weizhouapache commented on code in PR #419:
URL: 
https://github.com/apache/cloudstack-documentation/pull/419#discussion_r1722796342


##########
source/adminguide/networking/dynamic_static_routing.rst:
##########
@@ -0,0 +1,260 @@
+.. Licensed to the Apache Software Foundation (ASF) under one
+   or more contributor license agreements.  See the NOTICE file
+   distributed with this work for additional information#
+   regarding copyright ownership.  The ASF licenses this file
+   to you under the Apache License, Version 2.0 (the
+   "License"); you may not use this file except in compliance
+   with the License.  You may obtain a copy of the License at
+   http://www.apache.org/licenses/LICENSE-2.0
+   Unless required by applicable law or agreed to in writing,
+   software distributed under the License is distributed on an
+   "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+   KIND, either express or implied.  See the License for the
+   specific language governing permissions and limitations
+   under the License.
+
+
+Dynamic and Static Routing
+-----------------------------
+
+For VMs on Isolated networks, the IP of VMs are not publicly accessible.
+To access the VMs from the Internet, Users need to create Load balanceing 
rules,
+Port Forwarding rules, enable Static NAT, or enable VPN.
+
+The IPv6 static routing feature has been introduced in Apache CloudStack 
4.17.0.0, so that
+users are able to access the IPv6 address of guest VMs on Isolated networks 
from the Internet or public network.
+For more information, see `“IPv6 support for isolated networks and VPC Network 
Tiers” <../plugins/ipv6.html#isolated-network-and-vpc-network-tier>`_.
+
+From Apache CloudStack 4.20.0.0, users are able to create isolated networks 
and VPCs with ROUTED mode.
+
+- Manage IPv4 subnets for Zones (ROOT admin/operator only)
+- Create Networks with Static Routing for IPv4
+- Manage IPv4 Routing Firewall for Networks
+- Manage AS number and BPG peers for Dynamic Routing (ROOT admin only)
+- Create Networks with Dynamic Routing for IPv4 and IPv6
+
+
+About Network Mode
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+
+Network mode indicates the mode with which the isolated network or VPC will 
operate.
+There are two valid options
+
+- NATTED. This is the default network mode of isolated networks. The VR of 
isolated networks and VPCs provides Source NAT services, as well as Static NAT, 
Load Balancer, Port Forwarding, Vpn if the network offering supports.
+- ROUTED. For isolated networks in ROUTED mode, the VR no longer supports 
Source NAT, Static NAT, Load Balancer, Port Forwarding and Vpn. The supported 
services are Dns, Dhcp, Userdata, Firewall (for isolated networks) and Network 
ACL (for vpc and vpc networks).
+
+
+About Routing mode
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+
+Routing mode indicates how routing will operate with the isolated networks 
with ROUTED network mode.
+There are two valid options
+
+- Static. The operators need to add the static routes to the isolated networks 
or VPCs in the upstream router manually.
+- Dynamic. The AS number will be automatically allocated, and BGP peer 
sessions will be set up automatically in the VR of the isolated networks or 
VPCs. The operators need to add the AS number ranges and BGP peers for each 
zone before creating network with Dynamic routing mode.
+
+
+Manage IPv4 Subnets for Zone
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+
+Like IPv6 prefixes, operators need to configure the IPv4 subnets for zone, 
which will be eventually used by guest networks.
+
+Supported CloudStack APIs for operators to manage the IPv4 subnets for zone 
are:
+
+- **createIpv4SubnetForZone** : create an IPv4 subnet for zone
+- **dedicateIpv4SubnetForZone** : dedicate an IPv4 subnet for zone to a domain 
or an account
+- **deleteIpv4SubnetForZone** : delete an IPv4 subnet for zone
+- **listIpv4SubnetsForZone** : list IPv4 subnets for zone
+- **releaseIpv4SubnetForZone** : release a dedicated IPv4 subnet for zone from 
a domain or an account
+- **updateIpv4SubnetForZone** : update an IPv4 subnet for zone
+
+Operators (root admins) can manage the IPv4 subnets for zone by navigating to 
Infrastructure -> Zones -> IPv4 Subnets
+|manage-ipv4-subnets-for-zone.png|
+
+
+Manage IPv4 Subnets for Guest Networks
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+
+Unlike IPv6 (each isolated network with IPv6 support gets a /64 IPv6 network), 
operators need to manage IPv4 subnets for guest networks.
