Professional Cloud Network Engineer Exam Guide English
Professional Cloud Network Engineer Exam Guide English
Section 1: Designing and planning a Google Cloud network (~26% of the exam)
● Choosing the VPC type and quantity (e.g., standalone or Shared VPC, number of VPC
environments).
1
● Determining how the networks connect based on requirements (e.g., VPC Network
Peering, VPC Network Peering with Network Connectivity Center, Private Service
Connect).
● Planning the IP address management strategy (e.g., subnets, IPv6, bring your own IP
(public advertised prefix (PAP) and public delegated prefix (PDP)), Private NAT, non-RFC
1918, managed services).
● Planning a global or regional network environment.
● Planning the firewall strategy (e.g., VPC firewall rules, Cloud Next Generation Firewall,
hierarchical firewall rules).
● Planning custom routes (static or policy-based) for third-party device insertion (e.g.,
network virtual appliance).
1.3 Designing a resilient and performant hybrid and multi-cloud network. Considerations
include:
1.4 Designing an IP addressing plan for Google Kubernetes Engine (GKE). Considerations
include:
2
Section 2: Implementing Virtual Private Cloud (VPC) networks (~22% of the exam)
● Creating Google Cloud VPC resources (e.g., networks, subnets, firewall rules or policy,
private services access subnet).
● Configuring VPC Network Peering.
● Creating a Shared VPC network and sharing subnets with other projects.
● Configuring API access to Google services (e.g., Private Google Access, public
interfaces).
● Expanding VPC subnet ranges after creation.
● Managing VPC topology (e.g., star topology, hub and spokes, mesh topology).
● Implementing Private NAT.
2.4 Configuring and maintaining Google Kubernetes Engine clusters. Considerations include:
3
2.5 Configuring and managing Cloud Next Generation Firewall (NGFW) rules. Considerations
include:
4
● Configuring advanced network DDoS protection.
● Configuring edge and network edge security policies.
● Configuring Adaptive Protection.
● Configuring rate limiting.
● Configuring bot management.
● Applying Google Threat Intelligence.
● Setting up Cloud CDN for supported origins (e.g., managed instance groups, Cloud
Storage buckets, Cloud Run).
● Setting up Cloud CDN for external backends (internet NEGs) and third-party object
storage.
● Invalidating cached content.
● Configuring signed URLs.
● Routing and inspecting inter-VPC traffic using multi-NIC VMs (e.g., next-generation
firewall appliances).
5
● Configuring an internal load balancer as a next hop for highly available multi-NIC VM
routing.
● Enabling Layer 7 packet inspection in Cloud NGFW.
● Configuring HA VPN.
● Configuring Classic VPN (e.g., route-based, policy-based).
● Implementing Border Gateway Protocol (BGP) attributes (e.g., ASN, route priority/MED,
link-local addresses, authentication).
● Configuring Bidirectional Forwarding Detection (BFD).
● Creating custom advertised routes and custom learned routes.
5.1 Logging and monitoring with Google Cloud Observability. Considerations include:
6
● Enabling and reviewing logs for networking components (e.g., Cloud VPN, Cloud Router,
VPC Service Controls, Cloud NGFW, Firewall Insights, VPC Flow Logs, Cloud DNS, Cloud
NAT).
● Monitoring metrics of networking components (e.g., Cloud VPN, Cloud Interconnect
and VLAN attachments, Cloud Router, load balancers, Google Cloud Armor, Cloud NAT).
5.3 Using Network Intelligence Center to monitor and troubleshoot common networking
issues. Considerations include: