A RetroSearch Logo

Home - News ( United States | United Kingdom | Italy | Germany ) - Football scores

Search Query:

Showing content from https://cloud.google.com/vpc/docs/multiple-interfaces-concepts below:

Multiple network interfaces | VPC

Stay organized with collections Save and categorize content based on your preferences.

Multiple network interfaces

This page provides an overview of multiple network interfaces for Compute Engine VM instances. Instances with multiple network interfaces are referred to as multi-NIC instances.

An instance always has at least one virtual network interface (vNIC). Depending on the machine type, you can configure additional network interfaces.

Use cases

Multi-NIC instances are useful in the following scenarios:

You can also use multi-NIC instances with Private Service Connect interfaces to connect service producer and consumer networks in different projects.

Network interface types

Google Cloud supports the following types of network interfaces:

You can also configure multi-NIC instances using machine types that include RDMA network interfaces (MRDMA), which must be attached to a VPC network with an RDMA network profile. Other network interface types, including Dynamic NICs, aren't supported in VPC networks with an RDMA network profile.

Specifications

The following specifications apply to instances with multiple network interfaces:

Dynamic NICs

Dynamic NICs are useful in the following scenarios:

Properties of Dynamic NICs

See the following information about the properties of Dynamic NICs:

Limitations of Dynamic NICs

See the following limitations of Dynamic NICs:

Stack types and IP addresses

When you create a vNIC, you specify one of the following interface stack types:

The following table describes supported subnet stack types and IP address details for each interface stack type:

Changing network interface stack type

You can change the stack type of a network interface as follows:

You can't change the stack type of an IPv6-only interface. IPv6-only interfaces (Preview) are only supported when creating instances.

IPv4 address details

Each IPv4-only or dual-stack network interface receives a primary internal IPv4 address. Each interface optionally supports alias IP ranges and an external IPv4 address. The following are the IPv4 specifications and requirements:

IPv6 address details

Compute Engine assigns each dual-stack or IPv6-only network interface (Preview) a /96 IPv6 address range from the /64 IPv6 address range of the interface's subnet:

If you are connecting an instance to multiple networks by using IPv6 addresses, install google-guest-agent version 20220603.00 or later. For more information, see I can't connect to a secondary interface's IPv6 address.

Maximum number of network interfaces

For most machine types, the maximum number of network interfaces that you can attach to an instance scales with the number of vCPUs as described in the following tables.

The following are machine-specific exceptions:

Max interface numbers

Use the following table to determine how many network interfaces can be attached to an instance.

Number of vCPU Maximum number of vNICs Maximum number of Dynamic NICs Maximum number of network interfaces
(vNICs + Dynamic NICs) 2 or fewer 2 1 2 4 4 3 4 6 6 5 6 8 8 7 8 10 10 9 10 12 10 10 11 14 10 11 12 16 10 12 13 18 10 13 14 20 10 14 15 22 or more 10 15 16 Reference formulas

The following table provides the formulas used to calculate the maximum number of network interfaces for an instance. The formula depends on the number of vCPU.

Number of vCPU (X) Maximum number of vNICs Maximum number of Dynamic NICs Maximum number of network interfaces
(vNICs + Dynamic NICs) X=1 2 1 2 2 ≤ X ≤ 10 X (X-1) X X ≥ 12 10 min(15, (X-10)/2 + 9) min(16, (X-10)/2 + 10) Example distributions of Dynamic NICs

You don't have to distribute Dynamic NICs evenly across vNICs. However, you might want an even distribution because Dynamic NICs share the bandwidth of their parent vNIC.

An instance must have at least one vNIC. For example, an instance that has 2 vCPUs can have one of the following configurations:

The following tables provide example configurations that evenly distribute Dynamic NICs across vNICs while using the maximum number of network interfaces for a given number of vCPU.

2 vCPUs, 2 NICs

The following table provides examples for an instance with 2 vCPUs that show how many Dynamic NICs you can have for a given number of vNICs.

Number of vCPU Number of vNICs Number of Dynamic NICs per vNIC Total number of network interfaces (vNICs + Dynamic NICs) 2 1 1 2 2 0 4 vCPUs, 4 NICs

The following table provides examples for an instance with 4 vCPUs that show how many Dynamic NICs you can have for a given number of vNICs.

Number of vCPU Number of vNICs Number Dynamic NICs per vNIC Total number of network interfaces (vNICs + Dynamic NICs) 4 1 3 4 2 1 4 0 8 vCPUs, 8 NICs

The following table provides examples for an instance with 8 vCPUs that show how many Dynamic NICs you can have for a given number of vNICs.

