Get desktop application:
View/edit binary Protocol Buffers messages
Details of the final state "abort" and associated resource.
Used in:
Causes that the analysis is aborted.
URI of the resource that caused the abort.
List of project IDs that the user has specified in the request but does not have permission to access network configs. Analysis is aborted in this case with the PERMISSION_DENIED cause.
Abort cause types:
Used in:
Cause is unspecified.
Aborted due to unknown network. The reachability analysis cannot proceed because the user does not have access to the host project's network configurations, including firewall rules and routes. This happens when the project is a service project and the endpoints being traced are in the host project's network.
Aborted because the IP address(es) are unknown.
Aborted because no project information can be derived from the test input.
Aborted because the user lacks the permission to access all or part of the network configurations required to run the test.
Aborted because no valid source endpoint is derived from the input test request.
Aborted because the source and/or destination endpoint specified in the test are invalid. The possible reasons that an endpoint is invalid include: malformed IP address; nonexistent instance or network URI; IP address not in the range of specified network URI; and instance not owning the network interface in the specified network.
Aborted because traffic is sent from a public IP to an instance without an external IP.
Aborted because none of the traces matches destination information specified in the input test request.
Aborted because the number of steps in the trace exceeding a certain limit which may be caused by routing loop.
Aborted due to internal server error.
Aborted because the source endpoint could not be found.
Aborted because the source network does not match the source endpoint.
Aborted because the destination endpoint could not be found.
Aborted because the destination network does not match the destination endpoint.
Aborted because the test scenario is not supported.
Aborted because the source and destination resources have no common IP version.
Aborted because the connection between the control plane and the node of the source cluster is initiated by the node and managed by the Konnectivity proxy.
Aborted because expected resource configuration was missing.
For display only. Metadata associated with an App Engine version.
Used in:
Name of an App Engine version.
URI of an App Engine version.
Runtime of the App Engine version.
App Engine execution environment for a version.
For display only. Metadata associated with a Cloud Function.
Used in:
Name of a Cloud Function.
URI of a Cloud Function.
Location in which the Cloud Function is deployed.
Latest successfully deployed version id of the Cloud Function.
For display only. Metadata associated with a Cloud Run revision.
Used in:
Name of a Cloud Run revision.
URI of a Cloud Run revision.
Location in which this revision is deployed.
URI of Cloud Run service this revision belongs to.
For display only. Metadata associated with a Cloud SQL instance.
Used in:
Name of a Cloud SQL instance.
URI of a Cloud SQL instance.
URI of a Cloud SQL instance network or empty string if the instance does not have one.
Internal IP address of a Cloud SQL instance.
External IP address of a Cloud SQL instance.
Region in which the Cloud SQL instance is running.
A Connectivity Test for a network reachability analysis.
Used in:
Required. Unique name of the resource using the form: `projects/{project_id}/locations/global/connectivityTests/{test_id}`
The user-supplied description of the Connectivity Test. Maximum of 512 characters.
Required. Source specification of the Connectivity Test. You can use a combination of source IP address, virtual machine (VM) instance, or Compute Engine network to uniquely identify the source location. Examples: If the source IP address is an internal IP address within a Google Cloud Virtual Private Cloud (VPC) network, then you must also specify the VPC network. Otherwise, specify the VM instance, which already contains its internal IP address and VPC network information. If the source of the test is within an on-premises network, then you must provide the destination VPC network. If the source endpoint is a Compute Engine VM instance with multiple network interfaces, the instance itself is not sufficient to identify the endpoint. So, you must also specify the source IP address or VPC network. A reachability analysis proceeds even if the source location is ambiguous. However, the test result may include endpoints that you don't intend to test.
Required. Destination specification of the Connectivity Test. You can use a combination of destination IP address, Compute Engine VM instance, or VPC network to uniquely identify the destination location. Even if the destination IP address is not unique, the source IP location is unique. Usually, the analysis can infer the destination endpoint from route information. If the destination you specify is a VM instance and the instance has multiple network interfaces, then you must also specify either a destination IP address or VPC network to identify the destination interface. A reachability analysis proceeds even if the destination location is ambiguous. However, the result can include endpoints that you don't intend to test.
IP Protocol of the test. When not provided, "TCP" is assumed.
Other projects that may be relevant for reachability analysis. This is applicable to scenarios where a test can cross project boundaries.
Output only. The display name of a Connectivity Test.
