
Before you begin
- Labs create a Google Cloud project and resources for a fixed time
- Labs have a time limit and no pause feature. If you end the lab, you'll have to restart from the beginning.
- On the top left of your screen, click Start lab to begin
Create VPC network
/ 10
Create VPC subnet
/ 10
Create VPC firewall rules
/ 20
Create Firewall rule 5 (environment access)
/ 10
Create Firewall rule 6 (system access)
/ 10
Create Static IP address
/ 20
Create Cloud NAT service
/ 20
In this lab, you will learn about the key network related activities involved in deploying the various Google Cloud services and resources required for building the majority of SAP Landing Zones on Google Cloud.
The tasks of this lab are based on activities required to plan & deploy a network to host a provided mock SAP estate.
In this lab, you will learn how to:
Read these instructions. Labs are timed and you cannot pause them. The timer, which starts when you click Start Lab, shows how long Google Cloud resources will be made available to you.
This hands-on lab lets you do the lab activities yourself in a real cloud environment, not in a simulation or demo environment. It does so by giving you new, temporary credentials that you use to sign in and access Google Cloud for the duration of the lab.
To complete this lab, you need:
Click the Start Lab button. If you need to pay for the lab, a pop-up opens for you to select your payment method. On the left is the Lab Details panel with the following:
Click Open Google Cloud console (or right-click and select Open Link in Incognito Window if you are running the Chrome browser).
The lab spins up resources, and then opens another tab that shows the Sign in page.
Tip: Arrange the tabs in separate windows, side-by-side.
If necessary, copy the Username below and paste it into the Sign in dialog.
You can also find the Username in the Lab Details panel.
Click Next.
Copy the Password below and paste it into the Welcome dialog.
You can also find the Password in the Lab Details panel.
Click Next.
Click through the subsequent pages:
After a few moments, the Google Cloud console opens in this tab.
Cloud Shell is a virtual machine that is loaded with development tools. It offers a persistent 5GB home directory and runs on the Google Cloud. Cloud Shell provides command-line access to your Google Cloud resources.
When you are connected, you are already authenticated, and the project is set to your Project_ID,
gcloud
is the command-line tool for Google Cloud. It comes pre-installed on Cloud Shell and supports tab-completion.
Output:
Output:
gcloud
, in Google Cloud, refer to the gcloud CLI overview guide.
Although not mandatory, to maximize your learning in this lab, the following labs should be completed first:
This lab will focus on the following “Landing Zone” topic areas:
This lab will cover sample key activities which will be involved in deploying the various Google Cloud services and resources involved in building the majority of "SAP Landing Zones" on Google Cloud.
The activities in this lab will build on each other, therefore it will be required to work through the activities in the order they are stated. This is intentional as it is representative of real world scenarios in which there will be dependencies between Google Cloud resources and highlights the need to work accurately as performing corrective action could be very effort intensive.
Google Cloud supports many different options which can be used to deploy Google Cloud resources. These include but are not limited to:
Which option(s) will be adopted for a customer specific “SAP Landing Zone” would be defined during the design process.
In this lab it is assumed that all activities will be executed from the command line and the required command line instructions will be provided. However students may opt to use any supported option to perform the activities. Where available, links to the relevant “quickstart” online documentation will be provided which will include syntax instructions for the other options.
In this lab a sample naming convention will be provided for all resources (please reference the naming convention section and table provided in the pre-reading material for more information). The bulk of the activities will need the Google Cloud resources to be deployed in accordance with the naming convention and the configuration specifications provided as this will be representative of what would be expected in real world scenarios. Various activities in these labs will only be marked as completed if they are fully compliant to both the expected naming and the stated configuration specifications.
To help you understand what the various parameter values relate to, the following color coding of the parameter values has been adopted:
This lab is time restricted to 60 min. At the end of the time the lab environment will automatically shutdown and any resources deployed will be erased. Recommensing the lab will require all tasks to be executed afresh.
In order to ensure you have sufficient time to complete all the tasks, before clicking Start Lab it is highly advisable that you:
To help the student be able to both visualize and relate the activities in this lab back to their own SAP estates, a mock SAP estate has been provided on which all activities of this lab will be based.
The below table outlines the key configuration of the attributes of the SAP estate this lab will be based on. The table should be referenced in combination with the naming convention table provided in the pre-reading material.
The table outlines in yellow the components which will be deployed by the activities of this lab.
For additional real world conditions information about the customer cloud “onboarding” journey of the customer, you are advised to read the “Lab pre-read: “SAP on Cloud” onboarding” material.
