Skip to content

Commit 5930383

Browse files
committed
docs: add VPN DA reference architecture
1 parent 8af1162 commit 5930383

File tree

2 files changed

+104
-0
lines changed

2 files changed

+104
-0
lines changed
Lines changed: 100 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,100 @@
1+
---
2+
3+
copyright:
4+
years: 2025
5+
lastupdated: "2025-03-05"
6+
7+
keywords:
8+
9+
subcollection: deployable-reference-architectures
10+
11+
authors:
12+
- name: "Andrej Kocbek"
13+
14+
# The release that the reference architecture describes
15+
version: 2.1.3
16+
17+
# Whether the reference architecture is published to Cloud Docs production.
18+
# When set to false, the file is available only in staging. Default is false.
19+
production: false
20+
21+
# Use if the reference architecture has deployable code.
22+
# Value is the URL to land the user in the IBM Cloud catalog details page
23+
# for the deployable architecture.
24+
# See https://test.cloud.ibm.com/docs/get-coding?topic=get-coding-deploy-button
25+
deployment-url: https://cloud.ibm.com/catalog/7a4d68b4-cf8b-40cd-a3d1-f49aff526eb3/architecture/deploy-arch-ibm-client-to-site-vpn-1b824983-263f-4191-bfcd-c1d1b2220aa3-global
26+
27+
docs: https://cloud.ibm.com/docs/secure-infrastructure-vpc?topic=secure-infrastructure-vpc-connect-landingzone-client-vpn
28+
29+
image_source: https://github.com/terraform-ibm-modules/terraform-ibm-client-to-site-vpn/blob/main/reference-architectures/c2s-basic.drawio.svg
30+
31+
related_links:
32+
- title: "VPC landing zone - Standard variation"
33+
url: "https://cloud.ibm.com/docs/deployable-reference-architectures?topic=deployable-reference-architectures-vsi-ra"
34+
description: "A deployable architecture that is based on the IBM Cloud for Financial Services reference and that provides virtual servers in a secure VPC for your workloads."
35+
36+
use-case: Cybersecurity
37+
industry: Banking,FinancialSector
38+
compliance: FedRAMP
39+
40+
content-type: reference-architecture
41+
42+
---
43+
44+
{{site.data.keyword.attribute-definition-list}}
45+
46+
# Cloud automation for Client to Site VPN
47+
{: #vpn-ra}
48+
{: toc-content-type="reference-architecture"}
49+
{: toc-industry="Banking,FinancialSector"}
50+
{: toc-use-case="Cybersecurity"}
51+
{: toc-compliance="FedRAMP"}
52+
{: toc-version="2.1.0"}
53+
54+
This deployable architecture pattern configures client-to-site VPN secure and encrypted server connectivity within an existing management VPC using only a few required inputs. Once deployed, you can install an OpenVPN client application on the devices you wish to use for VPN access, and import a profile from the VPN server. The configuration also allows you to specify a list of users who will have access to the private network, with access control managed by IBM Cloud IAM.
55+
56+
## Architecture diagram
57+
{: #ra-vpn-ext-architecture-diagram}
58+
59+
![Architecture diagram for adding client-to-site VPN to a landing zone deployable architecture](c2s-basic.drawio.svg "Architecture diagram for adding client-to-site VPN to a landing zone deployable architecture"){: caption="Figure 1. client-to-site VPN on existing landing zone" caption-side="bottom"}{: external download="c2s-basic.drawio.svg"}
60+
61+
## Design requirements
62+
{: #ra-vpn-ext-design-requirements}
63+
64+
![Design requirements for VPN on management VPC landing zone](heat-map-deploy-arch-slz-vpn "Design requirements"){: caption="Figure 2. Scope of the design requirements" caption-side="bottom"}
65+
66+
<!--
67+
TODO: Add the typical use case for the architecture.
68+
The use case might include the motivation for the architecture composition,
69+
business challenge, or target cloud environments.
70+
-->
71+
## Components
72+
{: #ra-vpn-components}
73+
74+
### Client-to-site VPN architecture decisions
75+
{: #ra-vpn-components-arch}
76+
77+
| Requirement | Component | Reasons for choice | Alternative choice |
78+
|-------------|-----------|--------------------|--------------------|
79+
| Set up secure client-to-site VPN | VPN | | |
80+
| Store private certificate in existing Secrets Manager | Secrets Manager | Create and store private certificate to ensure secure communication and authentication between public network and the private VPC | |
81+
82+
### Network security architecture decisions
83+
| Requirement | Component | Reasons for choice | Alternative choice |
84+
|-------------|-----------|--------------------|--------------------|
85+
| Load VPN configuration to simplify VPN setup | VPNs | Open following ports by default: 53 (DNS service), 443 (https) | |
86+
| Create two subnets to achieve high availability | VPC | Distributing resources across two subnets allows for load balancing between them, ensuring that no single point of failure affects the performance or availability of client-to-site VPN | |
87+
| * Create connection to isolated existing management VPC and allow only a limited number of network connections \n * All other connections from or to existing management VPC are forbidden | ACL and security group rules in client-to-site VPN| | More ports might be opened in preset or added manually after deployment |
88+
{: caption="Table 2. Network security architecture decisions" caption-side="bottom"}
89+
90+
<!--
91+
## Compliance
92+
{: #ra-vpn-ext-compliance}
93+
94+
_Optional section._ Feedback from users implies that architects want only the high-level compliance items and links off to control details that team members can review. Include the list of control profiles or compliance audits that this architecture meets. For controls, provide "learn more" links to the control library that is published in the IBM Cloud Docs. For audits, provide information about the compliance item.
95+
-->
96+
97+
## Next steps
98+
{: #ra-vpn-ext-next-steps}
99+
100+
- See the landing zone [deployment guide](https://cloud.ibm.com/docs/secure-infrastructure-vpc?topic=secure-infrastructure-vpc-overview).

reference-architectures/heat-map-deploy-arch-slz-vpn.svg

Lines changed: 4 additions & 0 deletions
Loading

0 commit comments

Comments
 (0)