📂 File Browser

AgentAI/vendor/google/apiclient-services/src/NetworkManagement
🌙 Dark Mode
🎯 Quick Launch:

📁 Directories

📁 Resource/ 🔓 Open

📄 Files

🐘 AbortInfo.php
▶ Open 📄 View Source
🐘 AppEngineVersionEndpoint.php
▶ Open 📄 View Source
🐘 AppEngineVersionInfo.php
▶ Open 📄 View Source
🐘 AuditConfig.php
▶ Open 📄 View Source
🐘 AuditLogConfig.php
▶ Open 📄 View Source
🐘 Binding.php
▶ Open 📄 View Source
🐘 CancelOperationRequest.php
▶ Open 📄 View Source
🐘 CloudFunctionEndpoint.php
▶ Open 📄 View Source
🐘 CloudFunctionInfo.php
▶ Open 📄 View Source
🐘 CloudRunRevisionEndpoint.php
▶ Open 📄 View Source
🐘 CloudRunRevisionInfo.php
▶ Open 📄 View Source
🐘 CloudSQLInstanceInfo.php
▶ Open 📄 View Source
🐘 ConnectivityTest.php
▶ Open 📄 View Source
🐘 DeliverInfo.php
▶ Open 📄 View Source
🐘 DirectVpcEgressConnectionInfo.php
▶ Open 📄 View Source
🐘 DropInfo.php
▶ Open 📄 View Source
🐘 EdgeLocation.php
▶ Open 📄 View Source
🐘 EffectiveVpcFlowLogsConfig.php
▶ Open 📄 View Source
🐘 Endpoint.php
▶ Open 📄 View Source
🐘 EndpointInfo.php
▶ Open 📄 View Source
🐘 Expr.php
▶ Open 📄 View Source
🐘 FirewallInfo.php
▶ Open 📄 View Source
🐘 ForwardInfo.php
▶ Open 📄 View Source
🐘 ForwardingRuleInfo.php
▶ Open 📄 View Source
🐘 GKEMasterInfo.php
▶ Open 📄 View Source
🐘 GeoLocation.php
▶ Open 📄 View Source
🐘 GkeNetworkPolicyInfo.php
▶ Open 📄 View Source
🐘 GkeNetworkPolicySkippedInfo.php
▶ Open 📄 View Source
🐘 GkePodInfo.php
▶ Open 📄 View Source
🐘 GoogleManagedServiceInfo.php
▶ Open 📄 View Source
🐘 GoogleServiceInfo.php
▶ Open 📄 View Source
🐘 Host.php
▶ Open 📄 View Source
🐘 HybridSubnetInfo.php
▶ Open 📄 View Source
🐘 InstanceInfo.php
▶ Open 📄 View Source
🐘 InterconnectAttachmentInfo.php
▶ Open 📄 View Source
🐘 IpMasqueradingSkippedInfo.php
▶ Open 📄 View Source
🐘 LatencyDistribution.php
▶ Open 📄 View Source
🐘 LatencyPercentile.php
▶ Open 📄 View Source
🐘 ListConnectivityTestsResponse.php
▶ Open 📄 View Source
🐘 ListLocationsResponse.php
▶ Open 📄 View Source
🐘 ListMonitoringPointsResponse.php
▶ Open 📄 View Source
🐘 ListNetworkMonitoringProvidersResponse.php
▶ Open 📄 View Source
🐘 ListNetworkPathsResponse.php
▶ Open 📄 View Source
🐘 ListOperationsResponse.php
▶ Open 📄 View Source
🐘 ListVpcFlowLogsConfigsResponse.php
▶ Open 📄 View Source
🐘 ListWebPathsResponse.php
▶ Open 📄 View Source
🐘 LoadBalancerBackend.php
▶ Open 📄 View Source
🐘 LoadBalancerBackendInfo.php
▶ Open 📄 View Source
🐘 LoadBalancerInfo.php
▶ Open 📄 View Source
🐘 Location.php
▶ Open 📄 View Source
🐘 MonitoringPoint.php
▶ Open 📄 View Source
🐘 NatInfo.php
▶ Open 📄 View Source
🐘 NetworkInfo.php
▶ Open 📄 View Source
🐘 NetworkInterface.php
▶ Open 📄 View Source
🐘 NetworkMonitoringProvider.php
▶ Open 📄 View Source
🐘 NetworkPath.php
▶ Open 📄 View Source
🐘 NetworkmanagementEmpty.php
▶ Open 📄 View Source
🐘 NgfwPacketInspectionInfo.php
▶ Open 📄 View Source
🐘 Operation.php
▶ Open 📄 View Source
🐘 OperationMetadata.php
▶ Open 📄 View Source
🐘 Policy.php
▶ Open 📄 View Source
🐘 ProbingDetails.php
▶ Open 📄 View Source
🐘 ProviderTag.php
▶ Open 📄 View Source
🐘 ProxyConnectionInfo.php
▶ Open 📄 View Source
🐘 QueryOrgVpcFlowLogsConfigsResponse.php
▶ Open 📄 View Source
🐘 ReachabilityDetails.php
▶ Open 📄 View Source
🐘 RedisClusterInfo.php
▶ Open 📄 View Source
🐘 RedisInstanceInfo.php
▶ Open 📄 View Source
🐘 RerunConnectivityTestRequest.php
▶ Open 📄 View Source
🐘 RouteInfo.php
▶ Open 📄 View Source
🐘 ServerlessExternalConnectionInfo.php
▶ Open 📄 View Source
🐘 ServerlessNegInfo.php
▶ Open 📄 View Source
🐘 SetIamPolicyRequest.php
▶ Open 📄 View Source
🐘 ShowEffectiveFlowLogsConfigsResponse.php
▶ Open 📄 View Source
🐘 SingleEdgeResponse.php
▶ Open 📄 View Source
🐘 Status.php
▶ Open 📄 View Source
🐘 Step.php
▶ Open 📄 View Source
🐘 StorageBucketInfo.php
▶ Open 📄 View Source
🐘 TestIamPermissionsRequest.php
▶ Open 📄 View Source
🐘 TestIamPermissionsResponse.php
▶ Open 📄 View Source
🐘 Trace.php
▶ Open 📄 View Source
🐘 VpcConnectorInfo.php
▶ Open 📄 View Source
🐘 VpcFlowLogsConfig.php
▶ Open 📄 View Source
🐘 VpnGatewayInfo.php
▶ Open 📄 View Source
🐘 VpnTunnelInfo.php
▶ Open 📄 View Source
🐘 WebPath.php
▶ Open 📄 View Source

📄 Source: DropInfo.php

<?php
/*
 * Copyright 2014 Google Inc.
