IBM Cloud private connectivity offerings

This white paper explores how to establish a private connection to IBM Cloud by using various network topologies.

Introduction

These network topologies enable secure, high-performance connectivity between on-premises infrastructure and IBM Cloud resources. The following options are available:

  • Direct Link Dedicated - Single tenant connection to IBM Cloud Point of PresencesA physical location that stores servers and routers in a network cloud. (PoPs)
  • Direct Link Connect - Multi-tenant service provider connection to IBM Cloud PoPs
  • VPN (site-to-site) - VPN tunnel from on-premises firewall to IBM Cloud VPN
  • VPN (client-to-site) - VPN tunnel from laptop to IBM Cloud VPN
  • Satellite Connector - A layer-7, endpoint-oriented connection from IBM Cloud to access on-premises data source.

Private connectivity resources within IBM Cloud can be achieved with Transit Gateway (private backbone).

IBM Cloud Overview
IBM Cloud Private Connectivity Overview

Required skills for system administrators

Creating network connectivity in IBM Cloud is a critical task for network administrators. It allows you to connect your on-premises networks to the cloud, as well as connect different resources within the cloud itself. However, creating network connectivity can be a complex task, and it requires a number of different skills.

Administrators who need to create network connectivity in IBM Cloud should have a strong understanding of the following topics:

  • IP addressing and routing
  • Cloud networking concepts
  • IBM IBM Cloud networking services

Administrators should also be familiar with the following tools and technologies:

  • The IBM Cloud console
  • The IBM Cloud CLI
  • The IBM Cloud SDKs
  • Network monitoring and debugging tools

IBM Cloud offering descriptions and key differentiators

IBM Cloud offers the following private connectivity services.

Direct Link Dedicated

The IBM Cloud Direct Link solution seamlessly connects your on-premises resources to your cloud resources, through a single-tenant, fiber-based, cross-connect terminated connection. This offering is also used by colocation facilities that are next to IBM Cloud PoPs and data centers.

  • Private access to IBM Cloud using dedicated infrastructure.
  • High cost for dedicated connectivity with increased bandwidth options.
  • Single-tenant solution for maximum throughput.
  • Optimal for large or frequent data transfers.

Learn more

Direct Link Connect

Direct Link Connect uses a service provider to quickly establish and deliver connectivity to IBM Cloud locations. These service providers are already connected to the IBM Cloud network, and use multi-tenant, high capacity links (also known as network-to-network interfaces, or NNI).

  • Private access to IBM Cloud using shared infrastructure.
  • Moderate cost, private and secure, shared infrastructure, and fast deployment.
  • Ideal for multicloud environments with your server provider’s network.
  • Virtual connectivity for rapid provisioning.

Learn more

Transit Gateway

Use IBM Cloud Transit Gateway to interconnect IBM Cloud resources and Virtual Private Cloud (VPC) infrastructures worldwide, keeping traffic within the IBM Cloud network.

  • Deliver your applications around the world, with global routing across the IBM Cloud network.
  • Simplify your network and build applications — without managing a distributed network.
  • Scale and share IBM Cloud services  like IBM classic infrastructure resources and IBM VPCs.
  • Keep traffic within the IBM Cloud network without traversing the public internet.

Learn more

VPN (site-to-site gateways)

You can use the IBM Cloud VPN for VPC service to securely connect your Virtual Private Cloud (VPC) to another private network. Use a static, route-based VPN, or a policy-based VPN to set up an IPsec site-to-site tunnel between your VPC and your on-premises private network or another VPC.

  • Protocol suite that provides secure communication between devices.
  • Low-cost, pay-as-you-go pricing
  • Configurable mechanism to detect the availability of an IPsec peer.
  • Internet Key Exchange (IKE) is a part of the IPsec protocol that is used to establish VPN connections.
  • Perfect Forward Secrecy (PFS) ensures that DH-generated keys aren't used again during IPsec renegotiation.
  • Supports a pre-shared key for Phase 1 peer authentication. Supported authentication algorithms for both phases include SHA-256, SHA-384, and SHA-512.

Learn more

VPN (client-to-site servers)

Client VPN for VPC provides client-to-site connectivity, which allows remote devices to securely connect to the VPC network using an OpenVPN software client. This solution is useful for telecommuters who want to connect to the IBM Cloud from a remote location, such as a home office, while still maintaining secure connectivity.

  • Multi-factor client authentication.
  • Provides added layers of security with integrated authentication methods.
  • Low cost, pay-as-you-go pricing.
  • Availability in all MZRs' worldwide.
  • Supports both stand-alone (pilot) and high availability (production) deployments.
  • High availability spanning across zones, providing better performance and resiliency.
  • TLS 1.2 / 1.3-based secure or encrypted connectivity over the internet.

Learn more

Satellite Connector

Satellite Connector provides a lightweight solution for IBM Cloud services to reach out to on-premises data sources. If bidirectional communication is needed, or Cloud services to be deployed on the client on-premises, refer to a Satellite Location.

  • Provides client-owned L7 endpoints for IBM Cloud services to access data on the client premise, rather than bridging on-premises networks with cloud like a VPN.
  • Allows you to use your AWS, Azure, Google Cloud infrastructure, your on-premises hardware, or purchase from IBM/IBM partners.
  • Uses internet or Direct Link for transport.
  • Operated as-a-service by IBM.
  • Use a single dashboard to centralize observability and management across all locations.
  • Extend access policies, logging, monitoring, and other controls to all locations.
  • Low cost, pay-as-you-go pricing without bandwidth capacity limitations.

