To configure the Google Cloud resources needed for Cross-Cloud Interconnect, complete the following tasks:
- Create two VLAN attachments, one for each of your Cross-Cloud Interconnect connections.
- Configure Border Gateway Protocol (BGP) sessions, one for each VLAN attachment.
Before you begin
This section lists required permissions, resources, and setup steps.
Required roles
Before proceeding, you need the required permissions. Ask your administrator to make sure that
you have the Compute Network Admin
(roles/compute.networkAdmin
) IAM role on the project. For more information about
granting roles, see
Manage access.
Required resources
Make sure that you have the following resources.
VPC network
If you don't already have a Virtual Private Cloud (VPC) network, create one. For more information, see Create and manage VPC networks.
Cloud Router
To configure Cross-Cloud Interconnect, you need a Cloud Router. If you're working in the Google Cloud console, you can create your Cloud Router at the same time that you create your VLAN attachments.
If you want to create a Cloud Router in advance, see
Create a
Cloud Router to connect a VPC network to a peer network.
Give the Cloud Router an ASN of
16550
or any private ASN that doesn't conflict with Azure requirements.
(Azure reserves the 65515-65520
range for its internal use, which
leaves 64512-65514
and 65521-65534
.)
Place the Cloud Router in a region that's supported for your Google Cloud location.
Project selection
If you're using the Google Cloud CLI, set your project ID by using the
gcloud config set
command.
gcloud config set project PROJECT_ID
The gcloud CLI instructions on this page assume that you have set your project ID.
Check port status in Google Cloud
Before proceeding, verify that each of your Cross-Cloud Interconnect ports is receiving a signal from Azure.
Console
- In the Google Cloud console, go to the Cloud Interconnect Physical connections tab.
- Click the name of your Cross-Cloud Interconnect connection.
- On the Interconnect details page, make sure that the Status is
Active.
If Google Cloud displays a page titled Cross-Cloud Interconnect order confirmation, then your connection is not ready for configuration.
Create VLAN attachments
A VLAN attachment is a logical connection between a single region in your VPC network and a peer network (in this case, your Azure network).
To qualify for the service level agreement (SLA), create at least one VLAN attachment for each Cross-Cloud Interconnect connection. You can also create more attachments for each connection; however, certain quotas and limits apply.
Console
- In the Google Cloud console, go to the Cloud Interconnect Physical connections tab.
- Click the name of your primary Cross-Cloud Interconnect connection.
- On the Interconnect details page, click Add VLAN attachment.
- Fill out the Select interconnects & redundancy form:
- In the Redundancy section, select Create a redundant pair of VLAN attachments (recommended).
- In the Interconnects section, do the following:
- Make sure that the Interconnect A field displays the name of your primary Cross-Cloud Interconnect port.
- Set the Interconnect B field to the name of your redundant Cross-Cloud Interconnect port.
- Click Continue.
- Fill out the Create VLAN attachment for Interconnect A form:
- Enter a Name.
- Optional: Enter a Description.
- Select a Cloud Router from the list. If no routers are listed,
click Create new router and follow the prompts to add a new one.
The Cloud Router must be located in a region that's
supported for your Google Cloud location.
Give the Cloud Router an ASN of
16550
or any private ASN that doesn't conflict with Azure requirements. (Azure reserves the65515-65520
range for its internal use, which leaves64512-65514
and65521-65534
.) - Enter a VLAN ID that's between 2 and 4094 and unique among the VLAN attachments associated with this connection.
- Expand the Advanced options section of the form and make any needed changes:
- If you want to specify an IP address range for the attachment, set Allocate BGP IP address to manually and enter a range. Otherwise, leave this field set to automatically.
- Choose a Capacity for the attachment.
- Optional: If appropriate, change the MTU value from its default of 1440. For help with this field, see Cloud Interconnect MTU.
- Click Next.
The page updates to show a form for the second attachment.
- Enter details about the redundant attachment:
- Enter a Name.