Depending on network design patterns adopted in the customer environment there may be a need to deploy one or more VPC networks with at least 1 subnet to meet the network design requirements.
As mentioned in the pre-reading material, “network configuration” design is one of the “cloud foundations” topics.
There are many supported VPC network design patterns each with their own PROs, CONs and constraints. In real world scenarios customers should carefully evaluate their network design requirements to best address their specific needs across all current and future workloads. This activity should be performed with suitably skilled network specialists so as to ensure the appropriate network design is adopted.
Changing the network design at a later stage could be both very disruptive and labor intensive.
In order to be able to successfully deploy the required “VPC network(s)” the following dependencies will need to be correctly deployed before proceeding with this activity:
<01> - company id
<02> - business entity id
<03> - vpc short description
<04> - vpc count identifier
<01> - Company
<02> - Business entity ID
<03> - VPC description
<04> - VPC count identifier
Using any supported method deploy the “VPC Network(s)” with the following configuration details:
#01 of 01:
Parameter | Value |
---|---|
ID | xall-vpc--vpc-01 |
VPC description | XYZ-all VPC network = Standard VPC network - 01 |
Subnet mode | custom |
Routing mode | global |
Command 01 of 01 - Create a “VPC network”:
(Example output)
Confirm the “VPC network(s)” have been deployed in the Cloud Console using the following path “Navigation menu -> NETWORKING -> VPC network -> VPC networks”.
Click Check my progress to verify the objective.
As new SAP environments (e.g.: DR) or SAP operational landscapes (e.g. Project landscape) are deployed so there may be a need to add additional subnets to an existing VPC network.
There are many factors which may influence the subnet layout within a VPC network.
Subnet creation and maintenance are typically managed by a central network administration team(s) who ensure the appropriate security and design standards are enforced. Normally the SAP team will need to liaise with network administration team(s) to define the workload specific subnet layout under real world conditions.
The subnet layout provided in this lab is based on commonly observed real world scenarios but each customer should evaluate their own environment before deploying subnets and resources to them.
In order to be able to successfully deploy the required VPC “subnet(s)” the following dependencies will need to be correctly deployed before proceeding with this activity:
<01> - company id
<02> - business entity id
<03> - workload id
<04> - operational area id
<05> - environment id
<06> - hosting region id
<07> - subnet count identifier
<01> - Company
<02> - Business entity ID
<03> - Workload ID
<04> - Operational area ID
<05> - Environment ID
<06> - Hosting region ID
<07> - subnet count identifier
Using any supported method deploy the VPC “subnets(s)” with the following configuration details:
#01 of 01:
Parameter | Value |
---|---|
ID | xgl-subnet--cerps-bau-nonprd--be1-01 |
Description | XYZ-Global subnet = CERPS-BaU-NonProd - Belgium 1 (GCP) - 01 |
VPC network | xall-vpc--vpc-01 |
Region | |
IP range | 10.1.1.0/24 |
Command 01 of 01 - Create a VPC “subnet”:
(Example output)
Confirm the VPC “subnet(s)” have been deployed in the Cloud Console using the following path “Navigation menu -> NETWORKING -> VPC network -> VPC networks”.
Click Check my progress to verify the objective.
All SAP hosted resources required network access. VPC firewall rules are required to be defined to secure what network access is permissible. Network wide firewall rules will be required to enable various user access.
VPC firewall rules are typically managed by a central network administration team(s) who ensure appropriate security standards are enforced. Normally the SAP team will need to liaise with network administration team(s) to define the workload specific VPC firewall rules for “user access”, “environment wide access” & “inter-system access” under real world conditions.
Google Cloud supports different options for defining VPC firewall rules each with their own PROs, CONs and constraints. Google Cloud resources support being protected by multiple VPC firewall rules defined using multiple different options.
In order to be able to successfully deploy the required VPC “firewall rule(s)” the following dependencies will need to be correctly deployed before proceeding with this activity:
<01> - vpc id
<02> - company id
<03> - business entity id
<04> - firewall action id
<05> - user access short description
<06> - firewall version no.
<01> - VPC ID
<02> - Company
<03> - Business entity ID
<04> - Firewall ACTION
<05> - User access description
<06> - firewall version no.