+An IPv4 subnet for guest networks is created from its parent which is a IPv4 
subnet for zone.
+
+There are some global settings which can be set for each account. See below
+
+.. cssclass:: table-striped table-bordered table-hover
+
+================================================= ========================
+Configuration                                       Description
+================================================= ========================
+routed.ipv4.network.cidr.auto.allocation.enabled    Whether the 
auto-allocation of network CIDR for routed network is enabled or not. True by 
default.
+routed.ipv4.network.max.cidr.size                   The maximum value of the 
cidr size for isolated networks in ROUTED mode    
+routed.ipv4.network.min.cidr.size                   The minimum value of the 
cidr size for isolated networks in ROUTED mode    
+routed.ipv4.vpc.max.cidr.size                       The maximum value of the 
cidr size for VPC in ROUTED mode  
+routed.ipv4.vpc.min.cidr.size                       The minimum value of the 
cidr size for VPC in ROUTED mode  
+================================================= ========================
+
+Supported CloudStack APIs for operators to manage the IPv4 subnets for guest 
networks are:
+
+- **createIpv4SubnetForGuestNetwork** : create an IPv4 subnet for guest 
networks
+- **deleteIpv4SubnetForGuestNetwork** : delete an IPv4 subnet for guest 
networks
+- **listIpv4SubnetsForGuestNetwork** : list IPv4 subnets for guest networks
+ 
+Operators (root admins) can manage the IPv4 subnet by navigating to Network -> 
IPv4 Subnets
+|manage-ipv4-subnets-for-networks.png|
+
+
+Create Network and VPC Offering with ROUTED mode
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+
+To create network offering with ROUTED mode, see `“Creating a New Network 
Offering” <networking.html#creating-a-new-network-offering>`_.
+
+|routed-add-network-offering.png|
+
+To create VPC offering with ROUTED mode, see below
+
+|routed-add-vpc-offering.png|
+
+
+Create Network with Static Routing for IPv4
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+
+To create a network with static routing, users need to navigate to Network -> 
Add Network -> Isolated, and
+
+- Choose a network offering with ROUTED mode and routing mode is Static
+- Specify the gateway and netmask (available for ROOT admin only)
+- OR, specify the cidrsize (available for all users)
+
+|routed-add-network-cidrsize.png|
+
+If cidrsize is specified, CloudStack will allocate an IPv4 subnet for guest 
network to the net network
+
+- Check if there is an IPv4 subnet with same CIDR size available,
+- If not, and setting "routed.ipv4.network.cidr.auto.allocation.enabled" is 
true for account, allocate an IPv4 subnet for the new network, from the IPv4 
subnet for zone which the account can access.
+- Otherwise, the network creation fails.
+
+When the network is implemented, the Ipv4 routes are displayed in the network 
details page.
+
+|routed-ipv4-routes.png|
+
+
+Create Network with Static Routing for IPv6
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+
+The IPv6 static routing has been introduced in Apache CloudStack 4.17.0.0.
+For more information, see `“IPv6 support for isolated networks and VPC Network 
Tiers” <../plugins/ipv6.html#isolated-network-and-vpc-network-tier>`_.
+
+Users can create network with static routing for both IPv4 and IPv6, if the 
network offering supports DualStack.
+
+
+Manage IPv4 Routing Firewall
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+
+Users can manage the IPv4 Routing firewalls by navigating to Network -> Guest 
Networks -> choose a network -> IPv4 Routing Firewall
+
+|routed-ipv4-routing-firewall.png|
+
+Supported CloudStack API for operators to manage the IPv4 Routing firewall 
rules are:

Review Comment:
   ```suggestion
   Supported CloudStack APIs for operators to manage the IPv4 Routing firewall 
rules are:
   ```



##########
source/adminguide/networking/dynamic_static_routing.rst:
##########
@@ -0,0 +1,260 @@
+.. Licensed to the Apache Software Foundation (ASF) under one
+   or more contributor license agreements.  See the NOTICE file
+   distributed with this work for additional information#
+   regarding copyright ownership.  The ASF licenses this file
+   to you under the Apache License, Version 2.0 (the
+   "License"); you may not use this file except in compliance
+   with the License.  You may obtain a copy of the License at
+   http://www.apache.org/licenses/LICENSE-2.0
+   Unless required by applicable law or agreed to in writing,
+   software distributed under the License is distributed on an
+   "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+   KIND, either express or implied.  See the License for the
+   specific language governing permissions and limitations
+   under the License.
