Architecture Overview
These are the standard deployment models for connecting Access Gate and structuring your network.
Lollipop Mode (Standard Deployment)
Access Gate uses a lollipop topology rather than traditional inline deployment. The appliance connects to your network but doesn't sit in the physical traffic path.
Why Lollipop?
Traditional inline security devices create several problems:
- Single point of failure: Network goes down if device fails
- Performance bottleneck: All traffic limited by device throughput
- Complex deployment: Getting inline network changes right the first time is... challenging
- High risk: Misconfiguration can take entire network offline
Lollipop architecture solves these issues:
- Adjacent placement: Appliance sits beside network, not in the path
- Software-defined interception: Traffic redirected via DNS and routing
- Graceful degradation: Network functions normally if appliance offline
- Zero-touch deployment: No physical network changes required
How Traffic Flows
Without Access Gate (Underlay Network):Client → Asset
With Access Gate (Overlay Network Active): Client → Overlay IP → Route to Access Gate (Double NAT)
In the Access Gate scenario, it is important to note that the Client never access the Asset directly, but always through the proxy. The Access Gate initiate a second communication with the Asset (in red above).
This allows to deploy authentication, access control, monitoring... and all the good stuff.
How it works:
- Access Gate observes traffic via a netflow connection to the router
- Builds an overlay IP space (commonly 100.64.0.0/16) that maps protected services to proxy-enforced paths
- DNS resolves protected hostnames to overlay IP addresses
- Routing directs overlay traffic through Access Gate
- Assets remain on their original underlay network
Benefits:
- No single point of failure in the traffic path
- No physical network changes required
- Simple to deploy and remove
- The network continues to operate normally if Access Gate is offline
Bastion Mode for Remote Access
What it is: Access Gate becomes the single controlled entry point for users coming from outside the site. Remote users connect via VPN (Tailscale/WireGuard) to Access Gate, and Access Gate brokers access to protected assets through its proxy.
Why this mode exists (the problem it solves): Remote access to OT / sensitive IT usually ends up as one of these patterns:
- Flat VPN into the LAN
- Jump box / RDP server
- Vendor remote tools
What Bastion Mode improves
- Least-privilege remote access
- Stronger boundary
- Auditability
- Operational safety
- Vendor access without permanent exposure
When to choose it
- You need remote access for operators, IT, vendors, or incident response.
- You want to avoid “VPN = inside the LAN.”
- You need consistent logs/evidence for NIS2/CMMC/NIST-style controls.
Access Gate acts as a VPN gateway, enabling remote users to securely reach on-site assets. The network flow looks like:
Remote Users → VPN (Tailscale / WireGuard) → Access Gate
Multi-Site Mesh
What it is: Multiple Access Gates form an encrypted mesh between sites. Each site keeps its local underlay unchanged, but selected assets/services become reachable across sites through controlled, identity-based policies.
Why this mode exists (the problem it solves) Organizations with multiple sites often end up with:
- Site-to-site VPNs that are flat
- Complex network engineering
- Inconsistent controls per site
What the mesh improves
- Zero-trust across sites (Alice on site A is able to access CNC on Site B)
- Standardized security posture
- Faster rollout
- Unified logging and documentation for auditors
Typical use cases
- Central engineering team needs controlled access to machines across plants.
- Shared services (historians, patch repositories, backup, monitoring) must be reachable securely.
- M&A / multi-entity environments where networks must remain separate but collaboration is required.
- You want “connectivity as policy” instead of “connectivity as routing.”
Multiple Access Gates interconnect over VPN to provide secure, site-to-site connectivity:
Site A Assets ← Access Gate A ←→ Access Gate B
Requires: Site Mesh feature configuration