: Connection Name, Connection Source, Connection Start and Type. To call this API, you must have VPN Server administrator privileges. */\r\n this.EnumConnection = function () {\r\n return _this.CallAsync(\"EnumConnection\", new VpnRpcEnumConnection());\r\n };\r\n /** Disconnect TCP Connections Connecting to the VPN Server. Use this to forcefully disconnect specific TCP/IP connections that are connecting to the VPN Server. To call this API, you must have VPN Server administrator privileges. */\r\n this.DisconnectConnection = function (in_param) {\r\n return _this.CallAsync(\"DisconnectConnection\", in_param);\r\n };\r\n /** Get Information of TCP Connections Connecting to the VPN Server. Use this to get detailed information of a specific TCP/IP connection that is connecting to the VPN Server. You can get the following information: Connection Name, Connection Type, Source Hostname, Source IP Address, Source Port Number (TCP), Connection Start, Server Product Name, Server Version, Server Build Number, Client Product Name, Client Version, and Client Build Number. To call this API, you must have VPN Server administrator privileges. */\r\n this.GetConnectionInfo = function (in_param) {\r\n return _this.CallAsync(\"GetConnectionInfo\", in_param);\r\n };\r\n /** Switch Virtual Hub to Online or Offline. Use this to set the Virtual Hub to online or offline. A Virtual Hub with an offline status cannot receive VPN connections from clients. When you set the Virtual Hub offline, all sessions will be disconnected. A Virtual Hub with an offline status cannot receive VPN connections from clients. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n this.SetHubOnline = function (in_param) {\r\n return _this.CallAsync(\"SetHubOnline\", in_param);\r\n };\r\n /** Get Current Status of Virtual Hub. Use this to get the current status of the Virtual Hub currently being managed. You can get the following information: Virtual Hub Type, Number of Sessions, Number of Each Type of Object, Number of Logins, Last Login, Last Communication, and Communication Statistical Data. */\r\n this.GetHubStatus = function (in_param) {\r\n return _this.CallAsync(\"GetHubStatus\", in_param);\r\n };\r\n /** Set the logging configuration of the Virtual Hub. Use this to enable or disable a security log or packet logs of the Virtual Hub currently being managed, set the save contents of the packet log for each type of packet to be saved, and set the log file switch cycle for the security log or packet log that the currently managed Virtual Hub saves. There are the following packet types: TCP Connection Log, TCP Packet Log, DHCP Packet Log, UDP Packet Log, ICMP Packet Log, IP Packet Log, ARP Packet Log, and Ethernet Packet Log. To get the current setting, you can use the LogGet API. The log file switch cycle can be changed to switch in every second, every minute, every hour, every day, every month or not switch. To get the current setting, you can use the GetHubLog API. */\r\n this.SetHubLog = function (in_param) {\r\n return _this.CallAsync(\"SetHubLog\", in_param);\r\n };\r\n /** Get the logging configuration of the Virtual Hub. Use this to get the configuration for a security log or packet logs of the Virtual Hub currently being managed, get the setting for save contents of the packet log for each type of packet to be saved, and get the log file switch cycle for the security log or packet log that the currently managed Virtual Hub saves. To set the current setting, you can use the SetHubLog API. */\r\n this.GetHubLog = function (in_param) {\r\n return _this.CallAsync(\"GetHubLog\", in_param);\r\n };\r\n /** Add Trusted CA Certificate. Use this to add a new certificate to a list of CA certificates trusted by the currently managed Virtual Hub. The list of certificate authority certificates that are registered is used to verify certificates when a VPN Client is connected in signed certificate authentication mode. To get a list of the current certificates you can use the EnumCa API. The certificate you add must be saved in the X.509 file format. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a member server on a cluster. */\r\n this.AddCa = function (in_param) {\r\n return _this.CallAsync(\"AddCa\", in_param);\r\n };\r\n /** Get List of Trusted CA Certificates. Here you can manage the certificate authority certificates that are trusted by this currently managed Virtual Hub. The list of certificate authority certificates that are registered is used to verify certificates when a VPN Client is connected in signed certificate authentication mode. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a member server on a cluster. */\r\n this.EnumCa = function (in_param) {\r\n return _this.CallAsync(\"EnumCa\", in_param);\r\n };\r\n /** Get Trusted CA Certificate. Use this to get an existing certificate from the list of CA certificates trusted by the currently managed Virtual Hub and save it as a file in X.509 format. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a member server on a cluster. */\r\n this.GetCa = function (in_param) {\r\n return _this.CallAsync(\"GetCa\", in_param);\r\n };\r\n /** Delete Trusted CA Certificate. Use this to delete an existing certificate from the list of CA certificates trusted by the currently managed Virtual Hub. To get a list of the current certificates you can use the EnumCa API. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a member server on a cluster. */\r\n this.DeleteCa = function (in_param) {\r\n return _this.CallAsync(\"DeleteCa\", in_param);\r\n };\r\n /** Create New Cascade Connection. Use this to create a new Cascade Connection on the currently managed Virtual Hub. By using a Cascade Connection, you can connect this Virtual Hub by Cascade Connection to another Virtual Hub that is operating on the same or a different computer. To create a Cascade Connection, you must specify the name of the Cascade Connection, destination server and destination Virtual Hub and user name. When a new Cascade Connection is created, the type of user authentication is initially set as Anonymous Authentication and the proxy server setting and the verification options of the server certificate is not set. To change these settings and other advanced settings after a Cascade Connection has been created, use the other APIs that include the name \"Link\". [Warning About Cascade Connections] By connecting using a Cascade Connection you can create a Layer 2 bridge between multiple Virtual Hubs but if the connection is incorrectly configured, a loopback Cascade Connection could inadvertently be created. When using a Cascade Connection function please design the network topology with care. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n this.CreateLink = function (in_param) {\r\n return _this.CallAsync(\"CreateLink\", in_param);\r\n };\r\n /** Get the Cascade Connection Setting. Use this to get the Connection Setting of a Cascade Connection that is registered on the currently managed Virtual Hub. To change the Connection Setting contents of the Cascade Connection, use the APIs that include the name \"Link\" after creating the Cascade Connection. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n this.GetLink = function (in_param) {\r\n return _this.CallAsync(\"GetLink\", in_param);\r\n };\r\n /** Change Existing Cascade Connection. Use this to alter the setting of an existing Cascade Connection on the currently managed Virtual Hub. */\r\n this.SetLink = function (in_param) {\r\n return _this.CallAsync(\"SetLink\", in_param);\r\n };\r\n /** Get List of Cascade Connections. Use this to get a list of Cascade Connections that are registered on the currently managed Virtual Hub. By using a Cascade Connection, you can connect this Virtual Hub by Layer 2 Cascade Connection to another Virtual Hub that is operating on the same or a different computer. [Warning About Cascade Connections] By connecting using a Cascade Connection you can create a Layer 2 bridge between multiple Virtual Hubs but if the connection is incorrectly configured, a loopback Cascade Connection could inadvertently be created. When using a Cascade Connection function please design the network topology with care. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n this.EnumLink = function (in_param) {\r\n return _this.CallAsync(\"EnumLink\", in_param);\r\n };\r\n /** Switch Cascade Connection to Online Status. When a Cascade Connection registered on the currently managed Virtual Hub is specified, use this to switch that Cascade Connection to online status. The Cascade Connection that is switched to online status begins the process of connecting to the destination VPN Server in accordance with the Connection Setting. The Cascade Connection that is switched to online status will establish normal connection to the VPN Server or continue to attempt connection until it is switched to offline status. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n this.SetLinkOnline = function (in_param) {\r\n return _this.CallAsync(\"SetLinkOnline\", in_param);\r\n };\r\n /** Switch Cascade Connection to Offline Status. When a Cascade Connection registered on the currently managed Virtual Hub is specified, use this to switch that Cascade Connection to offline status. The Cascade Connection that is switched to offline will not connect to the VPN Server until next time it is switched to the online status using the SetLinkOnline API You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n this.SetLinkOffline = function (in_param) {\r\n return _this.CallAsync(\"SetLinkOffline\", in_param);\r\n };\r\n /** Delete Cascade Connection Setting. Use this to delete a Cascade Connection that is registered on the currently managed Virtual Hub. If the specified Cascade Connection has a status of online, the connections will be automatically disconnected and then the Cascade Connection will be deleted. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n this.DeleteLink = function (in_param) {\r\n return _this.CallAsync(\"DeleteLink\", in_param);\r\n };\r\n /** Change Name of Cascade Connection. When a Cascade Connection registered on the currently managed Virtual Hub is specified, use this to change the name of that Cascade Connection. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n this.RenameLink = function (in_param) {\r\n return _this.CallAsync(\"RenameLink\", in_param);\r\n };\r\n /** Get Current Cascade Connection Status. When a Cascade Connection registered on the currently managed Virtual Hub is specified and that Cascade Connection is currently online, use this to get its connection status and other information. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n this.GetLinkStatus = function (in_param) {\r\n return _this.CallAsync(\"GetLinkStatus\", in_param);\r\n };\r\n /** Add Access List Rule. Use this to add a new rule to the access list of the currently managed Virtual Hub. The access list is a set of packet file rules that are applied to packets that flow through the Virtual Hub. You can register multiple rules in an access list and you can also define an priority for each rule. All packets are checked for the conditions specified by the rules registered in the access list and based on the operation that is stipulated by the first matching rule, they either pass or are discarded. Packets that do not match any rule are implicitly allowed to pass. You can also use the access list to generate delays, jitters and packet losses. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a member server on a cluster. */\r\n this.AddAccess = function (in_param) {\r\n return _this.CallAsync(\"AddAccess\", in_param);\r\n };\r\n /** Delete Rule from Access List. Use this to specify a packet filter rule registered on the access list of the currently managed Virtual Hub and delete it. To delete a rule, you must specify that rule's ID. You can display the ID by using the EnumAccess API. If you wish not to delete the rule but to only temporarily disable it, use the SetAccessList API to set the rule status to disable. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a member server on a cluster. */\r\n this.DeleteAccess = function (in_param) {\r\n return _this.CallAsync(\"DeleteAccess\", in_param);\r\n };\r\n /** Get Access List Rule List. Use this to get a list of packet filter rules that are registered on access list of the currently managed Virtual Hub. The access list is a set of packet file rules that are applied to packets that flow through the Virtual Hub. You can register multiple rules in an access list and you can also define a priority for each rule. All packets are checked for the conditions specified by the rules registered in the access list and based on the operation that is stipulated by the first matching rule, they either pass or are discarded. Packets that do not match any rule are implicitly allowed to pass. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a member server on a cluster. */\r\n this.EnumAccess = function (in_param) {\r\n return _this.CallAsync(\"EnumAccess\", in_param);\r\n };\r\n /** Replace all access lists on a single bulk API call. This API removes all existing access list rules on the Virtual Hub, and replace them by new access list rules specified by the parameter. */\r\n this.SetAccessList = function (in_param) {\r\n return _this.CallAsync(\"SetAccessList\", in_param);\r\n };\r\n /** Create a user. Use this to create a new user in the security account database of the currently managed Virtual Hub. By creating a user, the VPN Client can connect to the Virtual Hub by using the authentication information of that user. Note that a user whose user name has been created as \"*\" (a single asterisk character) will automatically be registered as a RADIUS authentication user. For cases where there are users with \"*\" as the name, when a user, whose user name that has been provided when a client connected to a VPN Server does not match existing user names, is able to be authenticated by a RADIUS server or NT domain controller by inputting a user name and password, the authentication settings and security policy settings will follow the setting for the user \"*\". To change the user information of a user that has been created, use the SetUser API. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a member server on a cluster. */\r\n this.CreateUser = function (in_param) {\r\n return _this.CallAsync(\"CreateUser\", in_param);\r\n };\r\n /** Change User Settings. Use this to change user settings that is registered on the security account database of the currently managed Virtual Hub. The user settings that can be changed using this API are the three items that are specified when a new user is created using the CreateUser API: Group Name, Full Name, and Description. To get the list of currently registered users, use the EnumUser API. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a member server on a cluster. */\r\n this.SetUser = function (in_param) {\r\n return _this.CallAsync(\"SetUser\", in_param);\r\n };\r\n /** Get User Settings. Use this to get user settings information that is registered on the security account database of the currently managed Virtual Hub. The information that you can get using this API are User Name, Full Name, Group Name, Expiration Date, Security Policy, and Auth Type, as well as parameters that are specified as auth type attributes and the statistical data of that user. To get the list of currently registered users, use the EnumUser API. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a member server on a cluster. */\r\n this.GetUser = function (in_param) {\r\n return _this.CallAsync(\"GetUser\", in_param);\r\n };\r\n /** Delete a user. Use this to delete a user that is registered on the security account database of the currently managed Virtual Hub. By deleting the user, that user will no long be able to connect to the Virtual Hub. You can use the SetUser API to set the user's security policy to deny access instead of deleting a user, set the user to be temporarily denied from logging in. To get the list of currently registered users, use the EnumUser API. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a member server on a cluster. */\r\n this.DeleteUser = function (in_param) {\r\n return _this.CallAsync(\"DeleteUser\", in_param);\r\n };\r\n /** Get List of Users. Use this to get a list of users that are registered on the security account database of the currently managed Virtual Hub. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a member server on a cluster. */\r\n this.EnumUser = function (in_param) {\r\n return _this.CallAsync(\"EnumUser\", in_param);\r\n };\r\n /** Create Group. Use this to create a new group in the security account database of the currently managed Virtual Hub. You can register multiple users in a group. To register users in a group use the SetUser API. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a member server on a cluster. */\r\n this.CreateGroup = function (in_param) {\r\n return _this.CallAsync(\"CreateGroup\", in_param);\r\n };\r\n /** Set group settings. Use this to set group settings that is registered on the security account database of the currently managed Virtual Hub. To get the list of currently registered groups, use the EnumGroup API. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a member server on a cluster. */\r\n this.SetGroup = function (in_param) {\r\n return _this.CallAsync(\"SetGroup\", in_param);\r\n };\r\n /** Get Group Setting (Sync mode). Use this to get the setting of a group that is registered on the security account database of the currently managed Virtual Hub. To get the list of currently registered groups, use the EnumGroup API. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a member server on a cluster. */\r\n this.GetGroup = function (in_param) {\r\n return _this.CallAsync(\"GetGroup\", in_param);\r\n };\r\n /** Delete User from Group. Use this to delete a specified user from the group that is registered on the security account database of the currently managed Virtual Hub. By deleting a user from the group, that user becomes unassigned. To get the list of currently registered groups, use the EnumGroup API. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a member server on a cluster. */\r\n this.DeleteGroup = function (in_param) {\r\n return _this.CallAsync(\"DeleteGroup\", in_param);\r\n };\r\n /** Get List of Groups. Use this to get a list of groups that are registered on the security account database of the currently managed Virtual Hub. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a member server on a cluster. */\r\n this.EnumGroup = function (in_param) {\r\n return _this.CallAsync(\"EnumGroup\", in_param);\r\n };\r\n /** Get List of Connected VPN Sessions. Use this to get a list of the sessions connected to the Virtual Hub currently being managed. In the list of sessions, the following information will be obtained for each connection: Session Name, Session Site, User Name, Source Host Name, TCP Connection, Transfer Bytes and Transfer Packets. If the currently connected VPN Server is a cluster controller and the currently managed Virtual Hub is a static Virtual Hub, you can get an all-linked-together list of all sessions connected to that Virtual Hub on all cluster members. In all other cases, only the list of sessions that are actually connected to the currently managed VPN Server will be obtained. */\r\n this.EnumSession = function (in_param) {\r\n return _this.CallAsync(\"EnumSession\", in_param);\r\n };\r\n /** Get Session Status. Use this to specify a session currently connected to the currently managed Virtual Hub and get the session information. The session status includes the following: source host name and user name, version information, time information, number of TCP connections, communication parameters, session key, statistical information on data transferred, and other client and server information. To get the list of currently connected sessions, use the EnumSession API. */\r\n this.GetSessionStatus = function (in_param) {\r\n return _this.CallAsync(\"GetSessionStatus\", in_param);\r\n };\r\n /** Disconnect Session. Use this to specify a session currently connected to the currently managed Virtual Hub and forcefully disconnect that session using manager privileges. Note that when communication is disconnected by settings on the source client side and the automatically reconnect option is enabled, it is possible that the client will reconnect. To get the list of currently connected sessions, use the EnumSession API. */\r\n this.DeleteSession = function (in_param) {\r\n return _this.CallAsync(\"DeleteSession\", in_param);\r\n };\r\n /** Get the MAC Address Table Database. Use this to get the MAC address table database that is held by the currently managed Virtual Hub. The MAC address table database is a table that the Virtual Hub requires to perform the action of switching Ethernet frames and the Virtual Hub decides the sorting destination session of each Ethernet frame based on the MAC address table database. The MAC address database is built by the Virtual Hub automatically analyzing the contents of the communication. */\r\n this.EnumMacTable = function (in_param) {\r\n return _this.CallAsync(\"EnumMacTable\", in_param);\r\n };\r\n /** Delete MAC Address Table Entry. Use this API to operate the MAC address table database held by the currently managed Virtual Hub and delete a specified MAC address table entry from the database. To get the contents of the current MAC address table database use the EnumMacTable API. */\r\n this.DeleteMacTable = function (in_param) {\r\n return _this.CallAsync(\"DeleteMacTable\", in_param);\r\n };\r\n /** Get the IP Address Table Database. Use this to get the IP address table database that is held by the currently managed Virtual Hub. The IP address table database is a table that is automatically generated by analyzing the contents of communication so that the Virtual Hub can always know which session is using which IP address and it is frequently used by the engine that applies the Virtual Hub security policy. By specifying the session name you can get the IP address table entry that has been associated with that session. */\r\n this.EnumIpTable = function (in_param) {\r\n return _this.CallAsync(\"EnumIpTable\", in_param);\r\n };\r\n /** Delete IP Address Table Entry. Use this API to operate the IP address table database held by the currently managed Virtual Hub and delete a specified IP address table entry from the database. To get the contents of the current IP address table database use the EnumIpTable API. */\r\n this.DeleteIpTable = function (in_param) {\r\n return _this.CallAsync(\"DeleteIpTable\", in_param);\r\n };\r\n /** Set the Keep Alive Internet Connection Function. Use this to set the destination host name etc. of the Keep Alive Internet Connection Function. For network connection environments where connections will automatically be disconnected where there are periods of no communication that are longer than a set period, by using the Keep Alive Internet Connection Function, it is possible to keep alive the Internet connection by sending packets to a nominated server on the Internet at set intervals. When using this API, you can specify the following: Host Name, Port Number, Packet Send Interval, and Protocol. Packets sent to keep alive the Internet connection will have random content and personal information that could identify a computer or user is not sent. You can use the SetKeep API to enable/disable the Keep Alive Internet Connection Function. To execute this API on a VPN Server or VPN Bridge, you must have administrator privileges. */\r\n this.SetKeep = function (in_param) {\r\n return _this.CallAsync(\"SetKeep\", in_param);\r\n };\r\n /** Get the Keep Alive Internet Connection Function. Use this to get the current setting contents of the Keep Alive Internet Connection Function. In addition to the destination's Host Name, Port Number, Packet Send Interval and Protocol, you can obtain the current enabled/disabled status of the Keep Alive Internet Connection Function. */\r\n this.GetKeep = function (in_param) {\r\n return _this.CallAsync(\"GetKeep\", in_param);\r\n };\r\n /** Enable the Virtual NAT and DHCP Server Function (SecureNAT Function). Use this to enable the Virtual NAT and DHCP Server function (SecureNAT Function) on the currently managed Virtual Hub and begin its operation. Before executing this API, you must first check the setting contents of the current Virtual NAT function and DHCP Server function using the SetSecureNATOption API and GetSecureNATOption API. By enabling the SecureNAT function, you can virtually operate a NAT router (IP masquerade) and the DHCP Server function on a virtual network on the Virtual Hub. [Warning about SecureNAT Function] The SecureNAT function is recommended only for system administrators and people with a detailed knowledge of networks. If you use the SecureNAT function correctly, it is possible to achieve a safe form of remote access via a VPN. However when used in the wrong way, it can put the entire network in danger. Anyone who does not have a thorough knowledge of networks and anyone who does not have the network administrator's permission must not enable the SecureNAT function. For a detailed explanation of the SecureNAT function, please refer to the VPN Server's manual and online documentation. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n this.EnableSecureNAT = function (in_param) {\r\n return _this.CallAsync(\"EnableSecureNAT\", in_param);\r\n };\r\n /** Disable the Virtual NAT and DHCP Server Function (SecureNAT Function). Use this to disable the Virtual NAT and DHCP Server function (SecureNAT Function) on the currently managed Virtual Hub. By executing this API the Virtual NAT function immediately stops operating and the Virtual DHCP Server function deletes the DHCP lease database and stops the service. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n this.DisableSecureNAT = function (in_param) {\r\n return _this.CallAsync(\"DisableSecureNAT\", in_param);\r\n };\r\n /** Change Settings of SecureNAT Function. Use this to change and save the virtual host network interface settings, virtual NAT function settings and virtual DHCP server settings of the Virtual NAT and DHCP Server function (SecureNAT function) on the currently managed Virtual Hub. The SecureNAT function holds one virtual network adapter on the L2 segment inside the Virtual Hub and it has been assigned a MAC address and an IP address. By doing this, another host connected to the same L2 segment is able to communicate with the SecureNAT virtual host as if it is an actual IP host existing on the network. [Warning about SecureNAT Function] The SecureNAT function is recommended only for system administrators and people with a detailed knowledge of networks. If you use the SecureNAT function correctly, it is possible to achieve a safe form of remote access via a VPN. However when used in the wrong way, it can put the entire network in danger. Anyone who does not have a thorough knowledge of networks and anyone who does not have the network administrators permission must not enable the SecureNAT function. For a detailed explanation of the SecureNAT function, please refer to the VPN Server's manual and online documentation. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n this.SetSecureNATOption = function (in_param) {\r\n return _this.CallAsync(\"SetSecureNATOption\", in_param);\r\n };\r\n /** Get Settings of SecureNAT Function. This API get the registered settings for the SecureNAT function which is set by the SetSecureNATOption API. */\r\n this.GetSecureNATOption = function (in_param) {\r\n return _this.CallAsync(\"GetSecureNATOption\", in_param);\r\n };\r\n /** Get Virtual NAT Function Session Table of SecureNAT Function. Use this to get the table of TCP and UDP sessions currently communicating via the Virtual NAT (NAT table) in cases when the Virtual NAT function is operating on the currently managed Virtual Hub. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n this.EnumNAT = function (in_param) {\r\n return _this.CallAsync(\"EnumNAT\", in_param);\r\n };\r\n /** Get Virtual DHCP Server Function Lease Table of SecureNAT Function. Use this to get the lease table of IP addresses, held by the Virtual DHCP Server, that are assigned to clients in cases when the Virtual NAT function is operating on the currently managed Virtual Hub. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n this.EnumDHCP = function (in_param) {\r\n return _this.CallAsync(\"EnumDHCP\", in_param);\r\n };\r\n /** Get the Operating Status of the Virtual NAT and DHCP Server Function (SecureNAT Function). Use this to get the operating status of the Virtual NAT and DHCP Server function (SecureNAT Function) when it is operating on the currently managed Virtual Hub. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n this.GetSecureNATStatus = function (in_param) {\r\n return _this.CallAsync(\"GetSecureNATStatus\", in_param);\r\n };\r\n /** Get List of Network Adapters Usable as Local Bridge. Use this to get a list of Ethernet devices (network adapters) that can be used as a bridge destination device as part of a Local Bridge connection. If possible, network connection name is displayed. You can use a device displayed here by using the AddLocalBridge API. To call this API, you must have VPN Server administrator privileges. */\r\n this.EnumEthernet = function () {\r\n return _this.CallAsync(\"EnumEthernet\", new VpnRpcEnumEth());\r\n };\r\n /** Create Local Bridge Connection. Use this to create a new Local Bridge connection on the VPN Server. By using a Local Bridge, you can configure a Layer 2 bridge connection between a Virtual Hub operating on this VPN server and a physical Ethernet Device (Network Adapter). You can create a tap device (virtual network interface) on the system and connect a bridge between Virtual Hubs (the tap device is only supported by Linux versions). It is possible to establish a bridge to an operating network adapter of your choice for the bridge destination Ethernet device (network adapter), but in high load environments, we recommend you prepare a network adapter dedicated to serve as a bridge. To call this API, you must have VPN Server administrator privileges. */\r\n this.AddLocalBridge = function (in_param) {\r\n return _this.CallAsync(\"AddLocalBridge\", in_param);\r\n };\r\n /** Delete Local Bridge Connection. Use this to delete an existing Local Bridge connection. To get a list of current Local Bridge connections use the EnumLocalBridge API. To call this API, you must have VPN Server administrator privileges. */\r\n this.DeleteLocalBridge = function (in_param) {\r\n return _this.CallAsync(\"DeleteLocalBridge\", in_param);\r\n };\r\n /** Get List of Local Bridge Connection. Use this to get a list of the currently defined Local Bridge connections. You can get the Local Bridge connection Virtual Hub name and the bridge destination Ethernet device (network adapter) name or tap device name, as well as the operating status. */\r\n this.EnumLocalBridge = function () {\r\n return _this.CallAsync(\"EnumLocalBridge\", new VpnRpcEnumLocalBridge());\r\n };\r\n /** Get whether the localbridge function is supported on the current system. */\r\n this.GetBridgeSupport = function () {\r\n return _this.CallAsync(\"GetBridgeSupport\", new VpnRpcBridgeSupport());\r\n };\r\n /** Reboot VPN Server Service. Use this to restart the VPN Server service. When you restart the VPN Server, all currently connected sessions and TCP connections will be disconnected and no new connections will be accepted until the restart process has completed. By using this API, only the VPN Server service program will be restarted and the physical computer that VPN Server is operating on does not restart. This management session will also be disconnected, so you will need to reconnect to continue management. Also, by specifying the \"IntValue\" parameter to \"1\", the contents of the configuration file (.config) held by the current VPN Server will be initialized. To call this API, you must have VPN Server administrator privileges. */\r\n this.RebootServer = function (in_param) {\r\n return _this.CallAsync(\"RebootServer\", in_param);\r\n };\r\n /** Get List of Server Functions / Capability. Use this get a list of functions and capability of the VPN Server currently connected and being managed. The function and capability of VPN Servers are different depending on the operating VPN server's edition and version. Using this API, you can find out the capability of the target VPN Server and report it. */\r\n this.GetCaps = function () {\r\n return _this.CallAsync(\"GetCaps\", new VpnCapslist());\r\n };\r\n /** Get the current configuration of the VPN Server. Use this to get a text file (.config file) that contains the current configuration contents of the VPN server. You can get the status on the VPN Server at the instant this API is executed. You can edit the configuration file by using a regular text editor. To write an edited configuration to the VPN Server, use the SetConfig API. To call this API, you must have VPN Server administrator privileges. */\r\n this.GetConfig = function () {\r\n return _this.CallAsync(\"GetConfig\", new VpnRpcConfig());\r\n };\r\n /** Write Configuration File to VPN Server. Use this to write the configuration file to the VPN Server. By executing this API, the contents of the specified configuration file will be applied to the VPN Server and the VPN Server program will automatically restart and upon restart, operate according to the new configuration contents. Because it is difficult for an administrator to write all the contents of a configuration file, we recommend you use the GetConfig API to get the current contents of the VPN Server configuration and save it to file. You can then edit these contents in a regular text editor and then use the SetConfig API to rewrite the contents to the VPN Server. This API is for people with a detailed knowledge of the VPN Server and if an incorrectly configured configuration file is written to the VPN Server, it not only could cause errors, it could also result in the lost of the current setting data. Take special care when carrying out this action. To call this API, you must have VPN Server administrator privileges. */\r\n this.SetConfig = function (in_param) {\r\n return _this.CallAsync(\"SetConfig\", in_param);\r\n };\r\n /** Get Virtual Hub Administration Option default values. */\r\n this.GetDefaultHubAdminOptions = function (in_param) {\r\n return _this.CallAsync(\"GetDefaultHubAdminOptions\", in_param);\r\n };\r\n /** Get List of Virtual Hub Administration Options. Use this to get a list of Virtual Hub administration options that are set on the currently managed Virtual Hub. The purpose of the Virtual Hub administration options is for the VPN Server Administrator to set limits for the setting ranges when the administration of the Virtual Hub is to be trusted to each Virtual Hub administrator. Only an administrator with administration privileges for this entire VPN Server is able to add, edit and delete the Virtual Hub administration options. The Virtual Hub administrators are unable to make changes to the administration options, however they are able to view them. There is an exception however. If allow_hub_admin_change_option is set to \"1\", even Virtual Hub administrators are able to edit the administration options. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster member. */\r\n this.GetHubAdminOptions = function (in_param) {\r\n return _this.CallAsync(\"GetHubAdminOptions\", in_param);\r\n };\r\n /** Set Values of Virtual Hub Administration Options. Use this to change the values of Virtual Hub administration options that are set on the currently managed Virtual Hub. The purpose of the Virtual Hub administration options is for the VPN Server Administrator to set limits for the setting ranges when the administration of the Virtual Hub is to be trusted to each Virtual Hub administrator. Only an administrator with administration privileges for this entire VPN Server is able to add, edit and delete the Virtual Hub administration options. The Virtual Hub administrators are unable to make changes to the administration options, however they are able to view them. There is an exception however. If allow_hub_admin_change_option is set to \"1\", even Virtual Hub administrators are able to edit the administration options. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster member. */\r\n this.SetHubAdminOptions = function (in_param) {\r\n return _this.CallAsync(\"SetHubAdminOptions\", in_param);\r\n };\r\n /** Get List of Virtual Hub Extended Options. Use this to get a Virtual Hub Extended Options List that is set on the currently managed Virtual Hub. Virtual Hub Extended Option enables you to configure more detail settings of the Virtual Hub. By default, both VPN Server's global administrators and individual Virtual Hub's administrators can modify the Virtual Hub Extended Options. However, if the deny_hub_admin_change_ext_option is set to 1 on the Virtual Hub Admin Options, the individual Virtual Hub's administrators cannot modify the Virtual Hub Extended Options. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster member. */\r\n this.GetHubExtOptions = function (in_param) {\r\n return _this.CallAsync(\"GetHubExtOptions\", in_param);\r\n };\r\n /** Set a Value of Virtual Hub Extended Options. Use this to set a value in the Virtual Hub Extended Options List that is set on the currently managed Virtual Hub. Virtual Hub Extended Option enables you to configure more detail settings of the Virtual Hub. By default, both VPN Server's global administrators and individual Virtual Hub's administrators can modify the Virtual Hub Extended Options. However, if the deny_hub_admin_change_ext_option is set to 1 on the Virtual Hub Admin Options, the individual Virtual Hub's administrators cannot modify the Virtual Hub Extended Options. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster member. */\r\n this.SetHubExtOptions = function (in_param) {\r\n return _this.CallAsync(\"SetHubExtOptions\", in_param);\r\n };\r\n /** Define New Virtual Layer 3 Switch. Use this to define a new Virtual Layer 3 Switch on the VPN Server. To call this API, you must have VPN Server administrator privileges. Also, this API does not operate on VPN Bridge. [Explanation on Virtual Layer 3 Switch Function] You can define Virtual Layer 3 Switches between multiple Virtual Hubs operating on this VPN Server and configure routing between different IP networks. [Caution about the Virtual Layer 3 Switch Function] The Virtual Layer 3 Switch functions are provided for network administrators and other people who know a lot about networks and IP routing. If you are using the regular VPN functions, you do not need to use the Virtual Layer 3 Switch functions. If the Virtual Layer 3 Switch functions are to be used, the person who configures them must have sufficient knowledge of IP routing and be perfectly capable of not impacting the network. */\r\n this.AddL3Switch = function (in_param) {\r\n return _this.CallAsync(\"AddL3Switch\", in_param);\r\n };\r\n /** Delete Virtual Layer 3 Switch. Use this to delete an existing Virtual Layer 3 Switch that is defined on the VPN Server. When the specified Virtual Layer 3 Switch is operating, it will be automatically deleted after operation stops. To get a list of existing Virtual Layer 3 Switches, use the EnumL3Switch API. To call this API, you must have VPN Server administrator privileges. Also, this API does not operate on VPN Bridge. */\r\n this.DelL3Switch = function (in_param) {\r\n return _this.CallAsync(\"DelL3Switch\", in_param);\r\n };\r\n /** Get List of Virtual Layer 3 Switches. Use this to define a new Virtual Layer 3 Switch on the VPN Server. To call this API, you must have VPN Server administrator privileges. Also, this API does not operate on VPN Bridge. [Explanation on Virtual Layer 3 Switch Function] You can define Virtual Layer 3 Switches between multiple Virtual Hubs operating on this VPN Server and configure routing between different IP networks. [Caution about the Virtual Layer 3 Switch Function] The Virtual Layer 3 Switch functions are provided for network administrators and other people who know a lot about networks and IP routing. If you are using the regular VPN functions, you do not need to use the Virtual Layer 3 Switch functions. If the Virtual Layer 3 Switch functions are to be used, the person who configures them must have sufficient knowledge of IP routing and be perfectly capable of not impacting the network. */\r\n this.EnumL3Switch = function () {\r\n return _this.CallAsync(\"EnumL3Switch\", new VpnRpcEnumL3Sw());\r\n };\r\n /** Start Virtual Layer 3 Switch Operation. Use this to start the operation of an existing Virtual Layer 3 Switch defined on the VPN Server whose operation is currently stopped. To get a list of existing Virtual Layer 3 Switches, use the EnumL3Switch API. To call this API, you must have VPN Server administrator privileges. Also, this API does not operate on VPN Bridge. [Explanation on Virtual Layer 3 Switch Function] You can define Virtual Layer 3 Switches between multiple Virtual Hubs operating on this VPN Server and configure routing between different IP networks. [Caution about the Virtual Layer 3 Switch Function] The Virtual Layer 3 Switch functions are provided for network administrators and other people who know a lot about networks and IP routing. If you are using the regular VPN functions, you do not need to use the Virtual Layer 3 Switch functions. If the Virtual Layer 3 Switch functions are to be used, the person who configures them must have sufficient knowledge of IP routing and be perfectly capable of not impacting the network. */\r\n this.StartL3Switch = function (in_param) {\r\n return _this.CallAsync(\"StartL3Switch\", in_param);\r\n };\r\n /** Stop Virtual Layer 3 Switch Operation. Use this to stop the operation of an existing Virtual Layer 3 Switch defined on the VPN Server whose operation is currently operating. To get a list of existing Virtual Layer 3 Switches, use the EnumL3Switch API. To call this API, you must have VPN Server administrator privileges. */\r\n this.StopL3Switch = function (in_param) {\r\n return _this.CallAsync(\"StopL3Switch\", in_param);\r\n };\r\n /** Add Virtual Interface to Virtual Layer 3 Switch. Use this to add to a specified Virtual Layer 3 Switch, a virtual interface that connects to a Virtual Hub operating on the same VPN Server. You can define multiple virtual interfaces and routing tables for a single Virtual Layer 3 Switch. A virtual interface is associated to a virtual Hub and operates as a single IP host on the Virtual Hub when that Virtual Hub is operating. When multiple virtual interfaces that respectively belong to a different IP network of a different Virtual Hub are defined, IP routing will be automatically performed between these interfaces. You must define the IP network space that the virtual interface belongs to and the IP address of the interface itself. Also, you must specify the name of the Virtual Hub that the interface will connect to. You can specify a Virtual Hub that currently doesn't exist for the Virtual Hub name. The virtual interface must have one IP address in the Virtual Hub. You also must specify the subnet mask of an IP network that the IP address belongs to. Routing via the Virtual Layer 3 Switches of IP spaces of multiple virtual Hubs operates based on the IP address is specified here. To call this API, you must have VPN Server administrator privileges. Also, this API does not operate on VPN Bridge. To execute this API, the target Virtual Layer 3 Switch must be stopped. If it is not stopped, first use the StopL3Switch API to stop it and then execute this API. */\r\n this.AddL3If = function (in_param) {\r\n return _this.CallAsync(\"AddL3If\", in_param);\r\n };\r\n /** Delete Virtual Interface of Virtual Layer 3 Switch. Use this to delete a virtual interface already defined in the specified Virtual Layer 3 Switch. You can get a list of the virtual interfaces currently defined, by using the EnumL3If API. To call this API, you must have VPN Server administrator privileges. Also, this API does not operate on VPN Bridge. To execute this API, the target Virtual Layer 3 Switch must be stopped. If it is not stopped, first use the StopL3Switch API to stop it and then execute this API. */\r\n this.DelL3If = function (in_param) {\r\n return _this.CallAsync(\"DelL3If\", in_param);\r\n };\r\n /** Get List of Interfaces Registered on the Virtual Layer 3 Switch. Use this to get a list of virtual interfaces when virtual interfaces have been defined on a specified Virtual Layer 3 Switch. You can define multiple virtual interfaces and routing tables for a single Virtual Layer 3 Switch. A virtual interface is associated to a virtual Hub and operates as a single IP host on the Virtual Hub when that Virtual Hub is operating. When multiple virtual interfaces that respectively belong to a different IP network of a different Virtual Hub are defined, IP routing will be automatically performed between these interfaces. To call this API, you must have VPN Server administrator privileges. Also, this API does not operate on VPN Bridge. */\r\n this.EnumL3If = function (in_param) {\r\n return _this.CallAsync(\"EnumL3If\", in_param);\r\n };\r\n /** Add Routing Table Entry for Virtual Layer 3 Switch. Here you can add a new routing table entry to the routing table of the specified Virtual Layer 3 Switch. If the destination IP address of the IP packet does not belong to any IP network that belongs to a virtual interface, the IP routing engine of the Virtual Layer 3 Switch will reference the routing table and execute routing. You must specify the contents of the routing table entry to be added to the Virtual Layer 3 Switch. You must specify any IP address that belongs to the same IP network in the virtual interface of this Virtual Layer 3 Switch as the gateway address. To call this API, you must have VPN Server administrator privileges. Also, this API does not operate on VPN Bridge. To execute this API, the target Virtual Layer 3 Switch must be stopped. If it is not stopped, first use the StopL3Switch API to stop it and then execute this API. */\r\n this.AddL3Table = function (in_param) {\r\n return _this.CallAsync(\"AddL3Table\", in_param);\r\n };\r\n /** Delete Routing Table Entry of Virtual Layer 3 Switch. Use this to delete a routing table entry that is defined in the specified Virtual Layer 3 Switch. You can get a list of the already defined routing table entries by using the EnumL3Table API. To call this API, you must have VPN Server administrator privileges. Also, this API does not operate on VPN Bridge. To execute this API, the target Virtual Layer 3 Switch must be stopped. If it is not stopped, first use the StopL3Switch API to stop it and then execute this API. */\r\n this.DelL3Table = function (in_param) {\r\n return _this.CallAsync(\"DelL3Table\", in_param);\r\n };\r\n /** Get List of Routing Tables of Virtual Layer 3 Switch. Use this to get a list of routing tables when routing tables have been defined on a specified Virtual Layer 3 Switch. If the destination IP address of the IP packet does not belong to any IP network that belongs to a virtual interface, the IP routing engine of the Virtual Layer 3 Switch will reference this routing table and execute routing. To call this API, you must have VPN Server administrator privileges. Also, this API does not operate on VPN Bridge. */\r\n this.EnumL3Table = function (in_param) {\r\n return _this.CallAsync(\"EnumL3Table\", in_param);\r\n };\r\n /** Get List of Certificates Revocation List. Use this to get a Certificates Revocation List that is set on the currently managed Virtual Hub. By registering certificates in the Certificates Revocation List, the clients who provide these certificates will be unable to connect to this Virtual Hub using certificate authentication mode. Normally with this function, in cases where the security of a private key has been compromised or where a person holding a certificate has been stripped of their privileges, by registering that certificate as invalid on the Virtual Hub, it is possible to deny user authentication when that certificate is used by a client to connect to the Virtual Hub. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n this.EnumCrl = function (in_param) {\r\n return _this.CallAsync(\"EnumCrl\", in_param);\r\n };\r\n /** Add a Revoked Certificate. Use this to add a new revoked certificate definition in the Certificate Revocation List that is set on the currently managed Virtual Hub. Specify the contents to be registered in the Certificate Revocation List by using the parameters of this API. When a user connects to a Virtual Hub in certificate authentication mode and that certificate matches 1 or more of the contents registered in the certificates revocation list, the user is denied connection. A certificate that matches all the conditions that are defined by the parameters specified by this API will be judged as invalid. The items that can be set are as follows: Name (CN), Organization (O), Organization Unit (OU), Country (C), State (ST), Locale (L), Serial Number (hexadecimal), MD5 Digest Value (hexadecimal, 128 bit), and SHA-1 Digest Value (hexadecimal, 160 bit). For the specification of a digest value (hash value) a certificate is optionally specified depending on the circumstances. Normally when a MD5 or SHA-1 digest value is input, it is not necessary to input the other items. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n this.AddCrl = function (in_param) {\r\n return _this.CallAsync(\"AddCrl\", in_param);\r\n };\r\n /** Delete a Revoked Certificate. Use this to specify and delete a revoked certificate definition from the certificate revocation list that is set on the currently managed Virtual Hub. To get the list of currently registered revoked certificate definitions, use the EnumCrl API. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n this.DelCrl = function (in_param) {\r\n return _this.CallAsync(\"DelCrl\", in_param);\r\n };\r\n /** Get a Revoked Certificate. Use this to specify and get the contents of a revoked certificate definition from the Certificates Revocation List that is set on the currently managed Virtual Hub. To get the list of currently registered revoked certificate definitions, use the EnumCrl API. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n this.GetCrl = function (in_param) {\r\n return _this.CallAsync(\"GetCrl\", in_param);\r\n };\r\n /** Change Existing CRL (Certificate Revocation List) Entry. Use this to alter an existing revoked certificate definition in the Certificate Revocation List that is set on the currently managed Virtual Hub. Specify the contents to be registered in the Certificate Revocation List by using the parameters of this API. When a user connects to a Virtual Hub in certificate authentication mode and that certificate matches 1 or more of the contents registered in the certificates revocation list, the user is denied connection. A certificate that matches all the conditions that are defined by the parameters specified by this API will be judged as invalid. The items that can be set are as follows: Name (CN), Organization (O), Organization Unit (OU), Country (C), State (ST), Locale (L), Serial Number (hexadecimal), MD5 Digest Value (hexadecimal, 128 bit), and SHA-1 Digest Value (hexadecimal, 160 bit). For the specification of a digest value (hash value) a certificate is optionally specified depending on the circumstances. Normally when a MD5 or SHA-1 digest value is input, it is not necessary to input the other items. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n this.SetCrl = function (in_param) {\r\n return _this.CallAsync(\"SetCrl\", in_param);\r\n };\r\n /** Add Rule to Source IP Address Limit List. Use this to add a new rule to the Source IP Address Limit List that is set on the currently managed Virtual Hub. The items set here will be used to decide whether to allow or deny connection from a VPN Client when this client attempts connection to the Virtual Hub. You can specify a client IP address, or IP address or mask to match the rule as the contents of the rule item. By specifying an IP address only, there will only be one specified computer that will match the rule, but by specifying an IP net mask address or subnet mask address, all the computers in the range of that subnet will match the rule. You can specify the priority for the rule. You can specify an integer of 1 or greater for the priority and the smaller the number, the higher the priority. To get a list of the currently registered Source IP Address Limit List, use the GetAcList API. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n this.SetAcList = function (in_param) {\r\n return _this.CallAsync(\"SetAcList\", in_param);\r\n };\r\n /** Get List of Rule Items of Source IP Address Limit List. Use this to get a list of Source IP Address Limit List rules that is set on the currently managed Virtual Hub. You can allow or deny VPN connections to this Virtual Hub according to the client computer's source IP address. You can define multiple rules and set a priority for each rule. The search proceeds from the rule with the highest order or priority and based on the action of the rule that the IP address first matches, the connection from the client is either allowed or denied. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n this.GetAcList = function (in_param) {\r\n return _this.CallAsync(\"GetAcList\", in_param);\r\n };\r\n /** Get List of Log Files. Use this to display a list of log files outputted by the VPN Server that have been saved on the VPN Server computer. By specifying a log file file name displayed here and calling it using the ReadLogFile API you can download the contents of the log file. If you are connected to the VPN Server in server admin mode, you can display or download the packet logs and security logs of all Virtual Hubs and the server log of the VPN Server. When connected in Virtual Hub Admin Mode, you are able to view or download only the packet log and security log of the Virtual Hub that is the target of management. */\r\n this.EnumLogFile = function () {\r\n return _this.CallAsync(\"EnumLogFile\", new VpnRpcEnumLogFile());\r\n };\r\n /** Download a part of Log File. Use this to download the log file that is saved on the VPN Server computer. To download the log file first get the list of log files using the EnumLogFile API and then download the log file using the ReadLogFile API. If you are connected to the VPN Server in server admin mode, you can display or download the packet logs and security logs of all Virtual Hubs and the server log of the VPN Server. When connected in Virtual Hub Admin Mode, you are able to view or download only the packet log and security log of the Virtual Hub that is the target of management. */\r\n this.ReadLogFile = function (in_param) {\r\n return _this.CallAsync(\"ReadLogFile\", in_param);\r\n };\r\n /** Set syslog Send Function. Use this to set the usage of syslog send function and which syslog server to use. */\r\n this.SetSysLog = function (in_param) {\r\n return _this.CallAsync(\"SetSysLog\", in_param);\r\n };\r\n /** Get syslog Send Function. This allows you to get the current setting contents of the syslog send function. You can get the usage setting of the syslog function and the host name and port number of the syslog server to use. */\r\n this.GetSysLog = function (in_param) {\r\n return _this.CallAsync(\"GetSysLog\", in_param);\r\n };\r\n /** Set Today's Message of Virtual Hub. The message will be displayed on VPN Client UI when a user will establish a connection to the Virtual Hub. */\r\n this.SetHubMsg = function (in_param) {\r\n return _this.CallAsync(\"SetHubMsg\", in_param);\r\n };\r\n /** Get Today's Message of Virtual Hub. The message will be displayed on VPN Client UI when a user will establish a connection to the Virtual Hub. */\r\n this.GetHubMsg = function (in_param) {\r\n return _this.CallAsync(\"GetHubMsg\", in_param);\r\n };\r\n /** Raise a vital error on the VPN Server / Bridge to terminate the process forcefully. This API will raise a fatal error (memory access violation) on the VPN Server / Bridge running process in order to crash the process. As the result, VPN Server / Bridge will be terminated and restarted if it is running as a service mode. If the VPN Server is running as a user mode, the process will not automatically restarted. This API is for a situation when the VPN Server / Bridge is under a non-recoverable error or the process is in an infinite loop. This API will disconnect all VPN Sessions on the VPN Server / Bridge. All unsaved settings in the memory of VPN Server / Bridge will be lost. Before run this API, call the Flush API to try to save volatile data to the configuration file. To execute this API, you must have VPN Server / VPN Bridge administrator privileges. */\r\n this.Crash = function (in_param) {\r\n return _this.CallAsync(\"Crash\", in_param);\r\n };\r\n /** Get the message for administrators. */\r\n this.GetAdminMsg = function () {\r\n return _this.CallAsync(\"GetAdminMsg\", new VpnRpcMsg());\r\n };\r\n /** Save All Volatile Data of VPN Server / Bridge to the Configuration File. The number of configuration file bytes will be returned as the \"IntValue\" parameter. Normally, the VPN Server / VPN Bridge retains the volatile configuration data in memory. It is flushed to the disk as vpn_server.config or vpn_bridge.config periodically. The period is 300 seconds (5 minutes) by default. (The period can be altered by modifying the AutoSaveConfigSpan item in the configuration file.) The data will be saved on the timing of shutting down normally of the VPN Server / Bridge. Execute the Flush API to make the VPN Server / Bridge save the settings to the file immediately. The setting data will be stored on the disk drive of the server computer. Use the Flush API in a situation that you do not have an enough time to shut down the server process normally. To call this API, you must have VPN Server administrator privileges. To execute this API, you must have VPN Server / VPN Bridge administrator privileges. */\r\n this.Flush = function (in_param) {\r\n return _this.CallAsync(\"Flush\", in_param);\r\n };\r\n /** Enable or Disable IPsec VPN Server Function. Enable or Disable IPsec VPN Server Function on the VPN Server. If you enable this function, Virtual Hubs on the VPN Server will be able to accept Remote-Access VPN connections from L2TP-compatible PCs, Mac OS X and Smartphones, and also can accept EtherIP Site-to-Site VPN Connection. VPN Connections from Smartphones suchlike iPhone, iPad and Android, and also from native VPN Clients on Mac OS X and Windows can be accepted. To call this API, you must have VPN Server administrator privileges. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n this.SetIPsecServices = function (in_param) {\r\n return _this.CallAsync(\"SetIPsecServices\", in_param);\r\n };\r\n /** Get the Current IPsec VPN Server Settings. Get and view the current IPsec VPN Server settings on the VPN Server. To call this API, you must have VPN Server administrator privileges. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n this.GetIPsecServices = function () {\r\n return _this.CallAsync(\"GetIPsecServices\", new VpnIPsecServices());\r\n };\r\n /** Add New EtherIP / L2TPv3 over IPsec Client Setting to Accept EthreIP / L2TPv3 Client Devices. Add a new setting entry to enable the EtherIP / L2TPv3 over IPsec Server Function to accept client devices. In order to accept connections from routers by the EtherIP / L2TPv3 over IPsec Server Function, you have to define the relation table between an IPsec Phase 1 string which is presented by client devices of EtherIP / L2TPv3 over IPsec compatible router, and the designation of the destination Virtual Hub. After you add a definition entry by AddEtherIpId API, the defined connection setting to the Virtual Hub will be applied on the login-attepting session from an EtherIP / L2TPv3 over IPsec client device. The username and password in an entry must be registered on the Virtual Hub. An EtherIP / L2TPv3 client will be regarded as it connected the Virtual HUB with the identification of the above user information. To call this API, you must have VPN Server administrator privileges. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n this.AddEtherIpId = function (in_param) {\r\n return _this.CallAsync(\"AddEtherIpId\", in_param);\r\n };\r\n /** Get the Current List of EtherIP / L2TPv3 Client Device Entry Definitions. This API gets and shows the list of entries to accept VPN clients by EtherIP / L2TPv3 over IPsec Function. To call this API, you must have VPN Server administrator privileges. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n this.GetEtherIpId = function (in_param) {\r\n return _this.CallAsync(\"GetEtherIpId\", in_param);\r\n };\r\n /** Delete an EtherIP / L2TPv3 over IPsec Client Setting. This API deletes an entry to accept VPN clients by EtherIP / L2TPv3 over IPsec Function. To call this API, you must have VPN Server administrator privileges. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n this.DeleteEtherIpId = function (in_param) {\r\n return _this.CallAsync(\"DeleteEtherIpId\", in_param);\r\n };\r\n /** Get the Current List of EtherIP / L2TPv3 Client Device Entry Definitions. This API gets and shows the list of entries to accept VPN clients by EtherIP / L2TPv3 over IPsec Function. To call this API, you must have VPN Server administrator privileges. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n this.EnumEtherIpId = function () {\r\n return _this.CallAsync(\"EnumEtherIpId\", new VpnRpcEnumEtherIpId());\r\n };\r\n /** Set Settings for OpenVPN Clone Server Function. The VPN Server has the clone functions of OpenVPN software products by OpenVPN Technologies, Inc. Any OpenVPN Clients can connect to this VPN Server. The manner to specify a username to connect to the Virtual Hub, and the selection rule of default Hub by using this clone server functions are same to the IPsec Server functions. To call this API, you must have VPN Server administrator privileges. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n this.SetOpenVpnSstpConfig = function (in_param) {\r\n return _this.CallAsync(\"SetOpenVpnSstpConfig\", in_param);\r\n };\r\n /** Get the Current Settings of OpenVPN Clone Server Function. Get and show the current settings of OpenVPN Clone Server Function. To call this API, you must have VPN Server administrator privileges. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n this.GetOpenVpnSstpConfig = function () {\r\n return _this.CallAsync(\"GetOpenVpnSstpConfig\", new VpnOpenVpnSstpConfig());\r\n };\r\n /** Show the Current Status of Dynamic DNS Function. Get and show the current status of the Dynamic DNS function. The Dynamic DNS assigns a unique and permanent DNS hostname for this VPN Server. You can use that hostname to specify this VPN Server on the settings for VPN Client and VPN Bridge. You need not to register and keep a domain name. Also, if your ISP assignes you a dynamic (not-fixed) IP address, the corresponding IP address of your Dynamic DNS hostname will be automatically changed. It enables you to keep running the VPN Server by using only a dynamic IP address. Therefore, you need not any longer to keep static global IP addresses with expenses monthly costs. [Caution] To disable the Dynamic DNS Function, modify the configuration file of VPN Server. The \"declare root\" directive has the \"declare DDnsClient\" directive. In this directive, you can switch \"bool Disable\" from false to true, and reboot the VPN Server, then the Dynamic DNS Function will be disabled. To call this API, you must have VPN Server administrator privileges. This API cannot be invoked on VPN Bridge. */\r\n this.GetDDnsClientStatus = function () {\r\n return _this.CallAsync(\"GetDDnsClientStatus\", new VpnDDnsClientStatus());\r\n };\r\n /** Set the Dynamic DNS Hostname. You must specify the new hostname on the StrValue_str field. You can use this API to change the hostname assigned by the Dynamic DNS function. The currently assigned hostname can be showen by the GetDDnsClientStatus API. The Dynamic DNS assigns a unique and permanent DNS hostname for this VPN Server. You can use that hostname to specify this VPN Server on the settings for VPN Client and VPN Bridge. You need not to register and keep a domain name. Also, if your ISP assignes you a dynamic (not-fixed) IP address, the corresponding IP address of your Dynamic DNS hostname will be automatically changed. It enables you to keep running the VPN Server by using only a dynamic IP address. Therefore, you need not any longer to keep static global IP addresses with expenses monthly costs. [Caution] To disable the Dynamic DNS Function, modify the configuration file of VPN Server. The \"declare root\" directive has the \"declare DDnsClient\" directive. In this directive, you can switch \"bool Disable\" from false to true, and reboot the VPN Server, then the Dynamic DNS Function will be disabled. To call this API, you must have VPN Server administrator privileges. This API cannot be invoked on VPN Bridge. */\r\n this.ChangeDDnsClientHostname = function (in_param) {\r\n return _this.CallAsync(\"ChangeDDnsClientHostname\", in_param);\r\n };\r\n /** Generate New Self-Signed Certificate with Specified CN (Common Name) and Register on VPN Server. You can specify the new CN (common name) value on the StrValue_str field. You can use this API to replace the current certificate on the VPN Server to a new self-signed certificate which has the CN (Common Name) value in the fields. This API is convenient if you are planning to use Microsoft SSTP VPN Clone Server Function. Because of the value of CN (Common Name) on the SSL certificate of VPN Server must match to the hostname specified on the SSTP VPN client. This API will delete the existing SSL certificate of the VPN Server. It is recommended to backup the current SSL certificate and private key by using the GetServerCert API beforehand. To call this API, you must have VPN Server administrator privileges. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n this.RegenerateServerCert = function (in_param) {\r\n return _this.CallAsync(\"RegenerateServerCert\", in_param);\r\n };\r\n /** Generate a Sample Setting File for OpenVPN Client. Originally, the OpenVPN Client requires a user to write a very difficult configuration file manually. This API helps you to make a useful configuration sample. What you need to generate the configuration file for the OpenVPN Client is to run this API. To call this API, you must have VPN Server administrator privileges. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n this.MakeOpenVpnConfigFile = function () {\r\n return _this.CallAsync(\"MakeOpenVpnConfigFile\", new VpnRpcReadLogFile());\r\n };\r\n /** Enable / Disable the VPN over ICMP / VPN over DNS Server Function. You can establish a VPN only with ICMP or DNS packets even if there is a firewall or routers which blocks TCP/IP communications. You have to enable the following functions beforehand. Warning: Use this function for emergency only. It is helpful when a firewall or router is misconfigured to blocks TCP/IP, but either ICMP or DNS is not blocked. It is not for long-term stable using. To call this API, you must have VPN Server administrator privileges. This API cannot be invoked on VPN Bridge. */\r\n this.SetSpecialListener = function (in_param) {\r\n return _this.CallAsync(\"SetSpecialListener\", in_param);\r\n };\r\n /** Get Current Setting of the VPN over ICMP / VPN over DNS Function. Get and show the current VPN over ICMP / VPN over DNS Function status. To call this API, you must have VPN Server administrator privileges. This API cannot be invoked on VPN Bridge. */\r\n this.GetSpecialListener = function () {\r\n return _this.CallAsync(\"GetSpecialListener\", new VpnRpcSpecialListener());\r\n };\r\n /** Show the current status of VPN Azure function. Get and show the current status of the VPN Azure function. VPN Azure makes it easier to establish a VPN Session from your home PC to your office PC. While a VPN connection is established, you can access to any other servers on the private network of your company. You don't need a global IP address on the office PC (VPN Server). It can work behind firewalls or NATs. No network administrator's configuration required. You can use the built-in SSTP-VPN Client of Windows in your home PC. VPN Azure is a cloud VPN service operated by SoftEther Corporation. VPN Azure is free of charge and available to anyone. Visit http://www.vpnazure.net/ to see details and how-to-use instructions. The VPN Azure hostname is same to the hostname of the Dynamic DNS setting, but altering the domain suffix to \"vpnazure.net\". To change the hostname use the ChangeDDnsClientHostname API. To call this API, you must have VPN Server administrator privileges. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n this.GetAzureStatus = function () {\r\n return _this.CallAsync(\"GetAzureStatus\", new VpnRpcAzureStatus());\r\n };\r\n /** Enable / Disable VPN Azure Function. Enable or disable the VPN Azure function. VPN Azure makes it easier to establish a VPN Session from your home PC to your office PC. While a VPN connection is established, you can access to any other servers on the private network of your company. You don't need a global IP address on the office PC (VPN Server). It can work behind firewalls or NATs. No network administrator's configuration required. You can use the built-in SSTP-VPN Client of Windows in your home PC. VPN Azure is a cloud VPN service operated by SoftEther Corporation. VPN Azure is free of charge and available to anyone. Visit http://www.vpnazure.net/ to see details and how-to-use instructions. The VPN Azure hostname is same to the hostname of the Dynamic DNS setting, but altering the domain suffix to \"vpnazure.net\". To change the hostname use the ChangeDDnsClientHostname API. To call this API, you must have VPN Server administrator privileges. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n this.SetAzureStatus = function (in_param) {\r\n return _this.CallAsync(\"SetAzureStatus\", in_param);\r\n };\r\n /** Get the Proxy Settings for Connecting to the DDNS server. */\r\n this.GetDDnsInternetSettng = function () {\r\n return _this.CallAsync(\"GetDDnsInternetSettng\", new VpnInternetSetting());\r\n };\r\n /** Set the Proxy Settings for Connecting to the DDNS server. */\r\n this.SetDDnsInternetSettng = function (in_param) {\r\n return _this.CallAsync(\"SetDDnsInternetSettng\", in_param);\r\n };\r\n /** Set the VPN Gate Server Configuration. This API is valid for Win32 binary distribution of the Stable Edition of SoftEther VPN Server. */\r\n this.SetVgsConfig = function (in_param) {\r\n return _this.CallAsync(\"SetVgsConfig\", in_param);\r\n };\r\n /** Get the VPN Gate Server Configuration. This API is valid for Win32 binary distribution of the Stable Edition of SoftEther VPN Server. */\r\n this.GetVgsConfig = function () {\r\n return _this.CallAsync(\"GetVgsConfig\", new VpnVgsConfig());\r\n };\r\n var headers = {};\r\n var send_credentials = false;\r\n nodejs_https_client_reject_untrusted_server_cert = is_null(nodejs_https_client_reject_untrusted_server_cert) ? false : nodejs_https_client_reject_untrusted_server_cert;\r\n if (is_null(vpnserver_hostname)) {\r\n this.rpc_url = \"/api/\";\r\n send_credentials = true;\r\n }\r\n else {\r\n if (is_null(vpnserver_port))\r\n vpnserver_port = 443;\r\n this.rpc_url = \"https://\" + vpnserver_hostname + \":\" + vpnserver_port + \"/api/\";\r\n headers[\"X-VPNADMIN-HUBNAME\"] = is_null(hubname) ? \"\" : hubname;\r\n headers[\"X-VPNADMIN-PASSWORD\"] = is_null(password) ? \"\" : password;\r\n }\r\n if (is_null(nodejs_https_client_reject_untrusted_server_cert))\r\n nodejs_https_client_reject_untrusted_server_cert = false;\r\n this.rpc_client = new JsonRpcClient(this.rpc_url, headers, send_credentials, nodejs_https_client_reject_untrusted_server_cert);\r\n }\r\n /** Determine if this JavaScript environment is on the Node.js or not. */\r\n VpnServerRpc.IsNodeJS = function () {\r\n return is_node_js;\r\n };\r\n /** Set the debug mode flag */\r\n VpnServerRpc.SetDebugMode = function (flag) {\r\n debug_mode = flag;\r\n };\r\n // -- Utility functions --\r\n /** Call a RPC procedure */\r\n VpnServerRpc.prototype.CallAsync = function (method_name, request) {\r\n return __awaiter(this, void 0, void 0, function () {\r\n var response;\r\n return __generator(this, function (_a) {\r\n switch (_a.label) {\r\n case 0: return [4 /*yield*/, this.rpc_client.CallAsync(method_name, request)];\r\n case 1:\r\n response = _a.sent();\r\n return [2 /*return*/, response];\r\n }\r\n });\r\n });\r\n };\r\n return VpnServerRpc;\r\n}());\r\nexports.VpnServerRpc = VpnServerRpc;\r\n// --- Types ---\r\n/** IP Protocol Numbers */\r\nvar VpnIpProtocolNumber;\r\n(function (VpnIpProtocolNumber) {\r\n /** ICMP for IPv4 */\r\n VpnIpProtocolNumber[VpnIpProtocolNumber[\"ICMPv4\"] = 1] = \"ICMPv4\";\r\n /** TCP */\r\n VpnIpProtocolNumber[VpnIpProtocolNumber[\"TCP\"] = 6] = \"TCP\";\r\n /** UDP */\r\n VpnIpProtocolNumber[VpnIpProtocolNumber[\"UDP\"] = 17] = \"UDP\";\r\n /** ICMP for IPv6 */\r\n VpnIpProtocolNumber[VpnIpProtocolNumber[\"ICMPv6\"] = 58] = \"ICMPv6\";\r\n})(VpnIpProtocolNumber = exports.VpnIpProtocolNumber || (exports.VpnIpProtocolNumber = {}));\r\n/** The body of the Access list */\r\nvar VpnAccess = /** @class */ (function () {\r\n /** Constructor for the 'VpnAccess' class: The body of the Access list */\r\n function VpnAccess(init) {\r\n /** ID */\r\n this.Id_u32 = 0;\r\n /** Specify a description (note) for this rule */\r\n this.Note_utf = \"\";\r\n /** Enabled flag (true: enabled, false: disabled) */\r\n this.Active_bool = false;\r\n /** Specify an integer of 1 or higher to indicate the priority of the rule. Higher priority is given to rules with the lower priority values. */\r\n this.Priority_u32 = 0;\r\n /** The flag if the rule is DISCARD operation or PASS operation. When a packet matches this rule condition, this operation is decided. When the operation of the rule is PASS, the packet is allowed to pass, otherwise the packet will be discarded. */\r\n this.Discard_bool = false;\r\n /** The flag if the rule is for IPv6. Specify false for IPv4, or specify true for IPv6. */\r\n this.IsIPv6_bool = false;\r\n /** Valid only if the rule is IPv4 mode (IsIPv6_bool == false). Specify a source IPv4 address as a rule condition. You must also specify the SrcSubnetMask_ip field. */\r\n this.SrcIpAddress_ip = \"\";\r\n /** Valid only if the rule is IPv4 mode (IsIPv6_bool == false). Specify a source IPv4 subnet mask as a rule condition. \"0.0.0.0\" means all hosts. \"255.255.255.255\" means one single host. */\r\n this.SrcSubnetMask_ip = \"\";\r\n /** Valid only if the rule is IPv4 mode (IsIPv6_bool == false). Specify a destination IPv4 address as a rule condition. You must also specify the DestSubnetMask_ip field. */\r\n this.DestIpAddress_ip = \"\";\r\n /** Valid only if the rule is IPv4 mode (IsIPv6_bool == false). Specify a destination IPv4 subnet mask as a rule condition. \"0.0.0.0\" means all hosts. \"255.255.255.255\" means one single host. */\r\n this.DestSubnetMask_ip = \"\";\r\n /** Valid only if the rule is IPv6 mode (IsIPv6_bool == true). Specify a source IPv6 address as a rule condition. The field must be a byte array of 16 bytes (128 bits) to contain the IPv6 address in binary form. You must also specify the SrcSubnetMask6_bin field. */\r\n this.SrcIpAddress6_bin = new Uint8Array([]);\r\n /** Valid only if the rule is IPv6 mode (IsIPv6_bool == true). Specify a source IPv6 subnet mask as a rule condition. The field must be a byte array of 16 bytes (128 bits) to contain the IPv6 subnet mask in binary form. */\r\n this.SrcSubnetMask6_bin = new Uint8Array([]);\r\n /** Valid only if the rule is IPv6 mode (IsIPv6_bool == true). Specify a destination IPv6 address as a rule condition. The field must be a byte array of 16 bytes (128 bits) to contain the IPv6 address in binary form. You must also specify the DestSubnetMask6_bin field. */\r\n this.DestIpAddress6_bin = new Uint8Array([]);\r\n /** Valid only if the rule is IPv6 mode (IsIPv6_bool == true). Specify a destination IPv6 subnet mask as a rule condition. The field must be a byte array of 16 bytes (128 bits) to contain the IPv6 subnet mask in binary form. */\r\n this.DestSubnetMask6_bin = new Uint8Array([]);\r\n /** The IP protocol number */\r\n this.Protocol_u32 = 0;\r\n /** The Start Value of the Source Port Number Range. If the specified protocol is TCP/IP or UDP/IP, specify the source port number as the rule condition. Protocols other than this will be ignored. When this parameter is not specified, the rules will apply to all port numbers. */\r\n this.SrcPortStart_u32 = 0;\r\n /** The End Value of the Source Port Number Range. If the specified protocol is TCP/IP or UDP/IP, specify the source port number as the rule condition. Protocols other than this will be ignored. When this parameter is not specified, the rules will apply to all port numbers. */\r\n this.SrcPortEnd_u32 = 0;\r\n /** The Start Value of the Destination Port Number Range. If the specified protocol is TCP/IP or UDP/IP, specify the destination port number as the rule condition. Protocols other than this will be ignored. When this parameter is not specified, the rules will apply to all port numbers. */\r\n this.DestPortStart_u32 = 0;\r\n /** The End Value of the Destination Port Number Range. If the specified protocol is TCP/IP or UDP/IP, specify the destination port number as the rule condition. Protocols other than this will be ignored. When this parameter is not specified, the rules will apply to all port numbers. */\r\n this.DestPortEnd_u32 = 0;\r\n /** Source user name. You can apply this rule to only the packets sent by a user session of a user name that has been specified as a rule condition. In this case, specify the user name. */\r\n this.SrcUsername_str = \"\";\r\n /** Destination user name. You can apply this rule to only the packets received by a user session of a user name that has been specified as a rule condition. In this case, specify the user name. */\r\n this.DestUsername_str = \"\";\r\n /** Specify true if you want to check the source MAC address. */\r\n this.CheckSrcMac_bool = false;\r\n /** Source MAC address (6 bytes), valid only if CheckSrcMac_bool == true. */\r\n this.SrcMacAddress_bin = new Uint8Array([]);\r\n /** Source MAC address mask (6 bytes), valid only if CheckSrcMac_bool == true. */\r\n this.SrcMacMask_bin = new Uint8Array([]);\r\n /** Specify true if you want to check the destination MAC address. */\r\n this.CheckDstMac_bool = false;\r\n /** Destination MAC address (6 bytes), valid only if CheckSrcMac_bool == true. */\r\n this.DstMacAddress_bin = new Uint8Array([]);\r\n /** Destination MAC address mask (6 bytes), valid only if CheckSrcMac_bool == true. */\r\n this.DstMacMask_bin = new Uint8Array([]);\r\n /** Specify true if you want to check the state of the TCP connection. */\r\n this.CheckTcpState_bool = false;\r\n /** Valid only if CheckTcpState_bool == true. Set this field true to match only TCP-established packets. Set this field false to match only TCP-non established packets. */\r\n this.Established_bool = false;\r\n /** Set this value to generate delays when packets is passing. Specify the delay period in milliseconds. Specify 0 means no delays to generate. The delays must be 10000 milliseconds at most. */\r\n this.Delay_u32 = 0;\r\n /** Set this value to generate jitters when packets is passing. Specify the ratio of fluctuation of jitters within 0% to 100% range. Specify 0 means no jitters to generate. */\r\n this.Jitter_u32 = 0;\r\n /** Set this value to generate packet losses when packets is passing. Specify the ratio of packet losses within 0% to 100% range. Specify 0 means no packet losses to generate. */\r\n this.Loss_u32 = 0;\r\n /** The specified URL will be mandatory replied to the client as a response for TCP connecting request packets which matches the conditions of this access list entry via this Virtual Hub. To use this setting, you can enforce the web browser of the VPN Client computer to show the specified web site when that web browser tries to access the specific IP address. */\r\n this.RedirectUrl_str = \"\";\r\n Object.assign(this, init);\r\n }\r\n return VpnAccess;\r\n}());\r\nexports.VpnAccess = VpnAccess;\r\n/** Add an item to Access List */\r\nvar VpnRpcAddAccess = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcAddAccess' class: Add an item to Access List */\r\n function VpnRpcAddAccess(init) {\r\n /** The Virtual Hub name */\r\n this.HubName_str = \"\";\r\n /** Access list (Must be a single item) */\r\n this.AccessListSingle = [];\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcAddAccess;\r\n}());\r\nexports.VpnRpcAddAccess = VpnRpcAddAccess;\r\n/** Add CA to HUB */\r\nvar VpnRpcHubAddCA = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcHubAddCA' class: Add CA to HUB */\r\n function VpnRpcHubAddCA(init) {\r\n /** The Virtual Hub name */\r\n this.HubName_str = \"\";\r\n /** The body of the X.509 certificate */\r\n this.Cert_bin = new Uint8Array([]);\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcHubAddCA;\r\n}());\r\nexports.VpnRpcHubAddCA = VpnRpcHubAddCA;\r\n/** CRL entry */\r\nvar VpnRpcCrl = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcCrl' class: CRL entry */\r\n function VpnRpcCrl(init) {\r\n /** The Virtual Hub name */\r\n this.HubName_str = \"\";\r\n /** Key ID */\r\n this.Key_u32 = 0;\r\n /** CN, optional */\r\n this.CommonName_utf = \"\";\r\n /** O, optional */\r\n this.Organization_utf = \"\";\r\n /** OU, optional */\r\n this.Unit_utf = \"\";\r\n /** C, optional */\r\n this.Country_utf = \"\";\r\n /** ST, optional */\r\n this.State_utf = \"\";\r\n /** L, optional */\r\n this.Local_utf = \"\";\r\n /** Serial, optional */\r\n this.Serial_bin = new Uint8Array([]);\r\n /** MD5 Digest, optional */\r\n this.DigestMD5_bin = new Uint8Array([]);\r\n /** SHA1 Digest, optional */\r\n this.DigestSHA1_bin = new Uint8Array([]);\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcCrl;\r\n}());\r\nexports.VpnRpcCrl = VpnRpcCrl;\r\n/** EtherIP key list entry */\r\nvar VpnEtherIpId = /** @class */ (function () {\r\n /** Constructor for the 'VpnEtherIpId' class: EtherIP key list entry */\r\n function VpnEtherIpId(init) {\r\n /** Specify an ISAKMP Phase 1 ID. The ID must be exactly same as a ID in the configuration of the EtherIP / L2TPv3 Client. You can specify IP address as well as characters as ID, if the EtherIP Client uses IP address as Phase 1 ID. If you specify '*' (asterisk), it will be a wildcard to match any clients which doesn't match other explicit rules. */\r\n this.Id_str = \"\";\r\n /** Specify the name of the Virtual Hub to connect. */\r\n this.HubName_str = \"\";\r\n /** Specify the username to login to the destination Virtual Hub. */\r\n this.UserName_str = \"\";\r\n /** Specify the password to login to the destination Virtual Hub. */\r\n this.Password_str = \"\";\r\n Object.assign(this, init);\r\n }\r\n return VpnEtherIpId;\r\n}());\r\nexports.VpnEtherIpId = VpnEtherIpId;\r\n/** Layer-3 virtual interface */\r\nvar VpnRpcL3If = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcL3If' class: Layer-3 virtual interface */\r\n function VpnRpcL3If(init) {\r\n /** L3 switch name */\r\n this.Name_str = \"\";\r\n /** Virtual HUB name */\r\n this.HubName_str = \"\";\r\n /** IP address */\r\n this.IpAddress_ip = \"\";\r\n /** Subnet mask */\r\n this.SubnetMask_ip = \"\";\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcL3If;\r\n}());\r\nexports.VpnRpcL3If = VpnRpcL3If;\r\n/** Layer-3 switch */\r\nvar VpnRpcL3Sw = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcL3Sw' class: Layer-3 switch */\r\n function VpnRpcL3Sw(init) {\r\n /** Layer-3 Switch name */\r\n this.Name_str = \"\";\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcL3Sw;\r\n}());\r\nexports.VpnRpcL3Sw = VpnRpcL3Sw;\r\n/** Routing table */\r\nvar VpnRpcL3Table = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcL3Table' class: Routing table */\r\n function VpnRpcL3Table(init) {\r\n /** L3 switch name */\r\n this.Name_str = \"\";\r\n /** Network address */\r\n this.NetworkAddress_ip = \"\";\r\n /** Subnet mask */\r\n this.SubnetMask_ip = \"\";\r\n /** Gateway address */\r\n this.GatewayAddress_ip = \"\";\r\n /** Metric */\r\n this.Metric_u32 = 0;\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcL3Table;\r\n}());\r\nexports.VpnRpcL3Table = VpnRpcL3Table;\r\n/** Generic parameter to contain u32, u64, ascii_string and unicode string */\r\nvar VpnRpcTest = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcTest' class: Generic parameter to contain u32, u64, ascii_string and unicode string */\r\n function VpnRpcTest(init) {\r\n /** A 32-bit integer field */\r\n this.IntValue_u32 = 0;\r\n /** A 64-bit integer field */\r\n this.Int64Value_u64 = 0;\r\n /** An Ascii string field */\r\n this.StrValue_str = \"\";\r\n /** An UTF-8 string field */\r\n this.UniStrValue_utf = \"\";\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcTest;\r\n}());\r\nexports.VpnRpcTest = VpnRpcTest;\r\n/** Local Bridge list item */\r\nvar VpnRpcLocalBridge = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcLocalBridge' class: Local Bridge list item */\r\n function VpnRpcLocalBridge(init) {\r\n /** Physical Ethernet device name */\r\n this.DeviceName_str = \"\";\r\n /** The Virtual Hub name */\r\n this.HubNameLB_str = \"\";\r\n /** Online flag */\r\n this.Online_bool = false;\r\n /** Running flag */\r\n this.Active_bool = false;\r\n /** Specify true if you are using a tap device rather than a network adapter for the bridge destination (only supported for Linux versions). */\r\n this.TapMode_bool = false;\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcLocalBridge;\r\n}());\r\nexports.VpnRpcLocalBridge = VpnRpcLocalBridge;\r\n/** Create, configure, and get the group */\r\nvar VpnRpcSetGroup = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcSetGroup' class: Create, configure, and get the group */\r\n function VpnRpcSetGroup(init) {\r\n /** The Virtual Hub name */\r\n this.HubName_str = \"\";\r\n /** The group name */\r\n this.Name_str = \"\";\r\n /** Optional real name (full name) of the group, allow using any Unicode characters */\r\n this.Realname_utf = \"\";\r\n /** Optional, specify a description of the group */\r\n this.Note_utf = \"\";\r\n /** Number of broadcast packets (Recv) */\r\n this[\"Recv.BroadcastBytes_u64\"] = 0;\r\n /** Broadcast bytes (Recv) */\r\n this[\"Recv.BroadcastCount_u64\"] = 0;\r\n /** Unicast count (Recv) */\r\n this[\"Recv.UnicastBytes_u64\"] = 0;\r\n /** Unicast bytes (Recv) */\r\n this[\"Recv.UnicastCount_u64\"] = 0;\r\n /** Number of broadcast packets (Send) */\r\n this[\"Send.BroadcastBytes_u64\"] = 0;\r\n /** Broadcast bytes (Send) */\r\n this[\"Send.BroadcastCount_u64\"] = 0;\r\n /** Unicast bytes (Send) */\r\n this[\"Send.UnicastBytes_u64\"] = 0;\r\n /** Unicast bytes (Send) */\r\n this[\"Send.UnicastCount_u64\"] = 0;\r\n /** The flag whether to use security policy */\r\n this.UsePolicy_bool = false;\r\n /** Security policy: Allow Access. The users, which this policy value is true, have permission to make VPN connection to VPN Server. */\r\n this[\"policy:Access_bool\"] = false;\r\n /** Security policy: Filter DHCP Packets (IPv4). All IPv4 DHCP packets in sessions defined this policy will be filtered. */\r\n this[\"policy:DHCPFilter_bool\"] = false;\r\n /** Security policy: Disallow DHCP Server Operation (IPv4). Computers connected to sessions that have this policy setting will not be allowed to become a DHCP server and distribute IPv4 addresses to DHCP clients. */\r\n this[\"policy:DHCPNoServer_bool\"] = false;\r\n /** Security policy: Enforce DHCP Allocated IP Addresses (IPv4). Computers in sessions that have this policy setting will only be able to use IPv4 addresses allocated by a DHCP server on the virtual network side. */\r\n this[\"policy:DHCPForce_bool\"] = false;\r\n /** Security policy: Deny Bridge Operation. Bridge-mode connections are denied for user sessions that have this policy setting. Even in cases when the Ethernet Bridge is configured in the client side, communication will not be possible. */\r\n this[\"policy:NoBridge_bool\"] = false;\r\n /** Security policy: Deny Routing Operation (IPv4). IPv4 routing will be denied for sessions that have this policy setting. Even in the case where the IP router is operating on the user client side, communication will not be possible. */\r\n this[\"policy:NoRouting_bool\"] = false;\r\n /** Security policy: Deny MAC Addresses Duplication. The use of duplicating MAC addresses that are in use by computers of different sessions cannot be used by sessions with this policy setting. */\r\n this[\"policy:CheckMac_bool\"] = false;\r\n /** Security policy: Deny IP Address Duplication (IPv4). The use of duplicating IPv4 addresses that are in use by computers of different sessions cannot be used by sessions with this policy setting. */\r\n this[\"policy:CheckIP_bool\"] = false;\r\n /** Security policy: Deny Non-ARP / Non-DHCP / Non-ICMPv6 broadcasts. The sending or receiving of broadcast packets that are not ARP protocol, DHCP protocol, nor ICMPv6 on the virtual network will not be allowed for sessions with this policy setting. */\r\n this[\"policy:ArpDhcpOnly_bool\"] = false;\r\n /** Security policy: Privacy Filter Mode. All direct communication between sessions with the privacy filter mode policy setting will be filtered. */\r\n this[\"policy:PrivacyFilter_bool\"] = false;\r\n /** Security policy: Deny Operation as TCP/IP Server (IPv4). Computers of sessions with this policy setting can't listen and accept TCP/IP connections in IPv4. */\r\n this[\"policy:NoServer_bool\"] = false;\r\n /** Security policy: Unlimited Number of Broadcasts. If a computer of a session with this policy setting sends broadcast packets of a number unusually larger than what would be considered normal on the virtual network, there will be no automatic limiting. */\r\n this[\"policy:NoBroadcastLimiter_bool\"] = false;\r\n /** Security policy: Allow Monitoring Mode. Users with this policy setting will be granted to connect to the Virtual Hub in Monitoring Mode. Sessions in Monitoring Mode are able to monitor (tap) all packets flowing through the Virtual Hub. */\r\n this[\"policy:MonitorPort_bool\"] = false;\r\n /** Security policy: Maximum Number of TCP Connections. For sessions with this policy setting, this sets the maximum number of physical TCP connections consists in a physical VPN session. */\r\n this[\"policy:MaxConnection_u32\"] = 0;\r\n /** Security policy: Time-out Period. For sessions with this policy setting, this sets, in seconds, the time-out period to wait before disconnecting a session when communication trouble occurs between the VPN Client / VPN Server. */\r\n this[\"policy:TimeOut_u32\"] = 0;\r\n /** Security policy: Maximum Number of MAC Addresses. For sessions with this policy setting, this limits the number of MAC addresses per session. */\r\n this[\"policy:MaxMac_u32\"] = 0;\r\n /** Security policy: Maximum Number of IP Addresses (IPv4). For sessions with this policy setting, this specifies the number of IPv4 addresses that can be registered for a single session. */\r\n this[\"policy:MaxIP_u32\"] = 0;\r\n /** Security policy: Upload Bandwidth. For sessions with this policy setting, this limits the traffic bandwidth that is in the inwards direction from outside to inside the Virtual Hub. */\r\n this[\"policy:MaxUpload_u32\"] = 0;\r\n /** Security policy: Download Bandwidth. For sessions with this policy setting, this limits the traffic bandwidth that is in the outwards direction from inside the Virtual Hub to outside the Virtual Hub. */\r\n this[\"policy:MaxDownload_u32\"] = 0;\r\n /** Security policy: Deny Changing Password. The users which use password authentication with this policy setting are not allowed to change their own password from the VPN Client Manager or similar. */\r\n this[\"policy:FixPassword_bool\"] = false;\r\n /** Security policy: Maximum Number of Multiple Logins. Users with this policy setting are unable to have more than this number of concurrent logins. Bridge Mode sessions are not subjects to this policy. */\r\n this[\"policy:MultiLogins_u32\"] = 0;\r\n /** Security policy: Deny VoIP / QoS Function. Users with this security policy are unable to use VoIP / QoS functions in VPN connection sessions. */\r\n this[\"policy:NoQoS_bool\"] = false;\r\n /** Security policy: Filter RS / RA Packets (IPv6). All ICMPv6 packets which the message-type is 133 (Router Solicitation) or 134 (Router Advertisement) in sessions defined this policy will be filtered. As a result, an IPv6 client will be unable to use IPv6 address prefix auto detection and IPv6 default gateway auto detection. */\r\n this[\"policy:RSandRAFilter_bool\"] = false;\r\n /** Security policy: Filter RA Packets (IPv6). All ICMPv6 packets which the message-type is 134 (Router Advertisement) in sessions defined this policy will be filtered. As a result, a malicious users will be unable to spread illegal IPv6 prefix or default gateway advertisements on the network. */\r\n this[\"policy:RAFilter_bool\"] = false;\r\n /** Security policy: Filter DHCP Packets (IPv6). All IPv6 DHCP packets in sessions defined this policy will be filtered. */\r\n this[\"policy:DHCPv6Filter_bool\"] = false;\r\n /** Security policy: Disallow DHCP Server Operation (IPv6). Computers connected to sessions that have this policy setting will not be allowed to become a DHCP server and distribute IPv6 addresses to DHCP clients. */\r\n this[\"policy:DHCPv6NoServer_bool\"] = false;\r\n /** Security policy: Deny Routing Operation (IPv6). IPv6 routing will be denied for sessions that have this policy setting. Even in the case where the IP router is operating on the user client side, communication will not be possible. */\r\n this[\"policy:NoRoutingV6_bool\"] = false;\r\n /** Security policy: Deny IP Address Duplication (IPv6). The use of duplicating IPv6 addresses that are in use by computers of different sessions cannot be used by sessions with this policy setting. */\r\n this[\"policy:CheckIPv6_bool\"] = false;\r\n /** Security policy: Deny Operation as TCP/IP Server (IPv6). Computers of sessions with this policy setting can't listen and accept TCP/IP connections in IPv6. */\r\n this[\"policy:NoServerV6_bool\"] = false;\r\n /** Security policy: Maximum Number of IP Addresses (IPv6). For sessions with this policy setting, this specifies the number of IPv6 addresses that can be registered for a single session. */\r\n this[\"policy:MaxIPv6_u32\"] = 0;\r\n /** Security policy: Disallow Password Save in VPN Client. For users with this policy setting, when the user is using *standard* password authentication, the user will be unable to save the password in VPN Client. The user will be required to input passwords for every time to connect a VPN. This will improve the security. If this policy is enabled, VPN Client Version 2.0 will be denied to access. */\r\n this[\"policy:NoSavePassword_bool\"] = false;\r\n /** Security policy: VPN Client Automatic Disconnect. For users with this policy setting, a user's VPN session will be disconnected automatically after the specific period will elapse. In this case no automatic re-connection will be performed. This can prevent a lot of inactive VPN Sessions. If this policy is enabled, VPN Client Version 2.0 will be denied to access. */\r\n this[\"policy:AutoDisconnect_u32\"] = 0;\r\n /** Security policy: Filter All IPv4 Packets. All IPv4 and ARP packets in sessions defined this policy will be filtered. */\r\n this[\"policy:FilterIPv4_bool\"] = false;\r\n /** Security policy: Filter All IPv6 Packets. All IPv6 packets in sessions defined this policy will be filtered. */\r\n this[\"policy:FilterIPv6_bool\"] = false;\r\n /** Security policy: Filter All Non-IP Packets. All non-IP packets in sessions defined this policy will be filtered. \"Non-IP packet\" mean a packet which is not IPv4, ARP nor IPv6. Any tagged-VLAN packets via the Virtual Hub will be regarded as non-IP packets. */\r\n this[\"policy:FilterNonIP_bool\"] = false;\r\n /** Security policy: No Default-Router on IPv6 RA. In all VPN Sessions defines this policy, any IPv6 RA (Router Advertisement) packet with non-zero value in the router-lifetime will set to zero-value. This is effective to avoid the horrible behavior from the IPv6 routing confusion which is caused by the VPN client's attempts to use the remote-side IPv6 router as its local IPv6 router. */\r\n this[\"policy:NoIPv6DefaultRouterInRA_bool\"] = false;\r\n /** Security policy: No Default-Router on IPv6 RA (physical IPv6). In all VPN Sessions defines this policy (only when the physical communication protocol between VPN Client / VPN Bridge and VPN Server is IPv6), any IPv6 RA (Router Advertisement) packet with non-zero value in the router-lifetime will set to zero-value. This is effective to avoid the horrible behavior from the IPv6 routing confusion which is caused by the VPN client's attempts to use the remote-side IPv6 router as its local IPv6 router. */\r\n this[\"policy:NoIPv6DefaultRouterInRAWhenIPv6_bool\"] = false;\r\n /** Security policy: VLAN ID (IEEE802.1Q). You can specify the VLAN ID on the security policy. All VPN Sessions defines this policy, all Ethernet packets toward the Virtual Hub from the user will be inserted a VLAN tag (IEEE 802.1Q) with the VLAN ID. The user can also receive only packets with a VLAN tag which has the same VLAN ID. (Receiving process removes the VLAN tag automatically.) Any Ethernet packets with any other VLAN IDs or non-VLAN packets will not be received. All VPN Sessions without this policy definition can send / receive any kinds of Ethernet packets regardless of VLAN tags, and VLAN tags are not inserted or removed automatically. Any tagged-VLAN packets via the Virtual Hub will be regarded as non-IP packets. Therefore, tagged-VLAN packets are not subjects for IPv4 / IPv6 security policies, access lists nor other IPv4 / IPv6 specific deep processing. */\r\n this[\"policy:VLanId_u32\"] = 0;\r\n /** Security policy: Whether version 3.0 (must be true) */\r\n this[\"policy:Ver3_bool\"] = false;\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcSetGroup;\r\n}());\r\nexports.VpnRpcSetGroup = VpnRpcSetGroup;\r\n/** Hub types */\r\nvar VpnRpcHubType;\r\n(function (VpnRpcHubType) {\r\n /** Stand-alone HUB */\r\n VpnRpcHubType[VpnRpcHubType[\"Standalone\"] = 0] = \"Standalone\";\r\n /** Static HUB */\r\n VpnRpcHubType[VpnRpcHubType[\"FarmStatic\"] = 1] = \"FarmStatic\";\r\n /** Dynamic HUB */\r\n VpnRpcHubType[VpnRpcHubType[\"FarmDynamic\"] = 2] = \"FarmDynamic\";\r\n})(VpnRpcHubType = exports.VpnRpcHubType || (exports.VpnRpcHubType = {}));\r\n/** Create a HUB */\r\nvar VpnRpcCreateHub = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcCreateHub' class: Create a HUB */\r\n function VpnRpcCreateHub(init) {\r\n /** Specify the name of the Virtual Hub to create / update. */\r\n this.HubName_str = \"\";\r\n /** Specify an administrator password when the administrator password is going to be set for the Virtual Hub. On the update, leave it to empty string if you don't want to change the password. */\r\n this.AdminPasswordPlainText_str = \"\";\r\n /** Online flag */\r\n this.Online_bool = false;\r\n /** Maximum number of VPN sessions */\r\n this.MaxSession_u32 = 0;\r\n /** No Enum flag. By enabling this option, the VPN Client user will be unable to enumerate this Virtual Hub even if they send a Virtual Hub enumeration request to the VPN Server. */\r\n this.NoEnum_bool = false;\r\n /** Type of the Virtual Hub (Valid only for Clustered VPN Servers) */\r\n this.HubType_u32 = 0;\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcCreateHub;\r\n}());\r\nexports.VpnRpcCreateHub = VpnRpcCreateHub;\r\nvar VpnRpcClientAuthType;\r\n(function (VpnRpcClientAuthType) {\r\n /** Anonymous authentication */\r\n VpnRpcClientAuthType[VpnRpcClientAuthType[\"Anonymous\"] = 0] = \"Anonymous\";\r\n /** SHA-0 hashed password authentication */\r\n VpnRpcClientAuthType[VpnRpcClientAuthType[\"SHA0_Hashed_Password\"] = 1] = \"SHA0_Hashed_Password\";\r\n /** Plain password authentication */\r\n VpnRpcClientAuthType[VpnRpcClientAuthType[\"PlainPassword\"] = 2] = \"PlainPassword\";\r\n /** Certificate authentication */\r\n VpnRpcClientAuthType[VpnRpcClientAuthType[\"Cert\"] = 3] = \"Cert\";\r\n})(VpnRpcClientAuthType = exports.VpnRpcClientAuthType || (exports.VpnRpcClientAuthType = {}));\r\n/** Create and set of link */\r\nvar VpnRpcCreateLink = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcCreateLink' class: Create and set of link */\r\n function VpnRpcCreateLink(init) {\r\n /** The Virtual Hub name */\r\n this.HubName_Ex_str = \"\";\r\n /** Online flag */\r\n this.Online_bool = false;\r\n /** The flag to enable validation for the server certificate */\r\n this.CheckServerCert_bool = false;\r\n /** The body of server X.509 certificate to compare. Valid only if the CheckServerCert_bool flag is true. */\r\n this.ServerCert_bin = new Uint8Array([]);\r\n /** Client Option Parameters: Specify the name of the Cascade Connection */\r\n this.AccountName_utf = \"\";\r\n /** Client Option Parameters: Specify the hostname of the destination VPN Server. You can also specify by IP address. */\r\n this.Hostname_str = \"\";\r\n /** Client Option Parameters: Specify the port number of the destination VPN Server. */\r\n this.Port_u32 = 0;\r\n /** Client Option Parameters: The type of the proxy server */\r\n this.ProxyType_u32 = 0;\r\n /** Client Option Parameters: The hostname or IP address of the proxy server name */\r\n this.ProxyName_str = \"\";\r\n /** Client Option Parameters: The port number of the proxy server */\r\n this.ProxyPort_u32 = 0;\r\n /** Client Option Parameters: The username to connect to the proxy server */\r\n this.ProxyUsername_str = \"\";\r\n /** Client Option Parameters: The password to connect to the proxy server */\r\n this.ProxyPassword_str = \"\";\r\n /** Client Option Parameters: The Virtual Hub on the destination VPN Server */\r\n this.HubName_str = \"\";\r\n /** Client Option Parameters: Number of TCP Connections to Use in VPN Communication */\r\n this.MaxConnection_u32 = 0;\r\n /** Client Option Parameters: The flag to enable the encryption on the communication */\r\n this.UseEncrypt_bool = false;\r\n /** Client Option Parameters: Enable / Disable Data Compression when Communicating by Cascade Connection */\r\n this.UseCompress_bool = false;\r\n /** Client Option Parameters: Specify true when enabling half duplex mode. When using two or more TCP connections for VPN communication, it is possible to use Half Duplex Mode. By enabling half duplex mode it is possible to automatically fix data transmission direction as half and half for each TCP connection. In the case where a VPN using 8 TCP connections is established, for example, when half-duplex is enabled, communication can be fixes so that 4 TCP connections are dedicated to the upload direction and the other 4 connections are dedicated to the download direction. */\r\n this.HalfConnection_bool = false;\r\n /** Client Option Parameters: Connection attempt interval when additional connection will be established */\r\n this.AdditionalConnectionInterval_u32 = 0;\r\n /** Client Option Parameters: Connection Life of Each TCP Connection (0 for no keep-alive) */\r\n this.ConnectionDisconnectSpan_u32 = 0;\r\n /** Client Option Parameters: Disable QoS Control Function if the value is true */\r\n this.DisableQoS_bool = false;\r\n /** Client Option Parameters: Do not use TLS 1.x of the value is true */\r\n this.NoTls1_bool = false;\r\n /** Client Option Parameters: Do not use UDP acceleration mode if the value is true */\r\n this.NoUdpAcceleration_bool = false;\r\n /** Authentication type */\r\n this.AuthType_u32 = 0;\r\n /** User name */\r\n this.Username_str = \"\";\r\n /** SHA-0 Hashed password. Valid only if ClientAuth_AuthType_u32 == SHA0_Hashed_Password (1). The SHA-0 hashed password must be caluclated by the SHA0(UpperCase(username_ascii_string) + password_ascii_string). */\r\n this.HashedPassword_bin = new Uint8Array([]);\r\n /** Plaintext Password. Valid only if ClientAuth_AuthType_u32 == PlainPassword (2). */\r\n this.PlainPassword_str = \"\";\r\n /** Client certificate. Valid only if ClientAuth_AuthType_u32 == Cert (3). */\r\n this.ClientX_bin = new Uint8Array([]);\r\n /** Client private key of the certificate. Valid only if ClientAuth_AuthType_u32 == Cert (3). */\r\n this.ClientK_bin = new Uint8Array([]);\r\n /** Security policy: Filter DHCP Packets (IPv4). All IPv4 DHCP packets in sessions defined this policy will be filtered. */\r\n this[\"policy:DHCPFilter_bool\"] = false;\r\n /** Security policy: Disallow DHCP Server Operation (IPv4). Computers connected to sessions that have this policy setting will not be allowed to become a DHCP server and distribute IPv4 addresses to DHCP clients. */\r\n this[\"policy:DHCPNoServer_bool\"] = false;\r\n /** Security policy: Enforce DHCP Allocated IP Addresses (IPv4). Computers in sessions that have this policy setting will only be able to use IPv4 addresses allocated by a DHCP server on the virtual network side. */\r\n this[\"policy:DHCPForce_bool\"] = false;\r\n /** Security policy: Prohibit the duplicate MAC address */\r\n this.SecPol_CheckMac_bool = false;\r\n /** Security policy: Prohibit a duplicate IP address (IPv4) */\r\n this.SecPol_CheckIP_bool = false;\r\n /** Security policy: Deny Non-ARP / Non-DHCP / Non-ICMPv6 broadcasts. The sending or receiving of broadcast packets that are not ARP protocol, DHCP protocol, nor ICMPv6 on the virtual network will not be allowed for sessions with this policy setting. */\r\n this[\"policy:ArpDhcpOnly_bool\"] = false;\r\n /** Security policy: Privacy Filter Mode. All direct communication between sessions with the privacy filter mode policy setting will be filtered. */\r\n this[\"policy:PrivacyFilter_bool\"] = false;\r\n /** Security policy: Deny Operation as TCP/IP Server (IPv4). Computers of sessions with this policy setting can't listen and accept TCP/IP connections in IPv4. */\r\n this[\"policy:NoServer_bool\"] = false;\r\n /** Security policy: Unlimited Number of Broadcasts. If a computer of a session with this policy setting sends broadcast packets of a number unusually larger than what would be considered normal on the virtual network, there will be no automatic limiting. */\r\n this[\"policy:NoBroadcastLimiter_bool\"] = false;\r\n /** Security policy: Maximum Number of MAC Addresses. For sessions with this policy setting, this limits the number of MAC addresses per session. */\r\n this[\"policy:MaxMac_u32\"] = 0;\r\n /** Security policy: Maximum Number of IP Addresses (IPv4). For sessions with this policy setting, this specifies the number of IPv4 addresses that can be registered for a single session. */\r\n this[\"policy:MaxIP_u32\"] = 0;\r\n /** Security policy: Upload Bandwidth. For sessions with this policy setting, this limits the traffic bandwidth that is in the inwards direction from outside to inside the Virtual Hub. */\r\n this[\"policy:MaxUpload_u32\"] = 0;\r\n /** Security policy: Download Bandwidth. For sessions with this policy setting, this limits the traffic bandwidth that is in the outwards direction from inside the Virtual Hub to outside the Virtual Hub. */\r\n this[\"policy:MaxDownload_u32\"] = 0;\r\n /** Security policy: Filter RS / RA Packets (IPv6). All ICMPv6 packets which the message-type is 133 (Router Solicitation) or 134 (Router Advertisement) in sessions defined this policy will be filtered. As a result, an IPv6 client will be unable to use IPv6 address prefix auto detection and IPv6 default gateway auto detection. */\r\n this[\"policy:RSandRAFilter_bool\"] = false;\r\n /** Security policy: Filter the router advertisement packet (IPv6) */\r\n this.SecPol_RAFilter_bool = false;\r\n /** Security policy: Filter DHCP Packets (IPv6). All IPv6 DHCP packets in sessions defined this policy will be filtered. */\r\n this[\"policy:DHCPv6Filter_bool\"] = false;\r\n /** Security policy: Disallow DHCP Server Operation (IPv6). Computers connected to sessions that have this policy setting will not be allowed to become a DHCP server and distribute IPv6 addresses to DHCP clients. */\r\n this[\"policy:DHCPv6NoServer_bool\"] = false;\r\n /** Security policy: Prohibit the duplicate IP address (IPv6) */\r\n this.SecPol_CheckIPv6_bool = false;\r\n /** Security policy: Deny Operation as TCP/IP Server (IPv6). Computers of sessions with this policy setting can't listen and accept TCP/IP connections in IPv6. */\r\n this[\"policy:NoServerV6_bool\"] = false;\r\n /** Security policy: Maximum Number of IP Addresses (IPv6). For sessions with this policy setting, this specifies the number of IPv6 addresses that can be registered for a single session. */\r\n this[\"policy:MaxIPv6_u32\"] = 0;\r\n /** Security policy: Filter All IPv4 Packets. All IPv4 and ARP packets in sessions defined this policy will be filtered. */\r\n this[\"policy:FilterIPv4_bool\"] = false;\r\n /** Security policy: Filter All IPv6 Packets. All IPv6 packets in sessions defined this policy will be filtered. */\r\n this[\"policy:FilterIPv6_bool\"] = false;\r\n /** Security policy: Filter All Non-IP Packets. All non-IP packets in sessions defined this policy will be filtered. \"Non-IP packet\" mean a packet which is not IPv4, ARP nor IPv6. Any tagged-VLAN packets via the Virtual Hub will be regarded as non-IP packets. */\r\n this[\"policy:FilterNonIP_bool\"] = false;\r\n /** Security policy: No Default-Router on IPv6 RA. In all VPN Sessions defines this policy, any IPv6 RA (Router Advertisement) packet with non-zero value in the router-lifetime will set to zero-value. This is effective to avoid the horrible behavior from the IPv6 routing confusion which is caused by the VPN client's attempts to use the remote-side IPv6 router as its local IPv6 router. */\r\n this[\"policy:NoIPv6DefaultRouterInRA_bool\"] = false;\r\n /** Security policy: VLAN ID (IEEE802.1Q). You can specify the VLAN ID on the security policy. All VPN Sessions defines this policy, all Ethernet packets toward the Virtual Hub from the user will be inserted a VLAN tag (IEEE 802.1Q) with the VLAN ID. The user can also receive only packets with a VLAN tag which has the same VLAN ID. (Receiving process removes the VLAN tag automatically.) Any Ethernet packets with any other VLAN IDs or non-VLAN packets will not be received. All VPN Sessions without this policy definition can send / receive any kinds of Ethernet packets regardless of VLAN tags, and VLAN tags are not inserted or removed automatically. Any tagged-VLAN packets via the Virtual Hub will be regarded as non-IP packets. Therefore, tagged-VLAN packets are not subjects for IPv4 / IPv6 security policies, access lists nor other IPv4 / IPv6 specific deep processing. */\r\n this[\"policy:VLanId_u32\"] = 0;\r\n /** Security policy: Whether version 3.0 (must be true) */\r\n this[\"policy:Ver3_bool\"] = false;\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcCreateLink;\r\n}());\r\nexports.VpnRpcCreateLink = VpnRpcCreateLink;\r\n/** Listener */\r\nvar VpnRpcListener = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcListener' class: Listener */\r\n function VpnRpcListener(init) {\r\n /** Port number (Range: 1 - 65535) */\r\n this.Port_u32 = 0;\r\n /** Active state */\r\n this.Enable_bool = false;\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcListener;\r\n}());\r\nexports.VpnRpcListener = VpnRpcListener;\r\n/** User authentication type (server side) */\r\nvar VpnRpcUserAuthType;\r\n(function (VpnRpcUserAuthType) {\r\n /** Anonymous authentication */\r\n VpnRpcUserAuthType[VpnRpcUserAuthType[\"Anonymous\"] = 0] = \"Anonymous\";\r\n /** Password authentication */\r\n VpnRpcUserAuthType[VpnRpcUserAuthType[\"Password\"] = 1] = \"Password\";\r\n /** User certificate authentication */\r\n VpnRpcUserAuthType[VpnRpcUserAuthType[\"UserCert\"] = 2] = \"UserCert\";\r\n /** Root certificate which is issued by trusted Certificate Authority */\r\n VpnRpcUserAuthType[VpnRpcUserAuthType[\"RootCert\"] = 3] = \"RootCert\";\r\n /** Radius authentication */\r\n VpnRpcUserAuthType[VpnRpcUserAuthType[\"Radius\"] = 4] = \"Radius\";\r\n /** Windows NT authentication */\r\n VpnRpcUserAuthType[VpnRpcUserAuthType[\"NTDomain\"] = 5] = \"NTDomain\";\r\n})(VpnRpcUserAuthType = exports.VpnRpcUserAuthType || (exports.VpnRpcUserAuthType = {}));\r\n/** Create, configure, and get the user */\r\nvar VpnRpcSetUser = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcSetUser' class: Create, configure, and get the user */\r\n function VpnRpcSetUser(init) {\r\n /** The Virtual Hub name */\r\n this.HubName_str = \"\";\r\n /** Specify the user name of the user */\r\n this.Name_str = \"\";\r\n /** Assigned group name for the user */\r\n this.GroupName_str = \"\";\r\n /** Optional real name (full name) of the user, allow using any Unicode characters */\r\n this.Realname_utf = \"\";\r\n /** Optional User Description */\r\n this.Note_utf = \"\";\r\n /** Creation date and time */\r\n this.CreatedTime_dt = new Date();\r\n /** Last modified date and time */\r\n this.UpdatedTime_dt = new Date();\r\n /** Expiration date and time */\r\n this.ExpireTime_dt = new Date();\r\n /** Authentication method of the user */\r\n this.AuthType_u32 = 0;\r\n /** User password, valid only if AuthType_u32 == Password(1). Valid only to create or set operations. */\r\n this.Auth_Password_str = \"\";\r\n /** User certificate, valid only if AuthType_u32 == UserCert(2). */\r\n this.UserX_bin = new Uint8Array([]);\r\n /** Certificate Serial Number, optional, valid only if AuthType_u32 == RootCert(3). */\r\n this.Serial_bin = new Uint8Array([]);\r\n /** Certificate Common Name, optional, valid only if AuthType_u32 == RootCert(3). */\r\n this.CommonName_utf = \"\";\r\n /** Username in RADIUS server, optional, valid only if AuthType_u32 == Radius(4). */\r\n this.RadiusUsername_utf = \"\";\r\n /** Username in NT Domain server, optional, valid only if AuthType_u32 == NT(5). */\r\n this.NtUsername_utf = \"\";\r\n /** Number of total logins of the user */\r\n this.NumLogin_u32 = 0;\r\n /** Number of broadcast packets (Recv) */\r\n this[\"Recv.BroadcastBytes_u64\"] = 0;\r\n /** Broadcast bytes (Recv) */\r\n this[\"Recv.BroadcastCount_u64\"] = 0;\r\n /** Unicast count (Recv) */\r\n this[\"Recv.UnicastBytes_u64\"] = 0;\r\n /** Unicast bytes (Recv) */\r\n this[\"Recv.UnicastCount_u64\"] = 0;\r\n /** Number of broadcast packets (Send) */\r\n this[\"Send.BroadcastBytes_u64\"] = 0;\r\n /** Broadcast bytes (Send) */\r\n this[\"Send.BroadcastCount_u64\"] = 0;\r\n /** Unicast bytes (Send) */\r\n this[\"Send.UnicastBytes_u64\"] = 0;\r\n /** Unicast bytes (Send) */\r\n this[\"Send.UnicastCount_u64\"] = 0;\r\n /** The flag whether to use security policy */\r\n this.UsePolicy_bool = false;\r\n /** Security policy: Allow Access. The users, which this policy value is true, have permission to make VPN connection to VPN Server. */\r\n this[\"policy:Access_bool\"] = false;\r\n /** Security policy: Filter DHCP Packets (IPv4). All IPv4 DHCP packets in sessions defined this policy will be filtered. */\r\n this[\"policy:DHCPFilter_bool\"] = false;\r\n /** Security policy: Disallow DHCP Server Operation (IPv4). Computers connected to sessions that have this policy setting will not be allowed to become a DHCP server and distribute IPv4 addresses to DHCP clients. */\r\n this[\"policy:DHCPNoServer_bool\"] = false;\r\n /** Security policy: Enforce DHCP Allocated IP Addresses (IPv4). Computers in sessions that have this policy setting will only be able to use IPv4 addresses allocated by a DHCP server on the virtual network side. */\r\n this[\"policy:DHCPForce_bool\"] = false;\r\n /** Security policy: Deny Bridge Operation. Bridge-mode connections are denied for user sessions that have this policy setting. Even in cases when the Ethernet Bridge is configured in the client side, communication will not be possible. */\r\n this[\"policy:NoBridge_bool\"] = false;\r\n /** Security policy: Deny Routing Operation (IPv4). IPv4 routing will be denied for sessions that have this policy setting. Even in the case where the IP router is operating on the user client side, communication will not be possible. */\r\n this[\"policy:NoRouting_bool\"] = false;\r\n /** Security policy: Deny MAC Addresses Duplication. The use of duplicating MAC addresses that are in use by computers of different sessions cannot be used by sessions with this policy setting. */\r\n this[\"policy:CheckMac_bool\"] = false;\r\n /** Security policy: Deny IP Address Duplication (IPv4). The use of duplicating IPv4 addresses that are in use by computers of different sessions cannot be used by sessions with this policy setting. */\r\n this[\"policy:CheckIP_bool\"] = false;\r\n /** Security policy: Deny Non-ARP / Non-DHCP / Non-ICMPv6 broadcasts. The sending or receiving of broadcast packets that are not ARP protocol, DHCP protocol, nor ICMPv6 on the virtual network will not be allowed for sessions with this policy setting. */\r\n this[\"policy:ArpDhcpOnly_bool\"] = false;\r\n /** Security policy: Privacy Filter Mode. All direct communication between sessions with the privacy filter mode policy setting will be filtered. */\r\n this[\"policy:PrivacyFilter_bool\"] = false;\r\n /** Security policy: Deny Operation as TCP/IP Server (IPv4). Computers of sessions with this policy setting can't listen and accept TCP/IP connections in IPv4. */\r\n this[\"policy:NoServer_bool\"] = false;\r\n /** Security policy: Unlimited Number of Broadcasts. If a computer of a session with this policy setting sends broadcast packets of a number unusually larger than what would be considered normal on the virtual network, there will be no automatic limiting. */\r\n this[\"policy:NoBroadcastLimiter_bool\"] = false;\r\n /** Security policy: Allow Monitoring Mode. Users with this policy setting will be granted to connect to the Virtual Hub in Monitoring Mode. Sessions in Monitoring Mode are able to monitor (tap) all packets flowing through the Virtual Hub. */\r\n this[\"policy:MonitorPort_bool\"] = false;\r\n /** Security policy: Maximum Number of TCP Connections. For sessions with this policy setting, this sets the maximum number of physical TCP connections consists in a physical VPN session. */\r\n this[\"policy:MaxConnection_u32\"] = 0;\r\n /** Security policy: Time-out Period. For sessions with this policy setting, this sets, in seconds, the time-out period to wait before disconnecting a session when communication trouble occurs between the VPN Client / VPN Server. */\r\n this[\"policy:TimeOut_u32\"] = 0;\r\n /** Security policy: Maximum Number of MAC Addresses. For sessions with this policy setting, this limits the number of MAC addresses per session. */\r\n this[\"policy:MaxMac_u32\"] = 0;\r\n /** Security policy: Maximum Number of IP Addresses (IPv4). For sessions with this policy setting, this specifies the number of IPv4 addresses that can be registered for a single session. */\r\n this[\"policy:MaxIP_u32\"] = 0;\r\n /** Security policy: Upload Bandwidth. For sessions with this policy setting, this limits the traffic bandwidth that is in the inwards direction from outside to inside the Virtual Hub. */\r\n this[\"policy:MaxUpload_u32\"] = 0;\r\n /** Security policy: Download Bandwidth. For sessions with this policy setting, this limits the traffic bandwidth that is in the outwards direction from inside the Virtual Hub to outside the Virtual Hub. */\r\n this[\"policy:MaxDownload_u32\"] = 0;\r\n /** Security policy: Deny Changing Password. The users which use password authentication with this policy setting are not allowed to change their own password from the VPN Client Manager or similar. */\r\n this[\"policy:FixPassword_bool\"] = false;\r\n /** Security policy: Maximum Number of Multiple Logins. Users with this policy setting are unable to have more than this number of concurrent logins. Bridge Mode sessions are not subjects to this policy. */\r\n this[\"policy:MultiLogins_u32\"] = 0;\r\n /** Security policy: Deny VoIP / QoS Function. Users with this security policy are unable to use VoIP / QoS functions in VPN connection sessions. */\r\n this[\"policy:NoQoS_bool\"] = false;\r\n /** Security policy: Filter RS / RA Packets (IPv6). All ICMPv6 packets which the message-type is 133 (Router Solicitation) or 134 (Router Advertisement) in sessions defined this policy will be filtered. As a result, an IPv6 client will be unable to use IPv6 address prefix auto detection and IPv6 default gateway auto detection. */\r\n this[\"policy:RSandRAFilter_bool\"] = false;\r\n /** Security policy: Filter RA Packets (IPv6). All ICMPv6 packets which the message-type is 134 (Router Advertisement) in sessions defined this policy will be filtered. As a result, a malicious users will be unable to spread illegal IPv6 prefix or default gateway advertisements on the network. */\r\n this[\"policy:RAFilter_bool\"] = false;\r\n /** Security policy: Filter DHCP Packets (IPv6). All IPv6 DHCP packets in sessions defined this policy will be filtered. */\r\n this[\"policy:DHCPv6Filter_bool\"] = false;\r\n /** Security policy: Disallow DHCP Server Operation (IPv6). Computers connected to sessions that have this policy setting will not be allowed to become a DHCP server and distribute IPv6 addresses to DHCP clients. */\r\n this[\"policy:DHCPv6NoServer_bool\"] = false;\r\n /** Security policy: Deny Routing Operation (IPv6). IPv6 routing will be denied for sessions that have this policy setting. Even in the case where the IP router is operating on the user client side, communication will not be possible. */\r\n this[\"policy:NoRoutingV6_bool\"] = false;\r\n /** Security policy: Deny IP Address Duplication (IPv6). The use of duplicating IPv6 addresses that are in use by computers of different sessions cannot be used by sessions with this policy setting. */\r\n this[\"policy:CheckIPv6_bool\"] = false;\r\n /** Security policy: Deny Operation as TCP/IP Server (IPv6). Computers of sessions with this policy setting can't listen and accept TCP/IP connections in IPv6. */\r\n this[\"policy:NoServerV6_bool\"] = false;\r\n /** Security policy: Maximum Number of IP Addresses (IPv6). For sessions with this policy setting, this specifies the number of IPv6 addresses that can be registered for a single session. */\r\n this[\"policy:MaxIPv6_u32\"] = 0;\r\n /** Security policy: Disallow Password Save in VPN Client. For users with this policy setting, when the user is using *standard* password authentication, the user will be unable to save the password in VPN Client. The user will be required to input passwords for every time to connect a VPN. This will improve the security. If this policy is enabled, VPN Client Version 2.0 will be denied to access. */\r\n this[\"policy:NoSavePassword_bool\"] = false;\r\n /** Security policy: VPN Client Automatic Disconnect. For users with this policy setting, a user's VPN session will be disconnected automatically after the specific period will elapse. In this case no automatic re-connection will be performed. This can prevent a lot of inactive VPN Sessions. If this policy is enabled, VPN Client Version 2.0 will be denied to access. */\r\n this[\"policy:AutoDisconnect_u32\"] = 0;\r\n /** Security policy: Filter All IPv4 Packets. All IPv4 and ARP packets in sessions defined this policy will be filtered. */\r\n this[\"policy:FilterIPv4_bool\"] = false;\r\n /** Security policy: Filter All IPv6 Packets. All IPv6 packets in sessions defined this policy will be filtered. */\r\n this[\"policy:FilterIPv6_bool\"] = false;\r\n /** Security policy: Filter All Non-IP Packets. All non-IP packets in sessions defined this policy will be filtered. \"Non-IP packet\" mean a packet which is not IPv4, ARP nor IPv6. Any tagged-VLAN packets via the Virtual Hub will be regarded as non-IP packets. */\r\n this[\"policy:FilterNonIP_bool\"] = false;\r\n /** Security policy: No Default-Router on IPv6 RA. In all VPN Sessions defines this policy, any IPv6 RA (Router Advertisement) packet with non-zero value in the router-lifetime will set to zero-value. This is effective to avoid the horrible behavior from the IPv6 routing confusion which is caused by the VPN client's attempts to use the remote-side IPv6 router as its local IPv6 router. */\r\n this[\"policy:NoIPv6DefaultRouterInRA_bool\"] = false;\r\n /** Security policy: No Default-Router on IPv6 RA (physical IPv6). In all VPN Sessions defines this policy (only when the physical communication protocol between VPN Client / VPN Bridge and VPN Server is IPv6), any IPv6 RA (Router Advertisement) packet with non-zero value in the router-lifetime will set to zero-value. This is effective to avoid the horrible behavior from the IPv6 routing confusion which is caused by the VPN client's attempts to use the remote-side IPv6 router as its local IPv6 router. */\r\n this[\"policy:NoIPv6DefaultRouterInRAWhenIPv6_bool\"] = false;\r\n /** Security policy: VLAN ID (IEEE802.1Q). You can specify the VLAN ID on the security policy. All VPN Sessions defines this policy, all Ethernet packets toward the Virtual Hub from the user will be inserted a VLAN tag (IEEE 802.1Q) with the VLAN ID. The user can also receive only packets with a VLAN tag which has the same VLAN ID. (Receiving process removes the VLAN tag automatically.) Any Ethernet packets with any other VLAN IDs or non-VLAN packets will not be received. All VPN Sessions without this policy definition can send / receive any kinds of Ethernet packets regardless of VLAN tags, and VLAN tags are not inserted or removed automatically. Any tagged-VLAN packets via the Virtual Hub will be regarded as non-IP packets. Therefore, tagged-VLAN packets are not subjects for IPv4 / IPv6 security policies, access lists nor other IPv4 / IPv6 specific deep processing. */\r\n this[\"policy:VLanId_u32\"] = 0;\r\n /** Security policy: Whether version 3.0 (must be true) */\r\n this[\"policy:Ver3_bool\"] = false;\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcSetUser;\r\n}());\r\nexports.VpnRpcSetUser = VpnRpcSetUser;\r\n/** Delete the access list */\r\nvar VpnRpcDeleteAccess = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcDeleteAccess' class: Delete the access list */\r\n function VpnRpcDeleteAccess(init) {\r\n /** The Virtual Hub name */\r\n this.HubName_str = \"\";\r\n /** ID */\r\n this.Id_u32 = 0;\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcDeleteAccess;\r\n}());\r\nexports.VpnRpcDeleteAccess = VpnRpcDeleteAccess;\r\n/** Delete the CA of HUB */\r\nvar VpnRpcHubDeleteCA = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcHubDeleteCA' class: Delete the CA of HUB */\r\n function VpnRpcHubDeleteCA(init) {\r\n /** The Virtual Hub name */\r\n this.HubName_str = \"\";\r\n /** Certificate key id to be deleted */\r\n this.Key_u32 = 0;\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcHubDeleteCA;\r\n}());\r\nexports.VpnRpcHubDeleteCA = VpnRpcHubDeleteCA;\r\n/** Deleting a user or group */\r\nvar VpnRpcDeleteUser = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcDeleteUser' class: Deleting a user or group */\r\n function VpnRpcDeleteUser(init) {\r\n /** The Virtual Hub name */\r\n this.HubName_str = \"\";\r\n /** User or group name */\r\n this.Name_str = \"\";\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcDeleteUser;\r\n}());\r\nexports.VpnRpcDeleteUser = VpnRpcDeleteUser;\r\n/** Delete the HUB */\r\nvar VpnRpcDeleteHub = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcDeleteHub' class: Delete the HUB */\r\n function VpnRpcDeleteHub(init) {\r\n /** The Virtual Hub name */\r\n this.HubName_str = \"\";\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcDeleteHub;\r\n}());\r\nexports.VpnRpcDeleteHub = VpnRpcDeleteHub;\r\n/** Delete the table */\r\nvar VpnRpcDeleteTable = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcDeleteTable' class: Delete the table */\r\n function VpnRpcDeleteTable(init) {\r\n /** The Virtual Hub name */\r\n this.HubName_str = \"\";\r\n /** Key ID */\r\n this.Key_u32 = 0;\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcDeleteTable;\r\n}());\r\nexports.VpnRpcDeleteTable = VpnRpcDeleteTable;\r\n/** Specify the Link */\r\nvar VpnRpcLink = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcLink' class: Specify the Link */\r\n function VpnRpcLink(init) {\r\n /** The Virtual Hub name */\r\n this.HubName_str = \"\";\r\n /** The name of the cascade connection */\r\n this.AccountName_utf = \"\";\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcLink;\r\n}());\r\nexports.VpnRpcLink = VpnRpcLink;\r\n/** Disconnect the session */\r\nvar VpnRpcDeleteSession = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcDeleteSession' class: Disconnect the session */\r\n function VpnRpcDeleteSession(init) {\r\n /** The Virtual Hub name */\r\n this.HubName_str = \"\";\r\n /** Session name */\r\n this.Name_str = \"\";\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcDeleteSession;\r\n}());\r\nexports.VpnRpcDeleteSession = VpnRpcDeleteSession;\r\n/** Specify the HUB */\r\nvar VpnRpcHub = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcHub' class: Specify the HUB */\r\n function VpnRpcHub(init) {\r\n /** The Virtual Hub name */\r\n this.HubName_str = \"\";\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcHub;\r\n}());\r\nexports.VpnRpcHub = VpnRpcHub;\r\n/** Disconnect a connection */\r\nvar VpnRpcDisconnectConnection = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcDisconnectConnection' class: Disconnect a connection */\r\n function VpnRpcDisconnectConnection(init) {\r\n /** Connection name */\r\n this.Name_str = \"\";\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcDisconnectConnection;\r\n}());\r\nexports.VpnRpcDisconnectConnection = VpnRpcDisconnectConnection;\r\n/** Enumeration of the access list */\r\nvar VpnRpcEnumAccessList = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcEnumAccessList' class: Enumeration of the access list */\r\n function VpnRpcEnumAccessList(init) {\r\n /** The Virtual Hub name */\r\n this.HubName_str = \"\";\r\n /** Access list */\r\n this.AccessList = [];\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcEnumAccessList;\r\n}());\r\nexports.VpnRpcEnumAccessList = VpnRpcEnumAccessList;\r\n/** CA enumeration items of HUB */\r\nvar VpnRpcHubEnumCAItem = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcHubEnumCAItem' class: CA enumeration items of HUB */\r\n function VpnRpcHubEnumCAItem(init) {\r\n /** The key id of the item */\r\n this.Key_u32 = 0;\r\n /** Subject */\r\n this.SubjectName_utf = \"\";\r\n /** Issuer */\r\n this.IssuerName_utf = \"\";\r\n /** Expiration date */\r\n this.Expires_dt = new Date();\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcHubEnumCAItem;\r\n}());\r\nexports.VpnRpcHubEnumCAItem = VpnRpcHubEnumCAItem;\r\n/** CA enumeration of HUB */\r\nvar VpnRpcHubEnumCA = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcHubEnumCA' class: CA enumeration of HUB */\r\n function VpnRpcHubEnumCA(init) {\r\n /** The Virtual Hub name */\r\n this.HubName_str = \"\";\r\n /** The list of CA */\r\n this.CAList = [];\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcHubEnumCA;\r\n}());\r\nexports.VpnRpcHubEnumCA = VpnRpcHubEnumCA;\r\n/** Type of connection */\r\nvar VpnRpcConnectionType;\r\n(function (VpnRpcConnectionType) {\r\n /** VPN Client */\r\n VpnRpcConnectionType[VpnRpcConnectionType[\"Client\"] = 0] = \"Client\";\r\n /** During initialization */\r\n VpnRpcConnectionType[VpnRpcConnectionType[\"Init\"] = 1] = \"Init\";\r\n /** Login connection */\r\n VpnRpcConnectionType[VpnRpcConnectionType[\"Login\"] = 2] = \"Login\";\r\n /** Additional connection */\r\n VpnRpcConnectionType[VpnRpcConnectionType[\"Additional\"] = 3] = \"Additional\";\r\n /** RPC for server farm */\r\n VpnRpcConnectionType[VpnRpcConnectionType[\"FarmRpc\"] = 4] = \"FarmRpc\";\r\n /** RPC for Management */\r\n VpnRpcConnectionType[VpnRpcConnectionType[\"AdminRpc\"] = 5] = \"AdminRpc\";\r\n /** HUB enumeration */\r\n VpnRpcConnectionType[VpnRpcConnectionType[\"EnumHub\"] = 6] = \"EnumHub\";\r\n /** Password change */\r\n VpnRpcConnectionType[VpnRpcConnectionType[\"Password\"] = 7] = \"Password\";\r\n /** SSTP */\r\n VpnRpcConnectionType[VpnRpcConnectionType[\"SSTP\"] = 8] = \"SSTP\";\r\n /** OpenVPN */\r\n VpnRpcConnectionType[VpnRpcConnectionType[\"OpenVPN\"] = 9] = \"OpenVPN\";\r\n})(VpnRpcConnectionType = exports.VpnRpcConnectionType || (exports.VpnRpcConnectionType = {}));\r\n/** Connection enumeration items */\r\nvar VpnRpcEnumConnectionItem = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcEnumConnectionItem' class: Connection enumeration items */\r\n function VpnRpcEnumConnectionItem(init) {\r\n /** Connection name */\r\n this.Name_str = \"\";\r\n /** Host name */\r\n this.Hostname_str = \"\";\r\n /** IP address */\r\n this.Ip_ip = \"\";\r\n /** Port number */\r\n this.Port_u32 = 0;\r\n /** Connected time */\r\n this.ConnectedTime_dt = new Date();\r\n /** Connection type */\r\n this.Type_u32 = 0;\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcEnumConnectionItem;\r\n}());\r\nexports.VpnRpcEnumConnectionItem = VpnRpcEnumConnectionItem;\r\n/** Connection enumeration */\r\nvar VpnRpcEnumConnection = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcEnumConnection' class: Connection enumeration */\r\n function VpnRpcEnumConnection(init) {\r\n /** Number of connections */\r\n this.NumConnection_u32 = 0;\r\n /** Connection list */\r\n this.ConnectionList = [];\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcEnumConnection;\r\n}());\r\nexports.VpnRpcEnumConnection = VpnRpcEnumConnection;\r\n/** Enum CRL Item */\r\nvar VpnRpcEnumCrlItem = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcEnumCrlItem' class: Enum CRL Item */\r\n function VpnRpcEnumCrlItem(init) {\r\n /** Key ID */\r\n this.Key_u32 = 0;\r\n /** The contents of the CRL item */\r\n this.CrlInfo_utf = \"\";\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcEnumCrlItem;\r\n}());\r\nexports.VpnRpcEnumCrlItem = VpnRpcEnumCrlItem;\r\n/** Enum CRL */\r\nvar VpnRpcEnumCrl = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcEnumCrl' class: Enum CRL */\r\n function VpnRpcEnumCrl(init) {\r\n /** The Virtual Hub name */\r\n this.HubName_str = \"\";\r\n /** CRL list */\r\n this.CRLList = [];\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcEnumCrl;\r\n}());\r\nexports.VpnRpcEnumCrl = VpnRpcEnumCrl;\r\n/** RPC_ENUM_DHCP_ITEM */\r\nvar VpnRpcEnumDhcpItem = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcEnumDhcpItem' class: RPC_ENUM_DHCP_ITEM */\r\n function VpnRpcEnumDhcpItem(init) {\r\n /** ID */\r\n this.Id_u32 = 0;\r\n /** Lease time */\r\n this.LeasedTime_dt = new Date();\r\n /** Expiration date */\r\n this.ExpireTime_dt = new Date();\r\n /** MAC address */\r\n this.MacAddress_bin = new Uint8Array([]);\r\n /** IP address */\r\n this.IpAddress_ip = \"\";\r\n /** Subnet mask */\r\n this.Mask_u32 = 0;\r\n /** Host name */\r\n this.Hostname_str = \"\";\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcEnumDhcpItem;\r\n}());\r\nexports.VpnRpcEnumDhcpItem = VpnRpcEnumDhcpItem;\r\n/** RPC_ENUM_DHCP */\r\nvar VpnRpcEnumDhcp = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcEnumDhcp' class: RPC_ENUM_DHCP */\r\n function VpnRpcEnumDhcp(init) {\r\n /** Virtual Hub Name */\r\n this.HubName_str = \"\";\r\n /** DHCP Item */\r\n this.DhcpTable = [];\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcEnumDhcp;\r\n}());\r\nexports.VpnRpcEnumDhcp = VpnRpcEnumDhcp;\r\n/** EtherIP setting list */\r\nvar VpnRpcEnumEtherIpId = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcEnumEtherIpId' class: EtherIP setting list */\r\n function VpnRpcEnumEtherIpId(init) {\r\n /** Setting list */\r\n this.Settings = [];\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcEnumEtherIpId;\r\n}());\r\nexports.VpnRpcEnumEtherIpId = VpnRpcEnumEtherIpId;\r\n/** Ethernet Network Adapters list item */\r\nvar VpnRpcEnumEthItem = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcEnumEthItem' class: Ethernet Network Adapters list item */\r\n function VpnRpcEnumEthItem(init) {\r\n /** Device name */\r\n this.DeviceName_str = \"\";\r\n /** Network connection name (description) */\r\n this.NetworkConnectionName_utf = \"\";\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcEnumEthItem;\r\n}());\r\nexports.VpnRpcEnumEthItem = VpnRpcEnumEthItem;\r\n/** Ethernet Network Adapters list */\r\nvar VpnRpcEnumEth = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcEnumEth' class: Ethernet Network Adapters list */\r\n function VpnRpcEnumEth(init) {\r\n /** Ethernet Network Adapters list */\r\n this.EthList = [];\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcEnumEth;\r\n}());\r\nexports.VpnRpcEnumEth = VpnRpcEnumEth;\r\n/** Server farm members enumeration items */\r\nvar VpnRpcEnumFarmItem = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcEnumFarmItem' class: Server farm members enumeration items */\r\n function VpnRpcEnumFarmItem(init) {\r\n /** ID */\r\n this.Id_u32 = 0;\r\n /** Controller */\r\n this.Controller_bool = false;\r\n /** Connection time */\r\n this.ConnectedTime_dt = new Date();\r\n /** IP address */\r\n this.Ip_ip = \"\";\r\n /** Host name */\r\n this.Hostname_str = \"\";\r\n /** Point */\r\n this.Point_u32 = 0;\r\n /** Number of sessions */\r\n this.NumSessions_u32 = 0;\r\n /** Number of TCP connections */\r\n this.NumTcpConnections_u32 = 0;\r\n /** Number of HUBs */\r\n this.NumHubs_u32 = 0;\r\n /** Number of assigned client licenses */\r\n this.AssignedClientLicense_u32 = 0;\r\n /** Number of assigned bridge licenses */\r\n this.AssignedBridgeLicense_u32 = 0;\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcEnumFarmItem;\r\n}());\r\nexports.VpnRpcEnumFarmItem = VpnRpcEnumFarmItem;\r\n/** Server farm member enumeration */\r\nvar VpnRpcEnumFarm = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcEnumFarm' class: Server farm member enumeration */\r\n function VpnRpcEnumFarm(init) {\r\n /** Number of Cluster Members */\r\n this.NumFarm_u32 = 0;\r\n /** Cluster Members list */\r\n this.FarmMemberList = [];\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcEnumFarm;\r\n}());\r\nexports.VpnRpcEnumFarm = VpnRpcEnumFarm;\r\n/** Enumeration items in the group */\r\nvar VpnRpcEnumGroupItem = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcEnumGroupItem' class: Enumeration items in the group */\r\n function VpnRpcEnumGroupItem(init) {\r\n /** User name */\r\n this.Name_str = \"\";\r\n /** Real name */\r\n this.Realname_utf = \"\";\r\n /** Note */\r\n this.Note_utf = \"\";\r\n /** Number of users */\r\n this.NumUsers_u32 = 0;\r\n /** Access denied */\r\n this.DenyAccess_bool = false;\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcEnumGroupItem;\r\n}());\r\nexports.VpnRpcEnumGroupItem = VpnRpcEnumGroupItem;\r\n/** Group enumeration */\r\nvar VpnRpcEnumGroup = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcEnumGroup' class: Group enumeration */\r\n function VpnRpcEnumGroup(init) {\r\n /** The Virtual Hub name */\r\n this.HubName_str = \"\";\r\n /** Group list */\r\n this.GroupList = [];\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcEnumGroup;\r\n}());\r\nexports.VpnRpcEnumGroup = VpnRpcEnumGroup;\r\n/** Enumeration items of HUB */\r\nvar VpnRpcEnumHubItem = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcEnumHubItem' class: Enumeration items of HUB */\r\n function VpnRpcEnumHubItem(init) {\r\n /** The name of the Virtual Hub */\r\n this.HubName_str = \"\";\r\n /** Online state */\r\n this.Online_bool = false;\r\n /** Type of HUB (Valid only for Clustered VPN Servers) */\r\n this.HubType_u32 = 0;\r\n /** Number of users */\r\n this.NumUsers_u32 = 0;\r\n /** Number of registered groups */\r\n this.NumGroups_u32 = 0;\r\n /** Number of registered sessions */\r\n this.NumSessions_u32 = 0;\r\n /** Number of current MAC table entries */\r\n this.NumMacTables_u32 = 0;\r\n /** Number of current IP table entries */\r\n this.NumIpTables_u32 = 0;\r\n /** Last communication date and time */\r\n this.LastCommTime_dt = new Date();\r\n /** Last login date and time */\r\n this.LastLoginTime_dt = new Date();\r\n /** Creation date and time */\r\n this.CreatedTime_dt = new Date();\r\n /** Number of accumulated logins */\r\n this.NumLogin_u32 = 0;\r\n /** Whether the traffic information is provided */\r\n this.IsTrafficFilled_bool = false;\r\n /** Number of broadcast packets (Recv) */\r\n this[\"Ex.Recv.BroadcastBytes_u64\"] = 0;\r\n /** Broadcast bytes (Recv) */\r\n this[\"Ex.Recv.BroadcastCount_u64\"] = 0;\r\n /** Unicast count (Recv) */\r\n this[\"Ex.Recv.UnicastBytes_u64\"] = 0;\r\n /** Unicast bytes (Recv) */\r\n this[\"Ex.Recv.UnicastCount_u64\"] = 0;\r\n /** Number of broadcast packets (Send) */\r\n this[\"Ex.Send.BroadcastBytes_u64\"] = 0;\r\n /** Broadcast bytes (Send) */\r\n this[\"Ex.Send.BroadcastCount_u64\"] = 0;\r\n /** Unicast bytes (Send) */\r\n this[\"Ex.Send.UnicastBytes_u64\"] = 0;\r\n /** Unicast bytes (Send) */\r\n this[\"Ex.Send.UnicastCount_u64\"] = 0;\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcEnumHubItem;\r\n}());\r\nexports.VpnRpcEnumHubItem = VpnRpcEnumHubItem;\r\n/** Enumeration of HUB */\r\nvar VpnRpcEnumHub = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcEnumHub' class: Enumeration of HUB */\r\n function VpnRpcEnumHub(init) {\r\n /** Number of Virtual Hubs */\r\n this.NumHub_u32 = 0;\r\n /** Virtual Hubs */\r\n this.HubList = [];\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcEnumHub;\r\n}());\r\nexports.VpnRpcEnumHub = VpnRpcEnumHub;\r\n/** Enumeration items of IP table */\r\nvar VpnRpcEnumIpTableItem = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcEnumIpTableItem' class: Enumeration items of IP table */\r\n function VpnRpcEnumIpTableItem(init) {\r\n /** Key ID */\r\n this.Key_u32 = 0;\r\n /** Session name */\r\n this.SessionName_str = \"\";\r\n /** IP address */\r\n this.IpAddress_ip = \"\";\r\n /** Assigned by the DHCP */\r\n this.DhcpAllocated_bool = false;\r\n /** Creation date and time */\r\n this.CreatedTime_dt = new Date();\r\n /** Updating date */\r\n this.UpdatedTime_dt = new Date();\r\n /** Remote items */\r\n this.RemoteItem_bool = false;\r\n /** Remote host name */\r\n this.RemoteHostname_str = \"\";\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcEnumIpTableItem;\r\n}());\r\nexports.VpnRpcEnumIpTableItem = VpnRpcEnumIpTableItem;\r\n/** Enumeration of IP table */\r\nvar VpnRpcEnumIpTable = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcEnumIpTable' class: Enumeration of IP table */\r\n function VpnRpcEnumIpTable(init) {\r\n /** The Virtual Hub name */\r\n this.HubName_str = \"\";\r\n /** MAC table */\r\n this.IpTable = [];\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcEnumIpTable;\r\n}());\r\nexports.VpnRpcEnumIpTable = VpnRpcEnumIpTable;\r\n/** Layer-3 interface enumeration */\r\nvar VpnRpcEnumL3If = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcEnumL3If' class: Layer-3 interface enumeration */\r\n function VpnRpcEnumL3If(init) {\r\n /** Layer-3 switch name */\r\n this.Name_str = \"\";\r\n /** Layer-3 interface list */\r\n this.L3IFList = [];\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcEnumL3If;\r\n}());\r\nexports.VpnRpcEnumL3If = VpnRpcEnumL3If;\r\n/** Layer-3 switch enumeration item */\r\nvar VpnRpcEnumL3SwItem = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcEnumL3SwItem' class: Layer-3 switch enumeration item */\r\n function VpnRpcEnumL3SwItem(init) {\r\n /** Name of the layer-3 switch */\r\n this.Name_str = \"\";\r\n /** Number of layer-3 switch virtual interfaces */\r\n this.NumInterfaces_u32 = 0;\r\n /** Number of routing tables */\r\n this.NumTables_u32 = 0;\r\n /** Activated flag */\r\n this.Active_bool = false;\r\n /** Online flag */\r\n this.Online_bool = false;\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcEnumL3SwItem;\r\n}());\r\nexports.VpnRpcEnumL3SwItem = VpnRpcEnumL3SwItem;\r\n/** Layer-3 switch enumeration */\r\nvar VpnRpcEnumL3Sw = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcEnumL3Sw' class: Layer-3 switch enumeration */\r\n function VpnRpcEnumL3Sw(init) {\r\n /** Layer-3 switch list */\r\n this.L3SWList = [];\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcEnumL3Sw;\r\n}());\r\nexports.VpnRpcEnumL3Sw = VpnRpcEnumL3Sw;\r\n/** Routing table enumeration */\r\nvar VpnRpcEnumL3Table = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcEnumL3Table' class: Routing table enumeration */\r\n function VpnRpcEnumL3Table(init) {\r\n /** L3 switch name */\r\n this.Name_str = \"\";\r\n /** Routing table item list */\r\n this.L3Table = [];\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcEnumL3Table;\r\n}());\r\nexports.VpnRpcEnumL3Table = VpnRpcEnumL3Table;\r\n/** Cascade Connection Enumeration */\r\nvar VpnRpcEnumLinkItem = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcEnumLinkItem' class: Cascade Connection Enumeration */\r\n function VpnRpcEnumLinkItem(init) {\r\n /** The name of cascade connection */\r\n this.AccountName_utf = \"\";\r\n /** Online flag */\r\n this.Online_bool = false;\r\n /** The flag indicates whether the cascade connection is established */\r\n this.Connected_bool = false;\r\n /** The error last occurred if the cascade connection is in the fail state */\r\n this.LastError_u32 = 0;\r\n /** Connection completion time */\r\n this.ConnectedTime_dt = new Date();\r\n /** Host name of the destination VPN server */\r\n this.Hostname_str = \"\";\r\n /** The Virtual Hub name */\r\n this.TargetHubName_str = \"\";\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcEnumLinkItem;\r\n}());\r\nexports.VpnRpcEnumLinkItem = VpnRpcEnumLinkItem;\r\n/** Enumeration of the link */\r\nvar VpnRpcEnumLink = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcEnumLink' class: Enumeration of the link */\r\n function VpnRpcEnumLink(init) {\r\n /** The Virtual Hub name */\r\n this.HubName_str = \"\";\r\n /** Number of cascade connections */\r\n this.NumLink_u32 = 0;\r\n /** The list of cascade connections */\r\n this.LinkList = [];\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcEnumLink;\r\n}());\r\nexports.VpnRpcEnumLink = VpnRpcEnumLink;\r\n/** List of listeners item */\r\nvar VpnRpcListenerListItem = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcListenerListItem' class: List of listeners item */\r\n function VpnRpcListenerListItem(init) {\r\n /** TCP port number (range: 1 - 65535) */\r\n this.Ports_u32 = 0;\r\n /** Active state */\r\n this.Enables_bool = false;\r\n /** The flag to indicate if the error occurred on the listener port */\r\n this.Errors_bool = false;\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcListenerListItem;\r\n}());\r\nexports.VpnRpcListenerListItem = VpnRpcListenerListItem;\r\n/** List of listeners */\r\nvar VpnRpcListenerList = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcListenerList' class: List of listeners */\r\n function VpnRpcListenerList(init) {\r\n /** List of listener items */\r\n this.ListenerList = [];\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcListenerList;\r\n}());\r\nexports.VpnRpcListenerList = VpnRpcListenerList;\r\n/** Local Bridge enumeration */\r\nvar VpnRpcEnumLocalBridge = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcEnumLocalBridge' class: Local Bridge enumeration */\r\n function VpnRpcEnumLocalBridge(init) {\r\n /** Local Bridge list */\r\n this.LocalBridgeList = [];\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcEnumLocalBridge;\r\n}());\r\nexports.VpnRpcEnumLocalBridge = VpnRpcEnumLocalBridge;\r\n/** Log file enumeration */\r\nvar VpnRpcEnumLogFileItem = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcEnumLogFileItem' class: Log file enumeration */\r\n function VpnRpcEnumLogFileItem(init) {\r\n /** Server name */\r\n this.ServerName_str = \"\";\r\n /** File path */\r\n this.FilePath_str = \"\";\r\n /** File size */\r\n this.FileSize_u32 = 0;\r\n /** Last write date */\r\n this.UpdatedTime_dt = new Date();\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcEnumLogFileItem;\r\n}());\r\nexports.VpnRpcEnumLogFileItem = VpnRpcEnumLogFileItem;\r\n/** Log file enumeration */\r\nvar VpnRpcEnumLogFile = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcEnumLogFile' class: Log file enumeration */\r\n function VpnRpcEnumLogFile(init) {\r\n /** Log file list */\r\n this.LogFiles = [];\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcEnumLogFile;\r\n}());\r\nexports.VpnRpcEnumLogFile = VpnRpcEnumLogFile;\r\n/** Enumeration items of the MAC table */\r\nvar VpnRpcEnumMacTableItem = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcEnumMacTableItem' class: Enumeration items of the MAC table */\r\n function VpnRpcEnumMacTableItem(init) {\r\n /** Key ID */\r\n this.Key_u32 = 0;\r\n /** Session name */\r\n this.SessionName_str = \"\";\r\n /** MAC address */\r\n this.MacAddress_bin = new Uint8Array([]);\r\n /** Creation date and time */\r\n this.CreatedTime_dt = new Date();\r\n /** Updating date */\r\n this.UpdatedTime_dt = new Date();\r\n /** Remote items */\r\n this.RemoteItem_bool = false;\r\n /** Remote host name */\r\n this.RemoteHostname_str = \"\";\r\n /** VLAN ID */\r\n this.VlanId_u32 = 0;\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcEnumMacTableItem;\r\n}());\r\nexports.VpnRpcEnumMacTableItem = VpnRpcEnumMacTableItem;\r\n/** Enumeration of the MAC table */\r\nvar VpnRpcEnumMacTable = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcEnumMacTable' class: Enumeration of the MAC table */\r\n function VpnRpcEnumMacTable(init) {\r\n /** The Virtual Hub name */\r\n this.HubName_str = \"\";\r\n /** MAC table */\r\n this.MacTable = [];\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcEnumMacTable;\r\n}());\r\nexports.VpnRpcEnumMacTable = VpnRpcEnumMacTable;\r\n/** NAT Entry Protocol Number */\r\nvar VpnRpcNatProtocol;\r\n(function (VpnRpcNatProtocol) {\r\n /** TCP */\r\n VpnRpcNatProtocol[VpnRpcNatProtocol[\"TCP\"] = 0] = \"TCP\";\r\n /** UDP */\r\n VpnRpcNatProtocol[VpnRpcNatProtocol[\"UDP\"] = 1] = \"UDP\";\r\n /** DNS */\r\n VpnRpcNatProtocol[VpnRpcNatProtocol[\"DNS\"] = 2] = \"DNS\";\r\n /** ICMP */\r\n VpnRpcNatProtocol[VpnRpcNatProtocol[\"ICMP\"] = 3] = \"ICMP\";\r\n})(VpnRpcNatProtocol = exports.VpnRpcNatProtocol || (exports.VpnRpcNatProtocol = {}));\r\n/** State of NAT session (TCP) */\r\nvar VpnRpcNatTcpState;\r\n(function (VpnRpcNatTcpState) {\r\n /** Connecting */\r\n VpnRpcNatTcpState[VpnRpcNatTcpState[\"Connecting\"] = 0] = \"Connecting\";\r\n /** Send the RST (Connection failure or disconnected) */\r\n VpnRpcNatTcpState[VpnRpcNatTcpState[\"SendReset\"] = 1] = \"SendReset\";\r\n /** Connection complete */\r\n VpnRpcNatTcpState[VpnRpcNatTcpState[\"Connected\"] = 2] = \"Connected\";\r\n /** Connection established */\r\n VpnRpcNatTcpState[VpnRpcNatTcpState[\"Established\"] = 3] = \"Established\";\r\n /** Wait for socket disconnection */\r\n VpnRpcNatTcpState[VpnRpcNatTcpState[\"WaitDisconnect\"] = 4] = \"WaitDisconnect\";\r\n})(VpnRpcNatTcpState = exports.VpnRpcNatTcpState || (exports.VpnRpcNatTcpState = {}));\r\n/** VpnRpcEnumNat List Item */\r\nvar VpnRpcEnumNatItem = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcEnumNatItem' class: VpnRpcEnumNat List Item */\r\n function VpnRpcEnumNatItem(init) {\r\n /** ID */\r\n this.Id_u32 = 0;\r\n /** Protocol */\r\n this.Protocol_u32 = 0;\r\n /** Source IP address */\r\n this.SrcIp_ip = \"\";\r\n /** Source host name */\r\n this.SrcHost_str = \"\";\r\n /** Source port number */\r\n this.SrcPort_u32 = 0;\r\n /** Destination IP address */\r\n this.DestIp_ip = \"\";\r\n /** Destination host name */\r\n this.DestHost_str = \"\";\r\n /** Destination port number */\r\n this.DestPort_u32 = 0;\r\n /** Connection time */\r\n this.CreatedTime_dt = new Date();\r\n /** Last communication time */\r\n this.LastCommTime_dt = new Date();\r\n /** Transmission size */\r\n this.SendSize_u64 = 0;\r\n /** Receive size */\r\n this.RecvSize_u64 = 0;\r\n /** TCP state */\r\n this.TcpStatus_u32 = 0;\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcEnumNatItem;\r\n}());\r\nexports.VpnRpcEnumNatItem = VpnRpcEnumNatItem;\r\n/** RPC_ENUM_NAT */\r\nvar VpnRpcEnumNat = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcEnumNat' class: RPC_ENUM_NAT */\r\n function VpnRpcEnumNat(init) {\r\n /** Virtual Hub Name */\r\n this.HubName_str = \"\";\r\n /** NAT item */\r\n this.NatTable = [];\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcEnumNat;\r\n}());\r\nexports.VpnRpcEnumNat = VpnRpcEnumNat;\r\n/** Enumeration item of VPN session */\r\nvar VpnRpcEnumSessionItem = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcEnumSessionItem' class: Enumeration item of VPN session */\r\n function VpnRpcEnumSessionItem(init) {\r\n /** Session name */\r\n this.Name_str = \"\";\r\n /** Remote session */\r\n this.RemoteSession_bool = false;\r\n /** Remote server name */\r\n this.RemoteHostname_str = \"\";\r\n /** User name */\r\n this.Username_str = \"\";\r\n /** IP address */\r\n this.ClientIP_ip = \"\";\r\n /** Host name */\r\n this.Hostname_str = \"\";\r\n /** Maximum number of underlying TCP connections */\r\n this.MaxNumTcp_u32 = 0;\r\n /** Number of current underlying TCP connections */\r\n this.CurrentNumTcp_u32 = 0;\r\n /** Packet size transmitted */\r\n this.PacketSize_u64 = 0;\r\n /** Number of packets transmitted */\r\n this.PacketNum_u64 = 0;\r\n /** Is a Cascade VPN session */\r\n this.LinkMode_bool = false;\r\n /** Is a SecureNAT VPN session */\r\n this.SecureNATMode_bool = false;\r\n /** Is the VPN session for Local Bridge */\r\n this.BridgeMode_bool = false;\r\n /** Is a Layer-3 Switch VPN session */\r\n this.Layer3Mode_bool = false;\r\n /** Is in Bridge Mode */\r\n this.Client_BridgeMode_bool = false;\r\n /** Is in Monitor Mode */\r\n this.Client_MonitorMode_bool = false;\r\n /** VLAN ID */\r\n this.VLanId_u32 = 0;\r\n /** Unique ID of the VPN Session */\r\n this.UniqueId_bin = new Uint8Array([]);\r\n /** Creation date and time */\r\n this.CreatedTime_dt = new Date();\r\n /** Last communication date and time */\r\n this.LastCommTime_dt = new Date();\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcEnumSessionItem;\r\n}());\r\nexports.VpnRpcEnumSessionItem = VpnRpcEnumSessionItem;\r\n/** Enumerate VPN sessions */\r\nvar VpnRpcEnumSession = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcEnumSession' class: Enumerate VPN sessions */\r\n function VpnRpcEnumSession(init) {\r\n /** The Virtual Hub name */\r\n this.HubName_str = \"\";\r\n /** VPN sessions list */\r\n this.SessionList = [];\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcEnumSession;\r\n}());\r\nexports.VpnRpcEnumSession = VpnRpcEnumSession;\r\n/** Enumeration item of user */\r\nvar VpnRpcEnumUserItem = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcEnumUserItem' class: Enumeration item of user */\r\n function VpnRpcEnumUserItem(init) {\r\n /** User name */\r\n this.Name_str = \"\";\r\n /** Group name */\r\n this.GroupName_str = \"\";\r\n /** Real name */\r\n this.Realname_utf = \"\";\r\n /** Note */\r\n this.Note_utf = \"\";\r\n /** Authentication method */\r\n this.AuthType_u32 = 0;\r\n /** Number of logins */\r\n this.NumLogin_u32 = 0;\r\n /** Last login date and time */\r\n this.LastLoginTime_dt = new Date();\r\n /** Access denied */\r\n this.DenyAccess_bool = false;\r\n /** Flag of whether the traffic variable is set */\r\n this.IsTrafficFilled_bool = false;\r\n /** Flag of whether expiration date variable is set */\r\n this.IsExpiresFilled_bool = false;\r\n /** Expiration date */\r\n this.Expires_dt = new Date();\r\n /** Number of broadcast packets (Recv) */\r\n this[\"Ex.Recv.BroadcastBytes_u64\"] = 0;\r\n /** Broadcast bytes (Recv) */\r\n this[\"Ex.Recv.BroadcastCount_u64\"] = 0;\r\n /** Unicast count (Recv) */\r\n this[\"Ex.Recv.UnicastBytes_u64\"] = 0;\r\n /** Unicast bytes (Recv) */\r\n this[\"Ex.Recv.UnicastCount_u64\"] = 0;\r\n /** Number of broadcast packets (Send) */\r\n this[\"Ex.Send.BroadcastBytes_u64\"] = 0;\r\n /** Broadcast bytes (Send) */\r\n this[\"Ex.Send.BroadcastCount_u64\"] = 0;\r\n /** Unicast bytes (Send) */\r\n this[\"Ex.Send.UnicastBytes_u64\"] = 0;\r\n /** Unicast bytes (Send) */\r\n this[\"Ex.Send.UnicastCount_u64\"] = 0;\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcEnumUserItem;\r\n}());\r\nexports.VpnRpcEnumUserItem = VpnRpcEnumUserItem;\r\n/** Enumeration of user */\r\nvar VpnRpcEnumUser = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcEnumUser' class: Enumeration of user */\r\n function VpnRpcEnumUser(init) {\r\n /** The Virtual Hub name */\r\n this.HubName_str = \"\";\r\n /** User list */\r\n this.UserList = [];\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcEnumUser;\r\n}());\r\nexports.VpnRpcEnumUser = VpnRpcEnumUser;\r\n/** Source IP Address Limit List Item */\r\nvar VpnAc = /** @class */ (function () {\r\n /** Constructor for the 'VpnAc' class: Source IP Address Limit List Item */\r\n function VpnAc(init) {\r\n /** ID */\r\n this.Id_u32 = 0;\r\n /** Priority */\r\n this.Priority_u32 = 0;\r\n /** Deny access */\r\n this.Deny_bool = false;\r\n /** Set true if you want to specify the SubnetMask_ip item. */\r\n this.Masked_bool = false;\r\n /** IP address */\r\n this.IpAddress_ip = \"\";\r\n /** Subnet mask, valid only if Masked_bool == true */\r\n this.SubnetMask_ip = \"\";\r\n Object.assign(this, init);\r\n }\r\n return VpnAc;\r\n}());\r\nexports.VpnAc = VpnAc;\r\n/** Source IP Address Limit List */\r\nvar VpnRpcAcList = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcAcList' class: Source IP Address Limit List */\r\n function VpnRpcAcList(init) {\r\n /** The Virtual Hub name */\r\n this.HubName_str = \"\";\r\n /** Source IP Address Limit List */\r\n this.ACList = [];\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcAcList;\r\n}());\r\nexports.VpnRpcAcList = VpnRpcAcList;\r\n/** Message */\r\nvar VpnRpcMsg = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcMsg' class: Message */\r\n function VpnRpcMsg(init) {\r\n /** The Virtual Hub name */\r\n this.HubName_str = \"\";\r\n /** Message (Unicode strings acceptable) */\r\n this.Msg_bin = new Uint8Array([]);\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcMsg;\r\n}());\r\nexports.VpnRpcMsg = VpnRpcMsg;\r\n/** Get / Set the Azure state */\r\nvar VpnRpcAzureStatus = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcAzureStatus' class: Get / Set the Azure state */\r\n function VpnRpcAzureStatus(init) {\r\n /** Whether VPN Azure Function is Enabled */\r\n this.IsEnabled_bool = false;\r\n /** Whether connection to VPN Azure Cloud Server is established */\r\n this.IsConnected_bool = false;\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcAzureStatus;\r\n}());\r\nexports.VpnRpcAzureStatus = VpnRpcAzureStatus;\r\n/** Local Bridge support information */\r\nvar VpnRpcBridgeSupport = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcBridgeSupport' class: Local Bridge support information */\r\n function VpnRpcBridgeSupport(init) {\r\n /** Whether the OS supports the Local Bridge function */\r\n this.IsBridgeSupportedOs_bool = false;\r\n /** Whether WinPcap is necessary to install */\r\n this.IsWinPcapNeeded_bool = false;\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcBridgeSupport;\r\n}());\r\nexports.VpnRpcBridgeSupport = VpnRpcBridgeSupport;\r\n/** Get the CA of HUB */\r\nvar VpnRpcHubGetCA = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcHubGetCA' class: Get the CA of HUB */\r\n function VpnRpcHubGetCA(init) {\r\n /** The Virtual Hub name */\r\n this.HubName_str = \"\";\r\n /** The key id of the certificate */\r\n this.Key_u32 = 0;\r\n /** The body of the X.509 certificate */\r\n this.Cert_bin = new Uint8Array([]);\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcHubGetCA;\r\n}());\r\nexports.VpnRpcHubGetCA = VpnRpcHubGetCA;\r\n/** Caps item of the VPN Server */\r\nvar VpnCaps = /** @class */ (function () {\r\n /** Constructor for the 'VpnCaps' class: Caps item of the VPN Server */\r\n function VpnCaps(init) {\r\n /** Name */\r\n this.CapsName_str = \"\";\r\n /** Value */\r\n this.CapsValue_u32 = 0;\r\n /** Descrption */\r\n this.CapsDescrption_utf = \"\";\r\n Object.assign(this, init);\r\n }\r\n return VpnCaps;\r\n}());\r\nexports.VpnCaps = VpnCaps;\r\n/** Caps list of the VPN Server */\r\nvar VpnCapslist = /** @class */ (function () {\r\n /** Constructor for the 'VpnCapslist' class: Caps list of the VPN Server */\r\n function VpnCapslist(init) {\r\n /** Caps list of the VPN Server */\r\n this.CapsList = [];\r\n Object.assign(this, init);\r\n }\r\n return VpnCapslist;\r\n}());\r\nexports.VpnCapslist = VpnCapslist;\r\n/** Config operation */\r\nvar VpnRpcConfig = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcConfig' class: Config operation */\r\n function VpnRpcConfig(init) {\r\n /** File name (valid only for returning from the server) */\r\n this.FileName_str = \"\";\r\n /** File data */\r\n this.FileData_bin = new Uint8Array([]);\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcConfig;\r\n}());\r\nexports.VpnRpcConfig = VpnRpcConfig;\r\n/** Connection information */\r\nvar VpnRpcConnectionInfo = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcConnectionInfo' class: Connection information */\r\n function VpnRpcConnectionInfo(init) {\r\n /** Connection name */\r\n this.Name_str = \"\";\r\n /** Type */\r\n this.Type_u32 = 0;\r\n /** Host name */\r\n this.Hostname_str = \"\";\r\n /** IP address */\r\n this.Ip_ip = \"\";\r\n /** Port number */\r\n this.Port_u32 = 0;\r\n /** Connected time */\r\n this.ConnectedTime_dt = new Date();\r\n /** Server string */\r\n this.ServerStr_str = \"\";\r\n /** Server version */\r\n this.ServerVer_u32 = 0;\r\n /** Server build number */\r\n this.ServerBuild_u32 = 0;\r\n /** Client string */\r\n this.ClientStr_str = \"\";\r\n /** Client version */\r\n this.ClientVer_u32 = 0;\r\n /** Client build number */\r\n this.ClientBuild_u32 = 0;\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcConnectionInfo;\r\n}());\r\nexports.VpnRpcConnectionInfo = VpnRpcConnectionInfo;\r\n/** Proxy type */\r\nvar VpnRpcProxyType;\r\n(function (VpnRpcProxyType) {\r\n /** Direct TCP connection */\r\n VpnRpcProxyType[VpnRpcProxyType[\"Direct\"] = 0] = \"Direct\";\r\n /** Connection via HTTP proxy server */\r\n VpnRpcProxyType[VpnRpcProxyType[\"HTTP\"] = 1] = \"HTTP\";\r\n /** Connection via SOCKS proxy server */\r\n VpnRpcProxyType[VpnRpcProxyType[\"SOCKS\"] = 2] = \"SOCKS\";\r\n})(VpnRpcProxyType = exports.VpnRpcProxyType || (exports.VpnRpcProxyType = {}));\r\n/** The current status of the DDNS */\r\nvar VpnDDnsClientStatus = /** @class */ (function () {\r\n /** Constructor for the 'VpnDDnsClientStatus' class: The current status of the DDNS */\r\n function VpnDDnsClientStatus(init) {\r\n /** Last error code (IPv4) */\r\n this.Err_IPv4_u32 = 0;\r\n /** Last error string (IPv4) */\r\n this.ErrStr_IPv4_utf = \"\";\r\n /** Last error code (IPv6) */\r\n this.Err_IPv6_u32 = 0;\r\n /** Last error string (IPv6) */\r\n this.ErrStr_IPv6_utf = \"\";\r\n /** Current DDNS host name */\r\n this.CurrentHostName_str = \"\";\r\n /** Current FQDN of the DDNS hostname */\r\n this.CurrentFqdn_str = \"\";\r\n /** DDNS suffix */\r\n this.DnsSuffix_str = \"\";\r\n /** Current IPv4 address of the VPN Server */\r\n this.CurrentIPv4_str = \"\";\r\n /** Current IPv6 address of the VPN Server */\r\n this.CurrentIPv6_str = \"\";\r\n Object.assign(this, init);\r\n }\r\n return VpnDDnsClientStatus;\r\n}());\r\nexports.VpnDDnsClientStatus = VpnDDnsClientStatus;\r\n/** Internet connection settings */\r\nvar VpnInternetSetting = /** @class */ (function () {\r\n /** Constructor for the 'VpnInternetSetting' class: Internet connection settings */\r\n function VpnInternetSetting(init) {\r\n /** Type of proxy server */\r\n this.ProxyType_u32 = 0;\r\n /** Proxy server host name */\r\n this.ProxyHostName_str = \"\";\r\n /** Proxy server port number */\r\n this.ProxyPort_u32 = 0;\r\n /** Proxy server user name */\r\n this.ProxyUsername_str = \"\";\r\n /** Proxy server password */\r\n this.ProxyPassword_str = \"\";\r\n Object.assign(this, init);\r\n }\r\n return VpnInternetSetting;\r\n}());\r\nexports.VpnInternetSetting = VpnInternetSetting;\r\n/** Administration options */\r\nvar VpnAdminOption = /** @class */ (function () {\r\n /** Constructor for the 'VpnAdminOption' class: Administration options */\r\n function VpnAdminOption(init) {\r\n /** Name */\r\n this.Name_str = \"\";\r\n /** Data */\r\n this.Value_u32 = 0;\r\n /** Descrption */\r\n this.Descrption_utf = \"\";\r\n Object.assign(this, init);\r\n }\r\n return VpnAdminOption;\r\n}());\r\nexports.VpnAdminOption = VpnAdminOption;\r\n/** Administration options list */\r\nvar VpnRpcAdminOption = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcAdminOption' class: Administration options list */\r\n function VpnRpcAdminOption(init) {\r\n /** Virtual HUB name */\r\n this.HubName_str = \"\";\r\n /** List data */\r\n this.AdminOptionList = [];\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcAdminOption;\r\n}());\r\nexports.VpnRpcAdminOption = VpnRpcAdminOption;\r\n/** Connection state to the controller */\r\nvar VpnRpcFarmConnectionStatus = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcFarmConnectionStatus' class: Connection state to the controller */\r\n function VpnRpcFarmConnectionStatus(init) {\r\n /** IP address */\r\n this.Ip_ip = \"\";\r\n /** Port number */\r\n this.Port_u32 = 0;\r\n /** Online state */\r\n this.Online_bool = false;\r\n /** Last error code */\r\n this.LastError_u32 = 0;\r\n /** Connection start time */\r\n this.StartedTime_dt = new Date();\r\n /** First connection time */\r\n this.FirstConnectedTime_dt = new Date();\r\n /** Connection time of this time */\r\n this.CurrentConnectedTime_dt = new Date();\r\n /** Number of retries */\r\n this.NumTry_u32 = 0;\r\n /** Number of connection count */\r\n this.NumConnected_u32 = 0;\r\n /** Connection failure count */\r\n this.NumFailed_u32 = 0;\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcFarmConnectionStatus;\r\n}());\r\nexports.VpnRpcFarmConnectionStatus = VpnRpcFarmConnectionStatus;\r\n/** HUB item of each farm member */\r\nvar VpnRpcFarmHub = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcFarmHub' class: HUB item of each farm member */\r\n function VpnRpcFarmHub(init) {\r\n /** The Virtual Hub name */\r\n this.HubName_str = \"\";\r\n /** Dynamic HUB */\r\n this.DynamicHub_bool = false;\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcFarmHub;\r\n}());\r\nexports.VpnRpcFarmHub = VpnRpcFarmHub;\r\n/** Server farm member information acquisition */\r\nvar VpnRpcFarmInfo = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcFarmInfo' class: Server farm member information acquisition */\r\n function VpnRpcFarmInfo(init) {\r\n /** ID */\r\n this.Id_u32 = 0;\r\n /** The flag if the server is Cluster Controller (false: Cluster Member servers) */\r\n this.Controller_bool = false;\r\n /** Connection Established Time */\r\n this.ConnectedTime_dt = new Date();\r\n /** IP address */\r\n this.Ip_ip = \"\";\r\n /** Host name */\r\n this.Hostname_str = \"\";\r\n /** Point */\r\n this.Point_u32 = 0;\r\n /** Number of Public Ports */\r\n this.NumPort_u32 = 0;\r\n /** Public Ports */\r\n this.Ports_u32 = [];\r\n /** Server certificate */\r\n this.ServerCert_bin = new Uint8Array([]);\r\n /** Number of farm HUB */\r\n this.NumFarmHub_u32 = 0;\r\n /** The hosted Virtual Hub list */\r\n this.HubsList = [];\r\n /** Number of hosted VPN sessions */\r\n this.NumSessions_u32 = 0;\r\n /** Number of TCP connections */\r\n this.NumTcpConnections_u32 = 0;\r\n /** Performance Standard Ratio */\r\n this.Weight_u32 = 0;\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcFarmInfo;\r\n}());\r\nexports.VpnRpcFarmInfo = VpnRpcFarmInfo;\r\n/** Server farm configuration */\r\nvar VpnRpcFarm = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcFarm' class: Server farm configuration */\r\n function VpnRpcFarm(init) {\r\n /** Type of server */\r\n this.ServerType_u32 = 0;\r\n /** Valid only for Cluster Member servers. Number of the Ports_u32 element. */\r\n this.NumPort_u32 = 0;\r\n /** Valid only for Cluster Member servers. Specify the list of public port numbers on this server. The list must have at least one public port number set, and it is also possible to set multiple public port numbers. */\r\n this.Ports_u32 = [];\r\n /** Valid only for Cluster Member servers. Specify the public IP address of this server. If you wish to leave public IP address unspecified, specify the empty string. When a public IP address is not specified, the IP address of the network interface used when connecting to the cluster controller will be automatically used. */\r\n this.PublicIp_ip = \"\";\r\n /** Valid only for Cluster Member servers. Specify the host name or IP address of the destination cluster controller. */\r\n this.ControllerName_str = \"\";\r\n /** Valid only for Cluster Member servers. Specify the TCP port number of the destination cluster controller. */\r\n this.ControllerPort_u32 = 0;\r\n /** Valid only for Cluster Member servers. Specify the password required to connect to the destination controller. It needs to be the same as an administrator password on the destination controller. */\r\n this.MemberPasswordPlaintext_str = \"\";\r\n /** This sets a value for the performance standard ratio of this VPN Server. This is the standard value for when load balancing is performed in the cluster. For example, making only one machine 200 while the other members have a status of 100, will regulate that machine to receive twice as many connections as the other members. Specify 1 or higher for the value. If this parameter is left unspecified, 100 will be used. */\r\n this.Weight_u32 = 0;\r\n /** Valid only for Cluster Controller server. By specifying true, the VPN Server will operate only as a controller on the cluster and it will always distribute general VPN Client connections to members other than itself. This function is used in high-load environments. */\r\n this.ControllerOnly_bool = false;\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcFarm;\r\n}());\r\nexports.VpnRpcFarm = VpnRpcFarm;\r\n/** Log switch type */\r\nvar VpnRpcLogSwitchType;\r\n(function (VpnRpcLogSwitchType) {\r\n /** No switching */\r\n VpnRpcLogSwitchType[VpnRpcLogSwitchType[\"No\"] = 0] = \"No\";\r\n /** Secondly basis */\r\n VpnRpcLogSwitchType[VpnRpcLogSwitchType[\"Second\"] = 1] = \"Second\";\r\n /** Minutely basis */\r\n VpnRpcLogSwitchType[VpnRpcLogSwitchType[\"Minute\"] = 2] = \"Minute\";\r\n /** Hourly basis */\r\n VpnRpcLogSwitchType[VpnRpcLogSwitchType[\"Hour\"] = 3] = \"Hour\";\r\n /** Daily basis */\r\n VpnRpcLogSwitchType[VpnRpcLogSwitchType[\"Day\"] = 4] = \"Day\";\r\n /** Monthly basis */\r\n VpnRpcLogSwitchType[VpnRpcLogSwitchType[\"Month\"] = 5] = \"Month\";\r\n})(VpnRpcLogSwitchType = exports.VpnRpcLogSwitchType || (exports.VpnRpcLogSwitchType = {}));\r\n/** Packet log settings */\r\nvar VpnRpcPacketLogSetting;\r\n(function (VpnRpcPacketLogSetting) {\r\n /** Not save */\r\n VpnRpcPacketLogSetting[VpnRpcPacketLogSetting[\"None\"] = 0] = \"None\";\r\n /** Only header */\r\n VpnRpcPacketLogSetting[VpnRpcPacketLogSetting[\"Header\"] = 1] = \"Header\";\r\n /** All payloads */\r\n VpnRpcPacketLogSetting[VpnRpcPacketLogSetting[\"All\"] = 2] = \"All\";\r\n})(VpnRpcPacketLogSetting = exports.VpnRpcPacketLogSetting || (exports.VpnRpcPacketLogSetting = {}));\r\n/** Packet log settings array index */\r\nvar VpnRpcPacketLogSettingIndex;\r\n(function (VpnRpcPacketLogSettingIndex) {\r\n /** TCP connection log */\r\n VpnRpcPacketLogSettingIndex[VpnRpcPacketLogSettingIndex[\"TcpConnection\"] = 0] = \"TcpConnection\";\r\n /** TCP packet log */\r\n VpnRpcPacketLogSettingIndex[VpnRpcPacketLogSettingIndex[\"TcpAll\"] = 1] = \"TcpAll\";\r\n /** DHCP Log */\r\n VpnRpcPacketLogSettingIndex[VpnRpcPacketLogSettingIndex[\"Dhcp\"] = 2] = \"Dhcp\";\r\n /** UDP log */\r\n VpnRpcPacketLogSettingIndex[VpnRpcPacketLogSettingIndex[\"Udp\"] = 3] = \"Udp\";\r\n /** ICMP log */\r\n VpnRpcPacketLogSettingIndex[VpnRpcPacketLogSettingIndex[\"Icmp\"] = 4] = \"Icmp\";\r\n /** IP log */\r\n VpnRpcPacketLogSettingIndex[VpnRpcPacketLogSettingIndex[\"Ip\"] = 5] = \"Ip\";\r\n /** ARP log */\r\n VpnRpcPacketLogSettingIndex[VpnRpcPacketLogSettingIndex[\"Arp\"] = 6] = \"Arp\";\r\n /** Ethernet log */\r\n VpnRpcPacketLogSettingIndex[VpnRpcPacketLogSettingIndex[\"Ethernet\"] = 7] = \"Ethernet\";\r\n})(VpnRpcPacketLogSettingIndex = exports.VpnRpcPacketLogSettingIndex || (exports.VpnRpcPacketLogSettingIndex = {}));\r\n/** HUB log settings */\r\nvar VpnRpcHubLog = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcHubLog' class: HUB log settings */\r\n function VpnRpcHubLog(init) {\r\n /** The Virtual Hub name */\r\n this.HubName_str = \"\";\r\n /** The flag to enable / disable saving the security log */\r\n this.SaveSecurityLog_bool = false;\r\n /** The log filename switching setting of the security log */\r\n this.SecurityLogSwitchType_u32 = 0;\r\n /** The flag to enable / disable saving the security log */\r\n this.SavePacketLog_bool = false;\r\n /** The log filename switching settings of the packet logs */\r\n this.PacketLogSwitchType_u32 = 0;\r\n /** Specify the save contents of the packet logs (uint * 16 array). The index numbers: TcpConnection = 0, TcpAll = 1, DHCP = 2, UDP = 3, ICMP = 4, IP = 5, ARP = 6, Ethernet = 7. */\r\n this.PacketLogConfig_u32 = [];\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcHubLog;\r\n}());\r\nexports.VpnRpcHubLog = VpnRpcHubLog;\r\n/** RADIUS server options */\r\nvar VpnRpcRadius = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcRadius' class: RADIUS server options */\r\n function VpnRpcRadius(init) {\r\n /** The Virtual Hub name */\r\n this.HubName_str = \"\";\r\n /** RADIUS server name */\r\n this.RadiusServerName_str = \"\";\r\n /** RADIUS port number */\r\n this.RadiusPort_u32 = 0;\r\n /** Secret key */\r\n this.RadiusSecret_str = \"\";\r\n /** Radius retry interval */\r\n this.RadiusRetryInterval_u32 = 0;\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcRadius;\r\n}());\r\nexports.VpnRpcRadius = VpnRpcRadius;\r\n/** Get the state HUB */\r\nvar VpnRpcHubStatus = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcHubStatus' class: Get the state HUB */\r\n function VpnRpcHubStatus(init) {\r\n /** The Virtual Hub name */\r\n this.HubName_str = \"\";\r\n /** Online */\r\n this.Online_bool = false;\r\n /** Type of HUB */\r\n this.HubType_u32 = 0;\r\n /** Number of sessions */\r\n this.NumSessions_u32 = 0;\r\n /** Number of sessions (client mode) */\r\n this.NumSessionsClient_u32 = 0;\r\n /** Number of sessions (bridge mode) */\r\n this.NumSessionsBridge_u32 = 0;\r\n /** Number of Access list entries */\r\n this.NumAccessLists_u32 = 0;\r\n /** Number of users */\r\n this.NumUsers_u32 = 0;\r\n /** Number of groups */\r\n this.NumGroups_u32 = 0;\r\n /** Number of MAC table entries */\r\n this.NumMacTables_u32 = 0;\r\n /** Number of IP table entries */\r\n this.NumIpTables_u32 = 0;\r\n /** Number of broadcast packets (Recv) */\r\n this[\"Recv.BroadcastBytes_u64\"] = 0;\r\n /** Broadcast bytes (Recv) */\r\n this[\"Recv.BroadcastCount_u64\"] = 0;\r\n /** Unicast count (Recv) */\r\n this[\"Recv.UnicastBytes_u64\"] = 0;\r\n /** Unicast bytes (Recv) */\r\n this[\"Recv.UnicastCount_u64\"] = 0;\r\n /** Number of broadcast packets (Send) */\r\n this[\"Send.BroadcastBytes_u64\"] = 0;\r\n /** Broadcast bytes (Send) */\r\n this[\"Send.BroadcastCount_u64\"] = 0;\r\n /** Unicast bytes (Send) */\r\n this[\"Send.UnicastBytes_u64\"] = 0;\r\n /** Unicast bytes (Send) */\r\n this[\"Send.UnicastCount_u64\"] = 0;\r\n /** Whether SecureNAT is enabled */\r\n this.SecureNATEnabled_bool = false;\r\n /** Last communication date and time */\r\n this.LastCommTime_dt = new Date();\r\n /** Last login date and time */\r\n this.LastLoginTime_dt = new Date();\r\n /** Creation date and time */\r\n this.CreatedTime_dt = new Date();\r\n /** Number of logins */\r\n this.NumLogin_u32 = 0;\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcHubStatus;\r\n}());\r\nexports.VpnRpcHubStatus = VpnRpcHubStatus;\r\n/** List of services provided by IPsec server */\r\nvar VpnIPsecServices = /** @class */ (function () {\r\n /** Constructor for the 'VpnIPsecServices' class: List of services provided by IPsec server */\r\n function VpnIPsecServices(init) {\r\n /** Enable or Disable the L2TP Server Function (Raw L2TP with No Encryptions). To accept special VPN clients, enable this option. */\r\n this.L2TP_Raw_bool = false;\r\n /** Enable or Disable the L2TP over IPsec Server Function. To accept VPN connections from iPhone, iPad, Android, Windows or Mac OS X, enable this option. */\r\n this.L2TP_IPsec_bool = false;\r\n /** Enable or Disable the EtherIP / L2TPv3 over IPsec Server Function (for site-to-site VPN Server function). Router Products which are compatible with EtherIP over IPsec can connect to Virtual Hubs on the VPN Server and establish Layer-2 (Ethernet) Bridging. */\r\n this.EtherIP_IPsec_bool = false;\r\n /** Specify the IPsec Pre-Shared Key. An IPsec Pre-Shared Key is also called as \"PSK\" or \"secret\". Specify it equal or less than 8 letters, and distribute it to every users who will connect to the VPN Server. Please note: Google Android 4.0 has a bug which a Pre-Shared Key with 10 or more letters causes a unexpected behavior. For that reason, the letters of a Pre-Shared Key should be 9 or less characters. */\r\n this.IPsec_Secret_str = \"\";\r\n /** Specify the default Virtual HUB in a case of omitting the name of HUB on the Username. Users should specify their username such as \"Username@Target Virtual HUB Name\" to connect this L2TP Server. If the designation of the Virtual Hub is omitted, the above HUB will be used as the target. */\r\n this.L2TP_DefaultHub_str = \"\";\r\n Object.assign(this, init);\r\n }\r\n return VpnIPsecServices;\r\n}());\r\nexports.VpnIPsecServices = VpnIPsecServices;\r\n/** Keep alive protocol */\r\nvar VpnRpcKeepAliveProtocol;\r\n(function (VpnRpcKeepAliveProtocol) {\r\n /** TCP */\r\n VpnRpcKeepAliveProtocol[VpnRpcKeepAliveProtocol[\"TCP\"] = 0] = \"TCP\";\r\n /** UDP */\r\n VpnRpcKeepAliveProtocol[VpnRpcKeepAliveProtocol[\"UDP\"] = 1] = \"UDP\";\r\n})(VpnRpcKeepAliveProtocol = exports.VpnRpcKeepAliveProtocol || (exports.VpnRpcKeepAliveProtocol = {}));\r\n/** Keep Alive settings */\r\nvar VpnRpcKeep = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcKeep' class: Keep Alive settings */\r\n function VpnRpcKeep(init) {\r\n /** The flag to enable keep-alive to the Internet */\r\n this.UseKeepConnect_bool = false;\r\n /** Specify the host name or IP address of the destination */\r\n this.KeepConnectHost_str = \"\";\r\n /** Specify the port number of the destination */\r\n this.KeepConnectPort_u32 = 0;\r\n /** Protocol type */\r\n this.KeepConnectProtocol_u32 = 0;\r\n /** Interval Between Packets Sends (Seconds) */\r\n this.KeepConnectInterval_u32 = 0;\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcKeep;\r\n}());\r\nexports.VpnRpcKeep = VpnRpcKeep;\r\n/** State of the client session */\r\nvar VpnRpcClientSessionStatus;\r\n(function (VpnRpcClientSessionStatus) {\r\n /** Connecting */\r\n VpnRpcClientSessionStatus[VpnRpcClientSessionStatus[\"Connecting\"] = 0] = \"Connecting\";\r\n /** Negotiating */\r\n VpnRpcClientSessionStatus[VpnRpcClientSessionStatus[\"Negotiation\"] = 1] = \"Negotiation\";\r\n /** During user authentication */\r\n VpnRpcClientSessionStatus[VpnRpcClientSessionStatus[\"Auth\"] = 2] = \"Auth\";\r\n /** Connection complete */\r\n VpnRpcClientSessionStatus[VpnRpcClientSessionStatus[\"Established\"] = 3] = \"Established\";\r\n /** Wait to retry */\r\n VpnRpcClientSessionStatus[VpnRpcClientSessionStatus[\"Retry\"] = 4] = \"Retry\";\r\n /** Idle state */\r\n VpnRpcClientSessionStatus[VpnRpcClientSessionStatus[\"Idle\"] = 5] = \"Idle\";\r\n})(VpnRpcClientSessionStatus = exports.VpnRpcClientSessionStatus || (exports.VpnRpcClientSessionStatus = {}));\r\n/** Get the link state */\r\nvar VpnRpcLinkStatus = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcLinkStatus' class: Get the link state */\r\n function VpnRpcLinkStatus(init) {\r\n /** The Virtual Hub name */\r\n this.HubName_Ex_str = \"\";\r\n /** The name of the cascade connection */\r\n this.AccountName_utf = \"\";\r\n /** The flag whether the cascade connection is enabled */\r\n this.Active_bool = false;\r\n /** The flag whether the cascade connection is established */\r\n this.Connected_bool = false;\r\n /** The session status */\r\n this.SessionStatus_u32 = 0;\r\n /** The destination VPN server name */\r\n this.ServerName_str = \"\";\r\n /** The port number of the server */\r\n this.ServerPort_u32 = 0;\r\n /** Server product name */\r\n this.ServerProductName_str = \"\";\r\n /** Server product version */\r\n this.ServerProductVer_u32 = 0;\r\n /** Server product build number */\r\n this.ServerProductBuild_u32 = 0;\r\n /** Server's X.509 certificate */\r\n this.ServerX_bin = new Uint8Array([]);\r\n /** Client certificate */\r\n this.ClientX_bin = new Uint8Array([]);\r\n /** Connection start time */\r\n this.StartTime_dt = new Date();\r\n /** Connection completion time of the first connection */\r\n this.FirstConnectionEstablisiedTime_dt = new Date();\r\n /** Connection completion time of this connection */\r\n this.CurrentConnectionEstablishTime_dt = new Date();\r\n /** Number of connections have been established so far */\r\n this.NumConnectionsEatablished_u32 = 0;\r\n /** Half-connection */\r\n this.HalfConnection_bool = false;\r\n /** VoIP / QoS */\r\n this.QoS_bool = false;\r\n /** Maximum number of the underlying TCP connections */\r\n this.MaxTcpConnections_u32 = 0;\r\n /** Number of current underlying TCP connections */\r\n this.NumTcpConnections_u32 = 0;\r\n /** Number of underlying inbound TCP connections */\r\n this.NumTcpConnectionsUpload_u32 = 0;\r\n /** Number of underlying outbound TCP connections */\r\n this.NumTcpConnectionsDownload_u32 = 0;\r\n /** Use of encryption */\r\n this.UseEncrypt_bool = false;\r\n /** Cipher algorithm name */\r\n this.CipherName_str = \"\";\r\n /** Use of compression */\r\n this.UseCompress_bool = false;\r\n /** The flag whether this is a R-UDP session */\r\n this.IsRUDPSession_bool = false;\r\n /** Underlying physical communication protocol */\r\n this.UnderlayProtocol_str = \"\";\r\n /** The UDP acceleration is enabled */\r\n this.IsUdpAccelerationEnabled_bool = false;\r\n /** The UDP acceleration is being actually used */\r\n this.IsUsingUdpAcceleration_bool = false;\r\n /** Session name */\r\n this.SessionName_str = \"\";\r\n /** Connection name */\r\n this.ConnectionName_str = \"\";\r\n /** Session key */\r\n this.SessionKey_bin = new Uint8Array([]);\r\n /** Total transmitted data size */\r\n this.TotalSendSize_u64 = 0;\r\n /** Total received data size */\r\n this.TotalRecvSize_u64 = 0;\r\n /** Total transmitted data size (no compression) */\r\n this.TotalSendSizeReal_u64 = 0;\r\n /** Total received data size (no compression) */\r\n this.TotalRecvSizeReal_u64 = 0;\r\n /** The flag whether the VPN session is Bridge Mode */\r\n this.IsBridgeMode_bool = false;\r\n /** The flag whether the VPN session is Monitor mode */\r\n this.IsMonitorMode_bool = false;\r\n /** VLAN ID */\r\n this.VLanId_u32 = 0;\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcLinkStatus;\r\n}());\r\nexports.VpnRpcLinkStatus = VpnRpcLinkStatus;\r\n/** Setting of SSTP and OpenVPN */\r\nvar VpnOpenVpnSstpConfig = /** @class */ (function () {\r\n /** Constructor for the 'VpnOpenVpnSstpConfig' class: Setting of SSTP and OpenVPN */\r\n function VpnOpenVpnSstpConfig(init) {\r\n /** Specify true to enable the OpenVPN Clone Server Function. Specify false to disable. */\r\n this.EnableOpenVPN_bool = false;\r\n /** Specify UDP ports to listen for OpenVPN. Multiple UDP ports can be specified with splitting by space or comma letters, for example: \"1194, 2001, 2010, 2012\". The default port for OpenVPN is UDP 1194. You can specify any other UDP ports. */\r\n this.OpenVPNPortList_str = \"\";\r\n /** pecify true to enable the Microsoft SSTP VPN Clone Server Function. Specify false to disable. */\r\n this.EnableSSTP_bool = false;\r\n Object.assign(this, init);\r\n }\r\n return VpnOpenVpnSstpConfig;\r\n}());\r\nexports.VpnOpenVpnSstpConfig = VpnOpenVpnSstpConfig;\r\n/** Virtual host option */\r\nvar VpnVhOption = /** @class */ (function () {\r\n /** Constructor for the 'VpnVhOption' class: Virtual host option */\r\n function VpnVhOption(init) {\r\n /** Target Virtual HUB name */\r\n this.RpcHubName_str = \"\";\r\n /** MAC address */\r\n this.MacAddress_bin = new Uint8Array([]);\r\n /** IP address */\r\n this.Ip_ip = \"\";\r\n /** Subnet mask */\r\n this.Mask_ip = \"\";\r\n /** Use flag of the Virtual NAT function */\r\n this.UseNat_bool = false;\r\n /** MTU value (Standard: 1500) */\r\n this.Mtu_u32 = 0;\r\n /** NAT TCP timeout in seconds */\r\n this.NatTcpTimeout_u32 = 0;\r\n /** NAT UDP timeout in seconds */\r\n this.NatUdpTimeout_u32 = 0;\r\n /** Using flag of DHCP function */\r\n this.UseDhcp_bool = false;\r\n /** Specify the start point of the address band to be distributed to the client. (Example: 192.168.30.10) */\r\n this.DhcpLeaseIPStart_ip = \"\";\r\n /** Specify the end point of the address band to be distributed to the client. (Example: 192.168.30.200) */\r\n this.DhcpLeaseIPEnd_ip = \"\";\r\n /** Specify the subnet mask to be specified for the client. (Example: 255.255.255.0) */\r\n this.DhcpSubnetMask_ip = \"\";\r\n /** Specify the expiration date in second units for leasing an IP address to a client. */\r\n this.DhcpExpireTimeSpan_u32 = 0;\r\n /** Specify the IP address of the default gateway to be notified to the client. You can specify a SecureNAT Virtual Host IP address for this when the SecureNAT Function's Virtual NAT Function has been enabled and is being used also. If you specify 0 or none, then the client will not be notified of the default gateway. */\r\n this.DhcpGatewayAddress_ip = \"\";\r\n /** Specify the IP address of the primary DNS Server to be notified to the client. You can specify a SecureNAT Virtual Host IP address for this when the SecureNAT Function's Virtual NAT Function has been enabled and is being used also. If you specify empty, then the client will not be notified of the DNS Server address. */\r\n this.DhcpDnsServerAddress_ip = \"\";\r\n /** Specify the IP address of the secondary DNS Server to be notified to the client. You can specify a SecureNAT Virtual Host IP address for this when the SecureNAT Function's Virtual NAT Function has been enabled and is being used also. If you specify empty, then the client will not be notified of the DNS Server address. */\r\n this.DhcpDnsServerAddress2_ip = \"\";\r\n /** Specify the domain name to be notified to the client. If you specify none, then the client will not be notified of the domain name. */\r\n this.DhcpDomainName_str = \"\";\r\n /** Specify whether or not to save the Virtual DHCP Server operation in the Virtual Hub security log. Specify true to save it. This value is interlinked with the Virtual NAT Function log save setting. */\r\n this.SaveLog_bool = false;\r\n /** The flag to enable the DhcpPushRoutes_str field. */\r\n this.ApplyDhcpPushRoutes_bool = false;\r\n /** Specify the static routing table to push. Example: \"192.168.5.0/255.255.255.0/192.168.4.254, 10.0.0.0/255.0.0.0/192.168.4.253\" Split multiple entries (maximum: 64 entries) by comma or space characters. Each entry must be specified in the \"IP network address/subnet mask/gateway IP address\" format. This Virtual DHCP Server can push the classless static routes (RFC 3442) with DHCP reply messages to VPN clients. Whether or not a VPN client can recognize the classless static routes (RFC 3442) depends on the target VPN client software. SoftEther VPN Client and OpenVPN Client are supporting the classless static routes. On L2TP/IPsec and MS-SSTP protocols, the compatibility depends on the implementation of the client software. You can realize the split tunneling if you clear the default gateway field on the Virtual DHCP Server options. On the client side, L2TP/IPsec and MS-SSTP clients need to be configured not to set up the default gateway for the split tunneling usage. You can also push the classless static routes (RFC 3442) by your existing external DHCP server. In that case, disable the Virtual DHCP Server function on SecureNAT, and you need not to set up the classless routes on this API. See the RFC 3442 to understand the classless routes. */\r\n this.DhcpPushRoutes_str = \"\";\r\n Object.assign(this, init);\r\n }\r\n return VpnVhOption;\r\n}());\r\nexports.VpnVhOption = VpnVhOption;\r\n/** RPC_NAT_STATUS */\r\nvar VpnRpcNatStatus = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcNatStatus' class: RPC_NAT_STATUS */\r\n function VpnRpcNatStatus(init) {\r\n /** Virtual Hub Name */\r\n this.HubName_str = \"\";\r\n /** Number of TCP sessions */\r\n this.NumTcpSessions_u32 = 0;\r\n /** Ntmber of UDP sessions */\r\n this.NumUdpSessions_u32 = 0;\r\n /** Nymber of ICMP sessions */\r\n this.NumIcmpSessions_u32 = 0;\r\n /** Number of DNS sessions */\r\n this.NumDnsSessions_u32 = 0;\r\n /** Number of DHCP clients */\r\n this.NumDhcpClients_u32 = 0;\r\n /** Whether the NAT is operating in the Kernel Mode */\r\n this.IsKernelMode_bool = false;\r\n /** Whether the NAT is operating in the Raw IP Mode */\r\n this.IsRawIpMode_bool = false;\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcNatStatus;\r\n}());\r\nexports.VpnRpcNatStatus = VpnRpcNatStatus;\r\n/** Key pair */\r\nvar VpnRpcKeyPair = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcKeyPair' class: Key pair */\r\n function VpnRpcKeyPair(init) {\r\n /** The body of the certificate */\r\n this.Cert_bin = new Uint8Array([]);\r\n /** The body of the private key */\r\n this.Key_bin = new Uint8Array([]);\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcKeyPair;\r\n}());\r\nexports.VpnRpcKeyPair = VpnRpcKeyPair;\r\n/** Single string value */\r\nvar VpnRpcStr = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcStr' class: Single string value */\r\n function VpnRpcStr(init) {\r\n /** A string value */\r\n this.String_str = \"\";\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcStr;\r\n}());\r\nexports.VpnRpcStr = VpnRpcStr;\r\n/** Type of VPN Server */\r\nvar VpnRpcServerType;\r\n(function (VpnRpcServerType) {\r\n /** Stand-alone server */\r\n VpnRpcServerType[VpnRpcServerType[\"Standalone\"] = 0] = \"Standalone\";\r\n /** Farm controller server */\r\n VpnRpcServerType[VpnRpcServerType[\"FarmController\"] = 1] = \"FarmController\";\r\n /** Farm member server */\r\n VpnRpcServerType[VpnRpcServerType[\"FarmMember\"] = 2] = \"FarmMember\";\r\n})(VpnRpcServerType = exports.VpnRpcServerType || (exports.VpnRpcServerType = {}));\r\n/** Operating system type */\r\nvar VpnRpcOsType;\r\n(function (VpnRpcOsType) {\r\n /** Windows 95 */\r\n VpnRpcOsType[VpnRpcOsType[\"WINDOWS_95\"] = 1100] = \"WINDOWS_95\";\r\n /** Windows 98 */\r\n VpnRpcOsType[VpnRpcOsType[\"WINDOWS_98\"] = 1200] = \"WINDOWS_98\";\r\n /** Windows Me */\r\n VpnRpcOsType[VpnRpcOsType[\"WINDOWS_ME\"] = 1300] = \"WINDOWS_ME\";\r\n /** Windows (unknown) */\r\n VpnRpcOsType[VpnRpcOsType[\"WINDOWS_UNKNOWN\"] = 1400] = \"WINDOWS_UNKNOWN\";\r\n /** Windows NT 4.0 Workstation */\r\n VpnRpcOsType[VpnRpcOsType[\"WINDOWS_NT_4_WORKSTATION\"] = 2100] = \"WINDOWS_NT_4_WORKSTATION\";\r\n /** Windows NT 4.0 Server */\r\n VpnRpcOsType[VpnRpcOsType[\"WINDOWS_NT_4_SERVER\"] = 2110] = \"WINDOWS_NT_4_SERVER\";\r\n /** Windows NT 4.0 Server, Enterprise Edition */\r\n VpnRpcOsType[VpnRpcOsType[\"WINDOWS_NT_4_SERVER_ENTERPRISE\"] = 2111] = \"WINDOWS_NT_4_SERVER_ENTERPRISE\";\r\n /** Windows NT 4.0 Terminal Server */\r\n VpnRpcOsType[VpnRpcOsType[\"WINDOWS_NT_4_TERMINAL_SERVER\"] = 2112] = \"WINDOWS_NT_4_TERMINAL_SERVER\";\r\n /** BackOffice Server 4.5 */\r\n VpnRpcOsType[VpnRpcOsType[\"WINDOWS_NT_4_BACKOFFICE\"] = 2113] = \"WINDOWS_NT_4_BACKOFFICE\";\r\n /** Small Business Server 4.5 */\r\n VpnRpcOsType[VpnRpcOsType[\"WINDOWS_NT_4_SMS\"] = 2114] = \"WINDOWS_NT_4_SMS\";\r\n /** Windows 2000 Professional */\r\n VpnRpcOsType[VpnRpcOsType[\"WINDOWS_2000_PROFESSIONAL\"] = 2200] = \"WINDOWS_2000_PROFESSIONAL\";\r\n /** Windows 2000 Server */\r\n VpnRpcOsType[VpnRpcOsType[\"WINDOWS_2000_SERVER\"] = 2211] = \"WINDOWS_2000_SERVER\";\r\n /** Windows 2000 Advanced Server */\r\n VpnRpcOsType[VpnRpcOsType[\"WINDOWS_2000_ADVANCED_SERVER\"] = 2212] = \"WINDOWS_2000_ADVANCED_SERVER\";\r\n /** Windows 2000 Datacenter Server */\r\n VpnRpcOsType[VpnRpcOsType[\"WINDOWS_2000_DATACENTER_SERVER\"] = 2213] = \"WINDOWS_2000_DATACENTER_SERVER\";\r\n /** BackOffice Server 2000 */\r\n VpnRpcOsType[VpnRpcOsType[\"WINDOWS_2000_BACKOFFICE\"] = 2214] = \"WINDOWS_2000_BACKOFFICE\";\r\n /** Small Business Server 2000 */\r\n VpnRpcOsType[VpnRpcOsType[\"WINDOWS_2000_SBS\"] = 2215] = \"WINDOWS_2000_SBS\";\r\n /** Windows XP Home Edition */\r\n VpnRpcOsType[VpnRpcOsType[\"WINDOWS_XP_HOME\"] = 2300] = \"WINDOWS_XP_HOME\";\r\n /** Windows XP Professional */\r\n VpnRpcOsType[VpnRpcOsType[\"WINDOWS_XP_PROFESSIONAL\"] = 2301] = \"WINDOWS_XP_PROFESSIONAL\";\r\n /** Windows Server 2003 Web Edition */\r\n VpnRpcOsType[VpnRpcOsType[\"WINDOWS_2003_WEB\"] = 2410] = \"WINDOWS_2003_WEB\";\r\n /** Windows Server 2003 Standard Edition */\r\n VpnRpcOsType[VpnRpcOsType[\"WINDOWS_2003_STANDARD\"] = 2411] = \"WINDOWS_2003_STANDARD\";\r\n /** Windows Server 2003 Enterprise Edition */\r\n VpnRpcOsType[VpnRpcOsType[\"WINDOWS_2003_ENTERPRISE\"] = 2412] = \"WINDOWS_2003_ENTERPRISE\";\r\n /** Windows Server 2003 DataCenter Edition */\r\n VpnRpcOsType[VpnRpcOsType[\"WINDOWS_2003_DATACENTER\"] = 2413] = \"WINDOWS_2003_DATACENTER\";\r\n /** BackOffice Server 2003 */\r\n VpnRpcOsType[VpnRpcOsType[\"WINDOWS_2003_BACKOFFICE\"] = 2414] = \"WINDOWS_2003_BACKOFFICE\";\r\n /** Small Business Server 2003 */\r\n VpnRpcOsType[VpnRpcOsType[\"WINDOWS_2003_SBS\"] = 2415] = \"WINDOWS_2003_SBS\";\r\n /** Windows Vista */\r\n VpnRpcOsType[VpnRpcOsType[\"WINDOWS_LONGHORN_PROFESSIONAL\"] = 2500] = \"WINDOWS_LONGHORN_PROFESSIONAL\";\r\n /** Windows Server 2008 */\r\n VpnRpcOsType[VpnRpcOsType[\"WINDOWS_LONGHORN_SERVER\"] = 2510] = \"WINDOWS_LONGHORN_SERVER\";\r\n /** Windows 7 */\r\n VpnRpcOsType[VpnRpcOsType[\"WINDOWS_7\"] = 2600] = \"WINDOWS_7\";\r\n /** Windows Server 2008 R2 */\r\n VpnRpcOsType[VpnRpcOsType[\"WINDOWS_SERVER_2008_R2\"] = 2610] = \"WINDOWS_SERVER_2008_R2\";\r\n /** Windows 8 */\r\n VpnRpcOsType[VpnRpcOsType[\"WINDOWS_8\"] = 2700] = \"WINDOWS_8\";\r\n /** Windows Server 2012 */\r\n VpnRpcOsType[VpnRpcOsType[\"WINDOWS_SERVER_8\"] = 2710] = \"WINDOWS_SERVER_8\";\r\n /** Windows 8.1 */\r\n VpnRpcOsType[VpnRpcOsType[\"WINDOWS_81\"] = 2701] = \"WINDOWS_81\";\r\n /** Windows Server 2012 R2 */\r\n VpnRpcOsType[VpnRpcOsType[\"WINDOWS_SERVER_81\"] = 2711] = \"WINDOWS_SERVER_81\";\r\n /** Windows 10 */\r\n VpnRpcOsType[VpnRpcOsType[\"WINDOWS_10\"] = 2702] = \"WINDOWS_10\";\r\n /** Windows Server 10 */\r\n VpnRpcOsType[VpnRpcOsType[\"WINDOWS_SERVER_10\"] = 2712] = \"WINDOWS_SERVER_10\";\r\n /** Windows 11 or later */\r\n VpnRpcOsType[VpnRpcOsType[\"WINDOWS_11\"] = 2800] = \"WINDOWS_11\";\r\n /** Windows Server 11 or later */\r\n VpnRpcOsType[VpnRpcOsType[\"WINDOWS_SERVER_11\"] = 2810] = \"WINDOWS_SERVER_11\";\r\n /** Unknown UNIX */\r\n VpnRpcOsType[VpnRpcOsType[\"UNIX_UNKNOWN\"] = 3000] = \"UNIX_UNKNOWN\";\r\n /** Linux */\r\n VpnRpcOsType[VpnRpcOsType[\"LINUX\"] = 3100] = \"LINUX\";\r\n /** Solaris */\r\n VpnRpcOsType[VpnRpcOsType[\"SOLARIS\"] = 3200] = \"SOLARIS\";\r\n /** Cygwin */\r\n VpnRpcOsType[VpnRpcOsType[\"CYGWIN\"] = 3300] = \"CYGWIN\";\r\n /** BSD */\r\n VpnRpcOsType[VpnRpcOsType[\"BSD\"] = 3400] = \"BSD\";\r\n /** MacOS X */\r\n VpnRpcOsType[VpnRpcOsType[\"MACOS_X\"] = 3500] = \"MACOS_X\";\r\n})(VpnRpcOsType = exports.VpnRpcOsType || (exports.VpnRpcOsType = {}));\r\n/** VPN Server Information */\r\nvar VpnRpcServerInfo = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcServerInfo' class: VPN Server Information */\r\n function VpnRpcServerInfo(init) {\r\n /** Server product name */\r\n this.ServerProductName_str = \"\";\r\n /** Server version string */\r\n this.ServerVersionString_str = \"\";\r\n /** Server build information string */\r\n this.ServerBuildInfoString_str = \"\";\r\n /** Server version integer value */\r\n this.ServerVerInt_u32 = 0;\r\n /** Server build number integer value */\r\n this.ServerBuildInt_u32 = 0;\r\n /** Server host name */\r\n this.ServerHostName_str = \"\";\r\n /** Type of server */\r\n this.ServerType_u32 = 0;\r\n /** Build date and time of the server */\r\n this.ServerBuildDate_dt = new Date();\r\n /** Family name */\r\n this.ServerFamilyName_str = \"\";\r\n /** OS type */\r\n this.OsType_u32 = 0;\r\n /** Service pack number */\r\n this.OsServicePack_u32 = 0;\r\n /** OS system name */\r\n this.OsSystemName_str = \"\";\r\n /** OS product name */\r\n this.OsProductName_str = \"\";\r\n /** OS vendor name */\r\n this.OsVendorName_str = \"\";\r\n /** OS version */\r\n this.OsVersion_str = \"\";\r\n /** Kernel name */\r\n this.KernelName_str = \"\";\r\n /** Kernel version */\r\n this.KernelVersion_str = \"\";\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcServerInfo;\r\n}());\r\nexports.VpnRpcServerInfo = VpnRpcServerInfo;\r\n/** Server status */\r\nvar VpnRpcServerStatus = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcServerStatus' class: Server status */\r\n function VpnRpcServerStatus(init) {\r\n /** Type of server */\r\n this.ServerType_u32 = 0;\r\n /** Total number of TCP connections */\r\n this.NumTcpConnections_u32 = 0;\r\n /** Number of Local TCP connections */\r\n this.NumTcpConnectionsLocal_u32 = 0;\r\n /** Number of remote TCP connections */\r\n this.NumTcpConnectionsRemote_u32 = 0;\r\n /** Total number of HUBs */\r\n this.NumHubTotal_u32 = 0;\r\n /** Nymber of stand-alone HUB */\r\n this.NumHubStandalone_u32 = 0;\r\n /** Number of static HUBs */\r\n this.NumHubStatic_u32 = 0;\r\n /** Number of Dynamic HUBs */\r\n this.NumHubDynamic_u32 = 0;\r\n /** Total number of sessions */\r\n this.NumSessionsTotal_u32 = 0;\r\n /** Number of local VPN sessions */\r\n this.NumSessionsLocal_u32 = 0;\r\n /** The number of remote sessions */\r\n this.NumSessionsRemote_u32 = 0;\r\n /** Number of MAC table entries (total sum of all Virtual Hubs) */\r\n this.NumMacTables_u32 = 0;\r\n /** Number of IP table entries (total sum of all Virtual Hubs) */\r\n this.NumIpTables_u32 = 0;\r\n /** Number of users (total sum of all Virtual Hubs) */\r\n this.NumUsers_u32 = 0;\r\n /** Number of groups (total sum of all Virtual Hubs) */\r\n this.NumGroups_u32 = 0;\r\n /** Number of assigned bridge licenses (Useful to make a commercial version) */\r\n this.AssignedBridgeLicenses_u32 = 0;\r\n /** Number of assigned client licenses (Useful to make a commercial version) */\r\n this.AssignedClientLicenses_u32 = 0;\r\n /** Number of Assigned bridge license (cluster-wide), useful to make a commercial version */\r\n this.AssignedBridgeLicensesTotal_u32 = 0;\r\n /** Number of assigned client licenses (cluster-wide), useful to make a commercial version */\r\n this.AssignedClientLicensesTotal_u32 = 0;\r\n /** Number of broadcast packets (Recv) */\r\n this[\"Recv.BroadcastBytes_u64\"] = 0;\r\n /** Broadcast bytes (Recv) */\r\n this[\"Recv.BroadcastCount_u64\"] = 0;\r\n /** Unicast count (Recv) */\r\n this[\"Recv.UnicastBytes_u64\"] = 0;\r\n /** Unicast bytes (Recv) */\r\n this[\"Recv.UnicastCount_u64\"] = 0;\r\n /** Number of broadcast packets (Send) */\r\n this[\"Send.BroadcastBytes_u64\"] = 0;\r\n /** Broadcast bytes (Send) */\r\n this[\"Send.BroadcastCount_u64\"] = 0;\r\n /** Unicast bytes (Send) */\r\n this[\"Send.UnicastBytes_u64\"] = 0;\r\n /** Unicast bytes (Send) */\r\n this[\"Send.UnicastCount_u64\"] = 0;\r\n /** Current time */\r\n this.CurrentTime_dt = new Date();\r\n /** 64 bit High-Precision Logical System Clock */\r\n this.CurrentTick_u64 = 0;\r\n /** VPN Server Start-up time */\r\n this.StartTime_dt = new Date();\r\n /** Memory information: Total Memory */\r\n this.TotalMemory_u64 = 0;\r\n /** Memory information: Used Memory */\r\n this.UsedMemory_u64 = 0;\r\n /** Memory information: Free Memory */\r\n this.FreeMemory_u64 = 0;\r\n /** Memory information: Total Phys */\r\n this.TotalPhys_u64 = 0;\r\n /** Memory information: Used Phys */\r\n this.UsedPhys_u64 = 0;\r\n /** Memory information: Free Phys */\r\n this.FreePhys_u64 = 0;\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcServerStatus;\r\n}());\r\nexports.VpnRpcServerStatus = VpnRpcServerStatus;\r\n/** VPN Session status */\r\nvar VpnRpcSessionStatus = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcSessionStatus' class: VPN Session status */\r\n function VpnRpcSessionStatus(init) {\r\n /** The Virtual Hub name */\r\n this.HubName_str = \"\";\r\n /** VPN session name */\r\n this.Name_str = \"\";\r\n /** User name */\r\n this.Username_str = \"\";\r\n /** Real user name which was used for the authentication */\r\n this.RealUsername_str = \"\";\r\n /** Group name */\r\n this.GroupName_str = \"\";\r\n /** Is Cascade Session */\r\n this.LinkMode_bool = false;\r\n /** Client IP address */\r\n this.Client_Ip_Address_ip = \"\";\r\n /** Client host name */\r\n this.SessionStatus_ClientHostName_str = \"\";\r\n /** Operation flag */\r\n this.Active_bool = false;\r\n /** Connected flag */\r\n this.Connected_bool = false;\r\n /** State of the client session */\r\n this.SessionStatus_u32 = 0;\r\n /** Server name */\r\n this.ServerName_str = \"\";\r\n /** Port number of the server */\r\n this.ServerPort_u32 = 0;\r\n /** Server product name */\r\n this.ServerProductName_str = \"\";\r\n /** Server product version */\r\n this.ServerProductVer_u32 = 0;\r\n /** Server product build number */\r\n this.ServerProductBuild_u32 = 0;\r\n /** Connection start time */\r\n this.StartTime_dt = new Date();\r\n /** Connection completion time of the first connection */\r\n this.FirstConnectionEstablisiedTime_dt = new Date();\r\n /** Connection completion time of this connection */\r\n this.CurrentConnectionEstablishTime_dt = new Date();\r\n /** Number of connections have been established so far */\r\n this.NumConnectionsEatablished_u32 = 0;\r\n /** Half-connection */\r\n this.HalfConnection_bool = false;\r\n /** VoIP / QoS */\r\n this.QoS_bool = false;\r\n /** Maximum number of the underlying TCP connections */\r\n this.MaxTcpConnections_u32 = 0;\r\n /** Number of current underlying TCP connections */\r\n this.NumTcpConnections_u32 = 0;\r\n /** Number of inbound underlying connections */\r\n this.NumTcpConnectionsUpload_u32 = 0;\r\n /** Number of outbound underlying connections */\r\n this.NumTcpConnectionsDownload_u32 = 0;\r\n /** Use of encryption */\r\n this.UseEncrypt_bool = false;\r\n /** Cipher algorithm name */\r\n this.CipherName_str = \"\";\r\n /** Use of compression */\r\n this.UseCompress_bool = false;\r\n /** Is R-UDP session */\r\n this.IsRUDPSession_bool = false;\r\n /** Physical underlying communication protocol */\r\n this.UnderlayProtocol_str = \"\";\r\n /** The UDP acceleration is enabled */\r\n this.IsUdpAccelerationEnabled_bool = false;\r\n /** Using the UDP acceleration function */\r\n this.IsUsingUdpAcceleration_bool = false;\r\n /** VPN session name */\r\n this.SessionName_str = \"\";\r\n /** Connection name */\r\n this.ConnectionName_str = \"\";\r\n /** Session key */\r\n this.SessionKey_bin = new Uint8Array([]);\r\n /** Total transmitted data size */\r\n this.TotalSendSize_u64 = 0;\r\n /** Total received data size */\r\n this.TotalRecvSize_u64 = 0;\r\n /** Total transmitted data size (no compression) */\r\n this.TotalSendSizeReal_u64 = 0;\r\n /** Total received data size (no compression) */\r\n this.TotalRecvSizeReal_u64 = 0;\r\n /** Is Bridge Mode */\r\n this.IsBridgeMode_bool = false;\r\n /** Is Monitor mode */\r\n this.IsMonitorMode_bool = false;\r\n /** VLAN ID */\r\n this.VLanId_u32 = 0;\r\n /** Client product name */\r\n this.ClientProductName_str = \"\";\r\n /** Client version */\r\n this.ClientProductVer_u32 = 0;\r\n /** Client build number */\r\n this.ClientProductBuild_u32 = 0;\r\n /** Client OS name */\r\n this.ClientOsName_str = \"\";\r\n /** Client OS version */\r\n this.ClientOsVer_str = \"\";\r\n /** Client OS Product ID */\r\n this.ClientOsProductId_str = \"\";\r\n /** Client host name */\r\n this.ClientHostname_str = \"\";\r\n /** Unique ID */\r\n this.UniqueId_bin = new Uint8Array([]);\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcSessionStatus;\r\n}());\r\nexports.VpnRpcSessionStatus = VpnRpcSessionStatus;\r\n/** Set the special listener */\r\nvar VpnRpcSpecialListener = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcSpecialListener' class: Set the special listener */\r\n function VpnRpcSpecialListener(init) {\r\n /** The flag to activate the VPN over ICMP server function */\r\n this.VpnOverIcmpListener_bool = false;\r\n /** The flag to activate the VPN over DNS function */\r\n this.VpnOverDnsListener_bool = false;\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcSpecialListener;\r\n}());\r\nexports.VpnRpcSpecialListener = VpnRpcSpecialListener;\r\n/** Syslog configuration */\r\nvar VpnSyslogSaveType;\r\n(function (VpnSyslogSaveType) {\r\n /** Do not use syslog */\r\n VpnSyslogSaveType[VpnSyslogSaveType[\"None\"] = 0] = \"None\";\r\n /** Only server log */\r\n VpnSyslogSaveType[VpnSyslogSaveType[\"ServerLog\"] = 1] = \"ServerLog\";\r\n /** Server and Virtual HUB security log */\r\n VpnSyslogSaveType[VpnSyslogSaveType[\"ServerAndHubSecurityLog\"] = 2] = \"ServerAndHubSecurityLog\";\r\n /** Server, Virtual HUB security, and packet log */\r\n VpnSyslogSaveType[VpnSyslogSaveType[\"ServerAndHubAllLog\"] = 3] = \"ServerAndHubAllLog\";\r\n})(VpnSyslogSaveType = exports.VpnSyslogSaveType || (exports.VpnSyslogSaveType = {}));\r\n/** Syslog configuration */\r\nvar VpnSyslogSetting = /** @class */ (function () {\r\n /** Constructor for the 'VpnSyslogSetting' class: Syslog configuration */\r\n function VpnSyslogSetting(init) {\r\n /** The behavior of the syslog function */\r\n this.SaveType_u32 = 0;\r\n /** Specify the host name or IP address of the syslog server */\r\n this.Hostname_str = \"\";\r\n /** Specify the port number of the syslog server */\r\n this.Port_u32 = 0;\r\n Object.assign(this, init);\r\n }\r\n return VpnSyslogSetting;\r\n}());\r\nexports.VpnSyslogSetting = VpnSyslogSetting;\r\n/** VPN Gate Server Config */\r\nvar VpnVgsConfig = /** @class */ (function () {\r\n /** Constructor for the 'VpnVgsConfig' class: VPN Gate Server Config */\r\n function VpnVgsConfig(init) {\r\n /** Active flag */\r\n this.IsEnabled_bool = false;\r\n /** Message */\r\n this.Message_utf = \"\";\r\n /** Owner name */\r\n this.Owner_utf = \"\";\r\n /** Abuse email */\r\n this.Abuse_utf = \"\";\r\n /** Log save flag */\r\n this.NoLog_bool = false;\r\n /** Save log permanently */\r\n this.LogPermanent_bool = false;\r\n /** Enable the L2TP VPN function */\r\n this.EnableL2TP_bool = false;\r\n Object.assign(this, init);\r\n }\r\n return VpnVgsConfig;\r\n}());\r\nexports.VpnVgsConfig = VpnVgsConfig;\r\n/** Read a Log file */\r\nvar VpnRpcReadLogFile = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcReadLogFile' class: Read a Log file */\r\n function VpnRpcReadLogFile(init) {\r\n /** Server name */\r\n this.ServerName_str = \"\";\r\n /** File Path */\r\n this.FilePath_str = \"\";\r\n /** Offset to download. You have to call the ReadLogFile API multiple times to download the entire log file with requesting a part of the file by specifying the Offset_u32 field. */\r\n this.Offset_u32 = 0;\r\n /** Received buffer */\r\n this.Buffer_bin = new Uint8Array([]);\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcReadLogFile;\r\n}());\r\nexports.VpnRpcReadLogFile = VpnRpcReadLogFile;\r\n/** Rename link */\r\nvar VpnRpcRenameLink = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcRenameLink' class: Rename link */\r\n function VpnRpcRenameLink(init) {\r\n /** The Virtual Hub name */\r\n this.HubName_str = \"\";\r\n /** The old name of the cascade connection */\r\n this.OldAccountName_utf = \"\";\r\n /** The new name of the cascade connection */\r\n this.NewAccountName_utf = \"\";\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcRenameLink;\r\n}());\r\nexports.VpnRpcRenameLink = VpnRpcRenameLink;\r\n/** Online or offline the HUB */\r\nvar VpnRpcSetHubOnline = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcSetHubOnline' class: Online or offline the HUB */\r\n function VpnRpcSetHubOnline(init) {\r\n /** The Virtual Hub name */\r\n this.HubName_str = \"\";\r\n /** Online / offline flag */\r\n this.Online_bool = false;\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcSetHubOnline;\r\n}());\r\nexports.VpnRpcSetHubOnline = VpnRpcSetHubOnline;\r\n/** Set Password */\r\nvar VpnRpcSetPassword = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcSetPassword' class: Set Password */\r\n function VpnRpcSetPassword(init) {\r\n /** The plaintext password */\r\n this.PlainTextPassword_str = \"\";\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcSetPassword;\r\n}());\r\nexports.VpnRpcSetPassword = VpnRpcSetPassword;\r\n// --- Utility codes ---\r\n/** JSON-RPC request class. See https://www.jsonrpc.org/specification */\r\nvar JsonRpcRequest = /** @class */ (function () {\r\n function JsonRpcRequest(method, param, id) {\r\n if (method === void 0) { method = \"\"; }\r\n if (param === void 0) { param = null; }\r\n if (id === void 0) { id = \"\"; }\r\n this.jsonrpc = \"2.0\";\r\n this.method = method;\r\n this.params = param;\r\n this.id = id;\r\n }\r\n return JsonRpcRequest;\r\n}());\r\nexports.JsonRpcRequest = JsonRpcRequest;\r\n/** JSON-RPC error class. See https://www.jsonrpc.org/specification */\r\nvar JsonRpcError = /** @class */ (function () {\r\n function JsonRpcError(code, message, data) {\r\n if (code === void 0) { code = 0; }\r\n if (message === void 0) { message = \"\"; }\r\n if (data === void 0) { data = null; }\r\n this.code = code;\r\n this.message = message;\r\n this.data = data;\r\n }\r\n return JsonRpcError;\r\n}());\r\nexports.JsonRpcError = JsonRpcError;\r\n/** JSON-RPC response class with generics */\r\nvar JsonRpcResponse = /** @class */ (function () {\r\n function JsonRpcResponse() {\r\n this.jsonrpc = \"2.0\";\r\n this.result = null;\r\n this.error = null;\r\n this.id = \"\";\r\n }\r\n return JsonRpcResponse;\r\n}());\r\nexports.JsonRpcResponse = JsonRpcResponse;\r\n/** JSON-RPC client class. See https://www.jsonrpc.org/specification */\r\nvar JsonRpcClient = /** @class */ (function () {\r\n /**\r\n * JSON-RPC client class constructor\r\n * @param url The URL\r\n * @param headers Additional HTTP headers\r\n * @param send_credential Set true to use the same credential with the browsing web site. Valid only if the code is running on the web browser.\r\n */\r\n function JsonRpcClient(url, headers, send_credential, nodejs_https_client_reject_untrusted_server_cert) {\r\n this.BaseUrl = url;\r\n this.headers = headers;\r\n this.client = new HttpClient();\r\n this.client.SendCredential = send_credential;\r\n this.client.NodeJS_HTTPS_Client_Reject_Unauthorized = nodejs_https_client_reject_untrusted_server_cert;\r\n }\r\n /** A utility function to convert any object to JSON string */\r\n JsonRpcClient.ObjectToJson = function (obj) {\r\n return JSON.stringify(obj, function (key, value) {\r\n if (key.endsWith(\"_bin\")) {\r\n return Util_Base64_Encode(value);\r\n }\r\n return value;\r\n }, 4);\r\n };\r\n /** A utility function to convert JSON string to object */\r\n JsonRpcClient.JsonToObject = function (str) {\r\n return JSON.parse(str, function (key, value) {\r\n if (key.endsWith(\"_bin\")) {\r\n return Util_Base64_Decode(value);\r\n }\r\n else if (key.endsWith(\"_dt\")) {\r\n return new Date(value);\r\n }\r\n return value;\r\n });\r\n };\r\n /**\r\n * Call a single RPC call (without error check). You can wait for the response with Promise or await statement.\r\n * @param method_name The name of RPC method\r\n * @param param The parameters\r\n */\r\n JsonRpcClient.prototype.CallInternalAsync = function (method_name, param) {\r\n return __awaiter(this, void 0, void 0, function () {\r\n var id, req, req_string, http_response, ret_string;\r\n return __generator(this, function (_a) {\r\n switch (_a.label) {\r\n case 0:\r\n id = \"1\";\r\n req = new JsonRpcRequest(method_name, param, id);\r\n req_string = JsonRpcClient.ObjectToJson(req);\r\n if (debug_mode) {\r\n console.log(\"--- RPC Request Body ---\");\r\n console.log(req_string);\r\n console.log(\"------------------------\");\r\n }\r\n return [4 /*yield*/, this.client.PostAsync(this.BaseUrl, this.headers, req_string, \"application/json\")];\r\n case 1:\r\n http_response = _a.sent();\r\n ret_string = http_response.Body;\r\n if (debug_mode) {\r\n console.log(\"--- RPC Response Body ---\");\r\n console.log(ret_string);\r\n console.log(\"-------------------------\");\r\n }\r\n return [2 /*return*/, ret_string];\r\n }\r\n });\r\n });\r\n };\r\n /**\r\n * Call a single RPC call (with error check). You can wait for the response with Promise or await statement. In the case of error, it will be thrown.\r\n * @param method_name The name of RPC method\r\n * @param param The parameters\r\n */\r\n JsonRpcClient.prototype.CallAsync = function (method_name, param) {\r\n return __awaiter(this, void 0, void 0, function () {\r\n var ret_string, ret;\r\n return __generator(this, function (_a) {\r\n switch (_a.label) {\r\n case 0: return [4 /*yield*/, this.CallInternalAsync(method_name, param)];\r\n case 1:\r\n ret_string = _a.sent();\r\n ret = JSON.parse(ret_string);\r\n if (is_null(ret.error) === false) {\r\n throw new JsonRpcException(ret.error);\r\n }\r\n return [2 /*return*/, ret.result];\r\n }\r\n });\r\n });\r\n };\r\n return JsonRpcClient;\r\n}());\r\nexports.JsonRpcClient = JsonRpcClient;\r\n/** JSON-RPC exception class */\r\nvar JsonRpcException = /** @class */ (function (_super) {\r\n __extends(JsonRpcException, _super);\r\n function JsonRpcException(error) {\r\n var _this = _super.call(this, \"Code=\" + error.code + \", Message=\" + error.message) || this;\r\n _this.Error = error;\r\n return _this;\r\n }\r\n return JsonRpcException;\r\n}(Error));\r\nexports.JsonRpcException = JsonRpcException;\r\n/** HTTP client exception class */\r\nvar HttpClientException = /** @class */ (function (_super) {\r\n __extends(HttpClientException, _super);\r\n function HttpClientException(message) {\r\n return _super.call(this, message) || this;\r\n }\r\n return HttpClientException;\r\n}(Error));\r\nexports.HttpClientException = HttpClientException;\r\n/** HTTP client response class */\r\nvar HttpClientResponse = /** @class */ (function () {\r\n function HttpClientResponse() {\r\n this.Body = \"\";\r\n }\r\n return HttpClientResponse;\r\n}());\r\nexports.HttpClientResponse = HttpClientResponse;\r\n/** An HTTP client which can be used in both web browsers and Node.js */\r\nvar HttpClient = /** @class */ (function () {\r\n function HttpClient() {\r\n this.TimeoutMsecs = 60 * 5 * 1000;\r\n this.SendCredential = true;\r\n this.NodeJS_HTTPS_Client_Reject_Unauthorized = false;\r\n }\r\n /** Post method. In web browsers this function will process the request by itself. In Node.js this function will call PostAsync_NodeJS() instead. */\r\n HttpClient.prototype.PostAsync = function (url, headers, req_body, req_media_type) {\r\n return __awaiter(this, void 0, void 0, function () {\r\n var fetch_header_list, _i, _a, name_1, fetch_init, fetch_response, ret, _b;\r\n return __generator(this, function (_c) {\r\n switch (_c.label) {\r\n case 0:\r\n if (is_node_js) {\r\n return [2 /*return*/, this.PostAsync_NodeJS(url, headers, req_body, req_media_type)];\r\n }\r\n fetch_header_list = new Headers();\r\n for (_i = 0, _a = Object.keys(headers); _i < _a.length; _i++) {\r\n name_1 = _a[_i];\r\n fetch_header_list.append(name_1, headers[name_1]);\r\n }\r\n fetch_init = {\r\n mode: \"cors\",\r\n headers: fetch_header_list,\r\n credentials: (this.SendCredential ? \"include\" : \"omit\"),\r\n method: \"POST\",\r\n cache: \"no-cache\",\r\n keepalive: true,\r\n redirect: \"follow\",\r\n body: req_body\r\n };\r\n return [4 /*yield*/, fetch(url, fetch_init)];\r\n case 1:\r\n fetch_response = _c.sent();\r\n if (fetch_response.ok === false) {\r\n throw new HttpClientException(\"HTTP Error: \" + fetch_response.status + \" \" + fetch_response.statusText);\r\n }\r\n ret = new HttpClientResponse();\r\n _b = ret;\r\n return [4 /*yield*/, fetch_response.text()];\r\n case 2:\r\n _b.Body = _c.sent();\r\n return [2 /*return*/, ret];\r\n }\r\n });\r\n });\r\n };\r\n /** Post method for Node.js. */\r\n HttpClient.prototype.PostAsync_NodeJS = function (url, headers, req_body, req_media_type) {\r\n var https = __webpack_require__(/*! https */ \"./node_modules/https-browserify/index.js\");\r\n var keepAliveAgent = new https.Agent({ keepAlive: true });\r\n var urlparse = __webpack_require__(/*! url */ \"./node_modules/url/url.js\");\r\n var urlobj = urlparse.parse(url);\r\n if (is_null(urlobj.host))\r\n throw new Error(\"URL is invalid.\");\r\n var options = {\r\n host: urlobj.hostname,\r\n port: urlobj.port,\r\n path: urlobj.path,\r\n rejectUnauthorized: this.NodeJS_HTTPS_Client_Reject_Unauthorized,\r\n method: \"POST\",\r\n timeout: this.TimeoutMsecs,\r\n agent: keepAliveAgent\r\n };\r\n return new Promise(function (resolve, reject) {\r\n var req = https.request(options, function (res) {\r\n if (res.statusCode !== 200) {\r\n reject(new HttpClientException(\"HTTP Error: \" + res.statusCode + \" \" + res.statusMessage));\r\n }\r\n var recv_str = \"\";\r\n res.on(\"data\", function (body) {\r\n recv_str += body;\r\n });\r\n res.on(\"end\", function () {\r\n var ret = new HttpClientResponse();\r\n ret.Body = recv_str;\r\n resolve(ret);\r\n });\r\n }).on(\"error\", function (err) {\r\n throw err;\r\n });\r\n for (var _i = 0, _a = Object.keys(headers); _i < _a.length; _i++) {\r\n var name_2 = _a[_i];\r\n req.setHeader(name_2, !is_null(headers[name_2]) ? headers[name_2] : \"\");\r\n }\r\n req.setHeader(\"Content-Type\", req_media_type);\r\n req.setHeader(\"Content-Length\", Buffer.byteLength(req_body));\r\n req.write(req_body);\r\n req.end();\r\n });\r\n };\r\n return HttpClient;\r\n}());\r\nexports.HttpClient = HttpClient;\r\n//////// BEGIN: Base64 encode / decode utility functions from https://github.com/beatgammit/base64-js\r\n// The MIT License(MIT)\r\n// Copyright(c) 2014\r\n// Permission is hereby granted, free of charge, to any person obtaining a copy\r\n// of this software and associated documentation files(the \"Software\"), to deal\r\n// in the Software without restriction, including without limitation the rights\r\n// to use, copy, modify, merge, publish, distribute, sublicense, and / or sell\r\n// copies of the Software, and to permit persons to whom the Software is\r\n// furnished to do so, subject to the following conditions:\r\n// The above copyright notice and this permission notice shall be included in\r\n// all copies or substantial portions of the Software.\r\n// THE SOFTWARE IS PROVIDED \"AS IS\", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR\r\n// IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,\r\n// FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.IN NO EVENT SHALL THE\r\n// AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER\r\n// LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,\r\n// OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN\r\n// THE SOFTWARE.\r\nvar lookup = [];\r\nvar revLookup = [];\r\nvar code = \"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/\";\r\nfor (var i = 0, len = code.length; i < len; ++i) {\r\n lookup[i] = code[i];\r\n revLookup[code.charCodeAt(i)] = i;\r\n}\r\n// Support decoding URL-safe base64 strings, as Node.js does.\r\n// See: https://en.wikipedia.org/wiki/Base64#URL_applications\r\nrevLookup[\"-\".charCodeAt(0)] = 62;\r\nrevLookup[\"_\".charCodeAt(0)] = 63;\r\nfunction getLens(b64) {\r\n var len = b64.length;\r\n if (len % 4 > 0) {\r\n throw new Error(\"Invalid string. Length must be a multiple of 4\");\r\n }\r\n // Trim off extra bytes after placeholder bytes are found\r\n // See: https://github.com/beatgammit/base64-js/issues/42\r\n var validLen = b64.indexOf(\"=\");\r\n if (validLen === -1)\r\n validLen = len;\r\n var placeHoldersLen = validLen === len\r\n ? 0\r\n : 4 - (validLen % 4);\r\n return [validLen, placeHoldersLen];\r\n}\r\n// base64 is 4/3 + up to two characters of the original data\r\nfunction byteLength(b64) {\r\n var lens = getLens(b64);\r\n var validLen = lens[0];\r\n var placeHoldersLen = lens[1];\r\n return ((validLen + placeHoldersLen) * 3 / 4) - placeHoldersLen;\r\n}\r\nfunction _byteLength(b64, validLen, placeHoldersLen) {\r\n return ((validLen + placeHoldersLen) * 3 / 4) - placeHoldersLen;\r\n}\r\nfunction Util_Base64_Decode(b64) {\r\n var tmp;\r\n var lens = getLens(b64);\r\n var validLen = lens[0];\r\n var placeHoldersLen = lens[1];\r\n var arr = new Uint8Array(_byteLength(b64, validLen, placeHoldersLen));\r\n var curByte = 0;\r\n // if there are placeholders, only get up to the last complete 4 chars\r\n var len = placeHoldersLen > 0\r\n ? validLen - 4\r\n : validLen;\r\n for (var i = 0; i < len; i += 4) {\r\n tmp =\r\n (revLookup[b64.charCodeAt(i)] << 18) |\r\n (revLookup[b64.charCodeAt(i + 1)] << 12) |\r\n (revLookup[b64.charCodeAt(i + 2)] << 6) |\r\n revLookup[b64.charCodeAt(i + 3)];\r\n arr[curByte++] = (tmp >> 16) & 0xFF;\r\n arr[curByte++] = (tmp >> 8) & 0xFF;\r\n arr[curByte++] = tmp & 0xFF;\r\n }\r\n if (placeHoldersLen === 2) {\r\n tmp =\r\n (revLookup[b64.charCodeAt(i)] << 2) |\r\n (revLookup[b64.charCodeAt(i + 1)] >> 4);\r\n arr[curByte++] = tmp & 0xFF;\r\n }\r\n if (placeHoldersLen === 1) {\r\n tmp =\r\n (revLookup[b64.charCodeAt(i)] << 10) |\r\n (revLookup[b64.charCodeAt(i + 1)] << 4) |\r\n (revLookup[b64.charCodeAt(i + 2)] >> 2);\r\n arr[curByte++] = (tmp >> 8) & 0xFF;\r\n arr[curByte++] = tmp & 0xFF;\r\n }\r\n return arr;\r\n}\r\nexports.Util_Base64_Decode = Util_Base64_Decode;\r\nfunction tripletToBase64(num) {\r\n return lookup[num >> 18 & 0x3F] +\r\n lookup[num >> 12 & 0x3F] +\r\n lookup[num >> 6 & 0x3F] +\r\n lookup[num & 0x3F];\r\n}\r\nfunction encodeChunk(uint8, start, end) {\r\n var tmp;\r\n var output = [];\r\n for (var i = start; i < end; i += 3) {\r\n tmp =\r\n ((uint8[i] << 16) & 0xFF0000) +\r\n ((uint8[i + 1] << 8) & 0xFF00) +\r\n (uint8[i + 2] & 0xFF);\r\n output.push(tripletToBase64(tmp));\r\n }\r\n return output.join(\"\");\r\n}\r\nfunction Util_Base64_Encode(uint8) {\r\n var tmp;\r\n var len = uint8.length;\r\n var extraBytes = len % 3; // if we have 1 byte left, pad 2 bytes\r\n var parts = [];\r\n var maxChunkLength = 16383; // must be multiple of 3\r\n // go through the array every three bytes, we'll deal with trailing stuff later\r\n for (var i = 0, len2 = len - extraBytes; i < len2; i += maxChunkLength) {\r\n parts.push(encodeChunk(uint8, i, (i + maxChunkLength) > len2 ? len2 : (i + maxChunkLength)));\r\n }\r\n // pad the end with zeros, but make sure to not forget the extra bytes\r\n if (extraBytes === 1) {\r\n tmp = uint8[len - 1];\r\n parts.push(lookup[tmp >> 2] +\r\n lookup[(tmp << 4) & 0x3F] +\r\n \"==\");\r\n }\r\n else if (extraBytes === 2) {\r\n tmp = (uint8[len - 2] << 8) + uint8[len - 1];\r\n parts.push(lookup[tmp >> 10] +\r\n lookup[(tmp >> 4) & 0x3F] +\r\n lookup[(tmp << 2) & 0x3F] +\r\n \"=\");\r\n }\r\n return parts.join(\"\");\r\n}\r\nexports.Util_Base64_Encode = Util_Base64_Encode;\r\n//////// END: Base64 encode / decode utility functions from https://github.com/beatgammit/base64-js\r\n//# sourceMappingURL=vpnrpc.js.map\n/* WEBPACK VAR INJECTION */}.call(this, __webpack_require__(/*! ./../../buffer/index.js */ \"./node_modules/buffer/index.js\").Buffer))//# sourceURL=[module]\n//# sourceMappingURL=data:application/json;charset=utf-8;base64,{"version":3,"file":"./node_modules/vpnrpc/dist/vpnrpc.js.js","sources":["webpack://JS/./node_modules/vpnrpc/dist/vpnrpc.js?46ef"],"sourcesContent":["\"use strict\";\r\n// SoftEther VPN Server JSON-RPC Stub code for TypeScript\r\n// \r\n// vpnrpc.ts\r\n// Automatically generated at 2019-05-29 18:21:39 by vpnserver-jsonrpc-codegen\r\n//\r\n// Licensed under the Apache License 2.0\r\n// Copyright (c) 2014-2019 SoftEther VPN Project\r\nvar __extends = (this && this.__extends) || (function () {\r\n    var extendStatics = function (d, b) {\r\n        extendStatics = Object.setPrototypeOf ||\r\n            ({ __proto__: [] } instanceof Array && function (d, b) { d.__proto__ = b; }) ||\r\n            function (d, b) { for (var p in b) if (b.hasOwnProperty(p)) d[p] = b[p]; };\r\n        return extendStatics(d, b);\r\n    };\r\n    return function (d, b) {\r\n        extendStatics(d, b);\r\n        function __() { this.constructor = d; }\r\n        d.prototype = b === null ? Object.create(b) : (__.prototype = b.prototype, new __());\r\n    };\r\n})();\r\nvar __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) {\r\n    return new (P || (P = Promise))(function (resolve, reject) {\r\n        function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } }\r\n        function rejected(value) { try { step(generator[\"throw\"](value)); } catch (e) { reject(e); } }\r\n        function step(result) { result.done ? resolve(result.value) : new P(function (resolve) { resolve(result.value); }).then(fulfilled, rejected); }\r\n        step((generator = generator.apply(thisArg, _arguments || [])).next());\r\n    });\r\n};\r\nvar __generator = (this && this.__generator) || function (thisArg, body) {\r\n    var _ = { label: 0, sent: function() { if (t[0] & 1) throw t[1]; return t[1]; }, trys: [], ops: [] }, f, y, t, g;\r\n    return g = { next: verb(0), \"throw\": verb(1), \"return\": verb(2) }, typeof Symbol === \"function\" && (g[Symbol.iterator] = function() { return this; }), g;\r\n    function verb(n) { return function (v) { return step([n, v]); }; }\r\n    function step(op) {\r\n        if (f) throw new TypeError(\"Generator is already executing.\");\r\n        while (_) try {\r\n            if (f = 1, y && (t = op[0] & 2 ? y[\"return\"] : op[0] ? y[\"throw\"] || ((t = y[\"return\"]) && t.call(y), 0) : y.next) && !(t = t.call(y, op[1])).done) return t;\r\n            if (y = 0, t) op = [op[0] & 2, t.value];\r\n            switch (op[0]) {\r\n                case 0: case 1: t = op; break;\r\n                case 4: _.label++; return { value: op[1], done: false };\r\n                case 5: _.label++; y = op[1]; op = [0]; continue;\r\n                case 7: op = _.ops.pop(); _.trys.pop(); continue;\r\n                default:\r\n                    if (!(t = _.trys, t = t.length > 0 && t[t.length - 1]) && (op[0] === 6 || op[0] === 2)) { _ = 0; continue; }\r\n                    if (op[0] === 3 && (!t || (op[1] > t[0] && op[1] < t[3]))) { _.label = op[1]; break; }\r\n                    if (op[0] === 6 && _.label < t[1]) { _.label = t[1]; t = op; break; }\r\n                    if (t && _.label < t[2]) { _.label = t[2]; _.ops.push(op); break; }\r\n                    if (t[2]) _.ops.pop();\r\n                    _.trys.pop(); continue;\r\n            }\r\n            op = body.call(thisArg, _);\r\n        } catch (e) { op = [6, e]; y = 0; } finally { f = t = 0; }\r\n        if (op[0] & 5) throw op[1]; return { value: op[0] ? op[1] : void 0, done: true };\r\n    }\r\n};\r\nexports.__esModule = true;\r\n// Trivial utility codes\r\nvar is_node_js = (typeof navigator === \"undefined\") || navigator.userAgent.indexOf(\"Node.js\") !== -1 || navigator.userAgent.indexOf(\"jsdom\") !== -1;\r\nfunction is_null(obj) {\r\n    return (typeof obj === \"undefined\") || (obj === null);\r\n}\r\nvar debug_mode = false;\r\n/** VPN Server RPC Stubs */\r\nvar VpnServerRpc = /** @class */ (function () {\r\n    /**\r\n     * Constructor of the VpnServerRpc class\r\n     * @param vpnserver_hostname The hostname or IP address of the destination VPN Server. In the web browser you can specify null if you want to connect to the server itself.\r\n     * @param vpnserver_port The port number of the destination VPN Server. In the web browser you can specify null if you want to connect to the server itself.\r\n     * @param hubname The name of the Virtual Hub if you want to connect to the VPN Server as a Virtual Hub Admin Mode. Specify null if you want to connect to the VPN Server as the Entire VPN Server Admin Mode.\r\n     * @param password Specify the administration password. This value is valid only if vpnserver_hostname is sepcified.\r\n     * @param nodejs_https_client_reject_untrusted_server_cert In Node.js set this true to check the SSL server certificate on the destination VPN Server. Set this false to ignore the SSL server certification.\r\n     */\r\n    function VpnServerRpc(vpnserver_hostname, vpnserver_port, hubname, password, nodejs_https_client_reject_untrusted_server_cert) {\r\n        var _this = this;\r\n        // --- Stubs ---\r\n        /** Test RPC function. Input any integer value to the IntValue_u32 field. Then the server will convert the integer to the string, and return the string in the StrValue_str field. */\r\n        this.Test = function (in_param) {\r\n            return _this.CallAsync(\"Test\", in_param);\r\n        };\r\n        /** Get server information. This allows you to obtain the server information of the currently connected VPN Server or VPN Bridge. Included in the server information are the version number, build number and build information. You can also obtain information on the current server operation mode and the information of operating system that the server is operating on. */\r\n        this.GetServerInfo = function () {\r\n            return _this.CallAsync(\"GetServerInfo\", new VpnRpcServerInfo());\r\n        };\r\n        /** Get Current Server Status. This allows you to obtain in real-time the current status of the currently connected VPN Server or VPN Bridge. You can get statistical information on data communication and the number of different kinds of objects that exist on the server. You can get information on how much memory is being used on the current computer by the OS. */\r\n        this.GetServerStatus = function () {\r\n            return _this.CallAsync(\"GetServerStatus\", new VpnRpcServerStatus());\r\n        };\r\n        /** Create New TCP Listener. This allows you to create a new TCP Listener on the server. By creating the TCP Listener the server starts listening for a connection from clients at the specified TCP/IP port number. A TCP Listener that has been created can be deleted by the DeleteListener API. You can also get a list of TCP Listeners currently registered by using the EnumListener API. To execute this API, you must have VPN Server administrator privileges. */\r\n        this.CreateListener = function (in_param) {\r\n            return _this.CallAsync(\"CreateListener\", in_param);\r\n        };\r\n        /** Get List of TCP Listeners. This allows you to get a list of TCP listeners registered on the current server. You can obtain information on whether the various TCP listeners have a status of operating or error. To call this API, you must have VPN Server administrator privileges. */\r\n        this.EnumListener = function () {\r\n            return _this.CallAsync(\"EnumListener\", new VpnRpcListenerList());\r\n        };\r\n        /** Delete TCP Listener. This allows you to delete a TCP Listener that's registered on the server. When the TCP Listener is in a state of operation, the listener will automatically be deleted when its operation stops. You can also get a list of TCP Listeners currently registered by using the EnumListener API. To call this API, you must have VPN Server administrator privileges. */\r\n        this.DeleteListener = function (in_param) {\r\n            return _this.CallAsync(\"DeleteListener\", in_param);\r\n        };\r\n        /** Enable / Disable TCP Listener. This starts or stops the operation of TCP Listeners registered on the current server. You can also get a list of TCP Listeners currently registered by using the EnumListener API. To call this API, you must have VPN Server administrator privileges. */\r\n        this.EnableListener = function (in_param) {\r\n            return _this.CallAsync(\"EnableListener\", in_param);\r\n        };\r\n        /** Set VPN Server Administrator Password. This sets the VPN Server administrator password. You can specify the password as a parameter. To call this API, you must have VPN Server administrator privileges. */\r\n        this.SetServerPassword = function (in_param) {\r\n            return _this.CallAsync(\"SetServerPassword\", in_param);\r\n        };\r\n        /** Set the VPN Server clustering configuration. Use this to set the VPN Server type as Standalone Server, Cluster Controller Server or Cluster Member Server. Standalone server means a VPN Server that does not belong to any cluster in its current state. When VPN Server is installed, by default it will be in standalone server mode. Unless you have particular plans to configure a cluster, we recommend the VPN Server be operated in standalone mode. A cluster controller is the central computer of all member servers of a cluster in the case where a clustering environment is made up of multiple VPN Servers. Multiple cluster members can be added to the cluster as required. A cluster requires one computer to serve this role. The other cluster member servers that are configured in the same cluster begin operation as a cluster member by connecting to the cluster controller. To call this API, you must have VPN Server administrator privileges. Also, when this API is executed, VPN Server will automatically restart. This API cannot be called on VPN Bridge. */\r\n        this.SetFarmSetting = function (in_param) {\r\n            return _this.CallAsync(\"SetFarmSetting\", in_param);\r\n        };\r\n        /** Get Clustering Configuration of Current VPN Server. You can use this to acquire the clustering configuration of the current VPN Server. To call this API, you must have VPN Server administrator privileges. */\r\n        this.GetFarmSetting = function () {\r\n            return _this.CallAsync(\"GetFarmSetting\", new VpnRpcFarm());\r\n        };\r\n        /** Get Cluster Member Information. When the VPN Server is operating as a cluster controller, you can get information on cluster member servers on that cluster by specifying the IDs of the member servers. You can get the following information about the specified cluster member server: Server Type, Time Connection has been Established, IP Address, Host Name, Points, Public Port List, Number of Operating Virtual Hubs, First Virtual Hub, Number of Sessions and Number of TCP Connections. This API cannot be invoked on VPN Bridge. */\r\n        this.GetFarmInfo = function (in_param) {\r\n            return _this.CallAsync(\"GetFarmInfo\", in_param);\r\n        };\r\n        /** Get List of Cluster Members. Use this API when the VPN Server is operating as a cluster controller to get a list of the cluster member servers on the same cluster, including the cluster controller itself. For each member, the following information is also listed: Type, Connection Start, Host Name, Points, Number of Session, Number of TCP Connections, Number of Operating Virtual Hubs, Using Client Connection License and Using Bridge Connection License. This API cannot be invoked on VPN Bridge. */\r\n        this.EnumFarmMember = function () {\r\n            return _this.CallAsync(\"EnumFarmMember\", new VpnRpcEnumFarm());\r\n        };\r\n        /** Get Connection Status to Cluster Controller. Use this API when the VPN Server is operating as a cluster controller to get the status of connection to the cluster controller. You can get the following information: Controller IP Address, Port Number, Connection Status, Connection Start Time, First Connection Established Time, Current Connection Established Time, Number of Connection Attempts, Number of Successful Connections, Number of Failed Connections. This API cannot be invoked on VPN Bridge. */\r\n        this.GetFarmConnectionStatus = function () {\r\n            return _this.CallAsync(\"GetFarmConnectionStatus\", new VpnRpcFarmConnectionStatus());\r\n        };\r\n        /** Set SSL Certificate and Private Key of VPN Server. You can set the SSL certificate that the VPN Server provides to the connected client and the private key for that certificate. The certificate must be in X.509 format and the private key must be Base 64 encoded format. To call this API, you must have VPN Server administrator privileges. */\r\n        this.SetServerCert = function (in_param) {\r\n            return _this.CallAsync(\"SetServerCert\", in_param);\r\n        };\r\n        /** Get SSL Certificate and Private Key of VPN Server. Use this to get the SSL certificate private key that the VPN Server provides to the connected client. To call this API, you must have VPN Server administrator privileges. */\r\n        this.GetServerCert = function () {\r\n            return _this.CallAsync(\"GetServerCert\", new VpnRpcKeyPair());\r\n        };\r\n        /** Get the Encrypted Algorithm Used for VPN Communication. Use this API to get the current setting of the algorithm used for the electronic signature and encrypted for SSL connection to be used for communication between the VPN Server and the connected client and the list of algorithms that can be used on the VPN Server. */\r\n        this.GetServerCipher = function () {\r\n            return _this.CallAsync(\"GetServerCipher\", new VpnRpcStr());\r\n        };\r\n        /** Set the Encrypted Algorithm Used for VPN Communication. Use this API to set the algorithm used for the electronic signature and encrypted for SSL connections to be used for communication between the VPN Server and the connected client. By specifying the algorithm name, the specified algorithm will be used later between the VPN Client and VPN Bridge connected to this server and the data will be encrypted. To call this API, you must have VPN Server administrator privileges. */\r\n        this.SetServerCipher = function (in_param) {\r\n            return _this.CallAsync(\"SetServerCipher\", in_param);\r\n        };\r\n        /** Create New Virtual Hub. Use this to create a new Virtual Hub on the VPN Server. The created Virtual Hub will begin operation immediately. When the VPN Server is operating on a cluster, this API is only valid for the cluster controller. Also, the new Virtual Hub will operate as a dynamic Virtual Hub. You can change it to a static Virtual Hub by using the SetHub API. To get a list of Virtual Hubs that are already on the VPN Server, use the EnumHub API. To call this API, you must have VPN Server administrator privileges. Also, this API does not operate on VPN Servers that are operating as a VPN Bridge or cluster member. */\r\n        this.CreateHub = function (in_param) {\r\n            return _this.CallAsync(\"CreateHub\", in_param);\r\n        };\r\n        /** Set the Virtual Hub configuration. You can call this API to change the configuration of the specified Virtual Hub. You can set the Virtual Hub online or offline. You can set the maximum number of sessions that can be concurrently connected to the Virtual Hub that is currently being managed. You can set the Virtual Hub administrator password. You can set other parameters for the Virtual Hub. Before call this API, you need to obtain the latest state of the Virtual Hub by using the GetHub API. */\r\n        this.SetHub = function (in_param) {\r\n            return _this.CallAsync(\"SetHub\", in_param);\r\n        };\r\n        /** Get the Virtual Hub configuration. You can call this API to get the current configuration of the specified Virtual Hub. To change the configuration of the Virtual Hub, call the SetHub API. */\r\n        this.GetHub = function (in_param) {\r\n            return _this.CallAsync(\"GetHub\", in_param);\r\n        };\r\n        /** Get List of Virtual Hubs. Use this to get a list of existing Virtual Hubs on the VPN Server. For each Virtual Hub, you can get the following information: Virtual Hub Name, Status, Type, Number of Users, Number of Groups, Number of Sessions, Number of MAC Tables, Number of IP Tables, Number of Logins, Last Login, and Last Communication. Note that when connecting in Virtual Hub Admin Mode, if in the options of a Virtual Hub that you do not have administrator privileges for, the option Don't Enumerate this Virtual Hub for Anonymous Users is enabled then that Virtual Hub will not be enumerated. If you are connected in Server Admin Mode, then the list of all Virtual Hubs will be displayed. When connecting to and managing a non-cluster-controller cluster member of a clustering environment, only the Virtual Hub currently being hosted by that VPN Server will be displayed. When connecting to a cluster controller for administration purposes, all the Virtual Hubs will be displayed. */\r\n        this.EnumHub = function () {\r\n            return _this.CallAsync(\"EnumHub\", new VpnRpcEnumHub());\r\n        };\r\n        /** Delete Virtual Hub. Use this to delete an existing Virtual Hub on the VPN Server. If you delete the Virtual Hub, all sessions that are currently connected to the Virtual Hub will be disconnected and new sessions will be unable to connect to the Virtual Hub. Also, this will also delete all the Hub settings, user objects, group objects, certificates and Cascade Connections. Once you delete the Virtual Hub, it cannot be recovered. To call this API, you must have VPN Server administrator privileges. Also, this API does not operate on VPN Servers that are operating as a VPN Bridge or cluster member. */\r\n        this.DeleteHub = function (in_param) {\r\n            return _this.CallAsync(\"DeleteHub\", in_param);\r\n        };\r\n        /** Get Setting of RADIUS Server Used for User Authentication. Use this to get the current settings for the RADIUS server used when a user connects to the currently managed Virtual Hub using RADIUS Server Authentication Mode. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n        this.GetHubRadius = function (in_param) {\r\n            return _this.CallAsync(\"GetHubRadius\", in_param);\r\n        };\r\n        /** Set RADIUS Server to use for User Authentication. To accept users to the currently managed Virtual Hub in RADIUS server authentication mode, you can specify an external RADIUS server that confirms the user name and password. (You can specify multiple hostname by splitting with comma or semicolon.) The RADIUS server must be set to receive requests from IP addresses of this VPN Server. Also, authentication by Password Authentication Protocol (PAP) must be enabled. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n        this.SetHubRadius = function (in_param) {\r\n            return _this.CallAsync(\"SetHubRadius\", in_param);\r\n        };\r\n        /** Get List of TCP Connections Connecting to the VPN Server. Use this to get a list of TCP/IP connections that are currently connecting to the VPN Server. It does not display the TCP connections that have been established as VPN sessions. To get the list of TCP/IP connections that have been established as VPN sessions, you can use the EnumSession API. You can get the following: Connection Name, Connection Source, Connection Start and Type. To call this API, you must have VPN Server administrator privileges. */\r\n        this.EnumConnection = function () {\r\n            return _this.CallAsync(\"EnumConnection\", new VpnRpcEnumConnection());\r\n        };\r\n        /** Disconnect TCP Connections Connecting to the VPN Server. Use this to forcefully disconnect specific TCP/IP connections that are connecting to the VPN Server. To call this API, you must have VPN Server administrator privileges. */\r\n        this.DisconnectConnection = function (in_param) {\r\n            return _this.CallAsync(\"DisconnectConnection\", in_param);\r\n        };\r\n        /** Get Information of TCP Connections Connecting to the VPN Server. Use this to get detailed information of a specific TCP/IP connection that is connecting to the VPN Server. You can get the following information: Connection Name, Connection Type, Source Hostname, Source IP Address, Source Port Number (TCP), Connection Start, Server Product Name, Server Version, Server Build Number, Client Product Name, Client Version, and Client Build Number. To call this API, you must have VPN Server administrator privileges. */\r\n        this.GetConnectionInfo = function (in_param) {\r\n            return _this.CallAsync(\"GetConnectionInfo\", in_param);\r\n        };\r\n        /** Switch Virtual Hub to Online or Offline. Use this to set the Virtual Hub to online or offline. A Virtual Hub with an offline status cannot receive VPN connections from clients. When you set the Virtual Hub offline, all sessions will be disconnected. A Virtual Hub with an offline status cannot receive VPN connections from clients. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n        this.SetHubOnline = function (in_param) {\r\n            return _this.CallAsync(\"SetHubOnline\", in_param);\r\n        };\r\n        /** Get Current Status of Virtual Hub. Use this to get the current status of the Virtual Hub currently being managed. You can get the following information: Virtual Hub Type, Number of Sessions, Number of Each Type of Object, Number of Logins, Last Login, Last Communication, and Communication Statistical Data. */\r\n        this.GetHubStatus = function (in_param) {\r\n            return _this.CallAsync(\"GetHubStatus\", in_param);\r\n        };\r\n        /** Set the logging configuration of the Virtual Hub. Use this to enable or disable a security log or packet logs of the Virtual Hub currently being managed, set the save contents of the packet log for each type of packet to be saved, and set the log file switch cycle for the security log or packet log that the currently managed Virtual Hub saves. There are the following packet types: TCP Connection Log, TCP Packet Log, DHCP Packet Log, UDP Packet Log, ICMP Packet Log, IP Packet Log, ARP Packet Log, and Ethernet Packet Log. To get the current setting, you can use the LogGet API. The log file switch cycle can be changed to switch in every second, every minute, every hour, every day, every month or not switch. To get the current setting, you can use the GetHubLog API. */\r\n        this.SetHubLog = function (in_param) {\r\n            return _this.CallAsync(\"SetHubLog\", in_param);\r\n        };\r\n        /** Get the logging configuration of the Virtual Hub. Use this to get the configuration for a security log or packet logs of the Virtual Hub currently being managed, get the setting for save contents of the packet log for each type of packet to be saved, and get the log file switch cycle for the security log or packet log that the currently managed Virtual Hub saves. To set the current setting, you can use the SetHubLog API. */\r\n        this.GetHubLog = function (in_param) {\r\n            return _this.CallAsync(\"GetHubLog\", in_param);\r\n        };\r\n        /** Add Trusted CA Certificate. Use this to add a new certificate to a list of CA certificates trusted by the currently managed Virtual Hub. The list of certificate authority certificates that are registered is used to verify certificates when a VPN Client is connected in signed certificate authentication mode. To get a list of the current certificates you can use the EnumCa API. The certificate you add must be saved in the X.509 file format. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a member server on a cluster. */\r\n        this.AddCa = function (in_param) {\r\n            return _this.CallAsync(\"AddCa\", in_param);\r\n        };\r\n        /** Get List of Trusted CA Certificates. Here you can manage the certificate authority certificates that are trusted by this currently managed Virtual Hub. The list of certificate authority certificates that are registered is used to verify certificates when a VPN Client is connected in signed certificate authentication mode. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a member server on a cluster. */\r\n        this.EnumCa = function (in_param) {\r\n            return _this.CallAsync(\"EnumCa\", in_param);\r\n        };\r\n        /** Get Trusted CA Certificate. Use this to get an existing certificate from the list of CA certificates trusted by the currently managed Virtual Hub and save it as a file in X.509 format. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a member server on a cluster. */\r\n        this.GetCa = function (in_param) {\r\n            return _this.CallAsync(\"GetCa\", in_param);\r\n        };\r\n        /** Delete Trusted CA Certificate. Use this to delete an existing certificate from the list of CA certificates trusted by the currently managed Virtual Hub. To get a list of the current certificates you can use the EnumCa API. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a member server on a cluster. */\r\n        this.DeleteCa = function (in_param) {\r\n            return _this.CallAsync(\"DeleteCa\", in_param);\r\n        };\r\n        /** Create New Cascade Connection. Use this to create a new Cascade Connection on the currently managed Virtual Hub. By using a Cascade Connection, you can connect this Virtual Hub by Cascade Connection to another Virtual Hub that is operating on the same or a different computer. To create a Cascade Connection, you must specify the name of the Cascade Connection, destination server and destination Virtual Hub and user name. When a new Cascade Connection is created, the type of user authentication is initially set as Anonymous Authentication and the proxy server setting and the verification options of the server certificate is not set. To change these settings and other advanced settings after a Cascade Connection has been created, use the other APIs that include the name \"Link\". [Warning About Cascade Connections] By connecting using a Cascade Connection you can create a Layer 2 bridge between multiple Virtual Hubs but if the connection is incorrectly configured, a loopback Cascade Connection could inadvertently be created. When using a Cascade Connection function please design the network topology with care. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n        this.CreateLink = function (in_param) {\r\n            return _this.CallAsync(\"CreateLink\", in_param);\r\n        };\r\n        /** Get the Cascade Connection Setting. Use this to get the Connection Setting of a Cascade Connection that is registered on the currently managed Virtual Hub. To change the Connection Setting contents of the Cascade Connection, use the APIs that include the name \"Link\" after creating the Cascade Connection. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n        this.GetLink = function (in_param) {\r\n            return _this.CallAsync(\"GetLink\", in_param);\r\n        };\r\n        /** Change Existing Cascade Connection. Use this to alter the setting of an existing Cascade Connection on the currently managed Virtual Hub. */\r\n        this.SetLink = function (in_param) {\r\n            return _this.CallAsync(\"SetLink\", in_param);\r\n        };\r\n        /** Get List of Cascade Connections. Use this to get a list of Cascade Connections that are registered on the currently managed Virtual Hub. By using a Cascade Connection, you can connect this Virtual Hub by Layer 2 Cascade Connection to another Virtual Hub that is operating on the same or a different computer. [Warning About Cascade Connections] By connecting using a Cascade Connection you can create a Layer 2 bridge between multiple Virtual Hubs but if the connection is incorrectly configured, a loopback Cascade Connection could inadvertently be created. When using a Cascade Connection function please design the network topology with care. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n        this.EnumLink = function (in_param) {\r\n            return _this.CallAsync(\"EnumLink\", in_param);\r\n        };\r\n        /** Switch Cascade Connection to Online Status. When a Cascade Connection registered on the currently managed Virtual Hub is specified, use this to switch that Cascade Connection to online status. The Cascade Connection that is switched to online status begins the process of connecting to the destination VPN Server in accordance with the Connection Setting. The Cascade Connection that is switched to online status will establish normal connection to the VPN Server or continue to attempt connection until it is switched to offline status. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n        this.SetLinkOnline = function (in_param) {\r\n            return _this.CallAsync(\"SetLinkOnline\", in_param);\r\n        };\r\n        /** Switch Cascade Connection to Offline Status. When a Cascade Connection registered on the currently managed Virtual Hub is specified, use this to switch that Cascade Connection to offline status. The Cascade Connection that is switched to offline will not connect to the VPN Server until next time it is switched to the online status using the SetLinkOnline API You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n        this.SetLinkOffline = function (in_param) {\r\n            return _this.CallAsync(\"SetLinkOffline\", in_param);\r\n        };\r\n        /** Delete Cascade Connection Setting. Use this to delete a Cascade Connection that is registered on the currently managed Virtual Hub. If the specified Cascade Connection has a status of online, the connections will be automatically disconnected and then the Cascade Connection will be deleted. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n        this.DeleteLink = function (in_param) {\r\n            return _this.CallAsync(\"DeleteLink\", in_param);\r\n        };\r\n        /** Change Name of Cascade Connection. When a Cascade Connection registered on the currently managed Virtual Hub is specified, use this to change the name of that Cascade Connection. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n        this.RenameLink = function (in_param) {\r\n            return _this.CallAsync(\"RenameLink\", in_param);\r\n        };\r\n        /** Get Current Cascade Connection Status. When a Cascade Connection registered on the currently managed Virtual Hub is specified and that Cascade Connection is currently online, use this to get its connection status and other information. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n        this.GetLinkStatus = function (in_param) {\r\n            return _this.CallAsync(\"GetLinkStatus\", in_param);\r\n        };\r\n        /** Add Access List Rule. Use this to add a new rule to the access list of the currently managed Virtual Hub. The access list is a set of packet file rules that are applied to packets that flow through the Virtual Hub. You can register multiple rules in an access list and you can also define an priority for each rule. All packets are checked for the conditions specified by the rules registered in the access list and based on the operation that is stipulated by the first matching rule, they either pass or are discarded. Packets that do not match any rule are implicitly allowed to pass. You can also use the access list to generate delays, jitters and packet losses. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a member server on a cluster. */\r\n        this.AddAccess = function (in_param) {\r\n            return _this.CallAsync(\"AddAccess\", in_param);\r\n        };\r\n        /** Delete Rule from Access List. Use this to specify a packet filter rule registered on the access list of the currently managed Virtual Hub and delete it. To delete a rule, you must specify that rule's ID. You can display the ID by using the EnumAccess API. If you wish not to delete the rule but to only temporarily disable it, use the SetAccessList API to set the rule status to disable. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a member server on a cluster. */\r\n        this.DeleteAccess = function (in_param) {\r\n            return _this.CallAsync(\"DeleteAccess\", in_param);\r\n        };\r\n        /** Get Access List Rule List. Use this to get a list of packet filter rules that are registered on access list of the currently managed Virtual Hub. The access list is a set of packet file rules that are applied to packets that flow through the Virtual Hub. You can register multiple rules in an access list and you can also define a priority for each rule. All packets are checked for the conditions specified by the rules registered in the access list and based on the operation that is stipulated by the first matching rule, they either pass or are discarded. Packets that do not match any rule are implicitly allowed to pass. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a member server on a cluster. */\r\n        this.EnumAccess = function (in_param) {\r\n            return _this.CallAsync(\"EnumAccess\", in_param);\r\n        };\r\n        /** Replace all access lists on a single bulk API call. This API removes all existing access list rules on the Virtual Hub, and replace them by new access list rules specified by the parameter. */\r\n        this.SetAccessList = function (in_param) {\r\n            return _this.CallAsync(\"SetAccessList\", in_param);\r\n        };\r\n        /** Create a user. Use this to create a new user in the security account database of the currently managed Virtual Hub. By creating a user, the VPN Client can connect to the Virtual Hub by using the authentication information of that user. Note that a user whose user name has been created as \"*\" (a single asterisk character) will automatically be registered as a RADIUS authentication user. For cases where there are users with \"*\" as the name, when a user, whose user name that has been provided when a client connected to a VPN Server does not match existing user names, is able to be authenticated by a RADIUS server or NT domain controller by inputting a user name and password, the authentication settings and security policy settings will follow the setting for the user \"*\". To change the user information of a user that has been created, use the SetUser API. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a member server on a cluster. */\r\n        this.CreateUser = function (in_param) {\r\n            return _this.CallAsync(\"CreateUser\", in_param);\r\n        };\r\n        /** Change User Settings. Use this to change user settings that is registered on the security account database of the currently managed Virtual Hub. The user settings that can be changed using this API are the three items that are specified when a new user is created using the CreateUser API: Group Name, Full Name, and Description. To get the list of currently registered users, use the EnumUser API. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a member server on a cluster. */\r\n        this.SetUser = function (in_param) {\r\n            return _this.CallAsync(\"SetUser\", in_param);\r\n        };\r\n        /** Get User Settings. Use this to get user settings information that is registered on the security account database of the currently managed Virtual Hub. The information that you can get using this API are User Name, Full Name, Group Name, Expiration Date, Security Policy, and Auth Type, as well as parameters that are specified as auth type attributes and the statistical data of that user. To get the list of currently registered users, use the EnumUser API. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a member server on a cluster. */\r\n        this.GetUser = function (in_param) {\r\n            return _this.CallAsync(\"GetUser\", in_param);\r\n        };\r\n        /** Delete a user. Use this to delete a user that is registered on the security account database of the currently managed Virtual Hub. By deleting the user, that user will no long be able to connect to the Virtual Hub. You can use the SetUser API to set the user's security policy to deny access instead of deleting a user, set the user to be temporarily denied from logging in. To get the list of currently registered users, use the EnumUser API. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a member server on a cluster. */\r\n        this.DeleteUser = function (in_param) {\r\n            return _this.CallAsync(\"DeleteUser\", in_param);\r\n        };\r\n        /** Get List of Users. Use this to get a list of users that are registered on the security account database of the currently managed Virtual Hub. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a member server on a cluster. */\r\n        this.EnumUser = function (in_param) {\r\n            return _this.CallAsync(\"EnumUser\", in_param);\r\n        };\r\n        /** Create Group. Use this to create a new group in the security account database of the currently managed Virtual Hub. You can register multiple users in a group. To register users in a group use the SetUser API. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a member server on a cluster. */\r\n        this.CreateGroup = function (in_param) {\r\n            return _this.CallAsync(\"CreateGroup\", in_param);\r\n        };\r\n        /** Set group settings. Use this to set group settings that is registered on the security account database of the currently managed Virtual Hub. To get the list of currently registered groups, use the EnumGroup API. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a member server on a cluster. */\r\n        this.SetGroup = function (in_param) {\r\n            return _this.CallAsync(\"SetGroup\", in_param);\r\n        };\r\n        /** Get Group Setting (Sync mode). Use this to get the setting of a group that is registered on the security account database of the currently managed Virtual Hub. To get the list of currently registered groups, use the EnumGroup API. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a member server on a cluster. */\r\n        this.GetGroup = function (in_param) {\r\n            return _this.CallAsync(\"GetGroup\", in_param);\r\n        };\r\n        /** Delete User from Group. Use this to delete a specified user from the group that is registered on the security account database of the currently managed Virtual Hub. By deleting a user from the group, that user becomes unassigned. To get the list of currently registered groups, use the EnumGroup API. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a member server on a cluster. */\r\n        this.DeleteGroup = function (in_param) {\r\n            return _this.CallAsync(\"DeleteGroup\", in_param);\r\n        };\r\n        /** Get List of Groups. Use this to get a list of groups that are registered on the security account database of the currently managed Virtual Hub. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a member server on a cluster. */\r\n        this.EnumGroup = function (in_param) {\r\n            return _this.CallAsync(\"EnumGroup\", in_param);\r\n        };\r\n        /** Get List of Connected VPN Sessions. Use this to get a list of the sessions connected to the Virtual Hub currently being managed. In the list of sessions, the following information will be obtained for each connection: Session Name, Session Site, User Name, Source Host Name, TCP Connection, Transfer Bytes and Transfer Packets. If the currently connected VPN Server is a cluster controller and the currently managed Virtual Hub is a static Virtual Hub, you can get an all-linked-together list of all sessions connected to that Virtual Hub on all cluster members. In all other cases, only the list of sessions that are actually connected to the currently managed VPN Server will be obtained. */\r\n        this.EnumSession = function (in_param) {\r\n            return _this.CallAsync(\"EnumSession\", in_param);\r\n        };\r\n        /** Get Session Status. Use this to specify a session currently connected to the currently managed Virtual Hub and get the session information. The session status includes the following: source host name and user name, version information, time information, number of TCP connections, communication parameters, session key, statistical information on data transferred, and other client and server information. To get the list of currently connected sessions, use the EnumSession API. */\r\n        this.GetSessionStatus = function (in_param) {\r\n            return _this.CallAsync(\"GetSessionStatus\", in_param);\r\n        };\r\n        /** Disconnect Session. Use this to specify a session currently connected to the currently managed Virtual Hub and forcefully disconnect that session using manager privileges. Note that when communication is disconnected by settings on the source client side and the automatically reconnect option is enabled, it is possible that the client will reconnect. To get the list of currently connected sessions, use the EnumSession API. */\r\n        this.DeleteSession = function (in_param) {\r\n            return _this.CallAsync(\"DeleteSession\", in_param);\r\n        };\r\n        /** Get the MAC Address Table Database. Use this to get the MAC address table database that is held by the currently managed Virtual Hub. The MAC address table database is a table that the Virtual Hub requires to perform the action of switching Ethernet frames and the Virtual Hub decides the sorting destination session of each Ethernet frame based on the MAC address table database. The MAC address database is built by the Virtual Hub automatically analyzing the contents of the communication. */\r\n        this.EnumMacTable = function (in_param) {\r\n            return _this.CallAsync(\"EnumMacTable\", in_param);\r\n        };\r\n        /** Delete MAC Address Table Entry. Use this API to operate the MAC address table database held by the currently managed Virtual Hub and delete a specified MAC address table entry from the database. To get the contents of the current MAC address table database use the EnumMacTable API. */\r\n        this.DeleteMacTable = function (in_param) {\r\n            return _this.CallAsync(\"DeleteMacTable\", in_param);\r\n        };\r\n        /** Get the IP Address Table Database. Use this to get the IP address table database that is held by the currently managed Virtual Hub. The IP address table database is a table that is automatically generated by analyzing the contents of communication so that the Virtual Hub can always know which session is using which IP address and it is frequently used by the engine that applies the Virtual Hub security policy. By specifying the session name you can get the IP address table entry that has been associated with that session. */\r\n        this.EnumIpTable = function (in_param) {\r\n            return _this.CallAsync(\"EnumIpTable\", in_param);\r\n        };\r\n        /** Delete IP Address Table Entry. Use this API to operate the IP address table database held by the currently managed Virtual Hub and delete a specified IP address table entry from the database. To get the contents of the current IP address table database use the EnumIpTable API. */\r\n        this.DeleteIpTable = function (in_param) {\r\n            return _this.CallAsync(\"DeleteIpTable\", in_param);\r\n        };\r\n        /** Set the Keep Alive Internet Connection Function. Use this to set the destination host name etc. of the Keep Alive Internet Connection Function. For network connection environments where connections will automatically be disconnected where there are periods of no communication that are longer than a set period, by using the Keep Alive Internet Connection Function, it is possible to keep alive the Internet connection by sending packets to a nominated server on the Internet at set intervals. When using this API, you can specify the following: Host Name, Port Number, Packet Send Interval, and Protocol. Packets sent to keep alive the Internet connection will have random content and personal information that could identify a computer or user is not sent. You can use the SetKeep API to enable/disable the Keep Alive Internet Connection Function. To execute this API on a VPN Server or VPN Bridge, you must have administrator privileges. */\r\n        this.SetKeep = function (in_param) {\r\n            return _this.CallAsync(\"SetKeep\", in_param);\r\n        };\r\n        /** Get the Keep Alive Internet Connection Function. Use this to get the current setting contents of the Keep Alive Internet Connection Function. In addition to the destination's Host Name, Port Number, Packet Send Interval and Protocol, you can obtain the current enabled/disabled status of the Keep Alive Internet Connection Function. */\r\n        this.GetKeep = function (in_param) {\r\n            return _this.CallAsync(\"GetKeep\", in_param);\r\n        };\r\n        /** Enable the Virtual NAT and DHCP Server Function (SecureNAT Function). Use this to enable the Virtual NAT and DHCP Server function (SecureNAT Function) on the currently managed Virtual Hub and begin its operation. Before executing this API, you must first check the setting contents of the current Virtual NAT function and DHCP Server function using the SetSecureNATOption API and GetSecureNATOption API. By enabling the SecureNAT function, you can virtually operate a NAT router (IP masquerade) and the DHCP Server function on a virtual network on the Virtual Hub. [Warning about SecureNAT Function] The SecureNAT function is recommended only for system administrators and people with a detailed knowledge of networks. If you use the SecureNAT function correctly, it is possible to achieve a safe form of remote access via a VPN. However when used in the wrong way, it can put the entire network in danger. Anyone who does not have a thorough knowledge of networks and anyone who does not have the network administrator's permission must not enable the SecureNAT function. For a detailed explanation of the SecureNAT function, please refer to the VPN Server's manual and online documentation. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n        this.EnableSecureNAT = function (in_param) {\r\n            return _this.CallAsync(\"EnableSecureNAT\", in_param);\r\n        };\r\n        /** Disable the Virtual NAT and DHCP Server Function (SecureNAT Function). Use this to disable the Virtual NAT and DHCP Server function (SecureNAT Function) on the currently managed Virtual Hub. By executing this API the Virtual NAT function immediately stops operating and the Virtual DHCP Server function deletes the DHCP lease database and stops the service. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n        this.DisableSecureNAT = function (in_param) {\r\n            return _this.CallAsync(\"DisableSecureNAT\", in_param);\r\n        };\r\n        /** Change Settings of SecureNAT Function. Use this to change and save the virtual host network interface settings, virtual NAT function settings and virtual DHCP server settings of the Virtual NAT and DHCP Server function (SecureNAT function) on the currently managed Virtual Hub. The SecureNAT function holds one virtual network adapter on the L2 segment inside the Virtual Hub and it has been assigned a MAC address and an IP address. By doing this, another host connected to the same L2 segment is able to communicate with the SecureNAT virtual host as if it is an actual IP host existing on the network. [Warning about SecureNAT Function] The SecureNAT function is recommended only for system administrators and people with a detailed knowledge of networks. If you use the SecureNAT function correctly, it is possible to achieve a safe form of remote access via a VPN. However when used in the wrong way, it can put the entire network in danger. Anyone who does not have a thorough knowledge of networks and anyone who does not have the network administrators permission must not enable the SecureNAT function. For a detailed explanation of the SecureNAT function, please refer to the VPN Server's manual and online documentation. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n        this.SetSecureNATOption = function (in_param) {\r\n            return _this.CallAsync(\"SetSecureNATOption\", in_param);\r\n        };\r\n        /** Get Settings of SecureNAT Function. This API get the registered settings for the SecureNAT function which is set by the SetSecureNATOption API. */\r\n        this.GetSecureNATOption = function (in_param) {\r\n            return _this.CallAsync(\"GetSecureNATOption\", in_param);\r\n        };\r\n        /** Get Virtual NAT Function Session Table of SecureNAT Function. Use this to get the table of TCP and UDP sessions currently communicating via the Virtual NAT (NAT table) in cases when the Virtual NAT function is operating on the currently managed Virtual Hub. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n        this.EnumNAT = function (in_param) {\r\n            return _this.CallAsync(\"EnumNAT\", in_param);\r\n        };\r\n        /** Get Virtual DHCP Server Function Lease Table of SecureNAT Function. Use this to get the lease table of IP addresses, held by the Virtual DHCP Server, that are assigned to clients in cases when the Virtual NAT function is operating on the currently managed Virtual Hub. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n        this.EnumDHCP = function (in_param) {\r\n            return _this.CallAsync(\"EnumDHCP\", in_param);\r\n        };\r\n        /** Get the Operating Status of the Virtual NAT and DHCP Server Function (SecureNAT Function). Use this to get the operating status of the Virtual NAT and DHCP Server function (SecureNAT Function) when it is operating on the currently managed Virtual Hub. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n        this.GetSecureNATStatus = function (in_param) {\r\n            return _this.CallAsync(\"GetSecureNATStatus\", in_param);\r\n        };\r\n        /** Get List of Network Adapters Usable as Local Bridge. Use this to get a list of Ethernet devices (network adapters) that can be used as a bridge destination device as part of a Local Bridge connection. If possible, network connection name is displayed. You can use a device displayed here by using the AddLocalBridge API. To call this API, you must have VPN Server administrator privileges. */\r\n        this.EnumEthernet = function () {\r\n            return _this.CallAsync(\"EnumEthernet\", new VpnRpcEnumEth());\r\n        };\r\n        /** Create Local Bridge Connection. Use this to create a new Local Bridge connection on the VPN Server. By using a Local Bridge, you can configure a Layer 2 bridge connection between a Virtual Hub operating on this VPN server and a physical Ethernet Device (Network Adapter). You can create a tap device (virtual network interface) on the system and connect a bridge between Virtual Hubs (the tap device is only supported by Linux versions). It is possible to establish a bridge to an operating network adapter of your choice for the bridge destination Ethernet device (network adapter), but in high load environments, we recommend you prepare a network adapter dedicated to serve as a bridge. To call this API, you must have VPN Server administrator privileges. */\r\n        this.AddLocalBridge = function (in_param) {\r\n            return _this.CallAsync(\"AddLocalBridge\", in_param);\r\n        };\r\n        /** Delete Local Bridge Connection. Use this to delete an existing Local Bridge connection. To get a list of current Local Bridge connections use the EnumLocalBridge API. To call this API, you must have VPN Server administrator privileges. */\r\n        this.DeleteLocalBridge = function (in_param) {\r\n            return _this.CallAsync(\"DeleteLocalBridge\", in_param);\r\n        };\r\n        /** Get List of Local Bridge Connection. Use this to get a list of the currently defined Local Bridge connections. You can get the Local Bridge connection Virtual Hub name and the bridge destination Ethernet device (network adapter) name or tap device name, as well as the operating status. */\r\n        this.EnumLocalBridge = function () {\r\n            return _this.CallAsync(\"EnumLocalBridge\", new VpnRpcEnumLocalBridge());\r\n        };\r\n        /** Get whether the localbridge function is supported on the current system. */\r\n        this.GetBridgeSupport = function () {\r\n            return _this.CallAsync(\"GetBridgeSupport\", new VpnRpcBridgeSupport());\r\n        };\r\n        /** Reboot VPN Server Service. Use this to restart the VPN Server service. When you restart the VPN Server, all currently connected sessions and TCP connections will be disconnected and no new connections will be accepted until the restart process has completed. By using this API, only the VPN Server service program will be restarted and the physical computer that VPN Server is operating on does not restart. This management session will also be disconnected, so you will need to reconnect to continue management. Also, by specifying the \"IntValue\" parameter to \"1\", the contents of the configuration file (.config) held by the current VPN Server will be initialized. To call this API, you must have VPN Server administrator privileges. */\r\n        this.RebootServer = function (in_param) {\r\n            return _this.CallAsync(\"RebootServer\", in_param);\r\n        };\r\n        /** Get List of Server Functions / Capability. Use this get a list of functions and capability of the VPN Server currently connected and being managed. The function and capability of VPN Servers are different depending on the operating VPN server's edition and version. Using this API, you can find out the capability of the target VPN Server and report it. */\r\n        this.GetCaps = function () {\r\n            return _this.CallAsync(\"GetCaps\", new VpnCapslist());\r\n        };\r\n        /** Get the current configuration of the VPN Server. Use this to get a text file (.config file) that contains the current configuration contents of the VPN server. You can get the status on the VPN Server at the instant this API is executed. You can edit the configuration file by using a regular text editor. To write an edited configuration to the VPN Server, use the SetConfig API. To call this API, you must have VPN Server administrator privileges. */\r\n        this.GetConfig = function () {\r\n            return _this.CallAsync(\"GetConfig\", new VpnRpcConfig());\r\n        };\r\n        /** Write Configuration File to VPN Server. Use this to write the configuration file to the VPN Server. By executing this API, the contents of the specified configuration file will be applied to the VPN Server and the VPN Server program will automatically restart and upon restart, operate according to the new configuration contents. Because it is difficult for an administrator to write all the contents of a configuration file, we recommend you use the GetConfig API to get the current contents of the VPN Server configuration and save it to file. You can then edit these contents in a regular text editor and then use the SetConfig API to rewrite the contents to the VPN Server. This API is for people with a detailed knowledge of the VPN Server and if an incorrectly configured configuration file is written to the VPN Server, it not only could cause errors, it could also result in the lost of the current setting data. Take special care when carrying out this action. To call this API, you must have VPN Server administrator privileges. */\r\n        this.SetConfig = function (in_param) {\r\n            return _this.CallAsync(\"SetConfig\", in_param);\r\n        };\r\n        /** Get Virtual Hub Administration Option default values. */\r\n        this.GetDefaultHubAdminOptions = function (in_param) {\r\n            return _this.CallAsync(\"GetDefaultHubAdminOptions\", in_param);\r\n        };\r\n        /** Get List of Virtual Hub Administration Options. Use this to get a list of Virtual Hub administration options that are set on the currently managed Virtual Hub. The purpose of the Virtual Hub administration options is for the VPN Server Administrator to set limits for the setting ranges when the administration of the Virtual Hub is to be trusted to each Virtual Hub administrator. Only an administrator with administration privileges for this entire VPN Server is able to add, edit and delete the Virtual Hub administration options. The Virtual Hub administrators are unable to make changes to the administration options, however they are able to view them. There is an exception however. If allow_hub_admin_change_option is set to \"1\", even Virtual Hub administrators are able to edit the administration options. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster member. */\r\n        this.GetHubAdminOptions = function (in_param) {\r\n            return _this.CallAsync(\"GetHubAdminOptions\", in_param);\r\n        };\r\n        /** Set Values of Virtual Hub Administration Options. Use this to change the values of Virtual Hub administration options that are set on the currently managed Virtual Hub. The purpose of the Virtual Hub administration options is for the VPN Server Administrator to set limits for the setting ranges when the administration of the Virtual Hub is to be trusted to each Virtual Hub administrator. Only an administrator with administration privileges for this entire VPN Server is able to add, edit and delete the Virtual Hub administration options. The Virtual Hub administrators are unable to make changes to the administration options, however they are able to view them. There is an exception however. If allow_hub_admin_change_option is set to \"1\", even Virtual Hub administrators are able to edit the administration options. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster member. */\r\n        this.SetHubAdminOptions = function (in_param) {\r\n            return _this.CallAsync(\"SetHubAdminOptions\", in_param);\r\n        };\r\n        /** Get List of Virtual Hub Extended Options. Use this to get a Virtual Hub Extended Options List that is set on the currently managed Virtual Hub. Virtual Hub Extended Option enables you to configure more detail settings of the Virtual Hub. By default, both VPN Server's global administrators and individual Virtual Hub's administrators can modify the Virtual Hub Extended Options. However, if the deny_hub_admin_change_ext_option is set to 1 on the Virtual Hub Admin Options, the individual Virtual Hub's administrators cannot modify the Virtual Hub Extended Options. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster member. */\r\n        this.GetHubExtOptions = function (in_param) {\r\n            return _this.CallAsync(\"GetHubExtOptions\", in_param);\r\n        };\r\n        /** Set a Value of Virtual Hub Extended Options. Use this to set a value in the Virtual Hub Extended Options List that is set on the currently managed Virtual Hub. Virtual Hub Extended Option enables you to configure more detail settings of the Virtual Hub. By default, both VPN Server's global administrators and individual Virtual Hub's administrators can modify the Virtual Hub Extended Options. However, if the deny_hub_admin_change_ext_option is set to 1 on the Virtual Hub Admin Options, the individual Virtual Hub's administrators cannot modify the Virtual Hub Extended Options. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster member. */\r\n        this.SetHubExtOptions = function (in_param) {\r\n            return _this.CallAsync(\"SetHubExtOptions\", in_param);\r\n        };\r\n        /** Define New Virtual Layer 3 Switch. Use this to define a new Virtual Layer 3 Switch on the VPN Server. To call this API, you must have VPN Server administrator privileges. Also, this API does not operate on VPN Bridge. [Explanation on Virtual Layer 3 Switch Function] You can define Virtual Layer 3 Switches between multiple Virtual Hubs operating on this VPN Server and configure routing between different IP networks. [Caution about the Virtual Layer 3 Switch Function] The Virtual Layer 3 Switch functions are provided for network administrators and other people who know a lot about networks and IP routing. If you are using the regular VPN functions, you do not need to use the Virtual Layer 3 Switch functions. If the Virtual Layer 3 Switch functions are to be used, the person who configures them must have sufficient knowledge of IP routing and be perfectly capable of not impacting the network. */\r\n        this.AddL3Switch = function (in_param) {\r\n            return _this.CallAsync(\"AddL3Switch\", in_param);\r\n        };\r\n        /** Delete Virtual Layer 3 Switch. Use this to delete an existing Virtual Layer 3 Switch that is defined on the VPN Server. When the specified Virtual Layer 3 Switch is operating, it will be automatically deleted after operation stops. To get a list of existing Virtual Layer 3 Switches, use the EnumL3Switch API. To call this API, you must have VPN Server administrator privileges. Also, this API does not operate on VPN Bridge. */\r\n        this.DelL3Switch = function (in_param) {\r\n            return _this.CallAsync(\"DelL3Switch\", in_param);\r\n        };\r\n        /** Get List of Virtual Layer 3 Switches. Use this to define a new Virtual Layer 3 Switch on the VPN Server. To call this API, you must have VPN Server administrator privileges. Also, this API does not operate on VPN Bridge. [Explanation on Virtual Layer 3 Switch Function] You can define Virtual Layer 3 Switches between multiple Virtual Hubs operating on this VPN Server and configure routing between different IP networks. [Caution about the Virtual Layer 3 Switch Function] The Virtual Layer 3 Switch functions are provided for network administrators and other people who know a lot about networks and IP routing. If you are using the regular VPN functions, you do not need to use the Virtual Layer 3 Switch functions. If the Virtual Layer 3 Switch functions are to be used, the person who configures them must have sufficient knowledge of IP routing and be perfectly capable of not impacting the network. */\r\n        this.EnumL3Switch = function () {\r\n            return _this.CallAsync(\"EnumL3Switch\", new VpnRpcEnumL3Sw());\r\n        };\r\n        /** Start Virtual Layer 3 Switch Operation. Use this to start the operation of an existing Virtual Layer 3 Switch defined on the VPN Server whose operation is currently stopped. To get a list of existing Virtual Layer 3 Switches, use the EnumL3Switch API. To call this API, you must have VPN Server administrator privileges. Also, this API does not operate on VPN Bridge. [Explanation on Virtual Layer 3 Switch Function] You can define Virtual Layer 3 Switches between multiple Virtual Hubs operating on this VPN Server and configure routing between different IP networks. [Caution about the Virtual Layer 3 Switch Function] The Virtual Layer 3 Switch functions are provided for network administrators and other people who know a lot about networks and IP routing. If you are using the regular VPN functions, you do not need to use the Virtual Layer 3 Switch functions. If the Virtual Layer 3 Switch functions are to be used, the person who configures them must have sufficient knowledge of IP routing and be perfectly capable of not impacting the network. */\r\n        this.StartL3Switch = function (in_param) {\r\n            return _this.CallAsync(\"StartL3Switch\", in_param);\r\n        };\r\n        /** Stop Virtual Layer 3 Switch Operation. Use this to stop the operation of an existing Virtual Layer 3 Switch defined on the VPN Server whose operation is currently operating. To get a list of existing Virtual Layer 3 Switches, use the EnumL3Switch API. To call this API, you must have VPN Server administrator privileges. */\r\n        this.StopL3Switch = function (in_param) {\r\n            return _this.CallAsync(\"StopL3Switch\", in_param);\r\n        };\r\n        /** Add Virtual Interface to Virtual Layer 3 Switch. Use this to add to a specified Virtual Layer 3 Switch, a virtual interface that connects to a Virtual Hub operating on the same VPN Server. You can define multiple virtual interfaces and routing tables for a single Virtual Layer 3 Switch. A virtual interface is associated to a virtual Hub and operates as a single IP host on the Virtual Hub when that Virtual Hub is operating. When multiple virtual interfaces that respectively belong to a different IP network of a different Virtual Hub are defined, IP routing will be automatically performed between these interfaces. You must define the IP network space that the virtual interface belongs to and the IP address of the interface itself. Also, you must specify the name of the Virtual Hub that the interface will connect to. You can specify a Virtual Hub that currently doesn't exist for the Virtual Hub name. The virtual interface must have one IP address in the Virtual Hub. You also must specify the subnet mask of an IP network that the IP address belongs to. Routing via the Virtual Layer 3 Switches of IP spaces of multiple virtual Hubs operates based on the IP address is specified here. To call this API, you must have VPN Server administrator privileges. Also, this API does not operate on VPN Bridge. To execute this API, the target Virtual Layer 3 Switch must be stopped. If it is not stopped, first use the StopL3Switch API to stop it and then execute this API. */\r\n        this.AddL3If = function (in_param) {\r\n            return _this.CallAsync(\"AddL3If\", in_param);\r\n        };\r\n        /** Delete Virtual Interface of Virtual Layer 3 Switch. Use this to delete a virtual interface already defined in the specified Virtual Layer 3 Switch. You can get a list of the virtual interfaces currently defined, by using the EnumL3If API. To call this API, you must have VPN Server administrator privileges. Also, this API does not operate on VPN Bridge. To execute this API, the target Virtual Layer 3 Switch must be stopped. If it is not stopped, first use the StopL3Switch API to stop it and then execute this API. */\r\n        this.DelL3If = function (in_param) {\r\n            return _this.CallAsync(\"DelL3If\", in_param);\r\n        };\r\n        /** Get List of Interfaces Registered on the Virtual Layer 3 Switch. Use this to get a list of virtual interfaces when virtual interfaces have been defined on a specified Virtual Layer 3 Switch. You can define multiple virtual interfaces and routing tables for a single Virtual Layer 3 Switch. A virtual interface is associated to a virtual Hub and operates as a single IP host on the Virtual Hub when that Virtual Hub is operating. When multiple virtual interfaces that respectively belong to a different IP network of a different Virtual Hub are defined, IP routing will be automatically performed between these interfaces. To call this API, you must have VPN Server administrator privileges. Also, this API does not operate on VPN Bridge. */\r\n        this.EnumL3If = function (in_param) {\r\n            return _this.CallAsync(\"EnumL3If\", in_param);\r\n        };\r\n        /** Add Routing Table Entry for Virtual Layer 3 Switch. Here you can add a new routing table entry to the routing table of the specified Virtual Layer 3 Switch. If the destination IP address of the IP packet does not belong to any IP network that belongs to a virtual interface, the IP routing engine of the Virtual Layer 3 Switch will reference the routing table and execute routing. You must specify the contents of the routing table entry to be added to the Virtual Layer 3 Switch. You must specify any IP address that belongs to the same IP network in the virtual interface of this Virtual Layer 3 Switch as the gateway address. To call this API, you must have VPN Server administrator privileges. Also, this API does not operate on VPN Bridge. To execute this API, the target Virtual Layer 3 Switch must be stopped. If it is not stopped, first use the StopL3Switch API to stop it and then execute this API. */\r\n        this.AddL3Table = function (in_param) {\r\n            return _this.CallAsync(\"AddL3Table\", in_param);\r\n        };\r\n        /** Delete Routing Table Entry of Virtual Layer 3 Switch. Use this to delete a routing table entry that is defined in the specified Virtual Layer 3 Switch. You can get a list of the already defined routing table entries by using the EnumL3Table API. To call this API, you must have VPN Server administrator privileges. Also, this API does not operate on VPN Bridge. To execute this API, the target Virtual Layer 3 Switch must be stopped. If it is not stopped, first use the StopL3Switch API to stop it and then execute this API. */\r\n        this.DelL3Table = function (in_param) {\r\n            return _this.CallAsync(\"DelL3Table\", in_param);\r\n        };\r\n        /** Get List of Routing Tables of Virtual Layer 3 Switch. Use this to get a list of routing tables when routing tables have been defined on a specified Virtual Layer 3 Switch. If the destination IP address of the IP packet does not belong to any IP network that belongs to a virtual interface, the IP routing engine of the Virtual Layer 3 Switch will reference this routing table and execute routing. To call this API, you must have VPN Server administrator privileges. Also, this API does not operate on VPN Bridge. */\r\n        this.EnumL3Table = function (in_param) {\r\n            return _this.CallAsync(\"EnumL3Table\", in_param);\r\n        };\r\n        /** Get List of Certificates Revocation List. Use this to get a Certificates Revocation List that is set on the currently managed Virtual Hub. By registering certificates in the Certificates Revocation List, the clients who provide these certificates will be unable to connect to this Virtual Hub using certificate authentication mode. Normally with this function, in cases where the security of a private key has been compromised or where a person holding a certificate has been stripped of their privileges, by registering that certificate as invalid on the Virtual Hub, it is possible to deny user authentication when that certificate is used by a client to connect to the Virtual Hub. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n        this.EnumCrl = function (in_param) {\r\n            return _this.CallAsync(\"EnumCrl\", in_param);\r\n        };\r\n        /** Add a Revoked Certificate. Use this to add a new revoked certificate definition in the Certificate Revocation List that is set on the currently managed Virtual Hub. Specify the contents to be registered in the Certificate Revocation List by using the parameters of this API. When a user connects to a Virtual Hub in certificate authentication mode and that certificate matches 1 or more of the contents registered in the certificates revocation list, the user is denied connection. A certificate that matches all the conditions that are defined by the parameters specified by this API will be judged as invalid. The items that can be set are as follows: Name (CN), Organization (O), Organization Unit (OU), Country (C), State (ST), Locale (L), Serial Number (hexadecimal), MD5 Digest Value (hexadecimal, 128 bit), and SHA-1 Digest Value (hexadecimal, 160 bit). For the specification of a digest value (hash value) a certificate is optionally specified depending on the circumstances. Normally when a MD5 or SHA-1 digest value is input, it is not necessary to input the other items. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n        this.AddCrl = function (in_param) {\r\n            return _this.CallAsync(\"AddCrl\", in_param);\r\n        };\r\n        /** Delete a Revoked Certificate. Use this to specify and delete a revoked certificate definition from the certificate revocation list that is set on the currently managed Virtual Hub. To get the list of currently registered revoked certificate definitions, use the EnumCrl API. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n        this.DelCrl = function (in_param) {\r\n            return _this.CallAsync(\"DelCrl\", in_param);\r\n        };\r\n        /** Get a Revoked Certificate. Use this to specify and get the contents of a revoked certificate definition from the Certificates Revocation List that is set on the currently managed Virtual Hub. To get the list of currently registered revoked certificate definitions, use the EnumCrl API. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n        this.GetCrl = function (in_param) {\r\n            return _this.CallAsync(\"GetCrl\", in_param);\r\n        };\r\n        /** Change Existing CRL (Certificate Revocation List) Entry. Use this to alter an existing revoked certificate definition in the Certificate Revocation List that is set on the currently managed Virtual Hub. Specify the contents to be registered in the Certificate Revocation List by using the parameters of this API. When a user connects to a Virtual Hub in certificate authentication mode and that certificate matches 1 or more of the contents registered in the certificates revocation list, the user is denied connection. A certificate that matches all the conditions that are defined by the parameters specified by this API will be judged as invalid. The items that can be set are as follows: Name (CN), Organization (O), Organization Unit (OU), Country (C), State (ST), Locale (L), Serial Number (hexadecimal), MD5 Digest Value (hexadecimal, 128 bit), and SHA-1 Digest Value (hexadecimal, 160 bit). For the specification of a digest value (hash value) a certificate is optionally specified depending on the circumstances. Normally when a MD5 or SHA-1 digest value is input, it is not necessary to input the other items. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n        this.SetCrl = function (in_param) {\r\n            return _this.CallAsync(\"SetCrl\", in_param);\r\n        };\r\n        /** Add Rule to Source IP Address Limit List. Use this to add a new rule to the Source IP Address Limit List that is set on the currently managed Virtual Hub. The items set here will be used to decide whether to allow or deny connection from a VPN Client when this client attempts connection to the Virtual Hub. You can specify a client IP address, or IP address or mask to match the rule as the contents of the rule item. By specifying an IP address only, there will only be one specified computer that will match the rule, but by specifying an IP net mask address or subnet mask address, all the computers in the range of that subnet will match the rule. You can specify the priority for the rule. You can specify an integer of 1 or greater for the priority and the smaller the number, the higher the priority. To get a list of the currently registered Source IP Address Limit List, use the GetAcList API. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n        this.SetAcList = function (in_param) {\r\n            return _this.CallAsync(\"SetAcList\", in_param);\r\n        };\r\n        /** Get List of Rule Items of Source IP Address Limit List. Use this to get a list of Source IP Address Limit List rules that is set on the currently managed Virtual Hub. You can allow or deny VPN connections to this Virtual Hub according to the client computer's source IP address. You can define multiple rules and set a priority for each rule. The search proceeds from the rule with the highest order or priority and based on the action of the rule that the IP address first matches, the connection from the client is either allowed or denied. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n        this.GetAcList = function (in_param) {\r\n            return _this.CallAsync(\"GetAcList\", in_param);\r\n        };\r\n        /** Get List of Log Files. Use this to display a list of log files outputted by the VPN Server that have been saved on the VPN Server computer. By specifying a log file file name displayed here and calling it using the ReadLogFile API you can download the contents of the log file. If you are connected to the VPN Server in server admin mode, you can display or download the packet logs and security logs of all Virtual Hubs and the server log of the VPN Server. When connected in Virtual Hub Admin Mode, you are able to view or download only the packet log and security log of the Virtual Hub that is the target of management. */\r\n        this.EnumLogFile = function () {\r\n            return _this.CallAsync(\"EnumLogFile\", new VpnRpcEnumLogFile());\r\n        };\r\n        /** Download a part of Log File. Use this to download the log file that is saved on the VPN Server computer. To download the log file first get the list of log files using the EnumLogFile API and then download the log file using the ReadLogFile API. If you are connected to the VPN Server in server admin mode, you can display or download the packet logs and security logs of all Virtual Hubs and the server log of the VPN Server. When connected in Virtual Hub Admin Mode, you are able to view or download only the packet log and security log of the Virtual Hub that is the target of management. */\r\n        this.ReadLogFile = function (in_param) {\r\n            return _this.CallAsync(\"ReadLogFile\", in_param);\r\n        };\r\n        /** Set syslog Send Function. Use this to set the usage of syslog send function and which syslog server to use. */\r\n        this.SetSysLog = function (in_param) {\r\n            return _this.CallAsync(\"SetSysLog\", in_param);\r\n        };\r\n        /** Get syslog Send Function. This allows you to get the current setting contents of the syslog send function. You can get the usage setting of the syslog function and the host name and port number of the syslog server to use. */\r\n        this.GetSysLog = function (in_param) {\r\n            return _this.CallAsync(\"GetSysLog\", in_param);\r\n        };\r\n        /** Set Today's Message of Virtual Hub. The message will be displayed on VPN Client UI when a user will establish a connection to the Virtual Hub. */\r\n        this.SetHubMsg = function (in_param) {\r\n            return _this.CallAsync(\"SetHubMsg\", in_param);\r\n        };\r\n        /** Get Today's Message of Virtual Hub. The message will be displayed on VPN Client UI when a user will establish a connection to the Virtual Hub. */\r\n        this.GetHubMsg = function (in_param) {\r\n            return _this.CallAsync(\"GetHubMsg\", in_param);\r\n        };\r\n        /** Raise a vital error on the VPN Server / Bridge to terminate the process forcefully. This API will raise a fatal error (memory access violation) on the VPN Server / Bridge running process in order to crash the process. As the result, VPN Server / Bridge will be terminated and restarted if it is running as a service mode. If the VPN Server is running as a user mode, the process will not automatically restarted. This API is for a situation when the VPN Server / Bridge is under a non-recoverable error or the process is in an infinite loop. This API will disconnect all VPN Sessions on the VPN Server / Bridge. All unsaved settings in the memory of VPN Server / Bridge will be lost. Before run this API, call the Flush API to try to save volatile data to the configuration file. To execute this API, you must have VPN Server / VPN Bridge administrator privileges. */\r\n        this.Crash = function (in_param) {\r\n            return _this.CallAsync(\"Crash\", in_param);\r\n        };\r\n        /** Get the message for administrators. */\r\n        this.GetAdminMsg = function () {\r\n            return _this.CallAsync(\"GetAdminMsg\", new VpnRpcMsg());\r\n        };\r\n        /** Save All Volatile Data of VPN Server / Bridge to the Configuration File. The number of configuration file bytes will be returned as the \"IntValue\" parameter. Normally, the VPN Server / VPN Bridge retains the volatile configuration data in memory. It is flushed to the disk as vpn_server.config or vpn_bridge.config periodically. The period is 300 seconds (5 minutes) by default. (The period can be altered by modifying the AutoSaveConfigSpan item in the configuration file.) The data will be saved on the timing of shutting down normally of the VPN Server / Bridge. Execute the Flush API to make the VPN Server / Bridge save the settings to the file immediately. The setting data will be stored on the disk drive of the server computer. Use the Flush API in a situation that you do not have an enough time to shut down the server process normally. To call this API, you must have VPN Server administrator privileges. To execute this API, you must have VPN Server / VPN Bridge administrator privileges. */\r\n        this.Flush = function (in_param) {\r\n            return _this.CallAsync(\"Flush\", in_param);\r\n        };\r\n        /** Enable or Disable IPsec VPN Server Function. Enable or Disable IPsec VPN Server Function on the VPN Server. If you enable this function, Virtual Hubs on the VPN Server will be able to accept Remote-Access VPN connections from L2TP-compatible PCs, Mac OS X and Smartphones, and also can accept EtherIP Site-to-Site VPN Connection. VPN Connections from Smartphones suchlike iPhone, iPad and Android, and also from native VPN Clients on Mac OS X and Windows can be accepted. To call this API, you must have VPN Server administrator privileges. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n        this.SetIPsecServices = function (in_param) {\r\n            return _this.CallAsync(\"SetIPsecServices\", in_param);\r\n        };\r\n        /** Get the Current IPsec VPN Server Settings. Get and view the current IPsec VPN Server settings on the VPN Server. To call this API, you must have VPN Server administrator privileges. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n        this.GetIPsecServices = function () {\r\n            return _this.CallAsync(\"GetIPsecServices\", new VpnIPsecServices());\r\n        };\r\n        /** Add New EtherIP / L2TPv3 over IPsec Client Setting to Accept EthreIP / L2TPv3 Client Devices. Add a new setting entry to enable the EtherIP / L2TPv3 over IPsec Server Function to accept client devices. In order to accept connections from routers by the EtherIP / L2TPv3 over IPsec Server Function, you have to define the relation table between an IPsec Phase 1 string which is presented by client devices of EtherIP / L2TPv3 over IPsec compatible router, and the designation of the destination Virtual Hub. After you add a definition entry by AddEtherIpId API, the defined connection setting to the Virtual Hub will be applied on the login-attepting session from an EtherIP / L2TPv3 over IPsec client device. The username and password in an entry must be registered on the Virtual Hub. An EtherIP / L2TPv3 client will be regarded as it connected the Virtual HUB with the identification of the above user information. To call this API, you must have VPN Server administrator privileges. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n        this.AddEtherIpId = function (in_param) {\r\n            return _this.CallAsync(\"AddEtherIpId\", in_param);\r\n        };\r\n        /** Get the Current List of EtherIP / L2TPv3 Client Device Entry Definitions. This API gets and shows the list of entries to accept VPN clients by EtherIP / L2TPv3 over IPsec Function. To call this API, you must have VPN Server administrator privileges. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n        this.GetEtherIpId = function (in_param) {\r\n            return _this.CallAsync(\"GetEtherIpId\", in_param);\r\n        };\r\n        /** Delete an EtherIP / L2TPv3 over IPsec Client Setting. This API deletes an entry to accept VPN clients by EtherIP / L2TPv3 over IPsec Function. To call this API, you must have VPN Server administrator privileges. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n        this.DeleteEtherIpId = function (in_param) {\r\n            return _this.CallAsync(\"DeleteEtherIpId\", in_param);\r\n        };\r\n        /** Get the Current List of EtherIP / L2TPv3 Client Device Entry Definitions. This API gets and shows the list of entries to accept VPN clients by EtherIP / L2TPv3 over IPsec Function. To call this API, you must have VPN Server administrator privileges. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n        this.EnumEtherIpId = function () {\r\n            return _this.CallAsync(\"EnumEtherIpId\", new VpnRpcEnumEtherIpId());\r\n        };\r\n        /** Set Settings for OpenVPN Clone Server Function. The VPN Server has the clone functions of OpenVPN software products by OpenVPN Technologies, Inc. Any OpenVPN Clients can connect to this VPN Server. The manner to specify a username to connect to the Virtual Hub, and the selection rule of default Hub by using this clone server functions are same to the IPsec Server functions. To call this API, you must have VPN Server administrator privileges. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n        this.SetOpenVpnSstpConfig = function (in_param) {\r\n            return _this.CallAsync(\"SetOpenVpnSstpConfig\", in_param);\r\n        };\r\n        /** Get the Current Settings of OpenVPN Clone Server Function. Get and show the current settings of OpenVPN Clone Server Function. To call this API, you must have VPN Server administrator privileges. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n        this.GetOpenVpnSstpConfig = function () {\r\n            return _this.CallAsync(\"GetOpenVpnSstpConfig\", new VpnOpenVpnSstpConfig());\r\n        };\r\n        /** Show the Current Status of Dynamic DNS Function. Get and show the current status of the Dynamic DNS function. The Dynamic DNS assigns a unique and permanent DNS hostname for this VPN Server. You can use that hostname to specify this VPN Server on the settings for VPN Client and VPN Bridge. You need not to register and keep a domain name. Also, if your ISP assignes you a dynamic (not-fixed) IP address, the corresponding IP address of your Dynamic DNS hostname will be automatically changed. It enables you to keep running the VPN Server by using only a dynamic IP address. Therefore, you need not any longer to keep static global IP addresses with expenses monthly costs. [Caution] To disable the Dynamic DNS Function, modify the configuration file of VPN Server. The \"declare root\" directive has the \"declare DDnsClient\" directive. In this directive, you can switch \"bool Disable\" from false to true, and reboot the VPN Server, then the Dynamic DNS Function will be disabled. To call this API, you must have VPN Server administrator privileges. This API cannot be invoked on VPN Bridge. */\r\n        this.GetDDnsClientStatus = function () {\r\n            return _this.CallAsync(\"GetDDnsClientStatus\", new VpnDDnsClientStatus());\r\n        };\r\n        /** Set the Dynamic DNS Hostname. You must specify the new hostname on the StrValue_str field. You can use this API to change the hostname assigned by the Dynamic DNS function. The currently assigned hostname can be showen by the GetDDnsClientStatus API. The Dynamic DNS assigns a unique and permanent DNS hostname for this VPN Server. You can use that hostname to specify this VPN Server on the settings for VPN Client and VPN Bridge. You need not to register and keep a domain name. Also, if your ISP assignes you a dynamic (not-fixed) IP address, the corresponding IP address of your Dynamic DNS hostname will be automatically changed. It enables you to keep running the VPN Server by using only a dynamic IP address. Therefore, you need not any longer to keep static global IP addresses with expenses monthly costs. [Caution] To disable the Dynamic DNS Function, modify the configuration file of VPN Server. The \"declare root\" directive has the \"declare DDnsClient\" directive. In this directive, you can switch \"bool Disable\" from false to true, and reboot the VPN Server, then the Dynamic DNS Function will be disabled. To call this API, you must have VPN Server administrator privileges. This API cannot be invoked on VPN Bridge. */\r\n        this.ChangeDDnsClientHostname = function (in_param) {\r\n            return _this.CallAsync(\"ChangeDDnsClientHostname\", in_param);\r\n        };\r\n        /** Generate New Self-Signed Certificate with Specified CN (Common Name) and Register on VPN Server. You can specify the new CN (common name) value on the StrValue_str field. You can use this API to replace the current certificate on the VPN Server to a new self-signed certificate which has the CN (Common Name) value in the fields. This API is convenient if you are planning to use Microsoft SSTP VPN Clone Server Function. Because of the value of CN (Common Name) on the SSL certificate of VPN Server must match to the hostname specified on the SSTP VPN client. This API will delete the existing SSL certificate of the VPN Server. It is recommended to backup the current SSL certificate and private key by using the GetServerCert API beforehand. To call this API, you must have VPN Server administrator privileges. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n        this.RegenerateServerCert = function (in_param) {\r\n            return _this.CallAsync(\"RegenerateServerCert\", in_param);\r\n        };\r\n        /** Generate a Sample Setting File for OpenVPN Client. Originally, the OpenVPN Client requires a user to write a very difficult configuration file manually. This API helps you to make a useful configuration sample. What you need to generate the configuration file for the OpenVPN Client is to run this API. To call this API, you must have VPN Server administrator privileges. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n        this.MakeOpenVpnConfigFile = function () {\r\n            return _this.CallAsync(\"MakeOpenVpnConfigFile\", new VpnRpcReadLogFile());\r\n        };\r\n        /** Enable / Disable the VPN over ICMP / VPN over DNS Server Function. You can establish a VPN only with ICMP or DNS packets even if there is a firewall or routers which blocks TCP/IP communications. You have to enable the following functions beforehand. Warning: Use this function for emergency only. It is helpful when a firewall or router is misconfigured to blocks TCP/IP, but either ICMP or DNS is not blocked. It is not for long-term stable using. To call this API, you must have VPN Server administrator privileges. This API cannot be invoked on VPN Bridge. */\r\n        this.SetSpecialListener = function (in_param) {\r\n            return _this.CallAsync(\"SetSpecialListener\", in_param);\r\n        };\r\n        /** Get Current Setting of the VPN over ICMP / VPN over DNS Function. Get and show the current VPN over ICMP / VPN over DNS Function status. To call this API, you must have VPN Server administrator privileges. This API cannot be invoked on VPN Bridge. */\r\n        this.GetSpecialListener = function () {\r\n            return _this.CallAsync(\"GetSpecialListener\", new VpnRpcSpecialListener());\r\n        };\r\n        /** Show the current status of VPN Azure function. Get and show the current status of the VPN Azure function. VPN Azure makes it easier to establish a VPN Session from your home PC to your office PC. While a VPN connection is established, you can access to any other servers on the private network of your company. You don't need a global IP address on the office PC (VPN Server). It can work behind firewalls or NATs. No network administrator's configuration required. You can use the built-in SSTP-VPN Client of Windows in your home PC. VPN Azure is a cloud VPN service operated by SoftEther Corporation. VPN Azure is free of charge and available to anyone. Visit http://www.vpnazure.net/ to see details and how-to-use instructions. The VPN Azure hostname is same to the hostname of the Dynamic DNS setting, but altering the domain suffix to \"vpnazure.net\". To change the hostname use the ChangeDDnsClientHostname API. To call this API, you must have VPN Server administrator privileges. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n        this.GetAzureStatus = function () {\r\n            return _this.CallAsync(\"GetAzureStatus\", new VpnRpcAzureStatus());\r\n        };\r\n        /** Enable / Disable VPN Azure Function. Enable or disable the VPN Azure function. VPN Azure makes it easier to establish a VPN Session from your home PC to your office PC. While a VPN connection is established, you can access to any other servers on the private network of your company. You don't need a global IP address on the office PC (VPN Server). It can work behind firewalls or NATs. No network administrator's configuration required. You can use the built-in SSTP-VPN Client of Windows in your home PC. VPN Azure is a cloud VPN service operated by SoftEther Corporation. VPN Azure is free of charge and available to anyone. Visit http://www.vpnazure.net/ to see details and how-to-use instructions. The VPN Azure hostname is same to the hostname of the Dynamic DNS setting, but altering the domain suffix to \"vpnazure.net\". To change the hostname use the ChangeDDnsClientHostname API. To call this API, you must have VPN Server administrator privileges. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n        this.SetAzureStatus = function (in_param) {\r\n            return _this.CallAsync(\"SetAzureStatus\", in_param);\r\n        };\r\n        /** Get the Proxy Settings for Connecting to the DDNS server. */\r\n        this.GetDDnsInternetSettng = function () {\r\n            return _this.CallAsync(\"GetDDnsInternetSettng\", new VpnInternetSetting());\r\n        };\r\n        /** Set the Proxy Settings for Connecting to the DDNS server. */\r\n        this.SetDDnsInternetSettng = function (in_param) {\r\n            return _this.CallAsync(\"SetDDnsInternetSettng\", in_param);\r\n        };\r\n        /** Set the VPN Gate Server Configuration. This API is valid for Win32 binary distribution of the Stable Edition of SoftEther VPN Server. */\r\n        this.SetVgsConfig = function (in_param) {\r\n            return _this.CallAsync(\"SetVgsConfig\", in_param);\r\n        };\r\n        /** Get the VPN Gate Server Configuration. This API is valid for Win32 binary distribution of the Stable Edition of SoftEther VPN Server. */\r\n        this.GetVgsConfig = function () {\r\n            return _this.CallAsync(\"GetVgsConfig\", new VpnVgsConfig());\r\n        };\r\n        var headers = {};\r\n        var send_credentials = false;\r\n        nodejs_https_client_reject_untrusted_server_cert = is_null(nodejs_https_client_reject_untrusted_server_cert) ? false : nodejs_https_client_reject_untrusted_server_cert;\r\n        if (is_null(vpnserver_hostname)) {\r\n            this.rpc_url = \"/api/\";\r\n            send_credentials = true;\r\n        }\r\n        else {\r\n            if (is_null(vpnserver_port))\r\n                vpnserver_port = 443;\r\n            this.rpc_url = \"https://\" + vpnserver_hostname + \":\" + vpnserver_port + \"/api/\";\r\n            headers[\"X-VPNADMIN-HUBNAME\"] = is_null(hubname) ? \"\" : hubname;\r\n            headers[\"X-VPNADMIN-PASSWORD\"] = is_null(password) ? \"\" : password;\r\n        }\r\n        if (is_null(nodejs_https_client_reject_untrusted_server_cert))\r\n            nodejs_https_client_reject_untrusted_server_cert = false;\r\n        this.rpc_client = new JsonRpcClient(this.rpc_url, headers, send_credentials, nodejs_https_client_reject_untrusted_server_cert);\r\n    }\r\n    /** Determine if this JavaScript environment is on the Node.js or not. */\r\n    VpnServerRpc.IsNodeJS = function () {\r\n        return is_node_js;\r\n    };\r\n    /** Set the debug mode flag */\r\n    VpnServerRpc.SetDebugMode = function (flag) {\r\n        debug_mode = flag;\r\n    };\r\n    // -- Utility functions --\r\n    /** Call a RPC procedure */\r\n    VpnServerRpc.prototype.CallAsync = function (method_name, request) {\r\n        return __awaiter(this, void 0, void 0, function () {\r\n            var response;\r\n            return __generator(this, function (_a) {\r\n                switch (_a.label) {\r\n                    case 0: return [4 /*yield*/, this.rpc_client.CallAsync(method_name, request)];\r\n                    case 1:\r\n                        response = _a.sent();\r\n                        return [2 /*return*/, response];\r\n                }\r\n            });\r\n        });\r\n    };\r\n    return VpnServerRpc;\r\n}());\r\nexports.VpnServerRpc = VpnServerRpc;\r\n// --- Types ---\r\n/** IP Protocol Numbers */\r\nvar VpnIpProtocolNumber;\r\n(function (VpnIpProtocolNumber) {\r\n    /** ICMP for IPv4 */\r\n    VpnIpProtocolNumber[VpnIpProtocolNumber[\"ICMPv4\"] = 1] = \"ICMPv4\";\r\n    /** TCP */\r\n    VpnIpProtocolNumber[VpnIpProtocolNumber[\"TCP\"] = 6] = \"TCP\";\r\n    /** UDP */\r\n    VpnIpProtocolNumber[VpnIpProtocolNumber[\"UDP\"] = 17] = \"UDP\";\r\n    /** ICMP for IPv6 */\r\n    VpnIpProtocolNumber[VpnIpProtocolNumber[\"ICMPv6\"] = 58] = \"ICMPv6\";\r\n})(VpnIpProtocolNumber = exports.VpnIpProtocolNumber || (exports.VpnIpProtocolNumber = {}));\r\n/** The body of the Access list */\r\nvar VpnAccess = /** @class */ (function () {\r\n    /** Constructor for the 'VpnAccess' class: The body of the Access list */\r\n    function VpnAccess(init) {\r\n        /** ID */\r\n        this.Id_u32 = 0;\r\n        /** Specify a description (note) for this rule */\r\n        this.Note_utf = \"\";\r\n        /** Enabled flag (true: enabled, false: disabled) */\r\n        this.Active_bool = false;\r\n        /** Specify an integer of 1 or higher to indicate the priority of the rule. Higher priority is given to rules with the lower priority values. */\r\n        this.Priority_u32 = 0;\r\n        /** The flag if the rule is DISCARD operation or PASS operation. When a packet matches this rule condition, this operation is decided. When the operation of the rule is PASS, the packet is allowed to pass, otherwise the packet will be discarded. */\r\n        this.Discard_bool = false;\r\n        /** The flag if the rule is for IPv6. Specify false for IPv4, or specify true for IPv6. */\r\n        this.IsIPv6_bool = false;\r\n        /** Valid only if the rule is IPv4 mode (IsIPv6_bool == false). Specify a source IPv4 address as a rule condition. You must also specify the SrcSubnetMask_ip field. */\r\n        this.SrcIpAddress_ip = \"\";\r\n        /** Valid only if the rule is IPv4 mode (IsIPv6_bool == false). Specify a source IPv4 subnet mask as a rule condition. \"0.0.0.0\" means all hosts. \"255.255.255.255\" means one single host. */\r\n        this.SrcSubnetMask_ip = \"\";\r\n        /** Valid only if the rule is IPv4 mode (IsIPv6_bool == false). Specify a destination IPv4 address as a rule condition. You must also specify the DestSubnetMask_ip field. */\r\n        this.DestIpAddress_ip = \"\";\r\n        /** Valid only if the rule is IPv4 mode (IsIPv6_bool == false). Specify a destination IPv4 subnet mask as a rule condition. \"0.0.0.0\" means all hosts. \"255.255.255.255\" means one single host. */\r\n        this.DestSubnetMask_ip = \"\";\r\n        /** Valid only if the rule is IPv6 mode (IsIPv6_bool == true). Specify a source IPv6 address as a rule condition. The field must be a byte array of 16 bytes (128 bits) to contain the IPv6 address in binary form. You must also specify the SrcSubnetMask6_bin field. */\r\n        this.SrcIpAddress6_bin = new Uint8Array([]);\r\n        /** Valid only if the rule is IPv6 mode (IsIPv6_bool == true). Specify a source IPv6 subnet mask as a rule condition. The field must be a byte array of 16 bytes (128 bits) to contain the IPv6 subnet mask in binary form. */\r\n        this.SrcSubnetMask6_bin = new Uint8Array([]);\r\n        /** Valid only if the rule is IPv6 mode (IsIPv6_bool == true). Specify a destination IPv6 address as a rule condition. The field must be a byte array of 16 bytes (128 bits) to contain the IPv6 address in binary form. You must also specify the DestSubnetMask6_bin field. */\r\n        this.DestIpAddress6_bin = new Uint8Array([]);\r\n        /** Valid only if the rule is IPv6 mode (IsIPv6_bool == true). Specify a destination IPv6 subnet mask as a rule condition. The field must be a byte array of 16 bytes (128 bits) to contain the IPv6 subnet mask in binary form. */\r\n        this.DestSubnetMask6_bin = new Uint8Array([]);\r\n        /** The IP protocol number */\r\n        this.Protocol_u32 = 0;\r\n        /** The Start Value of the Source Port Number Range. If the specified protocol is TCP/IP or UDP/IP, specify the source port number as the rule condition. Protocols other than this will be ignored. When this parameter is not specified, the rules will apply to all port numbers. */\r\n        this.SrcPortStart_u32 = 0;\r\n        /** The End Value of the Source Port Number Range. If the specified protocol is TCP/IP or UDP/IP, specify the source port number as the rule condition. Protocols other than this will be ignored. When this parameter is not specified, the rules will apply to all port numbers. */\r\n        this.SrcPortEnd_u32 = 0;\r\n        /** The Start Value of the Destination Port Number Range. If the specified protocol is TCP/IP or UDP/IP, specify the destination port number as the rule condition. Protocols other than this will be ignored. When this parameter is not specified, the rules will apply to all port numbers. */\r\n        this.DestPortStart_u32 = 0;\r\n        /** The End Value of the Destination Port Number Range. If the specified protocol is TCP/IP or UDP/IP, specify the destination port number as the rule condition. Protocols other than this will be ignored. When this parameter is not specified, the rules will apply to all port numbers. */\r\n        this.DestPortEnd_u32 = 0;\r\n        /** Source user name. You can apply this rule to only the packets sent by a user session of a user name that has been specified as a rule condition. In this case, specify the user name. */\r\n        this.SrcUsername_str = \"\";\r\n        /** Destination user name. You can apply this rule to only the packets received by a user session of a user name that has been specified as a rule condition. In this case, specify the user name. */\r\n        this.DestUsername_str = \"\";\r\n        /** Specify true if you want to check the source MAC address. */\r\n        this.CheckSrcMac_bool = false;\r\n        /** Source MAC address (6 bytes), valid only if CheckSrcMac_bool == true. */\r\n        this.SrcMacAddress_bin = new Uint8Array([]);\r\n        /** Source MAC address mask (6 bytes), valid only if CheckSrcMac_bool == true. */\r\n        this.SrcMacMask_bin = new Uint8Array([]);\r\n        /** Specify true if you want to check the destination MAC address. */\r\n        this.CheckDstMac_bool = false;\r\n        /** Destination MAC address (6 bytes), valid only if CheckSrcMac_bool == true. */\r\n        this.DstMacAddress_bin = new Uint8Array([]);\r\n        /** Destination MAC address mask (6 bytes), valid only if CheckSrcMac_bool == true. */\r\n        this.DstMacMask_bin = new Uint8Array([]);\r\n        /** Specify true if you want to check the state of the TCP connection. */\r\n        this.CheckTcpState_bool = false;\r\n        /** Valid only if CheckTcpState_bool == true. Set this field true to match only TCP-established packets. Set this field false to match only TCP-non established packets. */\r\n        this.Established_bool = false;\r\n        /** Set this value to generate delays when packets is passing. Specify the delay period in milliseconds. Specify 0 means no delays to generate. The delays must be 10000 milliseconds at most. */\r\n        this.Delay_u32 = 0;\r\n        /** Set this value to generate jitters when packets is passing. Specify the ratio of fluctuation of jitters within 0% to 100% range. Specify 0 means no jitters to generate. */\r\n        this.Jitter_u32 = 0;\r\n        /** Set this value to generate packet losses when packets is passing. Specify the ratio of packet losses within 0% to 100% range. Specify 0 means no packet losses to generate. */\r\n        this.Loss_u32 = 0;\r\n        /** The specified URL will be mandatory replied to the client as a response for TCP connecting request packets which matches the conditions of this access list entry via this Virtual Hub. To use this setting, you can enforce the web browser of the VPN Client computer to show the specified web site when that web browser tries to access the specific IP address. */\r\n        this.RedirectUrl_str = \"\";\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnAccess;\r\n}());\r\nexports.VpnAccess = VpnAccess;\r\n/** Add an item to Access List */\r\nvar VpnRpcAddAccess = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcAddAccess' class: Add an item to Access List */\r\n    function VpnRpcAddAccess(init) {\r\n        /** The Virtual Hub name */\r\n        this.HubName_str = \"\";\r\n        /** Access list (Must be a single item) */\r\n        this.AccessListSingle = [];\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcAddAccess;\r\n}());\r\nexports.VpnRpcAddAccess = VpnRpcAddAccess;\r\n/** Add CA to HUB */\r\nvar VpnRpcHubAddCA = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcHubAddCA' class: Add CA to HUB */\r\n    function VpnRpcHubAddCA(init) {\r\n        /** The Virtual Hub name */\r\n        this.HubName_str = \"\";\r\n        /** The body of the X.509 certificate */\r\n        this.Cert_bin = new Uint8Array([]);\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcHubAddCA;\r\n}());\r\nexports.VpnRpcHubAddCA = VpnRpcHubAddCA;\r\n/** CRL entry */\r\nvar VpnRpcCrl = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcCrl' class: CRL entry */\r\n    function VpnRpcCrl(init) {\r\n        /** The Virtual Hub name */\r\n        this.HubName_str = \"\";\r\n        /** Key ID */\r\n        this.Key_u32 = 0;\r\n        /** CN, optional */\r\n        this.CommonName_utf = \"\";\r\n        /** O, optional */\r\n        this.Organization_utf = \"\";\r\n        /** OU, optional */\r\n        this.Unit_utf = \"\";\r\n        /** C, optional */\r\n        this.Country_utf = \"\";\r\n        /** ST, optional */\r\n        this.State_utf = \"\";\r\n        /** L, optional */\r\n        this.Local_utf = \"\";\r\n        /** Serial, optional */\r\n        this.Serial_bin = new Uint8Array([]);\r\n        /** MD5 Digest, optional */\r\n        this.DigestMD5_bin = new Uint8Array([]);\r\n        /** SHA1 Digest, optional */\r\n        this.DigestSHA1_bin = new Uint8Array([]);\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcCrl;\r\n}());\r\nexports.VpnRpcCrl = VpnRpcCrl;\r\n/** EtherIP key list entry */\r\nvar VpnEtherIpId = /** @class */ (function () {\r\n    /** Constructor for the 'VpnEtherIpId' class: EtherIP key list entry */\r\n    function VpnEtherIpId(init) {\r\n        /** Specify an ISAKMP Phase 1 ID. The ID must be exactly same as a ID in the configuration of the EtherIP / L2TPv3 Client. You can specify IP address as well as characters as ID, if the EtherIP Client uses IP address as Phase 1 ID. If you specify '*' (asterisk), it will be a wildcard to match any clients which doesn't match other explicit rules. */\r\n        this.Id_str = \"\";\r\n        /** Specify the name of the Virtual Hub to connect. */\r\n        this.HubName_str = \"\";\r\n        /** Specify the username to login to the destination Virtual Hub. */\r\n        this.UserName_str = \"\";\r\n        /** Specify the password to login to the destination Virtual Hub. */\r\n        this.Password_str = \"\";\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnEtherIpId;\r\n}());\r\nexports.VpnEtherIpId = VpnEtherIpId;\r\n/** Layer-3 virtual interface */\r\nvar VpnRpcL3If = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcL3If' class: Layer-3 virtual interface */\r\n    function VpnRpcL3If(init) {\r\n        /** L3 switch name */\r\n        this.Name_str = \"\";\r\n        /** Virtual HUB name */\r\n        this.HubName_str = \"\";\r\n        /** IP address */\r\n        this.IpAddress_ip = \"\";\r\n        /** Subnet mask */\r\n        this.SubnetMask_ip = \"\";\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcL3If;\r\n}());\r\nexports.VpnRpcL3If = VpnRpcL3If;\r\n/** Layer-3 switch */\r\nvar VpnRpcL3Sw = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcL3Sw' class: Layer-3 switch */\r\n    function VpnRpcL3Sw(init) {\r\n        /** Layer-3 Switch name */\r\n        this.Name_str = \"\";\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcL3Sw;\r\n}());\r\nexports.VpnRpcL3Sw = VpnRpcL3Sw;\r\n/** Routing table */\r\nvar VpnRpcL3Table = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcL3Table' class: Routing table */\r\n    function VpnRpcL3Table(init) {\r\n        /** L3 switch name */\r\n        this.Name_str = \"\";\r\n        /** Network address */\r\n        this.NetworkAddress_ip = \"\";\r\n        /** Subnet mask */\r\n        this.SubnetMask_ip = \"\";\r\n        /** Gateway address */\r\n        this.GatewayAddress_ip = \"\";\r\n        /** Metric */\r\n        this.Metric_u32 = 0;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcL3Table;\r\n}());\r\nexports.VpnRpcL3Table = VpnRpcL3Table;\r\n/** Generic parameter to contain u32, u64, ascii_string and unicode string */\r\nvar VpnRpcTest = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcTest' class: Generic parameter to contain u32, u64, ascii_string and unicode string */\r\n    function VpnRpcTest(init) {\r\n        /** A 32-bit integer field */\r\n        this.IntValue_u32 = 0;\r\n        /** A 64-bit integer field */\r\n        this.Int64Value_u64 = 0;\r\n        /** An Ascii string field */\r\n        this.StrValue_str = \"\";\r\n        /** An UTF-8 string field */\r\n        this.UniStrValue_utf = \"\";\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcTest;\r\n}());\r\nexports.VpnRpcTest = VpnRpcTest;\r\n/** Local Bridge list item */\r\nvar VpnRpcLocalBridge = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcLocalBridge' class: Local Bridge list item */\r\n    function VpnRpcLocalBridge(init) {\r\n        /** Physical Ethernet device name */\r\n        this.DeviceName_str = \"\";\r\n        /** The Virtual Hub name */\r\n        this.HubNameLB_str = \"\";\r\n        /** Online flag */\r\n        this.Online_bool = false;\r\n        /** Running flag */\r\n        this.Active_bool = false;\r\n        /** Specify true if you are using a tap device rather than a network adapter for the bridge destination (only supported for Linux versions). */\r\n        this.TapMode_bool = false;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcLocalBridge;\r\n}());\r\nexports.VpnRpcLocalBridge = VpnRpcLocalBridge;\r\n/** Create, configure, and get the group */\r\nvar VpnRpcSetGroup = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcSetGroup' class: Create, configure, and get the group */\r\n    function VpnRpcSetGroup(init) {\r\n        /** The Virtual Hub name */\r\n        this.HubName_str = \"\";\r\n        /** The group name */\r\n        this.Name_str = \"\";\r\n        /** Optional real name (full name) of the group, allow using any Unicode characters */\r\n        this.Realname_utf = \"\";\r\n        /** Optional, specify a description of the group */\r\n        this.Note_utf = \"\";\r\n        /** Number of broadcast packets (Recv) */\r\n        this[\"Recv.BroadcastBytes_u64\"] = 0;\r\n        /** Broadcast bytes (Recv) */\r\n        this[\"Recv.BroadcastCount_u64\"] = 0;\r\n        /** Unicast count (Recv) */\r\n        this[\"Recv.UnicastBytes_u64\"] = 0;\r\n        /** Unicast bytes (Recv) */\r\n        this[\"Recv.UnicastCount_u64\"] = 0;\r\n        /** Number of broadcast packets (Send) */\r\n        this[\"Send.BroadcastBytes_u64\"] = 0;\r\n        /** Broadcast bytes (Send) */\r\n        this[\"Send.BroadcastCount_u64\"] = 0;\r\n        /** Unicast bytes (Send) */\r\n        this[\"Send.UnicastBytes_u64\"] = 0;\r\n        /** Unicast bytes (Send) */\r\n        this[\"Send.UnicastCount_u64\"] = 0;\r\n        /** The flag whether to use security policy */\r\n        this.UsePolicy_bool = false;\r\n        /** Security policy: Allow Access. The users, which this policy value is true, have permission to make VPN connection to VPN Server. */\r\n        this[\"policy:Access_bool\"] = false;\r\n        /** Security policy: Filter DHCP Packets (IPv4). All IPv4 DHCP packets in sessions defined this policy will be filtered. */\r\n        this[\"policy:DHCPFilter_bool\"] = false;\r\n        /** Security policy: Disallow DHCP Server Operation (IPv4). Computers connected to sessions that have this policy setting will not be allowed to become a DHCP server and distribute IPv4 addresses to DHCP clients. */\r\n        this[\"policy:DHCPNoServer_bool\"] = false;\r\n        /** Security policy: Enforce DHCP Allocated IP Addresses (IPv4). Computers in sessions that have this policy setting will only be able to use IPv4 addresses allocated by a DHCP server on the virtual network side. */\r\n        this[\"policy:DHCPForce_bool\"] = false;\r\n        /** Security policy: Deny Bridge Operation. Bridge-mode connections are denied for user sessions that have this policy setting. Even in cases when the Ethernet Bridge is configured in the client side, communication will not be possible. */\r\n        this[\"policy:NoBridge_bool\"] = false;\r\n        /** Security policy: Deny Routing Operation (IPv4). IPv4 routing will be denied for sessions that have this policy setting. Even in the case where the IP router is operating on the user client side, communication will not be possible. */\r\n        this[\"policy:NoRouting_bool\"] = false;\r\n        /** Security policy: Deny MAC Addresses Duplication. The use of duplicating MAC addresses that are in use by computers of different sessions cannot be used by sessions with this policy setting. */\r\n        this[\"policy:CheckMac_bool\"] = false;\r\n        /** Security policy: Deny IP Address Duplication (IPv4). The use of duplicating IPv4 addresses that are in use by computers of different sessions cannot be used by sessions with this policy setting. */\r\n        this[\"policy:CheckIP_bool\"] = false;\r\n        /** Security policy: Deny Non-ARP / Non-DHCP / Non-ICMPv6 broadcasts. The sending or receiving of broadcast packets that are not ARP protocol, DHCP protocol, nor ICMPv6 on the virtual network will not be allowed for sessions with this policy setting. */\r\n        this[\"policy:ArpDhcpOnly_bool\"] = false;\r\n        /** Security policy: Privacy Filter Mode. All direct communication between sessions with the privacy filter mode policy setting will be filtered. */\r\n        this[\"policy:PrivacyFilter_bool\"] = false;\r\n        /** Security policy: Deny Operation as TCP/IP Server (IPv4). Computers of sessions with this policy setting can't listen and accept TCP/IP connections in IPv4. */\r\n        this[\"policy:NoServer_bool\"] = false;\r\n        /** Security policy: Unlimited Number of Broadcasts. If a computer of a session with this policy setting sends broadcast packets of a number unusually larger than what would be considered normal on the virtual network, there will be no automatic limiting. */\r\n        this[\"policy:NoBroadcastLimiter_bool\"] = false;\r\n        /** Security policy: Allow Monitoring Mode. Users with this policy setting will be granted to connect to the Virtual Hub in Monitoring Mode. Sessions in Monitoring Mode are able to monitor (tap) all packets flowing through the Virtual Hub. */\r\n        this[\"policy:MonitorPort_bool\"] = false;\r\n        /** Security policy: Maximum Number of TCP Connections. For sessions with this policy setting, this sets the maximum number of physical TCP connections consists in a physical VPN session. */\r\n        this[\"policy:MaxConnection_u32\"] = 0;\r\n        /** Security policy: Time-out Period. For sessions with this policy setting, this sets, in seconds, the time-out period to wait before disconnecting a session when communication trouble occurs between the VPN Client / VPN Server. */\r\n        this[\"policy:TimeOut_u32\"] = 0;\r\n        /** Security policy: Maximum Number of MAC Addresses. For sessions with this policy setting, this limits the number of MAC addresses per session. */\r\n        this[\"policy:MaxMac_u32\"] = 0;\r\n        /** Security policy: Maximum Number of IP Addresses (IPv4). For sessions with this policy setting, this specifies the number of IPv4 addresses that can be registered for a single session. */\r\n        this[\"policy:MaxIP_u32\"] = 0;\r\n        /** Security policy: Upload Bandwidth. For sessions with this policy setting, this limits the traffic bandwidth that is in the inwards direction from outside to inside the Virtual Hub. */\r\n        this[\"policy:MaxUpload_u32\"] = 0;\r\n        /** Security policy: Download Bandwidth. For sessions with this policy setting, this limits the traffic bandwidth that is in the outwards direction from inside the Virtual Hub to outside the Virtual Hub. */\r\n        this[\"policy:MaxDownload_u32\"] = 0;\r\n        /** Security policy: Deny Changing Password. The users which use password authentication with this policy setting are not allowed to change their own password from the VPN Client Manager or similar. */\r\n        this[\"policy:FixPassword_bool\"] = false;\r\n        /** Security policy: Maximum Number of Multiple Logins. Users with this policy setting are unable to have more than this number of concurrent logins. Bridge Mode sessions are not subjects to this policy. */\r\n        this[\"policy:MultiLogins_u32\"] = 0;\r\n        /** Security policy: Deny VoIP / QoS Function. Users with this security policy are unable to use VoIP / QoS functions in VPN connection sessions. */\r\n        this[\"policy:NoQoS_bool\"] = false;\r\n        /** Security policy: Filter RS / RA Packets (IPv6). All ICMPv6 packets which the message-type is 133 (Router Solicitation) or 134 (Router Advertisement) in sessions defined this policy will be filtered. As a result, an IPv6 client will be unable to use IPv6 address prefix auto detection and IPv6 default gateway auto detection. */\r\n        this[\"policy:RSandRAFilter_bool\"] = false;\r\n        /** Security policy: Filter RA Packets (IPv6). All ICMPv6 packets which the message-type is 134 (Router Advertisement) in sessions defined this policy will be filtered. As a result, a malicious users will be unable to spread illegal IPv6 prefix or default gateway advertisements on the network. */\r\n        this[\"policy:RAFilter_bool\"] = false;\r\n        /** Security policy: Filter DHCP Packets (IPv6). All IPv6 DHCP packets in sessions defined this policy will be filtered. */\r\n        this[\"policy:DHCPv6Filter_bool\"] = false;\r\n        /** Security policy: Disallow DHCP Server Operation (IPv6). Computers connected to sessions that have this policy setting will not be allowed to become a DHCP server and distribute IPv6 addresses to DHCP clients. */\r\n        this[\"policy:DHCPv6NoServer_bool\"] = false;\r\n        /** Security policy: Deny Routing Operation (IPv6). IPv6 routing will be denied for sessions that have this policy setting. Even in the case where the IP router is operating on the user client side, communication will not be possible. */\r\n        this[\"policy:NoRoutingV6_bool\"] = false;\r\n        /** Security policy: Deny IP Address Duplication (IPv6). The use of duplicating IPv6 addresses that are in use by computers of different sessions cannot be used by sessions with this policy setting. */\r\n        this[\"policy:CheckIPv6_bool\"] = false;\r\n        /** Security policy: Deny Operation as TCP/IP Server (IPv6). Computers of sessions with this policy setting can't listen and accept TCP/IP connections in IPv6. */\r\n        this[\"policy:NoServerV6_bool\"] = false;\r\n        /** Security policy: Maximum Number of IP Addresses (IPv6). For sessions with this policy setting, this specifies the number of IPv6 addresses that can be registered for a single session. */\r\n        this[\"policy:MaxIPv6_u32\"] = 0;\r\n        /** Security policy: Disallow Password Save in VPN Client. For users with this policy setting, when the user is using *standard* password authentication, the user will be unable to save the password in VPN Client. The user will be required to input passwords for every time to connect a VPN. This will improve the security. If this policy is enabled, VPN Client Version 2.0 will be denied to access. */\r\n        this[\"policy:NoSavePassword_bool\"] = false;\r\n        /** Security policy: VPN Client Automatic Disconnect. For users with this policy setting, a user's VPN session will be disconnected automatically after the specific period will elapse. In this case no automatic re-connection will be performed. This can prevent a lot of inactive VPN Sessions. If this policy is enabled, VPN Client Version 2.0 will be denied to access. */\r\n        this[\"policy:AutoDisconnect_u32\"] = 0;\r\n        /** Security policy: Filter All IPv4 Packets. All IPv4 and ARP packets in sessions defined this policy will be filtered. */\r\n        this[\"policy:FilterIPv4_bool\"] = false;\r\n        /** Security policy: Filter All IPv6 Packets. All IPv6 packets in sessions defined this policy will be filtered. */\r\n        this[\"policy:FilterIPv6_bool\"] = false;\r\n        /** Security policy: Filter All Non-IP Packets. All non-IP packets in sessions defined this policy will be filtered. \"Non-IP packet\" mean a packet which is not IPv4, ARP nor IPv6. Any tagged-VLAN packets via the Virtual Hub will be regarded as non-IP packets. */\r\n        this[\"policy:FilterNonIP_bool\"] = false;\r\n        /** Security policy: No Default-Router on IPv6 RA. In all VPN Sessions defines this policy, any IPv6 RA (Router Advertisement) packet with non-zero value in the router-lifetime will set to zero-value. This is effective to avoid the horrible behavior from the IPv6 routing confusion which is caused by the VPN client's attempts to use the remote-side IPv6 router as its local IPv6 router. */\r\n        this[\"policy:NoIPv6DefaultRouterInRA_bool\"] = false;\r\n        /** Security policy: No Default-Router on IPv6 RA (physical IPv6). In all VPN Sessions defines this policy (only when the physical communication protocol between VPN Client / VPN Bridge and VPN Server is IPv6), any IPv6 RA (Router Advertisement) packet with non-zero value in the router-lifetime will set to zero-value. This is effective to avoid the horrible behavior from the IPv6 routing confusion which is caused by the VPN client's attempts to use the remote-side IPv6 router as its local IPv6 router. */\r\n        this[\"policy:NoIPv6DefaultRouterInRAWhenIPv6_bool\"] = false;\r\n        /** Security policy: VLAN ID (IEEE802.1Q). You can specify the VLAN ID on the security policy. All VPN Sessions defines this policy, all Ethernet packets toward the Virtual Hub from the user will be inserted a VLAN tag (IEEE 802.1Q) with the VLAN ID. The user can also receive only packets with a VLAN tag which has the same VLAN ID. (Receiving process removes the VLAN tag automatically.) Any Ethernet packets with any other VLAN IDs or non-VLAN packets will not be received. All VPN Sessions without this policy definition can send / receive any kinds of Ethernet packets regardless of VLAN tags, and VLAN tags are not inserted or removed automatically. Any tagged-VLAN packets via the Virtual Hub will be regarded as non-IP packets. Therefore, tagged-VLAN packets are not subjects for IPv4 / IPv6 security policies, access lists nor other IPv4 / IPv6 specific deep processing. */\r\n        this[\"policy:VLanId_u32\"] = 0;\r\n        /** Security policy: Whether version 3.0 (must be true) */\r\n        this[\"policy:Ver3_bool\"] = false;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcSetGroup;\r\n}());\r\nexports.VpnRpcSetGroup = VpnRpcSetGroup;\r\n/** Hub types */\r\nvar VpnRpcHubType;\r\n(function (VpnRpcHubType) {\r\n    /** Stand-alone HUB */\r\n    VpnRpcHubType[VpnRpcHubType[\"Standalone\"] = 0] = \"Standalone\";\r\n    /** Static HUB */\r\n    VpnRpcHubType[VpnRpcHubType[\"FarmStatic\"] = 1] = \"FarmStatic\";\r\n    /** Dynamic HUB */\r\n    VpnRpcHubType[VpnRpcHubType[\"FarmDynamic\"] = 2] = \"FarmDynamic\";\r\n})(VpnRpcHubType = exports.VpnRpcHubType || (exports.VpnRpcHubType = {}));\r\n/** Create a HUB */\r\nvar VpnRpcCreateHub = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcCreateHub' class: Create a HUB */\r\n    function VpnRpcCreateHub(init) {\r\n        /** Specify the name of the Virtual Hub to create / update. */\r\n        this.HubName_str = \"\";\r\n        /** Specify an administrator password when the administrator password is going to be set for the Virtual Hub. On the update, leave it to empty string if you don't want to change the password. */\r\n        this.AdminPasswordPlainText_str = \"\";\r\n        /** Online flag */\r\n        this.Online_bool = false;\r\n        /** Maximum number of VPN sessions */\r\n        this.MaxSession_u32 = 0;\r\n        /** No Enum flag. By enabling this option, the VPN Client user will be unable to enumerate this Virtual Hub even if they send a Virtual Hub enumeration request to the VPN Server. */\r\n        this.NoEnum_bool = false;\r\n        /** Type of the Virtual Hub (Valid only for Clustered VPN Servers) */\r\n        this.HubType_u32 = 0;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcCreateHub;\r\n}());\r\nexports.VpnRpcCreateHub = VpnRpcCreateHub;\r\nvar VpnRpcClientAuthType;\r\n(function (VpnRpcClientAuthType) {\r\n    /** Anonymous authentication */\r\n    VpnRpcClientAuthType[VpnRpcClientAuthType[\"Anonymous\"] = 0] = \"Anonymous\";\r\n    /** SHA-0 hashed password authentication */\r\n    VpnRpcClientAuthType[VpnRpcClientAuthType[\"SHA0_Hashed_Password\"] = 1] = \"SHA0_Hashed_Password\";\r\n    /** Plain password authentication */\r\n    VpnRpcClientAuthType[VpnRpcClientAuthType[\"PlainPassword\"] = 2] = \"PlainPassword\";\r\n    /** Certificate authentication */\r\n    VpnRpcClientAuthType[VpnRpcClientAuthType[\"Cert\"] = 3] = \"Cert\";\r\n})(VpnRpcClientAuthType = exports.VpnRpcClientAuthType || (exports.VpnRpcClientAuthType = {}));\r\n/** Create and set of link */\r\nvar VpnRpcCreateLink = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcCreateLink' class: Create and set of link */\r\n    function VpnRpcCreateLink(init) {\r\n        /** The Virtual Hub name */\r\n        this.HubName_Ex_str = \"\";\r\n        /** Online flag */\r\n        this.Online_bool = false;\r\n        /** The flag to enable validation for the server certificate */\r\n        this.CheckServerCert_bool = false;\r\n        /** The body of server X.509 certificate to compare. Valid only if the CheckServerCert_bool flag is true. */\r\n        this.ServerCert_bin = new Uint8Array([]);\r\n        /** Client Option Parameters: Specify the name of the Cascade Connection */\r\n        this.AccountName_utf = \"\";\r\n        /** Client Option Parameters: Specify the hostname of the destination VPN Server. You can also specify by IP address. */\r\n        this.Hostname_str = \"\";\r\n        /** Client Option Parameters: Specify the port number of the destination VPN Server. */\r\n        this.Port_u32 = 0;\r\n        /** Client Option Parameters: The type of the proxy server */\r\n        this.ProxyType_u32 = 0;\r\n        /** Client Option Parameters: The hostname or IP address of the proxy server name */\r\n        this.ProxyName_str = \"\";\r\n        /** Client Option Parameters: The port number of the proxy server */\r\n        this.ProxyPort_u32 = 0;\r\n        /** Client Option Parameters: The username to connect to the proxy server */\r\n        this.ProxyUsername_str = \"\";\r\n        /** Client Option Parameters: The password to connect to the proxy server */\r\n        this.ProxyPassword_str = \"\";\r\n        /** Client Option Parameters: The Virtual Hub on the destination VPN Server */\r\n        this.HubName_str = \"\";\r\n        /** Client Option Parameters: Number of TCP Connections to Use in VPN Communication */\r\n        this.MaxConnection_u32 = 0;\r\n        /** Client Option Parameters: The flag to enable the encryption on the communication */\r\n        this.UseEncrypt_bool = false;\r\n        /** Client Option Parameters: Enable / Disable Data Compression when Communicating by Cascade Connection */\r\n        this.UseCompress_bool = false;\r\n        /** Client Option Parameters: Specify true when enabling half duplex mode. When using two or more TCP connections for VPN communication, it is possible to use Half Duplex Mode. By enabling half duplex mode it is possible to automatically fix data transmission direction as half and half for each TCP connection. In the case where a VPN using 8 TCP connections is established, for example, when half-duplex is enabled, communication can be fixes so that 4 TCP connections are dedicated to the upload direction and the other 4 connections are dedicated to the download direction. */\r\n        this.HalfConnection_bool = false;\r\n        /** Client Option Parameters: Connection attempt interval when additional connection will be established */\r\n        this.AdditionalConnectionInterval_u32 = 0;\r\n        /** Client Option Parameters: Connection Life of Each TCP Connection (0 for no keep-alive) */\r\n        this.ConnectionDisconnectSpan_u32 = 0;\r\n        /** Client Option Parameters: Disable QoS Control Function if the value is true */\r\n        this.DisableQoS_bool = false;\r\n        /** Client Option Parameters: Do not use TLS 1.x of the value is true */\r\n        this.NoTls1_bool = false;\r\n        /** Client Option Parameters: Do not use UDP acceleration mode if the value is true */\r\n        this.NoUdpAcceleration_bool = false;\r\n        /** Authentication type */\r\n        this.AuthType_u32 = 0;\r\n        /** User name */\r\n        this.Username_str = \"\";\r\n        /** SHA-0 Hashed password. Valid only if ClientAuth_AuthType_u32 == SHA0_Hashed_Password (1). The SHA-0 hashed password must be caluclated by the SHA0(UpperCase(username_ascii_string) + password_ascii_string). */\r\n        this.HashedPassword_bin = new Uint8Array([]);\r\n        /** Plaintext Password. Valid only if ClientAuth_AuthType_u32 == PlainPassword (2). */\r\n        this.PlainPassword_str = \"\";\r\n        /** Client certificate. Valid only if ClientAuth_AuthType_u32 == Cert (3). */\r\n        this.ClientX_bin = new Uint8Array([]);\r\n        /** Client private key of the certificate. Valid only if ClientAuth_AuthType_u32 == Cert (3). */\r\n        this.ClientK_bin = new Uint8Array([]);\r\n        /** Security policy: Filter DHCP Packets (IPv4). All IPv4 DHCP packets in sessions defined this policy will be filtered. */\r\n        this[\"policy:DHCPFilter_bool\"] = false;\r\n        /** Security policy: Disallow DHCP Server Operation (IPv4). Computers connected to sessions that have this policy setting will not be allowed to become a DHCP server and distribute IPv4 addresses to DHCP clients. */\r\n        this[\"policy:DHCPNoServer_bool\"] = false;\r\n        /** Security policy: Enforce DHCP Allocated IP Addresses (IPv4). Computers in sessions that have this policy setting will only be able to use IPv4 addresses allocated by a DHCP server on the virtual network side. */\r\n        this[\"policy:DHCPForce_bool\"] = false;\r\n        /** Security policy: Prohibit the duplicate MAC address */\r\n        this.SecPol_CheckMac_bool = false;\r\n        /** Security policy: Prohibit a duplicate IP address (IPv4) */\r\n        this.SecPol_CheckIP_bool = false;\r\n        /** Security policy: Deny Non-ARP / Non-DHCP / Non-ICMPv6 broadcasts. The sending or receiving of broadcast packets that are not ARP protocol, DHCP protocol, nor ICMPv6 on the virtual network will not be allowed for sessions with this policy setting. */\r\n        this[\"policy:ArpDhcpOnly_bool\"] = false;\r\n        /** Security policy: Privacy Filter Mode. All direct communication between sessions with the privacy filter mode policy setting will be filtered. */\r\n        this[\"policy:PrivacyFilter_bool\"] = false;\r\n        /** Security policy: Deny Operation as TCP/IP Server (IPv4). Computers of sessions with this policy setting can't listen and accept TCP/IP connections in IPv4. */\r\n        this[\"policy:NoServer_bool\"] = false;\r\n        /** Security policy: Unlimited Number of Broadcasts. If a computer of a session with this policy setting sends broadcast packets of a number unusually larger than what would be considered normal on the virtual network, there will be no automatic limiting. */\r\n        this[\"policy:NoBroadcastLimiter_bool\"] = false;\r\n        /** Security policy: Maximum Number of MAC Addresses. For sessions with this policy setting, this limits the number of MAC addresses per session. */\r\n        this[\"policy:MaxMac_u32\"] = 0;\r\n        /** Security policy: Maximum Number of IP Addresses (IPv4). For sessions with this policy setting, this specifies the number of IPv4 addresses that can be registered for a single session. */\r\n        this[\"policy:MaxIP_u32\"] = 0;\r\n        /** Security policy: Upload Bandwidth. For sessions with this policy setting, this limits the traffic bandwidth that is in the inwards direction from outside to inside the Virtual Hub. */\r\n        this[\"policy:MaxUpload_u32\"] = 0;\r\n        /** Security policy: Download Bandwidth. For sessions with this policy setting, this limits the traffic bandwidth that is in the outwards direction from inside the Virtual Hub to outside the Virtual Hub. */\r\n        this[\"policy:MaxDownload_u32\"] = 0;\r\n        /** Security policy: Filter RS / RA Packets (IPv6). All ICMPv6 packets which the message-type is 133 (Router Solicitation) or 134 (Router Advertisement) in sessions defined this policy will be filtered. As a result, an IPv6 client will be unable to use IPv6 address prefix auto detection and IPv6 default gateway auto detection. */\r\n        this[\"policy:RSandRAFilter_bool\"] = false;\r\n        /** Security policy: Filter the router advertisement packet (IPv6) */\r\n        this.SecPol_RAFilter_bool = false;\r\n        /** Security policy: Filter DHCP Packets (IPv6). All IPv6 DHCP packets in sessions defined this policy will be filtered. */\r\n        this[\"policy:DHCPv6Filter_bool\"] = false;\r\n        /** Security policy: Disallow DHCP Server Operation (IPv6). Computers connected to sessions that have this policy setting will not be allowed to become a DHCP server and distribute IPv6 addresses to DHCP clients. */\r\n        this[\"policy:DHCPv6NoServer_bool\"] = false;\r\n        /** Security policy: Prohibit the duplicate IP address (IPv6) */\r\n        this.SecPol_CheckIPv6_bool = false;\r\n        /** Security policy: Deny Operation as TCP/IP Server (IPv6). Computers of sessions with this policy setting can't listen and accept TCP/IP connections in IPv6. */\r\n        this[\"policy:NoServerV6_bool\"] = false;\r\n        /** Security policy: Maximum Number of IP Addresses (IPv6). For sessions with this policy setting, this specifies the number of IPv6 addresses that can be registered for a single session. */\r\n        this[\"policy:MaxIPv6_u32\"] = 0;\r\n        /** Security policy: Filter All IPv4 Packets. All IPv4 and ARP packets in sessions defined this policy will be filtered. */\r\n        this[\"policy:FilterIPv4_bool\"] = false;\r\n        /** Security policy: Filter All IPv6 Packets. All IPv6 packets in sessions defined this policy will be filtered. */\r\n        this[\"policy:FilterIPv6_bool\"] = false;\r\n        /** Security policy: Filter All Non-IP Packets. All non-IP packets in sessions defined this policy will be filtered. \"Non-IP packet\" mean a packet which is not IPv4, ARP nor IPv6. Any tagged-VLAN packets via the Virtual Hub will be regarded as non-IP packets. */\r\n        this[\"policy:FilterNonIP_bool\"] = false;\r\n        /** Security policy: No Default-Router on IPv6 RA. In all VPN Sessions defines this policy, any IPv6 RA (Router Advertisement) packet with non-zero value in the router-lifetime will set to zero-value. This is effective to avoid the horrible behavior from the IPv6 routing confusion which is caused by the VPN client's attempts to use the remote-side IPv6 router as its local IPv6 router. */\r\n        this[\"policy:NoIPv6DefaultRouterInRA_bool\"] = false;\r\n        /** Security policy: VLAN ID (IEEE802.1Q). You can specify the VLAN ID on the security policy. All VPN Sessions defines this policy, all Ethernet packets toward the Virtual Hub from the user will be inserted a VLAN tag (IEEE 802.1Q) with the VLAN ID. The user can also receive only packets with a VLAN tag which has the same VLAN ID. (Receiving process removes the VLAN tag automatically.) Any Ethernet packets with any other VLAN IDs or non-VLAN packets will not be received. All VPN Sessions without this policy definition can send / receive any kinds of Ethernet packets regardless of VLAN tags, and VLAN tags are not inserted or removed automatically. Any tagged-VLAN packets via the Virtual Hub will be regarded as non-IP packets. Therefore, tagged-VLAN packets are not subjects for IPv4 / IPv6 security policies, access lists nor other IPv4 / IPv6 specific deep processing. */\r\n        this[\"policy:VLanId_u32\"] = 0;\r\n        /** Security policy: Whether version 3.0 (must be true) */\r\n        this[\"policy:Ver3_bool\"] = false;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcCreateLink;\r\n}());\r\nexports.VpnRpcCreateLink = VpnRpcCreateLink;\r\n/** Listener */\r\nvar VpnRpcListener = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcListener' class: Listener */\r\n    function VpnRpcListener(init) {\r\n        /** Port number (Range: 1 - 65535) */\r\n        this.Port_u32 = 0;\r\n        /** Active state */\r\n        this.Enable_bool = false;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcListener;\r\n}());\r\nexports.VpnRpcListener = VpnRpcListener;\r\n/** User authentication type (server side) */\r\nvar VpnRpcUserAuthType;\r\n(function (VpnRpcUserAuthType) {\r\n    /** Anonymous authentication */\r\n    VpnRpcUserAuthType[VpnRpcUserAuthType[\"Anonymous\"] = 0] = \"Anonymous\";\r\n    /** Password authentication */\r\n    VpnRpcUserAuthType[VpnRpcUserAuthType[\"Password\"] = 1] = \"Password\";\r\n    /** User certificate authentication */\r\n    VpnRpcUserAuthType[VpnRpcUserAuthType[\"UserCert\"] = 2] = \"UserCert\";\r\n    /** Root certificate which is issued by trusted Certificate Authority */\r\n    VpnRpcUserAuthType[VpnRpcUserAuthType[\"RootCert\"] = 3] = \"RootCert\";\r\n    /** Radius authentication */\r\n    VpnRpcUserAuthType[VpnRpcUserAuthType[\"Radius\"] = 4] = \"Radius\";\r\n    /** Windows NT authentication */\r\n    VpnRpcUserAuthType[VpnRpcUserAuthType[\"NTDomain\"] = 5] = \"NTDomain\";\r\n})(VpnRpcUserAuthType = exports.VpnRpcUserAuthType || (exports.VpnRpcUserAuthType = {}));\r\n/** Create, configure, and get the user */\r\nvar VpnRpcSetUser = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcSetUser' class: Create, configure, and get the user */\r\n    function VpnRpcSetUser(init) {\r\n        /** The Virtual Hub name */\r\n        this.HubName_str = \"\";\r\n        /** Specify the user name of the user */\r\n        this.Name_str = \"\";\r\n        /** Assigned group name for the user */\r\n        this.GroupName_str = \"\";\r\n        /** Optional real name (full name) of the user, allow using any Unicode characters */\r\n        this.Realname_utf = \"\";\r\n        /** Optional User Description */\r\n        this.Note_utf = \"\";\r\n        /** Creation date and time */\r\n        this.CreatedTime_dt = new Date();\r\n        /** Last modified date and time */\r\n        this.UpdatedTime_dt = new Date();\r\n        /** Expiration date and time */\r\n        this.ExpireTime_dt = new Date();\r\n        /** Authentication method of the user */\r\n        this.AuthType_u32 = 0;\r\n        /** User password, valid only if AuthType_u32 == Password(1). Valid only to create or set operations. */\r\n        this.Auth_Password_str = \"\";\r\n        /** User certificate, valid only if AuthType_u32 == UserCert(2). */\r\n        this.UserX_bin = new Uint8Array([]);\r\n        /** Certificate Serial Number, optional, valid only if AuthType_u32 == RootCert(3). */\r\n        this.Serial_bin = new Uint8Array([]);\r\n        /** Certificate Common Name, optional, valid only if AuthType_u32 == RootCert(3). */\r\n        this.CommonName_utf = \"\";\r\n        /** Username in RADIUS server, optional, valid only if AuthType_u32 == Radius(4). */\r\n        this.RadiusUsername_utf = \"\";\r\n        /** Username in NT Domain server, optional, valid only if AuthType_u32 == NT(5). */\r\n        this.NtUsername_utf = \"\";\r\n        /** Number of total logins of the user */\r\n        this.NumLogin_u32 = 0;\r\n        /** Number of broadcast packets (Recv) */\r\n        this[\"Recv.BroadcastBytes_u64\"] = 0;\r\n        /** Broadcast bytes (Recv) */\r\n        this[\"Recv.BroadcastCount_u64\"] = 0;\r\n        /** Unicast count (Recv) */\r\n        this[\"Recv.UnicastBytes_u64\"] = 0;\r\n        /** Unicast bytes (Recv) */\r\n        this[\"Recv.UnicastCount_u64\"] = 0;\r\n        /** Number of broadcast packets (Send) */\r\n        this[\"Send.BroadcastBytes_u64\"] = 0;\r\n        /** Broadcast bytes (Send) */\r\n        this[\"Send.BroadcastCount_u64\"] = 0;\r\n        /** Unicast bytes (Send) */\r\n        this[\"Send.UnicastBytes_u64\"] = 0;\r\n        /** Unicast bytes (Send) */\r\n        this[\"Send.UnicastCount_u64\"] = 0;\r\n        /** The flag whether to use security policy */\r\n        this.UsePolicy_bool = false;\r\n        /** Security policy: Allow Access. The users, which this policy value is true, have permission to make VPN connection to VPN Server. */\r\n        this[\"policy:Access_bool\"] = false;\r\n        /** Security policy: Filter DHCP Packets (IPv4). All IPv4 DHCP packets in sessions defined this policy will be filtered. */\r\n        this[\"policy:DHCPFilter_bool\"] = false;\r\n        /** Security policy: Disallow DHCP Server Operation (IPv4). Computers connected to sessions that have this policy setting will not be allowed to become a DHCP server and distribute IPv4 addresses to DHCP clients. */\r\n        this[\"policy:DHCPNoServer_bool\"] = false;\r\n        /** Security policy: Enforce DHCP Allocated IP Addresses (IPv4). Computers in sessions that have this policy setting will only be able to use IPv4 addresses allocated by a DHCP server on the virtual network side. */\r\n        this[\"policy:DHCPForce_bool\"] = false;\r\n        /** Security policy: Deny Bridge Operation. Bridge-mode connections are denied for user sessions that have this policy setting. Even in cases when the Ethernet Bridge is configured in the client side, communication will not be possible. */\r\n        this[\"policy:NoBridge_bool\"] = false;\r\n        /** Security policy: Deny Routing Operation (IPv4). IPv4 routing will be denied for sessions that have this policy setting. Even in the case where the IP router is operating on the user client side, communication will not be possible. */\r\n        this[\"policy:NoRouting_bool\"] = false;\r\n        /** Security policy: Deny MAC Addresses Duplication. The use of duplicating MAC addresses that are in use by computers of different sessions cannot be used by sessions with this policy setting. */\r\n        this[\"policy:CheckMac_bool\"] = false;\r\n        /** Security policy: Deny IP Address Duplication (IPv4). The use of duplicating IPv4 addresses that are in use by computers of different sessions cannot be used by sessions with this policy setting. */\r\n        this[\"policy:CheckIP_bool\"] = false;\r\n        /** Security policy: Deny Non-ARP / Non-DHCP / Non-ICMPv6 broadcasts. The sending or receiving of broadcast packets that are not ARP protocol, DHCP protocol, nor ICMPv6 on the virtual network will not be allowed for sessions with this policy setting. */\r\n        this[\"policy:ArpDhcpOnly_bool\"] = false;\r\n        /** Security policy: Privacy Filter Mode. All direct communication between sessions with the privacy filter mode policy setting will be filtered. */\r\n        this[\"policy:PrivacyFilter_bool\"] = false;\r\n        /** Security policy: Deny Operation as TCP/IP Server (IPv4). Computers of sessions with this policy setting can't listen and accept TCP/IP connections in IPv4. */\r\n        this[\"policy:NoServer_bool\"] = false;\r\n        /** Security policy: Unlimited Number of Broadcasts. If a computer of a session with this policy setting sends broadcast packets of a number unusually larger than what would be considered normal on the virtual network, there will be no automatic limiting. */\r\n        this[\"policy:NoBroadcastLimiter_bool\"] = false;\r\n        /** Security policy: Allow Monitoring Mode. Users with this policy setting will be granted to connect to the Virtual Hub in Monitoring Mode. Sessions in Monitoring Mode are able to monitor (tap) all packets flowing through the Virtual Hub. */\r\n        this[\"policy:MonitorPort_bool\"] = false;\r\n        /** Security policy: Maximum Number of TCP Connections. For sessions with this policy setting, this sets the maximum number of physical TCP connections consists in a physical VPN session. */\r\n        this[\"policy:MaxConnection_u32\"] = 0;\r\n        /** Security policy: Time-out Period. For sessions with this policy setting, this sets, in seconds, the time-out period to wait before disconnecting a session when communication trouble occurs between the VPN Client / VPN Server. */\r\n        this[\"policy:TimeOut_u32\"] = 0;\r\n        /** Security policy: Maximum Number of MAC Addresses. For sessions with this policy setting, this limits the number of MAC addresses per session. */\r\n        this[\"policy:MaxMac_u32\"] = 0;\r\n        /** Security policy: Maximum Number of IP Addresses (IPv4). For sessions with this policy setting, this specifies the number of IPv4 addresses that can be registered for a single session. */\r\n        this[\"policy:MaxIP_u32\"] = 0;\r\n        /** Security policy: Upload Bandwidth. For sessions with this policy setting, this limits the traffic bandwidth that is in the inwards direction from outside to inside the Virtual Hub. */\r\n        this[\"policy:MaxUpload_u32\"] = 0;\r\n        /** Security policy: Download Bandwidth. For sessions with this policy setting, this limits the traffic bandwidth that is in the outwards direction from inside the Virtual Hub to outside the Virtual Hub. */\r\n        this[\"policy:MaxDownload_u32\"] = 0;\r\n        /** Security policy: Deny Changing Password. The users which use password authentication with this policy setting are not allowed to change their own password from the VPN Client Manager or similar. */\r\n        this[\"policy:FixPassword_bool\"] = false;\r\n        /** Security policy: Maximum Number of Multiple Logins. Users with this policy setting are unable to have more than this number of concurrent logins. Bridge Mode sessions are not subjects to this policy. */\r\n        this[\"policy:MultiLogins_u32\"] = 0;\r\n        /** Security policy: Deny VoIP / QoS Function. Users with this security policy are unable to use VoIP / QoS functions in VPN connection sessions. */\r\n        this[\"policy:NoQoS_bool\"] = false;\r\n        /** Security policy: Filter RS / RA Packets (IPv6). All ICMPv6 packets which the message-type is 133 (Router Solicitation) or 134 (Router Advertisement) in sessions defined this policy will be filtered. As a result, an IPv6 client will be unable to use IPv6 address prefix auto detection and IPv6 default gateway auto detection. */\r\n        this[\"policy:RSandRAFilter_bool\"] = false;\r\n        /** Security policy: Filter RA Packets (IPv6). All ICMPv6 packets which the message-type is 134 (Router Advertisement) in sessions defined this policy will be filtered. As a result, a malicious users will be unable to spread illegal IPv6 prefix or default gateway advertisements on the network. */\r\n        this[\"policy:RAFilter_bool\"] = false;\r\n        /** Security policy: Filter DHCP Packets (IPv6). All IPv6 DHCP packets in sessions defined this policy will be filtered. */\r\n        this[\"policy:DHCPv6Filter_bool\"] = false;\r\n        /** Security policy: Disallow DHCP Server Operation (IPv6). Computers connected to sessions that have this policy setting will not be allowed to become a DHCP server and distribute IPv6 addresses to DHCP clients. */\r\n        this[\"policy:DHCPv6NoServer_bool\"] = false;\r\n        /** Security policy: Deny Routing Operation (IPv6). IPv6 routing will be denied for sessions that have this policy setting. Even in the case where the IP router is operating on the user client side, communication will not be possible. */\r\n        this[\"policy:NoRoutingV6_bool\"] = false;\r\n        /** Security policy: Deny IP Address Duplication (IPv6). The use of duplicating IPv6 addresses that are in use by computers of different sessions cannot be used by sessions with this policy setting. */\r\n        this[\"policy:CheckIPv6_bool\"] = false;\r\n        /** Security policy: Deny Operation as TCP/IP Server (IPv6). Computers of sessions with this policy setting can't listen and accept TCP/IP connections in IPv6. */\r\n        this[\"policy:NoServerV6_bool\"] = false;\r\n        /** Security policy: Maximum Number of IP Addresses (IPv6). For sessions with this policy setting, this specifies the number of IPv6 addresses that can be registered for a single session. */\r\n        this[\"policy:MaxIPv6_u32\"] = 0;\r\n        /** Security policy: Disallow Password Save in VPN Client. For users with this policy setting, when the user is using *standard* password authentication, the user will be unable to save the password in VPN Client. The user will be required to input passwords for every time to connect a VPN. This will improve the security. If this policy is enabled, VPN Client Version 2.0 will be denied to access. */\r\n        this[\"policy:NoSavePassword_bool\"] = false;\r\n        /** Security policy: VPN Client Automatic Disconnect. For users with this policy setting, a user's VPN session will be disconnected automatically after the specific period will elapse. In this case no automatic re-connection will be performed. This can prevent a lot of inactive VPN Sessions. If this policy is enabled, VPN Client Version 2.0 will be denied to access. */\r\n        this[\"policy:AutoDisconnect_u32\"] = 0;\r\n        /** Security policy: Filter All IPv4 Packets. All IPv4 and ARP packets in sessions defined this policy will be filtered. */\r\n        this[\"policy:FilterIPv4_bool\"] = false;\r\n        /** Security policy: Filter All IPv6 Packets. All IPv6 packets in sessions defined this policy will be filtered. */\r\n        this[\"policy:FilterIPv6_bool\"] = false;\r\n        /** Security policy: Filter All Non-IP Packets. All non-IP packets in sessions defined this policy will be filtered. \"Non-IP packet\" mean a packet which is not IPv4, ARP nor IPv6. Any tagged-VLAN packets via the Virtual Hub will be regarded as non-IP packets. */\r\n        this[\"policy:FilterNonIP_bool\"] = false;\r\n        /** Security policy: No Default-Router on IPv6 RA. In all VPN Sessions defines this policy, any IPv6 RA (Router Advertisement) packet with non-zero value in the router-lifetime will set to zero-value. This is effective to avoid the horrible behavior from the IPv6 routing confusion which is caused by the VPN client's attempts to use the remote-side IPv6 router as its local IPv6 router. */\r\n        this[\"policy:NoIPv6DefaultRouterInRA_bool\"] = false;\r\n        /** Security policy: No Default-Router on IPv6 RA (physical IPv6). In all VPN Sessions defines this policy (only when the physical communication protocol between VPN Client / VPN Bridge and VPN Server is IPv6), any IPv6 RA (Router Advertisement) packet with non-zero value in the router-lifetime will set to zero-value. This is effective to avoid the horrible behavior from the IPv6 routing confusion which is caused by the VPN client's attempts to use the remote-side IPv6 router as its local IPv6 router. */\r\n        this[\"policy:NoIPv6DefaultRouterInRAWhenIPv6_bool\"] = false;\r\n        /** Security policy: VLAN ID (IEEE802.1Q). You can specify the VLAN ID on the security policy. All VPN Sessions defines this policy, all Ethernet packets toward the Virtual Hub from the user will be inserted a VLAN tag (IEEE 802.1Q) with the VLAN ID. The user can also receive only packets with a VLAN tag which has the same VLAN ID. (Receiving process removes the VLAN tag automatically.) Any Ethernet packets with any other VLAN IDs or non-VLAN packets will not be received. All VPN Sessions without this policy definition can send / receive any kinds of Ethernet packets regardless of VLAN tags, and VLAN tags are not inserted or removed automatically. Any tagged-VLAN packets via the Virtual Hub will be regarded as non-IP packets. Therefore, tagged-VLAN packets are not subjects for IPv4 / IPv6 security policies, access lists nor other IPv4 / IPv6 specific deep processing. */\r\n        this[\"policy:VLanId_u32\"] = 0;\r\n        /** Security policy: Whether version 3.0 (must be true) */\r\n        this[\"policy:Ver3_bool\"] = false;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcSetUser;\r\n}());\r\nexports.VpnRpcSetUser = VpnRpcSetUser;\r\n/** Delete the access list */\r\nvar VpnRpcDeleteAccess = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcDeleteAccess' class: Delete the access list */\r\n    function VpnRpcDeleteAccess(init) {\r\n        /** The Virtual Hub name */\r\n        this.HubName_str = \"\";\r\n        /** ID */\r\n        this.Id_u32 = 0;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcDeleteAccess;\r\n}());\r\nexports.VpnRpcDeleteAccess = VpnRpcDeleteAccess;\r\n/** Delete the CA of HUB */\r\nvar VpnRpcHubDeleteCA = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcHubDeleteCA' class: Delete the CA of HUB */\r\n    function VpnRpcHubDeleteCA(init) {\r\n        /** The Virtual Hub name */\r\n        this.HubName_str = \"\";\r\n        /** Certificate key id to be deleted */\r\n        this.Key_u32 = 0;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcHubDeleteCA;\r\n}());\r\nexports.VpnRpcHubDeleteCA = VpnRpcHubDeleteCA;\r\n/** Deleting a user or group */\r\nvar VpnRpcDeleteUser = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcDeleteUser' class: Deleting a user or group */\r\n    function VpnRpcDeleteUser(init) {\r\n        /** The Virtual Hub name */\r\n        this.HubName_str = \"\";\r\n        /** User or group name */\r\n        this.Name_str = \"\";\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcDeleteUser;\r\n}());\r\nexports.VpnRpcDeleteUser = VpnRpcDeleteUser;\r\n/** Delete the HUB */\r\nvar VpnRpcDeleteHub = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcDeleteHub' class: Delete the HUB */\r\n    function VpnRpcDeleteHub(init) {\r\n        /** The Virtual Hub name */\r\n        this.HubName_str = \"\";\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcDeleteHub;\r\n}());\r\nexports.VpnRpcDeleteHub = VpnRpcDeleteHub;\r\n/** Delete the table */\r\nvar VpnRpcDeleteTable = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcDeleteTable' class: Delete the table */\r\n    function VpnRpcDeleteTable(init) {\r\n        /** The Virtual Hub name */\r\n        this.HubName_str = \"\";\r\n        /** Key ID */\r\n        this.Key_u32 = 0;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcDeleteTable;\r\n}());\r\nexports.VpnRpcDeleteTable = VpnRpcDeleteTable;\r\n/** Specify the Link */\r\nvar VpnRpcLink = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcLink' class: Specify the Link */\r\n    function VpnRpcLink(init) {\r\n        /** The Virtual Hub name */\r\n        this.HubName_str = \"\";\r\n        /** The name of the cascade connection */\r\n        this.AccountName_utf = \"\";\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcLink;\r\n}());\r\nexports.VpnRpcLink = VpnRpcLink;\r\n/** Disconnect the session */\r\nvar VpnRpcDeleteSession = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcDeleteSession' class: Disconnect the session */\r\n    function VpnRpcDeleteSession(init) {\r\n        /** The Virtual Hub name */\r\n        this.HubName_str = \"\";\r\n        /** Session name */\r\n        this.Name_str = \"\";\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcDeleteSession;\r\n}());\r\nexports.VpnRpcDeleteSession = VpnRpcDeleteSession;\r\n/** Specify the HUB */\r\nvar VpnRpcHub = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcHub' class: Specify the HUB */\r\n    function VpnRpcHub(init) {\r\n        /** The Virtual Hub name */\r\n        this.HubName_str = \"\";\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcHub;\r\n}());\r\nexports.VpnRpcHub = VpnRpcHub;\r\n/** Disconnect a connection */\r\nvar VpnRpcDisconnectConnection = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcDisconnectConnection' class: Disconnect a connection */\r\n    function VpnRpcDisconnectConnection(init) {\r\n        /** Connection name */\r\n        this.Name_str = \"\";\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcDisconnectConnection;\r\n}());\r\nexports.VpnRpcDisconnectConnection = VpnRpcDisconnectConnection;\r\n/** Enumeration of the access list */\r\nvar VpnRpcEnumAccessList = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcEnumAccessList' class: Enumeration of the access list */\r\n    function VpnRpcEnumAccessList(init) {\r\n        /** The Virtual Hub name */\r\n        this.HubName_str = \"\";\r\n        /** Access list */\r\n        this.AccessList = [];\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcEnumAccessList;\r\n}());\r\nexports.VpnRpcEnumAccessList = VpnRpcEnumAccessList;\r\n/** CA enumeration items of HUB */\r\nvar VpnRpcHubEnumCAItem = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcHubEnumCAItem' class: CA enumeration items of HUB */\r\n    function VpnRpcHubEnumCAItem(init) {\r\n        /** The key id of the item */\r\n        this.Key_u32 = 0;\r\n        /** Subject */\r\n        this.SubjectName_utf = \"\";\r\n        /** Issuer */\r\n        this.IssuerName_utf = \"\";\r\n        /** Expiration date */\r\n        this.Expires_dt = new Date();\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcHubEnumCAItem;\r\n}());\r\nexports.VpnRpcHubEnumCAItem = VpnRpcHubEnumCAItem;\r\n/** CA enumeration of HUB */\r\nvar VpnRpcHubEnumCA = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcHubEnumCA' class: CA enumeration of HUB */\r\n    function VpnRpcHubEnumCA(init) {\r\n        /** The Virtual Hub name */\r\n        this.HubName_str = \"\";\r\n        /** The list of CA */\r\n        this.CAList = [];\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcHubEnumCA;\r\n}());\r\nexports.VpnRpcHubEnumCA = VpnRpcHubEnumCA;\r\n/** Type of connection */\r\nvar VpnRpcConnectionType;\r\n(function (VpnRpcConnectionType) {\r\n    /** VPN Client */\r\n    VpnRpcConnectionType[VpnRpcConnectionType[\"Client\"] = 0] = \"Client\";\r\n    /** During initialization */\r\n    VpnRpcConnectionType[VpnRpcConnectionType[\"Init\"] = 1] = \"Init\";\r\n    /** Login connection */\r\n    VpnRpcConnectionType[VpnRpcConnectionType[\"Login\"] = 2] = \"Login\";\r\n    /** Additional connection */\r\n    VpnRpcConnectionType[VpnRpcConnectionType[\"Additional\"] = 3] = \"Additional\";\r\n    /** RPC for server farm */\r\n    VpnRpcConnectionType[VpnRpcConnectionType[\"FarmRpc\"] = 4] = \"FarmRpc\";\r\n    /** RPC for Management */\r\n    VpnRpcConnectionType[VpnRpcConnectionType[\"AdminRpc\"] = 5] = \"AdminRpc\";\r\n    /** HUB enumeration */\r\n    VpnRpcConnectionType[VpnRpcConnectionType[\"EnumHub\"] = 6] = \"EnumHub\";\r\n    /** Password change */\r\n    VpnRpcConnectionType[VpnRpcConnectionType[\"Password\"] = 7] = \"Password\";\r\n    /** SSTP */\r\n    VpnRpcConnectionType[VpnRpcConnectionType[\"SSTP\"] = 8] = \"SSTP\";\r\n    /** OpenVPN */\r\n    VpnRpcConnectionType[VpnRpcConnectionType[\"OpenVPN\"] = 9] = \"OpenVPN\";\r\n})(VpnRpcConnectionType = exports.VpnRpcConnectionType || (exports.VpnRpcConnectionType = {}));\r\n/** Connection enumeration items */\r\nvar VpnRpcEnumConnectionItem = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcEnumConnectionItem' class: Connection enumeration items */\r\n    function VpnRpcEnumConnectionItem(init) {\r\n        /** Connection name */\r\n        this.Name_str = \"\";\r\n        /** Host name */\r\n        this.Hostname_str = \"\";\r\n        /** IP address */\r\n        this.Ip_ip = \"\";\r\n        /** Port number */\r\n        this.Port_u32 = 0;\r\n        /** Connected time */\r\n        this.ConnectedTime_dt = new Date();\r\n        /** Connection type */\r\n        this.Type_u32 = 0;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcEnumConnectionItem;\r\n}());\r\nexports.VpnRpcEnumConnectionItem = VpnRpcEnumConnectionItem;\r\n/** Connection enumeration */\r\nvar VpnRpcEnumConnection = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcEnumConnection' class: Connection enumeration */\r\n    function VpnRpcEnumConnection(init) {\r\n        /** Number of connections */\r\n        this.NumConnection_u32 = 0;\r\n        /** Connection list */\r\n        this.ConnectionList = [];\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcEnumConnection;\r\n}());\r\nexports.VpnRpcEnumConnection = VpnRpcEnumConnection;\r\n/** Enum CRL Item */\r\nvar VpnRpcEnumCrlItem = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcEnumCrlItem' class: Enum CRL Item */\r\n    function VpnRpcEnumCrlItem(init) {\r\n        /** Key ID */\r\n        this.Key_u32 = 0;\r\n        /** The contents of the CRL item */\r\n        this.CrlInfo_utf = \"\";\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcEnumCrlItem;\r\n}());\r\nexports.VpnRpcEnumCrlItem = VpnRpcEnumCrlItem;\r\n/** Enum CRL */\r\nvar VpnRpcEnumCrl = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcEnumCrl' class: Enum CRL */\r\n    function VpnRpcEnumCrl(init) {\r\n        /** The Virtual Hub name */\r\n        this.HubName_str = \"\";\r\n        /** CRL list */\r\n        this.CRLList = [];\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcEnumCrl;\r\n}());\r\nexports.VpnRpcEnumCrl = VpnRpcEnumCrl;\r\n/** RPC_ENUM_DHCP_ITEM */\r\nvar VpnRpcEnumDhcpItem = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcEnumDhcpItem' class: RPC_ENUM_DHCP_ITEM */\r\n    function VpnRpcEnumDhcpItem(init) {\r\n        /** ID */\r\n        this.Id_u32 = 0;\r\n        /** Lease time */\r\n        this.LeasedTime_dt = new Date();\r\n        /** Expiration date */\r\n        this.ExpireTime_dt = new Date();\r\n        /** MAC address */\r\n        this.MacAddress_bin = new Uint8Array([]);\r\n        /** IP address */\r\n        this.IpAddress_ip = \"\";\r\n        /** Subnet mask */\r\n        this.Mask_u32 = 0;\r\n        /** Host name */\r\n        this.Hostname_str = \"\";\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcEnumDhcpItem;\r\n}());\r\nexports.VpnRpcEnumDhcpItem = VpnRpcEnumDhcpItem;\r\n/** RPC_ENUM_DHCP */\r\nvar VpnRpcEnumDhcp = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcEnumDhcp' class: RPC_ENUM_DHCP */\r\n    function VpnRpcEnumDhcp(init) {\r\n        /** Virtual Hub Name */\r\n        this.HubName_str = \"\";\r\n        /** DHCP Item */\r\n        this.DhcpTable = [];\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcEnumDhcp;\r\n}());\r\nexports.VpnRpcEnumDhcp = VpnRpcEnumDhcp;\r\n/** EtherIP setting list */\r\nvar VpnRpcEnumEtherIpId = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcEnumEtherIpId' class: EtherIP setting list */\r\n    function VpnRpcEnumEtherIpId(init) {\r\n        /** Setting list */\r\n        this.Settings = [];\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcEnumEtherIpId;\r\n}());\r\nexports.VpnRpcEnumEtherIpId = VpnRpcEnumEtherIpId;\r\n/** Ethernet Network Adapters list item */\r\nvar VpnRpcEnumEthItem = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcEnumEthItem' class: Ethernet Network Adapters list item */\r\n    function VpnRpcEnumEthItem(init) {\r\n        /** Device name */\r\n        this.DeviceName_str = \"\";\r\n        /** Network connection name (description) */\r\n        this.NetworkConnectionName_utf = \"\";\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcEnumEthItem;\r\n}());\r\nexports.VpnRpcEnumEthItem = VpnRpcEnumEthItem;\r\n/** Ethernet Network Adapters list */\r\nvar VpnRpcEnumEth = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcEnumEth' class: Ethernet Network Adapters list */\r\n    function VpnRpcEnumEth(init) {\r\n        /** Ethernet Network Adapters list */\r\n        this.EthList = [];\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcEnumEth;\r\n}());\r\nexports.VpnRpcEnumEth = VpnRpcEnumEth;\r\n/** Server farm members enumeration items */\r\nvar VpnRpcEnumFarmItem = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcEnumFarmItem' class: Server farm members enumeration items */\r\n    function VpnRpcEnumFarmItem(init) {\r\n        /** ID */\r\n        this.Id_u32 = 0;\r\n        /** Controller */\r\n        this.Controller_bool = false;\r\n        /** Connection time */\r\n        this.ConnectedTime_dt = new Date();\r\n        /** IP address */\r\n        this.Ip_ip = \"\";\r\n        /** Host name */\r\n        this.Hostname_str = \"\";\r\n        /** Point */\r\n        this.Point_u32 = 0;\r\n        /** Number of sessions */\r\n        this.NumSessions_u32 = 0;\r\n        /** Number of TCP connections */\r\n        this.NumTcpConnections_u32 = 0;\r\n        /** Number of HUBs */\r\n        this.NumHubs_u32 = 0;\r\n        /** Number of assigned client licenses */\r\n        this.AssignedClientLicense_u32 = 0;\r\n        /** Number of assigned bridge licenses */\r\n        this.AssignedBridgeLicense_u32 = 0;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcEnumFarmItem;\r\n}());\r\nexports.VpnRpcEnumFarmItem = VpnRpcEnumFarmItem;\r\n/** Server farm member enumeration */\r\nvar VpnRpcEnumFarm = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcEnumFarm' class: Server farm member enumeration */\r\n    function VpnRpcEnumFarm(init) {\r\n        /** Number of Cluster Members */\r\n        this.NumFarm_u32 = 0;\r\n        /** Cluster Members list */\r\n        this.FarmMemberList = [];\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcEnumFarm;\r\n}());\r\nexports.VpnRpcEnumFarm = VpnRpcEnumFarm;\r\n/** Enumeration items in the group */\r\nvar VpnRpcEnumGroupItem = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcEnumGroupItem' class: Enumeration items in the group */\r\n    function VpnRpcEnumGroupItem(init) {\r\n        /** User name */\r\n        this.Name_str = \"\";\r\n        /** Real name */\r\n        this.Realname_utf = \"\";\r\n        /** Note */\r\n        this.Note_utf = \"\";\r\n        /** Number of users */\r\n        this.NumUsers_u32 = 0;\r\n        /** Access denied */\r\n        this.DenyAccess_bool = false;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcEnumGroupItem;\r\n}());\r\nexports.VpnRpcEnumGroupItem = VpnRpcEnumGroupItem;\r\n/** Group enumeration */\r\nvar VpnRpcEnumGroup = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcEnumGroup' class: Group enumeration */\r\n    function VpnRpcEnumGroup(init) {\r\n        /** The Virtual Hub name */\r\n        this.HubName_str = \"\";\r\n        /** Group list */\r\n        this.GroupList = [];\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcEnumGroup;\r\n}());\r\nexports.VpnRpcEnumGroup = VpnRpcEnumGroup;\r\n/** Enumeration items of HUB */\r\nvar VpnRpcEnumHubItem = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcEnumHubItem' class: Enumeration items of HUB */\r\n    function VpnRpcEnumHubItem(init) {\r\n        /** The name of the Virtual Hub */\r\n        this.HubName_str = \"\";\r\n        /** Online state */\r\n        this.Online_bool = false;\r\n        /** Type of HUB (Valid only for Clustered VPN Servers) */\r\n        this.HubType_u32 = 0;\r\n        /** Number of users */\r\n        this.NumUsers_u32 = 0;\r\n        /** Number of registered groups */\r\n        this.NumGroups_u32 = 0;\r\n        /** Number of registered sessions */\r\n        this.NumSessions_u32 = 0;\r\n        /** Number of current MAC table entries */\r\n        this.NumMacTables_u32 = 0;\r\n        /** Number of current IP table entries */\r\n        this.NumIpTables_u32 = 0;\r\n        /** Last communication date and time */\r\n        this.LastCommTime_dt = new Date();\r\n        /** Last login date and time */\r\n        this.LastLoginTime_dt = new Date();\r\n        /** Creation date and time */\r\n        this.CreatedTime_dt = new Date();\r\n        /** Number of accumulated logins */\r\n        this.NumLogin_u32 = 0;\r\n        /** Whether the traffic information is provided */\r\n        this.IsTrafficFilled_bool = false;\r\n        /** Number of broadcast packets (Recv) */\r\n        this[\"Ex.Recv.BroadcastBytes_u64\"] = 0;\r\n        /** Broadcast bytes (Recv) */\r\n        this[\"Ex.Recv.BroadcastCount_u64\"] = 0;\r\n        /** Unicast count (Recv) */\r\n        this[\"Ex.Recv.UnicastBytes_u64\"] = 0;\r\n        /** Unicast bytes (Recv) */\r\n        this[\"Ex.Recv.UnicastCount_u64\"] = 0;\r\n        /** Number of broadcast packets (Send) */\r\n        this[\"Ex.Send.BroadcastBytes_u64\"] = 0;\r\n        /** Broadcast bytes (Send) */\r\n        this[\"Ex.Send.BroadcastCount_u64\"] = 0;\r\n        /** Unicast bytes (Send) */\r\n        this[\"Ex.Send.UnicastBytes_u64\"] = 0;\r\n        /** Unicast bytes (Send) */\r\n        this[\"Ex.Send.UnicastCount_u64\"] = 0;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcEnumHubItem;\r\n}());\r\nexports.VpnRpcEnumHubItem = VpnRpcEnumHubItem;\r\n/** Enumeration of HUB */\r\nvar VpnRpcEnumHub = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcEnumHub' class: Enumeration of HUB */\r\n    function VpnRpcEnumHub(init) {\r\n        /** Number of Virtual Hubs */\r\n        this.NumHub_u32 = 0;\r\n        /** Virtual Hubs */\r\n        this.HubList = [];\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcEnumHub;\r\n}());\r\nexports.VpnRpcEnumHub = VpnRpcEnumHub;\r\n/** Enumeration items of IP table */\r\nvar VpnRpcEnumIpTableItem = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcEnumIpTableItem' class: Enumeration items of IP table */\r\n    function VpnRpcEnumIpTableItem(init) {\r\n        /** Key ID */\r\n        this.Key_u32 = 0;\r\n        /** Session name */\r\n        this.SessionName_str = \"\";\r\n        /** IP address */\r\n        this.IpAddress_ip = \"\";\r\n        /** Assigned by the DHCP */\r\n        this.DhcpAllocated_bool = false;\r\n        /** Creation date and time */\r\n        this.CreatedTime_dt = new Date();\r\n        /** Updating date */\r\n        this.UpdatedTime_dt = new Date();\r\n        /** Remote items */\r\n        this.RemoteItem_bool = false;\r\n        /** Remote host name */\r\n        this.RemoteHostname_str = \"\";\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcEnumIpTableItem;\r\n}());\r\nexports.VpnRpcEnumIpTableItem = VpnRpcEnumIpTableItem;\r\n/** Enumeration of IP table */\r\nvar VpnRpcEnumIpTable = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcEnumIpTable' class: Enumeration of IP table */\r\n    function VpnRpcEnumIpTable(init) {\r\n        /** The Virtual Hub name */\r\n        this.HubName_str = \"\";\r\n        /** MAC table */\r\n        this.IpTable = [];\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcEnumIpTable;\r\n}());\r\nexports.VpnRpcEnumIpTable = VpnRpcEnumIpTable;\r\n/** Layer-3 interface enumeration */\r\nvar VpnRpcEnumL3If = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcEnumL3If' class: Layer-3 interface enumeration */\r\n    function VpnRpcEnumL3If(init) {\r\n        /** Layer-3 switch name */\r\n        this.Name_str = \"\";\r\n        /** Layer-3 interface list */\r\n        this.L3IFList = [];\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcEnumL3If;\r\n}());\r\nexports.VpnRpcEnumL3If = VpnRpcEnumL3If;\r\n/** Layer-3 switch enumeration item */\r\nvar VpnRpcEnumL3SwItem = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcEnumL3SwItem' class: Layer-3 switch enumeration item */\r\n    function VpnRpcEnumL3SwItem(init) {\r\n        /** Name of the layer-3 switch */\r\n        this.Name_str = \"\";\r\n        /** Number of layer-3 switch virtual interfaces */\r\n        this.NumInterfaces_u32 = 0;\r\n        /** Number of routing tables */\r\n        this.NumTables_u32 = 0;\r\n        /** Activated flag */\r\n        this.Active_bool = false;\r\n        /** Online flag */\r\n        this.Online_bool = false;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcEnumL3SwItem;\r\n}());\r\nexports.VpnRpcEnumL3SwItem = VpnRpcEnumL3SwItem;\r\n/** Layer-3 switch enumeration */\r\nvar VpnRpcEnumL3Sw = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcEnumL3Sw' class: Layer-3 switch enumeration */\r\n    function VpnRpcEnumL3Sw(init) {\r\n        /** Layer-3 switch list */\r\n        this.L3SWList = [];\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcEnumL3Sw;\r\n}());\r\nexports.VpnRpcEnumL3Sw = VpnRpcEnumL3Sw;\r\n/** Routing table enumeration */\r\nvar VpnRpcEnumL3Table = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcEnumL3Table' class: Routing table enumeration */\r\n    function VpnRpcEnumL3Table(init) {\r\n        /** L3 switch name */\r\n        this.Name_str = \"\";\r\n        /** Routing table item list */\r\n        this.L3Table = [];\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcEnumL3Table;\r\n}());\r\nexports.VpnRpcEnumL3Table = VpnRpcEnumL3Table;\r\n/** Cascade Connection Enumeration */\r\nvar VpnRpcEnumLinkItem = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcEnumLinkItem' class: Cascade Connection Enumeration */\r\n    function VpnRpcEnumLinkItem(init) {\r\n        /** The name of cascade connection */\r\n        this.AccountName_utf = \"\";\r\n        /** Online flag */\r\n        this.Online_bool = false;\r\n        /** The flag indicates whether the cascade connection is established */\r\n        this.Connected_bool = false;\r\n        /** The error last occurred if the cascade connection is in the fail state */\r\n        this.LastError_u32 = 0;\r\n        /** Connection completion time */\r\n        this.ConnectedTime_dt = new Date();\r\n        /** Host name of the destination VPN server */\r\n        this.Hostname_str = \"\";\r\n        /** The Virtual Hub name */\r\n        this.TargetHubName_str = \"\";\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcEnumLinkItem;\r\n}());\r\nexports.VpnRpcEnumLinkItem = VpnRpcEnumLinkItem;\r\n/** Enumeration of the link */\r\nvar VpnRpcEnumLink = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcEnumLink' class: Enumeration of the link */\r\n    function VpnRpcEnumLink(init) {\r\n        /** The Virtual Hub name */\r\n        this.HubName_str = \"\";\r\n        /** Number of cascade connections */\r\n        this.NumLink_u32 = 0;\r\n        /** The list of cascade connections */\r\n        this.LinkList = [];\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcEnumLink;\r\n}());\r\nexports.VpnRpcEnumLink = VpnRpcEnumLink;\r\n/** List of listeners item */\r\nvar VpnRpcListenerListItem = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcListenerListItem' class: List of listeners item */\r\n    function VpnRpcListenerListItem(init) {\r\n        /** TCP port number (range: 1 - 65535) */\r\n        this.Ports_u32 = 0;\r\n        /** Active state */\r\n        this.Enables_bool = false;\r\n        /** The flag to indicate if the error occurred on the listener port */\r\n        this.Errors_bool = false;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcListenerListItem;\r\n}());\r\nexports.VpnRpcListenerListItem = VpnRpcListenerListItem;\r\n/** List of listeners */\r\nvar VpnRpcListenerList = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcListenerList' class: List of listeners */\r\n    function VpnRpcListenerList(init) {\r\n        /** List of listener items */\r\n        this.ListenerList = [];\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcListenerList;\r\n}());\r\nexports.VpnRpcListenerList = VpnRpcListenerList;\r\n/** Local Bridge enumeration */\r\nvar VpnRpcEnumLocalBridge = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcEnumLocalBridge' class: Local Bridge enumeration */\r\n    function VpnRpcEnumLocalBridge(init) {\r\n        /** Local Bridge list */\r\n        this.LocalBridgeList = [];\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcEnumLocalBridge;\r\n}());\r\nexports.VpnRpcEnumLocalBridge = VpnRpcEnumLocalBridge;\r\n/** Log file enumeration */\r\nvar VpnRpcEnumLogFileItem = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcEnumLogFileItem' class: Log file enumeration */\r\n    function VpnRpcEnumLogFileItem(init) {\r\n        /** Server name */\r\n        this.ServerName_str = \"\";\r\n        /** File path */\r\n        this.FilePath_str = \"\";\r\n        /** File size */\r\n        this.FileSize_u32 = 0;\r\n        /** Last write date */\r\n        this.UpdatedTime_dt = new Date();\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcEnumLogFileItem;\r\n}());\r\nexports.VpnRpcEnumLogFileItem = VpnRpcEnumLogFileItem;\r\n/** Log file enumeration */\r\nvar VpnRpcEnumLogFile = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcEnumLogFile' class: Log file enumeration */\r\n    function VpnRpcEnumLogFile(init) {\r\n        /** Log file list */\r\n        this.LogFiles = [];\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcEnumLogFile;\r\n}());\r\nexports.VpnRpcEnumLogFile = VpnRpcEnumLogFile;\r\n/** Enumeration items of the MAC table */\r\nvar VpnRpcEnumMacTableItem = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcEnumMacTableItem' class: Enumeration items of the MAC table */\r\n    function VpnRpcEnumMacTableItem(init) {\r\n        /** Key ID */\r\n        this.Key_u32 = 0;\r\n        /** Session name */\r\n        this.SessionName_str = \"\";\r\n        /** MAC address */\r\n        this.MacAddress_bin = new Uint8Array([]);\r\n        /** Creation date and time */\r\n        this.CreatedTime_dt = new Date();\r\n        /** Updating date */\r\n        this.UpdatedTime_dt = new Date();\r\n        /** Remote items */\r\n        this.RemoteItem_bool = false;\r\n        /** Remote host name */\r\n        this.RemoteHostname_str = \"\";\r\n        /** VLAN ID */\r\n        this.VlanId_u32 = 0;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcEnumMacTableItem;\r\n}());\r\nexports.VpnRpcEnumMacTableItem = VpnRpcEnumMacTableItem;\r\n/** Enumeration of the MAC table */\r\nvar VpnRpcEnumMacTable = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcEnumMacTable' class: Enumeration of the MAC table */\r\n    function VpnRpcEnumMacTable(init) {\r\n        /** The Virtual Hub name */\r\n        this.HubName_str = \"\";\r\n        /** MAC table */\r\n        this.MacTable = [];\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcEnumMacTable;\r\n}());\r\nexports.VpnRpcEnumMacTable = VpnRpcEnumMacTable;\r\n/** NAT Entry Protocol Number */\r\nvar VpnRpcNatProtocol;\r\n(function (VpnRpcNatProtocol) {\r\n    /** TCP */\r\n    VpnRpcNatProtocol[VpnRpcNatProtocol[\"TCP\"] = 0] = \"TCP\";\r\n    /** UDP */\r\n    VpnRpcNatProtocol[VpnRpcNatProtocol[\"UDP\"] = 1] = \"UDP\";\r\n    /** DNS */\r\n    VpnRpcNatProtocol[VpnRpcNatProtocol[\"DNS\"] = 2] = \"DNS\";\r\n    /** ICMP */\r\n    VpnRpcNatProtocol[VpnRpcNatProtocol[\"ICMP\"] = 3] = \"ICMP\";\r\n})(VpnRpcNatProtocol = exports.VpnRpcNatProtocol || (exports.VpnRpcNatProtocol = {}));\r\n/** State of NAT session (TCP) */\r\nvar VpnRpcNatTcpState;\r\n(function (VpnRpcNatTcpState) {\r\n    /** Connecting */\r\n    VpnRpcNatTcpState[VpnRpcNatTcpState[\"Connecting\"] = 0] = \"Connecting\";\r\n    /** Send the RST (Connection failure or disconnected) */\r\n    VpnRpcNatTcpState[VpnRpcNatTcpState[\"SendReset\"] = 1] = \"SendReset\";\r\n    /** Connection complete */\r\n    VpnRpcNatTcpState[VpnRpcNatTcpState[\"Connected\"] = 2] = \"Connected\";\r\n    /** Connection established */\r\n    VpnRpcNatTcpState[VpnRpcNatTcpState[\"Established\"] = 3] = \"Established\";\r\n    /** Wait for socket disconnection */\r\n    VpnRpcNatTcpState[VpnRpcNatTcpState[\"WaitDisconnect\"] = 4] = \"WaitDisconnect\";\r\n})(VpnRpcNatTcpState = exports.VpnRpcNatTcpState || (exports.VpnRpcNatTcpState = {}));\r\n/** VpnRpcEnumNat List Item */\r\nvar VpnRpcEnumNatItem = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcEnumNatItem' class: VpnRpcEnumNat List Item */\r\n    function VpnRpcEnumNatItem(init) {\r\n        /** ID */\r\n        this.Id_u32 = 0;\r\n        /** Protocol */\r\n        this.Protocol_u32 = 0;\r\n        /** Source IP address */\r\n        this.SrcIp_ip = \"\";\r\n        /** Source host name */\r\n        this.SrcHost_str = \"\";\r\n        /** Source port number */\r\n        this.SrcPort_u32 = 0;\r\n        /** Destination IP address */\r\n        this.DestIp_ip = \"\";\r\n        /** Destination host name */\r\n        this.DestHost_str = \"\";\r\n        /** Destination port number */\r\n        this.DestPort_u32 = 0;\r\n        /** Connection time */\r\n        this.CreatedTime_dt = new Date();\r\n        /** Last communication time */\r\n        this.LastCommTime_dt = new Date();\r\n        /** Transmission size */\r\n        this.SendSize_u64 = 0;\r\n        /** Receive size */\r\n        this.RecvSize_u64 = 0;\r\n        /** TCP state */\r\n        this.TcpStatus_u32 = 0;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcEnumNatItem;\r\n}());\r\nexports.VpnRpcEnumNatItem = VpnRpcEnumNatItem;\r\n/** RPC_ENUM_NAT */\r\nvar VpnRpcEnumNat = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcEnumNat' class: RPC_ENUM_NAT */\r\n    function VpnRpcEnumNat(init) {\r\n        /** Virtual Hub Name */\r\n        this.HubName_str = \"\";\r\n        /** NAT item */\r\n        this.NatTable = [];\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcEnumNat;\r\n}());\r\nexports.VpnRpcEnumNat = VpnRpcEnumNat;\r\n/** Enumeration item of VPN session */\r\nvar VpnRpcEnumSessionItem = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcEnumSessionItem' class: Enumeration item of VPN session */\r\n    function VpnRpcEnumSessionItem(init) {\r\n        /** Session name */\r\n        this.Name_str = \"\";\r\n        /** Remote session */\r\n        this.RemoteSession_bool = false;\r\n        /** Remote server name */\r\n        this.RemoteHostname_str = \"\";\r\n        /** User name */\r\n        this.Username_str = \"\";\r\n        /** IP address */\r\n        this.ClientIP_ip = \"\";\r\n        /** Host name */\r\n        this.Hostname_str = \"\";\r\n        /** Maximum number of underlying TCP connections */\r\n        this.MaxNumTcp_u32 = 0;\r\n        /** Number of current underlying TCP connections */\r\n        this.CurrentNumTcp_u32 = 0;\r\n        /** Packet size transmitted */\r\n        this.PacketSize_u64 = 0;\r\n        /** Number of packets transmitted */\r\n        this.PacketNum_u64 = 0;\r\n        /** Is a Cascade VPN session */\r\n        this.LinkMode_bool = false;\r\n        /** Is a SecureNAT VPN session */\r\n        this.SecureNATMode_bool = false;\r\n        /** Is the VPN session for Local Bridge */\r\n        this.BridgeMode_bool = false;\r\n        /** Is a Layer-3 Switch VPN session */\r\n        this.Layer3Mode_bool = false;\r\n        /** Is in Bridge Mode */\r\n        this.Client_BridgeMode_bool = false;\r\n        /** Is in Monitor Mode */\r\n        this.Client_MonitorMode_bool = false;\r\n        /** VLAN ID */\r\n        this.VLanId_u32 = 0;\r\n        /** Unique ID of the VPN Session */\r\n        this.UniqueId_bin = new Uint8Array([]);\r\n        /** Creation date and time */\r\n        this.CreatedTime_dt = new Date();\r\n        /** Last communication date and time */\r\n        this.LastCommTime_dt = new Date();\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcEnumSessionItem;\r\n}());\r\nexports.VpnRpcEnumSessionItem = VpnRpcEnumSessionItem;\r\n/** Enumerate VPN sessions */\r\nvar VpnRpcEnumSession = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcEnumSession' class: Enumerate VPN sessions */\r\n    function VpnRpcEnumSession(init) {\r\n        /** The Virtual Hub name */\r\n        this.HubName_str = \"\";\r\n        /** VPN sessions list */\r\n        this.SessionList = [];\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcEnumSession;\r\n}());\r\nexports.VpnRpcEnumSession = VpnRpcEnumSession;\r\n/** Enumeration item of user */\r\nvar VpnRpcEnumUserItem = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcEnumUserItem' class: Enumeration item of user */\r\n    function VpnRpcEnumUserItem(init) {\r\n        /** User name */\r\n        this.Name_str = \"\";\r\n        /** Group name */\r\n        this.GroupName_str = \"\";\r\n        /** Real name */\r\n        this.Realname_utf = \"\";\r\n        /** Note */\r\n        this.Note_utf = \"\";\r\n        /** Authentication method */\r\n        this.AuthType_u32 = 0;\r\n        /** Number of logins */\r\n        this.NumLogin_u32 = 0;\r\n        /** Last login date and time */\r\n        this.LastLoginTime_dt = new Date();\r\n        /** Access denied */\r\n        this.DenyAccess_bool = false;\r\n        /** Flag of whether the traffic variable is set */\r\n        this.IsTrafficFilled_bool = false;\r\n        /** Flag of whether expiration date variable is set */\r\n        this.IsExpiresFilled_bool = false;\r\n        /** Expiration date */\r\n        this.Expires_dt = new Date();\r\n        /** Number of broadcast packets (Recv) */\r\n        this[\"Ex.Recv.BroadcastBytes_u64\"] = 0;\r\n        /** Broadcast bytes (Recv) */\r\n        this[\"Ex.Recv.BroadcastCount_u64\"] = 0;\r\n        /** Unicast count (Recv) */\r\n        this[\"Ex.Recv.UnicastBytes_u64\"] = 0;\r\n        /** Unicast bytes (Recv) */\r\n        this[\"Ex.Recv.UnicastCount_u64\"] = 0;\r\n        /** Number of broadcast packets (Send) */\r\n        this[\"Ex.Send.BroadcastBytes_u64\"] = 0;\r\n        /** Broadcast bytes (Send) */\r\n        this[\"Ex.Send.BroadcastCount_u64\"] = 0;\r\n        /** Unicast bytes (Send) */\r\n        this[\"Ex.Send.UnicastBytes_u64\"] = 0;\r\n        /** Unicast bytes (Send) */\r\n        this[\"Ex.Send.UnicastCount_u64\"] = 0;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcEnumUserItem;\r\n}());\r\nexports.VpnRpcEnumUserItem = VpnRpcEnumUserItem;\r\n/** Enumeration of user */\r\nvar VpnRpcEnumUser = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcEnumUser' class: Enumeration of user */\r\n    function VpnRpcEnumUser(init) {\r\n        /** The Virtual Hub name */\r\n        this.HubName_str = \"\";\r\n        /** User list */\r\n        this.UserList = [];\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcEnumUser;\r\n}());\r\nexports.VpnRpcEnumUser = VpnRpcEnumUser;\r\n/** Source IP Address Limit List Item */\r\nvar VpnAc = /** @class */ (function () {\r\n    /** Constructor for the 'VpnAc' class: Source IP Address Limit List Item */\r\n    function VpnAc(init) {\r\n        /** ID */\r\n        this.Id_u32 = 0;\r\n        /** Priority */\r\n        this.Priority_u32 = 0;\r\n        /** Deny access */\r\n        this.Deny_bool = false;\r\n        /** Set true if you want to specify the SubnetMask_ip item. */\r\n        this.Masked_bool = false;\r\n        /** IP address */\r\n        this.IpAddress_ip = \"\";\r\n        /** Subnet mask, valid only if Masked_bool == true */\r\n        this.SubnetMask_ip = \"\";\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnAc;\r\n}());\r\nexports.VpnAc = VpnAc;\r\n/** Source IP Address Limit List */\r\nvar VpnRpcAcList = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcAcList' class: Source IP Address Limit List */\r\n    function VpnRpcAcList(init) {\r\n        /** The Virtual Hub name */\r\n        this.HubName_str = \"\";\r\n        /** Source IP Address Limit List */\r\n        this.ACList = [];\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcAcList;\r\n}());\r\nexports.VpnRpcAcList = VpnRpcAcList;\r\n/** Message */\r\nvar VpnRpcMsg = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcMsg' class: Message */\r\n    function VpnRpcMsg(init) {\r\n        /** The Virtual Hub name */\r\n        this.HubName_str = \"\";\r\n        /** Message (Unicode strings acceptable) */\r\n        this.Msg_bin = new Uint8Array([]);\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcMsg;\r\n}());\r\nexports.VpnRpcMsg = VpnRpcMsg;\r\n/** Get / Set the Azure state */\r\nvar VpnRpcAzureStatus = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcAzureStatus' class: Get / Set the Azure state */\r\n    function VpnRpcAzureStatus(init) {\r\n        /** Whether VPN Azure Function is Enabled */\r\n        this.IsEnabled_bool = false;\r\n        /** Whether connection to VPN Azure Cloud Server is established */\r\n        this.IsConnected_bool = false;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcAzureStatus;\r\n}());\r\nexports.VpnRpcAzureStatus = VpnRpcAzureStatus;\r\n/** Local Bridge support information */\r\nvar VpnRpcBridgeSupport = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcBridgeSupport' class: Local Bridge support information */\r\n    function VpnRpcBridgeSupport(init) {\r\n        /** Whether the OS supports the Local Bridge function */\r\n        this.IsBridgeSupportedOs_bool = false;\r\n        /** Whether WinPcap is necessary to install */\r\n        this.IsWinPcapNeeded_bool = false;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcBridgeSupport;\r\n}());\r\nexports.VpnRpcBridgeSupport = VpnRpcBridgeSupport;\r\n/** Get the CA of HUB */\r\nvar VpnRpcHubGetCA = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcHubGetCA' class: Get the CA of HUB */\r\n    function VpnRpcHubGetCA(init) {\r\n        /** The Virtual Hub name */\r\n        this.HubName_str = \"\";\r\n        /** The key id of the certificate */\r\n        this.Key_u32 = 0;\r\n        /** The body of the X.509 certificate */\r\n        this.Cert_bin = new Uint8Array([]);\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcHubGetCA;\r\n}());\r\nexports.VpnRpcHubGetCA = VpnRpcHubGetCA;\r\n/** Caps item of the VPN Server */\r\nvar VpnCaps = /** @class */ (function () {\r\n    /** Constructor for the 'VpnCaps' class: Caps item of the VPN Server */\r\n    function VpnCaps(init) {\r\n        /** Name */\r\n        this.CapsName_str = \"\";\r\n        /** Value */\r\n        this.CapsValue_u32 = 0;\r\n        /** Descrption */\r\n        this.CapsDescrption_utf = \"\";\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnCaps;\r\n}());\r\nexports.VpnCaps = VpnCaps;\r\n/** Caps list of the VPN Server */\r\nvar VpnCapslist = /** @class */ (function () {\r\n    /** Constructor for the 'VpnCapslist' class: Caps list of the VPN Server */\r\n    function VpnCapslist(init) {\r\n        /** Caps list of the VPN Server */\r\n        this.CapsList = [];\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnCapslist;\r\n}());\r\nexports.VpnCapslist = VpnCapslist;\r\n/** Config operation */\r\nvar VpnRpcConfig = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcConfig' class: Config operation */\r\n    function VpnRpcConfig(init) {\r\n        /** File name (valid only for returning from the server) */\r\n        this.FileName_str = \"\";\r\n        /** File data */\r\n        this.FileData_bin = new Uint8Array([]);\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcConfig;\r\n}());\r\nexports.VpnRpcConfig = VpnRpcConfig;\r\n/** Connection information */\r\nvar VpnRpcConnectionInfo = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcConnectionInfo' class: Connection information */\r\n    function VpnRpcConnectionInfo(init) {\r\n        /** Connection name */\r\n        this.Name_str = \"\";\r\n        /** Type */\r\n        this.Type_u32 = 0;\r\n        /** Host name */\r\n        this.Hostname_str = \"\";\r\n        /** IP address */\r\n        this.Ip_ip = \"\";\r\n        /** Port number */\r\n        this.Port_u32 = 0;\r\n        /** Connected time */\r\n        this.ConnectedTime_dt = new Date();\r\n        /** Server string */\r\n        this.ServerStr_str = \"\";\r\n        /** Server version */\r\n        this.ServerVer_u32 = 0;\r\n        /** Server build number */\r\n        this.ServerBuild_u32 = 0;\r\n        /** Client string */\r\n        this.ClientStr_str = \"\";\r\n        /** Client version */\r\n        this.ClientVer_u32 = 0;\r\n        /** Client build number */\r\n        this.ClientBuild_u32 = 0;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcConnectionInfo;\r\n}());\r\nexports.VpnRpcConnectionInfo = VpnRpcConnectionInfo;\r\n/** Proxy type */\r\nvar VpnRpcProxyType;\r\n(function (VpnRpcProxyType) {\r\n    /** Direct TCP connection */\r\n    VpnRpcProxyType[VpnRpcProxyType[\"Direct\"] = 0] = \"Direct\";\r\n    /** Connection via HTTP proxy server */\r\n    VpnRpcProxyType[VpnRpcProxyType[\"HTTP\"] = 1] = \"HTTP\";\r\n    /** Connection via SOCKS proxy server */\r\n    VpnRpcProxyType[VpnRpcProxyType[\"SOCKS\"] = 2] = \"SOCKS\";\r\n})(VpnRpcProxyType = exports.VpnRpcProxyType || (exports.VpnRpcProxyType = {}));\r\n/** The current status of the DDNS */\r\nvar VpnDDnsClientStatus = /** @class */ (function () {\r\n    /** Constructor for the 'VpnDDnsClientStatus' class: The current status of the DDNS */\r\n    function VpnDDnsClientStatus(init) {\r\n        /** Last error code (IPv4) */\r\n        this.Err_IPv4_u32 = 0;\r\n        /** Last error string (IPv4) */\r\n        this.ErrStr_IPv4_utf = \"\";\r\n        /** Last error code (IPv6) */\r\n        this.Err_IPv6_u32 = 0;\r\n        /** Last error string (IPv6) */\r\n        this.ErrStr_IPv6_utf = \"\";\r\n        /** Current DDNS host name */\r\n        this.CurrentHostName_str = \"\";\r\n        /** Current FQDN of the DDNS hostname */\r\n        this.CurrentFqdn_str = \"\";\r\n        /** DDNS suffix */\r\n        this.DnsSuffix_str = \"\";\r\n        /** Current IPv4 address of the VPN Server */\r\n        this.CurrentIPv4_str = \"\";\r\n        /** Current IPv6 address of the VPN Server */\r\n        this.CurrentIPv6_str = \"\";\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnDDnsClientStatus;\r\n}());\r\nexports.VpnDDnsClientStatus = VpnDDnsClientStatus;\r\n/** Internet connection settings */\r\nvar VpnInternetSetting = /** @class */ (function () {\r\n    /** Constructor for the 'VpnInternetSetting' class: Internet connection settings */\r\n    function VpnInternetSetting(init) {\r\n        /** Type of proxy server */\r\n        this.ProxyType_u32 = 0;\r\n        /** Proxy server host name */\r\n        this.ProxyHostName_str = \"\";\r\n        /** Proxy server port number */\r\n        this.ProxyPort_u32 = 0;\r\n        /** Proxy server user name */\r\n        this.ProxyUsername_str = \"\";\r\n        /** Proxy server password */\r\n        this.ProxyPassword_str = \"\";\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnInternetSetting;\r\n}());\r\nexports.VpnInternetSetting = VpnInternetSetting;\r\n/** Administration options */\r\nvar VpnAdminOption = /** @class */ (function () {\r\n    /** Constructor for the 'VpnAdminOption' class: Administration options */\r\n    function VpnAdminOption(init) {\r\n        /** Name */\r\n        this.Name_str = \"\";\r\n        /** Data */\r\n        this.Value_u32 = 0;\r\n        /** Descrption */\r\n        this.Descrption_utf = \"\";\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnAdminOption;\r\n}());\r\nexports.VpnAdminOption = VpnAdminOption;\r\n/** Administration options list */\r\nvar VpnRpcAdminOption = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcAdminOption' class: Administration options list */\r\n    function VpnRpcAdminOption(init) {\r\n        /** Virtual HUB name */\r\n        this.HubName_str = \"\";\r\n        /** List data */\r\n        this.AdminOptionList = [];\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcAdminOption;\r\n}());\r\nexports.VpnRpcAdminOption = VpnRpcAdminOption;\r\n/** Connection state to the controller */\r\nvar VpnRpcFarmConnectionStatus = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcFarmConnectionStatus' class: Connection state to the controller */\r\n    function VpnRpcFarmConnectionStatus(init) {\r\n        /** IP address */\r\n        this.Ip_ip = \"\";\r\n        /** Port number */\r\n        this.Port_u32 = 0;\r\n        /** Online state */\r\n        this.Online_bool = false;\r\n        /** Last error code */\r\n        this.LastError_u32 = 0;\r\n        /** Connection start time */\r\n        this.StartedTime_dt = new Date();\r\n        /** First connection time */\r\n        this.FirstConnectedTime_dt = new Date();\r\n        /** Connection time of this time */\r\n        this.CurrentConnectedTime_dt = new Date();\r\n        /** Number of retries */\r\n        this.NumTry_u32 = 0;\r\n        /** Number of connection count */\r\n        this.NumConnected_u32 = 0;\r\n        /** Connection failure count */\r\n        this.NumFailed_u32 = 0;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcFarmConnectionStatus;\r\n}());\r\nexports.VpnRpcFarmConnectionStatus = VpnRpcFarmConnectionStatus;\r\n/** HUB item of each farm member */\r\nvar VpnRpcFarmHub = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcFarmHub' class: HUB item of each farm member */\r\n    function VpnRpcFarmHub(init) {\r\n        /** The Virtual Hub name */\r\n        this.HubName_str = \"\";\r\n        /** Dynamic HUB */\r\n        this.DynamicHub_bool = false;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcFarmHub;\r\n}());\r\nexports.VpnRpcFarmHub = VpnRpcFarmHub;\r\n/** Server farm member information acquisition */\r\nvar VpnRpcFarmInfo = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcFarmInfo' class: Server farm member information acquisition */\r\n    function VpnRpcFarmInfo(init) {\r\n        /** ID */\r\n        this.Id_u32 = 0;\r\n        /** The flag if the server is Cluster Controller (false: Cluster Member servers) */\r\n        this.Controller_bool = false;\r\n        /** Connection Established Time */\r\n        this.ConnectedTime_dt = new Date();\r\n        /** IP address */\r\n        this.Ip_ip = \"\";\r\n        /** Host name */\r\n        this.Hostname_str = \"\";\r\n        /** Point */\r\n        this.Point_u32 = 0;\r\n        /** Number of Public Ports */\r\n        this.NumPort_u32 = 0;\r\n        /** Public Ports */\r\n        this.Ports_u32 = [];\r\n        /** Server certificate */\r\n        this.ServerCert_bin = new Uint8Array([]);\r\n        /** Number of farm HUB */\r\n        this.NumFarmHub_u32 = 0;\r\n        /** The hosted Virtual Hub list */\r\n        this.HubsList = [];\r\n        /** Number of hosted VPN sessions */\r\n        this.NumSessions_u32 = 0;\r\n        /** Number of TCP connections */\r\n        this.NumTcpConnections_u32 = 0;\r\n        /** Performance Standard Ratio */\r\n        this.Weight_u32 = 0;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcFarmInfo;\r\n}());\r\nexports.VpnRpcFarmInfo = VpnRpcFarmInfo;\r\n/** Server farm configuration */\r\nvar VpnRpcFarm = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcFarm' class: Server farm configuration */\r\n    function VpnRpcFarm(init) {\r\n        /** Type of server */\r\n        this.ServerType_u32 = 0;\r\n        /** Valid only for Cluster Member servers. Number of the Ports_u32 element. */\r\n        this.NumPort_u32 = 0;\r\n        /** Valid only for Cluster Member servers. Specify the list of public port numbers on this server. The list must have at least one public port number set, and it is also possible to set multiple public port numbers. */\r\n        this.Ports_u32 = [];\r\n        /** Valid only for Cluster Member servers. Specify the public IP address of this server. If you wish to leave public IP address unspecified, specify the empty string. When a public IP address is not specified, the IP address of the network interface used when connecting to the cluster controller will be automatically used. */\r\n        this.PublicIp_ip = \"\";\r\n        /** Valid only for Cluster Member servers. Specify the host name or IP address of the destination cluster controller. */\r\n        this.ControllerName_str = \"\";\r\n        /** Valid only for Cluster Member servers. Specify the TCP port number of the destination cluster controller. */\r\n        this.ControllerPort_u32 = 0;\r\n        /** Valid only for Cluster Member servers. Specify the password required to connect to the destination controller. It needs to be the same as an administrator password on the destination controller. */\r\n        this.MemberPasswordPlaintext_str = \"\";\r\n        /** This sets a value for the performance standard ratio of this VPN Server. This is the standard value for when load balancing is performed in the cluster. For example, making only one machine 200 while the other members have a status of 100, will regulate that machine to receive twice as many connections as the other members. Specify 1 or higher for the value. If this parameter is left unspecified, 100 will be used. */\r\n        this.Weight_u32 = 0;\r\n        /** Valid only for Cluster Controller server. By specifying true, the VPN Server will operate only as a controller on the cluster and it will always distribute general VPN Client connections to members other than itself. This function is used in high-load environments. */\r\n        this.ControllerOnly_bool = false;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcFarm;\r\n}());\r\nexports.VpnRpcFarm = VpnRpcFarm;\r\n/** Log switch type */\r\nvar VpnRpcLogSwitchType;\r\n(function (VpnRpcLogSwitchType) {\r\n    /** No switching */\r\n    VpnRpcLogSwitchType[VpnRpcLogSwitchType[\"No\"] = 0] = \"No\";\r\n    /** Secondly basis */\r\n    VpnRpcLogSwitchType[VpnRpcLogSwitchType[\"Second\"] = 1] = \"Second\";\r\n    /** Minutely basis */\r\n    VpnRpcLogSwitchType[VpnRpcLogSwitchType[\"Minute\"] = 2] = \"Minute\";\r\n    /** Hourly basis */\r\n    VpnRpcLogSwitchType[VpnRpcLogSwitchType[\"Hour\"] = 3] = \"Hour\";\r\n    /** Daily basis */\r\n    VpnRpcLogSwitchType[VpnRpcLogSwitchType[\"Day\"] = 4] = \"Day\";\r\n    /** Monthly basis */\r\n    VpnRpcLogSwitchType[VpnRpcLogSwitchType[\"Month\"] = 5] = \"Month\";\r\n})(VpnRpcLogSwitchType = exports.VpnRpcLogSwitchType || (exports.VpnRpcLogSwitchType = {}));\r\n/** Packet log settings */\r\nvar VpnRpcPacketLogSetting;\r\n(function (VpnRpcPacketLogSetting) {\r\n    /** Not save */\r\n    VpnRpcPacketLogSetting[VpnRpcPacketLogSetting[\"None\"] = 0] = \"None\";\r\n    /** Only header */\r\n    VpnRpcPacketLogSetting[VpnRpcPacketLogSetting[\"Header\"] = 1] = \"Header\";\r\n    /** All payloads */\r\n    VpnRpcPacketLogSetting[VpnRpcPacketLogSetting[\"All\"] = 2] = \"All\";\r\n})(VpnRpcPacketLogSetting = exports.VpnRpcPacketLogSetting || (exports.VpnRpcPacketLogSetting = {}));\r\n/** Packet log settings array index */\r\nvar VpnRpcPacketLogSettingIndex;\r\n(function (VpnRpcPacketLogSettingIndex) {\r\n    /** TCP connection log */\r\n    VpnRpcPacketLogSettingIndex[VpnRpcPacketLogSettingIndex[\"TcpConnection\"] = 0] = \"TcpConnection\";\r\n    /** TCP packet log */\r\n    VpnRpcPacketLogSettingIndex[VpnRpcPacketLogSettingIndex[\"TcpAll\"] = 1] = \"TcpAll\";\r\n    /** DHCP Log */\r\n    VpnRpcPacketLogSettingIndex[VpnRpcPacketLogSettingIndex[\"Dhcp\"] = 2] = \"Dhcp\";\r\n    /** UDP log */\r\n    VpnRpcPacketLogSettingIndex[VpnRpcPacketLogSettingIndex[\"Udp\"] = 3] = \"Udp\";\r\n    /** ICMP log */\r\n    VpnRpcPacketLogSettingIndex[VpnRpcPacketLogSettingIndex[\"Icmp\"] = 4] = \"Icmp\";\r\n    /** IP log */\r\n    VpnRpcPacketLogSettingIndex[VpnRpcPacketLogSettingIndex[\"Ip\"] = 5] = \"Ip\";\r\n    /** ARP log */\r\n    VpnRpcPacketLogSettingIndex[VpnRpcPacketLogSettingIndex[\"Arp\"] = 6] = \"Arp\";\r\n    /** Ethernet log */\r\n    VpnRpcPacketLogSettingIndex[VpnRpcPacketLogSettingIndex[\"Ethernet\"] = 7] = \"Ethernet\";\r\n})(VpnRpcPacketLogSettingIndex = exports.VpnRpcPacketLogSettingIndex || (exports.VpnRpcPacketLogSettingIndex = {}));\r\n/** HUB log settings */\r\nvar VpnRpcHubLog = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcHubLog' class: HUB log settings */\r\n    function VpnRpcHubLog(init) {\r\n        /** The Virtual Hub name */\r\n        this.HubName_str = \"\";\r\n        /** The flag to enable / disable saving the security log */\r\n        this.SaveSecurityLog_bool = false;\r\n        /** The log filename switching setting of the security log */\r\n        this.SecurityLogSwitchType_u32 = 0;\r\n        /** The flag to enable / disable saving the security log */\r\n        this.SavePacketLog_bool = false;\r\n        /** The log filename switching settings of the packet logs */\r\n        this.PacketLogSwitchType_u32 = 0;\r\n        /** Specify the save contents of the packet logs (uint * 16 array). The index numbers: TcpConnection = 0, TcpAll = 1, DHCP = 2, UDP = 3, ICMP = 4, IP = 5, ARP = 6, Ethernet = 7. */\r\n        this.PacketLogConfig_u32 = [];\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcHubLog;\r\n}());\r\nexports.VpnRpcHubLog = VpnRpcHubLog;\r\n/** RADIUS server options */\r\nvar VpnRpcRadius = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcRadius' class: RADIUS server options */\r\n    function VpnRpcRadius(init) {\r\n        /** The Virtual Hub name */\r\n        this.HubName_str = \"\";\r\n        /** RADIUS server name */\r\n        this.RadiusServerName_str = \"\";\r\n        /** RADIUS port number */\r\n        this.RadiusPort_u32 = 0;\r\n        /** Secret key */\r\n        this.RadiusSecret_str = \"\";\r\n        /** Radius retry interval */\r\n        this.RadiusRetryInterval_u32 = 0;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcRadius;\r\n}());\r\nexports.VpnRpcRadius = VpnRpcRadius;\r\n/** Get the state HUB */\r\nvar VpnRpcHubStatus = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcHubStatus' class: Get the state HUB */\r\n    function VpnRpcHubStatus(init) {\r\n        /** The Virtual Hub name */\r\n        this.HubName_str = \"\";\r\n        /** Online */\r\n        this.Online_bool = false;\r\n        /** Type of HUB */\r\n        this.HubType_u32 = 0;\r\n        /** Number of sessions */\r\n        this.NumSessions_u32 = 0;\r\n        /** Number of sessions (client mode) */\r\n        this.NumSessionsClient_u32 = 0;\r\n        /** Number of sessions (bridge mode) */\r\n        this.NumSessionsBridge_u32 = 0;\r\n        /** Number of Access list entries */\r\n        this.NumAccessLists_u32 = 0;\r\n        /** Number of users */\r\n        this.NumUsers_u32 = 0;\r\n        /** Number of groups */\r\n        this.NumGroups_u32 = 0;\r\n        /** Number of MAC table entries */\r\n        this.NumMacTables_u32 = 0;\r\n        /** Number of IP table entries */\r\n        this.NumIpTables_u32 = 0;\r\n        /** Number of broadcast packets (Recv) */\r\n        this[\"Recv.BroadcastBytes_u64\"] = 0;\r\n        /** Broadcast bytes (Recv) */\r\n        this[\"Recv.BroadcastCount_u64\"] = 0;\r\n        /** Unicast count (Recv) */\r\n        this[\"Recv.UnicastBytes_u64\"] = 0;\r\n        /** Unicast bytes (Recv) */\r\n        this[\"Recv.UnicastCount_u64\"] = 0;\r\n        /** Number of broadcast packets (Send) */\r\n        this[\"Send.BroadcastBytes_u64\"] = 0;\r\n        /** Broadcast bytes (Send) */\r\n        this[\"Send.BroadcastCount_u64\"] = 0;\r\n        /** Unicast bytes (Send) */\r\n        this[\"Send.UnicastBytes_u64\"] = 0;\r\n        /** Unicast bytes (Send) */\r\n        this[\"Send.UnicastCount_u64\"] = 0;\r\n        /** Whether SecureNAT is enabled */\r\n        this.SecureNATEnabled_bool = false;\r\n        /** Last communication date and time */\r\n        this.LastCommTime_dt = new Date();\r\n        /** Last login date and time */\r\n        this.LastLoginTime_dt = new Date();\r\n        /** Creation date and time */\r\n        this.CreatedTime_dt = new Date();\r\n        /** Number of logins */\r\n        this.NumLogin_u32 = 0;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcHubStatus;\r\n}());\r\nexports.VpnRpcHubStatus = VpnRpcHubStatus;\r\n/** List of services provided by IPsec server */\r\nvar VpnIPsecServices = /** @class */ (function () {\r\n    /** Constructor for the 'VpnIPsecServices' class: List of services provided by IPsec server */\r\n    function VpnIPsecServices(init) {\r\n        /** Enable or Disable the L2TP Server Function (Raw L2TP with No Encryptions). To accept special VPN clients, enable this option. */\r\n        this.L2TP_Raw_bool = false;\r\n        /** Enable or Disable the L2TP over IPsec Server Function. To accept VPN connections from iPhone, iPad, Android, Windows or Mac OS X, enable this option. */\r\n        this.L2TP_IPsec_bool = false;\r\n        /** Enable or Disable the EtherIP / L2TPv3 over IPsec Server Function (for site-to-site VPN Server function). Router Products which are compatible with EtherIP over IPsec can connect to Virtual Hubs on the VPN Server and establish Layer-2 (Ethernet) Bridging. */\r\n        this.EtherIP_IPsec_bool = false;\r\n        /** Specify the IPsec Pre-Shared Key. An IPsec Pre-Shared Key is also called as \"PSK\" or \"secret\". Specify it equal or less than 8 letters, and distribute it to every users who will connect to the VPN Server. Please note: Google Android 4.0 has a bug which a Pre-Shared Key with 10 or more letters causes a unexpected behavior. For that reason, the letters of a Pre-Shared Key should be 9 or less characters. */\r\n        this.IPsec_Secret_str = \"\";\r\n        /** Specify the default Virtual HUB in a case of omitting the name of HUB on the Username. Users should specify their username such as \"Username@Target Virtual HUB Name\" to connect this L2TP Server. If the designation of the Virtual Hub is omitted, the above HUB will be used as the target. */\r\n        this.L2TP_DefaultHub_str = \"\";\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnIPsecServices;\r\n}());\r\nexports.VpnIPsecServices = VpnIPsecServices;\r\n/** Keep alive protocol */\r\nvar VpnRpcKeepAliveProtocol;\r\n(function (VpnRpcKeepAliveProtocol) {\r\n    /** TCP */\r\n    VpnRpcKeepAliveProtocol[VpnRpcKeepAliveProtocol[\"TCP\"] = 0] = \"TCP\";\r\n    /** UDP */\r\n    VpnRpcKeepAliveProtocol[VpnRpcKeepAliveProtocol[\"UDP\"] = 1] = \"UDP\";\r\n})(VpnRpcKeepAliveProtocol = exports.VpnRpcKeepAliveProtocol || (exports.VpnRpcKeepAliveProtocol = {}));\r\n/** Keep Alive settings */\r\nvar VpnRpcKeep = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcKeep' class: Keep Alive settings */\r\n    function VpnRpcKeep(init) {\r\n        /** The flag to enable keep-alive to the Internet */\r\n        this.UseKeepConnect_bool = false;\r\n        /** Specify the host name or IP address of the destination */\r\n        this.KeepConnectHost_str = \"\";\r\n        /** Specify the port number of the destination */\r\n        this.KeepConnectPort_u32 = 0;\r\n        /** Protocol type */\r\n        this.KeepConnectProtocol_u32 = 0;\r\n        /** Interval Between Packets Sends (Seconds) */\r\n        this.KeepConnectInterval_u32 = 0;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcKeep;\r\n}());\r\nexports.VpnRpcKeep = VpnRpcKeep;\r\n/** State of the client session */\r\nvar VpnRpcClientSessionStatus;\r\n(function (VpnRpcClientSessionStatus) {\r\n    /** Connecting */\r\n    VpnRpcClientSessionStatus[VpnRpcClientSessionStatus[\"Connecting\"] = 0] = \"Connecting\";\r\n    /** Negotiating */\r\n    VpnRpcClientSessionStatus[VpnRpcClientSessionStatus[\"Negotiation\"] = 1] = \"Negotiation\";\r\n    /** During user authentication */\r\n    VpnRpcClientSessionStatus[VpnRpcClientSessionStatus[\"Auth\"] = 2] = \"Auth\";\r\n    /** Connection complete */\r\n    VpnRpcClientSessionStatus[VpnRpcClientSessionStatus[\"Established\"] = 3] = \"Established\";\r\n    /** Wait to retry */\r\n    VpnRpcClientSessionStatus[VpnRpcClientSessionStatus[\"Retry\"] = 4] = \"Retry\";\r\n    /** Idle state */\r\n    VpnRpcClientSessionStatus[VpnRpcClientSessionStatus[\"Idle\"] = 5] = \"Idle\";\r\n})(VpnRpcClientSessionStatus = exports.VpnRpcClientSessionStatus || (exports.VpnRpcClientSessionStatus = {}));\r\n/** Get the link state */\r\nvar VpnRpcLinkStatus = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcLinkStatus' class: Get the link state */\r\n    function VpnRpcLinkStatus(init) {\r\n        /** The Virtual Hub name */\r\n        this.HubName_Ex_str = \"\";\r\n        /** The name of the cascade connection */\r\n        this.AccountName_utf = \"\";\r\n        /** The flag whether the cascade connection is enabled */\r\n        this.Active_bool = false;\r\n        /** The flag whether the cascade connection is established */\r\n        this.Connected_bool = false;\r\n        /** The session status */\r\n        this.SessionStatus_u32 = 0;\r\n        /** The destination VPN server name */\r\n        this.ServerName_str = \"\";\r\n        /** The port number of the server */\r\n        this.ServerPort_u32 = 0;\r\n        /** Server product name */\r\n        this.ServerProductName_str = \"\";\r\n        /** Server product version */\r\n        this.ServerProductVer_u32 = 0;\r\n        /** Server product build number */\r\n        this.ServerProductBuild_u32 = 0;\r\n        /** Server's X.509 certificate */\r\n        this.ServerX_bin = new Uint8Array([]);\r\n        /** Client certificate */\r\n        this.ClientX_bin = new Uint8Array([]);\r\n        /** Connection start time */\r\n        this.StartTime_dt = new Date();\r\n        /** Connection completion time of the first connection */\r\n        this.FirstConnectionEstablisiedTime_dt = new Date();\r\n        /** Connection completion time of this connection */\r\n        this.CurrentConnectionEstablishTime_dt = new Date();\r\n        /** Number of connections have been established so far */\r\n        this.NumConnectionsEatablished_u32 = 0;\r\n        /** Half-connection */\r\n        this.HalfConnection_bool = false;\r\n        /** VoIP / QoS */\r\n        this.QoS_bool = false;\r\n        /** Maximum number of the underlying TCP connections */\r\n        this.MaxTcpConnections_u32 = 0;\r\n        /** Number of current underlying TCP connections */\r\n        this.NumTcpConnections_u32 = 0;\r\n        /** Number of underlying inbound TCP connections */\r\n        this.NumTcpConnectionsUpload_u32 = 0;\r\n        /** Number of underlying outbound TCP connections */\r\n        this.NumTcpConnectionsDownload_u32 = 0;\r\n        /** Use of encryption */\r\n        this.UseEncrypt_bool = false;\r\n        /** Cipher algorithm name */\r\n        this.CipherName_str = \"\";\r\n        /** Use of compression */\r\n        this.UseCompress_bool = false;\r\n        /** The flag whether this is a R-UDP session */\r\n        this.IsRUDPSession_bool = false;\r\n        /** Underlying physical communication protocol */\r\n        this.UnderlayProtocol_str = \"\";\r\n        /** The UDP acceleration is enabled */\r\n        this.IsUdpAccelerationEnabled_bool = false;\r\n        /** The UDP acceleration is being actually used */\r\n        this.IsUsingUdpAcceleration_bool = false;\r\n        /** Session name */\r\n        this.SessionName_str = \"\";\r\n        /** Connection name */\r\n        this.ConnectionName_str = \"\";\r\n        /** Session key */\r\n        this.SessionKey_bin = new Uint8Array([]);\r\n        /** Total transmitted data size */\r\n        this.TotalSendSize_u64 = 0;\r\n        /** Total received data size */\r\n        this.TotalRecvSize_u64 = 0;\r\n        /** Total transmitted data size (no compression) */\r\n        this.TotalSendSizeReal_u64 = 0;\r\n        /** Total received data size (no compression) */\r\n        this.TotalRecvSizeReal_u64 = 0;\r\n        /** The flag whether the VPN session is Bridge Mode */\r\n        this.IsBridgeMode_bool = false;\r\n        /** The flag whether the VPN session is Monitor mode */\r\n        this.IsMonitorMode_bool = false;\r\n        /** VLAN ID */\r\n        this.VLanId_u32 = 0;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcLinkStatus;\r\n}());\r\nexports.VpnRpcLinkStatus = VpnRpcLinkStatus;\r\n/** Setting of SSTP and OpenVPN */\r\nvar VpnOpenVpnSstpConfig = /** @class */ (function () {\r\n    /** Constructor for the 'VpnOpenVpnSstpConfig' class: Setting of SSTP and OpenVPN */\r\n    function VpnOpenVpnSstpConfig(init) {\r\n        /** Specify true to enable the OpenVPN Clone Server Function. Specify false to disable. */\r\n        this.EnableOpenVPN_bool = false;\r\n        /** Specify UDP ports to listen for OpenVPN. Multiple UDP ports can be specified with splitting by space or comma letters, for example: \"1194, 2001, 2010, 2012\". The default port for OpenVPN is UDP 1194. You can specify any other UDP ports. */\r\n        this.OpenVPNPortList_str = \"\";\r\n        /** pecify true to enable the Microsoft SSTP VPN Clone Server Function. Specify false to disable. */\r\n        this.EnableSSTP_bool = false;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnOpenVpnSstpConfig;\r\n}());\r\nexports.VpnOpenVpnSstpConfig = VpnOpenVpnSstpConfig;\r\n/** Virtual host option */\r\nvar VpnVhOption = /** @class */ (function () {\r\n    /** Constructor for the 'VpnVhOption' class: Virtual host option */\r\n    function VpnVhOption(init) {\r\n        /** Target Virtual HUB name */\r\n        this.RpcHubName_str = \"\";\r\n        /** MAC address */\r\n        this.MacAddress_bin = new Uint8Array([]);\r\n        /** IP address */\r\n        this.Ip_ip = \"\";\r\n        /** Subnet mask */\r\n        this.Mask_ip = \"\";\r\n        /** Use flag of the Virtual NAT function */\r\n        this.UseNat_bool = false;\r\n        /** MTU value (Standard: 1500) */\r\n        this.Mtu_u32 = 0;\r\n        /** NAT TCP timeout in seconds */\r\n        this.NatTcpTimeout_u32 = 0;\r\n        /** NAT UDP timeout in seconds */\r\n        this.NatUdpTimeout_u32 = 0;\r\n        /** Using flag of DHCP function */\r\n        this.UseDhcp_bool = false;\r\n        /** Specify the start point of the address band to be distributed to the client. (Example: 192.168.30.10) */\r\n        this.DhcpLeaseIPStart_ip = \"\";\r\n        /** Specify the end point of the address band to be distributed to the client. (Example: 192.168.30.200) */\r\n        this.DhcpLeaseIPEnd_ip = \"\";\r\n        /** Specify the subnet mask to be specified for the client. (Example: 255.255.255.0) */\r\n        this.DhcpSubnetMask_ip = \"\";\r\n        /** Specify the expiration date in second units for leasing an IP address to a client. */\r\n        this.DhcpExpireTimeSpan_u32 = 0;\r\n        /** Specify the IP address of the default gateway to be notified to the client. You can specify a SecureNAT Virtual Host IP address for this when the SecureNAT Function's Virtual NAT Function has been enabled and is being used also. If you specify 0 or none, then the client will not be notified of the default gateway. */\r\n        this.DhcpGatewayAddress_ip = \"\";\r\n        /** Specify the IP address of the primary DNS Server to be notified to the client. You can specify a SecureNAT Virtual Host IP address for this when the SecureNAT Function's Virtual NAT Function has been enabled and is being used also. If you specify empty, then the client will not be notified of the DNS Server address. */\r\n        this.DhcpDnsServerAddress_ip = \"\";\r\n        /** Specify the IP address of the secondary DNS Server to be notified to the client. You can specify a SecureNAT Virtual Host IP address for this when the SecureNAT Function's Virtual NAT Function has been enabled and is being used also. If you specify empty, then the client will not be notified of the DNS Server address. */\r\n        this.DhcpDnsServerAddress2_ip = \"\";\r\n        /** Specify the domain name to be notified to the client. If you specify none, then the client will not be notified of the domain name. */\r\n        this.DhcpDomainName_str = \"\";\r\n        /** Specify whether or not to save the Virtual DHCP Server operation in the Virtual Hub security log. Specify true to save it. This value is interlinked with the Virtual NAT Function log save setting. */\r\n        this.SaveLog_bool = false;\r\n        /** The flag to enable the DhcpPushRoutes_str field. */\r\n        this.ApplyDhcpPushRoutes_bool = false;\r\n        /** Specify the static routing table to push. Example: \"192.168.5.0/255.255.255.0/192.168.4.254, 10.0.0.0/255.0.0.0/192.168.4.253\" Split multiple entries (maximum: 64 entries) by comma or space characters. Each entry must be specified in the \"IP network address/subnet mask/gateway IP address\" format. This Virtual DHCP Server can push the classless static routes (RFC 3442) with DHCP reply messages to VPN clients. Whether or not a VPN client can recognize the classless static routes (RFC 3442) depends on the target VPN client software. SoftEther VPN Client and OpenVPN Client are supporting the classless static routes. On L2TP/IPsec and MS-SSTP protocols, the compatibility depends on the implementation of the client software. You can realize the split tunneling if you clear the default gateway field on the Virtual DHCP Server options. On the client side, L2TP/IPsec and MS-SSTP clients need to be configured not to set up the default gateway for the split tunneling usage. You can also push the classless static routes (RFC 3442) by your existing external DHCP server. In that case, disable the Virtual DHCP Server function on SecureNAT, and you need not to set up the classless routes on this API. See the RFC 3442 to understand the classless routes. */\r\n        this.DhcpPushRoutes_str = \"\";\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnVhOption;\r\n}());\r\nexports.VpnVhOption = VpnVhOption;\r\n/** RPC_NAT_STATUS */\r\nvar VpnRpcNatStatus = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcNatStatus' class: RPC_NAT_STATUS */\r\n    function VpnRpcNatStatus(init) {\r\n        /** Virtual Hub Name */\r\n        this.HubName_str = \"\";\r\n        /** Number of TCP sessions */\r\n        this.NumTcpSessions_u32 = 0;\r\n        /** Ntmber of UDP sessions */\r\n        this.NumUdpSessions_u32 = 0;\r\n        /** Nymber of ICMP sessions */\r\n        this.NumIcmpSessions_u32 = 0;\r\n        /** Number of DNS sessions */\r\n        this.NumDnsSessions_u32 = 0;\r\n        /** Number of DHCP clients */\r\n        this.NumDhcpClients_u32 = 0;\r\n        /** Whether the NAT is operating in the Kernel Mode */\r\n        this.IsKernelMode_bool = false;\r\n        /** Whether the NAT is operating in the Raw IP Mode */\r\n        this.IsRawIpMode_bool = false;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcNatStatus;\r\n}());\r\nexports.VpnRpcNatStatus = VpnRpcNatStatus;\r\n/** Key pair */\r\nvar VpnRpcKeyPair = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcKeyPair' class: Key pair */\r\n    function VpnRpcKeyPair(init) {\r\n        /** The body of the certificate */\r\n        this.Cert_bin = new Uint8Array([]);\r\n        /** The body of the private key */\r\n        this.Key_bin = new Uint8Array([]);\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcKeyPair;\r\n}());\r\nexports.VpnRpcKeyPair = VpnRpcKeyPair;\r\n/** Single string value */\r\nvar VpnRpcStr = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcStr' class: Single string value */\r\n    function VpnRpcStr(init) {\r\n        /** A string value */\r\n        this.String_str = \"\";\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcStr;\r\n}());\r\nexports.VpnRpcStr = VpnRpcStr;\r\n/** Type of VPN Server */\r\nvar VpnRpcServerType;\r\n(function (VpnRpcServerType) {\r\n    /** Stand-alone server */\r\n    VpnRpcServerType[VpnRpcServerType[\"Standalone\"] = 0] = \"Standalone\";\r\n    /** Farm controller server */\r\n    VpnRpcServerType[VpnRpcServerType[\"FarmController\"] = 1] = \"FarmController\";\r\n    /** Farm member server */\r\n    VpnRpcServerType[VpnRpcServerType[\"FarmMember\"] = 2] = \"FarmMember\";\r\n})(VpnRpcServerType = exports.VpnRpcServerType || (exports.VpnRpcServerType = {}));\r\n/** Operating system type */\r\nvar VpnRpcOsType;\r\n(function (VpnRpcOsType) {\r\n    /** Windows 95 */\r\n    VpnRpcOsType[VpnRpcOsType[\"WINDOWS_95\"] = 1100] = \"WINDOWS_95\";\r\n    /** Windows 98 */\r\n    VpnRpcOsType[VpnRpcOsType[\"WINDOWS_98\"] = 1200] = \"WINDOWS_98\";\r\n    /** Windows Me */\r\n    VpnRpcOsType[VpnRpcOsType[\"WINDOWS_ME\"] = 1300] = \"WINDOWS_ME\";\r\n    /** Windows (unknown) */\r\n    VpnRpcOsType[VpnRpcOsType[\"WINDOWS_UNKNOWN\"] = 1400] = \"WINDOWS_UNKNOWN\";\r\n    /** Windows NT 4.0 Workstation */\r\n    VpnRpcOsType[VpnRpcOsType[\"WINDOWS_NT_4_WORKSTATION\"] = 2100] = \"WINDOWS_NT_4_WORKSTATION\";\r\n    /** Windows NT 4.0 Server */\r\n    VpnRpcOsType[VpnRpcOsType[\"WINDOWS_NT_4_SERVER\"] = 2110] = \"WINDOWS_NT_4_SERVER\";\r\n    /** Windows NT 4.0 Server, Enterprise Edition */\r\n    VpnRpcOsType[VpnRpcOsType[\"WINDOWS_NT_4_SERVER_ENTERPRISE\"] = 2111] = \"WINDOWS_NT_4_SERVER_ENTERPRISE\";\r\n    /** Windows NT 4.0 Terminal Server */\r\n    VpnRpcOsType[VpnRpcOsType[\"WINDOWS_NT_4_TERMINAL_SERVER\"] = 2112] = \"WINDOWS_NT_4_TERMINAL_SERVER\";\r\n    /** BackOffice Server 4.5 */\r\n    VpnRpcOsType[VpnRpcOsType[\"WINDOWS_NT_4_BACKOFFICE\"] = 2113] = \"WINDOWS_NT_4_BACKOFFICE\";\r\n    /** Small Business Server 4.5 */\r\n    VpnRpcOsType[VpnRpcOsType[\"WINDOWS_NT_4_SMS\"] = 2114] = \"WINDOWS_NT_4_SMS\";\r\n    /** Windows 2000 Professional */\r\n    VpnRpcOsType[VpnRpcOsType[\"WINDOWS_2000_PROFESSIONAL\"] = 2200] = \"WINDOWS_2000_PROFESSIONAL\";\r\n    /** Windows 2000 Server */\r\n    VpnRpcOsType[VpnRpcOsType[\"WINDOWS_2000_SERVER\"] = 2211] = \"WINDOWS_2000_SERVER\";\r\n    /** Windows 2000 Advanced Server */\r\n    VpnRpcOsType[VpnRpcOsType[\"WINDOWS_2000_ADVANCED_SERVER\"] = 2212] = \"WINDOWS_2000_ADVANCED_SERVER\";\r\n    /** Windows 2000 Datacenter Server */\r\n    VpnRpcOsType[VpnRpcOsType[\"WINDOWS_2000_DATACENTER_SERVER\"] = 2213] = \"WINDOWS_2000_DATACENTER_SERVER\";\r\n    /** BackOffice Server 2000 */\r\n    VpnRpcOsType[VpnRpcOsType[\"WINDOWS_2000_BACKOFFICE\"] = 2214] = \"WINDOWS_2000_BACKOFFICE\";\r\n    /** Small Business Server 2000 */\r\n    VpnRpcOsType[VpnRpcOsType[\"WINDOWS_2000_SBS\"] = 2215] = \"WINDOWS_2000_SBS\";\r\n    /** Windows XP Home Edition */\r\n    VpnRpcOsType[VpnRpcOsType[\"WINDOWS_XP_HOME\"] = 2300] = \"WINDOWS_XP_HOME\";\r\n    /** Windows XP Professional */\r\n    VpnRpcOsType[VpnRpcOsType[\"WINDOWS_XP_PROFESSIONAL\"] = 2301] = \"WINDOWS_XP_PROFESSIONAL\";\r\n    /** Windows Server 2003 Web Edition */\r\n    VpnRpcOsType[VpnRpcOsType[\"WINDOWS_2003_WEB\"] = 2410] = \"WINDOWS_2003_WEB\";\r\n    /** Windows Server 2003 Standard Edition */\r\n    VpnRpcOsType[VpnRpcOsType[\"WINDOWS_2003_STANDARD\"] = 2411] = \"WINDOWS_2003_STANDARD\";\r\n    /** Windows Server 2003 Enterprise Edition */\r\n    VpnRpcOsType[VpnRpcOsType[\"WINDOWS_2003_ENTERPRISE\"] = 2412] = \"WINDOWS_2003_ENTERPRISE\";\r\n    /** Windows Server 2003 DataCenter Edition */\r\n    VpnRpcOsType[VpnRpcOsType[\"WINDOWS_2003_DATACENTER\"] = 2413] = \"WINDOWS_2003_DATACENTER\";\r\n    /** BackOffice Server 2003 */\r\n    VpnRpcOsType[VpnRpcOsType[\"WINDOWS_2003_BACKOFFICE\"] = 2414] = \"WINDOWS_2003_BACKOFFICE\";\r\n    /** Small Business Server 2003 */\r\n    VpnRpcOsType[VpnRpcOsType[\"WINDOWS_2003_SBS\"] = 2415] = \"WINDOWS_2003_SBS\";\r\n    /** Windows Vista */\r\n    VpnRpcOsType[VpnRpcOsType[\"WINDOWS_LONGHORN_PROFESSIONAL\"] = 2500] = \"WINDOWS_LONGHORN_PROFESSIONAL\";\r\n    /** Windows Server 2008 */\r\n    VpnRpcOsType[VpnRpcOsType[\"WINDOWS_LONGHORN_SERVER\"] = 2510] = \"WINDOWS_LONGHORN_SERVER\";\r\n    /** Windows 7 */\r\n    VpnRpcOsType[VpnRpcOsType[\"WINDOWS_7\"] = 2600] = \"WINDOWS_7\";\r\n    /** Windows Server 2008 R2 */\r\n    VpnRpcOsType[VpnRpcOsType[\"WINDOWS_SERVER_2008_R2\"] = 2610] = \"WINDOWS_SERVER_2008_R2\";\r\n    /** Windows 8 */\r\n    VpnRpcOsType[VpnRpcOsType[\"WINDOWS_8\"] = 2700] = \"WINDOWS_8\";\r\n    /** Windows Server 2012 */\r\n    VpnRpcOsType[VpnRpcOsType[\"WINDOWS_SERVER_8\"] = 2710] = \"WINDOWS_SERVER_8\";\r\n    /** Windows 8.1 */\r\n    VpnRpcOsType[VpnRpcOsType[\"WINDOWS_81\"] = 2701] = \"WINDOWS_81\";\r\n    /** Windows Server 2012 R2 */\r\n    VpnRpcOsType[VpnRpcOsType[\"WINDOWS_SERVER_81\"] = 2711] = \"WINDOWS_SERVER_81\";\r\n    /** Windows 10 */\r\n    VpnRpcOsType[VpnRpcOsType[\"WINDOWS_10\"] = 2702] = \"WINDOWS_10\";\r\n    /** Windows Server 10 */\r\n    VpnRpcOsType[VpnRpcOsType[\"WINDOWS_SERVER_10\"] = 2712] = \"WINDOWS_SERVER_10\";\r\n    /** Windows 11 or later */\r\n    VpnRpcOsType[VpnRpcOsType[\"WINDOWS_11\"] = 2800] = \"WINDOWS_11\";\r\n    /** Windows Server 11 or later */\r\n    VpnRpcOsType[VpnRpcOsType[\"WINDOWS_SERVER_11\"] = 2810] = \"WINDOWS_SERVER_11\";\r\n    /** Unknown UNIX */\r\n    VpnRpcOsType[VpnRpcOsType[\"UNIX_UNKNOWN\"] = 3000] = \"UNIX_UNKNOWN\";\r\n    /** Linux */\r\n    VpnRpcOsType[VpnRpcOsType[\"LINUX\"] = 3100] = \"LINUX\";\r\n    /** Solaris */\r\n    VpnRpcOsType[VpnRpcOsType[\"SOLARIS\"] = 3200] = \"SOLARIS\";\r\n    /** Cygwin */\r\n    VpnRpcOsType[VpnRpcOsType[\"CYGWIN\"] = 3300] = \"CYGWIN\";\r\n    /** BSD */\r\n    VpnRpcOsType[VpnRpcOsType[\"BSD\"] = 3400] = \"BSD\";\r\n    /** MacOS X */\r\n    VpnRpcOsType[VpnRpcOsType[\"MACOS_X\"] = 3500] = \"MACOS_X\";\r\n})(VpnRpcOsType = exports.VpnRpcOsType || (exports.VpnRpcOsType = {}));\r\n/** VPN Server Information */\r\nvar VpnRpcServerInfo = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcServerInfo' class: VPN Server Information */\r\n    function VpnRpcServerInfo(init) {\r\n        /** Server product name */\r\n        this.ServerProductName_str = \"\";\r\n        /** Server version string */\r\n        this.ServerVersionString_str = \"\";\r\n        /** Server build information string */\r\n        this.ServerBuildInfoString_str = \"\";\r\n        /** Server version integer value */\r\n        this.ServerVerInt_u32 = 0;\r\n        /** Server build number integer value */\r\n        this.ServerBuildInt_u32 = 0;\r\n        /** Server host name */\r\n        this.ServerHostName_str = \"\";\r\n        /** Type of server */\r\n        this.ServerType_u32 = 0;\r\n        /** Build date and time of the server */\r\n        this.ServerBuildDate_dt = new Date();\r\n        /** Family name */\r\n        this.ServerFamilyName_str = \"\";\r\n        /** OS type */\r\n        this.OsType_u32 = 0;\r\n        /** Service pack number */\r\n        this.OsServicePack_u32 = 0;\r\n        /** OS system name */\r\n        this.OsSystemName_str = \"\";\r\n        /** OS product name */\r\n        this.OsProductName_str = \"\";\r\n        /** OS vendor name */\r\n        this.OsVendorName_str = \"\";\r\n        /** OS version */\r\n        this.OsVersion_str = \"\";\r\n        /** Kernel name */\r\n        this.KernelName_str = \"\";\r\n        /** Kernel version */\r\n        this.KernelVersion_str = \"\";\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcServerInfo;\r\n}());\r\nexports.VpnRpcServerInfo = VpnRpcServerInfo;\r\n/** Server status */\r\nvar VpnRpcServerStatus = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcServerStatus' class: Server status */\r\n    function VpnRpcServerStatus(init) {\r\n        /** Type of server */\r\n        this.ServerType_u32 = 0;\r\n        /** Total number of TCP connections */\r\n        this.NumTcpConnections_u32 = 0;\r\n        /** Number of Local TCP connections */\r\n        this.NumTcpConnectionsLocal_u32 = 0;\r\n        /** Number of remote TCP connections */\r\n        this.NumTcpConnectionsRemote_u32 = 0;\r\n        /** Total number of HUBs */\r\n        this.NumHubTotal_u32 = 0;\r\n        /** Nymber of stand-alone HUB */\r\n        this.NumHubStandalone_u32 = 0;\r\n        /** Number of static HUBs */\r\n        this.NumHubStatic_u32 = 0;\r\n        /** Number of Dynamic HUBs */\r\n        this.NumHubDynamic_u32 = 0;\r\n        /** Total number of sessions */\r\n        this.NumSessionsTotal_u32 = 0;\r\n        /** Number of local VPN sessions */\r\n        this.NumSessionsLocal_u32 = 0;\r\n        /** The number of remote sessions */\r\n        this.NumSessionsRemote_u32 = 0;\r\n        /** Number of MAC table entries (total sum of all Virtual Hubs) */\r\n        this.NumMacTables_u32 = 0;\r\n        /** Number of IP table entries (total sum of all Virtual Hubs) */\r\n        this.NumIpTables_u32 = 0;\r\n        /** Number of users (total sum of all Virtual Hubs) */\r\n        this.NumUsers_u32 = 0;\r\n        /** Number of groups (total sum of all Virtual Hubs) */\r\n        this.NumGroups_u32 = 0;\r\n        /** Number of assigned bridge licenses (Useful to make a commercial version) */\r\n        this.AssignedBridgeLicenses_u32 = 0;\r\n        /** Number of assigned client licenses (Useful to make a commercial version) */\r\n        this.AssignedClientLicenses_u32 = 0;\r\n        /** Number of Assigned bridge license (cluster-wide), useful to make a commercial version */\r\n        this.AssignedBridgeLicensesTotal_u32 = 0;\r\n        /** Number of assigned client licenses (cluster-wide), useful to make a commercial version */\r\n        this.AssignedClientLicensesTotal_u32 = 0;\r\n        /** Number of broadcast packets (Recv) */\r\n        this[\"Recv.BroadcastBytes_u64\"] = 0;\r\n        /** Broadcast bytes (Recv) */\r\n        this[\"Recv.BroadcastCount_u64\"] = 0;\r\n        /** Unicast count (Recv) */\r\n        this[\"Recv.UnicastBytes_u64\"] = 0;\r\n        /** Unicast bytes (Recv) */\r\n        this[\"Recv.UnicastCount_u64\"] = 0;\r\n        /** Number of broadcast packets (Send) */\r\n        this[\"Send.BroadcastBytes_u64\"] = 0;\r\n        /** Broadcast bytes (Send) */\r\n        this[\"Send.BroadcastCount_u64\"] = 0;\r\n        /** Unicast bytes (Send) */\r\n        this[\"Send.UnicastBytes_u64\"] = 0;\r\n        /** Unicast bytes (Send) */\r\n        this[\"Send.UnicastCount_u64\"] = 0;\r\n        /** Current time */\r\n        this.CurrentTime_dt = new Date();\r\n        /** 64 bit High-Precision Logical System Clock */\r\n        this.CurrentTick_u64 = 0;\r\n        /** VPN Server Start-up time */\r\n        this.StartTime_dt = new Date();\r\n        /** Memory information: Total Memory */\r\n        this.TotalMemory_u64 = 0;\r\n        /** Memory information: Used Memory */\r\n        this.UsedMemory_u64 = 0;\r\n        /** Memory information: Free Memory */\r\n        this.FreeMemory_u64 = 0;\r\n        /** Memory information: Total Phys */\r\n        this.TotalPhys_u64 = 0;\r\n        /** Memory information: Used Phys */\r\n        this.UsedPhys_u64 = 0;\r\n        /** Memory information: Free Phys */\r\n        this.FreePhys_u64 = 0;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcServerStatus;\r\n}());\r\nexports.VpnRpcServerStatus = VpnRpcServerStatus;\r\n/** VPN Session status */\r\nvar VpnRpcSessionStatus = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcSessionStatus' class: VPN Session status */\r\n    function VpnRpcSessionStatus(init) {\r\n        /** The Virtual Hub name */\r\n        this.HubName_str = \"\";\r\n        /** VPN session name */\r\n        this.Name_str = \"\";\r\n        /** User name */\r\n        this.Username_str = \"\";\r\n        /** Real user name which was used for the authentication */\r\n        this.RealUsername_str = \"\";\r\n        /** Group name */\r\n        this.GroupName_str = \"\";\r\n        /** Is Cascade Session */\r\n        this.LinkMode_bool = false;\r\n        /** Client IP address */\r\n        this.Client_Ip_Address_ip = \"\";\r\n        /** Client host name */\r\n        this.SessionStatus_ClientHostName_str = \"\";\r\n        /** Operation flag */\r\n        this.Active_bool = false;\r\n        /** Connected flag */\r\n        this.Connected_bool = false;\r\n        /** State of the client session */\r\n        this.SessionStatus_u32 = 0;\r\n        /** Server name */\r\n        this.ServerName_str = \"\";\r\n        /** Port number of the server */\r\n        this.ServerPort_u32 = 0;\r\n        /** Server product name */\r\n        this.ServerProductName_str = \"\";\r\n        /** Server product version */\r\n        this.ServerProductVer_u32 = 0;\r\n        /** Server product build number */\r\n        this.ServerProductBuild_u32 = 0;\r\n        /** Connection start time */\r\n        this.StartTime_dt = new Date();\r\n        /** Connection completion time of the first connection */\r\n        this.FirstConnectionEstablisiedTime_dt = new Date();\r\n        /** Connection completion time of this connection */\r\n        this.CurrentConnectionEstablishTime_dt = new Date();\r\n        /** Number of connections have been established so far */\r\n        this.NumConnectionsEatablished_u32 = 0;\r\n        /** Half-connection */\r\n        this.HalfConnection_bool = false;\r\n        /** VoIP / QoS */\r\n        this.QoS_bool = false;\r\n        /** Maximum number of the underlying TCP connections */\r\n        this.MaxTcpConnections_u32 = 0;\r\n        /** Number of current underlying TCP connections */\r\n        this.NumTcpConnections_u32 = 0;\r\n        /** Number of inbound underlying connections */\r\n        this.NumTcpConnectionsUpload_u32 = 0;\r\n        /** Number of outbound underlying connections */\r\n        this.NumTcpConnectionsDownload_u32 = 0;\r\n        /** Use of encryption */\r\n        this.UseEncrypt_bool = false;\r\n        /** Cipher algorithm name */\r\n        this.CipherName_str = \"\";\r\n        /** Use of compression */\r\n        this.UseCompress_bool = false;\r\n        /** Is R-UDP session */\r\n        this.IsRUDPSession_bool = false;\r\n        /** Physical underlying communication protocol */\r\n        this.UnderlayProtocol_str = \"\";\r\n        /** The UDP acceleration is enabled */\r\n        this.IsUdpAccelerationEnabled_bool = false;\r\n        /** Using the UDP acceleration function */\r\n        this.IsUsingUdpAcceleration_bool = false;\r\n        /** VPN session name */\r\n        this.SessionName_str = \"\";\r\n        /** Connection name */\r\n        this.ConnectionName_str = \"\";\r\n        /** Session key */\r\n        this.SessionKey_bin = new Uint8Array([]);\r\n        /** Total transmitted data size */\r\n        this.TotalSendSize_u64 = 0;\r\n        /** Total received data size */\r\n        this.TotalRecvSize_u64 = 0;\r\n        /** Total transmitted data size (no compression) */\r\n        this.TotalSendSizeReal_u64 = 0;\r\n        /** Total received data size (no compression) */\r\n        this.TotalRecvSizeReal_u64 = 0;\r\n        /** Is Bridge Mode */\r\n        this.IsBridgeMode_bool = false;\r\n        /** Is Monitor mode */\r\n        this.IsMonitorMode_bool = false;\r\n        /** VLAN ID */\r\n        this.VLanId_u32 = 0;\r\n        /** Client product name */\r\n        this.ClientProductName_str = \"\";\r\n        /** Client version */\r\n        this.ClientProductVer_u32 = 0;\r\n        /** Client build number */\r\n        this.ClientProductBuild_u32 = 0;\r\n        /** Client OS name */\r\n        this.ClientOsName_str = \"\";\r\n        /** Client OS version */\r\n        this.ClientOsVer_str = \"\";\r\n        /** Client OS Product ID */\r\n        this.ClientOsProductId_str = \"\";\r\n        /** Client host name */\r\n        this.ClientHostname_str = \"\";\r\n        /** Unique ID */\r\n        this.UniqueId_bin = new Uint8Array([]);\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcSessionStatus;\r\n}());\r\nexports.VpnRpcSessionStatus = VpnRpcSessionStatus;\r\n/** Set the special listener */\r\nvar VpnRpcSpecialListener = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcSpecialListener' class: Set the special listener */\r\n    function VpnRpcSpecialListener(init) {\r\n        /** The flag to activate the VPN over ICMP server function */\r\n        this.VpnOverIcmpListener_bool = false;\r\n        /** The flag to activate the VPN over DNS function */\r\n        this.VpnOverDnsListener_bool = false;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcSpecialListener;\r\n}());\r\nexports.VpnRpcSpecialListener = VpnRpcSpecialListener;\r\n/** Syslog configuration */\r\nvar VpnSyslogSaveType;\r\n(function (VpnSyslogSaveType) {\r\n    /** Do not use syslog */\r\n    VpnSyslogSaveType[VpnSyslogSaveType[\"None\"] = 0] = \"None\";\r\n    /** Only server log */\r\n    VpnSyslogSaveType[VpnSyslogSaveType[\"ServerLog\"] = 1] = \"ServerLog\";\r\n    /** Server and Virtual HUB security log */\r\n    VpnSyslogSaveType[VpnSyslogSaveType[\"ServerAndHubSecurityLog\"] = 2] = \"ServerAndHubSecurityLog\";\r\n    /** Server, Virtual HUB security, and packet log */\r\n    VpnSyslogSaveType[VpnSyslogSaveType[\"ServerAndHubAllLog\"] = 3] = \"ServerAndHubAllLog\";\r\n})(VpnSyslogSaveType = exports.VpnSyslogSaveType || (exports.VpnSyslogSaveType = {}));\r\n/** Syslog configuration */\r\nvar VpnSyslogSetting = /** @class */ (function () {\r\n    /** Constructor for the 'VpnSyslogSetting' class: Syslog configuration */\r\n    function VpnSyslogSetting(init) {\r\n        /** The behavior of the syslog function */\r\n        this.SaveType_u32 = 0;\r\n        /** Specify the host name or IP address of the syslog server */\r\n        this.Hostname_str = \"\";\r\n        /** Specify the port number of the syslog server */\r\n        this.Port_u32 = 0;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnSyslogSetting;\r\n}());\r\nexports.VpnSyslogSetting = VpnSyslogSetting;\r\n/** VPN Gate Server Config */\r\nvar VpnVgsConfig = /** @class */ (function () {\r\n    /** Constructor for the 'VpnVgsConfig' class: VPN Gate Server Config */\r\n    function VpnVgsConfig(init) {\r\n        /** Active flag */\r\n        this.IsEnabled_bool = false;\r\n        /** Message */\r\n        this.Message_utf = \"\";\r\n        /** Owner name */\r\n        this.Owner_utf = \"\";\r\n        /** Abuse email */\r\n        this.Abuse_utf = \"\";\r\n        /** Log save flag */\r\n        this.NoLog_bool = false;\r\n        /** Save log permanently */\r\n        this.LogPermanent_bool = false;\r\n        /** Enable the L2TP VPN function */\r\n        this.EnableL2TP_bool = false;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnVgsConfig;\r\n}());\r\nexports.VpnVgsConfig = VpnVgsConfig;\r\n/** Read a Log file */\r\nvar VpnRpcReadLogFile = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcReadLogFile' class: Read a Log file */\r\n    function VpnRpcReadLogFile(init) {\r\n        /** Server name */\r\n        this.ServerName_str = \"\";\r\n        /** File Path */\r\n        this.FilePath_str = \"\";\r\n        /** Offset to download. You have to call the ReadLogFile API multiple times to download the entire log file with requesting a part of the file by specifying the Offset_u32 field. */\r\n        this.Offset_u32 = 0;\r\n        /** Received buffer */\r\n        this.Buffer_bin = new Uint8Array([]);\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcReadLogFile;\r\n}());\r\nexports.VpnRpcReadLogFile = VpnRpcReadLogFile;\r\n/** Rename link */\r\nvar VpnRpcRenameLink = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcRenameLink' class: Rename link */\r\n    function VpnRpcRenameLink(init) {\r\n        /** The Virtual Hub name */\r\n        this.HubName_str = \"\";\r\n        /** The old name of the cascade connection */\r\n        this.OldAccountName_utf = \"\";\r\n        /** The new name of the cascade connection */\r\n        this.NewAccountName_utf = \"\";\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcRenameLink;\r\n}());\r\nexports.VpnRpcRenameLink = VpnRpcRenameLink;\r\n/** Online or offline the HUB */\r\nvar VpnRpcSetHubOnline = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcSetHubOnline' class: Online or offline the HUB */\r\n    function VpnRpcSetHubOnline(init) {\r\n        /** The Virtual Hub name */\r\n        this.HubName_str = \"\";\r\n        /** Online / offline flag */\r\n        this.Online_bool = false;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcSetHubOnline;\r\n}());\r\nexports.VpnRpcSetHubOnline = VpnRpcSetHubOnline;\r\n/** Set Password */\r\nvar VpnRpcSetPassword = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcSetPassword' class: Set Password */\r\n    function VpnRpcSetPassword(init) {\r\n        /** The plaintext password */\r\n        this.PlainTextPassword_str = \"\";\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcSetPassword;\r\n}());\r\nexports.VpnRpcSetPassword = VpnRpcSetPassword;\r\n// --- Utility codes ---\r\n/** JSON-RPC request class. See https://www.jsonrpc.org/specification */\r\nvar JsonRpcRequest = /** @class */ (function () {\r\n    function JsonRpcRequest(method, param, id) {\r\n        if (method === void 0) { method = \"\"; }\r\n        if (param === void 0) { param = null; }\r\n        if (id === void 0) { id = \"\"; }\r\n        this.jsonrpc = \"2.0\";\r\n        this.method = method;\r\n        this.params = param;\r\n        this.id = id;\r\n    }\r\n    return JsonRpcRequest;\r\n}());\r\nexports.JsonRpcRequest = JsonRpcRequest;\r\n/** JSON-RPC error class. See https://www.jsonrpc.org/specification */\r\nvar JsonRpcError = /** @class */ (function () {\r\n    function JsonRpcError(code, message, data) {\r\n        if (code === void 0) { code = 0; }\r\n        if (message === void 0) { message = \"\"; }\r\n        if (data === void 0) { data = null; }\r\n        this.code = code;\r\n        this.message = message;\r\n        this.data = data;\r\n    }\r\n    return JsonRpcError;\r\n}());\r\nexports.JsonRpcError = JsonRpcError;\r\n/** JSON-RPC response class with generics */\r\nvar JsonRpcResponse = /** @class */ (function () {\r\n    function JsonRpcResponse() {\r\n        this.jsonrpc = \"2.0\";\r\n        this.result = null;\r\n        this.error = null;\r\n        this.id = \"\";\r\n    }\r\n    return JsonRpcResponse;\r\n}());\r\nexports.JsonRpcResponse = JsonRpcResponse;\r\n/** JSON-RPC client class. See https://www.jsonrpc.org/specification */\r\nvar JsonRpcClient = /** @class */ (function () {\r\n    /**\r\n     * JSON-RPC client class constructor\r\n     * @param url The URL\r\n     * @param headers Additional HTTP headers\r\n     * @param send_credential Set true to use the same credential with the browsing web site. Valid only if the code is running on the web browser.