Quotas and limits

This document lists the quotas and system limits that apply to Cloud Next Generation Firewall.

  • Quotas specify the amount of a countable, shared resource that you can use. Quotas are defined by Google Cloud services such as Cloud Next Generation Firewall.
  • System limits are fixed values that cannot be changed.

Google Cloud uses quotas to help ensure fairness and reduce spikes in resource use and availability. A quota restricts how much of a Google Cloud resource your Google Cloud project can use. Quotas apply to a range of resource types, including hardware, software, and network components. For example, quotas can restrict the number of API calls to a service, the number of load balancers used concurrently by your project, or the number of projects that you can create. Quotas protect the community of Google Cloud users by preventing the overloading of services. Quotas also help you to manage your own Google Cloud resources.

The Cloud Quotas system does the following:

  • Monitors your consumption of Google Cloud products and services
  • Restricts your consumption of those resources
  • Provides a way to request changes to the quota value

In most cases, when you attempt to consume more of a resource than its quota allows, the system blocks access to the resource, and the task that you're trying to perform fails.

Quotas generally apply at the Google Cloud project level. Your use of a resource in one project doesn't affect your available quota in another project. Within a Google Cloud project, quotas are shared across all applications and IP addresses.

There are also system limits on Cloud NGFW resources. System limits can't be changed.

Quotas

This section lists the quotas that apply to Cloud Next Generation Firewall.

To monitor per-project quotas that use Cloud Monitoring, set up monitoring for the metric serviceruntime.googleapis.com/quota/allocation/usage on the Consumer Quota resource type. Set additional label filters (service, quota_metric) to get to the quota type. For information about monitoring quota metrics, see Chart and monitor quota metrics. Each quota has a limit and a usage value.

Unless noted otherwise, to change a quota, see Request a higher quota.

Per project

The following table highlights Cloud NGFW quotas that are per project:

Quota Description
VPC firewall rules The number of VPC firewall rules that you can create in a project, regardless of the VPC network to which each firewall rule applies.
Global network firewall policies The number of Global network firewall policies in a project, regardless of how many VPC networks are associated with each policy.
Regional network firewall policies The number of Regional network firewall policies in each region of a project, regardless of how many VPC networks are associated with each policy.
Global address groups per project The number of global address groups that you can define in a project.
Regional address groups per project per region The number of regional address groups that you can define in each region of a project.

Per organization

The following table highlights Cloud NGFW quotas that are per organization. To change an organization-level quota, file a Support case.

Quota Description
Unassociated Hierarchical firewall policies in an organization The number of Hierarchical firewall policies in an organization that are not associated with any folder or organization resource. There is no limit on the number of Hierarchical firewall policies in an organization that are associated with a resource.

Per firewall policy

The following table highlights Cloud NGFW quotas that are per firewall policy resource:

Quota Description
Hierarchical firewall policies
Rule attributes per hierarchical firewall policy This quota is the sum of rule attributes from all rules in a hierarchical firewall policy. For more information, see Rule attribute count details.
Domain names (FQDNs) per hierarchical firewall policy The number of domain names that you can include in all rules of a hierarchical firewall policy. This quota is the sum of all source domain names from all ingress rules in the policy plus the sum of all destination domain names from all egress rules in the policy.
Global network firewall policies
Rule attributes per global network firewall policy The sum of rule attributes from all rules in a global network firewall policy. For more information, see Rule attribute count details.
Domain names (FQDNs) per global network firewall policy The number of domain names that you can include in all rules of a global network firewall policy. This quota is the sum of all source domain names from all ingress rules in the policy plus the sum of all destination domain names from all egress rules in the policy.
Regional network firewall policies
Rule attributes per regional network firewall policy The sum of rule attributes from all rules in a regional network firewall policy. For more information, see Rule attribute count details.
Domain names (FQDNs) per regional network firewall policy The number of domain names (FQDNs) that you can include in all rules of a regional network firewall policy: This quota is the sum of all source domain names from all ingress rules in the policy plus the sum of all destination domain names from all egress rules in the policy.

Rule attribute count details

Each firewall policy supports a maximum total number of attributes from all rules in the policy. To determine the rule attribute count for a given firewall policy, describe the policy. For directions, see the following:

The following table lists example rules and the attribute count for each example rule.

