Skip to main content

Remote Access Solution for IT Consulting

Autotunnel was designed for use-cases where quick, easy and secure remote access into untrusted networks is a requirement. As such, it is particularly suited to consulting activities that necessitate access to a clients network. This was in fact the initial motivation for building Autotunnel. Below are just some of the benefits of using Autotunnel as your remote access solution.

The Autotunnel Dashboard - Simplifying client and peering management. Groups can be created for each of your clients, under which you can create individual peerings as required. This makes the management of clients and peerings simple. Notes can be included at both the group and peering level. For instance, noting client contact information, or client specific requirements. The status of individual nodes and peers can also be monitored with ease.

The Autotunnel Virtual Appliance - Handles all of the complexities of establishing a secure tunnel for both you and your clients. You no longer need to be an expert to get a VPN up and running. Simply download and run the virtual appliance, input your key and a shared secret, and watch the virtual appliance work its magic.

Peerings are reusable - Once you're finished with a peering, simply delete it within the Autotunnel Dashboard to free it up to be used elsewhere. No need to transfer or purchase additional licences for new virtual appliances; as long as you're within your peering allowance you can create new peerings and generate keys via your dashboard.

Built with security as our number one priority - We don't compromise on security. Tunnels are encrypted using AES-256 in GCM mode for confidentiality and integrity. DH Group 20 (384-bit EC) is used for key exchange. Your encryption keys never leave your virtual appliance, and your traffic never traverses our servers or infrastructure.

Restricts access to your own network - Whilst you can access remote peer subnets via your virtual appliance, peer subnets will not have access to your subnets. Only return traffic that was initiated by your local subnets will be allowed through, this provides a layer of protection even when connecting to untrusted remote networks.

With remote access being made so simple, both you and your clients have more flexibility in how and when work is carried out. It also opens up the possibility offering additional services to clients that may not have been as feasible before due to access constraints.