- Optional: Enter a Description.
- Select a Cloud Router that's in the same region as the router that you used for the first attachment. You can use the same Cloud Router.
- If you want to manually select a range for the IP address, expand the Advanced options form. Set Allocate BGP IP address to manually and enter a range.
- Click Next, and continue to the next section, Create BGP sessions.
gcloud
Use the
gcloud compute interconnects attachments dedicated create
command.
Azure requires the IPv4 subnet mask value
to be 30
. For this reason, you can't use the --subnet-length
flag to
specify a different value, as you normally can with the
gcloud compute interconnects attachments dedicated create
command.
Complete the following steps:
Create the primary attachment:
gcloud compute interconnects attachments dedicated create VLAN_ATTACHMENT_NAME \ --interconnect CONNECTION \ --router ROUTER \ --region REGION \ --bandwidth BANDWIDTH \ --vlan ID \ --mtu MTU
Replace the following:
VLAN_ATTACHMENT_NAME
: the name for this VLAN attachmentCONNECTION
: the name of your primary Cross-Cloud Interconnect connectionROUTER
: the Cloud Router that you want to use for the attachment; unless you are using global dynamic routing mode, the router must be located in a supported Google Cloud locationREGION
: the region where the Cloud Router is locatedBANDWIDTH
: the bandwidth for this VLAN attachment in Mbps or Gbps—for example, for 50 Mbps, enter50m
, or for 10 Gbps, enter10g
ID
: a number between2
and4094
that's unique among the VLAN attachments associated with this connectionMTU
: the MTU to useIf you don't set a value, the default of
1440
is used. For help with setting this field, see Cloud Interconnect MTU.
-
Create the redundant attachment:
gcloud compute interconnects attachments dedicated create VLAN_ATTACHMENT_NAME_2 \ --interconnect CONNECTION_2 \ --router ROUTER_2 \ --region REGION\ --bandwidth BANDWIDTH \ --vlan ID \ --mtu MTU
Replace the following:
VLAN_ATTACHMENT_NAME_2
: the name that you want to give to this VLAN attachmentCONNECTION_2
: the name of your redundant Cross-Cloud Interconnect connectionROUTER_2
: the Cloud Router that you want to use for the redundant attachmentIt must be located in the same region as the Cloud Router that you used for the primary attachment. You can also use the same Cloud Router that you used for the primary attachment.
REGION
: the region where the Cloud Router is located
The following fields use the same values as the primary attachment:
BANDWIDTH
ID
MTU
Configure BGP sessions
Cross-Cloud Interconnect uses BGP to exchange routes between your VPC network and your Azure network. To that end, configure a BGP session for each of your VLAN attachments. The sessions are not active until you configure your Azure resources, but you can configure the Google Cloud side of the sessions now.
Console
- Configure the first session.
- Do one of the following:
- If the Configure Cloud Routers form is displayed, locate the name of your primary VLAN attachment and click Configure.
- If the form isn't open, go to the Cloud Interconnect VLAN attachments tab. Click the name of the attachment. In the Connection area of the form, click Configure BGP session.
- Fill out the Create BGP session form:
- Enter a Name for the session.
- In the Peer ASN field, enter a value to represent the
Azure side of the peering. For Peer ASN, enter
12076
, which is the value required by Azure. - Optional: Enter a value for Advertised route priority. For information about this field, see Advertised prefixes and priorities.
- Optional: Set MD5 Authentication to Enabled, and enter your secret MD5 authentication key. Later, when you configure peering in Azure, you must use the same key. For more information about MD5 authentication, see Use MD5 authentication. You can also choose to enable MD5 later.
- Click Save and continue.
- Do one of the following:
- Configure the second session.
- Do one of the following:
- If you are in the Configure Cloud Routers form, locate the name of your redundant VLAN attachment and click Configure.
- If the form isn't open, go to the Cloud Interconnect VLAN attachments tab. Click the name of the redundant attachment, and then click Configure.