If bidirectional communication is needed or the ability to deploy IBM Cloud services on your on-premises or other cloud infrastructures are required, a Satellite Location provides more capabilities. For more information, see Understanding Satellite location and hosts.

Learn more

Offering comparisons

Pricing

There are many factors to consider regarding pricing, such as peer configurations, dependent offerings, local providers. For example, a VPN site-to-site gateway or a VPN client-to-site server does not charge for an extra floating IP, and the pricing is also location-based.

To calculate pricing for IBM Cloud offerings, use the IBM Cloud cost estimator.

Pricing comparison
IBM Cloud service High cost Medium cost Low cost
Direct Link Dedicated Checkmark icon
Direct Link Connect Checkmark icon
Transit Gateway Checkmark icon
VPN (site-to-site) Checkmark icon
VPN (client-to-site) Checkmark icon
Satellite Connector Checkmark icon

Connectivity

  • Direct Link Dedicated: Connect VPC networks directly with physical connections.
  • Direct Link Connect: Connect VPC networks through intermediate partner networks.
  • Transit Gateway: Connect resources deployed in your VPC virtual networks with an Availability Zone (AZ) and between AZs.
  • VPN (site-to-site): Connect private networks with private connectivity over the internet.
  • VPN (client-to-site): Host a VPC network with private connectivity over the internet.
  • Satellite Connector: Connect with secure TLS 1.3 endpoint-oriented communications over the internet or Direct Link.

Latency and bandwidth

Direct Link offerings have the lowest latency followed by Satellite and VPN offerings. Latency is highly dependent on location.

Bandwidth:

  • Direct Link Dedicated: Speeds up to 10 Gbps.
  • Direct Link Connect: Speeds up to 5 Gbps.
  • Transit Gateway: Speeds up to or in excess of 10 Gbps.
  • VPN (site-to-site): Stand-alone mode up to 600 Mbps; High availability up to 1200 Mbps.
  • VPN (client-to-site): Speeds up to 650 Mbps.
  • Satellite Connector: Limited by client connectivity; maximum speed less than 1000 Mbps.

Provisioning time

Provisioning time includes completing names and configuration parameters, as well as other dependencies and prerequisites.

  • Direct Link Dedicated: 5-30 days
  • Direct Link Connect: 3-5 days, depending on your provider (Provisioning on the IBM side is the same day.)
  • Transit Gateway: 20-55 minutes
  • VPN (site-to-site gateways): 20 minutes to one hour
  • VPN (client-to-site servers): 20 minutes to one hour
  • Satellite Connector: 10 minutes

Security and data encryption

All solutions that are listed are private and secure. For more information, see Security and data encryptions in the Reference section for each service.

Resiliency

Solutions are diverse. To establish true redundancy, you must implement multiple connections to ensure that your solution meets your resiliency needs.

Monitoring and logging

Private connectivity options use various tools for monitoring and logging.

Monitoring and logging comparison
IBM Cloud service Monitoring Logging
Direct Link Dedicated Route reports Activity Tracker
Direct Link Connect Route reports Activity Tracker
Transit Gateway IBM Cloud Monitoring Activity Tracker
VPN (site-to-site) IBM Cloud Monitoring IBM Log Analysis
VPN (client-to-site) IBM Cloud Monitoring IBM Log Analysis
Satellite Connector IBM Cloud Monitoring Activity Tracker

IBM Log Analysis

Deployment considerations

When planning your network architecture, it's important to consider the deployment factors to ensure optimal performance, reliability, and cost-effectiveness.

Transit Gateway deployment considerations

Here are some deployment considerations to review when choosing Transit Gateway.

Part 1: Transit Gateway planning considerations
Deployment consideration Action
Have you decided which Transit Gateway location to use?
Do you want to use local or global routing? Your choice depends on where the networks to be connected are located. Learn more
Have you addressed any overlapping routes in the connected networks? Overlapping routes are a common issue when configuring a transit gateway. If the routes from two or more connections overlap, traffic might not be routed as intended. Learn more
Are there routes that you don't want advertised over the transit gateway? Do you need to create prefix filters?
Have you considered what connection type you plan to use?
For a GRE tunnel or unbound GRE tunnel, have you configured redundant tunnels for high availability? There's no out-of-the-box redundancy with either GRE connection type. You must configure two GREs in different zones advertising the same routes to get redundancy. Learn more

Related link: Planning for IBM Cloud Transit Gateway

Site-to-site VPN deployment considerations

Here are some deployment considerations to review when choosing a VPN for VPC.

