Blog

Twingate - the VPN Killer

Jonathan Canaveral
October 10, 2023

What is Twingate?

Twingate functions somewhat similar to a proxy, allowing you to direct any IP address from a local network and make its user-defined ports accessible on the internet.

Zero Trust Network Access (ZTNA)

Twingate operates on the principle of zero trust, which means that it doesn’t inherently trust any user or device, even if they are within the corporate network. Users and devices must authenticate and meet certain security criteria before gaining access to resources.

Cloud-Based

Twingate is a cloud-native solution, which means it doesn’t require on-premises hardware or extensive configuration. It can be easily integrated into existing corporate networks and cloud environments.

Secure Access for Remote Workers

Twingate is particularly suited for organisations with remote and distributed workforces. It ensures that development teams, employees, contractors, and partners can securely access company resources from anywhere while maintaining security and compliance.

Granular Access Control

Administrators can define access policies that are highly granular, allowing them to specify who can access which resources and under what conditions. This helps minimise the attack surface and enhances security.

Simplified Access

Twingate aims to simplify the access process for users. Instead of complex VPN configurations, users can typically connect with a simple app or web interface, making it user-friendly.

Multi-Factor Authentication (MFA)

Twingate often supports multi-factor authentication, adding an extra layer of security to the authentication process.

Audit and Logging

Twingate provides detailed logs and audit trails, which can be useful for compliance and security monitoring.

Integration

It can integrate with existing identity providers (such as Active Directory or SAML-based solutions) and various cloud services and applications.

Twingate is free

https://www.twingate.com/pricing - Up to 5 users, 1 admin - Up to 10 remote networks

Example Use Cases

  • Consider a scenario where you have a NAS within your local network, and you wish to grant access to a trusted individual.

  • You can also expose web applications, APIs, and similar resources, with their access points resembling local network IP addresses.

  • Consider a situation where you’re within a network that cannot be accessed from outside. It’s akin to being in a CGNAT (Carrier-Grade Network Address Translation) setup, where you lack a dedicated public IP address. Instead, in CGNAT, a single public IP is shared among multiple users.

How to install Twingate Connector

Twingate connector is a service you can run in different ways. But the most popular way of running it is through docker or a linux services. https://www.twingate.com/docs/quick-start#deploy-a-connector

However, before you embark on the journey of installing this service, it’s essential to create a network and add resources within the Twingate dashboard. https://www.twingate.com/docs/quick-start#define-a-new-remote-network https://www.twingate.com/docs/quick-start#define-a-resource

Once you’ve completed that configuration, you’re ready to proceed with the installation of the Twingate connector service.

Managing Your Team

A a free user, you can only have 5 users in your network https://www.twingate.com/docs/team

How to install Twingate Client

Instruct your users to install the Twingate client from https://www.twingate.com/download and ensure they correctly specify your network’s name when logging in.

Conclusion

VPNs remain valuable in numerous scenarios, but when it comes to security and accessibility, Twingate offers a broader range of benefits.

If you’d like to witness this entire setup in action, I’ve discovered an informative YouTube video for you by #NetworkChuck. You can watch it at this link: https://www.youtube.com/watch?v=IYmXPF3XUwo&t=1273s&ab_channel=NetworkChuck

We can help you with your application and any development requirements. Please contact us!