Skip to main content

IBM Power Virtual Server with VPC Landing Zone

Published: 20 April 2026; last updated: 30 April 2026

Abstract

This document provides step-by-step guidance for manually deploying IBM Power Virtual Server (PowerVS) with VPC landing zone infrastructure, following IBM Cloud best practices for security, networking, and compliance. The deployment establishes secure hybrid connectivity between on-premises environments and cloud resources using Client-to-Site VPN, Transit Gateway, and layered observability services, optimized for lift-and-shift workloads that preserve existing on-premises architecture.

Authors

Lokesh Bhatt and Vaibhav Shandilya

IBM Power Virtual Server with VPC Landing Zone

Authors

  • Lokesh Bhatt is a senior technology leader with deep expertise in Hybrid Cloud, AI Infrastructure, and mission-critical enterprise platforms. With 20 years of experience, he has led complex modernization programs, architected large-scale SAP and PowerVS deployments, and advised CXOs on cloud transformation strategies. Lokesh bridges business vision with engineering execution, delivering measurable outcomes in performance, resilience, and cost optimization. He collaborates with global product teams, contributes to cloud architecture best practices, and focuses on democratizing AI-enabled infrastructure for enterprises.

  • Vaibhav Shandilya is a technology leader with more than 28 years of experience, specializing in product development and presales across global teams. With more than 17 years at IBM, he leads APAC Client Engineering pilots and proof-of-concept initiatives in hybrid cloud, AI/ML, and Generative AI. Previously, he led IBM Systems Power Techline and assurance teams worldwide, driving technical excellence and partner enablement across global markets. He has led teams securing multimillion-dollar opportunities through technical consulting, aligning technology with business strategy, and mentoring cross-functional teams to drive results. His expertise includes cloud architecture, IBM Cloud Paks, watsonx.ai, watsonx.orchestrate, AI/ML, and Generative AI. He holds a master's degree in Computer Science and has published technical blogs and contributed to an IBM Redbook.

Notices

While IBM® values the use of inclusive language, terms that are outside of IBM's direct influence are sometimes required for the sake of maintaining user understanding. As other industry leaders join IBM in embracing the use of inclusive language, IBM will continue to update the documentation to reflect those changes.

Introduction

This IBM Redbooks® publication provides guidance for deploying IBM Power Virtual Server (PowerVS) with VPC landing zone infrastructure, following IBM Cloud best practices and compliance standards. Perform deployment steps manually rather than using automated templates to gain fine-grained control and customization for each component. This environment is best suited for lift-and-shift workloads, enabling quick application migration while preserving existing on-premises architecture.

Note: As a prerequisite to viewing or instantiating IBM Cloud resources, you must have appropriate IBM Cloud permissions.

IBM Cloud Infrastructure Components

The following figure depicts a typical IBM Power Virtual Server (PowerVS) VPC infrastructure deployment for a representative hybrid cloud use case.

A typical IBM Cloud PowerVS with VPC landing zone infrastructure deployment
Figure: A typical IBM Cloud PowerVS with VPC landing zone infrastructure deployment

For more information, see Power Virtual Server with VPC landing zone.

The components are grouped in three resource groups:

Edge Resource Group

vpclz-edge-rg contains the following edge entry points and transit networking elements:

Edge VPC: Encapsulates IBM Virtual Private Cloud (VPC) capabilities aligned with related Security Groups (SGs). SGs are configured to facilitate network traffic flow in and outside of the VPC component. The VPC security groups and the aligned VPC components are listed in the following sections:

Default Security Group:

  • VPC VPN server (OpenVPN Gateway): Client-to-site VPN gateway that enables remote users to connect directly to VPC resources using OpenVPN clients. It supports secure tunneling using SSL/TLS to connect users or external networks to the Edge VPC over encrypted tunnels.

Management Security Group (mgmt-sg):

  • Bastion Host with floating IPs: Bastion host is the controlled entry point for SSH/RDP. From the bastion host, you can SSH into other resources (like VMs) within the VPC as long as they allow SSH traffic from the bastion host's IP.

VPE Security Group (vpe-sg):

  • VPE to IBM Cloud Object Storage and Secrets Manager
  • COS VPE: Virtual Private Endpoint for Cloud Object Storage

Network Services SG (network-services-sg):

  • Internet proxy based on Squid
  • NTP server
  • DNS forwarder
  • Public Gateway
  • Network Load Balancer (NLB)

Transit Gateway: Connects multiple VPCs, on-premises networks (via VPN or Direct Link), and other IBM Cloud services into a single routing domain. It acts as a central hub for traffic forwarding.

Note: The transit gateway is not aligned with any specific resource or security group.