 *
 * Licensed under the Apache License, Version 2.0 (the "License"); you may not
 * use this file except in compliance with the License. You may obtain a copy of
 * the License at
 *
 * http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
 * License for the specific language governing permissions and limitations under
 * the License.
 */

namespace Google\Service\NetworkManagement;

class DropInfo extends \Google\Model
{
  /**
   * Cause is unspecified.
   */
  public const CAUSE_CAUSE_UNSPECIFIED = 'CAUSE_UNSPECIFIED';
  /**
   * Destination external address cannot be resolved to a known target. If the
   * address is used in a Google Cloud project, provide the project ID as test
   * input.
   */
  public const CAUSE_UNKNOWN_EXTERNAL_ADDRESS = 'UNKNOWN_EXTERNAL_ADDRESS';
  /**
   * A Compute Engine instance can only send or receive a packet with a foreign
   * IP address if ip_forward is enabled.
   */
  public const CAUSE_FOREIGN_IP_DISALLOWED = 'FOREIGN_IP_DISALLOWED';
  /**
   * Dropped due to a firewall rule, unless allowed due to connection tracking.
   */
  public const CAUSE_FIREWALL_RULE = 'FIREWALL_RULE';
  /**
   * Dropped due to no matching routes.
   */
  public const CAUSE_NO_ROUTE = 'NO_ROUTE';
  /**
   * Dropped due to invalid route. Route's next hop is a blackhole.
   */
  public const CAUSE_ROUTE_BLACKHOLE = 'ROUTE_BLACKHOLE';
  /**
   * Packet is sent to a wrong (unintended) network. Example: you trace a packet
   * from VM1:Network1 to VM2:Network2, however, the route configured in
   * Network1 sends the packet destined for VM2's IP address to Network3.
   */
  public const CAUSE_ROUTE_WRONG_NETWORK = 'ROUTE_WRONG_NETWORK';
  /**
   * Route's next hop IP address cannot be resolved to a GCP resource.
   */
  public const CAUSE_ROUTE_NEXT_HOP_IP_ADDRESS_NOT_RESOLVED = 'ROUTE_NEXT_HOP_IP_ADDRESS_NOT_RESOLVED';
  /**
   * Route's next hop resource is not found.
   */
  public const CAUSE_ROUTE_NEXT_HOP_RESOURCE_NOT_FOUND = 'ROUTE_NEXT_HOP_RESOURCE_NOT_FOUND';
  /**
   * Route's next hop instance doesn't have a NIC in the route's network.
   */
  public const CAUSE_ROUTE_NEXT_HOP_INSTANCE_WRONG_NETWORK = 'ROUTE_NEXT_HOP_INSTANCE_WRONG_NETWORK';
  /**
   * Route's next hop IP address is not a primary IP address of the next hop
   * instance.
   */
  public const CAUSE_ROUTE_NEXT_HOP_INSTANCE_NON_PRIMARY_IP = 'ROUTE_NEXT_HOP_INSTANCE_NON_PRIMARY_IP';
  /**
   * Route's next hop forwarding rule doesn't match next hop IP address.
   */
  public const CAUSE_ROUTE_NEXT_HOP_FORWARDING_RULE_IP_MISMATCH = 'ROUTE_NEXT_HOP_FORWARDING_RULE_IP_MISMATCH';
  /**
   * Route's next hop VPN tunnel is down (does not have valid IKE SAs).
   */
  public const CAUSE_ROUTE_NEXT_HOP_VPN_TUNNEL_NOT_ESTABLISHED = 'ROUTE_NEXT_HOP_VPN_TUNNEL_NOT_ESTABLISHED';
  /**
   * Route's next hop forwarding rule type is invalid (it's not a forwarding
   * rule of the internal passthrough load balancer).
   */
  public const CAUSE_ROUTE_NEXT_HOP_FORWARDING_RULE_TYPE_INVALID = 'ROUTE_NEXT_HOP_FORWARDING_RULE_TYPE_INVALID';
  /**
   * Packet is sent from the Internet to the private IPv6 address.
   */
  public const CAUSE_NO_ROUTE_FROM_INTERNET_TO_PRIVATE_IPV6_ADDRESS = 'NO_ROUTE_FROM_INTERNET_TO_PRIVATE_IPV6_ADDRESS';
  /**
   * Packet is sent from the Internet to the private IPv4 address.
   */
  public const CAUSE_NO_ROUTE_FROM_INTERNET_TO_PRIVATE_IPV4_ADDRESS = 'NO_ROUTE_FROM_INTERNET_TO_PRIVATE_IPV4_ADDRESS';
  /**
   * Packet is sent from the external IPv6 source address of an instance to the
   * private IPv6 address of an instance.
   */
  public const CAUSE_NO_ROUTE_FROM_EXTERNAL_IPV6_SOURCE_TO_PRIVATE_IPV6_ADDRESS = 'NO_ROUTE_FROM_EXTERNAL_IPV6_SOURCE_TO_PRIVATE_IPV6_ADDRESS';
  /**
   * The packet does not match a policy-based VPN tunnel local selector.
   */
  public const CAUSE_VPN_TUNNEL_LOCAL_SELECTOR_MISMATCH = 'VPN_TUNNEL_LOCAL_SELECTOR_MISMATCH';
  /**
   * The packet does not match a policy-based VPN tunnel remote selector.
   */
  public const CAUSE_VPN_TUNNEL_REMOTE_SELECTOR_MISMATCH = 'VPN_TUNNEL_REMOTE_SELECTOR_MISMATCH';
  /**
   * Packet with internal destination address sent to the internet gateway.
