Very slick
Rating: 10 out of 10
IncentivizedUse Cases and Deployment Scope
Transitioning away from P2S VPN and moving over to Cloudflare Zero trust allowed us to jump massively towards a highly available service. Setting up multiple tunnels and routes in depending on device status and user properties allowed a secure and highly redundant service without spending a fortune on firewalls.
Since deploying our design we have yet to see a single outage for remote workers.
Pros
- Redundant tunnel endpoints
- Zero trust access management
Cons
- Static IP addresses are behind a subscription tier. Being able to pay for specific features would be useful when you don’t be the full stack on offer.
- Alerts for tunnels going down could be more granular. While you can subscribe to tunnel down events, there isn’t an obvious difference between 1/5 is down vs 9/10 out of action. Where the latter would be substantially more of a pressing issue you have to login to check which is the case.
Likelihood to Recommend
I have recommended it in several companies now. When setting up for a new business it has a remarkably low barrier of entry for such a substantial service.
Its reverse proxies are less useful in the case of large web services however, due to the lower granularity of performance metrics vs a more specific web proxy service.
Its reverse proxies are less useful in the case of large web services however, due to the lower granularity of performance metrics vs a more specific web proxy service.