Services Resource Group

The Services resource group contains shared platform services and control plane resources. The following platform services are not tied to a specific workload:

  • Monitoring
  • Activity Tracker
  • Secrets Manager
  • LogDNA/Edge log collector
  • Event notification

PowerVS Resource Group

In the PowerVS Resource Group, IBM® Power® Virtual Server workspace manages IBM PowerVS instances. The instances run Enterprise IBM Power workloads in an IBM Cloud environment. PowerVS subnets include virtual Ethernet management and block storage.

As an initial step, create the resource groups required for the deployment.

Create Resource Groups

Access the IBM Cloud account console. Refer to the account management section for detailed instructions on creating resource groups.

Note: Create three resource groups: vpclz-edge-rg, vpclz-services-rg, and vpclz-powervs-rg.

IBM Cloud Resource Provisioning Guidelines

This section provides guidelines for provisioning IBM Cloud resources required for the deployment.

Provision Virtual Private Cloud (VPC) Resources

The following subsections describe provisioning VPC resources within the Edge Resource Group ( vpclz-edge-rg).

Create Edge VPC

Create a Virtual Private Cloud with subnets in the desired region (datacenter location). The Virtual Private Cloud (VPC) houses IBM Cloud resources.

Create the resource.

Create Edge VPC Subnets

VPC subnets provide L3 IP address pools within a single zone. Resources requiring IP addresses are placed into a subnet. The following VPC resources are associated with subnets:

  • VPN Gateway
  • Virtual Server Instances (VSIs)
  • Virtual Private Endpoints (VPEs)
  • Public Gateway (PGW)
  • Network Load Balancer (NLB)

The following table lists created VPC subnets with the resource mapping:

S.No. VPC Subnet Name Attached VPC Resources CIDR 1 edge-vpc-vpn-subnet C2S VPC VPN server 10.30.10.0/24 2 edge-vpc-mgmt-subnet Bastion Host / Floating IP 10.30.20.0/24 3 edge-vpc-vpe-subnet VPE / COS 10.30.30.0/24 4 edge-vpc-nw-services-subnet DNS, NTP, Proxy servers, PGW 10.30.40.0/24

Provision a VPC VPN Server Instance

Create a Client-to-Site VPN server within the edge-vpc-vpn subnet.

Use a self-signed certificate for server-side authentication and user name and password credentials for client-side authentication. The Secrets Manager service instance creates a self-signed private certificate. Refer to the IBM Cloud Secrets Manager Service Instance section for guidelines on private certificate creation.

Leave the security group settings at default.

To create the resource, see Client VPN for VPC.

Provision VPC Virtual Server Instances (VSIs)

In this section, provision Red Hat-based VSIs in the VPCs. Two virtual server instances are provisioned in the VPC. The instances use Red Hat 9.x images in IBM Cloud.

Navigate here to create the resource.

Provision a Bastion Host with Floating IP in the edge-vpc-mgmt Subnet

The Bastion Host with SSH in a VPC securely manages and provides access to resources within the VPC. It serves as a jump host for accessing resources in private subnets.

Connect to the Bastion Host using SSH and the Floating IP. The Floating IP provides public access.

Use the following link to create the resource.

Provision a VSI in the edge-vpc-nw-services Subnet

Provision a Red Hat-based Virtual Server Instance (VSI) within the edge-vpc-nw-services subnet.

The VSI provides outbound Internet connectivity through the P-GW. You connect to this instance by using SSH using the Bastion server as the jump host.

To enable IP forwarding on this instance, complete the following steps:

  1. Create or edit the sysctl configuration file. Open or create the 99-sysctl.conf file under /etc/sysctl.d/:

    sudo vi /etc/sysctl.d/99-sysctl.conf
  2. Add the following line to the file:

    net.ipv4.ip_forward=1
  3. Apply the changes. After saving the file, run the following command to apply the changes without rebooting:

    sudo sysctl --system

    This command reads and applies all the settings in the /etc/sysctl.d/ directory and /etc/sysctl.conf.

  4. Verify IP forwarding. To verify that IP forwarding is enabled, run sysctl net.ipv4.ip_forward. It should return net.ipv4.ip_forward = 1.

In this hybrid architecture, the RHEL-based VSI acts as an Internet egress router for PowerVS workloads via IP forwarding. It uses IBM Cloud DNS service with only on-premises clients accessing cloud resources by IP. Additionally, on-premises DNS can be manually updated with local host entries or static A records for cloud servers.

A Network Load Balancer is not required for on-premises clients accessing PowerVS workloads. Traffic flows directly through the Client-to-Site (C2S) VPN into the VPC and across the Transit Gateway to the PowerVS instances. The VPN server serves as the single ingress point, while VPC routing handles delivery to the workloads.

