Accessing service endpoints through VPN
IBM Cloud VPN for VPC allows you to get access to IBM Cloud service endpoints from your on-premises network.
To set up access to a service endpoint, follow these steps:
-
Get the IP of the service endpoint. IBM Cloud VPN for VPC supports two types of service endpoints: Infrastructure as a Service (IaaS) endpoints and IBM Cloud service endpoints. The IaaS endpoints are hosted in the IP address ranges
161.26.0.0/16; IBM Cloud service endpoints are hosted in the IP address ranges166.8.0.0/14. For more information about endpoints, see IaaS endpoints and Using service endpoints. -
Choose from the following VPN gateways:
-
For policy-based VPN gateways - For the VPN connection, make sure that the local subnets include the range
161.26.0.0/16for IaaS endpoints and166.8.0.0/14for IBM Cloud service endpoints. -
For static route-based VPN gateways connection - Create a connection to connect your on-premises private network, and add the following routes on your "on-premises gateway" to make sure that the traffic is going through the tunnel. No custom VPC routes are needed in the IBM VPC custom routing table.
- Destination -
166.8.0.0/14for IBM Cloud service endpoints, next hop: VPN tunnel interface - Destination -
161.26.0.0/16for IaaS endpoints, next hop: VPN tunnel interface
- Destination -
-
For dynamic route-based VPN gateway connection - Add the following routes in the advertised CIDRs section when you configure a VPN gateway.
-
166.8.0.0/14for IBM Cloud service endpoints. -
161.26.0.0/16for IaaS endpoints, next hop: VPN tunnel interface.
-
You can narrow the range of the destination CIDR instead of using 166.8.0.0/14 or 161.26.0.0/16. For example, if you need to access only IBM DNS IP 161.26.0.10 and 161.26.0.11, choose 161.26.0.10/30 as the destination instead of using 161.26.0.0/16.
For some on-premises VPN gateways, the next hop must be an IP address instead of a tunnel interface name. You must assign an IP address from a CIDR block with a 30-bit mask to the tunnel interface on the on-premises VPN gateway. The other IP address
from the same CIDR must be used as the next hop in the route. For example, assign 169.254.0.1/30 as the tunnel interface IP address on the on-premises VPN gateway, and use 169.254.0.2/30 as the route's next hop.