Part 1: Site-to-site VPN deployment considerations
Deployment consideration Action
Which IBM Cloud region do you plan to deploy the VPCs? The regions might be closest to your on-premises site.
What subnets in the VPC need to be connected through the VPN? Make sure that there's enough space in the subnet for the gateway.
Is there a requirement to separate connectivity between your VPN and your resources, such as the virtual server instances into VPCs?
How are your virtual server instances distributed in the VPC? VPN gateway is created in the zone that is associated with the subnet that you select and can be used to connect to virtual servers in the same zone. For zone fault tolerance, you can deploy one VPN gateway per zone.
Do you need your on-premises network to access service endpoints through your site-to-site connectivity option?
Do you have resources in IBM Cloud on Classic that you need to access through VPN or another connectivity option?
Do you have a peer VPN gateway or router (or multiple gateways/routers) setup on-premises? If yes, what is the type or model of that gateway? If your peer gateway enforces Perfect Forward Secrecy (PFS), you need to set custom policies.
What will be the CIDRs on-premises? Note that local (VPC) and peer (on-premises) subnets of a VPN gateway connection should not overlap or conflict. /
The local (VPC) subnet is specified when you create the VPN Gateway. For more information, see working with Working with subnets in VPC.
Is your VPN gateway on-premises behind a firewall doing Network Address Translation (NAT)?
Do you need the VPC resources to access the internet through VPN? Do you want any IP range to be blocked?

Performance and other things

Here are some site-to-site connectivity deployment considerations and actions.

Part 2. Site-to-site connectivity performance and other things
Deployment consideration Action
What is the desired throughput of the site-to-site connectivity option (that is, Direct Link or VPN)? Is there a peak hour, month, or season?
Site-to-site VPN supports up to 650 Mbps of throughput. Direct Link supports a much higher bandwidth up to 5 Gbps or 10 Gbps depending on your configurations.
What is your expected cost for the connectivity option?
Site-to-site VPN uses a usage-based pricing that can be estimated by using the Cost Estimator. Direct Link has multiple pricing plans, varies by provider, and has higher cost. See [Direct Link Dedicated] (/docs/private-connectivity?topic=private-connectivity-reference-direct-link-dedicated) and Direct Link Connect for more information.

Client-to-site VPN deployment considerations

Here are some deployment considerations to review when choosing Client VPN for VPC.

Part 1. Client-to-site VPN deployment considerations
Deployment consideration Action
Do you need your individual users to have private and secure access (client-to-site servers) to your VPC resources from anywhere (for example, the airport, a hotel, or from home)? If yes, where are these users located?
Do you need your individual users to access service endpoints through your client-to-site VPN? These endpoints securely connect to IBM Cloud services over the IBM Cloud private network.
Client-to-site VPN is integrated with Secrets Manager for server authentication. Are you familiar with Secrets Manager and do you have an existing public/imported/private certificate with your Secrets Manager instance?
Client-to-site VPN supports three types of client authentication: a client certificate, added security with a user ID and passcode, or both. Which will be your preferred way of authenticating your users? Client certificate / User ID/passcode / Both
Do you use client-to-site VPN for critical workload that requires a multi-zone deployment, or a pilot where multi-zone deployment is not a must?
Do you need the VPN server to do SNAT making your VPN client IP invisible to the destination devices?

Performance and other things

Here are some client-to-site connectivity deployment considerations and actions.

Part 2. Client-to-site performance and other things
Deployment consideration Action
If you need individual access to VPC (client-to-site connectivity) from remote, how many users can be connecting to VPC concurrently through VPN?
What is your expected cost for the connectivity option?

Client-to-site VPN uses usage-based pricing that can be estimated by using the Cost Estimator.

Direct Link has multiple pricing plans, varies by provider, and has higher cost. See Direct Link Dedicated and Direct Link Connect for more information.

Satellite Connector deployment considerations

Here are some deployment considerations to review when choosing a Satellite Connector.

Satellite Connector deployment considerations
Deployment consideration Action
Do you need a lightweight, secure tunnel or gateway from IBM Cloud back to your on-premises environment? If this describes your use case, see Satellite Connector overview.
Still, not sure which solution fits your use case? See more detailed Satellite Location use cases or the Satellite Connector capability comparison with Secure Gateway.
Do you need to initiate communications from your on-premises to IBM Cloud? In this case, a Satellite Location is required instead of a Satellite Connector.
Do you need to route networks between your on-premises and IBM Cloud? If so, consider a VPN or Direct Link connection.
Do you also need to run IBM Cloud services like Red Hat OpenShift on your own infrastructure, another cloud provider infrastructure, or on the edge? If this describes your use case, see Understanding Satellite locations and hosts.

Use cases

Explore typical scenarios where the connectivity method is most effective.

Direct Link Connect use cases

  • Primary use cases include transactional data exchange across business-critical application workloads with moderate to high volume and low latency requirements.
  • Other use cases include on-demand or scheduled, real-time, near-real-time high volume batch data transfers between applications, such as for analytical processing, archiving, or replication.
  • Application data exchange is done via RESTful APIs or TCP host/ports for synchronous/real-time calls between systems and components.
  • Data transfers usually is done using sophisticated data migration and data replication applications.

Connecting to VPC by using Direct Link Connect

Direct Link is a hybrid cloud connectivity service providing secure, private, high-bandwidth connectivity between customer on-premises and IBM Cloud resources. Paired with Power Systems Virtual Servers and IBM Cloud Transit Gateway, Direct Link offers options for high-bandwidth customer demand.

For Direct Link Connect use cases, see Using service provider networks to virtually reach IBM Cloud and Other Cloud Service Provers (CSPs) or enterprises.

For use cases with Power Systems Virtual Server, see Network architecture diagrams.

Transit Gateway use cases

As the number of your Virtual Private Clouds (VPCs) grows, you need an easy way to manage the interconnection between these resources across multiple regions. IBM Cloud Transit Gateway is designed specifically for this purpose.

