[[["易于理解","easyToUnderstand","thumb-up"],["解决了我的问题","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["很难理解","hardToUnderstand","thumb-down"],["信息或示例代码不正确","incorrectInformationOrSampleCode","thumb-down"],["没有我需要的信息/示例","missingTheInformationSamplesINeed","thumb-down"],["翻译问题","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["最后更新时间 (UTC):2025-07-16。"],[[["This guide outlines how to configure intra-project traffic network policies within Google Distributed Cloud (GDC) air-gapped environments."],["By default, GDC projects have a predefined intra-project policy that permits communication between workloads within the same project, with no inherent egress policy, which means that outbound traffic is allowed."],["Removing the default intra-project policy denies all intra-project communication for services and workloads in the project."],["Setting an egress policy restricts outbound traffic to only what the policy specifies and requires a separate policy to permit intra-project outbound traffic if data exfiltration prevention is disabled."],["You can create a global egress policy to apply the project network policy to all zones within the universe, allowing management across multiple zones."]]],[]]