diff --git a/nsxt/gateway_common.go b/nsxt/gateway_common.go index 0e5810758..78555b094 100644 --- a/nsxt/gateway_common.go +++ b/nsxt/gateway_common.go @@ -520,8 +520,11 @@ func setLocaleServiceRedistributionConfig(redistributionConfigs []interface{}, s rulesConfig := redistributionConfig["rule"].([]interface{}) redistributionStruct := model.Tier0RouteRedistributionConfig{ - BgpEnabled: &bgpEnabled, - OspfEnabled: &ospfEnabled, + BgpEnabled: &bgpEnabled, + } + + if nsxVersionHigherOrEqual("3.1.0") { + redistributionStruct.OspfEnabled = &ospfEnabled } setLocaleServiceRedistributionRulesConfig(rulesConfig, &redistributionStruct) diff --git a/nsxt/resource_nsxt_policy_evpn_config_test.go b/nsxt/resource_nsxt_policy_evpn_config_test.go index b3524f9ec..ad10582be 100644 --- a/nsxt/resource_nsxt_policy_evpn_config_test.go +++ b/nsxt/resource_nsxt_policy_evpn_config_test.go @@ -20,7 +20,7 @@ func TestAccResourceNsxtPolicyEvpnConfig_inline(t *testing.T) { updatedDescription := "terraform updated" resource.Test(t, resource.TestCase{ - PreCheck: func() { testAccPreCheck(t); testAccOnlyLocalManager(t) }, + PreCheck: func() { testAccPreCheck(t); testAccOnlyLocalManager(t); testAccNSXVersion(t, "3.1.0") }, Providers: testAccProviders, CheckDestroy: func(state *terraform.State) error { if err := testAccDataSourceNsxtPolicyVniPoolConfigDelete(); err != nil { @@ -76,7 +76,7 @@ func TestAccResourceNsxtPolicyEvpnConfig_routeServer(t *testing.T) { updatedDescription := "terraform updated" resource.Test(t, resource.TestCase{ - PreCheck: func() { testAccPreCheck(t); testAccOnlyLocalManager(t) }, + PreCheck: func() { testAccPreCheck(t); testAccOnlyLocalManager(t); testAccNSXVersion(t, "3.1.0") }, Providers: testAccProviders, CheckDestroy: func(state *terraform.State) error { if err := testAccDataSourceNsxtPolicyVniPoolConfigDelete(); err != nil { @@ -130,7 +130,7 @@ func TestAccResourceNsxtPolicyEvpnConfig_importBasic(t *testing.T) { testResourceName := "nsxt_policy_evpn_config.test" resource.Test(t, resource.TestCase{ - PreCheck: func() { testAccPreCheck(t); testAccOnlyLocalManager(t) }, + PreCheck: func() { testAccPreCheck(t); testAccOnlyLocalManager(t); testAccNSXVersion(t, "3.1.0") }, Providers: testAccProviders, CheckDestroy: func(state *terraform.State) error { if err := testAccDataSourceNsxtPolicyVniPoolConfigDelete(); err != nil { diff --git a/nsxt/resource_nsxt_policy_evpn_tenant_test.go b/nsxt/resource_nsxt_policy_evpn_tenant_test.go index 8eb124b2b..087f3d715 100644 --- a/nsxt/resource_nsxt_policy_evpn_tenant_test.go +++ b/nsxt/resource_nsxt_policy_evpn_tenant_test.go @@ -25,7 +25,7 @@ func TestAccResourceNsxtPolicyEvpnTenant_basic(t *testing.T) { testResourceName := "nsxt_policy_evpn_tenant.test" resource.Test(t, resource.TestCase{ - PreCheck: func() { testAccPreCheck(t); testAccOnlyLocalManager(t) }, + PreCheck: func() { testAccPreCheck(t); testAccOnlyLocalManager(t); testAccNSXVersion(t, "3.1.0") }, Providers: testAccProviders, CheckDestroy: func(state *terraform.State) error { if err := testAccDataSourceNsxtPolicyVniPoolConfigDelete(); err != nil { @@ -79,7 +79,7 @@ func TestAccResourceNsxtPolicyEvpnTenant_importBasic(t *testing.T) { testResourceName := "nsxt_policy_evpn_tenant.test" resource.Test(t, resource.TestCase{ - PreCheck: func() { testAccPreCheck(t); testAccOnlyLocalManager(t) }, + PreCheck: func() { testAccPreCheck(t); testAccOnlyLocalManager(t); testAccNSXVersion(t, "3.1.0") }, Providers: testAccProviders, CheckDestroy: func(state *terraform.State) error { if err := testAccDataSourceNsxtPolicyVniPoolConfigDelete(); err != nil { diff --git a/nsxt/resource_nsxt_policy_evpn_tunnel_endpoint_test.go b/nsxt/resource_nsxt_policy_evpn_tunnel_endpoint_test.go index f98fd9d5d..3f4446c92 100644 --- a/nsxt/resource_nsxt_policy_evpn_tunnel_endpoint_test.go +++ b/nsxt/resource_nsxt_policy_evpn_tunnel_endpoint_test.go @@ -31,7 +31,7 @@ func TestAccResourceNsxtPolicyEvpnTunnelEndpoint_basic(t *testing.T) { testResourceName := "nsxt_policy_evpn_tunnel_endpoint.test" resource.Test(t, resource.TestCase{ - PreCheck: func() { testAccPreCheck(t); testAccOnlyLocalManager(t) }, + PreCheck: func() { testAccPreCheck(t); testAccOnlyLocalManager(t); testAccNSXVersion(t, "3.1.0") }, Providers: testAccProviders, CheckDestroy: func(state *terraform.State) error { if err := testAccDataSourceNsxtPolicyVniPoolConfigDelete(); err != nil { @@ -84,7 +84,7 @@ func TestAccResourceNsxtPolicyEvpnTunnelEndpoint_importBasic(t *testing.T) { testResourceName := "nsxt_policy_evpn_tunnel_endpoint.test" resource.Test(t, resource.TestCase{ - PreCheck: func() { testAccPreCheck(t); testAccOnlyLocalManager(t) }, + PreCheck: func() { testAccPreCheck(t); testAccOnlyLocalManager(t); testAccNSXVersion(t, "3.1.0") }, Providers: testAccProviders, CheckDestroy: func(state *terraform.State) error { if err := testAccDataSourceNsxtPolicyVniPoolConfigDelete(); err != nil { diff --git a/nsxt/resource_nsxt_policy_gateway_redistribution_config.go b/nsxt/resource_nsxt_policy_gateway_redistribution_config.go index 01572e0bd..64524825f 100644 --- a/nsxt/resource_nsxt_policy_gateway_redistribution_config.go +++ b/nsxt/resource_nsxt_policy_gateway_redistribution_config.go @@ -69,8 +69,11 @@ func policyGatewayRedistributionConfigPatch(d *schema.ResourceData, m interface{ rulesConfig := d.Get("rule").([]interface{}) redistributionStruct := model.Tier0RouteRedistributionConfig{ - BgpEnabled: &bgpEnabled, - OspfEnabled: &ospfEnabled, + BgpEnabled: &bgpEnabled, + } + + if nsxVersionHigherOrEqual("3.1.0") { + redistributionStruct.OspfEnabled = &ospfEnabled } setLocaleServiceRedistributionRulesConfig(rulesConfig, &redistributionStruct) diff --git a/nsxt/resource_nsxt_policy_gateway_redistribution_config_test.go b/nsxt/resource_nsxt_policy_gateway_redistribution_config_test.go index 247984c24..56000977c 100644 --- a/nsxt/resource_nsxt_policy_gateway_redistribution_config_test.go +++ b/nsxt/resource_nsxt_policy_gateway_redistribution_config_test.go @@ -18,7 +18,7 @@ func TestAccResourceNsxtPolicyGatewayRedistributionConfig_basic(t *testing.T) { testResourceName := "nsxt_policy_gateway_redistribution_config.test" resource.Test(t, resource.TestCase{ - PreCheck: func() { testAccPreCheck(t); testAccNSXVersion(t, "3.0.0") }, + PreCheck: func() { testAccPreCheck(t); testAccNSXVersion(t, "3.1.0") }, Providers: testAccProviders, CheckDestroy: testAccNsxtPolicyTier0CheckNoRedistribution(testAccNsxtPolicyGatewayRedistributionHelperName), Steps: []resource.TestStep{ @@ -66,7 +66,7 @@ func TestAccResourceNsxtPolicyGatewayRedistributionConfig_importBasic(t *testing testResourceName := "nsxt_policy_gateway_redistribution_config.test" resource.Test(t, resource.TestCase{ - PreCheck: func() { testAccPreCheck(t); testAccNSXVersion(t, "3.0.0") }, + PreCheck: func() { testAccPreCheck(t); testAccNSXVersion(t, "3.1.0") }, Providers: testAccProviders, CheckDestroy: testAccNsxtPolicyTier0CheckNoRedistribution(testAccNsxtPolicyGatewayRedistributionHelperName), Steps: []resource.TestStep{ diff --git a/nsxt/resource_nsxt_policy_intrusion_service_policy_test.go b/nsxt/resource_nsxt_policy_intrusion_service_policy_test.go index 7d7eef150..9f574e600 100644 --- a/nsxt/resource_nsxt_policy_intrusion_service_policy_test.go +++ b/nsxt/resource_nsxt_policy_intrusion_service_policy_test.go @@ -29,7 +29,7 @@ func TestAccResourceNsxtPolicyIntrusionServicePolicy_basic(t *testing.T) { tag2 := "def" resource.ParallelTest(t, resource.TestCase{ - PreCheck: func() { testAccPreCheck(t); testAccOnlyLocalManager(t); testAccNSXVersion(t, "3.0.0") }, + PreCheck: func() { testAccPreCheck(t); testAccOnlyLocalManager(t); testAccNSXVersion(t, "3.1.0") }, Providers: testAccProviders, CheckDestroy: func(state *terraform.State) error { return testAccNsxtPolicyIntrusionServicePolicyCheckDestroy(state, updatedName, defaultDomain) @@ -118,7 +118,7 @@ func TestAccResourceNsxtPolicyIntrusionServicePolicy_withDependencies(t *testing defaultProtocol := "IPV4_IPV6" resource.ParallelTest(t, resource.TestCase{ - PreCheck: func() { testAccPreCheck(t); testAccOnlyLocalManager(t); testAccNSXVersion(t, "3.0.0") }, + PreCheck: func() { testAccPreCheck(t); testAccOnlyLocalManager(t); testAccNSXVersion(t, "3.1.0") }, Providers: testAccProviders, CheckDestroy: func(state *terraform.State) error { return testAccNsxtPolicyIntrusionServicePolicyCheckDestroy(state, name, defaultDomain) @@ -193,7 +193,7 @@ func TestAccResourceNsxtPolicyIntrusionServicePolicy_importBasic(t *testing.T) { testResourceName := "nsxt_policy_intrusion_service_policy.test" resource.ParallelTest(t, resource.TestCase{ - PreCheck: func() { testAccPreCheck(t); testAccOnlyLocalManager(t); testAccNSXVersion(t, "3.0.0") }, + PreCheck: func() { testAccPreCheck(t); testAccOnlyLocalManager(t); testAccNSXVersion(t, "3.1.0") }, Providers: testAccProviders, CheckDestroy: func(state *terraform.State) error { return testAccNsxtPolicyIntrusionServicePolicyCheckDestroy(state, name, defaultDomain) diff --git a/nsxt/resource_nsxt_policy_intrusion_service_profile_test.go b/nsxt/resource_nsxt_policy_intrusion_service_profile_test.go index 6f95fc4d6..27499df53 100644 --- a/nsxt/resource_nsxt_policy_intrusion_service_profile_test.go +++ b/nsxt/resource_nsxt_policy_intrusion_service_profile_test.go @@ -17,7 +17,7 @@ func TestAccResourceNsxtPolicyIntrusionServiceProfile_basic(t *testing.T) { testResourceName := "nsxt_policy_intrusion_service_profile.test" resource.ParallelTest(t, resource.TestCase{ - PreCheck: func() { testAccPreCheck(t); testAccOnlyLocalManager(t); testAccNSXVersion(t, "3.0.0") }, + PreCheck: func() { testAccPreCheck(t); testAccOnlyLocalManager(t); testAccNSXVersion(t, "3.1.0") }, Providers: testAccProviders, CheckDestroy: func(state *terraform.State) error { return testAccNsxtPolicyIntrusionServiceProfileCheckDestroy(state, updatedName) @@ -82,7 +82,7 @@ func TestAccResourceNsxtPolicyIntrusionServiceProfile_importBasic(t *testing.T) testResourceName := "nsxt_policy_intrusion_service_profile.test" resource.ParallelTest(t, resource.TestCase{ - PreCheck: func() { testAccPreCheck(t); testAccOnlyLocalManager(t); testAccNSXVersion(t, "3.0.0") }, + PreCheck: func() { testAccPreCheck(t); testAccOnlyLocalManager(t); testAccNSXVersion(t, "3.1.0") }, Providers: testAccProviders, CheckDestroy: func(state *terraform.State) error { return testAccNsxtPolicyIntrusionServiceProfileCheckDestroy(state, name) diff --git a/nsxt/resource_nsxt_policy_ospf_area_test.go b/nsxt/resource_nsxt_policy_ospf_area_test.go index 869955f7f..9cd5fbb53 100644 --- a/nsxt/resource_nsxt_policy_ospf_area_test.go +++ b/nsxt/resource_nsxt_policy_ospf_area_test.go @@ -37,7 +37,7 @@ func TestAccResourceNsxtPolicyOspfArea_basic(t *testing.T) { testResourceName := "nsxt_policy_ospf_area.test" resource.Test(t, resource.TestCase{ - PreCheck: func() { testAccOnlyLocalManager(t); testAccPreCheck(t) }, + PreCheck: func() { testAccOnlyLocalManager(t); testAccPreCheck(t); testAccNSXVersion(t, "3.1.0") }, Providers: testAccProviders, CheckDestroy: func(state *terraform.State) error { return testAccNsxtPolicyOspfAreaCheckDestroy(state, accTestPolicyOspfAreaCreateAttributes["display_name"]) @@ -96,7 +96,7 @@ func TestAccResourceNsxtPolicyOspfArea_importBasic(t *testing.T) { testResourceName := "nsxt_policy_ospf_area.test" resource.Test(t, resource.TestCase{ - PreCheck: func() { testAccOnlyLocalManager(t); testAccPreCheck(t) }, + PreCheck: func() { testAccOnlyLocalManager(t); testAccPreCheck(t); testAccNSXVersion(t, "3.1.0") }, Providers: testAccProviders, CheckDestroy: func(state *terraform.State) error { return testAccNsxtPolicyOspfAreaCheckDestroy(state, name) diff --git a/nsxt/resource_nsxt_policy_ospf_config_test.go b/nsxt/resource_nsxt_policy_ospf_config_test.go index 64efbee54..dfb742aa7 100644 --- a/nsxt/resource_nsxt_policy_ospf_config_test.go +++ b/nsxt/resource_nsxt_policy_ospf_config_test.go @@ -38,7 +38,7 @@ func TestAccResourceNsxtPolicyOspfConfig_basic(t *testing.T) { testResourceName := "nsxt_policy_ospf_config.test" resource.Test(t, resource.TestCase{ - PreCheck: func() { testAccOnlyLocalManager(t); testAccPreCheck(t) }, + PreCheck: func() { testAccOnlyLocalManager(t); testAccPreCheck(t); testAccNSXVersion(t, "3.1.0") }, Providers: testAccProviders, Steps: []resource.TestStep{ { @@ -93,7 +93,7 @@ func TestAccResourceNsxtPolicyOspfConfig_minimalistic(t *testing.T) { testResourceName := "nsxt_policy_ospf_config.test" resource.Test(t, resource.TestCase{ - PreCheck: func() { testAccOnlyLocalManager(t); testAccPreCheck(t) }, + PreCheck: func() { testAccOnlyLocalManager(t); testAccPreCheck(t); testAccNSXVersion(t, "3.1.0") }, Providers: testAccProviders, Steps: []resource.TestStep{ { diff --git a/nsxt/resource_nsxt_policy_security_policy_test.go b/nsxt/resource_nsxt_policy_security_policy_test.go index 4118326b2..69d6588a6 100644 --- a/nsxt/resource_nsxt_policy_security_policy_test.go +++ b/nsxt/resource_nsxt_policy_security_policy_test.go @@ -150,7 +150,7 @@ func TestAccResourceNsxtPolicySecurityPolicy_withDependencies(t *testing.T) { defaultProtocol := "IPV4_IPV6" resource.ParallelTest(t, resource.TestCase{ - PreCheck: func() { testAccPreCheck(t) }, + PreCheck: func() { testAccPreCheck(t); testAccNSXVersion(t, "3.1.0") }, Providers: testAccProviders, CheckDestroy: func(state *terraform.State) error { return testAccNsxtPolicySecurityPolicyCheckDestroy(state, name, defaultDomain) diff --git a/nsxt/resource_nsxt_policy_static_route_bfd_peer_test.go b/nsxt/resource_nsxt_policy_static_route_bfd_peer_test.go index 68f9e5e89..6bff0d73d 100644 --- a/nsxt/resource_nsxt_policy_static_route_bfd_peer_test.go +++ b/nsxt/resource_nsxt_policy_static_route_bfd_peer_test.go @@ -29,7 +29,7 @@ func TestAccResourceNsxtPolicyStaticRouteBfdPeer_basic(t *testing.T) { testResourceName := "nsxt_policy_static_route_bfd_peer.test" resource.ParallelTest(t, resource.TestCase{ - PreCheck: func() { testAccPreCheck(t) }, + PreCheck: func() { testAccPreCheck(t); testAccNSXVersion(t, "3.1.0") }, Providers: testAccProviders, CheckDestroy: func(state *terraform.State) error { return testAccNsxtPolicyStaticRouteBfdPeerCheckDestroy(state, accTestPolicyStaticRouteBfdPeerUpdateAttributes["display_name"]) @@ -87,7 +87,7 @@ func TestAccResourceNsxtPolicyStaticRouteBfdPeer_importBasic(t *testing.T) { testResourceName := "nsxt_policy_static_route_bfd_peer.test" resource.ParallelTest(t, resource.TestCase{ - PreCheck: func() { testAccPreCheck(t) }, + PreCheck: func() { testAccPreCheck(t); testAccNSXVersion(t, "3.1.0") }, Providers: testAccProviders, CheckDestroy: func(state *terraform.State) error { return testAccNsxtPolicyStaticRouteBfdPeerCheckDestroy(state, name) diff --git a/nsxt/resource_nsxt_policy_tier0_gateway_interface_test.go b/nsxt/resource_nsxt_policy_tier0_gateway_interface_test.go index 3be581784..102ada7c4 100644 --- a/nsxt/resource_nsxt_policy_tier0_gateway_interface_test.go +++ b/nsxt/resource_nsxt_policy_tier0_gateway_interface_test.go @@ -274,7 +274,7 @@ func TestAccResourceNsxtPolicyTier0GatewayInterface_ospf(t *testing.T) { enablePim := "false" resource.Test(t, resource.TestCase{ - PreCheck: func() { testAccPreCheck(t); testAccOnlyLocalManager(t); testAccNSXVersion(t, "3.0.0") }, + PreCheck: func() { testAccPreCheck(t); testAccOnlyLocalManager(t); testAccNSXVersion(t, "3.1.0") }, Providers: testAccProviders, CheckDestroy: func(state *terraform.State) error { return testAccNsxtPolicyTier0InterfaceCheckDestroy(state, updatedName) diff --git a/nsxt/resource_nsxt_policy_vlan_segment_test.go b/nsxt/resource_nsxt_policy_vlan_segment_test.go index b013fe0ab..2b6f3676d 100644 --- a/nsxt/resource_nsxt_policy_vlan_segment_test.go +++ b/nsxt/resource_nsxt_policy_vlan_segment_test.go @@ -74,7 +74,7 @@ func TestAccResourceNsxtPolicyVlanSegment_updateAdvConfig(t *testing.T) { testResourceName := "nsxt_policy_vlan_segment.test" resource.ParallelTest(t, resource.TestCase{ - PreCheck: func() { testAccPreCheck(t) }, + PreCheck: func() { testAccPreCheck(t); testAccNSXVersion(t, "3.1.0") }, Providers: testAccProviders, CheckDestroy: func(state *terraform.State) error { return testAccNsxtPolicyVlanSegmentCheckDestroy(state, name) diff --git a/nsxt/segment_common.go b/nsxt/segment_common.go index bb44f7906..379b897c3 100644 --- a/nsxt/segment_common.go +++ b/nsxt/segment_common.go @@ -757,8 +757,10 @@ func policySegmentResourceToInfraStruct(id string, d *schema.ResourceData, isVla advConfigStruct.UplinkTeamingPolicyName = &teamingPolicy } - urpfMode := advConfigMap["urpf_mode"].(string) - advConfigStruct.UrpfMode = &urpfMode + if nsxVersionHigherOrEqual("3.1.0") { + urpfMode := advConfigMap["urpf_mode"].