Set up consumer services

This page provides details about the steps that you as a service consumer must take to send traffic to a producer's packet inspection services.

Before you begin

  1. Sign in to your Google Cloud account. If you're new to Google Cloud, create an account to evaluate how our products perform in real-world scenarios. New customers also get $300 in free credits to run, test, and deploy workloads.
  2. In the Google Cloud console, on the project selector page, select or create a Google Cloud project.

    Roles required to select or create a project

    • Select a project: Selecting a project doesn't require a specific IAM role—you can select any project that you've been granted a role on.
    • Create a project: To create a project, you need the Project Creator role (roles/resourcemanager.projectCreator), which contains the resourcemanager.projects.create permission. Learn how to grant roles.

    Go to project selector

  3. Verify that billing is enabled for your Google Cloud project.

  4. In the Google Cloud console, on the project selector page, select or create a Google Cloud project.

    Roles required to select or create a project

    • Select a project: Selecting a project doesn't require a specific IAM role—you can select any project that you've been granted a role on.
    • Create a project: To create a project, you need the Project Creator role (roles/resourcemanager.projectCreator), which contains the resourcemanager.projects.create permission. Learn how to grant roles.

    Go to project selector

  5. Verify that billing is enabled for your Google Cloud project.

  6. Make sure that you have the following Identity and Access Management (IAM) roles on your project:
  7. Enable the Compute Engine and Network Security APIs.

    Roles required to enable APIs

    To enable APIs, you need the Service Usage Admin IAM role (roles/serviceusage.serviceUsageAdmin), which contains the serviceusage.services.enable permission. Learn how to grant roles.

    Enable the APIs

  8. Install the Google Cloud CLI. For more information, see gcloud CLI overview.

    Note: If you haven't run the Google Cloud CLI previously, initialize your gcloud CLI directory by running the gcloud init command.

  9. To connect to a producer, get the following details:
    • The name of the intercept deployment group.
    • The list of zones where the intercept deployment group is active.
    • The Intercept Deployment User role (roles/networksecurity.interceptDeploymentUser) on the producer's project.

Prepare your network

To enable one or more VPC networks to send traffic to a producer's packet inspection services, do the following:

  1. Identify VPC networks, and set the firewall policy enforcement order.

    Identify the VPC networks that want to use a producer's packet intercept offering. After the networks are identified, set the firewall policy and rule enforcement order of each network to BEFORE_CLASSIC_FIREWALL.

    The BEFORE_CLASSIC_FIREWALL enforcement order ensures that hierarchical and global firewall policy rules—which you will use to intercept traffic—are evaluated before VPC firewall rules. If you use the default AFTER_CLASSIC_FIREWALL order, VPC firewall rules take precedence and your traffic might get dropped before it can be intercepted for inspection.

  2. Create zonal managed or zonal unmanaged instance groups containing your VMs.

    We recommend using managed instance groups, if possible. If you choose managed instance groups, you must use zonal managed instance groups. For more information, see Create a MIG in a single zone.

Configure in-band resources

Create the following resources to use producer's packet inspection services:

  1. Create an intercept endpoint group and an intercept endpoint group association in a project. For more information, see Create and manage intercept endpoint groups.

    A consumer uses intercept endpoint group and intercept endpoint group association to select a producer's packet intercept offering to use in one or more consumer VPC networks.

    When configuring the intercept endpoint group and intercept endpoint group association, consider of the following:

    • Consumer VPC networks and their corresponding intercept endpoint group associations must be in the same project.
    • An intercept endpoint group referenced by an endpoint group association can be located in any project of the consumer's organization.
  2. Create a security profile and security profile group in the organization. For more information about how to create a custom intercept security profile, see Create a custom intercept security profile and Create and manage security profile groups.

    A security profile and a security profile group lets you use a producer's packet intercept offering in rules of a hierarchical firewall policy or global network firewall policy. Rules in a firewall policy reference the security profile group and use the apply_security_profile_group action to send packets to a producer's packet inspection service.

  3. Configure a firewall policy and add firewall rules to direct traffic for packet inspection. For more information, see Create and manage firewall rules.

    Rules that direct traffic to packet inspection must have all of the following characteristics:

    • The action of the firewall policy rule must be apply_security_profile_group.

    • The firewall policy rule must reference a security profile group containing the security profile you configured in the previous step.

      The security profile must reference the same intercept endpoint group that's associated with the VPC networks to which the rule needs to apply.

    • The firewall policy that contains the rule must be associated with the VPC networks to which the rule needs to apply. The method for creating this association depends on the type of policy:

      • If the rule is in a global network firewall policy, that policy must be associated with the VPC networks to which the rule needs to apply.

      • If the rule is in a hierarchical network firewall policy, the firewall policy must be associated with a folder or the organization that contains the VPC networks to which the rule needs to apply. Additionally, if the target of the rule is a network resource, the target must include the VPC networks to which the rule needs to apply.

      For more information about firewall rule parameters, see Firewall policy rules overview.

  4. Associate the firewall policy with the VPC networks that use producer's packet inspection.

    For more information, see Associate network firewall policy.

After you associate the firewall policy and configure the firewall rules, the network traffic is redirected to the producer's intercept deployment group.

What's next