+
+
+Dynamic and Static Routing
+-----------------------------
+
+For VMs on Isolated networks, the IP of VMs are not publicly accessible.
+To access the VMs from the Internet, Users need to create Load balanceing 
rules,
+Port Forwarding rules, enable Static NAT, or enable VPN.
+
+The IPv6 static routing feature has been introduced in Apache CloudStack 
4.17.0.0, so that
+users are able to access the IPv6 address of guest VMs on Isolated networks 
from the Internet or public network.
+For more information, see `“IPv6 support for isolated networks and VPC Network 
Tiers” <../plugins/ipv6.html#isolated-network-and-vpc-network-tier>`_.
+
+From Apache CloudStack 4.20.0.0, users are able to create isolated networks 
and VPCs with ROUTED mode.
+
+- Manage IPv4 subnets for Zones (ROOT admin/operator only)
+- Create Networks with Static Routing for IPv4
+- Manage IPv4 Routing Firewall for Networks
+- Manage AS number and BPG peers for Dynamic Routing (ROOT admin only)
+- Create Networks with Dynamic Routing for IPv4 and IPv6
+
+
+About Network Mode
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+
+Network mode indicates the mode with which the isolated network or VPC will 
operate.
+There are two valid options
+
+- NATTED. This is the default network mode of isolated networks. The VR of 
isolated networks and VPCs provides Source NAT services, as well as Static NAT, 
Load Balancer, Port Forwarding, Vpn if the network offering supports.
+- ROUTED. For isolated networks in ROUTED mode, the VR no longer supports 
Source NAT, Static NAT, Load Balancer, Port Forwarding and Vpn. The supported 
services are Dns, Dhcp, Userdata, Firewall (for isolated networks) and Network 
ACL (for vpc and vpc networks).
+
+
+About Routing mode
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+
+Routing mode indicates how routing will operate with the isolated networks 
with ROUTED network mode.
+There are two valid options
+
+- Static. The operators need to add the static routes to the isolated networks 
or VPCs in the upstream router manually.
+- Dynamic. The AS number will be automatically allocated, and BGP peer 
sessions will be set up automatically in the VR of the isolated networks or 
VPCs. The operators need to add the AS number ranges and BGP peers for each 
zone before creating network with Dynamic routing mode.
+
+
+Manage IPv4 Subnets for Zone
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+
+Like IPv6 prefixes, operators need to configure the IPv4 subnets for zone, 
which will be eventually used by guest networks.
+
+Supported CloudStack APIs for operators to manage the IPv4 subnets for zone 
are:
+
+- **createIpv4SubnetForZone** : create an IPv4 subnet for zone
+- **dedicateIpv4SubnetForZone** : dedicate an IPv4 subnet for zone to a domain 
or an account
+- **deleteIpv4SubnetForZone** : delete an IPv4 subnet for zone
+- **listIpv4SubnetsForZone** : list IPv4 subnets for zone
+- **releaseIpv4SubnetForZone** : release a dedicated IPv4 subnet for zone from 
a domain or an account
+- **updateIpv4SubnetForZone** : update an IPv4 subnet for zone
+
+Operators (root admins) can manage the IPv4 subnets for zone by navigating to 
Infrastructure -> Zones -> IPv4 Subnets
+|manage-ipv4-subnets-for-zone.png|
+
+
+Manage IPv4 Subnets for Guest Networks
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+
+Unlike IPv6 (each isolated network with IPv6 support gets a /64 IPv6 network), 
operators need to manage IPv4 subnets for guest networks.
+An IPv4 subnet for guest networks is created from its parent which is a IPv4 
subnet for zone.
+
+There are some global settings which can be set for each account. See below
+
+.. cssclass:: table-striped table-bordered table-hover
+
+================================================= ========================
+Configuration                                       Description
+================================================= ========================
+routed.ipv4.network.cidr.auto.allocation.enabled    Whether the 
auto-allocation of network CIDR for routed network is enabled or not. True by 
default.