Resource labels to represent user-provided metadata.
Output only. The time the test was created.
Output only. The time the test's configuration was updated.
Output only. The reachability details of this test from the latest run. The details are updated when creating a new test, updating an existing test, or triggering a one-time rerun of an existing test.
The CloudEvent raised when a ConnectivityTest is created.
The data associated with the event.
The CloudEvent raised when a ConnectivityTest is deleted.
The data associated with the event.
The data within all ConnectivityTest events.
Used in:
, ,Optional. The ConnectivityTest event payload. Unset for deletion events.
The CloudEvent raised when a ConnectivityTest is updated.
The data associated with the event.
Details of the final state "deliver" and associated resource.
Used in:
Target type where the packet is delivered to.
URI of the resource that the packet is delivered to.
Deliver target types:
Used in:
Target not specified.
Target is a Compute Engine instance.
Target is the internet.
Target is a Google API.
Target is a Google Kubernetes Engine cluster master.
Target is a Cloud SQL instance.
Target is a published service that uses [Private Service Connect](https://cloud.google.com/vpc/docs/configure-private-service-connect-services).
Target is all Google APIs that use [Private Service Connect](https://cloud.google.com/vpc/docs/configure-private-service-connect-apis).
Target is a VPC-SC that uses [Private Service Connect](https://cloud.google.com/vpc/docs/configure-private-service-connect-apis).
Details of the final state "drop" and associated resource.
Used in:
Cause that the packet is dropped.
URI of the resource that caused the drop.
Drop cause types:
Used in:
Cause is unspecified.
Destination external address cannot be resolved to a known target. If the address is used in a Google Cloud project, provide the project ID as test input.
A Compute Engine instance can only send or receive a packet with a foreign IP address if ip_forward is enabled.
Dropped due to a firewall rule, unless allowed due to connection tracking.
Dropped due to no routes.
Dropped due to invalid route. Route's next hop is a blackhole.
Packet is sent to a wrong (unintended) network. Example: you trace a packet from VM1:Network1 to VM2:Network2, however, the route configured in Network1 sends the packet destined for VM2's IP addresss to Network3.
Packet with internal destination address sent to the internet gateway.
Instance with only an internal IP address tries to access Google API and services, but private Google access is not enabled.
Instance with only an internal IP address tries to access external hosts, but Cloud NAT is not enabled in the subnet, unless special configurations on a VM allow this connection.
Destination internal address cannot be resolved to a known target. If this is a shared VPC scenario, verify if the service project ID is provided as test input. Otherwise, verify if the IP address is being used in the project.
Forwarding rule's protocol and ports do not match the packet header.
Packet could be dropped because it was sent from a different region to a regional forwarding without global access.
Forwarding rule does not have backends configured.
Firewalls block the health check probes to the backends and cause the backends to be unavailable for traffic from the load balancer. For more details, see [Health check firewall rules](https://cloud.google.com/load-balancing/docs/health-checks#firewall_rules).
Packet is sent from or to a Compute Engine instance that is not in a running state.
Packet sent from or to a GKE cluster that is not in running state.
Packet sent from or to a Cloud SQL instance that is not in running state.
The type of traffic is blocked and the user cannot configure a firewall rule to enable it. See [Always blocked traffic](https://cloud.google.com/vpc/docs/firewalls#blockedtraffic) for more details.
Access to Google Kubernetes Engine cluster master's endpoint is not authorized. See [Access to the cluster endpoints](https://cloud.google.com/kubernetes-engine/docs/how-to/private-clusters#access_to_the_cluster_endpoints) for more details.
Access to the Cloud SQL instance endpoint is not authorized. See [Authorizing with authorized networks](https://cloud.google.com/sql/docs/mysql/authorize-networks) for more details.
Packet was dropped inside Google Kubernetes Engine Service.
Packet was dropped inside Cloud SQL Service.
Packet was dropped because there is no peering between the originating network and the Google Managed Services Network.
Packet was dropped because the Google-managed service uses Private Service Connect (PSC), but the PSC endpoint is not found in the project.
Packet was dropped because the GKE cluster uses Private Service Connect (PSC), but the PSC endpoint is not found in the project.
Packet was dropped because the Cloud SQL instance has neither a private nor a public IP address.
Packet was dropped because a GKE cluster private endpoint is unreachable from a region different from the cluster's region.
Packet sent from a public GKE cluster control plane to a private IP address.
