You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: .docs/powervs-poc-classic.md
+17-10Lines changed: 17 additions & 10 deletions
Original file line number
Diff line number
Diff line change
@@ -128,12 +128,8 @@ There are multiple ways to manage volumes in Power Virtual Server:
128
128
* To remove volumes that are not attached to a virtual server, click on the volume's icon and click the delete button in the right panel.
129
129
130
130
### VPC VPN Server - Client to Site VPN
131
-
The VPC VPN Server used for client to site VPNs requires SSL/TLS certificates stored in a Secrets Manager instance. The Secrets Manager should be created outside of CRAIG and populated with the certificates before creating the VPN Server deployment in CRAIG.
132
131
133
-
1. Create a Secrets Manager instance and either [order public certificates](https://cloud.ibm.com/docs/secrets-manager?topic=secrets-manager-public-certificates&interface=ui
), or [import certificates](https://cloud.ibm.com/docs/secrets-manager?topic=secrets-manager-certificates&interface=ui). Consult the [VPC client-to-site server authentication documentation](https://cloud.ibm.com/docs/vpc?topic=vpc-client-to-site-authentication) to ensure the certificate authorities and certificates are created using values that are compatible with the VPN server.
136
-
2. Choose VPC Deployments from the menu and create a new security group for the VPN Server.
132
+
1. Choose VPC Deployments from the menu and create a new security group for the VPN Server.
137
133
Create the security group in the `transit-rg` resource group.
138
134
Add the following rules to the group:
139
135
@@ -143,7 +139,7 @@ Add the following rules to the group:
| vpn-outbound | outbound | 0.0.0.0/0 | ALL | ALL |
145
141
146
-
3. Create a VPN Server deployment
142
+
2. Create a VPN Server deployment
147
143
Set the VPN Server values using the following table as a guide.
148
144
149
145
| Field | Value |
@@ -153,8 +149,6 @@ Set the VPN Server values using the following table as a guide.
153
149
| Subnets | vpn-zone-1 |
154
150
| Security group | security group created in step 3 |
155
151
| Authentication method | Username and Certificate |
156
-
| Certificate CRN | The CRN of the Secrets Manager secret containing the certificate for the VPN Server. |
157
-
| Client CA CRN | The CRN of the Secrets Manager secret containing the certificate for the VPN client. |
158
152
| Client CIDR Pool | Specify a network CIDR that does not conflict with any on-premises network, the VPC network, or the Power VS network. The prefix length must be between 9 and 22 inclusive. The CIDR should also be a subnet of `10.0.0.0/8` to avoid additional security group and routing table changes. For example `10.60.0.0/22` does not conflict with the default VPC, Power VS, or on-premises networks in the template. |
159
153
| Port | 443 |
160
154
| Protocol | UDP |
@@ -163,7 +157,7 @@ Set the VPN Server values using the following table as a guide.
163
157
| Client DNS Server IPs | Leave empty |
164
158
| Additional VPC Prefixes | Zone 1, add the CIDR specified in `Client CIDR Pool`|
165
159
166
-
4. After the VPN server is created, click on the VPN server icon to add routes. Routes are added by clicking the plus icon at the bottom of the VPN Server settings. Add the following route:
160
+
3. After the VPN server is created, click on the VPN server icon to add routes. Routes are added by clicking the plus icon at the bottom of the VPN Server settings. Add the following route:
@@ -177,9 +171,22 @@ The project resources can be provisioned in the cloud using either IBM Cloud Sch
177
171
178
172
Resources can also be provisioned using a local Terraform install. The downloaded zip contains the `main.tf` and other Terraform files needed to provision the resources.
179
173
174
+
### Certificates for VPN Server
175
+
176
+
If you added a VPC VPN server to the project, you must have SSL/TLS certificates stored in a Secrets Manager instance. The VPC VPN Server used for client to site VPNs requires SSL/TLS certificates stored in a Secrets Manager instance. The Secrets Manager should be created outside of CRAIG and populated with the certificates as these certificate CRNs will be required inputs at deployment time.
177
+
178
+
> Create a Secrets Manager instance and either [order public certificates](https://cloud.ibm.com/docs/secrets-manager?topic=secrets-manager-public-certificates&interface=ui
), or [import certificates](https://cloud.ibm.com/docs/secrets-manager?topic=secrets-manager-certificates&interface=ui). Consult the [VPC client-to-site server authentication documentation](https://cloud.ibm.com/docs/vpc?topic=vpc-client-to-site-authentication) to ensure the certificate authorities and certificates are created using values that are compatible with the VPN server.
181
+
180
182
### Inputs Required at Deployment Time
181
183
>**Note:** The following input fields (Terraform values) must be set in IBM Schematics or Terraform at Generate Plan / Apply Plan time.
182
-
>*`ibmcloud_api_key`: The IBM Cloud platform API key that will be used to deploy the project resources. See [Access Policies](access-policies.md) for access policies and account settings required for creating and managing resources created in CRAIG projects.
|`ibmcloud_api_key`| The IBM Cloud platform API key that will be used to deploy the project resources. See [Access Policies](access-policies.md) for access policies and account settings required for creating and managing resources created in CRAIG projects. |
188
+
|`*_certificate_crn`| The CRN of the Secrets Manager secret containing the certificate for the VPN Server if a Client to Site VPN is being deployed _(variable exists only if a VPN server was added)._|
189
+
|`*_client_ca_crn`| The CRN of the Secrets Manager secret containing the certificate for the VPN client if a Client to Site VPN is being deployed _(variable exists only if a VPN server was added)._|
183
190
184
191
### Cost estimation
185
192
IBM Cloud Schematics provides a cost estimation for the project resources after running the `Generate Plan` step. See [the Schematics Integration document](./schematics-how-to.md) for more information.
Copy file name to clipboardExpand all lines: .docs/powervs-poc.md
+18-11Lines changed: 18 additions & 11 deletions
Original file line number
Diff line number
Diff line change
@@ -121,12 +121,8 @@ There are multiple ways to manage volumes in Power Virtual Server:
121
121
* To remove volumes that are not attached to a virtual server, click on the volume's icon and click the delete button in the right panel.
122
122
123
123
### VPC VPN Server - Client to Site VPN
124
-
The VPC VPN Server used for client to site VPNs requires SSL/TLS certificates stored in a Secrets Manager instance. The Secrets Manager should be created outside of CRAIG and populated with the certificates before creating the VPN Server deployment in CRAIG.
125
124
126
-
1. Create a Secrets Manager instance and either [order public certificates](https://cloud.ibm.com/docs/secrets-manager?topic=secrets-manager-public-certificates&interface=ui
), or [import certificates](https://cloud.ibm.com/docs/secrets-manager?topic=secrets-manager-certificates&interface=ui). Consult the [VPC client-to-site server authentication documentation](https://cloud.ibm.com/docs/vpc?topic=vpc-client-to-site-authentication) to ensure the certificate authorities and certificates are created using values that are compatible with the VPN server.
129
-
2. Choose VPC Deployments from the menu and create a new security group for the VPN Server.
125
+
1. Choose VPC Deployments from the menu and create a new security group for the VPN Server.
130
126
Create the security group in the `transit-rg` resource group.
131
127
Add the following rules to the group:
132
128
@@ -136,7 +132,7 @@ Add the following rules to the group:
| vpn-outbound | outbound | 0.0.0.0/0 | ALL | ALL |
138
134
139
-
3. Create a VPN Server deployment
135
+
2. Create a VPN Server deployment
140
136
Set the VPN Server values using the following table as a guide.
141
137
142
138
| Field | Value |
@@ -146,8 +142,6 @@ Set the VPN Server values using the following table as a guide.
