Staex logostaexDocs
Docs/Staex v2: Conclusion

Staex v2: Conclusion

How tunnels elevate IoT network security to a new level and simplify administration.

Overview#

The newest Staex release blocks network traffic by default and features tunnels as the main building block of your IoT network. Tunnels are versatile:

  • regular tunnels route traffic between two endpoints on Staex network,
  • internet tunnels route traffic between an endpoint on Staex network and an endpoint on the Internet, and
  • external tunnels route traffic between an endpoint on Staex network and a device in the local network (directly attached to one of the Staex nodes).
Tunnels elevate IoT network security to a whole new level. It is no longer possible for third parties to track geographical location of your devices. In the extreme event of a device breach the damage is contained within the tunnels attached to this device, and deactivating these tunnels will permanently block the spread of the malicious activity within the network. Finally, tunnels unprecedentedly simplify firewall configuration and network management in general for system administrators: when everything is a tunnel it is difficult to make mistake in the configuration.

Stay tuned for more updates! We will soon release a web UI that allows one to securely manage the whole IoT network without the cloud. It has been eye-opening experience to use this UI for our network management, and we can not wait for you to try it yourself.

Learn more about the tunnels.