On-Premise Network Connection

β­οΈβ­οΈβ­οΈπŸ›¬ Landing ZoneProvides managed IP (L3) connectivity to on-premises networks. This is commonly implemented using hub&spoke network architectures and a combination of VPNs or private network peerings.

🚧 This capability reference page is a draft.

If you want to be notified when the capability reference page is finished, click here.

A common approach to address on-prem connectivity is applying the Hub & Spoke design. You define a central hub in your cloud platform that actually connects to the On-Premise network. All managed tenants then connect via a Spoke network to this Hub to get access to On-Prem. Setting up the spoke must be done in a scalable way as the number of spokes grows with the number of tenants who need this access. This can be achieved by e.g. integrating the On-Prem connectivity via a Virtual Network Service.

TODO: describe IPAM integration

A key challenge with On-Premise network connections is to make them scale

  1. shared vm and vm based NAT system; load balancer inside VPC

    1. cloud foundation maintains NAT
  2. multiple shared VPC with VPC peeringopen in new window;

    1. cloud foundation maintains subnets and VPC for customer projects
  3. completely isolated VPCs and projects

    1. private service connectopen in new window/virtual private connect; consume them even if you do not
  4. don't do onprem; use internet with API gateway

How to Implement an on-Premise Network Connection

Azure

There are 3 options for connecting an on-premise network to an Azure Virtual Network

  1. A VPN Gateway sends encrypted traffic in a Hybrid network over the public internet. This option would cause some latency in performance and is best suited for applications with minimal traffic between the Azure Virtual Network and the on-premise servers. You can find more information on how to establish a VPN Gateway hereopen in new window and hereopen in new window is a guide on how to Implement a secure Hybrid network

  2. An Azure ExpressRoute sends traffic between on-premise and cloud resources using a dedicated, private connection. This option is suitable for large-scale, mission-critical workloads that require scalability. This option can be more complex to set up and requires working with a third party to establish the connection between the on-premise and Azure resources but is faster than a VPN Gateway connection and supports dynamic scaling of bandwidth. You can find an example of a Hybrid network utilising an ExpressRoute connection hereopen in new window.

  3. ExpressRoute with VPN Failover combines the previous two options. Using this design, you get the high bandwidth and availability of an ExpressRoute connection with a backup VPN Gateway connection if there are any issues with the ExpressRoute connection. This option is the most complex and requires a VPN Gateway and ExpressRoute connection but is the most reliable and ensures the most availability. You can find more information about how to design and connect ExpressRoute with VPN Failover hereopen in new window.

AWS

There are 2 options for connecting your on-premise resources to your resources in the AWS cloud: AWS Site-to-Site VPN or AWS Direct Connect.

AWS Site-to-Site VPN is a fully-managed service that creates a secure connection between your data centre or branch office and your AWS resources using IP Security (IPSec) tunnels. Site-to-Site VPN is a private, secure, and highly-available connection between your resources and allows for increased performance and monitoring of your applications. This connection is very useful for migrating your service to AWS and creating secure connections between remote locations. A Site-to-Site VPN can be created using the AWS Management Console, AWS Command Line Interface, AWS SDKs, or the Query API. You can find more detailed information about AWS Site-to-Site VPN and how to create a connection hereopen in new window.

AWS Direct Connect allows you to securely connect your on-premise data centre to your AWS VPC via an AWS Direct Connect Router. To setup this connection you have to take the following steps

  1. Request an AWS Direct Connect dedicated connection

  2. create a Virtual Interface

  3. Download the router configuration

  4. Verify the Virtual Interface

  5. Configure redundant connections (optional)

You can find more detailed information about creating different types of Direct Connection hereopen in new window.

GCP

GCP utilises Cloud VPN to create secure connections between your on-premise network and your GCP-hosted resources through and IPsec VPN connection. GCP provides 2 options for connecting your resources: High-Availability (HA) VPN or Classic VPN.

HA VPN is the preferred connection type for connecting your on-premise and VPC networks. It supports site-to-site connections and utilizes an IPsec VPN connection in a single region with an SLA of 99.99% service availability.

One option for using HA VPN is to deploy HA VPN over Cloud Interconnect. Cloud Interconnect connects your on-premise data centre to you Google Cloud resources with low latency and high availability. Dedicated Interconnectopen in new window creates a physical direct connection between your on-premise network and Google’s network while Partner Interconnectopen in new windowopen in new windowprovides connectivity through a supported service provider You can find more information about HA VPN hereopen in new window.

Classic VPN allows your on-premise hosts to communicate through one or more IPsec VPN tunnels to Compute Engine virtual machine (VM). Classic VPN supports both policy-based and route-based VPN configurations, providing flexibility in designing the network topology. While Classic VPN offers secure connectivity, it does not provide the same level of high availability and automatic failover capabilities as HA VPN. Therefore, it is recommended to consider HA VPN for scenarios that require continuous and resilient connectivity. You can find more information about Classic VPN hereopen in new window

  • GCP Fabric FAST

    On-prem VPN is offered with all 3 setups of the networking stages.

    Learn More open in new window
  • GCP CFT - Example Foundation

    On-Prem connectivity is provided in 3 different ways for all network setups mentioned above.

    Learn More open in new window
  • Azure LZ accelerator - ES

    You can choose to deploy the on-premises connectivity using the Virtual WAN or Azure Hub and Spoke. Here we can define a subscription specific to this connectivity appliance.

    Learn More open in new window
  • Azure LZ Terraform module - ES

    You can connect to your on-premise networks by choosing the matching option and configurations. You have the option of using Virtual WAN and then you are able to make the connection between your on-premises via VPN or Express route. If you deploy the terraform module using Collie's KitBundle functionality, on-premise network functionality will not be deployed automatically.

    Learn More open in new window
  • Azure CAF Terraform Modules

    You can connect to your on-premise networks by choosing the matching option and configurations. You have the option of using Virtual WAN and then you are able to make the connection between your on-premises via VPN or Express route

    Learn More open in new window
  • AWS Landing Zone Accelerator

    It provides a TransitGateway in the network config to connect easily to a hub that makes the on-prem connect. As also directConnectGateways can be defined in the network config, everything that is needed to establish an on-prem connection is available.

    Learn More open in new window