Static routes
This page provides an overview of how static routes work in Google Cloud.
For a general overview of routes in Google Cloud, see the Routes overview.
Considerations for creating static routes
You can create static routes in one of two ways:
You can create static routes manually using the Google Cloud console,
gcloud compute routes create
, or theroutes.insert
API.If you use the Google Cloud console to create a Classic VPN tunnel that doesn't use dynamic routing, Cloud VPN might create corresponding static routes automatically. For more information, see Cloud VPN networks and tunnel routing.
You can exchange static routes with a peered VPC network as described in Options for exchanging custom static routes in the VPC Network Peering documentation.
Route parameters
Static routes support the following attributes:
Name and Description. These fields identify the route. A name is required, but a description is optional. Every route in your project must have a unique name.
Network. Each route must be associated with exactly one VPC network.
Next hop. The next hop identifies the network resource to which packets are sent. All next hop types support IPv4 destinations, and some next hop types support IPv6 destinations. For more information, see Next hops and features.
Destination range. The destination range is a single IPv4 or IPv6 CIDR notation.
Destinations for static routes must follow the rules described in Interactions with static routes and Subnet and static route interactions. The broadest possible destination for an IPv4 static route is
0.0.0.0/0
. The broadest possible destination for an IPv6 static route is::/0
.Priority. Lower numbers indicate higher priorities. The highest possible priority is
0
, and the lowest possible priority is65,535
.Network tags. You can make a static route apply to only select VM instances in the VPC network, identified by a network tag. If you don't specify a network tag, Google Cloud makes the static route apply to all instances in the network. Static routes with tags are never exchanged when using VPC Network Peering.
Next hops and features
The following table summarizes static route feature support by next hop type:
Next hop type | IPv4 | Dual-stack IPv6 | IPv6-only | ECMP1 |
---|---|---|---|---|
Next hop gateway (next-hop-gateway )Specify a default internet gateway to define a path to external IP addresses. |
(Preview) | |||
Next hop instance by name and zone (next-hop-instance )
Send packets to a next hop VM that is identified by name and zone and is in the same project as the route. For more information, see Considerations for next hop instances. |
(Preview) | |||
Next hop instance by address (next-hop-address )Send packets to a next hop VM that is identified by the primary internal IPv4 address, or an internal or external IPv6 address, of its network interface. For more information, see Considerations for next hop instances. |
(Preview) | |||
Next hop internal passthrough Network Load Balancer by forwarding rule name
(next-hop-ilb ) and region (next-hop-ilb-region )
Send packets to backends of an internal passthrough Network Load Balancer that is identified by the forwarding rule's name, region, and, optionally, project. For more information, see Considerations for internal passthrough Network Load Balancer next hops. |
(Preview) | |||
Next hop internal passthrough Network Load Balancer by address (next-hop-ilb )Send packets to backends of an internal passthrough Network Load Balancer that is identified by the IP address of the load balancer's forwarding rule. For more information, see Considerations for internal passthrough Network Load Balancer next hops. |
(Preview) | |||
Next hop Classic VPN tunnel (next-hop-vpn-tunnel )
Send packets to a next hop Classic VPN tunnel by using either policy-based routing or route-based VPN. For more information, see Considerations for Classic VPN tunnel next hops. |
Next hop project and network
A static route next hop is associated with both a VPC network and a project:
Network: Except as indicated in the table below, the next hop's VPC network must match the route's VPC network.
Project: Except as indicated in the table below, the next hop must be located in the project that contains the next hop's VPC network (a standalone project or a Shared VPC host project). Some next hops can be located in Shared VPC service projects.
Next hop type | Can be in a peered VPC network | Can be in a Shared VPC service project |
---|---|---|
Next hop gateway (next-hop-gateway ) |
||
Next hop instance by name (next-hop-instance ) |
||
Next hop instance by address (next-hop-address ) |
||
Next hop internal passthrough Network Load Balancer by forwarding rule name and region
(next-hop-ilb ) |
||
Next hop internal passthrough Network Load Balancer by address (next-hop-ilb ) |
||
Next hop Classic VPN tunnel (next-hop-vpn-tunnel ) |
Considerations common to instance and internal passthrough Network Load Balancer next hops
Instance-based routing refers to a static route with a next hop that is a VM
instance (next-hop-instance
or next-hop-address
).
