OS CentOS 7.6
Network-as-a-Service meets Connectivity-as-Code. Your applications will control private, zero trust, high performance connections across the Internet.
Use our SDKs to embed secure, high performance, private networks into your apps. You and your customers instantly plugin from any Internet access. Your app will perform better for your customers, and you and your customers will eliminate the costs, time and pain involved in legacy solutions which require VPNs, private circuits or infrastructure deployments.
Add the cost savings of reducing hardware, private circuits and VPNs to the productivity gains of automation, speed and agility. Get the security of a Zero Trust, Software Defined Perimeter and high performance across any set of edges, clouds and service meshes. Optimize any individual app or site, or all of them, without disrupting your WAN and without deploying the infrastructure.
Use the NetFoundry 1-Click App to: 1. Spin up your network in minutes via web console and APIs 2. Use our client software to connect user devices across our global network fabric from any Internet connection 3. Use our virtual gateways to connect any site, data center or cloud from any Internet connection NetFoundry extends any WAN without requiring re-engineering, custom hardware or specific network providers. Simply connect your selected apps, user and IoT devices, and sites into zero-trust, high-performance private networks. Extend your private WAN benefits globally, with software. We provide the core infrastructure as a fully managed, on-demand service so that you control the networks without building or managing them. Use your existing Internet connections as short on-ramps to our managed global core network fabric, built over the Internet, leveraging multiple tier one providers. Our platform enables you to do app-level micro-segmentation across any set of networks and clouds, spinning up app-specific networks called "AppWANs". Each AppWAN is "dark" and encrypted, protecting you from DDoS and Man in the Middle attacks. Each device you attach to the network is authenticated via bi-directional certificate validation, included as part of our fully managed service, with the certificates embedded in our endpoint software.
Launch the droplet with privileged log in name "nfadmin" and an SSH pubkey2.
Next you'll register the NG GW with a one-time key. Registration instructions:
Technical overviews, how-tos, release notes, and support material
DevOps and development guidelines
Run your resources programmatically
Connect, share and learn