+routed.ipv4.network.max.cidr.size                   The maximum value of the 
cidr size for isolated networks in ROUTED mode    
+routed.ipv4.network.min.cidr.size                   The minimum value of the 
cidr size for isolated networks in ROUTED mode    
+routed.ipv4.vpc.max.cidr.size                       The maximum value of the 
cidr size for VPC in ROUTED mode  
+routed.ipv4.vpc.min.cidr.size                       The minimum value of the 
cidr size for VPC in ROUTED mode  
+================================================= ========================
+
+Supported CloudStack APIs for operators to manage the IPv4 subnets for guest 
networks are:
+
+- **createIpv4SubnetForGuestNetwork** : create an IPv4 subnet for guest 
networks
+- **deleteIpv4SubnetForGuestNetwork** : delete an IPv4 subnet for guest 
networks
+- **listIpv4SubnetsForGuestNetwork** : list IPv4 subnets for guest networks
+ 
+Operators (root admins) can manage the IPv4 subnet by navigating to Network -> 
IPv4 Subnets
+|manage-ipv4-subnets-for-networks.png|
+
+
+Create Network and VPC Offering with ROUTED mode
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+
+To create network offering with ROUTED mode, see `“Creating a New Network 
Offering” <networking.html#creating-a-new-network-offering>`_.
+
+|routed-add-network-offering.png|
+
+To create VPC offering with ROUTED mode, see below
+
+|routed-add-vpc-offering.png|
+
+
+Create Network with Static Routing for IPv4
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+
+To create a network with static routing, users need to navigate to Network -> 
Add Network -> Isolated, and
+
+- Choose a network offering with ROUTED mode and routing mode is Static
+- Specify the gateway and netmask (available for ROOT admin only)
+- OR, specify the cidrsize (available for all users)
+
+|routed-add-network-cidrsize.png|
+
+If cidrsize is specified, CloudStack will allocate an IPv4 subnet for guest 
network to the net network
+
+- Check if there is an IPv4 subnet with same CIDR size available,
+- If not, and setting "routed.ipv4.network.cidr.auto.allocation.enabled" is 
true for account, allocate an IPv4 subnet for the new network, from the IPv4 
subnet for zone which the account can access.
+- Otherwise, the network creation fails.
+
+When the network is implemented, the Ipv4 routes are displayed in the network 
details page.
+
+|routed-ipv4-routes.png|
+
+
+Create Network with Static Routing for IPv6
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+
+The IPv6 static routing has been introduced in Apache CloudStack 4.17.0.0.
+For more information, see `“IPv6 support for isolated networks and VPC Network 
Tiers” <../plugins/ipv6.html#isolated-network-and-vpc-network-tier>`_.
+
+Users can create network with static routing for both IPv4 and IPv6, if the 
network offering supports DualStack.
+
+
+Manage IPv4 Routing Firewall
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+
+Users can manage the IPv4 Routing firewalls by navigating to Network -> Guest 
Networks -> choose a network -> IPv4 Routing Firewall
+
+|routed-ipv4-routing-firewall.png|
+
+Supported CloudStack API for operators to manage the IPv4 Routing firewall 
rules are:
+
+- **createRoutingFirewallRule** : create an IPv4 routing firewall rule
+- **updateRoutingFirewallRule** : update an IPv4 routing firewall rule
+- **deleteRoutingFirewallRule** : delete an IPv4 routing firewall rule
+- **listRoutingFirewallRules** : list IPv4 routing firewall rules
+
+
+Manage AS number for Dynamic Routing
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+
+To create network with dynamic routing, operators must add AS number ranges in 
advance by navigating to Infrastructure -> Zones -> choose a zone -> AS Number.
+
+|dynamic-routing-as-number-ranges.png|
+
+Supported CloudStack API for operators to manage the AS number ranges and AS 
numbers are:

Review Comment:
   ```suggestion
   Supported CloudStack APIs for operators to manage the AS number ranges and 
AS numbers are:
   ```



##########
source/adminguide/networking/dynamic_static_routing.rst:
##########
@@ -0,0 +1,260 @@
+.. Licensed to the Apache Software Foundation (ASF) under one
+   or more contributor license agreements.  See the NOTICE file
+   distributed with this work for additional information#
+   regarding copyright ownership.  The ASF licenses this file
+   to you under the Apache License, Version 2.0 (the
+   "License"); you may not use this file except in compliance
+   with the License.  You may obtain a copy of the License at
+   http://www.apache.org/licenses/LICENSE-2.0
+   Unless required by applicable law or agreed to in writing,
+   software distributed under the License is distributed on an
+   "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+   KIND, either express or implied.  See the License for the
+   specific language governing permissions and limitations
+   under the License.