Internal passthrough Network Load Balancer as a next hop refers to a static route with a next hop
that is an internal passthrough Network Load Balancer (next-hop-ilb
).
When you configure instance-based routing or an internal passthrough Network Load Balancer as a next hop, consider the following guidelines:
You must configure the backend VMs or the next hop instance to forward packets from any source IP address. To configure forwarding, enable IP forwarding (
can-ip-forward
) on a per-VM basis when you create the VM. For VMs created automatically as part of a managed instance group, enable IP forwarding in the instance template used by the instance group. You must make this configuration change in addition to any operating system configuration necessary to route packets.Software running on the backend VM or the next hop instance must be configured appropriately. For example, third-party appliance VMs that act as routers or firewalls must be configured according to the manufacturer's instructions.
Backend VMs or the next hop instance must have appropriate firewall rules. You must configure firewall rules that apply to the packets being routed. Keep the following in mind:
- Ingress firewall rules applicable to instances that perform routing functions must include the IP addresses of routed packet sources. The implied deny ingress rule blocks all incoming packets, so you must at least create custom ingress allow firewall rules.
- Egress firewall rules applicable to instances that perform routing functions must include the IP addresses of routed packet destinations. The implied allow egress rule permits this unless you've created a specific egress deny rule to override it.
- Take into account whether the backend VM or Next Hop Instance is performing Network Address Translation (NAT) when creating your firewall rules.
For more information, see Implied firewall rules.
The source region of a packet sent by a backend VM or a next hop instance is the region where the backend VM or next hop instance is located. For example, packets processed by backend VMs or next hop instances in
us-west1
can be sent to destinations that are accessible only inus-west1
even if the backend VM or next hop instance originally received the packet from a resource in a region different fromus-west1
. Examples of resources that are accessible only in the same region as a VM sending a packet include the following:- Internal passthrough Network Load Balancers, internal Application Load Balancers, and regional internal proxy Network Load Balancers with global access turned off
- Cloud VPN tunnels, Cloud Interconnect VLAN attachments, and Network Connectivity Router appliance VMs if the VPC network uses regional dynamic routing
Considerations for next hop instances
Next hop by instance name and zone (
next-hop-instance
): When you create a static route that has a next hop instance specified by instance name and zone, Google Cloud requires that an instance with that name exists in the specified zone, and meets the following:- The instance is located in the same project as the route.
- The instance has a network interface (NIC) in the route's VPC network (not a peered VPC network).
As long as the static route exists, the following applies:
Google Cloud automatically updates programming for the next hop in either of the following cases:
- The primary internal IPv4 address of the next hop instance changes, or
- You replace the next hop instance, and the replacement instance has the same name, is in the same zone and project, and has a network interface in the route's VPC network.
Google Cloud doesn't update programming for the next hop in the following cases:
- When the instance is deleted.
- The IPv6 address range assigned to the instance's NIC changes.
- When the IPv4 or IPv6 address of the instance is unassigned.
- Next hop instance IP address
(
next-hop-address
): Valid next hop VM IP addresses are the following:- The primary internal IPv4 address of a VM network interface.
- Any internal or external IPv6 address in the
/96
IPv6 address range assigned to a VM network interface.
When you create a static route with a next hop instance specified by an IP address, Google Cloud accepts any VM-assigned IP address that fits within a subnet range of a subnet in the same VPC network as the route. However, Google Cloud only programs the route if the next hop address is a valid next hop VM IP address. For example, if you create a route and specify the next hop as an IP address that comes from an alias IP range, the route is created. However, because alias IP addresses aren't valid next hop VM IP addresses, the route is not programmed.
