TroutTrout
All docs

Architecture Overview

These are the standard deployment models for connecting Access Gate and structuring your network.

4 min read · Last updated 2026-04-22

These are the standard deployment models for connecting Access Gate and structuring your network.

Lollipop Mode (Standard Deployment)

Access Gate uses a lollipop topology rather than traditional inline deployment. The appliance connects to your network but doesn't sit in the physical traffic path.

Why Lollipop?

Traditional inline security devices create several problems:

  • Single point of failure: Network goes down if device fails
  • Performance bottleneck**:** All traffic limited by device throughput
  • Complex deployment: Getting inline network changes right the first time is... challenging
  • High risk: Misconfiguration can take entire network offline

Lollipop architecture solves these issues:

  • Adjacent placement: Appliance sits beside network, not in the path
  • Software-defined interception: Traffic redirected via DNS and routing
  • Graceful degradation: Network functions normally if appliance offline
  • Zero-touch deployment: No physical network changes required
How Traffic Flows

Without Access Gate (Underlay Network):Client → Asset

With Access Gate (Overlay Network Active): Client → Overlay IP → Route to Access Gate (Double NAT) → Underlay IP → Proxy to Asset

In the Access Gate scenario, it is important to note that the Client never access the Asset directly, but always through the proxy. The Access Gate initiate a second communication with the Asset (in red above).

This allows to deploy authentication, access control, monitoring... and all the good stuff.

Lollipop deployment of an Access Gate

How it works:

  • Access Gate observes traffic via a netflow connection to the router
  • Builds an overlay IP space (commonly 100.64.0.0/16) that maps protected services to proxy-enforced paths
  • DNS resolves protected hostnames to overlay IP addresses
  • Routing directs overlay traffic through Access Gate
  • Assets remain on their original underlay network

Benefits:

  • No single point of failure in the traffic path
  • No physical network changes required
  • Simple to deploy and remove
  • The network continues to operate normally if Access Gate is offline

Bastion Mode for Remote Access

What it is: Access Gate becomes the single controlled entry point for users coming from outside the site. Remote users connect via VPN (Tailscale/WireGuard) to Access Gate, and Access Gate brokers access to protected assets through its proxy.

Why this mode exists (the problem it solves): Remote access to OT / sensitive IT usually ends up as one of these patterns:

  • Flat VPN into the LAN
  • Jump box / RDP server
  • Vendor remote tools

What Bastion Mode improves

  • Least-privilege remote access
  • Stronger boundary
  • Auditability
  • Operational safety
  • Vendor access without permanent exposure

When to choose it

  • You need remote access for operators, IT, vendors, or incident response.
  • You want to avoid “VPN = inside the LAN.”
  • You need consistent logs/evidence for NIS2/CMMC/NIST-style controls.

Access Gate acts as a VPN gateway, enabling remote users to securely reach on-site assets. The network flow looks like:

Remote Users → VPN (Tailscale / WireGuard) → Access Gate → Protected Assets

Bastion deployment of an Access Gate

Multi-Site Mesh

What it is: Multiple Access Gates form an encrypted mesh between sites. Each site keeps its local underlay unchanged, but selected assets/services become reachable across sites through controlled, identity-based policies.

Why this mode exists (the problem it solves) Organizations with multiple sites often end up with:

  • Site-to-site VPNs that are flat
  • Complex network engineering
  • Inconsistent controls per site

What the mesh improves

  • Zero-trust across sites (Alice on site A is able to access CNC on Site B)
  • Standardized security posture
  • Faster rollout
  • Unified logging and documentation for auditors

Typical use cases

  • Central engineering team needs controlled access to machines across plants.
  • Shared services (historians, patch repositories, backup, monitoring) must be reachable securely.
  • M&A / multi-entity environments where networks must remain separate but collaboration is required.
  • You want “connectivity as policy” instead of “connectivity as routing.”

Multiple Access Gates interconnect over VPN to provide secure, site-to-site connectivity:

Site A Assets ← Access Gate A ←→ Access Gate B → Site B Assets

Access Gate implementation as a Multi-site Mesh

Requires: Site Mesh feature configuration