With IBM Cloud Transit Gateway, you can create single or multiple transit gateways to connect VPCs together. You can also connect your IBM Cloud classic infrastructure to a transit gateway to provide seamless communication with classic infrastructure resources. Any new network that you connect to a transit gateway is then automatically made available to every other network connected to it. This makes it easy to scale your network as it grows.

Transit gateways provide flexibility by allowing you to add networks to local gateways. Networks can be attached to multiple local gateways and a single global gateway, enabling you to keep local traffic on a local gateway.

Connecting two Power Virtual Server environments by using IBM Cloud Transit Gateway

In this deployment topology, a connection through IBM Cloud Transit Gateway is used to provide connectivity between Power virtual server environments at two different data centers. With IBM Cloud Transit Gateway, you can also interconnect your Power Virtual Servers to the IBM Cloud classic and VPC infrastructures, keeping traffic within the IBM Cloud network. Transit Gateway enables you to connect your otherwise disconnected private networks, such as classic, VPC, and Direct Link. In addition, you can establish connection between multiple Power Virtual Server workspaces across different data centers.

The following network architecture allows connectivity between multiple Power Virtual Server locations with high availability (HA) and disaster recovery (DR) solutions.

Transit Gateway deployment scenario
Transit Gateway use case

Key features are as follows:

  • Access and connectivity between two different Power Virtual Server locations in the same region (for example DAL12 to DAL13) to support HA through replication.
  • Access and connectivity between two different Power Virtual Server locations in different regions (for example DAL12 to WDC06) to support DR through replication.

With local routing you can only connect PERs in the same region as the Transit Gateway, while PERs in a different region require global routing.

Complete the following steps to implement this scenario:

  1. Create an IBM Cloud Transit Gateway to enable the virtual connections.
  2. Create an IBM Cloud connection with Transit Gateway enabled.
  3. Connect your Power Virtual Servers that are located in data center 1 and data center 2 through the IBM Cloud network by using a transit gateway.

After the transit gateway connection is established, different IBM Cloud networks are connected to each other.

Related link: Transit Gateway interconnectivity patterns

Site-to-site VPN use cases

Primary use cases include administrative remote access to various hosts across the cloud. Other use cases include low to moderate volume transactional or batch data exchange across business-critical application workloads tolerant to higher latency applications.

  • Direct administrative access to hosts on the cloud is accomplished with jump servers, SSH, remote desktop protocol, and so on.
  • Application data exchange is accomplished through RESTful APIs or TCP host/ports for synchronous/real-time calls between systems and components.
  • Data transfer is accomplished using SFTP or simple data migration applications.

Site-to-Site VPN for secure connectivity using a policy-based VPN

Traffic that matches negotiated CIDR ranges passes through a policy-based VPN. You can use policy-based VPN gateways and ingress routing to forward POWER incoming traffic from transit gateways to your on-premises network. VPC 1 adds an on-premises CIDR as the VPC address prefix to allow route propagation.

Site-to-site VPN use case
Site-to-site VPN use case

Related link: VPN for VPC use cases

Client-to-site VPN use cases

Primary use cases include ad hoc or on-demand connectivity for low volume administrative remote access from a client host to hosts on a VPC network. Other use cases include ad hoc or on-demand low volume batch data transfers from a client host to hosts on a VPC network. These connections are tolerant to higher latency.

  • Direct administrative access to hosts on the cloud is accomplished using jump servers, SSH, remote desktop protocol, and so on.
  • Data transfer is accomplished using SFTP or simple data migration applications.

Client-to-site VPN for secure connectivity

With Client VPN for VPC (client-to-site VPN) you can securely connect from remote devices to the IBM Cloud network using an OpenVPN client.

To access the resources in VPC1, in your routing table set Accept routes from to VPN server to allow route propagation by the VPN server.

To access resources in the POWER VM, in your routing table, create a VPN server route with the POWER network as the destination using the Translate action. This translates the source IP to the VPN server's private IP, making your VPN client IP invisible to the destination in the POWER network.

Client-to-site VPN use case
Client-to-site VPN use case

Related link: VPN server use cases

Satellite use cases

  • A Satellite Connector is a lightweight resource that provides secure TLS tunneling from IBM Cloud applications and services to your on-premises resources.

  • A Satellite Location expands on a Satellite Connector's capabilities by adding the ability for cloud services to be delivered on-premises, such as a managed Red Hat OpenShift on-premises or managed database on-premises. It also allows for communications originating from on-premises to resources inside of IBM Cloud.

Related link: Satellite Connector use cases

Provisioning walk-throughs

Use the walk-throughs to understand the provisioning process for the connectivity method.

Direct Link Dedicated provisioning walk-through

Direct Link Dedicated requires that you install an edge router (CER) to physically connect to the IBM cross-connect router (XCR) in the meet me room (MMR) at the IBM Cloud location. The setup is initiated by requesting an LOA/CFA from IBM to proceed.

You are issued a letter of authorization (LOA) that allows you and your service provider to work with the IBM Cloud site manager to install the CER. The site manager then provides a completion notice indicating that the install happened. This completion notice is approved by the IBM Implementation team for accuracy. After which, the team will ensure IBM side Layer-1 connectivity.