Google Cloud automatically updates programming for the next hop if the next hop IP address is moved to a different VM, if the IP address remains a valid next hop VM IP address.
When you specify a next hop instance by IP address, packets are routed to the network interface of the instance, not the specific IP address.
Next hop instances in Shared VPC service projects: When you specify a next hop VM by IP address, the VM can be located in either the same project as the route (a standalone project or a Shared VPC host project) or the VM can be located in a Shared VPC service project. When you specify a next hop VM by instance name and zone, the next hop VM must be located in the same project as the route and VPC network (a standalone project or a Shared VPC host project).
Region-to-region costs and latency: When you use a VM as a next hop, the next hop is located in a zone of a region. The route that uses the next hop is available to all instances in the same VPC network or to select instances with a matching network tag. Google Cloud doesn't consider regional distance for routes that use an instance as a next hop, so it is possible to create a route that sends traffic to a next hop VM in a different region. Sending packets from one region to another adds outbound data transfer costs and introduces network latency.
No health checking, no configuration validation: Google Cloud never checks whether a next hop instance meets all requirements outlined in the Considerations common to instance and internal passthrough Network Load Balancer next hops section. Disabling the VM's network interface by configuring the guest operating system of the instance doesn't cause Google Cloud to disregard the next hop instance.
No symmetric hashing when connecting two VPC networks: Google Cloud doesn't offer symmetric hashing when using two or more next hop VMs that have multiple network interfaces in a configuration that meets all of the following criteria:
- The VMs have one network interface in one VPC network and another interface in a second VPC network.
- In each VPC network, there exists a set of at least two custom static routes for the same destination, using the same priority, where each route in the set references a unique next hop VM.
If you use two or more VMs with multiple interfaces to connect VPC networks, and you require that the same VM processes packets for a given connection in both directions, you need symmetric hashing, which is only supported by next hop internal passthrough Network Load Balancers. For more information, see Symmetric hashing.
- Behavior when
instances are stopped or deleted: Google Cloud doesn't prevent
you from stopping or deleting a static route next hop VM (specified by
either name and zone or internal address). When a next hop VM is not
running, routing depends on whether other routes for the exact same
destination exist and whether those other routes have next hops that are
running. To illustrate this behavior, consider the following examples:
You have the following routes and VM states:
route-a
, destination192.168.168.0/24
, priority10
, next hop VMvm-a
is stoppedroute-b
, destination192.168.168.0/24
, priority20
, next hop VMvm-b
is runningroute-c
, destination192.168.168.0/24
, priority30
, next hop VMvm-c
is running
In this example, packets whose destinations fit in
192.168.168.0/24
are sent to thevm-b
next hop because thevm-a
next hop of the highest priorityroute-a
is not running. This happens because the disregard static and dynamic routes with unusable next hops step precedes the disregard low priority routes step in the Google Cloud routing order.You have the following routes and VM states:
route-x
, destination192.168.168.0/24
, priority10
, next hop VMvm-x
is stoppedroute-y
, destination192.168.168.0/24
, priority20
, next hop VMvm-y
is stoppedroute-z
, destination192.168.0.0/16
, priority0
, next hop VMvm-z
is running
In this example, packets whose destinations fit in
192.168.168.0/24
are dropped because the next hop VMs for the two192.168.168.0/24
routes (route-x
androute-y
) are not running, even though a route for the broader192.168.0.0/16
destination exists (route-z
) with a running next hop VM. This happens because the most specific destination step precedes the disregard static and dynamic routes with unusable next hops step in the Google Cloud routing order.
Considerations for internal passthrough Network Load Balancer next hops
Supported forwarding rules. Google Cloud supports only next hop internal passthrough Network Load Balancer forwarding rules. Google Cloud does not support next hop forwarding rules used by other load balancers, protocol forwarding, or as Private Service Connect endpoints.
Specification methods and forwarding rule network and project. You can specify a next hop forwarding rule by using one of following three methods. The specification method that you use determines whether the forwarding rule's network must match the route's network and in what project the forwarding rule can be located.
