<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article Google Cloud NGFW Tutorial in General Articles</title>
    <link>https://live.paloaltonetworks.com/t5/general-articles/google-cloud-ngfw-tutorial/ta-p/560817</link>
    <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;P&gt;This tutorial shows how to deploy and prevent threats with&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://cloud.google.com/security/products/firewall?hl=en" target="_blank" rel="nofollow noopener"&gt;Google Cloud NGFW Enterprise&lt;/A&gt;, a native Google Cloud service powered by Palo Alto Networks&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/threat-prevention" target="_blank" rel="nofollow noopener"&gt;Threat Prevention&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;technologies.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;&lt;span class="lia-unicode-emoji" title=":information:"&gt;ℹ️&lt;/span&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;FONT color="#000000"&gt;Note&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#808080"&gt;&lt;SPAN&gt;For the most recent version of this guide, please see the &lt;A href="https://github.com/PaloAltoNetworks/google-cloud-firewall-plus-tutorial/tree/main" target="_blank" rel="noopener"&gt;Google Cloud NGFW Enterprise Tutorial&lt;/A&gt;&amp;nbsp;Github repository.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://cloud.google.com/firewall?hl=en" target="_blank" rel="nofollow noopener"&gt;Cloud NGFW Enterprise&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;is a fully distributed firewall service with advanced protection capabilities to protect your Google Cloud workloads from internal &amp;amp; external threats, including: intrusion, malware, spyware, and command-and-control. The service works by creating Google-managed zonal&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://cloud.google.com/firewall/docs/about-firewall-endpoints" target="_blank" rel="nofollow noopener"&gt;firewall endpoints&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;that use packet intercept technology to transparently intercept workload traffic for deep packet inspection.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Architecture" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/66430i04DCCA3C1EA1B6C7/image-size/large?v=v2&amp;amp;px=999" role="button" title="topology.png" alt="Architecture" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Architecture&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;&lt;SPAN&gt;Requirements&lt;/SPAN&gt;&lt;/H1&gt;
&lt;P&gt;The following outline the required tools and IAM roles to complete this tutorial.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="markdown-heading" dir="auto"&gt;
&lt;H4 class="heading-element" dir="auto" tabindex="-1"&gt;Tools&lt;/H4&gt;
&lt;A id="user-content-tools" class="anchor" href="https://github.com/PaloAltoNetworks/google-cloud-ngfw-tutorial/blob/main/README.md#tools" target="_blank" rel="noopener" aria-label="Permalink: Tools"&gt;&lt;/A&gt;&lt;/DIV&gt;
&lt;UL dir="auto"&gt;
&lt;LI&gt;Access to Google&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://cloud.google.com/shell/docs/how-cloud-shell-works" target="_blank" rel="nofollow noopener"&gt;Cloud Shell&lt;/A&gt;, or a local machine with a Terraform or gcloud installation.&lt;/LI&gt;
&lt;LI&gt;A Google Cloud&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://cloud.google.com/resource-manager/docs/creating-managing-projects" target="_blank" rel="nofollow noopener"&gt;project&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;to host the deployment.&lt;/LI&gt;
&lt;LI&gt;A Google Cloud&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://cloud.google.com/billing/docs/how-to/view-linked" target="_blank" rel="nofollow noopener"&gt;billing project&lt;/A&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;TABLE border="1" width="100%"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="33.333333333333336%"&gt;Ability&lt;/TD&gt;
&lt;TD width="33.333333333333336%"&gt;Level&lt;/TD&gt;
&lt;TD width="33.333333333333336%"&gt;Roles&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33.333333333333336%"&gt;&lt;SPAN&gt;Create/modify/view firewall endpoints, endpoint associations, security profiles, and security profile groups.&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD width="33.333333333333336%"&gt;Organization&lt;/TD&gt;
&lt;TD width="33.333333333333336%"&gt;
&lt;P&gt;&lt;CODE&gt;compute.networkAdmin&lt;/CODE&gt;&lt;BR /&gt;&lt;CODE&gt;compute.networkUser&lt;/CODE&gt;&lt;BR /&gt;&lt;CODE&gt;compute.networkViewer&lt;/CODE&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33.333333333333336%"&gt;Create/modify/view global network firewall policies and view effective rules for VPC networks and virtual machines.&lt;/TD&gt;
