Restricted Internet Access Feature | OpenVPN Blog (2024)

A walled garden, in internet terms, “... is an environment that controls the user's access to network-based content and services.” A walled garden is used to keep users from exploring outside the walls and to protect against malware, phishing, and other cyber threats. According to TechTarget, “Although a walled garden does not always prevent users from navigating outside the walls, it often makes it more difficult than staying within the environment.”

Other examples of a walled garden environment are:

  • Apple App Store and Google Play Store
  • Social media sites
  • Collaboration platforms (e.g., Microsoft Teams, Slack)
  • MarTech platform (e.g., Google, Facebook, Apple, Amazon)

In these cases, the walled garden allows site operators to keep users on their platforms for as long as possible while protecting them from harmful content beyond the walls.

Walled gardens allow site operators to keep users on their platforms for as long as possible while protecting them from harmful content.

Restricted Internet Access, a new CloudConnexa feature, taps into the walled garden concept to:

  • Improve productivity and security
  • Help people focus on what’s most important
  • Mitigate risk to your network

Read on to learn how Administrators can have complete control over what users and devices access on the internet.

The Need for Internet Restrictions

With the growth of remote and hybrid workforces, employees are working outside the company firewall. They’re using public and home WiFi for internet connections. This, combined with unrestricted access, makes them prime targets for hackers. They’re also accessing apps, social media, and other internet content that isn’t work related. You can block websites on a case by case basis, but rather than play whack-a-mole with threats and bad actors, CloudConnexa lets you build an impenetrable wall around your network by:

  • Restricting secure access to authorized trusted internet destinations alone using continuous encryption and tunneling and blocking all other internet traffic.
  • Defining and enforcing internet access policies for users.
  • Protecting devices and your network from breaches by enforcing restricted internet access.

Recommended Reading: Traffic to private resources on your connected networks always traverses the tunnel to CloudConnexa, but there are different ways — Restricted Internet, Split Tunneling — you can control the traffic bound for the internet. Visit Internet Access Settings and Security Levels for details on built-in security solutions and interaction with Internet Access settings, as well as security levels for internet routing.

Create a Walled Garden With Content and Services from Trusted Domain Names

One use case for Restricted Internet Access is use-specific devices. Administrators can allow the device to access trusted sites only and block access to everything else on the internet. For example, a PC used for employee time tracking should limit access to the Microsoft OS update site and the time keeping app. Without internet restrictions, the device can be used to access web pages that expose it — and the network it’s on — to cyber threats.

Good to Know: How does a VPN (virtual private network) help with network security? Here’s how.

To curtail threats, admins can configure the public domain names, or public IP address ranges, of the timekeeping and OS update service as routes to the Internet Gateway network. This, combined with configuring Restricted Internet for the device, blocks all internet access other than the configured services. The result is that 1) the computer has safe access to necessary internet services, 2) internet connection abuse is prevented by locking down its allowable internet access, and 3) the risk of the device being infected by malware and other cyber threats is eliminated.

For more examples of use cases that may be relevant to your business or industry, check out our solutions page: Restricted Internet Access: Balance Convenience and Security.

Additional Protection With Cyber Shield

Included with CloudConnexa at no extra cost, Cyber Shield is an easy-to-use, customizable IDS/IPS that can be used along with Restricted Internet to add depth in defense.

Good to Know: OpenVPN Connect, the official client software developed and maintained by OpenVPN Inc., works with Windows, macOS, Linux, Android, and iOS operating systems.

Secure Virtualized Networking With CloudConnexa

The CloudConnexa network as a service (NaaS) solution combines the strengths of a VPN, ZTNA, SD-WAN, and SASE security. This enables secure, virtualized connectivity between employees, devices (IoT/IIoT), and networks of small to midsize organizations, as well as for branch offices of large enterprises.

If you’re already using CloudConnexa, learn how to configure Restricted Internet Access here. And if you’re not using CloudConnexa, you can start — right now — with three free connections.

Restricted Internet Access Feature | OpenVPN Blog (2024)
Top Articles
5 Tips for making a full-time income blogging - Jehava Brown Blog
Financial Planning in Your Bullet Journal: Gain Control of Your Finances ⋆ The Petite Planner
Hometown Pizza Sheridan Menu
Friskies Tender And Crunchy Recall
Places 5 Hours Away From Me
biBERK Business Insurance Provides Essential Insights on Liquor Store Risk Management and Insurance Considerations
What is IXL and How Does it Work?
12 Best Craigslist Apps for Android and iOS (2024)
What Does Dwb Mean In Instagram
Newgate Honda
Blog:Vyond-styled rants -- List of nicknames (blog edition) (TouhouWonder version)
104 Whiley Road Lancaster Ohio
Nwi Arrests Lake County
Kvta Ventura News
Trac Cbna
Touchless Car Wash Schaumburg
Jail View Sumter
Jeffers Funeral Home Obituaries Greeneville Tennessee
Naval Academy Baseball Roster
Synergy Grand Rapids Public Schools
2011 Hyundai Sonata 2 4 Serpentine Belt Diagram
Doctors of Optometry - Westchester Mall | Trusted Eye Doctors in White Plains, NY
Safeway Aciu
Intel K vs KF vs F CPUs: What's the Difference?
How do you get noble pursuit?
1636 Pokemon Fire Red U Squirrels Download
Movies - EPIC Theatres
Evil Dead Rise Showtimes Near Regal Sawgrass & Imax
Xfinity Outage Map Lacey Wa
Gerber Federal Credit
Petsmart Distribution Center Jobs
Truis Bank Near Me
Appleton Post Crescent Today's Obituaries
Edward Walk In Clinic Plainfield Il
Http://N14.Ultipro.com
W B Crumel Funeral Home Obituaries
Ket2 Schedule
R&J Travel And Tours Calendar
Regis Sectional Havertys
Duff Tuff
Boone County Sheriff 700 Report
Timberwolves Point Guard History
R: Getting Help with R
Avance Primary Care Morrisville
Jane Powell, MGM musical star of 'Seven Brides for Seven Brothers,' 'Royal Wedding,' dead at 92
Vci Classified Paducah
Online College Scholarships | Strayer University
F9 2385
Tyrone Unblocked Games Bitlife
O'reilly's On Marbach
Parks And Rec Fantasy Football Names
Famous Dave's BBQ Catering, BBQ Catering Packages, Handcrafted Catering, Famous Dave's | Famous Dave's BBQ Restaurant
Latest Posts
Article information

Author: Chrissy Homenick

Last Updated:

Views: 5903

Rating: 4.3 / 5 (74 voted)

Reviews: 81% of readers found this page helpful

Author information

Name: Chrissy Homenick

Birthday: 2001-10-22

Address: 611 Kuhn Oval, Feltonbury, NY 02783-3818

Phone: +96619177651654

Job: Mining Representative

Hobby: amateur radio, Sculling, Knife making, Gardening, Watching movies, Gunsmithing, Video gaming

Introduction: My name is Chrissy Homenick, I am a tender, funny, determined, tender, glorious, fancy, enthusiastic person who loves writing and wants to share my knowledge and understanding with you.