|
Virtual Private Network
Secure Connectivity, Wherever Your People WorkSite-to-site, client-to-site, site-to-cloud. IPSec, L2TP, PPTP, SSL VPN. Hardware tokens, two-factor auth, VPN acceleration. Industry-standard tunnels that keep confidential traffic encrypted across every link. Request a Demo Explore the Firewall |
|
|
Multi-Protocol
IPSec · L2TP · PPTP · SSL
|
Strong Encryption
3DES, AES 128/192/256
|
Token Support
RSA SecureID · VASCO
|
Multiple Locations, One Secure Network
Modern businesses operate across multiple work locations with employees and stakeholders accessing critical data continuously. Each access point opens a potential threat vector for hackers. Maintaining secured connectivity to the organisation's network is essential to protect against data breach attempts.
GajShield's Data Security Firewall creates Virtual Private Networks — networks completely isolated from the rest of the internet. VPN extends a private network across public networks, allowing users to send and receive data as if their devices were directly connected to the private network. Site-to-site and remote access methods, with encryption services that allow secure connections to be formed across any link.
Connect Whatever Needs Connecting
|
Mode 1
Client to SiteRemote workers and road warriors connecting securely back to corporate resources from anywhere. |
Mode 2
Site to SiteGeographically separated offices joined into one cohesive corporate network with encrypted tunnels. |
Mode 3
Site to Data CentreBranches connecting securely to centralised data centre resources with high-throughput tunnels. |
Mode 4
Site to CloudHybrid deployments connecting on-prem networks to Azure, AWS, GCP workloads securely. |
What GajShield VPN Delivers
|
|
Three Standards, One Platform
Pick the protocol that matches your security and operational requirements — GajShield supports the full set.
|
PROTOCOL 01
PPTPSimple to set up — the main selling point of PPTP. Tunnels form a point-to-point connection over the GRE protocol. Security has been called into question in recent years — strong, but not the most secure option. |
PROTOCOL 02
L2TP / IPsecMore secure than PPTP, with more security features. L2TP creates the tunnel, IPsec provides the secure channel — combining the best features of each protocol. Client-to-site VPN connection mode. |
PROTOCOL 03
IPsecSite-to-site VPN. The IPsec suite enables advanced VPN features. Acts at the network layer, protecting and authenticating IP packets between firewalls, routers, the Secure VPN Client, and other IPsec-compliant peers. |
Industry Standards, Hardened Implementation
GajShield provides industry-standard IPsec (Site-to-Site), L2TP, and PPTP VPN (Client-to-Site/Remote Access) along with High Availability for IPsec. Strong authentication via RSA SecureID, VASCO tokens, RADIUS, LDAP, and Active Directory (with 2FA) prevents network and communication interception — integrated with UserSense.
Strong emphasis on data encryption and user authentication. GajShield uses DES, 3DES, AES encryption with hash algorithms MD5, SHA1, SHA2. Pre-shared keys and digital certificates for secure authentication. Internet Key Exchange (IKEv1 or IKEv2) sets up Security Associations in the IPsec protocol suite.
Additional security features include IPsec NAT Traversal, Dead Peer Detection, and PFS (Perfect Forward Secrecy) support. IPsec VPN tunnel up/down logs and active VPN user logs let admins monitor IP address, VPN status, and connection type per user.
All Supported Capabilities
Protocols & Encryption
|
Authentication & Certificates
|
Connection & Resilience
|
Operations & Visibility
|
Encrypt Every Connection Across Every Site
Talk to a GajShield expert about VPN architecture for your environment. We'll size the deployment, walk through protocol selection, and demonstrate the full VPN stack live.
Request a Demo See SD-WAN See Enterprise Cloud