Share this post:
We’ve got good news: You can give your network the gift of the Virtual Router Appliance, now generally available at IBM. With the Virtual Router Appliance, you can turn your high-performance bare metal servers into enterprise-grade virtual routers, firewalls, and VPNs to fit your unique application requirements—all from a standalone appliance or a pair of high availability (HA) appliances.
Our Virtual Router Appliance offers a number of enhancements over our legacy gateway service: higher performance, capacity, throughput, and standards updates to meet your compliance needs.
What are some of the ways you can make the Virtual Router Appliance work for you? This post will describe a few examples.
Virtual Router Appliance as a Firewall
To protect your environment from external threats, the Virtual Router Appliance can be leveraged as a firewall. You have the ability to add firewall rules to allow or deny inbound or outbound network traffic to the ports on which your application is running. You have the ability to filter the traffic within your own networks. The Virtual Router Appliance can also be configured to perform stateful IPv4 and IPv6 filtering to protect your critical data.
Virtual Private Network (VPN) Gateway
Perhaps you want to connect your on-site data center to the IBM Cloud using VPN tunneling. To do this, you can provision your Virtual Router Appliance as a network gateway device. You can use an IPsec site-to-site VPN tunnel for secure communication from your enterprise data center to your IBM Bluemix network.
Network Address Translation (NAT)
With the Virtual Router Appliance, you can provision application and database servers without public network interfaces while still allowing your servers to access the Internet via Source NAT. You can also hide your servers behind the gateway device with Destination NAT for enhanced security.
For multi-tiered applications on different isolated networks, the Virtual Router Appliance enables you to build connectivity between these networks with greater flexibility.
Let’s say you have a three-tiered web application. You’d want to ensure that only certain traffic from your web tier can communicate with your database tier. How would the Virtual Router Appliance work in this scenario? You’d provision databases on a separate VLAN, use the Virtual Router Appliance to route traffic between them, and create firewall rules to ensure that the database VLAN is secure.
Ready to get started?
Get enhanced control over your network infrastructure with the new Virtual Router Appliance. If you’re ready to take the Virtual Router Appliance plunge, we’re ready to get you started.
Learn more about the Virtual Router Appliance