Architecture patterns for deploying a third-party router on a VMware Cloud Foundation for Classic - Automated instance
On VMware Cloud Foundation for Classic - Automated instance in IBM Cloud® classic infrastructure, your workloads are deployed and run on VMware NSX™ overlay networks. As part of the deployment, the automation deploys an example NSX topology. You can use the provisioned examples as your base or build your own topologies on overlay. These overlay networks are not automatically advertised to IBM Cloud classic infrastructure network.
VMware Cloud Foundation for Classic - Automated instance is deployed at IBM Cloud classic infrastructure. By default, two IBM Cloud private VLANs and one IBM Cloud public VLAN (optional) are deployed. In addition to the VLANs, NSX T0 Gateway is deployed on them with two interfaces, to private and to public (optional). If you opt for a public, the public uplink interface is attached to your public VLAN and has direct internet access. Your T0's private interface is attached to the private VLAN and it is using IBM Cloud portable private IP.
The architecture patterns give an introduction to connectivity patterns to integrate a third-party router, firewall, or other network device. They run as a virtual appliance on VMware with the standard NSX-based VMware Cloud Foundation for Classic - Automated instance.
Deploying third-party router in gateway cluster
When you deploy a VMware Cloud Foundation for Classic - Automated instance in your IBM Cloud classic infrastructure, you might optionally deploy a gateway cluster. This cluster can host a third-party router or firewall. You can control which VLANs are routed through the router or firewall that is running on it.
The gateway cluster must not be mixed with NSX edge cluster, which consists of NSX edge transport nodes. The gateway cluster provides compute capacity for third-party router or firewalls, and VLAN routing can be controlled by the gateway appliance configuration in IBM Cloud classic network.
This architecture pattern deployment is summarized as follows:
- You can optionally deploy a gateway cluster to host your own routing or firewall device. This cluster is attached to both IBM Cloud private and public networks through transit networks.
- The third-party device can route assigned VLANs through it. You can choose the VLANs to be routed through it on IBM Cloud portal. You must configure the required VLAN interfaces and IP addresses to the devices, and the firewall zones, rules, and policies.
- If you route your management VLAN through the firewall, you can also secure your management workloads, such as vCenter and NSX managers. Ensure that you allow the traffic for your management.
- Your workload T0 is attached to IBM Cloud private network. If you route this VLAN through the firewall, add the required rules on both the firewall and T0.
- Your workload T0 is attached to IBM Cloud public network. If you route this VLAN through the firewall, add the required rules on both the firewall and T0.
- If you need to customize the routing behavior or to establish dynamic routing between your T0 and the third-party device, alter the routes that are deployed by the automation.
Deploying a third-party router or firewall in converged or management clusters
When you deploy a VMware Cloud Foundation for Classic - Automated instance in your IBM Cloud classic infrastructure, you might optionally deploy a Juniper vSRX or host a third-party router or firewall on the converged or management clusters. You can integrate the firewall with your overlay topology in multiple ways, by using the VLAN or NSX overlay, if your firewall supports this.
In this pattern, you cannot control which VLANs are routed through the router or firewall that is running on the firewall.
This architecture pattern deployment is summarized as follows:
- Depending on the network preference selection, your VMware Cloud Foundation for Classic - Automated instance is deployed with both public and private connectivity or private connectivity only.
- You can optionally deploy a gateway cluster to host Juniper vSRX or your own routing or firewall device. In this case, you might put public and private VLANs behind the firewall.
- You can deploy third-party network devices into vCenter Server clusters by bringing in your own license and following the hardware and software guidance as provided by the specific third-party vendor. Discuss the technical details with the vendor.
- You can integrate the third-party network device or a router into using service insertion. With service insertion, you can apply third-party services to north-south traffic and to east-west traffic that passes through a router. The services typically provide advanced security features, such as an intrusion detection system (IDS) or an intrusion prevention system (IPS).
- When you use service insertion and after that you deploy a service instance, you can configure the type of traffic that the router redirects to the service. Configuring traffic redirection is similar to configuring a firewall.
- Alternatively, you can add the device into north-south traffic path and customize the NSX customer topology. Contact your third-party vendor to discuss the wanted network topology, for example, router mode versus transparent.
The following diagram presents the routing topology and routing for this pattern.
This architecture pattern deployment is summarized as follows:
- You can deploy third-party network devices into vCenter Server clusters by bringing in your own license and following the hardware and software guidance as provided by the specific third-party vendor. Discuss the technical details with the vendor.
- You can attach the private interface of the appliance into the IBM Cloud private network by using the IBM Cloud private VLAN. You can use IBM Cloud private portable IP addresses for the appliance.
- You can attach the public interface of the appliance into the IBM Cloud public network. You can use IBM Cloud public portable IP addresses for the appliance.
- You can remove or disable the public uplinks on T0. If you do, remove the default route as well.
- Create an NSX overlay segment for a transit network between the T0 and the third-party device. Add T0 uplink and an interface in the third-party device and establish static or dynamic routing between them.
- Add the default, IBM Cloud private network, and IBM Cloud services networks into the device routing definitions based on your communications needs.
- If needed, you might reassign more IPs from the public portable subnet or order new public static subnets for your overlay. With public static subnets, order them with a next of a VIP of the third-party device to cater for failure situations.
Considerations
When you design or deploy this architecture pattern, consider the following steps:
- Refer to the specific third-party vendor hardware and software specifications for interoperability with VMware ESXi™ and NSX.
- This approach supports BYOL only for the third-party solution licensing. Contact your vendor for licensing details.