&lt;TD width="33.333333333333336%"&gt;Project&lt;/TD&gt;
&lt;TD width="33.333333333333336%"&gt;
&lt;P&gt;&lt;CODE&gt;compute.securityAdmin&lt;/CODE&gt;&lt;BR /&gt;&lt;CODE&gt;compute.networkAdmin&lt;/CODE&gt;&lt;BR /&gt;&lt;CODE&gt;compute.networkViewer&lt;/CODE&gt;&lt;BR /&gt;&lt;CODE&gt;compute.viewer&lt;/CODE&gt;&lt;BR /&gt;&lt;CODE&gt;compute.instanceAdmin&lt;/CODE&gt;&lt;/P&gt;
&lt;P&gt;compute.instanceAdmin&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For more information, please see:&lt;/P&gt;
&lt;UL dir="auto"&gt;
&lt;LI&gt;&lt;A href="https://cloud.google.com/firewall/docs/about-firewall-endpoints#iam-roles" target="_blank" rel="nofollow noopener"&gt;IAM Roles - Firewall Endpoints&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://cloud.google.com/firewall/docs/about-firewall-endpoints#endpoint-association" target="_blank" rel="nofollow noopener"&gt;IAM Roles - Firewall Endpoint Associations&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://cloud.google.com/firewall/docs/about-security-profiles#iam-roles" target="_blank" rel="nofollow noopener"&gt;IAM Roles - Security Profiles&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://cloud.google.com/firewall/docs/network-firewall-policies#iam" target="_blank" rel="nofollow noopener"&gt;IAM Roles - Global Network Firewall Policies&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H1&gt;Topology&lt;/H1&gt;
&lt;P&gt;In this tutorial, a VPC network contains two virtual machines,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;CODE&gt;client-vm&lt;/CODE&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;amp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;CODE&gt;web-vm&lt;/CODE&gt;. The&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;CODE&gt;client-vm&lt;/CODE&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;simulates threats for both north/south internet traffic and east/west traffic to a web application on the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;CODE&gt;web-vm&lt;/CODE&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;To prevent the malicious traffic, a Cloud NGFW endpoint is created and associated to the network, where network firewall policies define how the traffic should be inspected by Cloud NGFW.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Topology" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/66431i94B1F82EB9CE848A/image-size/large?v=v2&amp;amp;px=999" role="button" title="topology (1).png" alt="Topology" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Topology&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;Prepare for deployment&lt;/H1&gt;
&lt;P&gt;&lt;SPAN&gt;Enable the required APIs, retrieve the deployment files, and configure the environment variables.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;&lt;span class="lia-unicode-emoji" title=":information:"&gt;ℹ️&lt;/span&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;FONT color="#000000"&gt;Important&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#808080"&gt;&lt;SPAN&gt;This tutorial assumes you are using Cloud Shell to provision all resources.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;1.&lt;/STRONG&gt; Open &lt;STRONG&gt;&lt;A href="https://shell.cloud.google.com/" target="_blank" rel="noopener"&gt;Google Cloud Shell&lt;/A&gt;&lt;/STRONG&gt; and enable the required APIs.&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;gcloud services enable compute.googleapis.com
gcloud services enable networksecurity.googleapis.com
gcloud services enable firewallinsights.googleapis.com&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;2.&lt;/STRONG&gt; Set environment variables for your deployment project and billing project.&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt; export PROJECT_ID=YOUR_PROJECT_ID
 export BILLING_ID=YOUR_BILLING_PROJECT_ID
&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;3.&lt;/STRONG&gt; &lt;SPAN&gt;Set environment variables for your organization ID, deployment region, zone, and naming prefix&lt;/SPAN&gt;.&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;export ORG_ID=$(gcloud projects describe $PROJECT_ID --format=json | jq -r '.parent.id')
export REGION=us-central1
export ZONE=us-central1-a
export PREFIX=panw&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;Select Deployment Option&lt;/H1&gt;
&lt;P&gt;Select a deployment option. Both options deploy identical environments.&lt;/P&gt;
