InlineExternalNetwork2
{
"networkBackings": {
"values": [
{
"backingId": "string",
"backingTypeValue": "string",
"networkProvider": {
"name": "string",
"id": "string"
},
"name": "string",
"isNsxTVlanSegment": false,
"parentTier0Ref": {
"id": "2a4ba9ad-e8d5-409c-8cae-c06910cd9b47",
"name": "string",
"type": "string"
}
}
]
},
"totalIpCount": 0,
"usedIpCount": 0,
"dedicatedOrg": {
"name": "string",
"id": "string"
},
"dedicatedEdgeGateway": {
"name": "string",
"id": "string"
},
"usingIpSpace": false,
"networkRouteAdvertisementIntention": "string",
"natAndFirewallServiceIntention": "string"
}
The number of IP addresses defined by the static ip pools. If the network contains any IpV6 subnets, the total ip count will be null.
The number of IP address used from the static ip pools.
Indicates whether the external network is using IP Spaces or not. This field is applicable only to the external networks backed by NSX-T Tier-0 router (i.e. Provider Gateway). If unset, the value defaults to false.
The different types of route advertisement intentions for routed Org vDC network connected to Edge Gateway that is connected to this Provider Gateway. Possible values are:
- IP_SPACE_UPLINKS_ADVERTISED_STRICT - All networks within IP Space associated with IP Space Uplink will be advertised by default. This can be changed on an individual network level later, if necessary. All other networks outside of IP Spaces associated with IP Space Uplinks cannot be configured to be advertised.
- IP_SPACE_UPLINKS_ADVERTISED_FLEXIBLE - All networks within IP Space associated with IP Space Uplink will be advertised by default. This can be changed on an individual network level later, if necessary. All other networks outside of IP Spaces associated with IP Space Uplinks are not advertised by default but can be configured to be advertised after creation.
- ALL_NETWORKS_ADVERTISED - All networks, regardless on whether they fall inside of any IP Spaces associated with IP Space Uplinks, will be advertised by default. This can be changed on an individual network level later, if necessary.
The different types of intentions to configure NAT and firewall rules:
- PROVIDER_GATEWAY - Allow management of NAT and firewall rules only on Provider Gateways.
- EDGE_GATEWAY - Allow management of NAT and firewall rules only on Edge Gateways.
- PROVIDER_AND_EDGE_GATEWAY - Allow management of NAT and firewall rules on both the Provider and Edge gateways.