Number of vCPU Number of vNICs Number of Dynamic NICs per vNIC Total number of network interfaces (vNICs + Dynamic NICs) 8 1 7 8 2 3 4 1 8 0 14 vCPUs, 12 NICs

The following table provides examples for an instance with 12 vCPUs that show how many Dynamic NICs you can have for a given number of vNICs.

Number of vCPU Number of vNICs Number of Dynamic NICs per vNIC Total number of network interfaces (vNICs + Dynamic NICs) 14 1 11 12 2 5 4 2 6 1 22 vCPUs, 16 NICs

The following table provides examples for an instance with 22 vCPUs that show how many Dynamic NICs you can have for a given number of vNICs.

Number of vCPU Number of vNICs Number of Dynamic NICs per vNIC Total number of network interfaces (vNICs + Dynamic NICs) 22 1 15 16 2 7 4 3 8 1 Product interactions

This section describes interactions between multi-NIC instances and other products and features in Google Cloud.

Except for Private Service Connect interfaces, the subnet and project relationship of a multi-NIC instance in a Shared VPC host or service project is as follows:

For more information about Shared VPC, see:

Compute Engine internal DNS

Compute Engine creates internal DNS name A and PTR records only for the primary internal IPv4 address of the nic0 network interface of an instance. Compute Engine doesn't create internal DNS records for any IPv4 or IPv6 address associated with a network interface different from nic0.

For more information, see Compute Engine internal DNS.

Static routes

Static routes can be scoped to specific instances by using network tags. When a network tag is associated with an instance, the tag applies to all network interfaces of the instance. Consequently, adding a network tag to or removing a network tag from an instance might change which static routes apply to any of the instance's network interfaces.

Load balancers

Instance group backends and zonal NEG backends each have an associated VPC network as follows:

The following table shows which backends support distributing connections or requests to any network interface.

Load balancer Instance groups GCE_VM_IP NEGs GCE_VM_IP_PORT NEGs Backend service-based External passthrough Network Load Balancer
The backend service isn't associated with a VPC network. For more information, see Backend services and VPC networks. nic0 only Any NIC N/A Internal passthrough Network Load Balancer
The backend service is associated with a VPC network. For more information, see Backend service network specification and Backend service network rules. Any NIC Any NIC N/A External proxy Network Load Balancer
For more information about backend service and network requirements, see Backends and VPC networks. nic0 only N/A Any NIC Internal proxy Network Load Balancer
For more information about backend service and network requirements, see Backends and VPC networks. nic0 only N/A Any NIC External Application Load Balancer
For more information about backend service and network requirements, see Backends and VPC networks. nic0 only N/A Any NIC Internal Application Load Balancer
For more information about backend service and network requirements, see Backends and VPC networks. nic0 only N/A Any NIC

Target pool-based External passthrough Network Load Balancers don't use instance groups or NEGs and only support load balancing to nic0 network interfaces.

Firewall rules

The set of firewall rules—from hierarchical firewall policies, global network firewall policies, regional network firewall policies, and VPC firewall rules—are unique to each network interface. Ensure that each network has appropriate firewall rules to allow the traffic that you want to allow to and from a multi-NIC instance. To determine which firewall rules apply to a network interface, and the source for each rule, see Get effective firewall rules for a VM interface.

Firewall rules can be scoped to specific VM instances by using network tags or secure tags, both of which apply to all network interfaces of an instance. For more information, see Comparison of secure tags and network tags.

Known issues

This section describes known issues related to using multiple network interfaces in Google Cloud.

Firewall interactions when reusing a VLAN ID with Dynamic NICs

For third generation VMs, deleting and adding a Dynamic NIC that has the same VLAN ID might allow unauthorized access across different VPC networks.

Consider the following scenario that includes two networks (network-1 and network-2) and a VLAN ID A:

  1. You delete a Dynamic NIC with VLAN ID A from network-1.
  2. Within the 10-minute Cloud NGFW connection tracking period, you create a new Dynamic NIC with the same VLAN ID A in network-2.
  3. Traffic originating from the new Dynamic NIC in network-2 might match an existing connection tracking entry that was previously created by the deleted Dynamic NIC in network-1.

If this happens, the traffic sent from or received by the new Dynamic NIC in network-2 might be allowed if it matches an entry in the Cloud NGFW connection tracking table, where the entry was created for a connection used by the deleted Dynamic NIC in network-1. To avoid this issue, see the following workaround.

Workaround:

To avoid this issue, do one of the following:

For more information about connection tracking and firewalls rules, see Specifications in the Cloud Next Generation Firewall documentation.

What's next

RetroSearch is an open source project built by @garambo | Open a GitHub Issue

Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo

HTML: 3.2 | Encoding: UTF-8 | Version: 0.7.4