This post was originally published on this site

Inserting security into your network design may involve the use of a network virtual appliance (NVA). The flexibility of the Cross-Cloud Network to support these configurations means enterprises can extend existing security aspects from hybrid connections into the cloud for a consistent experience. In this blog we will look at a reference architecture for hub and spoke communication using NVA within a single region.

Regional affinity

Enterprises may have specific requirements around low latency, data residency, and resource optimization. Regional affinity keeps resources and networking traffic between services in the same region. The possible trade off is the lack of regional failover where traffic is re-routed to another region in the event of any failure. These considerations must be kept in mind while designing the setup based on your enterprise’s requirements. Review the Google Cloud regional deployment archetype document for more on regional deployments.

The Cross-Cloud Network

The Cross-Cloud Network provides you with a set of functionality and architectures that allows any-to-any connectivity. Google’s software-defined global backbone provides excellent capabilities to connect your distributed applications. Google has built its network with multi-shards, Protective ReRoute (PRR), and autonomous networking to support its global scale.

Design pattern example

To understand how to think about setting up your network for NVA with VPC Network Peering in a regional design, let’s look at the design pattern.

The network comprises an External network (on-prem and other clouds) and Google Cloud networks (Internet access VPC, routing VPC, services-access VPC, managed services VPC,  workload VPCs).

1-ccn-vnp-nva-flows

The traffic flow 

This design utilizes the following services to provide an end-to-end solution.

The following diagram illustrates packet flows:

2-ccn-nva-flow

In the diagram, the orange line shows flows between the external network (on-prem and other clouds) and the Google Cloud services-access VPC network.

  • The traffic flows over the Interconnect and follows routes learned from the external Cloud Router in the routing VPC.

  • The routing VPC directly uses an untagged policy-based route to direct traffic to the Internal Passthrough NLB. Traffic is examined and the NVA uses a skip policy-based route on exiting traffic

  • Traffic follow the custom routes to the services-access VPC over the VPN connection

  • The return traffic follows the same traffic flows toward the On-Premises over the Cloud Interconnect

In the diagram, the blue line shows flows between the external network (on-prem and other clouds) and the Google Cloud workload VPC network 1.

  • The traffic flows over the Interconnect and follows routes learned from the external Cloud Router in the routing VPC.

  • The routing VPC directly uses an untagged policy-based route to direct traffic to the Internal Passthrough NLB. Traffic is examined and the NVA uses a skip policy-based route on exiting traffic.

  • Traffic follows the subnet routes to the workload VPC network 1 over the VPC Network Peering connection.

  • The return traffic follows the same traffic flows toward the On-Premises over the Cloud Interconnect

In the diagram, the pink line shows flows between Google Cloud workload VPC network 1 and the Google Cloud services-access VPC network.

  • Traffic originating in the workload VPC network follows a policy-based route that is programmed to direct the flow to the internal Passthrough Network Load Balancer in front of the NVAs in the routing VPC network

  • The traffic is examined and uses a skip policy-based route assigned on traffic leaving an NVA to skip the untagged policy-based route and follow VPC routing. 

  • Traffic follows a dynamic route over from the HA VPN tunnels to the services-access VPC network.

  • The return traffic follows the same flow back through the routing VPC and the NVAs toward the Workload VPC network.

To understand the all the specific details on traffic flow and considerations, read the VPC Network Peering Cross-Cloud Network with NVAs and regional affinity guide on the Google Cloud Architecture Center.

Next steps

Take a deeper dive into cross-cloud networking and read more on Network Security Integrations  and the Cross-Cloud Network.

Want to ask a question, find out more or share a thought? Please connect with me on Linkedin.