
Answer-first summary for fast verification
Answer: Use Cloud Logging to verify that there were no modifications to the VPC firewall rules or policies that were applied to the two network interfaces of the dual-NIC instance., Verify that the dual-NIC instance has the --can-Ip-Forward attribute enabled.
The sudden failure of all flows between the two VPCs suggests critical configuration changes or misconfigurations. Key steps include: 1. **Option B**: Cloud Logging helps identify recent changes to VPC firewall rules or policies applied to the dual-NIC instance. If rules were modified to block traffic, this would disrupt flows. 2. **Option D**: The `--can-ip-forward` attribute is required for the instance to forward traffic between NICs. If this was disabled (e.g., during instance recreation or misconfiguration), traffic would stop. While this attribute is set at VM creation, troubleshooting must verify it was not accidentally omitted in a replacement instance. Other options are less likely: - **A**: VPC Service Controls typically affect cross-project communication, not intra-project VPCs unless misconfigured, but the problem implies prior working flows. - **C**: Public IP assignment might introduce security risks but doesn’t inherently block internal VPC traffic. - **E**: Adding the instance to a backend service (e.g., load balancer) is unrelated to its role as a firewall unless health checks interfere, which isn’t indicated here.
Author: LeetQuiz Editorial Team
Ultimate access to all questions.
No comments yet.
Your company's network architecture consists of two VPCs connected via a dual-NIC instance functioning as a bump-in-the-wire firewall. While traffic between subnet pairs across the VPCs was working, you now receive an alert indicating all flows between the VPCs have stopped. How should you troubleshoot this issue? (Select two actions.)
A
Verify that a VPC Service Controls perimeter has not been enabled for the project that contains the two VPCs and the dual-NIC instance.
B
Use Cloud Logging to verify that there were no modifications to the VPC firewall rules or policies that were applied to the two network interfaces of the dual-NIC instance.
C
Verify that a public IP address has not been assigned to any network interface of the dual-NIC instance.
D
Verify that the dual-NIC instance has the --can-Ip-Forward attribute enabled.
E
Verify that the dual-NIC instance has not been added to a backend service.