File: //snap/google-cloud-cli/current/help/man/man1/gcloud_vmware_network-policies_create.1
.TH "GCLOUD_VMWARE_NETWORK\-POLICIES_CREATE" 1
.SH "NAME"
.HP
gcloud vmware network\-policies create \- create a VMware Engine network policy
.SH "SYNOPSIS"
.HP
\f5gcloud vmware network\-policies create\fR (\fINETWORK_POLICY\fR\ :\ \fB\-\-location\fR=\fILOCATION\fR) \fB\-\-edge\-services\-cidr\fR=\fIEDGE_SERVICES_CIDR\fR \fB\-\-vmware\-engine\-network\fR=\fIVMWARE_ENGINE_NETWORK\fR [\fB\-\-async\fR] [\fB\-\-description\fR=\fIDESCRIPTION\fR] [\fB\-\-external\-ip\-access\fR] [\fB\-\-internet\-access\fR] [\fIGCLOUD_WIDE_FLAG\ ...\fR]
.SH "DESCRIPTION"
Create a VMware Engine network policy. Only one network policy applies to a
VMware Engine network per region. Check the progress of a network policy
creation using \f5gcloud vmware network\-policies list\fR.
.SH "EXAMPLES"
To create a network policy called \f5my\-network\-policy\fR which connects to
the VMware Engine network \f5my\-vmware\-engine\-network\fR using the edge
services address range \f5192.168.0.0/26\fR with the internet access service
enabled and the external IP access service disabled, run:
.RS 2m
$ gcloud vmware network\-policies create my\-network\-policy \e
\-\-location=us\-west2 \-\-project=my\-project \e
\-\-vmware\-engine\-network=my\-vmware\-engine\-network \e
\-\-edge\-services\-cidr=192.168.0.0/26 \-\-internet\-access \e
\-\-no\-external\-ip\-access
.RE
Or:
.RS 2m
$ gcloud vmware network\-policies create my\-network\-policy \e
\-\-vmware\-engine\-network=my\-vmware\-engine\-network \e
\-\-edge\-services\-cidr=192.168.0.0/26 \-\-internet\-access
.RE
In the second example, the project and the location are taken from gcloud
properties core/project and compute/region respectively. If the
\f5\-\-external\-ip\-access\fR flag is not specified, it is taken as
\f5False\fR.
.SH "POSITIONAL ARGUMENTS"
.RS 2m
.TP 2m
VMware Engine Network Policy resource \- network_policy. The arguments in this
group can be used to specify the attributes of this resource. (NOTE) Some
attributes are not given arguments in this group but can be set in other ways.
To set the \f5project\fR attribute:
.RS 2m
.IP "\(em" 2m
provide the argument \f5network_policy\fR on the command line with a fully
specified name;
.IP "\(em" 2m
provide the argument \f5\-\-project\fR on the command line;
.IP "\(em" 2m
set the property \f5core/project\fR.
.RE
.sp
This must be specified.
.RS 2m
.TP 2m
\fINETWORK_POLICY\fR
ID of the VMware Engine Network Policy or fully qualified identifier for the
VMware Engine Network Policy.
To set the \f5network\-policy\fR attribute:
.RS 2m
.IP "\(bu" 2m
provide the argument \f5network_policy\fR on the command line.
.RE
.sp
This positional argument must be specified if any of the other arguments in this
group are specified.
.TP 2m
\fB\-\-location\fR=\fILOCATION\fR
The resource name of the location.
To set the \f5location\fR attribute:
.RS 2m
.IP "\(bu" 2m
provide the argument \f5network_policy\fR on the command line with a fully
specified name;
.IP "\(bu" 2m
provide the argument \f5\-\-location\fR on the command line;
.IP "\(bu" 2m
set the property \f5compute/region\fR.
.RE
.sp
.RE
.RE
.sp
.SH "REQUIRED FLAGS"
.RS 2m
.TP 2m
\fB\-\-edge\-services\-cidr\fR=\fIEDGE_SERVICES_CIDR\fR
IP address range to use for internet access and external IP access gateways, in
CIDR notation. An RFC 1918 CIDR block with a "/26" prefix is required.
.TP 2m
\fB\-\-vmware\-engine\-network\fR=\fIVMWARE_ENGINE_NETWORK\fR
Resource ID of the VMware Engine network to attach the new policy to.
.RE
.sp
.SH "OPTIONAL FLAGS"
.RS 2m
.TP 2m
\fB\-\-async\fR
Return immediately, without waiting for the operation in progress to complete.
The default is \fBTrue\fR. Enabled by default, use \fB\-\-no\-async\fR to
disable.
.TP 2m
\fB\-\-description\fR=\fIDESCRIPTION\fR
User\-provided description of the network policy.
.TP 2m
\fB\-\-external\-ip\-access\fR
Enable or disable network service that allows external IP addresses to be
assigned to VMware workloads. To enable this service, \f5internet\-access\fR
must also be enabled. Use \f5\-\-no\-external\-ip\-access\fR to disable. If the
flag is not provided, access to VMware workloads through external IP addresses
is disabled.
.TP 2m
\fB\-\-internet\-access\fR
Enable or disable network service that allows VMware workloads to access the
internet. Use \f5\-\-no\-internet\-access\fR to disable. If the flag is not
provided, internet access is disabled.
.RE
.sp
.SH "GCLOUD WIDE FLAGS"
These flags are available to all commands: \-\-access\-token\-file, \-\-account,
\-\-billing\-project, \-\-configuration, \-\-flags\-file, \-\-flatten,
\-\-format, \-\-help, \-\-impersonate\-service\-account, \-\-log\-http,
\-\-project, \-\-quiet, \-\-trace\-token, \-\-user\-output\-enabled,
\-\-verbosity.
Run \fB$ gcloud help\fR for details.