   */
  public const CAUSE_PRIVATE_TRAFFIC_TO_INTERNET = 'PRIVATE_TRAFFIC_TO_INTERNET';
  /**
   * Endpoint with only an internal IP address tries to access Google API and
   * services, but Private Google Access is not enabled in the subnet or is not
   * applicable.
   */
  public const CAUSE_PRIVATE_GOOGLE_ACCESS_DISALLOWED = 'PRIVATE_GOOGLE_ACCESS_DISALLOWED';
  /**
   * Source endpoint tries to access Google API and services through the VPN
   * tunnel to another network, but Private Google Access needs to be enabled in
   * the source endpoint network.
   */
  public const CAUSE_PRIVATE_GOOGLE_ACCESS_VIA_VPN_TUNNEL_UNSUPPORTED = 'PRIVATE_GOOGLE_ACCESS_VIA_VPN_TUNNEL_UNSUPPORTED';
  /**
   * Endpoint with only an internal IP address tries to access external hosts,
   * but there is no matching Cloud NAT gateway in the subnet.
   */
  public const CAUSE_NO_EXTERNAL_ADDRESS = 'NO_EXTERNAL_ADDRESS';
  /**
   * Destination internal address cannot be resolved to a known target. If this
   * is a shared VPC scenario, verify if the service project ID is provided as
   * test input. Otherwise, verify if the IP address is being used in the
   * project.
   */
  public const CAUSE_UNKNOWN_INTERNAL_ADDRESS = 'UNKNOWN_INTERNAL_ADDRESS';
  /**
   * Forwarding rule's protocol and ports do not match the packet header.
   */
  public const CAUSE_FORWARDING_RULE_MISMATCH = 'FORWARDING_RULE_MISMATCH';
  /**
   * Forwarding rule does not have backends configured.
   */
  public const CAUSE_FORWARDING_RULE_NO_INSTANCES = 'FORWARDING_RULE_NO_INSTANCES';
  /**
   * Firewalls block the health check probes to the backends and cause the
   * backends to be unavailable for traffic from the load balancer. For more
   * details, see [Health check firewall rules](https://cloud.google.com/load-
   * balancing/docs/health-checks#firewall_rules).
   */
  public const CAUSE_FIREWALL_BLOCKING_LOAD_BALANCER_BACKEND_HEALTH_CHECK = 'FIREWALL_BLOCKING_LOAD_BALANCER_BACKEND_HEALTH_CHECK';
  /**
   * Matching ingress firewall rules by network tags for packets sent via
   * serverless VPC direct egress is unsupported. Behavior is undefined.
   * https://cloud.google.com/run/docs/configuring/vpc-direct-vpc#limitations
   */
  public const CAUSE_INGRESS_FIREWALL_TAGS_UNSUPPORTED_BY_DIRECT_VPC_EGRESS = 'INGRESS_FIREWALL_TAGS_UNSUPPORTED_BY_DIRECT_VPC_EGRESS';
  /**
   * Packet is sent from or to a Compute Engine instance that is not in a
   * running state.
   */
  public const CAUSE_INSTANCE_NOT_RUNNING = 'INSTANCE_NOT_RUNNING';
  /**
   * Packet sent from or to a GKE cluster that is not in running state.
   */
  public const CAUSE_GKE_CLUSTER_NOT_RUNNING = 'GKE_CLUSTER_NOT_RUNNING';
  /**
   * Packet sent from or to a GKE Pod that is not in running state.
   */
  public const CAUSE_GKE_POD_NOT_RUNNING = 'GKE_POD_NOT_RUNNING';
  /**
   * Packet sent from or to a Cloud SQL instance that is not in running state.
   */
  public const CAUSE_CLOUD_SQL_INSTANCE_NOT_RUNNING = 'CLOUD_SQL_INSTANCE_NOT_RUNNING';
  /**
   * Packet sent from or to a Redis Instance that is not in running state.
   */
  public const CAUSE_REDIS_INSTANCE_NOT_RUNNING = 'REDIS_INSTANCE_NOT_RUNNING';
  /**
   * Packet sent from or to a Redis Cluster that is not in running state.
   */
  public const CAUSE_REDIS_CLUSTER_NOT_RUNNING = 'REDIS_CLUSTER_NOT_RUNNING';
  /**
   * The type of traffic is blocked and the user cannot configure a firewall
   * rule to enable it. See [Always blocked
   * traffic](https://cloud.google.com/vpc/docs/firewalls#blockedtraffic) for
   * more details.
   */
  public const CAUSE_TRAFFIC_TYPE_BLOCKED = 'TRAFFIC_TYPE_BLOCKED';
  /**
   * Access to Google Kubernetes Engine cluster master's endpoint is not
   * authorized. See [Access to the cluster
   * endpoints](https://cloud.google.com/kubernetes-engine/docs/how-to/private-
   * clusters#access_to_the_cluster_endpoints) for more details.
   */
  public const CAUSE_GKE_MASTER_UNAUTHORIZED_ACCESS = 'GKE_MASTER_UNAUTHORIZED_ACCESS';
  /**
   * Access to the Cloud SQL instance endpoint is not authorized. See
   * [Authorizing with authorized
   * networks](https://cloud.google.com/sql/docs/mysql/authorize-networks) for
   * more details.
   */
  public const CAUSE_CLOUD_SQL_INSTANCE_UNAUTHORIZED_ACCESS = 'CLOUD_SQL_INSTANCE_UNAUTHORIZED_ACCESS';
  /**
   * Packet was dropped inside Google Kubernetes Engine Service.
   */
  public const CAUSE_DROPPED_INSIDE_GKE_SERVICE = 'DROPPED_INSIDE_GKE_SERVICE';
  /**
   * Packet was dropped inside Cloud SQL Service.
   */
  public const CAUSE_DROPPED_INSIDE_CLOUD_SQL_SERVICE = 'DROPPED_INSIDE_CLOUD_SQL_SERVICE';
  /**
   * Packet was dropped because there is no peering between the originating
   * network and the Google Managed Services Network.
   */
  public const CAUSE_GOOGLE_MANAGED_SERVICE_NO_PEERING = 'GOOGLE_MANAGED_SERVICE_NO_PEERING';
  /**
   * Packet was dropped because the Google-managed service uses Private Service
   * Connect (PSC), but the PSC endpoint is not found in the project.
