Why do businesses today use VPN?
Whether you have servers in your office, in your data center, or on the cloud – VyOS can be used to establish a secure access to and between any of them.
To promote stability and confidence in your business, you have to make sure that one of your biggest goals is to keep your servers safe and protected from unwanted exposure. Plenty of flexible VPN solutions are available to secure your data communications, whether it’s for internet privacy, remote access for employees, securing IoT, or for networking cloud data centers. If you have already determined your business priorities, now is the time to consider which of the business VPNs is most suitable for your needs and in terms of protecting your sensitive data.
For an end-user VPN using a single VyOS server, OpenVPN will generally provide the best results in terms of ease-of-use and stability. It is best suited for access from a wide range of portable devices such as mobile phones, tablets and notebooks, as the client software is available for most operating systems. Connection can be managed by a server administrator. OpenVPN profiles provide a single-file configuration for each client and server.
For establishing and maintaining a stable connection between networks, VyOS offers support for various tunneling protocols such as GRE, IPIP, VXLAN, GENEVE. If encryption is required, IPSec (VTI or tunnel) and WireGuard are also well supported.
For a network with custom requirements for encryption, L2TP/IPSec might be preferable.
If the traditional VPN protocols are unavailable due to external constraints, SSTP is a suitable alternative.
In addition, VyOS lets you build VPNs that directly communicate with each other across multiple sites without having to statically configure all devices, through DMVPN.
VPN Connectivity
Security on All Devices
Due to the increased amount of devices connected to corporate networks followed by the implementation of “bring your own device” policies, businesses are concerned about providing secure access to their systems for their remote workers.
Cloud Agnostic Integration
Protection of sensitive data from a single interface becomes a priority for businesses as a consequence of integrating their VPNs into cloud-based platforms and services.
Precise User Segmentation
In order to properly monitor the access and usage of a corporate network, a granular policy-based permission system is necessary, which is beyond the capabilities of traditional VPNs.
IP Whitelisting
The option to determine which hosts that are allowed to access the network and the ability to assign static IP addresses to automatically trusted sources of traffic can be crucial to a secure network.
Success Story
J. Warren McClure School of Emerging
CommunicationTechnologies
The J. Warren McClure School of Emerging Communication Technologies (ECT) at Ohio University has used VyOS since early 2014. Prior to VyOS, our student labs were ran using CiscoInfrastructure which limited the capacity of students we could teach at a given time due to the expense and space constraints of physical hardware. On top of that, we faced issues of buying hardware with features that were unnecessary for our purposes, our curriculum requires a breadthof capacity rather than a depth of options. Our growing needs required us to look for new options.
Beat Loosli, GiBB, Bern, Switzerland
We have been using VyOS (formerly Vyatta) for years in computer science education. In Switzerland, there is a four-year training course in vocational education and training to become a system computer scientist and application developer. Every year we train about 350 IT specialists in Bern (Switzerland).
Our training is very action-oriented and close to the real world. During the four years of training, the apprentices work on a learning arrangement with about 20 virtual machines. Half of these are Linux-based and half Windows-based machines, and we use VyOS for network teaching.
Benefits:
- Save costs for your traveling workforce and stay safe in untrusted environments.
- Increased productivity and accelerated encryption performance, scalable to high connections counts.
- Better return on investment than a regular WAN for sensitive data.
- Security and privacy while keeping control over the traffic flow.
- Scalability with multiple protocols and platforms.
- Extended geographic presence across the world.
- Simple configuration of network services.