This picture is in the https://cloud.google.com/architecture/blueprints/security-foundations/networking
I think first NAVs should do deep package inspection and other purposes, if no problem, after that, Cloud Load Balancing just can distrubute request.
As per the screenshot, the traffic is handled by the Load balancer and the NVAs to support hub and spoke connectivity.
Hello, @DarwinVinoth You still do not explain why not firstly NVAs. I think NVAs should do firstly so that it can filter spammer traffic and so on.
Hi @anlex_N,
Welcome to Google Cloud Community!
As stated on the document, you have the option on how to configure your network topology, so the sequence and interaction with Cloud Load Balancing depend on the specific configuration:
As for the Hub-and-spoke network topology, the diagram shows the Shared VPC hub project acts as the central hub, connected to spoke networks via VPC Network Peering.
Traffic entering the Google Cloud environment from the on-premises environment via Dedicated Interconnects, routed through Cloud Routers, and processed by NVAs, performing security functions. Each region in the hub has redundantly deployed NVAs behind internal Network Load Balancer instances, serving as gateways to control traffic between spokes. Cloud Load Balancing then distributes the validated traffic to Compute Engine instances in the spoke networks.
Was this helpful? If so, please accept this answer as “Solution”. If you need additional assistance, reply here within 2 business days and I’ll be happy to help.
Shared VPC network for each environment topology say:
I also think that Each environment (production, non-production, and development) has one Shared VPC network. should be replaced by Each environment (production, non-production, and development) has one Shared VPC network in its own environment, Do you think so?