Cloud Interconnect 또는 Cloud VPN을 통해 연결된 온프레미스 IP 주소
Private Service Connect를 사용하면 내부 IP 주소를 사용하여 VPC 네트워크 내에 비공개 엔드포인트를 만들 수 있습니다. 비공개 네트워크 액세스는 기능을 확장하고Google Cloud 서비스가 VPC 네트워크에 직접 연결되도록 지원합니다.
비공개 네트워크 액세스는 다음과 같은 기능을 제공합니다.
모든 네트워크 경로에 적용되는 고객 네트워크, 보안, 액세스 정책을 통합된 방식으로 관리할 수 있습니다.
Google Cloud 제품이 인터넷이 아닌 Google의 비공개 네트워크를 통해 고객 비공개 네트워크의 하나 이상의 HTTP(S) 엔드포인트에 도달할 수 있도록 합니다. 또한 VPC 서비스 제어를 준수하는 옵션도 제공합니다. 이 통신은 HTTP 푸시와 같은 기능을 사용하는 동안 보안을 강화하고, 네트워크 보안 정책을 관리하고, 무단 반출을 방지하는 데 도움이 됩니다. Google Cloud
다음 다이어그램은 Dialogflow가 비공개 네트워크 액세스 없이 인터넷을 통해Google Cloud VM에 연결되는 방식을 보여줍니다. Dialogflow는 Google Cloud내에서 실행됩니다.
비공개 네트워크 액세스 없이 Dialogflow 연결 (확대하려면 클릭)
다음 다이어그램은 Dialogflow가 비공개 네트워크 액세스 권한이 있는 비공개 네트워크를 통해Google Cloud VM에 연결되는 방식을 보여줍니다.
[[["이해하기 쉬움","easyToUnderstand","thumb-up"],["문제가 해결됨","solvedMyProblem","thumb-up"],["기타","otherUp","thumb-up"]],[["이해하기 어려움","hardToUnderstand","thumb-down"],["잘못된 정보 또는 샘플 코드","incorrectInformationOrSampleCode","thumb-down"],["필요한 정보/샘플이 없음","missingTheInformationSamplesINeed","thumb-down"],["번역 문제","translationIssue","thumb-down"],["기타","otherDown","thumb-down"]],["최종 업데이트: 2025-09-04(UTC)"],[],[],null,["# Private network access overview\n\nPrivate network access enables supported Google Cloud products to send HTTP requests\nto a customer Virtual Private Cloud (VPC) network resource. The requests are sent\nover the private network while enforcing\n[Identity and Access Management (IAM)](/iam/docs/overview) and\n[VPC Service Controls](/vpc-service-controls/docs/overview).\n\nThe network resources supported as destinations are:\n\n- Virtual machine (VM) instances\n- Internal passthrough Network Load Balancers\n- Regional internal Application Load Balancers\n- On-premises IP addresses, reached through Cloud Interconnect or Cloud VPN\n\nWith [Private Service Connect](/vpc/docs/private-service-connect), you\ncan create private endpoints within your VPC network by using\ninternal IP addresses. Private network access extends the capability and helps\nGoogle Cloud services connect directly to VPC networks.\n\nPrivate network access offers the following features:\n\n- Provides a unified way of managing customer network, security, and access policies applied to all network paths.\n- Enables Google Cloud products to reach one or more HTTP(S) endpoints in customer private networks through the private network of Google rather than the internet. It also provides a VPC Service Controls-compliant option. The communication helps in providing better security, managing network security policies, and protecting against exfiltration while using Google Cloud features such as [HTTP\n Push](https://wikipedia.org/wiki/HTTP/2_Server_Push).\n\nThe following diagram shows how Dialogflow connects to a\nGoogle Cloud VM through the internet without private network access. Note that\nDialogflow runs within Google Cloud.\n[](/static/service-directory/images/without_pna.svg) Dialogflow connectivity without private network access (click to enlarge)\n\nThe following diagram shows how Dialogflow connects to a\nGoogle Cloud VM through the private network with private network access.\n[](/static/service-directory/images/with_pna.svg) Dialogflow connectivity with private network access (click to enlarge)\n\nFor detailed information about VPC Service Controls, see the [VPC Service Controls\ndocumentation](/vpc-service-controls/docs).\n\nFor information about how to configure private network access, see [Configuring\nprivate network access](/service-directory/docs/configuring-private-network-access).\n\nFor information about how you can use Service Directory private network access with\nDialogflow, see [Using Service Directory for\nprivate network access](/dialogflow/cx/docs/concept/webhook#sd).\n\nQuotas and limits\n-----------------\n\nThe following quotas and limits apply for private network access:\n\n- [Service Directory limits](/service-directory/quotas#limits) apply when you use private network access.\n- Calls from Google Cloud services that use private network access don't count against your quotas.\n- [Service Directory pricing](/service-directory/pricing) applies for calls from Google Cloud services that use private network access. Because Service Directory charges are per API call against the Service Directory service, each private network access is charged as one API call.\n\nWhat's next\n-----------\n\n- To learn about Service Directory, see [Service Directory\n overview](/service-directory/docs/overview).\n- To learn how to configure private network access, see [Configure\n private network access](/service-directory/docs/configuring-private-network-access).\n- To find solutions for common problems that you might experience when using Service Directory, see [Troubleshooting](/service-directory/docs/troubleshooting)."]]