Virtual Private Network (VPN)

An overview of Scout’s encrypted network foundation

Overview

The Scout Virtual Private Network (VPN) establishes a secure communication layer for all connected environments. It encrypts and routes network traffic through Scout’s protected core, enabling centralized visibility and control while keeping internal devices isolated from the public internet.

The VPN forms the backbone of Scout Secured, connecting homes, shops, and organizations under a single protected framework that supports monitoring, policy enforcement, and threat detection.


Why It Matters

A VPN is the foundation of every secure environment. It ensures that data in transit remains confidential, prevents exposure of internal IP addresses, and allows Scout’s inspection systems to identify malicious activity before it reaches users.

For administrators, the VPN provides:

  • Consistent protection across all locations and devices
  • Private, encrypted communication over any existing internet connection
  • Centralized visibility into traffic patterns and threats
  • Controlled isolation between networks or sites

This approach eliminates the need for complex site-to-site tunnels or per-device firewall rules while maintaining strong segmentation between connected networks.


Integration with Other Services

The VPN acts as the conduit for Scout’s other protections:

Service Interaction
Blackhole Filters and blocks malicious or restricted domains as traffic passes through the VPN
Sentry Monitors VPN traffic for intrusions and policy violations
Vault Remains accessible only through VPN-secured connections to ensure password integrity

Metrics such as Active Incidents and Devices Online reflect the operational health and security of VPN-connected devices.


Maturity Application

Level Focus
Foundation Deploy routers and connect key devices to establish secure connectivity.
Visibility Begin monitoring VPN activity, device status, and incident counts.
Control Implement access policies, enforce per-user credentials, and review VPN usage metrics.
Optimization Automate peer provisioning and integrate VPN insights into broader security operations.


Features Overview
Level 1 — VPN Setup
Getting Started
Features
Dashboard Reference
Help