(string) + advConfigStruct.UrpfMode = &urpfMode + } } obj.AdvancedConfig = &advConfigStruct } @@ -1309,6 +1311,11 @@ func nsxtPolicySegmentRead(d *schema.ResourceData, m interface{}, isVlan bool, i } if obj.AdvancedConfig.UrpfMode != nil { advConfig["urpf_mode"] = *obj.AdvancedConfig.UrpfMode + } else { + if nsxVersionLower("3.1.0") { + // set to default in early versions + advConfig["urpf_mode"] = model.SegmentAdvancedConfig_URPF_MODE_STRICT + } } // This is a list with 1 element var advConfigList []map[string]interface{} diff --git a/website/docs/r/policy_evpn_config.html.markdown b/website/docs/r/policy_evpn_config.html.markdown index 337adcc8b..b5ebc078c 100644 --- a/website/docs/r/policy_evpn_config.html.markdown +++ b/website/docs/r/policy_evpn_config.html.markdown @@ -10,6 +10,7 @@ description: A resource to configure EVPN Settings of Tier0 Gateway. This resource provides a method to configure EVPN on T0 Gateway. A single resource should be configured per Gateway. This resource is applicable to NSX Policy Manager only. +This resource is supported with NSX 3.1.0 onwards. ## Example Usage diff --git a/website/docs/r/policy_evpn_tenant.html.markdown b/website/docs/r/policy_evpn_tenant.html.markdown index ef7b5f5d8..6bbb78fe9 100644 --- a/website/docs/r/policy_evpn_tenant.html.markdown +++ b/website/docs/r/policy_evpn_tenant.html.markdown @@ -10,6 +10,7 @@ description: A resource to configure EVPN Tenant in NSX Policy manager. This resource provides a method for the management of EVPN Tenant. This resource is applicable to NSX Policy Manager. +This resource is supported with NSX 3.1.0 onwards. ## Example Usage diff --git a/website/docs/r/policy_evpn_tunnel_endpoint.html.markdown b/website/docs/r/policy_evpn_tunnel_endpoint.html.markdown index 8899481f6..737cfe58e 100644 --- a/website/docs/r/policy_evpn_tunnel_endpoint.html.markdown +++ b/website/docs/r/policy_evpn_tunnel_endpoint.html.markdown @@ -10,6 +10,7 @@ description: A resource to configure EVPN Tunnel Endpoint in NSX Policy manager. This resource provides a method for the management of EVPN Tunnel Endpoint. This resource is applicable to NSX Policy Manager. +This resource is supported with NSX 3.1.0 onwards. ## Example Usage diff --git a/website/docs/r/policy_gateway_redistribution_config.html.markdown b/website/docs/r/policy_gateway_redistribution_config.html.markdown index dc4394301..5a85ae80a 100644 --- a/website/docs/r/policy_gateway_redistribution_config.html.markdown +++ b/website/docs/r/policy_gateway_redistribution_config.html.markdown @@ -55,7 +55,7 @@ The following arguments are supported: * `gateway_path` - (Required) Policy path to Tier0 Gateway. * `site_path` - (Optional) Policy path to Global Manager site (domain). This attribute is required for NSX Global Manager and not applicable otherwise. * `bgp_enabled` - (Optional) Enable route redistribution for BGP. Defaults to `true`. -* `ospf_enabled` - (Optional) Enable route redistribution for OSPF. Defaults to `false`. +* `ospf_enabled` - (Optional) Enable route redistribution for OSPF. Defaults to `false`. Applicable from NSX 3.1.0 onwards. * `rule` - (Optional) List of redistribution rules. * `name` - (Optional) Rule name. * `route_map_path` - (Optional) Route map to be associated with the redistribution rule. diff --git a/website/docs/r/policy_intrusion_service_policy.html.markdown b/website/docs/r/policy_intrusion_service_policy.html.markdown index 4b42d5481..03d1162b7 100644 --- a/website/docs/r/policy_intrusion_service_policy.html.markdown +++ b/website/docs/r/policy_intrusion_service_policy.html.markdown @@ -9,7 +9,7 @@ description: A resource to configure Intrusion Service Policy and its rules. This resource provides a method for the management of Intrusion Service (IDS) Policy and rules under it. -This