๐Ÿ 

Use Case 01

Secure Remote Work Access

Give your distributed team fast, encrypted access to internal resources โ€” databases, dev servers, ERP systems, internal web apps โ€” without exposing them to the public internet. Remok deploys in minutes on your existing servers.

  • โœ“ Employees connect with Enterprise Code + account login โ€” no complex server URLs to share
  • โœ“ AnyConnect-compatible clients on Windows, macOS, iOS, and Android
  • โœ“ Split tunneling to route only corporate traffic through the VPN
  • โœ“ Auto-reconnect and always-on VPN policy for security enforcement
Read: Enterprise Code Login: A Simpler Way to Onboard Remote Teams โ†’

Typical deployment flow

1

Deploy Remok server

Run one command on any Linux server. Takes under 5 minutes.

2

Connect your identity source

LDAP, Active Directory, or local accounts. Enable MFA in one click.

3

Share Enterprise Code with employees

A short code replaces complex server addresses. Users self-activate.

4

Define access policies

Restrict which users can reach which internal resources.

Network topology

๐Ÿข

Headquarters โ€” Beijing

Gateway Node ยท 192.168.1.0/24

DTLS v1.2 ยท AES-256-GCM
๐Ÿญ

Branch โ€” Shanghai

Gateway Node ยท 192.168.2.0/24

DTLS v1.2 ยท AES-256-GCM
โ˜๏ธ

Cloud VPC โ€” AWS

Gateway Node ยท 10.0.0.0/16

All nodes managed from a single control plane

๐Ÿ”—

Use Case 02

Branch Office & Site-to-Site Networking

Connect offices, data centers, and cloud VPCs into a unified private network. Manage all gateway nodes from a single Remok control plane โ€” no separate hardware required.

  • โœ“ Multi-node topology โ€” add gateways in any region without redeploying
  • โœ“ Subnet routing between offices with fine-grained IP policy control
  • โœ“ Works alongside existing Cisco ASA or Meraki infrastructure during migration
  • โœ“ Failover to backup gateway with automatic client reconnection
Read: Designing a Multi-Gateway Access Architecture โ†’
๐Ÿค

Use Case 03

Controlled Partner & Vendor Access

Give external contractors, vendors, and technology partners scoped access to specific internal systems โ€” without putting them on the same network segment as your employees.

  • โœ“ Per-user and per-group access policies โ€” partners only see what they need
  • โœ“ Time-limited accounts with automatic expiry for contractors
  • โœ“ Complete audit log of every connection โ€” who connected, when, and to what
  • โœ“ No need for partners to install complex software โ€” standard AnyConnect clients work
Read: Identity + MFA + Audit: A Practical Security Baseline โ†’

Access policy model

Group: Engineering Full Access

10.0.0.0/8 ยท All internal resources

Group: Vendors Scoped

10.0.5.0/24 ยท Staging server only

Group: Auditors Read-Only

10.0.9.10 ยท Log server only ยท Expires 30 days

Each group's access is enforced at the gateway. Users cannot self-escalate privileges.

Developer workflow

# Connect to dev cluster

$ remok connect --group dev

โœ“ Connected to dev-cluster.internal

# Access internal Kubernetes API

$ kubectl get pods --namespace prod

NAME               READY  STATUS

api-server-7d8f9  1/1    Running

# SSH to internal server

$ ssh deploy@10.0.2.15

โœ“ Access logged ยท MFA verified

๐Ÿ’ป

Use Case 04

Secure Developer Infrastructure Access

Keep your production servers, Kubernetes clusters, CI/CD systems, and internal developer tooling off the public internet. Developers get seamless access without compromising security posture.

  • โœ“ CLI-friendly โ€” works transparently with SSH, kubectl, Docker, and internal APIs
  • โœ“ Separate access groups for dev, staging, and production environments
  • โœ“ Integrate with GitHub/GitLab SSO or internal LDAP for seamless login
  • โœ“ Full audit log for every SSH session and API call through the tunnel
Read: One-Command Installation Checklist โ†’
๐Ÿ›ก๏ธ

Use Case 05

Compliance-Ready Access Control

Meet internal security policies and external compliance requirements with Remok's built-in identity management, MFA enforcement, and immutable audit logs. Built for teams that need to demonstrate control.

  • โœ“ Immutable VPN access logs with timestamps, user identity, and destination
  • โœ“ MFA enforcement at login โ€” TOTP, SMS, or hardware token support
  • โœ“ Role-based access control with least-privilege policy design
  • โœ“ All data stays on your servers โ€” no third-party cloud telemetry required
  • โœ“ Export audit logs to SIEM or log management platforms
Read: Audit Logs for Security Reviews โ†’

Audit log sample

2026-04-17 09:14:02 alice@corp CONNECTED

10.0.1.5 โ†’ 10.0.5.22 ยท MFA: โœ“ TOTP

2026-04-17 09:21:45 bob@vendor CONNECTED

203.x.x.x โ†’ 10.0.5.0/24 ยท Scoped group

2026-04-17 10:03:11 charlie@corp DENIED

Access to 10.0.9.0/24 ยท Policy violation

2026-04-17 11:30:00 alice@corp DISCONNECTED

Session 2h 15m 58s ยท 142 MB transferred

Logs are tamper-evident and exportable to CSV, JSON, or syslog.

Implementation Guides

Detailed walkthroughs for the most common deployment scenarios.

Migration

How to Replace Legacy VPN Without Breaking User Habits

Migrate from legacy VPN clients in phases while preserving user habits and reducing support tickets.

AnyConnect OpenConnect
Read article โ†’

Onboarding

Enterprise Code Login: A Simpler Way to Onboard Remote Teams

Guide remote teams through first-day access with enterprise code login and fewer manual support steps.

Identity UX
Read article โ†’

Infrastructure

Designing a Multi-Gateway Access Architecture

Design multi-gateway access that centralizes policy while expanding capacity across offices and cloud.

HA Scaling
Read article โ†’

Security

Identity + MFA + Audit: A Practical Security Baseline

Connect identity sources, enforce MFA, and generate audit evidence for recurring security reviews.

LDAP MFA
Read article โ†’

Installation

One-Command Installation Checklist

Prepare production prerequisites and complete one-command installation with fewer retries and rollback risk.

Linux Docker
Read article โ†’

Operations

Audit Logs for Security Reviews

Collect and review VPN audit logs to support compliance checks and incident response decisions.

SIEM Compliance
Read article โ†’

Need help planning your secure access rollout?

Share your team size, identity setup, and the internal systems you need to protect. We will recommend the right architecture, rollout steps, and buying path.