-
Using VPC Network Peering
- When using VPC Network Peering to connect VPC network to another network, Google Cloud shares subnet routes between the networks
- The subnet routes allow traffic from the peer network to reach internal TCP/UDP load balancers in your network
- Access is allowed if the client virtual machine (VM) instances in the peer network are located in the same region as the internal TCP/UDP load balancer, unless global access is configured
- Access is allowed with global access configured, client VM instances from any region of the peered VPC network can access the internal TCP/UDP load balancer
- Ingress firewall rules allow traffic from client VMs in the peer network
- Google Cloud firewall rules are not shared among networks when using VPC Network Peering
- Users cannot selectively share only some of your internal TCP/UDP load balancers by using VPC Network Peering
- Users can limit access to the load balancer's backend VM instances by using firewall rules
-
Using Cloud VPN and Cloud Interconnect
- Users can access an internal TCP/UDP load balancer from a peer network that is connected through a Cloud VPN tunnel or interconnect attachment (VLAN) for a Dedicated Interconnect connection or Partner Interconnect connection
- The peer network can be an on-premises network, another Google Cloud VPC network, or a virtual network hosted by a different cloud provider
-
Access through Cloud VPN tunnels
- Internal TCP/UDP load balancer can be accessed through a Cloud VPN tunnel when both the Cloud VPN gateway and tunnel are located in the same region as the internal TCP/UDP load balancer's components
- When appropriate routes provide paths for egress traffic back to the clients from which the load balancer traffic originated.
- Cloud VPN tunnels that use dynamic routing rely on a Cloud Router to manage custom dynamic routes that serve this purpose
- Cloud VPN tunnels that use static routing require custom static routes, which are created automatically if tunnels are created by using the Google Cloud Console
- Ingress firewall rules allow traffic to the backend VMs, and egress firewall rules allow the backends to send responses back to the on-premises clients
- In the peer network, at least one Cloud VPN tunnel exists with appropriate routes whose destinations include the subnet where the internal TCP/UDP load balancer is defined and whose next hop is the VPN tunnel
- If the peer network is another Google Cloud VPC network, its Cloud VPN tunnel and gateway can be located in any region
- Clients in the peer network can connect to a Cloud VPN located in any region, provided that there is a route for the Cloud VPN tunnel on that VPN gateway to the network in which the load balancer resides
- For Cloud VPN tunnels that use dynamic routing, make sure that the VPC network uses global dynamic routing mode so that the custom dynamic routes learned by the Cloud Router for the tunnel are available to VMs in all regions
-
Access through Cloud Interconnect
- Access an internal TCP/UDP load balancer from an on-premises peer network that is connected to the load balancer's VPC network when the interconnect attachment (VLAN) and its Cloud Router are located in the same region as the load balancer's components
- On-premises routers share appropriate routes that provide return paths for responses from backend VMs to the on-premises clients
- Interconnect attachments (VLANs) for both Dedicated Interconnect and Partner Interconnect use Cloud Routers to manage the routes they learn from on-premises routers
- Ingress firewall rules allow traffic to the backend VMs, and egress firewall rules allow the backend VMs to send responses
- Routing and firewall rules in the on-premises peer network allow communication to and from the backend VMs in your VPC network
- Clients in the peer network that are accessing the interconnect attachment (VLAN) and Cloud Router through which the peer network accesses the internal TCP/UDP load balancer don't need to be located in the same region as the load balancer
- When global access is configured, the Cloud Router can be in a region different from the load balancer's region
-
Multiple egress paths
- In production environments, users probably will be using multiple tunnels or attachments for redundancy
- If each tunnel or each interconnect attachment (VLAN) is configured in the same region as the internal TCP/UDP load balancer, multiple simultaneously accessible paths can be provided for traffic to and from the load balancer
- Multiple paths can provide additional bandwidth or can serve as standby paths for redundancy
- Cloud VPN tunnels are always associated with a specific Cloud VPN gateway
- A tunnel cannot be created without a gateway
- Interconnect attachments (VLANs) are also associated with Cloud Interconnect connections
- After packets are delivered to the VPC network, the internal TCP/UDP load balancer distributes them to backend VMs according to the configured session affinity
- For ingress traffic to the internal TCP/UDP load balancer, the VPN tunnels must be in the same region as the load balancer