What VPN services are you using?

Setup your own VPN. The services you mentioned are for privacy protection and access of streaming services from other countries only. They won’t offer a tunnel to your network.

Go with OpenVPN or Wireguard. Or look into solutions from Palo Alto or Juniper.

OpenVPN is great! Most of the MAS devices allow some sort of VPN. OpenVPN is most common and easy to configure and run.

We had a requirement for IPSEC and used strongswan. We do some layer 2 tunnels with OpenVPN, and are currently playing with wireguard. These are all network devices, not users. For that I’d probably do OpenVPN.

make a machine or vm with pfsense. it supports ipsec openvpn etc. has a nice web ui and you can buy support if you need to. but i use it like 5 years now in multiple setups. never had any issues with it. it is also open source and free to use.

NordVPN is okay for my needs

Sounds like a discusion to have with your network team. Most Firewalls have VPN ability built in. Otherwise Wireguard, OpenVPN, Tailscale, Zerotier would be other options.

I’m surprised to see Wireguard mentioned only once, given its simplicity and speed it’s an absolute no-brainer, on top of that is built into the Kernel nowadays

I’ve been using Private Internet Access for nearly 10 years and it’s been fantastic the entire time.

Plus they give you access to a proxy server for… uh… downloads.

I happen to have a router at a data center that I use also as a vpn server. It’s a mikrotik ccr. So far it handles around 400+ L2TP tunnels with no problem. My servers sit behind it, administrators are assigned a special IP block. My servers secondary port are also in that block and ssh only listen on that port. If you are using a cloud infrastructure like aws I think it’s the same, your router will only be virtual instead of physical.

OpenVPN would probably be best but I use Nord as well. You can also do Nord through OpenVPN.

I replied to the above comment.

Not sure what you mean about Tailscale updates. There are official apt/yum repos from Tailscale that make updates exactly the same as OS updates.

What are the advantages over OpenVPN?

Good answer. There’s also OpenVPN cloud which takes away the need to run a server at all

This is what we use. 250 concurrent connections on an on-prem server. Works great, upgrades are easy and the v3 client is very nice.

Well we are not really a corporation, I’m talking about 10 users that want to access Wordpress backend securely and me who wants to secure access to a dozen of servers. Do you think this options are still not suitable for us?

You want something like Cloudflare Zero Trust (free/easy with no client
sw to install or manage) Tailscale (heard only good things but haven’t
used), or take a more manual approach and setup wireguard manually

Came here to recommend Cloudflare ZTNA using their tunnel and agent for “vpn” access.

You could also set up a Guacamole server and lock it down behind layers of authentication.

Nothing you posted there changes my advice.

Don’t use “access Netflix from a foreign country” services to secure corporate access to resources.

Do use a service designed for corporate use, and that prioritises ease of implementation, such as Tailscale. This is important unless you actively want to make “running a VPN” part of your job or at the least /someone’s/ job in the future.

If you don’t control both ends there’s NOTHING “private” about it.

This.

Guacamole is a privileged access tool rather than a remote access tool. Didn’t work for my use-case. Might be good for the OP.