+
+
+Dynamic and Static Routing
+-----------------------------
+
+For VMs on Isolated networks, the IP of VMs are not publicly accessible.
+To access the VMs from the Internet, Users need to create Load balanceing 
rules,
+Port Forwarding rules, enable Static NAT, or enable VPN.
+
+The IPv6 static routing feature has been introduced in Apache CloudStack 
4.17.0.0, so that
+users are able to access the IPv6 address of guest VMs on Isolated networks 
from the Internet or public network.
+For more information, see `“IPv6 support for isolated networks and VPC Network 
Tiers” <../plugins/ipv6.html#isolated-network-and-vpc-network-tier>`_.
+
+From Apache CloudStack 4.20.0.0, users are able to create isolated networks 
and VPCs with ROUTED mode.
+
+- Manage IPv4 subnets for Zones (ROOT admin/operator only)
+- Create Networks with Static Routing for IPv4
+- Manage IPv4 Routing Firewall for Networks
+- Manage AS number and BPG peers for Dynamic Routing (ROOT admin only)
+- Create Networks with Dynamic Routing for IPv4 and IPv6
+
+
+About Network Mode
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+
+Network mode indicates the mode with which the isolated network or VPC will 
operate.
+There are two valid options
+
+- NATTED. This is the default network mode of isolated networks. The VR of 
isolated networks and VPCs provides Source NAT services, as well as Static NAT, 
Load Balancer, Port Forwarding, Vpn if the network offering supports.
+- ROUTED. For isolated networks in ROUTED mode, the VR no longer supports 
Source NAT, Static NAT, Load Balancer, Port Forwarding and Vpn. The supported 
services are Dns, Dhcp, Userdata, Firewall (for isolated networks) and Network 
ACL (for vpc and vpc networks).
+
+
+About Routing mode
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+
+Routing mode indicates how routing will operate with the isolated networks 
with ROUTED network mode.
+There are two valid options
+
+- Static. The operators need to add the static routes to the isolated networks 
or VPCs in the upstream router manually.
+- Dynamic. The AS number will be automatically allocated, and BGP peer 
sessions will be set up automatically in the VR of the isolated networks or 
VPCs. The operators need to add the AS number ranges and BGP peers for each 
zone before creating network with Dynamic routing mode.
+
+
+Manage IPv4 Subnets for Zone
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+
+Like IPv6 prefixes, operators need to configure the IPv4 subnets for zone, 
which will be eventually used by guest networks.
+
+Supported CloudStack APIs for operators to manage the IPv4 subnets for zone 
are:
+
+- **createIpv4SubnetForZone** : create an IPv4 subnet for zone
+- **dedicateIpv4SubnetForZone** : dedicate an IPv4 subnet for zone to a domain 
or an account
+- **deleteIpv4SubnetForZone** : delete an IPv4 subnet for zone
+- **listIpv4SubnetsForZone** : list IPv4 subnets for zone
+- **releaseIpv4SubnetForZone** : release a dedicated IPv4 subnet for zone from 
a domain or an account
+- **updateIpv4SubnetForZone** : update an IPv4 subnet for zone
+
+Operators (root admins) can manage the IPv4 subnets for zone by navigating to 
Infrastructure -> Zones -> IPv4 Subnets
+|manage-ipv4-subnets-for-zone.png|
+
+
+Manage IPv4 Subnets for Guest Networks
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+
+Unlike IPv6 (each isolated network with IPv6 support gets a /64 IPv6 network), 
operators need to manage IPv4 subnets for guest networks.
+An IPv4 subnet for guest networks is created from its parent which is a IPv4 
subnet for zone.
+
+There are some global settings which can be set for each account. See below
+
+.. cssclass:: table-striped table-bordered table-hover
+
+================================================= ========================
+Configuration                                       Description
+================================================= ========================
+routed.ipv4.network.cidr.auto.allocation.enabled    Whether the 
auto-allocation of network CIDR for routed network is enabled or not. True by 
default.