   */
  public const CAUSE_GOOGLE_MANAGED_SERVICE_NO_PSC_ENDPOINT = 'GOOGLE_MANAGED_SERVICE_NO_PSC_ENDPOINT';
  /**
   * Packet was dropped because the GKE cluster uses Private Service Connect
   * (PSC), but the PSC endpoint is not found in the project.
   */
  public const CAUSE_GKE_PSC_ENDPOINT_MISSING = 'GKE_PSC_ENDPOINT_MISSING';
  /**
   * Packet was dropped because the Cloud SQL instance has neither a private nor
   * a public IP address.
   */
  public const CAUSE_CLOUD_SQL_INSTANCE_NO_IP_ADDRESS = 'CLOUD_SQL_INSTANCE_NO_IP_ADDRESS';
  /**
   * Packet was dropped because a GKE cluster private endpoint is unreachable
   * from a region different from the cluster's region.
   */
  public const CAUSE_GKE_CONTROL_PLANE_REGION_MISMATCH = 'GKE_CONTROL_PLANE_REGION_MISMATCH';
  /**
   * Packet sent from a public GKE cluster control plane to a private IP
   * address.
   */
  public const CAUSE_PUBLIC_GKE_CONTROL_PLANE_TO_PRIVATE_DESTINATION = 'PUBLIC_GKE_CONTROL_PLANE_TO_PRIVATE_DESTINATION';
  /**
   * Packet was dropped because there is no route from a GKE cluster control
   * plane to a destination network.
   */
  public const CAUSE_GKE_CONTROL_PLANE_NO_ROUTE = 'GKE_CONTROL_PLANE_NO_ROUTE';
  /**
   * Packet sent from a Cloud SQL instance to an external IP address is not
   * allowed. The Cloud SQL instance is not configured to send packets to
   * external IP addresses.
   */
  public const CAUSE_CLOUD_SQL_INSTANCE_NOT_CONFIGURED_FOR_EXTERNAL_TRAFFIC = 'CLOUD_SQL_INSTANCE_NOT_CONFIGURED_FOR_EXTERNAL_TRAFFIC';
  /**
   * Packet sent from a Cloud SQL instance with only a public IP address to a
   * private IP address.
   */
  public const CAUSE_PUBLIC_CLOUD_SQL_INSTANCE_TO_PRIVATE_DESTINATION = 'PUBLIC_CLOUD_SQL_INSTANCE_TO_PRIVATE_DESTINATION';
  /**
   * Packet was dropped because there is no route from a Cloud SQL instance to a
   * destination network.
   */
  public const CAUSE_CLOUD_SQL_INSTANCE_NO_ROUTE = 'CLOUD_SQL_INSTANCE_NO_ROUTE';
  /**
   * Packet was dropped because the Cloud SQL instance requires all connections
   * to use Cloud SQL connectors and to target the Cloud SQL proxy port (3307).
   */
  public const CAUSE_CLOUD_SQL_CONNECTOR_REQUIRED = 'CLOUD_SQL_CONNECTOR_REQUIRED';
  /**
   * Packet could be dropped because the Cloud Function is not in an active
   * status.
   */
  public const CAUSE_CLOUD_FUNCTION_NOT_ACTIVE = 'CLOUD_FUNCTION_NOT_ACTIVE';
  /**
   * Packet could be dropped because no VPC connector is set.
   */
  public const CAUSE_VPC_CONNECTOR_NOT_SET = 'VPC_CONNECTOR_NOT_SET';
  /**
   * Packet could be dropped because the VPC connector is not in a running
   * state.
   */
  public const CAUSE_VPC_CONNECTOR_NOT_RUNNING = 'VPC_CONNECTOR_NOT_RUNNING';
  /**
   * Packet could be dropped because the traffic from the serverless service to
   * the VPC connector is not allowed.
   */
  public const CAUSE_VPC_CONNECTOR_SERVERLESS_TRAFFIC_BLOCKED = 'VPC_CONNECTOR_SERVERLESS_TRAFFIC_BLOCKED';
  /**
   * Packet could be dropped because the health check traffic to the VPC
   * connector is not allowed.
   */
  public const CAUSE_VPC_CONNECTOR_HEALTH_CHECK_TRAFFIC_BLOCKED = 'VPC_CONNECTOR_HEALTH_CHECK_TRAFFIC_BLOCKED';
  /**
   * Packet could be dropped because it was sent from a different region to a
   * regional forwarding without global access.
   */
  public const CAUSE_FORWARDING_RULE_REGION_MISMATCH = 'FORWARDING_RULE_REGION_MISMATCH';
  /**
   * The Private Service Connect endpoint is in a project that is not approved
   * to connect to the service.
   */
  public const CAUSE_PSC_CONNECTION_NOT_ACCEPTED = 'PSC_CONNECTION_NOT_ACCEPTED';
  /**
   * The packet is sent to the Private Service Connect endpoint over the
   * peering, but [it's not
   * supported](https://cloud.google.com/vpc/docs/configure-private-service-
   * connect-services#on-premises).
   */
  public const CAUSE_PSC_ENDPOINT_ACCESSED_FROM_PEERED_NETWORK = 'PSC_ENDPOINT_ACCESSED_FROM_PEERED_NETWORK';
  /**
   * The packet is sent to the Private Service Connect backend (network endpoint
   * group), but the producer PSC forwarding rule does not have global access
   * enabled.
   */
  public const CAUSE_PSC_NEG_PRODUCER_ENDPOINT_NO_GLOBAL_ACCESS = 'PSC_NEG_PRODUCER_ENDPOINT_NO_GLOBAL_ACCESS';
  /**
   * The packet is sent to the Private Service Connect backend (network endpoint
   * group), but the producer PSC forwarding rule has multiple ports specified.
   */
  public const CAUSE_PSC_NEG_PRODUCER_FORWARDING_RULE_MULTIPLE_PORTS = 'PSC_NEG_PRODUCER_FORWARDING_RULE_MULTIPLE_PORTS';
  /**
   * The packet is sent to the Private Service Connect backend (network endpoint
   * group) targeting a Cloud SQL service attachment, but this configuration is
   * not supported.
