InlineExternalNetwork2

InlineExternalNetwork2
InlineExternalNetwork2
JSON Example
{
    "networkBackings": {
        "values": [
            {
                "backingId": "string",
                "backingType": {},
                "backingTypeValue": "string",
                "networkProvider": {
                    "name": "string",
                    "id": "string"
                },
                "name": "string",
                "isNsxTVlanSegment": false,
                "parentTier0Ref": {
                    "id": "2a4ba9ad-e8d5-409c-8cae-c06910cd9b47",
                    "name": "string",
                    "type": "string"
                }
            }
        ]
    },
    "totalIpCount": 0,
    "usedIpCount": 0,
    "dedicatedOrg": {
        "name": "string",
        "id": "string"
    },
    "dedicatedEdgeGateway": {
        "name": "string",
        "id": "string"
    },
    "usingIpSpace": false,
    "networkRouteAdvertisementIntention": "string",
    "natAndFirewallServiceIntention": "string",
    "vpnServiceIntention": "string",
    "strictIpMode": false
}
networkBackings
Optional

List of External Network backings.

integer
totalIpCount
Optional

The number of IP addresses defined by the static ip pools. If the network contains any IpV6 subnets, the total ip count will be null.

integer
usedIpCount
Optional

The number of IP address used from the static ip pools.

dedicatedOrg
Optional

Entity reference used to describe VCD entities

dedicatedEdgeGateway
Optional

Entity reference used to describe VCD entities

boolean
usingIpSpace
Optional

Indicates whether the external network is using IP Spaces or not. This field is applicable only to the external networks backed by NSX-T Tier-0 router (i.e. Provider Gateway). If unset, the value defaults to false.

string
networkRouteAdvertisementIntention
Optional

The different types of route advertisement intentions for routed Org vDC network connected to Edge Gateway that is connected to this Provider Gateway. Possible values are:

  • IP_SPACE_UPLINKS_ADVERTISED_STRICT - All networks within IP Space associated with IP Space Uplink will be advertised by default. This can be changed on an individual network level later, if necessary. All other networks outside of IP Spaces associated with IP Space Uplinks cannot be configured to be advertised.
  • IP_SPACE_UPLINKS_ADVERTISED_FLEXIBLE - All networks within IP Space associated with IP Space Uplink will be advertised by default. This can be changed on an individual network level later, if necessary. All other networks outside of IP Spaces associated with IP Space Uplinks are not advertised by default but can be configured to be advertised after creation.
  • ALL_NETWORKS_ADVERTISED - All networks, regardless on whether they fall inside of any IP Spaces associated with IP Space Uplinks, will be advertised by default. This can be changed on an individual network level later, if necessary.
This only applies to external networks backed by NSX-T Tier-0 router (i.e. Provider Gateway) and is unset otherwise. Public Provider Gateway supports only IP_SPACE_UPLINKS_ADVERTISED_STRICT. All other values are ignored. Private Provider Gateway can support all the intentions and if unset, the default is also IP_SPACE_UPLINKS_ADVERTISED_STRICT.
string
natAndFirewallServiceIntention
Optional

The different types of intentions to configure NAT and firewall rules:

  • PROVIDER_GATEWAY - Allow management of NAT and firewall rules only on Provider Gateways.
  • EDGE_GATEWAY - Allow management of NAT and firewall rules only on Edge Gateways.
  • PROVIDER_AND_EDGE_GATEWAY - Allow management of NAT and firewall rules on both the Provider and Edge gateways.
This only applies to external networks backed by NSX-T Tier-0 routers (i.e. Provider Gateways) and is unset otherwise. A public Provider Gateway supports only the EDGE_GATEWAY intention. All other values are ignored. Private Provider Gateway can support all the intentions and if unset, the default is EDGE_GATEWAY.
string
vpnServiceIntention
Optional

The different types of intentions to configure IPSec VPN Tunnels:

  • PROVIDER_GATEWAY - Allow management of IPSec VPN Tunnels only on Provider Gateways. L2 VPN will not be manageable on connected Edge Gateways, as L2 VPN is not currently supported for Provider Gateways.
  • EDGE_GATEWAY - Allow management of IPSec and L2 VPN Tunnels only on Edge Gateways.
  • PROVIDER_AND_EDGE_GATEWAY - Allow management of IPSec VPN Tunnels on both the Provider and Edge Gateways, and L2 VPN on Edge Gateways.
This only applies to external networks backed by NSX-T Tier-0 routers (i.e. Provider Gateways) and is unset otherwise. A public Provider Gateway supports only the EDGE_GATEWAY intention. All other values are ignored. Private Provider Gateway can support all the intentions and if unset, the default is EDGE_GATEWAY.
boolean
strictIpMode
Optional

When set to true, static manual IPs must come from static IP Pools defined for the network. Can only be activated when all static manual IPs fall within allocated ranges. This only applies to external networks backed by NSX-T Segments.