Tetap teratur dengan koleksi
Simpan dan kategorikan konten berdasarkan preferensi Anda.
Last reviewed 2025-01-23 UTC
Pola terbatas didasarkan pada arsitektur yang mengekspos aplikasi dan layanan
tertentu secara terperinci, berdasarkan API atau endpoint tertentu yang ditampilkan
di antara berbagai lingkungan. Panduan ini mengategorikan
pola ini menjadi tiga kemungkinan opsi, yang masing-masing ditentukan oleh
model komunikasi tertentu:
Seperti yang disebutkan sebelumnya dalam panduan ini, pola arsitektur jaringan
yang dijelaskan di sini dapat disesuaikan dengan berbagai aplikasi dengan persyaratan yang beragam.
Untuk memenuhi kebutuhan spesifik dari berbagai aplikasi, arsitektur zona landing utama
Anda dapat menggabungkan satu pola atau kombinasi pola
secara bersamaan. Deployment spesifik arsitektur yang dipilih ditentukan oleh persyaratan komunikasi spesifik dari setiap pola berpagar.
Seri ini membahas setiap pola berpagar dan kemungkinan opsi desainnya.
Namun, satu opsi desain umum yang berlaku untuk semua pola berpagar adalah
Zero Trust Distributed Architecture
untuk aplikasi dalam container dengan arsitektur microservice. Opsi ini
didukung oleh
Cloud Service Mesh,
Apigee, dan
Adaptor Apigee untuk Envoy—penempatan gateway Apigee yang ringan dalam cluster Kubernetes.
Adaptor Apigee untuk Envoy adalah proxy layanan dan edge open source populer yang
dirancang untuk aplikasi yang berfokus pada cloud. Arsitektur ini mengontrol komunikasi antarlayanan
yang aman dan arah komunikasi di
tingkat layanan. Kebijakan komunikasi traffic dapat dirancang, disesuaikan, dan
diterapkan di tingkat layanan berdasarkan pola yang dipilih.
Pola yang dibatasi memungkinkan penerapan Cloud Next Generation Firewall Enterprise
dengan
intrusion prevention service (IPS)
untuk melakukan deep packet inspection guna mencegah ancaman tanpa modifikasi desain
atau pemilihan rute. Pemeriksaan tersebut tunduk pada aplikasi
tertentu yang diakses, model komunikasi, dan persyaratan
keamanan. Jika persyaratan keamanan memerlukan pemeriksaan paket mendalam dan Lapisan 7
dengan mekanisme firewall lanjutan yang melampaui kemampuan
Cloud Next Generation Firewall, Anda dapat menggunakan firewall generasi berikutnya (NGFW) terpusat
yang dihosting di virtual appliance jaringan (NVA).
Beberapa Google Cloud
partner keamanan
menawarkan appliance NGFW yang dapat memenuhi persyaratan keamanan Anda. Mengintegrasikan NVA
dengan pola berpagar ini dapat memerlukan pengenalan beberapa zona keamanan dalam
desain jaringan, masing-masing dengan tingkat kontrol akses yang berbeda.
[[["Mudah dipahami","easyToUnderstand","thumb-up"],["Memecahkan masalah saya","solvedMyProblem","thumb-up"],["Lainnya","otherUp","thumb-up"]],[["Sulit dipahami","hardToUnderstand","thumb-down"],["Informasi atau kode contoh salah","incorrectInformationOrSampleCode","thumb-down"],["Informasi/contoh yang saya butuhkan tidak ada","missingTheInformationSamplesINeed","thumb-down"],["Masalah terjemahan","translationIssue","thumb-down"],["Lainnya","otherDown","thumb-down"]],["Terakhir diperbarui pada 2025-01-23 UTC."],[[["\u003cp\u003eThe gated pattern provides fine-grained control over the exposure of applications and services through specific APIs or endpoints, and is categorized into gated egress, gated ingress, and bidirectional gated patterns.\u003c/p\u003e\n"],["\u003cp\u003eThe networking architecture patterns can be customized to fit different applications' needs, allowing for single or combined pattern use within a main landing zone architecture based on the communication requirements.\u003c/p\u003e\n"],["\u003cp\u003eA common design option for all gated patterns is the Zero Trust Distributed Architecture for containerized applications with microservices, utilizing Cloud Service Mesh, Apigee, and Apigee Adapter for Envoy to secure service-to-service communications.\u003c/p\u003e\n"],["\u003cp\u003eGated patterns can integrate Cloud Next Generation Firewall Enterprise with intrusion prevention service (IPS) for deep packet inspection or can be implemented with centralized next generation firewall (NGFW) hosted in a network virtual appliance (NVA) for more advanced security.\u003c/p\u003e\n"]]],[],null,["# Gated patterns\n\nThe *gated* pattern is based on an architecture that exposes select\napplications and services in a fine-grained manner, based on specific exposed\nAPIs or endpoints between the different environments. This guide categorizes\nthis pattern into three possible options, each determined by the specific\ncommunication model:\n\n- [Gated egress](/architecture/hybrid-multicloud-secure-networking-patterns/gated-egress)\n- [Gated ingress](/architecture/hybrid-multicloud-secure-networking-patterns/gated-ingress)\n\n- [Gated egress and ingress](/architecture/hybrid-multicloud-secure-networking-patterns/gated-egress-ingress)\n (bidirectional gated in both directions)\n\nAs previously mentioned in this guide, the networking architecture patterns\ndescribed here can be adapted to various applications with diverse requirements.\nTo address the specific needs of different applications, your main landing zone\narchitecture might incorporate one pattern or a combination of patterns\nsimultaneously. The specific deployment of the selected architecture is\ndetermined by the specific communication requirements of each gated pattern.\n| **Note:** In general, the *gated* pattern can be applied or incorporated with the landing zone design option that exposes the services in a [consumer-producer model](/architecture/landing-zones/decide-network-design#option-4).\n\nThis series discusses each gated pattern and its possible design options.\nHowever, one common design option applicable to all gated patterns is the\n[Zero Trust Distributed Architecture](/architecture/network-hybrid-multicloud#zero_trust_distributed_architecture)\nfor containerized applications with microservice architecture. This option is\npowered by\n[Cloud Service Mesh](/anthos/service-mesh),\nApigee, and\n[Apigee Adapter for Envoy](/apigee/docs/api-platform/envoy-adapter/v2.0.x/concepts)---a\nlightweight Apigee gateway deployment within a Kubernetes cluster.\nApigee Adapter for Envoy is a popular, open source edge and service proxy that's\ndesigned for cloud-first applications. This architecture controls allowed secure\nservice-to-service communications and the direction of communication at a\nservice level. Traffic communication policies can be designed, fine-tuned, and\napplied at the service level based on the selected pattern.\n\nGated patterns allow for the implementation of Cloud Next Generation Firewall Enterprise\nwith\n[intrusion prevention service (IPS)](/firewall/docs/about-intrusion-prevention)\nto perform deep packet inspection for threat prevention without any design\nor routing modifications. That inspection is subject to the specific\napplications being accessed, the communication model, and the security\nrequirements. If security requirements demand Layer 7 and deep packet inspection\nwith advanced firewalling mechanisms that surpass the capabilities of\nCloud Next Generation Firewall, you can use a centralized next generation firewall (NGFW)\n[hosted in a network virtual appliance (NVA)](/architecture/network-secure-intra-cloud-access#network_virtual_appliance).\nSeveral Google Cloud\n[security partners](/security/partners)\noffer NGFW appliances that can meet your security requirements. Integrating NVAs\nwith these gated patterns can require introducing multiple security zones within\nthe network design, each with distinct access control levels."]]