This deployment uses IBM Cloud DNS and default cloud time synchronization services. For enterprise production deployments, you can install or tune additional services to meet auditing, security/compliance, or custom application requirements.

Optional network services on the VSI include the following:

  • Proxy Server: In the minimum deployment, Network Services VSI provides unrestricted TCP/UDP access through P-GW. To allow policy-based outbound traffic, logging, and auditing, you can install a forward proxy (for example, Squid). The Networking VSI runs both IP forwarding (general routing) and Proxy server (TCP 3128/8080). This configuration provides the following outbound traffic options:

    • Proxy-aware workloads configure HTTP_PROXY/HTTPS_PROXY to the Network VSI.
    • Non-proxy traffic can still be routed via IP forwarding (optional, less controlled). Adding a Proxy Server is recommended in production systems for enterprise-required security, auditability, and protocol restrictions. Non-proxy-aware traffic can be blocked or routed differently, while proxy-aware traffic can be controlled, logged, and cached.
  • DNS Forwarder: To support hybrid DNS for enterprise workloads with cross-environment dependencies, you can deploy a DNS forwarder (for example, BIND) on the networking-services VSI. On-premises DNS servers forward requests for VPC private domains to the forwarder, and the forwarder forwards requests for on-premises domains back to the on-premises DNS servers. Alternatively, you can use IBM Cloud DNS Services' custom resolvers where private zones define names resolvable only within IBM Cloud, and forwarding rules direct queries for specific domains to external DNS servers, such as on-premises resolvers.

    Note: In a minimal hybrid architecture using Client-to-Site (C2S) VPN, DNS forwarding is only required when private VPC hostname resolution is needed. For IP-based access, no forwarding is necessary. For hostname resolution, configure conditional forwarding on on-premises DNS servers to IBM Cloud DNS Services custom resolvers within the VPC.

  • Ansible Server: Optionally, provision an Ansible server on the Networking Services VSI to run automation playbooks directly from the VSI, targeting PowerVS instances or other VSIs in the VPC.

  • NTP (Network Time Protocol): Time synchronization is enabled by default in IBM Cloud deployments and can be adapted as needed to comply with enterprise policies or regulatory requirements.

Provision P-GW

Provision a P-GW and attach it to the nw-services-subnet to enable outgoing Internet connectivity. The virtual server attached to the network services subnet forwards Internet traffic through the P-GW.

For more information, see Public gateways for VPC.

Provision VPE to COS

Provision a VPE to COS instance within the VPE subnet.

For more information, see Endpoint Gateways.

Provision Transit Gateway

Provision a transit gateway in the desired region with global routing enabled, using the following resource.

Creating and attaching VPC Security Groups to VPC Resources

Security groups control inbound and outbound traffic for VPC resources. Each security group is associated with specific VPC resources, and rules apply only to attached resources.

The following table lists sample VPC security groups and their associated traffic rules used in this minimal deployment. Enhance this table to handle enterprise production workload security requirements.

S.No. Security Group (SG) Name Attached VPC Resources Allowed Inbound Traffic Allowed Outbound Traffic 1 Default SG Client-to-Site (C2S) VPC VPN server UDP 1194, TCP 443, ICMP VPC subnets, PowerVS subnets 2 edge-vpc-mgmt-sg: Management Security Group Bastion Host SSH (TCP 22), ICMP from VPN subnet PowerVS subnets, Network Services subnet 3 edge-network-services-sg: Network Services Security Group DNS, NTP, Proxy servers PowerVS subnets (required TCP/UDP or Any) 0.0.0.0/0

To create the resource, see Security Groups

Provision PowerVS Workspace and Resources

This section outlines provisioning PowerVS resources within the PowerVS Resource Group ( vpclz-powervs-rg).

An IBM PowerVS Workspace is the foundational environment in IBM Cloud where Power® Virtual Server (PowerVS) instances are created and managed. The workspace acts as the administrative and networking boundary for Power Systems-based infrastructure resources.

The following figures illustrate creating a PowerVS workspace and its associated resources in a specific cloud region and Power data center.

Power Virtual Server instances run Enterprise IBM Power workloads in an IBM Cloud environment. These instances operate within PowerVS subnets and use virtual Ethernet adapters for networking along with block storage for persistent data.

To create the resource, see Power Virtual Server.

Create an SSH Key

An SSH key is required to securely connect to the PowerVS virtual server instances. You can reuse the same SSH key for other components in the deployment, if required.

To create the resource, see SSH Keys.