Packet was dropped because there is no route from a GKE cluster control plane to a destination network.
Packet sent from a Cloud SQL instance to an external IP address is not allowed. The Cloud SQL instance is not configured to send packets to external IP addresses.
Packet sent from a Cloud SQL instance with only a public IP address to a private IP address.
Packet was dropped because there is no route from a Cloud SQL instance to a destination network.
Packet could be dropped because the Cloud Function is not in an active status.
Packet could be dropped because no VPC connector is set.
Packet could be dropped because the VPC connector is not in a running state.
The Private Service Connect endpoint is in a project that is not approved to connect to the service.
Packet sent from a Cloud Run revision that is not ready.
Packet was dropped inside Private Service Connect service producer.
Packet sent to a load balancer, which requires a proxy-only subnet and the subnet is not found.
Source or destination of the Connectivity Test.
Used in:
The IP address of the endpoint, which can be an external or internal IP. An IPv6 address is only allowed when the test's destination is a [global load balancer VIP](/load-balancing/docs/load-balancing-overview).
The IP protocol port of the endpoint. Only applicable when protocol is TCP or UDP.
A Compute Engine instance URI.
A cluster URI for [Google Kubernetes Engine master](https://cloud.google.com/kubernetes-engine/docs/concepts/cluster-architecture).
A [Cloud SQL](https://cloud.google.com/sql) instance URI.
A [Cloud Function](https://cloud.google.com/functions).
An [App Engine](https://cloud.google.com/appengine) [service version](https://cloud.google.com/appengine/docs/admin-api/reference/rest/v1/apps.services.versions).
A [Cloud Run](https://cloud.google.com/run) [revision](https://cloud.google.com/run/docs/reference/rest/v1/namespaces.revisions/get)
A Compute Engine network URI.
Type of the network where the endpoint is located. Applicable only to source endpoint, as destination network type can be inferred from the source.
Project ID where the endpoint is located. The Project ID can be derived from the URI if you provide a VM instance or network URI. The following are two cases where you must provide the project ID: 1. Only the IP address is specified, and the IP address is within a Google Cloud project. 2. When you are using Shared VPC and the IP address that you provide is from the service project. In this case, the network that the IP address resides in is defined in the host project.
Wrapper for the App Engine service version attributes.
Used in:
An [App Engine](https://cloud.google.com/appengine) [service version](https://cloud.google.com/appengine/docs/admin-api/reference/rest/v1/apps.services.versions) name.
Wrapper for Cloud Function attributes.
Used in:
A [Cloud Function](https://cloud.google.com/functions) name.
Wrapper for Cloud Run revision attributes.
Used in:
A [Cloud Run](https://cloud.google.com/run) [revision](https://cloud.google.com/run/docs/reference/rest/v1/namespaces.revisions/get) URI. The format is: projects/{project}/locations/{location}/revisions/{revision}
The type definition of an endpoint's network. Use one of the following choices:
Used in:
Default type if unspecified.
A network hosted within Google Cloud. To receive more detailed output, specify the URI for the source or destination network.
A network hosted outside of Google Cloud. This can be an on-premises network, or a network hosted by another cloud provider.
For display only. The specification of the endpoints for the test. EndpointInfo is derived from source and destination Endpoint and validated by the backend data plane model.
Used in:
,Source IP address.
Destination IP address.
IP protocol in string format, for example: "TCP", "UDP", "ICMP".
Source port. Only valid when protocol is TCP or UDP.
Destination port. Only valid when protocol is TCP or UDP.
URI of the network where this packet originates from.
URI of the network where this packet is sent to.
For display only. Metadata associated with a VPC firewall rule, an implied VPC firewall rule, or a hierarchical firewall policy rule.
Used in:
The display name of the VPC firewall rule. This field is not applicable to hierarchical firewall policy rules.
The URI of the VPC firewall rule. This field is not applicable to implied firewall rules or hierarchical firewall policy rules.
Possible values: INGRESS, EGRESS
Possible values: ALLOW, DENY
The priority of the firewall rule.
The URI of the VPC network that the firewall rule is associated with. This field is not applicable to hierarchical firewall policy rules.
The target tags defined by the VPC firewall rule. This field is not applicable to hierarchical firewall policy rules.
The target service accounts specified by the firewall rule.
The hierarchical firewall policy that this rule is associated with. This field is not applicable to VPC firewall rules.