Using any supported method deploy the VPC “firewall rule(s)” with the following configuration details:
#01 of 04:
Parameter | Value |
---|---|
ID | xall-vpc--vpc-01--xall-fw--user--a--linux--v01 |
Description | xall-vpc--vpc-01 - XYZ-all firewall rule = User access - ALLOW standard linux access - version 01 |
VPC network | xall-vpc--vpc-01 |
Priority | 1000 |
Direction | ingress |
Action | allow |
Target tags | xall-vpc--vpc-01--xall-fw--user--a--linux--v01 |
Source filter | source-ranges |
Source | 0.0.0.0/0 |
Network ports | tcp:22,icmp |
#02 of 04:
Parameter | Value |
---|---|
ID | xall-vpc--vpc-01--xall-fw--user--a--windows--v01 |
Description | xall-vpc--vpc-01 - XYZ-all firewall rule = User access - ALLOW standard windows access - version 01 |
VPC network | xall-vpc--vpc-01 |
Priority | 1000 |
Direction | ingress |
Action | allow |
Target tags | xall-vpc--vpc-01--xall-fw--user--a--windows--v01 |
Source filter | source-ranges |
Source | 0.0.0.0/0 |
Network ports | tcp:3389,icmp |
#03 of 04:
Parameter | Value |
---|---|
ID | xall-vpc--vpc-01--xall-fw--user--a--sapgui--v01 |
Description | xall-vpc--vpc-01 - XYZ-all firewall rule = User access - ALLOW SAPGUI access - version 01 |
VPC network | xall-vpc--vpc-01 |
Priority | 1000 |
Direction | ingress |
Action | allow |
Target tags | xall-vpc--vpc-01--xall-fw--user--a--sapgui--v01 |
Source filter | source-ranges |
Source | 0.0.0.0/0 |
Network ports | tcp:3200-3299,tcp:3600-3699 |
#04 of 04:
Parameter | Value |
---|---|
ID | xall-vpc--vpc-01--xall-fw--user--a--sap-fiori--v01 |
Description | xall-vpc--vpc-01 - XYZ-all firewall rule = User access - ALLOW SAP Fiori access - version 01 |
VPC network | xall-vpc--vpc-01 |
Priority | 1000 |
Direction | ingress |
Action | allow |
Target tags | xall-vpc--vpc-01--xall-fw--user--a--sap-fiori--v01 |
Source filter | source-ranges |
Source | 0.0.0.0/0 |
Network ports | tcp:80,tcp:8000-8099,tcp:443,tcp:4300-44300 |
Command 01 of 01 - Create a VPC “firewall rule”:
(Example output)
Confirm the VPC “firewall rule(s)” have been deployed in the Cloud Console using the following path “Navigation menu -> NETWORKING -> VPC network -> Firewall”.
Click Check my progress to verify the objective.
All SAP hosted resources required network access. VPC firewall rules are required to be defined to secure what network access is permissible. Environment wide firewall rules will be required to enable communication between SAP systems within the same environment. This access should be restricted to the standard SAP ports.
VPC firewall rules are typically managed by a central network administration team(s) who ensure appropriate security standards are enforced. Normally the SAP team will need to liaise with network administration team(s) to define the workload specific VPC firewall rules for “user access”, “environment wide access” & “inter-system access” under real world conditions.
Google Cloud supports different options for defining VPC firewall rules each with their own PROs, CONs and constraints. Google Cloud resources support being protected by multiple VPC firewall rules defined using multiple different options.
In order to be able to successfully deploy the required VPC “firewall rule(s)” the following dependencies will need to be correctly deployed before proceeding with this activity:
<01> - vpc id
<02> - company id
<03> - business entity id
<04> - workload id
<05> - operational area id
<06> - environment id
<07> - firewall action id
<08> - firewall version no.
<01> - VPC ID
<02> - Company
<03> - Business entity ID
<04> - Workload ID
<05> - Operational area ID
<06> - Environment ID
<07> - Firewall ACTION
<08> - firewall version no.
Using any supported method deploy the VPC “firewall rule(s)” with the following configuration details:
#01 of 01:
Parameter | Value |
---|---|
ID | xall-vpc--vpc-01--xgl-fw--cerps-bau-dev--a-env--v01 |
Description | xall-vpc--vpc-01 - XYZ-Global firewall rule = CERPS-BaU-Dev - ALLOW environment wide access - version 01 |
VPC network | xall-vpc--vpc-01 |
Priority | 1000 |
Direction | ingress |
Action | allow |
Target tags | xall-vpc--vpc-01--xgl-fw--cerps-bau-dev--a-env--v01 |
Source filter | source-tags |
Source | xall-vpc--vpc-01--xgl-fw--cerps-bau-dev--a-env--v01 |
Network ports | tcp:3200-3299,tcp:3300-3399,tcp:4800-4899,tcp:80,tcp:8000-8099,tcp:443,tcp:44300-44399,tcp:3600-3699,tcp:8100-8199,tcp:44400-44499,tcp:50000-59999,tcp:30000-39999,tcp:4300-4399,tcp:40000-49999,tcp:1128-1129,tcp:5050,tcp:8000-8499,tcp:515,icmp |
Command 01 of 01 - Create a VPC “firewall rule”:
(Example output)
Confirm the VPC “firewall rule(s)” have been deployed in the Cloud Console using the following path “Navigation menu -> NETWORKING -> VPC network -> Firewall”.