\r\n     */\r\n    function JsonRpcClient(url, headers, send_credential, nodejs_https_client_reject_untrusted_server_cert) {\r\n        this.BaseUrl = url;\r\n        this.headers = headers;\r\n        this.client = new HttpClient();\r\n        this.client.SendCredential = send_credential;\r\n        this.client.NodeJS_HTTPS_Client_Reject_Unauthorized = nodejs_https_client_reject_untrusted_server_cert;\r\n    }\r\n    /** A utility function to convert any object to JSON string */\r\n    JsonRpcClient.ObjectToJson = function (obj) {\r\n        return JSON.stringify(obj, function (key, value) {\r\n            if (key.endsWith(\"_bin\")) {\r\n                return Util_Base64_Encode(value);\r\n            }\r\n            return value;\r\n        }, 4);\r\n    };\r\n    /** A utility function to convert JSON string to object */\r\n    JsonRpcClient.JsonToObject = function (str) {\r\n        return JSON.parse(str, function (key, value) {\r\n            if (key.endsWith(\"_bin\")) {\r\n                return Util_Base64_Decode(value);\r\n            }\r\n            else if (key.endsWith(\"_dt\")) {\r\n                return new Date(value);\r\n            }\r\n            return value;\r\n        });\r\n    };\r\n    /**\r\n     * Call a single RPC call (without error check). You can wait for the response with Promise<string> or await statement.\r\n     * @param method_name The name of RPC method\r\n     * @param param The parameters\r\n     */\r\n    JsonRpcClient.prototype.CallInternalAsync = function (method_name, param) {\r\n        return __awaiter(this, void 0, void 0, function () {\r\n            var id, req, req_string, http_response, ret_string;\r\n            return __generator(this, function (_a) {\r\n                switch (_a.label) {\r\n                    case 0:\r\n                        id = \"1\";\r\n                        req = new JsonRpcRequest(method_name, param, id);\r\n                        req_string = JsonRpcClient.ObjectToJson(req);\r\n                        if (debug_mode) {\r\n                            console.log(\"--- RPC Request Body ---\");\r\n                            console.log(req_string);\r\n                            console.log(\"------------------------\");\r\n                        }\r\n                        return [4 /*yield*/, this.client.PostAsync(this.BaseUrl, this.headers, req_string, \"application/json\")];\r\n                    case 1:\r\n                        http_response = _a.sent();\r\n                        ret_string = http_response.Body;\r\n                        if (debug_mode) {\r\n                            console.log(\"--- RPC Response Body ---\");\r\n                            console.log(ret_string);\r\n                            console.log(\"-------------------------\");\r\n                        }\r\n                        return [2 /*return*/, ret_string];\r\n                }\r\n            });\r\n        });\r\n    };\r\n    /**\r\n     * Call a single RPC call (with error check). You can wait for the response with Promise<TResult> or await statement. In the case of error, it will be thrown.\r\n     * @param method_name The name of RPC method\r\n     * @param param The parameters\r\n     */\r\n    JsonRpcClient.prototype.CallAsync = function (method_name, param) {\r\n        return __awaiter(this, void 0, void 0, function () {\r\n            var ret_string, ret;\r\n            return __generator(this, function (_a) {\r\n                switch (_a.label) {\r\n                    case 0: return [4 /*yield*/, this.CallInternalAsync(method_name, param)];\r\n                    case 1:\r\n                        ret_string = _a.sent();\r\n                        ret = JSON.parse(ret_string);\r\n                        if (is_null(ret.error) === false) {\r\n                            throw new JsonRpcException(ret.error);\r\n                        }\r\n                        return [2 /*return*/, ret.result];\r\n                }\r\n            });\r\n        });\r\n    };\r\n    return JsonRpcClient;\r\n}());\r\nexports.JsonRpcClient = JsonRpcClient;\r\n/** JSON-RPC exception class */\r\nvar JsonRpcException = /** @class */ (function (_super) {\r\n    __extends(JsonRpcException, _super);\r\n    function JsonRpcException(error) {\r\n        var _this = _super.call(this, \"Code=\" + error.code + \", Message=\" + error.message) || this;\r\n        _this.Error = error;\r\n        return _this;\r\n    }\r\n    return JsonRpcException;\r\n}(Error));\r\nexports.JsonRpcException = JsonRpcException;\r\n/** HTTP client exception class */\r\nvar HttpClientException = /** @class */ (function (_super) {\r\n    __extends(HttpClientException, _super);\r\n    function HttpClientException(message) {\r\n        return _super.call(this, message) || this;\r\n    }\r\n    return HttpClientException;\r\n}(Error));\r\nexports.HttpClientException = HttpClientException;\r\n/** HTTP client response class */\r\nvar HttpClientResponse = /** @class */ (function () {\r\n    function HttpClientResponse() {\r\n        this.Body = \"\";\r\n    }\r\n    return HttpClientResponse;\r\n}());\r\nexports.HttpClientResponse = HttpClientResponse;\r\n/** An HTTP client which can be used in both web browsers and Node.js */\r\nvar HttpClient = /** @class */ (function () {\r\n    function HttpClient() {\r\n        this.TimeoutMsecs = 60 * 5 * 1000;\r\n        this.SendCredential = true;\r\n        this.NodeJS_HTTPS_Client_Reject_Unauthorized = false;\r\n    }\r\n    /** Post method. In web browsers this function will process the request by itself. In Node.js this function will call PostAsync_NodeJS() instead. */\r\n    HttpClient.prototype.PostAsync = function (url, headers, req_body, req_media_type) {\r\n        return __awaiter(this, void 0, void 0, function () {\r\n            var fetch_header_list, _i, _a, name_1, fetch_init, fetch_response, ret, _b;\r\n            return __generator(this, function (_c) {\r\n                switch (_c.label) {\r\n                    case 0:\r\n                        if (is_node_js) {\r\n                            return [2 /*return*/, this.PostAsync_NodeJS(url, headers, req_body, req_media_type)];\r\n                        }\r\n                        fetch_header_list = new Headers();\r\n                        for (_i = 0, _a = Object.keys(headers); _i < _a.length; _i++) {\r\n                            name_1 = _a[_i];\r\n                            fetch_header_list.append(name_1, headers[name_1]);\r\n                        }\r\n                        fetch_init = {\r\n                            mode: \"cors\",\r\n                            headers: fetch_header_list,\r\n                            credentials: (this.SendCredential ? \"include\" : \"omit\"),\r\n                            method: \"POST\",\r\n                            cache: \"no-cache\",\r\n                            keepalive: true,\r\n                            redirect: \"follow\",\r\n                            body: req_body\r\n                        };\r\n                        return [4 /*yield*/, fetch(url, fetch_init)];\r\n                    case 1:\r\n                        fetch_response = _c.sent();\r\n                        if (fetch_response.ok === false) {\r\n                            throw new HttpClientException(\"HTTP Error: \" + fetch_response.status + \" \" + fetch_response.statusText);\r\n                        }\r\n                        ret = new HttpClientResponse();\r\n                        _b = ret;\r\n                        return [4 /*yield*/, fetch_response.text()];\r\n                    case 2:\r\n                        _b.Body = _c.sent();\r\n                        return [2 /*return*/, ret];\r\n                }\r\n            });\r\n        });\r\n    };\r\n    /** Post method for Node.js. */\r\n    HttpClient.prototype.PostAsync_NodeJS = function (url, headers, req_body, req_media_type) {\r\n        var https = require(\"https\");\r\n        var keepAliveAgent = new https.Agent({ keepAlive: true });\r\n        var urlparse = require(\"url\");\r\n        var urlobj = urlparse.parse(url);\r\n        if (is_null(urlobj.host))\r\n            throw new Error(\"URL is invalid.\");\r\n        var options = {\r\n            host: urlobj.hostname,\r\n            port: urlobj.port,\r\n            path: urlobj.path,\r\n            rejectUnauthorized: this.NodeJS_HTTPS_Client_Reject_Unauthorized,\r\n            method: \"POST\",\r\n            timeout: this.TimeoutMsecs,\r\n            agent: keepAliveAgent\r\n        };\r\n        return new Promise(function (resolve, reject) {\r\n            var req = https.request(options, function (res) {\r\n                if (res.statusCode !== 200) {\r\n                    reject(new HttpClientException(\"HTTP Error: \" + res.statusCode + \" \" + res.statusMessage));\r\n                }\r\n                var recv_str = \"\";\r\n                res.on(\"data\", function (body) {\r\n                    recv_str += body;\r\n                });\r\n                res.on(\"end\", function () {\r\n                    var ret = new HttpClientResponse();\r\n                    ret.Body = recv_str;\r\n                    resolve(ret);\r\n                });\r\n            }).on(\"error\", function (err) {\r\n                throw err;\r\n            });\r\n            for (var _i = 0, _a = Object.keys(headers); _i < _a.length; _i++) {\r\n                var name_2 = _a[_i];\r\n                req.setHeader(name_2, !is_null(headers[name_2]) ? headers[name_2] : \"\");\r\n            }\r\n            req.setHeader(\"Content-Type\", req_media_type);\r\n            req.setHeader(\"Content-Length\", Buffer.byteLength(req_body));\r\n            req.write(req_body);\r\n            req.end();\r\n        });\r\n    };\r\n    return HttpClient;\r\n}());\r\nexports.HttpClient = HttpClient;\r\n//////// BEGIN: Base64 encode / decode utility functions from https://github.com/beatgammit/base64-js\r\n// The MIT License(MIT)\r\n// Copyright(c) 2014\r\n// Permission is hereby granted, free of charge, to any person obtaining a copy\r\n// of this software and associated documentation files(the \"Software\"), to deal\r\n//     in the Software without restriction, including without limitation the rights\r\n// to use, copy, modify, merge, publish, distribute, sublicense, and / or sell\r\n// copies of the Software, and to permit persons to whom the Software is\r\n// furnished to do so, subject to the following conditions:\r\n// The above copyright notice and this permission notice shall be included in\r\n//     all copies or substantial portions of the Software.\r\n// THE SOFTWARE IS PROVIDED \"AS IS\", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR\r\n// IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,\r\n//     FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.IN NO EVENT SHALL THE\r\n// AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER\r\n// LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,\r\n//     OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN\r\n// THE SOFTWARE.\r\nvar lookup = [];\r\nvar revLookup = [];\r\nvar code = \"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/\";\r\nfor (var i = 0, len = code.length; i < len; ++i) {\r\n    lookup[i] = code[i];\r\n    revLookup[code.charCodeAt(i)] = i;\r\n}\r\n// Support decoding URL-safe base64 strings, as Node.js does.\r\n// See: https://en.wikipedia.org/wiki/Base64#URL_applications\r\nrevLookup[\"-\".charCodeAt(0)] = 62;\r\nrevLookup[\"_\".charCodeAt(0)] = 63;\r\nfunction getLens(b64) {\r\n    var len = b64.length;\r\n    if (len % 4 > 0) {\r\n        throw new Error(\"Invalid string. Length must be a multiple of 4\");\r\n    }\r\n    // Trim off extra bytes after placeholder bytes are found\r\n    // See: https://github.com/beatgammit/base64-js/issues/42\r\n    var validLen = b64.indexOf(\"=\");\r\n    if (validLen === -1)\r\n        validLen = len;\r\n    var placeHoldersLen = validLen === len\r\n        ? 0\r\n        : 4 - (validLen % 4);\r\n    return [validLen, placeHoldersLen];\r\n}\r\n// base64 is 4/3 + up to two characters of the original data\r\nfunction byteLength(b64) {\r\n    var lens = getLens(b64);\r\n    var validLen = lens[0];\r\n    var placeHoldersLen = lens[1];\r\n    return ((validLen + placeHoldersLen) * 3 / 4) - placeHoldersLen;\r\n}\r\nfunction _byteLength(b64, validLen, placeHoldersLen) {\r\n    return ((validLen + placeHoldersLen) * 3 / 4) - placeHoldersLen;\r\n}\r\nfunction Util_Base64_Decode(b64) {\r\n    var tmp;\r\n    var lens = getLens(b64);\r\n    var validLen = lens[0];\r\n    var placeHoldersLen = lens[1];\r\n    var arr = new Uint8Array(_byteLength(b64, validLen, placeHoldersLen));\r\n    var curByte = 0;\r\n    // if there are placeholders, only get up to the last complete 4 chars\r\n    var len = placeHoldersLen > 0\r\n        ? validLen - 4\r\n        : validLen;\r\n    for (var i = 0; i < len; i += 4) {\r\n        tmp =\r\n            (revLookup[b64.charCodeAt(i)] << 18) |\r\n                (revLookup[b64.charCodeAt(i + 1)] << 12) |\r\n                (revLookup[b64.charCodeAt(i + 2)] << 6) |\r\n                revLookup[b64.charCodeAt(i + 3)];\r\n        arr[curByte++] = (tmp >> 16) & 0xFF;\r\n        arr[curByte++] = (tmp >> 8) & 0xFF;\r\n        arr[curByte++] = tmp & 0xFF;\r\n    }\r\n    if (placeHoldersLen === 2) {\r\n        tmp =\r\n            (revLookup[b64.charCodeAt(i)] << 2) |\r\n                (revLookup[b64.charCodeAt(i + 1)] >> 4);\r\n        arr[curByte++] = tmp & 0xFF;\r\n    }\r\n    if (placeHoldersLen === 1) {\r\n        tmp =\r\n            (revLookup[b64.charCodeAt(i)] << 10) |\r\n                (revLookup[b64.charCodeAt(i + 1)] << 4) |\r\n                (revLookup[b64.charCodeAt(i + 2)] >> 2);\r\n        arr[curByte++] = (tmp >> 8) & 0xFF;\r\n        arr[curByte++] = tmp & 0xFF;\r\n    }\r\n    return arr;\r\n}\r\nexports.Util_Base64_Decode = Util_Base64_Decode;\r\nfunction tripletToBase64(num) {\r\n    return lookup[num >> 18 & 0x3F] +\r\n        lookup[num >> 12 & 0x3F] +\r\n        lookup[num >> 6 & 0x3F] +\r\n        lookup[num & 0x3F];\r\n}\r\nfunction encodeChunk(uint8, start, end) {\r\n    var tmp;\r\n    var output = [];\r\n    for (var i = start; i < end; i += 3) {\r\n        tmp =\r\n            ((uint8[i] << 16) & 0xFF0000) +\r\n                ((uint8[i + 1] << 8) & 0xFF00) +\r\n                (uint8[i + 2] & 0xFF);\r\n        output.push(tripletToBase64(tmp));\r\n    }\r\n    return output.join(\"\");\r\n}\r\nfunction Util_Base64_Encode(uint8) {\r\n    var tmp;\r\n    var len = uint8.length;\r\n    var extraBytes = len % 3; // if we have 1 byte left, pad 2 bytes\r\n    var parts = [];\r\n    var maxChunkLength = 16383; // must be multiple of 3\r\n    // go through the array every three bytes, we'll deal with trailing stuff later\r\n    for (var i = 0, len2 = len - extraBytes; i < len2; i += maxChunkLength) {\r\n        parts.push(encodeChunk(uint8, i, (i + maxChunkLength) > len2 ? len2 : (i + maxChunkLength)));\r\n    }\r\n    // pad the end with zeros, but make sure to not forget the extra bytes\r\n    if (extraBytes === 1) {\r\n        tmp = uint8[len - 1];\r\n        parts.push(lookup[tmp >> 2] +\r\n            lookup[(tmp << 4) & 0x3F] +\r\n            \"==\");\r\n    }\r\n    else if (extraBytes === 2) {\r\n        tmp = (uint8[len - 2] << 8) + uint8[len - 1];\r\n        parts.push(lookup[tmp >> 10] +\r\n            lookup[(tmp >> 4) & 0x3F] +\r\n            lookup[(tmp << 2) & 0x3F] +\r\n            \"=\");\r\n    }\r\n    return parts.join(\"\");\r\n}\r\nexports.Util_Base64_Encode = Util_Base64_Encode;\r\n//////// END: Base64 encode / decode utility functions from https://github.com/beatgammit/base64-js\r\n//# sourceMappingURL=vpnrpc.js.map"],"mappings":"AAAA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;A","sourceRoot":""}\n//# sourceURL=webpack-internal:///./node_modules/vpnrpc/dist/vpnrpc.js\n"); +eval("/* WEBPACK VAR INJECTION */(function(Buffer) {\r\n// SoftEther VPN Server JSON-RPC Stub code for TypeScript\r\n// \r\n// vpnrpc.ts\r\n// Automatically generated at 2019-05-29 18:21:39 by vpnserver-jsonrpc-codegen\r\n//\r\n// Licensed under the Apache License 2.0\r\n// Copyright (c) 2014-2019 SoftEther VPN Project\r\nvar __extends = (this && this.__extends) || (function () {\r\n var extendStatics = function (d, b) {\r\n extendStatics = Object.setPrototypeOf ||\r\n ({ __proto__: [] } instanceof Array && function (d, b) { d.__proto__ = b; }) ||\r\n function (d, b) { for (var p in b) if (b.hasOwnProperty(p)) d[p] = b[p]; };\r\n return extendStatics(d, b);\r\n };\r\n return function (d, b) {\r\n extendStatics(d, b);\r\n function __() { this.constructor = d; }\r\n d.prototype = b === null ? Object.create(b) : (__.prototype = b.prototype, new __());\r\n };\r\n})();\r\nvar __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) {\r\n return new (P || (P = Promise))(function (resolve, reject) {\r\n function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } }\r\n function rejected(value) { try { step(generator[\"throw\"](value)); } catch (e) { reject(e); } }\r\n function step(result) { result.done ? resolve(result.value) : new P(function (resolve) { resolve(result.value); }).then(fulfilled, rejected); }\r\n step((generator = generator.apply(thisArg, _arguments || [])).next());\r\n });\r\n};\r\nvar __generator = (this && this.__generator) || function (thisArg, body) {\r\n var _ = { label: 0, sent: function() { if (t[0] & 1) throw t[1]; return t[1]; }, trys: [], ops: [] }, f, y, t, g;\r\n return g = { next: verb(0), \"throw\": verb(1), \"return\": verb(2) }, typeof Symbol === \"function\" && (g[Symbol.iterator] = function() { return this; }), g;\r\n function verb(n) { return function (v) { return step([n, v]); }; }\r\n function step(op) {\r\n if (f) throw new TypeError(\"Generator is already executing.\");\r\n while (_) try {\r\n if (f = 1, y && (t = op[0] & 2 ? y[\"return\"] : op[0] ? y[\"throw\"] || ((t = y[\"return\"]) && t.call(y), 0) : y.next) && !(t = t.call(y, op[1])).done) return t;\r\n if (y = 0, t) op = [op[0] & 2, t.value];\r\n switch (op[0]) {\r\n case 0: case 1: t = op; break;\r\n case 4: _.label++; return { value: op[1], done: false };\r\n case 5: _.label++; y = op[1]; op = [0]; continue;\r\n case 7: op = _.ops.pop(); _.trys.pop(); continue;\r\n default:\r\n if (!(t = _.trys, t = t.length > 0 && t[t.length - 1]) && (op[0] === 6 || op[0] === 2)) { _ = 0; continue; }\r\n if (op[0] === 3 && (!t || (op[1] > t[0] && op[1] < t[3]))) { _.label = op[1]; break; }\r\n if (op[0] === 6 && _.label < t[1]) { _.label = t[1]; t = op; break; }\r\n if (t && _.label < t[2]) { _.label = t[2]; _.ops.push(op); break; }\r\n if (t[2]) _.ops.pop();\r\n _.trys.pop(); continue;\r\n }\r\n op = body.call(thisArg, _);\r\n } catch (e) { op = [6, e]; y = 0; } finally { f = t = 0; }\r\n if (op[0] & 5) throw op[1]; return { value: op[0] ? op[1] : void 0, done: true };\r\n }\r\n};\r\nexports.__esModule = true;\r\n// Trivial utility codes\r\nvar is_node_js = (typeof navigator === \"undefined\") || navigator.userAgent.indexOf(\"Node.js\") !== -1 || navigator.userAgent.indexOf(\"jsdom\") !== -1;\r\nfunction is_null(obj) {\r\n return (typeof obj === \"undefined\") || (obj === null);\r\n}\r\nvar debug_mode = false;\r\n/** VPN Server RPC Stubs */\r\nvar VpnServerRpc = /** @class */ (function () {\r\n /**\r\n * Constructor of the VpnServerRpc class\r\n * @param vpnserver_hostname The hostname or IP address of the destination VPN Server. In the web browser you can specify null if you want to connect to the server itself.\r\n * @param vpnserver_port The port number of the destination VPN Server. In the web browser you can specify null if you want to connect to the server itself.\r\n * @param hubname The name of the Virtual Hub if you want to connect to the VPN Server as a Virtual Hub Admin Mode. Specify null if you want to connect to the VPN Server as the Entire VPN Server Admin Mode.\r\n * @param password Specify the administration password. This value is valid only if vpnserver_hostname is sepcified.\r\n * @param nodejs_https_client_reject_untrusted_server_cert In Node.js set this true to check the SSL server certificate on the destination VPN Server. Set this false to ignore the SSL server certification.\r\n */\r\n function VpnServerRpc(vpnserver_hostname, vpnserver_port, hubname, password, nodejs_https_client_reject_untrusted_server_cert) {\r\n var _this = this;\r\n // --- Stubs ---\r\n /** Test RPC function. Input any integer value to the IntValue_u32 field. Then the server will convert the integer to the string, and return the string in the StrValue_str field. */\r\n this.Test = function (in_param) {\r\n return _this.CallAsync(\"Test\", in_param);\r\n };\r\n /** Get server information. This allows you to obtain the server information of the currently connected VPN Server or VPN Bridge. Included in the server information are the version number, build number and build information. You can also obtain information on the current server operation mode and the information of operating system that the server is operating on. */\r\n this.GetServerInfo = function () {\r\n return _this.CallAsync(\"GetServerInfo\", new VpnRpcServerInfo());\r\n };\r\n /** Get Current Server Status. This allows you to obtain in real-time the current status of the currently connected VPN Server or VPN Bridge. You can get statistical information on data communication and the number of different kinds of objects that exist on the server. You can get information on how much memory is being used on the current computer by the OS. */\r\n this.GetServerStatus = function () {\r\n return _this.CallAsync(\"GetServerStatus\", new VpnRpcServerStatus());\r\n };\r\n /** Create New TCP Listener. This allows you to create a new TCP Listener on the server. By creating the TCP Listener the server starts listening for a connection from clients at the specified TCP/IP port number. A TCP Listener that has been created can be deleted by the DeleteListener API. You can also get a list of TCP Listeners currently registered by using the EnumListener API. To execute this API, you must have VPN Server administrator privileges. */\r\n this.CreateListener = function (in_param) {\r\n return _this.CallAsync(\"CreateListener\", in_param);\r\n };\r\n /** Get List of TCP Listeners. This allows you to get a list of TCP listeners registered on the current server. You can obtain information on whether the various TCP listeners have a status of operating or error. To call this API, you must have VPN Server administrator privileges. */\r\n this.EnumListener = function () {\r\n return _this.CallAsync(\"EnumListener\", new VpnRpcListenerList());\r\n };\r\n /** Delete TCP Listener. This allows you to delete a TCP Listener that's registered on the server. When the TCP Listener is in a state of operation, the listener will automatically be deleted when its operation stops. You can also get a list of TCP Listeners currently registered by using the EnumListener API. To call this API, you must have VPN Server administrator privileges. */\r\n this.DeleteListener = function (in_param) {\r\n return _this.CallAsync(\"DeleteListener\", in_param);\r\n };\r\n /** Enable / Disable TCP Listener. This starts or stops the operation of TCP Listeners registered on the current server. You can also get a list of TCP Listeners currently registered by using the EnumListener API. To call this API, you must have VPN Server administrator privileges. */\r\n this.EnableListener = function (in_param) {\r\n return _this.CallAsync(\"EnableListener\", in_param);\r\n };\r\n /** Set VPN Server Administrator Password. This sets the VPN Server administrator password. You can specify the password as a parameter. To call this API, you must have VPN Server administrator privileges. */\r\n this.SetServerPassword = function (in_param) {\r\n return _this.CallAsync(\"SetServerPassword\", in_param);\r\n };\r\n /** Set the VPN Server clustering configuration. Use this to set the VPN Server type as Standalone Server, Cluster Controller Server or Cluster Member Server. Standalone server means a VPN Server that does not belong to any cluster in its current state. When VPN Server is installed, by default it will be in standalone server mode. Unless you have particular plans to configure a cluster, we recommend the VPN Server be operated in standalone mode. A cluster controller is the central computer of all member servers of a cluster in the case where a clustering environment is made up of multiple VPN Servers. Multiple cluster members can be added to the cluster as required. A cluster requires one computer to serve this role. The other cluster member servers that are configured in the same cluster begin operation as a cluster member by connecting to the cluster controller. To call this API, you must have VPN Server administrator privileges. Also, when this API is executed, VPN Server will automatically restart. This API cannot be called on VPN Bridge. */\r\n this.SetFarmSetting = function (in_param) {\r\n return _this.CallAsync(\"SetFarmSetting\", in_param);\r\n };\r\n /** Get Clustering Configuration of Current VPN Server. You can use this to acquire the clustering configuration of the current VPN Server. To call this API, you must have VPN Server administrator privileges. */\r\n this.GetFarmSetting = function () {\r\n return _this.CallAsync(\"GetFarmSetting\", new VpnRpcFarm());\r\n };\r\n /** Get Cluster Member Information. When the VPN Server is operating as a cluster controller, you can get information on cluster member servers on that cluster by specifying the IDs of the member servers. You can get the following information about the specified cluster member server: Server Type, Time Connection has been Established, IP Address, Host Name, Points, Public Port List, Number of Operating Virtual Hubs, First Virtual Hub, Number of Sessions and Number of TCP Connections. This API cannot be invoked on VPN Bridge. */\r\n this.GetFarmInfo = function (in_param) {\r\n return _this.CallAsync(\"GetFarmInfo\", in_param);\r\n };\r\n /** Get List of Cluster Members. Use this API when the VPN Server is operating as a cluster controller to get a list of the cluster member servers on the same cluster, including the cluster controller itself. For each member, the following information is also listed: Type, Connection Start, Host Name, Points, Number of Session, Number of TCP Connections, Number of Operating Virtual Hubs, Using Client Connection License and Using Bridge Connection License. This API cannot be invoked on VPN Bridge. */\r\n this.EnumFarmMember = function () {\r\n return _this.CallAsync(\"EnumFarmMember\", new VpnRpcEnumFarm());\r\n };\r\n /** Get Connection Status to Cluster Controller. Use this API when the VPN Server is operating as a cluster controller to get the status of connection to the cluster controller. You can get the following information: Controller IP Address, Port Number, Connection Status, Connection Start Time, First Connection Established Time, Current Connection Established Time, Number of Connection Attempts, Number of Successful Connections, Number of Failed Connections. This API cannot be invoked on VPN Bridge. */\r\n this.GetFarmConnectionStatus = function () {\r\n return _this.CallAsync(\"GetFarmConnectionStatus\", new VpnRpcFarmConnectionStatus());\r\n };\r\n /** Set SSL Certificate and Private Key of VPN Server. You can set the SSL certificate that the VPN Server provides to the connected client and the private key for that certificate. The certificate must be in X.509 format and the private key must be Base 64 encoded format. To call this API, you must have VPN Server administrator privileges. */\r\n this.SetServerCert = function (in_param) {\r\n return _this.CallAsync(\"SetServerCert\", in_param);\r\n };\r\n /** Get SSL Certificate and Private Key of VPN Server. Use this to get the SSL certificate private key that the VPN Server provides to the connected client. To call this API, you must have VPN Server administrator privileges. */\r\n this.GetServerCert = function () {\r\n return _this.CallAsync(\"GetServerCert\", new VpnRpcKeyPair());\r\n };\r\n /** Get the Encrypted Algorithm Used for VPN Communication. Use this API to get the current setting of the algorithm used for the electronic signature and encrypted for SSL connection to be used for communication between the VPN Server and the connected client and the list of algorithms that can be used on the VPN Server. */\r\n this.GetServerCipher = function () {\r\n return _this.CallAsync(\"GetServerCipher\", new VpnRpcStr());\r\n };\r\n /** Set the Encrypted Algorithm Used for VPN Communication. Use this API to set the algorithm used for the electronic signature and encrypted for SSL connections to be used for communication between the VPN Server and the connected client. By specifying the algorithm name, the specified algorithm will be used later between the VPN Client and VPN Bridge connected to this server and the data will be encrypted. To call this API, you must have VPN Server administrator privileges. */\r\n this.SetServerCipher = function (in_param) {\r\n return _this.CallAsync(\"SetServerCipher\", in_param);\r\n };\r\n /** Create New Virtual Hub. Use this to create a new Virtual Hub on the VPN Server. The created Virtual Hub will begin operation immediately. When the VPN Server is operating on a cluster, this API is only valid for the cluster controller. Also, the new Virtual Hub will operate as a dynamic Virtual Hub. You can change it to a static Virtual Hub by using the SetHub API. To get a list of Virtual Hubs that are already on the VPN Server, use the EnumHub API. To call this API, you must have VPN Server administrator privileges. Also, this API does not operate on VPN Servers that are operating as a VPN Bridge or cluster member. */\r\n this.CreateHub = function (in_param) {\r\n return _this.CallAsync(\"CreateHub\", in_param);\r\n };\r\n /** Set the Virtual Hub configuration. You can call this API to change the configuration of the specified Virtual Hub. You can set the Virtual Hub online or offline. You can set the maximum number of sessions that can be concurrently connected to the Virtual Hub that is currently being managed. You can set the Virtual Hub administrator password. You can set other parameters for the Virtual Hub. Before call this API, you need to obtain the latest state of the Virtual Hub by using the GetHub API. */\r\n this.SetHub = function (in_param) {\r\n return _this.CallAsync(\"SetHub\", in_param);\r\n };\r\n /** Get the Virtual Hub configuration. You can call this API to get the current configuration of the specified Virtual Hub. To change the configuration of the Virtual Hub, call the SetHub API. */\r\n this.GetHub = function (in_param) {\r\n return _this.CallAsync(\"GetHub\", in_param);\r\n };\r\n /** Get List of Virtual Hubs. Use this to get a list of existing Virtual Hubs on the VPN Server. For each Virtual Hub, you can get the following information: Virtual Hub Name, Status, Type, Number of Users, Number of Groups, Number of Sessions, Number of MAC Tables, Number of IP Tables, Number of Logins, Last Login, and Last Communication. Note that when connecting in Virtual Hub Admin Mode, if in the options of a Virtual Hub that you do not have administrator privileges for, the option Don't Enumerate this Virtual Hub for Anonymous Users is enabled then that Virtual Hub will not be enumerated. If you are connected in Server Admin Mode, then the list of all Virtual Hubs will be displayed. When connecting to and managing a non-cluster-controller cluster member of a clustering environment, only the Virtual Hub currently being hosted by that VPN Server will be displayed. When connecting to a cluster controller for administration purposes, all the Virtual Hubs will be displayed. */\r\n this.EnumHub = function () {\r\n return _this.CallAsync(\"EnumHub\", new VpnRpcEnumHub());\r\n };\r\n /** Delete Virtual Hub. Use this to delete an existing Virtual Hub on the VPN Server. If you delete the Virtual Hub, all sessions that are currently connected to the Virtual Hub will be disconnected and new sessions will be unable to connect to the Virtual Hub. Also, this will also delete all the Hub settings, user objects, group objects, certificates and Cascade Connections. Once you delete the Virtual Hub, it cannot be recovered. To call this API, you must have VPN Server administrator privileges. Also, this API does not operate on VPN Servers that are operating as a VPN Bridge or cluster member. */\r\n this.DeleteHub = function (in_param) {\r\n return _this.CallAsync(\"DeleteHub\", in_param);\r\n };\r\n /** Get Setting of RADIUS Server Used for User Authentication. Use this to get the current settings for the RADIUS server used when a user connects to the currently managed Virtual Hub using RADIUS Server Authentication Mode. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n this.GetHubRadius = function (in_param) {\r\n return _this.CallAsync(\"GetHubRadius\", in_param);\r\n };\r\n /** Set RADIUS Server to use for User Authentication. To accept users to the currently managed Virtual Hub in RADIUS server authentication mode, you can specify an external RADIUS server that confirms the user name and password. (You can specify multiple hostname by splitting with comma or semicolon.) The RADIUS server must be set to receive requests from IP addresses of this VPN Server. Also, authentication by Password Authentication Protocol (PAP) must be enabled. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n this.SetHubRadius = function (in_param) {\r\n return _this.CallAsync(\"SetHubRadius\", in_param);\r\n };\r\n /** Get List of TCP Connections Connecting to the VPN Server. Use this to get a list of TCP/IP connections that are currently connecting to the VPN Server. It does not display the TCP connections that have been established as VPN sessions. To get the list of TCP/IP connections that have been established as VPN sessions, you can use the EnumSession API. You can get the following: Connection Name, Connection Source, Connection Start and Type. To call this API, you must have VPN Server administrator privileges. */\r\n this.EnumConnection = function () {\r\n return _this.CallAsync(\"EnumConnection\", new VpnRpcEnumConnection());\r\n };\r\n /** Disconnect TCP Connections Connecting to the VPN Server. Use this to forcefully disconnect specific TCP/IP connections that are connecting to the VPN Server. To call this API, you must have VPN Server administrator privileges. */\r\n this.DisconnectConnection = function (in_param) {\r\n return _this.CallAsync(\"DisconnectConnection\", in_param);\r\n };\r\n /** Get Information of TCP Connections Connecting to the VPN Server. Use this to get detailed information of a specific TCP/IP connection that is connecting to the VPN Server. You can get the following information: Connection Name, Connection Type, Source Hostname, Source IP Address, Source Port Number (TCP), Connection Start, Server Product Name, Server Version, Server Build Number, Client Product Name, Client Version, and Client Build Number. To call this API, you must have VPN Server administrator privileges. */\r\n this.GetConnectionInfo = function (in_param) {\r\n return _this.CallAsync(\"GetConnectionInfo\", in_param);\r\n };\r\n /** Switch Virtual Hub to Online or Offline. Use this to set the Virtual Hub to online or offline. A Virtual Hub with an offline status cannot receive VPN connections from clients. When you set the Virtual Hub offline, all sessions will be disconnected. A Virtual Hub with an offline status cannot receive VPN connections from clients. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n this.SetHubOnline = function (in_param) {\r\n return _this.CallAsync(\"SetHubOnline\", in_param);\r\n };\r\n /** Get Current Status of Virtual Hub. Use this to get the current status of the Virtual Hub currently being managed. You can get the following information: Virtual Hub Type, Number of Sessions, Number of Each Type of Object, Number of Logins, Last Login, Last Communication, and Communication Statistical Data. */\r\n this.GetHubStatus = function (in_param) {\r\n return _this.CallAsync(\"GetHubStatus\", in_param);\r\n };\r\n /** Set the logging configuration of the Virtual Hub. Use this to enable or disable a security log or packet logs of the Virtual Hub currently being managed, set the save contents of the packet log for each type of packet to be saved, and set the log file switch cycle for the security log or packet log that the currently managed Virtual Hub saves. There are the following packet types: TCP Connection Log, TCP Packet Log, DHCP Packet Log, UDP Packet Log, ICMP Packet Log, IP Packet Log, ARP Packet Log, and Ethernet Packet Log. To get the current setting, you can use the LogGet API. The log file switch cycle can be changed to switch in every second, every minute, every hour, every day, every month or not switch. To get the current setting, you can use the GetHubLog API. */\r\n this.SetHubLog = function (in_param) {\r\n return _this.CallAsync(\"SetHubLog\", in_param);\r\n };\r\n /** Get the logging configuration of the Virtual Hub. Use this to get the configuration for a security log or packet logs of the Virtual Hub currently being managed, get the setting for save contents of the packet log for each type of packet to be saved, and get the log file switch cycle for the security log or packet log that the currently managed Virtual Hub saves. To set the current setting, you can use the SetHubLog API. */\r\n this.GetHubLog = function (in_param) {\r\n return _this.CallAsync(\"GetHubLog\", in_param);\r\n };\r\n /** Add Trusted CA Certificate. Use this to add a new certificate to a list of CA certificates trusted by the currently managed Virtual Hub. The list of certificate authority certificates that are registered is used to verify certificates when a VPN Client is connected in signed certificate authentication mode. To get a list of the current certificates you can use the EnumCa API. The certificate you add must be saved in the X.509 file format. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a member server on a cluster. */\r\n this.AddCa = function (in_param) {\r\n return _this.CallAsync(\"AddCa\", in_param);\r\n };\r\n /** Get List of Trusted CA Certificates. Here you can manage the certificate authority certificates that are trusted by this currently managed Virtual Hub. The list of certificate authority certificates that are registered is used to verify certificates when a VPN Client is connected in signed certificate authentication mode. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a member server on a cluster. */\r\n this.EnumCa = function (in_param) {\r\n return _this.CallAsync(\"EnumCa\", in_param);\r\n };\r\n /** Get Trusted CA Certificate. Use this to get an existing certificate from the list of CA certificates trusted by the currently managed Virtual Hub and save it as a file in X.509 format. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a member server on a cluster. */\r\n this.GetCa = function (in_param) {\r\n return _this.CallAsync(\"GetCa\", in_param);\r\n };\r\n /** Delete Trusted CA Certificate. Use this to delete an existing certificate from the list of CA certificates trusted by the currently managed Virtual Hub. To get a list of the current certificates you can use the EnumCa API. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a member server on a cluster. */\r\n this.DeleteCa = function (in_param) {\r\n return _this.CallAsync(\"DeleteCa\", in_param);\r\n };\r\n /** Create New Cascade Connection. Use this to create a new Cascade Connection on the currently managed Virtual Hub. By using a Cascade Connection, you can connect this Virtual Hub by Cascade Connection to another Virtual Hub that is operating on the same or a different computer. To create a Cascade Connection, you must specify the name of the Cascade Connection, destination server and destination Virtual Hub and user name. When a new Cascade Connection is created, the type of user authentication is initially set as Anonymous Authentication and the proxy server setting and the verification options of the server certificate is not set. To change these settings and other advanced settings after a Cascade Connection has been created, use the other APIs that include the name \"Link\". [Warning About Cascade Connections] By connecting using a Cascade Connection you can create a Layer 2 bridge between multiple Virtual Hubs but if the connection is incorrectly configured, a loopback Cascade Connection could inadvertently be created. When using a Cascade Connection function please design the network topology with care. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n this.CreateLink = function (in_param) {\r\n return _this.CallAsync(\"CreateLink\", in_param);\r\n };\r\n /** Get the Cascade Connection Setting. Use this to get the Connection Setting of a Cascade Connection that is registered on the currently managed Virtual Hub. To change the Connection Setting contents of the Cascade Connection, use the APIs that include the name \"Link\" after creating the Cascade Connection. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n this.GetLink = function (in_param) {\r\n return _this.CallAsync(\"GetLink\", in_param);\r\n };\r\n /** Change Existing Cascade Connection. Use this to alter the setting of an existing Cascade Connection on the currently managed Virtual Hub. */\r\n this.SetLink = function (in_param) {\r\n return _this.CallAsync(\"SetLink\", in_param);\r\n };\r\n /** Get List of Cascade Connections. Use this to get a list of Cascade Connections that are registered on the currently managed Virtual Hub. By using a Cascade Connection, you can connect this Virtual Hub by Layer 2 Cascade Connection to another Virtual Hub that is operating on the same or a different computer. [Warning About Cascade Connections] By connecting using a Cascade Connection you can create a Layer 2 bridge between multiple Virtual Hubs but if the connection is incorrectly configured, a loopback Cascade Connection could inadvertently be created. When using a Cascade Connection function please design the network topology with care. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n this.EnumLink = function (in_param) {\r\n return _this.CallAsync(\"EnumLink\", in_param);\r\n };\r\n /** Switch Cascade Connection to Online Status. When a Cascade Connection registered on the currently managed Virtual Hub is specified, use this to switch that Cascade Connection to online status. The Cascade Connection that is switched to online status begins the process of connecting to the destination VPN Server in accordance with the Connection Setting. The Cascade Connection that is switched to online status will establish normal connection to the VPN Server or continue to attempt connection until it is switched to offline status. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n this.SetLinkOnline = function (in_param) {\r\n return _this.CallAsync(\"SetLinkOnline\", in_param);\r\n };\r\n /** Switch Cascade Connection to Offline Status. When a Cascade Connection registered on the currently managed Virtual Hub is specified, use this to switch that Cascade Connection to offline status. The Cascade Connection that is switched to offline will not connect to the VPN Server until next time it is switched to the online status using the SetLinkOnline API You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n this.SetLinkOffline = function (in_param) {\r\n return _this.CallAsync(\"SetLinkOffline\", in_param);\r\n };\r\n /** Delete Cascade Connection Setting. Use this to delete a Cascade Connection that is registered on the currently managed Virtual Hub. If the specified Cascade Connection has a status of online, the connections will be automatically disconnected and then the Cascade Connection will be deleted. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n this.DeleteLink = function (in_param) {\r\n return _this.CallAsync(\"DeleteLink\", in_param);\r\n };\r\n /** Change Name of Cascade Connection. When a Cascade Connection registered on the currently managed Virtual Hub is specified, use this to change the name of that Cascade Connection. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n this.RenameLink = function (in_param) {\r\n return _this.CallAsync(\"RenameLink\", in_param);\r\n };\r\n /** Get Current Cascade Connection Status. When a Cascade Connection registered on the currently managed Virtual Hub is specified and that Cascade Connection is currently online, use this to get its connection status and other information. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n this.GetLinkStatus = function (in_param) {\r\n return _this.CallAsync(\"GetLinkStatus\", in_param);\r\n };\r\n /** Add Access List Rule. Use this to add a new rule to the access list of the currently managed Virtual Hub. The access list is a set of packet file rules that are applied to packets that flow through the Virtual Hub. You can register multiple rules in an access list and you can also define an priority for each rule. All packets are checked for the conditions specified by the rules registered in the access list and based on the operation that is stipulated by the first matching rule, they either pass or are discarded. Packets that do not match any rule are implicitly allowed to pass. You can also use the access list to generate delays, jitters and packet losses. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a member server on a cluster. */\r\n this.AddAccess = function (in_param) {\r\n return _this.CallAsync(\"AddAccess\", in_param);\r\n };\r\n /** Delete Rule from Access List. Use this to specify a packet filter rule registered on the access list of the currently managed Virtual Hub and delete it. To delete a rule, you must specify that rule's ID. You can display the ID by using the EnumAccess API. If you wish not to delete the rule but to only temporarily disable it, use the SetAccessList API to set the rule status to disable. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a member server on a cluster. */\r\n this.DeleteAccess = function (in_param) {\r\n return _this.CallAsync(\"DeleteAccess\", in_param);\r\n };\r\n /** Get Access List Rule List. Use this to get a list of packet filter rules that are registered on access list of the currently managed Virtual Hub. The access list is a set of packet file rules that are applied to packets that flow through the Virtual Hub. You can register multiple rules in an access list and you can also define a priority for each rule. All packets are checked for the conditions specified by the rules registered in the access list and based on the operation that is stipulated by the first matching rule, they either pass or are discarded. Packets that do not match any rule are implicitly allowed to pass. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a member server on a cluster. */\r\n this.EnumAccess = function (in_param) {\r\n return _this.CallAsync(\"EnumAccess\", in_param);\r\n };\r\n /** Replace all access lists on a single bulk API call. This API removes all existing access list rules on the Virtual Hub, and replace them by new access list rules specified by the parameter. */\r\n this.SetAccessList = function (in_param) {\r\n return _this.CallAsync(\"SetAccessList\", in_param);\r\n };\r\n /** Create a user. Use this to create a new user in the security account database of the currently managed Virtual Hub. By creating a user, the VPN Client can connect to the Virtual Hub by using the authentication information of that user. Note that a user whose user name has been created as \"*\" (a single asterisk character) will automatically be registered as a RADIUS authentication user. For cases where there are users with \"*\" as the name, when a user, whose user name that has been provided when a client connected to a VPN Server does not match existing user names, is able to be authenticated by a RADIUS server or NT domain controller by inputting a user name and password, the authentication settings and security policy settings will follow the setting for the user \"*\". To change the user information of a user that has been created, use the SetUser API. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a member server on a cluster. */\r\n this.CreateUser = function (in_param) {\r\n return _this.CallAsync(\"CreateUser\", in_param);\r\n };\r\n /** Change User Settings. Use this to change user settings that is registered on the security account database of the currently managed Virtual Hub. The user settings that can be changed using this API are the three items that are specified when a new user is created using the CreateUser API: Group Name, Full Name, and Description. To get the list of currently registered users, use the EnumUser API. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a member server on a cluster. */\r\n this.SetUser = function (in_param) {\r\n return _this.CallAsync(\"SetUser\", in_param);\r\n };\r\n /** Get User Settings. Use this to get user settings information that is registered on the security account database of the currently managed Virtual Hub. The information that you can get using this API are User Name, Full Name, Group Name, Expiration Date, Security Policy, and Auth Type, as well as parameters that are specified as auth type attributes and the statistical data of that user. To get the list of currently registered users, use the EnumUser API. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a member server on a cluster. */\r\n this.GetUser = function (in_param) {\r\n return _this.CallAsync(\"GetUser\", in_param);\r\n };\r\n /** Delete a user. Use this to delete a user that is registered on the security account database of the currently managed Virtual Hub. By deleting the user, that user will no long be able to connect to the Virtual Hub. You can use the SetUser API to set the user's security policy to deny access instead of deleting a user, set the user to be temporarily denied from logging in. To get the list of currently registered users, use the EnumUser API. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a member server on a cluster. */\r\n this.DeleteUser = function (in_param) {\r\n return _this.CallAsync(\"DeleteUser\", in_param);\r\n };\r\n /** Get List of Users. Use this to get a list of users that are registered on the security account database of the currently managed Virtual Hub. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a member server on a cluster. */\r\n this.EnumUser = function (in_param) {\r\n return _this.CallAsync(\"EnumUser\", in_param);\r\n };\r\n /** Create Group. Use this to create a new group in the security account database of the currently managed Virtual Hub. You can register multiple users in a group. To register users in a group use the SetUser API. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a member server on a cluster. */\r\n this.CreateGroup = function (in_param) {\r\n return _this.CallAsync(\"CreateGroup\", in_param);\r\n };\r\n /** Set group settings. Use this to set group settings that is registered on the security account database of the currently managed Virtual Hub. To get the list of currently registered groups, use the EnumGroup API. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a member server on a cluster. */\r\n this.SetGroup = function (in_param) {\r\n return _this.CallAsync(\"SetGroup\", in_param);\r\n };\r\n /** Get Group Setting (Sync mode). Use this to get the setting of a group that is registered on the security account database of the currently managed Virtual Hub. To get the list of currently registered groups, use the EnumGroup API. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a member server on a cluster. */\r\n this.GetGroup = function (in_param) {\r\n return _this.CallAsync(\"GetGroup\", in_param);\r\n };\r\n /** Delete User from Group. Use this to delete a specified user from the group that is registered on the security account database of the currently managed Virtual Hub. By deleting a user from the group, that user becomes unassigned. To get the list of currently registered groups, use the EnumGroup API. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a member server on a cluster. */\r\n this.DeleteGroup = function (in_param) {\r\n return _this.CallAsync(\"DeleteGroup\", in_param);\r\n };\r\n /** Get List of Groups. Use this to get a list of groups that are registered on the security account database of the currently managed Virtual Hub. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a member server on a cluster. */\r\n this.EnumGroup = function (in_param) {\r\n return _this.CallAsync(\"EnumGroup\", in_param);\r\n };\r\n /** Get List of Connected VPN Sessions. Use this to get a list of the sessions connected to the Virtual Hub currently being managed. In the list of sessions, the following information will be obtained for each connection: Session Name, Session Site, User Name, Source Host Name, TCP Connection, Transfer Bytes and Transfer Packets. If the currently connected VPN Server is a cluster controller and the currently managed Virtual Hub is a static Virtual Hub, you can get an all-linked-together list of all sessions connected to that Virtual Hub on all cluster members. In all other cases, only the list of sessions that are actually connected to the currently managed VPN Server will be obtained. */\r\n this.EnumSession = function (in_param) {\r\n return _this.CallAsync(\"EnumSession\", in_param);\r\n };\r\n /** Get Session Status. Use this to specify a session currently connected to the currently managed Virtual Hub and get the session information. The session status includes the following: source host name and user name, version information, time information, number of TCP connections, communication parameters, session key, statistical information on data transferred, and other client and server information. To get the list of currently connected sessions, use the EnumSession API. */\r\n this.GetSessionStatus = function (in_param) {\r\n return _this.CallAsync(\"GetSessionStatus\", in_param);\r\n };\r\n /** Disconnect Session. Use this to specify a session currently connected to the currently managed Virtual Hub and forcefully disconnect that session using manager privileges. Note that when communication is disconnected by settings on the source client side and the automatically reconnect option is enabled, it is possible that the client will reconnect. To get the list of currently connected sessions, use the EnumSession API. */\r\n this.DeleteSession = function (in_param) {\r\n return _this.CallAsync(\"DeleteSession\", in_param);\r\n };\r\n /** Get the MAC Address Table Database. Use this to get the MAC address table database that is held by the currently managed Virtual Hub. The MAC address table database is a table that the Virtual Hub requires to perform the action of switching Ethernet frames and the Virtual Hub decides the sorting destination session of each Ethernet frame based on the MAC address table database. The MAC address database is built by the Virtual Hub automatically analyzing the contents of the communication. */\r\n this.EnumMacTable = function (in_param) {\r\n return _this.CallAsync(\"EnumMacTable\", in_param);\r\n };\r\n /** Delete MAC Address Table Entry. Use this API to operate the MAC address table database held by the currently managed Virtual Hub and delete a specified MAC address table entry from the database. To get the contents of the current MAC address table database use the EnumMacTable API. */\r\n this.DeleteMacTable = function (in_param) {\r\n return _this.CallAsync(\"DeleteMacTable\", in_param);\r\n };\r\n /** Get the IP Address Table Database. Use this to get the IP address table database that is held by the currently managed Virtual Hub. The IP address table database is a table that is automatically generated by analyzing the contents of communication so that the Virtual Hub can always know which session is using which IP address and it is frequently used by the engine that applies the Virtual Hub security policy. By specifying the session name you can get the IP address table entry that has been associated with that session. */\r\n this.EnumIpTable = function (in_param) {\r\n return _this.CallAsync(\"EnumIpTable\", in_param);\r\n };\r\n /** Delete IP Address Table Entry. Use this API to operate the IP address table database held by the currently managed Virtual Hub and delete a specified IP address table entry from the database. To get the contents of the current IP address table database use the EnumIpTable API. */\r\n this.DeleteIpTable = function (in_param) {\r\n return _this.CallAsync(\"DeleteIpTable\", in_param);\r\n };\r\n /** Set the Keep Alive Internet Connection Function. Use this to set the destination host name etc. of the Keep Alive Internet Connection Function. For network connection environments where connections will automatically be disconnected where there are periods of no communication that are longer than a set period, by using the Keep Alive Internet Connection Function, it is possible to keep alive the Internet connection by sending packets to a nominated server on the Internet at set intervals. When using this API, you can specify the following: Host Name, Port Number, Packet Send Interval, and Protocol. Packets sent to keep alive the Internet connection will have random content and personal information that could identify a computer or user is not sent. You can use the SetKeep API to enable/disable the Keep Alive Internet Connection Function. To execute this API on a VPN Server or VPN Bridge, you must have administrator privileges. */\r\n this.SetKeep = function (in_param) {\r\n return _this.CallAsync(\"SetKeep\", in_param);\r\n };\r\n /** Get the Keep Alive Internet Connection Function. Use this to get the current setting contents of the Keep Alive Internet Connection Function. In addition to the destination's Host Name, Port Number, Packet Send Interval and Protocol, you can obtain the current enabled/disabled status of the Keep Alive Internet Connection Function. */\r\n this.GetKeep = function (in_param) {\r\n return _this.CallAsync(\"GetKeep\", in_param);\r\n };\r\n /** Enable the Virtual NAT and DHCP Server Function (SecureNAT Function). Use this to enable the Virtual NAT and DHCP Server function (SecureNAT Function) on the currently managed Virtual Hub and begin its operation. Before executing this API, you must first check the setting contents of the current Virtual NAT function and DHCP Server function using the SetSecureNATOption API and GetSecureNATOption API. By enabling the SecureNAT function, you can virtually operate a NAT router (IP masquerade) and the DHCP Server function on a virtual network on the Virtual Hub. [Warning about SecureNAT Function] The SecureNAT function is recommended only for system administrators and people with a detailed knowledge of networks. If you use the SecureNAT function correctly, it is possible to achieve a safe form of remote access via a VPN. However when used in the wrong way, it can put the entire network in danger. Anyone who does not have a thorough knowledge of networks and anyone who does not have the network administrator's permission must not enable the SecureNAT function. For a detailed explanation of the SecureNAT function, please refer to the VPN Server's manual and online documentation. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n this.EnableSecureNAT = function (in_param) {\r\n return _this.CallAsync(\"EnableSecureNAT\", in_param);\r\n };\r\n /** Disable the Virtual NAT and DHCP Server Function (SecureNAT Function). Use this to disable the Virtual NAT and DHCP Server function (SecureNAT Function) on the currently managed Virtual Hub. By executing this API the Virtual NAT function immediately stops operating and the Virtual DHCP Server function deletes the DHCP lease database and stops the service. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n this.DisableSecureNAT = function (in_param) {\r\n return _this.CallAsync(\"DisableSecureNAT\", in_param);\r\n };\r\n /** Change Settings of SecureNAT Function. Use this to change and save the virtual host network interface settings, virtual NAT function settings and virtual DHCP server settings of the Virtual NAT and DHCP Server function (SecureNAT function) on the currently managed Virtual Hub. The SecureNAT function holds one virtual network adapter on the L2 segment inside the Virtual Hub and it has been assigned a MAC address and an IP address. By doing this, another host connected to the same L2 segment is able to communicate with the SecureNAT virtual host as if it is an actual IP host existing on the network. [Warning about SecureNAT Function] The SecureNAT function is recommended only for system administrators and people with a detailed knowledge of networks. If you use the SecureNAT function correctly, it is possible to achieve a safe form of remote access via a VPN. However when used in the wrong way, it can put the entire network in danger. Anyone who does not have a thorough knowledge of networks and anyone who does not have the network administrators permission must not enable the SecureNAT function. For a detailed explanation of the SecureNAT function, please refer to the VPN Server's manual and online documentation. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n this.SetSecureNATOption = function (in_param) {\r\n return _this.CallAsync(\"SetSecureNATOption\", in_param);\r\n };\r\n /** Get Settings of SecureNAT Function. This API get the registered settings for the SecureNAT function which is set by the SetSecureNATOption API. */\r\n this.GetSecureNATOption = function (in_param) {\r\n return _this.CallAsync(\"GetSecureNATOption\", in_param);\r\n };\r\n /** Get Virtual NAT Function Session Table of SecureNAT Function. Use this to get the table of TCP and UDP sessions currently communicating via the Virtual NAT (NAT table) in cases when the Virtual NAT function is operating on the currently managed Virtual Hub. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n this.EnumNAT = function (in_param) {\r\n return _this.CallAsync(\"EnumNAT\", in_param);\r\n };\r\n /** Get Virtual DHCP Server Function Lease Table of SecureNAT Function. Use this to get the lease table of IP addresses, held by the Virtual DHCP Server, that are assigned to clients in cases when the Virtual NAT function is operating on the currently managed Virtual Hub. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n this.EnumDHCP = function (in_param) {\r\n return _this.CallAsync(\"EnumDHCP\", in_param);\r\n };\r\n /** Get the Operating Status of the Virtual NAT and DHCP Server Function (SecureNAT Function). Use this to get the operating status of the Virtual NAT and DHCP Server function (SecureNAT Function) when it is operating on the currently managed Virtual Hub. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n this.GetSecureNATStatus = function (in_param) {\r\n return _this.CallAsync(\"GetSecureNATStatus\", in_param);\r\n };\r\n /** Get List of Network Adapters Usable as Local Bridge. Use this to get a list of Ethernet devices (network adapters) that can be used as a bridge destination device as part of a Local Bridge connection. If possible, network connection name is displayed. You can use a device displayed here by using the AddLocalBridge API. To call this API, you must have VPN Server administrator privileges. */\r\n this.EnumEthernet = function () {\r\n return _this.CallAsync(\"EnumEthernet\", new VpnRpcEnumEth());\r\n };\r\n /** Create Local Bridge Connection. Use this to create a new Local Bridge connection on the VPN Server. By using a Local Bridge, you can configure a Layer 2 bridge connection between a Virtual Hub operating on this VPN server and a physical Ethernet Device (Network Adapter). You can create a tap device (virtual network interface) on the system and connect a bridge between Virtual Hubs (the tap device is only supported by Linux versions). It is possible to establish a bridge to an operating network adapter of your choice for the bridge destination Ethernet device (network adapter), but in high load environments, we recommend you prepare a network adapter dedicated to serve as a bridge. To call this API, you must have VPN Server administrator privileges. */\r\n this.AddLocalBridge = function (in_param) {\r\n return _this.CallAsync(\"AddLocalBridge\", in_param);\r\n };\r\n /** Delete Local Bridge Connection. Use this to delete an existing Local Bridge connection. To get a list of current Local Bridge connections use the EnumLocalBridge API. To call this API, you must have VPN Server administrator privileges. */\r\n this.DeleteLocalBridge = function (in_param) {\r\n return _this.CallAsync(\"DeleteLocalBridge\", in_param);\r\n };\r\n /** Get List of Local Bridge Connection. Use this to get a list of the currently defined Local Bridge connections. You can get the Local Bridge connection Virtual Hub name and the bridge destination Ethernet device (network adapter) name or tap device name, as well as the operating status. */\r\n this.EnumLocalBridge = function () {\r\n return _this.CallAsync(\"EnumLocalBridge\", new VpnRpcEnumLocalBridge());\r\n };\r\n /** Get whether the localbridge function is supported on the current system. */\r\n this.GetBridgeSupport = function () {\r\n return _this.CallAsync(\"GetBridgeSupport\", new VpnRpcBridgeSupport());\r\n };\r\n /** Reboot VPN Server Service. Use this to restart the VPN Server service. When you restart the VPN Server, all currently connected sessions and TCP connections will be disconnected and no new connections will be accepted until the restart process has completed. By using this API, only the VPN Server service program will be restarted and the physical computer that VPN Server is operating on does not restart. This management session will also be disconnected, so you will need to reconnect to continue management. Also, by specifying the \"IntValue\" parameter to \"1\", the contents of the configuration file (.config) held by the current VPN Server will be initialized. To call this API, you must have VPN Server administrator privileges. */\r\n this.RebootServer = function (in_param) {\r\n return _this.CallAsync(\"RebootServer\", in_param);\r\n };\r\n /** Get List of Server Functions / Capability. Use this get a list of functions and capability of the VPN Server currently connected and being managed. The function and capability of VPN Servers are different depending on the operating VPN server's edition and version. Using this API, you can find out the capability of the target VPN Server and report it. */\r\n this.GetCaps = function () {\r\n return _this.CallAsync(\"GetCaps\", new VpnCapslist());\r\n };\r\n /** Get the current configuration of the VPN Server. Use this to get a text file (.config file) that contains the current configuration contents of the VPN server. You can get the status on the VPN Server at the instant this API is executed. You can edit the configuration file by using a regular text editor. To write an edited configuration to the VPN Server, use the SetConfig API. To call this API, you must have VPN Server administrator privileges. */\r\n this.GetConfig = function () {\r\n return _this.CallAsync(\"GetConfig\", new VpnRpcConfig());\r\n };\r\n /** Write Configuration File to VPN Server. Use this to write the configuration file to the VPN Server. By executing this API, the contents of the specified configuration file will be applied to the VPN Server and the VPN Server program will automatically restart and upon restart, operate according to the new configuration contents. Because it is difficult for an administrator to write all the contents of a configuration file, we recommend you use the GetConfig API to get the current contents of the VPN Server configuration and save it to file. You can then edit these contents in a regular text editor and then use the SetConfig API to rewrite the contents to the VPN Server. This API is for people with a detailed knowledge of the VPN Server and if an incorrectly configured configuration file is written to the VPN Server, it not only could cause errors, it could also result in the lost of the current setting data. Take special care when carrying out this action. To call this API, you must have VPN Server administrator privileges. */\r\n this.SetConfig = function (in_param) {\r\n return _this.CallAsync(\"SetConfig\", in_param);\r\n };\r\n /** Get Virtual Hub Administration Option default values. */\r\n this.GetDefaultHubAdminOptions = function (in_param) {\r\n return _this.CallAsync(\"GetDefaultHubAdminOptions\", in_param);\r\n };\r\n /** Get List of Virtual Hub Administration Options. Use this to get a list of Virtual Hub administration options that are set on the currently managed Virtual Hub. The purpose of the Virtual Hub administration options is for the VPN Server Administrator to set limits for the setting ranges when the administration of the Virtual Hub is to be trusted to each Virtual Hub administrator. Only an administrator with administration privileges for this entire VPN Server is able to add, edit and delete the Virtual Hub administration options. The Virtual Hub administrators are unable to make changes to the administration options, however they are able to view them. There is an exception however. If allow_hub_admin_change_option is set to \"1\", even Virtual Hub administrators are able to edit the administration options. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster member. */\r\n this.GetHubAdminOptions = function (in_param) {\r\n return _this.CallAsync(\"GetHubAdminOptions\", in_param);\r\n };\r\n /** Set Values of Virtual Hub Administration Options. Use this to change the values of Virtual Hub administration options that are set on the currently managed Virtual Hub. The purpose of the Virtual Hub administration options is for the VPN Server Administrator to set limits for the setting ranges when the administration of the Virtual Hub is to be trusted to each Virtual Hub administrator. Only an administrator with administration privileges for this entire VPN Server is able to add, edit and delete the Virtual Hub administration options. The Virtual Hub administrators are unable to make changes to the administration options, however they are able to view them. There is an exception however. If allow_hub_admin_change_option is set to \"1\", even Virtual Hub administrators are able to edit the administration options. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster member. */\r\n this.SetHubAdminOptions = function (in_param) {\r\n return _this.CallAsync(\"SetHubAdminOptions\", in_param);\r\n };\r\n /** Get List of Virtual Hub Extended Options. Use this to get a Virtual Hub Extended Options List that is set on the currently managed Virtual Hub. Virtual Hub Extended Option enables you to configure more detail settings of the Virtual Hub. By default, both VPN Server's global administrators and individual Virtual Hub's administrators can modify the Virtual Hub Extended Options. However, if the deny_hub_admin_change_ext_option is set to 1 on the Virtual Hub Admin Options, the individual Virtual Hub's administrators cannot modify the Virtual Hub Extended Options. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster member. */\r\n this.GetHubExtOptions = function (in_param) {\r\n return _this.CallAsync(\"GetHubExtOptions\", in_param);\r\n };\r\n /** Set a Value of Virtual Hub Extended Options. Use this to set a value in the Virtual Hub Extended Options List that is set on the currently managed Virtual Hub. Virtual Hub Extended Option enables you to configure more detail settings of the Virtual Hub. By default, both VPN Server's global administrators and individual Virtual Hub's administrators can modify the Virtual Hub Extended Options. However, if the deny_hub_admin_change_ext_option is set to 1 on the Virtual Hub Admin Options, the individual Virtual Hub's administrators cannot modify the Virtual Hub Extended Options. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster member. */\r\n this.SetHubExtOptions = function (in_param) {\r\n return _this.CallAsync(\"SetHubExtOptions\", in_param);\r\n };\r\n /** Define New Virtual Layer 3 Switch. Use this to define a new Virtual Layer 3 Switch on the VPN Server. To call this API, you must have VPN Server administrator privileges. Also, this API does not operate on VPN Bridge. [Explanation on Virtual Layer 3 Switch Function] You can define Virtual Layer 3 Switches between multiple Virtual Hubs operating on this VPN Server and configure routing between different IP networks. [Caution about the Virtual Layer 3 Switch Function] The Virtual Layer 3 Switch functions are provided for network administrators and other people who know a lot about networks and IP routing. If you are using the regular VPN functions, you do not need to use the Virtual Layer 3 Switch functions. If the Virtual Layer 3 Switch functions are to be used, the person who configures them must have sufficient knowledge of IP routing and be perfectly capable of not impacting the network. */\r\n this.AddL3Switch = function (in_param) {\r\n return _this.CallAsync(\"AddL3Switch\", in_param);\r\n };\r\n /** Delete Virtual Layer 3 Switch. Use this to delete an existing Virtual Layer 3 Switch that is defined on the VPN Server. When the specified Virtual Layer 3 Switch is operating, it will be automatically deleted after operation stops. To get a list of existing Virtual Layer 3 Switches, use the EnumL3Switch API. To call this API, you must have VPN Server administrator privileges. Also, this API does not operate on VPN Bridge. */\r\n this.DelL3Switch = function (in_param) {\r\n return _this.CallAsync(\"DelL3Switch\", in_param);\r\n };\r\n /** Get List of Virtual Layer 3 Switches. Use this to define a new Virtual Layer 3 Switch on the VPN Server. To call this API, you must have VPN Server administrator privileges. Also, this API does not operate on VPN Bridge. [Explanation on Virtual Layer 3 Switch Function] You can define Virtual Layer 3 Switches between multiple Virtual Hubs operating on this VPN Server and configure routing between different IP networks. [Caution about the Virtual Layer 3 Switch Function] The Virtual Layer 3 Switch functions are provided for network administrators and other people who know a lot about networks and IP routing. If you are using the regular VPN functions, you do not need to use the Virtual Layer 3 Switch functions. If the Virtual Layer 3 Switch functions are to be used, the person who configures them must have sufficient knowledge of IP routing and be perfectly capable of not impacting the network. */\r\n this.EnumL3Switch = function () {\r\n return _this.CallAsync(\"EnumL3Switch\", new VpnRpcEnumL3Sw());\r\n };\r\n /** Start Virtual Layer 3 Switch Operation. Use this to start the operation of an existing Virtual Layer 3 Switch defined on the VPN Server whose operation is currently stopped. To get a list of existing Virtual Layer 3 Switches, use the EnumL3Switch API. To call this API, you must have VPN Server administrator privileges. Also, this API does not operate on VPN Bridge. [Explanation on Virtual Layer 3 Switch Function] You can define Virtual Layer 3 Switches between multiple Virtual Hubs operating on this VPN Server and configure routing between different IP networks. [Caution about the Virtual Layer 3 Switch Function] The Virtual Layer 3 Switch functions are provided for network administrators and other people who know a lot about networks and IP routing. If you are using the regular VPN functions, you do not need to use the Virtual Layer 3 Switch functions. If the Virtual Layer 3 Switch functions are to be used, the person who configures them must have sufficient knowledge of IP routing and be perfectly capable of not impacting the network. */\r\n this.StartL3Switch = function (in_param) {\r\n return _this.CallAsync(\"StartL3Switch\", in_param);\r\n };\r\n /** Stop Virtual Layer 3 Switch Operation. Use this to stop the operation of an existing Virtual Layer 3 Switch defined on the VPN Server whose operation is currently operating. To get a list of existing Virtual Layer 3 Switches, use the EnumL3Switch API. To call this API, you must have VPN Server administrator privileges. */\r\n this.StopL3Switch = function (in_param) {\r\n return _this.CallAsync(\"StopL3Switch\", in_param);\r\n };\r\n /** Add Virtual Interface to Virtual Layer 3 Switch. Use this to add to a specified Virtual Layer 3 Switch, a virtual interface that connects to a Virtual Hub operating on the same VPN Server. You can define multiple virtual interfaces and routing tables for a single Virtual Layer 3 Switch. A virtual interface is associated to a virtual Hub and operates as a single IP host on the Virtual Hub when that Virtual Hub is operating. When multiple virtual interfaces that respectively belong to a different IP network of a different Virtual Hub are defined, IP routing will be automatically performed between these interfaces. You must define the IP network space that the virtual interface belongs to and the IP address of the interface itself. Also, you must specify the name of the Virtual Hub that the interface will connect to. You can specify a Virtual Hub that currently doesn't exist for the Virtual Hub name. The virtual interface must have one IP address in the Virtual Hub. You also must specify the subnet mask of an IP network that the IP address belongs to. Routing via the Virtual Layer 3 Switches of IP spaces of multiple virtual Hubs operates based on the IP address is specified here. To call this API, you must have VPN Server administrator privileges. Also, this API does not operate on VPN Bridge. To execute this API, the target Virtual Layer 3 Switch must be stopped. If it is not stopped, first use the StopL3Switch API to stop it and then execute this API. */\r\n this.AddL3If = function (in_param) {\r\n return _this.CallAsync(\"AddL3If\", in_param);\r\n };\r\n /** Delete Virtual Interface of Virtual Layer 3 Switch. Use this to delete a virtual interface already defined in the specified Virtual Layer 3 Switch. You can get a list of the virtual interfaces currently defined, by using the EnumL3If API. To call this API, you must have VPN Server administrator privileges. Also, this API does not operate on VPN Bridge. To execute this API, the target Virtual Layer 3 Switch must be stopped. If it is not stopped, first use the StopL3Switch API to stop it and then execute this API. */\r\n this.DelL3If = function (in_param) {\r\n return _this.CallAsync(\"DelL3If\", in_param);\r\n };\r\n /** Get List of Interfaces Registered on the Virtual Layer 3 Switch. Use this to get a list of virtual interfaces when virtual interfaces have been defined on a specified Virtual Layer 3 Switch. You can define multiple virtual interfaces and routing tables for a single Virtual Layer 3 Switch. A virtual interface is associated to a virtual Hub and operates as a single IP host on the Virtual Hub when that Virtual Hub is operating. When multiple virtual interfaces that respectively belong to a different IP network of a different Virtual Hub are defined, IP routing will be automatically performed between these interfaces. To call this API, you must have VPN Server administrator privileges. Also, this API does not operate on VPN Bridge. */\r\n this.EnumL3If = function (in_param) {\r\n return _this.CallAsync(\"EnumL3If\", in_param);\r\n };\r\n /** Add Routing Table Entry for Virtual Layer 3 Switch. Here you can add a new routing table entry to the routing table of the specified Virtual Layer 3 Switch. If the destination IP address of the IP packet does not belong to any IP network that belongs to a virtual interface, the IP routing engine of the Virtual Layer 3 Switch will reference the routing table and execute routing. You must specify the contents of the routing table entry to be added to the Virtual Layer 3 Switch. You must specify any IP address that belongs to the same IP network in the virtual interface of this Virtual Layer 3 Switch as the gateway address. To call this API, you must have VPN Server administrator privileges. Also, this API does not operate on VPN Bridge. To execute this API, the target Virtual Layer 3 Switch must be stopped. If it is not stopped, first use the StopL3Switch API to stop it and then execute this API. */\r\n this.AddL3Table = function (in_param) {\r\n return _this.CallAsync(\"AddL3Table\", in_param);\r\n };\r\n /** Delete Routing Table Entry of Virtual Layer 3 Switch. Use this to delete a routing table entry that is defined in the specified Virtual Layer 3 Switch. You can get a list of the already defined routing table entries by using the EnumL3Table API. To call this API, you must have VPN Server administrator privileges. Also, this API does not operate on VPN Bridge. To execute this API, the target Virtual Layer 3 Switch must be stopped. If it is not stopped, first use the StopL3Switch API to stop it and then execute this API. */\r\n this.DelL3Table = function (in_param) {\r\n return _this.CallAsync(\"DelL3Table\", in_param);\r\n };\r\n /** Get List of Routing Tables of Virtual Layer 3 Switch. Use this to get a list of routing tables when routing tables have been defined on a specified Virtual Layer 3 Switch. If the destination IP address of the IP packet does not belong to any IP network that belongs to a virtual interface, the IP routing engine of the Virtual Layer 3 Switch will reference this routing table and execute routing. To call this API, you must have VPN Server administrator privileges. Also, this API does not operate on VPN Bridge. */\r\n this.EnumL3Table = function (in_param) {\r\n return _this.CallAsync(\"EnumL3Table\", in_param);\r\n };\r\n /** Get List of Certificates Revocation List. Use this to get a Certificates Revocation List that is set on the currently managed Virtual Hub. By registering certificates in the Certificates Revocation List, the clients who provide these certificates will be unable to connect to this Virtual Hub using certificate authentication mode. Normally with this function, in cases where the security of a private key has been compromised or where a person holding a certificate has been stripped of their privileges, by registering that certificate as invalid on the Virtual Hub, it is possible to deny user authentication when that certificate is used by a client to connect to the Virtual Hub. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n this.EnumCrl = function (in_param) {\r\n return _this.CallAsync(\"EnumCrl\", in_param);\r\n };\r\n /** Add a Revoked Certificate. Use this to add a new revoked certificate definition in the Certificate Revocation List that is set on the currently managed Virtual Hub. Specify the contents to be registered in the Certificate Revocation List by using the parameters of this API. When a user connects to a Virtual Hub in certificate authentication mode and that certificate matches 1 or more of the contents registered in the certificates revocation list, the user is denied connection. A certificate that matches all the conditions that are defined by the parameters specified by this API will be judged as invalid. The items that can be set are as follows: Name (CN), Organization (O), Organization Unit (OU), Country (C), State (ST), Locale (L), Serial Number (hexadecimal), MD5 Digest Value (hexadecimal, 128 bit), and SHA-1 Digest Value (hexadecimal, 160 bit). For the specification of a digest value (hash value) a certificate is optionally specified depending on the circumstances. Normally when a MD5 or SHA-1 digest value is input, it is not necessary to input the other items. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n this.AddCrl = function (in_param) {\r\n return _this.CallAsync(\"AddCrl\", in_param);\r\n };\r\n /** Delete a Revoked Certificate. Use this to specify and delete a revoked certificate definition from the certificate revocation list that is set on the currently managed Virtual Hub. To get the list of currently registered revoked certificate definitions, use the EnumCrl API. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n this.DelCrl = function (in_param) {\r\n return _this.CallAsync(\"DelCrl\", in_param);\r\n };\r\n /** Get a Revoked Certificate. Use this to specify and get the contents of a revoked certificate definition from the Certificates Revocation List that is set on the currently managed Virtual Hub. To get the list of currently registered revoked certificate definitions, use the EnumCrl API. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n this.GetCrl = function (in_param) {\r\n return _this.CallAsync(\"GetCrl\", in_param);\r\n };\r\n /** Change Existing CRL (Certificate Revocation List) Entry. Use this to alter an existing revoked certificate definition in the Certificate Revocation List that is set on the currently managed Virtual Hub. Specify the contents to be registered in the Certificate Revocation List by using the parameters of this API. When a user connects to a Virtual Hub in certificate authentication mode and that certificate matches 1 or more of the contents registered in the certificates revocation list, the user is denied connection. A certificate that matches all the conditions that are defined by the parameters specified by this API will be judged as invalid. The items that can be set are as follows: Name (CN), Organization (O), Organization Unit (OU), Country (C), State (ST), Locale (L), Serial Number (hexadecimal), MD5 Digest Value (hexadecimal, 128 bit), and SHA-1 Digest Value (hexadecimal, 160 bit). For the specification of a digest value (hash value) a certificate is optionally specified depending on the circumstances. Normally when a MD5 or SHA-1 digest value is input, it is not necessary to input the other items. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n this.SetCrl = function (in_param) {\r\n return _this.CallAsync(\"SetCrl\", in_param);\r\n };\r\n /** Add Rule to Source IP Address Limit List. Use this to add a new rule to the Source IP Address Limit List that is set on the currently managed Virtual Hub. The items set here will be used to decide whether to allow or deny connection from a VPN Client when this client attempts connection to the Virtual Hub. You can specify a client IP address, or IP address or mask to match the rule as the contents of the rule item. By specifying an IP address only, there will only be one specified computer that will match the rule, but by specifying an IP net mask address or subnet mask address, all the computers in the range of that subnet will match the rule. You can specify the priority for the rule. You can specify an integer of 1 or greater for the priority and the smaller the number, the higher the priority. To get a list of the currently registered Source IP Address Limit List, use the GetAcList API. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n this.SetAcList = function (in_param) {\r\n return _this.CallAsync(\"SetAcList\", in_param);\r\n };\r\n /** Get List of Rule Items of Source IP Address Limit List. Use this to get a list of Source IP Address Limit List rules that is set on the currently managed Virtual Hub. You can allow or deny VPN connections to this Virtual Hub according to the client computer's source IP address. You can define multiple rules and set a priority for each rule. The search proceeds from the rule with the highest order or priority and based on the action of the rule that the IP address first matches, the connection from the client is either allowed or denied. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n this.GetAcList = function (in_param) {\r\n return _this.CallAsync(\"GetAcList\", in_param);\r\n };\r\n /** Get List of Log Files. Use this to display a list of log files outputted by the VPN Server that have been saved on the VPN Server computer. By specifying a log file file name displayed here and calling it using the ReadLogFile API you can download the contents of the log file. If you are connected to the VPN Server in server admin mode, you can display or download the packet logs and security logs of all Virtual Hubs and the server log of the VPN Server. When connected in Virtual Hub Admin Mode, you are able to view or download only the packet log and security log of the Virtual Hub that is the target of management. */\r\n this.EnumLogFile = function () {\r\n return _this.CallAsync(\"EnumLogFile\", new VpnRpcEnumLogFile());\r\n };\r\n /** Download a part of Log File. Use this to download the log file that is saved on the VPN Server computer. To download the log file first get the list of log files using the EnumLogFile API and then download the log file using the ReadLogFile API. If you are connected to the VPN Server in server admin mode, you can display or download the packet logs and security logs of all Virtual Hubs and the server log of the VPN Server. When connected in Virtual Hub Admin Mode, you are able to view or download only the packet log and security log of the Virtual Hub that is the target of management. */\r\n this.ReadLogFile = function (in_param) {\r\n return _this.CallAsync(\"ReadLogFile\", in_param);\r\n };\r\n /** Set syslog Send Function. Use this to set the usage of syslog send function and which syslog server to use. */\r\n this.SetSysLog = function (in_param) {\r\n return _this.CallAsync(\"SetSysLog\", in_param);\r\n };\r\n /** Get syslog Send Function. This allows you to get the current setting contents of the syslog send function. You can get the usage setting of the syslog function and the host name and port number of the syslog server to use. */\r\n this.GetSysLog = function (in_param) {\r\n return _this.CallAsync(\"GetSysLog\", in_param);\r\n };\r\n /** Set Today's Message of Virtual Hub. The message will be displayed on VPN Client UI when a user will establish a connection to the Virtual Hub. */\r\n this.SetHubMsg = function (in_param) {\r\n return _this.CallAsync(\"SetHubMsg\", in_param);\r\n };\r\n /** Get Today's Message of Virtual Hub. The message will be displayed on VPN Client UI when a user will establish a connection to the Virtual Hub. */\r\n this.GetHubMsg = function (in_param) {\r\n return _this.CallAsync(\"GetHubMsg\", in_param);\r\n };\r\n /** Raise a vital error on the VPN Server / Bridge to terminate the process forcefully. This API will raise a fatal error (memory access violation) on the VPN Server / Bridge running process in order to crash the process. As the result, VPN Server / Bridge will be terminated and restarted if it is running as a service mode. If the VPN Server is running as a user mode, the process will not automatically restarted. This API is for a situation when the VPN Server / Bridge is under a non-recoverable error or the process is in an infinite loop. This API will disconnect all VPN Sessions on the VPN Server / Bridge. All unsaved settings in the memory of VPN Server / Bridge will be lost. Before run this API, call the Flush API to try to save volatile data to the configuration file. To execute this API, you must have VPN Server / VPN Bridge administrator privileges. */\r\n this.Crash = function (in_param) {\r\n return _this.CallAsync(\"Crash\", in_param);\r\n };\r\n /** Get the message for administrators. */\r\n this.GetAdminMsg = function () {\r\n return _this.CallAsync(\"GetAdminMsg\", new VpnRpcMsg());\r\n };\r\n /** Save All Volatile Data of VPN Server / Bridge to the Configuration File. The number of configuration file bytes will be returned as the \"IntValue\" parameter. Normally, the VPN Server / VPN Bridge retains the volatile configuration data in memory. It is flushed to the disk as vpn_server.config or vpn_bridge.config periodically. The period is 300 seconds (5 minutes) by default. (The period can be altered by modifying the AutoSaveConfigSpan item in the configuration file.) The data will be saved on the timing of shutting down normally of the VPN Server / Bridge. Execute the Flush API to make the VPN Server / Bridge save the settings to the file immediately. The setting data will be stored on the disk drive of the server computer. Use the Flush API in a situation that you do not have an enough time to shut down the server process normally. To call this API, you must have VPN Server administrator privileges. To execute this API, you must have VPN Server / VPN Bridge administrator privileges. */\r\n this.Flush = function (in_param) {\r\n return _this.CallAsync(\"Flush\", in_param);\r\n };\r\n /** Enable or Disable IPsec VPN Server Function. Enable or Disable IPsec VPN Server Function on the VPN Server. If you enable this function, Virtual Hubs on the VPN Server will be able to accept Remote-Access VPN connections from L2TP-compatible PCs, Mac OS X and Smartphones, and also can accept EtherIP Site-to-Site VPN Connection. VPN Connections from Smartphones suchlike iPhone, iPad and Android, and also from native VPN Clients on Mac OS X and Windows can be accepted. To call this API, you must have VPN Server administrator privileges. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n this.SetIPsecServices = function (in_param) {\r\n return _this.CallAsync(\"SetIPsecServices\", in_param);\r\n };\r\n /** Get the Current IPsec VPN Server Settings. Get and view the current IPsec VPN Server settings on the VPN Server. To call this API, you must have VPN Server administrator privileges. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n this.GetIPsecServices = function () {\r\n return _this.CallAsync(\"GetIPsecServices\", new VpnIPsecServices());\r\n };\r\n /** Add New EtherIP / L2TPv3 over IPsec Client Setting to Accept EthreIP / L2TPv3 Client Devices. Add a new setting entry to enable the EtherIP / L2TPv3 over IPsec Server Function to accept client devices. In order to accept connections from routers by the EtherIP / L2TPv3 over IPsec Server Function, you have to define the relation table between an IPsec Phase 1 string which is presented by client devices of EtherIP / L2TPv3 over IPsec compatible router, and the designation of the destination Virtual Hub. After you add a definition entry by AddEtherIpId API, the defined connection setting to the Virtual Hub will be applied on the login-attepting session from an EtherIP / L2TPv3 over IPsec client device. The username and password in an entry must be registered on the Virtual Hub. An EtherIP / L2TPv3 client will be regarded as it connected the Virtual HUB with the identification of the above user information. To call this API, you must have VPN Server administrator privileges. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n this.AddEtherIpId = function (in_param) {\r\n return _this.CallAsync(\"AddEtherIpId\", in_param);\r\n };\r\n /** Get the Current List of EtherIP / L2TPv3 Client Device Entry Definitions. This API gets and shows the list of entries to accept VPN clients by EtherIP / L2TPv3 over IPsec Function. To call this API, you must have VPN Server administrator privileges. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n this.GetEtherIpId = function (in_param) {\r\n return _this.CallAsync(\"GetEtherIpId\", in_param);\r\n };\r\n /** Delete an EtherIP / L2TPv3 over IPsec Client Setting. This API deletes an entry to accept VPN clients by EtherIP / L2TPv3 over IPsec Function. To call this API, you must have VPN Server administrator privileges. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n this.DeleteEtherIpId = function (in_param) {\r\n return _this.CallAsync(\"DeleteEtherIpId\", in_param);\r\n };\r\n /** Get the Current List of EtherIP / L2TPv3 Client Device Entry Definitions. This API gets and shows the list of entries to accept VPN clients by EtherIP / L2TPv3 over IPsec Function. To call this API, you must have VPN Server administrator privileges. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n this.EnumEtherIpId = function () {\r\n return _this.CallAsync(\"EnumEtherIpId\", new VpnRpcEnumEtherIpId());\r\n };\r\n /** Set Settings for OpenVPN Clone Server Function. The VPN Server has the clone functions of OpenVPN software products by OpenVPN Technologies, Inc. Any OpenVPN Clients can connect to this VPN Server. The manner to specify a username to connect to the Virtual Hub, and the selection rule of default Hub by using this clone server functions are same to the IPsec Server functions. To call this API, you must have VPN Server administrator privileges. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n this.SetOpenVpnSstpConfig = function (in_param) {\r\n return _this.CallAsync(\"SetOpenVpnSstpConfig\", in_param);\r\n };\r\n /** Get the Current Settings of OpenVPN Clone Server Function. Get and show the current settings of OpenVPN Clone Server Function. To call this API, you must have VPN Server administrator privileges. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n this.GetOpenVpnSstpConfig = function () {\r\n return _this.CallAsync(\"GetOpenVpnSstpConfig\", new VpnOpenVpnSstpConfig());\r\n };\r\n /** Show the Current Status of Dynamic DNS Function. Get and show the current status of the Dynamic DNS function. The Dynamic DNS assigns a unique and permanent DNS hostname for this VPN Server. You can use that hostname to specify this VPN Server on the settings for VPN Client and VPN Bridge. You need not to register and keep a domain name. Also, if your ISP assignes you a dynamic (not-fixed) IP address, the corresponding IP address of your Dynamic DNS hostname will be automatically changed. It enables you to keep running the VPN Server by using only a dynamic IP address. Therefore, you need not any longer to keep static global IP addresses with expenses monthly costs. [Caution] To disable the Dynamic DNS Function, modify the configuration file of VPN Server. The \"declare root\" directive has the \"declare DDnsClient\" directive. In this directive, you can switch \"bool Disable\" from false to true, and reboot the VPN Server, then the Dynamic DNS Function will be disabled. To call this API, you must have VPN Server administrator privileges. This API cannot be invoked on VPN Bridge. */\r\n this.GetDDnsClientStatus = function () {\r\n return _this.CallAsync(\"GetDDnsClientStatus\", new VpnDDnsClientStatus());\r\n };\r\n /** Set the Dynamic DNS Hostname. You must specify the new hostname on the StrValue_str field. You can use this API to change the hostname assigned by the Dynamic DNS function. The currently assigned hostname can be showen by the GetDDnsClientStatus API. The Dynamic DNS assigns a unique and permanent DNS hostname for this VPN Server. You can use that hostname to specify this VPN Server on the settings for VPN Client and VPN Bridge. You need not to register and keep a domain name. Also, if your ISP assignes you a dynamic (not-fixed) IP address, the corresponding IP address of your Dynamic DNS hostname will be automatically changed. It enables you to keep running the VPN Server by using only a dynamic IP address. Therefore, you need not any longer to keep static global IP addresses with expenses monthly costs. [Caution] To disable the Dynamic DNS Function, modify the configuration file of VPN Server. The \"declare root\" directive has the \"declare DDnsClient\" directive. In this directive, you can switch \"bool Disable\" from false to true, and reboot the VPN Server, then the Dynamic DNS Function will be disabled. To call this API, you must have VPN Server administrator privileges. This API cannot be invoked on VPN Bridge. */\r\n this.ChangeDDnsClientHostname = function (in_param) {\r\n return _this.CallAsync(\"ChangeDDnsClientHostname\", in_param);\r\n };\r\n /** Generate New Self-Signed Certificate with Specified CN (Common Name) and Register on VPN Server. You can specify the new CN (common name) value on the StrValue_str field. You can use this API to replace the current certificate on the VPN Server to a new self-signed certificate which has the CN (Common Name) value in the fields. This API is convenient if you are planning to use Microsoft SSTP VPN Clone Server Function. Because of the value of CN (Common Name) on the SSL certificate of VPN Server must match to the hostname specified on the SSTP VPN client. This API will delete the existing SSL certificate of the VPN Server. It is recommended to backup the current SSL certificate and private key by using the GetServerCert API beforehand. To call this API, you must have VPN Server administrator privileges. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n this.RegenerateServerCert = function (in_param) {\r\n return _this.CallAsync(\"RegenerateServerCert\", in_param);\r\n };\r\n /** Generate a Sample Setting File for OpenVPN Client. Originally, the OpenVPN Client requires a user to write a very difficult configuration file manually. This API helps you to make a useful configuration sample. What you need to generate the configuration file for the OpenVPN Client is to run this API. To call this API, you must have VPN Server administrator privileges. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n this.MakeOpenVpnConfigFile = function () {\r\n return _this.CallAsync(\"MakeOpenVpnConfigFile\", new VpnRpcReadLogFile());\r\n };\r\n /** Enable / Disable the VPN over ICMP / VPN over DNS Server Function. You can establish a VPN only with ICMP or DNS packets even if there is a firewall or routers which blocks TCP/IP communications. You have to enable the following functions beforehand. Warning: Use this function for emergency only. It is helpful when a firewall or router is misconfigured to blocks TCP/IP, but either ICMP or DNS is not blocked. It is not for long-term stable using. To call this API, you must have VPN Server administrator privileges. This API cannot be invoked on VPN Bridge. */\r\n this.SetSpecialListener = function (in_param) {\r\n return _this.CallAsync(\"SetSpecialListener\", in_param);\r\n };\r\n /** Get Current Setting of the VPN over ICMP / VPN over DNS Function. Get and show the current VPN over ICMP / VPN over DNS Function status. To call this API, you must have VPN Server administrator privileges. This API cannot be invoked on VPN Bridge. */\r\n this.GetSpecialListener = function () {\r\n return _this.CallAsync(\"GetSpecialListener\", new VpnRpcSpecialListener());\r\n };\r\n /** Show the current status of VPN Azure function. Get and show the current status of the VPN Azure function. VPN Azure makes it easier to establish a VPN Session from your home PC to your office PC. While a VPN connection is established, you can access to any other servers on the private network of your company. You don't need a global IP address on the office PC (VPN Server). It can work behind firewalls or NATs. No network administrator's configuration required. You can use the built-in SSTP-VPN Client of Windows in your home PC. VPN Azure is a cloud VPN service operated by SoftEther Corporation. VPN Azure is free of charge and available to anyone. Visit http://www.vpnazure.net/ to see details and how-to-use instructions. The VPN Azure hostname is same to the hostname of the Dynamic DNS setting, but altering the domain suffix to \"vpnazure.net\". To change the hostname use the ChangeDDnsClientHostname API. To call this API, you must have VPN Server administrator privileges. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n this.GetAzureStatus = function () {\r\n return _this.CallAsync(\"GetAzureStatus\", new VpnRpcAzureStatus());\r\n };\r\n /** Enable / Disable VPN Azure Function. Enable or disable the VPN Azure function. VPN Azure makes it easier to establish a VPN Session from your home PC to your office PC. While a VPN connection is established, you can access to any other servers on the private network of your company. You don't need a global IP address on the office PC (VPN Server). It can work behind firewalls or NATs. No network administrator's configuration required. You can use the built-in SSTP-VPN Client of Windows in your home PC. VPN Azure is a cloud VPN service operated by SoftEther Corporation. VPN Azure is free of charge and available to anyone. Visit http://www.vpnazure.net/ to see details and how-to-use instructions. The VPN Azure hostname is same to the hostname of the Dynamic DNS setting, but altering the domain suffix to \"vpnazure.net\". To change the hostname use the ChangeDDnsClientHostname API. To call this API, you must have VPN Server administrator privileges. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n this.SetAzureStatus = function (in_param) {\r\n return _this.CallAsync(\"SetAzureStatus\", in_param);\r\n };\r\n /** Get the Proxy Settings for Connecting to the DDNS server. */\r\n this.GetDDnsInternetSetting = function () {\r\n return _this.CallAsync(\"GetDDnsInternetSetting\", new VpnInternetSetting());\r\n };\r\n /** Set the Proxy Settings for Connecting to the DDNS server. */\r\n this.SetDDnsInternetSetting = function (in_param) {\r\n return _this.CallAsync(\"SetDDnsInternetSetting\", in_param);\r\n };\r\n /** Set the VPN Gate Server Configuration. This API is valid for Win32 binary distribution of the Stable Edition of SoftEther VPN Server. */\r\n this.SetVgsConfig = function (in_param) {\r\n return _this.CallAsync(\"SetVgsConfig\", in_param);\r\n };\r\n /** Get the VPN Gate Server Configuration. This API is valid for Win32 binary distribution of the Stable Edition of SoftEther VPN Server. */\r\n this.GetVgsConfig = function () {\r\n return _this.CallAsync(\"GetVgsConfig\", new VpnVgsConfig());\r\n };\r\n var headers = {};\r\n var send_credentials = false;\r\n nodejs_https_client_reject_untrusted_server_cert = is_null(nodejs_https_client_reject_untrusted_server_cert) ? false : nodejs_https_client_reject_untrusted_server_cert;\r\n if (is_null(vpnserver_hostname)) {\r\n this.rpc_url = \"/api/\";\r\n send_credentials = true;\r\n }\r\n else {\r\n if (is_null(vpnserver_port))\r\n vpnserver_port = 443;\r\n this.rpc_url = \"https://\" + vpnserver_hostname + \":\" + vpnserver_port + \"/api/\";\r\n headers[\"X-VPNADMIN-HUBNAME\"] = is_null(hubname) ? \"\" : hubname;\r\n headers[\"X-VPNADMIN-PASSWORD\"] = is_null(password) ? \"\" : password;\r\n }\r\n if (is_null(nodejs_https_client_reject_untrusted_server_cert))\r\n nodejs_https_client_reject_untrusted_server_cert = false;\r\n this.rpc_client = new JsonRpcClient(this.rpc_url, headers, send_credentials, nodejs_https_client_reject_untrusted_server_cert);\r\n }\r\n /** Determine if this JavaScript environment is on the Node.js or not. */\r\n VpnServerRpc.IsNodeJS = function () {\r\n return is_node_js;\r\n };\r\n /** Set the debug mode flag */\r\n VpnServerRpc.SetDebugMode = function (flag) {\r\n debug_mode = flag;\r\n };\r\n // -- Utility functions --\r\n /** Call a RPC procedure */\r\n VpnServerRpc.prototype.CallAsync = function (method_name, request) {\r\n return __awaiter(this, void 0, void 0, function () {\r\n var response;\r\n return __generator(this, function (_a) {\r\n switch (_a.label) {\r\n case 0: return [4 /*yield*/, this.rpc_client.CallAsync(method_name, request)];\r\n case 1:\r\n response = _a.sent();\r\n return [2 /*return*/, response];\r\n }\r\n });\r\n });\r\n };\r\n return VpnServerRpc;\r\n}());\r\nexports.VpnServerRpc = VpnServerRpc;\r\n// --- Types ---\r\n/** IP Protocol Numbers */\r\nvar VpnIpProtocolNumber;\r\n(function (VpnIpProtocolNumber) {\r\n /** ICMP for IPv4 */\r\n VpnIpProtocolNumber[VpnIpProtocolNumber[\"ICMPv4\"] = 1] = \"ICMPv4\";\r\n /** TCP */\r\n VpnIpProtocolNumber[VpnIpProtocolNumber[\"TCP\"] = 6] = \"TCP\";\r\n /** UDP */\r\n VpnIpProtocolNumber[VpnIpProtocolNumber[\"UDP\"] = 17] = \"UDP\";\r\n /** ICMP for IPv6 */\r\n VpnIpProtocolNumber[VpnIpProtocolNumber[\"ICMPv6\"] = 58] = \"ICMPv6\";\r\n})(VpnIpProtocolNumber = exports.VpnIpProtocolNumber || (exports.VpnIpProtocolNumber = {}));\r\n/** The body of the Access list */\r\nvar VpnAccess = /** @class */ (function () {\r\n /** Constructor for the 'VpnAccess' class: The body of the Access list */\r\n function VpnAccess(init) {\r\n /** ID */\r\n this.Id_u32 = 0;\r\n /** Specify a description (note) for this rule */\r\n this.Note_utf = \"\";\r\n /** Enabled flag (true: enabled, false: disabled) */\r\n this.Active_bool = false;\r\n /** Specify an integer of 1 or higher to indicate the priority of the rule. Higher priority is given to rules with the lower priority values. */\r\n this.Priority_u32 = 0;\r\n /** The flag if the rule is DISCARD operation or PASS operation. When a packet matches this rule condition, this operation is decided. When the operation of the rule is PASS, the packet is allowed to pass, otherwise the packet will be discarded. */\r\n this.Discard_bool = false;\r\n /** The flag if the rule is for IPv6. Specify false for IPv4, or specify true for IPv6. */\r\n this.IsIPv6_bool = false;\r\n /** Valid only if the rule is IPv4 mode (IsIPv6_bool == false). Specify a source IPv4 address as a rule condition. You must also specify the SrcSubnetMask_ip field. */\r\n this.SrcIpAddress_ip = \"\";\r\n /** Valid only if the rule is IPv4 mode (IsIPv6_bool == false). Specify a source IPv4 subnet mask as a rule condition. \"0.0.0.0\" means all hosts. \"255.255.255.255\" means one single host. */\r\n this.SrcSubnetMask_ip = \"\";\r\n /** Valid only if the rule is IPv4 mode (IsIPv6_bool == false). Specify a destination IPv4 address as a rule condition. You must also specify the DestSubnetMask_ip field. */\r\n this.DestIpAddress_ip = \"\";\r\n /** Valid only if the rule is IPv4 mode (IsIPv6_bool == false). Specify a destination IPv4 subnet mask as a rule condition. \"0.0.0.0\" means all hosts. \"255.255.255.255\" means one single host. */\r\n this.DestSubnetMask_ip = \"\";\r\n /** Valid only if the rule is IPv6 mode (IsIPv6_bool == true). Specify a source IPv6 address as a rule condition. The field must be a byte array of 16 bytes (128 bits) to contain the IPv6 address in binary form. You must also specify the SrcSubnetMask6_bin field. */\r\n this.SrcIpAddress6_bin = new Uint8Array([]);\r\n /** Valid only if the rule is IPv6 mode (IsIPv6_bool == true). Specify a source IPv6 subnet mask as a rule condition. The field must be a byte array of 16 bytes (128 bits) to contain the IPv6 subnet mask in binary form. */\r\n this.SrcSubnetMask6_bin = new Uint8Array([]);\r\n /** Valid only if the rule is IPv6 mode (IsIPv6_bool == true). Specify a destination IPv6 address as a rule condition. The field must be a byte array of 16 bytes (128 bits) to contain the IPv6 address in binary form. You must also specify the DestSubnetMask6_bin field. */\r\n this.DestIpAddress6_bin = new Uint8Array([]);\r\n /** Valid only if the rule is IPv6 mode (IsIPv6_bool == true). Specify a destination IPv6 subnet mask as a rule condition. The field must be a byte array of 16 bytes (128 bits) to contain the IPv6 subnet mask in binary form. */\r\n this.DestSubnetMask6_bin = new Uint8Array([]);\r\n /** The IP protocol number */\r\n this.Protocol_u32 = 0;\r\n /** The Start Value of the Source Port Number Range. If the specified protocol is TCP/IP or UDP/IP, specify the source port number as the rule condition. Protocols other than this will be ignored. When this parameter is not specified, the rules will apply to all port numbers. */\r\n this.SrcPortStart_u32 = 0;\r\n /** The End Value of the Source Port Number Range. If the specified protocol is TCP/IP or UDP/IP, specify the source port number as the rule condition. Protocols other than this will be ignored. When this parameter is not specified, the rules will apply to all port numbers. */\r\n this.SrcPortEnd_u32 = 0;\r\n /** The Start Value of the Destination Port Number Range. If the specified protocol is TCP/IP or UDP/IP, specify the destination port number as the rule condition. Protocols other than this will be ignored. When this parameter is not specified, the rules will apply to all port numbers. */\r\n this.DestPortStart_u32 = 0;\r\n /** The End Value of the Destination Port Number Range. If the specified protocol is TCP/IP or UDP/IP, specify the destination port number as the rule condition. Protocols other than this will be ignored. When this parameter is not specified, the rules will apply to all port numbers. */\r\n this.DestPortEnd_u32 = 0;\r\n /** Source user name. You can apply this rule to only the packets sent by a user session of a user name that has been specified as a rule condition. In this case, specify the user name. */\r\n this.SrcUsername_str = \"\";\r\n /** Destination user name. You can apply this rule to only the packets received by a user session of a user name that has been specified as a rule condition. In this case, specify the user name. */\r\n this.DestUsername_str = \"\";\r\n /** Specify true if you want to check the source MAC address. */\r\n this.CheckSrcMac_bool = false;\r\n /** Source MAC address (6 bytes), valid only if CheckSrcMac_bool == true. */\r\n this.SrcMacAddress_bin = new Uint8Array([]);\r\n /** Source MAC address mask (6 bytes), valid only if CheckSrcMac_bool == true. */\r\n this.SrcMacMask_bin = new Uint8Array([]);\r\n /** Specify true if you want to check the destination MAC address. */\r\n this.CheckDstMac_bool = false;\r\n /** Destination MAC address (6 bytes), valid only if CheckSrcMac_bool == true. */\r\n this.DstMacAddress_bin = new Uint8Array([]);\r\n /** Destination MAC address mask (6 bytes), valid only if CheckSrcMac_bool == true. */\r\n this.DstMacMask_bin = new Uint8Array([]);\r\n /** Specify true if you want to check the state of the TCP connection. */\r\n this.CheckTcpState_bool = false;\r\n /** Valid only if CheckTcpState_bool == true. Set this field true to match only TCP-established packets. Set this field false to match only TCP-non established packets. */\r\n this.Established_bool = false;\r\n /** Set this value to generate delays when packets is passing. Specify the delay period in milliseconds. Specify 0 means no delays to generate. The delays must be 10000 milliseconds at most. */\r\n this.Delay_u32 = 0;\r\n /** Set this value to generate jitters when packets is passing. Specify the ratio of fluctuation of jitters within 0% to 100% range. Specify 0 means no jitters to generate. */\r\n this.Jitter_u32 = 0;\r\n /** Set this value to generate packet losses when packets is passing. Specify the ratio of packet losses within 0% to 100% range. Specify 0 means no packet losses to generate. */\r\n this.Loss_u32 = 0;\r\n /** The specified URL will be mandatory replied to the client as a response for TCP connecting request packets which matches the conditions of this access list entry via this Virtual Hub. To use this setting, you can enforce the web browser of the VPN Client computer to show the specified web site when that web browser tries to access the specific IP address. */\r\n this.RedirectUrl_str = \"\";\r\n Object.assign(this, init);\r\n }\r\n return VpnAccess;\r\n}());\r\nexports.VpnAccess = VpnAccess;\r\n/** Add an item to Access List */\r\nvar VpnRpcAddAccess = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcAddAccess' class: Add an item to Access List */\r\n function VpnRpcAddAccess(init) {\r\n /** The Virtual Hub name */\r\n this.HubName_str = \"\";\r\n /** Access list (Must be a single item) */\r\n this.AccessListSingle = [];\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcAddAccess;\r\n}());\r\nexports.VpnRpcAddAccess = VpnRpcAddAccess;\r\n/** Add CA to HUB */\r\nvar VpnRpcHubAddCA = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcHubAddCA' class: Add CA to HUB */\r\n function VpnRpcHubAddCA(init) {\r\n /** The Virtual Hub name */\r\n this.HubName_str = \"\";\r\n /** The body of the X.509 certificate */\r\n this.Cert_bin = new Uint8Array([]);\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcHubAddCA;\r\n}());\r\nexports.VpnRpcHubAddCA = VpnRpcHubAddCA;\r\n/** CRL entry */\r\nvar VpnRpcCrl = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcCrl' class: CRL entry */\r\n function VpnRpcCrl(init) {\r\n /** The Virtual Hub name */\r\n this.HubName_str = \"\";\r\n /** Key ID */\r\n this.Key_u32 = 0;\r\n /** CN, optional */\r\n this.CommonName_utf = \"\";\r\n /** O, optional */\r\n this.Organization_utf = \"\";\r\n /** OU, optional */\r\n this.Unit_utf = \"\";\r\n /** C, optional */\r\n this.Country_utf = \"\";\r\n /** ST, optional */\r\n this.State_utf = \"\";\r\n /** L, optional */\r\n this.Local_utf = \"\";\r\n /** Serial, optional */\r\n this.Serial_bin = new Uint8Array([]);\r\n /** MD5 Digest, optional */\r\n this.DigestMD5_bin = new Uint8Array([]);\r\n /** SHA1 Digest, optional */\r\n this.DigestSHA1_bin = new Uint8Array([]);\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcCrl;\r\n}());\r\nexports.VpnRpcCrl = VpnRpcCrl;\r\n/** EtherIP key list entry */\r\nvar VpnEtherIpId = /** @class */ (function () {\r\n /** Constructor for the 'VpnEtherIpId' class: EtherIP key list entry */\r\n function VpnEtherIpId(init) {\r\n /** Specify an ISAKMP Phase 1 ID. The ID must be exactly same as a ID in the configuration of the EtherIP / L2TPv3 Client. You can specify IP address as well as characters as ID, if the EtherIP Client uses IP address as Phase 1 ID. If you specify '*' (asterisk), it will be a wildcard to match any clients which doesn't match other explicit rules. */\r\n this.Id_str = \"\";\r\n /** Specify the name of the Virtual Hub to connect. */\r\n this.HubName_str = \"\";\r\n /** Specify the username to login to the destination Virtual Hub. */\r\n this.UserName_str = \"\";\r\n /** Specify the password to login to the destination Virtual Hub. */\r\n this.Password_str = \"\";\r\n Object.assign(this, init);\r\n }\r\n return VpnEtherIpId;\r\n}());\r\nexports.VpnEtherIpId = VpnEtherIpId;\r\n/** Layer-3 virtual interface */\r\nvar VpnRpcL3If = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcL3If' class: Layer-3 virtual interface */\r\n function VpnRpcL3If(init) {\r\n /** L3 switch name */\r\n this.Name_str = \"\";\r\n /** Virtual HUB name */\r\n this.HubName_str = \"\";\r\n /** IP address */\r\n this.IpAddress_ip = \"\";\r\n /** Subnet mask */\r\n this.SubnetMask_ip = \"\";\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcL3If;\r\n}());\r\nexports.VpnRpcL3If = VpnRpcL3If;\r\n/** Layer-3 switch */\r\nvar VpnRpcL3Sw = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcL3Sw' class: Layer-3 switch */\r\n function VpnRpcL3Sw(init) {\r\n /** Layer-3 Switch name */\r\n this.Name_str = \"\";\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcL3Sw;\r\n}());\r\nexports.VpnRpcL3Sw = VpnRpcL3Sw;\r\n/** Routing table */\r\nvar VpnRpcL3Table = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcL3Table' class: Routing table */\r\n function VpnRpcL3Table(init) {\r\n /** L3 switch name */\r\n this.Name_str = \"\";\r\n /** Network address */\r\n this.NetworkAddress_ip = \"\";\r\n /** Subnet mask */\r\n this.SubnetMask_ip = \"\";\r\n /** Gateway address */\r\n this.GatewayAddress_ip = \"\";\r\n /** Metric */\r\n this.Metric_u32 = 0;\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcL3Table;\r\n}());\r\nexports.VpnRpcL3Table = VpnRpcL3Table;\r\n/** Generic parameter to contain u32, u64, ascii_string and unicode string */\r\nvar VpnRpcTest = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcTest' class: Generic parameter to contain u32, u64, ascii_string and unicode string */\r\n function VpnRpcTest(init) {\r\n /** A 32-bit integer field */\r\n this.IntValue_u32 = 0;\r\n /** A 64-bit integer field */\r\n this.Int64Value_u64 = 0;\r\n /** An Ascii string field */\r\n this.StrValue_str = \"\";\r\n /** An UTF-8 string field */\r\n this.UniStrValue_utf = \"\";\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcTest;\r\n}());\r\nexports.VpnRpcTest = VpnRpcTest;\r\n/** Local Bridge list item */\r\nvar VpnRpcLocalBridge = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcLocalBridge' class: Local Bridge list item */\r\n function VpnRpcLocalBridge(init) {\r\n /** Physical Ethernet device name */\r\n this.DeviceName_str = \"\";\r\n /** The Virtual Hub name */\r\n this.HubNameLB_str = \"\";\r\n /** Online flag */\r\n this.Online_bool = false;\r\n /** Running flag */\r\n this.Active_bool = false;\r\n /** Specify true if you are using a tap device rather than a network adapter for the bridge destination (only supported for Linux versions). */\r\n this.TapMode_bool = false;\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcLocalBridge;\r\n}());\r\nexports.VpnRpcLocalBridge = VpnRpcLocalBridge;\r\n/** Create, configure, and get the group */\r\nvar VpnRpcSetGroup = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcSetGroup' class: Create, configure, and get the group */\r\n function VpnRpcSetGroup(init) {\r\n /** The Virtual Hub name */\r\n this.HubName_str = \"\";\r\n /** The group name */\r\n this.Name_str = \"\";\r\n /** Optional real name (full name) of the group, allow using any Unicode characters */\r\n this.Realname_utf = \"\";\r\n /** Optional, specify a description of the group */\r\n this.Note_utf = \"\";\r\n /** Number of broadcast packets (Recv) */\r\n this[\"Recv.BroadcastBytes_u64\"] = 0;\r\n /** Broadcast bytes (Recv) */\r\n this[\"Recv.BroadcastCount_u64\"] = 0;\r\n /** Unicast count (Recv) */\r\n this[\"Recv.UnicastBytes_u64\"] = 0;\r\n /** Unicast bytes (Recv) */\r\n this[\"Recv.UnicastCount_u64\"] = 0;\r\n /** Number of broadcast packets (Send) */\r\n this[\"Send.BroadcastBytes_u64\"] = 0;\r\n /** Broadcast bytes (Send) */\r\n this[\"Send.BroadcastCount_u64\"] = 0;\r\n /** Unicast bytes (Send) */\r\n this[\"Send.UnicastBytes_u64\"] = 0;\r\n /** Unicast bytes (Send) */\r\n this[\"Send.UnicastCount_u64\"] = 0;\r\n /** The flag whether to use security policy */\r\n this.UsePolicy_bool = false;\r\n /** Security policy: Allow Access. The users, which this policy value is true, have permission to make VPN connection to VPN Server. */\r\n this[\"policy:Access_bool\"] = false;\r\n /** Security policy: Filter DHCP Packets (IPv4). All IPv4 DHCP packets in sessions defined this policy will be filtered. */\r\n this[\"policy:DHCPFilter_bool\"] = false;\r\n /** Security policy: Disallow DHCP Server Operation (IPv4). Computers connected to sessions that have this policy setting will not be allowed to become a DHCP server and distribute IPv4 addresses to DHCP clients. */\r\n this[\"policy:DHCPNoServer_bool\"] = false;\r\n /** Security policy: Enforce DHCP Allocated IP Addresses (IPv4). Computers in sessions that have this policy setting will only be able to use IPv4 addresses allocated by a DHCP server on the virtual network side. */\r\n this[\"policy:DHCPForce_bool\"] = false;\r\n /** Security policy: Deny Bridge Operation. Bridge-mode connections are denied for user sessions that have this policy setting. Even in cases when the Ethernet Bridge is configured in the client side, communication will not be possible. */\r\n this[\"policy:NoBridge_bool\"] = false;\r\n /** Security policy: Deny Routing Operation (IPv4). IPv4 routing will be denied for sessions that have this policy setting. Even in the case where the IP router is operating on the user client side, communication will not be possible. */\r\n this[\"policy:NoRouting_bool\"] = false;\r\n /** Security policy: Deny MAC Addresses Duplication. The use of duplicating MAC addresses that are in use by computers of different sessions cannot be used by sessions with this policy setting. */\r\n this[\"policy:CheckMac_bool\"] = false;\r\n /** Security policy: Deny IP Address Duplication (IPv4). The use of duplicating IPv4 addresses that are in use by computers of different sessions cannot be used by sessions with this policy setting. */\r\n this[\"policy:CheckIP_bool\"] = false;\r\n /** Security policy: Deny Non-ARP / Non-DHCP / Non-ICMPv6 broadcasts. The sending or receiving of broadcast packets that are not ARP protocol, DHCP protocol, nor ICMPv6 on the virtual network will not be allowed for sessions with this policy setting. */\r\n this[\"policy:ArpDhcpOnly_bool\"] = false;\r\n /** Security policy: Privacy Filter Mode. All direct communication between sessions with the privacy filter mode policy setting will be filtered. */\r\n this[\"policy:PrivacyFilter_bool\"] = false;\r\n /** Security policy: Deny Operation as TCP/IP Server (IPv4). Computers of sessions with this policy setting can't listen and accept TCP/IP connections in IPv4. */\r\n this[\"policy:NoServer_bool\"] = false;\r\n /** Security policy: Unlimited Number of Broadcasts. If a computer of a session with this policy setting sends broadcast packets of a number unusually larger than what would be considered normal on the virtual network, there will be no automatic limiting. */\r\n this[\"policy:NoBroadcastLimiter_bool\"] = false;\r\n /** Security policy: Allow Monitoring Mode. Users with this policy setting will be granted to connect to the Virtual Hub in Monitoring Mode. Sessions in Monitoring Mode are able to monitor (tap) all packets flowing through the Virtual Hub. */\r\n this[\"policy:MonitorPort_bool\"] = false;\r\n /** Security policy: Maximum Number of TCP Connections. For sessions with this policy setting, this sets the maximum number of physical TCP connections consists in a physical VPN session. */\r\n this[\"policy:MaxConnection_u32\"] = 0;\r\n /** Security policy: Time-out Period. For sessions with this policy setting, this sets, in seconds, the time-out period to wait before disconnecting a session when communication trouble occurs between the VPN Client / VPN Server. */\r\n this[\"policy:TimeOut_u32\"] = 0;\r\n /** Security policy: Maximum Number of MAC Addresses. For sessions with this policy setting, this limits the number of MAC addresses per session. */\r\n this[\"policy:MaxMac_u32\"] = 0;\r\n /** Security policy: Maximum Number of IP Addresses (IPv4). For sessions with this policy setting, this specifies the number of IPv4 addresses that can be registered for a single session. */\r\n this[\"policy:MaxIP_u32\"] = 0;\r\n /** Security policy: Upload Bandwidth. For sessions with this policy setting, this limits the traffic bandwidth that is in the inwards direction from outside to inside the Virtual Hub. */\r\n this[\"policy:MaxUpload_u32\"] = 0;\r\n /** Security policy: Download Bandwidth. For sessions with this policy setting, this limits the traffic bandwidth that is in the outwards direction from inside the Virtual Hub to outside the Virtual Hub. */\r\n this[\"policy:MaxDownload_u32\"] = 0;\r\n /** Security policy: Deny Changing Password. The users which use password authentication with this policy setting are not allowed to change their own password from the VPN Client Manager or similar. */\r\n this[\"policy:FixPassword_bool\"] = false;\r\n /** Security policy: Maximum Number of Multiple Logins. Users with this policy setting are unable to have more than this number of concurrent logins. Bridge Mode sessions are not subjects to this policy. */\r\n this[\"policy:MultiLogins_u32\"] = 0;\r\n /** Security policy: Deny VoIP / QoS Function. Users with this security policy are unable to use VoIP / QoS functions in VPN connection sessions. */\r\n this[\"policy:NoQoS_bool\"] = false;\r\n /** Security policy: Filter RS / RA Packets (IPv6). All ICMPv6 packets which the message-type is 133 (Router Solicitation) or 134 (Router Advertisement) in sessions defined this policy will be filtered. As a result, an IPv6 client will be unable to use IPv6 address prefix auto detection and IPv6 default gateway auto detection. */\r\n this[\"policy:RSandRAFilter_bool\"] = false;\r\n /** Security policy: Filter RA Packets (IPv6). All ICMPv6 packets which the message-type is 134 (Router Advertisement) in sessions defined this policy will be filtered. As a result, a malicious users will be unable to spread illegal IPv6 prefix or default gateway advertisements on the network. */\r\n this[\"policy:RAFilter_bool\"] = false;\r\n /** Security policy: Filter DHCP Packets (IPv6). All IPv6 DHCP packets in sessions defined this policy will be filtered. */\r\n this[\"policy:DHCPv6Filter_bool\"] = false;\r\n /** Security policy: Disallow DHCP Server Operation (IPv6). Computers connected to sessions that have this policy setting will not be allowed to become a DHCP server and distribute IPv6 addresses to DHCP clients. */\r\n this[\"policy:DHCPv6NoServer_bool\"] = false;\r\n /** Security policy: Deny Routing Operation (IPv6). IPv6 routing will be denied for sessions that have this policy setting. Even in the case where the IP router is operating on the user client side, communication will not be possible. */\r\n this[\"policy:NoRoutingV6_bool\"] = false;\r\n /** Security policy: Deny IP Address Duplication (IPv6). The use of duplicating IPv6 addresses that are in use by computers of different sessions cannot be used by sessions with this policy setting. */\r\n this[\"policy:CheckIPv6_bool\"] = false;\r\n /** Security policy: Deny Operation as TCP/IP Server (IPv6). Computers of sessions with this policy setting can't listen and accept TCP/IP connections in IPv6. */\r\n this[\"policy:NoServerV6_bool\"] = false;\r\n /** Security policy: Maximum Number of IP Addresses (IPv6). For sessions with this policy setting, this specifies the number of IPv6 addresses that can be registered for a single session. */\r\n this[\"policy:MaxIPv6_u32\"] = 0;\r\n /** Security policy: Disallow Password Save in VPN Client. For users with this policy setting, when