InlineExternalNetwork2
{
"networkBackings": {
"values": [
{
"backingId": "string",
"backingType": {},
"backingTypeValue": "string",
"networkProvider": {
"name": "string",
"id": "string"
},
"name": "string",
"isNsxTVlanSegment": false,
"parentTier0Ref": {
"id": "2a4ba9ad-e8d5-409c-8cae-c06910cd9b47",
"name": "string",
"type": "string"
}
}
]
},
"totalIpCount": 0,
"usedIpCount": 0,
"dedicatedOrg": {
"name": "string",
"id": "string"
},
"dedicatedEdgeGateway": {
"name": "string",
"id": "string"
},
"usingIpSpace": false,
"networkRouteAdvertisementIntention": "string",
"natAndFirewallServiceIntention": "string",
"vpnServiceIntention": "string",
"strictIpMode": false
}
The number of IP addresses defined by the static ip pools. If the network contains any IpV6 subnets, the total ip count will be null.
The number of IP address used from the static ip pools.
Indicates whether the external network is using IP Spaces or not. This field is applicable only to the external networks backed by NSX-T Tier-0 router (i.e. Provider Gateway). If unset, the value defaults to false.
The different types of route advertisement intentions for routed Org vDC network connected to Edge Gateway that is connected to this Provider Gateway. Possible values are:
- IP_SPACE_UPLINKS_ADVERTISED_STRICT - All networks within IP Space associated with IP Space Uplink will be advertised by default. This can be changed on an individual network level later, if necessary. All other networks outside of IP Spaces associated with IP Space Uplinks cannot be configured to be advertised.
- IP_SPACE_UPLINKS_ADVERTISED_FLEXIBLE - All networks within IP Space associated with IP Space Uplink will be advertised by default. This can be changed on an individual network level later, if necessary. All other networks outside of IP Spaces associated with IP Space Uplinks are not advertised by default but can be configured to be advertised after creation.
- ALL_NETWORKS_ADVERTISED - All networks, regardless on whether they fall inside of any IP Spaces associated with IP Space Uplinks, will be advertised by default. This can be changed on an individual network level later, if necessary.
The different types of intentions to configure NAT and firewall rules:
- PROVIDER_GATEWAY - Allow management of NAT and firewall rules only on Provider Gateways.
- EDGE_GATEWAY - Allow management of NAT and firewall rules only on Edge Gateways.
- PROVIDER_AND_EDGE_GATEWAY - Allow management of NAT and firewall rules on both the Provider and Edge gateways.
The different types of intentions to configure IPSec VPN Tunnels:
- PROVIDER_GATEWAY - Allow management of IPSec VPN Tunnels only on Provider Gateways. L2 VPN will not be manageable on connected Edge Gateways, as L2 VPN is not currently supported for Provider Gateways.
- EDGE_GATEWAY - Allow management of IPSec and L2 VPN Tunnels only on Edge Gateways.
- PROVIDER_AND_EDGE_GATEWAY - Allow management of IPSec VPN Tunnels on both the Provider and Edge Gateways, and L2 VPN on Edge Gateways.
When set to true, static manual IPs must come from static IP Pools defined for the network. Can only be activated when all static manual IPs fall within allocated ranges. This only applies to external networks backed by NSX-T Segments.