Click Check my progress to verify the objective.
All SAP hosted resources required network access. VPC firewall rules are required to be defined to secure what network access is permissible. Because components of a single SAP system are commonly distributed over a number VMs, system wide firewall rules will be required to enable these components to communicate with one another. Since components of the same SAP system are so closely coupled and communicate heavily between each other it is quite common for there to be unrestricted network access between components of the same SAP system.
VPC firewall rules are typically managed by a central network administration team(s) who ensure appropriate security standards are enforced. Normally the SAP team will need to liaise with network administration team(s) to define the workload specific VPC firewall rules for “user access”, “environment wide access” & “inter-system access” under real world conditions.
Google Cloud supports different options for defining VPC firewall rules each with their own PROs, CONs and constraints. Google Cloud resources support being protected by multiple VPC firewall rules defined using multiple different options.
In order to be able to successfully deploy the required VPC “firewall rule(s)” the following dependencies will need to be correctly deployed before proceeding with this activity:
<01> - vpc id
<02> - company id
<03> - business entity id
<04> - workload id
<05> - operational area id
<06> - environment id
<07> - firewall action id
<08> - system id
<09> - firewall version no.
<01> - VPC ID
<02> - Company
<03> - Business entity ID
<04> - Workload ID
<05> - Operational area ID
<06> - Environment ID
<07> - Firewall ACTION
<08> - Application ID
<09> - System ID
<10> - firewall version no.
Using any supported method deploy the VPC “firewall rule(s)” with the following configuration details:
#01 of 01:
Parameter | Value |
---|---|
ID | xall-vpc--vpc-01--xgl-fw--cerps-bau-dev--a-ds4--v01 |
Description | xall-vpc--vpc-01 - XYZ-Global firewall rule = CERPS-BaU-Dev - ALLOW SAP S4 (DS4) system wide access - version 01 |
VPC network | xall-vpc--vpc-01 |
Priority | 1000 |
Direction | ingress |
Action | allow |
Target tags | xall-vpc--vpc-01--xgl-fw--cerps-bau-dev--a-ds4--v01 |
Source filter | source-tags |
Source | xall-vpc--vpc-01--xgl-fw--cerps-bau-dev--a-ds4--v01 |
Rules | tcp,udp,icmp |
Command 01 of 01 - Create a VPC “firewall rule”:
(Example output)
Confirm the VPC “firewall rule(s)” have been deployed in the Cloud Console using the following path “Navigation menu -> NETWORKING -> VPC network -> Firewall”.
Click Check my progress to verify the objective.
Some SAP customers opt to use “virtual hostnames” to deploy and access SAP components to take advantage of the benefits of “SAP Adaptive Design Principles”. In order to ensure IP addresses for “virtual hostnames” are not accidentally consumed by newly created VMs, internal IP addresses to be used for the “virtual hostnames” IP addresses need to be reserved.
Typically a central network administration team(s) will manage all network related resources within the VPC network and the SAP team will need to liaise with network administration team(s) to create these static “IP address(s)” reservations under real world conditions.