- In the Create BGP session form, enter the following values:
- Enter a Name for the session.
- Enter the same Peer ASN that you used for the BGP session on the primary attachment.
- Optional: Enter a value for Advertised route priority. For information about this field, see Advertised prefixes and priorities.
- Optional: Set MD5 Authentication to Enabled, and enter your secret MD5 authentication key. Later, when you configure peering in Azure, you must use the same key.
- Click Save and continue.
- Do one of the following:
- Click Save configuration.
- Click Finish setup.
gcloud
To create the required BGP sessions, you must create two interfaces on the Cloud Router used by your VLAN attachments. (Alternatively, if each of your attachments uses a different Cloud Router, configure an interface on each Cloud Router.) After you create your interfaces, create a peering session for each interface.
To complete this setup, you use the
gcloud compute routers add-interface
command
and the
gcloud compute routers add-bgp-peer
command.
Complete the following steps:
- Create the primary interface:
gcloud compute routers add-interface ROUTER_NAME \ --interface-name=INTERFACE \ --interconnect-attachment=ATTACHMENT \ --region=REGION
Replace the following:
ROUTER_NAME
: the name of the Cloud Router used by your primary VLAN attachmentINTERFACE
: the name of the new interfaceATTACHMENT
: the name of your primary VLAN attachmentREGION
: the region where the Cloud Router is located
- Create the redundant interface:
gcloud compute routers add-interface ROUTER_NAME_2 \ --interface-name=INTERFACE_2 \ --interconnect-attachment=ATTACHMENT_2 \ --region=REGION
Replace the following:
ROUTER_NAME_2
: the name of the Cloud Router used by your redundant VLAN attachmentINTERFACE_2
: the name of the redundant interfaceATTACHMENT_2
: the name of your redundant VLAN attachmentREGION
: the region where the Cloud Router is located
- Create a BGP session for the primary VLAN attachment:
gcloud compute routers add-bgp-peer ROUTER_NAME \ --interface=INTERFACE \ --peer-asn=12076 \ --peer-name=PEER_NAME \ --region=REGION \ --md5-authentication-key=YOUR_KEY
Replace the following:
ROUTER_NAME
: the name of the Cloud Router used by your primary VLAN attachmentINTERFACE
: the name of the primary interfacePEER_NAME
the name of the peerREGION
: the region where the Cloud Router is locatedYOUR_KEY
: the secret key to use for MD5 authentication (an optional feature); later, when you configure peering in Azure, you must use the same key
- Create a BGP session for the redundant VLAN attachment:
gcloud compute routers add-bgp-peer ROUTER_NAME_2 \ --interface=INTERFACE_2 \ --peer-asn=12076 \ --peer-name=PEER_NAME_2 \ --region=REGION \ --md5-authentication-key=YOUR_KEY_2
Replace the following:
ROUTER_NAME_2
: the name of the Cloud Router used by your primary VLAN attachmentINTERFACE_2
: the name of the primary interfacePEER_NAME_2
:the name of the peerREGION
: the region where the Cloud Router is locatedYOUR_KEY_2
: the secret key to use for MD5 authentication (an optional feature); later, when you configure peering in Azure, you must use the same key
Get details about your VLAN attachments
After you create your VLAN attachments, retrieve the details that you need to configure your Azure resources.
Console
- In the Google Cloud console, go to the Cloud Interconnect VLAN attachments tab.
- Click the name of your primary VLAN attachment.
- Make a note of the BGP Peer IP value. You need this information when you configure your ExpressRoute resources.
- Repeat the preceding steps for your redundant attachment.
gcloud
Use the
gcloud compute interconnects attachments describe
command.
Run the following command twice—once for each attachment:
gcloud compute interconnects attachments describe NAME --region REGION
Replace the following:
NAME
: the name of the VLAN attachmentREGION
: the region where the VLAN attachment is located
The command returns output that includes customerRouterIpAddress
. Make a note of
this value. You need it when you configure your Azure resources.