Create PowerVS Subnets

Two PowerVS subnets are required for this deployment:

  • PowerVS Management Subnet – Hosts the workload servers.
  • PowerVS Backup Subnet – Hosts the NFS/backup storage server.

You can update the DNS server setting later to use the internal IBM Cloud DNS server.

To create the resource, see PowerVS Subnets.

Creating Power Virtual Servers

Two RHEL 9.x-based Power Virtual servers are used for this deployment:

  • Management/Workload Server
  • Backup Server

For each virtual server instance (VSI), select the appropriate compute profile, attach the required block storage, and connect the VSI to the appropriate subnet (Management or Backup).

Provision IBM Cloud Service Instances

This section outlines provisioning IBM Cloud services required for the deployment within the Services Resource Group ( vpclz-services-rg).

IBM Cloud Secrets Manager Service Instance

The Secrets Manager service creates, leases, and centrally manages secrets—such as certificates, API keys, and credentials—used by IBM Cloud services and custom-built applications. In the deployment described in this document, the Secrets Manager service issues and securely stores a self-signed TLS certificate for the C2S server.

Provision a Secrets Manager service instance in the region of your choice. To create the resource, see Secrets Manager.

The following figure illustrates a provisioned Secrets Manager service instance with sample private certificates. Private certificates are used for server-side authentication of the VPC VPN server.

Certificate chain: Root CA (self-signed, trust anchor) → Intermediate CA (issuer) → VPN Server Certificate

The following figures illustrate the steps involved in provisioning a private certificate in Secrets Manager.

Create Root CA

This process describes how to create a root certificate authority (CA) in IBM Cloud Secrets Manager®. A root CA issues and signs subordinate certificates that can be used for private TLS and application security.

Procedure:

  1. Open the Certificate Authority workflow. From the Secrets Manager instance, start the Create a certificate authority workflow. The wizard displays a series of steps including Type, Subject Name, Key Management, Revocation List, Review, and Finish.

  2. Select the CA type. Choose Root certificate authority as the CA type:

    • Set the validity period (for example, 10 years).
    • Configure the minimum key length and enable URL encoding if required.
    • Assign a meaningful CA name, such as c2s-vpn-root-ca.
  3. Specify the subject name. Provide the X.509 subject information that identifies the CA. Typical entries include the following:

    • Common Name (CN): c2s-vpn-root-ca-cn
    • Organization and Organizational Unit fields (optional)
    • Country, State/Province, and Locality (optional)
    • Additional subject alternative names if required by policy
  4. Configure key management. Select the key management service responsible for creating and storing the CA's private key:

    • For example, choose Secrets Manager
    • Select the key type (for example, RSA 2048)
  5. Enable and configure the certificate revocation list (CRL):

    • Enable CRL generation
    • Enable CRL distribution points
    • Specify the CRL validity period (for example, 3 days)
  6. Review the configuration. The Review page summarizes all selected CA settings, including the following:

    • CA type and name
    • Subject details
    • Key management settings
    • Revocation list configuration

    Confirm the details, as CA name and subject information cannot be changed after creation.

  7. Create the root CA.

    Click Create to provision the new root certificate authority. Secrets Manager generates the CA, stores the private key securely, and prepares the CA for signing subordinate certificates.

  8. Create intermediate CA.

    Follow similar steps to create an intermediate CA signed by the root CA.

  9. Add a certificate template.

    Create a certificate template that defines the parameters for issuing certificates.

  10. Add a private certificate.

    Generate the VPN server certificate using the template.

  11. Create Service Authorization.

    Create service-to-service authorization to allow the VPN service to access certificates in Secrets Manager.

IBM Cloud Key Protect Service

IBM Cloud Key Protect is a customer-managed Key Management Service (KMS) used for encrypting data at rest, Bring Your Own Key (BYOK), key rotation, and meeting compliance requirements such as HIPAA and financial services regulations.

Key Protect adds customer-controlled key ownership for regulated workloads.

IBM Cloud Secrets Manager® issues and stores TLS certificates. By default, secrets are encrypted at rest using IBM-managed keys. Optionally, you can integrate IBM Cloud Key Protect to provide customer-managed root encryption keys for compliance-driven use cases, particularly in financial services or regulated industries.

IBM Cloud Object Storage Service Instance

IBM Cloud Object Storage (COS) is a highly scalable and resilient managed data service on IBM Cloud. Use the IBM Cloud Object Storage (COS) service (global) and cloud buckets (region-specific) for data storage requirements. It is a cost-effective data storage solution for managing massive volumes of data in a cloud environment. Data protection and backup is one typical COS use case in a hybrid cloud environment.