The firewall rule's type.
The firewall rule's type.
Used in:
Unspecified type.
Hierarchical firewall policy rule. For details, see [Hierarchical firewall policies overview](https://cloud.google.com/vpc/docs/firewall-policies).
VPC firewall rule. For details, see [VPC firewall rules overview](https://cloud.google.com/vpc/docs/firewalls).
Implied VPC firewall rule. For details, see [Implied rules](https://cloud.google.com/vpc/docs/firewalls#default_firewall_rules).
Implicit firewall rules that are managed by serverless VPC access to allow ingress access. They are not visible in the Google Cloud console. For details, see [VPC connector's implicit rules](https://cloud.google.com/functions/docs/networking/connecting-vpc#restrict-access).
Global network firewall policy rule. For details, see [Network firewall policies](https://cloud.google.com/vpc/docs/network-firewall-policies).
Details of the final state "forward" and associated resource.
Used in:
Target type where this packet is forwarded to.
URI of the resource that the packet is forwarded to.
Forward target types.
Used in:
Target not specified.
Forwarded to a VPC peering network.
Forwarded to a Cloud VPN gateway.
Forwarded to a Cloud Interconnect connection.
Forwarded to a Google Kubernetes Engine Container cluster master.
Forwarded to the next hop of a custom route imported from a peering VPC.
Forwarded to a Cloud SQL instance.
Forwarded to a VPC network in another project.
For display only. Metadata associated with a Compute Engine forwarding rule.
Used in:
Name of a Compute Engine forwarding rule.
URI of a Compute Engine forwarding rule.
Protocol defined in the forwarding rule that matches the test.
Port range defined in the forwarding rule that matches the test.
VIP of the forwarding rule.
Target type of the forwarding rule.
Network URI. Only valid for Internal Load Balancer.
For display only. Metadata associated with a Google Kubernetes Engine (GKE) cluster master.
Used in:
URI of a GKE cluster.
URI of a GKE cluster network.
Internal IP address of a GKE cluster master.
External IP address of a GKE cluster master.
For display only. Details of a Google Service sending packets to a VPC network. Although the source IP might be a publicly routable address, some Google Services use special routes within Google production infrastructure to reach Compute Engine Instances. https://cloud.google.com/vpc/docs/routes#special_return_paths
Used in:
Source IP address.
Recognized type of a Google Service.
Recognized type of a Google Service.
Used in:
Unspecified Google Service. Includes most of Google APIs and services.
Identity aware proxy. https://cloud.google.com/iap/docs/using-tcp-forwarding
One of two services sharing IP ranges: * Load Balancer proxy * Centralized Health Check prober https://cloud.google.com/load-balancing/docs/firewall-rules
Connectivity from Cloud DNS to forwarding targets or alternate name servers that use private routing. https://cloud.google.com/dns/docs/zones/forwarding-zones#firewall-rules https://cloud.google.com/dns/docs/policies#firewall-rules
For display only. Metadata associated with a Compute Engine instance.
Used in:
Name of a Compute Engine instance.
URI of a Compute Engine instance.
Name of the network interface of a Compute Engine instance.
URI of a Compute Engine network.
Internal IP address of the network interface.
External IP address of the network interface.
Network tags configured on the instance.
Service account authorized for the instance.
For display only. Metadata associated with a specific load balancer backend.
Used in:
Name of a Compute Engine instance or network endpoint.
URI of a Compute Engine instance or network endpoint.
State of the health check firewall configuration.
A list of firewall rule URIs allowing probes from health check IP ranges.
A list of firewall rule URIs blocking probes from health check IP ranges.
State of a health check firewall configuration:
Used in:
State is unspecified. Default state if not populated.
There are configured firewall rules to allow health check probes to the backend.
There are firewall rules configured to allow partial health check ranges or block all health check ranges. If a health check probe is sent from denied IP ranges, the health check to the backend will fail. Then, the backend will be marked unhealthy and will not receive traffic sent to the load balancer.
For display only. Metadata associated with a load balancer.
Used in:
Type of the load balancer.
URI of the health check for the load balancer.
Information for the loadbalancer backends.
Type of load balancer's backend configuration.
Backend configuration URI.
The type definition for a load balancer backend configuration:
Used in:
Type is unspecified.
Backend Service as the load balancer's backend.
Target Pool as the load balancer's backend.
Target Instance as the load balancer's backend.