   */
  public const CAUSE_CLOUD_SQL_PSC_NEG_UNSUPPORTED = 'CLOUD_SQL_PSC_NEG_UNSUPPORTED';
  /**
   * No NAT subnets are defined for the PSC service attachment.
   */
  public const CAUSE_NO_NAT_SUBNETS_FOR_PSC_SERVICE_ATTACHMENT = 'NO_NAT_SUBNETS_FOR_PSC_SERVICE_ATTACHMENT';
  /**
   * PSC endpoint is accessed via NCC, but PSC transitivity configuration is not
   * yet propagated.
   */
  public const CAUSE_PSC_TRANSITIVITY_NOT_PROPAGATED = 'PSC_TRANSITIVITY_NOT_PROPAGATED';
  /**
   * The packet sent from the hybrid NEG proxy matches a non-dynamic route, but
   * such a configuration is not supported.
   */
  public const CAUSE_HYBRID_NEG_NON_DYNAMIC_ROUTE_MATCHED = 'HYBRID_NEG_NON_DYNAMIC_ROUTE_MATCHED';
  /**
   * The packet sent from the hybrid NEG proxy matches a dynamic route with a
   * next hop in a different region, but such a configuration is not supported.
   */
  public const CAUSE_HYBRID_NEG_NON_LOCAL_DYNAMIC_ROUTE_MATCHED = 'HYBRID_NEG_NON_LOCAL_DYNAMIC_ROUTE_MATCHED';
  /**
   * Packet sent from a Cloud Run revision that is not ready.
   */
  public const CAUSE_CLOUD_RUN_REVISION_NOT_READY = 'CLOUD_RUN_REVISION_NOT_READY';
  /**
   * Packet was dropped inside Private Service Connect service producer.
   */
  public const CAUSE_DROPPED_INSIDE_PSC_SERVICE_PRODUCER = 'DROPPED_INSIDE_PSC_SERVICE_PRODUCER';
  /**
   * Packet sent to a load balancer, which requires a proxy-only subnet and the
   * subnet is not found.
   */
  public const CAUSE_LOAD_BALANCER_HAS_NO_PROXY_SUBNET = 'LOAD_BALANCER_HAS_NO_PROXY_SUBNET';
  /**
   * Packet sent to Cloud Nat without active NAT IPs.
   */
  public const CAUSE_CLOUD_NAT_NO_ADDRESSES = 'CLOUD_NAT_NO_ADDRESSES';
  /**
   * Packet is stuck in a routing loop.
   */
  public const CAUSE_ROUTING_LOOP = 'ROUTING_LOOP';
  /**
   * Packet is dropped inside a Google-managed service due to being delivered in
   * return trace to an endpoint that doesn't match the endpoint the packet was
   * sent from in forward trace. Used only for return traces.
   */
  public const CAUSE_DROPPED_INSIDE_GOOGLE_MANAGED_SERVICE = 'DROPPED_INSIDE_GOOGLE_MANAGED_SERVICE';
  /**
   * Packet is dropped due to a load balancer backend instance not having a
   * network interface in the network expected by the load balancer.
   */
  public const CAUSE_LOAD_BALANCER_BACKEND_INVALID_NETWORK = 'LOAD_BALANCER_BACKEND_INVALID_NETWORK';
  /**
   * Packet is dropped due to a backend service named port not being defined on
   * the instance group level.
   */
  public const CAUSE_BACKEND_SERVICE_NAMED_PORT_NOT_DEFINED = 'BACKEND_SERVICE_NAMED_PORT_NOT_DEFINED';
  /**
   * Packet is dropped due to a destination IP range being part of a Private NAT
   * IP range.
   */
  public const CAUSE_DESTINATION_IS_PRIVATE_NAT_IP_RANGE = 'DESTINATION_IS_PRIVATE_NAT_IP_RANGE';
  /**
   * Generic drop cause for a packet being dropped inside a Redis Instance
   * service project.
   */
  public const CAUSE_DROPPED_INSIDE_REDIS_INSTANCE_SERVICE = 'DROPPED_INSIDE_REDIS_INSTANCE_SERVICE';
  /**
   * Packet is dropped due to an unsupported port being used to connect to a
   * Redis Instance. Port 6379 should be used to connect to a Redis Instance.
   */
  public const CAUSE_REDIS_INSTANCE_UNSUPPORTED_PORT = 'REDIS_INSTANCE_UNSUPPORTED_PORT';
  /**
   * Packet is dropped due to connecting from PUPI address to a PSA based Redis
   * Instance.
   */
  public const CAUSE_REDIS_INSTANCE_CONNECTING_FROM_PUPI_ADDRESS = 'REDIS_INSTANCE_CONNECTING_FROM_PUPI_ADDRESS';
  /**
   * Packet is dropped due to no route to the destination network.
   */
  public const CAUSE_REDIS_INSTANCE_NO_ROUTE_TO_DESTINATION_NETWORK = 'REDIS_INSTANCE_NO_ROUTE_TO_DESTINATION_NETWORK';
  /**
   * Redis Instance does not have an external IP address.
   */
  public const CAUSE_REDIS_INSTANCE_NO_EXTERNAL_IP = 'REDIS_INSTANCE_NO_EXTERNAL_IP';
  /**
   * Packet is dropped due to an unsupported protocol being used to connect to a
   * Redis Instance. Only TCP connections are accepted by a Redis Instance.
   */
  public const CAUSE_REDIS_INSTANCE_UNSUPPORTED_PROTOCOL = 'REDIS_INSTANCE_UNSUPPORTED_PROTOCOL';
  /**
   * Generic drop cause for a packet being dropped inside a Redis Cluster
   * service project.
   */
  public const CAUSE_DROPPED_INSIDE_REDIS_CLUSTER_SERVICE = 'DROPPED_INSIDE_REDIS_CLUSTER_SERVICE';
  /**
   * Packet is dropped due to an unsupported port being used to connect to a
   * Redis Cluster. Ports 6379 and 11000 to 13047 should be used to connect to a
   * Redis Cluster.
   */
  public const CAUSE_REDIS_CLUSTER_UNSUPPORTED_PORT = 'REDIS_CLUSTER_UNSUPPORTED_PORT';
  /**
   * Redis Cluster does not have an external IP address.