the user is using *standard* password authentication, the user will be unable to save the password in VPN Client. The user will be required to input passwords for every time to connect a VPN. This will improve the security. If this policy is enabled, VPN Client Version 2.0 will be denied to access. */\r\n this[\"policy:NoSavePassword_bool\"] = false;\r\n /** Security policy: VPN Client Automatic Disconnect. For users with this policy setting, a user's VPN session will be disconnected automatically after the specific period will elapse. In this case no automatic re-connection will be performed. This can prevent a lot of inactive VPN Sessions. If this policy is enabled, VPN Client Version 2.0 will be denied to access. */\r\n this[\"policy:AutoDisconnect_u32\"] = 0;\r\n /** Security policy: Filter All IPv4 Packets. All IPv4 and ARP packets in sessions defined this policy will be filtered. */\r\n this[\"policy:FilterIPv4_bool\"] = false;\r\n /** Security policy: Filter All IPv6 Packets. All IPv6 packets in sessions defined this policy will be filtered. */\r\n this[\"policy:FilterIPv6_bool\"] = false;\r\n /** Security policy: Filter All Non-IP Packets. All non-IP packets in sessions defined this policy will be filtered. \"Non-IP packet\" mean a packet which is not IPv4, ARP nor IPv6. Any tagged-VLAN packets via the Virtual Hub will be regarded as non-IP packets. */\r\n this[\"policy:FilterNonIP_bool\"] = false;\r\n /** Security policy: No Default-Router on IPv6 RA. In all VPN Sessions defines this policy, any IPv6 RA (Router Advertisement) packet with non-zero value in the router-lifetime will set to zero-value. This is effective to avoid the horrible behavior from the IPv6 routing confusion which is caused by the VPN client's attempts to use the remote-side IPv6 router as its local IPv6 router. */\r\n this[\"policy:NoIPv6DefaultRouterInRA_bool\"] = false;\r\n /** Security policy: No Default-Router on IPv6 RA (physical IPv6). In all VPN Sessions defines this policy (only when the physical communication protocol between VPN Client / VPN Bridge and VPN Server is IPv6), any IPv6 RA (Router Advertisement) packet with non-zero value in the router-lifetime will set to zero-value. This is effective to avoid the horrible behavior from the IPv6 routing confusion which is caused by the VPN client's attempts to use the remote-side IPv6 router as its local IPv6 router. */\r\n this[\"policy:NoIPv6DefaultRouterInRAWhenIPv6_bool\"] = false;\r\n /** Security policy: VLAN ID (IEEE802.1Q). You can specify the VLAN ID on the security policy. All VPN Sessions defines this policy, all Ethernet packets toward the Virtual Hub from the user will be inserted a VLAN tag (IEEE 802.1Q) with the VLAN ID. The user can also receive only packets with a VLAN tag which has the same VLAN ID. (Receiving process removes the VLAN tag automatically.) Any Ethernet packets with any other VLAN IDs or non-VLAN packets will not be received. All VPN Sessions without this policy definition can send / receive any kinds of Ethernet packets regardless of VLAN tags, and VLAN tags are not inserted or removed automatically. Any tagged-VLAN packets via the Virtual Hub will be regarded as non-IP packets. Therefore, tagged-VLAN packets are not subjects for IPv4 / IPv6 security policies, access lists nor other IPv4 / IPv6 specific deep processing. */\r\n this[\"policy:VLanId_u32\"] = 0;\r\n /** Security policy: Whether version 3.0 (must be true) */\r\n this[\"policy:Ver3_bool\"] = false;\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcSetGroup;\r\n}());\r\nexports.VpnRpcSetGroup = VpnRpcSetGroup;\r\n/** Hub types */\r\nvar VpnRpcHubType;\r\n(function (VpnRpcHubType) {\r\n /** Stand-alone HUB */\r\n VpnRpcHubType[VpnRpcHubType[\"Standalone\"] = 0] = \"Standalone\";\r\n /** Static HUB */\r\n VpnRpcHubType[VpnRpcHubType[\"FarmStatic\"] = 1] = \"FarmStatic\";\r\n /** Dynamic HUB */\r\n VpnRpcHubType[VpnRpcHubType[\"FarmDynamic\"] = 2] = \"FarmDynamic\";\r\n})(VpnRpcHubType = exports.VpnRpcHubType || (exports.VpnRpcHubType = {}));\r\n/** Create a HUB */\r\nvar VpnRpcCreateHub = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcCreateHub' class: Create a HUB */\r\n function VpnRpcCreateHub(init) {\r\n /** Specify the name of the Virtual Hub to create / update. */\r\n this.HubName_str = \"\";\r\n /** Specify an administrator password when the administrator password is going to be set for the Virtual Hub. On the update, leave it to empty string if you don't want to change the password. */\r\n this.AdminPasswordPlainText_str = \"\";\r\n /** Online flag */\r\n this.Online_bool = false;\r\n /** Maximum number of VPN sessions */\r\n this.MaxSession_u32 = 0;\r\n /** No Enum flag. By enabling this option, the VPN Client user will be unable to enumerate this Virtual Hub even if they send a Virtual Hub enumeration request to the VPN Server. */\r\n this.NoEnum_bool = false;\r\n /** Type of the Virtual Hub (Valid only for Clustered VPN Servers) */\r\n this.HubType_u32 = 0;\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcCreateHub;\r\n}());\r\nexports.VpnRpcCreateHub = VpnRpcCreateHub;\r\nvar VpnRpcClientAuthType;\r\n(function (VpnRpcClientAuthType) {\r\n /** Anonymous authentication */\r\n VpnRpcClientAuthType[VpnRpcClientAuthType[\"Anonymous\"] = 0] = \"Anonymous\";\r\n /** SHA-0 hashed password authentication */\r\n VpnRpcClientAuthType[VpnRpcClientAuthType[\"SHA0_Hashed_Password\"] = 1] = \"SHA0_Hashed_Password\";\r\n /** Plain password authentication */\r\n VpnRpcClientAuthType[VpnRpcClientAuthType[\"PlainPassword\"] = 2] = \"PlainPassword\";\r\n /** Certificate authentication */\r\n VpnRpcClientAuthType[VpnRpcClientAuthType[\"Cert\"] = 3] = \"Cert\";\r\n})(VpnRpcClientAuthType = exports.VpnRpcClientAuthType || (exports.VpnRpcClientAuthType = {}));\r\n/** Create and set of link */\r\nvar VpnRpcCreateLink = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcCreateLink' class: Create and set of link */\r\n function VpnRpcCreateLink(init) {\r\n /** The Virtual Hub name */\r\n this.HubName_Ex_str = \"\";\r\n /** Online flag */\r\n this.Online_bool = false;\r\n /** The flag to enable validation for the server certificate */\r\n this.CheckServerCert_bool = false;\r\n /** The body of server X.509 certificate to compare. Valid only if the CheckServerCert_bool flag is true. */\r\n this.ServerCert_bin = new Uint8Array([]);\r\n /** Client Option Parameters: Specify the name of the Cascade Connection */\r\n this.AccountName_utf = \"\";\r\n /** Client Option Parameters: Specify the hostname of the destination VPN Server. You can also specify by IP address. */\r\n this.Hostname_str = \"\";\r\n /** Client Option Parameters: Specify the port number of the destination VPN Server. */\r\n this.Port_u32 = 0;\r\n /** Client Option Parameters: The type of the proxy server */\r\n this.ProxyType_u32 = 0;\r\n /** Client Option Parameters: The hostname or IP address of the proxy server name */\r\n this.ProxyName_str = \"\";\r\n /** Client Option Parameters: The port number of the proxy server */\r\n this.ProxyPort_u32 = 0;\r\n /** Client Option Parameters: The username to connect to the proxy server */\r\n this.ProxyUsername_str = \"\";\r\n /** Client Option Parameters: The password to connect to the proxy server */\r\n this.ProxyPassword_str = \"\";\r\n /** Client Option Parameters: The Virtual Hub on the destination VPN Server */\r\n this.HubName_str = \"\";\r\n /** Client Option Parameters: Number of TCP Connections to Use in VPN Communication */\r\n this.MaxConnection_u32 = 0;\r\n /** Client Option Parameters: The flag to enable the encryption on the communication */\r\n this.UseEncrypt_bool = false;\r\n /** Client Option Parameters: Enable / Disable Data Compression when Communicating by Cascade Connection */\r\n this.UseCompress_bool = false;\r\n /** Client Option Parameters: Specify true when enabling half duplex mode. When using two or more TCP connections for VPN communication, it is possible to use Half Duplex Mode. By enabling half duplex mode it is possible to automatically fix data transmission direction as half and half for each TCP connection. In the case where a VPN using 8 TCP connections is established, for example, when half-duplex is enabled, communication can be fixes so that 4 TCP connections are dedicated to the upload direction and the other 4 connections are dedicated to the download direction. */\r\n this.HalfConnection_bool = false;\r\n /** Client Option Parameters: Connection attempt interval when additional connection will be established */\r\n this.AdditionalConnectionInterval_u32 = 0;\r\n /** Client Option Parameters: Connection Life of Each TCP Connection (0 for no keep-alive) */\r\n this.ConnectionDisconnectSpan_u32 = 0;\r\n /** Client Option Parameters: Disable QoS Control Function if the value is true */\r\n this.DisableQoS_bool = false;\r\n /** Client Option Parameters: Do not use TLS 1.x of the value is true */\r\n this.NoTls1_bool = false;\r\n /** Client Option Parameters: Do not use UDP acceleration mode if the value is true */\r\n this.NoUdpAcceleration_bool = false;\r\n /** Authentication type */\r\n this.AuthType_u32 = 0;\r\n /** User name */\r\n this.Username_str = \"\";\r\n /** SHA-0 Hashed password. Valid only if ClientAuth_AuthType_u32 == SHA0_Hashed_Password (1). The SHA-0 hashed password must be caluclated by the SHA0(UpperCase(username_ascii_string) + password_ascii_string). */\r\n this.HashedPassword_bin = new Uint8Array([]);\r\n /** Plaintext Password. Valid only if ClientAuth_AuthType_u32 == PlainPassword (2). */\r\n this.PlainPassword_str = \"\";\r\n /** Client certificate. Valid only if ClientAuth_AuthType_u32 == Cert (3). */\r\n this.ClientX_bin = new Uint8Array([]);\r\n /** Client private key of the certificate. Valid only if ClientAuth_AuthType_u32 == Cert (3). */\r\n this.ClientK_bin = new Uint8Array([]);\r\n /** Security policy: Filter DHCP Packets (IPv4). All IPv4 DHCP packets in sessions defined this policy will be filtered. */\r\n this[\"policy:DHCPFilter_bool\"] = false;\r\n /** Security policy: Disallow DHCP Server Operation (IPv4). Computers connected to sessions that have this policy setting will not be allowed to become a DHCP server and distribute IPv4 addresses to DHCP clients. */\r\n this[\"policy:DHCPNoServer_bool\"] = false;\r\n /** Security policy: Enforce DHCP Allocated IP Addresses (IPv4). Computers in sessions that have this policy setting will only be able to use IPv4 addresses allocated by a DHCP server on the virtual network side. */\r\n this[\"policy:DHCPForce_bool\"] = false;\r\n /** Security policy: Prohibit the duplicate MAC address */\r\n this.SecPol_CheckMac_bool = false;\r\n /** Security policy: Prohibit a duplicate IP address (IPv4) */\r\n this.SecPol_CheckIP_bool = false;\r\n /** Security policy: Deny Non-ARP / Non-DHCP / Non-ICMPv6 broadcasts. The sending or receiving of broadcast packets that are not ARP protocol, DHCP protocol, nor ICMPv6 on the virtual network will not be allowed for sessions with this policy setting. */\r\n this[\"policy:ArpDhcpOnly_bool\"] = false;\r\n /** Security policy: Privacy Filter Mode. All direct communication between sessions with the privacy filter mode policy setting will be filtered. */\r\n this[\"policy:PrivacyFilter_bool\"] = false;\r\n /** Security policy: Deny Operation as TCP/IP Server (IPv4). Computers of sessions with this policy setting can't listen and accept TCP/IP connections in IPv4. */\r\n this[\"policy:NoServer_bool\"] = false;\r\n /** Security policy: Unlimited Number of Broadcasts. If a computer of a session with this policy setting sends broadcast packets of a number unusually larger than what would be considered normal on the virtual network, there will be no automatic limiting. */\r\n this[\"policy:NoBroadcastLimiter_bool\"] = false;\r\n /** Security policy: Maximum Number of MAC Addresses. For sessions with this policy setting, this limits the number of MAC addresses per session. */\r\n this[\"policy:MaxMac_u32\"] = 0;\r\n /** Security policy: Maximum Number of IP Addresses (IPv4). For sessions with this policy setting, this specifies the number of IPv4 addresses that can be registered for a single session. */\r\n this[\"policy:MaxIP_u32\"] = 0;\r\n /** Security policy: Upload Bandwidth. For sessions with this policy setting, this limits the traffic bandwidth that is in the inwards direction from outside to inside the Virtual Hub. */\r\n this[\"policy:MaxUpload_u32\"] = 0;\r\n /** Security policy: Download Bandwidth. For sessions with this policy setting, this limits the traffic bandwidth that is in the outwards direction from inside the Virtual Hub to outside the Virtual Hub. */\r\n this[\"policy:MaxDownload_u32\"] = 0;\r\n /** Security policy: Filter RS / RA Packets (IPv6). All ICMPv6 packets which the message-type is 133 (Router Solicitation) or 134 (Router Advertisement) in sessions defined this policy will be filtered. As a result, an IPv6 client will be unable to use IPv6 address prefix auto detection and IPv6 default gateway auto detection. */\r\n this[\"policy:RSandRAFilter_bool\"] = false;\r\n /** Security policy: Filter the router advertisement packet (IPv6) */\r\n this.SecPol_RAFilter_bool = false;\r\n /** Security policy: Filter DHCP Packets (IPv6). All IPv6 DHCP packets in sessions defined this policy will be filtered. */\r\n this[\"policy:DHCPv6Filter_bool\"] = false;\r\n /** Security policy: Disallow DHCP Server Operation (IPv6). Computers connected to sessions that have this policy setting will not be allowed to become a DHCP server and distribute IPv6 addresses to DHCP clients. */\r\n this[\"policy:DHCPv6NoServer_bool\"] = false;\r\n /** Security policy: Prohibit the duplicate IP address (IPv6) */\r\n this.SecPol_CheckIPv6_bool = false;\r\n /** Security policy: Deny Operation as TCP/IP Server (IPv6). Computers of sessions with this policy setting can't listen and accept TCP/IP connections in IPv6. */\r\n this[\"policy:NoServerV6_bool\"] = false;\r\n /** Security policy: Maximum Number of IP Addresses (IPv6). For sessions with this policy setting, this specifies the number of IPv6 addresses that can be registered for a single session. */\r\n this[\"policy:MaxIPv6_u32\"] = 0;\r\n /** Security policy: Filter All IPv4 Packets. All IPv4 and ARP packets in sessions defined this policy will be filtered. */\r\n this[\"policy:FilterIPv4_bool\"] = false;\r\n /** Security policy: Filter All IPv6 Packets. All IPv6 packets in sessions defined this policy will be filtered. */\r\n this[\"policy:FilterIPv6_bool\"] = false;\r\n /** Security policy: Filter All Non-IP Packets. All non-IP packets in sessions defined this policy will be filtered. \"Non-IP packet\" mean a packet which is not IPv4, ARP nor IPv6. Any tagged-VLAN packets via the Virtual Hub will be regarded as non-IP packets. */\r\n this[\"policy:FilterNonIP_bool\"] = false;\r\n /** Security policy: No Default-Router on IPv6 RA. In all VPN Sessions defines this policy, any IPv6 RA (Router Advertisement) packet with non-zero value in the router-lifetime will set to zero-value. This is effective to avoid the horrible behavior from the IPv6 routing confusion which is caused by the VPN client's attempts to use the remote-side IPv6 router as its local IPv6 router. */\r\n this[\"policy:NoIPv6DefaultRouterInRA_bool\"] = false;\r\n /** Security policy: VLAN ID (IEEE802.1Q). You can specify the VLAN ID on the security policy. All VPN Sessions defines this policy, all Ethernet packets toward the Virtual Hub from the user will be inserted a VLAN tag (IEEE 802.1Q) with the VLAN ID. The user can also receive only packets with a VLAN tag which has the same VLAN ID. (Receiving process removes the VLAN tag automatically.) Any Ethernet packets with any other VLAN IDs or non-VLAN packets will not be received. All VPN Sessions without this policy definition can send / receive any kinds of Ethernet packets regardless of VLAN tags, and VLAN tags are not inserted or removed automatically. Any tagged-VLAN packets via the Virtual Hub will be regarded as non-IP packets. Therefore, tagged-VLAN packets are not subjects for IPv4 / IPv6 security policies, access lists nor other IPv4 / IPv6 specific deep processing. */\r\n this[\"policy:VLanId_u32\"] = 0;\r\n /** Security policy: Whether version 3.0 (must be true) */\r\n this[\"policy:Ver3_bool\"] = false;\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcCreateLink;\r\n}());\r\nexports.VpnRpcCreateLink = VpnRpcCreateLink;\r\n/** Listener */\r\nvar VpnRpcListener = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcListener' class: Listener */\r\n function VpnRpcListener(init) {\r\n /** Port number (Range: 1 - 65535) */\r\n this.Port_u32 = 0;\r\n /** Active state */\r\n this.Enable_bool = false;\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcListener;\r\n}());\r\nexports.VpnRpcListener = VpnRpcListener;\r\n/** User authentication type (server side) */\r\nvar VpnRpcUserAuthType;\r\n(function (VpnRpcUserAuthType) {\r\n /** Anonymous authentication */\r\n VpnRpcUserAuthType[VpnRpcUserAuthType[\"Anonymous\"] = 0] = \"Anonymous\";\r\n /** Password authentication */\r\n VpnRpcUserAuthType[VpnRpcUserAuthType[\"Password\"] = 1] = \"Password\";\r\n /** User certificate authentication */\r\n VpnRpcUserAuthType[VpnRpcUserAuthType[\"UserCert\"] = 2] = \"UserCert\";\r\n /** Root certificate which is issued by trusted Certificate Authority */\r\n VpnRpcUserAuthType[VpnRpcUserAuthType[\"RootCert\"] = 3] = \"RootCert\";\r\n /** Radius authentication */\r\n VpnRpcUserAuthType[VpnRpcUserAuthType[\"Radius\"] = 4] = \"Radius\";\r\n /** Windows NT authentication */\r\n VpnRpcUserAuthType[VpnRpcUserAuthType[\"NTDomain\"] = 5] = \"NTDomain\";\r\n})(VpnRpcUserAuthType = exports.VpnRpcUserAuthType || (exports.VpnRpcUserAuthType = {}));\r\n/** Create, configure, and get the user */\r\nvar VpnRpcSetUser = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcSetUser' class: Create, configure, and get the user */\r\n function VpnRpcSetUser(init) {\r\n /** The Virtual Hub name */\r\n this.HubName_str = \"\";\r\n /** Specify the user name of the user */\r\n this.Name_str = \"\";\r\n /** Assigned group name for the user */\r\n this.GroupName_str = \"\";\r\n /** Optional real name (full name) of the user, allow using any Unicode characters */\r\n this.Realname_utf = \"\";\r\n /** Optional User Description */\r\n this.Note_utf = \"\";\r\n /** Creation date and time */\r\n this.CreatedTime_dt = new Date();\r\n /** Last modified date and time */\r\n this.UpdatedTime_dt = new Date();\r\n /** Expiration date and time */\r\n this.ExpireTime_dt = new Date();\r\n /** Authentication method of the user */\r\n this.AuthType_u32 = 0;\r\n /** User password, valid only if AuthType_u32 == Password(1). Valid only to create or set operations. */\r\n this.Auth_Password_str = \"\";\r\n /** User certificate, valid only if AuthType_u32 == UserCert(2). */\r\n this.UserX_bin = new Uint8Array([]);\r\n /** Certificate Serial Number, optional, valid only if AuthType_u32 == RootCert(3). */\r\n this.Serial_bin = new Uint8Array([]);\r\n /** Certificate Common Name, optional, valid only if AuthType_u32 == RootCert(3). */\r\n this.CommonName_utf = \"\";\r\n /** Username in RADIUS server, optional, valid only if AuthType_u32 == Radius(4). */\r\n this.RadiusUsername_utf = \"\";\r\n /** Username in NT Domain server, optional, valid only if AuthType_u32 == NT(5). */\r\n this.NtUsername_utf = \"\";\r\n /** Number of total logins of the user */\r\n this.NumLogin_u32 = 0;\r\n /** Number of broadcast packets (Recv) */\r\n this[\"Recv.BroadcastBytes_u64\"] = 0;\r\n /** Broadcast bytes (Recv) */\r\n this[\"Recv.BroadcastCount_u64\"] = 0;\r\n /** Unicast count (Recv) */\r\n this[\"Recv.UnicastBytes_u64\"] = 0;\r\n /** Unicast bytes (Recv) */\r\n this[\"Recv.UnicastCount_u64\"] = 0;\r\n /** Number of broadcast packets (Send) */\r\n this[\"Send.BroadcastBytes_u64\"] = 0;\r\n /** Broadcast bytes (Send) */\r\n this[\"Send.BroadcastCount_u64\"] = 0;\r\n /** Unicast bytes (Send) */\r\n this[\"Send.UnicastBytes_u64\"] = 0;\r\n /** Unicast bytes (Send) */\r\n this[\"Send.UnicastCount_u64\"] = 0;\r\n /** The flag whether to use security policy */\r\n this.UsePolicy_bool = false;\r\n /** Security policy: Allow Access. The users, which this policy value is true, have permission to make VPN connection to VPN Server. */\r\n this[\"policy:Access_bool\"] = false;\r\n /** Security policy: Filter DHCP Packets (IPv4). All IPv4 DHCP packets in sessions defined this policy will be filtered. */\r\n this[\"policy:DHCPFilter_bool\"] = false;\r\n /** Security policy: Disallow DHCP Server Operation (IPv4). Computers connected to sessions that have this policy setting will not be allowed to become a DHCP server and distribute IPv4 addresses to DHCP clients. */\r\n this[\"policy:DHCPNoServer_bool\"] = false;\r\n /** Security policy: Enforce DHCP Allocated IP Addresses (IPv4). Computers in sessions that have this policy setting will only be able to use IPv4 addresses allocated by a DHCP server on the virtual network side. */\r\n this[\"policy:DHCPForce_bool\"] = false;\r\n /** Security policy: Deny Bridge Operation. Bridge-mode connections are denied for user sessions that have this policy setting. Even in cases when the Ethernet Bridge is configured in the client side, communication will not be possible. */\r\n this[\"policy:NoBridge_bool\"] = false;\r\n /** Security policy: Deny Routing Operation (IPv4). IPv4 routing will be denied for sessions that have this policy setting. Even in the case where the IP router is operating on the user client side, communication will not be possible. */\r\n this[\"policy:NoRouting_bool\"] = false;\r\n /** Security policy: Deny MAC Addresses Duplication. The use of duplicating MAC addresses that are in use by computers of different sessions cannot be used by sessions with this policy setting. */\r\n this[\"policy:CheckMac_bool\"] = false;\r\n /** Security policy: Deny IP Address Duplication (IPv4). The use of duplicating IPv4 addresses that are in use by computers of different sessions cannot be used by sessions with this policy setting. */\r\n this[\"policy:CheckIP_bool\"] = false;\r\n /** Security policy: Deny Non-ARP / Non-DHCP / Non-ICMPv6 broadcasts. The sending or receiving of broadcast packets that are not ARP protocol, DHCP protocol, nor ICMPv6 on the virtual network will not be allowed for sessions with this policy setting. */\r\n this[\"policy:ArpDhcpOnly_bool\"] = false;\r\n /** Security policy: Privacy Filter Mode. All direct communication between sessions with the privacy filter mode policy setting will be filtered. */\r\n this[\"policy:PrivacyFilter_bool\"] = false;\r\n /** Security policy: Deny Operation as TCP/IP Server (IPv4). Computers of sessions with this policy setting can't listen and accept TCP/IP connections in IPv4. */\r\n this[\"policy:NoServer_bool\"] = false;\r\n /** Security policy: Unlimited Number of Broadcasts. If a computer of a session with this policy setting sends broadcast packets of a number unusually larger than what would be considered normal on the virtual network, there will be no automatic limiting. */\r\n this[\"policy:NoBroadcastLimiter_bool\"] = false;\r\n /** Security policy: Allow Monitoring Mode. Users with this policy setting will be granted to connect to the Virtual Hub in Monitoring Mode. Sessions in Monitoring Mode are able to monitor (tap) all packets flowing through the Virtual Hub. */\r\n this[\"policy:MonitorPort_bool\"] = false;\r\n /** Security policy: Maximum Number of TCP Connections. For sessions with this policy setting, this sets the maximum number of physical TCP connections consists in a physical VPN session. */\r\n this[\"policy:MaxConnection_u32\"] = 0;\r\n /** Security policy: Time-out Period. For sessions with this policy setting, this sets, in seconds, the time-out period to wait before disconnecting a session when communication trouble occurs between the VPN Client / VPN Server. */\r\n this[\"policy:TimeOut_u32\"] = 0;\r\n /** Security policy: Maximum Number of MAC Addresses. For sessions with this policy setting, this limits the number of MAC addresses per session. */\r\n this[\"policy:MaxMac_u32\"] = 0;\r\n /** Security policy: Maximum Number of IP Addresses (IPv4). For sessions with this policy setting, this specifies the number of IPv4 addresses that can be registered for a single session. */\r\n this[\"policy:MaxIP_u32\"] = 0;\r\n /** Security policy: Upload Bandwidth. For sessions with this policy setting, this limits the traffic bandwidth that is in the inwards direction from outside to inside the Virtual Hub. */\r\n this[\"policy:MaxUpload_u32\"] = 0;\r\n /** Security policy: Download Bandwidth. For sessions with this policy setting, this limits the traffic bandwidth that is in the outwards direction from inside the Virtual Hub to outside the Virtual Hub. */\r\n this[\"policy:MaxDownload_u32\"] = 0;\r\n /** Security policy: Deny Changing Password. The users which use password authentication with this policy setting are not allowed to change their own password from the VPN Client Manager or similar. */\r\n this[\"policy:FixPassword_bool\"] = false;\r\n /** Security policy: Maximum Number of Multiple Logins. Users with this policy setting are unable to have more than this number of concurrent logins. Bridge Mode sessions are not subjects to this policy. */\r\n this[\"policy:MultiLogins_u32\"] = 0;\r\n /** Security policy: Deny VoIP / QoS Function. Users with this security policy are unable to use VoIP / QoS functions in VPN connection sessions. */\r\n this[\"policy:NoQoS_bool\"] = false;\r\n /** Security policy: Filter RS / RA Packets (IPv6). All ICMPv6 packets which the message-type is 133 (Router Solicitation) or 134 (Router Advertisement) in sessions defined this policy will be filtered. As a result, an IPv6 client will be unable to use IPv6 address prefix auto detection and IPv6 default gateway auto detection. */\r\n this[\"policy:RSandRAFilter_bool\"] = false;\r\n /** Security policy: Filter RA Packets (IPv6). All ICMPv6 packets which the message-type is 134 (Router Advertisement) in sessions defined this policy will be filtered. As a result, a malicious users will be unable to spread illegal IPv6 prefix or default gateway advertisements on the network. */\r\n this[\"policy:RAFilter_bool\"] = false;\r\n /** Security policy: Filter DHCP Packets (IPv6). All IPv6 DHCP packets in sessions defined this policy will be filtered. */\r\n this[\"policy:DHCPv6Filter_bool\"] = false;\r\n /** Security policy: Disallow DHCP Server Operation (IPv6). Computers connected to sessions that have this policy setting will not be allowed to become a DHCP server and distribute IPv6 addresses to DHCP clients. */\r\n this[\"policy:DHCPv6NoServer_bool\"] = false;\r\n /** Security policy: Deny Routing Operation (IPv6). IPv6 routing will be denied for sessions that have this policy setting. Even in the case where the IP router is operating on the user client side, communication will not be possible. */\r\n this[\"policy:NoRoutingV6_bool\"] = false;\r\n /** Security policy: Deny IP Address Duplication (IPv6). The use of duplicating IPv6 addresses that are in use by computers of different sessions cannot be used by sessions with this policy setting. */\r\n this[\"policy:CheckIPv6_bool\"] = false;\r\n /** Security policy: Deny Operation as TCP/IP Server (IPv6). Computers of sessions with this policy setting can't listen and accept TCP/IP connections in IPv6. */\r\n this[\"policy:NoServerV6_bool\"] = false;\r\n /** Security policy: Maximum Number of IP Addresses (IPv6). For sessions with this policy setting, this specifies the number of IPv6 addresses that can be registered for a single session. */\r\n this[\"policy:MaxIPv6_u32\"] = 0;\r\n /** Security policy: Disallow Password Save in VPN Client. For users with this policy setting, when the user is using *standard* password authentication, the user will be unable to save the password in VPN Client. The user will be required to input passwords for every time to connect a VPN. This will improve the security. If this policy is enabled, VPN Client Version 2.0 will be denied to access. */\r\n this[\"policy:NoSavePassword_bool\"] = false;\r\n /** Security policy: VPN Client Automatic Disconnect. For users with this policy setting, a user's VPN session will be disconnected automatically after the specific period will elapse. In this case no automatic re-connection will be performed. This can prevent a lot of inactive VPN Sessions. If this policy is enabled, VPN Client Version 2.0 will be denied to access. */\r\n this[\"policy:AutoDisconnect_u32\"] = 0;\r\n /** Security policy: Filter All IPv4 Packets. All IPv4 and ARP packets in sessions defined this policy will be filtered. */\r\n this[\"policy:FilterIPv4_bool\"] = false;\r\n /** Security policy: Filter All IPv6 Packets. All IPv6 packets in sessions defined this policy will be filtered. */\r\n this[\"policy:FilterIPv6_bool\"] = false;\r\n /** Security policy: Filter All Non-IP Packets. All non-IP packets in sessions defined this policy will be filtered. \"Non-IP packet\" mean a packet which is not IPv4, ARP nor IPv6. Any tagged-VLAN packets via the Virtual Hub will be regarded as non-IP packets. */\r\n this[\"policy:FilterNonIP_bool\"] = false;\r\n /** Security policy: No Default-Router on IPv6 RA. In all VPN Sessions defines this policy, any IPv6 RA (Router Advertisement) packet with non-zero value in the router-lifetime will set to zero-value. This is effective to avoid the horrible behavior from the IPv6 routing confusion which is caused by the VPN client's attempts to use the remote-side IPv6 router as its local IPv6 router. */\r\n this[\"policy:NoIPv6DefaultRouterInRA_bool\"] = false;\r\n /** Security policy: No Default-Router on IPv6 RA (physical IPv6). In all VPN Sessions defines this policy (only when the physical communication protocol between VPN Client / VPN Bridge and VPN Server is IPv6), any IPv6 RA (Router Advertisement) packet with non-zero value in the router-lifetime will set to zero-value. This is effective to avoid the horrible behavior from the IPv6 routing confusion which is caused by the VPN client's attempts to use the remote-side IPv6 router as its local IPv6 router. */\r\n this[\"policy:NoIPv6DefaultRouterInRAWhenIPv6_bool\"] = false;\r\n /** Security policy: VLAN ID (IEEE802.1Q). You can specify the VLAN ID on the security policy. All VPN Sessions defines this policy, all Ethernet packets toward the Virtual Hub from the user will be inserted a VLAN tag (IEEE 802.1Q) with the VLAN ID. The user can also receive only packets with a VLAN tag which has the same VLAN ID. (Receiving process removes the VLAN tag automatically.) Any Ethernet packets with any other VLAN IDs or non-VLAN packets will not be received. All VPN Sessions without this policy definition can send / receive any kinds of Ethernet packets regardless of VLAN tags, and VLAN tags are not inserted or removed automatically. Any tagged-VLAN packets via the Virtual Hub will be regarded as non-IP packets. Therefore, tagged-VLAN packets are not subjects for IPv4 / IPv6 security policies, access lists nor other IPv4 / IPv6 specific deep processing. */\r\n this[\"policy:VLanId_u32\"] = 0;\r\n /** Security policy: Whether version 3.0 (must be true) */\r\n this[\"policy:Ver3_bool\"] = false;\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcSetUser;\r\n}());\r\nexports.VpnRpcSetUser = VpnRpcSetUser;\r\n/** Delete the access list */\r\nvar VpnRpcDeleteAccess = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcDeleteAccess' class: Delete the access list */\r\n function VpnRpcDeleteAccess(init) {\r\n /** The Virtual Hub name */\r\n this.HubName_str = \"\";\r\n /** ID */\r\n this.Id_u32 = 0;\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcDeleteAccess;\r\n}());\r\nexports.VpnRpcDeleteAccess = VpnRpcDeleteAccess;\r\n/** Delete the CA of HUB */\r\nvar VpnRpcHubDeleteCA = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcHubDeleteCA' class: Delete the CA of HUB */\r\n function VpnRpcHubDeleteCA(init) {\r\n /** The Virtual Hub name */\r\n this.HubName_str = \"\";\r\n /** Certificate key id to be deleted */\r\n this.Key_u32 = 0;\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcHubDeleteCA;\r\n}());\r\nexports.VpnRpcHubDeleteCA = VpnRpcHubDeleteCA;\r\n/** Deleting a user or group */\r\nvar VpnRpcDeleteUser = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcDeleteUser' class: Deleting a user or group */\r\n function VpnRpcDeleteUser(init) {\r\n /** The Virtual Hub name */\r\n this.HubName_str = \"\";\r\n /** User or group name */\r\n this.Name_str = \"\";\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcDeleteUser;\r\n}());\r\nexports.VpnRpcDeleteUser = VpnRpcDeleteUser;\r\n/** Delete the HUB */\r\nvar VpnRpcDeleteHub = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcDeleteHub' class: Delete the HUB */\r\n function VpnRpcDeleteHub(init) {\r\n /** The Virtual Hub name */\r\n this.HubName_str = \"\";\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcDeleteHub;\r\n}());\r\nexports.VpnRpcDeleteHub = VpnRpcDeleteHub;\r\n/** Delete the table */\r\nvar VpnRpcDeleteTable = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcDeleteTable' class: Delete the table */\r\n function VpnRpcDeleteTable(init) {\r\n /** The Virtual Hub name */\r\n this.HubName_str = \"\";\r\n /** Key ID */\r\n this.Key_u32 = 0;\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcDeleteTable;\r\n}());\r\nexports.VpnRpcDeleteTable = VpnRpcDeleteTable;\r\n/** Specify the Link */\r\nvar VpnRpcLink = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcLink' class: Specify the Link */\r\n function VpnRpcLink(init) {\r\n /** The Virtual Hub name */\r\n this.HubName_str = \"\";\r\n /** The name of the cascade connection */\r\n this.AccountName_utf = \"\";\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcLink;\r\n}());\r\nexports.VpnRpcLink = VpnRpcLink;\r\n/** Disconnect the session */\r\nvar VpnRpcDeleteSession = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcDeleteSession' class: Disconnect the session */\r\n function VpnRpcDeleteSession(init) {\r\n /** The Virtual Hub name */\r\n this.HubName_str = \"\";\r\n /** Session name */\r\n this.Name_str = \"\";\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcDeleteSession;\r\n}());\r\nexports.VpnRpcDeleteSession = VpnRpcDeleteSession;\r\n/** Specify the HUB */\r\nvar VpnRpcHub = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcHub' class: Specify the HUB */\r\n function VpnRpcHub(init) {\r\n /** The Virtual Hub name */\r\n this.HubName_str = \"\";\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcHub;\r\n}());\r\nexports.VpnRpcHub = VpnRpcHub;\r\n/** Disconnect a connection */\r\nvar VpnRpcDisconnectConnection = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcDisconnectConnection' class: Disconnect a connection */\r\n function VpnRpcDisconnectConnection(init) {\r\n /** Connection name */\r\n this.Name_str = \"\";\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcDisconnectConnection;\r\n}());\r\nexports.VpnRpcDisconnectConnection = VpnRpcDisconnectConnection;\r\n/** Enumeration of the access list */\r\nvar VpnRpcEnumAccessList = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcEnumAccessList' class: Enumeration of the access list */\r\n function VpnRpcEnumAccessList(init) {\r\n /** The Virtual Hub name */\r\n this.HubName_str = \"\";\r\n /** Access list */\r\n this.AccessList = [];\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcEnumAccessList;\r\n}());\r\nexports.VpnRpcEnumAccessList = VpnRpcEnumAccessList;\r\n/** CA enumeration items of HUB */\r\nvar VpnRpcHubEnumCAItem = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcHubEnumCAItem' class: CA enumeration items of HUB */\r\n function VpnRpcHubEnumCAItem(init) {\r\n /** The key id of the item */\r\n this.Key_u32 = 0;\r\n /** Subject */\r\n this.SubjectName_utf = \"\";\r\n /** Issuer */\r\n this.IssuerName_utf = \"\";\r\n /** Expiration date */\r\n this.Expires_dt = new Date();\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcHubEnumCAItem;\r\n}());\r\nexports.VpnRpcHubEnumCAItem = VpnRpcHubEnumCAItem;\r\n/** CA enumeration of HUB */\r\nvar VpnRpcHubEnumCA = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcHubEnumCA' class: CA enumeration of HUB */\r\n function VpnRpcHubEnumCA(init) {\r\n /** The Virtual Hub name */\r\n this.HubName_str = \"\";\r\n /** The list of CA */\r\n this.CAList = [];\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcHubEnumCA;\r\n}());\r\nexports.VpnRpcHubEnumCA = VpnRpcHubEnumCA;\r\n/** Type of connection */\r\nvar VpnRpcConnectionType;\r\n(function (VpnRpcConnectionType) {\r\n /** VPN Client */\r\n VpnRpcConnectionType[VpnRpcConnectionType[\"Client\"] = 0] = \"Client\";\r\n /** During initialization */\r\n VpnRpcConnectionType[VpnRpcConnectionType[\"Init\"] = 1] = \"Init\";\r\n /** Login connection */\r\n VpnRpcConnectionType[VpnRpcConnectionType[\"Login\"] = 2] = \"Login\";\r\n /** Additional connection */\r\n VpnRpcConnectionType[VpnRpcConnectionType[\"Additional\"] = 3] = \"Additional\";\r\n /** RPC for server farm */\r\n VpnRpcConnectionType[VpnRpcConnectionType[\"FarmRpc\"] = 4] = \"FarmRpc\";\r\n /** RPC for Management */\r\n VpnRpcConnectionType[VpnRpcConnectionType[\"AdminRpc\"] = 5] = \"AdminRpc\";\r\n /** HUB enumeration */\r\n VpnRpcConnectionType[VpnRpcConnectionType[\"EnumHub\"] = 6] = \"EnumHub\";\r\n /** Password change */\r\n VpnRpcConnectionType[VpnRpcConnectionType[\"Password\"] = 7] = \"Password\";\r\n /** SSTP */\r\n VpnRpcConnectionType[VpnRpcConnectionType[\"SSTP\"] = 8] = \"SSTP\";\r\n /** OpenVPN */\r\n VpnRpcConnectionType[VpnRpcConnectionType[\"OpenVPN\"] = 9] = \"OpenVPN\";\r\n})(VpnRpcConnectionType = exports.VpnRpcConnectionType || (exports.VpnRpcConnectionType = {}));\r\n/** Connection enumeration items */\r\nvar VpnRpcEnumConnectionItem = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcEnumConnectionItem' class: Connection enumeration items */\r\n function VpnRpcEnumConnectionItem(init) {\r\n /** Connection name */\r\n this.Name_str = \"\";\r\n /** Host name */\r\n this.Hostname_str = \"\";\r\n /** IP address */\r\n this.Ip_ip = \"\";\r\n /** Port number */\r\n this.Port_u32 = 0;\r\n /** Connected time */\r\n this.ConnectedTime_dt = new Date();\r\n /** Connection type */\r\n this.Type_u32 = 0;\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcEnumConnectionItem;\r\n}());\r\nexports.VpnRpcEnumConnectionItem = VpnRpcEnumConnectionItem;\r\n/** Connection enumeration */\r\nvar VpnRpcEnumConnection = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcEnumConnection' class: Connection enumeration */\r\n function VpnRpcEnumConnection(init) {\r\n /** Number of connections */\r\n this.NumConnection_u32 = 0;\r\n /** Connection list */\r\n this.ConnectionList = [];\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcEnumConnection;\r\n}());\r\nexports.VpnRpcEnumConnection = VpnRpcEnumConnection;\r\n/** Enum CRL Item */\r\nvar VpnRpcEnumCrlItem = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcEnumCrlItem' class: Enum CRL Item */\r\n function VpnRpcEnumCrlItem(init) {\r\n /** Key ID */\r\n this.Key_u32 = 0;\r\n /** The contents of the CRL item */\r\n this.CrlInfo_utf = \"\";\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcEnumCrlItem;\r\n}());\r\nexports.VpnRpcEnumCrlItem = VpnRpcEnumCrlItem;\r\n/** Enum CRL */\r\nvar VpnRpcEnumCrl = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcEnumCrl' class: Enum CRL */\r\n function VpnRpcEnumCrl(init) {\r\n /** The Virtual Hub name */\r\n this.HubName_str = \"\";\r\n /** CRL list */\r\n this.CRLList = [];\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcEnumCrl;\r\n}());\r\nexports.VpnRpcEnumCrl = VpnRpcEnumCrl;\r\n/** RPC_ENUM_DHCP_ITEM */\r\nvar VpnRpcEnumDhcpItem = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcEnumDhcpItem' class: RPC_ENUM_DHCP_ITEM */\r\n function VpnRpcEnumDhcpItem(init) {\r\n /** ID */\r\n this.Id_u32 = 0;\r\n /** Lease time */\r\n this.LeasedTime_dt = new Date();\r\n /** Expiration date */\r\n this.ExpireTime_dt = new Date();\r\n /** MAC address */\r\n this.MacAddress_bin = new Uint8Array([]);\r\n /** IP address */\r\n this.IpAddress_ip = \"\";\r\n /** Subnet mask */\r\n this.Mask_u32 = 0;\r\n /** Host name */\r\n this.Hostname_str = \"\";\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcEnumDhcpItem;\r\n}());\r\nexports.VpnRpcEnumDhcpItem = VpnRpcEnumDhcpItem;\r\n/** RPC_ENUM_DHCP */\r\nvar VpnRpcEnumDhcp = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcEnumDhcp' class: RPC_ENUM_DHCP */\r\n function VpnRpcEnumDhcp(init) {\r\n /** Virtual Hub Name */\r\n this.HubName_str = \"\";\r\n /** DHCP Item */\r\n this.DhcpTable = [];\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcEnumDhcp;\r\n}());\r\nexports.VpnRpcEnumDhcp = VpnRpcEnumDhcp;\r\n/** EtherIP setting list */\r\nvar VpnRpcEnumEtherIpId = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcEnumEtherIpId' class: EtherIP setting list */\r\n function VpnRpcEnumEtherIpId(init) {\r\n /** Setting list */\r\n this.Settings = [];\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcEnumEtherIpId;\r\n}());\r\nexports.VpnRpcEnumEtherIpId = VpnRpcEnumEtherIpId;\r\n/** Ethernet Network Adapters list item */\r\nvar VpnRpcEnumEthItem = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcEnumEthItem' class: Ethernet Network Adapters list item */\r\n function VpnRpcEnumEthItem(init) {\r\n /** Device name */\r\n this.DeviceName_str = \"\";\r\n /** Network connection name (description) */\r\n this.NetworkConnectionName_utf = \"\";\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcEnumEthItem;\r\n}());\r\nexports.VpnRpcEnumEthItem = VpnRpcEnumEthItem;\r\n/** Ethernet Network Adapters list */\r\nvar VpnRpcEnumEth = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcEnumEth' class: Ethernet Network Adapters list */\r\n function VpnRpcEnumEth(init) {\r\n /** Ethernet Network Adapters list */\r\n this.EthList = [];\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcEnumEth;\r\n}());\r\nexports.VpnRpcEnumEth = VpnRpcEnumEth;\r\n/** Server farm members enumeration items */\r\nvar VpnRpcEnumFarmItem = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcEnumFarmItem' class: Server farm members enumeration items */\r\n function VpnRpcEnumFarmItem(init) {\r\n /** ID */\r\n this.Id_u32 = 0;\r\n /** Controller */\r\n this.Controller_bool = false;\r\n /** Connection time */\r\n this.ConnectedTime_dt = new Date();\r\n /** IP address */\r\n this.Ip_ip = \"\";\r\n /** Host name */\r\n this.Hostname_str = \"\";\r\n /** Point */\r\n this.Point_u32 = 0;\r\n /** Number of sessions */\r\n this.NumSessions_u32 = 0;\r\n /** Number of TCP connections */\r\n this.NumTcpConnections_u32 = 0;\r\n /** Number of HUBs */\r\n this.NumHubs_u32 = 0;\r\n /** Number of assigned client licenses */\r\n this.AssignedClientLicense_u32 = 0;\r\n /** Number of assigned bridge licenses */\r\n this.AssignedBridgeLicense_u32 = 0;\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcEnumFarmItem;\r\n}());\r\nexports.VpnRpcEnumFarmItem = VpnRpcEnumFarmItem;\r\n/** Server farm member enumeration */\r\nvar VpnRpcEnumFarm = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcEnumFarm' class: Server farm member enumeration */\r\n function VpnRpcEnumFarm(init) {\r\n /** Number of Cluster Members */\r\n this.NumFarm_u32 = 0;\r\n /** Cluster Members list */\r\n this.FarmMemberList = [];\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcEnumFarm;\r\n}());\r\nexports.VpnRpcEnumFarm = VpnRpcEnumFarm;\r\n/** Enumeration items in the group */\r\nvar VpnRpcEnumGroupItem = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcEnumGroupItem' class: Enumeration items in the group */\r\n function VpnRpcEnumGroupItem(init) {\r\n /** User name */\r\n this.Name_str = \"\";\r\n /** Real name */\r\n this.Realname_utf = \"\";\r\n /** Note */\r\n this.Note_utf = \"\";\r\n /** Number of users */\r\n this.NumUsers_u32 = 0;\r\n /** Access denied */\r\n this.DenyAccess_bool = false;\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcEnumGroupItem;\r\n}());\r\nexports.VpnRpcEnumGroupItem = VpnRpcEnumGroupItem;\r\n/** Group enumeration */\r\nvar VpnRpcEnumGroup = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcEnumGroup' class: Group enumeration */\r\n function VpnRpcEnumGroup(init) {\r\n /** The Virtual Hub name */\r\n this.HubName_str = \"\";\r\n /** Group list */\r\n this.GroupList = [];\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcEnumGroup;\r\n}());\r\nexports.VpnRpcEnumGroup = VpnRpcEnumGroup;\r\n/** Enumeration items of HUB */\r\nvar VpnRpcEnumHubItem = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcEnumHubItem' class: Enumeration items of HUB */\r\n function VpnRpcEnumHubItem(init) {\r\n /** The name of the Virtual Hub */\r\n this.HubName_str = \"\";\r\n /** Online state */\r\n this.Online_bool = false;\r\n /** Type of HUB (Valid only for Clustered VPN Servers) */\r\n this.HubType_u32 = 0;\r\n /** Number of users */\r\n this.NumUsers_u32 = 0;\r\n /** Number of registered groups */\r\n this.NumGroups_u32 = 0;\r\n /** Number of registered sessions */\r\n this.NumSessions_u32 = 0;\r\n /** Number of current MAC table entries */\r\n this.NumMacTables_u32 = 0;\r\n /** Number of current IP table entries */\r\n this.NumIpTables_u32 = 0;\r\n /** Last communication date and time */\r\n this.LastCommTime_dt = new Date();\r\n /** Last login date and time */\r\n this.LastLoginTime_dt = new Date();\r\n /** Creation date and time */\r\n this.CreatedTime_dt = new Date();\r\n /** Number of accumulated logins */\r\n this.NumLogin_u32 = 0;\r\n /** Whether the traffic information is provided */\r\n this.IsTrafficFilled_bool = false;\r\n /** Number of broadcast packets (Recv) */\r\n this[\"Ex.Recv.BroadcastBytes_u64\"] = 0;\r\n /** Broadcast bytes (Recv) */\r\n this[\"Ex.Recv.BroadcastCount_u64\"] = 0;\r\n /** Unicast count (Recv) */\r\n this[\"Ex.Recv.UnicastBytes_u64\"] = 0;\r\n /** Unicast bytes (Recv) */\r\n this[\"Ex.Recv.UnicastCount_u64\"] = 0;\r\n /** Number of broadcast packets (Send) */\r\n this[\"Ex.Send.BroadcastBytes_u64\"] = 0;\r\n /** Broadcast bytes (Send) */\r\n this[\"Ex.Send.BroadcastCount_u64\"] = 0;\r\n /** Unicast bytes (Send) */\r\n this[\"Ex.Send.UnicastBytes_u64\"] = 0;\r\n /** Unicast bytes (Send) */\r\n this[\"Ex.Send.UnicastCount_u64\"] = 0;\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcEnumHubItem;\r\n}());\r\nexports.VpnRpcEnumHubItem = VpnRpcEnumHubItem;\r\n/** Enumeration of HUB */\r\nvar VpnRpcEnumHub = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcEnumHub' class: Enumeration of HUB */\r\n function VpnRpcEnumHub(init) {\r\n /** Number of Virtual Hubs */\r\n this.NumHub_u32 = 0;\r\n /** Virtual Hubs */\r\n this.HubList = [];\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcEnumHub;\r\n}());\r\nexports.VpnRpcEnumHub = VpnRpcEnumHub;\r\n/** Enumeration items of IP table */\r\nvar VpnRpcEnumIpTableItem = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcEnumIpTableItem' class: Enumeration items of IP table */\r\n function VpnRpcEnumIpTableItem(init) {\r\n /** Key ID */\r\n this.Key_u32 = 0;\r\n /** Session name */\r\n this.SessionName_str = \"\";\r\n /** IP address */\r\n this.IpAddress_ip = \"\";\r\n /** Assigned by the DHCP */\r\n this.DhcpAllocated_bool = false;\r\n /** Creation date and time */\r\n this.CreatedTime_dt = new Date();\r\n /** Updating date */\r\n this.UpdatedTime_dt = new Date();\r\n /** Remote items */\r\n this.RemoteItem_bool = false;\r\n /** Remote host name */\r\n this.RemoteHostname_str = \"\";\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcEnumIpTableItem;\r\n}());\r\nexports.VpnRpcEnumIpTableItem = VpnRpcEnumIpTableItem;\r\n/** Enumeration of IP table */\r\nvar VpnRpcEnumIpTable = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcEnumIpTable' class: Enumeration of IP table */\r\n function VpnRpcEnumIpTable(init) {\r\n /** The Virtual Hub name */\r\n this.HubName_str = \"\";\r\n /** MAC table */\r\n this.IpTable = [];\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcEnumIpTable;\r\n}());\r\nexports.VpnRpcEnumIpTable = VpnRpcEnumIpTable;\r\n/** Layer-3 interface enumeration */\r\nvar VpnRpcEnumL3If = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcEnumL3If' class: Layer-3 interface enumeration */\r\n function VpnRpcEnumL3If(init) {\r\n /** Layer-3 switch name */\r\n this.Name_str = \"\";\r\n /** Layer-3 interface list */\r\n this.L3IFList = [];\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcEnumL3If;\r\n}());\r\nexports.VpnRpcEnumL3If = VpnRpcEnumL3If;\r\n/** Layer-3 switch enumeration item */\r\nvar VpnRpcEnumL3SwItem = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcEnumL3SwItem' class: Layer-3 switch enumeration item */\r\n function VpnRpcEnumL3SwItem(init) {\r\n /** Name of the layer-3 switch */\r\n this.Name_str = \"\";\r\n /** Number of layer-3 switch virtual interfaces */\r\n this.NumInterfaces_u32 = 0;\r\n /** Number of routing tables */\r\n this.NumTables_u32 = 0;\r\n /** Activated flag */\r\n this.Active_bool = false;\r\n /** Online flag */\r\n this.Online_bool = false;\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcEnumL3SwItem;\r\n}());\r\nexports.VpnRpcEnumL3SwItem = VpnRpcEnumL3SwItem;\r\n/** Layer-3 switch enumeration */\r\nvar VpnRpcEnumL3Sw = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcEnumL3Sw' class: Layer-3 switch enumeration */\r\n function VpnRpcEnumL3Sw(init) {\r\n /** Layer-3 switch list */\r\n this.L3SWList = [];\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcEnumL3Sw;\r\n}());\r\nexports.VpnRpcEnumL3Sw = VpnRpcEnumL3Sw;\r\n/** Routing table enumeration */\r\nvar VpnRpcEnumL3Table = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcEnumL3Table' class: Routing table enumeration */\r\n function VpnRpcEnumL3Table(init) {\r\n /** L3 switch name */\r\n this.Name_str = \"\";\r\n /** Routing table item list */\r\n this.L3Table = [];\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcEnumL3Table;\r\n}());\r\nexports.VpnRpcEnumL3Table = VpnRpcEnumL3Table;\r\n/** Cascade Connection Enumeration */\r\nvar VpnRpcEnumLinkItem = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcEnumLinkItem' class: Cascade Connection Enumeration */\r\n function VpnRpcEnumLinkItem(init) {\r\n /** The name of cascade connection */\r\n this.AccountName_utf = \"\";\r\n /** Online flag */\r\n this.Online_bool = false;\r\n /** The flag indicates whether the cascade connection is established */\r\n this.Connected_bool = false;\r\n /** The error last occurred if the cascade connection is in the fail state */\r\n this.LastError_u32 = 0;\r\n /** Connection completion time */\r\n this.ConnectedTime_dt = new Date();\r\n /** Host name of the destination VPN server */\r\n this.Hostname_str = \"\";\r\n /** The Virtual Hub name */\r\n this.TargetHubName_str = \"\";\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcEnumLinkItem;\r\n}());\r\nexports.VpnRpcEnumLinkItem = VpnRpcEnumLinkItem;\r\n/** Enumeration of the link */\r\nvar VpnRpcEnumLink = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcEnumLink' class: Enumeration of the link */\r\n function VpnRpcEnumLink(init) {\r\n /** The Virtual Hub name */\r\n this.HubName_str = \"\";\r\n /** Number of cascade connections */\r\n this.NumLink_u32 = 0;\r\n /** The list of cascade connections */\r\n this.LinkList = [];\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcEnumLink;\r\n}());\r\nexports.VpnRpcEnumLink = VpnRpcEnumLink;\r\n/** List of listeners item */\r\nvar VpnRpcListenerListItem = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcListenerListItem' class: List of listeners item */\r\n function VpnRpcListenerListItem(init) {\r\n /** TCP port number (range: 1 - 65535) */\r\n this.Ports_u32 = 0;\r\n /** Active state */\r\n this.Enables_bool = false;\r\n /** The flag to indicate if the error occurred on the listener port */\r\n this.Errors_bool = false;\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcListenerListItem;\r\n}());\r\nexports.VpnRpcListenerListItem = VpnRpcListenerListItem;\r\n/** List of listeners */\r\nvar VpnRpcListenerList = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcListenerList' class: List of listeners */\r\n function VpnRpcListenerList(init) {\r\n /** List of listener items */\r\n this.ListenerList = [];\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcListenerList;\r\n}());\r\nexports.VpnRpcListenerList = VpnRpcListenerList;\r\n/** Local Bridge enumeration */\r\nvar VpnRpcEnumLocalBridge = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcEnumLocalBridge' class: Local Bridge enumeration */\r\n function VpnRpcEnumLocalBridge(init) {\r\n /** Local Bridge list */\r\n this.LocalBridgeList = [];\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcEnumLocalBridge;\r\n}());\r\nexports.VpnRpcEnumLocalBridge = VpnRpcEnumLocalBridge;\r\n/** Log file enumeration */\r\nvar VpnRpcEnumLogFileItem = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcEnumLogFileItem' class: Log file enumeration */\r\n function VpnRpcEnumLogFileItem(init) {\r\n /** Server name */\r\n this.ServerName_str = \"\";\r\n /** File path */\r\n this.FilePath_str = \"\";\r\n /** File size */\r\n this.FileSize_u32 = 0;\r\n /** Last write date */\r\n this.UpdatedTime_dt = new Date();\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcEnumLogFileItem;\r\n}());\r\nexports.VpnRpcEnumLogFileItem = VpnRpcEnumLogFileItem;\r\n/** Log file enumeration */\r\nvar VpnRpcEnumLogFile = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcEnumLogFile' class: Log file enumeration */\r\n function VpnRpcEnumLogFile(init) {\r\n /** Log file list */\r\n this.LogFiles = [];\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcEnumLogFile;\r\n}());\r\nexports.VpnRpcEnumLogFile = VpnRpcEnumLogFile;\r\n/** Enumeration items of the MAC table */\r\nvar VpnRpcEnumMacTableItem = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcEnumMacTableItem' class: Enumeration items of the MAC table */\r\n function VpnRpcEnumMacTableItem(init) {\r\n /** Key ID */\r\n this.Key_u32 = 0;\r\n /** Session name */\r\n this.SessionName_str = \"\";\r\n /** MAC address */\r\n this.MacAddress_bin = new Uint8Array([]);\r\n /** Creation date and time */\r\n this.CreatedTime_dt = new Date();\r\n /** Updating date */\r\n this.UpdatedTime_dt = new Date();\r\n /** Remote items */\r\n this.RemoteItem_bool = false;\r\n /** Remote host name */\r\n this.RemoteHostname_str = \"\";\r\n /** VLAN ID */\r\n this.VlanId_u32 = 0;\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcEnumMacTableItem;\r\n}());\r\nexports.VpnRpcEnumMacTableItem = VpnRpcEnumMacTableItem;\r\n/** Enumeration of the MAC table */\r\nvar VpnRpcEnumMacTable = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcEnumMacTable' class: Enumeration of the MAC table */\r\n function VpnRpcEnumMacTable(init) {\r\n /** The Virtual Hub name */\r\n this.HubName_str = \"\";\r\n /** MAC table */\r\n this.MacTable = [];\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcEnumMacTable;\r\n}());\r\nexports.VpnRpcEnumMacTable = VpnRpcEnumMacTable;\r\n/** NAT Entry Protocol Number */\r\nvar VpnRpcNatProtocol;\r\n(function (VpnRpcNatProtocol) {\r\n /** TCP */\r\n VpnRpcNatProtocol[VpnRpcNatProtocol[\"TCP\"] = 0] = \"TCP\";\r\n /** UDP */\r\n VpnRpcNatProtocol[VpnRpcNatProtocol[\"UDP\"] = 1] = \"UDP\";\r\n /** DNS */\r\n VpnRpcNatProtocol[VpnRpcNatProtocol[\"DNS\"] = 2] = \"DNS\";\r\n /** ICMP */\r\n VpnRpcNatProtocol[VpnRpcNatProtocol[\"ICMP\"] = 3] = \"ICMP\";\r\n})(VpnRpcNatProtocol = exports.VpnRpcNatProtocol || (exports.VpnRpcNatProtocol = {}));\r\n/** State of NAT session (TCP) */\r\nvar VpnRpcNatTcpState;\r\n(function (VpnRpcNatTcpState) {\r\n /** Connecting */\r\n VpnRpcNatTcpState[VpnRpcNatTcpState[\"Connecting\"] = 0] = \"Connecting\";\r\n /** Send the RST (Connection failure or disconnected) */\r\n VpnRpcNatTcpState[VpnRpcNatTcpState[\"SendReset\"] = 1] = \"SendReset\";\r\n /** Connection complete */\r\n VpnRpcNatTcpState[VpnRpcNatTcpState[\"Connected\"] = 2] = \"Connected\";\r\n /** Connection established */\r\n VpnRpcNatTcpState[VpnRpcNatTcpState[\"Established\"] = 3] = \"Established\";\r\n /** Wait for socket disconnection */\r\n VpnRpcNatTcpState[VpnRpcNatTcpState[\"WaitDisconnect\"] = 4] = \"WaitDisconnect\";\r\n})(VpnRpcNatTcpState = exports.VpnRpcNatTcpState || (exports.VpnRpcNatTcpState = {}));\r\n/** VpnRpcEnumNat List Item */\r\nvar VpnRpcEnumNatItem = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcEnumNatItem' class: VpnRpcEnumNat List Item */\r\n function VpnRpcEnumNatItem(init) {\r\n /** ID */\r\n this.Id_u32 = 0;\r\n /** Protocol */\r\n this.Protocol_u32 = 0;\r\n /** Source IP address */\r\n this.SrcIp_ip = \"\";\r\n /** Source host name */\r\n this.SrcHost_str = \"\";\r\n /** Source port number */\r\n this.SrcPort_u32 = 0;\r\n /** Destination IP address */\r\n this.DestIp_ip = \"\";\r\n /** Destination host name */\r\n this.DestHost_str = \"\";\r\n /** Destination port number */\r\n this.DestPort_u32 = 0;\r\n /** Connection time */\r\n this.CreatedTime_dt = new Date();\r\n /** Last communication time */\r\n this.LastCommTime_dt = new Date();\r\n /** Transmission size */\r\n this.SendSize_u64 = 0;\r\n /** Receive size */\r\n this.RecvSize_u64 = 0;\r\n /** TCP state */\r\n this.TcpStatus_u32 = 0;\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcEnumNatItem;\r\n}());\r\nexports.VpnRpcEnumNatItem = VpnRpcEnumNatItem;\r\n/** RPC_ENUM_NAT */\r\nvar VpnRpcEnumNat = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcEnumNat' class: RPC_ENUM_NAT */\r\n function VpnRpcEnumNat(init) {\r\n /** Virtual Hub Name */\r\n this.HubName_str = \"\";\r\n /** NAT item */\r\n this.NatTable = [];\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcEnumNat;\r\n}());\r\nexports.VpnRpcEnumNat = VpnRpcEnumNat;\r\n/** Enumeration item of VPN session */\r\nvar VpnRpcEnumSessionItem = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcEnumSessionItem' class: Enumeration item of VPN session */\r\n function VpnRpcEnumSessionItem(init) {\r\n /** Session name */\r\n this.Name_str = \"\";\r\n /** Remote session */\r\n this.RemoteSession_bool = false;\r\n /** Remote server name */\r\n this.RemoteHostname_str = \"\";\r\n /** User name */\r\n this.Username_str = \"\";\r\n /** IP address */\r\n this.ClientIP_ip = \"\";\r\n /** Host name */\r\n this.Hostname_str = \"\";\r\n /** Maximum number of underlying TCP connections */\r\n this.MaxNumTcp_u32 = 0;\r\n /** Number of current underlying TCP connections */\r\n this.CurrentNumTcp_u32 = 0;\r\n /** Packet size transmitted */\r\n this.PacketSize_u64 = 0;\r\n /** Number of packets transmitted */\r\n this.PacketNum_u64 = 0;\r\n /** Is a Cascade VPN session */\r\n this.LinkMode_bool = false;\r\n /** Is a SecureNAT VPN session */\r\n this.SecureNATMode_bool = false;\r\n /** Is the VPN session for Local Bridge */\r\n this.BridgeMode_bool = false;\r\n /** Is a Layer-3 Switch VPN session */\r\n this.Layer3Mode_bool = false;\r\n /** Is in Bridge Mode */\r\n this.Client_BridgeMode_bool = false;\r\n /** Is in Monitor Mode */\r\n this.Client_MonitorMode_bool = false;\r\n /** VLAN ID */\r\n this.VLanId_u32 = 0;\r\n /** Unique ID of the VPN Session */\r\n this.UniqueId_bin = new Uint8Array([]);\r\n /** Creation date and time */\r\n this.CreatedTime_dt = new Date();\r\n /** Last communication date and time */\r\n this.LastCommTime_dt = new Date();\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcEnumSessionItem;\r\n}());\r\nexports.VpnRpcEnumSessionItem = VpnRpcEnumSessionItem;\r\n/** Enumerate VPN sessions */\r\nvar VpnRpcEnumSession = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcEnumSession' class: Enumerate VPN sessions */\r\n function VpnRpcEnumSession(init) {\r\n /** The Virtual Hub name */\r\n this.HubName_str = \"\";\r\n /** VPN sessions list */\r\n this.SessionList = [];\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcEnumSession;\r\n}());\r\nexports.VpnRpcEnumSession = VpnRpcEnumSession;\r\n/** Enumeration item of user */\r\nvar VpnRpcEnumUserItem = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcEnumUserItem' class: Enumeration item of user */\r\n function VpnRpcEnumUserItem(init) {\r\n /** User name */\r\n this.Name_str = \"\";\r\n /** Group name */\r\n this.GroupName_str = \"\";\r\n /** Real name */\r\n this.Realname_utf = \"\";\r\n /** Note */\r\n this.Note_utf = \"\";\r\n /** Authentication method */\r\n this.AuthType_u32 = 0;\r\n /** Number of logins */\r\n this.NumLogin_u32 = 0;\r\n /** Last login date and time */\r\n this.LastLoginTime_dt = new Date();\r\n /** Access denied */\r\n this.DenyAccess_bool = false;\r\n /** Flag of whether the traffic variable is set */\r\n this.IsTrafficFilled_bool = false;\r\n /** Flag of whether expiration date variable is set */\r\n this.IsExpiresFilled_bool = false;\r\n /** Expiration date */\r\n this.Expires_dt = new Date();\r\n /** Number of broadcast packets (Recv) */\r\n this[\"Ex.Recv.BroadcastBytes_u64\"] = 0;\r\n /** Broadcast bytes (Recv) */\r\n this[\"Ex.Recv.BroadcastCount_u64\"] = 0;\r\n /** Unicast count (Recv) */\r\n this[\"Ex.Recv.UnicastBytes_u64\"] = 0;\r\n /** Unicast bytes (Recv) */\r\n this[\"Ex.Recv.UnicastCount_u64\"] = 0;\r\n /** Number of broadcast packets (Send) */\r\n this[\"Ex.Send.BroadcastBytes_u64\"] = 0;\r\n /** Broadcast bytes (Send) */\r\n this[\"Ex.Send.BroadcastCount_u64\"] = 0;\r\n /** Unicast bytes (Send) */\r\n this[\"Ex.Send.UnicastBytes_u64\"] = 0;\r\n /** Unicast bytes (Send) */\r\n this[\"Ex.Send.UnicastCount_u64\"] = 0;\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcEnumUserItem;\r\n}());\r\nexports.VpnRpcEnumUserItem = VpnRpcEnumUserItem;\r\n/** Enumeration of user */\r\nvar VpnRpcEnumUser = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcEnumUser' class: Enumeration of user */\r\n function VpnRpcEnumUser(init) {\r\n /** The Virtual Hub name */\r\n this.HubName_str = \"\";\r\n /** User list */\r\n this.UserList = [];\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcEnumUser;\r\n}());\r\nexports.VpnRpcEnumUser = VpnRpcEnumUser;\r\n/** Source IP Address Limit List Item */\r\nvar VpnAc = /** @class */ (function () {\r\n /** Constructor for the 'VpnAc' class: Source IP Address Limit List Item */\r\n function VpnAc(init) {\r\n /** ID */\r\n this.Id_u32 = 0;\r\n /** Priority */\r\n this.Priority_u32 = 0;\r\n /** Deny access */\r\n this.Deny_bool = false;\r\n /** Set true if you want to specify the SubnetMask_ip item. */\r\n this.Masked_bool = false;\r\n /** IP address */\r\n this.IpAddress_ip = \"\";\r\n /** Subnet mask, valid only if Masked_bool == true */\r\n this.SubnetMask_ip = \"\";\r\n Object.assign(this, init);\r\n }\r\n return VpnAc;\r\n}());\r\nexports.VpnAc = VpnAc;\r\n/** Source IP Address Limit List */\r\nvar VpnRpcAcList = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcAcList' class: Source IP Address Limit List */\r\n function VpnRpcAcList(init) {\r\n /** The Virtual Hub name */\r\n this.HubName_str = \"\";\r\n /** Source IP Address Limit List */\r\n this.ACList = [];\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcAcList;\r\n}());\r\nexports.VpnRpcAcList = VpnRpcAcList;\r\n/** Message */\r\nvar VpnRpcMsg = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcMsg' class: Message */\r\n function VpnRpcMsg(init) {\r\n /** The Virtual Hub name */\r\n this.HubName_str = \"\";\r\n /** Message (Unicode strings acceptable) */\r\n this.Msg_bin = new Uint8Array([]);\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcMsg;\r\n}());\r\nexports.VpnRpcMsg = VpnRpcMsg;\r\n/** Get / Set the Azure state */\r\nvar VpnRpcAzureStatus = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcAzureStatus' class: Get / Set the Azure state */\r\n function VpnRpcAzureStatus(init) {\r\n /** Whether VPN Azure Function is Enabled */\r\n this.IsEnabled_bool = false;\r\n /** Whether connection to VPN Azure Cloud Server is established */\r\n this.IsConnected_bool = false;\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcAzureStatus;\r\n}());\r\nexports.VpnRpcAzureStatus = VpnRpcAzureStatus;\r\n/** Local Bridge support information */\r\nvar VpnRpcBridgeSupport = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcBridgeSupport' class: Local Bridge support information */\r\n function VpnRpcBridgeSupport(init) {\r\n /** Whether the OS supports the Local Bridge function */\r\n this.IsBridgeSupportedOs_bool = false;\r\n /** Whether WinPcap is necessary to install */\r\n this.IsWinPcapNeeded_bool = false;\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcBridgeSupport;\r\n}());\r\nexports.VpnRpcBridgeSupport = VpnRpcBridgeSupport;\r\n/** Get the CA of HUB */\r\nvar VpnRpcHubGetCA = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcHubGetCA' class: Get the CA of HUB */\r\n function VpnRpcHubGetCA(init) {\r\n /** The Virtual Hub name */\r\n this.HubName_str = \"\";\r\n /** The key id of the certificate */\r\n this.Key_u32 = 0;\r\n /** The body of the X.509 certificate */\r\n this.Cert_bin = new Uint8Array([]);\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcHubGetCA;\r\n}());\r\nexports.VpnRpcHubGetCA = VpnRpcHubGetCA;\r\n/** Caps item of the VPN Server */\r\nvar VpnCaps = /** @class */ (function () {\r\n /** Constructor for the 'VpnCaps' class: Caps item of the VPN Server */\r\n function VpnCaps(init) {\r\n /** Name */\r\n this.CapsName_str = \"\";\r\n /** Value */\r\n this.CapsValue_u32 = 0;\r\n /** Descrption */\r\n this.CapsDescrption_utf = \"\";\r\n Object.assign(this, init);\r\n }\r\n return VpnCaps;\r\n}());\r\nexports.VpnCaps = VpnCaps;\r\n/** Caps list of the VPN Server */\r\nvar VpnCapslist = /** @class */ (function () {\r\n /** Constructor for the 'VpnCapslist' class: Caps list of the VPN Server */\r\n function VpnCapslist(init) {\r\n /** Caps list of the VPN Server */\r\n this.CapsList = [];\r\n Object.assign(this, init);\r\n }\r\n return VpnCapslist;\r\n}());\r\nexports.VpnCapslist = VpnCapslist;\r\n/** Config operation */\r\nvar VpnRpcConfig = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcConfig' class: Config operation */\r\n function VpnRpcConfig(init) {\r\n /** File name (valid only for returning from the server) */\r\n this.FileName_str = \"\";\r\n /** File data */\r\n this.FileData_bin = new Uint8Array([]);\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcConfig;\r\n}());\r\nexports.VpnRpcConfig = VpnRpcConfig;\r\n/** Connection information */\r\nvar VpnRpcConnectionInfo = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcConnectionInfo' class: Connection information */\r\n function VpnRpcConnectionInfo(init) {\r\n /** Connection name */\r\n this.Name_str = \"\";\r\n /** Type */\r\n this.Type_u32 = 0;\r\n /** Host name */\r\n this.Hostname_str = \"\";\r\n /** IP address */\r\n this.Ip_ip = \"\";\r\n /** Port number */\r\n this.Port_u32 = 0;\r\n /** Connected time */\r\n this.ConnectedTime_dt = new Date();\r\n /** Server string */\r\n this.ServerStr_str = \"\";\r\n /** Server version */\r\n this.ServerVer_u32 = 0;\r\n /** Server build number */\r\n this.ServerBuild_u32 = 0;\r\n /** Client string */\r\n this.ClientStr_str = \"\";\r\n /** Client version */\r\n this.ClientVer_u32 = 0;\r\n /** Client build number */\r\n this.ClientBuild_u32 = 0;\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcConnectionInfo;\r\n}());\r\nexports.VpnRpcConnectionInfo = VpnRpcConnectionInfo;\r\n/** Proxy type */\r\nvar VpnRpcProxyType;\r\n(function (VpnRpcProxyType) {\r\n /** Direct TCP connection */\r\n VpnRpcProxyType[VpnRpcProxyType[\"Direct\"] = 0] = \"Direct\";\r\n /** Connection via HTTP proxy server */\r\n VpnRpcProxyType[VpnRpcProxyType[\"HTTP\"] = 1] = \"HTTP\";\r\n /** Connection via SOCKS proxy server */\r\n VpnRpcProxyType[VpnRpcProxyType[\"SOCKS\"] = 2] = \"SOCKS\";\r\n})(VpnRpcProxyType = exports.VpnRpcProxyType || (exports.VpnRpcProxyType = {}));\r\n/** The current status of the DDNS */\r\nvar VpnDDnsClientStatus = /** @class */ (function () {\r\n /** Constructor for the 'VpnDDnsClientStatus' class: The current status of the DDNS */\r\n function VpnDDnsClientStatus(init) {\r\n /** Last error code (IPv4) */\r\n this.Err_IPv4_u32 = 0;\r\n /** Last error string (IPv4) */\r\n this.ErrStr_IPv4_utf = \"\";\r\n /** Last error code (IPv6) */\r\n this.Err_IPv6_u32 = 0;\r\n /** Last error string (IPv6) */\r\n this.ErrStr_IPv6_utf = \"\";\r\n /** Current DDNS host name */\r\n this.CurrentHostName_str = \"\";\r\n /** Current FQDN of the DDNS hostname */\r\n this.CurrentFqdn_str = \"\";\r\n /** DDNS suffix */\r\n this.DnsSuffix_str = \"\";\r\n /** Current IPv4 address of the VPN Server */\r\n this.CurrentIPv4_str = \"\";\r\n /** Current IPv6 address of the VPN Server */\r\n this.CurrentIPv6_str = \"\";\r\n Object.assign(this, init);\r\n }\r\n return VpnDDnsClientStatus;\r\n}());\r\nexports.VpnDDnsClientStatus = VpnDDnsClientStatus;\r\n/** Internet connection settings */\r\nvar VpnInternetSetting = /** @class */ (function () {\r\n /** Constructor for the 'VpnInternetSetting' class: Internet connection settings */\r\n function VpnInternetSetting(init) {\r\n /** Type of proxy server */\r\n this.ProxyType_u32 = 0;\r\n /** Proxy server host name */\r\n this.ProxyHostName_str = \"\";\r\n /** Proxy server port number */\r\n this.ProxyPort_u32 = 0;\r\n /** Proxy server user name */\r\n this.ProxyUsername_str = \"\";\r\n /** Proxy server password */\r\n this.ProxyPassword_str = \"\";\r\n Object.assign(this, init);\r\n }\r\n return VpnInternetSetting;\r\n}());\r\nexports.VpnInternetSetting = VpnInternetSetting;\r\n/** Administration options */\r\nvar VpnAdminOption = /** @class */ (function () {\r\n /** Constructor for the 'VpnAdminOption' class: Administration options */\r\n function VpnAdminOption(init) {\r\n /** Name */\r\n this.Name_str = \"\";\r\n /** Data */\r\n this.Value_u32 = 0;\r\n /** Descrption */\r\n this.Descrption_utf = \"\";\r\n Object.assign(this, init);\r\n }\r\n return VpnAdminOption;\r\n}());\r\nexports.VpnAdminOption = VpnAdminOption;\r\n/** Administration options list */\r\nvar VpnRpcAdminOption = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcAdminOption' class: Administration options list */\r\n function VpnRpcAdminOption(init) {\r\n /** Virtual HUB name */\r\n this.HubName_str = \"\";\r\n /** List data */\r\n this.AdminOptionList = [];\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcAdminOption;\r\n}());\r\nexports.VpnRpcAdminOption = VpnRpcAdminOption;\r\n/** Connection state to the controller */\r\nvar VpnRpcFarmConnectionStatus = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcFarmConnectionStatus' class: Connection state to the controller */\r\n function VpnRpcFarmConnectionStatus(init) {\r\n /** IP address */\r\n this.Ip_ip = \"\";\r\n /** Port number */\r\n this.Port_u32 = 0;\r\n /** Online state */\r\n this.Online_bool = false;\r\n /** Last error code */\r\n this.LastError_u32 = 0;\r\n /** Connection start time */\r\n this.StartedTime_dt = new Date();\r\n /** First connection time */\r\n this.FirstConnectedTime_dt = new Date();\r\n /** Connection time of this time */\r\n this.CurrentConnectedTime_dt = new Date();\r\n /** Number of retries */\r\n this.NumTry_u32 = 0;\r\n /** Number of connection count */\r\n this.NumConnected_u32 = 0;\r\n /** Connection failure count */\r\n this.NumFailed_u32 = 0;\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcFarmConnectionStatus;\r\n}());\r\nexports.VpnRpcFarmConnectionStatus = VpnRpcFarmConnectionStatus;\r\n/** HUB item of each farm member */\r\nvar VpnRpcFarmHub = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcFarmHub' class: HUB item of each farm member */\r\n function VpnRpcFarmHub(init) {\r\n /** The Virtual Hub name */\r\n this.HubName_str = \"\";\r\n /** Dynamic HUB */\r\n this.DynamicHub_bool = false;\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcFarmHub;\r\n}());\r\nexports.VpnRpcFarmHub = VpnRpcFarmHub;\r\n/** Server farm member information acquisition */\r\nvar VpnRpcFarmInfo = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcFarmInfo' class: Server farm member information acquisition */\r\n function VpnRpcFarmInfo(init) {\r\n /** ID */\r\n this.Id_u32 = 0;\r\n /** The flag if the server is Cluster Controller (false: Cluster Member servers) */\r\n this.Controller_bool = false;\r\n /** Connection Established Time */\r\n this.ConnectedTime_dt = new Date();\r\n /** IP address */\r\n this.Ip_ip = \"\";\r\n /** Host name */\r\n this.Hostname_str = \"\";\r\n /** Point */\r\n this.Point_u32 = 0;\r\n /** Number of Public Ports */\r\n this.NumPort_u32 = 0;\r\n /** Public Ports */\r\n this.Ports_u32 = [];\r\n /** Server certificate */\r\n this.ServerCert_bin = new Uint8Array([]);\r\n /** Number of farm HUB */\r\n this.NumFarmHub_u32 = 0;\r\n /** The hosted Virtual Hub list */\r\n this.HubsList = [];\r\n /** Number of hosted VPN sessions */\r\n this.NumSessions_u32 = 0;\r\n /** Number of TCP connections */\r\n this.NumTcpConnections_u32 = 0;\r\n /** Performance Standard Ratio */\r\n this.Weight_u32 = 0;\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcFarmInfo;\r\n}());\r\nexports.VpnRpcFarmInfo = VpnRpcFarmInfo;\r\n/** Server farm configuration */\r\nvar VpnRpcFarm = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcFarm' class: Server farm configuration */\r\n function VpnRpcFarm(init) {\r\n /** Type of server */\r\n this.ServerType_u32 = 0;\r\n /** Valid only for Cluster Member servers. Number of the Ports_u32 element. */\r\n this.NumPort_u32 = 0;\r\n /** Valid only for Cluster Member servers. Specify the list of public port numbers on this server. The list must have at least one public port number set, and it is also possible to set multiple public port numbers. */\r\n this.Ports_u32 = [];\r\n /** Valid only for Cluster Member servers. Specify the public IP address of this server. If you wish to leave public IP address unspecified, specify the empty string. When a public IP address is not specified, the IP address of the network interface used when connecting to the cluster controller will be automatically used. */\r\n this.PublicIp_ip = \"\";\r\n /** Valid only for Cluster Member servers. Specify the host name or IP address of the destination cluster controller. */\r\n this.ControllerName_str = \"\";\r\n /** Valid only for Cluster Member servers. Specify the TCP port number of the destination cluster controller. */\r\n this.ControllerPort_u32 = 0;\r\n /** Valid only for Cluster Member servers. Specify the password required to connect to the destination controller. It needs to be the same as an administrator password on the destination controller. */\r\n this.MemberPasswordPlaintext_str = \"\";\r\n /** This sets a value for the performance standard ratio of this VPN Server. This is the standard value for when load balancing is performed in the cluster. For example, making only one machine 200 while the other members have a status of 100, will regulate that machine to receive twice as many connections as the other members. Specify 1 or higher for the value. If this parameter is left unspecified, 100 will be used. */\r\n this.Weight_u32 = 0;\r\n /** Valid only for Cluster Controller server. By specifying true, the VPN Server will operate only as a controller on the cluster and it will always distribute general VPN Client connections to members other than itself. This function is used in high-load environments. */\r\n this.ControllerOnly_bool = false;\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcFarm;\r\n}());\r\nexports.VpnRpcFarm = VpnRpcFarm;\r\n/** Log switch type */\r\nvar VpnRpcLogSwitchType;\r\n(function (VpnRpcLogSwitchType) {\r\n /** No switching */\r\n VpnRpcLogSwitchType[VpnRpcLogSwitchType[\"No\"] = 0] = \"No\";\r\n /** Secondly basis */\r\n VpnRpcLogSwitchType[VpnRpcLogSwitchType[\"Second\"] = 1] = \"Second\";\r\n /** Minutely basis */\r\n VpnRpcLogSwitchType[VpnRpcLogSwitchType[\"Minute\"] = 2] = \"Minute\";\r\n /** Hourly basis */\r\n VpnRpcLogSwitchType[VpnRpcLogSwitchType[\"Hour\"] = 3] = \"Hour\";\r\n /** Daily basis */\r\n VpnRpcLogSwitchType[VpnRpcLogSwitchType[\"Day\"] = 4] = \"Day\";\r\n /** Monthly basis */\r\n VpnRpcLogSwitchType[VpnRpcLogSwitchType[\"Month\"] = 5] = \"Month\";\r\n})(VpnRpcLogSwitchType = exports.VpnRpcLogSwitchType || (exports.VpnRpcLogSwitchType = {}));\r\n/** Packet log settings */\r\nvar VpnRpcPacketLogSetting;\r\n(function (VpnRpcPacketLogSetting) {\r\n /** Not save */\r\n VpnRpcPacketLogSetting[VpnRpcPacketLogSetting[\"None\"] = 0] = \"None\";\r\n /** Only header */\r\n VpnRpcPacketLogSetting[VpnRpcPacketLogSetting[\"Header\"] = 1] = \"Header\";\r\n /** All payloads */\r\n VpnRpcPacketLogSetting[VpnRpcPacketLogSetting[\"All\"] = 2] = \"All\";\r\n})(VpnRpcPacketLogSetting = exports.VpnRpcPacketLogSetting || (exports.VpnRpcPacketLogSetting = {}));\r\n/** Packet log settings array index */\r\nvar VpnRpcPacketLogSettingIndex;\r\n(function (VpnRpcPacketLogSettingIndex) {\r\n /** TCP connection log */\r\n VpnRpcPacketLogSettingIndex[VpnRpcPacketLogSettingIndex[\"TcpConnection\"] = 0] = \"TcpConnection\";\r\n /** TCP packet log */\r\n VpnRpcPacketLogSettingIndex[VpnRpcPacketLogSettingIndex[\"TcpAll\"] = 1] = \"TcpAll\";\r\n /** DHCP Log */\r\n VpnRpcPacketLogSettingIndex[VpnRpcPacketLogSettingIndex[\"Dhcp\"] = 2] = \"Dhcp\";\r\n /** UDP log */\r\n VpnRpcPacketLogSettingIndex[VpnRpcPacketLogSettingIndex[\"Udp\"] = 3] = \"Udp\";\r\n /** ICMP log */\r\n VpnRpcPacketLogSettingIndex[VpnRpcPacketLogSettingIndex[\"Icmp\"] = 4] = \"Icmp\";\r\n /** IP log */\r\n VpnRpcPacketLogSettingIndex[VpnRpcPacketLogSettingIndex[\"Ip\"] = 5] = \"Ip\";\r\n /** ARP log */\r\n VpnRpcPacketLogSettingIndex[VpnRpcPacketLogSettingIndex[\"Arp\"] = 6] = \"Arp\";\r\n /** Ethernet log */\r\n VpnRpcPacketLogSettingIndex[VpnRpcPacketLogSettingIndex[\"Ethernet\"] = 7] = \"Ethernet\";\r\n})(VpnRpcPacketLogSettingIndex = exports.VpnRpcPacketLogSettingIndex || (exports.VpnRpcPacketLogSettingIndex = {}));\r\n/** HUB log settings */\r\nvar VpnRpcHubLog = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcHubLog' class: HUB log settings */\r\n function VpnRpcHubLog(init) {\r\n /** The Virtual Hub name */\r\n this.HubName_str = \"\";\r\n /** The flag to enable / disable saving the security log */\r\n this.SaveSecurityLog_bool = false;\r\n /** The log filename switching setting of the security log */\r\n this.SecurityLogSwitchType_u32 = 0;\r\n /** The flag to enable / disable saving the security log */\r\n this.SavePacketLog_bool = false;\r\n /** The log filename switching settings of the packet logs */\r\n this.PacketLogSwitchType_u32 = 0;\r\n /** Specify the save contents of the packet logs (uint * 16 array). The index numbers: TcpConnection = 0, TcpAll = 1, DHCP = 2, UDP = 3, ICMP = 4, IP = 5, ARP = 6, Ethernet = 7. */\r\n this.PacketLogConfig_u32 = [];\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcHubLog;\r\n}());\r\nexports.VpnRpcHubLog = VpnRpcHubLog;\r\n/** RADIUS server options */\r\nvar VpnRpcRadius = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcRadius' class: RADIUS server options */\r\n function VpnRpcRadius(init) {\r\n /** The Virtual Hub name */\r\n this.HubName_str = \"\";\r\n /** RADIUS server name */\r\n this.RadiusServerName_str = \"\";\r\n /** RADIUS port number */\r\n this.RadiusPort_u32 = 0;\r\n /** Secret key */\r\n this.RadiusSecret_str = \"\";\r\n /** Radius retry interval */\r\n this.RadiusRetryInterval_u32 = 0;\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcRadius;\r\n}());\r\nexports.VpnRpcRadius = VpnRpcRadius;\r\n/** Get the state HUB */\r\nvar VpnRpcHubStatus = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcHubStatus' class: Get the state HUB */\r\n function VpnRpcHubStatus(init) {\r\n /** The Virtual Hub name */\r\n this.HubName_str = \"\";\r\n /** Online */\r\n this.Online_bool = false;\r\n /** Type of HUB */\r\n this.HubType_u32 = 0;\r\n /** Number of sessions */\r\n this.NumSessions_u32 = 0;\r\n /** Number of sessions (client mode) */\r\n this.NumSessionsClient_u32 = 0;\r\n /** Number of sessions (bridge mode) */\r\n this.NumSessionsBridge_u32 = 0;\r\n /** Number of Access list entries */\r\n this.NumAccessLists_u32 = 0;\r\n /** Number of users */\r\n this.NumUsers_u32 = 0;\r\n /** Number of groups */\r\n this.NumGroups_u32 = 0;\r\n /** Number of MAC table entries */\r\n this.NumMacTables_u32 = 0;\r\n /** Number of IP table entries */\r\n this.NumIpTables_u32 = 0;\r\n /** Number of broadcast packets (Recv) */\r\n this[\"Recv.BroadcastBytes_u64\"] = 0;\r\n /** Broadcast bytes (Recv) */\r\n this[\"Recv.BroadcastCount_u64\"] = 0;\r\n /** Unicast count (Recv) */\r\n this[\"Recv.UnicastBytes_u64\"] = 0;\r\n /** Unicast bytes (Recv) */\r\n this[\"Recv.UnicastCount_u64\"] = 0;\r\n /** Number of broadcast packets (Send) */\r\n this[\"Send.BroadcastBytes_u64\"] = 0;\r\n /** Broadcast bytes (Send) */\r\n this[\"Send.BroadcastCount_u64\"] = 0;\r\n /** Unicast bytes (Send) */\r\n this[\"Send.UnicastBytes_u64\"] = 0;\r\n /** Unicast bytes (Send) */\r\n this[\"Send.UnicastCount_u64\"] = 0;\r\n /** Whether SecureNAT is enabled */\r\n this.SecureNATEnabled_bool = false;\r\n /** Last communication date and time */\r\n this.LastCommTime_dt = new Date();\r\n /** Last login date and time */\r\n this.LastLoginTime_dt = new Date();\r\n /** Creation date and time */\r\n this.CreatedTime_dt = new Date();\r\n /** Number of logins */\r\n this.NumLogin_u32 = 0;\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcHubStatus;\r\n}());\r\nexports.VpnRpcHubStatus = VpnRpcHubStatus;\r\n/** List of services provided by IPsec server */\r\nvar VpnIPsecServices = /** @class */ (function () {\r\n /** Constructor for the 'VpnIPsecServices' class: List of services provided by IPsec server */\r\n function VpnIPsecServices(init) {\r\n /** Enable or Disable the L2TP Server Function (Raw L2TP with No Encryptions). To accept special VPN clients, enable this option. */\r\n this.L2TP_Raw_bool = false;\r\n /** Enable or Disable the L2TP over IPsec Server Function. To accept VPN connections from iPhone, iPad, Android, Windows or Mac OS X, enable this option. */\r\n this.L2TP_IPsec_bool = false;\r\n /** Enable or Disable the EtherIP / L2TPv3 over IPsec Server Function (for site-to-site VPN Server function). Router Products which are compatible with EtherIP over IPsec can connect to Virtual Hubs on the VPN Server and establish Layer-2 (Ethernet) Bridging. */\r\n this.EtherIP_IPsec_bool = false;\r\n /** Specify the IPsec Pre-Shared Key. An IPsec Pre-Shared Key is also called as \"PSK\" or \"secret\". Specify it equal or less than 8 letters, and distribute it to every users who will connect to the VPN Server. Please note: Google Android 4.0 has a bug which a Pre-Shared Key with 10 or more letters causes a unexpected behavior. For that reason, the letters of a Pre-Shared Key should be 9 or less characters. */\r\n this.IPsec_Secret_str = \"\";\r\n /** Specify the default Virtual HUB in a case of omitting the name of HUB on the Username. Users should specify their username such as \"Username@Target Virtual HUB Name\" to connect this L2TP Server. If the designation of the Virtual Hub is omitted, the above HUB will be used as the target. */\r\n this.L2TP_DefaultHub_str = \"\";\r\n Object.assign(this, init);\r\n }\r\n return VpnIPsecServices;\r\n}());\r\nexports.VpnIPsecServices = VpnIPsecServices;\r\n/** Keep alive protocol */\r\nvar VpnRpcKeepAliveProtocol;\r\n(function (VpnRpcKeepAliveProtocol) {\r\n /** TCP */\r\n VpnRpcKeepAliveProtocol[VpnRpcKeepAliveProtocol[\"TCP\"] = 0] = \"TCP\";\r\n /** UDP */\r\n VpnRpcKeepAliveProtocol[VpnRpcKeepAliveProtocol[\"UDP\"] = 1] = \"UDP\";\r\n})(VpnRpcKeepAliveProtocol = exports.VpnRpcKeepAliveProtocol || (exports.VpnRpcKeepAliveProtocol = {}));\r\n/** Keep Alive settings */\r\nvar VpnRpcKeep = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcKeep' class: Keep Alive settings */\r\n function VpnRpcKeep(init) {\r\n /** The flag to enable keep-alive to the Internet */\r\n this.UseKeepConnect_bool = false;\r\n /** Specify the host name or IP address of the destination */\r\n this.KeepConnectHost_str = \"\";\r\n /** Specify the port number of the destination */\r\n this.KeepConnectPort_u32 = 0;\r\n /** Protocol type */\r\n this.KeepConnectProtocol_u32 = 0;\r\n /** Interval Between Packets Sends (Seconds) */\r\n this.KeepConnectInterval_u32 = 0;\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcKeep;\r\n}());\r\nexports.VpnRpcKeep = VpnRpcKeep;\r\n/** State of the client session */\r\nvar VpnRpcClientSessionStatus;\r\n(function (VpnRpcClientSessionStatus) {\r\n /** Connecting */\r\n VpnRpcClientSessionStatus[VpnRpcClientSessionStatus[\"Connecting\"] = 0] = \"Connecting\";\r\n /** Negotiating */\r\n VpnRpcClientSessionStatus[VpnRpcClientSessionStatus[\"Negotiation\"] = 1] = \"Negotiation\";\r\n /** During user authentication */\r\n VpnRpcClientSessionStatus[VpnRpcClientSessionStatus[\"Auth\"] = 2] = \"Auth\";\r\n /** Connection complete */\r\n VpnRpcClientSessionStatus[VpnRpcClientSessionStatus[\"Established\"] = 3] = \"Established\";\r\n /** Wait to retry */\r\n VpnRpcClientSessionStatus[VpnRpcClientSessionStatus[\"Retry\"] = 4] = \"Retry\";\r\n /** Idle state */\r\n VpnRpcClientSessionStatus[VpnRpcClientSessionStatus[\"Idle\"] = 5] = \"Idle\";\r\n})(VpnRpcClientSessionStatus = exports.VpnRpcClientSessionStatus || (exports.VpnRpcClientSessionStatus = {}));\r\n/** Get the link state */\r\nvar VpnRpcLinkStatus = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcLinkStatus' class: Get the link state */\r\n function VpnRpcLinkStatus(init) {\r\n /** The Virtual Hub name */\r\n this.HubName_Ex_str = \"\";\r\n /** The name of the cascade connection */\r\n this.AccountName_utf = \"\";\r\n /** The flag whether the cascade connection is enabled */\r\n this.Active_bool = false;\r\n /** The flag whether the cascade connection is established */\r\n this.Connected_bool = false;\r\n /** The session status */\r\n this.SessionStatus_u32 = 0;\r\n /** The destination VPN server name */\r\n this.ServerName_str = \"\";\r\n /** The port number of the server */\r\n this.ServerPort_u32 = 0;\r\n /** Server product name */\r\n this.ServerProductName_str = \"\";\r\n /** Server product version */\r\n this.ServerProductVer_u32 = 0;\r\n /** Server product build number */\r\n this.ServerProductBuild_u32 = 0;\r\n /** Server's X.509 certificate */\r\n this.ServerX_bin = new Uint8Array([]);\r\n /** Client certificate */\r\n this.ClientX_bin = new Uint8Array([]);\r\n /** Connection start time */\r\n this.StartTime_dt = new Date();\r\n /** Connection completion time of the first connection */\r\n this.FirstConnectionEstablisiedTime_dt = new Date();\r\n /** Connection completion time of this connection */\r\n this.CurrentConnectionEstablishTime_dt = new Date();\r\n /** Number of connections have been established so far */\r\n this.NumConnectionsEatablished_u32 = 0;\r\n /** Half-connection */\r\n this.HalfConnection_bool = false;\r\n /** VoIP / QoS */\r\n this.QoS_bool = false;\r\n /** Maximum number of the underlying TCP connections */\r\n this.MaxTcpConnections_u32 = 0;\r\n /** Number of current underlying TCP connections */\r\n this.NumTcpConnections_u32 = 0;\r\n /** Number of underlying inbound TCP connections */\r\n this.NumTcpConnectionsUpload_u32 = 0;\r\n /** Number of underlying outbound TCP connections */\r\n this.NumTcpConnectionsDownload_u32 = 0;\r\n /** Use of encryption */\r\n this.UseEncrypt_bool = false;\r\n /** Cipher algorithm name */\r\n this.CipherName_str = \"\";\r\n /** Use of compression */\r\n this.UseCompress_bool = false;\r\n /** The flag whether this is a R-UDP session */\r\n this.IsRUDPSession_bool = false;\r\n /** Underlying physical communication protocol */\r\n this.UnderlayProtocol_str = \"\";\r\n /** The UDP acceleration is enabled */\r\n this.IsUdpAccelerationEnabled_bool = false;\r\n /** The UDP acceleration is being actually used */\r\n this.IsUsingUdpAcceleration_bool = false;\r\n /** Session name */\r\n this.SessionName_str = \"\";\r\n /** Connection name */\r\n this.ConnectionName_str = \"\";\r\n /** Session key */\r\n this.SessionKey_bin = new Uint8Array([]);\r\n /** Total transmitted data size */\r\n this.TotalSendSize_u64 = 0;\r\n /** Total received data size */\r\n this.TotalRecvSize_u64 = 0;\r\n /** Total transmitted data size (no compression) */\r\n this.TotalSendSizeReal_u64 = 0;\r\n /** Total received data size (no compression) */\r\n this.TotalRecvSizeReal_u64 = 0;\r\n /** The flag whether the VPN session is Bridge Mode */\r\n this.IsBridgeMode_bool = false;\r\n /** The flag whether the VPN session is Monitor mode */\r\n this.IsMonitorMode_bool = false;\r\n /** VLAN ID */\r\n this.VLanId_u32 = 0;\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcLinkStatus;\r\n}());\r\nexports.VpnRpcLinkStatus = VpnRpcLinkStatus;\r\n/** Setting of SSTP and OpenVPN */\r\nvar VpnOpenVpnSstpConfig = /** @class */ (function () {\r\n /** Constructor for the 'VpnOpenVpnSstpConfig' class: Setting of SSTP and OpenVPN */\r\n function VpnOpenVpnSstpConfig(init) {\r\n /** Specify true to enable the OpenVPN Clone Server Function. Specify false to disable. */\r\n this.EnableOpenVPN_bool = false;\r\n /** Specify UDP ports to listen for OpenVPN. Multiple UDP ports can be specified with splitting by space or comma letters, for example: \"1194, 2001, 2010, 2012\". The default port for OpenVPN is UDP 1194. You can specify any other UDP ports. */\r\n this.OpenVPNPortList_str = \"\";\r\n /** pecify true to enable the Microsoft SSTP VPN Clone Server Function. Specify false to disable. */\r\n this.EnableSSTP_bool = false;\r\n Object.assign(this, init);\r\n }\r\n return VpnOpenVpnSstpConfig;\r\n}());\r\nexports.VpnOpenVpnSstpConfig = VpnOpenVpnSstpConfig;\r\n/** Virtual host option */\r\nvar VpnVhOption = /** @class */ (function () {\r\n /** Constructor for the 'VpnVhOption' class: Virtual host option */\r\n function VpnVhOption(init) {\r\n /** Target Virtual HUB name */\r\n this.RpcHubName_str = \"\";\r\n /** MAC address */\r\n this.MacAddress_bin = new Uint8Array([]);\r\n /** IP address */\r\n this.Ip_ip = \"\";\r\n /** Subnet mask */\r\n this.Mask_ip = \"\";\r\n /** Use flag of the Virtual NAT function */\r\n this.UseNat_bool = false;\r\n /** MTU value (Standard: 1500) */\r\n this.Mtu_u32 = 0;\r\n /** NAT TCP timeout in seconds */\r\n this.NatTcpTimeout_u32 = 0;\r\n /** NAT UDP timeout in seconds */\r\n this.NatUdpTimeout_u32 = 0;\r\n /** Using flag of DHCP function */\r\n this.UseDhcp_bool = false;\r\n /** Specify the start point of the address band to be distributed to the client. (Example: 192.168.30.10) */\r\n this.DhcpLeaseIPStart_ip = \"\";\r\n /** Specify the end point of the address band to be distributed to the client. (Example: 192.168.30.200) */\r\n this.DhcpLeaseIPEnd_ip = \"\";\r\n /** Specify the subnet mask to be specified for the client. (Example: 255.255.255.0) */\r\n this.DhcpSubnetMask_ip = \"\";\r\n /** Specify the expiration date in second units for leasing an IP address to a client. */\r\n this.DhcpExpireTimeSpan_u32 = 0;\r\n /** Specify the IP address of the default gateway to be notified to the client. You can specify a SecureNAT Virtual Host IP address for this when the SecureNAT Function's Virtual NAT Function has been enabled and is being used also. If you specify 0 or none, then the client will not be notified of the default gateway. */\r\n this.DhcpGatewayAddress_ip = \"\";\r\n /** Specify the IP address of the primary DNS Server to be notified to the client. You can specify a SecureNAT Virtual Host IP address for this when the SecureNAT Function's Virtual NAT Function has been enabled and is being used also. If you specify empty, then the client will not be notified of the DNS Server address. */\r\n this.DhcpDnsServerAddress_ip = \"\";\r\n /** Specify the IP address of the secondary DNS Server to be notified to the client. You can specify a SecureNAT Virtual Host IP address for this when the SecureNAT Function's Virtual NAT Function has been enabled and is being used also. If you specify empty, then the client will not be notified of the DNS Server address. */\r\n this.DhcpDnsServerAddress2_ip = \"\";\r\n /** Specify the domain name to be notified to the client. If you specify none, then the client will not be notified of the domain name. */\r\n this.DhcpDomainName_str = \"\";\r\n /** Specify whether or not to save the Virtual DHCP Server operation in the Virtual Hub security log. Specify true to save it. This value is interlinked with the Virtual NAT Function log save setting. */\r\n this.SaveLog_bool = false;\r\n /** The flag to enable the DhcpPushRoutes_str field. */\r\n this.ApplyDhcpPushRoutes_bool = false;\r\n /** Specify the static routing table to push. Example: \"192.168.5.0/255.255.255.0/192.168.4.254, 10.0.0.0/255.0.0.0/192.168.4.253\" Split multiple entries (maximum: 64 entries) by comma or space characters. Each entry must be specified in the \"IP network address/subnet mask/gateway IP address\" format. This Virtual DHCP Server can push the classless static routes (RFC 3442) with DHCP reply messages to VPN clients. Whether or not a VPN client can recognize the classless static routes (RFC 3442) depends on the target VPN client software. SoftEther VPN Client and OpenVPN Client are supporting the classless static routes. On L2TP/IPsec and MS-SSTP protocols, the compatibility depends on the implementation of the client software. You can realize the split tunneling if you clear the default gateway field on the Virtual DHCP Server options. On the client side, L2TP/IPsec and MS-SSTP clients need to be configured not to set up the default gateway for the split tunneling usage. You can also push the classless static routes (RFC 3442) by your existing external DHCP server. In that case, disable the Virtual DHCP Server function on SecureNAT, and you need not to set up the classless routes on this API. See the RFC 3442 to understand the classless routes. */\r\n this.DhcpPushRoutes_str = \"\";\r\n Object.assign(this, init);\r\n }\r\n return VpnVhOption;\r\n}());\r\nexports.VpnVhOption = VpnVhOption;\r\n/** RPC_NAT_STATUS */\r\nvar VpnRpcNatStatus = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcNatStatus' class: RPC_NAT_STATUS */\r\n function VpnRpcNatStatus(init) {\r\n /** Virtual Hub Name */\r\n this.HubName_str = \"\";\r\n /** Number of TCP sessions */\r\n this.NumTcpSessions_u32 = 0;\r\n /** Ntmber of UDP sessions */\r\n this.NumUdpSessions_u32 = 0;\r\n /** Nymber of ICMP sessions */\r\n this.NumIcmpSessions_u32 = 0;\r\n /** Number of DNS sessions */\r\n this.NumDnsSessions_u32 = 0;\r\n /** Number of DHCP clients */\r\n this.NumDhcpClients_u32 = 0;\r\n /** Whether the NAT is operating in the Kernel Mode */\r\n this.IsKernelMode_bool = false;\r\n /** Whether the NAT is operating in the Raw IP Mode */\r\n this.IsRawIpMode_bool = false;\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcNatStatus;\r\n}());\r\nexports.VpnRpcNatStatus = VpnRpcNatStatus;\r\n/** Key pair */\r\nvar VpnRpcKeyPair = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcKeyPair' class: Key pair */\r\n function VpnRpcKeyPair(init) {\r\n /** The body of the certificate */\r\n this.Cert_bin = new Uint8Array([]);\r\n /** The body of the private key */\r\n this.Key_bin = new Uint8Array([]);\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcKeyPair;\r\n}());\r\nexports.VpnRpcKeyPair = VpnRpcKeyPair;\r\n/** Single string value */\r\nvar VpnRpcStr = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcStr' class: Single string value */\r\n function VpnRpcStr(init) {\r\n /** A string value */\r\n this.String_str = \"\";\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcStr;\r\n}());\r\nexports.VpnRpcStr = VpnRpcStr;\r\n/** Type of VPN Server */\r\nvar VpnRpcServerType;\r\n(function (VpnRpcServerType) {\r\n /** Stand-alone server */\r\n VpnRpcServerType[VpnRpcServerType[\"Standalone\"] = 0] = \"Standalone\";\r\n /** Farm controller server */\r\n VpnRpcServerType[VpnRpcServerType[\"FarmController\"] = 1] = \"FarmController\";\r\n /** Farm member server */\r\n VpnRpcServerType[VpnRpcServerType[\"FarmMember\"] = 2] = \"FarmMember\";\r\n})(VpnRpcServerType = exports.VpnRpcServerType || (exports.VpnRpcServerType = {}));\r\n/** Operating system type */\r\nvar VpnRpcOsType;\r\n(function (VpnRpcOsType) {\r\n /** Windows 95 */\r\n VpnRpcOsType[VpnRpcOsType[\"WINDOWS_95\"] = 1100] = \"WINDOWS_95\";\r\n /** Windows 98 */\r\n VpnRpcOsType[VpnRpcOsType[\"WINDOWS_98\"] = 1200] = \"WINDOWS_98\";\r\n /** Windows Me */\r\n VpnRpcOsType[VpnRpcOsType[\"WINDOWS_ME\"] = 1300] = \"WINDOWS_ME\";\r\n /** Windows (unknown) */\r\n VpnRpcOsType[VpnRpcOsType[\"WINDOWS_UNKNOWN\"] = 1400] = \"WINDOWS_UNKNOWN\";\r\n /** Windows NT 4.0 Workstation */\r\n VpnRpcOsType[VpnRpcOsType[\"WINDOWS_NT_4_WORKSTATION\"] = 2100] = \"WINDOWS_NT_4_WORKSTATION\";\r\n /** Windows NT 4.0 Server */\r\n VpnRpcOsType[VpnRpcOsType[\"WINDOWS_NT_4_SERVER\"] = 2110] = \"WINDOWS_NT_4_SERVER\";\r\n /** Windows NT 4.0 Server, Enterprise Edition */\r\n VpnRpcOsType[VpnRpcOsType[\"WINDOWS_NT_4_SERVER_ENTERPRISE\"] = 2111] = \"WINDOWS_NT_4_SERVER_ENTERPRISE\";\r\n /** Windows NT 4.0 Terminal Server */\r\n VpnRpcOsType[VpnRpcOsType[\"WINDOWS_NT_4_TERMINAL_SERVER\"] = 2112] = \"WINDOWS_NT_4_TERMINAL_SERVER\";\r\n /** BackOffice Server 4.5 */\r\n VpnRpcOsType[VpnRpcOsType[\"WINDOWS_NT_4_BACKOFFICE\"] = 2113] = \"WINDOWS_NT_4_BACKOFFICE\";\r\n /** Small Business Server 4.5 */\r\n VpnRpcOsType[VpnRpcOsType[\"WINDOWS_NT_4_SMS\"] = 2114] = \"WINDOWS_NT_4_SMS\";\r\n /** Windows 2000 Professional */\r\n VpnRpcOsType[VpnRpcOsType[\"WINDOWS_2000_PROFESSIONAL\"] = 2200] = \"WINDOWS_2000_PROFESSIONAL\";\r\n /** Windows 2000 Server */\r\n VpnRpcOsType[VpnRpcOsType[\"WINDOWS_2000_SERVER\"] = 2211] = \"WINDOWS_2000_SERVER\";\r\n /** Windows 2000 Advanced Server */\r\n VpnRpcOsType[VpnRpcOsType[\"WINDOWS_2000_ADVANCED_SERVER\"] = 2212] = \"WINDOWS_2000_ADVANCED_SERVER\";\r\n /** Windows 2000 Datacenter Server */\r\n VpnRpcOsType[VpnRpcOsType[\"WINDOWS_2000_DATACENTER_SERVER\"] = 2213] = \"WINDOWS_2000_DATACENTER_SERVER\";\r\n /** BackOffice Server 2000 */\r\n VpnRpcOsType[VpnRpcOsType[\"WINDOWS_2000_BACKOFFICE\"] = 2214] = \"WINDOWS_2000_BACKOFFICE\";\r\n /** Small Business Server 2000 */\r\n VpnRpcOsType[VpnRpcOsType[\"WINDOWS_2000_SBS\"] = 2215] = \"WINDOWS_2000_SBS\";\r\n /** Windows XP Home Edition */\r\n VpnRpcOsType[VpnRpcOsType[\"WINDOWS_XP_HOME\"] = 2300] = \"WINDOWS_XP_HOME\";\r\n /** Windows XP Professional */\r\n VpnRpcOsType[VpnRpcOsType[\"WINDOWS_XP_PROFESSIONAL\"] = 2301] = \"WINDOWS_XP_PROFESSIONAL\";\r\n /** Windows Server 2003 Web Edition */\r\n VpnRpcOsType[VpnRpcOsType[\"WINDOWS_2003_WEB\"] = 2410] = \"WINDOWS_2003_WEB\";\r\n /** Windows Server 2003 Standard Edition */\r\n VpnRpcOsType[VpnRpcOsType[\"WINDOWS_2003_STANDARD\"] = 2411] = \"WINDOWS_2003_STANDARD\";\r\n /** Windows Server 2003 Enterprise Edition */\r\n VpnRpcOsType[VpnRpcOsType[\"WINDOWS_2003_ENTERPRISE\"] = 2412] = \"WINDOWS_2003_ENTERPRISE\";\r\n /** Windows Server 2003 DataCenter Edition */\r\n VpnRpcOsType[VpnRpcOsType[\"WINDOWS_2003_DATACENTER\"] = 2413] = \"WINDOWS_2003_DATACENTER\";\r\n /** BackOffice Server 2003 */\r\n VpnRpcOsType[VpnRpcOsType[\"WINDOWS_2003_BACKOFFICE\"] = 2414] = \"WINDOWS_2003_BACKOFFICE\";\r\n /** Small Business Server 2003 */\r\n VpnRpcOsType[VpnRpcOsType[\"WINDOWS_2003_SBS\"] = 2415] = \"WINDOWS_2003_SBS\";\r\n /** Windows Vista */\r\n VpnRpcOsType[VpnRpcOsType[\"WINDOWS_LONGHORN_PROFESSIONAL\"] = 2500] = \"WINDOWS_LONGHORN_PROFESSIONAL\";\r\n /** Windows Server 2008 */\r\n VpnRpcOsType[VpnRpcOsType[\"WINDOWS_LONGHORN_SERVER\"] = 2510] = \"WINDOWS_LONGHORN_SERVER\";\r\n /** Windows 7 */\r\n VpnRpcOsType[VpnRpcOsType[\"WINDOWS_7\"] = 2600] = \"WINDOWS_7\";\r\n /** Windows Server 2008 R2 */\r\n VpnRpcOsType[VpnRpcOsType[\"WINDOWS_SERVER_2008_R2\"] = 2610] = \"WINDOWS_SERVER_2008_R2\";\r\n /** Windows 8 */\r\n VpnRpcOsType[VpnRpcOsType[\"WINDOWS_8\"] = 2700] = \"WINDOWS_8\";\r\n /** Windows Server 2012 */\r\n VpnRpcOsType[VpnRpcOsType[\"WINDOWS_SERVER_8\"] = 2710] = \"WINDOWS_SERVER_8\";\r\n /** Windows 8.1 */\r\n VpnRpcOsType[VpnRpcOsType[\"WINDOWS_81\"] = 2701] = \"WINDOWS_81\";\r\n /** Windows Server 2012 R2 */\r\n VpnRpcOsType[VpnRpcOsType[\"WINDOWS_SERVER_81\"] = 2711] = \"WINDOWS_SERVER_81\";\r\n /** Windows 10 */\r\n VpnRpcOsType[VpnRpcOsType[\"WINDOWS_10\"] = 2702] = \"WINDOWS_10\";\r\n /** Windows Server 10 */\r\n VpnRpcOsType[VpnRpcOsType[\"WINDOWS_SERVER_10\"] = 2712] = \"WINDOWS_SERVER_10\";\r\n /** Windows 11 or later */\r\n VpnRpcOsType[VpnRpcOsType[\"WINDOWS_11\"] = 2800] = \"WINDOWS_11\";\r\n /** Windows Server 11 or later */\r\n VpnRpcOsType[VpnRpcOsType[\"WINDOWS_SERVER_11\"] = 2810] = \"WINDOWS_SERVER_11\";\r\n /** Unknown UNIX */\r\n VpnRpcOsType[VpnRpcOsType[\"UNIX_UNKNOWN\"] = 3000] = \"UNIX_UNKNOWN\";\r\n /** Linux */\r\n VpnRpcOsType[VpnRpcOsType[\"LINUX\"] = 3100] = \"LINUX\";\r\n /** Solaris */\r\n VpnRpcOsType[VpnRpcOsType[\"SOLARIS\"] = 3200] = \"SOLARIS\";\r\n /** Cygwin */\r\n VpnRpcOsType[VpnRpcOsType[\"CYGWIN\"] = 3300] = \"CYGWIN\";\r\n /** BSD */\r\n VpnRpcOsType[VpnRpcOsType[\"BSD\"] = 3400] = \"BSD\";\r\n /** MacOS X */\r\n VpnRpcOsType[VpnRpcOsType[\"MACOS_X\"] = 3500] = \"MACOS_X\";\r\n})(VpnRpcOsType = exports.VpnRpcOsType || (exports.VpnRpcOsType = {}));\r\n/** VPN Server Information */\r\nvar VpnRpcServerInfo = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcServerInfo' class: VPN Server Information */\r\n function VpnRpcServerInfo(init) {\r\n /** Server product name */\r\n this.ServerProductName_str = \"\";\r\n /** Server version string */\r\n this.ServerVersionString_str = \"\";\r\n /** Server build information string */\r\n this.ServerBuildInfoString_str = \"\";\r\n /** Server version integer value */\r\n this.ServerVerInt_u32 = 0;\r\n /** Server build number integer value */\r\n this.ServerBuildInt_u32 = 0;\r\n /** Server host name */\r\n this.ServerHostName_str = \"\";\r\n /** Type of server */\r\n this.ServerType_u32 = 0;\r\n /** Build date and time of the server */\r\n this.ServerBuildDate_dt = new Date();\r\n /** Family name */\r\n this.ServerFamilyName_str = \"\";\r\n /** OS type */\r\n this.OsType_u32 = 0;\r\n /** Service pack number */\r\n this.OsServicePack_u32 = 0;\r\n /** OS system name */\r\n this.OsSystemName_str = \"\";\r\n /** OS product name */\r\n this.OsProductName_str = \"\";\r\n /** OS vendor name */\r\n this.OsVendorName_str = \"\";\r\n /** OS version */\r\n this.OsVersion_str = \"\";\r\n /** Kernel name */\r\n this.KernelName_str = \"\";\r\n /** Kernel version */\r\n this.KernelVersion_str = \"\";\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcServerInfo;\r\n}());\r\nexports.VpnRpcServerInfo = VpnRpcServerInfo;\r\n/** Server status */\r\nvar VpnRpcServerStatus = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcServerStatus' class: Server status */\r\n function VpnRpcServerStatus(init) {\r\n /** Type of server */\r\n this.ServerType_u32 = 0;\r\n /** Total number of TCP connections */\r\n this.NumTcpConnections_u32 = 0;\r\n /** Number of Local TCP connections */\r\n this.NumTcpConnectionsLocal_u32 = 0;\r\n /** Number of remote TCP connections */\r\n this.NumTcpConnectionsRemote_u32 = 0;\r\n /** Total number of HUBs */\r\n this.NumHubTotal_u32 = 0;\r\n /** Nymber of stand-alone HUB */\r\n this.NumHubStandalone_u32 = 0;\r\n /** Number of static HUBs */\r\n this.NumHubStatic_u32 = 0;\r\n /** Number of Dynamic HUBs */\r\n this.NumHubDynamic_u32 = 0;\r\n /** Total number of sessions */\r\n this.NumSessionsTotal_u32 = 0;\r\n /** Number of local VPN sessions */\r\n this.NumSessionsLocal_u32 = 0;\r\n /** The number of remote sessions */\r\n this.NumSessionsRemote_u32 = 0;\r\n /** Number of MAC table entries (total sum of all Virtual Hubs) */\r\n this.NumMacTables_u32 = 0;\r\n /** Number of IP table entries (total sum of all Virtual Hubs) */\r\n this.NumIpTables_u32 = 0;\r\n /** Number of users (total sum of all Virtual Hubs) */\r\n this.NumUsers_u32 = 0;\r\n /** Number of groups (total sum of all Virtual Hubs) */\r\n this.NumGroups_u32 = 0;\r\n /** Number of assigned bridge licenses (Useful to make a commercial version) */\r\n this.AssignedBridgeLicenses_u32 = 0;\r\n /** Number of assigned client licenses (Useful to make a commercial version) */\r\n this.AssignedClientLicenses_u32 = 0;\r\n /** Number of Assigned bridge license (cluster-wide), useful to make a commercial version */\r\n this.AssignedBridgeLicensesTotal_u32 = 0;\r\n /** Number of assigned client licenses (cluster-wide), useful to make a commercial version */\r\n this.AssignedClientLicensesTotal_u32 = 0;\r\n /** Number of broadcast packets (Recv) */\r\n this[\"Recv.BroadcastBytes_u64\"] = 0;\r\n /** Broadcast bytes (Recv) */\r\n this[\"Recv.BroadcastCount_u64\"] = 0;\r\n /** Unicast count (Recv) */\r\n this[\"Recv.UnicastBytes_u64\"] = 0;\r\n /** Unicast bytes (Recv) */\r\n this[\"Recv.UnicastCount_u64\"] = 0;\r\n /** Number of broadcast packets (Send) */\r\n this[\"Send.BroadcastBytes_u64\"] = 0;\r\n /** Broadcast bytes (Send) */\r\n this[\"Send.BroadcastCount_u64\"] = 0;\r\n /** Unicast bytes (Send) */\r\n this[\"Send.UnicastBytes_u64\"] = 0;\r\n /** Unicast bytes (Send) */\r\n this[\"Send.UnicastCount_u64\"] = 0;\r\n /** Current time */\r\n this.CurrentTime_dt = new Date();\r\n /** 64 bit High-Precision Logical System Clock */\r\n this.CurrentTick_u64 = 0;\r\n /** VPN Server Start-up time */\r\n this.StartTime_dt = new Date();\r\n /** Memory information: Total Memory */\r\n this.TotalMemory_u64 = 0;\r\n /** Memory information: Used Memory */\r\n this.UsedMemory_u64 = 0;\r\n /** Memory information: Free Memory */\r\n this.FreeMemory_u64 = 0;\r\n /** Memory information: Total Phys */\r\n this.TotalPhys_u64 = 0;\r\n /** Memory information: Used Phys */\r\n this.UsedPhys_u64 = 0;\r\n /** Memory information: Free Phys */\r\n this.FreePhys_u64 = 0;\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcServerStatus;\r\n}());\r\nexports.VpnRpcServerStatus = VpnRpcServerStatus;\r\n/** VPN Session status */\r\nvar VpnRpcSessionStatus = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcSessionStatus' class: VPN Session status */\r\n function VpnRpcSessionStatus(init) {\r\n /** The Virtual Hub name */\r\n this.HubName_str = \"\";\r\n /** VPN session name */\r\n this.Name_str = \"\";\r\n /** User name */\r\n this.Username_str = \"\";\r\n /** Real user name which was used for the authentication */\r\n this.RealUsername_str = \"\";\r\n /** Group name */\r\n this.GroupName_str = \"\";\r\n /** Is Cascade Session */\r\n this.LinkMode_bool = false;\r\n /** Client IP address */\r\n this.Client_Ip_Address_ip = \"\";\r\n /** Client host name */\r\n this.SessionStatus_ClientHostName_str = \"\";\r\n /** Operation flag */\r\n this.Active_bool = false;\r\n /** Connected flag */\r\n this.Connected_bool = false;\r\n /** State of the client session */\r\n this.SessionStatus_u32 = 0;\r\n /** Server name */\r\n this.ServerName_str = \"\";\r\n /** Port number of the server */\r\n this.ServerPort_u32 = 0;\r\n /** Server product name */\r\n this.ServerProductName_str = \"\";\r\n /** Server product version */\r\n this.ServerProductVer_u32 = 0;\r\n /** Server product build number */\r\n this.ServerProductBuild_u32 = 0;\r\n /** Connection start time */\r\n this.StartTime_dt = new Date();\r\n /** Connection completion time of the first connection */\r\n this.FirstConnectionEstablisiedTime_dt = new Date();\r\n /** Connection completion time of this connection */\r\n this.CurrentConnectionEstablishTime_dt = new Date();\r\n /** Number of connections have been established so far */\r\n this.NumConnectionsEatablished_u32 = 0;\r\n /** Half-connection */\r\n this.HalfConnection_bool = false;\r\n /** VoIP / QoS */\r\n this.QoS_bool = false;\r\n /** Maximum number of the underlying TCP connections */\r\n this.MaxTcpConnections_u32 = 0;\r\n /** Number of current underlying TCP connections */\r\n this.NumTcpConnections_u32 = 0;\r\n /** Number of inbound underlying connections */\r\n this.NumTcpConnectionsUpload_u32 = 0;\r\n /** Number of outbound underlying connections */\r\n this.NumTcpConnectionsDownload_u32 = 0;\r\n /** Use of encryption */\r\n this.UseEncrypt_bool = false;\r\n /** Cipher algorithm name */\r\n this.CipherName_str = \"\";\r\n /** Use of compression */\r\n this.UseCompress_bool = false;\r\n /** Is R-UDP session */\r\n this.IsRUDPSession_bool = false;\r\n /** Physical underlying communication protocol */\r\n this.UnderlayProtocol_str = \"\";\r\n /** The UDP acceleration is enabled */\r\n this.IsUdpAccelerationEnabled_bool = false;\r\n /** Using the UDP acceleration function */\r\n this.IsUsingUdpAcceleration_bool = false;\r\n /** VPN session name */\r\n this.SessionName_str = \"\";\r\n /** Connection name */\r\n this.ConnectionName_str = \"\";\r\n /** Session key */\r\n this.SessionKey_bin = new Uint8Array([]);\r\n /** Total transmitted data size */\r\n this.TotalSendSize_u64 = 0;\r\n /** Total received data size */\r\n this.TotalRecvSize_u64 = 0;\r\n /** Total transmitted data size (no compression) */\r\n this.TotalSendSizeReal_u64 = 0;\r\n /** Total received data size (no compression) */\r\n this.TotalRecvSizeReal_u64 = 0;\r\n /** Is Bridge Mode */\r\n this.IsBridgeMode_bool = false;\r\n /** Is Monitor mode */\r\n this.IsMonitorMode_bool = false;\r\n /** VLAN ID */\r\n this.VLanId_u32 = 0;\r\n /** Client product name */\r\n this.ClientProductName_str = \"\";\r\n /** Client version */\r\n this.ClientProductVer_u32 = 0;\r\n /** Client build number */\r\n this.ClientProductBuild_u32 = 0;\r\n /** Client OS name */\r\n this.ClientOsName_str = \"\";\r\n /** Client OS version */\r\n this.ClientOsVer_str = \"\";\r\n /** Client OS Product ID */\r\n this.ClientOsProductId_str = \"\";\r\n /** Client host name */\r\n this.ClientHostname_str = \"\";\r\n /** Unique ID */\r\n this.UniqueId_bin = new Uint8Array([]);\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcSessionStatus;\r\n}());\r\nexports.VpnRpcSessionStatus = VpnRpcSessionStatus;\r\n/** Set the special listener */\r\nvar VpnRpcSpecialListener = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcSpecialListener' class: Set the special listener */\r\n function VpnRpcSpecialListener(init) {\r\n /** The flag to activate the VPN over ICMP server function */\r\n this.VpnOverIcmpListener_bool = false;\r\n /** The flag to activate the VPN over DNS function */\r\n this.VpnOverDnsListener_bool = false;\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcSpecialListener;\r\n}());\r\nexports.VpnRpcSpecialListener = VpnRpcSpecialListener;\r\n/** Syslog configuration */\r\nvar VpnSyslogSaveType;\r\n(function (VpnSyslogSaveType) {\r\n /** Do not use syslog */\r\n VpnSyslogSaveType[VpnSyslogSaveType[\"None\"] = 0] = \"None\";\r\n /** Only server log */\r\n VpnSyslogSaveType[VpnSyslogSaveType[\"ServerLog\"] = 1] = \"ServerLog\";\r\n /** Server and Virtual HUB security log */\r\n VpnSyslogSaveType[VpnSyslogSaveType[\"ServerAndHubSecurityLog\"] = 2] = \"ServerAndHubSecurityLog\";\r\n /** Server, Virtual HUB security, and packet log */\r\n VpnSyslogSaveType[VpnSyslogSaveType[\"ServerAndHubAllLog\"] = 3] = \"ServerAndHubAllLog\";\r\n})(VpnSyslogSaveType = exports.VpnSyslogSaveType || (exports.VpnSyslogSaveType = {}));\r\n/** Syslog configuration */\r\nvar VpnSyslogSetting = /** @class */ (function () {\r\n /** Constructor for the 'VpnSyslogSetting' class: Syslog configuration */\r\n function VpnSyslogSetting(init) {\r\n /** The behavior of the syslog function */\r\n this.SaveType_u32 = 0;\r\n /** Specify the host name or IP address of the syslog server */\r\n this.Hostname_str = \"\";\r\n /** Specify the port number of the syslog server */\r\n this.Port_u32 = 0;\r\n Object.assign(this, init);\r\n }\r\n return VpnSyslogSetting;\r\n}());\r\nexports.VpnSyslogSetting = VpnSyslogSetting;\r\n/** VPN Gate Server Config */\r\nvar VpnVgsConfig = /** @class */ (function () {\r\n /** Constructor for the 'VpnVgsConfig' class: VPN Gate Server Config */\r\n function VpnVgsConfig(init) {\r\n /** Active flag */\r\n this.IsEnabled_bool = false;\r\n /** Message */\r\n this.Message_utf = \"\";\r\n /** Owner name */\r\n this.Owner_utf = \"\";\r\n /** Abuse email */\r\n this.Abuse_utf = \"\";\r\n /** Log save flag */\r\n this.NoLog_bool = false;\r\n /** Save log permanently */\r\n this.LogPermanent_bool = false;\r\n /** Enable the L2TP VPN function */\r\n this.EnableL2TP_bool = false;\r\n Object.assign(this, init);\r\n }\r\n return VpnVgsConfig;\r\n}());\r\nexports.VpnVgsConfig = VpnVgsConfig;\r\n/** Read a Log file */\r\nvar VpnRpcReadLogFile = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcReadLogFile' class: Read a Log file */\r\n function VpnRpcReadLogFile(init) {\r\n /** Server name */\r\n this.ServerName_str = \"\";\r\n /** File Path */\r\n this.FilePath_str = \"\";\r\n /** Offset to download. You have to call the ReadLogFile API multiple times to download the entire log file with requesting a part of the file by specifying the Offset_u32 field. */\r\n this.Offset_u32 = 0;\r\n /** Received buffer */\r\n this.Buffer_bin = new Uint8Array([]);\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcReadLogFile;\r\n}());\r\nexports.VpnRpcReadLogFile = VpnRpcReadLogFile;\r\n/** Rename link */\r\nvar VpnRpcRenameLink = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcRenameLink' class: Rename link */\r\n function VpnRpcRenameLink(init) {\r\n /** The Virtual Hub name */\r\n this.HubName_str = \"\";\r\n /** The old name of the cascade connection */\r\n this.OldAccountName_utf = \"\";\r\n /** The new name of the cascade connection */\r\n this.NewAccountName_utf = \"\";\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcRenameLink;\r\n}());\r\nexports.VpnRpcRenameLink = VpnRpcRenameLink;\r\n/** Online or offline the HUB */\r\nvar VpnRpcSetHubOnline = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcSetHubOnline' class: Online or offline the HUB */\r\n function VpnRpcSetHubOnline(init) {\r\n /** The Virtual Hub name */\r\n this.HubName_str = \"\";\r\n /** Online / offline flag */\r\n this.Online_bool = false;\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcSetHubOnline;\r\n}());\r\nexports.VpnRpcSetHubOnline = VpnRpcSetHubOnline;\r\n/** Set Password */\r\nvar VpnRpcSetPassword = /** @class */ (function () {\r\n /** Constructor for the 'VpnRpcSetPassword' class: Set Password */\r\n function VpnRpcSetPassword(init) {\r\n /** The plaintext password */\r\n this.PlainTextPassword_str = \"\";\r\n Object.assign(this, init);\r\n }\r\n return VpnRpcSetPassword;\r\n}());\r\nexports.VpnRpcSetPassword = VpnRpcSetPassword;\r\n// --- Utility codes ---\r\n/** JSON-RPC request class. See https://www.jsonrpc.org/specification */\r\nvar JsonRpcRequest = /** @class */ (function () {\r\n function JsonRpcRequest(method, param, id) {\r\n if (method === void 0) { method = \"\"; }\r\n if (param === void 0) { param = null; }\r\n if (id === void 0) { id = \"\"; }\r\n this.jsonrpc = \"2.0\";\r\n this.method = method;\r\n this.params = param;\r\n this.id = id;\r\n }\r\n return JsonRpcRequest;\r\n}());\r\nexports.JsonRpcRequest = JsonRpcRequest;\r\n/** JSON-RPC error class. See https://www.jsonrpc.org/specification */\r\nvar JsonRpcError = /** @class */ (function () {\r\n function JsonRpcError(code, message, data) {\r\n if (code === void 0) { code = 0; }\r\n if (message === void 0) { message = \"\"; }\r\n if (data === void 0) { data = null; }\r\n this.code = code;\r\n this.message = message;\r\n this.data = data;\r\n }\r\n return JsonRpcError;\r\n}());\r\nexports.JsonRpcError = JsonRpcError;\r\n/** JSON-RPC response class with generics */\r\nvar JsonRpcResponse = /** @class */ (function () {\r\n function JsonRpcResponse() {\r\n this.jsonrpc = \"2.0\";\r\n this.result = null;\r\n this.error = null;\r\n this.id = \"\";\r\n }\r\n return JsonRpcResponse;\r\n}());\r\nexports.JsonRpcResponse = JsonRpcResponse;\r\n/** JSON-RPC client class. See https://www.jsonrpc.org/specification */\r\nvar JsonRpcClient = /** @class */ (function () {\r\n /**\r\n * JSON-RPC client class constructor\r\n * @param url The URL\r\n * @param headers Additional HTTP headers\r\n * @param send_credential Set true to use the same credential with the browsing web site. Valid only if the code is running on the web browser.\r\n */\r\n function JsonRpcClient(url, headers, send_credential, nodejs_https_client_reject_untrusted_server_cert) {\r\n this.BaseUrl = url;\r\n this.headers = headers;\r\n this.client = new HttpClient();\r\n this.client.SendCredential = send_credential;\r\n this.client.NodeJS_HTTPS_Client_Reject_Unauthorized = nodejs_https_client_reject_untrusted_server_cert;\r\n }\r\n /** A utility function to convert any object to JSON string */\r\n JsonRpcClient.ObjectToJson = function (obj) {\r\n return JSON.stringify(obj, function (key, value) {\r\n if (key.endsWith(\"_bin\")) {\r\n return Util_Base64_Encode(value);\r\n }\r\n return value;\r\n }, 4);\r\n };\r\n /** A utility function to convert JSON string to object */\r\n JsonRpcClient.JsonToObject = function (str) {\r\n return JSON.parse(str, function (key, value) {\r\n if (key.endsWith(\"_bin\")) {\r\n return Util_Base64_Decode(value);\r\n }\r\n else if (key.endsWith(\"_dt\")) {\r\n return new Date(value);\r\n }\r\n return value;\r\n });\r\n };\r\n /**\r\n * Call a single RPC call (without error check). You can wait for the response with Promise or await statement.\r\n * @param method_name The name of RPC method\r\n * @param param The parameters\r\n */\r\n JsonRpcClient.prototype.CallInternalAsync = function (method_name, param) {\r\n return __awaiter(this, void 0, void 0, function () {\r\n var id, req, req_string, http_response, ret_string;\r\n return __generator(this, function (_a) {\r\n switch (_a.label) {\r\n case 0:\r\n id = \"1\";\r\n req = new JsonRpcRequest(method_name, param, id);\r\n req_string = JsonRpcClient.ObjectToJson(req);\r\n if (debug_mode) {\r\n console.log(\"--- RPC Request Body ---\");\r\n console.log(req_string);\r\n console.log(\"------------------------\");\r\n }\r\n return [4 /*yield*/, this.client.PostAsync(this.BaseUrl, this.headers, req_string, \"application/json\")];\r\n case 1:\r\n http_response = _a.sent();\r\n ret_string = http_response.Body;\r\n if (debug_mode) {\r\n console.log(\"--- RPC Response Body ---\");\r\n console.log(ret_string);\r\n console.log(\"-------------------------\");\r\n }\r\n return [2 /*return*/, ret_string];\r\n }\r\n });\r\n });\r\n };\r\n /**\r\n * Call a single RPC call (with error check). You can wait for the response with Promise or await statement. In the case of error, it will be thrown.\r\n * @param method_name The name of RPC method\r\n * @param param The parameters\r\n */\r\n JsonRpcClient.prototype.CallAsync = function (method_name, param) {\r\n return __awaiter(this, void 0, void 0, function () {\r\n var ret_string, ret;\r\n return __generator(this, function (_a) {\r\n switch (_a.label) {\r\n case 0: return [4 /*yield*/, this.CallInternalAsync(method_name, param)];\r\n case 1:\r\n ret_string = _a.sent();\r\n ret = JSON.parse(ret_string);\r\n if (is_null(ret.error) === false) {\r\n throw new JsonRpcException(ret.error);\r\n }\r\n return [2 /*return*/, ret.result];\r\n }\r\n });\r\n });\r\n };\r\n return JsonRpcClient;\r\n}());\r\nexports.JsonRpcClient = JsonRpcClient;\r\n/** JSON-RPC exception class */\r\nvar JsonRpcException = /** @class */ (function (_super) {\r\n __extends(JsonRpcException, _super);\r\n function JsonRpcException(error) {\r\n var _this = _super.call(this, \"Code=\" + error.code + \", Message=\" + error.message) || this;\r\n _this.Error = error;\r\n return _this;\r\n }\r\n return JsonRpcException;\r\n}(Error));\r\nexports.JsonRpcException = JsonRpcException;\r\n/** HTTP client exception class */\r\nvar HttpClientException = /** @class */ (function (_super) {\r\n __extends(HttpClientException, _super);\r\n function HttpClientException(message) {\r\n return _super.call(this, message) || this;\r\n }\r\n return HttpClientException;\r\n}(Error));\r\nexports.HttpClientException = HttpClientException;\r\n/** HTTP client response class */\r\nvar HttpClientResponse = /** @class */ (function () {\r\n function HttpClientResponse() {\r\n this.Body = \"\";\r\n }\r\n return HttpClientResponse;\r\n}());\r\nexports.HttpClientResponse = HttpClientResponse;\r\n/** An HTTP client which can be used in both web browsers and Node.js */\r\nvar HttpClient = /** @class */ (function () {\r\n function HttpClient() {\r\n this.TimeoutMsecs = 60 * 5 * 1000;\r\n this.SendCredential = true;\r\n this.NodeJS_HTTPS_Client_Reject_Unauthorized = false;\r\n }\r\n /** Post method. In web browsers this function will process the request by itself. In Node.js this function will call PostAsync_NodeJS() instead. */\r\n HttpClient.prototype.PostAsync = function (url, headers, req_body, req_media_type) {\r\n return __awaiter(this, void 0, void 0, function () {\r\n var fetch_header_list, _i, _a, name_1, fetch_init, fetch_response, ret, _b;\r\n return __generator(this, function (_c) {\r\n switch (_c.label) {\r\n case 0:\r\n if (is_node_js) {\r\n return [2 /*return*/, this.PostAsync_NodeJS(url, headers, req_body, req_media_type)];\r\n }\r\n fetch_header_list = new Headers();\r\n for (_i = 0, _a = Object.keys(headers); _i < _a.length; _i++) {\r\n name_1 = _a[_i];\r\n fetch_header_list.append(name_1, headers[name_1]);\r\n }\r\n fetch_init = {\r\n mode: \"cors\",\r\n headers: fetch_header_list,\r\n credentials: (this.SendCredential ? \"include\" : \"omit\"),\r\n method: \"POST\",\r\n cache: \"no-cache\",\r\n keepalive: true,\r\n redirect: \"follow\",\r\n body: req_body\r\n };\r\n return [4 /*yield*/, fetch(url, fetch_init)];\r\n case 1:\r\n fetch_response = _c.sent();\r\n if (fetch_response.ok === false) {\r\n throw new HttpClientException(\"HTTP Error: \" + fetch_response.status + \" \" + fetch_response.statusText);\r\n }\r\n ret = new HttpClientResponse();\r\n _b = ret;\r\n return [4 /*yield*/, fetch_response.text()];\r\n case 2:\r\n _b.Body = _c.sent();\r\n return [2 /*return*/, ret];\r\n }\r\n });\r\n });\r\n };\r\n /** Post method for Node.js. */\r\n HttpClient.prototype.PostAsync_NodeJS = function (url, headers, req_body, req_media_type) {\r\n var https = __webpack_require__(/*! https */ \"./node_modules/https-browserify/index.js\");\r\n var keepAliveAgent = new https.Agent({ keepAlive: true });\r\n var urlparse = __webpack_require__(/*! url */ \"./node_modules/url/url.js\");\r\n var urlobj = urlparse.parse(url);\r\n if (is_null(urlobj.host))\r\n throw new Error(\"URL is invalid.\");\r\n var options = {\r\n host: urlobj.hostname,\r\n port: urlobj.port,\r\n path: urlobj.path,\r\n rejectUnauthorized: this.NodeJS_HTTPS_Client_Reject_Unauthorized,\r\n method: \"POST\",\r\n timeout: this.TimeoutMsecs,\r\n agent: keepAliveAgent\r\n };\r\n return new Promise(function (resolve, reject) {\r\n var req = https.request(options, function (res) {\r\n if (res.statusCode !== 200) {\r\n reject(new HttpClientException(\"HTTP Error: \" + res.statusCode + \" \" + res.statusMessage));\r\n }\r\n var recv_str = \"\";\r\n res.on(\"data\", function (body) {\r\n recv_str += body;\r\n });\r\n res.on(\"end\", function () {\r\n var ret = new HttpClientResponse();\r\n ret.Body = recv_str;\r\n resolve(ret);\r\n });\r\n }).on(\"error\", function (err) {\r\n throw err;\r\n });\r\n for (var _i = 0, _a = Object.keys(headers); _i < _a.length; _i++) {\r\n var name_2 = _a[_i];\r\n req.setHeader(name_2, !is_null(headers[name_2]) ? headers[name_2] : \"\");\r\n }\r\n req.setHeader(\"Content-Type\", req_media_type);\r\n req.setHeader(\"Content-Length\", Buffer.byteLength(req_body));\r\n req.write(req_body);\r\n req.end();\r\n });\r\n };\r\n return HttpClient;\r\n}());\r\nexports.HttpClient = HttpClient;\r\n//////// BEGIN: Base64 encode / decode utility functions from https://github.com/beatgammit/base64-js\r\n// The MIT License(MIT)\r\n// Copyright(c) 2014\r\n// Permission is hereby granted, free of charge, to any person obtaining a copy\r\n// of this software and associated documentation files(the \"Software\"), to deal\r\n// in the Software without restriction, including without limitation the rights\r\n// to use, copy, modify, merge, publish, distribute, sublicense, and / or sell\r\n// copies of the Software, and to permit persons to whom the Software is\r\n// furnished to do so, subject to the following conditions:\r\n// The above copyright notice and this permission notice shall be included in\r\n// all copies or substantial portions of the Software.\r\n// THE SOFTWARE IS PROVIDED \"AS IS\", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR\r\n// IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,\r\n// FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.IN NO EVENT SHALL THE\r\n// AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER\r\n// LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,\r\n// OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN\r\n// THE SOFTWARE.\r\nvar lookup = [];\r\nvar revLookup = [];\r\nvar code = \"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/\";\r\nfor (var i = 0, len = code.length; i < len; ++i) {\r\n lookup[i] = code[i];\r\n revLookup[code.charCodeAt(i)] = i;\r\n}\r\n// Support decoding URL-safe base64 strings, as Node.js does.\r\n// See: https://en.wikipedia.org/wiki/Base64#URL_applications\r\nrevLookup[\"-\".charCodeAt(0)] = 62;\r\nrevLookup[\"_\".charCodeAt(0)] = 63;\r\nfunction getLens(b64) {\r\n var len = b64.length;\r\n if (len % 4 > 0) {\r\n throw new Error(\"Invalid string. Length must be a multiple of 4\");\r\n }\r\n // Trim off extra bytes after placeholder bytes are found\r\n // See: https://github.com/beatgammit/base64-js/issues/42\r\n var validLen = b64.indexOf(\"=\");\r\n if (validLen === -1)\r\n validLen = len;\r\n var placeHoldersLen = validLen === len\r\n ? 0\r\n : 4 - (validLen % 4);\r\n return [validLen, placeHoldersLen];\r\n}\r\n// base64 is 4/3 + up to two characters of the original data\r\nfunction byteLength(b64) {\r\n var lens = getLens(b64);\r\n var validLen = lens[0];\r\n var placeHoldersLen = lens[1];\r\n return ((validLen + placeHoldersLen) * 3 / 4) - placeHoldersLen;\r\n}\r\nfunction _byteLength(b64, validLen, placeHoldersLen) {\r\n return ((validLen + placeHoldersLen) * 3 / 4) - placeHoldersLen;\r\n}\r\nfunction Util_Base64_Decode(b64) {\r\n var tmp;\r\n var lens = getLens(b64);\r\n var validLen = lens[0];\r\n var placeHoldersLen = lens[1];\r\n var arr = new Uint8Array(_byteLength(b64, validLen, placeHoldersLen));\r\n var curByte = 0;\r\n // if there are placeholders, only get up to the last complete 4 chars\r\n var len = placeHoldersLen > 0\r\n ? validLen - 4\r\n : validLen;\r\n for (var i = 0; i < len; i += 4) {\r\n tmp =\r\n (revLookup[b64.charCodeAt(i)] << 18) |\r\n (revLookup[b64.charCodeAt(i + 1)] << 12) |\r\n (revLookup[b64.charCodeAt(i + 2)] << 6) |\r\n revLookup[b64.charCodeAt(i + 3)];\r\n arr[curByte++] = (tmp >> 16) & 0xFF;\r\n arr[curByte++] = (tmp >> 8) & 0xFF;\r\n arr[curByte++] = tmp & 0xFF;\r\n }\r\n if (placeHoldersLen === 2) {\r\n tmp =\r\n (revLookup[b64.charCodeAt(i)] << 2) |\r\n (revLookup[b64.charCodeAt(i + 1)] >> 4);\r\n arr[curByte++] = tmp & 0xFF;\r\n }\r\n if (placeHoldersLen === 1) {\r\n tmp =\r\n (revLookup[b64.charCodeAt(i)] << 10) |\r\n (revLookup[b64.charCodeAt(i + 1)] << 4) |\r\n (revLookup[b64.charCodeAt(i + 2)] >> 2);\r\n arr[curByte++] = (tmp >> 8) & 0xFF;\r\n arr[curByte++] = tmp & 0xFF;\r\n }\r\n return arr;\r\n}\r\nexports.Util_Base64_Decode = Util_Base64_Decode;\r\nfunction tripletToBase64(num) {\r\n return lookup[num >> 18 & 0x3F] +\r\n lookup[num >> 12 & 0x3F] +\r\n lookup[num >> 6 & 0x3F] +\r\n lookup[num & 0x3F];\r\n}\r\nfunction encodeChunk(uint8, start, end) {\r\n var tmp;\r\n var output = [];\r\n for (var i = start; i < end; i += 3) {\r\n tmp =\r\n ((uint8[i] << 16) & 0xFF0000) +\r\n ((uint8[i + 1] << 8) & 0xFF00) +\r\n (uint8[i + 2] & 0xFF);\r\n output.push(tripletToBase64(tmp));\r\n }\r\n return output.join(\"\");\r\n}\r\nfunction Util_Base64_Encode(uint8) {\r\n var tmp;\r\n var len = uint8.length;\r\n var extraBytes = len % 3; // if we have 1 byte left, pad 2 bytes\r\n var parts = [];\r\n var maxChunkLength = 16383; // must be multiple of 3\r\n // go through the array every three bytes, we'll deal with trailing stuff later\r\n for (var i = 0, len2 = len - extraBytes; i < len2; i += maxChunkLength) {\r\n parts.push(encodeChunk(uint8, i, (i + maxChunkLength) > len2 ? len2 : (i + maxChunkLength)));\r\n }\r\n // pad the end with zeros, but make sure to not forget the extra bytes\r\n if (extraBytes === 1) {\r\n tmp = uint8[len - 1];\r\n parts.push(lookup[tmp >> 2] +\r\n lookup[(tmp << 4) & 0x3F] +\r\n \"==\");\r\n }\r\n else if (extraBytes === 2) {\r\n tmp = (uint8[len - 2] << 8) + uint8[len - 1];\r\n parts.push(lookup[tmp >> 10] +\r\n lookup[(tmp >> 4) & 0x3F] +\r\n lookup[(tmp << 2) & 0x3F] +\r\n \"=\");\r\n }\r\n return parts.join(\"\");\r\n}\r\nexports.Util_Base64_Encode = Util_Base64_Encode;\r\n//////// END: Base64 encode / decode utility functions from https://github.com/beatgammit/base64-js\r\n//# sourceMappingURL=vpnrpc.js.map\n/* WEBPACK VAR INJECTION */}.call(this, __webpack_require__(/*! ./../../buffer/index.js */ \"./node_modules/buffer/index.js\").Buffer))//# sourceURL=[module]\n//# sourceMappingURL=data:application/json;charset=utf-8;base64,{"version":3,"file":"./node_modules/vpnrpc/dist/vpnrpc.js.js","sources":["webpack://JS/./node_modules/vpnrpc/dist/vpnrpc.js?46ef"],"sourcesContent":["\"use strict\";\r\n// SoftEther VPN Server JSON-RPC Stub code for TypeScript\r\n// \r\n// vpnrpc.ts\r\n// Automatically generated at 2019-05-29 18:21:39 by vpnserver-jsonrpc-codegen\r\n//\r\n// Licensed under the Apache License 2.0\r\n// Copyright (c) 2014-2019 SoftEther VPN Project\r\nvar __extends = (this && this.__extends) || (function () {\r\n    var extendStatics = function (d, b) {\r\n        extendStatics = Object.setPrototypeOf ||\r\n            ({ __proto__: [] } instanceof Array && function (d, b) { d.__proto__ = b; }) ||\r\n            function (d, b) { for (var p in b) if (b.hasOwnProperty(p)) d[p] = b[p]; };\r\n        return extendStatics(d, b);\r\n    };\r\n    return function (d, b) {\r\n        extendStatics(d, b);\r\n        function __() { this.constructor = d; }\r\n        d.prototype = b === null ? Object.create(b) : (__.prototype = b.prototype, new __());\r\n    };\r\n})();\r\nvar __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) {\r\n    return new (P || (P = Promise))(function (resolve, reject) {\r\n        function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } }\r\n        function rejected(value) { try { step(generator[\"throw\"](value)); } catch (e) { reject(e); } }\r\n        function step(result) { result.done ? resolve(result.value) : new P(function (resolve) { resolve(result.value); }).then(fulfilled, rejected); }\r\n        step((generator = generator.apply(thisArg, _arguments || [])).next());\r\n    });\r\n};\r\nvar __generator = (this && this.__generator) || function (thisArg, body) {\r\n    var _ = { label: 0, sent: function() { if (t[0] & 1) throw t[1]; return t[1]; }, trys: [], ops: [] }, f, y, t, g;\r\n    return g = { next: verb(0), \"throw\": verb(1), \"return\": verb(2) }, typeof Symbol === \"function\" && (g[Symbol.iterator] = function() { return this; }), g;\r\n    function verb(n) { return function (v) { return step([n, v]); }; }\r\n    function step(op) {\r\n        if (f) throw new TypeError(\"Generator is already executing.\");\r\n        while (_) try {\r\n            if (f = 1, y && (t = op[0] & 2 ? y[\"return\"] : op[0] ? y[\"throw\"] || ((t = y[\"return\"]) && t.call(y), 0) : y.next) && !(t = t.call(y, op[1])).done) return t;\r\n            if (y = 0, t) op = [op[0] & 2, t.value];\r\n            switch (op[0]) {\r\n                case 0: case 1: t = op; break;\r\n                case 4: _.label++; return { value: op[1], done: false };\r\n                case 5: _.label++; y = op[1]; op = [0]; continue;\r\n                case 7: op = _.ops.pop(); _.trys.pop(); continue;\r\n                default:\r\n                    if (!(t = _.trys, t = t.length > 0 && t[t.length - 1]) && (op[0] === 6 || op[0] === 2)) { _ = 0; continue; }\r\n                    if (op[0] === 3 && (!t || (op[1] > t[0] && op[1] < t[3]))) { _.label = op[1]; break; }\r\n                    if (op[0] === 6 && _.label < t[1]) { _.label = t[1]; t = op; break; }\r\n                    if (t && _.label < t[2]) { _.label = t[2]; _.ops.push(op); break; }\r\n                    if (t[2]) _.ops.pop();\r\n                    _.trys.pop(); continue;\r\n            }\r\n            op = body.call(thisArg, _);\r\n        } catch (e) { op = [6, e]; y = 0; } finally { f = t = 0; }\r\n        if (op[0] & 5) throw op[1]; return { value: op[0] ? op[1] : void 0, done: true };\r\n    }\r\n};\r\nexports.__esModule = true;\r\n// Trivial utility codes\r\nvar is_node_js = (typeof navigator === \"undefined\") || navigator.userAgent.indexOf(\"Node.js\") !== -1 || navigator.userAgent.indexOf(\"jsdom\") !== -1;\r\nfunction is_null(obj) {\r\n    return (typeof obj === \"undefined\") || (obj === null);\r\n}\r\nvar debug_mode = false;\r\n/** VPN Server RPC Stubs */\r\nvar VpnServerRpc = /** @class */ (function () {\r\n    /**\r\n     * Constructor of the VpnServerRpc class\r\n     * @param vpnserver_hostname The hostname or IP address of the destination VPN Server. In the web browser you can specify null if you want to connect to the server itself.\r\n     * @param vpnserver_port The port number of the destination VPN Server. In the web browser you can specify null if you want to connect to the server itself.\r\n     * @param hubname The name of the Virtual Hub if you want to connect to the VPN Server as a Virtual Hub Admin Mode. Specify null if you want to connect to the VPN Server as the Entire VPN Server Admin Mode.\r\n     * @param password Specify the administration password. This value is valid only if vpnserver_hostname is sepcified.\r\n     * @param nodejs_https_client_reject_untrusted_server_cert In Node.js set this true to check the SSL server certificate on the destination VPN Server. Set this false to ignore the SSL server certification.\r\n     */\r\n    function VpnServerRpc(vpnserver_hostname, vpnserver_port, hubname, password, nodejs_https_client_reject_untrusted_server_cert) {\r\n        var _this = this;\r\n        // --- Stubs ---\r\n        /** Test RPC function. Input any integer value to the IntValue_u32 field. Then the server will convert the integer to the string, and return the string in the StrValue_str field. */\r\n        this.Test = function (in_param) {\r\n            return _this.CallAsync(\"Test\", in_param);\r\n        };\r\n        /** Get server information. This allows you to obtain the server information of the currently connected VPN Server or VPN Bridge. Included in the server information are the version number, build number and build information. You can also obtain information on the current server operation mode and the information of operating system that the server is operating on. */\r\n        this.GetServerInfo = function () {\r\n            return _this.CallAsync(\"GetServerInfo\", new VpnRpcServerInfo());\r\n        };\r\n        /** Get Current Server Status. This allows you to obtain in real-time the current status of the currently connected VPN Server or VPN Bridge. You can get statistical information on data communication and the number of different kinds of objects that exist on the server. You can get information on how much memory is being used on the current computer by the OS. */\r\n        this.GetServerStatus = function () {\r\n            return _this.CallAsync(\"GetServerStatus\", new VpnRpcServerStatus());\r\n        };\r\n        /** Create New TCP Listener. This allows you to create a new TCP Listener on the server. By creating the TCP Listener the server starts listening for a connection from clients at the specified TCP/IP port number. A TCP Listener that has been created can be deleted by the DeleteListener API. You can also get a list of TCP Listeners currently registered by using the EnumListener API. To execute this API, you must have VPN Server administrator privileges. */\r\n        this.CreateListener = function (in_param) {\r\n            return _this.CallAsync(\"CreateListener\", in_param);\r\n        };\r\n        /** Get List of TCP Listeners. This allows you to get a list of TCP listeners registered on the current server. You can obtain information on whether the various TCP listeners have a status of operating or error. To call this API, you must have VPN Server administrator privileges. */\r\n        this.EnumListener = function () {\r\n            return _this.CallAsync(\"EnumListener\", new VpnRpcListenerList());\r\n        };\r\n        /** Delete TCP Listener. This allows you to delete a TCP Listener that's registered on the server. When the TCP Listener is in a state of operation, the listener will automatically be deleted when its operation stops. You can also get a list of TCP Listeners currently registered by using the EnumListener API. To call this API, you must have VPN Server administrator privileges. */\r\n        this.DeleteListener = function (in_param) {\r\n            return _this.CallAsync(\"DeleteListener\", in_param);\r\n        };\r\n        /** Enable / Disable TCP Listener. This starts or stops the operation of TCP Listeners registered on the current server. You can also get a list of TCP Listeners currently registered by using the EnumListener API. To call this API, you must have VPN Server administrator privileges. */\r\n        this.EnableListener = function (in_param) {\r\n            return _this.CallAsync(\"EnableListener\", in_param);\r\n        };\r\n        /** Set VPN Server Administrator Password. This sets the VPN Server administrator password. You can specify the password as a parameter. To call this API, you must have VPN Server administrator privileges. */\r\n        this.SetServerPassword = function (in_param) {\r\n            return _this.CallAsync(\"SetServerPassword\", in_param);\r\n        };\r\n        /** Set the VPN Server clustering configuration. Use this to set the VPN Server type as Standalone Server, Cluster Controller Server or Cluster Member Server. Standalone server means a VPN Server that does not belong to any cluster in its current state. When VPN Server is installed, by default it will be in standalone server mode. Unless you have particular plans to configure a cluster, we recommend the VPN Server be operated in standalone mode. A cluster controller is the central computer of all member servers of a cluster in the case where a clustering environment is made up of multiple VPN Servers. Multiple cluster members can be added to the cluster as required. A cluster requires one computer to serve this role. The other cluster member servers that are configured in the same cluster begin operation as a cluster member by connecting to the cluster controller. To call this API, you must have VPN Server administrator privileges. Also, when this API is executed, VPN Server will automatically restart. This API cannot be called on VPN Bridge. */\r\n        this.SetFarmSetting = function (in_param) {\r\n            return _this.CallAsync(\"SetFarmSetting\", in_param);\r\n        };\r\n        /** Get Clustering Configuration of Current VPN Server. You can use this to acquire the clustering configuration of the current VPN Server. To call this API, you must have VPN Server administrator privileges. */\r\n        this.GetFarmSetting = function () {\r\n            return _this.CallAsync(\"GetFarmSetting\", new VpnRpcFarm());\r\n        };\r\n        /** Get Cluster Member Information. When the VPN Server is operating as a cluster controller, you can get information on cluster member servers on that cluster by specifying the IDs of the member servers. You can get the following information about the specified cluster member server: Server Type, Time Connection has been Established, IP Address, Host Name, Points, Public Port List, Number of Operating Virtual Hubs, First Virtual Hub, Number of Sessions and Number of TCP Connections. This API cannot be invoked on VPN Bridge. */\r\n        this.GetFarmInfo = function (in_param) {\r\n            return _this.CallAsync(\"GetFarmInfo\", in_param);\r\n        };\r\n        /** Get List of Cluster Members. Use this API when the VPN Server is operating as a cluster controller to get a list of the cluster member servers on the same cluster, including the cluster controller itself. For each member, the following information is also listed: Type, Connection Start, Host Name, Points, Number of Session, Number of TCP Connections, Number of Operating Virtual Hubs, Using Client Connection License and Using Bridge Connection License. This API cannot be invoked on VPN Bridge. */\r\n        this.EnumFarmMember = function () {\r\n            return _this.CallAsync(\"EnumFarmMember\", new VpnRpcEnumFarm());\r\n        };\r\n        /** Get Connection Status to Cluster Controller. Use this API when the VPN Server is operating as a cluster controller to get the status of connection to the cluster controller. You can get the following information: Controller IP Address, Port Number, Connection Status, Connection Start Time, First Connection Established Time, Current Connection Established Time, Number of Connection Attempts, Number of Successful Connections, Number of Failed Connections. This API cannot be invoked on VPN Bridge. */\r\n        this.GetFarmConnectionStatus = function () {\r\n            return _this.CallAsync(\"GetFarmConnectionStatus\", new VpnRpcFarmConnectionStatus());\r\n        };\r\n        /** Set SSL Certificate and Private Key of VPN Server. You can set the SSL certificate that the VPN Server provides to the connected client and the private key for that certificate. The certificate must be in X.509 format and the private key must be Base 64 encoded format. To call this API, you must have VPN Server administrator privileges. */\r\n        this.SetServerCert = function (in_param) {\r\n            return _this.CallAsync(\"SetServerCert\", in_param);\r\n        };\r\n        /** Get SSL Certificate and Private Key of VPN Server. Use this to get the SSL certificate private key that the VPN Server provides to the connected client. To call this API, you must have VPN Server administrator privileges. */\r\n        this.GetServerCert = function () {\r\n            return _this.CallAsync(\"GetServerCert\", new VpnRpcKeyPair());\r\n        };\r\n        /** Get the Encrypted Algorithm Used for VPN Communication. Use this API to get the current setting of the algorithm used for the electronic signature and encrypted for SSL connection to be used for communication between the VPN Server and the connected client and the list of algorithms that can be used on the VPN Server. */\r\n        this.GetServerCipher = function () {\r\n            return _this.CallAsync(\"GetServerCipher\", new VpnRpcStr());\r\n        };\r\n        /** Set the Encrypted Algorithm Used for VPN Communication. Use this API to set the algorithm used for the electronic signature and encrypted for SSL connections to be used for communication between the VPN Server and the connected client. By specifying the algorithm name, the specified algorithm will be used later between the VPN Client and VPN Bridge connected to this server and the data will be encrypted. To call this API, you must have VPN Server administrator privileges. */\r\n        this.SetServerCipher = function (in_param) {\r\n            return _this.CallAsync(\"SetServerCipher\", in_param);\r\n        };\r\n        /** Create New Virtual Hub. Use this to create a new Virtual Hub on the VPN Server. The created Virtual Hub will begin operation immediately. When the VPN Server is operating on a cluster, this API is only valid for the cluster controller. Also, the new Virtual Hub will operate as a dynamic Virtual Hub. You can change it to a static Virtual Hub by using the SetHub API. To get a list of Virtual Hubs that are already on the VPN Server, use the EnumHub API. To call this API, you must have VPN Server administrator privileges. Also, this API does not operate on VPN Servers that are operating as a VPN Bridge or cluster member. */\r\n        this.CreateHub = function (in_param) {\r\n            return _this.CallAsync(\"CreateHub\", in_param);\r\n        };\r\n        /** Set the Virtual Hub configuration. You can call this API to change the configuration of the specified Virtual Hub. You can set the Virtual Hub online or offline. You can set the maximum number of sessions that can be concurrently connected to the Virtual Hub that is currently being managed. You can set the Virtual Hub administrator password. You can set other parameters for the Virtual Hub. Before call this API, you need to obtain the latest state of the Virtual Hub by using the GetHub API. */\r\n        this.SetHub = function (in_param) {\r\n            return _this.CallAsync(\"SetHub\", in_param);\r\n        };\r\n        /** Get the Virtual Hub configuration. You can call this API to get the current configuration of the specified Virtual Hub. To change the configuration of the Virtual Hub, call the SetHub API. */\r\n        this.GetHub = function (in_param) {\r\n            return _this.CallAsync(\"GetHub\", in_param);\r\n        };\r\n        /** Get List of Virtual Hubs. Use this to get a list of existing Virtual Hubs on the VPN Server. For each Virtual Hub, you can get the following information: Virtual Hub Name, Status, Type, Number of Users, Number of Groups, Number of Sessions, Number of MAC Tables, Number of IP Tables, Number of Logins, Last Login, and Last Communication. Note that when connecting in Virtual Hub Admin Mode, if in the options of a Virtual Hub that you do not have administrator privileges for, the option Don't Enumerate this Virtual Hub for Anonymous Users is enabled then that Virtual Hub will not be enumerated. If you are connected in Server Admin Mode, then the list of all Virtual Hubs will be displayed. When connecting to and managing a non-cluster-controller cluster member of a clustering environment, only the Virtual Hub currently being hosted by that VPN Server will be displayed. When connecting to a cluster controller for administration purposes, all the Virtual Hubs will be displayed. */\r\n        this.EnumHub = function () {\r\n            return _this.CallAsync(\"EnumHub\", new VpnRpcEnumHub());\r\n        };\r\n        /** Delete Virtual Hub. Use this to delete an existing Virtual Hub on the VPN Server. If you delete the Virtual Hub, all sessions that are currently connected to the Virtual Hub will be disconnected and new sessions will be unable to connect to the Virtual Hub. Also, this will also delete all the Hub settings, user objects, group objects, certificates and Cascade Connections. Once you delete the Virtual Hub, it cannot be recovered. To call this API, you must have VPN Server administrator privileges. Also, this API does not operate on VPN Servers that are operating as a VPN Bridge or cluster member. */\r\n        this.DeleteHub = function (in_param) {\r\n            return _this.CallAsync(\"DeleteHub\", in_param);\r\n        };\r\n        /** Get Setting of RADIUS Server Used for User Authentication. Use this to get the current settings for the RADIUS server used when a user connects to the currently managed Virtual Hub using RADIUS Server Authentication Mode. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n        this.GetHubRadius = function (in_param) {\r\n            return _this.CallAsync(\"GetHubRadius\", in_param);\r\n        };\r\n        /** Set RADIUS Server to use for User Authentication. To accept users to the currently managed Virtual Hub in RADIUS server authentication mode, you can specify an external RADIUS server that confirms the user name and password. (You can specify multiple hostname by splitting with comma or semicolon.) The RADIUS server must be set to receive requests from IP addresses of this VPN Server. Also, authentication by Password Authentication Protocol (PAP) must be enabled. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n        this.SetHubRadius = function (in_param) {\r\n            return _this.CallAsync(\"SetHubRadius\", in_param);\r\n        };\r\n        /** Get List of TCP Connections Connecting to the VPN Server. Use this to get a list of TCP/IP connections that are currently connecting to the VPN Server. It does not display the TCP connections that have been established as VPN sessions. To get the list of TCP/IP connections that have been established as VPN sessions, you can use the EnumSession API. You can get the following: Connection Name, Connection Source, Connection Start and Type. To call this API, you must have VPN Server administrator privileges. */\r\n        this.EnumConnection = function () {\r\n            return _this.CallAsync(\"EnumConnection\", new VpnRpcEnumConnection());\r\n        };\r\n        /** Disconnect TCP Connections Connecting to the VPN Server. Use this to forcefully disconnect specific TCP/IP connections that are connecting to the VPN Server. To call this API, you must have VPN Server administrator privileges. */\r\n        this.DisconnectConnection = function (in_param) {\r\n            return _this.CallAsync(\"DisconnectConnection\", in_param);\r\n        };\r\n        /** Get Information of TCP Connections Connecting to the VPN Server. Use this to get detailed information of a specific TCP/IP connection that is connecting to the VPN Server. You can get the following information: Connection Name, Connection Type, Source Hostname, Source IP Address, Source Port Number (TCP), Connection Start, Server Product Name, Server Version, Server Build Number, Client Product Name, Client Version, and Client Build Number. To call this API, you must have VPN Server administrator privileges. */\r\n        this.GetConnectionInfo = function (in_param) {\r\n            return _this.CallAsync(\"GetConnectionInfo\", in_param);\r\n        };\r\n        /** Switch Virtual Hub to Online or Offline. Use this to set the Virtual Hub to online or offline. A Virtual Hub with an offline status cannot receive VPN connections from clients. When you set the Virtual Hub offline, all sessions will be disconnected. A Virtual Hub with an offline status cannot receive VPN connections from clients. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n        this.SetHubOnline = function (in_param) {\r\n            return _this.CallAsync(\"SetHubOnline\", in_param);\r\n        };\r\n        /** Get Current Status of Virtual Hub. Use this to get the current status of the Virtual Hub currently being managed. You can get the following information: Virtual Hub Type, Number of Sessions, Number of Each Type of Object, Number of Logins, Last Login, Last Communication, and Communication Statistical Data. */\r\n        this.GetHubStatus = function (in_param) {\r\n            return _this.CallAsync(\"GetHubStatus\", in_param);\r\n        };\r\n        /** Set the logging configuration of the Virtual Hub. Use this to enable or disable a security log or packet logs of the Virtual Hub currently being managed, set the save contents of the packet log for each type of packet to be saved, and set the log file switch cycle for the security log or packet log that the currently managed Virtual Hub saves. There are the following packet types: TCP Connection Log, TCP Packet Log, DHCP Packet Log, UDP Packet Log, ICMP Packet Log, IP Packet Log, ARP Packet Log, and Ethernet Packet Log. To get the current setting, you can use the LogGet API. The log file switch cycle can be changed to switch in every second, every minute, every hour, every day, every month or not switch. To get the current setting, you can use the GetHubLog API. */\r\n        this.SetHubLog = function (in_param) {\r\n            return _this.CallAsync(\"SetHubLog\", in_param);\r\n        };\r\n        /** Get the logging configuration of the Virtual Hub. Use this to get the configuration for a security log or packet logs of the Virtual Hub currently being managed, get the setting for save contents of the packet log for each type of packet to be saved, and get the log file switch cycle for the security log or packet log that the currently managed Virtual Hub saves. To set the current setting, you can use the SetHubLog API. */\r\n        this.GetHubLog = function (in_param) {\r\n            return _this.CallAsync(\"GetHubLog\", in_param);\r\n        };\r\n        /** Add Trusted CA Certificate. Use this to add a new certificate to a list of CA certificates trusted by the currently managed Virtual Hub. The list of certificate authority certificates that are registered is used to verify certificates when a VPN Client is connected in signed certificate authentication mode. To get a list of the current certificates you can use the EnumCa API. The certificate you add must be saved in the X.509 file format. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a member server on a cluster. */\r\n        this.AddCa = function (in_param) {\r\n            return _this.CallAsync(\"AddCa\", in_param);\r\n        };\r\n        /** Get List of Trusted CA Certificates. Here you can manage the certificate authority certificates that are trusted by this currently managed Virtual Hub. The list of certificate authority certificates that are registered is used to verify certificates when a VPN Client is connected in signed certificate authentication mode. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a member server on a cluster. */\r\n        this.EnumCa = function (in_param) {\r\n            return _this.CallAsync(\"EnumCa\", in_param);\r\n        };\r\n        /** Get Trusted CA Certificate. Use this to get an existing certificate from the list of CA certificates trusted by the currently managed Virtual Hub and save it as a file in X.509 format. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a member server on a cluster. */\r\n        this.GetCa = function (in_param) {\r\n            return _this.CallAsync(\"GetCa\", in_param);\r\n        };\r\n        /** Delete Trusted CA Certificate. Use this to delete an existing certificate from the list of CA certificates trusted by the currently managed Virtual Hub. To get a list of the current certificates you can use the EnumCa API. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a member server on a cluster. */\r\n        this.DeleteCa = function (in_param) {\r\n            return _this.CallAsync(\"DeleteCa\", in_param);\r\n        };\r\n        /** Create New Cascade Connection. Use this to create a new Cascade Connection on the currently managed Virtual Hub. By using a Cascade Connection, you can connect this Virtual Hub by Cascade Connection to another Virtual Hub that is operating on the same or a different computer. To create a Cascade Connection, you must specify the name of the Cascade Connection, destination server and destination Virtual Hub and user name. When a new Cascade Connection is created, the type of user authentication is initially set as Anonymous Authentication and the proxy server setting and the verification options of the server certificate is not set. To change these settings and other advanced settings after a Cascade Connection has been created, use the other APIs that include the name \"Link\". [Warning About Cascade Connections] By connecting using a Cascade Connection you can create a Layer 2 bridge between multiple Virtual Hubs but if the connection is incorrectly configured, a loopback Cascade Connection could inadvertently be created. When using a Cascade Connection function please design the network topology with care. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n        this.CreateLink = function (in_param) {\r\n            return _this.CallAsync(\"CreateLink\", in_param);\r\n        };\r\n        /** Get the Cascade Connection Setting. Use this to get the Connection Setting of a Cascade Connection that is registered on the currently managed Virtual Hub. To change the Connection Setting contents of the Cascade Connection, use the APIs that include the name \"Link\" after creating the Cascade Connection. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n        this.GetLink = function (in_param) {\r\n            return _this.CallAsync(\"GetLink\", in_param);\r\n        };\r\n        /** Change Existing Cascade Connection. Use this to alter the setting of an existing Cascade Connection on the currently managed Virtual Hub. */\r\n        this.SetLink = function (in_param) {\r\n            return _this.CallAsync(\"SetLink\", in_param);\r\n        };\r\n        /** Get List of Cascade Connections. Use this to get a list of Cascade Connections that are registered on the currently managed Virtual Hub. By using a Cascade Connection, you can connect this Virtual Hub by Layer 2 Cascade Connection to another Virtual Hub that is operating on the same or a different computer. [Warning About Cascade Connections] By connecting using a Cascade Connection you can create a Layer 2 bridge between multiple Virtual Hubs but if the connection is incorrectly configured, a loopback Cascade Connection could inadvertently be created. When using a Cascade Connection function please design the network topology with care. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n        this.EnumLink = function (in_param) {\r\n            return _this.CallAsync(\"EnumLink\", in_param);\r\n        };\r\n        /** Switch Cascade Connection to Online Status. When a Cascade Connection registered on the currently managed Virtual Hub is specified, use this to switch that Cascade Connection to online status. The Cascade Connection that is switched to online status begins the process of connecting to the destination VPN Server in accordance with the Connection Setting. The Cascade Connection that is switched to online status will establish normal connection to the VPN Server or continue to attempt connection until it is switched to offline status. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n        this.SetLinkOnline = function (in_param) {\r\n            return _this.CallAsync(\"SetLinkOnline\", in_param);\r\n        };\r\n        /** Switch Cascade Connection to Offline Status. When a Cascade Connection registered on the currently managed Virtual Hub is specified, use this to switch that Cascade Connection to offline status. The Cascade Connection that is switched to offline will not connect to the VPN Server until next time it is switched to the online status using the SetLinkOnline API You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n        this.SetLinkOffline = function (in_param) {\r\n            return _this.CallAsync(\"SetLinkOffline\", in_param);\r\n        };\r\n        /** Delete Cascade Connection Setting. Use this to delete a Cascade Connection that is registered on the currently managed Virtual Hub. If the specified Cascade Connection has a status of online, the connections will be automatically disconnected and then the Cascade Connection will be deleted. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n        this.DeleteLink = function (in_param) {\r\n            return _this.CallAsync(\"DeleteLink\", in_param);\r\n        };\r\n        /** Change Name of Cascade Connection. When a Cascade Connection registered on the currently managed Virtual Hub is specified, use this to change the name of that Cascade Connection. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n        this.RenameLink = function (in_param) {\r\n            return _this.CallAsync(\"RenameLink\", in_param);\r\n        };\r\n        /** Get Current Cascade Connection Status. When a Cascade Connection registered on the currently managed Virtual Hub is specified and that Cascade Connection is currently online, use this to get its connection status and other information. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n        this.GetLinkStatus = function (in_param) {\r\n            return _this.CallAsync(\"GetLinkStatus\", in_param);\r\n        };\r\n        /** Add Access List Rule. Use this to add a new rule to the access list of the currently managed Virtual Hub. The access list is a set of packet file rules that are applied to packets that flow through the Virtual Hub. You can register multiple rules in an access list and you can also define an priority for each rule. All packets are checked for the conditions specified by the rules registered in the access list and based on the operation that is stipulated by the first matching rule, they either pass or are discarded. Packets that do not match any rule are implicitly allowed to pass. You can also use the access list to generate delays, jitters and packet losses. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a member server on a cluster. */\r\n        this.AddAccess = function (in_param) {\r\n            return _this.CallAsync(\"AddAccess\", in_param);\r\n        };\r\n        /** Delete Rule from Access List. Use this to specify a packet filter rule registered on the access list of the currently managed Virtual Hub and delete it. To delete a rule, you must specify that rule's ID. You can display the ID by using the EnumAccess API. If you wish not to delete the rule but to only temporarily disable it, use the SetAccessList API to set the rule status to disable. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a member server on a cluster. */\r\n        this.DeleteAccess = function (in_param) {\r\n            return _this.CallAsync(\"DeleteAccess\", in_param);\r\n        };\r\n        /** Get Access List Rule List. Use this to get a list of packet filter rules that are registered on access list of the currently managed Virtual Hub. The access list is a set of packet file rules that are applied to packets that flow through the Virtual Hub. You can register multiple rules in an access list and you can also define a priority for each rule. All packets are checked for the conditions specified by the rules registered in the access list and based on the operation that is stipulated by the first matching rule, they either pass or are discarded. Packets that do not match any rule are implicitly allowed to pass. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a member server on a cluster. */\r\n        this.EnumAccess = function (in_param) {\r\n            return _this.CallAsync(\"EnumAccess\", in_param);\r\n        };\r\n        /** Replace all access lists on a single bulk API call. This API removes all existing access list rules on the Virtual Hub, and replace them by new access list rules specified by the parameter. */\r\n        this.SetAccessList = function (in_param) {\r\n            return _this.CallAsync(\"SetAccessList\", in_param);\r\n        };\r\n        /** Create a user. Use this to create a new user in the security account database of the currently managed Virtual Hub. By creating a user, the VPN Client can connect to the Virtual Hub by using the authentication information of that user. Note that a user whose user name has been created as \"*\" (a single asterisk character) will automatically be registered as a RADIUS authentication user. For cases where there are users with \"*\" as the name, when a user, whose user name that has been provided when a client connected to a VPN Server does not match existing user names, is able to be authenticated by a RADIUS server or NT domain controller by inputting a user name and password, the authentication settings and security policy settings will follow the setting for the user \"*\". To change the user information of a user that has been created, use the SetUser API. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a member server on a cluster. */\r\n        this.CreateUser = function (in_param) {\r\n            return _this.CallAsync(\"CreateUser\", in_param);\r\n        };\r\n        /** Change User Settings. Use this to change user settings that is registered on the security account database of the currently managed Virtual Hub. The user settings that can be changed using this API are the three items that are specified when a new user is created using the CreateUser API: Group Name, Full Name, and Description. To get the list of currently registered users, use the EnumUser API. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a member server on a cluster. */\r\n        this.SetUser = function (in_param) {\r\n            return _this.CallAsync(\"SetUser\", in_param);\r\n        };\r\n        /** Get User Settings. Use this to get user settings information that is registered on the security account database of the currently managed Virtual Hub. The information that you can get using this API are User Name, Full Name, Group Name, Expiration Date, Security Policy, and Auth Type, as well as parameters that are specified as auth type attributes and the statistical data of that user. To get the list of currently registered users, use the EnumUser API. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a member server on a cluster. */\r\n        this.GetUser = function (in_param) {\r\n            return _this.CallAsync(\"GetUser\", in_param);\r\n        };\r\n        /** Delete a user. Use this to delete a user that is registered on the security account database of the currently managed Virtual Hub. By deleting the user, that user will no long be able to connect to the Virtual Hub. You can use the SetUser API to set the user's security policy to deny access instead of deleting a user, set the user to be temporarily denied from logging in. To get the list of currently registered users, use the EnumUser API. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a member server on a cluster. */\r\n        this.DeleteUser = function (in_param) {\r\n            return _this.CallAsync(\"DeleteUser\", in_param);\r\n        };\r\n        /** Get List of Users. Use this to get a list of users that are registered on the security account database of the currently managed Virtual Hub. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a member server on a cluster. */\r\n        this.EnumUser = function (in_param) {\r\n            return _this.CallAsync(\"EnumUser\", in_param);\r\n        };\r\n        /** Create Group. Use this to create a new group in the security account database of the currently managed Virtual Hub. You can register multiple users in a group. To register users in a group use the SetUser API. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a member server on a cluster. */\r\n        this.CreateGroup = function (in_param) {\r\n            return _this.CallAsync(\"CreateGroup\", in_param);\r\n        };\r\n        /** Set group settings. Use this to set group settings that is registered on the security account database of the currently managed Virtual Hub. To get the list of currently registered groups, use the EnumGroup API. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a member server on a cluster. */\r\n        this.SetGroup = function (in_param) {\r\n            return _this.CallAsync(\"SetGroup\", in_param);\r\n        };\r\n        /** Get Group Setting (Sync mode). Use this to get the setting of a group that is registered on the security account database of the currently managed Virtual Hub. To get the list of currently registered groups, use the EnumGroup API. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a member server on a cluster. */\r\n        this.GetGroup = function (in_param) {\r\n            return _this.CallAsync(\"GetGroup\", in_param);\r\n        };\r\n        /** Delete User from Group. Use this to delete a specified user from the group that is registered on the security account database of the currently managed Virtual Hub. By deleting a user from the group, that user becomes unassigned. To get the list of currently registered groups, use the EnumGroup API. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a member server on a cluster. */\r\n        this.DeleteGroup = function (in_param) {\r\n            return _this.CallAsync(\"DeleteGroup\", in_param);\r\n        };\r\n        /** Get List of Groups. Use this to get a list of groups that are registered on the security account database of the currently managed Virtual Hub. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a member server on a cluster. */\r\n        this.EnumGroup = function (in_param) {\r\n            return _this.CallAsync(\"EnumGroup\", in_param);\r\n        };\r\n        /** Get List of Connected VPN Sessions. Use this to get a list of the sessions connected to the Virtual Hub currently being managed. In the list of sessions, the following information will be obtained for each connection: Session Name, Session Site, User Name, Source Host Name, TCP Connection, Transfer Bytes and Transfer Packets. If the currently connected VPN Server is a cluster controller and the currently managed Virtual Hub is a static Virtual Hub, you can get an all-linked-together list of all sessions connected to that Virtual Hub on all cluster members. In all other cases, only the list of sessions that are actually connected to the currently managed VPN Server will be obtained. */\r\n        this.EnumSession = function (in_param) {\r\n            return _this.CallAsync(\"EnumSession\", in_param);\r\n        };\r\n        /** Get Session Status. Use this to specify a session currently connected to the currently managed Virtual Hub and get the session information. The session status includes the following: source host name and user name, version information, time information, number of TCP connections, communication parameters, session key, statistical information on data transferred, and other client and server information. To get the list of currently connected sessions, use the EnumSession API. */\r\n        this.GetSessionStatus = function (in_param) {\r\n            return _this.CallAsync(\"GetSessionStatus\", in_param);\r\n        };\r\n        /** Disconnect Session. Use this to specify a session currently connected to the currently managed Virtual Hub and forcefully disconnect that session using manager privileges. Note that when communication is disconnected by settings on the source client side and the automatically reconnect option is enabled, it is possible that the client will reconnect. To get the list of currently connected sessions, use the EnumSession API. */\r\n        this.DeleteSession = function (in_param) {\r\n            return _this.CallAsync(\"DeleteSession\", in_param);\r\n        };\r\n        /** Get the MAC Address Table Database. Use this to get the MAC address table database that is held by the currently managed Virtual Hub. The MAC address table database is a table that the Virtual Hub requires to perform the action of switching Ethernet frames and the Virtual Hub decides the sorting destination session of each Ethernet frame based on the MAC address table database. The MAC address database is built by the Virtual Hub automatically analyzing the contents of the communication. */\r\n        this.EnumMacTable = function (in_param) {\r\n            return _this.CallAsync(\"EnumMacTable\", in_param);\r\n        };\r\n        /** Delete MAC Address Table Entry. Use this API to operate the MAC address table database held by the currently managed Virtual Hub and delete a specified MAC address table entry from the database. To get the contents of the current MAC address table database use the EnumMacTable API. */\r\n        this.DeleteMacTable = function (in_param) {\r\n            return _this.CallAsync(\"DeleteMacTable\", in_param);\r\n        };\r\n        /** Get the IP Address Table Database. Use this to get the IP address table database that is held by the currently managed Virtual Hub. The IP address table database is a table that is automatically generated by analyzing the contents of communication so that the Virtual Hub can always know which session is using which IP address and it is frequently used by the engine that applies the Virtual Hub security policy. By specifying the session name you can get the IP address table entry that has been associated with that session. */\r\n        this.EnumIpTable = function (in_param) {\r\n            return _this.CallAsync(\"EnumIpTable\", in_param);\r\n        };\r\n        /** Delete IP Address Table Entry. Use this API to operate the IP address table database held by the currently managed Virtual Hub and delete a specified IP address table entry from the database. To get the contents of the current IP address table database use the EnumIpTable API. */\r\n        this.DeleteIpTable = function (in_param) {\r\n            return _this.CallAsync(\"DeleteIpTable\", in_param);\r\n        };\r\n        /** Set the Keep Alive Internet Connection Function. Use this to set the destination host name etc. of the Keep Alive Internet Connection Function. For network connection environments where connections will automatically be disconnected where there are periods of no communication that are longer than a set period, by using the Keep Alive Internet Connection Function, it is possible to keep alive the Internet connection by sending packets to a nominated server on the Internet at set intervals. When using this API, you can specify the following: Host Name, Port Number, Packet Send Interval, and Protocol. Packets sent to keep alive the Internet connection will have random content and personal information that could identify a computer or user is not sent. You can use the SetKeep API to enable/disable the Keep Alive Internet Connection Function. To execute this API on a VPN Server or VPN Bridge, you must have administrator privileges. */\r\n        this.SetKeep = function (in_param) {\r\n            return _this.CallAsync(\"SetKeep\", in_param);\r\n        };\r\n        /** Get the Keep Alive Internet Connection Function. Use this to get the current setting contents of the Keep Alive Internet Connection Function. In addition to the destination's Host Name, Port Number, Packet Send Interval and Protocol, you can obtain the current enabled/disabled status of the Keep Alive Internet Connection Function. */\r\n        this.GetKeep = function (in_param) {\r\n            return _this.CallAsync(\"GetKeep\", in_param);\r\n        };\r\n        /** Enable the Virtual NAT and DHCP Server Function (SecureNAT Function). Use this to enable the Virtual NAT and DHCP Server function (SecureNAT Function) on the currently managed Virtual Hub and begin its operation. Before executing this API, you must first check the setting contents of the current Virtual NAT function and DHCP Server function using the SetSecureNATOption API and GetSecureNATOption API. By enabling the SecureNAT function, you can virtually operate a NAT router (IP masquerade) and the DHCP Server function on a virtual network on the Virtual Hub. [Warning about SecureNAT Function] The SecureNAT function is recommended only for system administrators and people with a detailed knowledge of networks. If you use the SecureNAT function correctly, it is possible to achieve a safe form of remote access via a VPN. However when used in the wrong way, it can put the entire network in danger. Anyone who does not have a thorough knowledge of networks and anyone who does not have the network administrator's permission must not enable the SecureNAT function. For a detailed explanation of the SecureNAT function, please refer to the VPN Server's manual and online documentation. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n        this.EnableSecureNAT = function (in_param) {\r\n            return _this.CallAsync(\"EnableSecureNAT\", in_param);\r\n        };\r\n        /** Disable the Virtual NAT and DHCP Server Function (SecureNAT Function). Use this to disable the Virtual NAT and DHCP Server function (SecureNAT Function) on the currently managed Virtual Hub. By executing this API the Virtual NAT function immediately stops operating and the Virtual DHCP Server function deletes the DHCP lease database and stops the service. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n        this.DisableSecureNAT = function (in_param) {\r\n            return _this.CallAsync(\"DisableSecureNAT\", in_param);\r\n        };\r\n        /** Change Settings of SecureNAT Function. Use this to change and save the virtual host network interface settings, virtual NAT function settings and virtual DHCP server settings of the Virtual NAT and DHCP Server function (SecureNAT function) on the currently managed Virtual Hub. The SecureNAT function holds one virtual network adapter on the L2 segment inside the Virtual Hub and it has been assigned a MAC address and an IP address. By doing this, another host connected to the same L2 segment is able to communicate with the SecureNAT virtual host as if it is an actual IP host existing on the network. [Warning about SecureNAT Function] The SecureNAT function is recommended only for system administrators and people with a detailed knowledge of networks. If you use the SecureNAT function correctly, it is possible to achieve a safe form of remote access via a VPN. However when used in the wrong way, it can put the entire network in danger. Anyone who does not have a thorough knowledge of networks and anyone who does not have the network administrators permission must not enable the SecureNAT function. For a detailed explanation of the SecureNAT function, please refer to the VPN Server's manual and online documentation. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n        this.SetSecureNATOption = function (in_param) {\r\n            return _this.CallAsync(\"SetSecureNATOption\", in_param);\r\n        };\r\n        /** Get Settings of SecureNAT Function. This API get the registered settings for the SecureNAT function which is set by the SetSecureNATOption API. */\r\n        this.GetSecureNATOption = function (in_param) {\r\n            return _this.CallAsync(\"GetSecureNATOption\", in_param);\r\n        };\r\n        /** Get Virtual NAT Function Session Table of SecureNAT Function. Use this to get the table of TCP and UDP sessions currently communicating via the Virtual NAT (NAT table) in cases when the Virtual NAT function is operating on the currently managed Virtual Hub. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n        this.EnumNAT = function (in_param) {\r\n            return _this.CallAsync(\"EnumNAT\", in_param);\r\n        };\r\n        /** Get Virtual DHCP Server Function Lease Table of SecureNAT Function. Use this to get the lease table of IP addresses, held by the Virtual DHCP Server, that are assigned to clients in cases when the Virtual NAT function is operating on the currently managed Virtual Hub. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n        this.EnumDHCP = function (in_param) {\r\n            return _this.CallAsync(\"EnumDHCP\", in_param);\r\n        };\r\n        /** Get the Operating Status of the Virtual NAT and DHCP Server Function (SecureNAT Function). Use this to get the operating status of the Virtual NAT and DHCP Server function (SecureNAT Function) when it is operating on the currently managed Virtual Hub. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n        this.GetSecureNATStatus = function (in_param) {\r\n            return _this.CallAsync(\"GetSecureNATStatus\", in_param);\r\n        };\r\n        /** Get List of Network Adapters Usable as Local Bridge. Use this to get a list of Ethernet devices (network adapters) that can be used as a bridge destination device as part of a Local Bridge connection. If possible, network connection name is displayed. You can use a device displayed here by using the AddLocalBridge API. To call this API, you must have VPN Server administrator privileges. */\r\n        this.EnumEthernet = function () {\r\n            return _this.CallAsync(\"EnumEthernet\", new VpnRpcEnumEth());\r\n        };\r\n        /** Create Local Bridge Connection. Use this to create a new Local Bridge connection on the VPN Server. By using a Local Bridge, you can configure a Layer 2 bridge connection between a Virtual Hub operating on this VPN server and a physical Ethernet Device (Network Adapter). You can create a tap device (virtual network interface) on the system and connect a bridge between Virtual Hubs (the tap device is only supported by Linux versions). It is possible to establish a bridge to an operating network adapter of your choice for the bridge destination Ethernet device (network adapter), but in high load environments, we recommend you prepare a network adapter dedicated to serve as a bridge. To call this API, you must have VPN Server administrator privileges. */\r\n        this.AddLocalBridge = function (in_param) {\r\n            return _this.CallAsync(\"AddLocalBridge\", in_param);\r\n        };\r\n        /** Delete Local Bridge Connection. Use this to delete an existing Local Bridge connection. To get a list of current Local Bridge connections use the EnumLocalBridge API. To call this API, you must have VPN Server administrator privileges. */\r\n        this.DeleteLocalBridge = function (in_param) {\r\n            return _this.CallAsync(\"DeleteLocalBridge\", in_param);\r\n        };\r\n        /** Get List of Local Bridge Connection. Use this to get a list of the currently defined Local Bridge connections. You can get the Local Bridge connection Virtual Hub name and the bridge destination Ethernet device (network adapter) name or tap device name, as well as the operating status. */\r\n        this.EnumLocalBridge = function () {\r\n            return _this.CallAsync(\"EnumLocalBridge\", new VpnRpcEnumLocalBridge());\r\n        };\r\n        /** Get whether the localbridge function is supported on the current system. */\r\n        this.GetBridgeSupport = function () {\r\n            return _this.CallAsync(\"GetBridgeSupport\", new VpnRpcBridgeSupport());\r\n        };\r\n        /** Reboot VPN Server Service. Use this to restart the VPN Server service. When you restart the VPN Server, all currently connected sessions and TCP connections will be disconnected and no new connections will be accepted until the restart process has completed. By using this API, only the VPN Server service program will be restarted and the physical computer that VPN Server is operating on does not restart. This management session will also be disconnected, so you will need to reconnect to continue management. Also, by specifying the \"IntValue\" parameter to \"1\", the contents of the configuration file (.config) held by the current VPN Server will be initialized. To call this API, you must have VPN Server administrator privileges. */\r\n        this.RebootServer = function (in_param) {\r\n            return _this.CallAsync(\"RebootServer\", in_param);\r\n        };\r\n        /** Get List of Server Functions / Capability. Use this get a list of functions and capability of the VPN Server currently connected and being managed. The function and capability of VPN Servers are different depending on the operating VPN server's edition and version. Using this API, you can find out the capability of the target VPN Server and report it. */\r\n        this.GetCaps = function () {\r\n            return _this.CallAsync(\"GetCaps\", new VpnCapslist());\r\n        };\r\n        /** Get the current configuration of the VPN Server. Use this to get a text file (.config file) that contains the current configuration contents of the VPN server. You can get the status on the VPN Server at the instant this API is executed. You can edit the configuration file by using a regular text editor. To write an edited configuration to the VPN Server, use the SetConfig API. To call this API, you must have VPN Server administrator privileges. */\r\n        this.GetConfig = function () {\r\n            return _this.CallAsync(\"GetConfig\", new VpnRpcConfig());\r\n        };\r\n        /** Write Configuration File to VPN Server. Use this to write the configuration file to the VPN Server. By executing this API, the contents of the specified configuration file will be applied to the VPN Server and the VPN Server program will automatically restart and upon restart, operate according to the new configuration contents. Because it is difficult for an administrator to write all the contents of a configuration file, we recommend you use the GetConfig API to get the current contents of the VPN Server configuration and save it to file. You can then edit these contents in a regular text editor and then use the SetConfig API to rewrite the contents to the VPN Server. This API is for people with a detailed knowledge of the VPN Server and if an incorrectly configured configuration file is written to the VPN Server, it not only could cause errors, it could also result in the lost of the current setting data. Take special care when carrying out this action. To call this API, you must have VPN Server administrator privileges. */\r\n        this.SetConfig = function (in_param) {\r\n            return _this.CallAsync(\"SetConfig\", in_param);\r\n        };\r\n        /** Get Virtual Hub Administration Option default values. */\r\n        this.GetDefaultHubAdminOptions = function (in_param) {\r\n            return _this.CallAsync(\"GetDefaultHubAdminOptions\", in_param);\r\n        };\r\n        /** Get List of Virtual Hub Administration Options. Use this to get a list of Virtual Hub administration options that are set on the currently managed Virtual Hub. The purpose of the Virtual Hub administration options is for the VPN Server Administrator to set limits for the setting ranges when the administration of the Virtual Hub is to be trusted to each Virtual Hub administrator. Only an administrator with administration privileges for this entire VPN Server is able to add, edit and delete the Virtual Hub administration options. The Virtual Hub administrators are unable to make changes to the administration options, however they are able to view them. There is an exception however. If allow_hub_admin_change_option is set to \"1\", even Virtual Hub administrators are able to edit the administration options. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster member. */\r\n        this.GetHubAdminOptions = function (in_param) {\r\n            return _this.CallAsync(\"GetHubAdminOptions\", in_param);\r\n        };\r\n        /** Set Values of Virtual Hub Administration Options. Use this to change the values of Virtual Hub administration options that are set on the currently managed Virtual Hub. The purpose of the Virtual Hub administration options is for the VPN Server Administrator to set limits for the setting ranges when the administration of the Virtual Hub is to be trusted to each Virtual Hub administrator. Only an administrator with administration privileges for this entire VPN Server is able to add, edit and delete the Virtual Hub administration options. The Virtual Hub administrators are unable to make changes to the administration options, however they are able to view them. There is an exception however. If allow_hub_admin_change_option is set to \"1\", even Virtual Hub administrators are able to edit the administration options. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster member. */\r\n        this.SetHubAdminOptions = function (in_param) {\r\n            return _this.CallAsync(\"SetHubAdminOptions\", in_param);\r\n        };\r\n        /** Get List of Virtual Hub Extended Options. Use this to get a Virtual Hub Extended Options List that is set on the currently managed Virtual Hub. Virtual Hub Extended Option enables you to configure more detail settings of the Virtual Hub. By default, both VPN Server's global administrators and individual Virtual Hub's administrators can modify the Virtual Hub Extended Options. However, if the deny_hub_admin_change_ext_option is set to 1 on the Virtual Hub Admin Options, the individual Virtual Hub's administrators cannot modify the Virtual Hub Extended Options. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster member. */\r\n        this.GetHubExtOptions = function (in_param) {\r\n            return _this.CallAsync(\"GetHubExtOptions\", in_param);\r\n        };\r\n        /** Set a Value of Virtual Hub Extended Options. Use this to set a value in the Virtual Hub Extended Options List that is set on the currently managed Virtual Hub. Virtual Hub Extended Option enables you to configure more detail settings of the Virtual Hub. By default, both VPN Server's global administrators and individual Virtual Hub's administrators can modify the Virtual Hub Extended Options. However, if the deny_hub_admin_change_ext_option is set to 1 on the Virtual Hub Admin Options, the individual Virtual Hub's administrators cannot modify the Virtual Hub Extended Options. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster member. */\r\n        this.SetHubExtOptions = function (in_param) {\r\n            return _this.CallAsync(\"SetHubExtOptions\", in_param);\r\n        };\r\n        /** Define New Virtual Layer 3 Switch. Use this to define a new Virtual Layer 3 Switch on the VPN Server. To call this API, you must have VPN Server administrator privileges. Also, this API does not operate on VPN Bridge. [Explanation on Virtual Layer 3 Switch Function] You can define Virtual Layer 3 Switches between multiple Virtual Hubs operating on this VPN Server and configure routing between different IP networks. [Caution about the Virtual Layer 3 Switch Function] The Virtual Layer 3 Switch functions are provided for network administrators and other people who know a lot about networks and IP routing. If you are using the regular VPN functions, you do not need to use the Virtual Layer 3 Switch functions. If the Virtual Layer 3 Switch functions are to be used, the person who configures them must have sufficient knowledge of IP routing and be perfectly capable of not impacting the network. */\r\n        this.AddL3Switch = function (in_param) {\r\n            return _this.CallAsync(\"AddL3Switch\", in_param);\r\n        };\r\n        /** Delete Virtual Layer 3 Switch. Use this to delete an existing Virtual Layer 3 Switch that is defined on the VPN Server. When the specified Virtual Layer 3 Switch is operating, it will be automatically deleted after operation stops. To get a list of existing Virtual Layer 3 Switches, use the EnumL3Switch API. To call this API, you must have VPN Server administrator privileges. Also, this API does not operate on VPN Bridge. */\r\n        this.DelL3Switch = function (in_param) {\r\n            return _this.CallAsync(\"DelL3Switch\", in_param);\r\n        };\r\n        /** Get List of Virtual Layer 3 Switches. Use this to define a new Virtual Layer 3 Switch on the VPN Server. To call this API, you must have VPN Server administrator privileges. Also, this API does not operate on VPN Bridge. [Explanation on Virtual Layer 3 Switch Function] You can define Virtual Layer 3 Switches between multiple Virtual Hubs operating on this VPN Server and configure routing between different IP networks. [Caution about the Virtual Layer 3 Switch Function] The Virtual Layer 3 Switch functions are provided for network administrators and other people who know a lot about networks and IP routing. If you are using the regular VPN functions, you do not need to use the Virtual Layer 3 Switch functions. If the Virtual Layer 3 Switch functions are to be used, the person who configures them must have sufficient knowledge of IP routing and be perfectly capable of not impacting the network. */\r\n        this.EnumL3Switch = function () {\r\n            return _this.CallAsync(\"EnumL3Switch\", new VpnRpcEnumL3Sw());\r\n        };\r\n        /** Start Virtual Layer 3 Switch Operation. Use this to start the operation of an existing Virtual Layer 3 Switch defined on the VPN Server whose operation is currently stopped. To get a list of existing Virtual Layer 3 Switches, use the EnumL3Switch API. To call this API, you must have VPN Server administrator privileges. Also, this API does not operate on VPN Bridge. [Explanation on Virtual Layer 3 Switch Function] You can define Virtual Layer 3 Switches between multiple Virtual Hubs operating on this VPN Server and configure routing between different IP networks. [Caution about the Virtual Layer 3 Switch Function] The Virtual Layer 3 Switch functions are provided for network administrators and other people who know a lot about networks and IP routing. If you are using the regular VPN functions, you do not need to use the Virtual Layer 3 Switch functions. If the Virtual Layer 3 Switch functions are to be used, the person who configures them must have sufficient knowledge of IP routing and be perfectly capable of not impacting the network. */\r\n        this.StartL3Switch = function (in_param) {\r\n            return _this.CallAsync(\"StartL3Switch\", in_param);\r\n        };\r\n        /** Stop Virtual Layer 3 Switch Operation. Use this to stop the operation of an existing Virtual Layer 3 Switch defined on the VPN Server whose operation is currently operating. To get a list of existing Virtual Layer 3 Switches, use the EnumL3Switch API. To call this API, you must have VPN Server administrator privileges. */\r\n        this.StopL3Switch = function (in_param) {\r\n            return _this.CallAsync(\"StopL3Switch\", in_param);\r\n        };\r\n        /** Add Virtual Interface to Virtual Layer 3 Switch. Use this to add to a specified Virtual Layer 3 Switch, a virtual interface that connects to a Virtual Hub operating on the same VPN Server. You can define multiple virtual interfaces and routing tables for a single Virtual Layer 3 Switch. A virtual interface is associated to a virtual Hub and operates as a single IP host on the Virtual Hub when that Virtual Hub is operating. When multiple virtual interfaces that respectively belong to a different IP network of a different Virtual Hub are defined, IP routing will be automatically performed between these interfaces. You must define the IP network space that the virtual interface belongs to and the IP address of the interface itself. Also, you must specify the name of the Virtual Hub that the interface will connect to. You can specify a Virtual Hub that currently doesn't exist for the Virtual Hub name. The virtual interface must have one IP address in the Virtual Hub. You also must specify the subnet mask of an IP network that the IP address belongs to. Routing via the Virtual Layer 3 Switches of IP spaces of multiple virtual Hubs operates based on the IP address is specified here. To call this API, you must have VPN Server administrator privileges. Also, this API does not operate on VPN Bridge. To execute this API, the target Virtual Layer 3 Switch must be stopped. If it is not stopped, first use the StopL3Switch API to stop it and then execute this API. */\r\n        this.AddL3If = function (in_param) {\r\n            return _this.CallAsync(\"AddL3If\", in_param);\r\n        };\r\n        /** Delete Virtual Interface of Virtual Layer 3 Switch. Use this to delete a virtual interface already defined in the specified Virtual Layer 3 Switch. You can get a list of the virtual interfaces currently defined, by using the EnumL3If API. To call this API, you must have VPN Server administrator privileges. Also, this API does not operate on VPN Bridge. To execute this API, the target Virtual Layer 3 Switch must be stopped. If it is not stopped, first use the StopL3Switch API to stop it and then execute this API. */\r\n        this.DelL3If = function (in_param) {\r\n            return _this.CallAsync(\"DelL3If\", in_param);\r\n        };\r\n        /** Get List of Interfaces Registered on the Virtual Layer 3 Switch. Use this to get a list of virtual interfaces when virtual interfaces have been defined on a specified Virtual Layer 3 Switch. You can define multiple virtual interfaces and routing tables for a single Virtual Layer 3 Switch. A virtual interface is associated to a virtual Hub and operates as a single IP host on the Virtual Hub when that Virtual Hub is operating. When multiple virtual interfaces that respectively belong to a different IP network of a different Virtual Hub are defined, IP routing will be automatically performed between these interfaces. To call this API, you must have VPN Server administrator privileges. Also, this API does not operate on VPN Bridge. */\r\n        this.EnumL3If = function (in_param) {\r\n            return _this.CallAsync(\"EnumL3If\", in_param);\r\n        };\r\n        /** Add Routing Table Entry for Virtual Layer 3 Switch. Here you can add a new routing table entry to the routing table of the specified Virtual Layer 3 Switch. If the destination IP address of the IP packet does not belong to any IP network that belongs to a virtual interface, the IP routing engine of the Virtual Layer 3 Switch will reference the routing table and execute routing. You must specify the contents of the routing table entry to be added to the Virtual Layer 3 Switch. You must specify any IP address that belongs to the same IP network in the virtual interface of this Virtual Layer 3 Switch as the gateway address. To call this API, you must have VPN Server administrator privileges. Also, this API does not operate on VPN Bridge. To execute this API, the target Virtual Layer 3 Switch must be stopped. If it is not stopped, first use the StopL3Switch API to stop it and then execute this API. */\r\n        this.AddL3Table = function (in_param) {\r\n            return _this.CallAsync(\"AddL3Table\", in_param);\r\n        };\r\n        /** Delete Routing Table Entry of Virtual Layer 3 Switch. Use this to delete a routing table entry that is defined in the specified Virtual Layer 3 Switch. You can get a list of the already defined routing table entries by using the EnumL3Table API. To call this API, you must have VPN Server administrator privileges. Also, this API does not operate on VPN Bridge. To execute this API, the target Virtual Layer 3 Switch must be stopped. If it is not stopped, first use the StopL3Switch API to stop it and then execute this API. */\r\n        this.DelL3Table = function (in_param) {\r\n            return _this.CallAsync(\"DelL3Table\", in_param);\r\n        };\r\n        /** Get List of Routing Tables of Virtual Layer 3 Switch. Use this to get a list of routing tables when routing tables have been defined on a specified Virtual Layer 3 Switch. If the destination IP address of the IP packet does not belong to any IP network that belongs to a virtual interface, the IP routing engine of the Virtual Layer 3 Switch will reference this routing table and execute routing. To call this API, you must have VPN Server administrator privileges. Also, this API does not operate on VPN Bridge. */\r\n        this.EnumL3Table = function (in_param) {\r\n            return _this.CallAsync(\"EnumL3Table\", in_param);\r\n        };\r\n        /** Get List of Certificates Revocation List. Use this to get a Certificates Revocation List that is set on the currently managed Virtual Hub. By registering certificates in the Certificates Revocation List, the clients who provide these certificates will be unable to connect to this Virtual Hub using certificate authentication mode. Normally with this function, in cases where the security of a private key has been compromised or where a person holding a certificate has been stripped of their privileges, by registering that certificate as invalid on the Virtual Hub, it is possible to deny user authentication when that certificate is used by a client to connect to the Virtual Hub. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n        this.EnumCrl = function (in_param) {\r\n            return _this.CallAsync(\"EnumCrl\", in_param);\r\n        };\r\n        /** Add a Revoked Certificate. Use this to add a new revoked certificate definition in the Certificate Revocation List that is set on the currently managed Virtual Hub. Specify the contents to be registered in the Certificate Revocation List by using the parameters of this API. When a user connects to a Virtual Hub in certificate authentication mode and that certificate matches 1 or more of the contents registered in the certificates revocation list, the user is denied connection. A certificate that matches all the conditions that are defined by the parameters specified by this API will be judged as invalid. The items that can be set are as follows: Name (CN), Organization (O), Organization Unit (OU), Country (C), State (ST), Locale (L), Serial Number (hexadecimal), MD5 Digest Value (hexadecimal, 128 bit), and SHA-1 Digest Value (hexadecimal, 160 bit). For the specification of a digest value (hash value) a certificate is optionally specified depending on the circumstances. Normally when a MD5 or SHA-1 digest value is input, it is not necessary to input the other items. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n        this.AddCrl = function (in_param) {\r\n            return _this.CallAsync(\"AddCrl\", in_param);\r\n        };\r\n        /** Delete a Revoked Certificate. Use this to specify and delete a revoked certificate definition from the certificate revocation list that is set on the currently managed Virtual Hub. To get the list of currently registered revoked certificate definitions, use the EnumCrl API. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n        this.DelCrl = function (in_param) {\r\n            return _this.CallAsync(\"DelCrl\", in_param);\r\n        };\r\n        /** Get a Revoked Certificate. Use this to specify and get the contents of a revoked certificate definition from the Certificates Revocation List that is set on the currently managed Virtual Hub. To get the list of currently registered revoked certificate definitions, use the EnumCrl API. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n        this.GetCrl = function (in_param) {\r\n            return _this.CallAsync(\"GetCrl\", in_param);\r\n        };\r\n        /** Change Existing CRL (Certificate Revocation List) Entry. Use this to alter an existing revoked certificate definition in the Certificate Revocation List that is set on the currently managed Virtual Hub. Specify the contents to be registered in the Certificate Revocation List by using the parameters of this API. When a user connects to a Virtual Hub in certificate authentication mode and that certificate matches 1 or more of the contents registered in the certificates revocation list, the user is denied connection. A certificate that matches all the conditions that are defined by the parameters specified by this API will be judged as invalid. The items that can be set are as follows: Name (CN), Organization (O), Organization Unit (OU), Country (C), State (ST), Locale (L), Serial Number (hexadecimal), MD5 Digest Value (hexadecimal, 128 bit), and SHA-1 Digest Value (hexadecimal, 160 bit). For the specification of a digest value (hash value) a certificate is optionally specified depending on the circumstances. Normally when a MD5 or SHA-1 digest value is input, it is not necessary to input the other items. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n        this.SetCrl = function (in_param) {\r\n            return _this.CallAsync(\"SetCrl\", in_param);\r\n        };\r\n        /** Add Rule to Source IP Address Limit List. Use this to add a new rule to the Source IP Address Limit List that is set on the currently managed Virtual Hub. The items set here will be used to decide whether to allow or deny connection from a VPN Client when this client attempts connection to the Virtual Hub. You can specify a client IP address, or IP address or mask to match the rule as the contents of the rule item. By specifying an IP address only, there will only be one specified computer that will match the rule, but by specifying an IP net mask address or subnet mask address, all the computers in the range of that subnet will match the rule. You can specify the priority for the rule. You can specify an integer of 1 or greater for the priority and the smaller the number, the higher the priority. To get a list of the currently registered Source IP Address Limit List, use the GetAcList API. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n        this.SetAcList = function (in_param) {\r\n            return _this.CallAsync(\"SetAcList\", in_param);\r\n        };\r\n        /** Get List of Rule Items of Source IP Address Limit List. Use this to get a list of Source IP Address Limit List rules that is set on the currently managed Virtual Hub. You can allow or deny VPN connections to this Virtual Hub according to the client computer's source IP address. You can define multiple rules and set a priority for each rule. The search proceeds from the rule with the highest order or priority and based on the action of the rule that the IP address first matches, the connection from the client is either allowed or denied. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n        this.GetAcList = function (in_param) {\r\n            return _this.CallAsync(\"GetAcList\", in_param);\r\n        };\r\n        /** Get List of Log Files. Use this to display a list of log files outputted by the VPN Server that have been saved on the VPN Server computer. By specifying a log file file name displayed here and calling it using the ReadLogFile API you can download the contents of the log file. If you are connected to the VPN Server in server admin mode, you can display or download the packet logs and security logs of all Virtual Hubs and the server log of the VPN Server. When connected in Virtual Hub Admin Mode, you are able to view or download only the packet log and security log of the Virtual Hub that is the target of management. */\r\n        this.EnumLogFile = function () {\r\n            return _this.CallAsync(\"EnumLogFile\", new VpnRpcEnumLogFile());\r\n        };\r\n        /** Download a part of Log File. Use this to download the log file that is saved on the VPN Server computer. To download the log file first get the list of log files using the EnumLogFile API and then download the log file using the ReadLogFile API. If you are connected to the VPN Server in server admin mode, you can display or download the packet logs and security logs of all Virtual Hubs and the server log of the VPN Server. When connected in Virtual Hub Admin Mode, you are able to view or download only the packet log and security log of the Virtual Hub that is the target of management. */\r\n        this.ReadLogFile = function (in_param) {\r\n            return _this.CallAsync(\"ReadLogFile\", in_param);\r\n        };\r\n        /** Set syslog Send Function. Use this to set the usage of syslog send function and which syslog server to use. */\r\n        this.SetSysLog = function (in_param) {\r\n            return _this.CallAsync(\"SetSysLog\", in_param);\r\n        };\r\n        /** Get syslog Send Function. This allows you to get the current setting contents of the syslog send function. You can get the usage setting of the syslog function and the host name and port number of the syslog server to use. */\r\n        this.GetSysLog = function (in_param) {\r\n            return _this.CallAsync(\"GetSysLog\", in_param);\r\n        };\r\n        /** Set Today's Message of Virtual Hub. The message will be displayed on VPN Client UI when a user will establish a connection to the Virtual Hub. */\r\n        this.SetHubMsg = function (in_param) {\r\n            return _this.CallAsync(\"SetHubMsg\", in_param);\r\n        };\r\n        /** Get Today's Message of Virtual Hub. The message will be displayed on VPN Client UI when a user will establish a connection to the Virtual Hub. */\r\n        this.GetHubMsg = function (in_param) {\r\n            return _this.CallAsync(\"GetHubMsg\", in_param);\r\n        };\r\n        /** Raise a vital error on the VPN Server / Bridge to terminate the process forcefully. This API will raise a fatal error (memory access violation) on the VPN Server / Bridge running process in order to crash the process. As the result, VPN Server / Bridge will be terminated and restarted if it is running as a service mode. If the VPN Server is running as a user mode, the process will not automatically restarted. This API is for a situation when the VPN Server / Bridge is under a non-recoverable error or the process is in an infinite loop. This API will disconnect all VPN Sessions on the VPN Server / Bridge. All unsaved settings in the memory of VPN Server / Bridge will be lost. Before run this API, call the Flush API to try to save volatile data to the configuration file. To execute this API, you must have VPN Server / VPN Bridge administrator privileges. */\r\n        this.Crash = function (in_param) {\r\n            return _this.CallAsync(\"Crash\", in_param);\r\n        };\r\n        /** Get the message for administrators. */\r\n        this.GetAdminMsg = function () {\r\n            return _this.CallAsync(\"GetAdminMsg\", new VpnRpcMsg());\r\n        };\r\n        /** Save All Volatile Data of VPN Server / Bridge to the Configuration File. The number of configuration file bytes will be returned as the \"IntValue\" parameter. Normally, the VPN Server / VPN Bridge retains the volatile configuration data in memory. It is flushed to the disk as vpn_server.config or vpn_bridge.config periodically. The period is 300 seconds (5 minutes) by default. (The period can be altered by modifying the AutoSaveConfigSpan item in the configuration file.) The data will be saved on the timing of shutting down normally of the VPN Server / Bridge. Execute the Flush API to make the VPN Server / Bridge save the settings to the file immediately. The setting data will be stored on the disk drive of the server computer. Use the Flush API in a situation that you do not have an enough time to shut down the server process normally. To call this API, you must have VPN Server administrator privileges. To execute this API, you must have VPN Server / VPN Bridge administrator privileges. */\r\n        this.Flush = function (in_param) {\r\n            return _this.CallAsync(\"Flush\", in_param);\r\n        };\r\n        /** Enable or Disable IPsec VPN Server Function. Enable or Disable IPsec VPN Server Function on the VPN Server. If you enable this function, Virtual Hubs on the VPN Server will be able to accept Remote-Access VPN connections from L2TP-compatible PCs, Mac OS X and Smartphones, and also can accept EtherIP Site-to-Site VPN Connection. VPN Connections from Smartphones suchlike iPhone, iPad and Android, and also from native VPN Clients on Mac OS X and Windows can be accepted. To call this API, you must have VPN Server administrator privileges. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n        this.SetIPsecServices = function (in_param) {\r\n            return _this.CallAsync(\"SetIPsecServices\", in_param);\r\n        };\r\n        /** Get the Current IPsec VPN Server Settings. Get and view the current IPsec VPN Server settings on the VPN Server. To call this API, you must have VPN Server administrator privileges. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n        this.GetIPsecServices = function () {\r\n            return _this.CallAsync(\"GetIPsecServices\", new VpnIPsecServices());\r\n        };\r\n        /** Add New EtherIP / L2TPv3 over IPsec Client Setting to Accept EthreIP / L2TPv3 Client Devices. Add a new setting entry to enable the EtherIP / L2TPv3 over IPsec Server Function to accept client devices. In order to accept connections from routers by the EtherIP / L2TPv3 over IPsec Server Function, you have to define the relation table between an IPsec Phase 1 string which is presented by client devices of EtherIP / L2TPv3 over IPsec compatible router, and the designation of the destination Virtual Hub. After you add a definition entry by AddEtherIpId API, the defined connection setting to the Virtual Hub will be applied on the login-attepting session from an EtherIP / L2TPv3 over IPsec client device. The username and password in an entry must be registered on the Virtual Hub. An EtherIP / L2TPv3 client will be regarded as it connected the Virtual HUB with the identification of the above user information. To call this API, you must have VPN Server administrator privileges. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n        this.AddEtherIpId = function (in_param) {\r\n            return _this.CallAsync(\"AddEtherIpId\", in_param);\r\n        };\r\n        /** Get the Current List of EtherIP / L2TPv3 Client Device Entry Definitions. This API gets and shows the list of entries to accept VPN clients by EtherIP / L2TPv3 over IPsec Function. To call this API, you must have VPN Server administrator privileges. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n        this.GetEtherIpId = function (in_param) {\r\n            return _this.CallAsync(\"GetEtherIpId\", in_param);\r\n        };\r\n        /** Delete an EtherIP / L2TPv3 over IPsec Client Setting. This API deletes an entry to accept VPN clients by EtherIP / L2TPv3 over IPsec Function. To call this API, you must have VPN Server administrator privileges. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n        this.DeleteEtherIpId = function (in_param) {\r\n            return _this.CallAsync(\"DeleteEtherIpId\", in_param);\r\n        };\r\n        /** Get the Current List of EtherIP / L2TPv3 Client Device Entry Definitions. This API gets and shows the list of entries to accept VPN clients by EtherIP / L2TPv3 over IPsec Function. To call this API, you must have VPN Server administrator privileges. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n        this.EnumEtherIpId = function () {\r\n            return _this.CallAsync(\"EnumEtherIpId\", new VpnRpcEnumEtherIpId());\r\n        };\r\n        /** Set Settings for OpenVPN Clone Server Function. The VPN Server has the clone functions of OpenVPN software products by OpenVPN Technologies, Inc. Any OpenVPN Clients can connect to this VPN Server. The manner to specify a username to connect to the Virtual Hub, and the selection rule of default Hub by using this clone server functions are same to the IPsec Server functions. To call this API, you must have VPN Server administrator privileges. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n        this.SetOpenVpnSstpConfig = function (in_param) {\r\n            return _this.CallAsync(\"SetOpenVpnSstpConfig\", in_param);\r\n        };\r\n        /** Get the Current Settings of OpenVPN Clone Server Function. Get and show the current settings of OpenVPN Clone Server Function. To call this API, you must have VPN Server administrator privileges. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n        this.GetOpenVpnSstpConfig = function () {\r\n            return _this.CallAsync(\"GetOpenVpnSstpConfig\", new VpnOpenVpnSstpConfig());\r\n        };\r\n        /** Show the Current Status of Dynamic DNS Function. Get and show the current status of the Dynamic DNS function. The Dynamic DNS assigns a unique and permanent DNS hostname for this VPN Server. You can use that hostname to specify this VPN Server on the settings for VPN Client and VPN Bridge. You need not to register and keep a domain name. Also, if your ISP assignes you a dynamic (not-fixed) IP address, the corresponding IP address of your Dynamic DNS hostname will be automatically changed. It enables you to keep running the VPN Server by using only a dynamic IP address. Therefore, you need not any longer to keep static global IP addresses with expenses monthly costs. [Caution] To disable the Dynamic DNS Function, modify the configuration file of VPN Server. The \"declare root\" directive has the \"declare DDnsClient\" directive. In this directive, you can switch \"bool Disable\" from false to true, and reboot the VPN Server, then the Dynamic DNS Function will be disabled. To call this API, you must have VPN Server administrator privileges. This API cannot be invoked on VPN Bridge. */\r\n        this.GetDDnsClientStatus = function () {\r\n            return _this.CallAsync(\"GetDDnsClientStatus\", new VpnDDnsClientStatus());\r\n        };\r\n        /** Set the Dynamic DNS Hostname. You must specify the new hostname on the StrValue_str field. You can use this API to change the hostname assigned by the Dynamic DNS function. The currently assigned hostname can be showen by the GetDDnsClientStatus API. The Dynamic DNS assigns a unique and permanent DNS hostname for this VPN Server. You can use that hostname to specify this VPN Server on the settings for VPN Client and VPN Bridge. You need not to register and keep a domain name. Also, if your ISP assignes you a dynamic (not-fixed) IP address, the corresponding IP address of your Dynamic DNS hostname will be automatically changed. It enables you to keep running the VPN Server by using only a dynamic IP address. Therefore, you need not any longer to keep static global IP addresses with expenses monthly costs. [Caution] To disable the Dynamic DNS Function, modify the configuration file of VPN Server. The \"declare root\" directive has the \"declare DDnsClient\" directive. In this directive, you can switch \"bool Disable\" from false to true, and reboot the VPN Server, then the Dynamic DNS Function will be disabled. To call this API, you must have VPN Server administrator privileges. This API cannot be invoked on VPN Bridge. */\r\n        this.ChangeDDnsClientHostname = function (in_param) {\r\n            return _this.CallAsync(\"ChangeDDnsClientHostname\", in_param);\r\n        };\r\n        /** Generate New Self-Signed Certificate with Specified CN (Common Name) and Register on VPN Server. You can specify the new CN (common name) value on the StrValue_str field. You can use this API to replace the current certificate on the VPN Server to a new self-signed certificate which has the CN (Common Name) value in the fields. This API is convenient if you are planning to use Microsoft SSTP VPN Clone Server Function. Because of the value of CN (Common Name) on the SSL certificate of VPN Server must match to the hostname specified on the SSTP VPN client. This API will delete the existing SSL certificate of the VPN Server. It is recommended to backup the current SSL certificate and private key by using the GetServerCert API beforehand. To call this API, you must have VPN Server administrator privileges. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n        this.RegenerateServerCert = function (in_param) {\r\n            return _this.CallAsync(\"RegenerateServerCert\", in_param);\r\n        };\r\n        /** Generate a Sample Setting File for OpenVPN Client. Originally, the OpenVPN Client requires a user to write a very difficult configuration file manually. This API helps you to make a useful configuration sample. What you need to generate the configuration file for the OpenVPN Client is to run this API. To call this API, you must have VPN Server administrator privileges. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n        this.MakeOpenVpnConfigFile = function () {\r\n            return _this.CallAsync(\"MakeOpenVpnConfigFile\", new VpnRpcReadLogFile());\r\n        };\r\n        /** Enable / Disable the VPN over ICMP / VPN over DNS Server Function. You can establish a VPN only with ICMP or DNS packets even if there is a firewall or routers which blocks TCP/IP communications. You have to enable the following functions beforehand. Warning: Use this function for emergency only. It is helpful when a firewall or router is misconfigured to blocks TCP/IP, but either ICMP or DNS is not blocked. It is not for long-term stable using. To call this API, you must have VPN Server administrator privileges. This API cannot be invoked on VPN Bridge. */\r\n        this.SetSpecialListener = function (in_param) {\r\n            return _this.CallAsync(\"SetSpecialListener\", in_param);\r\n        };\r\n        /** Get Current Setting of the VPN over ICMP / VPN over DNS Function. Get and show the current VPN over ICMP / VPN over DNS Function status. To call this API, you must have VPN Server administrator privileges. This API cannot be invoked on VPN Bridge. */\r\n        this.GetSpecialListener = function () {\r\n            return _this.CallAsync(\"GetSpecialListener\", new VpnRpcSpecialListener());\r\n        };\r\n        /** Show the current status of VPN Azure function. Get and show the current status of the VPN Azure function. VPN Azure makes it easier to establish a VPN Session from your home PC to your office PC. While a VPN connection is established, you can access to any other servers on the private network of your company. You don't need a global IP address on the office PC (VPN Server). It can work behind firewalls or NATs. No network administrator's configuration required. You can use the built-in SSTP-VPN Client of Windows in your home PC. VPN Azure is a cloud VPN service operated by SoftEther Corporation. VPN Azure is free of charge and available to anyone. Visit http://www.vpnazure.net/ to see details and how-to-use instructions. The VPN Azure hostname is same to the hostname of the Dynamic DNS setting, but altering the domain suffix to \"vpnazure.net\". To change the hostname use the ChangeDDnsClientHostname API. To call this API, you must have VPN Server administrator privileges. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n        this.GetAzureStatus = function () {\r\n            return _this.CallAsync(\"GetAzureStatus\", new VpnRpcAzureStatus());\r\n        };\r\n        /** Enable / Disable VPN Azure Function. Enable or disable the VPN Azure function. VPN Azure makes it easier to establish a VPN Session from your home PC to your office PC. While a VPN connection is established, you can access to any other servers on the private network of your company. You don't need a global IP address on the office PC (VPN Server). It can work behind firewalls or NATs. No network administrator's configuration required. You can use the built-in SSTP-VPN Client of Windows in your home PC. VPN Azure is a cloud VPN service operated by SoftEther Corporation. VPN Azure is free of charge and available to anyone. Visit http://www.vpnazure.net/ to see details and how-to-use instructions. The VPN Azure hostname is same to the hostname of the Dynamic DNS setting, but altering the domain suffix to \"vpnazure.net\". To change the hostname use the ChangeDDnsClientHostname API. To call this API, you must have VPN Server administrator privileges. This API cannot be invoked on VPN Bridge. You cannot execute this API for Virtual Hubs of VPN Servers operating as a cluster. */\r\n        this.SetAzureStatus = function (in_param) {\r\n            return _this.CallAsync(\"SetAzureStatus\", in_param);\r\n        };\r\n        /** Get the Proxy Settings for Connecting to the DDNS server. */\r\n        this.GetDDnsInternetSettng = function () {\r\n            return _this.CallAsync(\"GetDDnsInternetSettng\", new VpnInternetSetting());\r\n        };\r\n        /** Set the Proxy Settings for Connecting to the DDNS server. */\r\n        this.SetDDnsInternetSettng = function (in_param) {\r\n            return _this.CallAsync(\"SetDDnsInternetSettng\", in_param);\r\n        };\r\n        /** Set the VPN Gate Server Configuration. This API is valid for Win32 binary distribution of the Stable Edition of SoftEther VPN Server. */\r\n        this.SetVgsConfig = function (in_param) {\r\n            return _this.CallAsync(\"SetVgsConfig\", in_param);\r\n        };\r\n        /** Get the VPN Gate Server Configuration. This API is valid for Win32 binary distribution of the Stable Edition of SoftEther VPN Server. */\r\n        this.GetVgsConfig = function () {\r\n            return _this.CallAsync(\"GetVgsConfig\", new VpnVgsConfig());\r\n        };\r\n        var headers = {};\r\n        var send_credentials = false;\r\n        nodejs_https_client_reject_untrusted_server_cert = is_null(nodejs_https_client_reject_untrusted_server_cert) ? false : nodejs_https_client_reject_untrusted_server_cert;\r\n        if (is_null(vpnserver_hostname)) {\r\n            this.rpc_url = \"/api/\";\r\n            send_credentials = true;\r\n        }\r\n        else {\r\n            if (is_null(vpnserver_port))\r\n                vpnserver_port = 443;\r\n            this.rpc_url = \"https://\" + vpnserver_hostname + \":\" + vpnserver_port + \"/api/\";\r\n            headers[\"X-VPNADMIN-HUBNAME\"] = is_null(hubname) ? \"\" : hubname;\r\n            headers[\"X-VPNADMIN-PASSWORD\"] = is_null(password) ? \"\" : password;\r\n        }\r\n        if (is_null(nodejs_https_client_reject_untrusted_server_cert))\r\n            nodejs_https_client_reject_untrusted_server_cert = false;\r\n        this.rpc_client = new JsonRpcClient(this.rpc_url, headers, send_credentials, nodejs_https_client_reject_untrusted_server_cert);\r\n    }\r\n    /** Determine if this JavaScript environment is on the Node.js or not. */\r\n    VpnServerRpc.IsNodeJS = function () {\r\n        return is_node_js;\r\n    };\r\n    /** Set the debug mode flag */\r\n    VpnServerRpc.SetDebugMode = function (flag) {\r\n        debug_mode = flag;\r\n    };\r\n    // -- Utility functions --\r\n    /** Call a RPC procedure */\r\n    VpnServerRpc.prototype.CallAsync = function (method_name, request) {\r\n        return __awaiter(this, void 0, void 0, function () {\r\n            var response;\r\n            return __generator(this, function (_a) {\r\n                switch (_a.label) {\r\n                    case 0: return [4 /*yield*/, this.rpc_client.CallAsync(method_name, request)];\r\n                    case 1:\r\n                        response = _a.sent();\r\n                        return [2 /*return*/, response];\r\n                }\r\n            });\r\n        });\r\n    };\r\n    return VpnServerRpc;\r\n}());\r\nexports.VpnServerRpc = VpnServerRpc;\r\n// --- Types ---\r\n/** IP Protocol Numbers */\r\nvar VpnIpProtocolNumber;\r\n(function (VpnIpProtocolNumber) {\r\n    /** ICMP for IPv4 */\r\n    VpnIpProtocolNumber[VpnIpProtocolNumber[\"ICMPv4\"] = 1] = \"ICMPv4\";\r\n    /** TCP */\r\n    VpnIpProtocolNumber[VpnIpProtocolNumber[\"TCP\"] = 6] = \"TCP\";\r\n    /** UDP */\r\n    VpnIpProtocolNumber[VpnIpProtocolNumber[\"UDP\"] = 17] = \"UDP\";\r\n    /** ICMP for IPv6 */\r\n    VpnIpProtocolNumber[VpnIpProtocolNumber[\"ICMPv6\"] = 58] = \"ICMPv6\";\r\n})(VpnIpProtocolNumber = exports.VpnIpProtocolNumber || (exports.VpnIpProtocolNumber = {}));\r\n/** The body of the Access list */\r\nvar VpnAccess = /** @class */ (function () {\r\n    /** Constructor for the 'VpnAccess' class: The body of the Access list */\r\n    function VpnAccess(init) {\r\n        /** ID */\r\n        this.Id_u32 = 0;\r\n        /** Specify a description (note) for this rule */\r\n        this.Note_utf = \"\";\r\n        /** Enabled flag (true: enabled, false: disabled) */\r\n        this.Active_bool = false;\r\n        /** Specify an integer of 1 or higher to indicate the priority of the rule. Higher priority is given to rules with the lower priority values. */\r\n        this.Priority_u32 = 0;\r\n        /** The flag if the rule is DISCARD operation or PASS operation. When a packet matches this rule condition, this operation is decided. When the operation of the rule is PASS, the packet is allowed to pass, otherwise the packet will be discarded. */\r\n        this.Discard_bool = false;\r\n        /** The flag if the rule is for IPv6. Specify false for IPv4, or specify true for IPv6. */\r\n        this.IsIPv6_bool = false;\r\n        /** Valid only if the rule is IPv4 mode (IsIPv6_bool == false). Specify a source IPv4 address as a rule condition. You must also specify the SrcSubnetMask_ip field. */\r\n        this.SrcIpAddress_ip = \"\";\r\n        /** Valid only if the rule is IPv4 mode (IsIPv6_bool == false). Specify a source IPv4 subnet mask as a rule condition. \"0.0.0.0\" means all hosts. \"255.255.255.255\" means one single host. */\r\n        this.SrcSubnetMask_ip = \"\";\r\n        /** Valid only if the rule is IPv4 mode (IsIPv6_bool == false). Specify a destination IPv4 address as a rule condition. You must also specify the DestSubnetMask_ip field. */\r\n        this.DestIpAddress_ip = \"\";\r\n        /** Valid only if the rule is IPv4 mode (IsIPv6_bool == false). Specify a destination IPv4 subnet mask as a rule condition. \"0.0.0.0\" means all hosts. \"255.255.255.255\" means one single host. */\r\n        this.DestSubnetMask_ip = \"\";\r\n        /** Valid only if the rule is IPv6 mode (IsIPv6_bool == true). Specify a source IPv6 address as a rule condition. The field must be a byte array of 16 bytes (128 bits) to contain the IPv6 address in binary form. You must also specify the SrcSubnetMask6_bin field. */\r\n        this.SrcIpAddress6_bin = new Uint8Array([]);\r\n        /** Valid only if the rule is IPv6 mode (IsIPv6_bool == true). Specify a source IPv6 subnet mask as a rule condition. The field must be a byte array of 16 bytes (128 bits) to contain the IPv6 subnet mask in binary form. */\r\n        this.SrcSubnetMask6_bin = new Uint8Array([]);\r\n        /** Valid only if the rule is IPv6 mode (IsIPv6_bool == true). Specify a destination IPv6 address as a rule condition. The field must be a byte array of 16 bytes (128 bits) to contain the IPv6 address in binary form. You must also specify the DestSubnetMask6_bin field. */\r\n        this.DestIpAddress6_bin = new Uint8Array([]);\r\n        /** Valid only if the rule is IPv6 mode (IsIPv6_bool == true). Specify a destination IPv6 subnet mask as a rule condition. The field must be a byte array of 16 bytes (128 bits) to contain the IPv6 subnet mask in binary form. */\r\n        this.DestSubnetMask6_bin = new Uint8Array([]);\r\n        /** The IP protocol number */\r\n        this.Protocol_u32 = 0;\r\n        /** The Start Value of the Source Port Number Range. If the specified protocol is TCP/IP or UDP/IP, specify the source port number as the rule condition. Protocols other than this will be ignored. When this parameter is not specified, the rules will apply to all port numbers. */\r\n        this.SrcPortStart_u32 = 0;\r\n        /** The End Value of the Source Port Number Range. If the specified protocol is TCP/IP or UDP/IP, specify the source port number as the rule condition. Protocols other than this will be ignored. When this parameter is not specified, the rules will apply to all port numbers. */\r\n        this.SrcPortEnd_u32 = 0;\r\n        /** The Start Value of the Destination Port Number Range. If the specified protocol is TCP/IP or UDP/IP, specify the destination port number as the rule condition. Protocols other than this will be ignored. When this parameter is not specified, the rules will apply to all port numbers. */\r\n        this.DestPortStart_u32 = 0;\r\n        /** The End Value of the Destination Port Number Range. If the specified protocol is TCP/IP or UDP/IP, specify the destination port number as the rule condition. Protocols other than this will be ignored. When this parameter is not specified, the rules will apply to all port numbers. */\r\n        this.DestPortEnd_u32 = 0;\r\n        /** Source user name. You can apply this rule to only the packets sent by a user session of a user name that has been specified as a rule condition. In this case, specify the user name. */\r\n        this.SrcUsername_str = \"\";\r\n        /** Destination user name. You can apply this rule to only the packets received by a user session of a user name that has been specified as a rule condition. In this case, specify the user name. */\r\n        this.DestUsername_str = \"\";\r\n        /** Specify true if you want to check the source MAC address. */\r\n        this.CheckSrcMac_bool = false;\r\n        /** Source MAC address (6 bytes), valid only if CheckSrcMac_bool == true. */\r\n        this.SrcMacAddress_bin = new Uint8Array([]);\r\n        /** Source MAC address mask (6 bytes), valid only if CheckSrcMac_bool == true. */\r\n        this.SrcMacMask_bin = new Uint8Array([]);\r\n        /** Specify true if you want to check the destination MAC address. */\r\n        this.CheckDstMac_bool = false;\r\n        /** Destination MAC address (6 bytes), valid only if CheckSrcMac_bool == true. */\r\n        this.DstMacAddress_bin = new Uint8Array([]);\r\n        /** Destination MAC address mask (6 bytes), valid only if CheckSrcMac_bool == true. */\r\n        this.DstMacMask_bin = new Uint8Array([]);\r\n        /** Specify true if you want to check the state of the TCP connection. */\r\n        this.CheckTcpState_bool = false;\r\n        /** Valid only if CheckTcpState_bool == true. Set this field true to match only TCP-established packets. Set this field false to match only TCP-non established packets. */\r\n        this.Established_bool = false;\r\n        /** Set this value to generate delays when packets is passing. Specify the delay period in milliseconds. Specify 0 means no delays to generate. The delays must be 10000 milliseconds at most. */\r\n        this.Delay_u32 = 0;\r\n        /** Set this value to generate jitters when packets is passing. Specify the ratio of fluctuation of jitters within 0% to 100% range. Specify 0 means no jitters to generate. */\r\n        this.Jitter_u32 = 0;\r\n        /** Set this value to generate packet losses when packets is passing. Specify the ratio of packet losses within 0% to 100% range. Specify 0 means no packet losses to generate. */\r\n        this.Loss_u32 = 0;\r\n        /** The specified URL will be mandatory replied to the client as a response for TCP connecting request packets which matches the conditions of this access list entry via this Virtual Hub. To use this setting, you can enforce the web browser of the VPN Client computer to show the specified web site when that web browser tries to access the specific IP address. */\r\n        this.RedirectUrl_str = \"\";\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnAccess;\r\n}());\r\nexports.VpnAccess = VpnAccess;\r\n/** Add an item to Access List */\r\nvar VpnRpcAddAccess = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcAddAccess' class: Add an item to Access List */\r\n    function VpnRpcAddAccess(init) {\r\n        /** The Virtual Hub name */\r\n        this.HubName_str = \"\";\r\n        /** Access list (Must be a single item) */\r\n        this.AccessListSingle = [];\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcAddAccess;\r\n}());\r\nexports.VpnRpcAddAccess = VpnRpcAddAccess;\r\n/** Add CA to HUB */\r\nvar VpnRpcHubAddCA = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcHubAddCA' class: Add CA to HUB */\r\n    function VpnRpcHubAddCA(init) {\r\n        /** The Virtual Hub name */\r\n        this.HubName_str = \"\";\r\n        /** The body of the X.509 certificate */\r\n        this.Cert_bin = new Uint8Array([]);\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcHubAddCA;\r\n}());\r\nexports.VpnRpcHubAddCA = VpnRpcHubAddCA;\r\n/** CRL entry */\r\nvar VpnRpcCrl = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcCrl' class: CRL entry */\r\n    function VpnRpcCrl(init) {\r\n        /** The Virtual Hub name */\r\n        this.HubName_str = \"\";\r\n        /** Key ID */\r\n        this.Key_u32 = 0;\r\n        /** CN, optional */\r\n        this.CommonName_utf = \"\";\r\n        /** O, optional */\r\n        this.Organization_utf = \"\";\r\n        /** OU, optional */\r\n        this.Unit_utf = \"\";\r\n        /** C, optional */\r\n        this.Country_utf = \"\";\r\n        /** ST, optional */\r\n        this.State_utf = \"\";\r\n        /** L, optional */\r\n        this.Local_utf = \"\";\r\n        /** Serial, optional */\r\n        this.Serial_bin = new Uint8Array([]);\r\n        /** MD5 Digest, optional */\r\n        this.DigestMD5_bin = new Uint8Array([]);\r\n        /** SHA1 Digest, optional */\r\n        this.DigestSHA1_bin = new Uint8Array([]);\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcCrl;\r\n}());\r\nexports.VpnRpcCrl = VpnRpcCrl;\r\n/** EtherIP key list entry */\r\nvar VpnEtherIpId = /** @class */ (function () {\r\n    /** Constructor for the 'VpnEtherIpId' class: EtherIP key list entry */\r\n    function VpnEtherIpId(init) {\r\n        /** Specify an ISAKMP Phase 1 ID. The ID must be exactly same as a ID in the configuration of the EtherIP / L2TPv3 Client. You can specify IP address as well as characters as ID, if the EtherIP Client uses IP address as Phase 1 ID. If you specify '*' (asterisk), it will be a wildcard to match any clients which doesn't match other explicit rules. */\r\n        this.Id_str = \"\";\r\n        /** Specify the name of the Virtual Hub to connect. */\r\n        this.HubName_str = \"\";\r\n        /** Specify the username to login to the destination Virtual Hub. */\r\n        this.UserName_str = \"\";\r\n        /** Specify the password to login to the destination Virtual Hub. */\r\n        this.Password_str = \"\";\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnEtherIpId;\r\n}());\r\nexports.VpnEtherIpId = VpnEtherIpId;\r\n/** Layer-3 virtual interface */\r\nvar VpnRpcL3If = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcL3If' class: Layer-3 virtual interface */\r\n    function VpnRpcL3If(init) {\r\n        /** L3 switch name */\r\n        this.Name_str = \"\";\r\n        /** Virtual HUB name */\r\n        this.HubName_str = \"\";\r\n        /** IP address */\r\n        this.IpAddress_ip = \"\";\r\n        /** Subnet mask */\r\n        this.SubnetMask_ip = \"\";\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcL3If;\r\n}());\r\nexports.VpnRpcL3If = VpnRpcL3If;\r\n/** Layer-3 switch */\r\nvar VpnRpcL3Sw = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcL3Sw' class: Layer-3 switch */\r\n    function VpnRpcL3Sw(init) {\r\n        /** Layer-3 Switch name */\r\n        this.Name_str = \"\";\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcL3Sw;\r\n}());\r\nexports.VpnRpcL3Sw = VpnRpcL3Sw;\r\n/** Routing table */\r\nvar VpnRpcL3Table = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcL3Table' class: Routing table */\r\n    function VpnRpcL3Table(init) {\r\n        /** L3 switch name */\r\n        this.Name_str = \"\";\r\n        /** Network address */\r\n        this.NetworkAddress_ip = \"\";\r\n        /** Subnet mask */\r\n        this.SubnetMask_ip = \"\";\r\n        /** Gateway address */\r\n        this.GatewayAddress_ip = \"\";\r\n        /** Metric */\r\n        this.Metric_u32 = 0;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcL3Table;\r\n}());\r\nexports.VpnRpcL3Table = VpnRpcL3Table;\r\n/** Generic parameter to contain u32, u64, ascii_string and unicode string */\r\nvar VpnRpcTest = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcTest' class: Generic parameter to contain u32, u64, ascii_string and unicode string */\r\n    function VpnRpcTest(init) {\r\n        /** A 32-bit integer field */\r\n        this.IntValue_u32 = 0;\r\n        /** A 64-bit integer field */\r\n        this.Int64Value_u64 = 0;\r\n        /** An Ascii string field */\r\n        this.StrValue_str = \"\";\r\n        /** An UTF-8 string field */\r\n        this.UniStrValue_utf = \"\";\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcTest;\r\n}());\r\nexports.VpnRpcTest = VpnRpcTest;\r\n/** Local Bridge list item */\r\nvar VpnRpcLocalBridge = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcLocalBridge' class: Local Bridge list item */\r\n    function VpnRpcLocalBridge(init) {\r\n        /** Physical Ethernet device name */\r\n        this.DeviceName_str = \"\";\r\n        /** The Virtual Hub name */\r\n        this.HubNameLB_str = \"\";\r\n        /** Online flag */\r\n        this.Online_bool = false;\r\n        /** Running flag */\r\n        this.Active_bool = false;\r\n        /** Specify true if you are using a tap device rather than a network adapter for the bridge destination (only supported for Linux versions). */\r\n        this.TapMode_bool = false;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcLocalBridge;\r\n}());\r\nexports.VpnRpcLocalBridge = VpnRpcLocalBridge;\r\n/** Create, configure, and get the group */\r\nvar VpnRpcSetGroup = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcSetGroup' class: Create, configure, and get the group */\r\n    function VpnRpcSetGroup(init) {\r\n        /** The Virtual Hub name */\r\n        this.HubName_str = \"\";\r\n        /** The group name */\r\n        this.Name_str = \"\";\r\n        /** Optional real name (full name) of the group, allow using any Unicode characters */\r\n        this.Realname_utf = \"\";\r\n        /** Optional, specify a description of the group */\r\n        this.Note_utf = \"\";\r\n        /** Number of broadcast packets (Recv) */\r\n        this[\"Recv.BroadcastBytes_u64\"] = 0;\r\n        /** Broadcast bytes (Recv) */\r\n        this[\"Recv.BroadcastCount_u64\"] = 0;\r\n        /** Unicast count (Recv) */\r\n        this[\"Recv.UnicastBytes_u64\"] = 0;\r\n        /** Unicast bytes (Recv) */\r\n        this[\"Recv.UnicastCount_u64\"] = 0;\r\n        /** Number of broadcast packets (Send) */\r\n        this[\"Send.BroadcastBytes_u64\"] = 0;\r\n        /** Broadcast bytes (Send) */\r\n        this[\"Send.BroadcastCount_u64\"] = 0;\r\n        /** Unicast bytes (Send) */\r\n        this[\"Send.UnicastBytes_u64\"] = 0;\r\n        /** Unicast bytes (Send) */\r\n        this[\"Send.UnicastCount_u64\"] = 0;\r\n        /** The flag whether to use security policy */\r\n        this.UsePolicy_bool = false;\r\n        /** Security policy: Allow Access. The users, which this policy value is true, have permission to make VPN connection to VPN Server. */\r\n        this[\"policy:Access_bool\"] = false;\r\n        /** Security policy: Filter DHCP Packets (IPv4). All IPv4 DHCP packets in sessions defined this policy will be filtered. */\r\n        this[\"policy:DHCPFilter_bool\"] = false;\r\n        /** Security policy: Disallow DHCP Server Operation (IPv4). Computers connected to sessions that have this policy setting will not be allowed to become a DHCP server and distribute IPv4 addresses to DHCP clients. */\r\n        this[\"policy:DHCPNoServer_bool\"] = false;\r\n        /** Security policy: Enforce DHCP Allocated IP Addresses (IPv4). Computers in sessions that have this policy setting will only be able to use IPv4 addresses allocated by a DHCP server on the virtual network side. */\r\n        this[\"policy:DHCPForce_bool\"] = false;\r\n        /** Security policy: Deny Bridge Operation. Bridge-mode connections are denied for user sessions that have this policy setting. Even in cases when the Ethernet Bridge is configured in the client side, communication will not be possible. */\r\n        this[\"policy:NoBridge_bool\"] = false;\r\n        /** Security policy: Deny Routing Operation (IPv4). IPv4 routing will be denied for sessions that have this policy setting. Even in the case where the IP router is operating on the user client side, communication will not be possible. */\r\n        this[\"policy:NoRouting_bool\"] = false;\r\n        /** Security policy: Deny MAC Addresses Duplication. The use of duplicating MAC addresses that are in use by computers of different sessions cannot be used by sessions with this policy setting. */\r\n        this[\"policy:CheckMac_bool\"] = false;\r\n        /** Security policy: Deny IP Address Duplication (IPv4). The use of duplicating IPv4 addresses that are in use by computers of different sessions cannot be used by sessions with this policy setting. */\r\n        this[\"policy:CheckIP_bool\"] = false;\r\n        /** Security policy: Deny Non-ARP / Non-DHCP / Non-ICMPv6 broadcasts. The sending or receiving of broadcast packets that are not ARP protocol, DHCP protocol, nor ICMPv6 on the virtual network will not be allowed for sessions with this policy setting. */\r\n        this[\"policy:ArpDhcpOnly_bool\"] = false;\r\n        /** Security policy: Privacy Filter Mode. All direct communication between sessions with the privacy filter mode policy setting will be filtered. */\r\n        this[\"policy:PrivacyFilter_bool\"] = false;\r\n        /** Security policy: Deny Operation as TCP/IP Server (IPv4). Computers of sessions with this policy setting can't listen and accept TCP/IP connections in IPv4. */\r\n        this[\"policy:NoServer_bool\"] = false;\r\n        /** Security policy: Unlimited Number of Broadcasts. If a computer of a session with this policy setting sends broadcast packets of a number unusually larger than what would be considered normal on the virtual network, there will be no automatic limiting. */\r\n        this[\"policy:NoBroadcastLimiter_bool\"] = false;\r\n        /** Security policy: Allow Monitoring Mode. Users with this policy setting will be granted to connect to the Virtual Hub in Monitoring Mode. Sessions in Monitoring Mode are able to monitor (tap) all packets flowing through the Virtual Hub. */\r\n        this[\"policy:MonitorPort_bool\"] = false;\r\n        /** Security policy: Maximum Number of TCP Connections. For sessions with this policy setting, this sets the maximum number of physical TCP connections consists in a physical VPN session. */\r\n        this[\"policy:MaxConnection_u32\"] = 0;\r\n        /** Security policy: Time-out Period. For sessions with this policy setting, this sets, in seconds, the time-out period to wait before disconnecting a session when communication trouble occurs between the VPN Client / VPN Server. */\r\n        this[\"policy:TimeOut_u32\"] = 0;\r\n        /** Security policy: Maximum Number of MAC Addresses. For sessions with this policy setting, this limits the number of MAC addresses per session. */\r\n        this[\"policy:MaxMac_u32\"] = 0;\r\n        /** Security policy: Maximum Number of IP Addresses (IPv4). For sessions with this policy setting, this specifies the number of IPv4 addresses that can be registered for a single session. */\r\n        this[\"policy:MaxIP_u32\"] = 0;\r\n        /** Security policy: Upload Bandwidth. For sessions with this policy setting, this limits the traffic bandwidth that is in the inwards direction from outside to inside the Virtual Hub. */\r\n        this[\"policy:MaxUpload_u32\"] = 0;\r\n        /** Security policy: Download Bandwidth. For sessions with this policy setting, this limits the traffic bandwidth that is in the outwards direction from inside the Virtual Hub to outside the Virtual Hub. */\r\n        this[\"policy:MaxDownload_u32\"] = 0;\r\n        /** Security policy: Deny Changing Password. The users which use password authentication with this policy setting are not allowed to change their own password from the VPN Client Manager or similar. */\r\n        this[\"policy:FixPassword_bool\"] = false;\r\n        /** Security policy: Maximum Number of Multiple Logins. Users with this policy setting are unable to have more than this number of concurrent logins. Bridge Mode sessions are not subjects to this policy. */\r\n        this[\"policy:MultiLogins_u32\"] = 0;\r\n        /** Security policy: Deny VoIP / QoS Function. Users with this security policy are unable to use VoIP / QoS functions in VPN connection sessions. */\r\n        this[\"policy:NoQoS_bool\"] = false;\r\n        /** Security policy: Filter RS / RA Packets (IPv6). All ICMPv6 packets which the message-type is 133 (Router Solicitation) or 134 (Router Advertisement) in sessions defined this policy will be filtered. As a result, an IPv6 client will be unable to use IPv6 address prefix auto detection and IPv6 default gateway auto detection. */\r\n        this[\"policy:RSandRAFilter_bool\"] = false;\r\n        /** Security policy: Filter RA Packets (IPv6). All ICMPv6 packets which the message-type is 134 (Router Advertisement) in sessions defined this policy will be filtered. As a result, a malicious users will be unable to spread illegal IPv6 prefix or default gateway advertisements on the network. */\r\n        this[\"policy:RAFilter_bool\"] = false;\r\n        /** Security policy: Filter DHCP Packets (IPv6). All IPv6 DHCP packets in sessions defined this policy will be filtered. */\r\n        this[\"policy:DHCPv6Filter_bool\"] = false;\r\n        /** Security policy: Disallow DHCP Server Operation (IPv6). Computers connected to sessions that have this policy setting will not be allowed to become a DHCP server and distribute IPv6 addresses to DHCP clients. */\r\n        this[\"policy:DHCPv6NoServer_bool\"] = false;\r\n        /** Security policy: Deny Routing Operation (IPv6). IPv6 routing will be denied for sessions that have this policy setting. Even in the case where the IP router is operating on the user client side, communication will not be possible. */\r\n        this[\"policy:NoRoutingV6_bool\"] = false;\r\n        /** Security policy: Deny IP Address Duplication (IPv6). The use of duplicating IPv6 addresses that are in use by computers of different sessions cannot be used by sessions with this policy setting. */\r\n        this[\"policy:CheckIPv6_bool\"] = false;\r\n        /** Security policy: Deny Operation as TCP/IP Server (IPv6). Computers of sessions with this policy setting can't listen and accept TCP/IP connections in IPv6. */\r\n        this[\"policy:NoServerV6_bool\"] = false;\r\n        /** Security policy: Maximum Number of IP Addresses (IPv6). For sessions with this policy setting, this specifies the number of IPv6 addresses that can be registered for a single session. */\r\n        this[\"policy:MaxIPv6_u32\"] = 0;\r\n        /** Security policy: Disallow Password Save in VPN Client. For users with this policy setting, when the user is using *standard* password authentication, the user will be unable to save the password in VPN Client. The user will be required to input passwords for every time to connect a VPN. This will improve the security. If this policy is enabled, VPN Client Version 2.0 will be denied to access. */\r\n        this[\"policy:NoSavePassword_bool\"] = false;\r\n        /** Security policy: VPN Client Automatic Disconnect. For users with this policy setting, a user's VPN session will be disconnected automatically after the specific period will elapse. In this case no automatic re-connection will be performed. This can prevent a lot of inactive VPN Sessions. If this policy is enabled, VPN Client Version 2.0 will be denied to access. */\r\n        this[\"policy:AutoDisconnect_u32\"] = 0;\r\n        /** Security policy: Filter All IPv4 Packets. All IPv4 and ARP packets in sessions defined this policy will be filtered. */\r\n        this[\"policy:FilterIPv4_bool\"] = false;\r\n        /** Security policy: Filter All IPv6 Packets. All IPv6 packets in sessions defined this policy will be filtered. */\r\n        this[\"policy:FilterIPv6_bool\"] = false;\r\n        /** Security policy: Filter All Non-IP Packets. All non-IP packets in sessions defined this policy will be filtered. \"Non-IP packet\" mean a packet which is not IPv4, ARP nor IPv6. Any tagged-VLAN packets via the Virtual Hub will be regarded as non-IP packets. */\r\n        this[\"policy:FilterNonIP_bool\"] = false;\r\n        /** Security policy: No Default-Router on IPv6 RA. In all VPN Sessions defines this policy, any IPv6 RA (Router Advertisement) packet with non-zero value in the router-lifetime will set to zero-value. This is effective to avoid the horrible behavior from the IPv6 routing confusion which is caused by the VPN client's attempts to use the remote-side IPv6 router as its local IPv6 router. */\r\n        this[\"policy:NoIPv6DefaultRouterInRA_bool\"] = false;\r\n        /** Security policy: No Default-Router on IPv6 RA (physical IPv6). In all VPN Sessions defines this policy (only when the physical communication protocol between VPN Client / VPN Bridge and VPN Server is IPv6), any IPv6 RA (Router Advertisement) packet with non-zero value in the router-lifetime will set to zero-value. This is effective to avoid the horrible behavior from the IPv6 routing confusion which is caused by the VPN client's attempts to use the remote-side IPv6 router as its local IPv6 router. */\r\n        this[\"policy:NoIPv6DefaultRouterInRAWhenIPv6_bool\"] = false;\r\n        /** Security policy: VLAN ID (IEEE802.1Q). You can specify the VLAN ID on the security policy. All VPN Sessions defines this policy, all Ethernet packets toward the Virtual Hub from the user will be inserted a VLAN tag (IEEE 802.1Q) with the VLAN ID. The user can also receive only packets with a VLAN tag which has the same VLAN ID. (Receiving process removes the VLAN tag automatically.) Any Ethernet packets with any other VLAN IDs or non-VLAN packets will not be received. All VPN Sessions without this policy definition can send / receive any kinds of Ethernet packets regardless of VLAN tags, and VLAN tags are not inserted or removed automatically. Any tagged-VLAN packets via the Virtual Hub will be regarded as non-IP packets. Therefore, tagged-VLAN packets are not subjects for IPv4 / IPv6 security policies, access lists nor other IPv4 / IPv6 specific deep processing. */\r\n        this[\"policy:VLanId_u32\"] = 0;\r\n        /** Security policy: Whether version 3.0 (must be true) */\r\n        this[\"policy:Ver3_bool\"] = false;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcSetGroup;\r\n}());\r\nexports.VpnRpcSetGroup = VpnRpcSetGroup;\r\n/** Hub types */\r\nvar VpnRpcHubType;\r\n(function (VpnRpcHubType) {\r\n    /** Stand-alone HUB */\r\n    VpnRpcHubType[VpnRpcHubType[\"Standalone\"] = 0] = \"Standalone\";\r\n    /** Static HUB */\r\n    VpnRpcHubType[VpnRpcHubType[\"FarmStatic\"] = 1] = \"FarmStatic\";\r\n    /** Dynamic HUB */\r\n    VpnRpcHubType[VpnRpcHubType[\"FarmDynamic\"] = 2] = \"FarmDynamic\";\r\n})(VpnRpcHubType = exports.VpnRpcHubType || (exports.VpnRpcHubType = {}));\r\n/** Create a HUB */\r\nvar VpnRpcCreateHub = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcCreateHub' class: Create a HUB */\r\n    function VpnRpcCreateHub(init) {\r\n        /** Specify the name of the Virtual Hub to create / update. */\r\n        this.HubName_str = \"\";\r\n        /** Specify an administrator password when the administrator password is going to be set for the Virtual Hub. On the update, leave it to empty string if you don't want to change the password. */\r\n        this.AdminPasswordPlainText_str = \"\";\r\n        /** Online flag */\r\n        this.Online_bool = false;\r\n        /** Maximum number of VPN sessions */\r\n        this.MaxSession_u32 = 0;\r\n        /** No Enum flag. By enabling this option, the VPN Client user will be unable to enumerate this Virtual Hub even if they send a Virtual Hub enumeration request to the VPN Server. */\r\n        this.NoEnum_bool = false;\r\n        /** Type of the Virtual Hub (Valid only for Clustered VPN Servers) */\r\n        this.HubType_u32 = 0;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcCreateHub;\r\n}());\r\nexports.VpnRpcCreateHub = VpnRpcCreateHub;\r\nvar VpnRpcClientAuthType;\r\n(function (VpnRpcClientAuthType) {\r\n    /** Anonymous authentication */\r\n    VpnRpcClientAuthType[VpnRpcClientAuthType[\"Anonymous\"] = 0] = \"Anonymous\";\r\n    /** SHA-0 hashed password authentication */\r\n    VpnRpcClientAuthType[VpnRpcClientAuthType[\"SHA0_Hashed_Password\"] = 1] = \"SHA0_Hashed_Password\";\r\n    /** Plain password authentication */\r\n    VpnRpcClientAuthType[VpnRpcClientAuthType[\"PlainPassword\"] = 2] = \"PlainPassword\";\r\n    /** Certificate authentication */\r\n    VpnRpcClientAuthType[VpnRpcClientAuthType[\"Cert\"] = 3] = \"Cert\";\r\n})(VpnRpcClientAuthType = exports.VpnRpcClientAuthType || (exports.VpnRpcClientAuthType = {}));\r\n/** Create and set of link */\r\nvar VpnRpcCreateLink = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcCreateLink' class: Create and set of link */\r\n    function VpnRpcCreateLink(init) {\r\n        /** The Virtual Hub name */\r\n        this.HubName_Ex_str = \"\";\r\n        /** Online flag */\r\n        this.Online_bool = false;\r\n        /** The flag to enable validation for the server certificate */\r\n        this.CheckServerCert_bool = false;\r\n        /** The body of server X.509 certificate to compare. Valid only if the CheckServerCert_bool flag is true. */\r\n        this.ServerCert_bin = new Uint8Array([]);\r\n        /** Client Option Parameters: Specify the name of the Cascade Connection */\r\n        this.AccountName_utf = \"\";\r\n        /** Client Option Parameters: Specify the hostname of the destination VPN Server. You can also specify by IP address. */\r\n        this.Hostname_str = \"\";\r\n        /** Client Option Parameters: Specify the port number of the destination VPN Server. */\r\n        this.Port_u32 = 0;\r\n        /** Client Option Parameters: The type of the proxy server */\r\n        this.ProxyType_u32 = 0;\r\n        /** Client Option Parameters: The hostname or IP address of the proxy server name */\r\n        this.ProxyName_str = \"\";\r\n        /** Client Option Parameters: The port number of the proxy server */\r\n        this.ProxyPort_u32 = 0;\r\n        /** Client Option Parameters: The username to connect to the proxy server */\r\n        this.ProxyUsername_str = \"\";\r\n        /** Client Option Parameters: The password to connect to the proxy server */\r\n        this.ProxyPassword_str = \"\";\r\n        /** Client Option Parameters: The Virtual Hub on the destination VPN Server */\r\n        this.HubName_str = \"\";\r\n        /** Client Option Parameters: Number of TCP Connections to Use in VPN Communication */\r\n        this.MaxConnection_u32 = 0;\r\n        /** Client Option Parameters: The flag to enable the encryption on the communication */\r\n        this.UseEncrypt_bool = false;\r\n        /** Client Option Parameters: Enable / Disable Data Compression when Communicating by Cascade Connection */\r\n        this.UseCompress_bool = false;\r\n        /** Client Option Parameters: Specify true when enabling half duplex mode. When using two or more TCP connections for VPN communication, it is possible to use Half Duplex Mode. By enabling half duplex mode it is possible to automatically fix data transmission direction as half and half for each TCP connection. In the case where a VPN using 8 TCP connections is established, for example, when half-duplex is enabled, communication can be fixes so that 4 TCP connections are dedicated to the upload direction and the other 4 connections are dedicated to the download direction. */\r\n        this.HalfConnection_bool = false;\r\n        /** Client Option Parameters: Connection attempt interval when additional connection will be established */\r\n        this.AdditionalConnectionInterval_u32 = 0;\r\n        /** Client Option Parameters: Connection Life of Each TCP Connection (0 for no keep-alive) */\r\n        this.ConnectionDisconnectSpan_u32 = 0;\r\n        /** Client Option Parameters: Disable QoS Control Function if the value is true */\r\n        this.DisableQoS_bool = false;\r\n        /** Client Option Parameters: Do not use TLS 1.x of the value is true */\r\n        this.NoTls1_bool = false;\r\n        /** Client Option Parameters: Do not use UDP acceleration mode if the value is true */\r\n        this.NoUdpAcceleration_bool = false;\r\n        /** Authentication type */\r\n        this.AuthType_u32 = 0;\r\n        /** User name */\r\n        this.Username_str = \"\";\r\n        /** SHA-0 Hashed password. Valid only if ClientAuth_AuthType_u32 == SHA0_Hashed_Password (1). The SHA-0 hashed password must be caluclated by the SHA0(UpperCase(username_ascii_string) + password_ascii_string). */\r\n        this.HashedPassword_bin = new Uint8Array([]);\r\n        /** Plaintext Password. Valid only if ClientAuth_AuthType_u32 == PlainPassword (2). */\r\n        this.PlainPassword_str = \"\";\r\n        /** Client certificate. Valid only if ClientAuth_AuthType_u32 == Cert (3). */\r\n        this.ClientX_bin = new Uint8Array([]);\r\n        /** Client private key of the certificate. Valid only if ClientAuth_AuthType_u32 == Cert (3). */\r\n        this.ClientK_bin = new Uint8Array([]);\r\n        /** Security policy: Filter DHCP Packets (IPv4). All IPv4 DHCP packets in sessions defined this policy will be filtered. */\r\n        this[\"policy:DHCPFilter_bool\"] = false;\r\n        /** Security policy: Disallow DHCP Server Operation (IPv4). Computers connected to sessions that have this policy setting will not be allowed to become a DHCP server and distribute IPv4 addresses to DHCP clients. */\r\n        this[\"policy:DHCPNoServer_bool\"] = false;\r\n        /** Security policy: Enforce DHCP Allocated IP Addresses (IPv4). Computers in sessions that have this policy setting will only be able to use IPv4 addresses allocated by a DHCP server on the virtual network side. */\r\n        this[\"policy:DHCPForce_bool\"] = false;\r\n        /** Security policy: Prohibit the duplicate MAC address */\r\n        this.SecPol_CheckMac_bool = false;\r\n        /** Security policy: Prohibit a duplicate IP address (IPv4) */\r\n        this.SecPol_CheckIP_bool = false;\r\n        /** Security policy: Deny Non-ARP / Non-DHCP / Non-ICMPv6 broadcasts. The sending or receiving of broadcast packets that are not ARP protocol, DHCP protocol, nor ICMPv6 on the virtual network will not be allowed for sessions with this policy setting. */\r\n        this[\"policy:ArpDhcpOnly_bool\"] = false;\r\n        /** Security policy: Privacy Filter Mode. All direct communication between sessions with the privacy filter mode policy setting will be filtered. */\r\n        this[\"policy:PrivacyFilter_bool\"] = false;\r\n        /** Security policy: Deny Operation as TCP/IP Server (IPv4). Computers of sessions with this policy setting can't listen and accept TCP/IP connections in IPv4. */\r\n        this[\"policy:NoServer_bool\"] = false;\r\n        /** Security policy: Unlimited Number of Broadcasts. If a computer of a session with this policy setting sends broadcast packets of a number unusually larger than what would be considered normal on the virtual network, there will be no automatic limiting. */\r\n        this[\"policy:NoBroadcastLimiter_bool\"] = false;\r\n        /** Security policy: Maximum Number of MAC Addresses. For sessions with this policy setting, this limits the number of MAC addresses per session. */\r\n        this[\"policy:MaxMac_u32\"] = 0;\r\n        /** Security policy: Maximum Number of IP Addresses (IPv4). For sessions with this policy setting, this specifies the number of IPv4 addresses that can be registered for a single session. */\r\n        this[\"policy:MaxIP_u32\"] = 0;\r\n        /** Security policy: Upload Bandwidth. For sessions with this policy setting, this limits the traffic bandwidth that is in the inwards direction from outside to inside the Virtual Hub. */\r\n        this[\"policy:MaxUpload_u32\"] = 0;\r\n        /** Security policy: Download Bandwidth. For sessions with this policy setting, this limits the traffic bandwidth that is in the outwards direction from inside the Virtual Hub to outside the Virtual Hub. */\r\n        this[\"policy:MaxDownload_u32\"] = 0;\r\n        /** Security policy: Filter RS / RA Packets (IPv6). All ICMPv6 packets which the message-type is 133 (Router Solicitation) or 134 (Router Advertisement) in sessions defined this policy will be filtered. As a result, an IPv6 client will be unable to use IPv6 address prefix auto detection and IPv6 default gateway auto detection. */\r\n        this[\"policy:RSandRAFilter_bool\"] = false;\r\n        /** Security policy: Filter the router advertisement packet (IPv6) */\r\n        this.SecPol_RAFilter_bool = false;\r\n        /** Security policy: Filter DHCP Packets (IPv6). All IPv6 DHCP packets in sessions defined this policy will be filtered. */\r\n        this[\"policy:DHCPv6Filter_bool\"] = false;\r\n        /** Security policy: Disallow DHCP Server Operation (IPv6). Computers connected to sessions that have this policy setting will not be allowed to become a DHCP server and distribute IPv6 addresses to DHCP clients. */\r\n        this[\"policy:DHCPv6NoServer_bool\"] = false;\r\n        /** Security policy: Prohibit the duplicate IP address (IPv6) */\r\n        this.SecPol_CheckIPv6_bool = false;\r\n        /** Security policy: Deny Operation as TCP/IP Server (IPv6). Computers of sessions with this policy setting can't listen and accept TCP/IP connections in IPv6. */\r\n        this[\"policy:NoServerV6_bool\"] = false;\r\n        /** Security policy: Maximum Number of IP Addresses (IPv6). For sessions with this policy setting, this specifies the number of IPv6 addresses that can be registered for a single session. */\r\n        this[\"policy:MaxIPv6_u32\"] = 0;\r\n        /** Security policy: Filter All IPv4 Packets. All IPv4 and ARP packets in sessions defined this policy will be filtered. */\r\n        this[\"policy:FilterIPv4_bool\"] = false;\r\n        /** Security policy: Filter All IPv6 Packets. All IPv6 packets in sessions defined this policy will be filtered. */\r\n        this[\"policy:FilterIPv6_bool\"] = false;\r\n        /** Security policy: Filter All Non-IP Packets. All non-IP packets in sessions defined this policy will be filtered. \"Non-IP packet\" mean a packet which is not IPv4, ARP nor IPv6. Any tagged-VLAN packets via the Virtual Hub will be regarded as non-IP packets. */\r\n        this[\"policy:FilterNonIP_bool\"] = false;\r\n        /** Security policy: No Default-Router on IPv6 RA. In all VPN Sessions defines this policy, any IPv6 RA (Router Advertisement) packet with non-zero value in the router-lifetime will set to zero-value. This is effective to avoid the horrible behavior from the IPv6 routing confusion which is caused by the VPN client's attempts to use the remote-side IPv6 router as its local IPv6 router. */\r\n        this[\"policy:NoIPv6DefaultRouterInRA_bool\"] = false;\r\n        /** Security policy: VLAN ID (IEEE802.1Q). You can specify the VLAN ID on the security policy. All VPN Sessions defines this policy, all Ethernet packets toward the Virtual Hub from the user will be inserted a VLAN tag (IEEE 802.1Q) with the VLAN ID. The user can also receive only packets with a VLAN tag which has the same VLAN ID. (Receiving process removes the VLAN tag automatically.) Any Ethernet packets with any other VLAN IDs or non-VLAN packets will not be received. All VPN Sessions without this policy definition can send / receive any kinds of Ethernet packets regardless of VLAN tags, and VLAN tags are not inserted or removed automatically. Any tagged-VLAN packets via the Virtual Hub will be regarded as non-IP packets. Therefore, tagged-VLAN packets are not subjects for IPv4 / IPv6 security policies, access lists nor other IPv4 / IPv6 specific deep processing. */\r\n        this[\"policy:VLanId_u32\"] = 0;\r\n        /** Security policy: Whether version 3.0 (must be true) */\r\n        this[\"policy:Ver3_bool\"] = false;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcCreateLink;\r\n}());\r\nexports.VpnRpcCreateLink = VpnRpcCreateLink;\r\n/** Listener */\r\nvar VpnRpcListener = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcListener' class: Listener */\r\n    function VpnRpcListener(init) {\r\n        /** Port number (Range: 1 - 65535) */\r\n        this.Port_u32 = 0;\r\n        /** Active state */\r\n        this.Enable_bool = false;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcListener;\r\n}());\r\nexports.VpnRpcListener = VpnRpcListener;\r\n/** User authentication type (server side) */\r\nvar VpnRpcUserAuthType;\r\n(function (VpnRpcUserAuthType) {\r\n    /** Anonymous authentication */\r\n    VpnRpcUserAuthType[VpnRpcUserAuthType[\"Anonymous\"] = 0] = \"Anonymous\";\r\n    /** Password authentication */\r\n    VpnRpcUserAuthType[VpnRpcUserAuthType[\"Password\"] = 1] = \"Password\";\r\n    /** User certificate authentication */\r\n    VpnRpcUserAuthType[VpnRpcUserAuthType[\"UserCert\"] = 2] = \"UserCert\";\r\n    /** Root certificate which is issued by trusted Certificate Authority */\r\n    VpnRpcUserAuthType[VpnRpcUserAuthType[\"RootCert\"] = 3] = \"RootCert\";\r\n    /** Radius authentication */\r\n    VpnRpcUserAuthType[VpnRpcUserAuthType[\"Radius\"] = 4] = \"Radius\";\r\n    /** Windows NT authentication */\r\n    VpnRpcUserAuthType[VpnRpcUserAuthType[\"NTDomain\"] = 5] = \"NTDomain\";\r\n})(VpnRpcUserAuthType = exports.VpnRpcUserAuthType || (exports.VpnRpcUserAuthType = {}));\r\n/** Create, configure, and get the user */\r\nvar VpnRpcSetUser = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcSetUser' class: Create, configure, and get the user */\r\n    function VpnRpcSetUser(init) {\r\n        /** The Virtual Hub name */\r\n        this.HubName_str = \"\";\r\n        /** Specify the user name of the user */\r\n        this.Name_str = \"\";\r\n        /** Assigned group name for the user */\r\n        this.GroupName_str = \"\";\r\n        /** Optional real name (full name) of the user, allow using any Unicode characters */\r\n        this.Realname_utf = \"\";\r\n        /** Optional User Description */\r\n        this.Note_utf = \"\";\r\n        /** Creation date and time */\r\n        this.CreatedTime_dt = new Date();\r\n        /** Last modified date and time */\r\n        this.UpdatedTime_dt = new Date();\r\n        /** Expiration date and time */\r\n        this.ExpireTime_dt = new Date();\r\n        /** Authentication method of the user */\r\n        this.AuthType_u32 = 0;\r\n        /** User password, valid only if AuthType_u32 == Password(1). Valid only to create or set operations. */\r\n        this.Auth_Password_str = \"\";\r\n        /** User certificate, valid only if AuthType_u32 == UserCert(2). */\r\n        this.UserX_bin = new Uint8Array([]);\r\n        /** Certificate Serial Number, optional, valid only if AuthType_u32 == RootCert(3). */\r\n        this.Serial_bin = new Uint8Array([]);\r\n        /** Certificate Common Name, optional, valid only if AuthType_u32 == RootCert(3). */\r\n        this.CommonName_utf = \"\";\r\n        /** Username in RADIUS server, optional, valid only if AuthType_u32 == Radius(4). */\r\n        this.RadiusUsername_utf = \"\";\r\n        /** Username in NT Domain server, optional, valid only if AuthType_u32 == NT(5). */\r\n        this.NtUsername_utf = \"\";\r\n        /** Number of total logins of the user */\r\n        this.NumLogin_u32 = 0;\r\n        /** Number of broadcast packets (Recv) */\r\n        this[\"Recv.BroadcastBytes_u64\"] = 0;\r\n        /** Broadcast bytes (Recv) */\r\n        this[\"Recv.BroadcastCount_u64\"] = 0;\r\n        /** Unicast count (Recv) */\r\n        this[\"Recv.UnicastBytes_u64\"] = 0;\r\n        /** Unicast bytes (Recv) */\r\n        this[\"Recv.UnicastCount_u64\"] = 0;\r\n        /** Number of broadcast packets (Send) */\r\n        this[\"Send.BroadcastBytes_u64\"] = 0;\r\n        /** Broadcast bytes (Send) */\r\n        this[\"Send.BroadcastCount_u64\"] = 0;\r\n        /** Unicast bytes (Send) */\r\n        this[\"Send.UnicastBytes_u64\"] = 0;\r\n        /** Unicast bytes (Send) */\r\n        this[\"Send.UnicastCount_u64\"] = 0;\r\n        /** The flag whether to use security policy */\r\n        this.UsePolicy_bool = false;\r\n        /** Security policy: Allow Access. The users, which this policy value is true, have permission to make VPN connection to VPN Server. */\r\n        this[\"policy:Access_bool\"] = false;\r\n        /** Security policy: Filter DHCP Packets (IPv4). All IPv4 DHCP packets in sessions defined this policy will be filtered. */\r\n        this[\"policy:DHCPFilter_bool\"] = false;\r\n        /** Security policy: Disallow DHCP Server Operation (IPv4). Computers connected to sessions that have this policy setting will not be allowed to become a DHCP server and distribute IPv4 addresses to DHCP clients. */\r\n        this[\"policy:DHCPNoServer_bool\"] = false;\r\n        /** Security policy: Enforce DHCP Allocated IP Addresses (IPv4). Computers in sessions that have this policy setting will only be able to use IPv4 addresses allocated by a DHCP server on the virtual network side. */\r\n        this[\"policy:DHCPForce_bool\"] = false;\r\n        /** Security policy: Deny Bridge Operation. Bridge-mode connections are denied for user sessions that have this policy setting. Even in cases when the Ethernet Bridge is configured in the client side, communication will not be possible. */\r\n        this[\"policy:NoBridge_bool\"] = false;\r\n        /** Security policy: Deny Routing Operation (IPv4). IPv4 routing will be denied for sessions that have this policy setting. Even in the case where the IP router is operating on the user client side, communication will not be possible. */\r\n        this[\"policy:NoRouting_bool\"] = false;\r\n        /** Security policy: Deny MAC Addresses Duplication. The use of duplicating MAC addresses that are in use by computers of different sessions cannot be used by sessions with this policy setting. */\r\n        this[\"policy:CheckMac_bool\"] = false;\r\n        /** Security policy: Deny IP Address Duplication (IPv4). The use of duplicating IPv4 addresses that are in use by computers of different sessions cannot be used by sessions with this policy setting. */\r\n        this[\"policy:CheckIP_bool\"] = false;\r\n        /** Security policy: Deny Non-ARP / Non-DHCP / Non-ICMPv6 broadcasts. The sending or receiving of broadcast packets that are not ARP protocol, DHCP protocol, nor ICMPv6 on the virtual network will not be allowed for sessions with this policy setting. */\r\n        this[\"policy:ArpDhcpOnly_bool\"] = false;\r\n        /** Security policy: Privacy Filter Mode. All direct communication between sessions with the privacy filter mode policy setting will be filtered. */\r\n        this[\"policy:PrivacyFilter_bool\"] = false;\r\n        /** Security policy: Deny Operation as TCP/IP Server (IPv4). Computers of sessions with this policy setting can't listen and accept TCP/IP connections in IPv4. */\r\n        this[\"policy:NoServer_bool\"] = false;\r\n        /** Security policy: Unlimited Number of Broadcasts. If a computer of a session with this policy setting sends broadcast packets of a number unusually larger than what would be considered normal on the virtual network, there will be no automatic limiting. */\r\n        this[\"policy:NoBroadcastLimiter_bool\"] = false;\r\n        /** Security policy: Allow Monitoring Mode. Users with this policy setting will be granted to connect to the Virtual Hub in Monitoring Mode. Sessions in Monitoring Mode are able to monitor (tap) all packets flowing through the Virtual Hub. */\r\n        this[\"policy:MonitorPort_bool\"] = false;\r\n        /** Security policy: Maximum Number of TCP Connections. For sessions with this policy setting, this sets the maximum number of physical TCP connections consists in a physical VPN session. */\r\n        this[\"policy:MaxConnection_u32\"] = 0;\r\n        /** Security policy: Time-out Period. For sessions with this policy setting, this sets, in seconds, the time-out period to wait before disconnecting a session when communication trouble occurs between the VPN Client / VPN Server. */\r\n        this[\"policy:TimeOut_u32\"] = 0;\r\n        /** Security policy: Maximum Number of MAC Addresses. For sessions with this policy setting, this limits the number of MAC addresses per session. */\r\n        this[\"policy:MaxMac_u32\"] = 0;\r\n        /** Security policy: Maximum Number of IP Addresses (IPv4). For sessions with this policy setting, this specifies the number of IPv4 addresses that can be registered for a single session. */\r\n        this[\"policy:MaxIP_u32\"] = 0;\r\n        /** Security policy: Upload Bandwidth. For sessions with this policy setting, this limits the traffic bandwidth that is in the inwards direction from outside to inside the Virtual Hub. */\r\n        this[\"policy:MaxUpload_u32\"] = 0;\r\n        /** Security policy: Download Bandwidth. For sessions with this policy setting, this limits the traffic bandwidth that is in the outwards direction from inside the Virtual Hub to outside the Virtual Hub. */\r\n        this[\"policy:MaxDownload_u32\"] = 0;\r\n        /** Security policy: Deny Changing Password. The users which use password authentication with this policy setting are not allowed to change their own password from the VPN Client Manager or similar. */\r\n        this[\"policy:FixPassword_bool\"] = false;\r\n        /** Security policy: Maximum Number of Multiple Logins. Users with this policy setting are unable to have more than this number of concurrent logins. Bridge Mode sessions are not subjects to this policy. */\r\n        this[\"policy:MultiLogins_u32\"] = 0;\r\n        /** Security policy: Deny VoIP / QoS Function. Users with this security policy are unable to use VoIP / QoS functions in VPN connection sessions. */\r\n        this[\"policy:NoQoS_bool\"] = false;\r\n        /** Security policy: Filter RS / RA Packets (IPv6). All ICMPv6 packets which the message-type is 133 (Router Solicitation) or 134 (Router Advertisement) in sessions defined this policy will be filtered. As a result, an IPv6 client will be unable to use IPv6 address prefix auto detection and IPv6 default gateway auto detection. */\r\n        this[\"policy:RSandRAFilter_bool\"] = false;\r\n        /** Security policy: Filter RA Packets (IPv6). All ICMPv6 packets which the message-type is 134 (Router Advertisement) in sessions defined this policy will be filtered. As a result, a malicious users will be unable to spread illegal IPv6 prefix or default gateway advertisements on the network. */\r\n        this[\"policy:RAFilter_bool\"] = false;\r\n        /** Security policy: Filter DHCP Packets (IPv6). All IPv6 DHCP packets in sessions defined this policy will be filtered. */\r\n        this[\"policy:DHCPv6Filter_bool\"] = false;\r\n        /** Security policy: Disallow DHCP Server Operation (IPv6). Computers connected to sessions that have this policy setting will not be allowed to become a DHCP server and distribute IPv6 addresses to DHCP clients. */\r\n        this[\"policy:DHCPv6NoServer_bool\"] = false;\r\n        /** Security policy: Deny Routing Operation (IPv6). IPv6 routing will be denied for sessions that have this policy setting. Even in the case where the IP router is operating on the user client side, communication will not be possible. */\r\n        this[\"policy:NoRoutingV6_bool\"] = false;\r\n        /** Security policy: Deny IP Address Duplication (IPv6). The use of duplicating IPv6 addresses that are in use by computers of different sessions cannot be used by sessions with this policy setting. */\r\n        this[\"policy:CheckIPv6_bool\"] = false;\r\n        /** Security policy: Deny Operation as TCP/IP Server (IPv6). Computers of sessions with this policy setting can't listen and accept TCP/IP connections in IPv6. */\r\n        this[\"policy:NoServerV6_bool\"] = false;\r\n        /** Security policy: Maximum Number of IP Addresses (IPv6). For sessions with this policy setting, this specifies the number of IPv6 addresses that can be registered for a single session. */\r\n        this[\"policy:MaxIPv6_u32\"] = 0;\r\n        /** Security policy: Disallow Password Save in VPN Client. For users with this policy setting, when the user is using *standard* password authentication, the user will be unable to save the password in VPN Client. The user will be required to input passwords for every time to connect a VPN. This will improve the security. If this policy is enabled, VPN Client Version 2.0 will be denied to access. */\r\n        this[\"policy:NoSavePassword_bool\"] = false;\r\n        /** Security policy: VPN Client Automatic Disconnect. For users with this policy setting, a user's VPN session will be disconnected automatically after the specific period will elapse. In this case no automatic re-connection will be performed. This can prevent a lot of inactive VPN Sessions. If this policy is enabled, VPN Client Version 2.0 will be denied to access. */\r\n        this[\"policy:AutoDisconnect_u32\"] = 0;\r\n        /** Security policy: Filter All IPv4 Packets. All IPv4 and ARP packets in sessions defined this policy will be filtered. */\r\n        this[\"policy:FilterIPv4_bool\"] = false;\r\n        /** Security policy: Filter All IPv6 Packets. All IPv6 packets in sessions defined this policy will be filtered. */\r\n        this[\"policy:FilterIPv6_bool\"] = false;\r\n        /** Security policy: Filter All Non-IP Packets. All non-IP packets in sessions defined this policy will be filtered. \"Non-IP packet\" mean a packet which is not IPv4, ARP nor IPv6. Any tagged-VLAN packets via the Virtual Hub will be regarded as non-IP packets. */\r\n        this[\"policy:FilterNonIP_bool\"] = false;\r\n        /** Security policy: No Default-Router on IPv6 RA. In all VPN Sessions defines this policy, any IPv6 RA (Router Advertisement) packet with non-zero value in the router-lifetime will set to zero-value. This is effective to avoid the horrible behavior from the IPv6 routing confusion which is caused by the VPN client's attempts to use the remote-side IPv6 router as its local IPv6 router. */\r\n        this[\"policy:NoIPv6DefaultRouterInRA_bool\"] = false;\r\n        /** Security policy: No Default-Router on IPv6 RA (physical IPv6). In all VPN Sessions defines this policy (only when the physical communication protocol between VPN Client / VPN Bridge and VPN Server is IPv6), any IPv6 RA (Router Advertisement) packet with non-zero value in the router-lifetime will set to zero-value. This is effective to avoid the horrible behavior from the IPv6 routing confusion which is caused by the VPN client's attempts to use the remote-side IPv6 router as its local IPv6 router. */\r\n        this[\"policy:NoIPv6DefaultRouterInRAWhenIPv6_bool\"] = false;\r\n        /** Security policy: VLAN ID (IEEE802.1Q). You can specify the VLAN ID on the security policy. All VPN Sessions defines this policy, all Ethernet packets toward the Virtual Hub from the user will be inserted a VLAN tag (IEEE 802.1Q) with the VLAN ID. The user can also receive only packets with a VLAN tag which has the same VLAN ID. (Receiving process removes the VLAN tag automatically.) Any Ethernet packets with any other VLAN IDs or non-VLAN packets will not be received. All VPN Sessions without this policy definition can send / receive any kinds of Ethernet packets regardless of VLAN tags, and VLAN tags are not inserted or removed automatically. Any tagged-VLAN packets via the Virtual Hub will be regarded as non-IP packets. Therefore, tagged-VLAN packets are not subjects for IPv4 / IPv6 security policies, access lists nor other IPv4 / IPv6 specific deep processing. */\r\n        this[\"policy:VLanId_u32\"] = 0;\r\n        /** Security policy: Whether version 3.0 (must be true) */\r\n        this[\"policy:Ver3_bool\"] = false;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcSetUser;\r\n}());\r\nexports.VpnRpcSetUser = VpnRpcSetUser;\r\n/** Delete the access list */\r\nvar VpnRpcDeleteAccess = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcDeleteAccess' class: Delete the access list */\r\n    function VpnRpcDeleteAccess(init) {\r\n        /** The Virtual Hub name */\r\n        this.HubName_str = \"\";\r\n        /** ID */\r\n        this.Id_u32 = 0;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcDeleteAccess;\r\n}());\r\nexports.VpnRpcDeleteAccess = VpnRpcDeleteAccess;\r\n/** Delete the CA of HUB */\r\nvar VpnRpcHubDeleteCA = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcHubDeleteCA' class: Delete the CA of HUB */\r\n    function VpnRpcHubDeleteCA(init) {\r\n        /** The Virtual Hub name */\r\n        this.HubName_str = \"\";\r\n        /** Certificate key id to be deleted */\r\n        this.Key_u32 = 0;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcHubDeleteCA;\r\n}());\r\nexports.VpnRpcHubDeleteCA = VpnRpcHubDeleteCA;\r\n/** Deleting a user or group */\r\nvar VpnRpcDeleteUser = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcDeleteUser' class: Deleting a user or group */\r\n    function VpnRpcDeleteUser(init) {\r\n        /** The Virtual Hub name */\r\n        this.HubName_str = \"\";\r\n        /** User or group name */\r\n        this.Name_str = \"\";\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcDeleteUser;\r\n}());\r\nexports.VpnRpcDeleteUser = VpnRpcDeleteUser;\r\n/** Delete the HUB */\r\nvar VpnRpcDeleteHub = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcDeleteHub' class: Delete the HUB */\r\n    function VpnRpcDeleteHub(init) {\r\n        /** The Virtual Hub name */\r\n        this.HubName_str = \"\";\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcDeleteHub;\r\n}());\r\nexports.VpnRpcDeleteHub = VpnRpcDeleteHub;\r\n/** Delete the table */\r\nvar VpnRpcDeleteTable = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcDeleteTable' class: Delete the table */\r\n    function VpnRpcDeleteTable(init) {\r\n        /** The Virtual Hub name */\r\n        this.HubName_str = \"\";\r\n        /** Key ID */\r\n        this.Key_u32 = 0;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcDeleteTable;\r\n}());\r\nexports.VpnRpcDeleteTable = VpnRpcDeleteTable;\r\n/** Specify the Link */\r\nvar VpnRpcLink = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcLink' class: Specify the Link */\r\n    function VpnRpcLink(init) {\r\n        /** The Virtual Hub name */\r\n        this.HubName_str = \"\";\r\n        /** The name of the cascade connection */\r\n        this.AccountName_utf = \"\";\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcLink;\r\n}());\r\nexports.VpnRpcLink = VpnRpcLink;\r\n/** Disconnect the session */\r\nvar VpnRpcDeleteSession = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcDeleteSession' class: Disconnect the session */\r\n    function VpnRpcDeleteSession(init) {\r\n        /** The Virtual Hub name */\r\n        this.HubName_str = \"\";\r\n        /** Session name */\r\n        this.Name_str = \"\";\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcDeleteSession;\r\n}());\r\nexports.VpnRpcDeleteSession = VpnRpcDeleteSession;\r\n/** Specify the HUB */\r\nvar VpnRpcHub = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcHub' class: Specify the HUB */\r\n    function VpnRpcHub(init) {\r\n        /** The Virtual Hub name */\r\n        this.HubName_str = \"\";\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcHub;\r\n}());\r\nexports.VpnRpcHub = VpnRpcHub;\r\n/** Disconnect a connection */\r\nvar VpnRpcDisconnectConnection = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcDisconnectConnection' class: Disconnect a connection */\r\n    function VpnRpcDisconnectConnection(init) {\r\n        /** Connection name */\r\n        this.Name_str = \"\";\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcDisconnectConnection;\r\n}());\r\nexports.VpnRpcDisconnectConnection = VpnRpcDisconnectConnection;\r\n/** Enumeration of the access list */\r\nvar VpnRpcEnumAccessList = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcEnumAccessList' class: Enumeration of the access list */\r\n    function VpnRpcEnumAccessList(init) {\r\n        /** The Virtual Hub name */\r\n        this.HubName_str = \"\";\r\n        /** Access list */\r\n        this.AccessList = [];\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcEnumAccessList;\r\n}());\r\nexports.VpnRpcEnumAccessList = VpnRpcEnumAccessList;\r\n/** CA enumeration items of HUB */\r\nvar VpnRpcHubEnumCAItem = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcHubEnumCAItem' class: CA enumeration items of HUB */\r\n    function VpnRpcHubEnumCAItem(init) {\r\n        /** The key id of the item */\r\n        this.Key_u32 = 0;\r\n        /** Subject */\r\n        this.SubjectName_utf = \"\";\r\n        /** Issuer */\r\n        this.IssuerName_utf = \"\";\r\n        /** Expiration date */\r\n        this.Expires_dt = new Date();\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcHubEnumCAItem;\r\n}());\r\nexports.VpnRpcHubEnumCAItem = VpnRpcHubEnumCAItem;\r\n/** CA enumeration of HUB */\r\nvar VpnRpcHubEnumCA = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcHubEnumCA' class: CA enumeration of HUB */\r\n    function VpnRpcHubEnumCA(init) {\r\n        /** The Virtual Hub name */\r\n        this.HubName_str = \"\";\r\n        /** The list of CA */\r\n        this.CAList = [];\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcHubEnumCA;\r\n}());\r\nexports.VpnRpcHubEnumCA = VpnRpcHubEnumCA;\r\n/** Type of connection */\r\nvar VpnRpcConnectionType;\r\n(function (VpnRpcConnectionType) {\r\n    /** VPN Client */\r\n    VpnRpcConnectionType[VpnRpcConnectionType[\"Client\"] = 0] = \"Client\";\r\n    /** During initialization */\r\n    VpnRpcConnectionType[VpnRpcConnectionType[\"Init\"] = 1] = \"Init\";\r\n    /** Login connection */\r\n    VpnRpcConnectionType[VpnRpcConnectionType[\"Login\"] = 2] = \"Login\";\r\n    /** Additional connection */\r\n    VpnRpcConnectionType[VpnRpcConnectionType[\"Additional\"] = 3] = \"Additional\";\r\n    /** RPC for server farm */\r\n    VpnRpcConnectionType[VpnRpcConnectionType[\"FarmRpc\"] = 4] = \"FarmRpc\";\r\n    /** RPC for Management */\r\n    VpnRpcConnectionType[VpnRpcConnectionType[\"AdminRpc\"] = 5] = \"AdminRpc\";\r\n    /** HUB enumeration */\r\n    VpnRpcConnectionType[VpnRpcConnectionType[\"EnumHub\"] = 6] = \"EnumHub\";\r\n    /** Password change */\r\n    VpnRpcConnectionType[VpnRpcConnectionType[\"Password\"] = 7] = \"Password\";\r\n    /** SSTP */\r\n    VpnRpcConnectionType[VpnRpcConnectionType[\"SSTP\"] = 8] = \"SSTP\";\r\n    /** OpenVPN */\r\n    VpnRpcConnectionType[VpnRpcConnectionType[\"OpenVPN\"] = 9] = \"OpenVPN\";\r\n})(VpnRpcConnectionType = exports.VpnRpcConnectionType || (exports.VpnRpcConnectionType = {}));\r\n/** Connection enumeration items */\r\nvar VpnRpcEnumConnectionItem = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcEnumConnectionItem' class: Connection enumeration items */\r\n    function VpnRpcEnumConnectionItem(init) {\r\n        /** Connection name */\r\n        this.Name_str = \"\";\r\n        /** Host name */\r\n        this.Hostname_str = \"\";\r\n        /** IP address */\r\n        this.Ip_ip = \"\";\r\n        /** Port number */\r\n        this.Port_u32 = 0;\r\n        /** Connected time */\r\n        this.ConnectedTime_dt = new Date();\r\n        /** Connection type */\r\n        this.Type_u32 = 0;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcEnumConnectionItem;\r\n}());\r\nexports.VpnRpcEnumConnectionItem = VpnRpcEnumConnectionItem;\r\n/** Connection enumeration */\r\nvar VpnRpcEnumConnection = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcEnumConnection' class: Connection enumeration */\r\n    function VpnRpcEnumConnection(init) {\r\n        /** Number of connections */\r\n        this.NumConnection_u32 = 0;\r\n        /** Connection list */\r\n        this.ConnectionList = [];\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcEnumConnection;\r\n}());\r\nexports.VpnRpcEnumConnection = VpnRpcEnumConnection;\r\n/** Enum CRL Item */\r\nvar VpnRpcEnumCrlItem = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcEnumCrlItem' class: Enum CRL Item */\r\n    function VpnRpcEnumCrlItem(init) {\r\n        /** Key ID */\r\n        this.Key_u32 = 0;\r\n        /** The contents of the CRL item */\r\n        this.CrlInfo_utf = \"\";\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcEnumCrlItem;\r\n}());\r\nexports.VpnRpcEnumCrlItem = VpnRpcEnumCrlItem;\r\n/** Enum CRL */\r\nvar VpnRpcEnumCrl = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcEnumCrl' class: Enum CRL */\r\n    function VpnRpcEnumCrl(init) {\r\n        /** The Virtual Hub name */\r\n        this.HubName_str = \"\";\r\n        /** CRL list */\r\n        this.CRLList = [];\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcEnumCrl;\r\n}());\r\nexports.VpnRpcEnumCrl = VpnRpcEnumCrl;\r\n/** RPC_ENUM_DHCP_ITEM */\r\nvar VpnRpcEnumDhcpItem = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcEnumDhcpItem' class: RPC_ENUM_DHCP_ITEM */\r\n    function VpnRpcEnumDhcpItem(init) {\r\n        /** ID */\r\n        this.Id_u32 = 0;\r\n        /** Lease time */\r\n        this.LeasedTime_dt = new Date();\r\n        /** Expiration date */\r\n        this.ExpireTime_dt = new Date();\r\n        /** MAC address */\r\n        this.MacAddress_bin = new Uint8Array([]);\r\n        /** IP address */\r\n        this.IpAddress_ip = \"\";\r\n        /** Subnet mask */\r\n        this.Mask_u32 = 0;\r\n        /** Host name */\r\n        this.Hostname_str = \"\";\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcEnumDhcpItem;\r\n}());\r\nexports.VpnRpcEnumDhcpItem = VpnRpcEnumDhcpItem;\r\n/** RPC_ENUM_DHCP */\r\nvar VpnRpcEnumDhcp = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcEnumDhcp' class: RPC_ENUM_DHCP */\r\n    function VpnRpcEnumDhcp(init) {\r\n        /** Virtual Hub Name */\r\n        this.HubName_str = \"\";\r\n        /** DHCP Item */\r\n        this.DhcpTable = [];\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcEnumDhcp;\r\n}());\r\nexports.VpnRpcEnumDhcp = VpnRpcEnumDhcp;\r\n/** EtherIP setting list */\r\nvar VpnRpcEnumEtherIpId = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcEnumEtherIpId' class: EtherIP setting list */\r\n    function VpnRpcEnumEtherIpId(init) {\r\n        /** Setting list */\r\n        this.Settings = [];\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcEnumEtherIpId;\r\n}());\r\nexports.VpnRpcEnumEtherIpId = VpnRpcEnumEtherIpId;\r\n/** Ethernet Network Adapters list item */\r\nvar VpnRpcEnumEthItem = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcEnumEthItem' class: Ethernet Network Adapters list item */\r\n    function VpnRpcEnumEthItem(init) {\r\n        /** Device name */\r\n        this.DeviceName_str = \"\";\r\n        /** Network connection name (description) */\r\n        this.NetworkConnectionName_utf = \"\";\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcEnumEthItem;\r\n}());\r\nexports.VpnRpcEnumEthItem = VpnRpcEnumEthItem;\r\n/** Ethernet Network Adapters list */\r\nvar VpnRpcEnumEth = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcEnumEth' class: Ethernet Network Adapters list */\r\n    function VpnRpcEnumEth(init) {\r\n        /** Ethernet Network Adapters list */\r\n        this.EthList = [];\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcEnumEth;\r\n}());\r\nexports.VpnRpcEnumEth = VpnRpcEnumEth;\r\n/** Server farm members enumeration items */\r\nvar VpnRpcEnumFarmItem = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcEnumFarmItem' class: Server farm members enumeration items */\r\n    function VpnRpcEnumFarmItem(init) {\r\n        /** ID */\r\n        this.Id_u32 = 0;\r\n        /** Controller */\r\n        this.Controller_bool = false;\r\n        /** Connection time */\r\n        this.ConnectedTime_dt = new Date();\r\n        /** IP address */\r\n        this.Ip_ip = \"\";\r\n        /** Host name */\r\n        this.Hostname_str = \"\";\r\n        /** Point */\r\n        this.Point_u32 = 0;\r\n        /** Number of sessions */\r\n        this.NumSessions_u32 = 0;\r\n        /** Number of TCP connections */\r\n        this.NumTcpConnections_u32 = 0;\r\n        /** Number of HUBs */\r\n        this.NumHubs_u32 = 0;\r\n        /** Number of assigned client licenses */\r\n        this.AssignedClientLicense_u32 = 0;\r\n        /** Number of assigned bridge licenses */\r\n        this.AssignedBridgeLicense_u32 = 0;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcEnumFarmItem;\r\n}());\r\nexports.VpnRpcEnumFarmItem = VpnRpcEnumFarmItem;\r\n/** Server farm member enumeration */\r\nvar VpnRpcEnumFarm = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcEnumFarm' class: Server farm member enumeration */\r\n    function VpnRpcEnumFarm(init) {\r\n        /** Number of Cluster Members */\r\n        this.NumFarm_u32 = 0;\r\n        /** Cluster Members list */\r\n        this.FarmMemberList = [];\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcEnumFarm;\r\n}());\r\nexports.VpnRpcEnumFarm = VpnRpcEnumFarm;\r\n/** Enumeration items in the group */\r\nvar VpnRpcEnumGroupItem = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcEnumGroupItem' class: Enumeration items in the group */\r\n    function VpnRpcEnumGroupItem(init) {\r\n        /** User name */\r\n        this.Name_str = \"\";\r\n        /** Real name */\r\n        this.Realname_utf = \"\";\r\n        /** Note */\r\n        this.Note_utf = \"\";\r\n        /** Number of users */\r\n        this.NumUsers_u32 = 0;\r\n        /** Access denied */\r\n        this.DenyAccess_bool = false;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcEnumGroupItem;\r\n}());\r\nexports.VpnRpcEnumGroupItem = VpnRpcEnumGroupItem;\r\n/** Group enumeration */\r\nvar VpnRpcEnumGroup = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcEnumGroup' class: Group enumeration */\r\n    function VpnRpcEnumGroup(init) {\r\n        /** The Virtual Hub name */\r\n        this.HubName_str = \"\";\r\n        /** Group list */\r\n        this.GroupList = [];\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcEnumGroup;\r\n}());\r\nexports.VpnRpcEnumGroup = VpnRpcEnumGroup;\r\n/** Enumeration items of HUB */\r\nvar VpnRpcEnumHubItem = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcEnumHubItem' class: Enumeration items of HUB */\r\n    function VpnRpcEnumHubItem(init) {\r\n        /** The name of the Virtual Hub */\r\n        this.HubName_str = \"\";\r\n        /** Online state */\r\n        this.Online_bool = false;\r\n        /** Type of HUB (Valid only for Clustered VPN Servers) */\r\n        this.HubType_u32 = 0;\r\n        /** Number of users */\r\n        this.NumUsers_u32 = 0;\r\n        /** Number of registered groups */\r\n        this.NumGroups_u32 = 0;\r\n        /** Number of registered sessions */\r\n        this.NumSessions_u32 = 0;\r\n        /** Number of current MAC table entries */\r\n        this.NumMacTables_u32 = 0;\r\n        /** Number of current IP table entries */\r\n        this.NumIpTables_u32 = 0;\r\n        /** Last communication date and time */\r\n        this.LastCommTime_dt = new Date();\r\n        /** Last login date and time */\r\n        this.LastLoginTime_dt = new Date();\r\n        /** Creation date and time */\r\n        this.CreatedTime_dt = new Date();\r\n        /** Number of accumulated logins */\r\n        this.NumLogin_u32 = 0;\r\n        /** Whether the traffic information is provided */\r\n        this.IsTrafficFilled_bool = false;\r\n        /** Number of broadcast packets (Recv) */\r\n        this[\"Ex.Recv.BroadcastBytes_u64\"] = 0;\r\n        /** Broadcast bytes (Recv) */\r\n        this[\"Ex.Recv.BroadcastCount_u64\"] = 0;\r\n        /** Unicast count (Recv) */\r\n        this[\"Ex.Recv.UnicastBytes_u64\"] = 0;\r\n        /** Unicast bytes (Recv) */\r\n        this[\"Ex.Recv.UnicastCount_u64\"] = 0;\r\n        /** Number of broadcast packets (Send) */\r\n        this[\"Ex.Send.BroadcastBytes_u64\"] = 0;\r\n        /** Broadcast bytes (Send) */\r\n        this[\"Ex.Send.BroadcastCount_u64\"] = 0;\r\n        /** Unicast bytes (Send) */\r\n        this[\"Ex.Send.UnicastBytes_u64\"] = 0;\r\n        /** Unicast bytes (Send) */\r\n        this[\"Ex.Send.UnicastCount_u64\"] = 0;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcEnumHubItem;\r\n}());\r\nexports.VpnRpcEnumHubItem = VpnRpcEnumHubItem;\r\n/** Enumeration of HUB */\r\nvar VpnRpcEnumHub = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcEnumHub' class: Enumeration of HUB */\r\n    function VpnRpcEnumHub(init) {\r\n        /** Number of Virtual Hubs */\r\n        this.NumHub_u32 = 0;\r\n        /** Virtual Hubs */\r\n        this.HubList = [];\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcEnumHub;\r\n}());\r\nexports.VpnRpcEnumHub = VpnRpcEnumHub;\r\n/** Enumeration items of IP table */\r\nvar VpnRpcEnumIpTableItem = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcEnumIpTableItem' class: Enumeration items of IP table */\r\n    function VpnRpcEnumIpTableItem(init) {\r\n        /** Key ID */\r\n        this.Key_u32 = 0;\r\n        /** Session name */\r\n        this.SessionName_str = \"\";\r\n        /** IP address */\r\n        this.IpAddress_ip = \"\";\r\n        /** Assigned by the DHCP */\r\n        this.DhcpAllocated_bool = false;\r\n        /** Creation date and time */\r\n        this.CreatedTime_dt = new Date();\r\n        /** Updating date */\r\n        this.UpdatedTime_dt = new Date();\r\n        /** Remote items */\r\n        this.RemoteItem_bool = false;\r\n        /** Remote host name */\r\n        this.RemoteHostname_str = \"\";\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcEnumIpTableItem;\r\n}());\r\nexports.VpnRpcEnumIpTableItem = VpnRpcEnumIpTableItem;\r\n/** Enumeration of IP table */\r\nvar VpnRpcEnumIpTable = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcEnumIpTable' class: Enumeration of IP table */\r\n    function VpnRpcEnumIpTable(init) {\r\n        /** The Virtual Hub name */\r\n        this.HubName_str = \"\";\r\n        /** MAC table */\r\n        this.IpTable = [];\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcEnumIpTable;\r\n}());\r\nexports.VpnRpcEnumIpTable = VpnRpcEnumIpTable;\r\n/** Layer-3 interface enumeration */\r\nvar VpnRpcEnumL3If = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcEnumL3If' class: Layer-3 interface enumeration */\r\n    function VpnRpcEnumL3If(init) {\r\n        /** Layer-3 switch name */\r\n        this.Name_str = \"\";\r\n        /** Layer-3 interface list */\r\n        this.L3IFList = [];\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcEnumL3If;\r\n}());\r\nexports.VpnRpcEnumL3If = VpnRpcEnumL3If;\r\n/** Layer-3 switch enumeration item */\r\nvar VpnRpcEnumL3SwItem = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcEnumL3SwItem' class: Layer-3 switch enumeration item */\r\n    function VpnRpcEnumL3SwItem(init) {\r\n        /** Name of the layer-3 switch */\r\n        this.Name_str = \"\";\r\n        /** Number of layer-3 switch virtual interfaces */\r\n        this.NumInterfaces_u32 = 0;\r\n        /** Number of routing tables */\r\n        this.NumTables_u32 = 0;\r\n        /** Activated flag */\r\n        this.Active_bool = false;\r\n        /** Online flag */\r\n        this.Online_bool = false;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcEnumL3SwItem;\r\n}());\r\nexports.VpnRpcEnumL3SwItem = VpnRpcEnumL3SwItem;\r\n/** Layer-3 switch enumeration */\r\nvar VpnRpcEnumL3Sw = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcEnumL3Sw' class: Layer-3 switch enumeration */\r\n    function VpnRpcEnumL3Sw(init) {\r\n        /** Layer-3 switch list */\r\n        this.L3SWList = [];\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcEnumL3Sw;\r\n}());\r\nexports.VpnRpcEnumL3Sw = VpnRpcEnumL3Sw;\r\n/** Routing table enumeration */\r\nvar VpnRpcEnumL3Table = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcEnumL3Table' class: Routing table enumeration */\r\n    function VpnRpcEnumL3Table(init) {\r\n        /** L3 switch name */\r\n        this.Name_str = \"\";\r\n        /** Routing table item list */\r\n        this.L3Table = [];\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcEnumL3Table;\r\n}());\r\nexports.VpnRpcEnumL3Table = VpnRpcEnumL3Table;\r\n/** Cascade Connection Enumeration */\r\nvar VpnRpcEnumLinkItem = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcEnumLinkItem' class: Cascade Connection Enumeration */\r\n    function VpnRpcEnumLinkItem(init) {\r\n        /** The name of cascade connection */\r\n        this.AccountName_utf = \"\";\r\n        /** Online flag */\r\n        this.Online_bool = false;\r\n        /** The flag indicates whether the cascade connection is established */\r\n        this.Connected_bool = false;\r\n        /** The error last occurred if the cascade connection is in the fail state */\r\n        this.LastError_u32 = 0;\r\n        /** Connection completion time */\r\n        this.ConnectedTime_dt = new Date();\r\n        /** Host name of the destination VPN server */\r\n        this.Hostname_str = \"\";\r\n        /** The Virtual Hub name */\r\n        this.TargetHubName_str = \"\";\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcEnumLinkItem;\r\n}());\r\nexports.VpnRpcEnumLinkItem = VpnRpcEnumLinkItem;\r\n/** Enumeration of the link */\r\nvar VpnRpcEnumLink = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcEnumLink' class: Enumeration of the link */\r\n    function VpnRpcEnumLink(init) {\r\n        /** The Virtual Hub name */\r\n        this.HubName_str = \"\";\r\n        /** Number of cascade connections */\r\n        this.NumLink_u32 = 0;\r\n        /** The list of cascade connections */\r\n        this.LinkList = [];\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcEnumLink;\r\n}());\r\nexports.VpnRpcEnumLink = VpnRpcEnumLink;\r\n/** List of listeners item */\r\nvar VpnRpcListenerListItem = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcListenerListItem' class: List of listeners item */\r\n    function VpnRpcListenerListItem(init) {\r\n        /** TCP port number (range: 1 - 65535) */\r\n        this.Ports_u32 = 0;\r\n        /** Active state */\r\n        this.Enables_bool = false;\r\n        /** The flag to indicate if the error occurred on the listener port */\r\n        this.Errors_bool = false;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcListenerListItem;\r\n}());\r\nexports.VpnRpcListenerListItem = VpnRpcListenerListItem;\r\n/** List of listeners */\r\nvar VpnRpcListenerList = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcListenerList' class: List of listeners */\r\n    function VpnRpcListenerList(init) {\r\n        /** List of listener items */\r\n        this.ListenerList = [];\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcListenerList;\r\n}());\r\nexports.VpnRpcListenerList = VpnRpcListenerList;\r\n/** Local Bridge enumeration */\r\nvar VpnRpcEnumLocalBridge = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcEnumLocalBridge' class: Local Bridge enumeration */\r\n    function VpnRpcEnumLocalBridge(init) {\r\n        /** Local Bridge list */\r\n        this.LocalBridgeList = [];\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcEnumLocalBridge;\r\n}());\r\nexports.VpnRpcEnumLocalBridge = VpnRpcEnumLocalBridge;\r\n/** Log file enumeration */\r\nvar VpnRpcEnumLogFileItem = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcEnumLogFileItem' class: Log file enumeration */\r\n    function VpnRpcEnumLogFileItem(init) {\r\n        /** Server name */\r\n        this.ServerName_str = \"\";\r\n        /** File path */\r\n        this.FilePath_str = \"\";\r\n        /** File size */\r\n        this.FileSize_u32 = 0;\r\n        /** Last write date */\r\n        this.UpdatedTime_dt = new Date();\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcEnumLogFileItem;\r\n}());\r\nexports.VpnRpcEnumLogFileItem = VpnRpcEnumLogFileItem;\r\n/** Log file enumeration */\r\nvar VpnRpcEnumLogFile = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcEnumLogFile' class: Log file enumeration */\r\n    function VpnRpcEnumLogFile(init) {\r\n        /** Log file list */\r\n        this.LogFiles = [];\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcEnumLogFile;\r\n}());\r\nexports.VpnRpcEnumLogFile = VpnRpcEnumLogFile;\r\n/** Enumeration items of the MAC table */\r\nvar VpnRpcEnumMacTableItem = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcEnumMacTableItem' class: Enumeration items of the MAC table */\r\n    function VpnRpcEnumMacTableItem(init) {\r\n        /** Key ID */\r\n        this.Key_u32 = 0;\r\n        /** Session name */\r\n        this.SessionName_str = \"\";\r\n        /** MAC address */\r\n        this.MacAddress_bin = new Uint8Array([]);\r\n        /** Creation date and time */\r\n        this.CreatedTime_dt = new Date();\r\n        /** Updating date */\r\n        this.UpdatedTime_dt = new Date();\r\n        /** Remote items */\r\n        this.RemoteItem_bool = false;\r\n        /** Remote host name */\r\n        this.RemoteHostname_str = \"\";\r\n        /** VLAN ID */\r\n        this.VlanId_u32 = 0;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcEnumMacTableItem;\r\n}());\r\nexports.VpnRpcEnumMacTableItem = VpnRpcEnumMacTableItem;\r\n/** Enumeration of the MAC table */\r\nvar VpnRpcEnumMacTable = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcEnumMacTable' class: Enumeration of the MAC table */\r\n    function VpnRpcEnumMacTable(init) {\r\n        /** The Virtual Hub name */\r\n        this.HubName_str = \"\";\r\n        /** MAC table */\r\n        this.MacTable = [];\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcEnumMacTable;\r\n}());\r\nexports.VpnRpcEnumMacTable = VpnRpcEnumMacTable;\r\n/** NAT Entry Protocol Number */\r\nvar VpnRpcNatProtocol;\r\n(function (VpnRpcNatProtocol) {\r\n    /** TCP */\r\n    VpnRpcNatProtocol[VpnRpcNatProtocol[\"TCP\"] = 0] = \"TCP\";\r\n    /** UDP */\r\n    VpnRpcNatProtocol[VpnRpcNatProtocol[\"UDP\"] = 1] = \"UDP\";\r\n    /** DNS */\r\n    VpnRpcNatProtocol[VpnRpcNatProtocol[\"DNS\"] = 2] = \"DNS\";\r\n    /** ICMP */\r\n    VpnRpcNatProtocol[VpnRpcNatProtocol[\"ICMP\"] = 3] = \"ICMP\";\r\n})(VpnRpcNatProtocol = exports.VpnRpcNatProtocol || (exports.VpnRpcNatProtocol = {}));\r\n/** State of NAT session (TCP) */\r\nvar VpnRpcNatTcpState;\r\n(function (VpnRpcNatTcpState) {\r\n    /** Connecting */\r\n    VpnRpcNatTcpState[VpnRpcNatTcpState[\"Connecting\"] = 0] = \"Connecting\";\r\n    /** Send the RST (Connection failure or disconnected) */\r\n    VpnRpcNatTcpState[VpnRpcNatTcpState[\"SendReset\"] = 1] = \"SendReset\";\r\n    /** Connection complete */\r\n    VpnRpcNatTcpState[VpnRpcNatTcpState[\"Connected\"] = 2] = \"Connected\";\r\n    /** Connection established */\r\n    VpnRpcNatTcpState[VpnRpcNatTcpState[\"Established\"] = 3] = \"Established\";\r\n    /** Wait for socket disconnection */\r\n    VpnRpcNatTcpState[VpnRpcNatTcpState[\"WaitDisconnect\"] = 4] = \"WaitDisconnect\";\r\n})(VpnRpcNatTcpState = exports.VpnRpcNatTcpState || (exports.VpnRpcNatTcpState = {}));\r\n/** VpnRpcEnumNat List Item */\r\nvar VpnRpcEnumNatItem = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcEnumNatItem' class: VpnRpcEnumNat List Item */\r\n    function VpnRpcEnumNatItem(init) {\r\n        /** ID */\r\n        this.Id_u32 = 0;\r\n        /** Protocol */\r\n        this.Protocol_u32 = 0;\r\n        /** Source IP address */\r\n        this.SrcIp_ip = \"\";\r\n        /** Source host name */\r\n        this.SrcHost_str = \"\";\r\n        /** Source port number */\r\n        this.SrcPort_u32 = 0;\r\n        /** Destination IP address */\r\n        this.DestIp_ip = \"\";\r\n        /** Destination host name */\r\n        this.DestHost_str = \"\";\r\n        /** Destination port number */\r\n        this.DestPort_u32 = 0;\r\n        /** Connection time */\r\n        this.CreatedTime_dt = new Date();\r\n        /** Last communication time */\r\n        this.LastCommTime_dt = new Date();\r\n        /** Transmission size */\r\n        this.SendSize_u64 = 0;\r\n        /** Receive size */\r\n        this.RecvSize_u64 = 0;\r\n        /** TCP state */\r\n        this.TcpStatus_u32 = 0;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcEnumNatItem;\r\n}());\r\nexports.VpnRpcEnumNatItem = VpnRpcEnumNatItem;\r\n/** RPC_ENUM_NAT */\r\nvar VpnRpcEnumNat = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcEnumNat' class: RPC_ENUM_NAT */\r\n    function VpnRpcEnumNat(init) {\r\n        /** Virtual Hub Name */\r\n        this.HubName_str = \"\";\r\n        /** NAT item */\r\n        this.NatTable = [];\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcEnumNat;\r\n}());\r\nexports.VpnRpcEnumNat = VpnRpcEnumNat;\r\n/** Enumeration item of VPN session */\r\nvar VpnRpcEnumSessionItem = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcEnumSessionItem' class: Enumeration item of VPN session */\r\n    function VpnRpcEnumSessionItem(init) {\r\n        /** Session name */\r\n        this.Name_str = \"\";\r\n        /** Remote session */\r\n        this.RemoteSession_bool = false;\r\n        /** Remote server name */\r\n        this.RemoteHostname_str = \"\";\r\n        /** User name */\r\n        this.Username_str = \"\";\r\n        /** IP address */\r\n        this.ClientIP_ip = \"\";\r\n        /** Host name */\r\n        this.Hostname_str = \"\";\r\n        /** Maximum number of underlying TCP connections */\r\n        this.MaxNumTcp_u32 = 0;\r\n        /** Number of current underlying TCP connections */\r\n        this.CurrentNumTcp_u32 = 0;\r\n        /** Packet size transmitted */\r\n        this.PacketSize_u64 = 0;\r\n        /** Number of packets transmitted */\r\n        this.PacketNum_u64 = 0;\r\n        /** Is a Cascade VPN session */\r\n        this.LinkMode_bool = false;\r\n        /** Is a SecureNAT VPN session */\r\n        this.SecureNATMode_bool = false;\r\n        /** Is the VPN session for Local Bridge */\r\n        this.BridgeMode_bool = false;\r\n        /** Is a Layer-3 Switch VPN session */\r\n        this.Layer3Mode_bool = false;\r\n        /** Is in Bridge Mode */\r\n        this.Client_BridgeMode_bool = false;\r\n        /** Is in Monitor Mode */\r\n        this.Client_MonitorMode_bool = false;\r\n        /** VLAN ID */\r\n        this.VLanId_u32 = 0;\r\n        /** Unique ID of the VPN Session */\r\n        this.UniqueId_bin = new Uint8Array([]);\r\n        /** Creation date and time */\r\n        this.CreatedTime_dt = new Date();\r\n        /** Last communication date and time */\r\n        this.LastCommTime_dt = new Date();\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcEnumSessionItem;\r\n}());\r\nexports.VpnRpcEnumSessionItem = VpnRpcEnumSessionItem;\r\n/** Enumerate VPN sessions */\r\nvar VpnRpcEnumSession = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcEnumSession' class: Enumerate VPN sessions */\r\n    function VpnRpcEnumSession(init) {\r\n        /** The Virtual Hub name */\r\n        this.HubName_str = \"\";\r\n        /** VPN sessions list */\r\n        this.SessionList = [];\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcEnumSession;\r\n}());\r\nexports.VpnRpcEnumSession = VpnRpcEnumSession;\r\n/** Enumeration item of user */\r\nvar VpnRpcEnumUserItem = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcEnumUserItem' class: Enumeration item of user */\r\n    function VpnRpcEnumUserItem(init) {\r\n        /** User name */\r\n        this.Name_str = \"\";\r\n        /** Group name */\r\n        this.GroupName_str = \"\";\r\n        /** Real name */\r\n        this.Realname_utf = \"\";\r\n        /** Note */\r\n        this.Note_utf = \"\";\r\n        /** Authentication method */\r\n        this.AuthType_u32 = 0;\r\n        /** Number of logins */\r\n        this.NumLogin_u32 = 0;\r\n        /** Last login date and time */\r\n        this.LastLoginTime_dt = new Date();\r\n        /** Access denied */\r\n        this.DenyAccess_bool = false;\r\n        /** Flag of whether the traffic variable is set */\r\n        this.IsTrafficFilled_bool = false;\r\n        /** Flag of whether expiration date variable is set */\r\n        this.IsExpiresFilled_bool = false;\r\n        /** Expiration date */\r\n        this.Expires_dt = new Date();\r\n        /** Number of broadcast packets (Recv) */\r\n        this[\"Ex.Recv.BroadcastBytes_u64\"] = 0;\r\n        /** Broadcast bytes (Recv) */\r\n        this[\"Ex.Recv.BroadcastCount_u64\"] = 0;\r\n        /** Unicast count (Recv) */\r\n        this[\"Ex.Recv.UnicastBytes_u64\"] = 0;\r\n        /** Unicast bytes (Recv) */\r\n        this[\"Ex.Recv.UnicastCount_u64\"] = 0;\r\n        /** Number of broadcast packets (Send) */\r\n        this[\"Ex.Send.BroadcastBytes_u64\"] = 0;\r\n        /** Broadcast bytes (Send) */\r\n        this[\"Ex.Send.BroadcastCount_u64\"] = 0;\r\n        /** Unicast bytes (Send) */\r\n        this[\"Ex.Send.UnicastBytes_u64\"] = 0;\r\n        /** Unicast bytes (Send) */\r\n        this[\"Ex.Send.UnicastCount_u64\"] = 0;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcEnumUserItem;\r\n}());\r\nexports.VpnRpcEnumUserItem = VpnRpcEnumUserItem;\r\n/** Enumeration of user */\r\nvar VpnRpcEnumUser = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcEnumUser' class: Enumeration of user */\r\n    function VpnRpcEnumUser(init) {\r\n        /** The Virtual Hub name */\r\n        this.HubName_str = \"\";\r\n        /** User list */\r\n        this.UserList = [];\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcEnumUser;\r\n}());\r\nexports.VpnRpcEnumUser = VpnRpcEnumUser;\r\n/** Source IP Address Limit List Item */\r\nvar VpnAc = /** @class */ (function () {\r\n    /** Constructor for the 'VpnAc' class: Source IP Address Limit List Item */\r\n    function VpnAc(init) {\r\n        /** ID */\r\n        this.Id_u32 = 0;\r\n        /** Priority */\r\n        this.Priority_u32 = 0;\r\n        /** Deny access */\r\n        this.Deny_bool = false;\r\n        /** Set true if you want to specify the SubnetMask_ip item. */\r\n        this.Masked_bool = false;\r\n        /** IP address */\r\n        this.IpAddress_ip = \"\";\r\n        /** Subnet mask, valid only if Masked_bool == true */\r\n        this.SubnetMask_ip = \"\";\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnAc;\r\n}());\r\nexports.VpnAc = VpnAc;\r\n/** Source IP Address Limit List */\r\nvar VpnRpcAcList = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcAcList' class: Source IP Address Limit List */\r\n    function VpnRpcAcList(init) {\r\n        /** The Virtual Hub name */\r\n        this.HubName_str = \"\";\r\n        /** Source IP Address Limit List */\r\n        this.ACList = [];\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcAcList;\r\n}());\r\nexports.VpnRpcAcList = VpnRpcAcList;\r\n/** Message */\r\nvar VpnRpcMsg = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcMsg' class: Message */\r\n    function VpnRpcMsg(init) {\r\n        /** The Virtual Hub name */\r\n        this.HubName_str = \"\";\r\n        /** Message (Unicode strings acceptable) */\r\n        this.Msg_bin = new Uint8Array([]);\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcMsg;\r\n}());\r\nexports.VpnRpcMsg = VpnRpcMsg;\r\n/** Get / Set the Azure state */\r\nvar VpnRpcAzureStatus = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcAzureStatus' class: Get / Set the Azure state */\r\n    function VpnRpcAzureStatus(init) {\r\n        /** Whether VPN Azure Function is Enabled */\r\n        this.IsEnabled_bool = false;\r\n        /** Whether connection to VPN Azure Cloud Server is established */\r\n        this.IsConnected_bool = false;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcAzureStatus;\r\n}());\r\nexports.VpnRpcAzureStatus = VpnRpcAzureStatus;\r\n/** Local Bridge support information */\r\nvar VpnRpcBridgeSupport = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcBridgeSupport' class: Local Bridge support information */\r\n    function VpnRpcBridgeSupport(init) {\r\n        /** Whether the OS supports the Local Bridge function */\r\n        this.IsBridgeSupportedOs_bool = false;\r\n        /** Whether WinPcap is necessary to install */\r\n        this.IsWinPcapNeeded_bool = false;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcBridgeSupport;\r\n}());\r\nexports.VpnRpcBridgeSupport = VpnRpcBridgeSupport;\r\n/** Get the CA of HUB */\r\nvar VpnRpcHubGetCA = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcHubGetCA' class: Get the CA of HUB */\r\n    function VpnRpcHubGetCA(init) {\r\n        /** The Virtual Hub name */\r\n        this.HubName_str = \"\";\r\n        /** The key id of the certificate */\r\n        this.Key_u32 = 0;\r\n        /** The body of the X.509 certificate */\r\n        this.Cert_bin = new Uint8Array([]);\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcHubGetCA;\r\n}());\r\nexports.VpnRpcHubGetCA = VpnRpcHubGetCA;\r\n/** Caps item of the VPN Server */\r\nvar VpnCaps = /** @class */ (function () {\r\n    /** Constructor for the 'VpnCaps' class: Caps item of the VPN Server */\r\n    function VpnCaps(init) {\r\n        /** Name */\r\n        this.CapsName_str = \"\";\r\n        /** Value */\r\n        this.CapsValue_u32 = 0;\r\n        /** Descrption */\r\n        this.CapsDescrption_utf = \"\";\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnCaps;\r\n}());\r\nexports.VpnCaps = VpnCaps;\r\n/** Caps list of the VPN Server */\r\nvar VpnCapslist = /** @class */ (function () {\r\n    /** Constructor for the 'VpnCapslist' class: Caps list of the VPN Server */\r\n    function VpnCapslist(init) {\r\n        /** Caps list of the VPN Server */\r\n        this.CapsList = [];\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnCapslist;\r\n}());\r\nexports.VpnCapslist = VpnCapslist;\r\n/** Config operation */\r\nvar VpnRpcConfig = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcConfig' class: Config operation */\r\n    function VpnRpcConfig(init) {\r\n        /** File name (valid only for returning from the server) */\r\n        this.FileName_str = \"\";\r\n        /** File data */\r\n        this.FileData_bin = new Uint8Array([]);\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcConfig;\r\n}());\r\nexports.VpnRpcConfig = VpnRpcConfig;\r\n/** Connection information */\r\nvar VpnRpcConnectionInfo = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcConnectionInfo' class: Connection information */\r\n    function VpnRpcConnectionInfo(init) {\r\n        /** Connection name */\r\n        this.Name_str = \"\";\r\n        /** Type */\r\n        this.Type_u32 = 0;\r\n        /** Host name */\r\n        this.Hostname_str = \"\";\r\n        /** IP address */\r\n        this.Ip_ip = \"\";\r\n        /** Port number */\r\n        this.Port_u32 = 0;\r\n        /** Connected time */\r\n        this.ConnectedTime_dt = new Date();\r\n        /** Server string */\r\n        this.ServerStr_str = \"\";\r\n        /** Server version */\r\n        this.ServerVer_u32 = 0;\r\n        /** Server build number */\r\n        this.ServerBuild_u32 = 0;\r\n        /** Client string */\r\n        this.ClientStr_str = \"\";\r\n        /** Client version */\r\n        this.ClientVer_u32 = 0;\r\n        /** Client build number */\r\n        this.ClientBuild_u32 = 0;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcConnectionInfo;\r\n}());\r\nexports.VpnRpcConnectionInfo = VpnRpcConnectionInfo;\r\n/** Proxy type */\r\nvar VpnRpcProxyType;\r\n(function (VpnRpcProxyType) {\r\n    /** Direct TCP connection */\r\n    VpnRpcProxyType[VpnRpcProxyType[\"Direct\"] = 0] = \"Direct\";\r\n    /** Connection via HTTP proxy server */\r\n    VpnRpcProxyType[VpnRpcProxyType[\"HTTP\"] = 1] = \"HTTP\";\r\n    /** Connection via SOCKS proxy server */\r\n    VpnRpcProxyType[VpnRpcProxyType[\"SOCKS\"] = 2] = \"SOCKS\";\r\n})(VpnRpcProxyType = exports.VpnRpcProxyType || (exports.VpnRpcProxyType = {}));\r\n/** The current status of the DDNS */\r\nvar VpnDDnsClientStatus = /** @class */ (function () {\r\n    /** Constructor for the 'VpnDDnsClientStatus' class: The current status of the DDNS */\r\n    function VpnDDnsClientStatus(init) {\r\n        /** Last error code (IPv4) */\r\n        this.Err_IPv4_u32 = 0;\r\n        /** Last error string (IPv4) */\r\n        this.ErrStr_IPv4_utf = \"\";\r\n        /** Last error code (IPv6) */\r\n        this.Err_IPv6_u32 = 0;\r\n        /** Last error string (IPv6) */\r\n        this.ErrStr_IPv6_utf = \"\";\r\n        /** Current DDNS host name */\r\n        this.CurrentHostName_str = \"\";\r\n        /** Current FQDN of the DDNS hostname */\r\n        this.CurrentFqdn_str = \"\";\r\n        /** DDNS suffix */\r\n        this.DnsSuffix_str = \"\";\r\n        /** Current IPv4 address of the VPN Server */\r\n        this.CurrentIPv4_str = \"\";\r\n        /** Current IPv6 address of the VPN Server */\r\n        this.CurrentIPv6_str = \"\";\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnDDnsClientStatus;\r\n}());\r\nexports.VpnDDnsClientStatus = VpnDDnsClientStatus;\r\n/** Internet connection settings */\r\nvar VpnInternetSetting = /** @class */ (function () {\r\n    /** Constructor for the 'VpnInternetSetting' class: Internet connection settings */\r\n    function VpnInternetSetting(init) {\r\n        /** Type of proxy server */\r\n        this.ProxyType_u32 = 0;\r\n        /** Proxy server host name */\r\n        this.ProxyHostName_str = \"\";\r\n        /** Proxy server port number */\r\n        this.ProxyPort_u32 = 0;\r\n        /** Proxy server user name */\r\n        this.ProxyUsername_str = \"\";\r\n        /** Proxy server password */\r\n        this.ProxyPassword_str = \"\";\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnInternetSetting;\r\n}());\r\nexports.VpnInternetSetting = VpnInternetSetting;\r\n/** Administration options */\r\nvar VpnAdminOption = /** @class */ (function () {\r\n    /** Constructor for the 'VpnAdminOption' class: Administration options */\r\n    function VpnAdminOption(init) {\r\n        /** Name */\r\n        this.Name_str = \"\";\r\n        /** Data */\r\n        this.Value_u32 = 0;\r\n        /** Descrption */\r\n        this.Descrption_utf = \"\";\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnAdminOption;\r\n}());\r\nexports.VpnAdminOption = VpnAdminOption;\r\n/** Administration options list */\r\nvar VpnRpcAdminOption = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcAdminOption' class: Administration options list */\r\n    function VpnRpcAdminOption(init) {\r\n        /** Virtual HUB name */\r\n        this.HubName_str = \"\";\r\n        /** List data */\r\n        this.AdminOptionList = [];\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcAdminOption;\r\n}());\r\nexports.VpnRpcAdminOption = VpnRpcAdminOption;\r\n/** Connection state to the controller */\r\nvar VpnRpcFarmConnectionStatus = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcFarmConnectionStatus' class: Connection state to the controller */\r\n    function VpnRpcFarmConnectionStatus(init) {\r\n        /** IP address */\r\n        this.Ip_ip = \"\";\r\n        /** Port number */\r\n        this.Port_u32 = 0;\r\n        /** Online state */\r\n        this.Online_bool = false;\r\n        /** Last error code */\r\n        this.LastError_u32 = 0;\r\n        /** Connection start time */\r\n        this.StartedTime_dt = new Date();\r\n        /** First connection time */\r\n        this.FirstConnectedTime_dt = new Date();\r\n        /** Connection time of this time */\r\n        this.CurrentConnectedTime_dt = new Date();\r\n        /** Number of retries */\r\n        this.NumTry_u32 = 0;\r\n        /** Number of connection count */\r\n        this.NumConnected_u32 = 0;\r\n        /** Connection failure count */\r\n        this.NumFailed_u32 = 0;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcFarmConnectionStatus;\r\n}());\r\nexports.VpnRpcFarmConnectionStatus = VpnRpcFarmConnectionStatus;\r\n/** HUB item of each farm member */\r\nvar VpnRpcFarmHub = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcFarmHub' class: HUB item of each farm member */\r\n    function VpnRpcFarmHub(init) {\r\n        /** The Virtual Hub name */\r\n        this.HubName_str = \"\";\r\n        /** Dynamic HUB */\r\n        this.DynamicHub_bool = false;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcFarmHub;\r\n}());\r\nexports.VpnRpcFarmHub = VpnRpcFarmHub;\r\n/** Server farm member information acquisition */\r\nvar VpnRpcFarmInfo = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcFarmInfo' class: Server farm member information acquisition */\r\n    function VpnRpcFarmInfo(init) {\r\n        /** ID */\r\n        this.Id_u32 = 0;\r\n        /** The flag if the server is Cluster Controller (false: Cluster Member servers) */\r\n        this.Controller_bool = false;\r\n        /** Connection Established Time */\r\n        this.ConnectedTime_dt = new Date();\r\n        /** IP address */\r\n        this.Ip_ip = \"\";\r\n        /** Host name */\r\n        this.Hostname_str = \"\";\r\n        /** Point */\r\n        this.Point_u32 = 0;\r\n        /** Number of Public Ports */\r\n        this.NumPort_u32 = 0;\r\n        /** Public Ports */\r\n        this.Ports_u32 = [];\r\n        /** Server certificate */\r\n        this.ServerCert_bin = new Uint8Array([]);\r\n        /** Number of farm HUB */\r\n        this.NumFarmHub_u32 = 0;\r\n        /** The hosted Virtual Hub list */\r\n        this.HubsList = [];\r\n        /** Number of hosted VPN sessions */\r\n        this.NumSessions_u32 = 0;\r\n        /** Number of TCP connections */\r\n        this.NumTcpConnections_u32 = 0;\r\n        /** Performance Standard Ratio */\r\n        this.Weight_u32 = 0;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcFarmInfo;\r\n}());\r\nexports.VpnRpcFarmInfo = VpnRpcFarmInfo;\r\n/** Server farm configuration */\r\nvar VpnRpcFarm = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcFarm' class: Server farm configuration */\r\n    function VpnRpcFarm(init) {\r\n        /** Type of server */\r\n        this.ServerType_u32 = 0;\r\n        /** Valid only for Cluster Member servers. Number of the Ports_u32 element. */\r\n        this.NumPort_u32 = 0;\r\n        /** Valid only for Cluster Member servers. Specify the list of public port numbers on this server. The list must have at least one public port number set, and it is also possible to set multiple public port numbers. */\r\n        this.Ports_u32 = [];\r\n        /** Valid only for Cluster Member servers. Specify the public IP address of this server. If you wish to leave public IP address unspecified, specify the empty string. When a public IP address is not specified, the IP address of the network interface used when connecting to the cluster controller will be automatically used. */\r\n        this.PublicIp_ip = \"\";\r\n        /** Valid only for Cluster Member servers. Specify the host name or IP address of the destination cluster controller. */\r\n        this.ControllerName_str = \"\";\r\n        /** Valid only for Cluster Member servers. Specify the TCP port number of the destination cluster controller. */\r\n        this.ControllerPort_u32 = 0;\r\n        /** Valid only for Cluster Member servers. Specify the password required to connect to the destination controller. It needs to be the same as an administrator password on the destination controller. */\r\n        this.MemberPasswordPlaintext_str = \"\";\r\n        /** This sets a value for the performance standard ratio of this VPN Server. This is the standard value for when load balancing is performed in the cluster. For example, making only one machine 200 while the other members have a status of 100, will regulate that machine to receive twice as many connections as the other members. Specify 1 or higher for the value. If this parameter is left unspecified, 100 will be used. */\r\n        this.Weight_u32 = 0;\r\n        /** Valid only for Cluster Controller server. By specifying true, the VPN Server will operate only as a controller on the cluster and it will always distribute general VPN Client connections to members other than itself. This function is used in high-load environments. */\r\n        this.ControllerOnly_bool = false;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcFarm;\r\n}());\r\nexports.VpnRpcFarm = VpnRpcFarm;\r\n/** Log switch type */\r\nvar VpnRpcLogSwitchType;\r\n(function (VpnRpcLogSwitchType) {\r\n    /** No switching */\r\n    VpnRpcLogSwitchType[VpnRpcLogSwitchType[\"No\"] = 0] = \"No\";\r\n    /** Secondly basis */\r\n    VpnRpcLogSwitchType[VpnRpcLogSwitchType[\"Second\"] = 1] = \"Second\";\r\n    /** Minutely basis */\r\n    VpnRpcLogSwitchType[VpnRpcLogSwitchType[\"Minute\"] = 2] = \"Minute\";\r\n    /** Hourly basis */\r\n    VpnRpcLogSwitchType[VpnRpcLogSwitchType[\"Hour\"] = 3] = \"Hour\";\r\n    /** Daily basis */\r\n    VpnRpcLogSwitchType[VpnRpcLogSwitchType[\"Day\"] = 4] = \"Day\";\r\n    /** Monthly basis */\r\n    VpnRpcLogSwitchType[VpnRpcLogSwitchType[\"Month\"] = 5] = \"Month\";\r\n})(VpnRpcLogSwitchType = exports.VpnRpcLogSwitchType || (exports.VpnRpcLogSwitchType = {}));\r\n/** Packet log settings */\r\nvar VpnRpcPacketLogSetting;\r\n(function (VpnRpcPacketLogSetting) {\r\n    /** Not save */\r\n    VpnRpcPacketLogSetting[VpnRpcPacketLogSetting[\"None\"] = 0] = \"None\";\r\n    /** Only header */\r\n    VpnRpcPacketLogSetting[VpnRpcPacketLogSetting[\"Header\"] = 1] = \"Header\";\r\n    /** All payloads */\r\n    VpnRpcPacketLogSetting[VpnRpcPacketLogSetting[\"All\"] = 2] = \"All\";\r\n})(VpnRpcPacketLogSetting = exports.VpnRpcPacketLogSetting || (exports.VpnRpcPacketLogSetting = {}));\r\n/** Packet log settings array index */\r\nvar VpnRpcPacketLogSettingIndex;\r\n(function (VpnRpcPacketLogSettingIndex) {\r\n    /** TCP connection log */\r\n    VpnRpcPacketLogSettingIndex[VpnRpcPacketLogSettingIndex[\"TcpConnection\"] = 0] = \"TcpConnection\";\r\n    /** TCP packet log */\r\n    VpnRpcPacketLogSettingIndex[VpnRpcPacketLogSettingIndex[\"TcpAll\"] = 1] = \"TcpAll\";\r\n    /** DHCP Log */\r\n    VpnRpcPacketLogSettingIndex[VpnRpcPacketLogSettingIndex[\"Dhcp\"] = 2] = \"Dhcp\";\r\n    /** UDP log */\r\n    VpnRpcPacketLogSettingIndex[VpnRpcPacketLogSettingIndex[\"Udp\"] = 3] = \"Udp\";\r\n    /** ICMP log */\r\n    VpnRpcPacketLogSettingIndex[VpnRpcPacketLogSettingIndex[\"Icmp\"] = 4] = \"Icmp\";\r\n    /** IP log */\r\n    VpnRpcPacketLogSettingIndex[VpnRpcPacketLogSettingIndex[\"Ip\"] = 5] = \"Ip\";\r\n    /** ARP log */\r\n    VpnRpcPacketLogSettingIndex[VpnRpcPacketLogSettingIndex[\"Arp\"] = 6] = \"Arp\";\r\n    /** Ethernet log */\r\n    VpnRpcPacketLogSettingIndex[VpnRpcPacketLogSettingIndex[\"Ethernet\"] = 7] = \"Ethernet\";\r\n})(VpnRpcPacketLogSettingIndex = exports.VpnRpcPacketLogSettingIndex || (exports.VpnRpcPacketLogSettingIndex = {}));\r\n/** HUB log settings */\r\nvar VpnRpcHubLog = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcHubLog' class: HUB log settings */\r\n    function VpnRpcHubLog(init) {\r\n        /** The Virtual Hub name */\r\n        this.HubName_str = \"\";\r\n        /** The flag to enable / disable saving the security log */\r\n        this.SaveSecurityLog_bool = false;\r\n        /** The log filename switching setting of the security log */\r\n        this.SecurityLogSwitchType_u32 = 0;\r\n        /** The flag to enable / disable saving the security log */\r\n        this.SavePacketLog_bool = false;\r\n        /** The log filename switching settings of the packet logs */\r\n        this.PacketLogSwitchType_u32 = 0;\r\n        /** Specify the save contents of the packet logs (uint * 16 array). The index numbers: TcpConnection = 0, TcpAll = 1, DHCP = 2, UDP = 3, ICMP = 4, IP = 5, ARP = 6, Ethernet = 7. */\r\n        this.PacketLogConfig_u32 = [];\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcHubLog;\r\n}());\r\nexports.VpnRpcHubLog = VpnRpcHubLog;\r\n/** RADIUS server options */\r\nvar VpnRpcRadius = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcRadius' class: RADIUS server options */\r\n    function VpnRpcRadius(init) {\r\n        /** The Virtual Hub name */\r\n        this.HubName_str = \"\";\r\n        /** RADIUS server name */\r\n        this.RadiusServerName_str = \"\";\r\n        /** RADIUS port number */\r\n        this.RadiusPort_u32 = 0;\r\n        /** Secret key */\r\n        this.RadiusSecret_str = \"\";\r\n        /** Radius retry interval */\r\n        this.RadiusRetryInterval_u32 = 0;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcRadius;\r\n}());\r\nexports.VpnRpcRadius = VpnRpcRadius;\r\n/** Get the state HUB */\r\nvar VpnRpcHubStatus = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcHubStatus' class: Get the state HUB */\r\n    function VpnRpcHubStatus(init) {\r\n        /** The Virtual Hub name */\r\n        this.HubName_str = \"\";\r\n        /** Online */\r\n        this.Online_bool = false;\r\n        /** Type of HUB */\r\n        this.HubType_u32 = 0;\r\n        /** Number of sessions */\r\n        this.NumSessions_u32 = 0;\r\n        /** Number of sessions (client mode) */\r\n        this.NumSessionsClient_u32 = 0;\r\n        /** Number of sessions (bridge mode) */\r\n        this.NumSessionsBridge_u32 = 0;\r\n        /** Number of Access list entries */\r\n        this.NumAccessLists_u32 = 0;\r\n        /** Number of users */\r\n        this.NumUsers_u32 = 0;\r\n        /** Number of groups */\r\n        this.NumGroups_u32 = 0;\r\n        /** Number of MAC table entries */\r\n        this.NumMacTables_u32 = 0;\r\n        /** Number of IP table entries */\r\n        this.NumIpTables_u32 = 0;\r\n        /** Number of broadcast packets (Recv) */\r\n        this[\"Recv.BroadcastBytes_u64\"] = 0;\r\n        /** Broadcast bytes (Recv) */\r\n        this[\"Recv.BroadcastCount_u64\"] = 0;\r\n        /** Unicast count (Recv) */\r\n        this[\"Recv.UnicastBytes_u64\"] = 0;\r\n        /** Unicast bytes (Recv) */\r\n        this[\"Recv.UnicastCount_u64\"] = 0;\r\n        /** Number of broadcast packets (Send) */\r\n        this[\"Send.BroadcastBytes_u64\"] = 0;\r\n        /** Broadcast bytes (Send) */\r\n        this[\"Send.BroadcastCount_u64\"] = 0;\r\n        /** Unicast bytes (Send) */\r\n        this[\"Send.UnicastBytes_u64\"] = 0;\r\n        /** Unicast bytes (Send) */\r\n        this[\"Send.UnicastCount_u64\"] = 0;\r\n        /** Whether SecureNAT is enabled */\r\n        this.SecureNATEnabled_bool = false;\r\n        /** Last communication date and time */\r\n        this.LastCommTime_dt = new Date();\r\n        /** Last login date and time */\r\n        this.LastLoginTime_dt = new Date();\r\n        /** Creation date and time */\r\n        this.CreatedTime_dt = new Date();\r\n        /** Number of logins */\r\n        this.NumLogin_u32 = 0;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcHubStatus;\r\n}());\r\nexports.VpnRpcHubStatus = VpnRpcHubStatus;\r\n/** List of services provided by IPsec server */\r\nvar VpnIPsecServices = /** @class */ (function () {\r\n    /** Constructor for the 'VpnIPsecServices' class: List of services provided by IPsec server */\r\n    function VpnIPsecServices(init) {\r\n        /** Enable or Disable the L2TP Server Function (Raw L2TP with No Encryptions). To accept special VPN clients, enable this option. */\r\n        this.L2TP_Raw_bool = false;\r\n        /** Enable or Disable the L2TP over IPsec Server Function. To accept VPN connections from iPhone, iPad, Android, Windows or Mac OS X, enable this option. */\r\n        this.L2TP_IPsec_bool = false;\r\n        /** Enable or Disable the EtherIP / L2TPv3 over IPsec Server Function (for site-to-site VPN Server function). Router Products which are compatible with EtherIP over IPsec can connect to Virtual Hubs on the VPN Server and establish Layer-2 (Ethernet) Bridging. */\r\n        this.EtherIP_IPsec_bool = false;\r\n        /** Specify the IPsec Pre-Shared Key. An IPsec Pre-Shared Key is also called as \"PSK\" or \"secret\". Specify it equal or less than 8 letters, and distribute it to every users who will connect to the VPN Server. Please note: Google Android 4.0 has a bug which a Pre-Shared Key with 10 or more letters causes a unexpected behavior. For that reason, the letters of a Pre-Shared Key should be 9 or less characters. */\r\n        this.IPsec_Secret_str = \"\";\r\n        /** Specify the default Virtual HUB in a case of omitting the name of HUB on the Username. Users should specify their username such as \"Username@Target Virtual HUB Name\" to connect this L2TP Server. If the designation of the Virtual Hub is omitted, the above HUB will be used as the target. */\r\n        this.L2TP_DefaultHub_str = \"\";\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnIPsecServices;\r\n}());\r\nexports.VpnIPsecServices = VpnIPsecServices;\r\n/** Keep alive protocol */\r\nvar VpnRpcKeepAliveProtocol;\r\n(function (VpnRpcKeepAliveProtocol) {\r\n    /** TCP */\r\n    VpnRpcKeepAliveProtocol[VpnRpcKeepAliveProtocol[\"TCP\"] = 0] = \"TCP\";\r\n    /** UDP */\r\n    VpnRpcKeepAliveProtocol[VpnRpcKeepAliveProtocol[\"UDP\"] = 1] = \"UDP\";\r\n})(VpnRpcKeepAliveProtocol = exports.VpnRpcKeepAliveProtocol || (exports.VpnRpcKeepAliveProtocol = {}));\r\n/** Keep Alive settings */\r\nvar VpnRpcKeep = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcKeep' class: Keep Alive settings */\r\n    function VpnRpcKeep(init) {\r\n        /** The flag to enable keep-alive to the Internet */\r\n        this.UseKeepConnect_bool = false;\r\n        /** Specify the host name or IP address of the destination */\r\n        this.KeepConnectHost_str = \"\";\r\n        /** Specify the port number of the destination */\r\n        this.KeepConnectPort_u32 = 0;\r\n        /** Protocol type */\r\n        this.KeepConnectProtocol_u32 = 0;\r\n        /** Interval Between Packets Sends (Seconds) */\r\n        this.KeepConnectInterval_u32 = 0;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcKeep;\r\n}());\r\nexports.VpnRpcKeep = VpnRpcKeep;\r\n/** State of the client session */\r\nvar VpnRpcClientSessionStatus;\r\n(function (VpnRpcClientSessionStatus) {\r\n    /** Connecting */\r\n    VpnRpcClientSessionStatus[VpnRpcClientSessionStatus[\"Connecting\"] = 0] = \"Connecting\";\r\n    /** Negotiating */\r\n    VpnRpcClientSessionStatus[VpnRpcClientSessionStatus[\"Negotiation\"] = 1] = \"Negotiation\";\r\n    /** During user authentication */\r\n    VpnRpcClientSessionStatus[VpnRpcClientSessionStatus[\"Auth\"] = 2] = \"Auth\";\r\n    /** Connection complete */\r\n    VpnRpcClientSessionStatus[VpnRpcClientSessionStatus[\"Established\"] = 3] = \"Established\";\r\n    /** Wait to retry */\r\n    VpnRpcClientSessionStatus[VpnRpcClientSessionStatus[\"Retry\"] = 4] = \"Retry\";\r\n    /** Idle state */\r\n    VpnRpcClientSessionStatus[VpnRpcClientSessionStatus[\"Idle\"] = 5] = \"Idle\";\r\n})(VpnRpcClientSessionStatus = exports.VpnRpcClientSessionStatus || (exports.VpnRpcClientSessionStatus = {}));\r\n/** Get the link state */\r\nvar VpnRpcLinkStatus = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcLinkStatus' class: Get the link state */\r\n    function VpnRpcLinkStatus(init) {\r\n        /** The Virtual Hub name */\r\n        this.HubName_Ex_str = \"\";\r\n        /** The name of the cascade connection */\r\n        this.AccountName_utf = \"\";\r\n        /** The flag whether the cascade connection is enabled */\r\n        this.Active_bool = false;\r\n        /** The flag whether the cascade connection is established */\r\n        this.Connected_bool = false;\r\n        /** The session status */\r\n        this.SessionStatus_u32 = 0;\r\n        /** The destination VPN server name */\r\n        this.ServerName_str = \"\";\r\n        /** The port number of the server */\r\n        this.ServerPort_u32 = 0;\r\n        /** Server product name */\r\n        this.ServerProductName_str = \"\";\r\n        /** Server product version */\r\n        this.ServerProductVer_u32 = 0;\r\n        /** Server product build number */\r\n        this.ServerProductBuild_u32 = 0;\r\n        /** Server's X.509 certificate */\r\n        this.ServerX_bin = new Uint8Array([]);\r\n        /** Client certificate */\r\n        this.ClientX_bin = new Uint8Array([]);\r\n        /** Connection start time */\r\n        this.StartTime_dt = new Date();\r\n        /** Connection completion time of the first connection */\r\n        this.FirstConnectionEstablisiedTime_dt = new Date();\r\n        /** Connection completion time of this connection */\r\n        this.CurrentConnectionEstablishTime_dt = new Date();\r\n        /** Number of connections have been established so far */\r\n        this.NumConnectionsEatablished_u32 = 0;\r\n        /** Half-connection */\r\n        this.HalfConnection_bool = false;\r\n        /** VoIP / QoS */\r\n        this.QoS_bool = false;\r\n        /** Maximum number of the underlying TCP connections */\r\n        this.MaxTcpConnections_u32 = 0;\r\n        /** Number of current underlying TCP connections */\r\n        this.NumTcpConnections_u32 = 0;\r\n        /** Number of underlying inbound TCP connections */\r\n        this.NumTcpConnectionsUpload_u32 = 0;\r\n        /** Number of underlying outbound TCP connections */\r\n        this.NumTcpConnectionsDownload_u32 = 0;\r\n        /** Use of encryption */\r\n        this.UseEncrypt_bool = false;\r\n        /** Cipher algorithm name */\r\n        this.CipherName_str = \"\";\r\n        /** Use of compression */\r\n        this.UseCompress_bool = false;\r\n        /** The flag whether this is a R-UDP session */\r\n        this.IsRUDPSession_bool = false;\r\n        /** Underlying physical communication protocol */\r\n        this.UnderlayProtocol_str = \"\";\r\n        /** The UDP acceleration is enabled */\r\n        this.IsUdpAccelerationEnabled_bool = false;\r\n        /** The UDP acceleration is being actually used */\r\n        this.IsUsingUdpAcceleration_bool = false;\r\n        /** Session name */\r\n        this.SessionName_str = \"\";\r\n        /** Connection name */\r\n        this.ConnectionName_str = \"\";\r\n        /** Session key */\r\n        this.SessionKey_bin = new Uint8Array([]);\r\n        /** Total transmitted data size */\r\n        this.TotalSendSize_u64 = 0;\r\n        /** Total received data size */\r\n        this.TotalRecvSize_u64 = 0;\r\n        /** Total transmitted data size (no compression) */\r\n        this.TotalSendSizeReal_u64 = 0;\r\n        /** Total received data size (no compression) */\r\n        this.TotalRecvSizeReal_u64 = 0;\r\n        /** The flag whether the VPN session is Bridge Mode */\r\n        this.IsBridgeMode_bool = false;\r\n        /** The flag whether the VPN session is Monitor mode */\r\n        this.IsMonitorMode_bool = false;\r\n        /** VLAN ID */\r\n        this.VLanId_u32 = 0;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcLinkStatus;\r\n}());\r\nexports.VpnRpcLinkStatus = VpnRpcLinkStatus;\r\n/** Setting of SSTP and OpenVPN */\r\nvar VpnOpenVpnSstpConfig = /** @class */ (function () {\r\n    /** Constructor for the 'VpnOpenVpnSstpConfig' class: Setting of SSTP and OpenVPN */\r\n    function VpnOpenVpnSstpConfig(init) {\r\n        /** Specify true to enable the OpenVPN Clone Server Function. Specify false to disable. */\r\n        this.EnableOpenVPN_bool = false;\r\n        /** Specify UDP ports to listen for OpenVPN. Multiple UDP ports can be specified with splitting by space or comma letters, for example: \"1194, 2001, 2010, 2012\". The default port for OpenVPN is UDP 1194. You can specify any other UDP ports. */\r\n        this.OpenVPNPortList_str = \"\";\r\n        /** pecify true to enable the Microsoft SSTP VPN Clone Server Function. Specify false to disable. */\r\n        this.EnableSSTP_bool = false;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnOpenVpnSstpConfig;\r\n}());\r\nexports.VpnOpenVpnSstpConfig = VpnOpenVpnSstpConfig;\r\n/** Virtual host option */\r\nvar VpnVhOption = /** @class */ (function () {\r\n    /** Constructor for the 'VpnVhOption' class: Virtual host option */\r\n    function VpnVhOption(init) {\r\n        /** Target Virtual HUB name */\r\n        this.RpcHubName_str = \"\";\r\n        /** MAC address */\r\n        this.MacAddress_bin = new Uint8Array([]);\r\n        /** IP address */\r\n        this.Ip_ip = \"\";\r\n        /** Subnet mask */\r\n        this.Mask_ip = \"\";\r\n        /** Use flag of the Virtual NAT function */\r\n        this.UseNat_bool = false;\r\n        /** MTU value (Standard: 1500) */\r\n        this.Mtu_u32 = 0;\r\n        /** NAT TCP timeout in seconds */\r\n        this.NatTcpTimeout_u32 = 0;\r\n        /** NAT UDP timeout in seconds */\r\n        this.NatUdpTimeout_u32 = 0;\r\n        /** Using flag of DHCP function */\r\n        this.UseDhcp_bool = false;\r\n        /** Specify the start point of the address band to be distributed to the client. (Example: 192.168.30.10) */\r\n        this.DhcpLeaseIPStart_ip = \"\";\r\n        /** Specify the end point of the address band to be distributed to the client. (Example: 192.168.30.200) */\r\n        this.DhcpLeaseIPEnd_ip = \"\";\r\n        /** Specify the subnet mask to be specified for the client. (Example: 255.255.255.0) */\r\n        this.DhcpSubnetMask_ip = \"\";\r\n        /** Specify the expiration date in second units for leasing an IP address to a client. */\r\n        this.DhcpExpireTimeSpan_u32 = 0;\r\n        /** Specify the IP address of the default gateway to be notified to the client. You can specify a SecureNAT Virtual Host IP address for this when the SecureNAT Function's Virtual NAT Function has been enabled and is being used also. If you specify 0 or none, then the client will not be notified of the default gateway. */\r\n        this.DhcpGatewayAddress_ip = \"\";\r\n        /** Specify the IP address of the primary DNS Server to be notified to the client. You can specify a SecureNAT Virtual Host IP address for this when the SecureNAT Function's Virtual NAT Function has been enabled and is being used also. If you specify empty, then the client will not be notified of the DNS Server address. */\r\n        this.DhcpDnsServerAddress_ip = \"\";\r\n        /** Specify the IP address of the secondary DNS Server to be notified to the client. You can specify a SecureNAT Virtual Host IP address for this when the SecureNAT Function's Virtual NAT Function has been enabled and is being used also. If you specify empty, then the client will not be notified of the DNS Server address. */\r\n        this.DhcpDnsServerAddress2_ip = \"\";\r\n        /** Specify the domain name to be notified to the client. If you specify none, then the client will not be notified of the domain name. */\r\n        this.DhcpDomainName_str = \"\";\r\n        /** Specify whether or not to save the Virtual DHCP Server operation in the Virtual Hub security log. Specify true to save it. This value is interlinked with the Virtual NAT Function log save setting. */\r\n        this.SaveLog_bool = false;\r\n        /** The flag to enable the DhcpPushRoutes_str field. */\r\n        this.ApplyDhcpPushRoutes_bool = false;\r\n        /** Specify the static routing table to push. Example: \"192.168.5.0/255.255.255.0/192.168.4.254, 10.0.0.0/255.0.0.0/192.168.4.253\" Split multiple entries (maximum: 64 entries) by comma or space characters. Each entry must be specified in the \"IP network address/subnet mask/gateway IP address\" format. This Virtual DHCP Server can push the classless static routes (RFC 3442) with DHCP reply messages to VPN clients. Whether or not a VPN client can recognize the classless static routes (RFC 3442) depends on the target VPN client software. SoftEther VPN Client and OpenVPN Client are supporting the classless static routes. On L2TP/IPsec and MS-SSTP protocols, the compatibility depends on the implementation of the client software. You can realize the split tunneling if you clear the default gateway field on the Virtual DHCP Server options. On the client side, L2TP/IPsec and MS-SSTP clients need to be configured not to set up the default gateway for the split tunneling usage. You can also push the classless static routes (RFC 3442) by your existing external DHCP server. In that case, disable the Virtual DHCP Server function on SecureNAT, and you need not to set up the classless routes on this API. See the RFC 3442 to understand the classless routes. */\r\n        this.DhcpPushRoutes_str = \"\";\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnVhOption;\r\n}());\r\nexports.VpnVhOption = VpnVhOption;\r\n/** RPC_NAT_STATUS */\r\nvar VpnRpcNatStatus = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcNatStatus' class: RPC_NAT_STATUS */\r\n    function VpnRpcNatStatus(init) {\r\n        /** Virtual Hub Name */\r\n        this.HubName_str = \"\";\r\n        /** Number of TCP sessions */\r\n        this.NumTcpSessions_u32 = 0;\r\n        /** Ntmber of UDP sessions */\r\n        this.NumUdpSessions_u32 = 0;\r\n        /** Nymber of ICMP sessions */\r\n        this.NumIcmpSessions_u32 = 0;\r\n        /** Number of DNS sessions */\r\n        this.NumDnsSessions_u32 = 0;\r\n        /** Number of DHCP clients */\r\n        this.NumDhcpClients_u32 = 0;\r\n        /** Whether the NAT is operating in the Kernel Mode */\r\n        this.IsKernelMode_bool = false;\r\n        /** Whether the NAT is operating in the Raw IP Mode */\r\n        this.IsRawIpMode_bool = false;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcNatStatus;\r\n}());\r\nexports.VpnRpcNatStatus = VpnRpcNatStatus;\r\n/** Key pair */\r\nvar VpnRpcKeyPair = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcKeyPair' class: Key pair */\r\n    function VpnRpcKeyPair(init) {\r\n        /** The body of the certificate */\r\n        this.Cert_bin = new Uint8Array([]);\r\n        /** The body of the private key */\r\n        this.Key_bin = new Uint8Array([]);\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcKeyPair;\r\n}());\r\nexports.VpnRpcKeyPair = VpnRpcKeyPair;\r\n/** Single string value */\r\nvar VpnRpcStr = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcStr' class: Single string value */\r\n    function VpnRpcStr(init) {\r\n        /** A string value */\r\n        this.String_str = \"\";\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcStr;\r\n}());\r\nexports.VpnRpcStr = VpnRpcStr;\r\n/** Type of VPN Server */\r\nvar VpnRpcServerType;\r\n(function (VpnRpcServerType) {\r\n    /** Stand-alone server */\r\n    VpnRpcServerType[VpnRpcServerType[\"Standalone\"] = 0] = \"Standalone\";\r\n    /** Farm controller server */\r\n    VpnRpcServerType[VpnRpcServerType[\"FarmController\"] = 1] = \"FarmController\";\r\n    /** Farm member server */\r\n    VpnRpcServerType[VpnRpcServerType[\"FarmMember\"] = 2] = \"FarmMember\";\r\n})(VpnRpcServerType = exports.VpnRpcServerType || (exports.VpnRpcServerType = {}));\r\n/** Operating system type */\r\nvar VpnRpcOsType;\r\n(function (VpnRpcOsType) {\r\n    /** Windows 95 */\r\n    VpnRpcOsType[VpnRpcOsType[\"WINDOWS_95\"] = 1100] = \"WINDOWS_95\";\r\n    /** Windows 98 */\r\n    VpnRpcOsType[VpnRpcOsType[\"WINDOWS_98\"] = 1200] = \"WINDOWS_98\";\r\n    /** Windows Me */\r\n    VpnRpcOsType[VpnRpcOsType[\"WINDOWS_ME\"] = 1300] = \"WINDOWS_ME\";\r\n    /** Windows (unknown) */\r\n    VpnRpcOsType[VpnRpcOsType[\"WINDOWS_UNKNOWN\"] = 1400] = \"WINDOWS_UNKNOWN\";\r\n    /** Windows NT 4.0 Workstation */\r\n    VpnRpcOsType[VpnRpcOsType[\"WINDOWS_NT_4_WORKSTATION\"] = 2100] = \"WINDOWS_NT_4_WORKSTATION\";\r\n    /** Windows NT 4.0 Server */\r\n    VpnRpcOsType[VpnRpcOsType[\"WINDOWS_NT_4_SERVER\"] = 2110] = \"WINDOWS_NT_4_SERVER\";\r\n    /** Windows NT 4.0 Server, Enterprise Edition */\r\n    VpnRpcOsType[VpnRpcOsType[\"WINDOWS_NT_4_SERVER_ENTERPRISE\"] = 2111] = \"WINDOWS_NT_4_SERVER_ENTERPRISE\";\r\n    /** Windows NT 4.0 Terminal Server */\r\n    VpnRpcOsType[VpnRpcOsType[\"WINDOWS_NT_4_TERMINAL_SERVER\"] = 2112] = \"WINDOWS_NT_4_TERMINAL_SERVER\";\r\n    /** BackOffice Server 4.5 */\r\n    VpnRpcOsType[VpnRpcOsType[\"WINDOWS_NT_4_BACKOFFICE\"] = 2113] = \"WINDOWS_NT_4_BACKOFFICE\";\r\n    /** Small Business Server 4.5 */\r\n    VpnRpcOsType[VpnRpcOsType[\"WINDOWS_NT_4_SMS\"] = 2114] = \"WINDOWS_NT_4_SMS\";\r\n    /** Windows 2000 Professional */\r\n    VpnRpcOsType[VpnRpcOsType[\"WINDOWS_2000_PROFESSIONAL\"] = 2200] = \"WINDOWS_2000_PROFESSIONAL\";\r\n    /** Windows 2000 Server */\r\n    VpnRpcOsType[VpnRpcOsType[\"WINDOWS_2000_SERVER\"] = 2211] = \"WINDOWS_2000_SERVER\";\r\n    /** Windows 2000 Advanced Server */\r\n    VpnRpcOsType[VpnRpcOsType[\"WINDOWS_2000_ADVANCED_SERVER\"] = 2212] = \"WINDOWS_2000_ADVANCED_SERVER\";\r\n    /** Windows 2000 Datacenter Server */\r\n    VpnRpcOsType[VpnRpcOsType[\"WINDOWS_2000_DATACENTER_SERVER\"] = 2213] = \"WINDOWS_2000_DATACENTER_SERVER\";\r\n    /** BackOffice Server 2000 */\r\n    VpnRpcOsType[VpnRpcOsType[\"WINDOWS_2000_BACKOFFICE\"] = 2214] = \"WINDOWS_2000_BACKOFFICE\";\r\n    /** Small Business Server 2000 */\r\n    VpnRpcOsType[VpnRpcOsType[\"WINDOWS_2000_SBS\"] = 2215] = \"WINDOWS_2000_SBS\";\r\n    /** Windows XP Home Edition */\r\n    VpnRpcOsType[VpnRpcOsType[\"WINDOWS_XP_HOME\"] = 2300] = \"WINDOWS_XP_HOME\";\r\n    /** Windows XP Professional */\r\n    VpnRpcOsType[VpnRpcOsType[\"WINDOWS_XP_PROFESSIONAL\"] = 2301] = \"WINDOWS_XP_PROFESSIONAL\";\r\n    /** Windows Server 2003 Web Edition */\r\n    VpnRpcOsType[VpnRpcOsType[\"WINDOWS_2003_WEB\"] = 2410] = \"WINDOWS_2003_WEB\";\r\n    /** Windows Server 2003 Standard Edition */\r\n    VpnRpcOsType[VpnRpcOsType[\"WINDOWS_2003_STANDARD\"] = 2411] = \"WINDOWS_2003_STANDARD\";\r\n    /** Windows Server 2003 Enterprise Edition */\r\n    VpnRpcOsType[VpnRpcOsType[\"WINDOWS_2003_ENTERPRISE\"] = 2412] = \"WINDOWS_2003_ENTERPRISE\";\r\n    /** Windows Server 2003 DataCenter Edition */\r\n    VpnRpcOsType[VpnRpcOsType[\"WINDOWS_2003_DATACENTER\"] = 2413] = \"WINDOWS_2003_DATACENTER\";\r\n    /** BackOffice Server 2003 */\r\n    VpnRpcOsType[VpnRpcOsType[\"WINDOWS_2003_BACKOFFICE\"] = 2414] = \"WINDOWS_2003_BACKOFFICE\";\r\n    /** Small Business Server 2003 */\r\n    VpnRpcOsType[VpnRpcOsType[\"WINDOWS_2003_SBS\"] = 2415] = \"WINDOWS_2003_SBS\";\r\n    /** Windows Vista */\r\n    VpnRpcOsType[VpnRpcOsType[\"WINDOWS_LONGHORN_PROFESSIONAL\"] = 2500] = \"WINDOWS_LONGHORN_PROFESSIONAL\";\r\n    /** Windows Server 2008 */\r\n    VpnRpcOsType[VpnRpcOsType[\"WINDOWS_LONGHORN_SERVER\"] = 2510] = \"WINDOWS_LONGHORN_SERVER\";\r\n    /** Windows 7 */\r\n    VpnRpcOsType[VpnRpcOsType[\"WINDOWS_7\"] = 2600] = \"WINDOWS_7\";\r\n    /** Windows Server 2008 R2 */\r\n    VpnRpcOsType[VpnRpcOsType[\"WINDOWS_SERVER_2008_R2\"] = 2610] = \"WINDOWS_SERVER_2008_R2\";\r\n    /** Windows 8 */\r\n    VpnRpcOsType[VpnRpcOsType[\"WINDOWS_8\"] = 2700] = \"WINDOWS_8\";\r\n    /** Windows Server 2012 */\r\n    VpnRpcOsType[VpnRpcOsType[\"WINDOWS_SERVER_8\"] = 2710] = \"WINDOWS_SERVER_8\";\r\n    /** Windows 8.1 */\r\n    VpnRpcOsType[VpnRpcOsType[\"WINDOWS_81\"] = 2701] = \"WINDOWS_81\";\r\n    /** Windows Server 2012 R2 */\r\n    VpnRpcOsType[VpnRpcOsType[\"WINDOWS_SERVER_81\"] = 2711] = \"WINDOWS_SERVER_81\";\r\n    /** Windows 10 */\r\n    VpnRpcOsType[VpnRpcOsType[\"WINDOWS_10\"] = 2702] = \"WINDOWS_10\";\r\n    /** Windows Server 10 */\r\n    VpnRpcOsType[VpnRpcOsType[\"WINDOWS_SERVER_10\"] = 2712] = \"WINDOWS_SERVER_10\";\r\n    /** Windows 11 or later */\r\n    VpnRpcOsType[VpnRpcOsType[\"WINDOWS_11\"] = 2800] = \"WINDOWS_11\";\r\n    /** Windows Server 11 or later */\r\n    VpnRpcOsType[VpnRpcOsType[\"WINDOWS_SERVER_11\"] = 2810] = \"WINDOWS_SERVER_11\";\r\n    /** Unknown UNIX */\r\n    VpnRpcOsType[VpnRpcOsType[\"UNIX_UNKNOWN\"] = 3000] = \"UNIX_UNKNOWN\";\r\n    /** Linux */\r\n    VpnRpcOsType[VpnRpcOsType[\"LINUX\"] = 3100] = \"LINUX\";\r\n    /** Solaris */\r\n    VpnRpcOsType[VpnRpcOsType[\"SOLARIS\"] = 3200] = \"SOLARIS\";\r\n    /** Cygwin */\r\n    VpnRpcOsType[VpnRpcOsType[\"CYGWIN\"] = 3300] = \"CYGWIN\";\r\n    /** BSD */\r\n    VpnRpcOsType[VpnRpcOsType[\"BSD\"] = 3400] = \"BSD\";\r\n    /** MacOS X */\r\n    VpnRpcOsType[VpnRpcOsType[\"MACOS_X\"] = 3500] = \"MACOS_X\";\r\n})(VpnRpcOsType = exports.VpnRpcOsType || (exports.VpnRpcOsType = {}));\r\n/** VPN Server Information */\r\nvar VpnRpcServerInfo = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcServerInfo' class: VPN Server Information */\r\n    function VpnRpcServerInfo(init) {\r\n        /** Server product name */\r\n        this.ServerProductName_str = \"\";\r\n        /** Server version string */\r\n        this.ServerVersionString_str = \"\";\r\n        /** Server build information string */\r\n        this.ServerBuildInfoString_str = \"\";\r\n        /** Server version integer value */\r\n        this.ServerVerInt_u32 = 0;\r\n        /** Server build number integer value */\r\n        this.ServerBuildInt_u32 = 0;\r\n        /** Server host name */\r\n        this.ServerHostName_str = \"\";\r\n        /** Type of server */\r\n        this.ServerType_u32 = 0;\r\n        /** Build date and time of the server */\r\n        this.ServerBuildDate_dt = new Date();\r\n        /** Family name */\r\n        this.ServerFamilyName_str = \"\";\r\n        /** OS type */\r\n        this.OsType_u32 = 0;\r\n        /** Service pack number */\r\n        this.OsServicePack_u32 = 0;\r\n        /** OS system name */\r\n        this.OsSystemName_str = \"\";\r\n        /** OS product name */\r\n        this.OsProductName_str = \"\";\r\n        /** OS vendor name */\r\n        this.OsVendorName_str = \"\";\r\n        /** OS version */\r\n        this.OsVersion_str = \"\";\r\n        /** Kernel name */\r\n        this.KernelName_str = \"\";\r\n        /** Kernel version */\r\n        this.KernelVersion_str = \"\";\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcServerInfo;\r\n}());\r\nexports.VpnRpcServerInfo = VpnRpcServerInfo;\r\n/** Server status */\r\nvar VpnRpcServerStatus = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcServerStatus' class: Server status */\r\n    function VpnRpcServerStatus(init) {\r\n        /** Type of server */\r\n        this.ServerType_u32 = 0;\r\n        /** Total number of TCP connections */\r\n        this.NumTcpConnections_u32 = 0;\r\n        /** Number of Local TCP connections */\r\n        this.NumTcpConnectionsLocal_u32 = 0;\r\n        /** Number of remote TCP connections */\r\n        this.NumTcpConnectionsRemote_u32 = 0;\r\n        /** Total number of HUBs */\r\n        this.NumHubTotal_u32 = 0;\r\n        /** Nymber of stand-alone HUB */\r\n        this.NumHubStandalone_u32 = 0;\r\n        /** Number of static HUBs */\r\n        this.NumHubStatic_u32 = 0;\r\n        /** Number of Dynamic HUBs */\r\n        this.NumHubDynamic_u32 = 0;\r\n        /** Total number of sessions */\r\n        this.NumSessionsTotal_u32 = 0;\r\n        /** Number of local VPN sessions */\r\n        this.NumSessionsLocal_u32 = 0;\r\n        /** The number of remote sessions */\r\n        this.NumSessionsRemote_u32 = 0;\r\n        /** Number of MAC table entries (total sum of all Virtual Hubs) */\r\n        this.NumMacTables_u32 = 0;\r\n        /** Number of IP table entries (total sum of all Virtual Hubs) */\r\n        this.NumIpTables_u32 = 0;\r\n        /** Number of users (total sum of all Virtual Hubs) */\r\n        this.NumUsers_u32 = 0;\r\n        /** Number of groups (total sum of all Virtual Hubs) */\r\n        this.NumGroups_u32 = 0;\r\n        /** Number of assigned bridge licenses (Useful to make a commercial version) */\r\n        this.AssignedBridgeLicenses_u32 = 0;\r\n        /** Number of assigned client licenses (Useful to make a commercial version) */\r\n        this.AssignedClientLicenses_u32 = 0;\r\n        /** Number of Assigned bridge license (cluster-wide), useful to make a commercial version */\r\n        this.AssignedBridgeLicensesTotal_u32 = 0;\r\n        /** Number of assigned client licenses (cluster-wide), useful to make a commercial version */\r\n        this.AssignedClientLicensesTotal_u32 = 0;\r\n        /** Number of broadcast packets (Recv) */\r\n        this[\"Recv.BroadcastBytes_u64\"] = 0;\r\n        /** Broadcast bytes (Recv) */\r\n        this[\"Recv.BroadcastCount_u64\"] = 0;\r\n        /** Unicast count (Recv) */\r\n        this[\"Recv.UnicastBytes_u64\"] = 0;\r\n        /** Unicast bytes (Recv) */\r\n        this[\"Recv.UnicastCount_u64\"] = 0;\r\n        /** Number of broadcast packets (Send) */\r\n        this[\"Send.BroadcastBytes_u64\"] = 0;\r\n        /** Broadcast bytes (Send) */\r\n        this[\"Send.BroadcastCount_u64\"] = 0;\r\n        /** Unicast bytes (Send) */\r\n        this[\"Send.UnicastBytes_u64\"] = 0;\r\n        /** Unicast bytes (Send) */\r\n        this[\"Send.UnicastCount_u64\"] = 0;\r\n        /** Current time */\r\n        this.CurrentTime_dt = new Date();\r\n        /** 64 bit High-Precision Logical System Clock */\r\n        this.CurrentTick_u64 = 0;\r\n        /** VPN Server Start-up time */\r\n        this.StartTime_dt = new Date();\r\n        /** Memory information: Total Memory */\r\n        this.TotalMemory_u64 = 0;\r\n        /** Memory information: Used Memory */\r\n        this.UsedMemory_u64 = 0;\r\n        /** Memory information: Free Memory */\r\n        this.FreeMemory_u64 = 0;\r\n        /** Memory information: Total Phys */\r\n        this.TotalPhys_u64 = 0;\r\n        /** Memory information: Used Phys */\r\n        this.UsedPhys_u64 = 0;\r\n        /** Memory information: Free Phys */\r\n        this.FreePhys_u64 = 0;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcServerStatus;\r\n}());\r\nexports.VpnRpcServerStatus = VpnRpcServerStatus;\r\n/** VPN Session status */\r\nvar VpnRpcSessionStatus = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcSessionStatus' class: VPN Session status */\r\n    function VpnRpcSessionStatus(init) {\r\n        /** The Virtual Hub name */\r\n        this.HubName_str = \"\";\r\n        /** VPN session name */\r\n        this.Name_str = \"\";\r\n        /** User name */\r\n        this.Username_str = \"\";\r\n        /** Real user name which was used for the authentication */\r\n        this.RealUsername_str = \"\";\r\n        /** Group name */\r\n        this.GroupName_str = \"\";\r\n        /** Is Cascade Session */\r\n        this.LinkMode_bool = false;\r\n        /** Client IP address */\r\n        this.Client_Ip_Address_ip = \"\";\r\n        /** Client host name */\r\n        this.SessionStatus_ClientHostName_str = \"\";\r\n        /** Operation flag */\r\n        this.Active_bool = false;\r\n        /** Connected flag */\r\n        this.Connected_bool = false;\r\n        /** State of the client session */\r\n        this.SessionStatus_u32 = 0;\r\n        /** Server name */\r\n        this.ServerName_str = \"\";\r\n        /** Port number of the server */\r\n        this.ServerPort_u32 = 0;\r\n        /** Server product name */\r\n        this.ServerProductName_str = \"\";\r\n        /** Server product version */\r\n        this.ServerProductVer_u32 = 0;\r\n        /** Server product build number */\r\n        this.ServerProductBuild_u32 = 0;\r\n        /** Connection start time */\r\n        this.StartTime_dt = new Date();\r\n        /** Connection completion time of the first connection */\r\n        this.FirstConnectionEstablisiedTime_dt = new Date();\r\n        /** Connection completion time of this connection */\r\n        this.CurrentConnectionEstablishTime_dt = new Date();\r\n        /** Number of connections have been established so far */\r\n        this.NumConnectionsEatablished_u32 = 0;\r\n        /** Half-connection */\r\n        this.HalfConnection_bool = false;\r\n        /** VoIP / QoS */\r\n        this.QoS_bool = false;\r\n        /** Maximum number of the underlying TCP connections */\r\n        this.MaxTcpConnections_u32 = 0;\r\n        /** Number of current underlying TCP connections */\r\n        this.NumTcpConnections_u32 = 0;\r\n        /** Number of inbound underlying connections */\r\n        this.NumTcpConnectionsUpload_u32 = 0;\r\n        /** Number of outbound underlying connections */\r\n        this.NumTcpConnectionsDownload_u32 = 0;\r\n        /** Use of encryption */\r\n        this.UseEncrypt_bool = false;\r\n        /** Cipher algorithm name */\r\n        this.CipherName_str = \"\";\r\n        /** Use of compression */\r\n        this.UseCompress_bool = false;\r\n        /** Is R-UDP session */\r\n        this.IsRUDPSession_bool = false;\r\n        /** Physical underlying communication protocol */\r\n        this.UnderlayProtocol_str = \"\";\r\n        /** The UDP acceleration is enabled */\r\n        this.IsUdpAccelerationEnabled_bool = false;\r\n        /** Using the UDP acceleration function */\r\n        this.IsUsingUdpAcceleration_bool = false;\r\n        /** VPN session name */\r\n        this.SessionName_str = \"\";\r\n        /** Connection name */\r\n        this.ConnectionName_str = \"\";\r\n        /** Session key */\r\n        this.SessionKey_bin = new Uint8Array([]);\r\n        /** Total transmitted data size */\r\n        this.TotalSendSize_u64 = 0;\r\n        /** Total received data size */\r\n        this.TotalRecvSize_u64 = 0;\r\n        /** Total transmitted data size (no compression) */\r\n        this.TotalSendSizeReal_u64 = 0;\r\n        /** Total received data size (no compression) */\r\n        this.TotalRecvSizeReal_u64 = 0;\r\n        /** Is Bridge Mode */\r\n        this.IsBridgeMode_bool = false;\r\n        /** Is Monitor mode */\r\n        this.IsMonitorMode_bool = false;\r\n        /** VLAN ID */\r\n        this.VLanId_u32 = 0;\r\n        /** Client product name */\r\n        this.ClientProductName_str = \"\";\r\n        /** Client version */\r\n        this.ClientProductVer_u32 = 0;\r\n        /** Client build number */\r\n        this.ClientProductBuild_u32 = 0;\r\n        /** Client OS name */\r\n        this.ClientOsName_str = \"\";\r\n        /** Client OS version */\r\n        this.ClientOsVer_str = \"\";\r\n        /** Client OS Product ID */\r\n        this.ClientOsProductId_str = \"\";\r\n        /** Client host name */\r\n        this.ClientHostname_str = \"\";\r\n        /** Unique ID */\r\n        this.UniqueId_bin = new Uint8Array([]);\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcSessionStatus;\r\n}());\r\nexports.VpnRpcSessionStatus = VpnRpcSessionStatus;\r\n/** Set the special listener */\r\nvar VpnRpcSpecialListener = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcSpecialListener' class: Set the special listener */\r\n    function VpnRpcSpecialListener(init) {\r\n        /** The flag to activate the VPN over ICMP server function */\r\n        this.VpnOverIcmpListener_bool = false;\r\n        /** The flag to activate the VPN over DNS function */\r\n        this.VpnOverDnsListener_bool = false;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcSpecialListener;\r\n}());\r\nexports.VpnRpcSpecialListener = VpnRpcSpecialListener;\r\n/** Syslog configuration */\r\nvar VpnSyslogSaveType;\r\n(function (VpnSyslogSaveType) {\r\n    /** Do not use syslog */\r\n    VpnSyslogSaveType[VpnSyslogSaveType[\"None\"] = 0] = \"None\";\r\n    /** Only server log */\r\n    VpnSyslogSaveType[VpnSyslogSaveType[\"ServerLog\"] = 1] = \"ServerLog\";\r\n    /** Server and Virtual HUB security log */\r\n    VpnSyslogSaveType[VpnSyslogSaveType[\"ServerAndHubSecurityLog\"] = 2] = \"ServerAndHubSecurityLog\";\r\n    /** Server, Virtual HUB security, and packet log */\r\n    VpnSyslogSaveType[VpnSyslogSaveType[\"ServerAndHubAllLog\"] = 3] = \"ServerAndHubAllLog\";\r\n})(VpnSyslogSaveType = exports.VpnSyslogSaveType || (exports.VpnSyslogSaveType = {}));\r\n/** Syslog configuration */\r\nvar VpnSyslogSetting = /** @class */ (function () {\r\n    /** Constructor for the 'VpnSyslogSetting' class: Syslog configuration */\r\n    function VpnSyslogSetting(init) {\r\n        /** The behavior of the syslog function */\r\n        this.SaveType_u32 = 0;\r\n        /** Specify the host name or IP address of the syslog server */\r\n        this.Hostname_str = \"\";\r\n        /** Specify the port number of the syslog server */\r\n        this.Port_u32 = 0;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnSyslogSetting;\r\n}());\r\nexports.VpnSyslogSetting = VpnSyslogSetting;\r\n/** VPN Gate Server Config */\r\nvar VpnVgsConfig = /** @class */ (function () {\r\n    /** Constructor for the 'VpnVgsConfig' class: VPN Gate Server Config */\r\n    function VpnVgsConfig(init) {\r\n        /** Active flag */\r\n        this.IsEnabled_bool = false;\r\n        /** Message */\r\n        this.Message_utf = \"\";\r\n        /** Owner name */\r\n        this.Owner_utf = \"\";\r\n        /** Abuse email */\r\n        this.Abuse_utf = \"\";\r\n        /** Log save flag */\r\n        this.NoLog_bool = false;\r\n        /** Save log permanently */\r\n        this.LogPermanent_bool = false;\r\n        /** Enable the L2TP VPN function */\r\n        this.EnableL2TP_bool = false;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnVgsConfig;\r\n}());\r\nexports.VpnVgsConfig = VpnVgsConfig;\r\n/** Read a Log file */\r\nvar VpnRpcReadLogFile = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcReadLogFile' class: Read a Log file */\r\n    function VpnRpcReadLogFile(init) {\r\n        /** Server name */\r\n        this.ServerName_str = \"\";\r\n        /** File Path */\r\n        this.FilePath_str = \"\";\r\n        /** Offset to download. You have to call the ReadLogFile API multiple times to download the entire log file with requesting a part of the file by specifying the Offset_u32 field. */\r\n        this.Offset_u32 = 0;\r\n        /** Received buffer */\r\n        this.Buffer_bin = new Uint8Array([]);\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcReadLogFile;\r\n}());\r\nexports.VpnRpcReadLogFile = VpnRpcReadLogFile;\r\n/** Rename link */\r\nvar VpnRpcRenameLink = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcRenameLink' class: Rename link */\r\n    function VpnRpcRenameLink(init) {\r\n        /** The Virtual Hub name */\r\n        this.HubName_str = \"\";\r\n        /** The old name of the cascade connection */\r\n        this.OldAccountName_utf = \"\";\r\n        /** The new name of the cascade connection */\r\n        this.NewAccountName_utf = \"\";\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcRenameLink;\r\n}());\r\nexports.VpnRpcRenameLink = VpnRpcRenameLink;\r\n/** Online or offline the HUB */\r\nvar VpnRpcSetHubOnline = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcSetHubOnline' class: Online or offline the HUB */\r\n    function VpnRpcSetHubOnline(init) {\r\n        /** The Virtual Hub name */\r\n        this.HubName_str = \"\";\r\n        /** Online / offline flag */\r\n        this.Online_bool = false;\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcSetHubOnline;\r\n}());\r\nexports.VpnRpcSetHubOnline = VpnRpcSetHubOnline;\r\n/** Set Password */\r\nvar VpnRpcSetPassword = /** @class */ (function () {\r\n    /** Constructor for the 'VpnRpcSetPassword' class: Set Password */\r\n    function VpnRpcSetPassword(init) {\r\n        /** The plaintext password */\r\n        this.PlainTextPassword_str = \"\";\r\n        Object.assign(this, init);\r\n    }\r\n    return VpnRpcSetPassword;\r\n}());\r\nexports.VpnRpcSetPassword = VpnRpcSetPassword;\r\n// --- Utility codes ---\r\n/** JSON-RPC request class. See https://www.jsonrpc.org/specification */\r\nvar JsonRpcRequest = /** @class */ (function () {\r\n    function JsonRpcRequest(method, param, id) {\r\n        if (method === void 0) { method = \"\"; }\r\n        if (param === void 0) { param = null; }\r\n        if (id === void 0) { id = \"\"; }\r\n        this.jsonrpc = \"2.0\";\r\n        this.method = method;\r\n        this.params = param;\r\n        this.id = id;\r\n    }\r\n    return JsonRpcRequest;\r\n}());\r\nexports.JsonRpcRequest = JsonRpcRequest;\r\n/** JSON-RPC error class. See https://www.jsonrpc.org/specification */\r\nvar JsonRpcError = /** @class */ (function () {\r\n    function JsonRpcError(code, message, data) {\r\n        if (code === void 0) { code = 0; }\r\n        if (message === void 0) { message = \"\"; }\r\n        if (data === void 0) { data = null; }\r\n        this.code = code;\r\n        this.message = message;\r\n        this.data = data;\r\n    }\r\n    return JsonRpcError;\r\n}());\r\nexports.JsonRpcError = JsonRpcError;\r\n/** JSON-RPC response class with generics */\r\nvar JsonRpcResponse = /** @class */ (function () {\r\n    function JsonRpcResponse() {\r\n        this.jsonrpc = \"2.0\";\r\n        this.result = null;\r\n        this.error = null;\r\n        this.id = \"\";\r\n    }\r\n    return JsonRpcResponse;\r\n}());\r\nexports.JsonRpcResponse = JsonRpcResponse;\r\n/** JSON-RPC client class. See https://www.jsonrpc.org/specification */\r\nvar JsonRpcClient = /** @class */ (function () {\r\n    /**\r\n     * JSON-RPC client class constructor\r\n     * @param url The URL\r\n     * @param headers Additional HTTP headers\r\n     * @param send_credential Set true to use the same credential with the browsing web site. Valid only if the code is running on the web browser.\r\n     */\r\n    function JsonRpcClient(url, headers, send_credential, nodejs_https_client_reject_untrusted_server_cert) {\r\n        this.BaseUrl = url;\r\n        this.headers = headers;\r\n        this.client = new HttpClient();\r\n        this.client.SendCredential = send_credential;\r\n        this.client.NodeJS_HTTPS_Client_Reject_Unauthorized = nodejs_https_client_reject_untrusted_server_cert;\r\n    }\r\n    /** A utility function to convert any object to JSON string */\r\n    JsonRpcClient.ObjectToJson = function (obj) {\r\n        return JSON.stringify(obj, function (key, value) {\r\n            if (key.endsWith(\"_bin\")) {\r\n                return Util_Base64_Encode(value);\r\n            }\r\n            return value;\r\n        }, 4);\r\n    };\r\n    /** A utility function to convert JSON string to object */\r\n    JsonRpcClient.JsonToObject = function (str) {\r\n        return JSON.parse(str, function (key, value) {\r\n            if (key.endsWith(\"_bin\")) {\r\n                return Util_Base64_Decode(value);\r\n            }\r\n            else if (key.endsWith(\"_dt\")) {\r\n                return new Date(value);\r\n            }\r\n            return value;\r\n        });\r\n    };\r\n    /**\r\n     * Call a single RPC call (without error check). You can wait for the response with Promise<string> or await statement.\r\n     * @param method_name The name of RPC method\r\n     * @param param The parameters\r\n     */\r\n    JsonRpcClient.prototype.CallInternalAsync = function (method_name, param) {\r\n        return __awaiter(this, void 0, void 0, function () {\r\n            var id, req, req_string, http_response, ret_string;\r\n            return __generator(this, function (_a) {\r\n                switch (_a.label) {\r\n                    case 0:\r\n                        id = \"1\";\r\n                        req = new JsonRpcRequest(method_name, param, id);\r\n                        req_string = JsonRpcClient.ObjectToJson(req);\r\n                        if (debug_mode) {\r\n                            console.log(\"--- RPC Request Body ---\");\r\n                            console.log(req_string);\r\n                            console.log(\"------------------------\");\r\n                        }\r\n                        return [4 /*yield*/, this.client.PostAsync(this.BaseUrl, this.headers, req_string, \"application/json\")];\r\n                    case 1:\r\n                        http_response = _a.sent();\r\n                        ret_string = http_response.Body;\r\n                        if (debug_mode) {\r\n                            console.log(\"--- RPC Response Body ---\");\r\n                            console.log(ret_string);\r\n                            console.log(\"-------------------------\");\r\n                        }\r\n                        return [2 /*return*/, ret_string];\r\n                }\r\n            });\r\n        });\r\n    };\r\n    /**\r\n     * Call a single RPC call (with error check). You can wait for the response with Promise<TResult> or await statement. In the case of error, it will be thrown.\r\n     * @param method_name The name of RPC method\r\n     * @param param The parameters\r\n     */\r\n    JsonRpcClient.prototype.CallAsync = function (method_name, param) {\r\n        return __awaiter(this, void 0, void 0, function () {\r\n            var ret_string, ret;\r\n            return __generator(this, function (_a) {\r\n                switch (_a.label) {\r\n                    case 0: return [4 /*yield*/, this.CallInternalAsync(method_name, param)];\r\n                    case 1:\r\n                        ret_string = _a.sent();\r\n                        ret = JSON.parse(ret_string);\r\n                        if (is_null(ret.error) === false) {\r\n                            throw new JsonRpcException(ret.error);\r\n                        }\r\n                        return [2 /*return*/, ret.result];\r\n                }\r\n            });\r\n        });\r\n    };\r\n    return JsonRpcClient;\r\n}());\r\nexports.JsonRpcClient = JsonRpcClient;\r\n/** JSON-RPC exception class */\r\nvar JsonRpcException = /** @class */ (function (_super) {\r\n    __extends(JsonRpcException, _super);\r\n    function JsonRpcException(error) {\r\n        var _this = _super.call(this, \"Code=\" + error.code + \", Message=\" + error.message) || this;\r\n        _this.Error = error;\r\n        return _this;\r\n    }\r\n    return JsonRpcException;\r\n}(Error));\r\nexports.JsonRpcException = JsonRpcException;\r\n/** HTTP client exception class */\r\nvar HttpClientException = /** @class */ (function (_super) {\r\n    __extends(HttpClientException, _super);\r\n    function HttpClientException(message) {\r\n        return _super.call(this, message) || this;\r\n    }\r\n    return HttpClientException;\r\n}(Error));\r\nexports.HttpClientException = HttpClientException;\r\n/** HTTP client response class */\r\nvar HttpClientResponse = /** @class */ (function () {\r\n    function HttpClientResponse() {\r\n        this.Body = \"\";\r\n    }\r\n    return HttpClientResponse;\r\n}());\r\nexports.HttpClientResponse = HttpClientResponse;\r\n/** An HTTP client which can be used in both web browsers and Node.js */\r\nvar HttpClient = /** @class */ (function () {\r\n    function HttpClient() {\r\n        this.TimeoutMsecs = 60 * 5 * 1000;\r\n        this.SendCredential = true;\r\n        this.NodeJS_HTTPS_Client_Reject_Unauthorized = false;\r\n    }\r\n    /** Post method. In web browsers this function will process the request by itself. In Node.js this function will call PostAsync_NodeJS() instead. */\r\n    HttpClient.prototype.PostAsync = function (url, headers, req_body, req_media_type) {\r\n        return __awaiter(this, void 0, void 0, function () {\r\n            var fetch_header_list, _i, _a, name_1, fetch_init, fetch_response, ret, _b;\r\n            return __generator(this, function (_c) {\r\n                switch (_c.label) {\r\n                    case 0:\r\n                        if (is_node_js) {\r\n                            return [2 /*return*/, this.PostAsync_NodeJS(url, headers, req_body, req_media_type)];\r\n                        }\r\n                        fetch_header_list = new Headers();\r\n                        for (_i = 0, _a = Object.keys(headers); _i < _a.length; _i++) {\r\n                            name_1 = _a[_i];\r\n                            fetch_header_list.append(name_1, headers[name_1]);\r\n                        }\r\n                        fetch_init = {\r\n                            mode: \"cors\",\r\n                            headers: fetch_header_list,\r\n                            credentials: (this.SendCredential ? \"include\" : \"omit\"),\r\n                            method: \"POST\",\r\n                            cache: \"no-cache\",\r\n                            keepalive: true,\r\n                            redirect: \"follow\",\r\n                            body: req_body\r\n                        };\r\n                        return [4 /*yield*/, fetch(url, fetch_init)];\r\n                    case 1:\r\n                        fetch_response = _c.sent();\r\n                        if (fetch_response.ok === false) {\r\n                            throw new HttpClientException(\"HTTP Error: \" + fetch_response.status + \" \" + fetch_response.statusText);\r\n                        }\r\n                        ret = new HttpClientResponse();\r\n                        _b = ret;\r\n                        return [4 /*yield*/, fetch_response.text()];\r\n                    case 2:\r\n                        _b.Body = _c.sent();\r\n                        return [2 /*return*/, ret];\r\n                }\r\n            });\r\n        });\r\n    };\r\n    /** Post method for Node.js. */\r\n    HttpClient.prototype.PostAsync_NodeJS = function (url, headers, req_body, req_media_type) {\r\n        var https = require(\"https\");\r\n        var keepAliveAgent = new https.Agent({ keepAlive: true });\r\n        var urlparse = require(\"url\");\r\n        var urlobj = urlparse.parse(url);\r\n        if (is_null(urlobj.host))\r\n            throw new Error(\"URL is invalid.\");\r\n        var options = {\r\n            host: urlobj.hostname,\r\n            port: urlobj.port,\r\n            path: urlobj.path,\r\n            rejectUnauthorized: this.NodeJS_HTTPS_Client_Reject_Unauthorized,\r\n            method: \"POST\",\r\n            timeout: this.TimeoutMsecs,\r\n            agent: keepAliveAgent\r\n        };\r\n        return new Promise(function (resolve, reject) {\r\n            var req = https.request(options, function (res) {\r\n                if (res.statusCode !== 200) {\r\n                    reject(new HttpClientException(\"HTTP Error: \" + res.statusCode + \" \" + res.statusMessage));\r\n                }\r\n                var recv_str = \"\";\r\n                res.on(\"data\", function (body) {\r\n                    recv_str += body;\r\n                });\r\n                res.on(\"end\", function () {\r\n                    var ret = new HttpClientResponse();\r\n                    ret.Body = recv_str;\r\n                    resolve(ret);\r\n                });\r\n            }).on(\"error\", function (err) {\r\n                throw err;\r\n            });\r\n            for (var _i = 0, _a = Object.keys(headers); _i < _a.length; _i++) {\r\n                var name_2 = _a[_i];\r\n                req.setHeader(name_2, !is_null(headers[name_2]) ? headers[name_2] : \"\");\r\n            }\r\n            req.setHeader(\"Content-Type\", req_media_type);\r\n            req.setHeader(\"Content-Length\", Buffer.byteLength(req_body));\r\n            req.write(req_body);\r\n            req.end();\r\n        });\r\n    };\r\n    return HttpClient;\r\n}());\r\nexports.HttpClient = HttpClient;\r\n//////// BEGIN: Base64 encode / decode utility functions from https://github.com/beatgammit/base64-js\r\n// The MIT License(MIT)\r\n// Copyright(c) 2014\r\n// Permission is hereby granted, free of charge, to any person obtaining a copy\r\n// of this software and associated documentation files(the \"Software\"), to deal\r\n//     in the Software without restriction, including without limitation the rights\r\n// to use, copy, modify, merge, publish, distribute, sublicense, and / or sell\r\n// copies of the Software, and to permit persons to whom the Software is\r\n// furnished to do so, subject to the following conditions:\r\n// The above copyright notice and this permission notice shall be included in\r\n//     all copies or substantial portions of the Software.\r\n// THE SOFTWARE IS PROVIDED \"AS IS\", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR\r\n// IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,\r\n//     FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.IN NO EVENT SHALL THE\r\n// AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER\r\n// LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,\r\n//     OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN\r\n// THE SOFTWARE.\r\nvar lookup = [];\r\nvar revLookup = [];\r\nvar code = \"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/\";\r\nfor (var i = 0, len = code.length; i < len; ++i) {\r\n    lookup[i] = code[i];\r\n    revLookup[code.charCodeAt(i)] = i;\r\n}\r\n// Support decoding URL-safe base64 strings, as Node.js does.\r\n// See: https://en.wikipedia.org/wiki/Base64#URL_applications\r\nrevLookup[\"-\".charCodeAt(0)] = 62;\r\nrevLookup[\"_\".charCodeAt(0)] = 63;\r\nfunction getLens(b64) {\r\n    var len = b64.length;\r\n    if (len % 4 > 0) {\r\n        throw new Error(\"Invalid string. Length must be a multiple of 4\");\r\n    }\r\n    // Trim off extra bytes after placeholder bytes are found\r\n    // See: https://github.com/beatgammit/base64-js/issues/42\r\n    var validLen = b64.indexOf(\"=\");\r\n    if (validLen === -1)\r\n        validLen = len;\r\n    var placeHoldersLen = validLen === len\r\n        ? 0\r\n        : 4 - (validLen % 4);\r\n    return [validLen, placeHoldersLen];\r\n}\r\n// base64 is 4/3 + up to two characters of the original data\r\nfunction byteLength(b64) {\r\n    var lens = getLens(b64);\r\n    var validLen = lens[0];\r\n    var placeHoldersLen = lens[1];\r\n    return ((validLen + placeHoldersLen) * 3 / 4) - placeHoldersLen;\r\n}\r\nfunction _byteLength(b64, validLen, placeHoldersLen) {\r\n    return ((validLen + placeHoldersLen) * 3 / 4) - placeHoldersLen;\r\n}\r\nfunction Util_Base64_Decode(b64) {\r\n    var tmp;\r\n    var lens = getLens(b64);\r\n    var validLen = lens[0];\r\n    var placeHoldersLen = lens[1];\r\n    var arr = new Uint8Array(_byteLength(b64, validLen, placeHoldersLen));\r\n    var curByte = 0;\r\n    // if there are placeholders, only get up to the last complete 4 chars\r\n    var len = placeHoldersLen > 0\r\n        ? validLen - 4\r\n        : validLen;\r\n    for (var i = 0; i < len; i += 4) {\r\n        tmp =\r\n            (revLookup[b64.charCodeAt(i)] << 18) |\r\n                (revLookup[b64.charCodeAt(i + 1)] << 12) |\r\n                (revLookup[b64.charCodeAt(i + 2)] << 6) |\r\n                revLookup[b64.charCodeAt(i + 3)];\r\n        arr[curByte++] = (tmp >> 16) & 0xFF;\r\n        arr[curByte++] = (tmp >> 8) & 0xFF;\r\n        arr[curByte++] = tmp & 0xFF;\r\n    }\r\n    if (placeHoldersLen === 2) {\r\n        tmp =\r\n            (revLookup[b64.charCodeAt(i)] << 2) |\r\n                (revLookup[b64.charCodeAt(i + 1)] >> 4);\r\n        arr[curByte++] = tmp & 0xFF;\r\n    }\r\n    if (placeHoldersLen === 1) {\r\n        tmp =\r\n            (revLookup[b64.charCodeAt(i)] << 10) |\r\n                (revLookup[b64.charCodeAt(i + 1)] << 4) |\r\n                (revLookup[b64.charCodeAt(i + 2)] >> 2);\r\n        arr[curByte++] = (tmp >> 8) & 0xFF;\r\n        arr[curByte++] = tmp & 0xFF;\r\n    }\r\n    return arr;\r\n}\r\nexports.Util_Base64_Decode = Util_Base64_Decode;\r\nfunction tripletToBase64(num) {\r\n    return lookup[num >> 18 & 0x3F] +\r\n        lookup[num >> 12 & 0x3F] +\r\n        lookup[num >> 6 & 0x3F] +\r\n        lookup[num & 0x3F];\r\n}\r\nfunction encodeChunk(uint8, start, end) {\r\n    var tmp;\r\n    var output = [];\r\n    for (var i = start; i < end; i += 3) {\r\n        tmp =\r\n            ((uint8[i] << 16) & 0xFF0000) +\r\n                ((uint8[i + 1] << 8) & 0xFF00) +\r\n                (uint8[i + 2] & 0xFF);\r\n        output.push(tripletToBase64(tmp));\r\n    }\r\n    return output.join(\"\");\r\n}\r\nfunction Util_Base64_Encode(uint8) {\r\n    var tmp;\r\n    var len = uint8.length;\r\n    var extraBytes = len % 3; // if we have 1 byte left, pad 2 bytes\r\n    var parts = [];\r\n    var maxChunkLength = 16383; // must be multiple of 3\r\n    // go through the array every three bytes, we'll deal with trailing stuff later\r\n    for (var i = 0, len2 = len - extraBytes; i < len2; i += maxChunkLength) {\r\n        parts.push(encodeChunk(uint8, i, (i + maxChunkLength) > len2 ? len2 : (i + maxChunkLength)));\r\n    }\r\n    // pad the end with zeros, but make sure to not forget the extra bytes\r\n    if (extraBytes === 1) {\r\n        tmp = uint8[len - 1];\r\n        parts.push(lookup[tmp >> 2] +\r\n            lookup[(tmp << 4) & 0x3F] +\r\n            \"==\");\r\n    }\r\n    else if (extraBytes === 2) {\r\n        tmp = (uint8[len - 2] << 8) + uint8[len - 1];\r\n        parts.push(lookup[tmp >> 10] +\r\n            lookup[(tmp >> 4) & 0x3F] +\r\n            lookup[(tmp << 2) & 0x3F] +\r\n            \"=\");\r\n    }\r\n    return parts.join(\"\");\r\n}\r\nexports.Util_Base64_Encode = Util_Base64_Encode;\r\n//////// END: Base64 encode / decode utility functions from https://github.com/beatgammit/base64-js\r\n//# sourceMappingURL=vpnrpc.js.map"],"mappings":"AAAA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;A","sourceRoot":""}\n//# sourceURL=webpack-internal:///./node_modules/vpnrpc/dist/vpnrpc.js\n"); /***/ }), From e4330ca71ab0b97c9b90e6aee151e2a301d6226f Mon Sep 17 00:00:00 2001 From: hiura Date: Wed, 28 Jun 2023 23:18:09 +0900 Subject: [PATCH 03/63] bind outgoing connection --- src/Cedar/CM.c | 61 +++++++++ src/Cedar/Client.c | 10 +- src/Cedar/Connection.h | 2 + src/Cedar/Protocol.c | 122 ++++++++++++++++-- src/Cedar/Protocol.h | 9 ++ src/Cedar/SMInner.h | 5 +- src/Cedar/Session.c | 1 + src/Cedar/Session.h | 1 + src/Mayaqua/Network.c | 213 +++++++++++++++++++++++++++++++- src/Mayaqua/Network.h | 14 +++ src/Mayaqua/Proxy.c | 40 +++++- src/Mayaqua/Proxy.h | 7 ++ src/PenCore/PenCore.rc | 20 +-- src/PenCore/resource.h | 1 + src/bin/hamcore/strtable_en.stb | 1 + src/bin/hamcore/strtable_ja.stb | 1 + 16 files changed, 479 insertions(+), 29 deletions(-) diff --git a/src/Cedar/CM.c b/src/Cedar/CM.c index 42a2b412..6d535bc2 100644 --- a/src/Cedar/CM.c +++ b/src/Cedar/CM.c @@ -6150,6 +6150,7 @@ void CmImportAccountMainEx(HWND hWnd, wchar_t *filename, bool overwrite) t->ClientOption->RequireMonitorMode = old_option->RequireMonitorMode; t->ClientOption->RequireBridgeRoutingMode = old_option->RequireBridgeRoutingMode; t->ClientOption->DisableQoS = old_option->DisableQoS; + t->ClientOption->BindLocalIP = old_option->BindLocalIP;// Source IP address for outgoing connection // Inherit the authentication data CiFreeClientAuth(t->ClientAuth); @@ -6456,9 +6457,54 @@ void CmDetailDlgUpdate(HWND hWnd, CM_ACCOUNT *a) Disable(hWnd, R_BRIDGE); Disable(hWnd, R_MONITOR); Disable(hWnd, R_NO_ROUTING); +#if TYPE_BINDLOCALIP + Disable(hWnd, E_BIND_LOCALIP);// Source IP address for outgoing connection +#endif + } } +#if TYPE_BINDLOCALIP +// Set the value of the IP type +void SetIp(HWND hWnd, UINT id, IP* ip) +{ + char tmp[MAX_SIZE]; + // Validate arguments + if (hWnd == NULL || ip == NULL) + { + return; + } + + IPToStr(tmp, sizeof(tmp), ip); + SetTextA(hWnd, id, tmp); +} + +// Get an IP address +bool GetIp(HWND hWnd, UINT id, IP* ip) +{ + char tmp[MAX_SIZE]; + // Validate arguments + if (hWnd == NULL || ip == NULL) + { + return false; + } + + Zero(ip, sizeof(IP)); + + if (GetTxtA(hWnd, id, tmp, sizeof(tmp)) == false) + { + return false; + } + + if (StrToIP(ip, tmp) == false) + { + return false; + } + + return true; +} +#endif + // Advanced Settings dialog procedure UINT CmDetailDlgProc(HWND hWnd, UINT msg, WPARAM wParam, LPARAM lParam, void *param) { @@ -6495,6 +6541,9 @@ UINT CmDetailDlgProc(HWND hWnd, UINT msg, WPARAM wParam, LPARAM lParam, void *pa Check(hWnd, R_NO_ROUTING, a->ClientOption->NoRoutingTracking); Check(hWnd, R_DISABLE_QOS, a->ClientOption->DisableQoS); Check(hWnd, R_DISABLE_UDP, a->ClientOption->NoUdpAcceleration); +#if TYPE_BINDLOCALIP + SetIp(hWnd, E_BIND_LOCALIP, &a->ClientOption->BindLocalIP);// Source IP address for outgoing connection +#endif // Select the Connection Mode if (a->LinkMode == false) @@ -6542,6 +6591,15 @@ UINT CmDetailDlgProc(HWND hWnd, UINT msg, WPARAM wParam, LPARAM lParam, void *pa Focus(hWnd, E_INTERVAL); break; } +#if TYPE_BINDLOCALIP + // Source IP address for outgoing connection + IP tmpIP; + if (GetIp(hWnd, E_BIND_LOCALIP, &tmpIP) == false) + { + FocusEx(hWnd, E_BIND_LOCALIP); + break; + } +#endif a->ClientOption->MaxConnection = num; a->ClientOption->AdditionalConnectionInterval = GetInt(hWnd, E_INTERVAL); @@ -6559,6 +6617,9 @@ UINT CmDetailDlgProc(HWND hWnd, UINT msg, WPARAM wParam, LPARAM lParam, void *pa a->ClientOption->NoRoutingTracking = IsChecked(hWnd, R_NO_ROUTING); a->ClientOption->DisableQoS = IsChecked(hWnd, R_DISABLE_QOS); a->ClientOption->NoUdpAcceleration = IsChecked(hWnd, R_DISABLE_UDP); +#if TYPE_BINDLOCALIP + a->ClientOption->BindLocalIP = tmpIP;// Source IP address for outgoing connection +#endif if (a->LinkMode) { diff --git a/src/Cedar/Client.c b/src/Cedar/Client.c index a4175a3c..3e4c26d4 100644 --- a/src/Cedar/Client.c +++ b/src/Cedar/Client.c @@ -4342,6 +4342,9 @@ void InRpcClientOption(CLIENT_OPTION *c, PACK *p) PackGetStr(p, "CustomHttpHeader", c->CustomHttpHeader, sizeof(c->CustomHttpHeader)); PackGetStr(p, "HubName", c->HubName, sizeof(c->HubName)); PackGetStr(p, "DeviceName", c->DeviceName, sizeof(c->DeviceName)); +#if TYPE_BINDLOCALIP + PackGetIp(p, "BindLocalIP", &c->BindLocalIP);// Source IP address for outgoing connection +#endif c->UseEncrypt = PackGetInt(p, "UseEncrypt") ? true : false; c->UseCompress = PackGetInt(p, "UseCompress") ? true : false; c->HalfConnection = PackGetInt(p, "HalfConnection") ? true : false; @@ -4402,6 +4405,9 @@ void OutRpcClientOption(PACK *p, CLIENT_OPTION *c) PackAddBool(p, "FromAdminPack", c->FromAdminPack); PackAddBool(p, "NoUdpAcceleration", c->NoUdpAcceleration); PackAddData(p, "HostUniqueKey", c->HostUniqueKey, SHA1_SIZE); +#if TYPE_BINDLOCALIP + PackAddIp(p, "BindLocalIP", &c->BindLocalIP);// Source IP address for outgoing connection +#endif } // CLIENT_AUTH @@ -9296,7 +9302,8 @@ CLIENT_OPTION *CiLoadClientOption(FOLDER *f) o->DisableQoS = CfgGetBool(f, "DisableQoS"); o->FromAdminPack = CfgGetBool(f, "FromAdminPack"); o->NoUdpAcceleration = CfgGetBool(f, "NoUdpAcceleration"); - + CfgGetIp(f, "BindLocalIP", &o->BindLocalIP);// Source IP address for outgoing connection + b = CfgGetBuf(f, "HostUniqueKey"); if (b != NULL) { @@ -9850,6 +9857,7 @@ void CiWriteClientOption(FOLDER *f, CLIENT_OPTION *o) CfgAddBool(f, "RequireBridgeRoutingMode", o->RequireBridgeRoutingMode); CfgAddBool(f, "DisableQoS", o->DisableQoS); CfgAddBool(f, "NoUdpAcceleration", o->NoUdpAcceleration); + CfgAddIp(f, "BindLocalIP", &o->BindLocalIP);// Source IP address for outgoing connection if (o->FromAdminPack) { diff --git a/src/Cedar/Connection.h b/src/Cedar/Connection.h index 16c44f4b..d691fcdb 100644 --- a/src/Cedar/Connection.h +++ b/src/Cedar/Connection.h @@ -58,6 +58,7 @@ struct RC4_KEY_PAIR UCHAR ServerToClientKey[16]; UCHAR ClientToServerKey[16]; }; +#define TYPE_BINDLOCALIP 1 // Enable HMI user to edit Source IP address for outgoing connection // Client Options // Do not change item size or order and only add new items at the end! @@ -106,6 +107,7 @@ struct CLIENT_OPTION UCHAR HostUniqueKey[SHA1_SIZE]; // Host unique key char CustomHttpHeader[HTTP_CUSTOM_HEADER_MAX_SIZE]; // Custom HTTP proxy header char HintStr[MAX_HOST_NAME_LEN + 1]; // Hint string for NAT-T + IP BindLocalIP; // Source IP address for outgoing connection }; // Client authentication data diff --git a/src/Cedar/Protocol.c b/src/Cedar/Protocol.c index e2efd2b9..7eb98ea8 100644 --- a/src/Cedar/Protocol.c +++ b/src/Cedar/Protocol.c @@ -6219,6 +6219,8 @@ SOCK *ClientConnectGetSocket(CONNECTION *c, bool additional_connect) { volatile bool *cancel_flag = NULL; char hostname[MAX_HOST_NAME_LEN]; + char localaddr[MAX_HOST_NAME_LEN]; + bool save_resolved_ip = false; CLIENT_OPTION *o; SESSION *sess; @@ -6278,10 +6280,37 @@ SOCK *ClientConnectGetSocket(CONNECTION *c, bool additional_connect) if (o->PortUDP == 0) { + IP *localIP; + IP tmpIP; + UINT localport = BIND_LOCALPORT_NULL; + + // Top of Bind outgoing connection + // Decide the binding operation which is explicitly executed on the client-side + + // In the case of first TCP/IP connection + if (additional_connect == false) { + if (sess->ClientOption->NoRoutingTracking == false) { + StrToIP(&tmpIP, "0::0"); // Zero address is for dummy not to bind + } + else { + Debug("ClientConnectGetSocket(): Using client option %r for source IP address\n", sess->ClientOption->BindLocalIP); + // Nonzero address is for source IP address to bind. Zero address is for dummy not to bind. + tmpIP = sess->ClientOption->BindLocalIP; + } + localIP = &tmpIP; + } + // In the case of second and subsequent TCP/IP connections + else { + // Bind the socket to the actual local IP address of first TCP / IP connection + localIP = &sess->LocalIP_CacheForNextConnect; + //localIP = BIND_LOCALIP_NULL; // Specify not to bind for test + } + // Bottom of Bind outgoing connection + // If additional_connect == false, enable trying to NAT-T connection // If additional_connect == true, follow the IsRUDPSession setting in this session // In additional connect or redirect we do not need ssl verification as the certificate is always compared with a saved one - sock = TcpIpConnectEx2(hostname, c->ServerPort, + sock = BindTcpIpConnectEx2(localIP, localport, hostname, c->ServerPort, (bool *)cancel_flag, c->hWndForUI, &nat_t_err, (additional_connect ? (!sess->IsRUDPSession) : false), true, ((additional_connect || c->UseTicket) ? NULL : sess->SslOption), &ssl_err, o->HintStr, &resolved_ip); } @@ -6351,6 +6380,25 @@ SOCK *ClientConnectGetSocket(CONNECTION *c, bool additional_connect) StrCpy(in.HttpCustomHeader, sizeof(in.HttpCustomHeader), o->CustomHttpHeader); StrCpy(in.HttpUserAgent, sizeof(in.HttpUserAgent), c->Cedar->HttpUserAgent); + // Top of Bind outgoing connection + // In the case of first TCP/IP connection + if (additional_connect == false) { + if (sess->ClientOption->NoRoutingTracking == false) { + IP tmpIP; + StrToIP(&tmpIP, "0::0"); + in.BindLocalIP = tmpIP; + } + else { + in.BindLocalIP = sess->ClientOption->BindLocalIP; + } + } + // In the case of second and subsequent TCP/IP connections + else { + in.BindLocalIP = sess->LocalIP_CacheForNextConnect; + } + in.BindLocalPort = BIND_LOCALPORT_NULL; + // Bottom of Bind outgoing connection + #ifdef OS_WIN32 in.Hwnd = c->hWndForUI; #endif @@ -6361,13 +6409,16 @@ SOCK *ClientConnectGetSocket(CONNECTION *c, bool additional_connect) switch (o->ProxyType) { case PROXY_HTTP: - ret = ProxyHttpConnect(&out, &in, cancel_flag); +// ret = ProxyHttpConnect(&out, &in, cancel_flag); + ret = BindProxyHttpConnect(&out, &in, cancel_flag); // Bind outgoing connection break; case PROXY_SOCKS: - ret = ProxySocks4Connect(&out, &in, cancel_flag); +// ret = ProxySocks4Connect(&out, &in, cancel_flag); + ret = BindProxySocks4Connect(&out, &in, cancel_flag); // Bind outgoing connection break; case PROXY_SOCKS5: - ret = ProxySocks5Connect(&out, &in, cancel_flag); +// ret = ProxySocks5Connect(&out, &in, cancel_flag); + ret = BindProxySocks5Connect(&out, &in, cancel_flag); // Bind outgoing connection break; default: c->Err = ERR_INTERNAL_ERROR; @@ -6402,6 +6453,25 @@ SOCK *ClientConnectGetSocket(CONNECTION *c, bool additional_connect) Debug("ClientConnectGetSocket(): Saved %s IP address %r for future connections.\n", hostname, &resolved_ip); } + // Top of Bind outgoing connection + IPToStr(localaddr, sizeof(localaddr), &sock->LocalIP); + + // In the case of first TCP/IP connection, save the local IP address + if (additional_connect == false) { + c->Session->LocalIP_CacheForNextConnect = sock->LocalIP; + Debug("ClientConnectGetSocket(): Saved local IP address %r for future connections.\n", &sock->LocalIP); + } + // In the case of second and subsequent TCP/IP connections, check to see whether or not the local IP address is same as the first one + else { + if (memcmp(sock->LocalIP.address, c->Session->LocalIP_CacheForNextConnect.address, sizeof(sock->LocalIP.address)) == 0) { + Debug("ClientConnectGetSocket(): Binded local IP address %s OK\n", localaddr); + } + else { + Debug("ClientConnectGetSocket(): Binded local IP address %s NG\n", localaddr); + } + } + // Bottom of Bind outgoing connection + return sock; } @@ -6432,15 +6502,41 @@ UINT ProxyCodeToCedar(UINT code) // TCP connection function SOCK *TcpConnectEx3(char *hostname, UINT port, UINT timeout, bool *cancel_flag, void *hWnd, bool no_nat_t, UINT *nat_t_error_code, bool try_start_ssl, IP *ret_ip) { - return TcpConnectEx4(hostname, port, timeout, cancel_flag, hWnd, no_nat_t, nat_t_error_code, try_start_ssl, NULL, NULL, NULL, ret_ip); + return BindTcpConnectEx3(BIND_LOCALIP_NULL, BIND_LOCALPORT_NULL, hostname, port, timeout, cancel_flag, hWnd, no_nat_t, nat_t_error_code, try_start_ssl, ret_ip); } -SOCK *TcpConnectEx4(char *hostname, UINT port, UINT timeout, bool *cancel_flag, void *hWnd, bool no_nat_t, UINT *nat_t_error_code, bool try_start_ssl, SSL_VERIFY_OPTION *ssl_option, UINT *ssl_err, char *hint_str, IP *ret_ip) + +SOCK *TcpConnectEx4(char * hostname, UINT port, UINT timeout, bool * cancel_flag, void *hWnd, bool no_nat_t, UINT *nat_t_error_code, bool try_start_ssl, SSL_VERIFY_OPTION *ssl_option, UINT *ssl_err, char *hint_str, IP *ret_ip) +{ + return BindTcpConnectEx4(BIND_LOCALIP_NULL, BIND_LOCALPORT_NULL, hostname, port, timeout, cancel_flag, hWnd, no_nat_t, nat_t_error_code, try_start_ssl, ssl_option, ssl_err, hint_str, ret_ip); +} + +// Connect with TCP/IP +SOCK *TcpIpConnectEx(char *hostname, UINT port, bool *cancel_flag, void *hWnd, UINT *nat_t_error_code, bool no_nat_t, bool try_start_ssl, IP *ret_ip) +{ + return BindTcpIpConnectEx(BIND_LOCALIP_NULL, BIND_LOCALPORT_NULL, hostname, port, cancel_flag, hWnd, nat_t_error_code, no_nat_t, try_start_ssl, ret_ip); +} + +SOCK *TcpIpConnectEx2(char * hostname, UINT port, bool * cancel_flag, void *hWnd, UINT *nat_t_error_code, bool no_nat_t, bool try_start_ssl, SSL_VERIFY_OPTION *ssl_option, UINT *ssl_err, char *hint_str, IP *ret_ip) +{ + return BindTcpIpConnectEx2(BIND_LOCALIP_NULL, BIND_LOCALPORT_NULL, hostname, port, cancel_flag, hWnd, nat_t_error_code, no_nat_t, try_start_ssl, ssl_option, ssl_err, hint_str, ret_ip); +} + +// TCP connection function +//SOCK* TcpConnectEx3(char* hostname, UINT port, UINT timeout, bool* cancel_flag, void* hWnd, bool no_nat_t, UINT* nat_t_error_code, bool try_start_ssl, IP* ret_ip) +SOCK *BindTcpConnectEx3(IP *localIP, UINT localport, char *hostname, UINT port, UINT timeout, bool *cancel_flag, void *hWnd, bool no_nat_t, UINT *nat_t_error_code, bool try_start_ssl, IP *ret_ip) +{ +// return TcpConnectEx4(hostname, port, timeout, cancel_flag, hWnd, no_nat_t, nat_t_error_code, try_start_ssl, NULL, NULL, NULL, ret_ip); + return BindTcpConnectEx4(localIP, localport, hostname, port, timeout, cancel_flag, hWnd, no_nat_t, nat_t_error_code, try_start_ssl, NULL, NULL, NULL, ret_ip); +} +//SOCK *TcpConnectEx4(char *hostname, UINT port, UINT timeout, bool *cancel_flag, void *hWnd, bool no_nat_t, UINT *nat_t_error_code, bool try_start_ssl, SSL_VERIFY_OPTION *ssl_option, UINT *ssl_err, char *hint_str, IP *ret_ip) +SOCK *BindTcpConnectEx4(IP *localIP, UINT localport, char *hostname, UINT port, UINT timeout, bool *cancel_flag, void *hWnd, bool no_nat_t, UINT *nat_t_error_code, bool try_start_ssl, SSL_VERIFY_OPTION *ssl_option, UINT *ssl_err, char *hint_str, IP *ret_ip) { #ifdef OS_WIN32 if (hWnd == NULL) { #endif // OS_WIN32 - return ConnectEx5(hostname, port, timeout, cancel_flag, (no_nat_t ? NULL : VPN_RUDP_SVC_NAME), nat_t_error_code, try_start_ssl, true, ssl_option, ssl_err, hint_str, ret_ip); +// return ConnectEx5(hostname, port, timeout, cancel_flag, (no_nat_t ? NULL : VPN_RUDP_SVC_NAME), nat_t_error_code, try_start_ssl, true, ssl_option, ssl_err, hint_str, ret_ip); + return BindConnectEx5(localIP, localport, hostname, port, timeout, cancel_flag, (no_nat_t ? NULL : VPN_RUDP_SVC_NAME), nat_t_error_code, try_start_ssl, true, ssl_option, ssl_err, hint_str, ret_ip); #ifdef OS_WIN32 } else @@ -6451,11 +6547,14 @@ SOCK *TcpConnectEx4(char *hostname, UINT port, UINT timeout, bool *cancel_flag, } // Connect with TCP/IP -SOCK *TcpIpConnectEx(char *hostname, UINT port, bool *cancel_flag, void *hWnd, UINT *nat_t_error_code, bool no_nat_t, bool try_start_ssl, IP *ret_ip) +//SOCK *TcpIpConnectEx(char *hostname, UINT port, bool *cancel_flag, void *hWnd, UINT *nat_t_error_code, bool no_nat_t, bool try_start_ssl, IP *ret_ip) +SOCK *BindTcpIpConnectEx(IP *localIP, UINT localport, char *hostname, UINT port, bool *cancel_flag, void *hWnd, UINT *nat_t_error_code, bool no_nat_t, bool try_start_ssl, IP *ret_ip) { - return TcpIpConnectEx2(hostname, port, cancel_flag, hWnd, nat_t_error_code, no_nat_t, try_start_ssl, NULL, NULL, NULL, ret_ip); +// return TcpIpConnectEx2(hostname, port, cancel_flag, hWnd, nat_t_error_code, no_nat_t, try_start_ssl, NULL, NULL, NULL, ret_ip); + return BindTcpIpConnectEx2(localIP, localport, hostname, port, cancel_flag, hWnd, nat_t_error_code, no_nat_t, try_start_ssl, NULL, NULL, NULL, ret_ip); } -SOCK *TcpIpConnectEx2(char *hostname, UINT port, bool *cancel_flag, void *hWnd, UINT *nat_t_error_code, bool no_nat_t, bool try_start_ssl, SSL_VERIFY_OPTION *ssl_option, UINT *ssl_err, char *hint_str, IP *ret_ip) +//SOCK *TcpIpConnectEx2(char *hostname, UINT port, bool *cancel_flag, void *hWnd, UINT *nat_t_error_code, bool no_nat_t, bool try_start_ssl, SSL_VERIFY_OPTION *ssl_option, UINT *ssl_err, char *hint_str, IP *ret_ip) +SOCK *BindTcpIpConnectEx2(IP *localIP, UINT localport, char *hostname, UINT port, bool *cancel_flag, void *hWnd, UINT *nat_t_error_code, bool no_nat_t, bool try_start_ssl, SSL_VERIFY_OPTION *ssl_option, UINT *ssl_err, char *hint_str, IP *ret_ip) { SOCK *s = NULL; UINT dummy_int = 0; @@ -6470,7 +6569,8 @@ SOCK *TcpIpConnectEx2(char *hostname, UINT port, bool *cancel_flag, void *hWnd, return NULL; } - s = TcpConnectEx4(hostname, port, 0, cancel_flag, hWnd, no_nat_t, nat_t_error_code, try_start_ssl, ssl_option, ssl_err, hint_str, ret_ip); +// s = TcpConnectEx4(hostname, port, 0, cancel_flag, hWnd, no_nat_t, nat_t_error_code, try_start_ssl, ssl_option, ssl_err, hint_str, ret_ip); + s = BindTcpConnectEx4(localIP, localport, hostname, port, 0, cancel_flag, hWnd, no_nat_t, nat_t_error_code, try_start_ssl, ssl_option, ssl_err, hint_str, ret_ip); if (s == NULL) { return NULL; diff --git a/src/Cedar/Protocol.h b/src/Cedar/Protocol.h index ebcc1052..f1b1f6b9 100644 --- a/src/Cedar/Protocol.h +++ b/src/Cedar/Protocol.h @@ -115,6 +115,11 @@ bool ClientConnect(CONNECTION *c); SOCK *ClientConnectToServer(CONNECTION *c); SOCK *TcpIpConnectEx(char *hostname, UINT port, bool *cancel_flag, void *hWnd, UINT *nat_t_error_code, bool no_nat_t, bool try_start_ssl, IP *ret_ip); SOCK *TcpIpConnectEx2(char *hostname, UINT port, bool *cancel_flag, void *hWnd, UINT *nat_t_error_code, bool no_nat_t, bool try_start_ssl, SSL_VERIFY_OPTION *ssl_option, UINT *ssl_err, char *hint_str, IP *ret_ip); + +// New function named with prefix "Bind" binds outgoing connection to a specific address. New one is wrapped in original one. +SOCK* BindTcpIpConnectEx(IP *localIP, UINT localport, char *hostname, UINT port, bool *cancel_flag, void *hWnd, UINT *nat_t_error_code, bool no_nat_t, bool try_start_ssl, IP *ret_ip); +SOCK* BindTcpIpConnectEx2(IP *localIP, UINT localport, char *hostname, UINT port, bool *cancel_flag, void *hWnd, UINT *nat_t_error_code, bool no_nat_t, bool try_start_ssl, SSL_VERIFY_OPTION *ssl_option, UINT *ssl_err, char *hint_str, IP *ret_ip); + bool ClientUploadSignature(SOCK *s); bool ClientDownloadHello(CONNECTION *c, SOCK *s); bool ServerDownloadSignature(CONNECTION *c, char **error_detail_str); @@ -124,6 +129,10 @@ SOCK *ClientConnectGetSocket(CONNECTION *c, bool additional_connect); SOCK *TcpConnectEx3(char *hostname, UINT port, UINT timeout, bool *cancel_flag, void *hWnd, bool no_nat_t, UINT *nat_t_error_code, bool try_start_ssl, IP *ret_ip); SOCK *TcpConnectEx4(char *hostname, UINT port, UINT timeout, bool *cancel_flag, void *hWnd, bool no_nat_t, UINT *nat_t_error_code, bool try_start_ssl, SSL_VERIFY_OPTION *ssl_option, UINT *ssl_err, char *hint_str, IP *ret_ip); +// New function named with prefix "Bind" binds outgoing connection to a specific address. New one is wrapped in original one. +SOCK* BindTcpConnectEx3(IP *localIP, UINT localport, char *hostname, UINT port, UINT timeout, bool *cancel_flag, void *hWnd, bool no_nat_t, UINT *nat_t_error_code, bool try_start_ssl, IP *ret_ip); +SOCK* BindTcpConnectEx4(IP *localIP, UINT localport, char *hostname, UINT port, UINT timeout, bool *cancel_flag, void *hWnd, bool no_nat_t, UINT *nat_t_error_code, bool try_start_ssl, SSL_VERIFY_OPTION *ssl_option, UINT *ssl_err, char *hint_str, IP *ret_ip); + UINT ProxyCodeToCedar(UINT code); void InitProtocol(); diff --git a/src/Cedar/SMInner.h b/src/Cedar/SMInner.h index 2a9158ec..9c10bbb5 100644 --- a/src/Cedar/SMInner.h +++ b/src/Cedar/SMInner.h @@ -41,7 +41,10 @@ typedef struct SETTING char HubName[MAX_HUBNAME_LEN + 1]; // HUB name UCHAR HashedPassword[SHA1_SIZE]; // Password CLIENT_OPTION ClientOption; // Client Option - UCHAR Reserved[10240 - sizeof(UINT) * 8 - SHA1_SIZE - HTTP_CUSTOM_HEADER_MAX_SIZE - MAX_HOST_NAME_LEN - 1]; // Reserved area + +#define IP_SIZE sizeof(IP) // Source IP address for outgoing connection +// UCHAR Reserved[10240 - sizeof(UINT) * 8 - SHA1_SIZE - HTTP_CUSTOM_HEADER_MAX_SIZE - MAX_HOST_NAME_LEN - 1]; // Reserved area + UCHAR Reserved[10240 - sizeof(UINT) * 8 - SHA1_SIZE - HTTP_CUSTOM_HEADER_MAX_SIZE - MAX_HOST_NAME_LEN - 1 - IP_SIZE]; // Reserved area } SETTING; // Structure declaration diff --git a/src/Cedar/Session.c b/src/Cedar/Session.c index d680a73a..3df84e75 100644 --- a/src/Cedar/Session.c +++ b/src/Cedar/Session.c @@ -1430,6 +1430,7 @@ void ClientThread(THREAD *t, void *param) while (true) { Zero(&s->ServerIP_CacheForNextConnect, sizeof(IP)); + Zero(&s->LocalIP_CacheForNextConnect, sizeof(IP)); Zero(s->UnderlayProtocol, sizeof(s->UnderlayProtocol)); Zero(s->ProtocolDetails, sizeof(s->ProtocolDetails)); diff --git a/src/Cedar/Session.h b/src/Cedar/Session.h index 992a56f4..8056446a 100644 --- a/src/Cedar/Session.h +++ b/src/Cedar/Session.h @@ -130,6 +130,7 @@ struct SESSION UCHAR Padding[2]; IP ServerIP_CacheForNextConnect; // Server IP, cached for next connect + IP LocalIP_CacheForNextConnect; // Local IP, cached for next connect (2nd and subsequent), assigned by first outgoing connection UINT64 CreatedTime; // Creation date and time UINT64 LastCommTime; // Last communication date and time diff --git a/src/Mayaqua/Network.c b/src/Mayaqua/Network.c index 6cc39318..0c548ad6 100644 --- a/src/Mayaqua/Network.c +++ b/src/Mayaqua/Network.c @@ -13634,6 +13634,54 @@ int connect_timeout(SOCKET s, struct sockaddr *addr, int size, int timeout, bool } } #else +#if 0 +LPSTR PrintError(int ErrorCode) +{ + static char Message[1024]; + + // If this program was multithreaded, we'd want to use + // FORMAT_MESSAGE_ALLOCATE_BUFFER instead of a static buffer here. + // (And of course, free the buffer when we were done with it) + + FormatMessageA(FORMAT_MESSAGE_FROM_SYSTEM | FORMAT_MESSAGE_IGNORE_INSERTS | + FORMAT_MESSAGE_MAX_WIDTH_MASK, NULL, ErrorCode, + MAKELANGID(LANG_NEUTRAL, SUBLANG_DEFAULT), + (LPSTR)Message, 1024, NULL); + return Message; +} +#else +char *PrintError(int ErrorCode) +{ + char *Message; + switch (ErrorCode) { + case WSAEWOULDBLOCK: + Message = "Resource temporarily unavailable."; + break; + + case WSAEINPROGRESS: + Message = "Operation now in progress."; + break; + + case WSAEALREADY: + Message = "Operation already in progress."; + break; + + case WSAEADDRINUSE: + Message = "Address already in use."; + break; + + case WSAEADDRNOTAVAIL: + Message = "Cannot assign requested address."; + break; + + default: + Message = ""; + break; + } + return Message; +} +#endif + // Connection with timeout (Win32 version) int connect_timeout(SOCKET s, struct sockaddr *addr, int size, int timeout, bool *cancel_flag) { @@ -13765,8 +13813,63 @@ void SetSockHighPriority(SOCK *s, bool flag) SetSockTos(s, (flag ? 16 : 0)); } +// Bind the socket to IPv4 or IPV6 address +int bind_sock(SOCKET sock, IP* ip, UINT port) +{ + //char tmp[MAX_HOST_NAME_LEN + 1]; + //IPToStr(tmp, sizeof(tmp), ip); + //Debug("_____ bind_sock(): Binding... IP address %s:%d\n", tmp, port); + + if (IsIP4(ip)) + { + // Declare variables + struct sockaddr_in sockaddr_in; + struct in_addr in_addr; + + Zero(&sockaddr_in, sizeof(sockaddr_in)); + Zero(&in_addr, sizeof(in_addr)); + + IPToInAddr(&in_addr, ip); + + // Set up the sockaddr structure + sockaddr_in.sin_family = AF_INET; + //inet_pton(AF_INET, tmp, &addr_in.sin_addr.s_addr); + sockaddr_in.sin_addr.s_addr = in_addr.s_addr; + sockaddr_in.sin_port = htons((USHORT)port); + + // Bind the socket using the information in the sockaddr structure + return (bind(sock, (struct sockaddr *)&sockaddr_in, sizeof(sockaddr_in))); + } + else + { + // Declare variables + struct sockaddr_in6 sockaddr_in; + struct in6_addr in_addr; + + Zero(&sockaddr_in, sizeof(sockaddr_in)); + Zero(&in_addr, sizeof(in_addr)); + + IPToInAddr6(&in_addr, ip); + + // Set up the sockaddr structure + sockaddr_in.sin6_family = AF_INET6; + //inet_pton(AF_INET6, tmp, &sockaddr_in.sin6_addr.s6_bytes); + Copy(&sockaddr_in.sin6_addr, &in_addr, sizeof(in_addr)); + sockaddr_in.sin6_port = htons((USHORT)port); + + // Bind the socket using the information in the sockaddr structure + return (bind(sock, (struct sockaddr *)&sockaddr_in, sizeof(sockaddr_in))); + } +} + // Connect to the IPv4 host using a socket -SOCKET ConnectTimeoutIPv4(IP *ip, UINT port, UINT timeout, bool *cancel_flag) +SOCKET ConnectTimeoutIPv4(IP* ip, UINT port, UINT timeout, bool* cancel_flag) +{ + return BindConnectTimeoutIPv4(BIND_LOCALIP_NULL, BIND_LOCALPORT_NULL, ip, port, timeout, cancel_flag); +} + +// Connect to the IPv4 host using a socket +SOCKET BindConnectTimeoutIPv4(IP* localIP, UINT localport, IP* ip, UINT port, UINT timeout, bool* cancel_flag) { SOCKET s; struct sockaddr_in sockaddr4; @@ -13783,6 +13886,28 @@ SOCKET ConnectTimeoutIPv4(IP *ip, UINT port, UINT timeout, bool *cancel_flag) // Socket creation s = socket(AF_INET, SOCK_STREAM, 0); + + // Top of Bind outgoing connection + if (s != INVALID_SOCKET) { + int ier; + + if ((IsZeroIP(localIP) == false) || (localport != 0)) { + + // Bind the socket + if (bind_sock(s, localIP, localport) != 0) { +#ifdef OS_WIN32 + ier = WSAGetLastError(); + Debug("IPv4 bind() failed with error: %d %s\n", ier, PrintError(ier)); +#else + Debug("IPv4 bind() failed with error: %d %s\n", errno, strerror(errno)); +#endif + closesocket(s); + s = INVALID_SOCKET; + } + } + } + // Bottom of Bind outgoing connection + if (s != INVALID_SOCKET) { // Connection @@ -14045,7 +14170,21 @@ void ConnectThreadForRUDP(THREAD *thread, void *param) } // IPv4 connection thread (multiple protocols, multiple addresses) -void ConnectThreadForIPv4(THREAD *thread, void *param) +void ConnectThreadForIPv4(THREAD* thread, void* param) +{ + CONNECT_SERIAL_PARAM* p = (CONNECT_SERIAL_PARAM*)param; + if (thread == NULL || p == NULL) + { + return; + } + StrToIP(&p->LocalIP, "0.0.0.0"); + p->LocalPort = 0; + return BindConnectThreadForIPv4(thread, param); +} + +// IPv4 connection thread (multiple protocols, multiple addresses) +//void ConnectThreadForIPv4(THREAD* thread, void* param) +void BindConnectThreadForIPv4(THREAD *thread, void *param) { SOCKET s = INVALID_SOCKET; IP current_ip; @@ -14098,7 +14237,8 @@ void ConnectThreadForIPv4(THREAD *thread, void *param) if (use_natt == false) { // Normal connection without using NAT-T - s = ConnectTimeoutIPv4(ip, p->Port, p->Timeout, p->CancelFlag); +// s = ConnectTimeoutIPv4(ip, p->Port, p->Timeout, p->CancelFlag); + s = BindConnectTimeoutIPv4(&p->LocalIP, p->LocalPort, ip, p->Port, p->Timeout, p->CancelFlag); if (s != INVALID_SOCKET) { @@ -14400,7 +14540,21 @@ void ConnectThreadForIPv4(THREAD *thread, void *param) } // IPv6 connection thread (multiple addresses) -void ConnectThreadForIPv6(THREAD *thread, void *param) +void ConnectThreadForIPv6(THREAD* thread, void* param) +{ + CONNECT_SERIAL_PARAM* p = (CONNECT_SERIAL_PARAM*)param; + if (thread == NULL || p == NULL) + { + return; + } + StrToIP(&p->LocalIP, "0::0"); + p->LocalPort = 0; + return BindConnectThreadForIPv6(thread, param); +} + +// IPv6 connection thread (multiple addresses) +//void ConnectThreadForIPv6(THREAD *thread, void *param) +void BindConnectThreadForIPv6(THREAD* thread, void* param) { SOCKET s = INVALID_SOCKET; IP current_ip; @@ -14455,6 +14609,28 @@ void ConnectThreadForIPv6(THREAD *thread, void *param) // Socket creation s = socket(AF_INET6, SOCK_STREAM, 0); + + // Top of Bind outgoing connection + if (s != INVALID_SOCKET){ + int ier; + + if ((IsZeroIP(&p->LocalIP) == false) || (p->LocalPort != 0)){ + + // Bind the socket + if (bind_sock(s, &p->LocalIP, p->LocalPort) != 0) { +#ifdef OS_WIN32 + ier = WSAGetLastError(); + Debug("IPv6 bind() failed with error: %d %s\n", ier, PrintError(ier)); +#else + Debug("IPv6 bind() failed with error: %d %s\n", errno, strerror(errno)); +#endif + closesocket(s); + s = INVALID_SOCKET; + } + } + } + // Bottom of Bind outgoing connection + if (s != INVALID_SOCKET) { // Connection @@ -14580,6 +14756,18 @@ SOCK *ConnectEx4(char *hostname, UINT port, UINT timeout, bool *cancel_flag, cha return ConnectEx5(hostname, port, timeout, cancel_flag, nat_t_svc_name, nat_t_error_code, try_start_ssl, no_get_hostname, NULL, NULL, NULL, ret_ip); } SOCK *ConnectEx5(char *hostname, UINT port, UINT timeout, bool *cancel_flag, char *nat_t_svc_name, UINT *nat_t_error_code, bool try_start_ssl, bool no_get_hostname, SSL_VERIFY_OPTION *ssl_option, UINT *ssl_err, char *hint_str, IP *ret_ip) +{ + return BindConnectEx5(BIND_LOCALIP_NULL, BIND_LOCALPORT_NULL, hostname, port, timeout, cancel_flag, nat_t_svc_name, nat_t_error_code, try_start_ssl, no_get_hostname, ssl_option, ssl_err, hint_str, ret_ip); +} + +//SOCK* ConnectEx4(char* hostname, UINT port, UINT timeout, bool* cancel_flag, char* nat_t_svc_name, UINT* nat_t_error_code, bool try_start_ssl, bool no_get_hostname, IP* ret_ip) +SOCK *BindConnectEx4(IP *localIP, UINT localport, char *hostname, UINT port, UINT timeout, bool *cancel_flag, char *nat_t_svc_name, UINT *nat_t_error_code, bool try_start_ssl, bool no_get_hostname, IP *ret_ip) +{ +// return ConnectEx5(hostname, port, timeout, cancel_flag, nat_t_svc_name, nat_t_error_code, try_start_ssl, no_get_hostname, NULL, NULL, NULL, ret_ip); + return BindConnectEx5(localIP, localport, hostname, port, timeout, cancel_flag, nat_t_svc_name, nat_t_error_code, try_start_ssl, no_get_hostname, NULL, NULL, NULL, ret_ip); +} +//SOCK *ConnectEx5(char *hostname, UINT port, UINT timeout, bool *cancel_flag, char *nat_t_svc_name, UINT *nat_t_error_code, bool try_start_ssl, bool no_get_hostname, SSL_VERIFY_OPTION *ssl_option, UINT *ssl_err, char *hint_str, IP *ret_ip) +SOCK *BindConnectEx5(IP *localIP, UINT localport, char *hostname, UINT port, UINT timeout, bool *cancel_flag, char *nat_t_svc_name, UINT *nat_t_error_code, bool try_start_ssl, bool no_get_hostname, SSL_VERIFY_OPTION *ssl_option, UINT *ssl_err, char *hint_str, IP *ret_ip) { bool dummy = false; bool use_natt = false; @@ -14675,6 +14863,12 @@ SOCK *ConnectEx5(char *hostname, UINT port, UINT timeout, bool *cancel_flag, cha if (LIST_NUM(iplist_v6) > 0) { p6.IpList = iplist_v6; + + //ZeroIP6(&p6.LocalIP); + Zero(&p6.LocalIP, sizeof(p6.LocalIP)); // Zero IP6 must be used when argument localIP is NULL + CopyIP(&p6.LocalIP, localIP); + p6.LocalPort = localport; + p6.Port = port; p6.Timeout = timeout; StrCpy(p6.Hostname, sizeof(p6.Hostname), hostname); @@ -14688,13 +14882,19 @@ SOCK *ConnectEx5(char *hostname, UINT port, UINT timeout, bool *cancel_flag, cha p6.Ret_Ip = &ret_ip6; p6.RetryDelay = 250; p6.Delay = 0; - t6 = NewThread(ConnectThreadForIPv6, &p6); +// t6 = NewThread(ConnectThreadForIPv6, &p6); + t6 = NewThread(BindConnectThreadForIPv6, &p6); // For binding a socket } // IPv4 connection thread if (LIST_NUM(iplist_v4) > 0) { p4.IpList = iplist_v4; + + ZeroIP4(&p4.LocalIP); // Zero IP4 must be used when argument localIP is NULL + CopyIP(&p4.LocalIP, localIP); + p4.LocalPort = localport; + p4.Port = port; p4.Timeout = timeout; StrCpy(p4.Hostname, sizeof(p4.Hostname), hostname); @@ -14713,7 +14913,8 @@ SOCK *ConnectEx5(char *hostname, UINT port, UINT timeout, bool *cancel_flag, cha p4.Ret_Ip = &ret_ip4; p4.RetryDelay = 250; p4.Delay = 250; // Delay by 250ms to prioritize IPv6 (RFC 6555 recommends 150-250ms, Chrome uses 300ms) - t4 = NewThread(ConnectThreadForIPv4, &p4); +// t4 = NewThread(ConnectThreadForIPv4, &p4); + t4 = NewThread(BindConnectThreadForIPv4, &p4); // For binding a socket } if (t6 == NULL || t4 == NULL) diff --git a/src/Mayaqua/Network.h b/src/Mayaqua/Network.h index 202df410..526b9005 100644 --- a/src/Mayaqua/Network.h +++ b/src/Mayaqua/Network.h @@ -808,6 +808,8 @@ struct RUDP_STACK struct CONNECT_SERIAL_PARAM { LIST *IpList; + UINT LocalPort; // Local port number to bind + IP LocalIP; // Local IP address to bind UINT Port; UINT Timeout; char Hostname[MAX_SIZE]; @@ -946,6 +948,10 @@ void ConnectThreadForRUDP(THREAD *thread, void *param); void ConnectThreadForOverDnsOrIcmp(THREAD *thread, void *param); void ConnectThreadForIPv4(THREAD *thread, void *param); void ConnectThreadForIPv6(THREAD *thread, void *param); + +void BindConnectThreadForIPv4(THREAD *thread, void *param); +void BindConnectThreadForIPv6(THREAD *thread, void *param); + SOCK *CreateTCPSock(SOCKET s, bool is_ipv6, IP *current_ip, bool no_get_hostname, char *hostname_original); SOCK *NewRUDPClientNatT(char *svc_name, IP *ip, UINT *error_code, UINT timeout, bool *cancel, char *hint_str, char *target_hostname); RUDP_STACK *NewRUDPServer(char *svc_name, RUDP_STACK_INTERRUPTS_PROC *proc_interrupts, RUDP_STACK_RPC_RECV_PROC *proc_rpc_recv, void *param, UINT port, bool no_natt_register, bool over_dns_mode, volatile UINT *natt_global_udp_port, UCHAR rand_port_id, IP *listen_ip); @@ -1109,6 +1115,14 @@ SOCK *ConnectEx3(char *hostname, UINT port, UINT timeout, bool *cancel_flag, cha SOCK *ConnectEx4(char *hostname, UINT port, UINT timeout, bool *cancel_flag, char *nat_t_svc_name, UINT *nat_t_error_code, bool try_start_ssl, bool no_get_hostname, IP *ret_ip); SOCK *ConnectEx5(char *hostname, UINT port, UINT timeout, bool *cancel_flag, char *nat_t_svc_name, UINT *nat_t_error_code, bool try_start_ssl, bool no_get_hostname, SSL_VERIFY_OPTION *ssl_option, UINT *ssl_err, char *hint_str, IP *ret_ip); SOCKET ConnectTimeoutIPv4(IP *ip, UINT port, UINT timeout, bool *cancel_flag); + +// New function named with prefix "Bind" binds outgoing connection to a specific address. New one is wrapped in original one. +#define BIND_LOCALIP_NULL NULL // NULL IP address specifies no binding +#define BIND_LOCALPORT_NULL 0 // NULL port number specifies no binding +SOCK *BindConnectEx4(IP *localIP, UINT localport, char *hostname, UINT port, UINT timeout, bool *cancel_flag, char *nat_t_svc_name, UINT *nat_t_error_code, bool try_start_ssl, bool no_get_hostname, IP *ret_ip); +SOCK *BindConnectEx5(IP *localIP, UINT localport, char *hostname, UINT port, UINT timeout, bool *cancel_flag, char *nat_t_svc_name, UINT *nat_t_error_code, bool try_start_ssl, bool no_get_hostname, SSL_VERIFY_OPTION *ssl_option, UINT *ssl_err, char *hint_str, IP *ret_ip); +SOCKET BindConnectTimeoutIPv4(IP *localIP, UINT localport, IP *ip, UINT port, UINT timeout, bool *cancel_flag); + bool SetSocketBufferSize(SOCKET s, bool send, UINT size); UINT SetSocketBufferSizeWithBestEffort(SOCKET s, bool send, UINT size); void InitUdpSocketBufferSize(SOCKET s); diff --git a/src/Mayaqua/Proxy.c b/src/Mayaqua/Proxy.c index 37f5c159..8d4f1c6a 100644 --- a/src/Mayaqua/Proxy.c +++ b/src/Mayaqua/Proxy.c @@ -16,11 +16,25 @@ SOCK *Internal_ProxyTcpConnect(PROXY_PARAM_IN *param, volatile bool *cancel_flag } #endif - return ConnectEx4(param->Hostname, param->Port, param->Timeout, (bool *)cancel_flag, NULL, NULL, false, true, resolved_ip); + //return ConnectEx4(param->Hostname, param->Port, param->Timeout, (bool*)cancel_flag, NULL, NULL, false, true, resolved_ip); + return BindConnectEx4(¶m->BindLocalIP, param->BindLocalPort, param->Hostname, param->Port, param->Timeout, (bool *)cancel_flag, NULL, NULL, false, true, resolved_ip); } // Connect to an HTTP proxy UINT ProxyHttpConnect(PROXY_PARAM_OUT *out, PROXY_PARAM_IN *in, volatile bool *cancel_flag) +{ + // Validate arguments + if (out == NULL || in == NULL || in->Port == 0 || in->TargetPort == 0 || IsEmptyStr(in->Hostname) || IsEmptyStr(in->TargetHostname)) + { + return PROXY_ERROR_PARAMETER; + } + StrToIP(&in->BindLocalIP, "0::0"); + in->BindLocalPort = 0; + return BindProxyHttpConnect(out, in, cancel_flag); +} + +// Connect to an HTTP proxy +UINT BindProxyHttpConnect(PROXY_PARAM_OUT *out, PROXY_PARAM_IN *in, volatile bool *cancel_flag) { bool dummy_cancel_flag = false, use_auth = false; char target_hostname[MAX_HOST_NAME_LEN + 1]; @@ -208,6 +222,19 @@ FAILURE: // Connect to a SOCKS5 proxy (RFC1928, RFC1929 defines username/password authentication) UINT ProxySocks5Connect(PROXY_PARAM_OUT *out, PROXY_PARAM_IN *in, volatile bool *cancel_flag) +{ + // Validate arguments + if (out == NULL || in == NULL || in->Port == 0 || in->TargetPort == 0 || IsEmptyStr(in->Hostname) || IsEmptyStr(in->TargetHostname)) + { + return PROXY_ERROR_PARAMETER; + } + StrToIP(&in->BindLocalIP, "0::0"); + in->BindLocalPort = 0; + return BindProxySocks5Connect(out, in, cancel_flag); +} + +// Connect to a SOCKS5 proxy (RFC1928, RFC1929 defines username/password authentication) +UINT BindProxySocks5Connect(PROXY_PARAM_OUT *out, PROXY_PARAM_IN *in, volatile bool *cancel_flag) { bool dummy_cancel_flag = false; UCHAR tmp, recv_buf[2], *recv_buf_final; @@ -521,6 +548,17 @@ FAILURE: // Connect to a SOCKS4 proxy UINT ProxySocks4Connect(PROXY_PARAM_OUT *out, PROXY_PARAM_IN *in, volatile bool *cancel_flag) +{ + // Validate arguments + if (out == NULL || in == NULL || in->Port == 0 || in->TargetPort == 0 || IsEmptyStr(in->Hostname) || IsEmptyStr(in->TargetHostname)) + { + return PROXY_ERROR_PARAMETER; + } + return BindProxySocks4Connect(out, in, cancel_flag); +} + +// Connect to a SOCKS4 proxy +UINT BindProxySocks4Connect(PROXY_PARAM_OUT *out, PROXY_PARAM_IN *in, volatile bool *cancel_flag) { bool dummy_cancel_flag = false; UCHAR tmp, recv_buf[8]; diff --git a/src/Mayaqua/Proxy.h b/src/Mayaqua/Proxy.h index 2f8325ca..3b5abb91 100644 --- a/src/Mayaqua/Proxy.h +++ b/src/Mayaqua/Proxy.h @@ -30,6 +30,8 @@ struct PROXY_PARAM_IN UINT Timeout; char HttpCustomHeader[HTTP_CUSTOM_HEADER_MAX_SIZE]; char HttpUserAgent[HTTP_HEADER_USER_AGENT_MAX_SIZE + 1]; + IP BindLocalIP; // Source IP address for outgoing connection + UINT BindLocalPort; // UINT used not USHORT // Source port number for outgoing connection #ifdef OS_WIN32 void *Hwnd; #endif @@ -45,4 +47,9 @@ UINT ProxyHttpConnect(PROXY_PARAM_OUT *out, PROXY_PARAM_IN *in, volatile bool *c UINT ProxySocks5Connect(PROXY_PARAM_OUT *out, PROXY_PARAM_IN *in, volatile bool *cancel_flag); UINT ProxySocks4Connect(PROXY_PARAM_OUT *out, PROXY_PARAM_IN *in, volatile bool *cancel_flag); +// New function named with prefix "Bind" binds outgoing connection to a specific address. New one is wrapped in original one. +UINT BindProxyHttpConnect(PROXY_PARAM_OUT *out, PROXY_PARAM_IN *in, volatile bool *cancel_flag); +UINT BindProxySocks5Connect(PROXY_PARAM_OUT *out, PROXY_PARAM_IN *in, volatile bool *cancel_flag); +UINT BindProxySocks4Connect(PROXY_PARAM_OUT *out, PROXY_PARAM_IN *in, volatile bool *cancel_flag); + #endif diff --git a/src/PenCore/PenCore.rc b/src/PenCore/PenCore.rc index 3d356d3c..c43db768 100644 --- a/src/PenCore/PenCore.rc +++ b/src/PenCore/PenCore.rc @@ -13,7 +13,7 @@ #undef APSTUDIO_READONLY_SYMBOLS ///////////////////////////////////////////////////////////////////////////// -// resources +// 餁Eresources #if !defined(AFX_RESOURCE_DLL) || defined(AFX_TARG_JPN) #ifdef _WIN32 @@ -1654,10 +1654,12 @@ BEGIN LTEXT "@S_MODE",S_MODE,254,169,166,17 CONTROL "@R_BRIDGE",R_BRIDGE,"Button",BS_AUTOCHECKBOX | WS_TABSTOP,254,191,166,9 CONTROL "@R_MONITOR",R_MONITOR,"Button",BS_AUTOCHECKBOX | WS_TABSTOP,254,205,166,9 - GROUPBOX "@STATIC17",IDC_STATIC,222,225,205,30 + GROUPBOX "@STATIC17", IDC_STATIC, 222, 225, 205, 42 CONTROL "@R_NO_ROUTING",R_NO_ROUTING,"Button",BS_AUTOCHECKBOX | WS_TABSTOP,233,238,181,9 - ICON ICO_WARNING,S_WARNING_ICON,223,261,18,18 - LTEXT "@STATIC18",IDC_STATIC,247,261,180,26 + LTEXT "@STATIC20", IDC_STATIC, 233, 249, 56, 17 + EDITTEXT E_BIND_LOCALIP, 289, 249, 126, 11, ES_RIGHT | ES_AUTOHSCROLL + ICON ICO_WARNING,S_WARNING_ICON,223,270,18,18 + LTEXT "@STATIC18",IDC_STATIC,247,270,180,26 DEFPUSHBUTTON "@IDOK",IDOK,294,291,64,15 PUSHBUTTON "@IDCANCEL",IDCANCEL,363,291,64,15 ICON ICO_SWITCH,IDC_STATIC,230,169,18,18 @@ -4865,12 +4867,12 @@ END // BIN_WINPCAP BIN "Dummy.bin" -#endif // resources +#endif // 餁Eresources ///////////////////////////////////////////////////////////////////////////// ///////////////////////////////////////////////////////////////////////////// -// (xW) resources +// E(xW) resources #if !defined(AFX_RESOURCE_DLL) || defined(AFX_TARG_CHT) #ifdef _WIN32 @@ -4886,12 +4888,12 @@ LANGUAGE LANG_CHINESE, SUBLANG_CHINESE_TRADITIONAL // Icon with lowest ID value placed first to ensure application icon // remains consistent on all systems. ICO_LANG_TRADITIONAL_CHINESE ICON "LANG_TRADITIONAL_CHINESE.ico" -#endif // (xW) resources +#endif // E(xW) resources ///////////////////////////////////////////////////////////////////////////// ///////////////////////////////////////////////////////////////////////////// -// ^ () resources +// ^E(EE resources #if !defined(AFX_RESOURCE_DLL) || defined(AFX_TARG_ENU) #ifdef _WIN32 @@ -4952,7 +4954,7 @@ BMP_ZURUKKO BITMAP "Zurukko.bmp" BMP_VPNGATEEN BITMAP "VPNGateEN.bmp" BMP_VPNGATEJA BITMAP "VPNGateJA.bmp" BMP_UNIVTSUKUBA BITMAP "UnivTsukuba.bmp" -#endif // ^ () resources +#endif // ^E(EE resources ///////////////////////////////////////////////////////////////////////////// diff --git a/src/PenCore/resource.h b/src/PenCore/resource.h index 384d3ff9..c6379093 100644 --- a/src/PenCore/resource.h +++ b/src/PenCore/resource.h @@ -339,6 +339,7 @@ #define C_NUM_TCP 1075 #define B_TRUST 1076 #define E_INTERVAL 1076 +#define E_BIND_LOCALIP 9076 // Bind source IP #define B_PROXY_CONFIG 1077 #define B_SERVER_CERT 1078 #define B_VIEW_SERVER_CERT 1079 diff --git a/src/bin/hamcore/strtable_en.stb b/src/bin/hamcore/strtable_en.stb index 508960b7..6a078a65 100644 --- a/src/bin/hamcore/strtable_en.stb +++ b/src/bin/hamcore/strtable_en.stb @@ -2420,6 +2420,7 @@ STATIC17 Other Confi&gurations: R_NO_ROUTING No Adjustments of &Routing Table STATIC18 Keep the settings default in this dialog unless you are told to do so by a system administrator, or you have expertise for networking and security. STATIC19 The VoIP / QoS functions handle high priority packets such as IP telephone packets (VoIP) to be transmitted faster. +STATIC20 Source IP Address\n(IP Address on NIC): R_DISABLE_QOS Disable VoIP / &QoS Functions IDOK &OK IDCANCEL Cancel diff --git a/src/bin/hamcore/strtable_ja.stb b/src/bin/hamcore/strtable_ja.stb index 5462b57b..76e895a5 100644 --- a/src/bin/hamcore/strtable_ja.stb +++ b/src/bin/hamcore/strtable_ja.stb @@ -2423,6 +2423,7 @@ STATIC17 その他の設定(&G): R_NO_ROUTING ルーティングテーブルの調整処理を行わない(&R) STATIC18 この設定画面の設定項目は、システム管理者から指示があった場合や、ネットワークやセキュリティに関して詳しい知識をお持ちの場合以外は変更しないでください。 STATIC19 VoIP / QoS 対応機能を使用すると、IP 電話パケットなどの優先度の高いパケットを VPN 内で高速に伝送できます。 +STATIC20 送信元IPアドレス\n(NICのIPアドレス): R_DISABLE_QOS VoIP / QoS 対応機能を無効にする(&Q) IDOK &OK IDCANCEL キャンセル From c2fe874865558d8d2ccd05b36ff4504848cd2c06 Mon Sep 17 00:00:00 2001 From: hiura Date: Tue, 8 Aug 2023 18:14:22 +0900 Subject: [PATCH 04/63] Bind outgoing connection to a specific IP address No.2 --- src/Cedar/CM.c | 12 ++++- src/Cedar/Client.c | 9 ++-- src/Cedar/Connection.h | 3 +- src/Cedar/Protocol.c | 43 ++++++++++----- src/Cedar/SMInner.h | 4 +- src/Cedar/Session.c | 20 ++++++- src/Mayaqua/Network.c | 94 +++++++++++++++++++++++---------- src/Mayaqua/Network.h | 3 +- src/Mayaqua/Proxy.c | 12 +++-- src/Mayaqua/Proxy.h | 2 +- src/PenCore/PenCore.rc | 12 +++-- src/PenCore/resource.h | 3 +- src/bin/hamcore/strtable_en.stb | 3 +- src/bin/hamcore/strtable_ja.stb | 3 +- 14 files changed, 158 insertions(+), 65 deletions(-) diff --git a/src/Cedar/CM.c b/src/Cedar/CM.c index 6d535bc2..f982a2cb 100644 --- a/src/Cedar/CM.c +++ b/src/Cedar/CM.c @@ -6151,6 +6151,7 @@ void CmImportAccountMainEx(HWND hWnd, wchar_t *filename, bool overwrite) t->ClientOption->RequireBridgeRoutingMode = old_option->RequireBridgeRoutingMode; t->ClientOption->DisableQoS = old_option->DisableQoS; t->ClientOption->BindLocalIP = old_option->BindLocalIP;// Source IP address for outgoing connection + t->ClientOption->BindLocalPort = old_option->BindLocalPort;// Source port number for outgoing connection // Inherit the authentication data CiFreeClientAuth(t->ClientAuth); @@ -6459,6 +6460,7 @@ void CmDetailDlgUpdate(HWND hWnd, CM_ACCOUNT *a) Disable(hWnd, R_NO_ROUTING); #if TYPE_BINDLOCALIP Disable(hWnd, E_BIND_LOCALIP);// Source IP address for outgoing connection + Disable(hWnd, E_BIND_LOCALPORT);// Source port number for outgoing connection #endif } @@ -6543,6 +6545,8 @@ UINT CmDetailDlgProc(HWND hWnd, UINT msg, WPARAM wParam, LPARAM lParam, void *pa Check(hWnd, R_DISABLE_UDP, a->ClientOption->NoUdpAcceleration); #if TYPE_BINDLOCALIP SetIp(hWnd, E_BIND_LOCALIP, &a->ClientOption->BindLocalIP);// Source IP address for outgoing connection + SetIntEx(hWnd, E_BIND_LOCALPORT, a->ClientOption->BindLocalPort);// Source port number for outgoing connection + //Disable(hWnd, E_BIND_LOCALPORT); // You can not edit #endif // Select the Connection Mode @@ -6594,11 +6598,16 @@ UINT CmDetailDlgProc(HWND hWnd, UINT msg, WPARAM wParam, LPARAM lParam, void *pa #if TYPE_BINDLOCALIP // Source IP address for outgoing connection IP tmpIP; - if (GetIp(hWnd, E_BIND_LOCALIP, &tmpIP) == false) + if (GetIp(hWnd, E_BIND_LOCALIP, &tmpIP) == false) { FocusEx(hWnd, E_BIND_LOCALIP); break; } + // Source port number for outgoing connection + if ((GetInt(hWnd, E_BIND_LOCALPORT) < 0) || (GetInt(hWnd, E_BIND_LOCALPORT) > 65535)){ + FocusEx(hWnd, E_BIND_LOCALPORT); + break; + } #endif a->ClientOption->MaxConnection = num; @@ -6619,6 +6628,7 @@ UINT CmDetailDlgProc(HWND hWnd, UINT msg, WPARAM wParam, LPARAM lParam, void *pa a->ClientOption->NoUdpAcceleration = IsChecked(hWnd, R_DISABLE_UDP); #if TYPE_BINDLOCALIP a->ClientOption->BindLocalIP = tmpIP;// Source IP address for outgoing connection + a->ClientOption->BindLocalPort = GetInt(hWnd, E_BIND_LOCALPORT);// Source port number for outgoing connection #endif if (a->LinkMode) diff --git a/src/Cedar/Client.c b/src/Cedar/Client.c index 3e4c26d4..e2755d8d 100644 --- a/src/Cedar/Client.c +++ b/src/Cedar/Client.c @@ -4342,9 +4342,9 @@ void InRpcClientOption(CLIENT_OPTION *c, PACK *p) PackGetStr(p, "CustomHttpHeader", c->CustomHttpHeader, sizeof(c->CustomHttpHeader)); PackGetStr(p, "HubName", c->HubName, sizeof(c->HubName)); PackGetStr(p, "DeviceName", c->DeviceName, sizeof(c->DeviceName)); -#if TYPE_BINDLOCALIP PackGetIp(p, "BindLocalIP", &c->BindLocalIP);// Source IP address for outgoing connection -#endif + c->BindLocalPort = PackGetInt(p, "BindLocalPort");// Source port nubmer for outgoing connection + c->UseEncrypt = PackGetInt(p, "UseEncrypt") ? true : false; c->UseCompress = PackGetInt(p, "UseCompress") ? true : false; c->HalfConnection = PackGetInt(p, "HalfConnection") ? true : false; @@ -4405,9 +4405,8 @@ void OutRpcClientOption(PACK *p, CLIENT_OPTION *c) PackAddBool(p, "FromAdminPack", c->FromAdminPack); PackAddBool(p, "NoUdpAcceleration", c->NoUdpAcceleration); PackAddData(p, "HostUniqueKey", c->HostUniqueKey, SHA1_SIZE); -#if TYPE_BINDLOCALIP PackAddIp(p, "BindLocalIP", &c->BindLocalIP);// Source IP address for outgoing connection -#endif + PackAddInt(p, "BindLocalPort", c->BindLocalPort);// Source port number for outgoing connection } // CLIENT_AUTH @@ -9303,6 +9302,7 @@ CLIENT_OPTION *CiLoadClientOption(FOLDER *f) o->FromAdminPack = CfgGetBool(f, "FromAdminPack"); o->NoUdpAcceleration = CfgGetBool(f, "NoUdpAcceleration"); CfgGetIp(f, "BindLocalIP", &o->BindLocalIP);// Source IP address for outgoing connection + o->BindLocalPort = CfgGetInt(f, "BindLocalPort");// Source port number for outgoing connection b = CfgGetBuf(f, "HostUniqueKey"); if (b != NULL) @@ -9858,6 +9858,7 @@ void CiWriteClientOption(FOLDER *f, CLIENT_OPTION *o) CfgAddBool(f, "DisableQoS", o->DisableQoS); CfgAddBool(f, "NoUdpAcceleration", o->NoUdpAcceleration); CfgAddIp(f, "BindLocalIP", &o->BindLocalIP);// Source IP address for outgoing connection + CfgAddInt(f, "BindLocalPort", o->BindLocalPort);// Source port number for outgoing connection if (o->FromAdminPack) { diff --git a/src/Cedar/Connection.h b/src/Cedar/Connection.h index d691fcdb..954738fe 100644 --- a/src/Cedar/Connection.h +++ b/src/Cedar/Connection.h @@ -58,7 +58,7 @@ struct RC4_KEY_PAIR UCHAR ServerToClientKey[16]; UCHAR ClientToServerKey[16]; }; -#define TYPE_BINDLOCALIP 1 // Enable HMI user to edit Source IP address for outgoing connection +#define TYPE_BINDLOCALIP 1 // Enable HMI user to edit Source IP address & Source port number for outgoing connection // Client Options // Do not change item size or order and only add new items at the end! @@ -108,6 +108,7 @@ struct CLIENT_OPTION char CustomHttpHeader[HTTP_CUSTOM_HEADER_MAX_SIZE]; // Custom HTTP proxy header char HintStr[MAX_HOST_NAME_LEN + 1]; // Hint string for NAT-T IP BindLocalIP; // Source IP address for outgoing connection + UINT BindLocalPort; // Source port number for outgoing connection }; // Client authentication data diff --git a/src/Cedar/Protocol.c b/src/Cedar/Protocol.c index 7eb98ea8..feb29ece 100644 --- a/src/Cedar/Protocol.c +++ b/src/Cedar/Protocol.c @@ -6281,8 +6281,7 @@ SOCK *ClientConnectGetSocket(CONNECTION *c, bool additional_connect) if (o->PortUDP == 0) { IP *localIP; - IP tmpIP; - UINT localport = BIND_LOCALPORT_NULL; + UINT localport; // Top of Bind outgoing connection // Decide the binding operation which is explicitly executed on the client-side @@ -6290,14 +6289,19 @@ SOCK *ClientConnectGetSocket(CONNECTION *c, bool additional_connect) // In the case of first TCP/IP connection if (additional_connect == false) { if (sess->ClientOption->NoRoutingTracking == false) { - StrToIP(&tmpIP, "0::0"); // Zero address is for dummy not to bind + localIP = BIND_LOCALIP_NULL; // Specify not to bind } else { - Debug("ClientConnectGetSocket(): Using client option %r for source IP address\n", sess->ClientOption->BindLocalIP); + Debug("ClientConnectGetSocket(): Using client option %r and %d for binding\n" + , sess->ClientOption->BindLocalIP, sess->ClientOption->BindLocalPort); // Nonzero address is for source IP address to bind. Zero address is for dummy not to bind. - tmpIP = sess->ClientOption->BindLocalIP; + if (IsZeroIP(&sess->ClientOption->BindLocalIP) == true) { + localIP = BIND_LOCALIP_NULL; + } + else { + localIP = &sess->ClientOption->BindLocalIP; + } } - localIP = &tmpIP; } // In the case of second and subsequent TCP/IP connections else { @@ -6305,6 +6309,13 @@ SOCK *ClientConnectGetSocket(CONNECTION *c, bool additional_connect) localIP = &sess->LocalIP_CacheForNextConnect; //localIP = BIND_LOCALIP_NULL; // Specify not to bind for test } + if (sess->ClientOption->BindLocalPort == 0) { + localport = BIND_LOCALPORT_NULL; + } + else { + localport = sess->ClientOption->BindLocalPort + Count(sess->Connection->CurrentNumConnection) - 1; + Debug("ClientConnectGetSocket(): Additional port number %u\n", localport); + } // Bottom of Bind outgoing connection // If additional_connect == false, enable trying to NAT-T connection @@ -6384,19 +6395,27 @@ SOCK *ClientConnectGetSocket(CONNECTION *c, bool additional_connect) // In the case of first TCP/IP connection if (additional_connect == false) { if (sess->ClientOption->NoRoutingTracking == false) { - IP tmpIP; - StrToIP(&tmpIP, "0::0"); - in.BindLocalIP = tmpIP; + in.BindLocalIP = BIND_LOCALIP_NULL; // Specify not to bind } else { - in.BindLocalIP = sess->ClientOption->BindLocalIP; + if (IsZeroIP(&sess->ClientOption->BindLocalIP) == true) { + in.BindLocalIP = BIND_LOCALIP_NULL; + } + else { + in.BindLocalIP = &sess->ClientOption->BindLocalIP; + } } } // In the case of second and subsequent TCP/IP connections else { - in.BindLocalIP = sess->LocalIP_CacheForNextConnect; + in.BindLocalIP = &sess->LocalIP_CacheForNextConnect; + } + if (sess->ClientOption->BindLocalPort == 0) { + in.BindLocalPort = BIND_LOCALPORT_NULL; + } + else { + in.BindLocalPort = sess->ClientOption->BindLocalPort + Count(sess->Connection->CurrentNumConnection) - 1; } - in.BindLocalPort = BIND_LOCALPORT_NULL; // Bottom of Bind outgoing connection #ifdef OS_WIN32 diff --git a/src/Cedar/SMInner.h b/src/Cedar/SMInner.h index 9c10bbb5..f54ea8c0 100644 --- a/src/Cedar/SMInner.h +++ b/src/Cedar/SMInner.h @@ -42,9 +42,9 @@ typedef struct SETTING UCHAR HashedPassword[SHA1_SIZE]; // Password CLIENT_OPTION ClientOption; // Client Option -#define IP_SIZE sizeof(IP) // Source IP address for outgoing connection +#define SRC_SIZE (sizeof(IP) + sizeof(UINT)) // Source IP address & port number for outgoing connection // UCHAR Reserved[10240 - sizeof(UINT) * 8 - SHA1_SIZE - HTTP_CUSTOM_HEADER_MAX_SIZE - MAX_HOST_NAME_LEN - 1]; // Reserved area - UCHAR Reserved[10240 - sizeof(UINT) * 8 - SHA1_SIZE - HTTP_CUSTOM_HEADER_MAX_SIZE - MAX_HOST_NAME_LEN - 1 - IP_SIZE]; // Reserved area + UCHAR Reserved[10240 - sizeof(UINT) * 8 - SHA1_SIZE - HTTP_CUSTOM_HEADER_MAX_SIZE - MAX_HOST_NAME_LEN - 1 - SRC_SIZE]; // Reserved area } SETTING; // Structure declaration diff --git a/src/Cedar/Session.c b/src/Cedar/Session.c index 3df84e75..00a9e817 100644 --- a/src/Cedar/Session.c +++ b/src/Cedar/Session.c @@ -609,6 +609,24 @@ void SessionMain(SESSION *s) WHERE; } } + + // If all the specified number of tcp connections are not alive continuously, then terminate the session. + UINT num_tcp_conn = LIST_NUM(s->Connection->Tcp->TcpSockList); + UINT max_conn = s->ClientOption->MaxConnection; + + if ((s->CurrentConnectionEstablishTime + + (UINT64)(s->ClientOption->AdditionalConnectionInterval * 1000 * 2 + CONNECTING_TIMEOUT * 2)) + <= Tick64()) + { + if (s->ClientOption->BindLocalPort != 0 || num_tcp_conn == 0) + { + timeouted = true; + WHERE; + } + } + //Debug("SessionMain(): The number of TCP connections short... Num_Tcp_Conn=%d Max_Conn=%d Curr_Conn_Time=%llu Tick64=%llu\n" + // , num_tcp_conn, max_conn, s->CurrentConnectionEstablishTime, Tick64()); + } } @@ -1430,7 +1448,7 @@ void ClientThread(THREAD *t, void *param) while (true) { Zero(&s->ServerIP_CacheForNextConnect, sizeof(IP)); - Zero(&s->LocalIP_CacheForNextConnect, sizeof(IP)); + Zero(&s->LocalIP_CacheForNextConnect, sizeof(IP)); // Assigned by first outgoing connection Zero(s->UnderlayProtocol, sizeof(s->UnderlayProtocol)); Zero(s->ProtocolDetails, sizeof(s->ProtocolDetails)); diff --git a/src/Mayaqua/Network.c b/src/Mayaqua/Network.c index 0c548ad6..b81fe5e1 100644 --- a/src/Mayaqua/Network.c +++ b/src/Mayaqua/Network.c @@ -13108,7 +13108,6 @@ SOCK *ListenEx63(UINT port, bool local_only, bool enable_ca, IP *listen_ip) #ifdef OS_WIN32 if (enable_ca) { - setsockopt(s, SOL_SOCKET, SO_CONDITIONAL_ACCEPT, (char *)&true_flag, sizeof(true_flag)); backlog = 1; } #endif @@ -13654,6 +13653,10 @@ char *PrintError(int ErrorCode) { char *Message; switch (ErrorCode) { + case WSAEFAULT: + Message = "Bad address."; + break; + case WSAEWOULDBLOCK: Message = "Resource temporarily unavailable."; break; @@ -13666,6 +13669,10 @@ char *PrintError(int ErrorCode) Message = "Operation already in progress."; break; + case WSAEAFNOSUPPORT: + Message = "Address family not supported by protocol family."; + break; + case WSAEADDRINUSE: Message = "Address already in use."; break; @@ -13814,28 +13821,30 @@ void SetSockHighPriority(SOCK *s, bool flag) } // Bind the socket to IPv4 or IPV6 address -int bind_sock(SOCKET sock, IP* ip, UINT port) +int bind_sock(SOCKET sock, IP *ip, UINT port) { //char tmp[MAX_HOST_NAME_LEN + 1]; + //memset(tmp, 0, sizeof(tmp)); //IPToStr(tmp, sizeof(tmp), ip); - //Debug("_____ bind_sock(): Binding... IP address %s:%d\n", tmp, port); + //Debug("bind_sock(): Binding... IP address %s:%d\n", tmp, port); if (IsIP4(ip)) { // Declare variables struct sockaddr_in sockaddr_in; - struct in_addr in_addr; Zero(&sockaddr_in, sizeof(sockaddr_in)); - Zero(&in_addr, sizeof(in_addr)); - - IPToInAddr(&in_addr, ip); // Set up the sockaddr structure sockaddr_in.sin_family = AF_INET; - //inet_pton(AF_INET, tmp, &addr_in.sin_addr.s_addr); - sockaddr_in.sin_addr.s_addr = in_addr.s_addr; + IPToInAddr(&sockaddr_in.sin_addr, ip); sockaddr_in.sin_port = htons((USHORT)port); + //inet_pton(AF_INET, tmp, &addr_in.sin_addr.s_addr); + + UINT true_flag = 1; + // This only have enabled for UNIX system since there is a bug + // in the implementation of REUSEADDR in Windows OS + (void)setsockopt(sock, SOL_SOCKET, SO_REUSEADDR, (char*)&true_flag, sizeof(true_flag)); // Bind the socket using the information in the sockaddr structure return (bind(sock, (struct sockaddr *)&sockaddr_in, sizeof(sockaddr_in))); @@ -13844,18 +13853,24 @@ int bind_sock(SOCKET sock, IP* ip, UINT port) { // Declare variables struct sockaddr_in6 sockaddr_in; - struct in6_addr in_addr; Zero(&sockaddr_in, sizeof(sockaddr_in)); - Zero(&in_addr, sizeof(in_addr)); - - IPToInAddr6(&in_addr, ip); // Set up the sockaddr structure sockaddr_in.sin6_family = AF_INET6; - //inet_pton(AF_INET6, tmp, &sockaddr_in.sin6_addr.s6_bytes); - Copy(&sockaddr_in.sin6_addr, &in_addr, sizeof(in_addr)); + IPToInAddr6(&sockaddr_in.sin6_addr, ip); + sockaddr_in.sin6_scope_id = ip->ipv6_scope_id; sockaddr_in.sin6_port = htons((USHORT)port); + //inet_pton(AF_INET6, tmp, &sockaddr_in.sin6_addr.s6_bytes); + + UINT true_flag = 1; +#ifdef OS_UNIX + // It is necessary to set the IPv6 Only flag on a UNIX system + (void)setsockopt(sock, IPPROTO_IPV6, IPV6_V6ONLY, &true_flag, sizeof(true_flag)); +#endif // OS_UNIX + // This only have enabled for UNIX system since there is a bug + // in the implementation of REUSEADDR in Windows OS + (void)setsockopt(sock, SOL_SOCKET, SO_REUSEADDR, (char*)&true_flag, sizeof(true_flag)); // Bind the socket using the information in the sockaddr structure return (bind(sock, (struct sockaddr *)&sockaddr_in, sizeof(sockaddr_in))); @@ -13890,6 +13905,12 @@ SOCKET BindConnectTimeoutIPv4(IP* localIP, UINT localport, IP* ip, UINT port, UI // Top of Bind outgoing connection if (s != INVALID_SOCKET) { int ier; + IP tmpIP; + + if (localIP == BIND_LOCALIP_NULL) { + StrToIP(&tmpIP, "0.0.0.0"); // A NULL address for the argument "localIP" is treated as if "0::0" in IPV4 was specified. + localIP = &tmpIP; + } if ((IsZeroIP(localIP) == false) || (localport != 0)) { @@ -14177,8 +14198,8 @@ void ConnectThreadForIPv4(THREAD* thread, void* param) { return; } - StrToIP(&p->LocalIP, "0.0.0.0"); - p->LocalPort = 0; + p->LocalIP = BIND_LOCALIP_NULL; + p->LocalPort = BIND_LOCALPORT_NULL; return BindConnectThreadForIPv4(thread, param); } @@ -14238,7 +14259,7 @@ void BindConnectThreadForIPv4(THREAD *thread, void *param) { // Normal connection without using NAT-T // s = ConnectTimeoutIPv4(ip, p->Port, p->Timeout, p->CancelFlag); - s = BindConnectTimeoutIPv4(&p->LocalIP, p->LocalPort, ip, p->Port, p->Timeout, p->CancelFlag); + s = BindConnectTimeoutIPv4(p->LocalIP, p->LocalPort, ip, p->Port, p->Timeout, p->CancelFlag); if (s != INVALID_SOCKET) { @@ -14547,8 +14568,8 @@ void ConnectThreadForIPv6(THREAD* thread, void* param) { return; } - StrToIP(&p->LocalIP, "0::0"); - p->LocalPort = 0; + p->LocalIP = BIND_LOCALIP_NULL; + p->LocalPort = BIND_LOCALPORT_NULL; return BindConnectThreadForIPv6(thread, param); } @@ -14613,11 +14634,17 @@ void BindConnectThreadForIPv6(THREAD* thread, void* param) // Top of Bind outgoing connection if (s != INVALID_SOCKET){ int ier; + IP tmpIP; - if ((IsZeroIP(&p->LocalIP) == false) || (p->LocalPort != 0)){ + if (p->LocalIP == BIND_LOCALIP_NULL) { + StrToIP(&tmpIP, "0::0"); // A NULL address for the argument "p->LocalIP" is treated as if "0::0" in IPV6 was specified. + p->LocalIP = &tmpIP; + } + + if ((IsZeroIP(p->LocalIP) == false) || (p->LocalPort != 0)){ // Bind the socket - if (bind_sock(s, &p->LocalIP, p->LocalPort) != 0) { + if (bind_sock(s, p->LocalIP, p->LocalPort) != 0) { #ifdef OS_WIN32 ier = WSAGetLastError(); Debug("IPv6 bind() failed with error: %d %s\n", ier, PrintError(ier)); @@ -14864,10 +14891,14 @@ SOCK *BindConnectEx5(IP *localIP, UINT localport, char *hostname, UINT port, UIN { p6.IpList = iplist_v6; - //ZeroIP6(&p6.LocalIP); - Zero(&p6.LocalIP, sizeof(p6.LocalIP)); // Zero IP6 must be used when argument localIP is NULL - CopyIP(&p6.LocalIP, localIP); - p6.LocalPort = localport; + if (localIP == BIND_LOCALIP_NULL) { + p6.LocalIP = BIND_LOCALIP_NULL; // Make the NULL address passing through + } + else { + CopyIP(&p6.LocalIP_Cache, localIP); + p6.LocalIP = &p6.LocalIP_Cache; + } + p6.LocalPort = localport; p6.Port = port; p6.Timeout = timeout; @@ -14891,9 +14922,14 @@ SOCK *BindConnectEx5(IP *localIP, UINT localport, char *hostname, UINT port, UIN { p4.IpList = iplist_v4; - ZeroIP4(&p4.LocalIP); // Zero IP4 must be used when argument localIP is NULL - CopyIP(&p4.LocalIP, localIP); - p4.LocalPort = localport; + if (localIP == BIND_LOCALIP_NULL) { + p4.LocalIP = BIND_LOCALIP_NULL; // Make the NULL address passing through + } + else { + CopyIP(&p4.LocalIP_Cache, localIP); + p4.LocalIP = &p4.LocalIP_Cache; + } + p4.LocalPort = localport; p4.Port = port; p4.Timeout = timeout; diff --git a/src/Mayaqua/Network.h b/src/Mayaqua/Network.h index 526b9005..b1142145 100644 --- a/src/Mayaqua/Network.h +++ b/src/Mayaqua/Network.h @@ -809,7 +809,8 @@ struct CONNECT_SERIAL_PARAM { LIST *IpList; UINT LocalPort; // Local port number to bind - IP LocalIP; // Local IP address to bind + IP *LocalIP; // Local IP address to bind. NULL address allowed to use. + IP LocalIP_Cache; // Local IP address to bind UINT Port; UINT Timeout; char Hostname[MAX_SIZE]; diff --git a/src/Mayaqua/Proxy.c b/src/Mayaqua/Proxy.c index 8d4f1c6a..fa0ea096 100644 --- a/src/Mayaqua/Proxy.c +++ b/src/Mayaqua/Proxy.c @@ -17,7 +17,7 @@ SOCK *Internal_ProxyTcpConnect(PROXY_PARAM_IN *param, volatile bool *cancel_flag #endif //return ConnectEx4(param->Hostname, param->Port, param->Timeout, (bool*)cancel_flag, NULL, NULL, false, true, resolved_ip); - return BindConnectEx4(¶m->BindLocalIP, param->BindLocalPort, param->Hostname, param->Port, param->Timeout, (bool *)cancel_flag, NULL, NULL, false, true, resolved_ip); + return BindConnectEx4(param->BindLocalIP, param->BindLocalPort, param->Hostname, param->Port, param->Timeout, (bool *)cancel_flag, NULL, NULL, false, true, resolved_ip); } // Connect to an HTTP proxy @@ -28,8 +28,8 @@ UINT ProxyHttpConnect(PROXY_PARAM_OUT *out, PROXY_PARAM_IN *in, volatile bool *c { return PROXY_ERROR_PARAMETER; } - StrToIP(&in->BindLocalIP, "0::0"); - in->BindLocalPort = 0; + in->BindLocalIP = BIND_LOCALIP_NULL; + in->BindLocalPort = BIND_LOCALPORT_NULL; return BindProxyHttpConnect(out, in, cancel_flag); } @@ -228,8 +228,8 @@ UINT ProxySocks5Connect(PROXY_PARAM_OUT *out, PROXY_PARAM_IN *in, volatile bool { return PROXY_ERROR_PARAMETER; } - StrToIP(&in->BindLocalIP, "0::0"); - in->BindLocalPort = 0; + in->BindLocalIP = BIND_LOCALIP_NULL; + in->BindLocalPort = BIND_LOCALPORT_NULL; return BindProxySocks5Connect(out, in, cancel_flag); } @@ -554,6 +554,8 @@ UINT ProxySocks4Connect(PROXY_PARAM_OUT *out, PROXY_PARAM_IN *in, volatile bool { return PROXY_ERROR_PARAMETER; } + in->BindLocalIP = BIND_LOCALIP_NULL; + in->BindLocalPort = BIND_LOCALPORT_NULL; return BindProxySocks4Connect(out, in, cancel_flag); } diff --git a/src/Mayaqua/Proxy.h b/src/Mayaqua/Proxy.h index 3b5abb91..626bd886 100644 --- a/src/Mayaqua/Proxy.h +++ b/src/Mayaqua/Proxy.h @@ -30,7 +30,7 @@ struct PROXY_PARAM_IN UINT Timeout; char HttpCustomHeader[HTTP_CUSTOM_HEADER_MAX_SIZE]; char HttpUserAgent[HTTP_HEADER_USER_AGENT_MAX_SIZE + 1]; - IP BindLocalIP; // Source IP address for outgoing connection + IP *BindLocalIP; // Source IP address for outgoing connection UINT BindLocalPort; // UINT used not USHORT // Source port number for outgoing connection #ifdef OS_WIN32 void *Hwnd; diff --git a/src/PenCore/PenCore.rc b/src/PenCore/PenCore.rc index c43db768..47ca1f5c 100644 --- a/src/PenCore/PenCore.rc +++ b/src/PenCore/PenCore.rc @@ -1654,16 +1654,18 @@ BEGIN LTEXT "@S_MODE",S_MODE,254,169,166,17 CONTROL "@R_BRIDGE",R_BRIDGE,"Button",BS_AUTOCHECKBOX | WS_TABSTOP,254,191,166,9 CONTROL "@R_MONITOR",R_MONITOR,"Button",BS_AUTOCHECKBOX | WS_TABSTOP,254,205,166,9 - GROUPBOX "@STATIC17", IDC_STATIC, 222, 225, 205, 42 - CONTROL "@R_NO_ROUTING",R_NO_ROUTING,"Button",BS_AUTOCHECKBOX | WS_TABSTOP,233,238,181,9 - LTEXT "@STATIC20", IDC_STATIC, 233, 249, 56, 17 - EDITTEXT E_BIND_LOCALIP, 289, 249, 126, 11, ES_RIGHT | ES_AUTOHSCROLL + GROUPBOX "@STATIC17", IDC_STATIC, 222, 225, 205, 43 + CONTROL "@R_NO_ROUTING",R_NO_ROUTING,"Button",BS_AUTOCHECKBOX | WS_TABSTOP,233,234,181,9 + LTEXT "@STATIC20", IDC_STATIC, 233, 243, 58, 17 + EDITTEXT E_BIND_LOCALIP, 292, 243, 126, 11, ES_RIGHT | ES_AUTOHSCROLL + LTEXT "@STATIC21", IDC_STATIC, 233, 255, 58, 12 + EDITTEXT E_BIND_LOCALPORT, 292, 255, 40, 11, ES_RIGHT | ES_AUTOHSCROLL ICON ICO_WARNING,S_WARNING_ICON,223,270,18,18 LTEXT "@STATIC18",IDC_STATIC,247,270,180,26 DEFPUSHBUTTON "@IDOK",IDOK,294,291,64,15 PUSHBUTTON "@IDCANCEL",IDCANCEL,363,291,64,15 ICON ICO_SWITCH,IDC_STATIC,230,169,18,18 -END + END D_CM_NEW_VLAN DIALOGEX 0, 0, 251, 98 STYLE DS_SETFONT | DS_MODALFRAME | DS_FIXEDSYS | WS_POPUP | WS_CAPTION | WS_SYSMENU diff --git a/src/PenCore/resource.h b/src/PenCore/resource.h index c6379093..2c886a3a 100644 --- a/src/PenCore/resource.h +++ b/src/PenCore/resource.h @@ -339,7 +339,8 @@ #define C_NUM_TCP 1075 #define B_TRUST 1076 #define E_INTERVAL 1076 -#define E_BIND_LOCALIP 9076 // Bind source IP +#define E_BIND_LOCALIP 9076 // Bind source IP address +#define E_BIND_LOCALPORT 9077 // Bind source port number #define B_PROXY_CONFIG 1077 #define B_SERVER_CERT 1078 #define B_VIEW_SERVER_CERT 1079 diff --git a/src/bin/hamcore/strtable_en.stb b/src/bin/hamcore/strtable_en.stb index 6a078a65..6be54546 100644 --- a/src/bin/hamcore/strtable_en.stb +++ b/src/bin/hamcore/strtable_en.stb @@ -2420,7 +2420,8 @@ STATIC17 Other Confi&gurations: R_NO_ROUTING No Adjustments of &Routing Table STATIC18 Keep the settings default in this dialog unless you are told to do so by a system administrator, or you have expertise for networking and security. STATIC19 The VoIP / QoS functions handle high priority packets such as IP telephone packets (VoIP) to be transmitted faster. -STATIC20 Source IP Address\n(IP Address on NIC): +STATIC20 Source IP Address: +STATIC21 Source Port Number: R_DISABLE_QOS Disable VoIP / &QoS Functions IDOK &OK IDCANCEL Cancel diff --git a/src/bin/hamcore/strtable_ja.stb b/src/bin/hamcore/strtable_ja.stb index 76e895a5..970b3180 100644 --- a/src/bin/hamcore/strtable_ja.stb +++ b/src/bin/hamcore/strtable_ja.stb @@ -2423,7 +2423,8 @@ STATIC17 その他の設定(&G): R_NO_ROUTING ルーティングテーブルの調整処理を行わない(&R) STATIC18 この設定画面の設定項目は、システム管理者から指示があった場合や、ネットワークやセキュリティに関して詳しい知識をお持ちの場合以外は変更しないでください。 