The type definition for a load balancer:
Used in:
Type is unspecified.
Internal TCP/UDP load balancer.
Network TCP/UDP load balancer.
HTTP(S) proxy load balancer.
TCP proxy load balancer.
SSL proxy load balancer.
For display only. Metadata associated with a Compute Engine network.
Used in:
Name of a Compute Engine network.
URI of a Compute Engine network.
The IP range that matches the test.
Results of the configuration analysis from the last run of the test.
Used in:
The overall result of the test's configuration analysis.
The time of the configuration analysis.
The details of a failure or a cancellation of reachability analysis.
Result may contain a list of traces if a test has multiple possible paths in the network, such as when destination endpoint is a load balancer with multiple backends.
The overall result of the test's configuration analysis.
Used in:
No result was specified.
Possible scenarios are: * The configuration analysis determined that a packet originating from the source is expected to reach the destination. * The analysis didn't complete because the user lacks permission for some of the resources in the trace. However, at the time the user's permission became insufficient, the trace had been successful so far.
A packet originating from the source is expected to be dropped before reaching the destination.
The source and destination endpoints do not uniquely identify the test location in the network, and the reachability result contains multiple traces. For some traces, a packet could be delivered, and for others, it would not be.
The configuration analysis did not complete. Possible reasons are: * A permissions error occurred--for example, the user might not have read permission for all of the resources named in the test. * An internal error occurred. * The analyzer received an invalid or unsupported argument or was unable to identify a known endpoint.
For display only. Metadata associated with a Compute Engine route.
Used in:
Type of route.
Type of next hop.
Name of a Compute Engine route.
URI of a Compute Engine route. Dynamic route from cloud router does not have a URI. Advertised route from Google Cloud VPC to on-premises network also does not have a URI.
Destination IP range of the route.
Next hop of the route.
URI of a Compute Engine network.
Priority of the route.
Instance tags of the route.
Source IP address range of the route. Policy based routes only.
Destination port ranges of the route. Policy based routes only.
Source port ranges of the route. Policy based routes only.
Protocols of the route. Policy based routes only.
Type of next hop:
Used in:
Unspecified type. Default value.
Next hop is an IP address.
Next hop is a Compute Engine instance.
Next hop is a VPC network gateway.
Next hop is a peering VPC.
Next hop is an interconnect.
Next hop is a VPN tunnel.
Next hop is a VPN gateway. This scenario only happens when tracing connectivity from an on-premises network to Google Cloud through a VPN. The analysis simulates a packet departing from the on-premises network through a VPN tunnel and arriving at a Cloud VPN gateway.
Next hop is an internet gateway.
Next hop is blackhole; that is, the next hop either does not exist or is not running.
Next hop is the forwarding rule of an Internal Load Balancer.
Next hop is a [router appliance instance](https://cloud.google.com/network-connectivity/docs/network-connectivity-center/concepts/ra-overview).
Type of route:
Used in:
Unspecified type. Default value.
Route is a subnet route automatically created by the system.
Static route created by the user, including the default route to the internet.
Dynamic route exchanged between BGP peers.
A subnet route received from peering network.
A static route received from peering network.
A dynamic route received from peering network.
Policy based route.
A simulated forwarding path is composed of multiple steps. Each step has a well-defined state and an associated configuration.
Used in:
A description of the step. Usually this is a summary of the state.
Each step is in one of the pre-defined states.
This is a step that leads to the final state Drop.
Project ID that contains the configuration this step is validating.
Configuration or metadata associated with each step. The configuration is filtered based on viewer's permission. If a viewer has no permission to view the configuration in this step, for non-final states a special state is populated (VIEWER_PERMISSION_MISSING), and for final state the configuration is cleared.
Display information of a Compute Engine instance.
Display information of a Compute Engine firewall rule.
Display information of a Compute Engine route.
Display information of the source and destination under analysis. The endpoint information in an intermediate state may differ with the initial input, as it might be modified by state like NAT, or Connection Proxy.
Display information of a Google service
Display information of a Compute Engine forwarding rule.
Display information of a Compute Engine VPN gateway.
Display information of a Compute Engine VPN tunnel.
Display information of a VPC connector.
Display information of the final state "deliver" and reason.
Display information of the final state "forward" and reason.
Display information of the final state "abort" and reason.
Display information of the final state "drop" and reason.
Display information of the load balancers.
