Computer Networking โ†’ GCP Networking

Every concept, simplified. Zero fluff, 100% clarity.

31 Networking Topics
16 GCP Services
100% Visual

1. OSI Model, 7 Layers

๐Ÿ“š OSI = Open Systems Interconnection

Layer 7, Application HTTP, FTP, SMTP, DNS, SSH
Layer 6, Presentation Encryption, Compression, Translation
Layer 5, Session Establish, Manage, Terminate
Layer 4, Transport TCP, UDP, Segments
Layer 3, Network IP, ICMP, Routers, Packets
Layer 2, Data Link MAC, Switches, Frames
Layer 1, Physical Cables, Hubs, Signals, Bits

Mnemonic: "All People Seem To Need Data Processing"

LayerPDUDevice
7 ApplicationData,
6 PresentationData,
5 SessionData,
4 TransportSegment,
3 NetworkPacketRouter
2 Data LinkFrameSwitch
1 PhysicalBitsHub / Cable

PDU = Protocol Data Unit

2. TCP/IP Model, 4 Layers

๐Ÿ”— TCP/IP Model

Application HTTP, DNS, FTP, SSH (OSI 5+6+7)
Transport TCP / UDP (OSI 4)
Internet IP, ICMP, ARP (OSI 3)

๐Ÿ”„ OSI โ†” TCP/IP Mapping

L7 App
โ†”
Application
L6 Pres
โ†”
Application
L5 Session
โ†”
Application
L4 Transport
โ†”
Transport
L3 Network
โ†”
Internet
L2 Data Link
โ†”
L1 Physical
โ†”
3. Network Types

๐Ÿ“ก By Geographic Scope

PAN
~1m
LAN
~1km
MAN
~100km
WAN
Global
PANPersonal, Bluetooth, USB LANLocal, Office, Home MANMetropolitan, City-wide WANWide, Internet, Cross-country

๐ŸŒ Special Types

WLANWireless LAN (WiFi) SANStorage Area Network CANCampus Area Network VPNVirtual Private Network (over internet) VLANVirtual LAN (logical segmentation) SD-WANSoftware-Defined WAN
4. Network Topologies

๐Ÿ”€ Physical Topologies

โญ Star

Central hub/switch

Bus

Single backbone

๐Ÿ”ต Ring

Circular data flow

๐Ÿ•ธ๏ธ Mesh

Every node connected

๐ŸŒณ Tree

Hierarchical
5. IPv4 Addressing

๐Ÿ  IPv4 Structure

192
.
168
.
1
.
100
Size32 bits (4 octets)FormatDotted decimal (x.x.x.x)Range0.0.0.0, 255.255.255.255Total~4.3 billion addresses

๐Ÿ“Š IPv4 Classes

ClassRangeMaskUse
A1โ€“126.x.x.x/8Large orgs
B128โ€“191.x.x.x/16Medium orgs
C192โ€“223.x.x.x/24Small orgs
D224โ€“239.x.x.x,Multicast
E240โ€“255.x.x.x,Research

๐Ÿ”’ Private IP Ranges (RFC 1918)

ClassRangeCIDR
A10.0.0.0, 10.255.255.25510.0.0.0/8
B172.16.0.0, 172.31.255.255172.16.0.0/12
C192.168.0.0, 192.168.255.255192.168.0.0/16
127.0.0.1Loopback (localhost)169.254.x.xAPIPA (no DHCP fallback)0.0.0.0Default route255.255.255.255Broadcast

๐ŸŽญ Public vs Private IP

๐Ÿ  Private IP

  • Used inside LAN
  • Not routable on internet
  • Free, reusable
  • Assigned by router/DHCP
vs

๐ŸŒ Public IP

  • Used on the internet
  • Globally unique
  • Assigned by ISP
  • Costs money
6. IPv6 Addressing

๐Ÿš€ IPv6 Overview

2001
:
0db8
:
85a3
:
0000
:
0000
:
8a2e
:
0370
:
7334
Size128 bits (8 groups of 16 bits)FormatHex, colon-separatedTotal340 undecillion addressesNo NATEvery device gets a public IPNo BroadcastUses Multicast insteadAuto-configSLAAC (no DHCP needed)

๐Ÿ“ IPv6 Address Types

TypePrefixScope
Global Unicast2000::/3Internet
Link-Localfe80::/10Same link only
Unique Localfc00::/7Private
Multicastff00::/8One-to-many
Loopback::1Self
7. Subnetting