resource is applicable to NSX Policy Manager and VMC (NSX version 3.0.0 and up). +This resource is applicable to NSX Policy Manager and VMC (NSX version 3.1.0 and up). ## Example Usage diff --git a/website/docs/r/policy_intrusion_service_profile.html.markdown b/website/docs/r/policy_intrusion_service_profile.html.markdown index 9d718f821..3e1d73987 100644 --- a/website/docs/r/policy_intrusion_service_profile.html.markdown +++ b/website/docs/r/policy_intrusion_service_profile.html.markdown @@ -9,7 +9,7 @@ description: A resource to configure Intrusion Service Profile. This resource provides a method for the management of Intrusion Service (IDS) Profile. -This resource is applicable to NSX Policy Manager and VMC (NSX version 3.0.0 and up). +This resource is applicable to NSX Policy Manager and VMC (NSX version 3.1.0 and up). ## Example Usage diff --git a/website/docs/r/policy_ospf_area.html.markdown b/website/docs/r/policy_ospf_area.html.markdown index 4b0713870..2712c4cd6 100644 --- a/website/docs/r/policy_ospf_area.html.markdown +++ b/website/docs/r/policy_ospf_area.html.markdown @@ -10,6 +10,7 @@ description: A resource to configure a OSPF Area. This resource provides a method for the management of OSPF Area. Only a single area is supported so far per Tier-0 Gateway OSPF Config. This resource is applicable to NSX Policy Manager only. +This resource is supported with NSX 3.1.0 onwards. ## Example Usage diff --git a/website/docs/r/policy_ospf_config.html.markdown b/website/docs/r/policy_ospf_config.html.markdown index d01a50212..7ebae0f80 100644 --- a/website/docs/r/policy_ospf_config.html.markdown +++ b/website/docs/r/policy_ospf_config.html.markdown @@ -10,6 +10,7 @@ description: A resource to configure OSPF Settings of Tier0 Gateway on NSX Polic This resource provides a method for the management of OSPF for T0 Gateway on default locale service. A single resource should be specified per T0 Gateway. Edge Cluster is expected to be configured on the Gateway. This resource is applicable to NSX Policy Manager only. +This resource is supported with NSX 3.1.0 onwards. ~> **NOTE:** NSX does not support deleting OSPF config on gateway, therefore this resource will update NSX object, but never delete it. To undo OSPF configuration, please disable it within the resource. diff --git a/website/docs/r/policy_tier0_gateway.html.markdown b/website/docs/r/policy_tier0_gateway.html.markdown index 7ab5074d9..bef78e6a8 100644 --- a/website/docs/r/policy_tier0_gateway.html.markdown +++ b/website/docs/r/policy_tier0_gateway.html.markdown @@ -170,7 +170,7 @@ The following arguments are supported: * `fallback_site_paths` - (Optional) Fallback sites to be used as new primary site on current primary site failure. * `redistribution_config` - (Deprecated) Route redistribution properties. This setting is for local manager only. This setting is deprecated, please use `nsxt_policy_gateway_redistribution_config` resource instead. * `enabled` - Enable route redistribution for BGP. Defaults to `true`. - * `ospf_enabled` - (Optional) Enable route redistribution for OSPF. Defaults to `false`. + * `ospf_enabled` - (Optional) Enable route redistribution for OSPF. Defaults to `false`. Applicable from NSX 3.1.0 onwards. * `rule` - (Optional) List of redistribution rules. * `name` - (Optional) Rule name. * `route_map_path` - (Optional) Route map to be associated with the redistribution rule.