Build and Secure Networks in Google Cloud
Task 1: Check the firewall rules. Remove the overly permissive rules
gcloud compute firewall-rules delete open-accessTask 2: Navigate to Compute Engine in the Cloud Console and identify the bastion host. The instance should be stopped. Start the instance
Go to Compute Engine > VM Instances > Select bastion > click on StartTask 3: The bastion host is the one machine authorized to receive external SSH traffic. Create a firewall rule that allows SSH (tcp/22) from the IAP service. The firewall rule should be enabled on bastion via a network tag.
gcloud compute firewall-rules create ssh-ingress --allow=tcp:22 --source-ranges 35.235.240.0/20 --target-tags ssh-ingress --network acme-vpcgcloud compute instances add-tags bastion --tags=ssh-ingress --zone=us-central1-bTask 4: The juice-shop server serves HTTP traffic. Create a firewall rule that allows traffic on HTTP (tcp/80) to any address. The firewall rule should be enabled on juice-shop via a network tag
gcloud compute firewall-rules create http-ingress --allow=tcp:80 --source-ranges 0.0.0.0/0 --target-tags http-ingress --network acme-vpcgcloud compute instances add-tags juice-shop --tags=http-ingress --zone=us-central1-bTask 5: You need to connect to juice-shop from the bastion using SSH. Create a firewall rule that allows traffic on SSH (tcp/22) from acme-mgmt-subnet network address. The firewall rule should be enabled on juice-shop via a network tag
gcloud compute firewall-rules create internal-ssh-ingress --allow=tcp:22 --source-ranges 192.168.10.0/24 --target-tags internal-ssh-ingress --network acme-vpcgcloud compute instances add-tags juice-shop --tags=internal-ssh-ingress --zone=us-central1-bTask 6: In the Compute Engine instances page, click the SSH button for the bastion host. Once connected, SSH to juice-shop
ssh <internal IP of the juice-shop>PreviousBuild and Deploy a Docker Image to a Kubernetes ClusterNextSet Up and Configure a Cloud Environment in Google Cloud
Last updated