โœ‚๏ธ Subnetting, Splitting Networks

IP = Network Part + Host Part, Subnet mask tells where to split

192.168.1.0/24

N
N
N
N
N
N
N
N
N
N
N
N
N
N
N
N
N
N
N
N
N
N
N
N
H
H
H
H
H
H
H
H

N = Network (24 bits) H = Host (8 bits)

Mask: 255.255.255.0 โ†’ Usable hosts: 2โธ - 2 = 254

CIDRMaskHostsUsable
/24255.255.255.0256254
/25255.255.255.128128126
/26255.255.255.1926462
/27255.255.255.2243230
/28255.255.255.2401614
/30255.255.255.25242
/32255.255.255.25511

Usable = Total - 2 (network + broadcast)

8. CIDR Notation

๐Ÿ“ CIDR = Classless Inter-Domain Routing

10.0.0.0
/16
/16 meansFirst 16 bits = network, rest = hostsWhy CIDR?Replaced wasteful classful addressingSupernettingCombine smaller networks โ†’ larger blockFormulaHosts = 2^(32 - prefix) - 2
9. MAC Address

๐Ÿท๏ธ MAC = Media Access Control

AA:BB:CC
OUI (vendor)
DD:EE:FF
NIC (unique)
Size48 bits (6 bytes), hexLayerL2 (Data Link)ScopeLocal network onlyBurned-inSet by manufacturer (can be spoofed)ff:ff:ff:ff:ff:ffBroadcast MAC
10. Data Encapsulation

๐Ÿ“ฆ How data travels down the OSI layers

Data
App Layer
โ†“ + TCP/UDP Header
TCP Hdr
Data
Segment
โ†“ + IP Header
IP Hdr
TCP Hdr
Data
Packet
โ†“ + MAC Header + Trailer
MAC
IP
TCP
Data
FCS
Frame
โ†“ Converted to
0 1 1 0 1 0 0 1 1 0 1 1 ...
Bits
11. TCP vs UDP

โšก TCP vs UDP, Transport Layer

๐Ÿ“ฆ TCP

  • Connection-oriented (handshake)
  • Reliable (ACK, retransmit)
  • Ordered packets
  • Flow + congestion control
  • Slower, more overhead
  • Use: HTTP, SSH, FTP, Email
vs

๐Ÿš€ UDP

  • Connectionless (fire & forget)
  • No delivery guarantee
  • No ordering
  • No flow control
  • Faster, low overhead
  • Use: DNS, Video, VoIP, Gaming
12. TCP 3-Way Handshake

๐Ÿค Connection Setup

Client
SYN โ†’
Server
Client
โ† SYN+ACK
Server
Client
ACK โ†’
Server

After 3-way handshake โ†’ data transfer begins

๐Ÿ‘‹ Connection Teardown (4-Way)

Client
FIN โ†’
Server
Client
โ† ACK
Server
Client
โ† FIN
Server
Client
ACK โ†’
Server
13. Well-Known Ports

๐Ÿšช Ports to Remember

20/21
FTP
22
SSH
23
Telnet
25
SMTP
53
DNS
67/68
DHCP
80
HTTP
110
POP3
143
IMAP
443
HTTPS
3306
MySQL
5432
Postgres
3389
RDP
8080
Alt HTTP
161
SNMP
6379
Redis
0โ€“1023Well-Known (system)1024โ€“49151Registered49152โ€“65535Dynamic / Ephemeral
14. DNS, Domain Name System

๐Ÿ“– DNS Resolution Flow

google.com
โ†’
Browser Cache
โ†’
OS Cache
โ†’
Recursive Resolver
โ†’
Root (.)
โ†’
TLD (.com)
โ†’
Authoritative NS
โ†’
142.250.80.46

๐Ÿ“‹ DNS Record Types

TypePurposeExample
AName โ†’ IPv4google.com โ†’ 142.250.x.x
AAAAName โ†’ IPv6google.com โ†’ 2607:f8b0:โ€ฆ
CNAMEAliaswww โ†’ google.com
MXMail serverPriority + mail host
NSNameserverns1.google.com
TXTText (SPF, DKIM)Verification strings
PTRReverse lookupIP โ†’ Name
SOAStart of AuthorityZone info
SRVService locator_sip._tcp.example.com
15. DHCP, Dynamic Host Configuration

๐ŸŽฏ DHCP DORA Process

Discover
Client broadcasts
โ†’
Offer
Server offers IP
Request
Client requests
โ†’
Ack
Server confirms
ProvidesIP, Subnet Mask, Gateway, DNSPortServer: 67, Client: 68LeaseIP assigned for limited time
16. ARP, Address Resolution Protocol