&lt;UL dir="auto"&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;A href="https://github.com/PaloAltoNetworks/google-cloud-ngfw-tutorial/blob/main/README.md#deploy-using-terraform" target="_blank" rel="noopener"&gt;Option 1. Deploy using Terraform&lt;/A&gt;&lt;/STRONG&gt;
&lt;UL dir="auto"&gt;
&lt;LI&gt;All of the cloud resources required for the tutorial are deployed using a single Terraform plan.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;A href="https://github.com/PaloAltoNetworks/google-cloud-ngfw-tutorial/blob/main/README.md#deploy-using-gcloud" target="_blank" rel="noopener"&gt;Option 2. Deploy using gcloud&lt;/A&gt;&lt;/STRONG&gt;
&lt;UL dir="auto"&gt;
&lt;LI&gt;Each cloud resource is deployed individually using&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;CODE&gt;gcloud&lt;/CODE&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;After deploying the resources, continue with the guide on the Github repository to complete the tutorial.&amp;nbsp; For any issues related to the tutorial, kindly submit a &lt;A href="https://github.com/PaloAltoNetworks/google-cloud-ngfw-tutorial/pulls" target="_self"&gt;pull request&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;H1&gt;More Information&lt;/H1&gt;
&lt;P&gt;Please see the materials below for more information about the topics discussed in this tutorial.&lt;/P&gt;
&lt;UL dir="auto"&gt;
&lt;LI&gt;&lt;A href="https://www.paloaltonetworks.com/blog/network-security/netsec-google-cloud-firewall-plus/" target="_blank" rel="nofollow noopener"&gt;Announcement Palo Alto Networks with Google Cloud Firewall&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://cloud.google.com/palo-alto-networks" target="_blank" rel="nofollow noopener"&gt;Palo Alto Networks with Google Cloud&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://cloud.google.com/firewall/docs/about-intrusion-prevention" target="_blank" rel="nofollow noopener"&gt;Cloud NGFW Enterprise Overview&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://cloud.google.com/firewall/docs/configure-intrusion-prevention" target="_blank" rel="nofollow noopener"&gt;Configure Intrusion Prevention Service&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/DIV&gt;</description>
    <pubDate>Mon, 16 Jun 2025 19:47:01 GMT</pubDate>
    <dc:creator>mmclimans</dc:creator>
    <dc:date>2025-06-16T19:47:01Z</dc:date>
    <item>
      <title>Google Cloud NGFW Tutorial</title>
      <link>https://live.paloaltonetworks.com/t5/general-articles/google-cloud-ngfw-tutorial/ta-p/560817</link>
      <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;P&gt;This tutorial shows how to deploy and prevent threats with&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://cloud.google.com/security/products/firewall?hl=en" target="_blank" rel="nofollow noopener"&gt;Google Cloud NGFW Enterprise&lt;/A&gt;, a native Google Cloud service powered by Palo Alto Networks&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/threat-prevention" target="_blank" rel="nofollow noopener"&gt;Threat Prevention&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;technologies.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;&lt;span class="lia-unicode-emoji" title=":information:"&gt;ℹ️&lt;/span&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;FONT color="#000000"&gt;Note&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#808080"&gt;&lt;SPAN&gt;For the most recent version of this guide, please see the &lt;A href="https://github.com/PaloAltoNetworks/google-cloud-firewall-plus-tutorial/tree/main" target="_blank" rel="noopener"&gt;Google Cloud NGFW Enterprise Tutorial&lt;/A&gt;&amp;nbsp;Github repository.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://cloud.google.com/firewall?hl=en" target="_blank" rel="nofollow noopener"&gt;Cloud NGFW Enterprise&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;is a fully distributed firewall service with advanced protection capabilities to protect your Google Cloud workloads from internal &amp;amp; external threats, including: intrusion, malware, spyware, and command-and-control. The service works by creating Google-managed zonal&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://cloud.google.com/firewall/docs/about-firewall-endpoints" target="_blank" rel="nofollow noopener"&gt;firewall endpoints&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;that use packet intercept technology to transparently intercept workload traffic for deep packet inspection.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Architecture" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/66430i04DCCA3C1EA1B6C7/image-size/large?v=v2&amp;amp;px=999" role="button" title="topology.png" alt="Architecture" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Architecture&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;&lt;SPAN&gt;Requirements&lt;/SPAN&gt;&lt;/H1&gt;
&lt;P&gt;The following outline the required tools and IAM roles to complete this tutorial.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="markdown-heading" dir="auto"&gt;
&lt;H4 class="heading-element" dir="auto" tabindex="-1"&gt;Tools&lt;/H4&gt;
&lt;A id="user-content-tools" class="anchor" href="https://github.com/PaloAltoNetworks/google-cloud-ngfw-tutorial/blob/main/README.md#tools" target="_blank" rel="noopener" aria-label="Permalink: Tools"&gt;&lt;/A&gt;&lt;/DIV&gt;
&lt;UL dir="auto"&gt;
&lt;LI&gt;Access to Google&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://cloud.google.com/shell/docs/how-cloud-shell-works" target="_blank" rel="nofollow noopener"&gt;Cloud Shell&lt;/A&gt;, or a local machine with a Terraform or gcloud installation.&lt;/LI&gt;
&lt;LI&gt;A Google Cloud&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://cloud.google.com/resource-manager/docs/creating-managing-projects" target="_blank" rel="nofollow noopener"&gt;project&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;to host the deployment.&lt;/LI&gt;
&lt;LI&gt;A Google Cloud&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://cloud.google.com/billing/docs/how-to/view-linked" target="_blank" rel="nofollow noopener"&gt;billing project&lt;/A&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;TABLE border="1" width="100%"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="33.333333333333336%"&gt;Ability&lt;/TD&gt;
&lt;TD width="33.333333333333336%"&gt;Level&lt;/TD&gt;
&lt;TD width="33.333333333333336%"&gt;Roles&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33.333333333333336%"&gt;&lt;SPAN&gt;Create/modify/view firewall endpoints, endpoint associations, security profiles, and security profile groups.&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD width="33.333333333333336%"&gt;Organization&lt;/TD&gt;
&lt;TD width="33.333333333333336%"&gt;
&lt;P&gt;&lt;CODE&gt;compute.networkAdmin&lt;/CODE&gt;&lt;BR /&gt;&lt;CODE&gt;compute.networkUser&lt;/CODE&gt;&lt;BR /&gt;&lt;CODE&gt;compute.networkViewer&lt;/CODE&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33.333333333333336%"&gt;Create/modify/view global network firewall policies and view effective rules for VPC networks and virtual machines.&lt;/TD&gt;
&lt;TD width="33.333333333333336%"&gt;Project&lt;/TD&gt;
&lt;TD width="33.333333333333336%"&gt;
&lt;P&gt;&lt;CODE&gt;compute.securityAdmin&lt;/CODE&gt;&lt;BR /&gt;&lt;CODE&gt;compute.networkAdmin&lt;/CODE&gt;&lt;BR /&gt;&lt;CODE&gt;compute.networkViewer&lt;/CODE&gt;&lt;BR /&gt;&lt;CODE&gt;compute.viewer&lt;/CODE&gt;&lt;BR /&gt;&lt;CODE&gt;compute.instanceAdmin&lt;/CODE&gt;&lt;/P&gt;
&lt;P&gt;compute.instanceAdmin&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For more information, please see:&lt;/P&gt;
&lt;UL dir="auto"&gt;
&lt;LI&gt;&lt;A href="https://cloud.google.com/firewall/docs/about-firewall-endpoints#iam-roles" target="_blank" rel="nofollow noopener"&gt;IAM Roles - Firewall Endpoints&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://cloud.google.com/firewall/docs/about-firewall-endpoints#endpoint-association" target="_blank" rel="nofollow noopener"&gt;IAM Roles - Firewall Endpoint Associations&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://cloud.google.com/firewall/docs/about-security-profiles#iam-roles" target="_blank" rel="nofollow noopener"&gt;IAM Roles - Security Profiles&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://cloud.google.com/firewall/docs/network-firewall-policies#iam" target="_blank" rel="nofollow noopener"&gt;IAM Roles - Global Network Firewall Policies&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H1&gt;Topology&lt;/H1&gt;
&lt;P&gt;In this tutorial, a VPC network contains two virtual machines,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;CODE&gt;client-vm&lt;/CODE&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;amp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;CODE&gt;web-vm&lt;/CODE&gt;. The&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;CODE&gt;client-vm&lt;/CODE&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;simulates threats for both north/south internet traffic and east/west traffic to a web application on the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;CODE&gt;web-vm&lt;/CODE&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;To prevent the malicious traffic, a Cloud NGFW endpoint is created and associated to the network, where network firewall policies define how the traffic should be inspected by Cloud NGFW.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Topology" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/66431i94B1F82EB9CE848A/image-size/large?v=v2&amp;amp;px=999" role="button" title="topology (1).png" alt="Topology" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Topology&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;Prepare for deployment&lt;/H1&gt;