Example firewall rule Rule attribute count Explanation
Ingress allow firewall rule with source IP address range 10.100.0.1/32, tcp protocol, and 5000-6000 port range. 3 One source range; one protocol, one port range.
Ingress deny firewall rule with source IP address ranges 10.0.0.0/8, 192.168.0.0/16, destination IP address range 100.64.0.7/32, tcp and udp protocols, port ranges 53-53 and 5353-5353. 11 There are four protocol and port combinations: tcp:53-53, tcp:5353-5353, udp:53-53, and udp:5353-5353. Each protocol and port combination uses two attributes. One attribute each for the two source IP address ranges, one attribute for the destination IP address range, and eight attributes for the protocol and port combinations produces an attribute count of 11.
Egress deny firewall rule with source IP address range 100.64.0.7/32, destination IP address range 10.100.0.1/32, 10.100.1.1/32, tcp:80, tcp:443, and udp:4000-5000. 9 Protocol and port combinations expand to three: tcp:80-80, tcp:443-443, and udp:4000-5000. Each protocol and port combination uses two attributes. One attribute for the source range, one attribute each for the two destination IP address ranges, and six attributes for the protocol and port combinations produces an attribute count of 9.

Limits

Limits cannot be increased unless specifically noted.

Per organization

The following limits apply to organizations:

Item limit Notes
Global address groups per organization 100 The maximum number of global address groups that you can create per organization.
Regional address groups per organization per region 100 The maximum number of regional address groups that you can create per organization in a region.
Organization address groups 100 The maximum number of address groups that you can create per organization regardless of location (global or regional).
Maximum address group capacity 1,000 The maximum capacity of an address group per organization or project.
Maximum secure tag keys per organization or per project 1,000 The maximum number of secure tag keys that you can create per organization or project. For more information, see Tag limits.
Maximum secure tag values per key per organization or per project 1,000 The maximum number of secure tag values that you can add per key in an organization or project. For more information, see Tag limits.
Maximum secure tags key-value pairs per resource per organization 50 The maximum number of secure tag key-value pairs that you can add per resource in an organization or project. For more information, see Tag limits.

For network limits, see Per network limits.

Threat prevention security profiles per organization 40 The maximum number of security profiles of type threat prevention that you can create per organization.
Security profile groups per organization 40 The maximum number of security profile groups that use a threat prevention security profile that you can create per organization.
Firewall endpoints per zone per organization 10 The maximum number of firewall endpoints that you can create per zone per organization.

Per network

The following limits apply to VPC networks:

Item Limit Notes
Maximum global network firewall policies per network 1 The maximum number of global network firewall policies that you can associate with a VPC network.
Maximum regional network firewall policies per region per network 1 The maximum number of regional network firewall policies that you can associate with a combination of VPC network and region.
Maximum number of domain names (FQDNs) per network 1,000 The maximum total number of domain names that can be used in firewall rules that come from hierarchical firewall policies, global network firewall policies, and regional network firewall policies associated with a VPC network.
Firewall endpoints per zone per network 1 The maximum number of firewall endpoints that you can assign per zone per network.

Per firewall rule

The following limits apply to firewall rules:

Item Limit Notes
Maximum number of source secure tags per ingress firewall policy rule 256 Applicable only to ingress firewall policy rule—the maximum number of secure tags that you can use as source tags in the firewall rule. This limit cannot be increased.
Maximum number of target secure tags per firewall policy rule 256 Applicable only to firewall policy rule—the maximum number of secure tags that you can use as target tags in the firewall rule. This limit cannot be increased.
Maximum number of source network tags per ingress VPC firewall rule 30 Applicable only to ingress VPC firewall rules—the maximum number of network tags that you can use as source tags in the firewall rule. This limit cannot be increased.
Maximum number of target network tags per VPC firewall rule 70 Applicable only to VPC firewall rules—the maximum number of network tags that you can use as target tags in the firewall rule. This limit cannot be increased.
Maximum number of source service accounts per ingress VPC firewall rule 10 Applicable only to ingress VPC firewall rules—the maximum number of service accounts that you can use as sources in the firewall rule. This limit cannot be increased.
Maximum number of target service accounts per firewall rule 10 The maximum number of service accounts that you can use as targets in a VPC firewall rule or rule in a firewall policy. This limit cannot be increased.
Maximum number of source IP address ranges per firewall rule 5,000 The maximum number of source IP address ranges that you can specify in a VPC firewall rule or rule in a firewall policy. IP address ranges are either IPv4 only or IPv6 only. This limit cannot be increased.
Maximum number of destination IP address ranges per firewall rule 5,000 The maximum number of destination IP address ranges that you can specify in a VPC firewall rule or rule in a firewall policy. IP address ranges are either IPv4 only or IPv6 only. This limit cannot be increased.
Maximum number of source address groups per ingress firewall rule in a firewall policy 10 The maximum number of source address groups that you can specify in an ingress firewall rule in a firewall policy. This limit cannot be increased.
Maximum number of destination address groups per firewall rule in a firewall policy 10 The maximum number of destination address groups that you can specify in an egress firewall rule in a firewall policy. This limit cannot be increased.
Maximum number of domain names (FQDNs) per firewall rule in a firewall policy 100 The number of domain names (FQDNs) that you can include in a rule of a firewall policy. This limit cannot be increased.

Per firewall endpoint

The following limits apply to firewall endpoints:

Item Limit Notes
Associations per firewall endpoint 50 The maximum number of VPC networks that you can associate with a firewall endpoint. You can create additional firewall endpoints in the same zone to overcome this limit.

Per security profile

The following limits apply to security profiles:

Item Limit Notes
Number of threat overrides per security profile 100 The maximum number of threat overrides you can add in a threat prevention security profile.

Per VM network interface

The following limits apply to VM network interfaces:

Item Limit Notes
Maximum secure tags per VM interface 10 The maximum number of secure tags that you can add per VM per NIC.

Manage quotas

Cloud Next Generation Firewall enforces quotas on resource usage for various reasons. For example, quotas protect the community of Google Cloud users by preventing unforeseen spikes in usage. Quotas also help users who are exploring Google Cloud with the free tier to stay within their trial.

All projects start with the same quotas, which you can change by requesting additional quota. Some quotas might increase automatically based on your use of a product.

Permissions

To view quotas or request quota increases, Identity and Access Management (IAM) principals need one of the following roles.

Task Required role
Check quotas for a project One of the following:
Modify quotas, request additional quota One of the following:
  • Project Owner (roles/owner)
  • Project Editor (roles/editor)
  • Quota Administrator (roles/servicemanagement.quotaAdmin)
  • A custom role with the serviceusage.quotas.update permission

Check your quota

Console

  1. In the Google Cloud console, go to the Quotas page.

    Go to Quotas

  2. To search for the quota that you want to update, use the Filter table. If you don't know the name of the quota, use the links on this page instead.

gcloud

Using the Google Cloud CLI, run the following command to check your quotas. Replace PROJECT_ID with your own project ID.

    gcloud compute project-info describe --project PROJECT_ID

To check your used quota in a region, run the following command:

    gcloud compute regions describe example-region
    

Errors when exceeding your quota

If you exceed a quota with a gcloud command, gcloud outputs a quota exceeded error message and returns with the exit code 1.

If you exceed a quota with an API request, Google Cloud returns the following HTTP status code: 413 Request Entity Too Large.

Request additional quota

To adjust most quotas, use the Google Cloud console. For more information, see Request a quota adjustment.

Console

  1. In the Google Cloud console, go to the Quotas page.

    Go to Quotas

  2. On the Quotas page, select the quotas that you want to change.
  3. At the top of the page, click Edit quotas.
  4. For Name, enter your name.
  5. Optional: For Phone, enter a phone number.
  6. Submit your request. Quota requests take 24 to 48 hours to process.

Resource availability

Each quota represents a maximum number for a particular type of resource that you can create, if that resource is available. It's important to note that quotas don't guarantee resource availability. Even if you have available quota, you can't create a new resource if it is not available.

For example, you might have sufficient quota to create a new regional, external IP address in a given region. However, that is not possible if there are no available external IP addresses in that region. Zonal resource availability can also affect your ability to create a new resource.

Situations where resources are unavailable in an entire region are rare. However, resources within a zone can be depleted from time to time, typically without impact to the service level agreement (SLA) for the type of resource. For more information, review the relevant SLA for the resource.