In order to be able to successfully reserve the required static “IP address(s)” the following dependencies will need to be correctly deployed before proceeding with this activity:
<01> - company id
<02> - business entity id
<03> - workload id
<04> - operational area id
<05> - environment id
<06> - system id
<07> - short virtual hostname
<02> - Business entity ID
<03> - Workload ID
<04> - Operational area ID
<05> - Environment ID
<06> - Application ID
<07> - System ID
<08> - short virtual hostname
Using any supported method reserve static “IP address(s)” with the following configuration details:
#01 of 04:
Parameter | Value |
---|---|
ID | xgl-ip-address--cerps-bau-dev--dh1--d-cerpshana1 |
Description | XYZ-Global reserved IP address = CERPS-BaU-Dev - SAP HANA 1 (DH1) - d-cerpshana1 |
Region | |
Subnet | xgl-subnet--cerps-bau-nonprd--be1-01 |
Addresses | 10.1.1.100 |
#02 of 04:
Parameter | Value |
---|---|
ID | xgl-ip-address--cerps-bau-dev--ds4--d-cerpss4db |
Description | XYZ-Global reserved IP address = CERPS-BaU-Dev - SAP S4 (DS4) - d-cerpss4db |
Region | |
Subnet | xgl-subnet--cerps-bau-nonprd--be1-01 |
Addresses | 10.1.1.101 |
#03 of 04:
Parameter | Value |
---|---|
ID | xgl-ip-address--cerps-bau-dev--ds4--d-cerpss4scs |
Description | XYZ-Global reserved IP address = CERPS-BaU-Dev - SAP S4 (DS4) - d-cerpss4scs |
Region | |
Subnet | xgl-subnet--cerps-bau-nonprd--be1-01 |
Addresses | 10.1.1.102 |
#04 of 04:
Parameter | Value |
---|---|
ID | xgl-ip-address--cerps-bau-dev--ds4--d-cerpss4app1 |
Description | XYZ-Global reserved IP address = CERPS-BaU-Dev - SAP S4 (DS4) - d-cerpss4app1 |
Region | |
Subnet | xgl-subnet--cerps-bau-nonprd--be1-01 |
Addresses | 10.1.1.103 |
Command 01 of 01 - Create a static “IP address” reservation:
(Example output)
Confirm the reservation of static internal “IP address(s)” in the Cloud Console using the following path “Navigation menu -> NETWORKING -> VPC network -> IP addresses”.
Click Check my progress to verify the objective.
It is quite common for VMs hosting SAP components to not be assigned public IP addresses for security reasons. However these VM often still need internet access to be able to do critical activities like update OS packages. “Cloud NAT” service provides a secure manner for these SAP related VMs to access the internet.
Typically a central network administration team(s) will manage all network related resources within the VPC network.
There are many patterns supported to providing internet access to VMs which don’t have a public IP address assigned and therefore the SAP team will need to liaise with network administration team(s) on how internet access can be granted inline with the adopted network design.
In order to be able to successfully deploy the required “Cloud NAT service(s)” the following dependencies will need to be correctly deployed before proceeding with this activity:
<01> - vpc id
<02> - company id
<03> - business entity id
<04> - short nat description
<05> - Hosting region ID
<06> - subnet count identifier
<01> - vpc id
<02> - company id
<03> - business entity id
<04> - short router description
<05> - Hosting region ID
<06> - router count identifier
<01> - vpc id
<02> - Company
<03> - Business entity ID
<04> - Router description
<05> - Hosting region ID
<07> - router count identifier
Using any supported method deploy the “Cloud NAT service(s)” with the following configuration details:
#01 of 01:
Parameter | Value |
---|---|
Cloud NAT - ID | xall-vpc--vpc-01--xall-nat-gw--shared-nat--de1-01 |
Router - ID | xall-vpc--vpc-01--xall-router--shared-nat--de1-01 |
Router - Description | xall-vpc--vpc-01 - XYZ-Global router = Shared NAT - Germany 1 (GCP) - 01 |
Region | |
VPC network | xall-vpc--vpc-01 |
Command 01 of 02 - Create a “router”:
(Example output)
Command 02 of 02 - Create a “Cloud NAT”:
(Example output)
Confirm the “router(s)” have been deployed in the Cloud Console using the following path “Navigation menu -> NETWORKING -> Network Connectivity -> Cloud Routers”.
Confirm the “Cloud NAT(s)” have been deployed in the Cloud Console using the following path “Navigation menu -> NETWORKING -> Network Services -> Cloud NAT”.
Click Check my progress to verify the objective.
Summary of Activities:
The below table outlines in yellow the components which will have been deployed by the activities of this lab.
Be sure to check out the following documentation for more practice with SAP:
...helps you make the most of Google Cloud technologies. Our classes include technical skills and best practices to help you get up to speed quickly and continue your learning journey. We offer fundamental to advanced level training, with on-demand, live, and virtual options to suit your busy schedule. Certifications help you validate and prove your skill and expertise in Google Cloud technologies.
Manual Last Updated July 18, 2024
Lab Last Tested July 18, 2024
Copyright 2024 Google LLC All rights reserved. Google and the Google logo are trademarks of Google LLC. All other company and product names may be trademarks of the respective companies with which they are associated.
This content is not currently available
We will notify you via email when it becomes available
Great!
We will contact you via email if it becomes available
One lab at a time
Confirm to end all existing labs and start this one