Display information of a Google Cloud network.
Display information of a Google Kubernetes Engine cluster master.
Display information of a Cloud SQL instance.
Display information of a Cloud Function.
Display information of an App Engine service version.
Display information of a Cloud Run revision.
Type of states that are defined in the network state machine. Each step in the packet trace is in a specific state.
Used in:
Unspecified state.
Initial state: packet originating from a Compute Engine instance. An InstanceInfo is populated with starting instance information.
Initial state: packet originating from the internet. The endpoint information is populated.
Initial state: packet originating from a Google service. Some Google services, such as health check probers or Identity Aware Proxy use special routes, outside VPC routing configuration to reach Compute Engine Instances.
Initial state: packet originating from a VPC or on-premises network with internal source IP. If the source is a VPC network visible to the user, a NetworkInfo is populated with details of the network.
Initial state: packet originating from a Google Kubernetes Engine cluster master. A GKEMasterInfo is populated with starting instance information.
Initial state: packet originating from a Cloud SQL instance. A CloudSQLInstanceInfo is populated with starting instance information.
Initial state: packet originating from a Cloud Function. A CloudFunctionInfo is populated with starting function information.
Initial state: packet originating from an App Engine service version. An AppEngineVersionInfo is populated with starting version information.
Initial state: packet originating from a Cloud Run revision. A CloudRunRevisionInfo is populated with starting revision information.
Config checking state: verify ingress firewall rule.
Config checking state: verify egress firewall rule.
Config checking state: verify route.
Config checking state: match forwarding rule.
Config checking state: packet sent or received under foreign IP address and allowed.
Forwarding state: arriving at a Compute Engine instance.
Forwarding state: arriving at a Compute Engine internal load balancer.
Forwarding state: arriving at a Compute Engine external load balancer.
Forwarding state: arriving at a Cloud VPN gateway.
Forwarding state: arriving at a Cloud VPN tunnel.
Forwarding state: arriving at a VPC connector.
Transition state: packet header translated.
Transition state: original connection is terminated and a new proxied connection is initiated.
Final state: packet could be delivered.
Final state: packet could be dropped.
Final state: packet could be forwarded to a network with an unknown configuration.
Final state: analysis is aborted.
Special state: viewer of the test result does not have permission to see the configuration in this step.
Trace represents one simulated packet forwarding path. * Each trace contains multiple ordered steps. * Each step is in a particular state with associated configuration. * State is categorized as final or non-final states. * Each final state has a reason associated. * Each trace must end with a final state (the last step). ``` |---------------------Trace----------------------| Step1(State) Step2(State) --- StepN(State(final)) ```
Used in:
Derived from the source and destination endpoints definition specified by user request, and validated by the data plane model. If there are multiple traces starting from different source locations, then the endpoint_info may be different between traces.
A trace of a test contains multiple steps from the initial state to the final state (delivered, dropped, forwarded, or aborted). The steps are ordered by the processing sequence within the simulated network state machine. It is critical to preserve the order of the steps and avoid reordering or sorting them.
For display only. Metadata associated with a VPC connector.
Used in:
Name of a VPC connector.
URI of a VPC connector.
Location in which the VPC connector is deployed.
For display only. Metadata associated with a Compute Engine VPN gateway.
Used in:
Name of a VPN gateway.
URI of a VPN gateway.
URI of a Compute Engine network where the VPN gateway is configured.
IP address of the VPN gateway.
A VPN tunnel that is associated with this VPN gateway. There may be multiple VPN tunnels configured on a VPN gateway, and only the one relevant to the test is displayed.
Name of a Google Cloud region where this VPN gateway is configured.
For display only. Metadata associated with a Compute Engine VPN tunnel.
Used in:
Name of a VPN tunnel.
URI of a VPN tunnel.
URI of the VPN gateway at local end of the tunnel.
URI of a VPN gateway at remote end of the tunnel.
Remote VPN gateway's IP address.
Local VPN gateway's IP address.
URI of a Compute Engine network where the VPN tunnel is configured.
Name of a Google Cloud region where this VPN tunnel is configured.
Type of the routing policy.
Types of VPN routing policy. For details, refer to [Networks and Tunnel routing](https://cloud.google.com/network-connectivity/docs/vpn/concepts/choosing-networks-routing/).
Used in:
Unspecified type. Default value.
Route based VPN.
Policy based routing.
Dynamic (BGP) routing.