๐Ÿ” ARP = IP โ†’ MAC Translation

Host A
ARP Request (broadcast): Who has 192.168.1.5?
All
Host A
ARP Reply (unicast): I'm AA:BB:CC:DD:EE:FF
Host B
ARP CacheStores recent IPโ†”MAC mappingsRARPReverse: MAC โ†’ IP (obsolete)Gratuitous ARPAnnounce own IP (detect conflicts)ARP SpoofingAttack: fake replies โ†’ MITM
17. NAT, Network Address Translation

๐Ÿ”„ NAT Types

Private IP
192.168.1.10
โ†’
NAT Router
โ†’
Public IP
203.0.113.5
TypeHow
Static NAT1 Private โ†’ 1 Public (permanent)
Dynamic NATPool of Public IPs, on demand
PAT / OverloadMany Private โ†’ 1 Public (using ports)

PAT is most common, your home router uses it!

18. Routing

๐Ÿ—บ๏ธ Static vs Dynamic

Static

  • Manually configured
  • No overhead
  • Doesn't adapt
  • Small networks
vs

Dynamic

  • Auto-discovers routes
  • Adapts to changes
  • Uses protocols
  • Large networks

๐Ÿ“ก Routing Protocols

ProtocolTypeAlgorithmMetric
RIPIGP, Distance VectorBellman-FordHop count (max 15)
OSPFIGP, Link StateDijkstra SPFCost (bandwidth)
EIGRPIGP, HybridDUALBandwidth+delay
BGPEGP, Path VectorBest pathAS path, policies
IS-ISIGP, Link StateDijkstraCost
IGPInterior Gateway (within AS)EGPExterior Gateway (between AS)ASAutonomous System
19. Switching

๐Ÿ”€ L2 vs L3 Switch

L2 Switch

  • Uses MAC
  • MAC table
  • Same VLAN/subnet
  • Faster, simpler
vs

L3 Switch

  • Uses IP
  • Routing table
  • Inter-VLAN routing
  • Switch + Router
HubL1, Broadcasts to all (dumb)SwitchL2, Forwards to specific MACRouterL3, Forwards between networks
20. VLANs

๐Ÿท๏ธ VLAN = Virtual LAN

VLAN 10, Sales
PC1, PC2, PC3
VLAN 20, Eng
PC4, PC5, PC6
PurposeLogical network segmentationAccess PortBelongs to 1 VLANTrunk PortCarries multiple VLANs (802.1Q)Native VLANUntagged traffic on trunkInter-VLANNeeds L3 switch or router-on-a-stick
21. HTTP / HTTPS

๐ŸŒ Methods & Status Codes

GETRead
POSTCreate
PUTUpdate (full)
PATCHUpdate (partial)
DELETERemove
HEADHeaders only
OPTIONSSupported methods
1xxInformational
2xxSuccess โœ“
3xxRedirect
4xxClient Error
5xxServer Error
200OK301Moved403Forbidden404Not Found500Server Error502Bad Gateway503Unavailable

๐Ÿ”’ HTTP vs HTTPS

HTTP

  • Port 80
  • Plain text
  • No encryption
vs

HTTPS

  • Port 443
  • Encrypted (TLS)
  • SSL certificate
22. SSL / TLS

๐Ÿ” TLS Handshake

1. Client Hello โ†’ ciphers, TLS version
โ†•
2. Server Hello โ†’ cipher + certificate
โ†•
3. Client verifies cert โ†’ session key โ†’ encrypts
โ†•
4. Shared symmetric key โ†’ encrypted comms
SSLDeprecated โ†’ use TLSTLS 1.2Widely supportedTLS 1.3Latest, 1-RTT handshakemTLSBoth sides verify certs
23. VPN

๐Ÿ›ก๏ธ VPN Types

Device
โ†’
๐Ÿ”’ Encrypted Tunnel
โ†’
VPN Server
โ†’
Internet
TypeUseProtocol
Site-to-SiteConnect 2 officesIPsec
Remote AccessUser โ†’ corp networkSSL/TLS, IPsec
Client-basedApp on deviceOpenVPN, WireGuard
IPsecL3, AH (auth) + ESP (encrypt)IKEKey exchange (Phase 1+2)GRETunnel (no encryption alone)WireGuardModern, fast, simple
24. Firewalls

