Google Cloud load balancers typically require one or more firewall rules to ensure that traffic from clients reaches the backends.
Most load balancers are required to specify a health check for backend instances. For the health check probes to reach your backends, you must create an ingress allow firewall rule that allows health check probes to reach your backend instances.
Load balancers based on Google Front Ends (GFEs) require an ingress allow firewall rule that permits traffic from the GFE proxy to reach the backend instances. In most cases, GFE proxies use the same source IP ranges as the health check probes and therefore don't require a separate firewall rule. Exceptions are noted in the following table.
Load balancers based on the open source Envoy proxy require an ingress allow firewall rule that permits traffic from the proxy-only subnet to reach the backend instances. These load balancers terminate incoming connections and traffic from the load balancer to the backends is then sent from IP addresses in the proxy-only subnet.
The following table summarizes the minimum required firewall rules for each type of load balancer.
Load balancer type | Minimum required ingress allow firewall rules | Overview | Example |
---|---|---|---|
Global external Application Load Balancer |
|
Overview | Example |
Classic Application Load Balancer |
|
Overview | Example |
Regional external Application Load Balancer |
|
Overview | Example |
Cross-region internal Application Load Balancer |
|
Overview | Example |
Regional internal Application Load Balancer |
|
Overview | Example |
Global external proxy Network Load Balancer |
|
Overview | Example |
Classic proxy Network Load Balancer |
|
Overview | Example |
Regional external proxy Network Load Balancer |
|
Overview | Example |
Regional internal proxy Network Load Balancer |
|
Overview | Example |
Cross-region internal proxy Network Load Balancer |
|
Overview | Example |
External passthrough Network Load Balancer |
|
Overview |
Examples |
Internal passthrough Network Load Balancer |
|
Overview | single-stack dual-stack |
1 Allowlisting Google's health check probe ranges isn't required for hybrid NEGs. However, if you're using a combination of hybrid and zonal NEGs in a single backend service, you need to allowlist the Google health check probe ranges for the zonal NEGs.
2 For regional internet NEGs, health checks are optional. Traffic from load balancers using regional internet NEGs originates from the proxy-only subnet and is then NAT-translated (by using Cloud NAT) to either manual or auto-allocated NAT IP addresses. This traffic includes both health check probes and user requests from the load balancer to the backends. For details, see Regional NEGs: Use Cloud NAT to egress.