After there is compete Layer-1 connectivity (customer and IBM side), and the direct link is configured on the XCR and cross-connect switch (XCS), the provisioning process is complete. The direct link is now able to establish the boarder gateway protocol (BGP) session between the CER and XCR.

You must have your Direct Link planned and built out before ordering a dedicated direct link to prevent delays. The Dedicated Direct Link physical demarcation is a Patch page Port. It is up to the client to build to the Patch page Port. If this is the first Direct Link order or is a new order into a new region, please allow yourself plenty of time. Depending on where your network's Points Of Presence (PoPs) are, it can take 20 to 40 days to build out to an IBM site.

When all prerequisites are met, the Direct Link Dedicated provisioning process takes approximately 4 weeks to complete. The provisioning process is as follows:

  1. 1 day - Read planning considerations and order a Dedicated direct link. For instructions, see Ordering IBM Cloud Direct Link Dedicated.

  2. 1 day - You receive a letter of authorization (LOA), which allows your service provider to order and set up the cross-connect for your direct link. You are notified when the LOA becomes available for review on the IBM Cloud console.

  3. Depends on customer - Review the LOA with your service provider for accuracy and accept it. If anything is incorrect, discuss your concern with the IBM implementation team directly through this case.

    If the LOA is incorrect, or you have any questions, open a case with IBM Support case, upload your concerns or questions to the case.

  4. Depends on-site provider - Give the approved LOA to your service provider. Work with your service provider to set up the cross-connect within your chosen IBM Cloud location.

  5. Depends on customer - Upload the completion notice received from your service provider on the IBM Cloud console. Ensure that your physical connection is patched down between the device and patch page. Also, check to make sure you're sending light to IBM. For more information, see How do I troubleshoot a Direct Link Dedicated connection during activation? and this completion notice example.

  6. 1-2 days - The IBM Implementation team reviews the completion notice to ensure that it aligns with the LOA. If the completion notice is rejected, you are notified through an existing case or via the Direct Link console.

  7. 1-4 days - The IBM implementation team checks Layer-1 connectivity between the cross-connect router (XCR) and the Edge router and begins the patch cable installation process to established Layer-1 connectivity.

  8. 1-4 days - After the cross-connect completion notice is accepted, the patch cable installation between the IBM Cloud device to the patch page begins.

    Some DC sites cannot work on the patch cable installation process until they receive management approval.

After connectivity is established successfully, your gateway moves to Provisioned status. Then, this case is closed. For further assistance with your direct link, contact IBM Support.

Direct Link Connect provisioning walk-through

Use a service provider to quickly establish and deliver connectivity to IBM Cloud locations. A service provider is already connected to the IBM Cloud network via multi-tenant, high-capacity links, also known as a network-to-network interface (NNI). Typically, you can purchase a virtual circuit at this provider, establishing connectivity in a rapid manner because the physical connectivity from IBM to the service provider is already in place.

This offering is ideal for multicloud environments with your service provider's network.

Depending on your service provider, the Direct Link Connect provisioning process takes approximately 3 to 5 business days to complete. Provisioning on the IBM side is completed the same day. The provisioning process is as follows:

IBM Cloud highly recommends that a second, diverse direct link be established to prevent outages, whether unplanned or planned due to maintenance.

  1. 1-2 days - Contact your service provider. Determine the location to IBM Cloud by verifying your provider capabilities to reach IBM Cloud over partner interconnects known as NNIs.

  2. 1-2 days - Read planning considerations and order Direct Link Connect. For instructions, see Ordering Direct Link Connect.

    The IBM side is provisioned immediately after submitting your order in the IBM Cloud console.

  3. After you submit your order, contact your service provider and negotiate connectivity to your environment, whether it is on-premises or in colocation.

  4. Contact your provider for provisioning time - Order a virtual circuit through the service provider. Reference the case ID of the Direct Link Connect request as your Request ID or Authorization ID.

  5. Contact your provider for provisioning time - Configure the BGP parameters on your Edge router for BGP session establishment. After this completes, the BGP status indicates Established.

After connectivity is established successfully, your gateway moves to Provisioned status. Then, this case is closed. For further assistance with your direct link, contact IBM Support.

Transit Gateway provisioning walk-through

Use IBM Cloud Transit Gateway to interconnect IBM Cloud resources and Virtual Private Cloud (VPC) infrastructures worldwide, keeping traffic within the IBM Cloud network.

The provisioning process takes approximately 20-55 minutes to complete. The provisioning process is as follows:

  1. 5-10 mins - Review Planning for IBM Cloud Transit Gateway and plan the networks to be connected.
  2. 5-20 mins - Create a transit gateway.
  3. 5-20 mins - Add desired network connections to the transit gateway. These can be added while the gateway is still provisioning.
  4. 5 mins - Verify that you can ping between networks via the transit gateway.

Site-to-site VPN provisioning walk-through

You can use the IBM Cloud VPN for VPC service to securely connect your Virtual Private Cloud (VPC) to another private network. Use a static, route-based VPN, or a policy-based VPN to set up an IPsec site-to-site tunnel between your VPC and your on-premises private network or another VPC.

