{"id":52762,"date":"2022-01-06T04:08:30","date_gmt":"2022-01-06T00:08:30","guid":{"rendered":"https:\/\/www.msp360.com\/resources\/?p=52762"},"modified":"2025-11-19T17:45:41","modified_gmt":"2025-11-19T13:45:41","slug":"vpn-management-best-practices","status":"publish","type":"post","link":"https:\/\/www.msp360.com\/resources\/blog\/vpn-management-best-practices\/","title":{"rendered":"VPN Management Best Practices for All Situations"},"content":{"rendered":"<p>VPNs, or virtual private networks, are trending more than ever with the rise of remote work. But how can a managed service provider take full advantage of what VPNs offer? The needs may be many, but they all boil down to two very common factors - accessibility and security.<!--more--><\/p>\n<p>Here is a breakdown of both of these factors, as well as an overview of what VPNs are and how to best manage them.<\/p>\n<h2>VPN Management Best Practices: Types of VPN Connections<\/h2>\n<p>To best support a client\u2019s virtual private network connections, it is important to understand logical design and the difference between VPN clients and VPN gateways. Each client\u2019s need will help determine which connection is best for the situation.<\/p>\n<h3>What is a VPN Gateway?<\/h3>\n<p>A virtual private network gateway, in most cases, is a gateway routing device that can be used to connect to other gateways in a one-to-one setup or to act as a host to multiple client connections. Most business-class firewalls have this option available for use.<\/p>\n<p>No matter which connection method is chosen, each is held to a standard that should offer the user a secure connection to meet their needs. The decision on which connection method to use will come down to situational considerations, including location, facilities, and flexibility.<\/p>\n<h3>Gateway-to-Gateway<\/h3>\n<p>When building a virtual private network to connect two physical networks, the \u201cgateway-to-gateway\u201d model comes to mind. Here are a few examples of where they are found and used.<\/p>\n<ul>\n<li><strong>Connecting two or more office branches.<\/strong> These connections typically have a bidirectional, one-to-one connection design.<\/li>\n<li><strong>Connecting the main office to smaller branch offices<\/strong>. Often called a \u201chub-and-spoke\u201d, the main office has connections to each branch office, while the branch offices do not connect.<\/li>\n<li><strong>Connecting a home office to the main office.<\/strong> This isn\u2019t seen a lot but happens from time to time - especially now, while more people are working from home. Set up much like a branch-office-to-branch-office connection - there is a one-to-one direct connection between the main and home offices.<\/li>\n<\/ul>\n<h3>Client-to-Gateway<\/h3>\n<p>A client-to-gateway connection is typically established between client software on a PC and a main office gateway router. Here are a few places that these are found.<\/p>\n<ul>\n<li><strong>Connecting a home user to the main office.<\/strong> With the rise in remote work, this is the most popular client-to-gateway connection in the past year.<\/li>\n<li><strong>Connecting a mobile user to the main office.<\/strong> Client VPN users do not have to be working from home. Traveling employees that need a connection to the home office can do so using client VPN software.<\/li>\n<li><strong>Connecting to a remote office in outage situations.<\/strong> A common situation in an emergency.<\/li>\n<\/ul>\n<h2>VPN Management Best Practices<\/h2>\n<p>As with most technical configurations, every managed service provider should follow a set of best practices while managing virtual private networks. These best practices cover both client and gateway management. Here are a few ideas.<\/p>\n<h3>Client Software<\/h3>\n<p>Managed service providers have a choice of client software when establishing client-to-gateway VPN connections.<\/p>\n<ul>\n<li><strong>Native OS software.<\/strong> Apple, Windows, and Linux all offer native VPN client software. These can be used with some, but not all, gateways.<\/li>\n<li><strong>Gateway-provided software.<\/strong> Most gateways will have their client software that can be used to connect via VPN. This is often the simplest to set up.<\/li>\n<li><strong>Third-party software.<\/strong> There are a few third-party software providers that offer VPN client software. This is most likely the least beneficial route to go in, as it has not been previously verified by the client OS or gateway manufacturer.<\/li>\n<\/ul>\n<h3>Gateway Device Configuration<\/h3>\n<p>A gateway router acts exactly as described - it is a gateway into your network. Here are a few key ways to be sure that your gateway is configured with security in mind.<\/p>\n<ul>\n<li><strong>Use a strong pre-shared key.<\/strong> Be sure that your pre-shared key is long, random, and contains special characters. Never use something that an intruder would be able to guess at.<\/li>\n<li><strong>Force user authentication.<\/strong> Using a pre-shared key alone for authentication offers anonymity to network offenders and only one level of protection against intruders. Require each user to have a unique username and password for authentication. Furthermore, passwords must meet complexity requirements and should be changed regularly.<\/li>\n<\/ul>\n<h2>VPN Protocol Selection<\/h2>\n<p id=\"last\">Several different protocols can be chosen for VPN encapsulation. Each has its advantages and it is important to understand what each offers when choosing what\u2019s best to use.<\/p>\n<div id=\"slidebox\"><a class=\"close\">\u00a0<\/a><!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-79b6ff0d-42a9-4545-b559-d70d2e8731f2\" data-portal=\"5442029\" data-id=\"79b6ff0d-42a9-4545-b559-d70d2e8731f2\"><span class=\"hs-cta-node hs-cta-79b6ff0d-42a9-4545-b559-d70d2e8731f2\" id=\"hs-cta-79b6ff0d-42a9-4545-b559-d70d2e8731f2\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/79b6ff0d-42a9-4545-b559-d70d2e8731f2\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-79b6ff0d-42a9-4545-b559-d70d2e8731f2\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/79b6ff0d-42a9-4545-b559-d70d2e8731f2.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code --><\/div>\n<h3>PPTP<\/h3>\n<ul>\n<li><strong>Outdated<\/strong>. While this VPN option is still available on many gateway routers, it is outdated and no longer recommended.<\/li>\n<li><strong>Unencrypted<\/strong>. While a tunnel is established, the data transferred across it is unencrypted and is easy to be intercepted.<\/li>\n<\/ul>\n<div class=\"call-to-action\">\n<div class=\"call-to-action__left\" style=\"width: 55%;\">\n<div class=\"call-to-action__title\">Remote Access Security Essentials: Checklist and Best Practices [PDF]<\/div>\n<\/div>\n<div class=\"call-to-action__right\" style=\"width: 45%;\">\n<p style=\"text-align: center;\"><!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-53cea886-67bd-4601-a8c5-972ec6f9195b\" data-portal=\"5442029\" data-id=\"53cea886-67bd-4601-a8c5-972ec6f9195b\"><span class=\"hs-cta-node hs-cta-53cea886-67bd-4601-a8c5-972ec6f9195b\" id=\"hs-cta-53cea886-67bd-4601-a8c5-972ec6f9195b\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/53cea886-67bd-4601-a8c5-972ec6f9195b\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-53cea886-67bd-4601-a8c5-972ec6f9195b\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/53cea886-67bd-4601-a8c5-972ec6f9195b.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code --><\/p>\n<\/div>\n<\/div>\n<h3>IPSec<\/h3>\n<ul>\n<li><strong>Still popular today<\/strong>. Even with its long history dating back to the early 1990s, IPSec is still the most popular and most used protocol today. This popularity leads to reliability and availability on gateway devices.<\/li>\n<li><strong>Two modes: tunnel and transport<\/strong>. These modes offer, respectively, encrypted and unencrypted communications. Managed service providers and users have a choice between speed and security.<\/li>\n<\/ul>\n<h3>SSL<\/h3>\n<ul>\n<li><strong>Uses transport layer security<\/strong>. TLS is one of the most modern security protocols available and highly reliable.<\/li>\n<li><strong>Used by OpenVPN<\/strong>. OpenVPN is one of the most popular VPN solutions because of its open-source technology and free-to-low price point.<\/li>\n<\/ul>\n<h2>Conclusion<\/h2>\n<p>For managed service providers to get ahead in the \u201cnew normal\u201d of work environments, they must be able to provide their clients with virtual private networks that will meet their needs and keep their data safe. Having a deep understanding of how virtual private networks work and the best management practices is just the first step.<\/p>\n<h3>MSP360 Products and Resources<\/h3>\n<p><a href=\"https:\/\/www.msp360.com\/rmm\"><b>RMM<\/b><\/a> <b>Platform:<\/b><span style=\"font-weight: 400;\"> This flagship product provides powerful<\/span><a href=\"https:\/\/www.msp360.com\/rmm\/monitoring-and-alerting\/\"><span style=\"font-weight: 400;\"> monitoring and alerting<\/span><\/a><span style=\"font-weight: 400;\"> and automated<\/span><a href=\"https:\/\/www.msp360.com\/rmm\/patch-management\/\"><span style=\"font-weight: 400;\"> patch management<\/span><\/a><span style=\"font-weight: 400;\"> and <\/span><a href=\"https:\/\/www.msp360.com\/msp-software\/halo-psa-integration\/\"><span style=\"font-weight: 400;\">HALOPSA integration<\/span><\/a><span style=\"font-weight: 400;\">, to ensure endpoints remain secure and operate smoothly.<\/span><\/p>\n<p>Find what <a href=\"https:\/\/www.msp360.com\/resources\/blog\/powershell-vs-cmd-the-difference-explained\">PowerShell and Command Prompt are, what is the difference,<\/a> and when to use each of these tools. Also, having a policy in place makes sense, when it comes to <a href=\"https:\/\/www.msp360.com\/resources\/blog\/cyber-insurance-5-important-things-msps-must-know\/\">cyber insurance<\/a>.<\/p>\n<p><a href=\"https:\/\/www.msp360.com\/managed-backup\/\"><b>Managed Backup<\/b><\/a><b>:<\/b><span style=\"font-weight: 400;\"> This service offers<\/span><a href=\"https:\/\/www.msp360.com\/backup\/cloud-backup\/\"><span style=\"font-weight: 400;\"> reliable cloud backup<\/span><\/a><span style=\"font-weight: 400;\"> and image-based protection. A key feature is the dedicated<\/span><a href=\"https:\/\/www.msp360.com\/saas-backup\/\"> <b>SaaS backup<\/b><\/a><span style=\"font-weight: 400;\"> for popular platforms:<\/span><\/p>\n<p><a href=\"https:\/\/www.msp360.com\/saas-backup\/m365\/\"><span style=\"font-weight: 400;\">Microsoft 365<\/span><\/a><span style=\"font-weight: 400;\">, including<\/span><a href=\"https:\/\/www.msp360.com\/saas-backup\/m365\/onedrive-backup\/\"> <b>OneDrive backup<\/b><\/a><b>,<\/b><a href=\"https:\/\/www.msp360.com\/saas-backup\/m365\/outlook-backup\/\"> <span style=\"font-weight: 400;\">Outlook Backup<\/span><\/a><span style=\"font-weight: 400;\"> features, and <a href=\"https:\/\/www.msp360.com\/saas-backup\/google-workspace\/.\">Google Workspace.<\/a><\/span><\/p>\n<p><span style=\"font-weight: 400;\">Start securing your IT environment today with our<\/span><a href=\"https:\/\/www.msp360.com\/backup\/free-backup-software\/\"><span style=\"font-weight: 400;\"> Free Backup Software<\/span><\/a><span style=\"font-weight: 400;\"> or explore the full range of features. We are a<\/span><a href=\"https:\/\/www.msp360.com\/company\/\"><span style=\"font-weight: 400;\"> trusted company<\/span><\/a><span style=\"font-weight: 400;\"> committed to your success and here we share some tips on how <a href=\"https:\/\/www.msp360.com\/resources\/blog\/msp-marketing-should-msps-target-one-or-several-verticals\/\">MSP marketing can help you grow in a niche better<\/a>, or <a href=\"https:\/\/www.msp360.com\/resources\/blog\/setting-up-a-new-it-department\/\">setting up a new IT department<\/a>.<\/span><\/p>\n<p>Finally, find videos aimed to guide you through installation <a href=\"https:\/\/www.msp360.com\/resources\/video-tutorials\/msp360-explorer\/\">processes for the cloud storage of your choice<\/a>, with advanced features of MSP360 Explorer, an overview the support for <a href=\"https:\/\/www.msp360.com\/resources\/blog\/using-aws-kms-with-backup\/\">AWS Key Management Service in MSP360 Backup<\/a>, or <a href=\"https:\/\/www.msp360.com\/resources\/blog\/how-to-configure-vmimport-role\/\">how to configure a CM import role<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>VPNs, or virtual private networks, are trending more than ever with the rise of remote work. But how can a managed service provider take full advantage of what VPNs offer? The needs may be many, but they all boil down to two very common factors &#8211; accessibility and security.<\/p>\n","protected":false},"author":53,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[877,884],"tags":[],"class_list":["post-52762","post","type-post","status-publish","format-standard","hentry","category-blog-articles","category-msp-business-articles"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/52762","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/users\/53"}],"replies":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/comments?post=52762"}],"version-history":[{"count":7,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/52762\/revisions"}],"predecessor-version":[{"id":61363,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/52762\/revisions\/61363"}],"wp:attachment":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/media?parent=52762"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/categories?post=52762"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/tags?post=52762"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}