Prüfpunkte
Create a VPC with custom subnet mode.
/ 10
Create custom subnet within the labnet VPC
/ 10
Add firewall rules to allow tcp:22 and icmp
/ 10
Create another VPC, subnet and required deny firewall rules.
/ 30
Create VM instances
/ 40
Configuring Networks via gcloud
- GSP630
- Overview
- Setup and requirements
- Task 1. Create network
- Task 2. Create a subnetwork
- Task 3. Viewing networks
- Task 4. List subnets
- Task 5. Creating firewall rules
- Task 6. Viewing firewall rules details
- Task 7. Create another network
- Task 8. Create VM instances
- Task 9. Explore the connectivity
- Congratulations!
GSP630
Overview
A Virtual Private Cloud (VPC) network is a global resource which consists of a list of regional virtual subnetworks (subnets) in data centers, all connected by a global wide area network (WAN). VPC networks are logically isolated from each other in Google Cloud.
VPC provides networking functionality to Compute Engine virtual machine (VM) instances, Kubernetes Engine containers, and App Engine Flex. Each Google Cloud project by default has a default
network configuration which provides each region with an auto subnet network.
In this lab you use gcloud
to create two custom VPC networks with subnets, firewall rules, and VM instances, then test the networks' ability to allow traffic from the public internet.
Setup and requirements
Before you click the Start Lab button
Read these instructions. Labs are timed and you cannot pause them. The timer, which starts when you click Start Lab, shows how long Google Cloud resources will be made available to you.
This hands-on lab lets you do the lab activities yourself in a real cloud environment, not in a simulation or demo environment. It does so by giving you new, temporary credentials that you use to sign in and access Google Cloud for the duration of the lab.
To complete this lab, you need:
- Access to a standard internet browser (Chrome browser recommended).
- Time to complete the lab---remember, once you start, you cannot pause a lab.
How to start your lab and sign in to the Google Cloud console
-
Click the Start Lab button. If you need to pay for the lab, a pop-up opens for you to select your payment method. On the left is the Lab Details panel with the following:
- The Open Google Cloud console button
- Time remaining
- The temporary credentials that you must use for this lab
- Other information, if needed, to step through this lab
-
Click Open Google Cloud console (or right-click and select Open Link in Incognito Window if you are running the Chrome browser).
The lab spins up resources, and then opens another tab that shows the Sign in page.
Tip: Arrange the tabs in separate windows, side-by-side.
Note: If you see the Choose an account dialog, click Use Another Account. -
If necessary, copy the Username below and paste it into the Sign in dialog.
{{{user_0.username | "Username"}}} You can also find the Username in the Lab Details panel.
-
Click Next.
-
Copy the Password below and paste it into the Welcome dialog.
{{{user_0.password | "Password"}}} You can also find the Password in the Lab Details panel.
-
Click Next.
Important: You must use the credentials the lab provides you. Do not use your Google Cloud account credentials. Note: Using your own Google Cloud account for this lab may incur extra charges. -
Click through the subsequent pages:
- Accept the terms and conditions.
- Do not add recovery options or two-factor authentication (because this is a temporary account).
- Do not sign up for free trials.
After a few moments, the Google Cloud console opens in this tab.
Activate Cloud Shell
Cloud Shell is a virtual machine that is loaded with development tools. It offers a persistent 5GB home directory and runs on the Google Cloud. Cloud Shell provides command-line access to your Google Cloud resources.
- Click Activate Cloud Shell at the top of the Google Cloud console.
When you are connected, you are already authenticated, and the project is set to your Project_ID,
gcloud
is the command-line tool for Google Cloud. It comes pre-installed on Cloud Shell and supports tab-completion.
- (Optional) You can list the active account name with this command:
- Click Authorize.
Output:
- (Optional) You can list the project ID with this command:
Output:
gcloud
, in Google Cloud, refer to the gcloud CLI overview guide.
Install ping
to use later in this lab:
Task 1. Create network
You can choose to create an auto mode
or custom mode
VPC network. Each new network that you create must have a unique name within the same project. You can create up to four additional networks in a project.
- In Cloud Shell, use the following
gcloud
command to create a custom mode network calledlabnet
:
With this command you're doing the following:
-
gcloud
invokes the Cloud SDKgcloud
command line tool -
compute
is a one of the groups available ingcloud
, part of a nested hierarchy of command groups -
networks
is a subgroup ofcompute
with it's own specialized commands -
create
is the action to be executed on this group -
labnet
is the name of the network you're creating -
--subnet-mode=custom
you're passing the subnet mode flag and the type of subnet you're creating, "custom".