๐Ÿงฑ Firewall Types

TypeLayerHow
Packet FilterL3/L4IP + port rules (stateless)
StatefulL3/L4Tracks connection state
WAFL7Inspects HTTP content
NGFWL3-L7DPI + IPS + app awareness
ProxyL7Intermediary for traffic
ACLAccess Control ListIngressIncoming rulesEgressOutgoing rules
25. Load Balancing

โš–๏ธ Load Balancer

Clients
โ†“
โš–๏ธ Load Balancer
Server 1
Server 2
Server 3
AlgorithmHow
Round Robin1โ†’2โ†’3โ†’1โ†’2โ†’3
Least ConnectionsLeast busy server
IP HashSame client โ†’ same server
WeightedPowerful server gets more
L4 LBTCP/UDP (faster)L7 LBHTTP (smarter, content-based)
26. Proxy & Reverse Proxy

๐Ÿ”„ Forward vs Reverse

Forward Proxy

Client
โ†’
Proxy
โ†’
Internet
  • Hides client identity
  • Content filtering
  • Caching
vs

Reverse Proxy

Client
โ†’
Rev. Proxy
โ†’
Servers
  • Hides server identity
  • Load balancing
  • SSL termination
27. CDN

๐ŸŒ Content Delivery Network

๐Ÿข Origin Server
โ†™ โ†“ โ†˜
๐Ÿ‡บ๐Ÿ‡ธ Edge
๐Ÿ‡ช๐Ÿ‡บ Edge
๐Ÿ‡ฎ๐Ÿ‡ณ Edge
๐Ÿ‡ฏ๐Ÿ‡ต Edge
โ†‘ Users served from nearest edge
PoPPoint of PresenceCache HitFound at edge โ†’ fastCache MissFetch from origin โ†’ cacheTTLTime-to-Live
28. WiFi Standards

๐Ÿ“ถ 802.11 Standards

StandardNameFreqSpeed
802.11nWiFi 42.4/5 GHz600 Mbps
802.11acWiFi 55 GHz6.9 Gbps
802.11axWiFi 6/6E2.4/5/6 GHz9.6 Gbps
2.4 GHzLonger range, more interference5 GHzShorter range, fasterSSIDNetwork nameWPA3Latest security
29. Cast Types

๐Ÿ“ก Unicast / Broadcast / Multicast / Anycast

Unicast
1 โ†’ 1
๐Ÿ‘ค โ†’ ๐Ÿ‘ค
Broadcast
1 โ†’ ALL
๐Ÿ‘ค โ†’ ๐Ÿ‘ฅ๐Ÿ‘ฅ๐Ÿ‘ฅ
Multicast
1 โ†’ group
๐Ÿ‘ค โ†’ ๐Ÿ‘ฅ๐Ÿ‘ฅ
Anycast
1 โ†’ nearest
๐Ÿ‘ค โ†’ ๐Ÿ‘ค (closest)
30. ICMP & Tools

๐Ÿ“ก ICMP

pingEcho Request/Reply โ†’ test reachabilitytracerouteEach hop to destination (TTL trick)MTUMax Transmission Unit (1500 bytes)TTLHop counter, prevents loopsFragmentationSplit packets if > MTU

๐Ÿ”ง Network Tools

ToolPurpose
pingTest connectivity
traceroutePath to dest
nslookup/digDNS queries
netstat/ssConnections
tcpdumpPacket capture
wiresharkGUI analyzer
nmapPort scanner
curlHTTP requests
31. Network Security

๐Ÿ›ก๏ธ Security Fundamentals

CIA TriadConfidentiality, Integrity, AvailabilityEncryptionSymmetric (AES) / Asymmetric (RSA)HashingOne-way: MD5, SHA-256IDSDetect onlyIPSDetect + blockDDoSDistributed Denial of ServiceMITMMan-in-the-MiddleZero TrustNever trust, always verify

๐Ÿ”‘ Auth Protocols

ProtocolUse
RADIUSCentral network auth
TACACS+Cisco auth (separates AAA)
802.1XPort-based access control
KerberosTicket-based (AD)
LDAPDirectory services

AAA = Authentication, Authorization, Accounting


โ˜๏ธ GCP Networking Concepts

Every GCP service mapped to fundamentals above

GCP 1. VPC

โ˜๏ธ VPC = Your Private Network in GCP

Like: Private Network
GCP Project
โ””โ”€โ”€ contains โ”€โ”€โ”˜
VPC Network Global resource
โ””โ”€โ”€ contains โ”€โ”€โ”˜
Subnet us-central1
Subnet europe-west1
ScopeGlobal (not regional!)SubnetsRegionalDefault VPCAuto-created, subnets in all regionsCustom VPCYou create subnets manuallyAuto ModeAuto subnet every region (/20)Custom ModeYou choose regions + CIDR โœ“Internal DNSAutomatic within VPCMTU1460 (default) or 1500
GCP 2. Subnets