   */
  public const CAUSE_REDIS_CLUSTER_NO_EXTERNAL_IP = 'REDIS_CLUSTER_NO_EXTERNAL_IP';
  /**
   * Packet is dropped due to an unsupported protocol being used to connect to a
   * Redis Cluster. Only TCP connections are accepted by a Redis Cluster.
   */
  public const CAUSE_REDIS_CLUSTER_UNSUPPORTED_PROTOCOL = 'REDIS_CLUSTER_UNSUPPORTED_PROTOCOL';
  /**
   * Packet from the non-GCP (on-prem) or unknown GCP network is dropped due to
   * the destination IP address not belonging to any IP prefix advertised via
   * BGP by the Cloud Router.
   */
  public const CAUSE_NO_ADVERTISED_ROUTE_TO_GCP_DESTINATION = 'NO_ADVERTISED_ROUTE_TO_GCP_DESTINATION';
  /**
   * Packet from the non-GCP (on-prem) or unknown GCP network is dropped due to
   * the destination IP address not belonging to any IP prefix included to the
   * local traffic selector of the VPN tunnel.
   */
  public const CAUSE_NO_TRAFFIC_SELECTOR_TO_GCP_DESTINATION = 'NO_TRAFFIC_SELECTOR_TO_GCP_DESTINATION';
  /**
   * Packet from the unknown peered network is dropped due to no known route
   * from the source network to the destination IP address.
   */
  public const CAUSE_NO_KNOWN_ROUTE_FROM_PEERED_NETWORK_TO_DESTINATION = 'NO_KNOWN_ROUTE_FROM_PEERED_NETWORK_TO_DESTINATION';
  /**
   * Sending packets processed by the Private NAT Gateways to the Private
   * Service Connect endpoints is not supported.
   */
  public const CAUSE_PRIVATE_NAT_TO_PSC_ENDPOINT_UNSUPPORTED = 'PRIVATE_NAT_TO_PSC_ENDPOINT_UNSUPPORTED';
  /**
   * Packet is sent to the PSC port mapping service, but its destination port
   * does not match any port mapping rules.
   */
  public const CAUSE_PSC_PORT_MAPPING_PORT_MISMATCH = 'PSC_PORT_MAPPING_PORT_MISMATCH';
  /**
   * Sending packets directly to the PSC port mapping service without going
   * through the PSC connection is not supported.
   */
  public const CAUSE_PSC_PORT_MAPPING_WITHOUT_PSC_CONNECTION_UNSUPPORTED = 'PSC_PORT_MAPPING_WITHOUT_PSC_CONNECTION_UNSUPPORTED';
  /**
   * Packet with destination IP address within the reserved NAT64 range is
   * dropped due to matching a route of an unsupported type.
   */
  public const CAUSE_UNSUPPORTED_ROUTE_MATCHED_FOR_NAT64_DESTINATION = 'UNSUPPORTED_ROUTE_MATCHED_FOR_NAT64_DESTINATION';
  /**
   * Packet could be dropped because hybrid endpoint like a VPN gateway or
   * Interconnect is not allowed to send traffic to the Internet.
   */
  public const CAUSE_TRAFFIC_FROM_HYBRID_ENDPOINT_TO_INTERNET_DISALLOWED = 'TRAFFIC_FROM_HYBRID_ENDPOINT_TO_INTERNET_DISALLOWED';
  /**
   * Packet with destination IP address within the reserved NAT64 range is
   * dropped due to no matching NAT gateway in the subnet.
   */
  public const CAUSE_NO_MATCHING_NAT64_GATEWAY = 'NO_MATCHING_NAT64_GATEWAY';
  /**
   * Packet is dropped due to matching a Private NAT64 gateway with no rules for
   * source IPv6 addresses.
   */
  public const CAUSE_NO_CONFIGURED_PRIVATE_NAT64_RULE = 'NO_CONFIGURED_PRIVATE_NAT64_RULE';
  /**
   * Packet is dropped due to being sent to a backend of a passthrough load
   * balancer that doesn't use the same IP version as the frontend.
   */
  public const CAUSE_LOAD_BALANCER_BACKEND_IP_VERSION_MISMATCH = 'LOAD_BALANCER_BACKEND_IP_VERSION_MISMATCH';
  /**
   * Packet from the unknown NCC network is dropped due to no known route from
   * the source network to the destination IP address.
   */
  public const CAUSE_NO_KNOWN_ROUTE_FROM_NCC_NETWORK_TO_DESTINATION = 'NO_KNOWN_ROUTE_FROM_NCC_NETWORK_TO_DESTINATION';
  /**
   * Packet is dropped by Cloud NAT due to using an unsupported protocol.
   */
  public const CAUSE_CLOUD_NAT_PROTOCOL_UNSUPPORTED = 'CLOUD_NAT_PROTOCOL_UNSUPPORTED';
  /**
   * Packet is dropped due to using an unsupported protocol (any other than UDP)
   * for L2 Interconnect.
   */
  public const CAUSE_L2_INTERCONNECT_UNSUPPORTED_PROTOCOL = 'L2_INTERCONNECT_UNSUPPORTED_PROTOCOL';
  /**
   * Packet is dropped due to using an unsupported port (any other than 6081)
   * for L2 Interconnect.
   */
  public const CAUSE_L2_INTERCONNECT_UNSUPPORTED_PORT = 'L2_INTERCONNECT_UNSUPPORTED_PORT';
  /**
   * Packet is dropped due to destination IP not matching the appliance mapping
   * IPs configured on the L2 Interconnect attachment.
   */
  public const CAUSE_L2_INTERCONNECT_DESTINATION_IP_MISMATCH = 'L2_INTERCONNECT_DESTINATION_IP_MISMATCH';
  /**
   * Packet could be dropped because it matches a route associated with an NCC
   * spoke in the hybrid subnet context, but such a configuration is not
   * supported.
   */
  public const CAUSE_NCC_ROUTE_WITHIN_HYBRID_SUBNET_UNSUPPORTED = 'NCC_ROUTE_WITHIN_HYBRID_SUBNET_UNSUPPORTED';
  /**
   * Packet is dropped because the region of the hybrid subnet is different from
   * the region of the next hop of the route matched within this hybrid subnet.