STATIC19 VoIP / QoS 対応機能を使用すると、IP 電話パケットなどの優先度の高いパケットを VPN 内で高速に伝送できます。 -STATIC20 送信元IPアドレス\n(NICのIPアドレス): +STATIC20 送信元IPアドレス: +STATIC21 送信元ポート番号: R_DISABLE_QOS VoIP / QoS 対応機能を無効にする(&Q) IDOK &OK IDCANCEL キャンセル From aa65e11fc80d5c78afb582157aac6354a2b0063c Mon Sep 17 00:00:00 2001 From: Ilya Shipitsin Date: Fri, 25 Aug 2023 22:05:08 +0200 Subject: [PATCH 05/63] stbchecker: retarget against net7.0 --- developer_tools/stbchecker/stbchecker.csproj | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/developer_tools/stbchecker/stbchecker.csproj b/developer_tools/stbchecker/stbchecker.csproj index 3483b250..077d3d65 100644 --- a/developer_tools/stbchecker/stbchecker.csproj +++ b/developer_tools/stbchecker/stbchecker.csproj @@ -2,7 +2,7 @@ Exe - netcoreapp2.1 + net7.0 From 107c4ba362fe1ecf365f32b3bbc7fb4b89f14d95 Mon Sep 17 00:00:00 2001 From: Ilya Shipitsin Date: Fri, 25 Aug 2023 22:06:09 +0200 Subject: [PATCH 06/63] CI: add stb check --- .github/workflows/stb_check.yml | 16 ++++++++++++++++ 1 file changed, 16 insertions(+) create mode 100644 .github/workflows/stb_check.yml diff --git a/.github/workflows/stb_check.yml b/.github/workflows/stb_check.yml new file mode 100644 index 00000000..5353250e --- /dev/null +++ b/.github/workflows/stb_check.yml @@ -0,0 +1,16 @@ +on: [push, pull_request] + +permissions: + contents: read + +jobs: + check: + runs-on: ubuntu-latest + steps: + - uses: actions/checkout@v1 + with: + submodules: true + - name: Check + run: | + cd developer_tools/stbchecker + dotnet run ../../src/bin/hamcore \ No newline at end of file From 7fe3e6a80018bcf1066c90a6584e540afa87398d Mon Sep 17 00:00:00 2001 From: Ilya Shipitsin Date: Fri, 25 Aug 2023 22:07:07 +0200 Subject: [PATCH 07/63] CI: travis: cleanup stb check --- .travis.yml | 10 ---------- 1 file changed, 10 deletions(-) diff --git a/.travis.yml b/.travis.yml index 00cbf76a..25553258 100644 --- a/.travis.yml +++ b/.travis.yml @@ -38,16 +38,6 @@ matrix: before_install: - sudo apt-get -y install libsodium-dev - bash .ci/build-libressl.sh > build-deps.log 2>&1 || (cat build-deps.log && exit 1) - - env: LABEL="check stb files" - os: linux - language: csharp - mono: none - dotnet: 2.2.203 - before_install: - - true - script: - - cd developer_tools/stbchecker - - dotnet run ../../src/bin/hamcore cache: directories: From 63595f79c5c751af198f1c129daf68c2938c3f85 Mon Sep 17 00:00:00 2001 From: Ilya Shipitsin Date: Fri, 25 Aug 2023 22:24:53 +0200 Subject: [PATCH 08/63] fix some missing localization --- src/bin/hamcore/strtable_pt_br.stb | 2 +- src/bin/hamcore/strtable_tw.stb | 1 + 2 files changed, 2 insertions(+), 1 deletion(-) diff --git a/src/bin/hamcore/strtable_pt_br.stb b/src/bin/hamcore/strtable_pt_br.stb index f78a8179..89083eeb 100644 --- a/src/bin/hamcore/strtable_pt_br.stb +++ b/src/bin/hamcore/strtable_pt_br.stb @@ -479,7 +479,7 @@ NATT_MSG ** Connected with NAT traversal - might be unstable **\r\n\r\nThis VPN # Virtual HUB Admin Options HUB_AO_CLICK Select an item to view the description here. HUB_AO_UNKNOWN The description of the item was not found. Refer to the documents, or speculate the meaning and purpose of the item from the name of the item. -HUB_AO_allow_eap_tls_match_user_by_cert If you enable (set to 1) this option, the Virtual Hub will attempt to match the EAP Identity not only with usernames, but also with user certificate CNs during the PPP EAP authentication flow. +HUB_AO_allow_hub_admin_change_option This is a special item. If you are enable (set to 1) this option, then not only the VPN Server's global administrator but also the Virtual Hub's administrator will be granted to modify the Virtual Hub Admin Options by himself. HUB_AO_deny_hub_admin_change_ext_option If you are enable (set to 1) this option, the Virtual Hub's administrator will be forbidden to modify any values on the Virtual Hub Extended Options, then only the VPN Server's global administrator can modify them. HUB_AO_no_delay_jitter_packet_loss If you set this option to non-zero value, then all parameters of delay, jitter and packet-loss on the access-list entry will be ignored even if these parameters are set when the administrator adds a new access list entry. Therefore, delay, jitter and packet-loss generating function will be virtually disabled. Because of the delay generating function sometimes make a high volume of load on the CPU and RAM, a Virtual Hub which is shared by several users should have this option enabled. HUB_AO_max_users If you set this option to non-zero value, the maximum number of user objects registered on the Virtual Hub will be limited to this value, then greater number of user objects than this value cannot be added. diff --git a/src/bin/hamcore/strtable_tw.stb b/src/bin/hamcore/strtable_tw.stb index 69dc3818..0eec56e3 100644 --- a/src/bin/hamcore/strtable_tw.stb +++ b/src/bin/hamcore/strtable_tw.stb @@ -574,6 +574,7 @@ HUB_AO_NoPhysicalIPOnPacketLog If you set this option to non-zero value, then HUB_AO_UseHubNameAsDhcpUserClassOption If you set this option to non-zero value, then the Virtual Hub Name will be added to a DHCP request to an external DHCP server as the "User-Class" option. This allows to use separate pools of IP addresses for each Virtual Hub. (For only L2TP/IPsec and OpenVPN sessions.) HUB_AO_UseHubNameAsRadiusNasId If you set this option to non-zero value, then the NAS-Identifier RADIUS attribute will be set to a name of the Virtual Hub. This allows to determine on RADIUS server whether access to the Virtual Hub should be granted or denied. HUB_AO_AllowEapMatchUserByCert If you enable (set to 1) this option, the Virtual Hub will attempt to match the EAP Identity not only with usernames, but also with user certificates during the PPP EAP authentication flow. +HUB_AO_AllowSameUserInPrivacyFilterMode Allow packets if both the source and destination session users are the same, even in PrivacyFilter mode. #關於失敗連接對話方塊 From 68e704097d96b22f3920a3c69881c9d0907735b5 Mon Sep 17 00:00:00 2001 From: Ilya Shipitsin Date: Sun, 27 Aug 2023 21:11:53 +0200 Subject: [PATCH 09/63] fix another stb complaints --- src/bin/hamcore/strtable_ru.stb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/bin/hamcore/strtable_ru.stb b/src/bin/hamcore/strtable_ru.stb index 1916982f..bc29456c 100644 --- a/src/bin/hamcore/strtable_ru.stb +++ b/src/bin/hamcore/strtable_ru.stb @@ -989,7 +989,7 @@ CM_TRAY_MENU_ABOUT &О VPN клиенте... CM_TRAY_MENU_SETTING Изменить режим работы... CM_TRAY_MENU_CANCEL Закрыть это меню CM_EXIT_MESSAGE Это действие закроет VPN клиент. \r\nВы действительно хотите это сделать? -CM_IMPORT_MESSAGE Настройки VPN подключения "%s" из файла "%S" были установлены. +CM_IMPORT_MESSAGE Из файла "%S" были импортированы настройки "%s". CM_VLAN_CREATING Создание нового Виртуального Сетевого Адаптера для Windows. \r\n\r\nЭтот процесс может занять несколько секунд или более минуты. \r\nПожалуйста, подождите...\r\n\r\n(Пожалуйста, не выполняйте другие операции во время создания Виртуального Сетевого Адаптера.) CM_SETTING_PASSWORD Настройки заблокированы. Чтобы отключить блокировку, необходимо ввести пароль. CM_EASY_MODE_NOT_ON_REMOTE Невозможно подключиться, так как VPN клиент на удаленном компьютере работает в Упрощенном режиме. From a9a93a28245ce028eb44809a88c7a7f68bb2c1a8 Mon Sep 17 00:00:00 2001 From: puripuri2100 Date: Thu, 31 Aug 2023 01:30:15 +0900 Subject: [PATCH 10/63] fixed VpnAzureSetStatus to VpnAzureSetEnable --- src/bin/hamcore/strtable_cn.stb | 2 +- src/bin/hamcore/strtable_en.stb | 2 +- src/bin/hamcore/strtable_ja.stb | 2 +- src/bin/hamcore/strtable_ko.stb | 2 +- src/bin/hamcore/strtable_ru.stb | 2 +- src/bin/hamcore/strtable_tw.stb | 2 +- 6 files changed, 6 insertions(+), 6 deletions(-) diff --git a/src/bin/hamcore/strtable_cn.stb b/src/bin/hamcore/strtable_cn.stb index efc11a1e..abda7401 100644 --- a/src/bin/hamcore/strtable_cn.stb +++ b/src/bin/hamcore/strtable_cn.stb @@ -6476,7 +6476,7 @@ CMD_VpnAzureGetStatus_PRINT_CONNECTED 至 VPN Azure 云服务器的连接建立 CMD_VpnAzureGetStatus_PRINT_HOSTNAME 在 VPN Azure 服务上的本 VPN 服务器的主机名 -# VpnAzureSetStatus command +# VpnAzureSetEnable command CMD_VpnAzureSetEnable 启用/禁用 VPN Azure 功能 CMD_VpnAzureSetEnable_Help 启用或禁用 VPN Azure 功能。\n\nVPN Azure 可以更容易地从你家里的计算机到你办公室的计算机建立一个 VPN 会话。当一个 VPN 连接建立了,您可以访问您公司专用网络上的任何其他服务器。\n在办公室的计算机(VPN 服务器)上,你并不需要一个全球 IP 地址。它可以在防火墙或 NAT 后面工作。无需网络管理员的配置。您可以在您的家用电脑使用 Windows 内置的 SSTP VPN 客户端。\nVPN Azure 是一个云 VPN 服务由 SoftEther 公司经营。VPN Azure 是免费的,可提供给任何人。访问 http://www.vpnazure.net/ 查看详细信息和如何使用的说明。\n\nVPN Azure 主机名与动态 DNS 设置的主机名相同,但改变的域名后缀为“vpnazure.net”。要改变主机名使用 DynamicDnsSetHostname 命令。\n\n要执行此命令,你必须具有 VPN 服务器管理员权限。\n此命令不能在 VPN 网桥上运行。\n以集群成员运行的 VPN 服务器的虚拟 HUB 不能执行此命令。 CMD_VpnAzureSetEnable_Args VpnAzureSetEnable [yes|no] diff --git a/src/bin/hamcore/strtable_en.stb b/src/bin/hamcore/strtable_en.stb index c7e9698c..0f79db28 100644 --- a/src/bin/hamcore/strtable_en.stb +++ b/src/bin/hamcore/strtable_en.stb @@ -6463,7 +6463,7 @@ CMD_VpnAzureGetStatus_PRINT_CONNECTED Connection to VPN Azure Cloud Server is Es CMD_VpnAzureGetStatus_PRINT_HOSTNAME Hostname of this VPN Server on VPN Azure Service -# VpnAzureSetStatus command +# VpnAzureSetEnable command CMD_VpnAzureSetEnable Enable / Disable VPN Azure Function CMD_VpnAzureSetEnable_Help Enable or disable the VPN Azure function.\n\nVPN Azure makes it easier to establish a VPN Session from your home PC to your office PC. While a VPN connection is established, you can access to any other servers on the private network of your company.\nYou don't need a global IP address on the office PC (VPN Server). It can work behind firewalls or NATs. No network administrator's configuration required. You can use the built-in SSTP-VPN Client of Windows in your home PC.\nVPN Azure is a cloud VPN service operated by SoftEther VPN Project. VPN Azure is free of charge and available to anyone. Visit http://www.vpnazure.net/ to see details and how-to-use instructions.\n\nThe VPN Azure hostname is same to the hostname of the Dynamic DNS setting, but altering the domain suffix to "vpnazure.net". To change the hostname use the DynamicDnsSetHostname command.\n\nTo execute this command, you must have VPN Server administrator privileges. \nThis command cannot be run on VPN Bridge.\nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster. CMD_VpnAzureSetEnable_Args VpnAzureSetEnable [yes|no] diff --git a/src/bin/hamcore/strtable_ja.stb b/src/bin/hamcore/strtable_ja.stb index c6dd947e..b7e2f4eb 100644 --- a/src/bin/hamcore/strtable_ja.stb +++ b/src/bin/hamcore/strtable_ja.stb @@ -6470,7 +6470,7 @@ CMD_VpnAzureGetStatus_PRINT_CONNECTED VPN Azure クラウドサーバーへ接 CMD_VpnAzureGetStatus_PRINT_HOSTNAME VPN Azure サービス上でのホスト名 -# VpnAzureSetStatus コマンド +# VpnAzureSetEnable コマンド CMD_VpnAzureSetEnable VPN Azure 機能の有効化 / 無効化 CMD_VpnAzureSetEnable_Help VPN Azure 機能を有効または無効にします。\n\nVPN Azure により、会社のパソコンに自宅や外出先のパソコンから非常に簡単に VPN 接続できるようになります。VPN 接続中は会社のパソコンを経由して、社内 LAN の他のサーバーにもアクセスできます。\n会社のパソコン (VPN Server) にはグローバル IP アドレスは不要です。ファイアウォールや NAT の内側であっても動作し、ネットワーク管理者による設定は一切必要ありません。VPN クライアントとなる自宅のパソコンでは、Windows に標準付属の SSTP VPN クライアントを使用できます。\nVPN Azure は、SoftEther VPN Server をお使いの方はどなたでも無料で利用できるクラウド VPN サービスです。ソフトイーサ株式会社によって運営されています。使い方は http://www.vpnazure.net/ に掲載されています。\n\nVPN Azure ホスト名はダイナミック DNS サービスのホスト名のドメイン部分を "vpnazure.net" に変更したものが使用されます。ホスト名を変更するには DynamicDnsSetHostname コマンドを使用してください。\n\nこのコマンドを実行するには、VPN Server の管理者権限が必要です。\nこのコマンドは、VPN Bridge では実行できません。\nこのコマンドは、クラスタとして動作している VPN Server の仮想 HUB では実行できません。 CMD_VpnAzureSetEnable_Args VpnAzureSetEnable [yes|no] diff --git a/src/bin/hamcore/strtable_ko.stb b/src/bin/hamcore/strtable_ko.stb index de30a1d2..de81e586 100644 --- a/src/bin/hamcore/strtable_ko.stb +++ b/src/bin/hamcore/strtable_ko.stb @@ -6445,7 +6445,7 @@ CMD_VpnAzureGetStatus_PRINT_CONNECTED VPN Azure 클라우드 서버에 연결 CMD_VpnAzureGetStatus_PRINT_HOSTNAME VPN Azure 서비스에서 호스트 이름 -# VpnAzureSetStatus 명령 +# VpnAzureSetEnable 명령 CMD_VpnAzureSetEnable VPN Azure 기능의 활성화/비활성화 CMD_VpnAzureSetEnable_Help VPN Azure 기능을 활성화하거나 비활성화합니다. \n \nVPN Azure하여 회사의 PC에 가정이나 이동 PC에서 매우 쉽게 VPN 연결 할 수 있습니다. VPN 연결 중에 회사의 컴퓨터를 통해 사내 LAN의 다른 서버에 액세스 할 수 있습니다. \n 회사 컴퓨터 (VPN Server)는 글로벌 IP 주소는 필요하지 않습니다. 방화벽이나 NAT 뒤에라도 작동하고 네트워크 관리자의 설정은 필요하지 않습니다. VPN 클라이언트가 될 자택의 PC에서는 Windows에 표준 부속의 SSTP VPN 클라이언트를 사용할 수 있습니다. \nVPN Azure는 SoftEther VPN Server를 사용하시는 분들은 누구나 무료로 이용할 수 클라우드 VPN 서비스입니다. 소프트 이사 회사에 의해 운영되고 있습니다. 사용법은 http://www.vpnazure.net/에 게재되어 있습니다. \n \nVPN Azure 호스트 이름은 동적 DNS 서비스 호스트 이름의 도메인 부분을 "vpnazure.net"로 변경 한 것이 사용됩니다. 호스트 이름을 변경하려면 DynamicDnsSetHostname 명령을 사용하십시오. \n \n이 명령을 실행하려면 VPN Server 관리자 권한이 있어야합니다. \n이 명령은 VPN Bridge에서는 실행되지 않습니다. \n이 명령은 클러스터로 작동하는 VPN Server의 가상 HUB에서는 실행되지 않습니다. CMD_VpnAzureSetEnable_Args VpnAzureSetEnable [yes|no] diff --git a/src/bin/hamcore/strtable_ru.stb b/src/bin/hamcore/strtable_ru.stb index bc29456c..e7a2fda1 100644 --- a/src/bin/hamcore/strtable_ru.stb +++ b/src/bin/hamcore/strtable_ru.stb @@ -6463,7 +6463,7 @@ CMD_VpnAzureGetStatus_PRINT_CONNECTED Connection to VPN Azure Cloud Server is Es CMD_VpnAzureGetStatus_PRINT_HOSTNAME Hostname of this VPN Server on VPN Azure Service -# VpnAzureSetStatus command +# VpnAzureSetEnable command CMD_VpnAzureSetEnable Enable / Disable VPN Azure Function CMD_VpnAzureSetEnable_Help Enable or disable the VPN Azure function.\n\nVPN Azure makes it easier to establish a VPN Session from your home PC to your office PC. While a VPN connection is established, you can access to any other servers on the private network of your company.\nYou don't need a global IP address on the office PC (VPN Server). It can work behind firewalls or NATs. No network administrator's configuration required. You can use the built-in SSTP-VPN Client of Windows in your home PC.\nVPN Azure is a cloud VPN service operated by SoftEther VPN Project. VPN Azure is free of charge and available to anyone. Visit http://www.vpnazure.net/ to see details and how-to-use instructions.\n\nThe VPN Azure hostname is same to the hostname of the Dynamic DNS setting, but altering the domain suffix to "vpnazure.net". To change the hostname use the DynamicDnsSetHostname command.\n\nTo execute this command, you must have VPN Server administrator privileges. \nThis command cannot be run on VPN Bridge.\nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster. CMD_VpnAzureSetEnable_Args VpnAzureSetEnable [yes|no] diff --git a/src/bin/hamcore/strtable_tw.stb b/src/bin/hamcore/strtable_tw.stb index 0eec56e3..289506ec 100644 --- a/src/bin/hamcore/strtable_tw.stb +++ b/src/bin/hamcore/strtable_tw.stb @@ -6478,7 +6478,7 @@ CMD_VpnAzureGetStatus_PRINT_CONNECTED 至 VPN Azure 雲伺服器的連接建立 CMD_VpnAzureGetStatus_PRINT_HOSTNAME 在 VPN Azure 服務上的本 VPN 伺服器的主機名稱 -# VpnAzureSetStatus command +# VpnAzureSetEnable command CMD_VpnAzureSetEnable 啟用/禁用 VPN Azure 功能 CMD_VpnAzureSetEnable_Help 啟用或禁用 VPN Azure 功能。\n\nVPN Azure 可以更容易地從你家裡的電腦到你辦公室的電腦建立一個 VPN 會話。當一個 VPN 連接建立了,您可以訪問您公司私人網路絡上的任何其他伺服器。\n在辦公室的電腦(VPN 伺服器)上,你並不需要一個全球 IP 位址。它可以在防火牆或 NAT 後面工作。無需網路系統管理員的配置。您可以在您的家用電腦使用 Windows 內置的 SSTP VPN 用戶端。\nVPN Azure 是一個雲 VPN 服務由 SoftEther 公司經營。VPN Azure 是免費的,可提供給任何人。訪問 http://www.vpnazure.net/ 查看詳細資訊和如何使用的說明。\n\nVPN Azure 主機名稱與動態 DNS 設置的主機名稱相同,但改變的功能變數名稱尾碼為“vpnazure.net”。要改變主機名稱使用 DynamicDnsSetHostname 命令。\n\n要執行此命令,你必須具有 VPN 伺服器管理員許可權。\n此命令不能在 VPN 橋接器上運行。\n以集群成員運行的 VPN 伺服器的虛擬 HUB 不能執行此命令。 CMD_VpnAzureSetEnable_Args VpnAzureSetEnable [yes|no] From 643cbbbf88b88416737675d6af5eae24a5872f47 Mon Sep 17 00:00:00 2001 From: hiura Date: Tue, 12 Sep 2023 10:20:51 +0900 Subject: [PATCH 11/63] Bind outgoing connection to a specific IP address (avoid illegal access) --- src/Mayaqua/Network.c | 30 +++++++++++++++++++++++------- 1 file changed, 23 insertions(+), 7 deletions(-) diff --git a/src/Mayaqua/Network.c b/src/Mayaqua/Network.c index b81fe5e1..15fd704d 100644 --- a/src/Mayaqua/Network.c +++ b/src/Mayaqua/Network.c @@ -13681,6 +13681,14 @@ char *PrintError(int ErrorCode) Message = "Cannot assign requested address."; break; + case WSAEISCONN: + Message = "Socket is already connected."; // Added on AUG.10, 2023 + break; + + case WSAEINVAL: + Message = "Invalid argument."; // Added on AUG.10, 2023 + break; + default: Message = ""; break; @@ -13906,16 +13914,20 @@ SOCKET BindConnectTimeoutIPv4(IP* localIP, UINT localport, IP* ip, UINT port, UI if (s != INVALID_SOCKET) { int ier; IP tmpIP; + IP *tmpIP2; if (localIP == BIND_LOCALIP_NULL) { - StrToIP(&tmpIP, "0.0.0.0"); // A NULL address for the argument "localIP" is treated as if "0::0" in IPV4 was specified. - localIP = &tmpIP; + StrToIP(&tmpIP, "0.0.0.0"); // A NULL address for the argument "localIP" is treated as if "0.0.0.0" in IPV4 was specified. + tmpIP2 = &tmpIP; + } + else { + tmpIP2 = localIP; } - if ((IsZeroIP(localIP) == false) || (localport != 0)) { + if ((IsZeroIP(tmpIP2) == false) || (localport != 0)) { // Bind the socket - if (bind_sock(s, localIP, localport) != 0) { + if (bind_sock(s, tmpIP2, localport) != 0) { #ifdef OS_WIN32 ier = WSAGetLastError(); Debug("IPv4 bind() failed with error: %d %s\n", ier, PrintError(ier)); @@ -14635,16 +14647,20 @@ void BindConnectThreadForIPv6(THREAD* thread, void* param) if (s != INVALID_SOCKET){ int ier; IP tmpIP; + IP *tmpIP2; if (p->LocalIP == BIND_LOCALIP_NULL) { StrToIP(&tmpIP, "0::0"); // A NULL address for the argument "p->LocalIP" is treated as if "0::0" in IPV6 was specified. - p->LocalIP = &tmpIP; + tmpIP2 = &tmpIP; + } + else { + tmpIP2 = p->LocalIP; } - if ((IsZeroIP(p->LocalIP) == false) || (p->LocalPort != 0)){ + if ((IsZeroIP(tmpIP2) == false) || (p->LocalPort != 0)){ // Bind the socket - if (bind_sock(s, p->LocalIP, p->LocalPort) != 0) { + if (bind_sock(s, tmpIP2, p->LocalPort) != 0) { #ifdef OS_WIN32 ier = WSAGetLastError(); Debug("IPv6 bind() failed with error: %d %s\n", ier, PrintError(ier)); From 2fd6c0b76a5beaeb6b664a3ee9bafbf0173fca8a Mon Sep 17 00:00:00 2001 From: Ilya Shipitsin Date: Tue, 12 Sep 2023 22:43:01 +0200 Subject: [PATCH 12/63] add missing localization this is a follow up of https://github.com/SoftEtherVPN/SoftEtherVPN/pull/1867 English localization is added for now --- src/bin/hamcore/strtable_cn.stb | 2 ++ src/bin/hamcore/strtable_ko.stb | 2 ++ src/bin/hamcore/strtable_pt_br.stb | 2 ++ src/bin/hamcore/strtable_ru.stb | 2 ++ src/bin/hamcore/strtable_tw.stb | 2 ++ 5 files changed, 10 insertions(+) diff --git a/src/bin/hamcore/strtable_cn.stb b/src/bin/hamcore/strtable_cn.stb index abda7401..fa462554 100644 --- a/src/bin/hamcore/strtable_cn.stb +++ b/src/bin/hamcore/strtable_cn.stb @@ -2437,6 +2437,8 @@ STATIC17 其它配置(&G): R_NO_ROUTING 不要调整路由表(&R) STATIC18 除非你得到系统管理员的同意或者你有网络和安全方面的专业知识,否则请保持此对话框的默认设置。 STATIC19 VoIP / QoS 功能可以处理高优先级数据包,如 IP 电话数据包 (VoIP) 可以被更快的传输。 +STATIC20 Source IP Address: +STATIC21 Source Port Number: R_DISABLE_QOS 禁用 VoIP / &QoS 功能 IDOK 确定(&O) IDCANCEL 取消 diff --git a/src/bin/hamcore/strtable_ko.stb b/src/bin/hamcore/strtable_ko.stb index de81e586..f1576dab 100644 --- a/src/bin/hamcore/strtable_ko.stb +++ b/src/bin/hamcore/strtable_ko.stb @@ -2402,6 +2402,8 @@ STATIC17 기타 설정 (&G): R_NO_ROUTING 라우팅 테이블의 조정 작업을 수행하지 (&R) STATIC18 이 설정 화면의 설정은 시스템 관리자의 지시가있을 경우, 네트워크 및 보안에 대해 상세한 지식을 가지고있는 경우를 제외하고는 변경하지 마십시오. STATIC19 VoIP/QoS 지원 기능을 사용하면 IP 전화 패킷 등의 우선 순위가 높은 패킷을 VPN에서 고속으로 전송할 수 있습니다. +STATIC20 Source IP Address: +STATIC21 Source Port Number: R_DISABLE_QOS VoIP/QoS 지원 기능을 비활성화 (&Q) IDOK & OK IDCANCEL 취소 diff --git a/src/bin/hamcore/strtable_pt_br.stb b/src/bin/hamcore/strtable_pt_br.stb index 89083eeb..183e30eb 100644 --- a/src/bin/hamcore/strtable_pt_br.stb +++ b/src/bin/hamcore/strtable_pt_br.stb @@ -2390,6 +2390,8 @@ STATIC17 Outras confi&gurações: R_NO_ROUTING Sem ajustes na tabela de &roteamento STATIC18 Mantenha as configurações padrão nesta caixa de diálogo, a menos que seja solicitado por um administrador do sistema ou se você possui experiência em redes e segurança. STATIC19 As funções VoIP/QoS lidam com pacotes de alta prioridade, para serem transmitidos mais rapidamente. +STATIC20 Source IP Address: +STATIC21 Source Port Number: R_DISABLE_QOS Desativar função VoIP / &QoS IDOK &OK IDCANCEL Cancelar diff --git a/src/bin/hamcore/strtable_ru.stb b/src/bin/hamcore/strtable_ru.stb index e7a2fda1..5bc1653d 100644 --- a/src/bin/hamcore/strtable_ru.stb +++ b/src/bin/hamcore/strtable_ru.stb @@ -2421,6 +2421,8 @@ STATIC17 Другие конфигурации: R_NO_ROUTING Не вносить изменения в таблицу маршрутизации STATIC18 Если у вас нет опыта работы с сетью и безопасностью, то оставьте настройки в этом окне по умолчанию. STATIC19 Функции VoIP/QoS обрабатывают пакеты (например VoIP) с высоким приоритетом для более быстрой передачи. +STATIC20 Source IP Address: +STATIC21 Source Port Number: R_DISABLE_QOS Отключить функции VoIP / QoS IDOK &OK IDCANCEL Отмена diff --git a/src/bin/hamcore/strtable_tw.stb b/src/bin/hamcore/strtable_tw.stb index 289506ec..0f5d500d 100644 --- a/src/bin/hamcore/strtable_tw.stb +++ b/src/bin/hamcore/strtable_tw.stb @@ -2439,6 +2439,8 @@ STATIC17 其它配置(&G): R_NO_ROUTING 不要調整路由表(&R) STATIC18 除非你得到系統管理員的同意或者你有網路和安全方面的專業知識,否則請保持此對話方塊的默認設置。 STATIC19 VoIP / QoS 功能可以處理高優先級封包,如 IP 電話封包 (VoIP) 可以被更快的傳輸。 +STATIC20 Source IP Address: +STATIC21 Source Port Number: R_DISABLE_QOS 禁用 VoIP / &QoS 功能 IDOK 確定(&O) IDCANCEL 取消 From fc2a33d1f32b598849fc8210f8c052f57f0397c0 Mon Sep 17 00:00:00 2001 From: puripuri2100 Date: Fri, 15 Sep 2023 09:39:11 +0900 Subject: [PATCH 13/63] fix missing arg --- src/bin/hamcore/strtable_pt_br.stb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/bin/hamcore/strtable_pt_br.stb b/src/bin/hamcore/strtable_pt_br.stb index 183e30eb..52540cb4 100644 --- a/src/bin/hamcore/strtable_pt_br.stb +++ b/src/bin/hamcore/strtable_pt_br.stb @@ -4443,7 +4443,7 @@ CMD_Debug_Msg2 The debug command has executed.\nResults: \"%S\" # Crash command CMD_Crash Raise a error on the VPN Server / Bridge to terminate the process forcefully. CMD_Crash_Help This command will raise a fatal error (memory access violation) on the VPN Server / Bridge running process in order to crash the process. As the result, VPN Server / Bridge will be terminated and restarted if it is running as a service mode. If the VPN Server is running as a user mode, the process will not automatically restarted.\nThis command is for a situation when the VPN Server / Bridge is under a non-recoverable error or the process is in an infinite loop. This command will disconnect all VPN Sessions on the VPN Server / Bridge. All unsaved settings in the memory of VPN Server / Bridge will be lost.\nBefore run this command, run the Flush command to try to save volatile data to the configuration file.\nTo execute this command, you must have VPN Server / VPN Bridge administrator privileges. -CMD_Crash_Args Crash [sim] +CMD_Crash_Args Crash [yes] CMD_Crash_[yes] Input "yes" for confirmation. CMD_Crash_Msg Sending the Crush command to the VPN Server. The VPN Server will be let to crash immediately, so you can never get the result value of this command. After this moment, vpncmd will be disconnected from the VPN Server. CMD_Crash_Confirm Do you really want to crash the VPN Server?\nInput "yes" if it is ok: From 1be55ebb94161923258fe317a8ecb8496d46ab8b Mon Sep 17 00:00:00 2001 From: Ilya Shipitsin Date: Sat, 16 Sep 2023 00:02:29 +0200 Subject: [PATCH 14/63] src/vpndrvinst/main.c: add missing header file --- src/vpndrvinst/main.c | 1 + 1 file changed, 1 insertion(+) diff --git a/src/vpndrvinst/main.c b/src/vpndrvinst/main.c index 658f92a1..e947ac97 100644 --- a/src/vpndrvinst/main.c +++ b/src/vpndrvinst/main.c @@ -2,6 +2,7 @@ #include "Dialog.h" #include +#include void ShowUsage() { From f736d18267e48918a5e1e2fac6b38a8fc8f4d224 Mon Sep 17 00:00:00 2001 From: Ilya Shipitsin Date: Sat, 16 Sep 2023 00:03:03 +0200 Subject: [PATCH 15/63] temporarily suppress clang warnings on "-Wincompatible-function-pointer-types" --- src/Cedar/SW.c | 6 ++++++ src/Cedar/SeLowUser.c | 3 +++ src/Cedar/WinUi.c | 6 ++++++ src/Mayaqua/Win32.c | 3 +++ 4 files changed, 18 insertions(+) diff --git a/src/Cedar/SW.c b/src/Cedar/SW.c index 4e4ca3c9..a953021c 100644 --- a/src/Cedar/SW.c +++ b/src/Cedar/SW.c @@ -113,9 +113,12 @@ bool SwCompileSfx(LIST *o, wchar_t *dst_filename) } // Get the API related to the resource editing + #pragma clang diagnostic push + #pragma clang diagnostic ignored "-Wincompatible-function-pointer-types" _BeginUpdateResourceW = (HANDLE (__stdcall *)(LPCWSTR,UINT))GetProcAddress(hKernel32, "BeginUpdateResourceW"); _UpdateResourceA = (UINT (__stdcall *)(HANDLE,LPCSTR,LPCSTR,WORD,LPVOID,DWORD))GetProcAddress(hKernel32, "UpdateResourceA"); _EndUpdateResourceW = (UINT (__stdcall *)(HANDLE,UINT))GetProcAddress(hKernel32, "EndUpdateResourceW"); + #pragma clang diagnostic pop if (_BeginUpdateResourceW != NULL && _UpdateResourceA != NULL && _EndUpdateResourceW != NULL) { @@ -647,7 +650,10 @@ UINT SWExec() bool is_datafile_exists = false; // Examine whether DATAFILE resources are stored in setup.exe that is currently running + #pragma clang diagnostic push + #pragma clang diagnostic ignored "-Wincompatible-function-pointer-types" EnumResourceNamesA(NULL, SW_SFX_RESOURCE_TYPE, SwEnumResourceNamesProc, (LONG_PTR)(&is_datafile_exists)); + #pragma clang diagnostic pop if (is_datafile_exists) { diff --git a/src/Cedar/SeLowUser.c b/src/Cedar/SeLowUser.c index 80c38fa9..f6b40777 100644 --- a/src/Cedar/SeLowUser.c +++ b/src/Cedar/SeLowUser.c @@ -93,9 +93,12 @@ void SuDeleteGarbageInfsInner() return; } + #pragma clang diagnostic push + #pragma clang diagnostic ignored "-Wincompatible-function-pointer-types" _SetupUninstallOEMInfA = (UINT (__stdcall *)(PCSTR,DWORD,PVOID)) GetProcAddress(hSetupApiDll, "SetupUninstallOEMInfA"); + #pragma clang diagnostic pop if (_SetupUninstallOEMInfA != NULL) { diff --git a/src/Cedar/WinUi.c b/src/Cedar/WinUi.c index 904db691..8b1de535 100644 --- a/src/Cedar/WinUi.c +++ b/src/Cedar/WinUi.c @@ -903,7 +903,10 @@ void ShowWizard(HWND hWndParent, WIZARD *w, UINT start_id) h.phpage = (HPROPSHEETPAGE *)pages_array; h.pszbmHeader = MAKEINTRESOURCEW(w->Bitmap); h.pszCaption = w->Caption; + #pragma clang diagnostic push + #pragma clang diagnostic ignored "-Wincompatible-function-pointer-types" h.pfnCallback = WizardDlgProc; + #pragma clang diagnostic pop start_page = GetWizardPage(w, start_id); if (start_page != NULL) @@ -3487,7 +3490,10 @@ HWND SearchWindow(wchar_t *caption) p.caption = caption; p.hWndFound = NULL; + #pragma clang diagnostic push + #pragma clang diagnostic ignored "-Wincompatible-function-pointer-types" EnumWindows(SearchWindowEnumProc, (LPARAM)&p); + #pragma clang diagnostic pop return p.hWndFound; } diff --git a/src/Mayaqua/Win32.c b/src/Mayaqua/Win32.c index 32d30be4..7ed778cb 100644 --- a/src/Mayaqua/Win32.c +++ b/src/Mayaqua/Win32.c @@ -2846,7 +2846,10 @@ bool Win32InitThread(THREAD *t) // Thread creation t->pData = w; + #pragma clang diagnostic push + #pragma clang diagnostic ignored "-Wincompatible-function-pointer-types" hThread = (HANDLE)_beginthreadex(NULL, 0, Win32DefaultThreadProc, info, 0, &thread_id); + #pragma clang diagnostic pop if (hThread == NULL) { // Thread creation failure From f57f05a5999d0ee370630a4bc8993db396d06556 Mon Sep 17 00:00:00 2001 From: hiura Date: Sun, 17 Sep 2023 16:36:57 +0900 Subject: [PATCH 16/63] Bind outgoing connection to a specific IP address (fix a bug) --- src/Cedar/Protocol.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/src/Cedar/Protocol.c b/src/Cedar/Protocol.c index feb29ece..643af069 100644 --- a/src/Cedar/Protocol.c +++ b/src/Cedar/Protocol.c @@ -6292,8 +6292,6 @@ SOCK *ClientConnectGetSocket(CONNECTION *c, bool additional_connect) localIP = BIND_LOCALIP_NULL; // Specify not to bind } else { - Debug("ClientConnectGetSocket(): Using client option %r and %d for binding\n" - , sess->ClientOption->BindLocalIP, sess->ClientOption->BindLocalPort); // Nonzero address is for source IP address to bind. Zero address is for dummy not to bind. if (IsZeroIP(&sess->ClientOption->BindLocalIP) == true) { localIP = BIND_LOCALIP_NULL; @@ -6301,6 +6299,8 @@ SOCK *ClientConnectGetSocket(CONNECTION *c, bool additional_connect) else { localIP = &sess->ClientOption->BindLocalIP; } + Debug("ClientConnectGetSocket(): Source IP address %r and source port number %d for binding\n" + , &sess->ClientOption->BindLocalIP, sess->ClientOption->BindLocalPort); } } // In the case of second and subsequent TCP/IP connections @@ -6314,7 +6314,7 @@ SOCK *ClientConnectGetSocket(CONNECTION *c, bool additional_connect) } else { localport = sess->ClientOption->BindLocalPort + Count(sess->Connection->CurrentNumConnection) - 1; - Debug("ClientConnectGetSocket(): Additional port number %u\n", localport); + Debug("ClientConnectGetSocket(): Additional source port number %u\n", localport); } // Bottom of Bind outgoing connection From b8e542105f748b88e518a969c2189eca2e92f7dd Mon Sep 17 00:00:00 2001 From: Daiyuu Nobori Date: Thu, 28 Sep 2023 18:24:12 +0900 Subject: [PATCH 17/63] Fix Vulnerability: CVE-2023-27395 TALOS-2023-1735 SoftEther VPN vpnserver WpcParsePacket () heap-based buffer overflow vulnerability https://www.softether.org/9-about/News/904-SEVPN202301 https://jvn.jp/en/jp/JVN64316789/ --- src/Cedar/DDNS.c | 4 ---- src/Cedar/Wpc.c | 12 ++++++++++-- 2 files changed, 10 insertions(+), 6 deletions(-) diff --git a/src/Cedar/DDNS.c b/src/Cedar/DDNS.c index 87cd49f1..486c3bfe 100644 --- a/src/Cedar/DDNS.c +++ b/src/Cedar/DDNS.c @@ -541,13 +541,9 @@ UINT DCRegister(DDNS_CLIENT *c, bool ipv6, DDNS_REGISTER_PARAM *p, char *replace } } - - Format(url2, sizeof(url2), "%s?v=%I64u", url, Rand64()); Format(url3, sizeof(url3), url2, key_hash_str[2], key_hash_str[3]); - ReplaceStr(url3, sizeof(url3), url3, "https://", "http://"); - ReplaceStr(url3, sizeof(url3), url3, ".servers", ".open.servers"); cert_hash = StrToBin(DDNS_CERT_HASH); diff --git a/src/Cedar/Wpc.c b/src/Cedar/Wpc.c index 64e8a952..c53a32aa 100644 --- a/src/Cedar/Wpc.c +++ b/src/Cedar/Wpc.c @@ -313,8 +313,16 @@ BUF *WpcDataEntryToBuf(WPC_ENTRY *e) } data_size = e->Size + 4096; - data = Malloc(data_size); - size = DecodeSafe64(data, e->Data, e->Size); + data = ZeroMalloc(data_size); + + if (e->Size >= 1) + { + size = DecodeSafe64(data, e->Data, e->Size); + } + else + { + size = 0; + } b = NewBuf(); WriteBuf(b, data, size); From c49e462ed1e7df813bc14022896bb26fa75546de Mon Sep 17 00:00:00 2001 From: Daiyuu Nobori Date: Thu, 28 Sep 2023 18:26:17 +0900 Subject: [PATCH 18/63] Fix Vulnerability: CVE-2023-22325 TALOS-2023-1736 SoftEther VPN DCRegister DDNS_RPC_MAX_RECV_SIZE denial of service vulnerability https://www.softether.org/9-about/News/904-SEVPN202301 https://jvn.jp/en/jp/JVN64316789/ --- src/Cedar/DDNS.h | 2 +- src/Mayaqua/Memory.c | 4 ++++ src/Mayaqua/Network.c | 4 +++- 3 files changed, 8 insertions(+), 2 deletions(-) diff --git a/src/Cedar/DDNS.h b/src/Cedar/DDNS.h index 0775766f..c8fa0207 100644 --- a/src/Cedar/DDNS.h +++ b/src/Cedar/DDNS.h @@ -43,7 +43,7 @@ #define DDNS_URL2_V4_ALT "http://get-my-ip.ddns.uxcom.jp/ddns/getmyip.ashx" #define DDNS_URL2_V6_ALT "http://get-my-ip-v6.ddns.uxcom.jp/ddns/getmyip.ashx" -#define DDNS_RPC_MAX_RECV_SIZE DYN32(DDNS_RPC_MAX_RECV_SIZE, (128 * 1024 * 1024)) +#define DDNS_RPC_MAX_RECV_SIZE DYN32(DDNS_RPC_MAX_RECV_SIZE, (38 * 1024 * 1024)) // Connection Timeout #define DDNS_CONNECT_TIMEOUT DYN32(DDNS_CONNECT_TIMEOUT, (15 * 1000)) diff --git a/src/Mayaqua/Memory.c b/src/Mayaqua/Memory.c index 96ff994a..aa793d70 100644 --- a/src/Mayaqua/Memory.c +++ b/src/Mayaqua/Memory.c @@ -3114,6 +3114,10 @@ void AdjustBufSize(BUF *b, UINT new_size) while (b->SizeReserved < new_size) { + if (b->SizeReserved > 0x7FFFFFFF) + { + AbortExitEx("AdjustBufSize(): too large buffer size"); + } b->SizeReserved = b->SizeReserved * 2; } b->Buf = ReAlloc(b->Buf, b->SizeReserved); diff --git a/src/Mayaqua/Network.c b/src/Mayaqua/Network.c index 04aebdea..b170d130 100644 --- a/src/Mayaqua/Network.c +++ b/src/Mayaqua/Network.c @@ -1191,7 +1191,9 @@ void RUDPProcess_NatT_Recv(RUDP_STACK *r, UDPPACKET *udp) bool is_ok = PackGetBool(p, "ok"); UINT64 tran_id = PackGetInt64(p, "tran_id"); - ExtractAndApplyDynList(p); + // This ExtractAndApplyDynList() calling was removed because it is not actually used and could be abused by + // illegal UDP packets that spoof the source IP address. 2023-6-14 Daiyuu Nobori + // ExtractAndApplyDynList(p); if (r->ServerMode) { From 2dec52b875fec5ebc57fc57632f8b1dfdda9ccd2 Mon Sep 17 00:00:00 2001 From: Daiyuu Nobori Date: Sat, 7 Oct 2023 04:42:00 +0200 Subject: [PATCH 19/63] Heap area protection of memory has been enhanced. When memory is released and reallocated, a random security value called a canary is written to the before/after area of memory, and if the value has been modified, the process is terminated (restarted) for safety, assuming it is a buffer overflow of the memory area. This feature may effectively prevent confidentiality or integrity violations in the event that some heap area overflow vulnerability is discovered in this system in the future. --- src/Mayaqua/Kernel.c | 24 ++++ src/Mayaqua/MayaType.h | 3 +- src/Mayaqua/Mayaqua.c | 2 + src/Mayaqua/Memory.c | 248 ++++++++++++++++++++++++++++++++++------- src/Mayaqua/Memory.h | 41 +++++-- src/Mayaqua/Tick64.c | 17 +++ src/Mayaqua/Tick64.h | 1 + src/Mayaqua/Unix.c | 62 +++++++++++ src/Mayaqua/Unix.h | 1 + 9 files changed, 347 insertions(+), 52 deletions(-) diff --git a/src/Mayaqua/Kernel.c b/src/Mayaqua/Kernel.c index 99890a08..ec4621f7 100644 --- a/src/Mayaqua/Kernel.c +++ b/src/Mayaqua/Kernel.c @@ -2100,7 +2100,31 @@ void AbortExitEx(char *msg) f = fopen("abort_error_log.txt", "w"); if (f != NULL) { + SYSTEMTIME time = { 0 }; + char time_str[128] = { 0 }; + char *crlf = "\r\n"; + char *tag = "---------"; + + LocalTime(&time); + + sprintf(time_str, "%04u-%02u-%02u %02u:%02u:%02u", + time.wYear, time.wMonth, time.wDay, + time.wHour, time.wMinute, time.wSecond); + + fwrite(tag, 1, strlen(tag), f); + + fwrite(crlf, 1, strlen(crlf), f); + + fwrite(time_str, 1, strlen(time_str), f); + + fwrite(crlf, 1, strlen(crlf), f); + fwrite(msg, 1, strlen(msg), f); + + fwrite(crlf, 1, strlen(crlf), f); + + fwrite(crlf, 1, strlen(crlf), f); + fclose(f); } diff --git a/src/Mayaqua/MayaType.h b/src/Mayaqua/MayaType.h index efdfaa59..483fedad 100644 --- a/src/Mayaqua/MayaType.h +++ b/src/Mayaqua/MayaType.h @@ -282,7 +282,8 @@ typedef struct TRACKING_LIST TRACKING_LIST; typedef struct IO IO; // Memory.h -typedef struct MEMTAG MEMTAG; +typedef struct MEMTAG1 MEMTAG1; +typedef struct MEMTAG2 MEMTAG2; typedef struct BUF BUF; typedef struct FIFO FIFO; typedef struct LIST LIST; diff --git a/src/Mayaqua/Mayaqua.c b/src/Mayaqua/Mayaqua.c index 88f03684..86492751 100644 --- a/src/Mayaqua/Mayaqua.c +++ b/src/Mayaqua/Mayaqua.c @@ -65,6 +65,8 @@ void InitProcessCallOnce() { init_proc_once_flag = true; + InitCanaryRand(); + #ifdef OS_WIN32 MsInitProcessCallOnce(); #endif // OS_WIN32 diff --git a/src/Mayaqua/Memory.c b/src/Mayaqua/Memory.c index aa793d70..67929483 100644 --- a/src/Mayaqua/Memory.c +++ b/src/Mayaqua/Memory.c @@ -16,10 +16,16 @@ #include "Object.h" #include "OS.h" #include "Str.h" +#include "Tick64.h" #include "Tracking.h" #include #include +#include + +#ifdef OS_UNIX +#include +#endif #include @@ -34,6 +40,105 @@ static UINT fifo_current_realloc_mem_size = FIFO_REALLOC_MEM_SIZE; +static bool canary_inited = false; +typedef struct CANARY_RAND_DATA +{ + UCHAR Data[CANARY_RAND_SIZE + 4]; +} CANARY_RAND_DATA; + +static CANARY_RAND_DATA canary_rand_data[NUM_CANARY_RAND] = { 0 }; + +static UINT64 canary_memtag_magic1 = 0; +static UINT64 canary_memtag_magic2 = 0; + +UCHAR *GetCanaryRand(UINT id) +{ + if (id >= NUM_CANARY_RAND) + { + id = NUM_CANARY_RAND - 1; + } + + return &((canary_rand_data[id].Data)[0]); +} + +void InitCanaryRand() +{ + SYSTEMTIME st = { 0 }; + char random_seed[1024] = { 0 }; + UINT64 t1 = 0, t2 = 0; + if (canary_inited) + { + return; + } + +#ifdef OS_WIN32 + Win32GetSystemTime(&st); + memcpy(&t1, ((UCHAR *)&st) + 0, 8); + memcpy(&t2, ((UCHAR *)&st) + 8, 8); +#else // OS_WIN32 + struct timeval tv = { 0 }; + struct timezone tz = { 0 }; + gettimeofday(&tv, &tz); + t1 = (UINT64)tv.tv_sec; + t2 = (UINT64)tv.tv_usec; +#endif // OS_WIN32 + + { + UINT64 dos_rand = (UINT64)rand(); + UINT64 tick1 = TickHighresNano64(true); + UINT64 tick2 = TickHighresNano64(true); + + UINT i; + + void *p1 = malloc(1); + void *p2 = malloc(1); + + for (i = 0;i < NUM_CANARY_RAND;i++) + { + // using sprintf() here is safe. + sprintf(random_seed, + "%u " + "%llu " + "%llu " + "%llu " + "%llu " + "%llu " + "%llu " + "%llu " + "%llu " + "%llu " + "%llu " + "%llu " + "%u " + , + i, + (UINT64)InitCanaryRand, + (UINT64)&canary_inited, + (UINT64) & ((canary_rand_data[0].Data)[0]), + (UINT64)&random_seed[0], + tick1, + tick2, + dos_rand, + (UINT64)p1, + (UINT64)p2, + t1, + t2, + ~i + ); + + Sha0(canary_rand_data[i].Data, random_seed, (UINT)strlen(random_seed)); + } + + free(p1); + free(p2); + + canary_memtag_magic1 = *((UINT64 *)(GetCanaryRand(CANARY_RAND_ID_MEMTAG_MAGIC) + 0)); + canary_memtag_magic2 = *((UINT64 *)(GetCanaryRand(CANARY_RAND_ID_MEMTAG_MAGIC) + 8)); + + canary_inited = true; + } +} + // New PRand PRAND *NewPRand(void *key, UINT key_size) { @@ -3519,33 +3624,52 @@ void *Malloc(UINT size) } void *MallocEx(UINT size, bool zero_clear_when_free) { - MEMTAG *tag; + MEMTAG1 *tag1; + MEMTAG2 *tag2; UINT real_size; + if (canary_inited == false) + { + InitCanaryRand(); + } + + if (size > MAX_MALLOC_MEM_SIZE) + { + AbortExitEx("MallocEx() error: too large size"); + } + real_size = CALC_MALLOCSIZE(size); - tag = InternalMalloc(real_size); + tag1 = InternalMalloc(real_size); - Zero(tag, sizeof(MEMTAG)); - tag->Magic = MEMTAG_MAGIC; - tag->Size = size; - tag->ZeroFree = zero_clear_when_free; + tag1->Magic = canary_memtag_magic1 ^ ((UINT64)tag1 * GOLDEN_RATION_PRIME_U64); + tag1->Size = size; + tag1->ZeroFree = zero_clear_when_free; - return MEMTAG_TO_POINTER(tag); + tag2 = (MEMTAG2 *)(((UCHAR *)tag1) + CALC_MALLOCSIZE(tag1->Size) - sizeof(MEMTAG2)); + tag2->Magic = canary_memtag_magic2 ^ ((UINT64)tag2 * GOLDEN_RATION_PRIME_U64); + + return MEMTAG1_TO_POINTER(tag1); } // Get memory size UINT GetMemSize(void *addr) { - MEMTAG *tag; + MEMTAG1 *tag; + + if (canary_inited == false) + { + InitCanaryRand(); + } + // Validate arguments if (IS_NULL_POINTER(addr)) { return 0; } - tag = POINTER_TO_MEMTAG(addr); - CheckMemTag(tag); + tag = POINTER_TO_MEMTAG1(addr); + CheckMemTag1(tag); return tag->Size; } @@ -3553,20 +3677,35 @@ UINT GetMemSize(void *addr) // ReAlloc void *ReAlloc(void *addr, UINT size) { - MEMTAG *tag; + MEMTAG1 *tag1; + MEMTAG2 *tag2; bool zerofree; + + if (canary_inited == false) + { + InitCanaryRand(); + } + + if (size > MAX_MALLOC_MEM_SIZE) + { + AbortExitEx("ReAlloc() error: too large size"); + } + // Validate arguments if (IS_NULL_POINTER(addr)) { return NULL; } - tag = POINTER_TO_MEMTAG(addr); - CheckMemTag(tag); + tag1 = POINTER_TO_MEMTAG1(addr); + CheckMemTag1(tag1); - zerofree = tag->ZeroFree; + tag2 = (MEMTAG2 *)(((UCHAR *)tag1) + CALC_MALLOCSIZE(tag1->Size) - sizeof(MEMTAG2)); + CheckMemTag2(tag2); - if (tag->Size == size) + zerofree = tag1->ZeroFree; + + if (tag1->Size == size) { // No size change return addr; @@ -3578,10 +3717,10 @@ void *ReAlloc(void *addr, UINT size) // Size changed (zero clearing required) void *new_p = MallocEx(size, true); - if (tag->Size <= size) + if (tag1->Size <= size) { // Size expansion - Copy(new_p, addr, tag->Size); + Copy(new_p, addr, tag1->Size); } else { @@ -3597,13 +3736,22 @@ void *ReAlloc(void *addr, UINT size) else { // Size changed - MEMTAG *tag2 = InternalReAlloc(tag, CALC_MALLOCSIZE(size)); + MEMTAG1 *tag1_new; + MEMTAG2 *tag2_new; - Zero(tag2, sizeof(MEMTAG)); - tag2->Magic = MEMTAG_MAGIC; - tag2->Size = size; + tag1->Magic = 0; + tag2->Magic = 0; - return MEMTAG_TO_POINTER(tag2); + tag1_new = InternalReAlloc(tag1, CALC_MALLOCSIZE(size)); + + tag1_new->Magic = canary_memtag_magic1 ^ ((UINT64)tag1_new * GOLDEN_RATION_PRIME_U64); + tag1_new->Size = size; + tag1_new->ZeroFree = 0; + + tag2_new = (MEMTAG2 *)(((UCHAR *)tag1_new) + CALC_MALLOCSIZE(size) - sizeof(MEMTAG2)); + tag2_new->Magic = canary_memtag_magic2 ^ ((UINT64)tag2_new * GOLDEN_RATION_PRIME_U64); + + return MEMTAG1_TO_POINTER(tag1_new); } } } @@ -3611,25 +3759,35 @@ void *ReAlloc(void *addr, UINT size) // Free void Free(void *addr) { - MEMTAG *tag; + MEMTAG1 *tag1; + MEMTAG2 *tag2; // Validate arguments if (IS_NULL_POINTER(addr)) { return; } - tag = POINTER_TO_MEMTAG(addr); - CheckMemTag(tag); + if (canary_inited == false) + { + InitCanaryRand(); + } - if (tag->ZeroFree) + tag1 = POINTER_TO_MEMTAG1(addr); + CheckMemTag1(tag1); + + tag2 = (MEMTAG2 *)(((UCHAR *)tag1) + CALC_MALLOCSIZE(tag1->Size) - sizeof(MEMTAG2)); + CheckMemTag2(tag2); + + if (tag1->ZeroFree) { // Zero clear - Zero(addr, tag->Size); + Zero(addr, tag1->Size); } // Memory release - tag->Magic = 0; - InternalFree(tag); + tag1->Magic = 0; + tag2->Magic = 0; + InternalFree(tag1); } // Free and set pointer's value to NULL @@ -3639,24 +3797,36 @@ void FreeSafe(void **addr) *addr = NULL; } -// Check the memtag -void CheckMemTag(MEMTAG *tag) +// Check the memtag1 +void CheckMemTag1(MEMTAG1 *tag) { - if (IsTrackingEnabled() == false) - { - return; - } - // Validate arguments if (tag == NULL) { - AbortExitEx("CheckMemTag: tag == NULL"); + AbortExitEx("CheckMemTag1: tag1 == NULL"); return; } - if (tag->Magic != MEMTAG_MAGIC) + if (tag->Magic != (canary_memtag_magic1 ^ ((UINT64)tag * GOLDEN_RATION_PRIME_U64))) { - AbortExitEx("CheckMemTag: tag->Magic != MEMTAG_MAGIC"); + AbortExitEx("CheckMemTag1: tag1->Magic != canary_memtag_magic1"); + return; + } +} + +// Check the memtag2 +void CheckMemTag2(MEMTAG2 *tag) +{ + // Validate arguments + if (tag == NULL) + { + AbortExitEx("CheckMemTag2: tag2 == NULL"); + return; + } + + if (tag->Magic != (canary_memtag_magic2 ^ ((UINT64)tag * GOLDEN_RATION_PRIME_U64))) + { + AbortExitEx("CheckMemTag2: tag2->Magic != canary_memtag_magic2"); return; } } diff --git a/src/Mayaqua/Memory.h b/src/Mayaqua/Memory.h index 8b39cd9d..cb94a06d 100644 --- a/src/Mayaqua/Memory.h +++ b/src/Mayaqua/Memory.h @@ -14,29 +14,38 @@ #define MallocFast Malloc #define ZeroMallocFast ZeroMalloc +#define MAX_MALLOC_MEM_SIZE (0xffffffff - 64) + // Memory size that can be passed to the kernel at a time #define MAX_SEND_BUF_MEM_SIZE (10 * 1024 * 1024) -// The magic number for memory tag -#define MEMTAG_MAGIC 0x49414449 - -#define CALC_MALLOCSIZE(size) ((MAX(size, 1)) + sizeof(MEMTAG)) -#define MEMTAG_TO_POINTER(p) ((void *)(((UCHAR *)(p)) + sizeof(MEMTAG))) -#define POINTER_TO_MEMTAG(p) ((MEMTAG *)(((UCHAR *)(p)) - sizeof(MEMTAG))) -#define IS_NULL_POINTER(p) (((p) == NULL) || ((POINTER_TO_UINT64(p) == (UINT64)sizeof(MEMTAG)))) +#define CALC_MALLOCSIZE(size) (((MAX(size, 1) + 7) / 8) * 8 + sizeof(MEMTAG1) + sizeof(MEMTAG2)) +#define MEMTAG1_TO_POINTER(p) ((void *)(((UCHAR *)(p)) + sizeof(MEMTAG1))) +#define POINTER_TO_MEMTAG1(p) ((MEMTAG1 *)(((UCHAR *)(p)) - sizeof(MEMTAG1))) +#define IS_NULL_POINTER(p) (((p) == NULL) || ((POINTER_TO_UINT64(p) == (UINT64)sizeof(MEMTAG1)))) #define PTR_TO_PTR(p) ((void **)(&p)) +// Golden Ratio Prime +// From https://github.com/torvalds/linux/blob/88c5083442454e5e8a505b11fa16f32d2879651e/include/linux/hash.h +#define GOLDEN_RATION_PRIME_U32 ((UINT32)0x61C88647) +#define GOLDEN_RATION_PRIME_U64 ((UINT64)7046029254386353131ULL) // 0x61C8864680B583EB + // Fixed size of a block of memory pool #define MEMPOOL_MAX_SIZE 3000 -// Memory tag -struct MEMTAG +// Memory tag 1 +struct MEMTAG1 { - UINT Magic; + UINT64 Magic; UINT Size; bool ZeroFree; - UINT Padding; +}; + +// Memory tag 2 +struct MEMTAG2 +{ + UINT64 Magic; }; // Buffer @@ -174,7 +183,8 @@ void *ZeroMallocEx(UINT size, bool zero_clear_when_free); void *ReAlloc(void *addr, UINT size); void Free(void *addr); void FreeSafe(void **addr); -void CheckMemTag(MEMTAG *tag); +void CheckMemTag1(MEMTAG1 *tag); +void CheckMemTag2(MEMTAG2 *tag); UINT GetMemSize(void *addr); void *InternalMalloc(UINT size); @@ -364,5 +374,12 @@ LIST *NewStrList(); void ReleaseStrList(LIST *o); bool AddStrToStrListDistinct(LIST *o, char *str); +#define NUM_CANARY_RAND 32 +#define CANARY_RAND_ID_MEMTAG_MAGIC 0 +#define CANARY_RAND_SIZE 20 + +void InitCanaryRand(); +UCHAR *GetCanaryRand(UINT id); + #endif // MEMORY_H diff --git a/src/Mayaqua/Tick64.c b/src/Mayaqua/Tick64.c index f99a623f..02932677 100644 --- a/src/Mayaqua/Tick64.c +++ b/src/Mayaqua/Tick64.c @@ -34,6 +34,23 @@ UINT64 TickHighres64() } +UINT64 TickHighresNano64(bool raw) +{ + UINT64 ret = 0; + +#ifdef OS_WIN32 + + ret = (UINT64)(MsGetHiResTimeSpan(MsGetHiResCounter()) * 1000000000.0f); + +#else // OS_WIN32 + + ret = UnixGetHighresTickNano64(raw); + +#endif // OS_WIN32 + + return ret; +} + // Convert the Tick value to time UINT64 Tick64ToTime64(UINT64 tick) { diff --git a/src/Mayaqua/Tick64.h b/src/Mayaqua/Tick64.h index 1791c517..bde8517d 100644 --- a/src/Mayaqua/Tick64.h +++ b/src/Mayaqua/Tick64.h @@ -49,6 +49,7 @@ UINT64 Diff64(UINT64 a, UINT64 b); UINT64 Tick64ToTime64(UINT64 tick); UINT64 TickToTime(UINT64 tick); UINT64 TickHighres64(); +UINT64 TickHighresNano64(bool raw); #endif // TICK64_H diff --git a/src/Mayaqua/Unix.c b/src/Mayaqua/Unix.c index bd1263c9..0c3778df 100755 --- a/src/Mayaqua/Unix.c +++ b/src/Mayaqua/Unix.c @@ -2008,6 +2008,68 @@ void UnixGetSystemTime(SYSTEMTIME *system_time) pthread_mutex_unlock(&get_time_lock); } +UINT64 UnixGetHighresTickNano64(bool raw) +{ +#if defined(OS_WIN32) || defined(CLOCK_REALTIME) || defined(CLOCK_MONOTONIC) || defined(CLOCK_HIGHRES) + struct timespec t; + UINT64 ret; + static bool akirame = false; + + if (akirame) + { + return UnixGetTick64() * 1000000ULL; + } + + Zero(&t, sizeof(t)); + + if (raw == false) + { + // Function to get the boot time of the system + // Be careful. The Implementation is depend on the system. +#ifdef CLOCK_HIGHRES + clock_gettime(CLOCK_HIGHRES, &t); +#else // CLOCK_HIGHRES +#ifdef CLOCK_MONOTONIC + clock_gettime(CLOCK_MONOTONIC, &t); +#else // CLOCK_MONOTONIC + clock_gettime(CLOCK_REALTIME, &t); +#endif // CLOCK_MONOTONIC +#endif // CLOCK_HIGHRES + } + else + { + // Function to get the boot time of the system + // Be careful. The Implementation is depend on the system. +#ifdef CLOCK_HIGHRES + clock_gettime(CLOCK_HIGHRES, &t); +#else // CLOCK_HIGHRES +#ifdef CLOCK_MONOTONIC_RAW + clock_gettime(CLOCK_MONOTONIC_RAW, &t); +#else // CLOCK_MONOTONIC_RAW +#ifdef CLOCK_MONOTONIC + clock_gettime(CLOCK_MONOTONIC, &t); +#else // CLOCK_MONOTONIC + clock_gettime(CLOCK_REALTIME, &t); +#endif // CLOCK_MONOTONIC +#endif // CLOCK_MONOTONIC_RAW +#endif // CLOCK_HIGHRES + } + + ret = ((UINT64)((UINT)t.tv_sec)) * 1000000000LL + (UINT64)t.tv_nsec; + + if (akirame == false && ret == 0) + { + ret = UnixGetTick64() * 1000000ULL; + akirame = true; + } + + return ret; + +#else + return UnixGetTick64() * 1000000ULL; +#endif +} + // Get the system timer (64bit) UINT64 UnixGetTick64() { diff --git a/src/Mayaqua/Unix.h b/src/Mayaqua/Unix.h index e382d686..9777564f 100644 --- a/src/Mayaqua/Unix.h +++ b/src/Mayaqua/Unix.h @@ -117,6 +117,7 @@ void UnixSetThreadPriorityRealtime(); void UnixSetResourceLimit(UINT id, UINT64 value); bool UnixIs64BitRlimSupported(); UINT64 UnixGetTick64(); +UINT64 UnixGetHighresTickNano64(bool raw); void UnixSigChldHandler(int sig); void UnixCloseIO(); void UnixGetCurrentDir(char *dir, UINT size); From f4bbe476beedc502b30ed8478d28ead727c03d4b Mon Sep 17 00:00:00 2001 From: Daiyuu Nobori Date: Thu, 28 Sep 2023 19:08:40 +0900 Subject: [PATCH 20/63] Fix Vulnerability: CVE-2023-32275 TALOS-2023-1753 SoftEther VPN CtEnumCa () information disclosure vulnerability https://www.softether.org/9-about/News/904-SEVPN202301 https://jvn.jp/en/jp/JVN64316789/ --- src/Mayaqua/Encrypt.c | 9 +++++++-- src/Mayaqua/MayaType.h | 6 +----- src/Mayaqua/Memory.h | 2 ++ 3 files changed, 10 insertions(+), 7 deletions(-) diff --git a/src/Mayaqua/Encrypt.c b/src/Mayaqua/Encrypt.c index b0535fc3..fed18bdb 100644 --- a/src/Mayaqua/Encrypt.c +++ b/src/Mayaqua/Encrypt.c @@ -712,7 +712,8 @@ UINT RsaPublicSize(K *k) // Hash a pointer to a 32-bit UINT HashPtrToUINT(void *p) { - UCHAR hash_data[MD5_SIZE]; + UCHAR hash_data[SHA256_SIZE]; + UCHAR hash_src[CANARY_RAND_SIZE + sizeof(void *)]; UINT ret; // Validate arguments if (p == NULL) @@ -720,7 +721,11 @@ UINT HashPtrToUINT(void *p) return 0; } - Md5(hash_data, &p, sizeof(p)); + Zero(hash_src, sizeof(hash_src)); + Copy(hash_src + 0, GetCanaryRand(CANARY_RAND_ID_PTR_KEY_HASH), CANARY_RAND_SIZE); + Copy(hash_src + CANARY_RAND_SIZE, p, sizeof(void *)); + + Sha2_256(hash_data, hash_src, sizeof(hash_src)); Copy(&ret, hash_data, sizeof(ret)); diff --git a/src/Mayaqua/MayaType.h b/src/Mayaqua/MayaType.h index 483fedad..73307cba 100644 --- a/src/Mayaqua/MayaType.h +++ b/src/Mayaqua/MayaType.h @@ -123,11 +123,7 @@ typedef int (COMPARE)(void *p1, void *p2); #define GET_ABS(a) ((a) >= 0 ? (a) : -(a)) // Convert the pointer to UINT -#ifdef CPU_64 -#define POINTER_TO_KEY(p) HashPtrToUINT(p) -#else -#define POINTER_TO_KEY(p) (UINT)(p) -#endif +#define POINTER_TO_KEY(p) (HashPtrToUINT(p)) // Compare the pointer and UINT #define COMPARE_POINTER_AND_KEY(p, i) (POINTER_TO_KEY(p) == (i)) diff --git a/src/Mayaqua/Memory.h b/src/Mayaqua/Memory.h index cb94a06d..49c9c5cd 100644 --- a/src/Mayaqua/Memory.h +++ b/src/Mayaqua/Memory.h @@ -378,6 +378,8 @@ bool AddStrToStrListDistinct(LIST *o, char *str); #define CANARY_RAND_ID_MEMTAG_MAGIC 0 #define CANARY_RAND_SIZE 20 +#define CANARY_RAND_ID_PTR_KEY_HASH 1 + void InitCanaryRand(); UCHAR *GetCanaryRand(UINT id); From 3b932f5fee4640ff5020b029d346eb93a076a57d Mon Sep 17 00:00:00 2001 From: Daiyuu Nobori Date: Thu, 28 Sep 2023 19:18:58 +0900 Subject: [PATCH 21/63] Fix Vulnerability: CVE-2023-27516 TALOS-2023-1754 and CVE-2023-32634 TALOS-2023-1755 SoftEther VPN CiRpcAccepted () authentication bypass vulnerability and SoftEther VPN CiRpcServerThread () MitM authentication bypass vulnerability https://www.softether.org/9-about/News/904-SEVPN202301 https://jvn.jp/en/jp/JVN64316789/ --- src/Cedar/Client.c | 51 ++++++++++++++++++++++++++++++--- src/Cedar/Client.h | 1 + src/bin/hamcore/strtable_cn.stb | 6 ++-- src/bin/hamcore/strtable_en.stb | 6 ++-- src/bin/hamcore/strtable_ja.stb | 6 ++-- 5 files changed, 57 insertions(+), 13 deletions(-) diff --git a/src/Cedar/Client.c b/src/Cedar/Client.c index 1432228e..fd0496e8 100644 --- a/src/Cedar/Client.c +++ b/src/Cedar/Client.c @@ -5155,6 +5155,22 @@ void CiRpcAccepted(CLIENT *c, SOCK *s) retcode = 0; } + if (retcode == 0) + { + if (IsLocalHostIP(&s->RemoteIP) == false) + { + // If the RPC client is from network check whether the password is empty + UCHAR empty_password_hash[20]; + Sha0(empty_password_hash, "", 0); + if (Cmp(empty_password_hash, hashed_password, SHA1_SIZE) == 0 || + IsZero(hashed_password, SHA1_SIZE)) + { + // Regard it as incorrect password + retcode = 1; + } + } + } + Lock(c->lock); { if (c->Config.AllowRemoteConfig == false) @@ -5258,14 +5274,21 @@ void CiRpcServerThread(THREAD *thread, void *param) // Open the port listener = NULL; - for (i = CLIENT_CONFIG_PORT;i < (CLIENT_CONFIG_PORT + 5);i++) + if (c->Config.DisableRpcDynamicPortListener == false) { - listener = Listen(i); - if (listener != NULL) + for (i = CLIENT_CONFIG_PORT;i < (CLIENT_CONFIG_PORT + 5);i++) { - break; + listener = ListenEx(i, !c->Config.AllowRemoteConfig); + if (listener != NULL) + { + break; + } } } + else + { + listener = ListenEx(CLIENT_CONFIG_PORT, !c->Config.AllowRemoteConfig); + } if (listener == NULL) { @@ -9028,6 +9051,12 @@ void CiInitConfiguration(CLIENT *c) c->Config.UseKeepConnect = false; // Don't use the connection maintenance function by default in the Client // Eraser c->Eraser = NewEraser(c->Logger, 0); + +#ifdef OS_WIN32 + c->Config.DisableRpcDynamicPortListener = false; +#else // OS_WIN32 + c->Config.DisableRpcDynamicPortListener = true; +#endif // OS_WIN32 } else { @@ -9174,6 +9203,19 @@ void CiLoadClientConfig(CLIENT_CONFIG *c, FOLDER *f) c->AllowRemoteConfig = CfgGetBool(f, "AllowRemoteConfig"); c->KeepConnectInterval = MAKESURE(CfgGetInt(f, "KeepConnectInterval"), KEEP_INTERVAL_MIN, KEEP_INTERVAL_MAX); c->NoChangeWcmNetworkSettingOnWindows8 = CfgGetBool(f, "NoChangeWcmNetworkSettingOnWindows8"); + + if (CfgIsItem(f, "DisableRpcDynamicPortListener")) + { + c->DisableRpcDynamicPortListener = CfgGetBool(f, "DisableRpcDynamicPortListener"); + } + else + { +#ifdef OS_WIN32 + c->DisableRpcDynamicPortListener = false; +#else // OS_WIN32 + c->DisableRpcDynamicPortListener = true; +#endif // OS_WIN32 + } } // Read the client authentication data @@ -9748,6 +9790,7 @@ void CiWriteClientConfig(FOLDER *cc, CLIENT_CONFIG *config) CfgAddBool(cc, "AllowRemoteConfig", config->AllowRemoteConfig); CfgAddInt(cc, "KeepConnectInterval", config->KeepConnectInterval); CfgAddBool(cc, "NoChangeWcmNetworkSettingOnWindows8", config->NoChangeWcmNetworkSettingOnWindows8); + CfgAddBool(cc, "DisableRpcDynamicPortListener", config->DisableRpcDynamicPortListener); } // Write the client authentication data diff --git a/src/Cedar/Client.h b/src/Cedar/Client.h index 533996d9..13e44d32 100644 --- a/src/Cedar/Client.h +++ b/src/Cedar/Client.h @@ -87,6 +87,7 @@ struct CLIENT_CONFIG UINT KeepConnectProtocol; // Protocol UINT KeepConnectInterval; // Interval bool NoChangeWcmNetworkSettingOnWindows8; // Don't change the WCM network settings on Windows 8 + bool DisableRpcDynamicPortListener; }; // Version acquisition diff --git a/src/bin/hamcore/strtable_cn.stb b/src/bin/hamcore/strtable_cn.stb index fa462554..14486000 100644 --- a/src/bin/hamcore/strtable_cn.stb +++ b/src/bin/hamcore/strtable_cn.stb @@ -2482,7 +2482,7 @@ STATIC1 您可以更改 VPN Client 的设置 STATIC2 远程管理(&E) STATIC3 您可以通过使用 VPN Client 管理器远程模式从另一台计算机上远程管理 VPN Client 服务程序。 R_ALLOW_REMOTE_CONFIG 允许 VPN Client 服务的远程管理(&R) -S_WARNING 建议您在允许远程管理时设置密码。在菜单里选择“工具” >“设置密码”来设置密码。 +S_WARNING 如果你允许远程管理,你必须设置一个密码。在菜单里选择“工具” >“设置密码”来设置密码。必须重新启动 VPN Client 服务,以应用远程管理可用性的配置变化。 STATIC4 在通讯闲置一段时间后自动断开互联网连接的环境下,可以通过向互联网上任意主机发送假数据包的方式来保持互联网连接。 R_USE_KEEP_CONNECT 使用保持 Internet 连接功能(&K) S_HOSTNAME 主机名(&H): @@ -7028,13 +7028,13 @@ CMD_AccountImport_OK 连接设置 "%s" 已导入。 # RemoteEnable 命令 CMD_RemoteEnable 允许 VPN 客户服务的远程管理 -CMD_RemoteEnable_Help 对 VPN Client 服务,从本地主机以外的远程计算机上,允许通过命令行管理设施或 VPN Client 管理器员进行连接和管理。 +CMD_RemoteEnable_Help 对 VPN Client 服务,从本地主机以外的远程计算机上,允许通过命令行管理设施或 VPN Client 管理器员进行连接和管理。必须重新启动 VPN Client 服务,以应用远程管理可用性的配置变化。如果你允许远程管理,你必须设置一个密码。 CMD_RemoteEnable_Args RemoteEnable # RemoteDisable 命令 CMD_RemoteDisable 禁止 VPN 客户服务的远程管理 -CMD_RemoteDisable_Help 对 VPN Client 服务,从本地主机以外的远程计算机上,禁止通过命令行管理设施或 VPN Client 管理器员进行连接和管理。 +CMD_RemoteDisable_Help 对 VPN Client 服务,从本地主机以外的远程计算机上,禁止通过命令行管理设施或 VPN Client 管理器员进行连接和管理。必须重新启动 VPN 客户端服务,以应用远程管理可用性的配置变化。 CMD_RemoteDisable_Args RemoteDisable diff --git a/src/bin/hamcore/strtable_en.stb b/src/bin/hamcore/strtable_en.stb index 5634379f..be3f9aa5 100644 --- a/src/bin/hamcore/strtable_en.stb +++ b/src/bin/hamcore/strtable_en.stb @@ -2466,7 +2466,7 @@ STATIC1 You can modify the settings for VPN Client. STATIC2 R&emote Management: STATIC3 You can remotely manage the VPN Client Service Program from another computer by using VPN Client Manager Remote Mode. R_ALLOW_REMOTE_CONFIG Allow &Remote Management of VPN Client Service -S_WARNING It is recommended to set a password if you allow remote management. From the menu bar, choose Tools -> Set Password to set the password. +S_WARNING You must set a password if you allow remote management. From the menu bar, choose Tools -> Set Password to set the password. The VPN Client service must be restarted to apply the change of remote management availability. STATIC4 For environments where Internet connections will automatically be disconnected when idle, you can keep alive the Internet connection by sending dummy packets to any host on the Internet. R_USE_KEEP_CONNECT Use &Keep Alive Internet Connection Function S_HOSTNAME &Host Name: @@ -7016,13 +7016,13 @@ CMD_AccountImport_OK The VPN Connection Setting "%s" has been imported. # RemoteEnable command CMD_RemoteEnable Allow Remote Management of VPN Client Service -CMD_RemoteEnable_Help Use this to allow management of a VPN Client service from a remote computer that is not localhost, via a remote connection by Command Line Management Utility or VPN Client Manager. +CMD_RemoteEnable_Help Use this to allow management of a VPN Client service from a remote computer that is not localhost, via a remote connection by Command Line Management Utility or VPN Client Manager. The VPN Client service must be restarted to apply the change of remote management availability. You must set a password if you allow remote management. CMD_RemoteEnable_Args RemoteEnable # RemoteDisable command CMD_RemoteDisable Deny Remote Management of VPN Client Service -CMD_RemoteDisable_Help Use this to deny management of a VPN Client service from a remote computer that is not localhost, via a remote connection by Command Line Management Utility or VPN Client Manager. +CMD_RemoteDisable_Help Use this to deny management of a VPN Client service from a remote computer that is not localhost, via a remote connection by Command Line Management Utility or VPN Client Manager. The VPN Client service must be restarted to apply the change of remote management availability. CMD_RemoteDisable_Args RemoteDisable diff --git a/src/bin/hamcore/strtable_ja.stb b/src/bin/hamcore/strtable_ja.stb index 3e195742..12021c36 100644 --- a/src/bin/hamcore/strtable_ja.stb +++ b/src/bin/hamcore/strtable_ja.stb @@ -2469,7 +2469,7 @@ STATIC1 VPN Client の動作に関する設定を変更できます。 STATIC2 リモート管理の設定(&E) STATIC3 VPN Client サービスプログラムを別のコンピュータ上から VPN クライアント接続マネージャによってリモート管理することが可能です。 R_ALLOW_REMOTE_CONFIG VPN Client サービスのリモート管理を許可する(&R) -S_WARNING リモート管理を許可する場合、パスワードを設定しておくことを強くお勧めします。パスワードは [ツール] メニューの [パスワードの設定] をクリックして設定することができます。 +S_WARNING リモート管理を許可する場合、パスワードを設定する必要があります。パスワードは [ツール] メニューの [パスワードの設定] をクリックして設定することができます。リモート管理の可否の変更の設定適用には、VPN Client サービスを再起動する必要があります。 STATIC4 一定期間無通信状態が続くと接続が自動的に切断されるようなネットワーク接続環境の場合、インターネット上の任意のサーバーに対して一定間隔ごとにパケットを送信することにより、インターネット接続を維持することができます。 R_USE_KEEP_CONNECT インターネット接続の維持機能を使用する(&K) S_HOSTNAME ホスト名(&H): @@ -7022,13 +7022,13 @@ CMD_AccountImport_OK 接続設定 "%s" としてインポートしました。 # RemoteEnable コマンド CMD_RemoteEnable VPN Client サービスのリモート管理の許可 -CMD_RemoteEnable_Help VPN Client サービスに、localhost 以外のリモートコンピュータから、コマンドライン管理ユーティリティまたは VPN クライアント接続マネージャでリモート接続して管理することを許可します。 +CMD_RemoteEnable_Help VPN Client サービスに、localhost 以外のリモートコンピュータから、コマンドライン管理ユーティリティまたは VPN クライアント接続マネージャでリモート接続して管理することを許可します。注意: リモート管理の可否の変更の設定適用には、VPN Client サービスを再起動する必要があります。リモート管理を許可する場合、パスワードを設定する必要があります。 CMD_RemoteEnable_Args RemoteEnable # RemoteDisable コマンド CMD_RemoteDisable VPN Client サービスのリモート管理の禁止 -CMD_RemoteDisable_Help VPN Client サービスに、localhost 以外のリモートコンピュータからコマンドライン管理ユーティリティまたは VPN クライアント接続マネージャでリモート接続して管理することを禁止します。 +CMD_RemoteDisable_Help VPN Client サービスに、localhost 以外のリモートコンピュータからコマンドライン管理ユーティリティまたは VPN クライアント接続マネージャでリモート接続して管理することを禁止します。注意: リモート管理の可否の変更の設定適用には、VPN Client サービスを再起動する必要があります。 CMD_RemoteDisable_Args RemoteDisable From 35077deaf14f824af53d38b2ba86834b66fa288c Mon Sep 17 00:00:00 2001 From: Daiyuu Nobori Date: Mon, 9 Oct 2023 17:13:41 +0200 Subject: [PATCH 22/63] Fix Vulnerability: CVE-2023-25774 TALOS-2023-1743 SoftEther VPN vpnserver ConnectionAccept () denial of service vulnerability --- src/Cedar/Admin.c | 12 +-- src/Cedar/Cedar.c | 69 ++++++++++++++ src/Cedar/Cedar.h | 2 + src/Cedar/Listener.c | 217 +++++++++++++++++++++++++++++++++++++++++++ src/Cedar/Listener.h | 19 ++++ 5 files changed, 309 insertions(+), 10 deletions(-) diff --git a/src/Cedar/Admin.c b/src/Cedar/Admin.c index 85f9bd9b..b79a5cea 100644 --- a/src/Cedar/Admin.c +++ b/src/Cedar/Admin.c @@ -726,9 +726,8 @@ void AdminWebProcPost(CONNECTION *c, SOCK *s, HTTP_HEADER *h, UINT post_data_siz if (RecvAll(s, data, post_data_size, s->SecureMode)) { c->JsonRpcAuthed = true; -#ifndef GC_SOFTETHER_OSS + RemoveDosEntry(c->Listener, s); -#endif // GC_SOFTETHER_OSS // Divide url_target into URL and query string StrCpy(url, sizeof(url), url_target); @@ -767,9 +766,8 @@ void AdminWebProcGet(CONNECTION *c, SOCK *s, HTTP_HEADER *h, char *url_target) } c->JsonRpcAuthed = true; -#ifndef GC_SOFTETHER_OSS + RemoveDosEntry(c->Listener, s); -#endif // GC_SOFTETHER_OSS // Divide url_target into URL and query string StrCpy(url, sizeof(url), url_target); @@ -1199,9 +1197,7 @@ void JsonRpcProcOptions(CONNECTION *c, SOCK *s, HTTP_HEADER *h, char *url_target c->JsonRpcAuthed = true; -#ifndef GC_SOFTETHER_OSS RemoveDosEntry(c->Listener, s); -#endif // GC_SOFTETHER_OSS AdminWebSendBody(s, 200, "OK", NULL, 0, NULL, NULL, NULL, h); } @@ -1228,9 +1224,7 @@ void JsonRpcProcGet(CONNECTION *c, SOCK *s, HTTP_HEADER *h, char *url_target) c->JsonRpcAuthed = true; -#ifndef GC_SOFTETHER_OSS RemoveDosEntry(c->Listener, s); -#endif // GC_SOFTETHER_OSS // Divide url_target into URL and query string StrCpy(url, sizeof(url), url_target); @@ -1357,9 +1351,7 @@ void JsonRpcProcPost(CONNECTION *c, SOCK *s, HTTP_HEADER *h, UINT post_data_size c->JsonRpcAuthed = true; -#ifndef GC_SOFTETHER_OSS RemoveDosEntry(c->Listener, s); -#endif // GC_SOFTETHER_OSS if (json_req == NULL || json_req_object == NULL) { diff --git a/src/Cedar/Cedar.c b/src/Cedar/Cedar.c index 02b4ee2b..6f3e32c2 100644 --- a/src/Cedar/Cedar.c +++ b/src/Cedar/Cedar.c @@ -322,6 +322,34 @@ void DecrementNoSsl(CEDAR *c, IP *ip, UINT num_dec) UnlockList(c->NonSslList); } +// Check whether the specified IP address is in Non-SSL connection list +bool IsInNoSsl(CEDAR *c, IP *ip) +{ + bool ret = false; + // Validate arguments + if (c == NULL || ip == NULL) + { + return false; + } + + LockList(c->NonSslList); + { + NON_SSL *n = SearchNoSslList(c, ip); + + if (n != NULL) + { + if (n->EntryExpires > Tick64() && n->Count > NON_SSL_MIN_COUNT) + { + n->EntryExpires = Tick64() + (UINT64)NON_SSL_ENTRY_EXPIRES; + ret = true; + } + } + } + UnlockList(c->NonSslList); + + return ret; +} + // Add new entry to Non-SSL connection list bool AddNoSsl(CEDAR *c, IP *ip) { @@ -704,6 +732,47 @@ void DelConnection(CEDAR *cedar, CONNECTION *c) UnlockList(cedar->ConnectionList); } +// Get the number of unestablished connections +UINT GetUnestablishedConnections(CEDAR *cedar) +{ + UINT i, ret; + // Validate arguments + if (cedar == NULL) + { + return 0; + } + + ret = 0; + + LockList(cedar->ConnectionList); + { + for (i = 0;i < LIST_NUM(cedar->ConnectionList);i++) + { + CONNECTION *c = LIST_DATA(cedar->ConnectionList, i); + + switch (c->Type) + { + case CONNECTION_TYPE_CLIENT: + case CONNECTION_TYPE_INIT: + case CONNECTION_TYPE_LOGIN: + case CONNECTION_TYPE_ADDITIONAL: + switch (c->Status) + { + case CONNECTION_STATUS_ACCEPTED: + case CONNECTION_STATUS_NEGOTIATION: + case CONNECTION_STATUS_USERAUTH: + ret++; + break; + } + break; + } + } + } + UnlockList(cedar->ConnectionList); + + return ret + Count(cedar->AcceptingSockets); +} + // Add connection to Cedar void AddConnection(CEDAR *cedar, CONNECTION *c) { diff --git a/src/Cedar/Cedar.h b/src/Cedar/Cedar.h index ec1b18b9..699263a9 100644 --- a/src/Cedar/Cedar.h +++ b/src/Cedar/Cedar.h @@ -1022,6 +1022,7 @@ void DelHubEx(CEDAR *c, HUB *h, bool no_lock); void StopAllHub(CEDAR *c); void StopAllConnection(CEDAR *c); void AddConnection(CEDAR *cedar, CONNECTION *c); +UINT GetUnestablishedConnections(CEDAR *cedar); void DelConnection(CEDAR *cedar, CONNECTION *c); void SetCedarCipherList(CEDAR *cedar, char *name); void InitCedar(); @@ -1046,6 +1047,7 @@ bool AddNoSsl(CEDAR *c, IP *ip); void DecrementNoSsl(CEDAR *c, IP *ip, UINT num_dec); void DeleteOldNoSsl(CEDAR *c); NON_SSL *SearchNoSslList(CEDAR *c, IP *ip); +bool IsInNoSsl(CEDAR *c, IP *ip); void FreeTinyLog(TINY_LOG *t); void WriteTinyLog(TINY_LOG *t, char *str); TINY_LOG *NewTinyLog(); diff --git a/src/Cedar/Listener.c b/src/Cedar/Listener.c index 6ea0d5cc..ec295403 100644 --- a/src/Cedar/Listener.c +++ b/src/Cedar/Listener.c @@ -17,6 +17,7 @@ #include "Mayaqua/Memory.h" #include "Mayaqua/Object.h" #include "Mayaqua/Str.h" +#include "Mayaqua/Tick64.h" static bool disable_dos = false; static UINT max_connections_per_ip = DEFAULT_MAX_CONNECTIONS_PER_IP; @@ -181,6 +182,11 @@ void TCPAcceptedThread(THREAD *t, void *param) ConnectionAccept(c); flag1 = c->flag1; + if (c->JsonRpcAuthed) + { + RemoveDosEntry(r, s); + } + // Release SLog(r->Cedar, "LS_CONNECTION_END_1", c->Name); ReleaseListener(c->Listener); @@ -221,6 +227,46 @@ void TCPAccepted(LISTENER *r, SOCK *s) num_clients_from_this_ip = GetNumIpClient(&s->RemoteIP); +#ifdef USE_DOS_ATTACK_DETECTION + if (disable_dos == false && r->DisableDos == false && r->Protocol != LISTENER_INPROC) + { + UINT max_uec, now_uec; + // DOS attack check + if (CheckDosAttack(r, s) == false) + { + Debug("DOS Attack 1 !!\n"); + IPToStr(tmp, sizeof(tmp), &s->RemoteIP); + SLog(r->Cedar, "LS_LISTENER_DOS", r->Port, tmp, s->RemotePort); + return; + } + if (StrCmpi(s->UnderlayProtocol, SOCK_UNDERLAY_NATIVE_V6) == 0 || + StrCmpi(s->UnderlayProtocol, SOCK_UNDERLAY_NATIVE_V4) == 0) + { + if (IsInNoSsl(r->Cedar, &s->RemoteIP)) + { + Debug("DOS Attack 2 !!\n"); + IPToStr(tmp, sizeof(tmp), &s->RemoteIP); + SLog(r->Cedar, "LS_LISTENER_DOS", r->Port, tmp, s->RemotePort); + return; + } + } + if (num_clients_from_this_ip > GetMaxConnectionsPerIp()) + { + Debug("DOS Attack 3 !!\n"); + IPToStr(tmp, sizeof(tmp), &s->RemoteIP); + SLog(r->Cedar, "LS_LISTENER_DOS", r->Port, tmp, s->RemotePort); + return; + } + max_uec = GetMaxUnestablishedConnections(); + now_uec = GetUnestablishedConnections(cedar); + if (now_uec > max_uec) + { + Debug("DOS Attack 4 !!\n"); + SLog(r->Cedar, "LS_LISTENER_MAXUEC", max_uec, now_uec); + return; + } + } +#endif // USE_DOS_ATTACK_DETECTION IPToStr(tmp, sizeof(tmp), &s->RemoteIP); @@ -239,6 +285,169 @@ void TCPAccepted(LISTENER *r, SOCK *s) ReleaseThread(t); } +// Remove a DOS entry +bool RemoveDosEntry(LISTENER *r, SOCK *s) +{ + DOS *d; + bool ok = false; + // Validate arguments + if (r == NULL || s == NULL) + { + return false; + } + + LockList(r->DosList); + { + // Delete old entries from the DOS attack list + RefreshDosList(r); + + // Search the table + d = SearchDosList(r, &s->RemoteIP); + + if (d != NULL) + { + Delete(r->DosList, d); + Free(d); + ok = true; + } + } + UnlockList(r->DosList); + + return ok; +} + +// Check whether this is a DOS attack +bool CheckDosAttack(LISTENER *r, SOCK *s) +{ + DOS *d; + bool ok = true; + // Validate arguments + if (r == NULL || s == NULL) + { + return false; + } + + LockList(r->DosList); + { + // Delete old entries from the DOS attack list + RefreshDosList(r); + + // Search the table + d = SearchDosList(r, &s->RemoteIP); + + if (d != NULL) + { + // There is a entry already + // This should mean being under a DOS attack + d->LastConnectedTick = Tick64(); + d->CurrentExpireSpan = MIN(d->CurrentExpireSpan * (UINT64)2, DOS_TABLE_EXPIRES_MAX); + d->AccessCount++; + if (d->AccessCount > DOS_TABLE_MAX_LIMIT_PER_IP) + { + ok = false; + } + } + else + { + // Create a new entry + d = ZeroMalloc(sizeof(DOS)); + d->CurrentExpireSpan = (UINT64)DOS_TABLE_EXPIRES_FIRST; + d->FirstConnectedTick = d->LastConnectedTick = Tick64(); + d->AccessCount = 1; + d->DeleteEntryTick = d->FirstConnectedTick + (UINT64)DOS_TABLE_EXPIRES_TOTAL; + Copy(&d->IpAddress, &s->RemoteIP, sizeof(IP)); + Add(r->DosList, d); + } + } + UnlockList(r->DosList); + + return ok; +} + +// Delete old entries from the DOS attack list +void RefreshDosList(LISTENER *r) +{ + // Validate arguments + if (r == NULL) + { + return; + } + + if (r->DosListLastRefreshTime == 0 || + (r->DosListLastRefreshTime + (UINT64)DOS_TABLE_REFRESH_INTERVAL) <= Tick64()) + { + UINT i; + LIST *o; + r->DosListLastRefreshTime = Tick64(); + + o = NewListFast(NULL); + for (i = 0;i < LIST_NUM(r->DosList);i++) + { + DOS *d = LIST_DATA(r->DosList, i); + if ((d->LastConnectedTick + d->CurrentExpireSpan) <= Tick64() || + (d->DeleteEntryTick <= Tick64())) + { + Add(o, d); + } + } + + for (i = 0;i < LIST_NUM(o);i++) + { + DOS *d = LIST_DATA(o, i); + Delete(r->DosList, d); + Free(d); + } + + ReleaseList(o); + } +} + +// Search the DOS attack list by the IP address +DOS *SearchDosList(LISTENER *r, IP *ip) +{ + DOS *d, t; + // Validate arguments + if (r == NULL || ip == NULL) + { + return NULL; + } + + Copy(&t.IpAddress, ip, sizeof(IP)); + + d = Search(r->DosList, &t); + + if (d != NULL) + { + if ((d->LastConnectedTick + d->CurrentExpireSpan) <= Tick64() || + (d->DeleteEntryTick <= Tick64())) + { + // Delete old entries + Delete(r->DosList, d); + Free(d); + return NULL; + } + } + + return d; +} + +// Comparison of DOS attack list entries +int CompareDos(void *p1, void *p2) +{ + DOS *d1, *d2; + if (p1 == NULL || p2 == NULL) + { + return 0; + } + d1 = *(DOS **)p1; + d2 = *(DOS **)p2; + if (d1 == NULL || d2 == NULL) + { + return 0; + } + + return CmpIpAddr(&d1->IpAddress, &d2->IpAddress); +} // UDP listener main loop void ListenerUDPMainLoop(LISTENER *r) @@ -653,6 +862,13 @@ void CleanupListener(LISTENER *r) return; } + // Release the DOS attack list + for (i = 0;i < LIST_NUM(r->DosList);i++) + { + DOS *d = LIST_DATA(r->DosList, i); + Free(d); + } + ReleaseList(r->DosList); if (r->Sock != NULL) { @@ -802,6 +1018,7 @@ LISTENER *NewListenerEx5(CEDAR *cedar, UINT proto, UINT port, THREAD_PROC *proc, r->Port = port; r->Event = NewEvent(); + r->DosList = NewList(CompareDos); r->LocalOnly = local_only; r->ShadowIPv6 = shadow_ipv6; diff --git a/src/Cedar/Listener.h b/src/Cedar/Listener.h index 40b816f1..e3609df5 100644 --- a/src/Cedar/Listener.h +++ b/src/Cedar/Listener.h @@ -10,12 +10,24 @@ #include "CedarType.h" +#include "Mayaqua/MayaType.h" #include "Mayaqua/Kernel.h" +#include "Mayaqua/Network.h" // Function to call when receiving a new connection typedef void (NEW_CONNECTION_PROC)(CONNECTION *c); +// DOS attack list +struct DOS +{ + IP IpAddress; // IP address + UINT64 FirstConnectedTick; // Time which a client connects at the first time + UINT64 LastConnectedTick; // Time which a client connected at the last time + UINT64 CurrentExpireSpan; // Current time-out period of this record + UINT64 DeleteEntryTick; // Time planned to delete this entry + UINT AccessCount; // The number of accesses +}; // Listener structure struct LISTENER @@ -31,6 +43,8 @@ struct LISTENER volatile bool Halt; // Halting flag UINT Status; // State + LIST *DosList; // DOS attack list + UINT64 DosListLastRefreshTime; // Time that the DOS list is refreshed at the last THREAD_PROC *ThreadProc; // Thread procedure void *ThreadParam; // Thread parameters @@ -105,6 +119,11 @@ void FreeDynamicListener(DYNAMIC_LISTENER *d); bool ListenerRUDPRpcRecvProc(RUDP_STACK *r, UDPPACKET *p); void ListenerSetProcRecvRpcEnable(bool b); +int CompareDos(void *p1, void *p2); +DOS *SearchDosList(LISTENER *r, IP *ip); +void RefreshDosList(LISTENER *r); +bool CheckDosAttack(LISTENER *r, SOCK *s); +bool RemoveDosEntry(LISTENER *r, SOCK *s); #endif // LISTENER_H From 54ae7f725bf10f7521d1a62b74ee8f0f9d5f43a5 Mon Sep 17 00:00:00 2001 From: Daiyuu Nobori Date: Thu, 28 Sep 2023 19:56:41 +0900 Subject: [PATCH 23/63] Add four new certificate hashes to the DDNS_CERT_HASH list by Daiyuu Nobori. These certificates will be used to University of Tsukuba's built-in "softether.net" DDNS server after year 2038. --- src/Cedar/DDNS.h | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/src/Cedar/DDNS.h b/src/Cedar/DDNS.h index c8fa0207..75546109 100644 --- a/src/Cedar/DDNS.h +++ b/src/Cedar/DDNS.h @@ -18,7 +18,11 @@ "439BAFA75A6EE5671FC9F9A02D34FF29881761A0" \ "EFAC5FA0CDD14E0F864EED58A73C35D7E33B62F3" \ "74DF99D4B1B5F0488A388B50D347D26013DC67A5" \ - "6EBB39AFCA8C900635CFC11218CF293A612457E4" + "6EBB39AFCA8C900635CFC11218CF293A612457E4" \ + "05A9386C5E2B233F7BAB2479620EAAA2793709ED" \ + "A811C64BB715351E36B6C1E022648D8BE0ACD128" \ + "BD264DB3B0B1B3ABA0AF3074AA574ED1EF3B42D7" \ + "9AB61D691536645DD55A8730FC6D2CDF33C8C73F" #define DDNS_SNI_VER_STRING "DDNS" From 6dbf7e9ae27ab3191210742e2075fe08b6c7c43a Mon Sep 17 00:00:00 2001 From: Daiyuu Nobori Date: Thu, 28 Sep 2023 20:24:44 +0900 Subject: [PATCH 24/63] Showing an explanation of the purpose of the Developer Edition and the difference from the Stable Editon by Daiyuu Nobori --- src/Cedar/Command.c | 28 ++++++++++++++++++++++++++++ 1 file changed, 28 insertions(+) diff --git a/src/Cedar/Command.c b/src/Cedar/Command.c index 8969ee7b..dce502bb 100644 --- a/src/Cedar/Command.c +++ b/src/Cedar/Command.c @@ -24496,6 +24496,34 @@ void CmdPrintAbout(CONSOLE *c) c->Write(c, tmp); + // Showing an explanation of the purpose of the Developer Edition and the difference from the Stable Editon by Daiyuu Nobori + /* + * Welcome to the Developer Edition of SoftEther VPN. + + Please note: SoftEther VPN Developer Edition (Version 5.x) has accepted + great code contributions on GitHub from many excellent open source + developers. This edition contains some very bright experimental code. + The experimental code in this Developer Edition has *NOT* been fully + reviewed by Daiyuu Nobori (the first original author of SoftEther VPN) + and has not been endorsed by him for stability and quality. It is his + policy to encourage many developers to contribute code with their + creative minds and ambitions. The succession of low-level system + software and network developers is of critical importance worldwide, + and SoftEther VPN Developer Edition is very important to increase + the number of such great developers. + - If you are a programmer of VPN software, or if you want a variety of + experimental code, this edition is very suitable for you. + - On the other hand, if you are building VPNs for mission-critical + business systems that require stability and security, + Stable Edition (Version 4.x) is highly recommended. + - All code in Stable Edition is reviewed by Daiyuu Nobori. He is also + responsible for porting features from the Developer Edition + to the Stable Edition. + - SoftEther VPN Stable Edition can be downloaded at: + https://github.com/SoftEtherVPN/SoftEtherVPN_Stable/ +*/ + c->Write(c, L"\nWelcome to the Developer Edition of SoftEther VPN.\n\nPlease note: SoftEther VPN Developer Edition (Version 5.x) has accepted\ngreat code contributions on GitHub from many excellent open source\ndevelopers. This edition contains some very bright experimental code.\n The experimental code in this Developer Edition has *NOT* been fully\nreviewed by Daiyuu Nobori (the first original author of SoftEther VPN)\nand has not been endorsed by him for stability and quality. It is his\npolicy to encourage many developers to contribute code with their\ncreative minds and ambitions. The succession of low-level system\nsoftware and network developers is of critical importance worldwide,\nand SoftEther VPN Developer Edition is very important to increase\nthe number of such great developers.\n- If you are a programmer of VPN software, or if you want a variety of\n experimental code, this edition is very suitable for you.\n- On the other hand, if you are building VPNs for mission-critical\n business systems that require stability and security,\n Stable Edition (Version 4.x) is highly recommended.\n- All code in Stable Edition is reviewed by Daiyuu Nobori. He is also\n responsible for porting features from the Developer Edition\n to the Stable Edition.\n- SoftEther VPN Stable Edition can be downloaded at:\n https://github.com/SoftEtherVPN/SoftEtherVPN_Stable/\n\n"); + ReleaseCedar(cedar); } From 895c16e3e8d043511fd8ae730a44eacfc7bffe4d Mon Sep 17 00:00:00 2001 From: Yihong Wu Date: Sun, 15 Oct 2023 06:13:59 +0000 Subject: [PATCH 25/63] Revert "README.md: Add me to members" This reverts commit 1f40de2ddac90b31c909d4c501251b1b90e6e581. --- README.md | 3 --- 1 file changed, 3 deletions(-) diff --git a/README.md b/README.md index 4f16a3d1..bf2ae5d6 100644 --- a/README.md +++ b/README.md @@ -101,9 +101,6 @@ https://github.com/davidebeatrici Ilya Shipitsin (Since Jul 21, 2018) https://github.com/chipitsine -Yihong Wu (Since Jul 16, 2021) -https://github.com/domosekai - # SOFTETHER VPN ADVANTAGES From 3574f8aa98257d6b732bd3cb4b48a5b31e8e2d9d Mon Sep 17 00:00:00 2001 From: hiura Date: Thu, 2 Nov 2023 18:42:12 +0900 Subject: [PATCH 26/63] Fix azure pipelines: Publish separate artifacts for both x64 and x86. --- .ci/azure-pipelines/windows-steps.yml | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/.ci/azure-pipelines/windows-steps.yml b/.ci/azure-pipelines/windows-steps.yml index 326a9df7..79bd5fdf 100644 --- a/.ci/azure-pipelines/windows-steps.yml +++ b/.ci/azure-pipelines/windows-steps.yml @@ -29,12 +29,12 @@ steps: inputs: sourceFolder: '$(Build.BinariesDirectory)' contents: '?(*.exe|*.se2|*.pdb)' - TargetFolder: '$(Build.StagingDirectory)/binaries' + TargetFolder: '$(Build.StagingDirectory)/binaries/${{parameters.architecture}}' flattenFolders: true - task: PublishBuildArtifacts@1 inputs: - pathtoPublish: '$(Build.StagingDirectory)/binaries' - artifactName: 'Binaries' + pathtoPublish: '$(Build.StagingDirectory)/binaries/${{parameters.architecture}}' + artifactName: 'Binaries_${{parameters.architecture}}' - task: PublishBuildArtifacts@1 inputs: pathtoPublish: '$(Build.StagingDirectory)/installers' From e6792d889332b6fb36bfc6e1fd454abe466e98e8 Mon Sep 17 00:00:00 2001 From: Ilya Shipitsin Date: Sun, 19 Nov 2023 10:57:28 +0100 Subject: [PATCH 27/63] fix nullptr deref Co-authored-by: icy17 <1061499390@qq.com> --- src/Mayaqua/Network.c | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/src/Mayaqua/Network.c b/src/Mayaqua/Network.c index 83c4d283..52db2b2c 100644 --- a/src/Mayaqua/Network.c +++ b/src/Mayaqua/Network.c @@ -5785,6 +5785,10 @@ SSL_PIPE *NewSslPipeEx2(bool server_mode, X *x, K *k, LIST *chain, DH_CTX *dh, b } ssl = SSL_new(ssl_ctx); + if (ssl == NULL) + { + return NULL; + } SSL_set_ex_data(ssl, GetSslClientCertIndex(), clientcert); } From 7398bf2724a8fcfa24e6f868db884085c49550d1 Mon Sep 17 00:00:00 2001 From: Ilya Shipitsin Date: Sat, 2 Dec 2023 22:30:26 +0100 Subject: [PATCH 28/63] CI: use OPENSSL_ROOT_DIR for cirrus-ci builds --- .cirrus.yml | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/.cirrus.yml b/.cirrus.yml index 7261b207..68b66ab5 100644 --- a/.cirrus.yml +++ b/.cirrus.yml @@ -2,8 +2,10 @@ FreeBSD_task: matrix: env: SSL: openssl + OPENSSL_ROOT_DIR: /usr/local env: - SSL: openssl31 + SSL: openssl32 + OPENSSL_ROOT_DIR: /usr/local env: # base openssl SSL: From 4e4bd79ad289d98c70e00e01ac9823ad250cd1ff Mon Sep 17 00:00:00 2001 From: hiura Date: Tue, 20 Feb 2024 12:01:35 +0900 Subject: [PATCH 29/63] IPC.c:Cast the pointer to a defined size due to the error in compiling. --- src/Cedar/IPC.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/src/Cedar/IPC.c b/src/Cedar/IPC.c index 67dfdf23..85e58a7f 100644 --- a/src/Cedar/IPC.c +++ b/src/Cedar/IPC.c @@ -1537,7 +1537,8 @@ void IPCProcessL3EventsEx(IPC *ipc, UINT64 now) // Remove link-layer address options for Windows clients (required on Windows 11) if (header_size > 0) { - UCHAR *src = p->ICMPv6HeaderPacketInfo.Headers.HeaderPointer + header_size; + //UCHAR *src = p->ICMPv6HeaderPacketInfo.Headers.HeaderPointer + header_size; + UCHAR* src = (UCHAR *)p->ICMPv6HeaderPacketInfo.Headers.HeaderPointer + header_size;// Cast the pointer to UCHAR *. UINT opt_size = p->ICMPv6HeaderPacketInfo.DataSize - header_size; UCHAR *dst = src; UINT removed = 0; From 60ee4630442c4458896553060c795732fd4a04de Mon Sep 17 00:00:00 2001 From: Ilya Shipitsin Date: Fri, 23 Feb 2024 11:06:27 +0100 Subject: [PATCH 30/63] adjust types of variables gcc14 is not happy on "error: passing argument .. from incompatible pointer type [-Wincompatible-pointer-types]" --- src/Mayaqua/pkcs11f.h | 6 +++--- src/Mayaqua/pkcs11t.h | 9 ++++++--- 2 files changed, 9 insertions(+), 6 deletions(-) diff --git a/src/Mayaqua/pkcs11f.h b/src/Mayaqua/pkcs11f.h index 30097535..33550c3d 100644 --- a/src/Mayaqua/pkcs11f.h +++ b/src/Mayaqua/pkcs11f.h @@ -73,7 +73,7 @@ CK_PKCS11_FUNCTION_INFO(C_GetSlotList) ( CK_BBOOL tokenPresent, /* only slots with tokens? */ CK_SLOT_ID_PTR pSlotList, /* receives array of slot IDs */ - CK_ULONG_PTR pulCount /* receives number of slots */ + CK_UINT_PTR pulCount /* receives number of slots */ ); #endif @@ -351,7 +351,7 @@ CK_PKCS11_FUNCTION_INFO(C_FindObjects) CK_SESSION_HANDLE hSession, /* session's handle */ CK_OBJECT_HANDLE_PTR phObject, /* gets obj. handles */ CK_ULONG ulMaxObjectCount, /* max handles to get */ - CK_ULONG_PTR pulObjectCount /* actual # returned */ + CK_UINT_PTR pulObjectCount /* actual # returned */ ); #endif @@ -558,7 +558,7 @@ CK_PKCS11_FUNCTION_INFO(C_Sign) CK_BYTE_PTR pData, /* the data to sign */ CK_ULONG ulDataLen, /* count of bytes to sign */ CK_BYTE_PTR pSignature, /* gets the signature */ - CK_ULONG_PTR pulSignatureLen /* gets signature length */ + CK_UINT_PTR pulSignatureLen /* gets signature length */ ); #endif diff --git a/src/Mayaqua/pkcs11t.h b/src/Mayaqua/pkcs11t.h index c04b5719..f157ce73 100644 --- a/src/Mayaqua/pkcs11t.h +++ b/src/Mayaqua/pkcs11t.h @@ -51,6 +51,8 @@ typedef CK_BYTE CK_BBOOL; /* an unsigned value, at least 32 bits long */ typedef unsigned long int CK_ULONG; +typedef unsigned int CK_UINT; + /* a signed value, the same size as a CK_ULONG */ /* CK_LONG is new for v2.0 */ typedef long int CK_LONG; @@ -68,6 +70,7 @@ typedef CK_BYTE CK_PTR CK_BYTE_PTR; typedef CK_CHAR CK_PTR CK_CHAR_PTR; typedef CK_UTF8CHAR CK_PTR CK_UTF8CHAR_PTR; typedef CK_ULONG CK_PTR CK_ULONG_PTR; +typedef CK_UINT CK_PTR CK_UINT_PTR; typedef void CK_PTR CK_VOID_PTR; /* Pointer to a CK_VOID_PTR-- i.e., pointer to pointer to void */ @@ -110,7 +113,7 @@ typedef CK_ULONG CK_NOTIFICATION; #define CKN_SURRENDER 0 -typedef CK_ULONG CK_SLOT_ID; +typedef CK_UINT CK_SLOT_ID; typedef CK_SLOT_ID CK_PTR CK_SLOT_ID_PTR; @@ -262,7 +265,7 @@ typedef CK_TOKEN_INFO CK_PTR CK_TOKEN_INFO_PTR; /* CK_SESSION_HANDLE is a Cryptoki-assigned value that * identifies a session */ -typedef CK_ULONG CK_SESSION_HANDLE; +typedef CK_UINT CK_SESSION_HANDLE; typedef CK_SESSION_HANDLE CK_PTR CK_SESSION_HANDLE_PTR; @@ -310,7 +313,7 @@ typedef CK_SESSION_INFO CK_PTR CK_SESSION_INFO_PTR; /* CK_OBJECT_HANDLE is a token-specific identifier for an * object */ -typedef CK_ULONG CK_OBJECT_HANDLE; +typedef CK_UINT CK_OBJECT_HANDLE; typedef CK_OBJECT_HANDLE CK_PTR CK_OBJECT_HANDLE_PTR; From 01b05af33316ec222dd76e96d1d328ca0ad40d1c Mon Sep 17 00:00:00 2001 From: Ilya Shipitsin Date: Fri, 23 Feb 2024 16:28:11 +0100 Subject: [PATCH 31/63] add "vcpkg_installed" to gitignore --- .gitignore | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/.gitignore b/.gitignore index c00f4b74..78d81534 100644 --- a/.gitignore +++ b/.gitignore @@ -209,4 +209,4 @@ developer_tools/stbchecker/**/ASALocalRun/ developer_tools/stbchecker/**/*.binlog developer_tools/stbchecker/**/*.nvuser developer_tools/stbchecker/**/.mfractor/ - +/vcpkg_installed From 442885deb5a65fadb6ba51068696c9037f77ddcb Mon Sep 17 00:00:00 2001 From: Thomas Winkler Date: Sat, 24 Feb 2024 22:24:15 +0100 Subject: [PATCH 32/63] Update CMakeLists.txt with version bump (upcoming 5182) --- CMakeLists.txt | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/CMakeLists.txt b/CMakeLists.txt index 3ededd63..e1120daa 100644 --- a/CMakeLists.txt +++ b/CMakeLists.txt @@ -3,7 +3,7 @@ cmake_minimum_required(VERSION 3.10) set(BUILD_NUMBER CACHE STRING "The number of the current build.") if ("${BUILD_NUMBER}" STREQUAL "") - set(BUILD_NUMBER "5180") + set(BUILD_NUMBER "5182") endif() if (BUILD_NUMBER LESS 5180) From 913934f7c08aba3b840d499202145a4388e84da0 Mon Sep 17 00:00:00 2001 From: Thomas Winkler Date: Sat, 24 Feb 2024 22:24:41 +0100 Subject: [PATCH 33/63] Update CMakeSettings.json with version bump (upcoming 5182) --- CMakeSettings.json | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/CMakeSettings.json b/CMakeSettings.json index fa46663d..82a5e910 100644 --- a/CMakeSettings.json +++ b/CMakeSettings.json @@ -1,5 +1,5 @@ { - "environments": [ { "BuildNumber": "5180" } ], + "environments": [ { "BuildNumber": "5182" } ], "configurations": [ { "name": "x64-native", From 0dfc82c14e93c2b46d60f9b1edcd1cd0f0bfc8f7 Mon Sep 17 00:00:00 2001 From: Kensei Sakai <24488142+libnumafly@users.noreply.github.com> Date: Tue, 27 Feb 2024 03:27:20 +0900 Subject: [PATCH 34/63] Update BUILD_UNIX.md for fix location # Using SoftEther without installation Correct location for build output dir. --- src/BUILD_UNIX.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/BUILD_UNIX.md b/src/BUILD_UNIX.md index 340afabc..7034dd4e 100644 --- a/src/BUILD_UNIX.md +++ b/src/BUILD_UNIX.md @@ -228,7 +228,7 @@ You can write your own VPN Server management application in your favorite langua You can use any SoftEtherVPN component (server, client, bridge) without installing it, if you wish so. -In this case please do not run the `make install` command after compiling the source code, and head directly to the **bin/** directory. There you will find the generated binaries for SoftEtherVPN and those could be used without installing SoftEtherVPN. +In this case please do not run the `make install` command after compiling the source code, and head directly to the **build/** directory. There you will find the generated binaries for SoftEtherVPN and those could be used without installing SoftEtherVPN. ************************************ Thank You Using SoftEther VPN ! From 645d5ebb55968150e6e41776818d627cae4c3859 Mon Sep 17 00:00:00 2001 From: hiura Date: Wed, 6 Mar 2024 11:33:56 +0900 Subject: [PATCH 35/63] Change bridge function: Make the NIC appear in the 'Local Bridge Settings' list regardless of a NULL character consisted in 'FriendlyName' --- src/Cedar/BridgeWin32.c | 24 ++++++++++++++++-------- src/Cedar/SeLowUser.c | 4 +++- 2 files changed, 19 insertions(+), 9 deletions(-) diff --git a/src/Cedar/BridgeWin32.c b/src/Cedar/BridgeWin32.c index 00d3ada0..b5df92f2 100644 --- a/src/Cedar/BridgeWin32.c +++ b/src/Cedar/BridgeWin32.c @@ -1161,7 +1161,9 @@ void Win32EthMakeCombinedName(char *dst, UINT dst_size, char *nicname, char *gui if (IsEmptyStr(guid) == false) { - Format(dst, dst_size, "%s (ID=%010u)", nicname, Win32EthGenIdFromGuid(guid)); + // Allow to combine "FriendlyName" consisting of a NULL character and ID. + //Format(dst, dst_size, "%s (ID=%010u)", nicname, Win32EthGenIdFromGuid(guid)); + Format(dst, dst_size, "%s(ID=%010u)", nicname, Win32EthGenIdFromGuid(guid)); } else { @@ -1185,18 +1187,19 @@ UINT Win32EthGetNameAndIdFromCombinedName(char *name, UINT name_size, char *str) len = StrLen(str); - if (len >= 16) + // Allow to combine "FriendlyName" consisting of a NULL character and ID. + if (len >= 15) { - StrCpy(id_str, sizeof(id_str), str + len - 16); + StrCpy(id_str, sizeof(id_str), str + len - 15); - if (StartWith(id_str, " (ID=")) + if (StartWith(id_str, "(ID=")) { if (EndWith(id_str, ")")) { char num[MAX_SIZE]; Zero(num, sizeof(num)); - StrCpy(num, sizeof(num), id_str + 5); + StrCpy(num, sizeof(num), id_str + 4); num[StrLen(num) - 1] = 0; @@ -1204,7 +1207,7 @@ UINT Win32EthGetNameAndIdFromCombinedName(char *name, UINT name_size, char *str) if (ret != 0) { - name[len - 16] = 0; + name[len - 15] = 0; } } } @@ -1346,6 +1349,8 @@ TOKEN_LIST *GetEthListEx(UINT *total_num_including_hidden, bool enum_normal, boo Debug("%s - %s\n", a->Guid, a->Title); } + // Make sure that "FriendlyName" does not cosist a NULL character. + Debug("%s,- s=%d, t=%s, %s,\n", a->Guid, show, tmp, a->Title[0] == 0 ? "check=NG FriendlyName(Title) is NULL !" : "check=OK"); } *total_num_including_hidden = ret->NumTokens; @@ -1405,7 +1410,8 @@ LIST *GetEthAdapterListInternal() UINT size; char *buf; UINT i, j; - char *qos_tag = " (Microsoft's Packet Scheduler)"; + //char *qos_tag = " (Microsoft's Packet Scheduler)"; + char *qos_tag = "(Microsoft's Packet Scheduler)"; // Allow to combine "FriendlyName" consisting of a NULL character and QOS. SU *su = NULL; LIST *su_adapter_list = NULL; @@ -1660,7 +1666,9 @@ ANSI_STR: } else { - Format(tmp, sizeof(tmp), "%s (%u)", a->Title, k + 1); + // Allow to combine "FriendlyName" consisting of a NULL character and ID. + //Format(tmp, sizeof(tmp), "%s (%u)", a->Title, k + 1); + Format(tmp, sizeof(tmp), "%s(%u)", a->Title, k + 1); } ok = true; diff --git a/src/Cedar/SeLowUser.c b/src/Cedar/SeLowUser.c index f6b40777..29967464 100644 --- a/src/Cedar/SeLowUser.c +++ b/src/Cedar/SeLowUser.c @@ -827,7 +827,9 @@ SU_ADAPTER_LIST *SuAdapterInfoToAdapterList(SL_ADAPTER_INFO *info) Copy(&t.Info, info, sizeof(SL_ADAPTER_INFO)); UniToStr(tmp, sizeof(tmp), info->AdapterId); - if (IsEmptyStr(tmp) || IsEmptyStr(info->FriendlyName) || StartWith(tmp, SL_ADAPTER_ID_PREFIX) == false) + // Make the NIC appear in the "Local Bridge Settings" list regardless of a NULL character consisted in "FriendlyName". + //if (IsEmptyStr(tmp) || IsEmptyStr(info->FriendlyName) || StartWith(tmp, SL_ADAPTER_ID_PREFIX) == false) + if (IsEmptyStr(tmp) || StartWith(tmp, SL_ADAPTER_ID_PREFIX) == false) { // Name is invalid return NULL; From 370d83ffa0e2c591736228a469a586d094d20496 Mon Sep 17 00:00:00 2001 From: Koichiro Iwao Date: Fri, 8 Mar 2024 11:45:02 +0900 Subject: [PATCH 36/63] Introduce new issue form --- .github/ISSUE_TEMPLATE.md | 51 ----------- .../bug_report_or_issue_report.yml | 87 +++++++++++++++++++ .github/ISSUE_TEMPLATE/config.yml | 8 ++ 3 files changed, 95 insertions(+), 51 deletions(-) delete mode 100644 .github/ISSUE_TEMPLATE.md create mode 100644 .github/ISSUE_TEMPLATE/bug_report_or_issue_report.yml create mode 100644 .github/ISSUE_TEMPLATE/config.yml diff --git a/.github/ISSUE_TEMPLATE.md b/.github/ISSUE_TEMPLATE.md deleted file mode 100644 index 160aa871..00000000 --- a/.github/ISSUE_TEMPLATE.md +++ /dev/null @@ -1,51 +0,0 @@ -Hi, there! - -Thank you for using SoftEther. - -If you are running SoftEther VPN 4.x (i.e. Stable Edition), please read the comparison with Developer Edition at: - -https://github.com/SoftEtherVPN/SoftEtherVPN#comparison-with-stable-edition - -Before you submit an issue, please read the following: - -Is this a question? - -- If the answer is "yes", then please ask your question on [www.vpnusers.com](http://www.vpnusers.com). -The issue section on GitHub is reserved for bugs and feature requests. - -- If the answer is "no", please read the following: - -We provide a template which is specifically made for bug reports, in order to be sure that the report includes enough details to be helpful. - -Please use or adapt it as needed. - ---- - -### Prerequisites - -* [ ] Can you reproduce? -* [ ] Are you running the latest version of SoftEtherVPN? - -**SoftEther version:** -**Component:** [Server, Client, Bridge, etc.] -**Operating system:** [Windows, Linux, BSD, macOS, etc.] -**Architecture:** [64 bit, 32 bit] - -[In case it's a computer with known specs, such as the Raspberry Pi, you can specify it omitting the details.] -**Processor:** [Specify brand and model. Example: AMD Ryzen 7 1800x] - -### Description - -[Description of the bug] - -**Expected behavior:** -[What you expected to happen] - -**Actual behavior:** -[What actually happened] - -### Steps to reproduce - -1. [First step] -2. [Second step] -3. [And so on...] diff --git a/.github/ISSUE_TEMPLATE/bug_report_or_issue_report.yml b/.github/ISSUE_TEMPLATE/bug_report_or_issue_report.yml new file mode 100644 index 00000000..cd9bc40f --- /dev/null +++ b/.github/ISSUE_TEMPLATE/bug_report_or_issue_report.yml @@ -0,0 +1,87 @@ +name: Bug Report or Issue Report +description: File a bug report or an issue report +labels: "needs-triage" +body: + - type: markdown + attributes: + value: | + Thanks for taking the time to fill out this bug report! + We provide a template which is specifically made for bug reports, to be sure that the report includes enough details to be helpful. + + - type: checkboxes + attributes: + label: Are you using SoftEther VPN 5.x? + description: | + This issue tracker is for SoftEther VPN Developer Edition versioned 5.x. + Please report issues about SoftEther VPN Stable Edition versioned 4.x through the correct path. + See also [the top of the issue tracker](https://github.com/SoftEtherVPN/SoftEtherVPN/issues/new/choose). + options: + - label: Yes, I'm using SoftEther VPN 5.x, not 4.x. + required: true + + - type: input + attributes: + label: Version + description: | + The exact version you are using. + It would be very nice if you let us know version tag or commit hash. + placeholder: "5.02.5180 / 09b7e4f / 5.01.9674+git20200806+8181039+dfsg2-2build1" + + - type: dropdown + attributes: + label: Component + description: Which component did you encounter an issue with? + multiple: true + options: + - VPN Server + - VPN Bridge + - VPN Client + - VPN Tools + - Other + validations: + required: true + + - type: input + attributes: + label: Operating system & version + placeholder: "Windows 11 Pro 23H2 / Ubuntu 22.04 / FreeBSD 14.0 / macOS Sonoma / Independent" + description: | + Let us know about your operating system and version. + validations: + required: true + + - type: input + attributes: + label: Architecture or Hardware model + placeholder: "amd64 / aarch64 / Raspberry Pi 4B+ / Apple M2" + description: | + Necessary if your issue is architecture-specific. + + - type: textarea + attributes: + label: Steps to reproduce + placeholder: Having detailed steps helps us reproduce the bug. + validations: + required: true + + - type: textarea + attributes: + label: ✔️ Expected Behavior + placeholder: What do you expect to happen? + validations: + required: false + + - type: textarea + attributes: + label: ❌ Actual Behavior + placeholder: What happened actually? + validations: + required: false + + - type: textarea + attributes: + label: Anything else? + description: | + Links? References? + Anything that will give us more context about the issue you are encountering! + diff --git a/.github/ISSUE_TEMPLATE/config.yml b/.github/ISSUE_TEMPLATE/config.yml new file mode 100644 index 00000000..e67472a7 --- /dev/null +++ b/.github/ISSUE_TEMPLATE/config.yml @@ -0,0 +1,8 @@ +contact_links: + - name: Are you using SoftEther VPN 4.x? + about: This repository is for SoftEther VPN 5.x Developer Edition, developed independently from SoftEther VPN 4.x. Visit vpnusers.com if you would like to report issues or ask questions about version 4.x! + url: https://www.vpnusers.com/ + + - name: Questions about SoftEtherVPN 5.x + about: Visit Discussions to ask community to help. + url: https://github.com/SoftEtherVPN/SoftEtherVPN/discussions/new?category=q-a From 64cb8e1efff329add2904b8ece3186fe0f1adbfc Mon Sep 17 00:00:00 2001 From: hiura Date: Mon, 11 Mar 2024 00:16:22 +0900 Subject: [PATCH 37/63] Change bridge function: Make the NIC appear in the 'Local Bridge Settings' list No.2 --- src/Cedar/BridgeWin32.c | 9 +++------ src/Cedar/SeLowUser.c | 43 ++++++++++++++++++++++++++++++++++++----- 2 files changed, 41 insertions(+), 11 deletions(-) diff --git a/src/Cedar/BridgeWin32.c b/src/Cedar/BridgeWin32.c index b5df92f2..2941ae81 100644 --- a/src/Cedar/BridgeWin32.c +++ b/src/Cedar/BridgeWin32.c @@ -1162,7 +1162,6 @@ void Win32EthMakeCombinedName(char *dst, UINT dst_size, char *nicname, char *gui if (IsEmptyStr(guid) == false) { // Allow to combine "FriendlyName" consisting of a NULL character and ID. - //Format(dst, dst_size, "%s (ID=%010u)", nicname, Win32EthGenIdFromGuid(guid)); Format(dst, dst_size, "%s(ID=%010u)", nicname, Win32EthGenIdFromGuid(guid)); } else @@ -1187,7 +1186,7 @@ UINT Win32EthGetNameAndIdFromCombinedName(char *name, UINT name_size, char *str) len = StrLen(str); - // Allow to combine "FriendlyName" consisting of a NULL character and ID. + // Allow to combine "FriendlyName" consisting of a NULL character and ID beginning with "(ID=". if (len >= 15) { StrCpy(id_str, sizeof(id_str), str + len - 15); @@ -1410,8 +1409,7 @@ LIST *GetEthAdapterListInternal() UINT size; char *buf; UINT i, j; - //char *qos_tag = " (Microsoft's Packet Scheduler)"; - char *qos_tag = "(Microsoft's Packet Scheduler)"; // Allow to combine "FriendlyName" consisting of a NULL character and QOS. + char *qos_tag = "(Microsoft's Packet Scheduler)"; // Allow to combine "FriendlyName" consisting of a NULL character and QOS tag. SU *su = NULL; LIST *su_adapter_list = NULL; @@ -1666,8 +1664,7 @@ ANSI_STR: } else { - // Allow to combine "FriendlyName" consisting of a NULL character and ID. - //Format(tmp, sizeof(tmp), "%s (%u)", a->Title, k + 1); + // Allow to combine "FriendlyName" consisting of a NULL character and SEQ number. Format(tmp, sizeof(tmp), "%s(%u)", a->Title, k + 1); } diff --git a/src/Cedar/SeLowUser.c b/src/Cedar/SeLowUser.c index 29967464..1074adf9 100644 --- a/src/Cedar/SeLowUser.c +++ b/src/Cedar/SeLowUser.c @@ -753,11 +753,45 @@ LIST *SuGetAdapterList(SU *u) for (i = 0;i < u->AdapterInfoList.NumAdapters;i++) { SL_ADAPTER_INFO *info = &u->AdapterInfoList.Adapters[i]; - SU_ADAPTER_LIST *a = SuAdapterInfoToAdapterList(info); - if (a != NULL) + if (IsEmptyStr(info->FriendlyName)) { - Add(ret, a); + // Some NetAdapterCx drivers doesn't report the FriendlyName in the kernel mode. + // So we attempt to obtain the DriverDesc string from NetCfg registry key alternatively. + char regkey[MAX_PATH] = {0}; + char tmp[MAX_PATH] = {0}; + char adapter_guid[MAX_PATH] = {0}; + + UniToStr(adapter_guid, sizeof(adapter_guid), info->AdapterId + StrLen(SL_ADAPTER_ID_PREFIX)); + + if (GetClassRegKeyWin32(regkey, sizeof(regkey), tmp, sizeof(tmp), adapter_guid)) + { + char *driver_desc = MsRegReadStrEx2(REG_LOCAL_MACHINE, regkey, "DriverDesc", false, true); + + if (driver_desc != NULL) + { + StrCpy(info->FriendlyName, sizeof(info->FriendlyName), driver_desc); + Free(driver_desc); + } + } + } + + { + SU_ADAPTER_LIST *a = SuAdapterInfoToAdapterList(info); + + char macstr[128] = {0}; + BinToStr(macstr, sizeof(macstr), info->MacAddress, sizeof(info->MacAddress)); + + if (a != NULL) + { + // Debug("SU: Adapter %u (OK): ID=%S, MAC=%s, FriendlyName=%s\n", i, info->AdapterId, macstr, info->FriendlyName); + + Add(ret, a); + } + else + { + // Debug("SU: Adapter %u (NG): ID=%S, MAC=%s, FriendlyName=%s\n", i, info->AdapterId, macstr, info->FriendlyName); + } } } @@ -828,8 +862,7 @@ SU_ADAPTER_LIST *SuAdapterInfoToAdapterList(SL_ADAPTER_INFO *info) UniToStr(tmp, sizeof(tmp), info->AdapterId); // Make the NIC appear in the "Local Bridge Settings" list regardless of a NULL character consisted in "FriendlyName". - //if (IsEmptyStr(tmp) || IsEmptyStr(info->FriendlyName) || StartWith(tmp, SL_ADAPTER_ID_PREFIX) == false) - if (IsEmptyStr(tmp) || StartWith(tmp, SL_ADAPTER_ID_PREFIX) == false) + if (IsEmptyStr(tmp) || /* IsEmptyStr(info->FriendlyName) || */ StartWith(tmp, SL_ADAPTER_ID_PREFIX) == false) { // Name is invalid return NULL; From 2789b16c120c29b151fde7e61ea96a5d23922a16 Mon Sep 17 00:00:00 2001 From: hiura Date: Sat, 16 Mar 2024 12:52:46 +0900 Subject: [PATCH 38/63] Fix hamcore access: Correcting path separator for hamcore. --- src/Mayaqua/FileIO.c | 23 ++++++++++++++++++++++- 1 file changed, 22 insertions(+), 1 deletion(-) diff --git a/src/Mayaqua/FileIO.c b/src/Mayaqua/FileIO.c index c03c3906..5e4b9c97 100644 --- a/src/Mayaqua/FileIO.c +++ b/src/Mayaqua/FileIO.c @@ -2124,6 +2124,24 @@ IO *FileOpenEx(char *name, bool write_mode, bool read_lock) return ret; } + +// Replace the specified character in the string with a new character +wchar_t *UniReplaceCharW(wchar_t *src, UINT size, wchar_t c, wchar_t newc) { + if (src == NULL) + { + return NULL; + } + for (; *src; src++, size -= sizeof(wchar_t)) { + if (size < sizeof(wchar_t)) { + break; + } + if (*src == c) { + *src = newc; + } + } + return (wchar_t *)src; +} + IO *FileOpenExW(wchar_t *name, bool write_mode, bool read_lock) { wchar_t tmp[MAX_SIZE]; @@ -2140,9 +2158,12 @@ IO *FileOpenExW(wchar_t *name, bool write_mode, bool read_lock) IO *o = ZeroMalloc(sizeof(IO)); name++; UniStrCpy(o->NameW, sizeof(o->NameW), name); +#ifdef OS_WIN32 + UniReplaceCharW(o->NameW, sizeof(o->NameW), L'\\', L'/'); // Path separator "/" is used. +#endif // OS_WIN32 UniToStr(o->Name, sizeof(o->Name), o->NameW); o->HamMode = true; - o->HamBuf = ReadHamcoreW(name); + o->HamBuf = ReadHamcoreW(o->NameW); if (o->HamBuf == NULL) { Free(o); From e8c14cba68f89e2ef226cf2756acfafc84d98190 Mon Sep 17 00:00:00 2001 From: hiura Date: Sun, 24 Mar 2024 19:11:24 +0900 Subject: [PATCH 39/63] Fix 'Session Timeouted.': Change the time for checking wether all the TCP connectins are alive or not. --- src/Cedar/Session.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/Cedar/Session.c b/src/Cedar/Session.c index 00a9e817..e0bb58a6 100644 --- a/src/Cedar/Session.c +++ b/src/Cedar/Session.c @@ -615,7 +615,7 @@ void SessionMain(SESSION *s) UINT max_conn = s->ClientOption->MaxConnection; if ((s->CurrentConnectionEstablishTime + - (UINT64)(s->ClientOption->AdditionalConnectionInterval * 1000 * 2 + CONNECTING_TIMEOUT * 2)) + (UINT64)(num_tcp_conn * s->ClientOption->AdditionalConnectionInterval * 1000 * 2 + CONNECTING_TIMEOUT * 2)) <= Tick64()) { if (s->ClientOption->BindLocalPort != 0 || num_tcp_conn == 0) From 495cddd518a88caff2322fc1a7c93d360efef30f Mon Sep 17 00:00:00 2001 From: Ilya Shipitsin Date: Sun, 24 Mar 2024 20:18:38 +0100 Subject: [PATCH 40/63] bump version for upcoming 5183 release --- .vscode/settings.json | 3 +++ CMakeLists.txt | 2 +- CMakeSettings.json | 2 +- 3 files changed, 5 insertions(+), 2 deletions(-) create mode 100644 .vscode/settings.json diff --git a/.vscode/settings.json b/.vscode/settings.json new file mode 100644 index 00000000..cad7657d --- /dev/null +++ b/.vscode/settings.json @@ -0,0 +1,3 @@ +{ + "cmake.configureOnOpen": false +} \ No newline at end of file diff --git a/CMakeLists.txt b/CMakeLists.txt index e1120daa..88278a43 100644 --- a/CMakeLists.txt +++ b/CMakeLists.txt @@ -3,7 +3,7 @@ cmake_minimum_required(VERSION 3.10) set(BUILD_NUMBER CACHE STRING "The number of the current build.") if ("${BUILD_NUMBER}" STREQUAL "") - set(BUILD_NUMBER "5182") + set(BUILD_NUMBER "5183") endif() if (BUILD_NUMBER LESS 5180) diff --git a/CMakeSettings.json b/CMakeSettings.json index 82a5e910..22cda99d 100644 --- a/CMakeSettings.json +++ b/CMakeSettings.json @@ -1,5 +1,5 @@ { - "environments": [ { "BuildNumber": "5182" } ], + "environments": [ { "BuildNumber": "5183" } ], "configurations": [ { "name": "x64-native", From 97203568e7d5540ae2cefffed0881be4966c2d05 Mon Sep 17 00:00:00 2001 From: hiura Date: Sun, 31 Mar 2024 23:07:16 +0900 Subject: [PATCH 41/63] Fix 'RemoveDefGwOnDhcpForLocalhost' function: Change to exclude unplugged device from MAC address list. --- src/Mayaqua/Microsoft.c | 1 + src/Mayaqua/Microsoft.h | 1 + src/Mayaqua/Network.c | 7 +++++++ 3 files changed, 9 insertions(+) diff --git a/src/Mayaqua/Microsoft.c b/src/Mayaqua/Microsoft.c index 5f9e015e..4579b301 100644 --- a/src/Mayaqua/Microsoft.c +++ b/src/Mayaqua/Microsoft.c @@ -2568,6 +2568,7 @@ MS_ADAPTER_LIST *MsCreateAdapterListInnerExVista(bool no_info) UniStrCpy(a->TitleW, sizeof(a->TitleW), title); UniToStr(a->Title, sizeof(a->Title), title); a->Index = r->InterfaceIndex; + a->MediaConnectState = r->MediaConnectState; a->Type = r->Type; a->Status = ConvertMidStatusVistaToXp(r->OperStatus); a->Mtu = r->Mtu; diff --git a/src/Mayaqua/Microsoft.h b/src/Mayaqua/Microsoft.h index c0d6a5ab..0044bbda 100644 --- a/src/Mayaqua/Microsoft.h +++ b/src/Mayaqua/Microsoft.h @@ -281,6 +281,7 @@ typedef struct MS_ADAPTER char Title[MAX_PATH]; // Display name wchar_t TitleW[MAX_PATH]; // Display Name (Unicode) UINT Index; // Index + UINT MediaConnectState; // Media Connect State UINT Type; // Type UINT Status; // Status UINT Mtu; // MTU diff --git a/src/Mayaqua/Network.c b/src/Mayaqua/Network.c index 465ae836..c9ea7595 100644 --- a/src/Mayaqua/Network.c +++ b/src/Mayaqua/Network.c @@ -540,6 +540,13 @@ LIST *Win32GetNicList() if (a->Type == 6 && a->AddressSize == 6) { + // If the connection state of the interface is unknown, then exclude it. + // Unknown means that the device is not plugged into the local host. + if (a->MediaConnectState == MediaConnectStateUnknown) + { + continue; + } + NIC_ENTRY *e = ZeroMalloc(sizeof(NIC_ENTRY)); StrCpy(e->IfName, sizeof(e->IfName), a->Title); From 62e7f0ba8adfdad2766537ce427fc2716d784443 Mon Sep 17 00:00:00 2001 From: Ilia Shipitsin Date: Fri, 5 Apr 2024 22:08:51 +0200 Subject: [PATCH 42/63] CI: adopt windows_build.bat for GitHub actions --- .ci/azure-pipelines/windows_build.bat | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/.ci/azure-pipelines/windows_build.bat b/.ci/azure-pipelines/windows_build.bat index 6f533c72..b8491266 100644 --- a/.ci/azure-pipelines/windows_build.bat +++ b/.ci/azure-pipelines/windows_build.bat @@ -14,6 +14,12 @@ if %SE_BUILD_NUMBER_TOKEN_LENGTH% equ 64 ( set BUILD_NUMBER=0 ) + +if "%BUILD_BINARIESDIRECTORY%"=="" (set BUILD_BINARIESDIRECTORY=build) +if "%BUILD_SOURCESDIRECTORY%"=="" (set BUILD_SOURCESDIRECTORY=%cd%) + +if not exist %BUILD_BINARIESDIRECTORY% mkdir %BUILD_BINARIESDIRECTORY% + cd %BUILD_BINARIESDIRECTORY% call "%VCVARS_PATH%" @@ -21,6 +27,7 @@ call "%VCVARS_PATH%" cmake -G "Ninja" -DCMAKE_TOOLCHAIN_FILE="C:\vcpkg\scripts\buildsystems\vcpkg.cmake" -DVCPKG_TARGET_TRIPLET=%VCPKG_TRIPLET% -DCMAKE_BUILD_TYPE=RelWithDebInfo -DCMAKE_C_COMPILER="%COMPILER_PATH%" -DCMAKE_CXX_COMPILER="%COMPILER_PATH%" -DBUILD_NUMBER=%BUILD_NUMBER% "%BUILD_SOURCESDIRECTORY%" cmake --build . +if "%BUILD_STAGINGDIRECTORY%"=="" (set BUILD_STAGINGDIRECTORY=%cd%) mkdir "%BUILD_STAGINGDIRECTORY%\installers" vpnsetup /SFXMODE:vpnclient /SFXOUT:"%BUILD_STAGINGDIRECTORY%\installers\softether-vpnclient-%VERSION%.%BUILD_NUMBER%.%ARCHITECTURE%.exe" vpnsetup /SFXMODE:vpnserver_vpnbridge /SFXOUT:"%BUILD_STAGINGDIRECTORY%\installers\softether-vpnserver_vpnbridge-%VERSION%.%BUILD_NUMBER%.%ARCHITECTURE%.exe" From 7981e16e0bd6329d79721621fb202e6213b6ecc1 Mon Sep 17 00:00:00 2001 From: Ilia Shipitsin Date: Fri, 5 Apr 2024 22:09:39 +0200 Subject: [PATCH 43/63] CI: add windows GitHub Actions --- .github/workflows/windows.yml | 46 +++++++++++++++++++++++++++++++++++ 1 file changed, 46 insertions(+) create mode 100644 .github/workflows/windows.yml diff --git a/.github/workflows/windows.yml b/.github/workflows/windows.yml new file mode 100644 index 00000000..4b798b6b --- /dev/null +++ b/.github/workflows/windows.yml @@ -0,0 +1,46 @@ +on: [push, pull_request] + +permissions: + contents: read + +jobs: + build_and_test: + strategy: + matrix: + platform: [ + { ARCHITECTURE: x86, COMPILER_PATH: "C:/Program Files/Microsoft Visual Studio/2022/Enterprise/VC/Tools/Llvm/bin/clang-cl.exe", VCPKG_TRIPLET: "x86-windows-static", VCVARS_PATH: "C:/Program Files/Microsoft Visual Studio/2022/Enterprise/VC/Auxiliary/Build/vcvars32.bat"}, + { ARCHITECTURE: x64, COMPILER_PATH: "C:/Program Files/Microsoft Visual Studio/2022/Enterprise/VC/Tools/Llvm/x64/bin/clang-cl.exe", VCPKG_TRIPLET: "x64-windows-static", VCVARS_PATH: "C:/Program Files/Microsoft Visual Studio/2022/Enterprise/VC/Auxiliary/Build/vcvars64.bat"} + ] + runs-on: windows-latest + name: ${{ matrix.platform.ARCHITECTURE }} + steps: + - uses: actions/checkout@v4 + with: + submodules: true + - name: Cache vcpkg + uses: actions/cache@v4 + with: + path: 'build/vcpkg_installed/' + key: vcpkg-${{ matrix.platform.VCPKG_TRIPLET }} + - name: Build + env: + ARCHITECTURE: ${{ matrix.platform.ARCHITECTURE }} + COMPILER_PATH: ${{ matrix.platform.COMPILER_PATH }} + VCPKG_TRIPLET: ${{ matrix.platform.VCPKG_TRIPLET }} + VCVARS_PATH: ${{ matrix.platform.VCVARS_PATH }} + run: .ci/azure-pipelines/windows_build.bat + - name: Test + shell: powershell + run: | + . .ci/appveyor-vpntest.ps1 + - uses: actions/upload-artifact@v4 + with: + name: Binaries-${{ matrix.platform.ARCHITECTURE }} + path: | + build/*.exe + build/*.pdb + build/*.se2 + - uses: actions/upload-artifact@v4 + with: + name: Installers-${{ matrix.platform.ARCHITECTURE }} + path: build/installers \ No newline at end of file From 4c1eeb717baf5772a84ac5b00a2c6e4fedbb2362 Mon Sep 17 00:00:00 2001 From: Ilia Shipitsin Date: Fri, 5 Apr 2024 22:15:35 +0200 Subject: [PATCH 44/63] CI: harden artifacts upload --- .github/workflows/windows.yml | 2 ++ 1 file changed, 2 insertions(+) diff --git a/.github/workflows/windows.yml b/.github/workflows/windows.yml index 4b798b6b..66a32ccf 100644 --- a/.github/workflows/windows.yml +++ b/.github/workflows/windows.yml @@ -35,6 +35,7 @@ jobs: . .ci/appveyor-vpntest.ps1 - uses: actions/upload-artifact@v4 with: + if-no-files-found: error name: Binaries-${{ matrix.platform.ARCHITECTURE }} path: | build/*.exe @@ -42,5 +43,6 @@ jobs: build/*.se2 - uses: actions/upload-artifact@v4 with: + if-no-files-found: error name: Installers-${{ matrix.platform.ARCHITECTURE }} path: build/installers \ No newline at end of file From 23e9f74e7e516b6c393c4cb8910d24b13ac6c679 Mon Sep 17 00:00:00 2001 From: Ilia Shipitsin Date: Sun, 7 Apr 2024 17:16:45 +0200 Subject: [PATCH 45/63] CI: move linux builds to GHA, drop ADO --- .azure-pipelines.yml | 4 --- .ci/azure-pipelines/linux.yml | 20 ------------- .ci/azure-pipelines/macos.yml | 14 --------- .ci/azure-pipelines/windows-steps.yml | 41 --------------------------- .ci/azure-pipelines/windows.yml | 27 ------------------ .github/workflows/linux.yml | 34 ++++++++++++++++++++++ 6 files changed, 34 insertions(+), 106 deletions(-) delete mode 100644 .azure-pipelines.yml delete mode 100644 .ci/azure-pipelines/linux.yml delete mode 100644 .ci/azure-pipelines/macos.yml delete mode 100644 .ci/azure-pipelines/windows-steps.yml delete mode 100644 .ci/azure-pipelines/windows.yml create mode 100644 .github/workflows/linux.yml diff --git a/.azure-pipelines.yml b/.azure-pipelines.yml deleted file mode 100644 index e4d8739a..00000000 --- a/.azure-pipelines.yml +++ /dev/null @@ -1,4 +0,0 @@ -jobs: - - template: .ci/azure-pipelines/linux.yml - - template: .ci/azure-pipelines/windows.yml - - template: .ci/azure-pipelines/macos.yml diff --git a/.ci/azure-pipelines/linux.yml b/.ci/azure-pipelines/linux.yml deleted file mode 100644 index fbb8aeb5..00000000 --- a/.ci/azure-pipelines/linux.yml +++ /dev/null @@ -1,20 +0,0 @@ -jobs: -- job: Ubuntu_x64 - pool: - vmImage: ubuntu-22.04 - steps: - - checkout: self - submodules: true - persistCredentials: true - - script: sudo apt update && sudo apt-get -y install cmake gcc g++ ninja-build libncurses5-dev libreadline-dev libsodium-dev libssl-dev make zlib1g-dev liblz4-dev libnl-genl-3-dev - displayName: 'Prepare environment' - - script: "$(Build.SourcesDirectory)/.ci/azure-pipelines/linux_build.sh" - env: - SE_BUILD_NUMBER_TOKEN: $(BUILD_NUMBER_TOKEN) - displayName: 'Build' - - script: | - .ci/appveyor-deb-install-test.sh - sudo apt-get -y install autoconf libtool liblzo2-dev libpam-dev fping unzip libcap-ng-dev # To build OpenVPN - sudo BUILD_BINARIESDIRECTORY=$BUILD_BINARIESDIRECTORY .ci/start-se-openvpn.sh - sudo BUILD_BINARIESDIRECTORY=$BUILD_BINARIESDIRECTORY .ci/run-openvpn-tests.sh - displayName: 'Test' diff --git a/.ci/azure-pipelines/macos.yml b/.ci/azure-pipelines/macos.yml deleted file mode 100644 index da8fa2f8..00000000 --- a/.ci/azure-pipelines/macos.yml +++ /dev/null @@ -1,14 +0,0 @@ -jobs: -- job: macOS - pool: - vmImage: macOS-latest - steps: - - checkout: self - submodules: true - persistCredentials: true - - script: brew install pkg-config cmake ninja ncurses readline libsodium openssl zlib - displayName: 'Prepare environment' - - script: '$(Build.SourcesDirectory)/.ci/azure-pipelines/macos_build.sh' - env: - SE_BUILD_NUMBER_TOKEN: $(BUILD_NUMBER_TOKEN) - displayName: 'Build' diff --git a/.ci/azure-pipelines/windows-steps.yml b/.ci/azure-pipelines/windows-steps.yml deleted file mode 100644 index 79bd5fdf..00000000 --- a/.ci/azure-pipelines/windows-steps.yml +++ /dev/null @@ -1,41 +0,0 @@ -parameters: -- name: architecture - type: string -- name: compilerPath - type: string -- name: vcpkgTriplet - type: string -- name: vcvarsPath - type: string - -steps: -- task: Cache@2 - inputs: - key: '"vcpkg-manifest" | "$(Agent.OS)" | "${{parameters.vcpkgTriplet}}" | C:/vcpkg/.git/refs/heads/master' - path: '$(Build.BinariesDirectory)/vcpkg_installed' - displayName: 'Environment storage' -- script: '$(Build.SourcesDirectory)/.ci/azure-pipelines/windows_build.bat' - env: - ARCHITECTURE: ${{parameters.architecture}} - COMPILER_PATH: ${{parameters.compilerPath}} - VCPKG_TRIPLET: ${{parameters.vcpkgTriplet}} - VCVARS_PATH: ${{parameters.vcvarsPath}} - SE_BUILD_NUMBER_TOKEN: $(BUILD_NUMBER_TOKEN) - displayName: 'Build' -- powershell: | - . .ci/appveyor-vpntest.ps1 - displayName: 'Test' -- task: CopyFiles@2 - inputs: - sourceFolder: '$(Build.BinariesDirectory)' - contents: '?(*.exe|*.se2|*.pdb)' - TargetFolder: '$(Build.StagingDirectory)/binaries/${{parameters.architecture}}' - flattenFolders: true -- task: PublishBuildArtifacts@1 - inputs: - pathtoPublish: '$(Build.StagingDirectory)/binaries/${{parameters.architecture}}' - artifactName: 'Binaries_${{parameters.architecture}}' -- task: PublishBuildArtifacts@1 - inputs: - pathtoPublish: '$(Build.StagingDirectory)/installers' - artifactName: 'Installers' diff --git a/.ci/azure-pipelines/windows.yml b/.ci/azure-pipelines/windows.yml deleted file mode 100644 index 6c6a75e8..00000000 --- a/.ci/azure-pipelines/windows.yml +++ /dev/null @@ -1,27 +0,0 @@ -jobs: -- job: Windows_x64 - pool: - vmImage: windows-latest - steps: - - checkout: self - submodules: true - persistCredentials: true - - template: "windows-steps.yml" - parameters: - architecture: "x64" - compilerPath: "C:/Program Files/Microsoft Visual Studio/2022/Enterprise/VC/Tools/Llvm/x64/bin/clang-cl.exe" - vcpkgTriplet: "x64-windows-static" - vcvarsPath: "C:/Program Files/Microsoft Visual Studio/2022/Enterprise/VC/Auxiliary/Build/vcvars64.bat" -- job: Windows_x86 - pool: - vmImage: windows-latest - steps: - - checkout: self - submodules: true - persistCredentials: true - - template: "windows-steps.yml" - parameters: - architecture: "x86" - compilerPath: "C:/Program Files/Microsoft Visual Studio/2022/Enterprise/VC/Tools/Llvm/bin/clang-cl.exe" - vcpkgTriplet: "x86-windows-static" - vcvarsPath: "C:/Program Files/Microsoft Visual Studio/2022/Enterprise/VC/Auxiliary/Build/vcvars32.bat" diff --git a/.github/workflows/linux.yml b/.github/workflows/linux.yml new file mode 100644 index 00000000..799f4b8f --- /dev/null +++ b/.github/workflows/linux.yml @@ -0,0 +1,34 @@ +on: [push, pull_request] + +permissions: + contents: read + +jobs: + build_and_test: + runs-on: ubuntu-latest + steps: + - uses: actions/checkout@v4 + with: + submodules: true + + - name: Install dependencies + run: sudo apt update && sudo apt-get -y install cmake gcc g++ ninja-build libncurses5-dev libreadline-dev libsodium-dev libssl-dev make zlib1g-dev liblz4-dev libnl-genl-3-dev + + - name: Build + run: | + mkdir build + cd build + cmake -G "Ninja" -DCMAKE_BUILD_TYPE=RelWithDebInfo .. + cmake --build . + + - name: Build deb packages + run: | + cd build + cpack -C Release -G DEB + + - name: Test + run: | + .ci/appveyor-deb-install-test.sh + sudo apt-get -y install autoconf libtool liblzo2-dev libpam-dev fping unzip libcap-ng-dev # To build OpenVPN + sudo .ci/start-se-openvpn.sh + sudo .ci/run-openvpn-tests.sh From 74ea87d725e5c1379db3be7410d0ea9d107d4aa8 Mon Sep 17 00:00:00 2001 From: Ilia Shipitsin Date: Fri, 12 Apr 2024 12:44:19 +0200 Subject: [PATCH 46/63] CI: drop app veyor in favour of GHA --- .appveyor.yml | 33 --------------------------------- 1 file changed, 33 deletions(-) delete mode 100644 .appveyor.yml diff --git a/.appveyor.yml b/.appveyor.yml deleted file mode 100644 index 5170a90c..00000000 --- a/.appveyor.yml +++ /dev/null @@ -1,33 +0,0 @@ -version: '{build}' - -image: Ubuntu2004 - -configuration: Release - -skip_branch_with_pr: true -clone_depth: 1 - -skip_commits: - files: - - .travis.yml - - .gitlab-ci.yml - - .azure-pipelines.yml - - .cirrus.yml - -init: - - ps: Update-AppveyorBuild -Version "build-$env:APPVEYOR_BUILD_NUMBER-$($env:APPVEYOR_REPO_COMMIT.substring(0,7))" - -install: - - sudo apt-get -y install libsodium-dev libcap-ng-dev -before_build: - - git submodule update --init --recursive - - ./configure -build_script: - - make package -C build -j $(nproc || sysctl -n hw.ncpu || echo 4) - - .ci/memory-leak-test.sh -test_script: - - .ci/appveyor-deb-install-test.sh - - sudo apt-get update && sudo apt-get -y install autoconf libtool liblzo2-dev libpam-dev fping unzip liblz4-dev libnl-genl-3-dev # openvpn build deps - - sudo .ci/start-se-openvpn.sh - - sudo .ci/run-openvpn-tests.sh - From 71d71e51db30ab9816977523313a32df941114ee Mon Sep 17 00:00:00 2001 From: Alexey Ivanov Date: Fri, 12 Apr 2024 23:08:24 +0500 Subject: [PATCH 47/63] OpenVPN certificate authorization with cn_username in 'email' format --- src/Cedar/Protocol.c | 16 ++++++++++++++-- 1 file changed, 14 insertions(+), 2 deletions(-) diff --git a/src/Cedar/Protocol.c b/src/Cedar/Protocol.c index 6075f3ff..3829b563 100644 --- a/src/Cedar/Protocol.c +++ b/src/Cedar/Protocol.c @@ -6773,7 +6773,6 @@ PACK *PackLoginWithOpenVPNCertificate(char *hubname, char *username, X *x) p = NewPack(); PackAddStr(p, "method", "login"); - PackAddStr(p, "hubname", hubname); if (IsEmptyStr(username)) { @@ -6782,12 +6781,25 @@ PACK *PackLoginWithOpenVPNCertificate(char *hubname, char *username, X *x) FreePack(p); return NULL; } + UniToStr(cn_username, sizeof(cn_username), x->subject_name->CommonName); - PackAddStr(p, "username", cn_username); + + if(strchr(cn_username, '@') != NULL) + { + PackAddStr(p, "username", strtok(cn_username, "@")); + PackAddStr(p, "hubname", strtok(NULL, "")); + } + else + { + PackAddStr(p, "username", cn_username); + PackAddStr(p, "hubname", hubname); + } + } else { PackAddStr(p, "username", username); + PackAddStr(p, "hubname", hubname); } PackAddInt(p, "authtype", AUTHTYPE_OPENVPN_CERT); From 6582955cfa4158d889bf96da9f91e8b8bbbfae82 Mon Sep 17 00:00:00 2001 From: Ilya Shipitsin Date: Sun, 14 Apr 2024 10:36:55 +0200 Subject: [PATCH 48/63] Update src/Cedar/Protocol.c Co-authored-by: Davide Beatrici --- src/Cedar/Protocol.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/src/Cedar/Protocol.c b/src/Cedar/Protocol.c index 3829b563..a0da6c70 100644 --- a/src/Cedar/Protocol.c +++ b/src/Cedar/Protocol.c @@ -6784,7 +6784,8 @@ PACK *PackLoginWithOpenVPNCertificate(char *hubname, char *username, X *x) UniToStr(cn_username, sizeof(cn_username), x->subject_name->CommonName); - if(strchr(cn_username, '@') != NULL) + if (strchr(cn_username, '@') != NULL) + { PackAddStr(p, "username", strtok(cn_username, "@")); PackAddStr(p, "hubname", strtok(NULL, "")); From c36d7187a8de4b39d7879a752f5933de9689de6b Mon Sep 17 00:00:00 2001 From: hiura Date: Tue, 16 Apr 2024 10:30:10 +0900 Subject: [PATCH 49/63] Fix 'RemoveDefGwOnDhcpForLocalhost' function No.2: Change the minimum size of DHCP reply --- src/Mayaqua/TcpIp.c | 7 +++++-- 1 file changed, 5 insertions(+), 2 deletions(-) diff --git a/src/Mayaqua/TcpIp.c b/src/Mayaqua/TcpIp.c index 7c3abddb..21cc14e9 100644 --- a/src/Mayaqua/TcpIp.c +++ b/src/Mayaqua/TcpIp.c @@ -4168,6 +4168,7 @@ BUF *DhcpModify(DHCP_MODIFY_OPTION *m, void *data, UINT size) LIST *opt_list2 = NULL; UINT src_size = size; UINT i; + UINT dhcp_min_size; // Validate arguments if (m == NULL || data == NULL || size == 0) { @@ -4270,11 +4271,13 @@ BUF *DhcpModify(DHCP_MODIFY_OPTION *m, void *data, UINT size) // Rewrite if anything changes. Do not rewrite if there is no change ret_ok = true; - if (ret->Size < DHCP_MIN_SIZE) + // If src_size is greater than DHCP_MIN_SIZE, then use the src_size as minimum size of DHCP. + dhcp_min_size = max(src_size, DHCP_MIN_SIZE); + if (ret->Size < dhcp_min_size) { // Padding UCHAR *pad_buf; - UINT pad_size = DHCP_MIN_SIZE - ret->Size; + UINT pad_size = dhcp_min_size - ret->Size; pad_buf = ZeroMalloc(pad_size); From 9a009d750aac2416ee15515df8639eed2ba8215f Mon Sep 17 00:00:00 2001 From: hiura Date: Tue, 16 Apr 2024 19:14:44 +0900 Subject: [PATCH 50/63] Use macro 'MAX' instead of 'max' --- src/Mayaqua/TcpIp.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/Mayaqua/TcpIp.c b/src/Mayaqua/TcpIp.c index 21cc14e9..8dba45e2 100644 --- a/src/Mayaqua/TcpIp.c +++ b/src/Mayaqua/TcpIp.c @@ -4272,7 +4272,7 @@ BUF *DhcpModify(DHCP_MODIFY_OPTION *m, void *data, UINT size) ret_ok = true; // If src_size is greater than DHCP_MIN_SIZE, then use the src_size as minimum size of DHCP. - dhcp_min_size = max(src_size, DHCP_MIN_SIZE); + dhcp_min_size = MAX(src_size, DHCP_MIN_SIZE); if (ret->Size < dhcp_min_size) { // Padding From 9982e128effee1f4b7d5b1f634b2cc9d70010a64 Mon Sep 17 00:00:00 2001 From: Ilia Shipitsin Date: Tue, 16 Apr 2024 22:26:00 +0200 Subject: [PATCH 51/63] CI: simplify GHA windows workflow --- .ci/azure-pipelines/windows_build.bat | 33 --------------------------- .github/workflows/windows.yml | 17 +++++++++++++- 2 files changed, 16 insertions(+), 34 deletions(-) delete mode 100644 .ci/azure-pipelines/windows_build.bat diff --git a/.ci/azure-pipelines/windows_build.bat b/.ci/azure-pipelines/windows_build.bat deleted file mode 100644 index b8491266..00000000 --- a/.ci/azure-pipelines/windows_build.bat +++ /dev/null @@ -1,33 +0,0 @@ -@echo on - -:: The method we use to store a command's output into a variable: -:: https://stackoverflow.com/a/6362922 -for /f "tokens=* USEBACKQ" %%g in (`python "version.py"`) do (set "VERSION=%%g") - -:: https://stackoverflow.com/a/8566001 -echo %SE_BUILD_NUMBER_TOKEN%> "%tmp%\length.txt" -for %%? in ("%tmp%\length.txt") do ( set /A SE_BUILD_NUMBER_TOKEN_LENGTH=%%~z? - 2 ) - -if %SE_BUILD_NUMBER_TOKEN_LENGTH% equ 64 ( - for /f "tokens=* USEBACKQ" %%g in (`curl "https://softether.network/get-build-number?commit=%BUILD_SOURCEVERSION%&version=%VERSION%&token=%SE_BUILD_NUMBER_TOKEN%"`) do (set "BUILD_NUMBER=%%g") -) else ( - set BUILD_NUMBER=0 -) - - -if "%BUILD_BINARIESDIRECTORY%"=="" (set BUILD_BINARIESDIRECTORY=build) -if "%BUILD_SOURCESDIRECTORY%"=="" (set BUILD_SOURCESDIRECTORY=%cd%) - -if not exist %BUILD_BINARIESDIRECTORY% mkdir %BUILD_BINARIESDIRECTORY% - -cd %BUILD_BINARIESDIRECTORY% - -call "%VCVARS_PATH%" - -cmake -G "Ninja" -DCMAKE_TOOLCHAIN_FILE="C:\vcpkg\scripts\buildsystems\vcpkg.cmake" -DVCPKG_TARGET_TRIPLET=%VCPKG_TRIPLET% -DCMAKE_BUILD_TYPE=RelWithDebInfo -DCMAKE_C_COMPILER="%COMPILER_PATH%" -DCMAKE_CXX_COMPILER="%COMPILER_PATH%" -DBUILD_NUMBER=%BUILD_NUMBER% "%BUILD_SOURCESDIRECTORY%" -cmake --build . - -if "%BUILD_STAGINGDIRECTORY%"=="" (set BUILD_STAGINGDIRECTORY=%cd%) -mkdir "%BUILD_STAGINGDIRECTORY%\installers" -vpnsetup /SFXMODE:vpnclient /SFXOUT:"%BUILD_STAGINGDIRECTORY%\installers\softether-vpnclient-%VERSION%.%BUILD_NUMBER%.%ARCHITECTURE%.exe" -vpnsetup /SFXMODE:vpnserver_vpnbridge /SFXOUT:"%BUILD_STAGINGDIRECTORY%\installers\softether-vpnserver_vpnbridge-%VERSION%.%BUILD_NUMBER%.%ARCHITECTURE%.exe" diff --git a/.github/workflows/windows.yml b/.github/workflows/windows.yml index 66a32ccf..d5cccba3 100644 --- a/.github/workflows/windows.yml +++ b/.github/workflows/windows.yml @@ -22,13 +22,28 @@ jobs: with: path: 'build/vcpkg_installed/' key: vcpkg-${{ matrix.platform.VCPKG_TRIPLET }} + - name: Set version variables + run: | + $v = python version.py + echo "VERSION=$v" | Out-File -FilePath $Env:GITHUB_ENV -Encoding utf8 -Append + shell: pwsh - name: Build env: ARCHITECTURE: ${{ matrix.platform.ARCHITECTURE }} COMPILER_PATH: ${{ matrix.platform.COMPILER_PATH }} VCPKG_TRIPLET: ${{ matrix.platform.VCPKG_TRIPLET }} VCVARS_PATH: ${{ matrix.platform.VCVARS_PATH }} - run: .ci/azure-pipelines/windows_build.bat + run: | + set BUILD_NUMBER=0 + mkdir build + cd build + call "%VCVARS_PATH%" + cmake -G "Ninja" -DCMAKE_TOOLCHAIN_FILE="C:\vcpkg\scripts\buildsystems\vcpkg.cmake" -DVCPKG_TARGET_TRIPLET=%VCPKG_TRIPLET% -DCMAKE_BUILD_TYPE=RelWithDebInfo -DCMAKE_C_COMPILER="%COMPILER_PATH%" -DCMAKE_CXX_COMPILER="%COMPILER_PATH%" -DBUILD_NUMBER=%BUILD_NUMBER% .. + cmake --build . + mkdir installers + vpnsetup /SFXMODE:vpnclient /SFXOUT:"installers\softether-vpnclient-%VERSION%.%BUILD_NUMBER%.%ARCHITECTURE%.exe" + vpnsetup /SFXMODE:vpnserver_vpnbridge /SFXOUT:"installers\softether-vpnserver_vpnbridge-%VERSION%.%BUILD_NUMBER%.%ARCHITECTURE%.exe" + shell: cmd - name: Test shell: powershell run: | From c838ba0009a2419e81f75f9f3ce2ebd6f0bfe57e Mon Sep 17 00:00:00 2001 From: Ilia Shipitsin Date: Tue, 16 Apr 2024 22:26:51 +0200 Subject: [PATCH 52/63] CI: create windows installer on release --- .github/workflows/windows_release.yml | 94 +++++++++++++++++++++++++++ 1 file changed, 94 insertions(+) create mode 100644 .github/workflows/windows_release.yml diff --git a/.github/workflows/windows_release.yml b/.github/workflows/windows_release.yml new file mode 100644 index 00000000..d9198934 --- /dev/null +++ b/.github/workflows/windows_release.yml @@ -0,0 +1,94 @@ +name: "Release" + +on: + push: + tags: + - '*' + +concurrency: + group: "${{ github.workflow }}-${{ github.ref }}" + cancel-in-progress: true + +permissions: + contents: write + +jobs: + release: + runs-on: windows-latest + outputs: + upload_url: "${{ steps.create_release.outputs.upload_url }}" + steps: + - name: "Checkout repository" + uses: actions/checkout@v4 + + - name: "Create GitHub release" + id: create_release + uses: softprops/action-gh-release@v1 + build-windows: + name: ${{ matrix.platform.ARCHITECTURE }} + runs-on: windows-latest + needs: ["release"] + strategy: + matrix: + platform: [ + { ARCHITECTURE: x86, COMPILER_PATH: "C:/Program Files/Microsoft Visual Studio/2022/Enterprise/VC/Tools/Llvm/bin/clang-cl.exe", VCPKG_TRIPLET: "x86-windows-static", VCVARS_PATH: "C:/Program Files/Microsoft Visual Studio/2022/Enterprise/VC/Auxiliary/Build/vcvars32.bat"}, + { ARCHITECTURE: x64, COMPILER_PATH: "C:/Program Files/Microsoft Visual Studio/2022/Enterprise/VC/Tools/Llvm/x64/bin/clang-cl.exe", VCPKG_TRIPLET: "x64-windows-static", VCVARS_PATH: "C:/Program Files/Microsoft Visual Studio/2022/Enterprise/VC/Auxiliary/Build/vcvars64.bat"} + ] + steps: + - name: "Checkout repository" + uses: actions/checkout@v4 + with: + submodules: true + - name: Cache vcpkg + uses: actions/cache@v4 + with: + path: 'build/vcpkg_installed/' + key: vcpkg-release-${{ matrix.platform.VCPKG_TRIPLET }} + - name: Set version variables + run: | + $b=(Get-Content CMakeSettings.json | Out-String | ConvertFrom-Json).environments.BuildNumber + echo "BUILD_NUMBER=$b" | Out-File -FilePath $Env:GITHUB_ENV -Encoding utf8 -Append + $v = python version.py + echo "VERSION=$v" | Out-File -FilePath $Env:GITHUB_ENV -Encoding utf8 -Append + shell: pwsh + - name: Build + env: + ARCHITECTURE: ${{ matrix.platform.ARCHITECTURE }} + COMPILER_PATH: ${{ matrix.platform.COMPILER_PATH }} + VCPKG_TRIPLET: ${{ matrix.platform.VCPKG_TRIPLET }} + VCVARS_PATH: ${{ matrix.platform.VCVARS_PATH }} + run: | + mkdir build + cd build + call "%VCVARS_PATH%" + cmake -G "Ninja" -DCMAKE_TOOLCHAIN_FILE="C:\vcpkg\scripts\buildsystems\vcpkg.cmake" -DVCPKG_TARGET_TRIPLET=%VCPKG_TRIPLET% -DCMAKE_BUILD_TYPE=RelWithDebInfo -DCMAKE_C_COMPILER="%COMPILER_PATH%" -DCMAKE_CXX_COMPILER="%COMPILER_PATH%" -DBUILD_NUMBER=%BUILD_NUMBER% .. + cmake --build . + mkdir installers + vpnsetup /SFXMODE:vpnclient /SFXOUT:"installers\softether-vpnclient-%VERSION%.%BUILD_NUMBER%.%ARCHITECTURE%.exe" + vpnsetup /SFXMODE:vpnserver_vpnbridge /SFXOUT:"installers\softether-vpnserver_vpnbridge-%VERSION%.%BUILD_NUMBER%.%ARCHITECTURE%.exe" + shell: cmd + + - name: dir + run: | + Get-ChildItem -Recurse build/installers + shell: pwsh + + - name: "Upload softether-vpnclient" + uses: actions/upload-release-asset@v1 + env: + GITHUB_TOKEN: "${{ github.token }}" + with: + upload_url: "${{ needs.release.outputs.upload_url }}" + asset_path: "build/installers/softether-vpnclient-${{ env.VERSION }}.${{ env.BUILD_NUMBER }}.${{ matrix.platform.ARCHITECTURE }}.exe" + asset_name: "softether-vpnclient-${{ env.VERSION }}.${{ env.BUILD_NUMBER }}.${{ matrix.platform.ARCHITECTURE }}.exe" + asset_content_type: "application/octet-stream" + - name: "Upload softether-vpnserver_vpnbridge" + uses: actions/upload-release-asset@v1 + env: + GITHUB_TOKEN: "${{ github.token }}" + with: + upload_url: "${{ needs.release.outputs.upload_url }}" + asset_path: "build/installers/softether-vpnserver_vpnbridge-${{ env.VERSION }}.${{ env.BUILD_NUMBER }}.${{ matrix.platform.ARCHITECTURE }}.exe" + asset_name: "softether-vpnserver_vpnbridge-${{ env.VERSION }}.${{ env.BUILD_NUMBER }}.${{ matrix.platform.ARCHITECTURE }}.exe" + asset_content_type: "application/octet-stream" + From 5ee8e3f00c20a5557ea3db78a4534f4a6dc0403d Mon Sep 17 00:00:00 2001 From: Ilia Shipitsin Date: Wed, 17 Apr 2024 09:10:07 +0200 Subject: [PATCH 53/63] CI: cleanup azure pipeline helpers --- .ci/azure-pipelines/linux_build.sh | 15 --------------- .ci/azure-pipelines/macos_build.sh | 13 ------------- 2 files changed, 28 deletions(-) delete mode 100755 .ci/azure-pipelines/linux_build.sh delete mode 100755 .ci/azure-pipelines/macos_build.sh diff --git a/.ci/azure-pipelines/linux_build.sh b/.ci/azure-pipelines/linux_build.sh deleted file mode 100755 index 87537491..00000000 --- a/.ci/azure-pipelines/linux_build.sh +++ /dev/null @@ -1,15 +0,0 @@ -#!/bin/bash - -if [[ "${#SE_BUILD_NUMBER_TOKEN}" -eq 64 ]]; then - VERSION=$(python3 "version.py") - BUILD_NUMBER=$(curl "https://softether.network/get-build-number?commit=${BUILD_SOURCEVERSION}&version=${VERSION}&token=${SE_BUILD_NUMBER_TOKEN}") -else - BUILD_NUMBER=0 -fi - -cd ${BUILD_BINARIESDIRECTORY} - -cmake -G "Ninja" -DCMAKE_BUILD_TYPE=RelWithDebInfo -DBUILD_NUMBER=${BUILD_NUMBER} ${BUILD_SOURCESDIRECTORY} -cmake --build . - -cpack -C Release -G DEB diff --git a/.ci/azure-pipelines/macos_build.sh b/.ci/azure-pipelines/macos_build.sh deleted file mode 100755 index a7418e74..00000000 --- a/.ci/azure-pipelines/macos_build.sh +++ /dev/null @@ -1,13 +0,0 @@ -#!/bin/bash - -if [[ "${#SE_BUILD_NUMBER_TOKEN}" -eq 64 ]]; then - VERSION=$(python3 "version.py") - BUILD_NUMBER=$(curl "https://softether.network/get-build-number?commit=${BUILD_SOURCEVERSION}&version=${VERSION}&token=${SE_BUILD_NUMBER_TOKEN}") -else - BUILD_NUMBER=0 -fi - -cd ${BUILD_BINARIESDIRECTORY} - -cmake -G "Ninja" -DCMAKE_BUILD_TYPE=RelWithDebInfo -DBUILD_NUMBER=${BUILD_NUMBER} -DOPENSSL_ROOT_DIR="/usr/local/opt/openssl" ${BUILD_SOURCESDIRECTORY} -cmake --build . From 831905d281a7539df863044b8ef12ddfdc2ac935 Mon Sep 17 00:00:00 2001 From: Ilia Shipitsin Date: Wed, 17 Apr 2024 09:18:00 +0200 Subject: [PATCH 54/63] doc: remove badges of deprecated CI --- README.md | 2 -- 1 file changed, 2 deletions(-) diff --git a/README.md b/README.md index bf2ae5d6..5cab02e2 100644 --- a/README.md +++ b/README.md @@ -2,10 +2,8 @@ ||Badges| |---|---| -|AppVeyor|[![AppVeyor build status](https://ci.appveyor.com/api/projects/status/github/softethervpn/softethervpn?branch=master&svg=true)](https://ci.appveyor.com/project/softethervpn/softethervpn) | |GitLab CI|[![GitLab CI build status](https://gitlab.com/SoftEther/SoftEtherVPN/badges/master/pipeline.svg)](https://gitlab.com/SoftEther/SoftEtherVPN/pipelines)| |Coverity Scan|[![Coverity Scan build status](https://scan.coverity.com/projects/16304/badge.svg)](https://scan.coverity.com/projects/softethervpn-softethervpn)| -|Azure Pipelines|[![Azure Pipelines build status for Nightly](https://dev.azure.com/SoftEther-VPN/SoftEther%20VPN/_apis/build/status/6?api-version=6.0-preview.1)](https://dev.azure.com/SoftEther-VPN/SoftEther%20VPN/_build?definitionId=6)| |Cirrus CI|[![Cirrus CI build status](https://api.cirrus-ci.com/github/SoftEtherVPN/SoftEtherVPN.svg)](https://cirrus-ci.com/github/SoftEtherVPN/SoftEtherVPN)| - [SoftEther VPN](#softether-vpn) From 071a87297b49475dda1e2b160ef7f01d8d2eade9 Mon Sep 17 00:00:00 2001 From: Ilia Shipitsin Date: Wed, 17 Apr 2024 13:20:04 +0200 Subject: [PATCH 55/63] bump version for upcoming 5184 release --- CMakeLists.txt | 2 +- CMakeSettings.json | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/CMakeLists.txt b/CMakeLists.txt index 88278a43..80ecd5d3 100644 --- a/CMakeLists.txt +++ b/CMakeLists.txt @@ -3,7 +3,7 @@ cmake_minimum_required(VERSION 3.10) set(BUILD_NUMBER CACHE STRING "The number of the current build.") if ("${BUILD_NUMBER}" STREQUAL "") - set(BUILD_NUMBER "5183") + set(BUILD_NUMBER "5184") endif() if (BUILD_NUMBER LESS 5180) diff --git a/CMakeSettings.json b/CMakeSettings.json index 22cda99d..2d05d087 100644 --- a/CMakeSettings.json +++ b/CMakeSettings.json @@ -1,5 +1,5 @@ { - "environments": [ { "BuildNumber": "5183" } ], + "environments": [ { "BuildNumber": "5184" } ], "configurations": [ { "name": "x64-native", From f8c5fa53843d0f15d6146d46f203e10bc1ac28ca Mon Sep 17 00:00:00 2001 From: panakuma Date: Sat, 20 Apr 2024 00:48:24 +0900 Subject: [PATCH 56/63] Change var of CMAKE_INSTALL_RPATH --- CMakeLists.txt | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/CMakeLists.txt b/CMakeLists.txt index 80ecd5d3..60e4d50d 100644 --- a/CMakeLists.txt +++ b/CMakeLists.txt @@ -53,7 +53,7 @@ if(UNIX) # # use rpath for locating installed libraries # - set(CMAKE_INSTALL_RPATH "${CMAKE_INSTALL_PREFIX}/lib") + set(CMAKE_INSTALL_RPATH "${CMAKE_INSTALL_PREFIX}/${CMAKE_INSTALL_LIBDIR}") set(CMAKE_INSTALL_RPATH_USE_LINK_PATH TRUE) include(CheckIncludeFile) From 7f074d0c0b6a06c637bf4508cf832ed0e5b8b07c Mon Sep 17 00:00:00 2001 From: hiura Date: Fri, 26 Apr 2024 12:42:27 +0900 Subject: [PATCH 57/63] Fix Virtual DHCP Server: Correct HDCP Sequence --- src/Cedar/Virtual.c | 58 ++++++++++++++++++++++++--------------------- 1 file changed, 31 insertions(+), 27 deletions(-) diff --git a/src/Cedar/Virtual.c b/src/Cedar/Virtual.c index c9cb0fd6..4fe0c84f 100644 --- a/src/Cedar/Virtual.c +++ b/src/Cedar/Virtual.c @@ -9710,36 +9710,40 @@ void VirtualDhcpServer(VH *v, PKT *p) } else { - // There is no IP address that can be provided - DHCP_OPTION_LIST ret; - LIST *o; - Zero(&ret, sizeof(ret)); - - ret.Opcode = DHCP_NACK; - ret.ServerAddress = v->HostIP; - StrCpy(ret.DomainName, sizeof(ret.DomainName), v->DhcpDomain); - ret.SubnetMask = v->DhcpMask; - - // Build the DHCP option - o = BuildDhcpOption(&ret); - if (o != NULL) + // Reply of DHCP_REQUEST must be either DHCP_ACK or DHCP_NAK. + if (opt->Opcode == DHCP_REQUEST) { - BUF *b = BuildDhcpOptionsBuf(o); - if (b != NULL) - { - UINT dest_ip = p->L3.IPv4Header->SrcIP; - if (dest_ip == 0) - { - dest_ip = 0xffffffff; - } - // Transmission - VirtualDhcpSend(v, tran_id, dest_ip, Endian16(p->L4.UDPHeader->SrcPort), - ip, dhcp->ClientMacAddress, b, dhcp->HardwareType, dhcp->HardwareAddressSize); + // There is no IP address that can be provided + DHCP_OPTION_LIST ret; + LIST *o; + Zero(&ret, sizeof(ret)); - // Release the memory - FreeBuf(b); + ret.Opcode = DHCP_NACK; + ret.ServerAddress = v->HostIP; + StrCpy(ret.DomainName, sizeof(ret.DomainName), v->DhcpDomain); + ret.SubnetMask = v->DhcpMask; + + // Build the DHCP option + o = BuildDhcpOption(&ret); + if (o != NULL) + { + BUF *b = BuildDhcpOptionsBuf(o); + if (b != NULL) + { + UINT dest_ip = p->L3.IPv4Header->SrcIP; + if (dest_ip == 0) + { + dest_ip = 0xffffffff; + } + // Transmission + VirtualDhcpSend(v, tran_id, dest_ip, Endian16(p->L4.UDPHeader->SrcPort), + ip, dhcp->ClientMacAddress, b, dhcp->HardwareType, dhcp->HardwareAddressSize); + + // Release the memory + FreeBuf(b); + } + FreeDhcpOptions(o); } - FreeDhcpOptions(o); } } } From c9b5e25c8733dfc208782b685408a8ce8e66b911 Mon Sep 17 00:00:00 2001 From: Evengard Date: Sat, 27 Apr 2024 02:01:48 +0300 Subject: [PATCH 58/63] Fix memory access error when IPv6 prefix reading, should resolve #1972 --- src/Cedar/IPC.c | 11 +++++++++-- 1 file changed, 9 insertions(+), 2 deletions(-) diff --git a/src/Cedar/IPC.c b/src/Cedar/IPC.c index 85e58a7f..6d408069 100644 --- a/src/Cedar/IPC.c +++ b/src/Cedar/IPC.c @@ -2354,7 +2354,14 @@ void IPCIPv6AddRouterPrefixes(IPC *ipc, ICMPV6_OPTION_LIST *recvPrefix, UCHAR *m IntToSubnetMask6(&newRA->RoutedMask, recvPrefix->Prefix[i]->SubnetLength); CopyIP(&newRA->RouterAddress, ip); Copy(newRA->RouterMacAddress, macAddress, 6); - Copy(newRA->RouterLinkLayerAddress, recvPrefix->SourceLinkLayer->Address, 6); + if (recvPrefix->SourceLinkLayer != NULL) + { + Copy(newRA->RouterLinkLayerAddress, recvPrefix->SourceLinkLayer->Address, 6); + } + else + { + Zero(newRA->RouterLinkLayerAddress, 6); + } Add(ipc->IPv6RouterAdvs, newRA); } } @@ -2657,7 +2664,7 @@ void IPCIPv6SendUnicast(IPC *ipc, void *data, UINT size, IP *next_ip) } destMac = ra.RouterMacAddress; - if (!IsMacUnicast(destMac) && !IsMacInvalid(ra.RouterMacAddress)) + if (!IsMacUnicast(destMac) && !IsMacInvalid(ra.RouterLinkLayerAddress)) { destMac = ra.RouterLinkLayerAddress; } From d568cc172771a1f6399c954d63d0e17655081f6d Mon Sep 17 00:00:00 2001 From: Evengard Date: Sat, 27 Apr 2024 21:57:36 +0300 Subject: [PATCH 59/63] Fix another memory access error again because of a missing MAC address in IPv6 headers --- src/Cedar/IPC.c | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/src/Cedar/IPC.c b/src/Cedar/IPC.c index 6d408069..6cfc8369 100644 --- a/src/Cedar/IPC.c +++ b/src/Cedar/IPC.c @@ -1517,7 +1517,9 @@ void IPCProcessL3EventsEx(IPC *ipc, UINT64 now) // We save the router advertisement data for later use IPCIPv6AddRouterPrefixes(ipc, &p->ICMPv6HeaderPacketInfo.OptionList, src_mac, &ip_src); IPCIPv6AssociateOnNDTEx(ipc, &ip_src, src_mac, true); - IPCIPv6AssociateOnNDTEx(ipc, &ip_src, p->ICMPv6HeaderPacketInfo.OptionList.SourceLinkLayer->Address, true); + if (p->ICMPv6HeaderPacketInfo.OptionList.SourceLinkLayer != NULL) { + IPCIPv6AssociateOnNDTEx(ipc, &ip_src, p->ICMPv6HeaderPacketInfo.OptionList.SourceLinkLayer->Address, true); + } ndtProcessed = true; header_size = sizeof(ICMPV6_ROUTER_ADVERTISEMENT_HEADER); break; From 6e5395cc8d0262fa2bb1d44116cac80b32f34cf9 Mon Sep 17 00:00:00 2001 From: hiura Date: Fri, 3 May 2024 17:18:13 +0900 Subject: [PATCH 60/63] Fix Virtual DHCP Server: Correct DHCP renewal request --- src/Cedar/Virtual.c | 69 ++++++++++++++++++++++++++++++++++++++++----- 1 file changed, 62 insertions(+), 7 deletions(-) diff --git a/src/Cedar/Virtual.c b/src/Cedar/Virtual.c index 4fe0c84f..fa2367dc 100644 --- a/src/Cedar/Virtual.c +++ b/src/Cedar/Virtual.c @@ -9340,20 +9340,75 @@ UINT ServeDhcpDiscoverEx(VH *v, UCHAR *mac, UINT request_ip, bool is_static_ip) return 0; } + UINT ret = 0; DHCP_LEASE *d = SearchDhcpLeaseByIp(v, request_ip); + if (d != NULL) { - // The requested IP address is used already - return 0; + // If an entry for the same IP address already exists, + // check whether it is a request from the same MAC address + if (Cmp(mac, d->MacAddress, 6) == 0) + { + // Examine whether the specified IP address is within the range of assignment + if (Endian32(v->DhcpIpStart) > Endian32(request_ip) || + Endian32(request_ip) > Endian32(v->DhcpIpEnd)) + { + // Accept if within the range + ret = request_ip; + } + } + else { + // Duplicated IPV4 address found. The DHCP server replies to DHCPREQUEST with DHCP NAK. + char ipstr[MAX_HOST_NAME_LEN + 1] = { 0 }; + char macstr[128] = { 0 }; + IPToStr32(ipstr, sizeof(ipstr), request_ip); + BinToStr(macstr, sizeof(macstr), d->MacAddress, 6); + Debug("Virtual DHC Server: Duplicated IP address detected. Static IP: %s, Used by MAC:%s\n", ipstr, macstr); + return ret; + } } - - // For static IP, the requested IP address must NOT be within the range of the DHCP pool - if (Endian32(request_ip) < Endian32(v->DhcpIpStart) || Endian32(request_ip) > Endian32(v->DhcpIpEnd)) + else { - return request_ip; + // Examine whether the specified IP address is within the range of assignment + if (Endian32(v->DhcpIpStart) > Endian32(request_ip) || + Endian32(request_ip) > Endian32(v->DhcpIpEnd)) + { + // Accept if within the range + ret = request_ip; + } + else + { + // Propose an IP in the range since it's a Discover although It is out of range + } + } + if (ret == 0) + { + // If there is any entry with the same MAC address + // that are already registered, use it with priority + DHCP_LEASE *d = SearchDhcpLeaseByMac(v, mac); + + if (d != NULL) + { + // Examine whether the found IP address is in the allocation region + if (Endian32(v->DhcpIpStart) > Endian32(d->IpAddress) || + Endian32(d->IpAddress) > Endian32(v->DhcpIpEnd)) + { + // Use the IP address if it's found within the range + ret = d->IpAddress; + } + } + } + if (ret == 0) + { + // For static IP, the requested IP address must NOT be within the range of the DHCP pool + if (Endian32(v->DhcpIpStart) > Endian32(request_ip) || + Endian32(request_ip) > Endian32(v->DhcpIpEnd)) + { + ret = request_ip; + } } - return 0; + return ret; } // Take an appropriate IP addresses that can be assigned newly From 37231ac0061649295e0a5b38666ac33c6389a888 Mon Sep 17 00:00:00 2001 From: Ilia Shipitsin Date: Sat, 4 May 2024 21:23:00 +0200 Subject: [PATCH 61/63] bump version for upcoming 5185 release --- CMakeLists.txt | 2 +- CMakeSettings.json | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/CMakeLists.txt b/CMakeLists.txt index 60e4d50d..a4d1d827 100644 --- a/CMakeLists.txt +++ b/CMakeLists.txt @@ -3,7 +3,7 @@ cmake_minimum_required(VERSION 3.10) set(BUILD_NUMBER CACHE STRING "The number of the current build.") if ("${BUILD_NUMBER}" STREQUAL "") - set(BUILD_NUMBER "5184") + set(BUILD_NUMBER "5185") endif() if (BUILD_NUMBER LESS 5180) diff --git a/CMakeSettings.json b/CMakeSettings.json index 2d05d087..b5d3b77e 100644 --- a/CMakeSettings.json +++ b/CMakeSettings.json @@ -1,5 +1,5 @@ { - "environments": [ { "BuildNumber": "5184" } ], + "environments": [ { "BuildNumber": "5185" } ], "configurations": [ { "name": "x64-native", From 186d48fba2722ab1ce9d5d38e92c44ba2e588f32 Mon Sep 17 00:00:00 2001 From: Ilia Shipitsin Date: Sat, 4 May 2024 21:25:39 +0200 Subject: [PATCH 62/63] CI: add macos-14 --- .github/workflows/macos.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/.github/workflows/macos.yml b/.github/workflows/macos.yml index dd58217a..621aee5f 100644 --- a/.github/workflows/macos.yml +++ b/.github/workflows/macos.yml @@ -7,7 +7,7 @@ jobs: build_and_test: strategy: matrix: - os: [macos-13, macos-12, macos-11] + os: [macos-14, macos-13, macos-12, macos-11] name: ${{ matrix.os }} runs-on: ${{ matrix.os }} steps: From 141060101d6fc11955ef91cb48fdd80ec51f3443 Mon Sep 17 00:00:00 2001 From: Ilia Shipitsin Date: Mon, 20 May 2024 21:50:07 +0200 Subject: [PATCH 63/63] CI: drop macos-11 more details: https://github.blog/changelog/2024-05-20-actions-upcoming-changes-to-github-hosted-macos-runners/ --- .github/workflows/macos.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/.github/workflows/macos.yml b/.github/workflows/macos.yml index 621aee5f..f6821b9b 100644 --- a/.github/workflows/macos.yml +++ b/.github/workflows/macos.yml @@ -7,7 +7,7 @@ jobs: build_and_test: strategy: matrix: - os: [macos-14, macos-13, macos-12, macos-11] + os: [macos-14, macos-13, macos-12] name: ${{ matrix.os }} runs-on: ${{ matrix.os }} steps: