![]() Using n2n you can in essence create a network overlay which crosses firewall and that allows you to reach remote network edges without paying attention to network constraints such as NAT. Note that even in this latter case your data will be completely protected due to the end-to-end encryption provided by n2n. While people can use their private supernode, ntop offers a public supernode available at in case you do not want to setup a supernode. The figure below shows you how you can achieve that.Īs most of you now, in addition to popular tools such as nProbe and ntopng, we develop a decentralised peer-to-peer VPN named n2n that allows you to create your own network meshed topology simply installing a small software named edge (and part of the n2n toolkit) and leveraging on a supernode (still part of n2n) that allows remote edge’s to connect even if behind a network. Be able to do all this while remote users might be behind a NAT (e.g.Continuously check the connection speed for every worker: namely perform periodic checks such as the active tests offered by ntopng (ping, continuous ping and speedtest) so that the company can check if the remote worker/site can profitably work having sufficient and permanent bandwidth available. ![]() Monitor the traffic in remote networks such as a small site or home office.In the past months, some people contact us to ask how they could: While this option is still possible, many resources are now available from the cloud thus making VPNs obsolete in some environments, in particular for mobile workforce that connects to the Internet by means of a cellular network. To make things even more complicated, in the past remote workers used to connect to the company network via a VPN. Due to pandemic, many people are now working in a delocalised world: some work from home, others from the office.
0 Comments
Leave a Reply. |