   */
  public const CAUSE_HYBRID_SUBNET_REGION_MISMATCH = 'HYBRID_SUBNET_REGION_MISMATCH';
  /**
   * Packet is dropped because no matching route was found in the hybrid subnet.
   */
  public const CAUSE_HYBRID_SUBNET_NO_ROUTE = 'HYBRID_SUBNET_NO_ROUTE';
  /**
   * Packet is dropped by GKE Network Policy.
   */
  public const CAUSE_GKE_NETWORK_POLICY = 'GKE_NETWORK_POLICY';
  /**
   * Packet is dropped because there is no valid matching route from the network
   * of the Google-managed service to the destination.
   */
  public const CAUSE_NO_VALID_ROUTE_FROM_GOOGLE_MANAGED_NETWORK_TO_DESTINATION = 'NO_VALID_ROUTE_FROM_GOOGLE_MANAGED_NETWORK_TO_DESTINATION';
  /**
   * Cause that the packet is dropped.
   *
   * @var string
   */
  public $cause;
  /**
   * Geolocation (region code) of the destination IP address (if relevant).
   *
   * @var string
   */
  public $destinationGeolocationCode;
  /**
   * Destination IP address of the dropped packet (if relevant).
   *
   * @var string
   */
  public $destinationIp;
  /**
   * Region of the dropped packet (if relevant).
   *
   * @var string
   */
  public $region;
  /**
   * URI of the resource that caused the drop.
   *
   * @var string
   */
  public $resourceUri;
  /**
   * Geolocation (region code) of the source IP address (if relevant).
   *
   * @var string
   */
  public $sourceGeolocationCode;
  /**
   * Source IP address of the dropped packet (if relevant).
   *
   * @var string
   */
  public $sourceIp;

  /**
   * Cause that the packet is dropped.
   *
   * Accepted values: CAUSE_UNSPECIFIED, UNKNOWN_EXTERNAL_ADDRESS,
   * FOREIGN_IP_DISALLOWED, FIREWALL_RULE, NO_ROUTE, ROUTE_BLACKHOLE,
   * ROUTE_WRONG_NETWORK, ROUTE_NEXT_HOP_IP_ADDRESS_NOT_RESOLVED,
   * ROUTE_NEXT_HOP_RESOURCE_NOT_FOUND, ROUTE_NEXT_HOP_INSTANCE_WRONG_NETWORK,
   * ROUTE_NEXT_HOP_INSTANCE_NON_PRIMARY_IP,
   * ROUTE_NEXT_HOP_FORWARDING_RULE_IP_MISMATCH,
   * ROUTE_NEXT_HOP_VPN_TUNNEL_NOT_ESTABLISHED,
   * ROUTE_NEXT_HOP_FORWARDING_RULE_TYPE_INVALID,
   * NO_ROUTE_FROM_INTERNET_TO_PRIVATE_IPV6_ADDRESS,
   * NO_ROUTE_FROM_INTERNET_TO_PRIVATE_IPV4_ADDRESS,
   * NO_ROUTE_FROM_EXTERNAL_IPV6_SOURCE_TO_PRIVATE_IPV6_ADDRESS,
   * VPN_TUNNEL_LOCAL_SELECTOR_MISMATCH, VPN_TUNNEL_REMOTE_SELECTOR_MISMATCH,
   * PRIVATE_TRAFFIC_TO_INTERNET, PRIVATE_GOOGLE_ACCESS_DISALLOWED,
   * PRIVATE_GOOGLE_ACCESS_VIA_VPN_TUNNEL_UNSUPPORTED, NO_EXTERNAL_ADDRESS,
   * UNKNOWN_INTERNAL_ADDRESS, FORWARDING_RULE_MISMATCH,
   * FORWARDING_RULE_NO_INSTANCES,
   * FIREWALL_BLOCKING_LOAD_BALANCER_BACKEND_HEALTH_CHECK,
   * INGRESS_FIREWALL_TAGS_UNSUPPORTED_BY_DIRECT_VPC_EGRESS,
   * INSTANCE_NOT_RUNNING, GKE_CLUSTER_NOT_RUNNING, GKE_POD_NOT_RUNNING,
   * CLOUD_SQL_INSTANCE_NOT_RUNNING, REDIS_INSTANCE_NOT_RUNNING,
   * REDIS_CLUSTER_NOT_RUNNING, TRAFFIC_TYPE_BLOCKED,
   * GKE_MASTER_UNAUTHORIZED_ACCESS, CLOUD_SQL_INSTANCE_UNAUTHORIZED_ACCESS,
   * DROPPED_INSIDE_GKE_SERVICE, DROPPED_INSIDE_CLOUD_SQL_SERVICE,
   * GOOGLE_MANAGED_SERVICE_NO_PEERING, GOOGLE_MANAGED_SERVICE_NO_PSC_ENDPOINT,
   * GKE_PSC_ENDPOINT_MISSING, CLOUD_SQL_INSTANCE_NO_IP_ADDRESS,
   * GKE_CONTROL_PLANE_REGION_MISMATCH,
   * PUBLIC_GKE_CONTROL_PLANE_TO_PRIVATE_DESTINATION,
   * GKE_CONTROL_PLANE_NO_ROUTE,
   * CLOUD_SQL_INSTANCE_NOT_CONFIGURED_FOR_EXTERNAL_TRAFFIC,
   * PUBLIC_CLOUD_SQL_INSTANCE_TO_PRIVATE_DESTINATION,
   * CLOUD_SQL_INSTANCE_NO_ROUTE, CLOUD_SQL_CONNECTOR_REQUIRED,
   * CLOUD_FUNCTION_NOT_ACTIVE, VPC_CONNECTOR_NOT_SET,
   * VPC_CONNECTOR_NOT_RUNNING, VPC_CONNECTOR_SERVERLESS_TRAFFIC_BLOCKED,
   * VPC_CONNECTOR_HEALTH_CHECK_TRAFFIC_BLOCKED,
   * FORWARDING_RULE_REGION_MISMATCH, PSC_CONNECTION_NOT_ACCEPTED,
   * PSC_ENDPOINT_ACCESSED_FROM_PEERED_NETWORK,
   * PSC_NEG_PRODUCER_ENDPOINT_NO_GLOBAL_ACCESS,
   * PSC_NEG_PRODUCER_FORWARDING_RULE_MULTIPLE_PORTS,
   * CLOUD_SQL_PSC_NEG_UNSUPPORTED, NO_NAT_SUBNETS_FOR_PSC_SERVICE_ATTACHMENT,
   * PSC_TRANSITIVITY_NOT_PROPAGATED, HYBRID_NEG_NON_DYNAMIC_ROUTE_MATCHED,
   * HYBRID_NEG_NON_LOCAL_DYNAMIC_ROUTE_MATCHED, CLOUD_RUN_REVISION_NOT_READY,
