Enables Anywhere Access Despite IP Restrictions.
What do you like best about the product?
It helps the users from any location when there IP restriction to access the resources
What do you dislike about the product?
I found the license cost more if the subscribers are just VPN feature.
What problems is the product solving and how is that benefiting you?
It helps our remote users to access IP restricted resources.
Secure remote access has enabled single sign-on and centralized control for all company users
What is our primary use case?
I am currently working with OpenVPN Access Server for approximately 20 users. We use OpenVPN Access Server to connect to our company services from one IP address to secure these connections. OpenVPN Access Server is very lightweight, and the installation process is equally lightweight.
Single sign-on is very important for me because it is one of the principles of zero-trust architecture. In this architecture, each user has minimum privilege and uses one login and one password to connect to any services.
How has it helped my organization?
It is very easy to install and set up OpenVPN Access Server within the organization. Installing and using this service is very easy. OpenVPN Access Server provides a very detailed guide for installing it on your own server and integrating it with Google or Microsoft, making the process straightforward.
What is most valuable?
The best feature of OpenVPN Access Server is single sign-on, which is a very secure feature for information security.
Access control is effective in providing precise access to user groups and devices. In our company, we use a couple of services to control devices and users. One of these is a mobile device management solution such as Miradore or JumpCloud, and another solution to secure the channel to connect to company services is OpenVPN Access Server. Through the admin console, we can manage user rights and connections to company services.
What needs improvement?
I have no answer regarding what I would like to see improved in OpenVPN Access Server. I am not aware of future features, but the current features in the interface and the functionality of OpenVPN Access Server are very good. Everything in OpenVPN Access Server is very good, but the price is expensive.
For how long have I used the solution?
I have been working with OpenVPN Access Server for around three years across two companies where I worked.
What do I think about the stability of the solution?
I find it very stable. All the issues were from my own mistakes, not from OpenVPN Access Server.
What do I think about the scalability of the solution?
I find OpenVPN Access Server scalable and have not seen any limitations with it. The stability was very good, and I have no issues or problems. When we deploy and install OpenVPN Access Server, the principle is to install and forget.
How are customer service and support?
Regarding technical support for OpenVPN Access Server, it is very good and very fast. Any issue was solved in five to ten minutes, or they sent me a description to solve my issue when I could not determine the problem myself. The technical support is very fast and very good.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
I previously used L2TP/IPsec on my home router, and I am currently testing WireGuard for my home network because WireGuard is faster than OpenVPN Access Server.
How was the initial setup?
The user interface of OpenVPN Access Server is very easy. It has two buttons: a download button and a cancel button, along with a checkbox to download only the profile. There are no additional settings, only log out and download options with the checkbox. This is a very simple interface that is very good for users, very good for admins, and very good for security.
What about the implementation team?
We purchased OpenVPN Access Server directly from the OpenVPN market. I found it on the internet, researched it, connected to the company, and after testing, my chief decided to buy this solution for secure connection to our services. Our first purchase was from OpenVPN Access Server, and the next purchase was for the admin panel of OpenVPN Access Server, which was deployed on our rented server as a standalone server.
What was our ROI?
The main benefits that I have seen from using OpenVPN Access Server are that it is simple, easy, and secure.
What's my experience with pricing, setup cost, and licensing?
I find it not cost-effective. It is not worth the money from a pricing perspective. However, it is a good investment for security and company information security. It is a good investment overall.
Which other solutions did I evaluate?
Apart from speed considerations, I use OpenVPN Access Server only for enterprise use and do not have a plan to use it for my home network. This is an enterprise solution and enterprise service, but not for a home user.
What other advice do I have?
For authentication, we use SAML to authenticate users from Microsoft Entra ID or Google Workspace. SAML and single sign-on serve the same purpose. We use SAML and local authentication for the admin, and the admin can authenticate through SAML with a checkbox in the admin panel or user panel.
I have a recommendation that I can share with other organizations considering OpenVPN Access Server. From my previous job, we used OpenVPN Access Server, and when I moved to a new job, I proposed using OpenVPN Access Server, and the chief decided to implement it. In the future, when I see that my friends or friendly corporations or friendly structures want to use a VPN, I will recommend OpenVPN Access Server.
Secure access for remote teams has enabled private network work and compliance
What is our primary use case?
My main use case for OpenVPN Access Server is to allow our employees to access the private network and external web services that are whitelisted to our network.