Click Check my progress to verify the objective.
Task 2. Create a subnetwork
When you create a subnetwork, its name must be unique in that project for that region, even across networks. The same name can appear twice in a project as long as each one is in a different region.
Each subnet must have a primary range, which must be unique within the same region in a project.
- Now create sub-network
labnet-sub
:
Click Check my progress to verify the objective.
Task 3. Viewing networks
- List the networks in your project:
Your output should look like this:
- Use
describe
to view network details, such as its peering connections and subnets. ReplaceNETWORK_NAME
with the name of your network:
Task 4. List subnets
You can list all subnets in all networks in your project, or you can show only the subnets for a particular network or region.
- Use this command to list all subnets in all VPC networks, in all regions:
You'll see the subnet you created towards the bottom of the list. It's the only one in the labnet
network.
Task 5. Creating firewall rules
Auto networks include default rules, custom networks do not include any firewall rules. Firewall rules are defined at the network level, and only apply to the network where they are created.
The name you choose for each firewall rule must be unique to the project. To allow access to VM instances, you must apply firewall rules.
- Create the
labnet-allow-internal
firewall rule:
With this command you are doing the following:
-
firewall-rules
is a subcategory ofcompute
-
create
is the action you are taking -
labnet-allow-internal
is the name of the firewall rule -
--network=labnet
puts the rule in thelabnet
network -
--action=ALLOW
must be used with the--rules
flag, and is either "ALLOW" or "DENY" -
--rules=icmp,tcp:22
specifies the icmp and tcp protocols and the ports that the rule applies to -
--source-ranges=0.0.0.0/0
specifies the ranges of source IP addresses in CIDR format.
Click Check my progress to verify the objective.
Task 6. Viewing firewall rules details
- Inspect the firewall rules to see its name, applicable network, and components, including whether the rule is enabled or disabled:
Task 7. Create another network
Now you'll create a another network, add firewall rules to it, then add VMs to both networks to test the ability to communicate with the networks.
- Run the following command to create the privatenet network:
- Create the private-sub subnet:
Create the firewall rules for privatenet
- Run the following command to create the privatenet-deny firewall rule:
This firewall rule denies all access from the internal protocol.
The output should look like this:
Click Check my progress to verify the objective.
- Run the following command to list all the firewall rules (sorted by VPC network):
- Look for the networks you created to quickly find your firewall rules.
Task 8. Create VM instances
Create two VM instances in the subnets:
- pnet-vm in private-sub
- lnet-vm in labnet-sub
Create the pnet-vm instance
- Run the following command to create the pnet-vm instance in the
private-sub
subnet:
The output should look like this:
Create the lnet-vm instance
- Using the previous step as your guide, create a VM with the following values:
Property | Value |
---|---|
Name | lnet-vm |
Zone | |
Machine type | n1-standard-1 |
Subnet | labnet-sub |
You should see a similar output when your subnet is created.
- Now list all the VM instances (sorted by zone):
For this command you're using the instance
subgroup, with it's specialized command list
.
You should see the 2 VMs you just created:
Click Check my progress to verify the objective.
Task 9. Explore the connectivity
When you created the networks, you applied firewall rules to each - so one network allows INGRESS traffic, and the other denies INGRESS traffic.
For this experiment, you should be able to communicate with the first network, but be unable to communicate with the second one.
Ping the external IP addresses
- Ping the external IP addresses of the VM instances to determine if you can reach the instances from the public internet.
This should work - lnet-vm
's network has a firewall rule that allows traffic.
- Repeat the command, but use
pnet-vm
's external IP address.
This should not work - nothing should be happening. pnet-vm
's network has a firewall rule that denies traffic. Use Ctrl+C to end the process.
Congratulations!
In this lab you created two custom mode VPC networks, firewall rules, and VM instances using the Cloud Shell command line. Then you tested the ability of the VPC networks to receive traffic from the public internet.
Next steps / learn more
Learn more about VPC networking:
Google Cloud training and certification
...helps you make the most of Google Cloud technologies. Our classes include technical skills and best practices to help you get up to speed quickly and continue your learning journey. We offer fundamental to advanced level training, with on-demand, live, and virtual options to suit your busy schedule. Certifications help you validate and prove your skill and expertise in Google Cloud technologies.
Manual Last Updated May 24, 2024
Lab Last Tested May 24, 2024
Copyright 2024 Google LLC All rights reserved. Google and the Google logo are trademarks of Google LLC. All other company and product names may be trademarks of the respective companies with which they are associated.