   * DROPPED_INSIDE_PSC_SERVICE_PRODUCER, LOAD_BALANCER_HAS_NO_PROXY_SUBNET,
   * CLOUD_NAT_NO_ADDRESSES, ROUTING_LOOP,
   * DROPPED_INSIDE_GOOGLE_MANAGED_SERVICE,
   * LOAD_BALANCER_BACKEND_INVALID_NETWORK,
   * BACKEND_SERVICE_NAMED_PORT_NOT_DEFINED,
   * DESTINATION_IS_PRIVATE_NAT_IP_RANGE, DROPPED_INSIDE_REDIS_INSTANCE_SERVICE,
   * REDIS_INSTANCE_UNSUPPORTED_PORT,
   * REDIS_INSTANCE_CONNECTING_FROM_PUPI_ADDRESS,
   * REDIS_INSTANCE_NO_ROUTE_TO_DESTINATION_NETWORK,
   * REDIS_INSTANCE_NO_EXTERNAL_IP, REDIS_INSTANCE_UNSUPPORTED_PROTOCOL,
   * DROPPED_INSIDE_REDIS_CLUSTER_SERVICE, REDIS_CLUSTER_UNSUPPORTED_PORT,
   * REDIS_CLUSTER_NO_EXTERNAL_IP, REDIS_CLUSTER_UNSUPPORTED_PROTOCOL,
   * NO_ADVERTISED_ROUTE_TO_GCP_DESTINATION,
   * NO_TRAFFIC_SELECTOR_TO_GCP_DESTINATION,
   * NO_KNOWN_ROUTE_FROM_PEERED_NETWORK_TO_DESTINATION,
   * PRIVATE_NAT_TO_PSC_ENDPOINT_UNSUPPORTED, PSC_PORT_MAPPING_PORT_MISMATCH,
   * PSC_PORT_MAPPING_WITHOUT_PSC_CONNECTION_UNSUPPORTED,
   * UNSUPPORTED_ROUTE_MATCHED_FOR_NAT64_DESTINATION,
   * TRAFFIC_FROM_HYBRID_ENDPOINT_TO_INTERNET_DISALLOWED,
   * NO_MATCHING_NAT64_GATEWAY, NO_CONFIGURED_PRIVATE_NAT64_RULE,
   * LOAD_BALANCER_BACKEND_IP_VERSION_MISMATCH,
   * NO_KNOWN_ROUTE_FROM_NCC_NETWORK_TO_DESTINATION,
   * CLOUD_NAT_PROTOCOL_UNSUPPORTED, L2_INTERCONNECT_UNSUPPORTED_PROTOCOL,
   * L2_INTERCONNECT_UNSUPPORTED_PORT, L2_INTERCONNECT_DESTINATION_IP_MISMATCH,
   * NCC_ROUTE_WITHIN_HYBRID_SUBNET_UNSUPPORTED, HYBRID_SUBNET_REGION_MISMATCH,
   * HYBRID_SUBNET_NO_ROUTE, GKE_NETWORK_POLICY,
   * NO_VALID_ROUTE_FROM_GOOGLE_MANAGED_NETWORK_TO_DESTINATION
   *
   * @param self::CAUSE_* $cause
   */
  public function setCause($cause)
  {
    $this->cause = $cause;
  }
  /**
   * @return self::CAUSE_*
   */
  public function getCause()
  {
    return $this->cause;
  }
  /**
   * Geolocation (region code) of the destination IP address (if relevant).
   *
   * @param string $destinationGeolocationCode
   */
  public function setDestinationGeolocationCode($destinationGeolocationCode)
  {
    $this->destinationGeolocationCode = $destinationGeolocationCode;
  }
  /**
   * @return string
   */
  public function getDestinationGeolocationCode()
  {
    return $this->destinationGeolocationCode;
  }
  /**
   * Destination IP address of the dropped packet (if relevant).
   *
   * @param string $destinationIp
   */
  public function setDestinationIp($destinationIp)
  {
    $this->destinationIp = $destinationIp;
  }
  /**
   * @return string
   */
  public function getDestinationIp()
  {
    return $this->destinationIp;
  }
  /**
   * Region of the dropped packet (if relevant).
   *
   * @param string $region
   */
  public function setRegion($region)
  {
    $this->region = $region;
  }
  /**
   * @return string
   */
  public function getRegion()
  {
    return $this->region;
  }
  /**
   * URI of the resource that caused the drop.
   *
   * @param string $resourceUri
   */
  public function setResourceUri($resourceUri)
  {
    $this->resourceUri = $resourceUri;
  }
  /**
   * @return string
   */
  public function getResourceUri()
  {
    return $this->resourceUri;
  }
  /**
   * Geolocation (region code) of the source IP address (if relevant).
   *
   * @param string $sourceGeolocationCode
   */
  public function setSourceGeolocationCode($sourceGeolocationCode)
  {
    $this->sourceGeolocationCode = $sourceGeolocationCode;
  }
  /**
   * @return string
   */
  public function getSourceGeolocationCode()
  {
    return $this->sourceGeolocationCode;
  }
  /**
   * Source IP address of the dropped packet (if relevant).
   *
   * @param string $sourceIp
   */
  public function setSourceIp($sourceIp)
  {
    $this->sourceIp = $sourceIp;
  }
  /**
   * @return string
   */
  public function getSourceIp()
  {
    return $this->sourceIp;
  }
}

// Adding a class alias for backwards compatibility with the previous class name.
class_alias(DropInfo::class, 'Google_Service_NetworkManagement_DropInfo');
← Back