Network architecture diagrams

Off-premises

This topic describes typical network architectures that are used in the IBM® Power® Virtual Server network architecture and is not an exhaustive list of Power Virtual Server connection methods.

Power Virtual Server networking environment

When you create a Power Virtual Server, you can select a private or public network interface. For more information, see Public and Private networks.

Power Virtual Server network architectures consist of one or more of the following networks:

  • IBM Cloud infrastructure networks - While the following infrastructure network environments offer different features and are managed separately, they can be connected to each other to provide layer-3 IPv4 traffic flow:
    • Classic - Classic network resources include VLANs, subnets, and SSL Virtual Private Network (VPN) access. See Network security architecture for a description of the classic network components. Bring Your Own IP (BYOIP) is not supported.
    • Virtual Private Cloud (VPC) - VPC network resources include subnets, floating IP addresses, security groups, and VPN gateways. For more information, see About networking. See Advanced networking for IBM Cloud VPC for a one-hour course on VPC networking. BYOIP is supported.
    • IBM Power - Network resources include subnets. BYOIP is supported.
  • Overlay networks - These networks exist in the IBM Cloud VMware Shared and VMware Dedicated offerings. While technically hosted in the IBM Cloud classic infrastructure environment, these networks are implemented in VMware NSX and are under your direct control, including the IP addressing schema. BYOIP is supported. Therefore, the IBM Cloud infrastructure networks cannot route the overlay networks; access is through tunnels.
  • External networks:
    • Internet - Access the internet through resources that are hosted in any of the three IBM Cloud infrastructure environments.

    • Remote - Connect remote networks to your IBM Cloud networks. You can use the following services to connect to a remote network:

      • Internet VPN - Uses the public internet to connect remote networks and their IBM Cloud networks through a VPN. The VPN is terminated on gateway devices or a service within IBM Cloud.
      • Direct Link - Direct Link is a suite of offerings that enable the creation of direct and private connections between your remote, private cloud network and IBM Cloud, without traversing the public internet. For more information, see Getting started with IBM Cloud Direct Link (2.0).

      You can connect Direct Links to either a local or remote IBM Cloud Transit Gateway, which allows the private cloud network to access all networks that are connected to the IBM Cloud Transit Gateway.

Power Edge Router use cases

Using a Power Edge Router (PER)-enabled workspace provides the following benefits:

  • Improved performance with aggregated bandwidth of 400 Gbps.
  • Direct access to the IBM Cloud services from the Power Virtual Server workspace.
  • Direct access to the Power Virtual Server from a client-managed environment by using a Direct Link connect or Direct Link dedicated.

The following are some of the use cases of a PER-enabled Power Virtual Server workspace:

  1. Connecting a client-managed data center
  2. Connecting to classic infrastructure
  3. Connecting to Virtual Private Cloud
  4. Connecting to IBM Cloud services
  5. Connecting multiple workspaces

The use cases are enabled with base capabilities and can be customized to meet any specific requirements.

Connecting a client-managed data center

In this depiction, the client-managed data center uses a Direct Link connection to attach to the Transit Gateway.

  1. You can attach a PER-enabled Power Virtual Server workspace to a Transit Gateway. The Transit Gateway enables the connectivity to the client-managed data center through the incoming Direct Link connectivity. The Direct Link connectivity is interconnected through the Transit Gateway.
  2. You pay for the Direct Link connection that you use to connect your client-managed environment with the Transit Gateway. You can use up to 4 connections on a local Transit Gateway without any charges. For more information on Transit Gateway pricing, see: Pricing for Power Edge Router.

Connecting client-managed environment with a PER-enabled workspace
Figure 9. Connecting on-premise with a PER-enabled Power Virtual Server

Connecting to classic infrastructure

Establish a connection between PER-enabled Power Virtual Server workspace and the classic infrastructure by local routing of Transit Gateway.

You do not pay extra charges for Transit Gateway. To establish the connection, the following conditions must be met: - The workspace and the classic infrastructure must be in the same region. - The workspace must be connected to a Transit Gateway.

For more information on Transit Gateway pricing, see: Pricing for Power Edge Router.

Connecting PER workspace with classic with custom IP
Figure 10. Connecting PER workspace with classic

The following two scenarios for connecting the classic infrastructure to a PER-enabled workspace are differentiated based on the Generic Routing Encapsulation (GRE) tunnel requirement:

  • When is a GRE tunnel not required?

    A GRE tunnel is not required to establish a connection from your PER-enabled workspace with classic infrastructure and you do not have a custom IP address on your workspace.

    The Backend Customer Router (BCR) allows an IBM Cloud IP address (10.0.0.0/8) only to pass through. If you use any other IP address other than 10.0.0.0/8, you might need to configure a GRE tunnel.

  • When is a GRE tunnel required?

    A GRE tunnel is required to establish a connection from your PER-enabled workspace with classic infrastructure that uses a custom IP address.

    • The classic subnet is located behind the BCR router.
    • The custom IP address, for example 172.X.X.X, originating from your workspace is dropped and not allowed to pass through the classic subnet by the BCR.
    • The BCR only allows an IBM Cloud IP address (10.0.0.0/8) only to pass through.

    Hence, if you have a custom IP address in your PER-enabled workspace, you need a GRE tunnel that wraps the custom IP address with another header. This GRE tunnel needs to be attached with the Transit Gateway.

    For detailed steps, see Configuring Generic Routing Encapsulation (GRE) tunnel.

Connecting to Virtual Private Cloud

Establish a connection between a PER-enabled Power Virtual Server workspace and a Virtual Private Cloud (VPC) by using the Transit Gateway. To create a multi-connection network, connect the classic infrastructure with the Transit Gateway. A three-way communication is established. Thus, a connection between the PER-enabled workspace, VPC, and the classic infrastructure is established.

The pricing for this connection depends on the usage of a local or global Transit Gateway. For more information, see: Pricing for Power Edge Router.

Connecting PER workspace with VPC
Figure 11. Connecting PER workspace with VPC

Connecting to IBM Cloud (Classic) services through Secure Endpoint (SE)

By default, a PER-enabled Power Virtual Server workspace can connect to the IBM Cloud Service Endpoints (CSE).

You can also connect a PER-enabled workspace seamlessly with the Secure Endpoints (SE) in the classic infrastructure environment. To establish the connection through a Transit Tateway, complete the following steps:

  1. Connect a PER-enabled Power Virtual Server workspace to the classic infrastructure environment by using a Transit Gateway.

  2. Connect Power Virtual Server to the Secure Endpoint (SE) of the IBM Cloud (Classic) services.

    On a PER-enabled workspace that uses a custom IP address, the network is routed through a Network Address Translator (NAT) device. The NAT converts the custom IP address into an IBM Cloud-supported IP address.

For information about Transit Gateway pricing, see Pricing for Power Edge Router.

Connecting PER workspace to IBM Cloud (Classic) services via Secure Endpoint (SE)
Figure 12. Connecting PER workspace to IBM Cloud (Classic) services via Secure Endpoint (SE)

Connecting multiple workspaces across a data center

Use a local Transit Gateway to connect multiple Power Virtual Server workspaces that are across different zones but in the same region. A PER-enabled workspace must be attached with the Transit Gateway that can exchange routes between two workspaces.

Use a global Transit Gateway to connect the workspaces that are present in different regions.

For more information about Transit Gateway charges for local and global routing, see Pricing for Power Edge Router.

Connecting workspaces in different regions
Figure 13. Connecting workspaces in different regions