146
142
| Subnets | vpn-zone-1 |
147
143
| Security group | security group created in step 3 |
148
144
| Authentication method | Username and Certificate |
149
-
| Certificate CRN | The CRN of the Secrets Manager secret containing the certificate for the VPN Server. |
150
-
| Client CA CRN | The CRN of the Secrets Manager secret containing the certificate for the VPN client. |
151
145
| Client CIDR Pool | Specify a network CIDR that does not conflict with any on-premises network, the VPC network, or the Power VS network. The prefix length must be between 9 and 22 inclusive. The CIDR should also be a subnet of `10.0.0.0/8` to avoid additional security group and routing table changes. For example `10.60.0.0/22` does not conflict with the default VPC, Power VS, or on-premises networks in the template. |
152
146
| Port | 443 |
153
147
| Protocol | UDP |
@@ -156,7 +150,7 @@ Set the VPN Server values using the following table as a guide.
156
150
| Client DNS Server IPs | Leave empty |
157
151
| Additional VPC Prefixes | Zone 1, add the CIDR specified in `Client CIDR Pool`|
158
152
159
-
4. After the VPN server is created, click on the VPN server icon to add routes. Routes are added by clicking the plus icon at the bottom of the VPN Server settings. Add two routes:
153
+
3. After the VPN server is created, click on the VPN server icon to add routes. Routes are added by clicking the plus icon at the bottom of the VPN Server settings. Add two routes:
@@ -171,10 +165,23 @@ The project resources can be provisioned in the cloud using either IBM Cloud Sch
171
165
172
166
Resources can also be provisioned using a local Terraform install. The downloaded zip contains the `main.tf` and other Terraform files needed to provision the resources.
173
167
168
+
### Certificates for VPN Server
169
+
170
+
If you added a VPC VPN server to the project, you must have SSL/TLS certificates stored in a Secrets Manager instance. The VPC VPN Server used for client to site VPNs requires SSL/TLS certificates stored in a Secrets Manager instance. The Secrets Manager should be created outside of CRAIG and populated with the certificates as these certificate CRNs will be required inputs at deployment time.
171
+
172
+
> Create a Secrets Manager instance and either [order public certificates](https://cloud.ibm.com/docs/secrets-manager?topic=secrets-manager-public-certificates&interface=ui
), or [import certificates](https://cloud.ibm.com/docs/secrets-manager?topic=secrets-manager-certificates&interface=ui). Consult the [VPC client-to-site server authentication documentation](https://cloud.ibm.com/docs/vpc?topic=vpc-client-to-site-authentication) to ensure the certificate authorities and certificates are created using values that are compatible with the VPN server.
175
+
174
176
### Inputs Required at Deployment Time
175
177
>**Note:** The following input fields (Terraform values) must be set in IBM Schematics or Terraform at Generate Plan / Apply Plan time.
176
-
>*`ibmcloud_api_key`: The IBM Cloud platform API key that will be used to deploy the project resources. See [Access Policies](access-policies.md) for access policies and account settings required for creating and managing resources created in CRAIG projects.
177
-
>*`dal10gw_on_prem_connection_preshared_key`: This is the preshared key for the VPN Gateway connection (site-to-site VPN). The variable name will be different if you change the name of the VPN gateway or the connection. This variable will also not be present if the VPN Gateway is removed from the project.
|`ibmcloud_api_key`| The IBM Cloud platform API key that will be used to deploy the project resources. See [Access Policies](access-policies.md) for access policies and account settings required for creating and managing resources created in CRAIG projects. |
182
+
|`dal10gw_on_prem_connection_preshared_key`| This is the preshared key for the VPN Gateway connection (site-to-site VPN). The variable name will be different if you change the name of the VPN gateway or the connection. This variable will also not be present if the VPN Gateway is removed from the project. |
183
+
|`*_certificate_crn`| The CRN of the Secrets Manager secret containing the certificate for the VPN Server if a Client to Site VPN is being deployed _(variable exists only if a VPN server was added)._|
184
+
|`*_client_ca_crn`| The CRN of the Secrets Manager secret containing the certificate for the VPN client if a Client to Site VPN is being deployed _(variable exists only if a VPN server was added)._|
178
185
179
186
### Cost estimation
180
187
IBM Cloud Schematics provides a cost estimation for the project resources after running the `Generate Plan` step. See [the Schematics Integration document](./schematics-how-to.md) for more information.
0 commit comments