Categories: FAANG

How to use VPN with a VPC hub-and-spoke architecture

Site-to-site Virtual Private Network (VPN) has been used to connect distributed networks for decades. This post describes how to use a VPC VPN Gateway to connect an on-premises (enterprise) network to the IBM Cloud VPC in a transit hub-and-spoke architecture:

VPN Gateway connectivity to a VPC transit hub and spoke.

Each spoke can be operated by a different business unit or team. The team can allow enterprise access to VPC resources like Virtual Service Instances running applications or VPC RedHat OpenShift IBM Cloud clusters. Private enterprise access to VPE-enabled services, like databases, is also possible through the VPN gateway. With this method, you can enjoy the ease of use and elasticity of cloud resources and pay for just what you need by accessing the resources securely over VPN.

The Centralize communication through a VPC Transit Hub and Spoke architecture tutorial was published a few months ago. The companion GitHub repository was modified to optionally support a policy-mode VPC VPN gateway to replace the IBM Direct Link simulation.

Multi-zone region (MZR) design

The transit hub design integrates with IBM multi-zone regions (MZRs), and the VPN Gateways are zone-specific. After some careful study, the zonal architecture shown below was implemented. It shows only two zones but can be expanded to three:

VPN Gateway zonal connectivity.

Notes:

  1. A VPN Gateway is connected to each zone. Enterprise CIDR blocks are connected to a specific cloud zone VPN Gateway. Notice the enterprise CIDR block is narrow:192.168.0.0/24. The cloud CIDR block is broad, covering the entire cloud (all VPCs and all zones): 10.0.0.0/8.
  2. A VPC Address Prefix representing the enterprise zone is added to the transit VPC. See how phantom address prefix allow the spokes to route traffic to the enterprise in the tutorial.
  3. A VPC ingress route table is added to the transit VPC as described in this example. It will automatically route all ingress traffic from the spokes heading to the enterprise through the VPN gateway appliances.

Follow the steps in the companion GitHub repository in the TLDR section. When editing the config_tf/terraform.tfvars file, make sure the following variables are configured:

config_tf/terraform.tfvars:

enterprise_phantom_address_prefixes_in_transit = true
vpn = true
firewall = false

Also consider setting make_redis = true to allow provisioning Redis instances for the transit and spoke with associated Virtual Private Endpoint Gateway connections. If configured, even the private Redis instance in the spoke can be accessed from the enterprise. The details of private DNS configuration and forwarding are covered in this section of part 2 of the tutorial.

When all of the layers have been applied, run the tests (see special notes in the GitHub repository README.md on configuring Python if needed). All the tests should pass:

python install -r requirements.txt
pytest

A note on enterprise-to-transit cross-zone routing

The initial design worked well for enterprise <> spokes. The enterprise <> transit within the same zone also worked. But additional configuration is required to resolve enterprise <> transit cross-zone routing failures:

VPN Gateway cross-zone routing.

Without the additional cross-zone VPN Gateway Connections, there were no return VPC route table entries in the default route table in the transit VPC to the cross-zone enterprise (see the red line). The VPN Gateway Connections automatically add routes to the default route table in the transit VPC but only in the zones containing the VPN Gateway. In the diagram above, the worker 10.2.0.4 had no route to return to 192.168.0.4.

The extra cross-zone connections for the transit VPC zones resolved this issue, as shown by the blue line.

Conclusions

Site-to-site VPN might be just the technology you need to connect your enterprise to the IBM Cloud VPC in a multi-zone region. Using the steps described in this post, you can minimize the number of VPN Gateways required to fully connect the enterprise to the cloud. Enjoy the private connectivity to VPC resources like Virtual Server Instances and resources from the catalog that can be accessed through a Virtual Private Endpoint Gateway.

Learn more about IBM Cloud VPC

The post How to use VPN with a VPC hub-and-spoke architecture appeared first on IBM Blog.

AI Generated Robotic Content

Recent Posts

Statistical Methods for Evaluating LLM Performance

The large language model (LLM) has become a cornerstone of many AI applications.

8 hours ago

Getting started with computer use in Amazon Bedrock Agents

Computer use is a breakthrough capability from Anthropic that allows foundation models (FMs) to visually…

8 hours ago

OpenAI’s strategic gambit: The Agents SDK and why it changes everything for enterprise AI

OpenAI's new API and Agents SDK consolidate a previously fragmented complex ecosystem into a unified,…

9 hours ago

Under Trump, AI Scientists Are Told to Remove ‘Ideological Bias’ From Powerful Models

A directive from the National Institute of Standards and Technology eliminates mention of “AI safety”…

9 hours ago

Exploring Prediction Targets in Masked Pre-Training for Speech Foundation Models

Speech foundation models, such as HuBERT and its variants, are pre-trained on large amounts of…

1 day ago

How GoDaddy built a category generation system at scale with batch inference for Amazon Bedrock

This post was co-written with Vishal Singh, Data Engineering Leader at Data & Analytics team…

1 day ago