Create a Virtual Private Cloud Network

Create a Virtual Private Network (VPC) in GCP so that you can later create a virtual machine for cloud environment.

GCP documentation can be found at Virtual Private Cloud Documentation and Using VPC Networks .

  1. Login to the GCP console.
  2. Click the navigation menu () located in the upper left-hand corner of the web page.
  3. Click VPC network > VPC networks.
  4. Click CREATE VPC NETWORK.
  5. Enter the following to create a VPC:
    1. For Name, enter a name for the VPC.
      The name can be anything meaningful to your organization, e.g., bursting-vpc.
    2. In the Subnets section, click the Custom tab under Subnet creation mode.
    3. For Name, enter a name for the subnet.
      The name can be anything meaningful to your organization, e.g., bursting-subnet.
    4. For Region, select a Region based on the geographical location of users.
    5. For IP address range, enter an IP address range using CIDR notation
    6. For Private Google access, select Off.
    7. Click Done.
    8. For Dynamic routing mode, enable Regional.
  6. Click Create.
    Creating the VPC network may take some time. Do not proceed until the VPC is created.
  7. Select the VPC by clicking on its name.
  8. Click the Firewall tab.
  9. Click CREATE FIREWALL RULE.
  10. Enter the following to create a firewall rule:
    1. For Name, enter a name for the firewall rule.
      The name can be anything meaningful to your organization, e.g., ssh-all.
    2. Select the network.
    3. For Direction of Traffic, enable Ingress.
    4. For Action on match, enable Allow.
    5. For Targets, select All instances in the network.
    6. For Source filter, select IP ranges.
    7. For Source IP ranges, enter 0.0.0.0/0.
    8. For Protocols and ports, enable Specified protocols and ports.
    9. Enable tcp.
    10. Enter 22.
  11. Click Create.
    Warning: 0.0.0.0/0 enables all IPv4 addresses to access your instance. This is acceptable for a short time in a test environment, but it's unsafe for production environments. In production, authorize only a specific IP address or range of addresses to access your instance.