A specific example of how my team uses OpenVPN Access Server is that developers are accessing private development services, microservices, or resources on AWS, while the business team or sales has access to some specific services launched and implemented on our private network that are closed from internet access.
External parties or partners whitelist our IP addresses, and our employees use VPN to access those services as well.
What is most valuable?
I believe the best features OpenVPN Access Server offers are 2FA authorization and its connection with Google Workspace, which allows for good synchronization.
I use the 2FA authentication and Google Workspace synchronization, and the benefits of these features for my team are that Google accounts of our employees can be synchronized and authorized through SSO, which makes it easier to set up and configure VPN for our employees. If they have a Google account, they can connect to VPN easily. 2FA adds an additional layer of authorization that enhances security.
OpenVPN Access Server has positively impacted my organization by allowing access to our private services, enhancing security, and enabling remote work from anywhere, as I just need to connect to the VPN to have encrypted traffic to our private resources.
What needs improvement?
I think the most difficult part of OpenVPN Access Server that I would improve is the management of the network, particularly the configuration on the admin side of the network and subnets, which is quite complicated.
Some services, such as YouTube, occasionally become unavailable because it seems to be a bot detection issue from YouTube related to the VPN, and I believe that can be improved to ensure other services do not misidentify OpenVPN Access Server as a bot.
I would describe the user interface of OpenVPN Access Server as fine, but sometimes it requires reloading the whole page to see changes, which can be annoying. In cluster mode, I cannot see what node the user is connected to from the cluster without checking each node individually, which could be improved.
For how long have I used the solution?
I have been working in my current field for seven years.
What do I think about the stability of the solution?
OpenVPN Access Server is stable.
What do I think about the scalability of the solution?
OpenVPN Access Server's scalability is somewhat hard to manage, but it remains scalable overall, primarily due to its cluster mode.
Which solution did I use previously and why did I switch?
We did not use a previous solution; however, I could mention WireGuard, which could have been an option but lacked 2FA authorization and Google authorization and operates only on Layer 3, while OpenVPN Access Server works on Layer 7, which is important for business users.
How was the initial setup?
I find it easy to install OpenVPN Access Server, and there are no issues. It is just a couple of clicks or using the package from the Ubuntu package registry, and the documentation is clear on how to do that.
What about the implementation team?
I did not purchase OpenVPN Access Server through the AWS Marketplace; it was set up manually as a self-hosted solution.
What was our ROI?
I have not seen a return on investment in terms of fewer employees needed, money saved, or time saved.
What's my experience with pricing, setup cost, and licensing?
My experience with pricing, setup cost, and licensing for OpenVPN Access Server is that the license was for 10 people and it was fine on a yearly basis.
Which other solutions did I evaluate?
WireGuard was another option considered before choosing OpenVPN Access Server.
What other advice do I have?
OpenVPN Access Server remains stable and works well despite a couple of things that can be improved or enhanced, and the documentation is good with no issues on that side. My impression of the connection speed when using OpenVPN Access Server compared to other VPN solutions is that it is medium; it is not fast and it is not slow, but in some cases, it could be slow.
My advice for others looking into using OpenVPN Access Server is to consider if they need a VPN or just zero trust network access. If they want to route traffic to specific domains, OpenVPN Access Server may not be suitable, but for a secure, safe, and stable VPN with good service integrations such as Google for SAML authorization, it works well and I would recommend it. I would rate OpenVPN Access Server an eight on a scale of one to ten.
Which deployment model are you using for this solution?
Private Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Secure remote access has protected diverse users while access controls provide precise permissions
What is our primary use case?
My primary use case for OpenVPN Access Server is providing secure, centralized access to hybrid cloud environments. Whenever I set up hybrid cloud infrastructure for clients, deploying Access Server is a natural next step. It acts as a gateway, allowing us to securely connect to the private network for routine administration, system updates, and accessing internal dashboards and tools.
How has it helped my organization?
The main benefit I have seen from using OpenVPN Access Server is secure access to private resources over the public internet. That is the key benefit whenever it is set up, and it applies to all types of users. It applies to technical users who want to administer servers, internal users who are working, and executives who want to view internal dashboards. OpenVPN Access Server allows users to feel secure, and indeed, a lot of their traffic is secure. At the same time, if you configure OpenVPN Access Server correctly, users can continue to access non-corporate websites over the public internet, which is beneficial. If they are using Facebook or other personal activities on their phone, they can continue to do that, and that traffic will not be transferred over OpenVPN Access Server. Only when they try to access internal resources will that be accessed over OpenVPN Access Server. I really appreciate that aspect of OpenVPN Access Server.
What is most valuable?
The best features in OpenVPN Access Server for me are the integrations with single sign-on providers so that users can maintain a single corporate identity. I also appreciate the administration dashboard, which allows you to fairly easily provision subnets for different groups. Performance-wise, it is quite performant. OpenVPN Access Server supports both TCP and UDP protocols, and you can decide which to turn on or off. It is fairly performant and reliable. You can trust that once you are in the network, you will access your resources.
What needs improvement?
The user interface of OpenVPN Access Server is good but can be improved. I would prefer to see it become more intuitive. I use Twingate as an alternative, and in Twingate, you see resources, while in OpenVPN Access Server, those would be IP addresses. You get to see dashboards and access views of who can access a particular resource or subnet. You can see who can access what resources from the user view, but you can also see the reverse, which is which resource can be accessed by what users. That reverse view would be a nice addition to have in a dashboard. Additionally, access logs associated with that resource would be helpful, so it would be beneficial to have different views for the same content.
Beyond the positive aspects, I would like to see improvements in OpenVPN Access Server. Twingate offers a different approach to the same problem by moving more towards resource-specific resources and fine-grained zero-trust access, as opposed to entire subnets and entire networks. I would prefer to see views on resources. In the same way that we can define subnets, perhaps we could have views that describe what this particular subnet does and what this particular resource does. Then we can assign those resources and subnets to individual users and groups. It is more about granularizing the resources that can be accessed rather than simply bundling them under subnets or a list of subnets, which is the current approach.
Apart from that, I would like to see UI enhancements in OpenVPN Access Server in the future. Making it more modern would be beneficial.
For how long have I used the solution?
I have been using OpenVPN Access Server for over eight years since 2018.
What do I think about the stability of the solution?
Regarding stability, I have not had any crashes, performance issues, or stability issues with OpenVPN Access Server. That is one thing I appreciate the most about OpenVPN Access Server. Once you set it up correctly, it works and continues to work reliably. I do not recall ever experiencing OpenVPN Access Server crashing or the OpenVPN Access Server client crashing personally.
What do I think about the scalability of the solution?
Regarding scalability, I find OpenVPN Access Server scalable with some caveats. It is scalable on AWS because it is a matter of increasing the instance size and increasing the number of licenses. However, sometimes your license disappears or gets wiped out when you scale the infrastructure, which can be quite annoying, and requires reaching out to support to get set up again. Inherently it is scalable, but the process of scalability can be enhanced.
How are customer service and support?
I would evaluate OpenVPN's technical support and customer service teams as providing standard support. You send a ticket or create a ticket, and somebody responds, and they seem to know what they are doing. The service is adequate. I would rate the technical support an eight on a scale of one to ten.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
In comparison with other products and solutions such as Twingate or other VPN services, the key differences between OpenVPN Access Server and competitors include access to resources versus subnets, focusing on fine-grained access. Another difference is the ability to see logs specific to the resource that has been accessed. Compared to other products such as Cisco, the advantages include reliability and the protocol—OpenVPN Access Server uses HTTPS and UDP, which are universal. Some of the other protocols that other VPN providers use are not guaranteed. OpenVPN Access Server has advantages there. There should be a move more towards zero trust, where you are accessing a specific resource, defining a specific server or subnet, and assigning access to those resources to individual users or groups. That approach would be better.
How was the initial setup?
The ease of installing and setting up OpenVPN Access Server within the organization depends on the skillset of the person conducting the setup. On AWS, I would say it is medium difficulty because you have to select the right license and the right instance size, and it is not inherently clear what instance size to use. On-premise, it is fairly easy to set up. The setup for clients depends on the client that the end user is using. On mobile devices, sometimes I find that Mac users and iPhone users find it easier to set up than Android users. Overall, I would characterize the setup difficulty as medium. It is not too difficult and also not too easy.
What's my experience with pricing, setup cost, and licensing?
My experience with the pricing, setup cost, and licensing cost of OpenVPN Access Server is that the licensing is fair for the value provided. My experience is mostly on AWS, and there, I think the pricing is quite fair.
What other advice do I have?
I utilize the Access Controls feature of OpenVPN Access Server by provisioning users into groups and then provisioning access to those groups. The effectiveness of OpenVPN Access Server in providing precise access to users, groups, or devices is quite effective and reliable. I would not say it is the most intuitive specifically because there are default access groups, then you have overrides, and it is not inherently clear for someone just getting started with the product. However, if you are more experienced, it is straightforward to set up. Once you set it up, it is reliable, and you have confidence that whatever access you provision for that group of users will be maintained.
