Google CloudPCNE

Google PCNE: Professional Cloud Network Engineer for GCP

The Google Professional Cloud Network Engineer (PCNE) validates your ability to design, implement, and manage networking infrastructure on Google Cloud. It goes deep on VPC design, hybrid connectivity, load balancing, DNS, network security, and network performance optimisation. If your primary responsibility is GCP networking — building the connectivity fabric that links applications, services, and on-premises systems — PCNE is your certification.

11 min
3 sections · 10 exam key points

Advanced VPC Design and Connectivity

PCNE-level VPC design covers the full connectivity model. VPC sharing: Shared VPC (host project owns the VPC network, service projects attach to it and create resources in shared subnets — centralised network governance, reduces the number of VPC networks to manage). VPC peering: connect two VPCs — routes exchanged automatically, non-transitive (A-B and B-C does not give A-C connectivity). Private Service Connect: create private endpoints for Google APIs and third-party services inside your VPC — traffic stays on Google's private network, DNS resolves to a private IP. Cloud DNS: managed authoritative DNS — public zones (serve external DNS), private zones (resolve within VPC — visible only to VMs in the VPC or peered VPCs), forwarding zones (forward queries to on-premises DNS servers via hybrid connectivity). DNS Server Policy: configure the VPC to use Cloud DNS as the DNS resolver for on-premises hosts connecting via VPN or Interconnect. Network Connectivity Center: hub-and-spoke topology for connecting VPCs, VPN tunnels, and Interconnect attachments — similar to AWS Transit Gateway but designed for Google's network model.

Hybrid Connectivity and Load Balancing

Hybrid connectivity for PCNE. Cloud VPN: IPSec-based VPN — HA VPN (two tunnels, BGP routing, 99.99% SLA), Classic VPN (single tunnel, legacy). HA VPN requires Cloud Router for dynamic BGP routing. Cloud Interconnect: Dedicated (direct 10G or 100G private circuit to Google) and Partner (through a partner, 50 Mbps to 10 Gbps). Cloud Router: manages BGP sessions for VPN and Interconnect — announces VPC subnet routes to on-premises, learns on-premises routes dynamically. MED (Multi-Exit Discriminator): BGP attribute that influences inbound path selection — lower MED preferred. Google Cloud load balancers: Global External HTTP(S) Load Balancer (anycast IP, CDN integration, URL-based routing, backend services with health checks — used for web applications with global users), Regional External HTTP(S) LB (single region, lower cost), External TCP/UDP Network LB (pass-through, preserves client IP, no SSL termination — for non-HTTP protocols), Internal HTTP(S) LB (for internal microservices — Envoy-based, supports traffic management policies), Internal TCP/UDP LB (pass-through for internal L4 traffic). Cloud CDN: integrated with Global HTTP(S) LB — caches responses at Google's edge PoPs worldwide.

Network Security and Monitoring

Network security at PCNE level. Hierarchical firewall policies: apply firewall rules at organisation or folder level — enforced before VPC-level firewall rules, cannot be overridden by projects. VPC firewall rules: stateful rules applied per instance (via network tag or service account) — implied deny-all inbound, implied allow-all outbound. Best practice: replace tag-based rules with service-account-based rules (more precise — a tag can be applied by anyone with Compute access, but service account assignment is IAM-controlled). Cloud Armor security policies: layer 7 rules for HTTPS traffic — rate limiting, geo-blocking, OWASP CRS, custom IP/header/URI match rules. Threat Intelligence integration: automatically blocks known malicious IPs from Mandiant's threat intelligence database. Network Intelligence Center: suite of tools for network visibility and monitoring — Network Topology (visualise VPC connectivity and traffic flow), Connectivity Tests (diagnose packet paths and identify routing issues — similar to AWS Reachability Analyser), Flow Logs Analyser (query VPC Flow Logs with aggregation and filtering). Packet Mirroring: clone traffic from specific instances to an IDS for deep packet inspection.

Key exam facts — PCNE

  • Shared VPC: host project owns the network; service projects create resources in shared subnets
  • VPC peering is non-transitive — Network Connectivity Center provides hub-and-spoke transitivity
  • HA VPN: two tunnels with BGP via Cloud Router — 99.99% SLA; Classic VPN has lower SLA
  • Global HTTP(S) LB: anycast IP, CDN integration, URL routing — for globally distributed web apps
  • Internal HTTP(S) LB: Envoy-based, supports traffic management (header-based routing, weight-based) — for internal microservices
  • Hierarchical firewall policies: org/folder level, enforced before VPC rules — cannot be overridden
  • Service-account-based firewall rules: more precise than tag-based — IAM controls service account assignment
  • Cloud Armor Threat Intelligence: blocks known malicious IPs from Mandiant threat database
  • Network Intelligence Center Connectivity Tests: diagnose packet paths without sending traffic
  • Private Service Connect: private IP access to Google APIs and third-party services within VPC

Common exam traps

VPC peering and Shared VPC serve the same network sharing purpose

VPC peering connects two separate VPCs that each retain their own IAM and policies — used for service-to-service connectivity. Shared VPC shares a VPC across multiple projects under centralised governance — service projects use subnets from the host project's VPC. They solve different organisational problems.

Cloud Armor is only useful for DDoS protection

Cloud Armor provides DDoS protection, WAF (OWASP CRS), IP/geo blocking, rate limiting, custom match rules, adaptive protection (ML-based), and threat intelligence integration. It is a full-featured layer 7 security policy engine, not just a DDoS shield.

Practice this topic

Test yourself on Google Cloud Network Engineer

JT Exams routes you to questions in your exact weak areas — automatically, after every session.

No credit card · Cancel anytime

Related certification topics