๐Ÿ—๏ธ GCP Subnets

Like: Subnetting/CIDR
ScopeRegionalPrimary RangeMain CIDR for VMsSecondary RangeAlias IPs for Pods (GKE)Can ExpandYes! (can't shrink)Reserved IPs4 per subnet
VPC: my-vpc
โ””โ”€ web-subnet (us-central1) โ†’ 10.0.1.0/24
โ””โ”€ db-subnet (us-east1) โ†’ 10.0.2.0/24

๐Ÿ”ข IP Addressing in GCP

TypeScopeNotes
Internal IPRegionalFrom subnet CIDR
External IPReg/GlobalEphemeral or static
Alias IPVMMultiple IPs (GKE pods)
PGASubnetReach Google APIs privately
EphemeralChanges on stop/startStaticPersists, costs $ if unused
GCP 3. Firewall Rules

๐Ÿงฑ VPC Firewall Rules

Like: ACLs / Firewalls
ScopeVPC-level (global)StatefulYes! Return traffic auto-allowedDirectionIngress or EgressActionAllow or DenyPriority0โ€“65535 (lower = higher)TargetAll VMs, tag, or service account

Default Rules (can't delete):

โœ… Egress allow all65535
โŒ Ingress deny all65535
Direction
Priority
Action
Target
Src/Dst
Proto:Port
Hierarchical Firewall Policies, Org/Folder level, evaluated BEFORE VPC rules
Order: Hierarchical โ†’ VPC Rules โ†’ Implied rules
GCP 4. Routes

๐Ÿ—บ๏ธ GCP Routing

Like: Routing Table
TypeCreated By
System-generatedAuto: default (0.0.0.0/0) + subnet routes
Custom staticYou create (CIDR โ†’ next hop)
Dynamic (BGP)Cloud Router learns from peers
Next HopsInstance, IP, VPN, IL, LBCloud RouterManaged BGP speakerDefault0.0.0.0/0 โ†’ Internet GW
GCP 5. Cloud NAT

๐Ÿ”„ Cloud NAT = Managed NAT

Like: PAT/NAT
VMs
(no ext IP)
โ†’
Cloud NAT
โ†’
Internet
DirectionOutbound onlyScopeRegionalNo VM agentNetwork-levelAuto/ManualAuto-allocate or specify IPsUseVMs need internet without public IP
GCP 6. Cloud DNS

๐Ÿ“– Cloud DNS

Like: DNS Server
100% SLAHighest availabilityPublic ZoneInternet-facingPrivate ZoneWithin VPC onlyForwardingForward to on-prem DNSPeering ZoneResolve in another VPCDNSSECSupported (public)
GCP 7. Cloud Load Balancing

โš–๏ธ GCP LB Family

Like: L4/L7 LB
TypeLScopeTraffic
External HTTP(S)L7GlobalExternal HTTP/S
Internal HTTP(S)L7RegionalInternal HTTP/S
External NetworkL4RegionalExternal TCP/UDP
Internal TCP/UDPL4RegionalInternal TCP/UDP
TCP ProxyL4GlobalExternal TCP
SSL ProxyL4GlobalExternal SSL
โ‘  Global External IP
โ‘ก Forwarding Rule
โ‘ข Target Proxy
โ‘ฃ URL Map
โ‘ค Backend Service
โ‘ฅ Health Check
โ‘ฆ Instance Group / NEG
โ€ข Anycast IP (single global)
โ€ข SSL termination
โ€ข URL-based routing
โ€ข CDN integration
โ€ข Cloud Armor (WAF)
โ€ข Auto-scaling with MIGs
โ€ข Multi-region failover
GCP 8. Cloud VPN

๐Ÿ”’ Cloud VPN

Like: Site-to-Site VPN
On-Prem
โ†’
VPN GW
โ†’
๐Ÿ”’ IPsec
โ†’
Cloud VPN
โ†’
VPC

Classic VPN

  • 1 interface, 1 IP
  • Static or dynamic
  • 99.9% SLA
vs

HA VPN โœ“

  • 2 interfaces, 2 IPs
  • BGP only
  • 99.99% SLA
GCP 9. Cloud Interconnect

๐Ÿ”Œ Dedicated Link

Like: Leased Line

Dedicated IC

  • Physical to Google
  • 10/100 Gbps per link
  • Colocation needed
vs

Partner IC

  • Via provider
  • 50 Mbpsโ€“50 Gbps
  • No colocation
When to use what?
VPN: < 3 Gbps, quick | Partner: no colocation | Dedicated: 10โ€“100 Gbps, lowest latency
GCP 10. VPC Peering

๐Ÿค VPC Peering

Like: Direct Link
VPC-A
Project 1
โ‡„
VPC-B
Project 2
Internal IPsPrivate communicationNo transitAโ†”B, Bโ†”C โ‰  Aโ†”CNon-overlappingCIDRs must differCross-projectYes, even cross-orgFirewallEach VPC owns its rules
GCP 11. Shared VPC

๐Ÿข Shared VPC

Like: Shared LAN
Host Project
Owns VPC, subnets, firewall
โ†™ โ†“ โ†˜
Service A
Dev
Service B
QA
Service C
Prod
HostContains VPC, network adminsServiceDeploy into shared subnetsBenefitCentral control + project isolation
GCP 12. Private Google Access

๐Ÿ” PGA

VM
(no ext IP)
โ†’
PGA
โ†’
Google APIs
Enable onSubnet levelUseVMs reach GCS, BigQuery without ext IP

๐Ÿ”— Private Service Access

WhatPrivate connection to managed servicesExamplesCloud SQL, Memorystore, FilestoreHowVPC Peering to Google's service networkReserved RangeYou allocate IP range for Google
GCP 13. Private Service Connect

๐ŸŽฏ PSC

Consumer VPC
โ†’
PSC Endpoint
โ†’
Producer Service
ConsumerCreates endpoint (internal IP)ProducerPublishes service attachmentvs PeeringNo CIDR overlap, more controlUseGoogle APIs, your services, 3rd party
GCP 14. Cloud Armor

๐Ÿ›ก๏ธ WAF + DDoS

Like: WAF
Internet
โ†’
Armor
โ†’
HTTP(S) LB
โ†’
Backends
IP allow/denyBlock by IP rangeGeo-blockingBlock by countryOWASP rulesSQLi, XSS protectionRate limitingThrottle requestsAdaptiveML-based DDoS detectionWorks withExternal HTTP(S) LB only
GCP 15. Network Tiers

๐ŸŽ๏ธ Premium vs Standard

Premium โœ“

  • Google global network
  • Traffic enters near user
  • Low latency
  • Global LB + CDN
vs

Standard

  • Public internet (ISP)
  • Enters near GCP region
  • Higher latency
  • Regional LB only
GCP 16. More Services

๐Ÿ“ก Cloud CDN

Like: CDN
Works withExternal HTTP(S) LBCacheGoogle edge PoPsOriginGCE, GCS, ExternalSigned URLsTime-limited access

๐Ÿ” Packet Mirroring

Like: SPAN
WhatCopy VM traffic for inspectionUseIDS, forensicsFull packetNot sampled

๐Ÿง  Network Intelligence Center

Connectivity TestsTest reachabilityTopologyVisualize VPCPerformanceLatency & packet lossFirewall InsightsRule usage analysis

๐Ÿšฆ Traffic Director

WhatService mesh control planeEnvoySidecar proxyUseMicroservice routing, mTLS

๐Ÿ”— VPC Flow Logs

WhatLog flows to/from VMsEnable onSubnet levelInfoSrc/Dst IP, port, bytes, actionExportLogging, BigQuery, Pub/Sub

๐ŸŒ GCP Networking, Quick Reference

ConceptGCP ServiceScope
Private NetworkVPCGlobal
SubnetVPC SubnetRegional
FirewallVPC Firewall RulesGlobal
NATCloud NATRegional
DNSCloud DNSGlobal
Load BalancerCloud Load BalancingGlobal/Regional
VPNCloud VPN (HA/Classic)Regional
Dedicated LinkCloud InterconnectRegional
PeeringVPC PeeringGlobal
Multi-projectShared VPCOrg
WAF / DDoSCloud ArmorGlobal
CDNCloud CDNGlobal
Packet CapturePacket MirroringRegional
MonitoringNetwork Intelligence CenterGlobal
Service MeshTraffic DirectorGlobal
Private APIPGA / PSCSubnet/VPC
Flow LoggingVPC Flow LogsSubnet