The provisioning process takes approximately 20 minutes to one hour to complete. The provisioning process is as follows:

  1. 10 mins - Review planning considerations for VPN gateways and plan for local/remote CIDRs. Also, review VPN gateway limitations and configuration information, such as IKE policies, mode.
  2. 10 mins - Create a VPN gateway using the IBM Cloud console or with the CLI and API. Review ACLs and security groups.
  3. 5-10 mins, depending on the gateway type - Make sure that your peer device supports NAT traversal and that it is enabled on the peer device.
  4. 5 mins - Create a VPN gateway.
  5. 5 mins - Create VPN connections.
  6. 5 mins - For static, route-based VPNs, select or create a routing table for static routing, then create routes by using the VPN connection type.
  7. 10-20 mins, depending on the gateway type - Connect to an on-premises network through a VPN tunnel.
  8. 5 mins - Verify that your VPN connection is available by sending ping or data traffic across the tunnel to devices that are on the peer network.

Client-to-site VPN provisioning walk-through

Client VPN for VPC provides client-to-site connectivity, which allows remote devices to securely connect to the VPC network using an OpenVPN software client. This solution is useful for telecommuters who want to connect to the IBM Cloud from a remote location, such as a home office, while still maintaining secure connectivity.

The provisioning process takes approximately 20 minutes to one hour to complete. The provisioning process is as follows:

  1. 10 mins - Review planning considerations for VPN servers and decide which VPN client authentication that you want to use: certificate-based, user ID and passcode, or both. For more information, see Setting up client-to-site authentication.

  2. 10 mins - For user ID and passcode authentication only, create an IAM access group and grant users the role to connect to the VPN server.

  3. 15 mins - Create a Secrets Manager instance and import certificates.

  4. 10 mins - Create a VPC. Optionally, configure security groups and ACLs for use with VPN.

    Notes:

    • For a high available VPN server, create a VPC and two subnets in two different zones.
    • For a stand-alone VPN server, create a VPC and one subnet in one zone.
    • Ensure your security groups and ACLs allow VPN traffic.
    • When creating a new VPC, the default security group that is attached only allows ICMP and SSH communications. Ensure that you add an inbound rule for client-to-site VPN traffic in this security group.
  5. 5 mins - For server authentication only, create IAM service-to-service authorization.

  6. 5 mins - Create a VPN server and validate status.

  7. 5 mins - Create VPN routes.

  8. 10 mins - Set up a VPN client environment and connect to the VPN server.

Satellite Connector provisioning walk-through

Satellite Connector provides secure TLS tunneling from IBM Cloud applications and services to your on-premises applications.

Reference

Reference for understanding the key aspects of connectivity and implementation.

Transit Gateway

This topic provides additional information on the Transit Gateway offering.

Pricing

To calculate pricing for IBM Cloud offerings, use the IBM Cloud cost estimator.

  • Moderate cost
  • Costs are derived from the number of networks connected to the gateway, is the gateway that is enabled for local or global routing, volume of traffic through the gateway, and so on.

Connectivity

IBM Cloud provides:

  • A private backbone for all connectivity between resources deployed in your VPC virtual networks with an AZ and between AZs (this backbone is separate from the public backbone for connectivity using public addressing). IP addresses on the private backbone are non-internet routable, or not announced toward the public backbone or the internet. The private backbone is owned, managed, and operated exclusively by IBM Cloud.
  • IBM Cloud Transit Gateway uses this private backbone exclusively for connectivity between your virtual networks within a single region, across multiple regions, and to your IBM Cloud classic workloads.

Transit gateways connect:

  • VPCs in the same region (local routing)
  • VPCs in different regions (global routing)
  • VPCs to your IBM Cloud classic infrastructure
  • Networks using a Generic Routing Encapsulation (GRE) tunnel
  • On-premise networks using Direct Link to your IBM Cloud networks

Latency and bandwidth

  • Reliable, high throughput, purely contained within the Cloud network.
  • Can traverse multiple regions if connecting networks in disparate locations.
  • Speeds up to or in excess of 10 Gbps.

Provisioning

With IBM Cloud Transit Gateway, you can connect:

  • VPCs in the same region (local routing)
  • VPCs in different regions (global routing)
  • VPCs to your IBM Cloud classic infrastructure
  • Networks using a Generic Routing Encapsulation (GRE) tunnel
  • On-premise networks using Direct Link to your IBM Cloud networks
  • Ordered and configured through IBM Cloud UI, CLI or API.

Related links:

Security and data encryption

  • Workload data transmitted across the network connections is not encrypted by the provider and is the customer's responsibility.
  • Encryption is highly recommended and can be achieved at application level, for example with TLS encryption between the application client/severs.
  • The offering configuration and control data is encrypted in-transit and at-rest at the database level. Learn more

Resiliency

IBM Cloud Transit Gateway is highly available within any IBM Cloud location (for example, Dallas or Washington, DC). However, recovering from disasters that affect an entire location requires planning and preparation.

You are responsible for understanding your configuration, customization, and usage of the service. You are also responsible for being ready to re-create an instance of the service in a new location and restore your data in a new location.

Related links:

Monitoring and logging

Transit Gateway log analysis

You can use the Activity Tracker service to track how users and applications interact with Transit Gateway in IBM Cloud.

IBM Cloud Activity Tracker records user-initiated activities that change the state of a service in IBM Cloud. You can use this service to investigate abnormal activity and critical actions and to comply with regulatory audit requirements. In addition, you can be alerted about actions as they happen. The events that are collected comply with the Cloud Auditing Data Federation (CADF) standard. For more information, refer to Auditing events for IBM Cloud Transit Gateway.

