Setup your own VPN. The services you mentioned are for privacy protection and access of streaming services from other countries only. They won’t offer a tunnel to your network.
Go with OpenVPN or Wireguard. Or look into solutions from Palo Alto or Juniper.
We had a requirement for IPSEC and used strongswan. We do some layer 2 tunnels with OpenVPN, and are currently playing with wireguard. These are all network devices, not users. For that I’d probably do OpenVPN.
make a machine or vm with pfsense. it supports ipsec openvpn etc. has a nice web ui and you can buy support if you need to. but i use it like 5 years now in multiple setups. never had any issues with it. it is also open source and free to use.
Sounds like a discusion to have with your network team. Most Firewalls have VPN ability built in. Otherwise Wireguard, OpenVPN, Tailscale, Zerotier would be other options.
I’m surprised to see Wireguard mentioned only once, given its simplicity and speed it’s an absolute no-brainer, on top of that is built into the Kernel nowadays
I happen to have a router at a data center that I use also as a vpn server. It’s a mikrotik ccr. So far it handles around 400+ L2TP tunnels with no problem. My servers sit behind it, administrators are assigned a special IP block. My servers secondary port are also in that block and ssh only listen on that port. If you are using a cloud infrastructure like aws I think it’s the same, your router will only be virtual instead of physical.
Well we are not really a corporation, I’m talking about 10 users that want to access Wordpress backend securely and me who wants to secure access to a dozen of servers. Do you think this options are still not suitable for us?
You want something like Cloudflare Zero Trust (free/easy with no client
sw to install or manage) Tailscale (heard only good things but haven’t
used), or take a more manual approach and setup wireguard manually
Came here to recommend Cloudflare ZTNA using their tunnel and agent for “vpn” access.
You could also set up a Guacamole server and lock it down behind layers of authentication.
Don’t use “access Netflix from a foreign country” services to secure corporate access to resources.
Do use a service designed for corporate use, and that prioritises ease of implementation, such as Tailscale. This is important unless you actively want to make “running a VPN” part of your job or at the least /someone’s/ job in the future.