Please enable JavaScript.
Coggle requires JavaScript to display documents.
GCP_Networking - Coggle Diagram
GCP_Networking
VPC
-
-
-
-
-
-
VPC Service Control
- Ensure sensitive data can only be accessed from authorized networks
- Restrict resource access to allowed IP addresses, identities, and trusted client devices
- Mitigate exfiltration risks by isolating multi-tenant services
- Control which Google Cloud services are accessible from a VPC network
-
Private Google Access
Private Google Access offers private connectivity to hosts either in a VPC network or on-premises network that use private IP addresses to access Google APIs and services.
VM instances that only have internal IP addresses (no external IP addresses) can use Private Google Access.
If you disable Private Google Access, the VM instances can no longer reach Google APIs and services; they can only send traffic within the VPC network.
-
-
Servless
A network endpoint group (NEG) specifies a group of backend endpoints for a load balancer. A serverless NEG is a backend that points to a Cloud Run, App Engine, or Cloud Functions service.
Serverless NEGs do not have any network endpoints such as ports or IP addresses. They can only point to an existing Cloud Run, App Engine, or Cloud Functions service residing in the same region as the NEG.