Articles on: User Guides

How to use Nordlayer

NORDLAYER USER GUIDE



This detailed guide provides comprehensive instructions on using NordLayer, a powerful business VPN (Virtual Private Network) solution designed to secure company networks, protect data, and ensure safe remote access. This manual will help workers set up, navigate, and effectively use NordLayer to protect their online activity and access corporate resources securely.

I. INTRODUCTION TO NORDLAYER



NordLayer is a cloud-based VPN solution designed to ensure secure remote access to company networks and resources, protect sensitive data, and enhance network security for distributed workforces.

Purpose of NordLayer:

a. To secure online activities by encrypting internet traffic.

b. To provide remote access to company networks and internal resources.

c. To ensure compliance with security policies and prevent unauthorized access.

Key Features:

a. Global VPN Servers: Access servers worldwide for fast and secure connections.

b. Private Gateways: Create dedicated gateways for secure access to specific resources.

c. User Management: Assign roles, permissions, and manage teams easily.

d. Network Segmentation: Isolate resources for enhanced security.

Platform Availability:

a. Desktop apps for Windows, macOS, and Linux.

b. Mobile apps for iOS and Android.

c. Web-based dashboard for admin management.

II. SETTING UP YOUR NORDLAYER ACCOUNT



To begin using NordLayer, you’ll need to create or access your user account and join your company’s network.

Receiving an Invitation:

a. Your administrator will send an email invitation to join the organization.

b. Open the invitation email and click the Join Now link.

Creating Your Account:

a. Enter your company email address and choose a strong password.

b. Verify your email address through the confirmation link sent to your inbox.

Logging In to NordLayer:

a. Go to NordLayer’s login page or open the app.

b. Enter your credentials and log in to the dashboard or client app.

Configuring Account Settings:

a. Navigate to Account Settings to update your profile, language preferences, and password.

b. Enable two-factor authentication (2FA) for added security.

III. INSTALLING AND CONFIGURING NORDLAYER



Once your account is set up, the next step is to install the NordLayer client on your devices.

Downloading the NordLayer App:

a. Visit the NordLayer Download Page to get the appropriate version for your device.

b. Select the correct installer for Windows, macOS, Linux, iOS, or Android.

Installing the Application:

a. Follow the installation prompts specific to your operating system.

b. Allow the app to make changes if prompted by your system.

Initial Configuration:

a. Log in to the NordLayer app using your account credentials.

b. Grant the necessary permissions for the app to create VPN connections.

Setting Up Network Preferences:

a. Navigate to Settings > Network Preferences to configure VPN protocols (e.g., OpenVPN, IKEv2).

b. Enable Auto-connect to ensure the VPN starts automatically when the device boots.

Configuring DNS and Split Tunneling:

a. Use custom DNS servers if required by your organization.

b. Enable Split Tunneling to choose which apps or websites bypass the VPN connection.

IV. CONNECTING TO NORDLAYER SERVERS



NordLayer provides multiple connection options for accessing company resources securely.

Connecting to a Public Server:

a. Open the NordLayer app and click Quick Connect to connect to the nearest server automatically.

b. To choose a specific location, select Servers and pick a country or region.

Connecting to a Private Gateway:

a. Go to Gateways and select the company’s dedicated gateway.

b. Use the Private IP Address provided by the admin for access.

Checking Connection Status:

a. The status bar in the app will display Connected when the VPN is active.

b. Verify the connection by checking your public IP address under Connection Details.

Customizing Connection Options:

a. Enable Kill Switch to disconnect internet access if the VPN connection drops.

b. Use Custom DNS settings if provided by the IT team for additional security.

V. MANAGING TEAMS AND PERMISSIONS ###



For team leaders or users with administrative privileges, managing users and permissions is essential.

Adding Team Members:

a. Navigate to the User Management section in the web dashboard.

b. Click Add Users, enter their email addresses, and assign roles (e.g., User, Admin).

Assigning Roles and Permissions:

a. Define roles such as Viewer, Editor, or Admin based on access requirements.

b. Customize permissions to control who can access certain gateways or resources.

Organizing Users into Teams:

a. Create teams for different departments or projects for easier management.

b. Assign private gateways or network segments to specific teams.

Managing Access Policies:

a. Set time-based access restrictions for specific users or teams.

b. Define allowed IP ranges for additional control over connections.

VI. USING NORDLAYER FOR SECURE ACCESS



NordLayer ensures secure remote access to company resources while maintaining user privacy.

Accessing Internal Resources:

a. Connect to the company’s private gateway to access internal websites, databases, or servers.

b. Use the Remote Desktop Protocol (RDP) if configured by your IT team.

Secure File Transfers:

a. Use encrypted connections to transfer sensitive files between remote servers and your device.

b. Ensure file-sharing apps are routed through the VPN for added protection.

Browsing Securely on Public Networks:

a. Connect to NordLayer when using public Wi-Fi to encrypt your data.

b. Enable Web Threat Protection to block malicious websites automatically.

Bypassing Geo-restrictions:

a. Use NordLayer to access company-approved geo-restricted resources.

b. Select appropriate server locations based on the resource’s region.

VII. MONITORING NETWORK ACTIVITY AND USAGE



Admins can track network activity and ensure compliance with company policies.

Viewing Activity Logs:

a. Access the Activity Logs in the web dashboard to review connection details.

b. Filter logs by date, user, or gateway for specific insights.

Generating Usage Reports:

a. Navigate to Reports and select metrics such as data usage or session duration.

b. Export reports in CSV or PDF format for analysis or compliance reporting.

Monitoring Threats and Alerts:

a. Review the Threat Management section for blocked attempts or suspicious activities.

b. Set up Email Alerts for real-time notifications of potential security breaches.

VIII. TROUBLESHOOTING AND SUPPORT



Common Issues and Solutions:

a. Connection Failures: Restart the app, check your internet, or switch servers.

b. Slow Speeds: Connect to a nearby server or change VPN protocols.

c. Login Issues: Ensure credentials are correct and check for 2FA prompts.

Accessing Support:

a. Visit the NordLayer Help Center.

b. Contact customer support via live chat or email for personalized assistance.

IX. BEST PRACTICES FOR USING NORDLAYER



Always Use the VPN:

a. Enable Auto-connect to ensure the VPN activates on startup.

b. Use the Kill Switch feature to block internet access if the VPN drops.

Follow Security Protocols:

a. Regularly update the app to ensure you have the latest security patches.

b. Avoid accessing sensitive resources over untrusted networks without the VPN.

Organize Your Teams:

a. Regularly review team access and permissions for changes.

b. Deactivate accounts immediately when team members leave.

Monitor and Report:

a. Check logs regularly for unauthorized or unusual activity.

b. Report any suspicious behavior to your IT security team promptly.

By following this guide, workers can effectively use NordLayer to secure their online activities, access corporate resources safely.### X. YOUTUBE GUIDE

Scan QR code or use link below to check video user guide on YouTube platform:

https://www.youtube.com/@NordLayer

1c8d78b9055b5c739075c8243317edfa.png

Updated on: 18/12/2024

Was this article helpful?

Share your feedback

Cancel

Thank you!