&lt;P&gt;&lt;SPAN&gt;Enable the required APIs, retrieve the deployment files, and configure the environment variables.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;&lt;span class="lia-unicode-emoji" title=":information:"&gt;ℹ️&lt;/span&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;FONT color="#000000"&gt;Important&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#808080"&gt;&lt;SPAN&gt;This tutorial assumes you are using Cloud Shell to provision all resources.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;1.&lt;/STRONG&gt; Open &lt;STRONG&gt;&lt;A href="https://shell.cloud.google.com/" target="_blank" rel="noopener"&gt;Google Cloud Shell&lt;/A&gt;&lt;/STRONG&gt; and enable the required APIs.&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;gcloud services enable compute.googleapis.com
gcloud services enable networksecurity.googleapis.com
gcloud services enable firewallinsights.googleapis.com&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;2.&lt;/STRONG&gt; Set environment variables for your deployment project and billing project.&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt; export PROJECT_ID=YOUR_PROJECT_ID
 export BILLING_ID=YOUR_BILLING_PROJECT_ID
&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;3.&lt;/STRONG&gt; &lt;SPAN&gt;Set environment variables for your organization ID, deployment region, zone, and naming prefix&lt;/SPAN&gt;.&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;export ORG_ID=$(gcloud projects describe $PROJECT_ID --format=json | jq -r '.parent.id')
export REGION=us-central1
export ZONE=us-central1-a
export PREFIX=panw&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;Select Deployment Option&lt;/H1&gt;
&lt;P&gt;Select a deployment option. Both options deploy identical environments.&lt;/P&gt;
&lt;UL dir="auto"&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;A href="https://github.com/PaloAltoNetworks/google-cloud-ngfw-tutorial/blob/main/README.md#deploy-using-terraform" target="_blank" rel="noopener"&gt;Option 1. Deploy using Terraform&lt;/A&gt;&lt;/STRONG&gt;
&lt;UL dir="auto"&gt;
&lt;LI&gt;All of the cloud resources required for the tutorial are deployed using a single Terraform plan.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;A href="https://github.com/PaloAltoNetworks/google-cloud-ngfw-tutorial/blob/main/README.md#deploy-using-gcloud" target="_blank" rel="noopener"&gt;Option 2. Deploy using gcloud&lt;/A&gt;&lt;/STRONG&gt;
&lt;UL dir="auto"&gt;
&lt;LI&gt;Each cloud resource is deployed individually using&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;CODE&gt;gcloud&lt;/CODE&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;After deploying the resources, continue with the guide on the Github repository to complete the tutorial.&amp;nbsp; For any issues related to the tutorial, kindly submit a &lt;A href="https://github.com/PaloAltoNetworks/google-cloud-ngfw-tutorial/pulls" target="_self"&gt;pull request&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;H1&gt;More Information&lt;/H1&gt;
&lt;P&gt;Please see the materials below for more information about the topics discussed in this tutorial.&lt;/P&gt;
&lt;UL dir="auto"&gt;
&lt;LI&gt;&lt;A href="https://www.paloaltonetworks.com/blog/network-security/netsec-google-cloud-firewall-plus/" target="_blank" rel="nofollow noopener"&gt;Announcement Palo Alto Networks with Google Cloud Firewall&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://cloud.google.com/palo-alto-networks" target="_blank" rel="nofollow noopener"&gt;Palo Alto Networks with Google Cloud&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://cloud.google.com/firewall/docs/about-intrusion-prevention" target="_blank" rel="nofollow noopener"&gt;Cloud NGFW Enterprise Overview&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://cloud.google.com/firewall/docs/configure-intrusion-prevention" target="_blank" rel="nofollow noopener"&gt;Configure Intrusion Prevention Service&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/DIV&gt;</description>
      <pubDate>Mon, 16 Jun 2025 19:47:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-articles/google-cloud-ngfw-tutorial/ta-p/560817</guid>
      <dc:creator>mmclimans</dc:creator>
      <dc:date>2025-06-16T19:47:01Z</dc:date>
    </item>
  </channel>
</rss>

