This page describes how to successfully create and provision a Partner Cross-Cloud Interconnect for Amazon Web Services (AWS) connection from AWS if you already have an activation key.
Before you start the Partner Cross-Cloud Interconnect for AWS provisioning process, ensure that the following conditions are met:
- You already have an AWS account.
- You create a Virtual Private Cloud (VPC) network, if it doesn't already exist, to connect your transport resource to.
- If you are a VPC Service Controls user, you must set up ingress and egress rules
using the
networkconnectivity-transportmanager-clh@system.gserviceaccount.comservice account that is associated with Partner Cross-Cloud Interconnect for AWS. For instructions, see Set up ingress and egress rules (for VPC Service Controls users).
If you want to initiate a connection from the AWS Console, see Getting started with AWS Interconnect for creating the required resource. Provide the project and region information where you want the connection to land in Google Cloud. After AWS has created the resource, you must create the Google Cloud resource with the provided activation key.
To achieve a successful connection, you must create the transport resource.
Follow these instructions to create the transport.
Before you begin
Before you get started, review the following sections.
Create or select a project
To make it easier to configure Partner Cross-Cloud Interconnect for AWS, start by identifying a valid project.
- Sign in to your Google Cloud account. If you're new to Google Cloud, create an account to evaluate how our products perform in real-world scenarios. New customers also get $300 in free credits to run, test, and deploy workloads.
-
In the Google Cloud console, on the project selector page, select or create a Google Cloud project.
Roles required to select or create a project
- Select a project: Selecting a project doesn't require a specific IAM role—you can select any project that you've been granted a role on.
-
Create a project: To create a project, you need the Project Creator role
(
roles/resourcemanager.projectCreator), which contains theresourcemanager.projects.createpermission. Learn how to grant roles.
-
Verify that billing is enabled for your Google Cloud project.
-
Install the Google Cloud CLI.
-
If you're using an external identity provider (IdP), you must first sign in to the gcloud CLI with your federated identity.
-
To initialize the gcloud CLI, run the following command:
gcloud init -
In the Google Cloud console, on the project selector page, select or create a Google Cloud project.
Roles required to select or create a project
- Select a project: Selecting a project doesn't require a specific IAM role—you can select any project that you've been granted a role on.
-
Create a project: To create a project, you need the Project Creator role
(
roles/resourcemanager.projectCreator), which contains theresourcemanager.projects.createpermission. Learn how to grant roles.
-
Verify that billing is enabled for your Google Cloud project.
-
Install the Google Cloud CLI.
-
If you're using an external identity provider (IdP), you must first sign in to the gcloud CLI with your federated identity.
-
To initialize the gcloud CLI, run the following command:
gcloud init If you are using the Google Cloud CLI, set your project ID by using the
gcloud config setcommand.gcloud config set project PROJECT_ID
Replace
PROJECT_IDwith your unique project ID.The gcloud CLI instructions on this page assume that you have set your project ID.
To confirm that you set the project ID correctly, use the
gcloud config listcommand.gcloud config list --format='text(core.project)'
Enable the Network Connectivity API
Before you can perform any tasks using Partner Cross-Cloud Interconnect for AWS, you must enable the Network Connectivity API.
Console
To enable the Network Connectivity API, do the following:
In the Google Cloud console, go to the Network Connectivity API.
Click Enable.
Alternatively, you can enable the API by using the Google Cloud console API Library, as described in Enabling APIs.
Initiate a connection from AWS with an AWS activation key
Create the transport resource
gcloud
Run the gcloud network-connectivity transports create command
gcloud network-connectivity transports create TRANSPORT_NAME \
--region=REGION \
--activation-key=ACTIVATION_KEY \
--network=NETWORK \
--advertised-routes=ADVERTISED_ROUTES \
--stack-type=STACK_TYPE
Replace the following values:
TRANSPORT_NAME: a name for the transport resource that you want to createLOCATION: the name of the region where you want to provision connectivity, such as,us-west1ACTIVATION_KEY: the activation key that you have received from AWSNETWORK: the name of your VPC networkADVERTISED_ROUTE: IP addresses for the Google Cloud VPC network's routes to be advertised to AWS.STACK_TYPE(optional): IP address version stack type.
API
Use the networkconnectivity.transports.create method:
POST https://networkconnectivity.googleapis.com/v1/projects/PROJECT/locations/LOCATION/transport/TRANSPORT_NAME
curl \
-H "Authorization: Bearer $(gcloud auth print-access-token)" \
-H "Content-Type: application/json" \
https://networkconnectivity.googleapis.com/v1/projects/PROJECT/locations/LOCATION/transports?transportId=TRANSPORT_NAME \
--data '
{
"network": "NETWORK",
"advertisedRoutes": ["ADVERTISED_ROUTE"],
"providedActivationKey": "ACTIVATION_KEY",
"stackType": "STACK_TYPE
}'
Replace the following values:
PROJECT: the name of the project in which you want to create the transportLOCATION: the name of the Google Cloud region where you want to provision connectivity, such as,us-west1TRANSPORT_NAME: a name for the transport resourceNETWORK: the network in which you want to create the transportADVERTISED_ROUTE: IP addresses for the Google Cloud VPC network's routes to be advertised to AWS.ACTIVATION_KEY: the activation key that you have received from AWSSTACK_TYPE(optional): IP address version stack type.
Establish VPC Network Peering
You can proactively establish VPC Network Peering at the
Google Cloud end. To do this, use the peeringNetwork resource
and ensure that you create a peering with the same stack type. The default
stack type matches the transport resource using IPV4_ONLY.
To receive the AWS routes, you must enable the
Import custom routes field.
The MTU in the peering VPC network is explicitly set to the
maximum in order to avoid MTU issues in the connectivity. If you're using an
MTU less than 8896, you might get a warning WARNING: Some requests generated
warnings: - Network MTU 1460B does not match the peer's MTU 8896B. In that
case, you must ensure that you're using matching MTU configurations between
your Google Cloud VPC network and the
AWS VPC network. If these are mismatched, you might
need to override MTU values to the lowest common denominator. For example, if
you're using 8896 in Google Cloud and 8800 in AWS,
everything in Google Cloud must be configured as 8800.
gcloud
To establish VPC Network Peering, use the
gcloud compute networks peerings create command.
gcloud compute networks peerings create "TRANSPORT_NAME" \
--network="VPC_NETWORK" \
--peer-network="PEERING_NETWORK" \
--stack-type=STACK_TYPE \
--import-custom-routes \
--export-custom-routes
Replace the following values:
TRANSPORT_NAME: the name of the transport that you createdVPC_NETWORK: the name of the VPC network that you want to list the routes forPEERING_NETWORK: the name of the VPC network provided by theTransportresourceSTACK_TYPE: IP address version stack type.
If the command is successful, the output's state field has the value
ACTIVE.
API
To establish VPC Network Peering, use the
compute.networks.addPeering method.
POST https://compute.googleapis.com/compute/v1/projects/PROJECT/global/networks/NETWORK/addPeering
Replace the following values:
PROJECT: the name of the project that you are peeringNETWORK: the name of the network resource to add peering to
Verify your connection
You can verify that connectivity has been established by listing the peered VPC networks and the route tables. After the AWS configuration is complete, you can see your AWS routes in the list.
gcloud
To list the peered VPC networks, use the
gcloud compute networks peerings list command.
gcloud compute networks peerings list
The output is similar to the following:
NAME NETWORK PEER_PROJECT PEER_NETWORK STACK_TYPE PEER_MTU IMPORT_CUSTOM_ROUTES EXPORT_CUSTOM_ROUTES UPDATE_STRATEGY STATE STATE_DETAILS cci-virginia cci ke526b767340356b7p-tp transport-b52816f13d929baf-vpc IPV4_ONLY 8896 True True INDEPENDENT ACTIVE [2026-01-22T07:20:58.891-08:00]: Connected.
To list routes for a specific transport, use the
gcloud compute networks peerings list-routes command.
gcloud compute networks peerings list-routes TRANSPORT_NAME \
--direction=INCOMING \
--network=NETWORK \
--region=REGION
Replace the following values:
TRANSPORT_NAME: the name of the transport resourceNETWORK: the name of the VPC network that you want to list the route tables forREGION: the region of the transport resource
The output is similar to the following:
DEST_RANGE TYPE NEXT_HOP_REGION PRIORITY STATUS 10.0.0.0/16 DYNAMIC_PEERING_ROUTE us-east4 0 accepted
API
To list peered networks, use the
compute.networks.list method.
GET https://compute.googleapis.com/compute/v1/projects/PROJECT/global/networks
Replace PROJECT with the name of the project that you
want to list the networks for.
To list routes, use the
compute.routes.listPeeringRoutes method
GET https://compute.googleapis.com/compute/v1/projects/PROJECT/global/networks/NETWORK/listPeeringRoutes
Replace the following values:
PROJECTwith the name of the project that you want to list the routes forNETWORK: the name of the VPC network that you want to list the route tables for
What's next
- To find answers to common questions about Cloud Interconnect architecture and features, see the Cloud Interconnect FAQ.
- To find out more about Cloud Interconnect, see the Cloud Interconnect overview.
- To learn about best practices when planning for and configuring Cloud Interconnect, see Best practices.
- To find Google Cloud resource names, see the
Cloud Interconnect APIs.