Transit Gateway metrics monitoring

You can generate a report of all routes known to a gateway and its connections. This report allows you to verify the expected routes, view what connections are contributing which routes to your gateway, and see BGP information on routes received. This report contains routes from same account networks, and from networks connected using the cross-account connection capability. For more information, refer to Generating a Transit Gateway route report.

Site-to-site VPN

This topic provides additional information on the VPN for VPC offering.

Pricing

To calculate pricing for IBM Cloud offerings, use the IBM Cloud cost estimator.

  • Low cost, pay-as-you-go pricing
  • Costs are typically associated with the type of VPN gateway, usage hours, connection hours, and public IP addresses, volume of data egress from VPC through the gateway, and so on.

Connectivity

  • Connect private networks with private connectivity over the internet.
  • The cloud provider's internet service provider (ISP) provides connection to the internet.
  • The connection is shared with internet users, is private and encrypted, and uses a secure tunnel.

Latency and bandwidth

  • Susceptible to the inherent variability in internet connectivity, latency, and bandwidth fluctuations.
  • Connection path might not be the shortest and might also traverse multiple hops, resulting in higher latencies.
  • Latency can be minimized if the data center location where the VPN host and server are provisioned are geographically close (in the same region).
  • Maximum limits usually apply to throughput capacity, depending on the cloud provider's VPN offering.
  • The IBM Cloud offerings provide two options - stand-alone (up to 600 Mbps) and HA (up to 1200 Mbps).

Provisioning

  • Requires VPN gateways deployed on each peer VPC network. VPNs use network connectivity resources from cloud service provider's ISPs that connect the public clouds and VPCs to the internet.
  • Most cloud providers offer VPN-as-a-service: self-service provisioning of the VPN gateway and connections to establish secure private connection.
  • Provides flexibility to make changes by adding/removing connections quickly and by modifying subnets included in the tunnel.

Related links:

Security and data encryption

  • Uses IPsec secure encrypted tunnel between networks exchanging workload data; uses Internet Key Exchange (IKE) encryption, and Pre-Shared Key (PSK) authentication.
  • Appropriate access controls and network ports must be configured on the VPC networks for applications to communicate with each other. Learn more (Search for VPN in this link.)

Resiliency

  • Depends on the VPN cloud offering. Typically, two VPN gateways are provisioned in the same availability zones and provide appliance-level redundancy/HA.
  • Appropriate selection of locations can help in planning for HA/DR.
  • IBM Cloud VPN gateway consists of two back-end instances in the same zone for high availability. Recommended to provision a gateway in each availability zone for zone fault tolerance.

Related link: VPN gateway high availability

Monitoring and logging

VPN (site-to-site) gateways use a combination of IBM Log Analysis and IBM Cloud Monitoring for log analysis and metrics monitoring.

Site-to-site log analysis

You can use IBM Log Analysis to view application and connection logs from your IBM Cloud VPN (site-to-site) for VPC. IBM Log Analysis offers administrators, DevOps teams, and developers advanced features to filter, search, and tail log data, define alerts, and design custom views to monitor application and system logs.

For more information, refer to Using IBM Log Analysis to view VPN logs.

Site-to-site metrics monitoring

IBM Cloud Monitoring collects basic VPN metrics on IBM Cloud for VPC, such as VPN gateway status, VPN gateway packets input/output, and VPN connection bytes input/output. These metrics are stored in IBM Cloud Monitoring. You can access metrics through the prebuilt dashboard.

For more information, refer to Monitoring VPN gateway for VPC metrics.

Related link: VPN gateway events

Client-to-site VPN

This topic provides additional information on the Client VPN for VPC offering.

Pricing

To calculate pricing for IBM Cloud offerings, use the IBM Cloud cost estimator.

  • Low cost, pay-as-you-go pricing
  • Costs are typically associated with the type of VPN server, usage hours, aggregated connection hours, and public IP addresses, volume of data egress from the VPC, and so on.

Connectivity

  • It connects a client host to a VPC network with private connectivity over the internet.
  • The cloud provider's internet service provider (ISP) provides connection to the internet.
  • The connection is shared with internet users, is private and encrypted, and uses a secure tunnel.

Latency and bandwidth

  • Susceptible to the inherent variability in internet connectivity, latency, and bandwidth fluctuations.
  • Connection path may not be the shortest and may traverse multiple hops, resulting in higher latencies.
  • Latency can be minimized if the data center location where the VPN gateways are provisioned are geographically close (in the same region).
  • Maximum limits usually apply to throughput capacity, depending on the cloud provider's VPN offering.
  • This IBM Cloud offering provides speeds up to 650 Mbps.

Provisioning

  • Requires the provisioning of a VPN server on the VPC network; The VPN uses network connectivity resources from cloud service provider's ISPs that connect the public clouds and VPCs to the internet. VPN client software (OpenVPN) is required on the client host to connect to the VPN server and its network.
  • Most cloud providers offer VPN-as-a-service: self-service provisioning of VPN server and connections to establish secure private connection. For a client-to-site VPN, a software client must be installed.
  • Provides a flexible host to network connectivity and quick provisioning.

Related links:

Security and data encryption

  • Uses TLS 1.2/1.3 encryption
  • Multi-factor authentication can be applied to VPN server and client connections to provide an added layer of security to meet compliance and security requirements.