I purchase OpenVPN Access Server for my clients through the AWS Marketplace. Given my extensive experience with OpenVPN Access Server, I would recommend that before any organization implements it, they really need to define what their networks and subnets are and what is connected to what. Consider whether your on-premise infrastructure is connected to your cloud and whether your cloud is connected to another cloud. It is essential to have a good understanding of your network. Make sure there are no overlapping subnets, and then decide where to provision OpenVPN Access Server. The key advice is to understand your network before you even provision this resource, because where you provision it will determine what users can access. You certainly want to have a good amount of coverage where possible so that you can access your internal resources securely. I would rate this product an eight overall.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Amazon Web Services (AWS)
Keeps Our Systems Secure with Reliable VPN Access
What do you like best about the product?
It is making our system security threat free , bcos all our micro services and internal systems need vpn access to make it accessible.
It can be access through many OS systems , in our company we are using mac, windows, linux and android.
We use it daily basis and installing this our system is easy as the steps to install is very less.
It provides CLI Tooling
What do you dislike about the product?
Sometimes we get issues with open vpn like connection failed and we have seen some outages too.
Our IT team gets in touch with their Customer Support team and give quick response .
What problems is the product solving and how is that benefiting you?
It helps keep our system secure and threat-free, and it provides secure remote access so I can work from anywhere. New devs, QA, or vendor teams can simply be given a VPN account or an SSO group assignment; when they leave, removing that access in one place immediately cuts their access everywhere.
Secure and User-Friendly with Seamless Licensing
What do you like best about the product?
I like that OpenVPN Access Server is easy to use and easy to manage, and it works great. The activation and licensing process is seamless and easy, which I appreciate. Also, the initial setup was very easy for my team.
What do you dislike about the product?
I wish there was some more cleanup features and reporting in the web UI. Clean out old profiles/users based on connection dates and so on.
What problems is the product solving and how is that benefiting you?
I use OpenVPN Access Server for secure access to our k8s cluster in Azure.
A Decade of Reliable, Easy-to-Admin OpenVPN Access Server
What do you like best about the product?
We have been using OpenVPN for over a decade. OpenVPN is easy for our users, simple to administrate, and has been reliable. Most importantly, in the last couple of years, the amount of effort being put into the product has really reflected on the administration side.
What do you dislike about the product?
With all the recent updates, I find it difficult to find anything I dislike about OpenVPN Access Server.
What problems is the product solving and how is that benefiting you?
OpenVPN provides us the ability to keep our proprietary and sensitive data inside our domain and allows our users access to this information. We are not a cloud-using company, and need our data kept on-premise, so OpenVPN ensures we can do this.
Secure and Confidence-Boosting Protection with OpenVPN
What do you like best about the product?
It gives me an extra layer of protection and helps me feel confident that I’m working securely.
What do you dislike about the product?
I don’t dislike anything about OpenVPN. I just wish they would improve the connection speed when using it.
What problems is the product solving and how is that benefiting you?
Insecure Remote Access: It protects sensitive data with 256-bit AES encryption and applies zero-trust controls to help prevent unauthorized access to internal systems.
Straightforward Web Interface That Works Perfectly on the First Try
What do you like best about the product?
I really like the web interface because it makes managing users and certificates very straightforward. On top of that, it connects successfully on the first try and works perfectly on any computer.
What do you dislike about the product?
Visually, the interface feels a bit dated. It’s functional, but it could really use an update to a more modern design. That’s all.
What problems is the product solving and how is that benefiting you?
You don’t have to be a networking genius to use it. It’s a solid product that works well, gives me a lot of peace of mind, and stays super stable. For me, it’s really worth the price.
Flexible Multi-Platform VPN with Room for Improvement
What do you like best about the product?
I like using OpenVPN Access Server for connecting our different environments to access resources. I appreciate that it provides support for Linux, which helps us meet our client's requirements, unlike other products which only support Windows and Mac. I find the device management, control, and geo-fencing features useful, despite the limited features available for Linux. I also found the initial setup to be easy after understanding the architecture of OpenVPN.
What do you dislike about the product?
I find the need to manually download and share configuration files instead of having the ability to push the config directly to the end system. Also, the control on Linux devices could be improved.
What problems is the product solving and how is that benefiting you?
OpenVPN Access Server supports Linux, resolving OS platform challenges and meeting client requirements.