Provision and configure the IBM COS storage instance and buckets:

  • Create service credentials to access storage.
  • Create COS buckets for storage with public access disabled.

You can access COS buckets using direct endpoints to ensure that traffic originating from a VPC remains within the IBM Cloud network. This approach uses IBM's internal backbone and does not require a Virtual Private Endpoint (VPE) gateway. Direct endpoints are publicly DNS resolvable and resolve to public IP addresses.

An example of a direct endpoint for accessing COS buckets is: s3.direct.<region>.cloud-object-storage.appdomain.cloud

Private endpoints are primarily designed to provide in-VPC network isolation. They are configured using Virtual Private Endpoint (VPE) gateways, enabling access through private IP addresses within the VPC. This configuration provides enhanced security and more granular network access control.

In hybrid cloud deployments, direct endpoints are typically the recommended option for on-premises access to IBM Cloud Object Storage (COS), unless there is a requirement for additional network isolation and private IP control provided by a Virtual Private Endpoint (VPE). In this document, direct endpoints are used to access storage.

Refer to the IBM Cloud documentation for detailed guidance on setting up and managing IBM Cloud Object Storage (COS) buckets: Managing IBM Cloud Object Storage (COS) buckets.

COS is the primary storage service. For auditing, integrate with IBM Cloud Logs (which replaces Activity Tracker) to capture Object Storage events. For deployment, use a dedicated COS bucket to store installation files.

Observability and Security Model with VPC Flow Log Collector, Cloud Logs, Monitoring and Security and Compliance Center (SCC) Workload Protection Services

To ensure operational transparency, workload security, and compliance across the hybrid environment:

  • VPC Flow Log Collector captures traffic flow metadata, enabling analysis of network traffic across the hybrid environment.
  • IBM Cloud Logs records service and activity events, supporting compliance and governance auditing.
  • IBM Cloud Monitoring collects performance and health metrics, enabling proactive monitoring and alerting.
  • SCC Workload Protection provides runtime threat detection, vulnerability management, and workload-level compliance monitoring.

To summarize, the hybrid environment implements layered observability and security: VPC Flow Logs provide network-level visibility, Cloud Logs captures audit and API activity across IBM Cloud services, and IBM Cloud Monitoring provides performance and health metrics for compute workloads.

SCC complements observability and monitoring by focusing specifically on workload-level security and compliance.

Together, these services ensure operational transparency, security posture management, and compliance assurance across the hybrid environment.

Look up these services in IBM Cloud Catalog to provision them.

File Storage

You can optionally provision IBM Cloud File Storage to provide shared file access across multiple virtual server instances (VSIs) in the deployment.

To provision the resource, see Infrastructure - IBM Cloud.

Provision and Configure Cloud Networking Resources

This section describes how to configure networking components in IBM Cloud to enable secure hybrid connectivity between on-premises and cloud environments using a Client-to-Site (C2S) VPN.

Configure Client-to-Site (C2S) VPN for VPC

The first step in establishing hybrid cloud connectivity is to configure the Client-to-Site VPN server routing within the VPC.

Configure Client-to-Site VPN Routing

After deploying the VPN server, configure routing to ensure that traffic between VPN clients and VPC resources flows correctly through the tunnel.

Client-to-Site VPN Route Configuration

Client-to-Site routing comprises two route types, both pushed to the VPN client at connection time:

  • Client-side routes – Routes pushed to the VPN client that determine which destination prefixes should be sent through the VPN tunnel.
  • VPN server routes - Forwarding rules configured on the VPN server that control whether traffic from VPN clients is allowed to reach specific VPC subnets.

Create client routes in the VPN server and download the client profile. This profile is used on the client side to establish a connection between the OpenVPN client and the cloud VPN server.

Set Up OpenVPN Connectivity Between On-Premises and VPC-VPN Gateway

An OpenVPN connection between the on-premises environment and the cloud VPN gateway provides encrypted data transport between on-premises infrastructure and cloud resources.

Configure the OpenVPN Client:

  1. Install the OpenVPN client on the local system.
  2. Import the client profile file into the OpenVPN Client.
  3. Connect the OpenVPN Client to the server.

Configure user IDs and passcodes:

For more information, see IBM Cloud Client-to-Site Authentication.

Authentication Procedure:

  1. The VPN administrator invites the VPN client user to the account that the VPN server resides in.
  2. The VPN administrator assigns the VPN client user an IAM permission. This permission allows this user to connect to the VPN server. For more information, see Creating an IAM access group and granting the role to connect to the VPN server.
  3. The VPN client user opens the following website to generate a passcode for their user ID: https://iam.cloud.ibm.com/identity/passcode
  4. The VPN client user inputs the passcode in their OpenVPN client and starts the connection to the VPN server. For more information, see Setting up a client VPN environment and connecting to a VPN server.

