Onboard an Google Cloud Platform VPC to Prisma Access
and secure access to it for mobile users and remote networks.
| Where Can I Use
This? | What Do I Need? |
You can secure resources in a Google Cloud
Platform (GCP) virtual private cloud (VPC) seamlessly using Prisma
Access by onboarding the VPC as a remote network connection. Prisma Access
establishes an industry-standard IPSec tunnel between Prisma Access
and the GCP virtual network to provide connectivity to resources
in GCP. After you onboard the virtual network, you can define security
and access controls by configuring security policies for the remote
network, which provides consistent policy management and control
for all of your Prisma Access remote networks.
Currently,
GCP does not support creating two VPN tunnels within the same Cloud
VPN gateway to the same Prisma Access instance; therefore, high
availability using primary and secondary tunnels is not available
with GCP. However, the GCP incorporates high availability by providing
a service level agreement (SLA) of 99.9% cloud VPN service availability.
If the GCP cloud VPN goes down, it restarts automatically. If an
entire virtual VPN device fails, the cloud VPN automatically instantiates
a new one with the same configuration. The new gateway and tunnel
connect automatically. For more information about High Availability
and Classic VPNs, see the Google Cloud document
Redundant and High-throughput
VPNs.
Use
the following workflow to secure a GCP VPC with Prisma Access.