Choose one of the following methods and ensure that the IP version of your forwarding rule matches the IP version of the static route that you create:
By forwarding rule name (
--next-hop-ilb
) and region (--next-hop-ilb-region
): When you specify a next hop forwarding rule by name and region, the forwarding rule's network must match the route's VPC network. The forwarding rule must be located in the same project that contains the forwarding rule's network (a standalone project or a Shared VPC host project).By forwarding rule resource link: A forwarding rule's resource link uses the format
/projects/
PROJECT_ID/regions/
REGION/forwardingRules/
FORWARDING_RULE_NAME, where PROJECT_ID is the project ID of the project that contains the forwarding rule, REGION is the forwarding rule's region, and FORWARDING_RULE_NAME is the forwarding rule's name. When you specify a next hop forwarding rule by its resource link, the forwarding rule's network must match the route's VPC network. The forwarding rule can be located in either the project that contains the forwarding rule's network (a standalone project or a Shared VPC host project) or a Shared VPC service project.By a forwarding rule IP address: When you specify a next hop forwarding rule by its IPv4 or IPv6 (Preview) address, the forwarding rule's network can be either the route's VPC network or a peered VPC network. The forwarding rule can be located in either the project that contains the forwarding rule's network (a standalone project or a Shared VPC host project) or a Shared VPC service project.
Effect of global access. Custom static routes using internal passthrough Network Load Balancer next hops are programmed in all regions. Whether the next hop is usable depends on the load balancer's global access setting. With global access enabled, the load balancer next hop is accessible in all regions of the VPC network. With global access disabled, the load balancer next hop is only accessible in the same region as the load balancer. With global access disabled, packets sent from another region to a route using an internal passthrough Network Load Balancer next hop are dropped.
When all backends are unhealthy. When all backends of an internal passthrough Network Load Balancer fail health checks, the routes using that load balancer next hop are still in effect. Packets processed by the route are sent to one of the next hop load balancer's backends according to traffic distribution.
Forwarding rules that use a common internal IP address (
--purpose=SHARED_LOADBALANCER_VIP
) are not supported. Next hop internal passthrough Network Load Balancers and internal passthrough Network Load Balancer forwarding rules with a common IP address are mutually exclusive features. A next hop internal passthrough Network Load Balancer must use an IP address that is unique to the load balancer's forwarding rule so that only one backend service (one load balancer) is unambiguously referenced. It's possible for forwarding rules that use a common internal IP address to reference different backend services (different internal passthrough Network Load Balancers).Multiple routes with the same destinations and priorities, but different next hop internal passthrough Network Load Balancers. Google Cloud never distributes traffic among two or more next hop internal passthrough Network Load Balancers using ECMP. Instead, Google Cloud selects just one next hop internal passthrough Network Load Balancer using a deterministic, internal algorithm. To avoid this ambiguity, you can use unique network tags for each route.
Multiple routes with the same destinations, priorities, and next hop internal passthrough Network Load Balancers. Without a network tag, Google Cloud does not allow you to create multiple static routes that have the same combination of destination, priority, and internal passthrough Network Load Balancer next hop. With network tags, you can create multiple static routes having the same combination of destination, priority, and internal passthrough Network Load Balancer next hop.
Considerations for Classic VPN tunnel next hops
Region-to-region costs and latency: Google Cloud doesn't consider regional distance for routes that use a next hop Classic VPN tunnel. Sending traffic to a next hop Classic VPN tunnel in another region adds outbound data transfer costs and introduces network latency. As a best practice, use an HA VPN tunnel with dynamic routing instead because that configuration considers regional distance.
Behavior when Classic VPN tunnels are not running: Custom static routes whose next hops are Classic VPN tunnels are not automatically removed when the Classic VPN tunnels are not running. For details about what happens when tunnels are not running, see When tunnels are down in the Classic VPN documentation.
What's next
- To create and manage routes, see Use routes.
- To get a general overview of routes Google Cloud, see Routes.