GCP Network Deep Flashcards
(117 cards)
What is a network endpoint group (NEG)?
Network endpoint groups (NEGs) are zonal resources that represent collections of IP address and port combinations for GCP resources within a single subnet. Each IP address and port combination is called a network endpoint.
What is a Secondary subnet range?
Secondary range you can apply to a subnet for use with alias IP ranges
Why would you use tags over service accounts for firewall rules?
Don’t need to restart VM to change, can have multiple tags on a VM
Why would you use service accounts over network tags for firewall rules?
Anyone can set any tag! Service accounts are resources with permissions.
What are the IP address ranges you need to assign when you build a GKE cluster?
“Node subnet
Services secondary range
Pods secondary range
Master IP range (for private clusters)”
What is an Ingress controller?
It is a GKE service that creates and manages an HTTP(s) load balancer on GCP. The backend can be a NEG.
What are the traits of a cloud network engineer?
1 year experience, use gcloud, use IAC, work with architects for network aspects.
What is Cymbal’s bank existing infrastructure?
What is the infrastructure going to look like?
4 shared VPCs
4 Projects, Dev, test, stage, and prod
Each VPC has six subnets in primary and secondary regions.
How do you connect the NCC Hub with other parts of your organization
VPC Spokes - each vpc is a separate spoke
Router Appliance
Cloud VPN,Cloud Interconnect spokes VLAN attachments
What’s a VPC Spoke?
VPC spokes let you connect two or more VPC networks to a hub so that the networks exchange IPv4 subnet routes. VPC spokes attached to a single hub can reference VPC networks in the same project or a different project
What are the 3 tiers in an SDN?
Application Layer
Control Layer
infrastructure Layer
what are the Google Cloud networking services?
Connect
Secure
Scale
Optimize
Modernize
what are the different network tiers for GCP?
Premium
Standard
What are the different connectivity options to connect VPCs to one another or another site?
Cloud Interconnect uses colocation (dedicated or partner)
Cloud VPN
Cloud Peering
Network Connectivity Center hub and spoke model
What is available with Cloud DNS?
Public DNS Zones
Global DNS
Private DNS Zones
Split Horizon DNS
DNS Peering
Security
How do you split up your VPCs?
Per environment or Per team
But, fewer VPCs are easier to manage and provide better resource utilization
What are the two different modes to create subnets?
Auto - Puts in all rules, etc…
Custom - You control subnets created and how they work
What is the difference between primary and secondary subnet CIDR ranges for IP Address
Secondary CIDR Range
Definition: Secondary CIDR ranges are additional IP ranges associated with a subnet to support specific GCP features, such as alias IPs or private Google access.
Characteristics:
Purpose: Used for purposes like:
Alias IP Ranges: Allowing VM instances to have multiple IP addresses from the secondary range.
Private Google Access: Enabling access to Google APIs and services from the private IP addresses in the VPC.
Allocation: Secondary CIDR ranges must be distinct from the primary range but can be within the same or different subnet.
Format: Also specified in CIDR notation (e.g., 10.2.0.0/16).
Key Differences
Functionality:
Primary: Used for the core IP addressing of VMs and other resources.
Secondary: Used for additional features like alias IPs and private Google services.
what are the two ways to figure how many subnets are required?
1-subnet per application
Create large subnets
Recommend use large subnet for simplicity
What services are affected by VPC Firewall
VM out
VM in
Implied Rules
Ingress Deny
Egress Allow
What are the differences for VPC firewall rules vs firewall policies?
Management Level:
Firewall Rules: Individual and directly applied to VPC networks.
Firewall Policies: Higher-level management tool for organizing and applying rules across multiple networks.
Flexibility:
Firewall Rules: Good for simpler setups where rules are managed individually.
Firewall Policies: Better for complex environments where centralized management of rules is beneficial.
Use Cases:
Firewall Rules: Suitable for straightforward, single-network environments or specific use cases within a single VPC.
Firewall Policies: Ideal for larger organizations or projects needing centralized control over multiple networks and a consistent security posture.
In summary, while firewall rules provide the granular control needed for specific network traffic management, firewall policies offer a way to efficiently manage and apply these rules across multiple networks and projects, facilitating better organization and consistency in complex environments.
what are the parts of a firewall policy
Priority
direction
Action
Source/Destination Filters
Target Type
Protocols and Ports