Server provisioning
Ubuntu 24.04 LTS, 4 GB RAM, root access, ports 443/51820/1194/500/4500 open.
Self-hosted multi-protocol VPN · WireGuard / OpenVPN / IKEv2
Multi-protocol enterprise VPN platform (WireGuard, OpenVPN, IKEv2) self-hosted on your infrastructure. DNS filtering, distributed exit nodes, admin dashboard, deploys on Ubuntu in 5 minutes.
Multi-protocol enterprise VPN platform (WireGuard, OpenVPN, IKEv2) self-hosted on your infrastructure. DNS filtering, distributed exit nodes, admin dashboard, deploys on Ubuntu in 5 minutes.
SYLink Protect — Self-hosted multi-protocol VPN · WireGuard / OpenVPN / IKEv2.
SYLink Protect est conçu comme une suite de microservices isolés : Core Engine (orchestration et access control), Protocol layer (3 protocoles indépendants), DNS Protection, Remote Nodes (infrastructure distribuée), Secure Storage (data + audit logs).
Chaque service tourne dans son propre conteneur, ce qui permet une mise à jour différenciée et une scalabilité horizontale. Le déploiement complet se fait via un installeur en une commande sur Ubuntu.
Concentrateur VPN multi-protocole pour usage utilisateurs ET site-à-site. Auto-bascule, rotation des clés et supervision NOC 24/7. Déploiement on-premise ou en SaaS souverain selon votre choix.
5-minute install on an Ubuntu 24.04 LTS server. SSH then run the installer — everything is configured automatically.
Ubuntu 24.04 LTS, 4 GB RAM, root access, ports 443/51820/1194/500/4500 open.
SSH then run the installer in one command. Certificates, services, protocols configured.
Open the admin dashboard with the credentials shown at install end.
Groups, permissions, VPN profile generation, delivery by email or QR code.
Add new exit nodes from the dashboard, automatic sync.
Ubuntu 24.04 LTS, 4 GB RAM, root access, ports 443/51820/1194/500/4500 open.
SSH then run the installer in one command. Certificates, services, protocols configured.
Open the admin dashboard with the credentials shown at install end.
Groups, permissions, VPN profile generation, delivery by email or QR code.
Add new exit nodes from the dashboard, automatic sync.
↓ Integration pipeline — step by step, from scoping to production ↓
Runs on your Ubuntu server: no data egress, no cloud callback, no third-party vendor.
WireGuard (fast), OpenVPN (compatibility), IKEv2 (enterprise). Your users pick.
Anti-malware, anti-tracker, anti-ad blocklist at the network level. Auto-updates.
Multiple exit servers on your infrastructure, with heartbeat monitoring and auto-sync.
| WireGuard | Inclus, recommandé |
| OpenVPN | TCP / UDP, compatibilité totale |
| IKEv2 / IPsec | Standard entreprise |
| Multi-protocole simultané | Oui — un seul serveur |
| OS | Ubuntu 24.04 LTS |
| Minimum RAM | 4 Go |
| Ports | 443, 51820/UDP, 1194/UDP, 500/UDP, 4500/UDP |
| Domain | Recommandé |
| Users | Illimités |
| DNS filtering | Blocklists configurables |
| Self-service | Portail utilisateur (téléchargement profils, QR codes) |
| Monitoring | Trafic temps réel, logs DNS, exports analytics |
| Encryption | ChaCha20-Poly1305 (WG), AES-256 (OpenVPN/IKEv2) |
| Auth | Mot de passe + MFA, ou certificat |
| Logs | Configurables (RGPD-compliant par défaut) |
| Install token | Validation licence centralisée |
White-label VPN for your customers, exit nodes distributed at their sites, central supervision.
Classified VPN deployed in an air-gap zone, full control of nodes, no external dependency.
Site-to-site tunnels and roaming access, DNS filtering to block malicious domains.
VPN platform for the carrier's enterprise customers, hosted on sovereign infrastructure.
30-minute guided demo, PoC on a pilot perimeter, support by our French teams based in Clermont-Ferrand, Marseille and Rennes.