Overview

This page provides an overview of the Google Distributed Cloud (GDC) air-gapped VPN feature and describes the supported specifications and tunneling protocols.

GDC VPN securely extends a peer network to a user's virtual machine (VM) in an organization of a GDC zone through an Internet Protocol Security (IPsec) VPN connection.

Configure the GDC VPN using the VPNGateway, PeerGateway, VPNBGPPeer, and VPNTunnel resources from the Networking API.

Specifications

The GDC VPN has the following specifications:

  • GDC VPN only supports site-to-site IPsec VPN connectivity. IPsec is a suite of protocols designed to secure communication over IP networks. Other VPN technologies, such as SSL and VPN are not supported.
  • The peer VPN gateway must have a static external IPv4 address. You need this IP address to configure VPN.
  • If your peer VPN gateway is behind a firewall rule, you must configure the firewall rule to pass both Encapsulating Security Payload (ESP) IPsec protocol and Internet Key Exchange (IKE) UDP 500 and UDP 4500 traffic to it.
  • GDC VPN only supports one-to-one NAT by using UDP encapsulation for NAT-Traversal (NAT-T). The peer VPN gateway must be configured to identify itself using its static external IPv4 address, not its internal private IP.
  • IPv6 traffic is not supported.

IPsec and IKE support

GDC VPN supports IKEv2 by using an IKE pre-shared key (shared secret) and IKE ciphers. GDC VPN only supports a pre-shared key for authentication. When you create the GDC VPN tunnel, specify a pre-shared key. When you create the tunnel at the peer VPN gateway, specify this same pre-shared key. For more information, see Create the secret with a PSK.

GDC VPN supports ESP in tunnel mode with authentication, but does not support AH or ESP in transport mode.

What's next