|
| 1 | +--- |
| 2 | + |
| 3 | +copyright: |
| 4 | + years: 2025 |
| 5 | +lastupdated: "2025-03-05" |
| 6 | + |
| 7 | +keywords: |
| 8 | + |
| 9 | +subcollection: deployable-reference-architectures |
| 10 | + |
| 11 | +authors: |
| 12 | + - name: "Andrej Kocbek" |
| 13 | + |
| 14 | +# The release that the reference architecture describes |
| 15 | +version: 2.1.3 |
| 16 | + |
| 17 | +# Whether the reference architecture is published to Cloud Docs production. |
| 18 | +# When set to false, the file is available only in staging. Default is false. |
| 19 | +production: false |
| 20 | + |
| 21 | +# Use if the reference architecture has deployable code. |
| 22 | +# Value is the URL to land the user in the IBM Cloud catalog details page |
| 23 | +# for the deployable architecture. |
| 24 | +# See https://test.cloud.ibm.com/docs/get-coding?topic=get-coding-deploy-button |
| 25 | +deployment-url: https://cloud.ibm.com/catalog/7a4d68b4-cf8b-40cd-a3d1-f49aff526eb3/architecture/deploy-arch-ibm-client-to-site-vpn-1b824983-263f-4191-bfcd-c1d1b2220aa3-global |
| 26 | + |
| 27 | +docs: https://cloud.ibm.com/docs/secure-infrastructure-vpc?topic=secure-infrastructure-vpc-connect-landingzone-client-vpn |
| 28 | + |
| 29 | +image_source: https://github.com/terraform-ibm-modules/terraform-ibm-client-to-site-vpn/blob/main/reference-architectures/c2s-basic.drawio.svg |
| 30 | + |
| 31 | +related_links: |
| 32 | + - title: "VPC landing zone - Standard variation" |
| 33 | + url: "https://cloud.ibm.com/docs/deployable-reference-architectures?topic=deployable-reference-architectures-vsi-ra" |
| 34 | + description: "A deployable architecture that is based on the IBM Cloud for Financial Services reference and that provides virtual servers in a secure VPC for your workloads." |
| 35 | + |
| 36 | +use-case: Cybersecurity |
| 37 | +industry: Banking,FinancialSector |
| 38 | +compliance: FedRAMP |
| 39 | + |
| 40 | +content-type: reference-architecture |
| 41 | + |
| 42 | +--- |
| 43 | + |
| 44 | +{{site.data.keyword.attribute-definition-list}} |
| 45 | + |
| 46 | +# Cloud automation for Client to Site VPN |
| 47 | +{: #vpn-ra} |
| 48 | +{: toc-content-type="reference-architecture"} |
| 49 | +{: toc-industry="Banking,FinancialSector"} |
| 50 | +{: toc-use-case="Cybersecurity"} |
| 51 | +{: toc-compliance="FedRAMP"} |
| 52 | +{: toc-version="2.1.0"} |
| 53 | + |
| 54 | +This deployable architecture pattern configures client-to-site VPN secure and encrypted server connectivity within an existing management VPC using only a few required inputs. Once deployed, you can install an OpenVPN client application on the devices you wish to use for VPN access, and import a profile from the VPN server. The configuration also allows you to specify a list of users who will have access to the private network, with access control managed by IBM Cloud IAM. |
| 55 | + |
| 56 | +## Architecture diagram |
| 57 | +{: #ra-vpn-ext-architecture-diagram} |
| 58 | + |
| 59 | +{: caption="Figure 1. client-to-site VPN on existing landing zone" caption-side="bottom"}{: external download="c2s-basic.drawio.svg"} |
| 60 | + |
| 61 | +## Design requirements |
| 62 | +{: #ra-vpn-ext-design-requirements} |
| 63 | + |
| 64 | +{: caption="Figure 2. Scope of the design requirements" caption-side="bottom"} |
| 65 | + |
| 66 | +<!-- |
| 67 | +TODO: Add the typical use case for the architecture. |
| 68 | +The use case might include the motivation for the architecture composition, |
| 69 | +business challenge, or target cloud environments. |
| 70 | +--> |
| 71 | +## Components |
| 72 | +{: #ra-vpn-components} |
| 73 | + |
| 74 | +### Client-to-site VPN architecture decisions |
| 75 | +{: #ra-vpn-components-arch} |
| 76 | + |
| 77 | +| Requirement | Component | Reasons for choice | Alternative choice | |
| 78 | +|-------------|-----------|--------------------|--------------------| |
| 79 | +| Set up secure client-to-site VPN | VPN | | | |
| 80 | +| Store private certificate in existing Secrets Manager | Secrets Manager | Create and store private certificate to ensure secure communication and authentication between public network and the private VPC | | |
| 81 | + |
| 82 | +### Network security architecture decisions |
| 83 | +| Requirement | Component | Reasons for choice | Alternative choice | |
| 84 | +|-------------|-----------|--------------------|--------------------| |
| 85 | +| Load VPN configuration to simplify VPN setup | VPNs | Open following ports by default: 53 (DNS service), 443 (https) | | |
| 86 | +| Create two subnets to achieve high availability | VPC | Distributing resources across two subnets allows for load balancing between them, ensuring that no single point of failure affects the performance or availability of client-to-site VPN | | |
| 87 | +| * Create connection to isolated existing management VPC and allow only a limited number of network connections \n * All other connections from or to existing management VPC are forbidden | ACL and security group rules in client-to-site VPN| | More ports might be opened in preset or added manually after deployment | |
| 88 | +{: caption="Table 2. Network security architecture decisions" caption-side="bottom"} |
| 89 | + |
| 90 | +<!-- |
| 91 | +## Compliance |
| 92 | +{: #ra-vpn-ext-compliance} |
| 93 | +
|
| 94 | +_Optional section._ Feedback from users implies that architects want only the high-level compliance items and links off to control details that team members can review. Include the list of control profiles or compliance audits that this architecture meets. For controls, provide "learn more" links to the control library that is published in the IBM Cloud Docs. For audits, provide information about the compliance item. |
| 95 | +--> |
| 96 | + |
| 97 | +## Next steps |
| 98 | +{: #ra-vpn-ext-next-steps} |
| 99 | + |
| 100 | +- See the landing zone [deployment guide](https://cloud.ibm.com/docs/secure-infrastructure-vpc?topic=secure-infrastructure-vpc-overview). |
0 commit comments