Related link: Securing your environment with VPN server

Resiliency

  • Depends on the VPN cloud offering. Typically, two VPN servers are provisioned in different availability zones and provide appliance-level redundancy/HA.
  • An appropriate selection of locations can help in planning for HA/DR. IBM Cloud offering provides two modes:
    • High-availability mode: Deploys the VPN server across two subnets in different zones. Best for multi-zone deployments and solutions where client VPN access is critical.
    • Stand-alone mode: Deploys the VPN server in a single subnet and zone. Best for nonproduction use where multi-zone resiliency is not required.

Related link: Upgrading to an HA VPN server

Monitoring and logging

VPN (client-to-site) gateways use a combination of IBM Log Analysis and IBM Cloud Monitoring for log analysis and metrics monitoring.

Client-to-site log analysis

You can use IBM Log Analysis to view application and connection logs from your IBM Cloud VPN (client-to-site) for VPC. IBM Log Analysis offers administrators, DevOps teams, and developers advanced features to filter, search, and tail log data, define alerts, and design custom views to monitor application and system logs.

For more information, refer to Using IBM Log Analysis to view VPN logs.

Client-to-site metrics monitoring

IBM Cloud Monitoring collects basic VPN metrics on IBM Cloud for VPC, such as VPN gateway status, VPN gateway packets input/output, and VPN connection bytes input/output. These metrics are stored in IBM Cloud Monitoring. You can access metrics through the prebuilt dashboard.

For more information, refer to Monitoring VPN servers.

Related link: VPN server events

Satellite Connector

Provides additional information on the Satellite Connector offering.

Satellite Connector provides a lightweight solution for IBM Cloud services to reach out to on-premises data sources. If bidirectional communication is needed, or Cloud services to be deployed on the client on-premises, refer to Understanding Satellite location and hosts.

Pricing

To calculate pricing for IBM Cloud offerings, use the IBM Cloud cost estimator.

  • Low cost, pay-as-you-go pricing with a single flat rate charge without bandwidth caps.
  • Flat rate per on-premises instance. Satellite locations and connections are priced at the same rate with no additional charges.
  • The client is responsible for on-premises compute/storage/network components and internet connection back to the IBM Cloud MZR.

Connectivity

  • Establishes secure TLS 1.3 endpoint communications over the internet or Direct Link. The client always maintains control over whatever data is transferred.
  • Communications originate outbound from within the client's network for simplified client networking.
  • Unique DNS names for each instance enable tight firewall controls.
  • The client configured unique endpoints for each data transfer at layer 7 of the stack, as opposed to linking L2/L3 networks similar to a VPN.

Latency and bandwidth

  • Fully dependent on the client's underlying internet or Direct Link transport, and is impacted by any bandwidth limitations or latency they might introduce.
  • Connection is made to one of IBM's MZRs. Clients are encouraged to pick the MZR closet to them in terms of network performance.
  • Maximum latency requirements exist between the on-premises hosts for a satellite location. The maximum host-to-host communication at the satellite location is x ms.

Provisioning

  • Ordered and configured through IBM Cloud UI, CLI, or API.
  • Satellite Locations support an on-premises service control plan that operates all local services, and establishes management connectivity with IBM Cloud. This requires three hosts for the HA control plane, plus an additional host to support local management services.
  • Satellite connectors support cloud endpoints that enable communication to the client premises. These require a client-supported docker host (x86), and can also be deployed in redundant and HA configurations.

For deployment options, including redundant and HA patterns, see the Satellite Connector overview.

Related links:

Security and data encryption

  • Uses TLS 1.3 encryption for all communications, with managed key rotation implemented through an IBM Site Recovery Engineer.
  • The client always has control on communication and is able to individually disable and enable any set of endpoints on demand.
  • Client can specify their own encryption for individual endpoints they create, if wanted.
  • Fully supports IAM roles and responsibility assignment to control access and data exposure risk.

Related links:

Resiliency

  • Satellite Locations and Satellite Connectors both support High Availability (HA) deployments across multiple client availability zones.
  • The client premise deployment is the responsibility of the client to deploy across hosts that are logically and physically independent of give the greatest failure resiliency.
  • For resiliency the IBM Cloud infrastructure is deployed across three independent zones, each zone is a separate data center with independent power, cooling, and networking for maximum reliability.

Related links:

Monitoring and logging

IBM Satellite connectivity uses a combination of IBM Log Analysis and IBM Cloud Monitoring for log analysis and metrics monitoring.

  • All operations work through the client's IBM Cloud account, and can be accomplished through the UI, CLI, or API.
  • Solution management is provided by an IBM Cloud Site Reliability Engineer. The client is responsible for their on-premises compute, network, and storage management.
Satellite log analysis

You can use IBM Log Analysis to view application and connection logs for satellite connectivity. IBM Log Analysis offers administrators, DevOps teams, and developers advanced features to filter, search, and tail log data, define alerts, and design custom views to monitor application and system logs. For more information, refer to Logging for Satellite.

Satellite metrics monitoring

IBM Cloud Satellite® comes with basic tools to help you manage the health of your Satellite resources, such as reviewing location and host health. Also, you can integrate Satellite and other IBM Cloud resources with IBM Cloud Monitoring to get a comprehensive view and tools to manage all your resources.

Related links: