This is a general overview of how our VPN solutions can be used, please reach out to us to discuss your requirements.

A simple LAN-to-LAN VPN setup between two branches in Manama and Seef

VPN in the context of our website does not refer to subscription-based services where you need to re-route your traffic through some provider.

On this website, VPNs specifically refer to situations where you own the devices and control all end-points.. an example would be securely connecting multiple locations of a company over the Internet. Not every company wants to put their data in the “cloud” or expose their traffic to a 3rd party. In that context, the two most common types of VPNs are:

  1. LAN-to-LAN: you link two locations for the purpose of virtually having all machines on both sides to be on a single network (illustrated in first diagram above).
  2. Road-Warrior: is when a single device (laptop/PC/phone), connects to a network securely to access its resources, like an employee connecting back to HQ office using an encrypted VPN tunnel.

Road-warrior: an employee that works from anywhere.

Many VPN protocols exist, some are better suited depending on situation

Many VPN protocols exist, on Enterprise hardware like those provided by Cisco or Juniper, most of the time IPSec is used, but many other protocols exist that could potentially be better suited for the task at hand.

For example, if you have a road-warrior setup where the user is connecting using an unstable link, say over 4G/LTE in a remote area, then Wireguard could be better suited, as it does not have the overhead of IPSec associations, it establishes a link (and reconnects) much faster, as there’s no phase 1, phase 2.. etc.

When recommending a solution to a customer, we look at the particular use-case to determine the most suitable protocol. Please feel free to reach out to us to discuss further.