Verify Client-to-Site VPC VPN Connectivity with On-Premises Desktop

Confirm that split-tunnel VPN functionality is working as expected:

  • Only VPC-bound traffic is routed through the VPN.
  • Regular Internet traffic is routed through the local gateway.

Verification Steps:

  1. Open PowerShell or Git Bash on the local desktop.
  2. Check the routing table by running route print.
  3. Review the routing table to verify the following:
    • A specific route exists for the VPC CIDR block pointing to the VPN interface.
    • The default route (0.0.0.0) points to the local network gateway.

Sample routing table:

IPv4 Route Table =========================================================================== Active Routes: Network Destination Netmask Gateway Interface Metric 0.0.0.0 0.0.0.0 9.110.102.1 9.110.102.235 45 9.110.102.0 255.255.254.0 On-link 9.110.102.235 301 9.110.102.235 255.255.255.255 On-link 9.110.102.235 301 9.110.103.255 255.255.255.255 On-link 9.110.102.235 301 10.30.0.0 255.255.0.0 192.168.252.129 192.168.252.130 257 10.51.0.0 255.255.255.0 192.168.252.129 192.168.252.130 257 10.52.0.0 255.255.255.0 192.168.252.129 192.168.252.130 257 127.0.0.0 255.0.0.0 On-link 127.0.0.1 331 127.0.0.1 255.255.255.255 On-link 127.0.0.1 331 127.255.255.255 255.255.255.255 On-link 127.0.0.1 331 161.26.0.0 255.255.0.0 192.168.252.129 192.168.252.130 257 169.38.9.200 255.255.255.255 9.110.102.1 9.110.102.235 301 192.168.252.0 255.255.252.0 192.168.252.129 192.168.252.130 257 192.168.252.128 255.255.255.128 On-link 192.168.252.130 257 192.168.252.130 255.255.255.255 On-link 192.168.252.130 257 192.168.252.255 255.255.255.255 On-link 192.168.252.130 257 224.0.0.0 240.0.0.0 On-link 127.0.0.1 331 224.0.0.0 240.0.0.0 On-link 192.168.252.130 257 224.0.0.0 240.0.0.0 On-link 9.110.102.235 301 255.255.255.255 255.255.255.255 On-link 127.0.0.1 331 255.255.255.255 255.255.255.255 On-link 192.168.252.130 257 255.255.255.255 255.255.255.255 On-link 9.110.102.235 301 ===========================================================================

Expected Behavior:

From the sample routing table:

  • The default internet route (0.0.0.0/0) uses the local gateway (9.110.102.1) and does not traverse the VPN.
  • Only VPC, Cloud DNS, and PowerVS subnets are routed through the VPN tunnel (split-tunnel configuration).

Set Up Connectivity Between PowerVS Workspace and the VPC

This section describes provisioning and configuring network connectivity between the PowerVS workspace and the VPC. The procedure consists of the following steps:

Create PowerVS Cloud Connections

Cloud Connections establish network connectivity between PowerVS and other IBM Cloud resources. For the use case described in this document, Cloud Connections link the PowerVS workspace to the Transit Gateway.

To create the resource, see PowerVS Cloud Connections.

Set Up Connectivity Through Transit Gateway

This section describes the Transit Gateway configuration required to enable connectivity.

Add Connections to the Transit Gateway

The following figure illustrates the PowerVS Cloud Connections and the VPC connection added to the Transit Gateway. The Transit Gateway supports direct connectivity to the VPC, while PowerVS Cloud Connections are attached as Direct Link connections.

Generate a Route Report

Generate a report of all routes known to a transit gateway and each of its connections. The report shows Border Gateway Protocol (BGP) information associated with these routes, which connections supply which routes, and overlapping routes.

To configure the resource, see Transit Gateway.

Verify Connectivity Between PowerVS Instances and VPC Resources

Verify network connectivity from PowerVS virtual server instances (VSIs) to VPC resources and IBM Cloud Object Storage (COS).

Ping Test to VPC Network Services VSI:

From the PowerVS instance, run the following command:

[root@powervs-backup-vsi ~]# ping -c 1 10.30.40.10 PING 10.30.40.10 (10.30.40.10) 56(84) bytes of data. 64 bytes from 10.30.40.10: icmp_seq=1 ttl=52 time=1.64 ms

A successful response confirms connectivity to the VPC network services VSI.

Ping Test to IBM COS Direct Endpoint:

[root@powervs-backup-vsi ~]# ping -c 1 s3.direct.in-che.cloud-object-storage.appdomain.cloud PING s3ep.direct.in-che.gslb.cloud-object-storage.appdomain.cloud (161.26.12.136) 56(84) bytes of data. 64 bytes from 88.0c.1aa1.ip4.static.sl-reverse.com (161.26.12.136): icmp_seq=1 ttl=240 time=1.84 ms

Verify DNS resolution:

[root@powervs-backup-vsi ~]# nslookup s3.direct.in-che.cloud-object-storage.appdomain.cloud Server: 161.26.0.10 Address: 161.26.0.10#53 Non-authoritative answer: s3.direct.in-che.cloud-object-storage.appdomain.cloud canonical name = s3ep.direct.in-che.gslb.cloud-object-storage.appdomain.cloud. Name: s3ep.direct.in-che.gslb.cloud-object-storage.appdomain.cloud Address: 161.26.12.140

These results confirm that access to IBM COS via the direct endpoint resolves to a public IP address while routing traffic over IBM Cloud's internal backbone network.

Access COS Service using the direct link:

[root@powervs-backup-vsi ~]# curl -v https://s3.direct.in-che.cloud-object-storage.appdomain.cloud 2>&1 | grep SSL * SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384 * SSL certificate verify ok.

The response confirms that the endpoint is reachable and the service is responding correctly.

Note: 403 is a valid S3 service response. The service is up and reachable. You can access objects using pre-signed URLs.

Access COS Buckets Using IBM Cloud CLI:

Install the IBM Cloud CLI and authenticate using your API key:

curl -fsSL https://clis.cloud.ibm.com/install/linux | sh ibmcloud plugin install cloud-object-storage ibmcloud login --apikey <API-KEY>

Set the region and resource group:

ibmcloud cos config region in-che -g vpclz-services-rg

Configure the COS CRN:

ibmcloud cos config crn --crn <CRN>

Verify the presence of COS buckets:

ibmcloud cos buckets

Sample Output:

OK 2 buckets found in your account: Name Date Created (UTC) edge-vpc-atc-tyres-bucket Jan 07, 2026 at 08:34:57 t1-atc-test-bucket Jan 28, 2026 at 09:32:32

Successful output confirms access to the COS buckets from the PowerVS instance.

Configure Internet Outbound Connectivity for PowerVS Instances

PowerVS instances often require outbound Internet connectivity, for example, to download operating system or firmware updates.

In this setup, the virtual server instance (VSI) attached to the VPC network-services subnet functions as the proxy forwarder through the Public Gateway (P-GW). Refer to the Provision a VSI in the edge-vpc-nw-services Subnet section for details on the VSI.

Configure VPC Routing Table

Create a VPC routing table with the following settings:

  • Traffic sources: Transit Gateway and Direct Link
  • Advertise to: Enabled

Add the following two routes to the routing table:

  • Local VPC network route – Action set to Delegate
  • Internet route (0.0.0.0/0) – Destination next hop set to the VSI's IP address, with Advertise set to On.

The following figure illustrates Internet-bound traffic from the PowerVSI through the VPC network-services subnet P-GW.

For more information, see Simple Internet egress for Power Virtual Servers.

Verify PowerVSI Internet Connectivity

To verify outbound connectivity from the Power Virtual Server instance, perform a ping test:

[root@powervs-backup-vsi ~]# ping -c 1 google.com PING google.com (142.250.117.102) 56(84) bytes of data. 64 bytes from um-in-f102.1e100.net (142.250.117.102): icmp_seq=1 ttl=95 time=234 ms

A successful response indicates that the PowerVSI has Internet access through the configured proxy forwarder.

Verify End-to-End Hybrid Network Connectivity

Verify network connectivity from the on-premises environment to Virtual Server Instances and IBM Cloud Object Storage (COS).

Ping Test to VPC VSIs and PowerVSIs

From a local desktop terminal (PowerShell or Git Bash), run the following commands:

Ping the Bastion Host VSI:

PS C:\> ping -n 1 10.30.40.10 Pinging 10.30.40.10 with 32 bytes of data: Reply from 10.30.40.10: bytes=32 time=22ms TTL=62 Ping statistics for 10.30.40.10: Packets: Sent = 1, Received = 1, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 22ms, Maximum = 22ms, Average = 22ms

Ping the Network Services VSI:

PS C:\> ping -n 1 10.30.40.10 Pinging 10.30.40.10 with 32 bytes of data: Reply from 10.30.40.10: bytes=32 time=22ms TTL=62 Ping statistics for 10.30.40.10: Packets: Sent = 1, Received = 1, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 22ms, Maximum = 22ms, Average = 22ms

Ping PowerVSI:

PS C:\> ping -n 1 10.52.0.12 Pinging 10.52.0.12 with 32 bytes of data: Reply from 10.52.0.12: bytes=32 time=20ms TTL=49 Ping statistics for 10.52.0.12: Packets: Sent = 1, Received = 1, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 20ms, Maximum = 20ms, Average = 20ms

Successful responses confirm on-premises network connectivity to the VPC Bastion, Network Services, and Power VSIs.

Verify IBM COS Direct Endpoint DNS resolution:

PS C:\> nslookup s3.direct.in-che.cloud-object-storage.appdomain.cloud Server: dns01v6.ibm.com Address: 2620:1f7::1 Non-authoritative answer: Name: s3ep.direct.in-che.gslb.cloud-object-storage.appdomain.cloud Address: 161.26.12.140 Aliases: s3.direct.in-che.cloud-object-storage.appdomain.cloud

These results confirm that access to IBM COS via the direct endpoint resolves to a public IP address while routing traffic over IBM Cloud's internal backbone network.

Ping Test to IBM COS Direct Endpoint:

PS C:\> ping -n 1 s3.direct.in-che.cloud-object-storage.appdomain.cloud Pinging s3ep.direct.in-che.gslb.cloud-object-storage.appdomain.cloud [161.26.12.136] with 32 bytes of data: Reply from 161.26.12.136: bytes=32 time=64ms TTL=252 Ping statistics for 161.26.12.136: Packets: Sent = 1, Received = 1, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 64ms, Maximum = 64ms, Average = 64ms

A successful response confirms on-premises network connectivity to the IBM COS service.

CURL Access to COS Direct Endpoint:

$ curl -v https://s3.direct.in-che.cloud-object-storage.appdomain.cloud 2>&1 | grep -F "Established" * Established connection to s3.direct.in-che.cloud-object-storage.appdomain.cloud (161.26.15.164 port 443) from 192.168.253.130 port 49677

The output shows that the COS direct endpoint is reachable and responding. The "Established connection" line confirms TCP/SSL connectivity.

Note: 403 is a valid S3 service response expected for anonymous requests. You can access objects using pre-signed URLs.

Access COS Buckets Using IBM Cloud CLI

Install the IBM Cloud CLI and authenticate using your API key:

PS C:\> curl -fsSL https://clis.cloud.ibm.com/install/linux | sh PS C:\> ibmcloud plugin install cloud-object-storage PS C:\> ibmcloud login --apikey <API-KEY>

Set the region and resource group:

PS C:\> ibmcloud cos config region in-che -g vpclz-services-rg

Configure the COS CRN:

PS C:\> ibmcloud cos config crn --crn <CRN>

Verify the presence of COS buckets:

PS C:\> ibmcloud cos buckets

Sample Output:

OK 2 buckets found in your account: Name Date Created (UTC) edge-vpc-atc-tyres-bucket Jan 07, 2026 at 08:34:57 t1-atc-test-bucket Jan 28, 2026 at 09:32:32

Successful output confirms access to the COS buckets from the on-premises environment.

Summary

This document provides guidelines for setting up hybrid networking and connectivity from on-premises to PowerVS using IBM Cloud VPC infrastructure. The deployment follows IBM Cloud best practices for security, networking, and resource organization.

Future Enhancements

This document will be enhanced with recommendations for deploying key industry-specific workloads.

References

The following references provide additional details:

Version History

Version Date Changes 1.1 2026-04-30 Updated product naming from "IBM Cloud Power Virtual Server" to "IBM Power Virtual Server" throughout the document for consistency with official product naming conventions. 1.0 2026-04-20 Initial publication

Trademarks

IBM, the IBM logo, IBM Cloud, IBM Cloud Pak, IBM Consulting, IBM Security, IBM Sterling, IBM Watson, IBM watsonx, IBM Z, AIX, CICS, Cloudant, Cognos, DataPower, DataStage, Db2, FileNet, FlashCopy, Guardium, Informix, Instana, Maximo, MQ, Netezza, Power, PowerHA, PowerVM, QRadar, RACF, Rational, Red Hat, Redbooks, SPSS, Sterling, Tivoli, Turbonomic, WebSphere, and z/OS are trademarks of International Business Machines Corporation, registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the web at "Copyright and trademark information" at www.ibm.com/legal/copytrade.shtml.

Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both.

Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both.

Red Hat, JBoss, OpenShift, Fedora, Hibernate, Ansible, CloudForms, RHCA, RHCE, RHCSA, Ceph, and Gluster are trademarks or registered trademarks of Red Hat, Inc. or its subsidiaries in the United States and other countries.

Other company, product, or service names may be trademarks or service marks of others.