[[["容易理解","easyToUnderstand","thumb-up"],["確實解決了我的問題","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["難以理解","hardToUnderstand","thumb-down"],["資訊或程式碼範例有誤","incorrectInformationOrSampleCode","thumb-down"],["缺少我需要的資訊/範例","missingTheInformationSamplesINeed","thumb-down"],["翻譯問題","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["上次更新時間:2025-09-04 (世界標準時間)。"],[],[],null,["# Intra-project traffic network policies\n\nThis page provides instructions to configure intra-project traffic network policies in Google Distributed Cloud (GDC) air-gapped appliance.\n\nProject network policies define either ingress or egress rules. You can define policies that allow communication within projects, between projects, and to external IP addresses.\n\nBefore you begin\n----------------\n\nTo configure intra-project traffic network policies, you must have the following:\n\n- The necessary identity and access roles. For more information, see [Prepare predefined roles and access](/distributed-cloud/hosted/docs/latest/appliance/platform/pa-user/pnp/pnp-overview#prepare-predefined-roles-and-access).\n- An existing project. For more information, see [Create a project](/distributed-cloud/hosted/docs/latest/appliance/platform/pa-user/create-a-project).\n\nCreate an intra-project traffic policy\n--------------------------------------\n\nFor traffic within a project, GDC applies a predefined\nproject network policy, the intra-project policy, to each project by default.\nBy default, workloads in a project namespace have the ability to communicate\nwith each other without exposing anything to external resources.\n\nBy default, there is no egress policy, so outbound traffic is allowed for all\nintra-project traffic. However, when you set a single egress policy, only the\ntraffic that the policy specifies is allowed.\n\n### Ingress intra-project traffic network policy\n\nWhen you create a project, you implicitly create a default base\n`ProjectNetworkPolicy` that allows intra-project communication. This policy\nallows inbound traffic from other services in the same project.\n\nYou can remove the default policy, but be aware that this removal results in denying intra-project communication for\nall services and workloads within the project."]]