Create Workspot Landing Zone Google Cloud Platform (GCP)

Prerequisites

  • An empty Google project dedicated to Workspot IaaS

  • A network CIDR block for Virtual Network configuration. 

  • A supported Identity Provider (such as Microsoft Active Directory, Microsoft Azure Active Directory, OKTA, etc)

  • Connectivity to Microsoft Active Directory or Domain Controller on the VPC

  • A supported operating system for VDI desktops or RD Pools servers

  • Optional network connectivity to on-premises such as Site-to-Site VPN

GCP Project

  • Create a GCP Project that is dedicated to Workspot.

  • Leave everything in the project at the defaults.

  • The GCP project will require Public IPs for the Workspot Managed Gateways.

Networking

  • Create a GCP Virtual Private Cloud (VPC) i.e. ws-gcp-vpc with 3 subnets

    • Gateway Subnet - subnet used to provision or create Workspot managed gateways on, i.e. ws-gcp-subnet-dmz 

    • Management Subnet - subnet used to create Workspot Enterprise Connector on, i.e. ws-gcp-subnet-mgmt  

    • Cloud PC Subnet - subnet used to provision Workspot VDI desktops on, i.e ws-gcp-subnet-vdi  

  • CIDR block example: 10.0.0.0/20

  • The CIDR block cannot overlap with any other CIDR block within the private network when connecting this GCP project to the private network.

  • Provide a large enough block of IP addresses to allow for expansion over time.