+routed.ipv4.network.max.cidr.size                   The maximum value of the 
cidr size for isolated networks in ROUTED mode    
+routed.ipv4.network.min.cidr.size                   The minimum value of the 
cidr size for isolated networks in ROUTED mode    
+routed.ipv4.vpc.max.cidr.size                       The maximum value of the 
cidr size for VPC in ROUTED mode  
+routed.ipv4.vpc.min.cidr.size                       The minimum value of the 
cidr size for VPC in ROUTED mode  
+================================================= ========================
+
+Supported CloudStack APIs for operators to manage the IPv4 subnets for guest 
networks are:
+
+- **createIpv4SubnetForGuestNetwork** : create an IPv4 subnet for guest 
networks
+- **deleteIpv4SubnetForGuestNetwork** : delete an IPv4 subnet for guest 
networks
+- **listIpv4SubnetsForGuestNetwork** : list IPv4 subnets for guest networks
+ 
+Operators (root admins) can manage the IPv4 subnet by navigating to Network -> 
IPv4 Subnets
+|manage-ipv4-subnets-for-networks.png|
+
+
+Create Network and VPC Offering with ROUTED mode
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+
+To create network offering with ROUTED mode, see `“Creating a New Network 
Offering” <networking.html#creating-a-new-network-offering>`_.
+
+|routed-add-network-offering.png|
+
+To create VPC offering with ROUTED mode, see below
+
+|routed-add-vpc-offering.png|
+
+
+Create Network with Static Routing for IPv4
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+
+To create a network with static routing, users need to navigate to Network -> 
Add Network -> Isolated, and
+
+- Choose a network offering with ROUTED mode and routing mode is Static
+- Specify the gateway and netmask (available for ROOT admin only)
+- OR, specify the cidrsize (available for all users)
+
+|routed-add-network-cidrsize.png|
+
+If cidrsize is specified, CloudStack will allocate an IPv4 subnet for guest 
network to the net network
+
+- Check if there is an IPv4 subnet with same CIDR size available,
+- If not, and setting "routed.ipv4.network.cidr.auto.allocation.enabled" is 
true for account, allocate an IPv4 subnet for the new network, from the IPv4 
subnet for zone which the account can access.
+- Otherwise, the network creation fails.
+
+When the network is implemented, the Ipv4 routes are displayed in the network 
details page.
+
+|routed-ipv4-routes.png|
+
+
+Create Network with Static Routing for IPv6
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+
+The IPv6 static routing has been introduced in Apache CloudStack 4.17.0.0.
+For more information, see `“IPv6 support for isolated networks and VPC Network 
Tiers” <../plugins/ipv6.html#isolated-network-and-vpc-network-tier>`_.
+
+Users can create network with static routing for both IPv4 and IPv6, if the 
network offering supports DualStack.
+
+
+Manage IPv4 Routing Firewall
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+
+Users can manage the IPv4 Routing firewalls by navigating to Network -> Guest 
Networks -> choose a network -> IPv4 Routing Firewall
+
+|routed-ipv4-routing-firewall.png|
+
+Supported CloudStack API for operators to manage the IPv4 Routing firewall 
rules are:
+
+- **createRoutingFirewallRule** : create an IPv4 routing firewall rule
+- **updateRoutingFirewallRule** : update an IPv4 routing firewall rule
+- **deleteRoutingFirewallRule** : delete an IPv4 routing firewall rule
+- **listRoutingFirewallRules** : list IPv4 routing firewall rules
+
+
+Manage AS number for Dynamic Routing
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+
+To create network with dynamic routing, operators must add AS number ranges in 
advance by navigating to Infrastructure -> Zones -> choose a zone -> AS Number.
+
+|dynamic-routing-as-number-ranges.png|
+
+Supported CloudStack API for operators to manage the AS number ranges and AS 
numbers are:
+
+- **createASNRange** : Creates a range of Autonomous Systems for BGP Dynamic 
Routing
+- **listASNRanges** : List Autonomous Systems Number Ranges
+- **deleteASNRange** : deletes a range of Autonomous Systems for BGP Dynamic 
Routing
+- **listASNumbers** : List Autonomous Systems Numbers
+- **releaseASNumber** : Releases an AS Number back to the pool
+
+Operators can list the AS numbers by navigating to Network -> AS Numbers
+
+|dynamic-routing-as-numbers.png|
+
+
+Manage BPG peers for Dynamic Routing
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+
+To create network with dynamic routing, operators must add BGP peers in 
advance. Guest networks with Dynamic Routing will connect to all BGP peers the 
account can access.
+
+|dynamic-routing-bgp-peers.png|
+
+Supported CloudStack API for operators to manage the BGP peers are:

Review Comment:
   ```suggestion
   Supported CloudStack APIs for operators to manage the BGP peers are:
   ```



-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: dev-unsubscr...@cloudstack.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org

Reply via email to