Private Tunnel App

  
  1. Openvpn Tunnel
  2. Private Tunnel App Android
  3. Private Tunnel App Download
  4. Private Tunnel App Download

Private Tunnel VPN APK Apps Full Version Download for PC.Download Private Tunnel VPN APK Latest Version for PC,Laptop,Windows.Private Tunnel VPN for Android is a new approach to true Internet Access, Security and Privacy that creates a Virtual Private Network (VPN). SECURE AND PROTECT YOUR PATH ACROSS THE INTERNET. Private Tunnel Smartphone Apps. The smartphone apps of Private Tunnel boast the same simplicity in the interface as the desktop apps. Users can choose the server they want to connect to from the main screen and access settings by tapping on the three vertical lines on the top left.

-->

This article can help you install the Microsoft Tunnel VPN gateway for Microsoft Intune. You install the tunnel software on a Linux server, and then use Microsoft Endpoint Manager admin center to configure the tunnel for use with your infrastructure. You also configure Intune VPN profiles to deploy the tunnel configuration to supported devices, and must provision devices with the Microsoft Tunnel app.

Microsoft Tunnel is in public preview.

To Install Microsoft Tunnel Gateway, you’ll need at least one Linux server with Docker installed, which runs either on-premises or in the cloud. Depending on your environment and infrastructure, additional configurations and software like Azure ExpressRoute might be needed.

Private tunnel app device

Before you start installation be sure to complete the following tasks:

  • Review and Configure prerequisites for Microsoft Tunnel.
  • Run the Microsoft Tunnel readiness tool to confirm your environment is ready to support use of the tunnel.

After your prerequisites are ready, return to this article to begin installation and configuration of the tunnel.

When you install Microsoft Tunnel, it pulls information from Intune about the tunnel Sites you’ve defined for your tenant. This information includes the Server configurations for those Sites. Therefore, you must configure at least one Site and one Server configuration before you install Microsoft Tunnel on a Linux server.

Create a Server configuration

Use of a Server configuration lets you create a configuration a single time and have that configuration used by multiple servers. The configuration includes IP address ranges, DNS servers, and split-tunneling rules. Later, you’ll assign a Server configuration to a Site, which automatically applies that configuration to each server that joins that Site.

To create a Server configuration

  1. Sign in to Microsoft Endpoint Manager admin center > Tenant administration > Microsoft Tunnel Gateway > select theServer configurationstab > Create new.

  2. On the Basics tab, enter a Name and Description(optional) and select Next.

  3. On the Settings tab, configure the following items:

    • IP address range: IP addresses within this range are leased to devices when they connect to Tunnel Gateway. For example, 169.254.0.0/16.

    • DNS servers: These servers are used when a DNS request comes from a device that's connected to Tunnel Gateway.

    • DNS suffix search(optional): This domain is provided to clients as the default domain when they connect to Tunnel Gateway.

    • Split tunneling(optional): Include or exclude addresses. Included addresses are routed to Tunnel Gateway. Excluded addresses aren’t routed to Tunnel Gateway. For example, you might configure an include rule for 255.255.0.0 or 192.168.0.0/16.

      Split tunneling supports a total of 500 rules between both include and exclude rules. For example, if you configure 300 include rules, you can only have 200 exclude rules.

    • Server port: Enter the port that the server listens to for connections.

  4. On the Review + create tab, review the configuration, and then select Create to save it.

Create a Site

Sites are logical groups of servers that host Microsoft Tunnel. You’ll assign a Server configuration to each Site you create. That configuration is applied to each server that joins the Site.

To create a Site configuration

Openvpn Tunnel

  1. Sign in to Microsoft Endpoint Manager admin center > Tenant administration > Microsoft Tunnel Gateway > select theSitestab > Create.

  2. On the Create a site pane, specify the following properties:

    • Name: Enter a name for this Site.
    • Description(optional)
    • Public IP address or FQDN: Specify a public IP address or FQDN, which is the connection point for devices that use the tunnel. This IP address can be an individual server or the IP or FQDN of a load-balancing server. The IP address must be publicly routable and the FQDN must be resolvable in public DNS.
    • Server configuration: Use the drop-down to select a server configuration to associate with this Site.
  3. Select Create to save the Site.

Install Microsoft Tunnel Gateway

Before installing Microsoft Tunnel Gateway on a Linux server, configure your tenant with at least one Server configuration, and then create a Site. Later, you’ll specify the Site that a server joins when you install the tunnel on that server.

Use the script to install Microsoft Tunnel

  1. Download the Microsoft Tunnel installation script by using one of the following methods:

    • Download the tool directly by using a web browser. Go to https://aka.ms/microsofttunneldownload to download the file mstunnel-setup.

    • Sign in to Microsoft Endpoint Manager admin center > Tenant administration > Microsoft Tunnel Gateway, select the Servers tab, select Create to open the Create a server pane, and then select Download script.

    • Use a Linux command to get the readiness tool directly. For example, on the server where you’ll install the tunnel, you can use wget or curl to open the link https://aka.ms/microsofttunneldownload.

      For example, to use wget and log details to mstunnel-setup during the download, run wget --output-document=mstunnel-setup https://aka.ms/microsofttunneldownload

  2. To start the server installation, run the script as root. For example, you might use the following command line: sudo chmod +x ./mstunnel-setup. The script always installs the most recent version of Microsoft Tunnel.

    Tip

    If you stop the installation and script, you can restart it by running the command line again. Installation continues from where you left off.

    When you start the script, it downloads container images from Docker, and creates necessary folders and files on the server.

    During setup, the script will prompt you to complete several admin tasks.

  3. When prompted by the script, accept the license agreement (EULA).

  4. Review and configure variables in the following files to support your environment.

    • Environment file: /etc/mstunnel/env.sh. For more information on these variables, see Environment variables in the reference for Microsoft Tunnel article.
  5. When prompted, copy the full chain of your TLS certificate file to the Linux server. The script displays the correct location to use on the Linux server.

    The TLS certificate secures the connection between the devices that use the tunnel and the Tunnel Gateway endpoint. The certificate must have the IP address or FQDN of the Tunnel Gateway server in its SAN.

    The private key will remain available on the machine where you create the certificate signing request for the TLS certificate. This file must be exported with a name of site.key.

    Install the TLS certificate and private key. Use the following guidance that matches your file format:

    • PFX:

      • The certificate file name must be site.pfx. Copy the certificate file to /etc/mstunnel/private/site.pfx.
    • PEM:

      • The full chain (root, intermediate, end-entity) must be in a single file named site.crt. If your using a certificate issued by a public provider like Digicert, you have the option of downloading the complete chain as a single .pem file.

      • The certificate file name must be *site.crt. Copy the full chain certificate into /etc/mstunnel/certs/site.crt. For example: cp [full path to cert] /etc/mstunnel/certs/site.crt

        Alternatively, create a link to the full chain cert in /etc/mstunnel/certs/site.crt. For example: ln -s [full path to cert] /etc/mstunnel/certs/site.crt

      • Copy the private key file into /etc/mstunnel/private/site.key. For example: cp [full path to key] /etc/mstunnel/private/site.key

        Alternatively, create a link to the private key file in /etc/mstunnel/private/site.key. For example: ln -s [full path to key file] /etc/mstunnel/private/site.key This key shouldn't be encrypted with a password. The private key file name must be site.key.

  6. After setup installs the certificate and creates the Tunnel Gateway services, you’re prompted to sign in and authenticate with Intune. The user account must have either the Intune Administrator or Global Administrator roles assigned. The account you use to complete the authentication must have an Intune license, or you must turn off the requirement for admin accounts to need licenses. The credentials of this account aren't saved and are only used for initial sign-in to Azure Active Directory. After successful authentication, Azure app IDs/secret keys are used for authentication between the Tunnel Gateway and Azure Active Directory.

    Tip

    To turn off the requirement for admin licenses, in the Microsoft Endpoint Manager admin center navigate to Tenant Administration > Roles > Administrator Licensing and disable administrator licensing.

    This authentication registers Tunnel Gateway with Microsoft Endpoint Manager and your Intune tenant.

    1. From a web browser. navigate to https://Microsoft.com/devicelogin and enter the device code that’s provided by the installation script, and then sign in with your Intune admin credentials.

    2. After Microsoft Tunnel Gateway registers with Intune, the script gets information about your Sites and Server configurations from Intune. The script then prompts you to enter the GUID of the tunnel Site you want this server to join. The script presents you with a list of your available sites.

    3. After you select a Site, setup pulls the Server configuration for that Site from Intune and applies it to your new server to complete the Microsoft Tunnel installation.

  7. After the installation script finishes, you can navigate in Microsoft Endpoint Manager admin center to the Microsoft Tunnel Gateway tab to view high-level status for the tunnel. You can also open the Health status tab to confirm that the server is online.

Deploy the Microsoft Tunnel App

To use the Microsoft Tunnel, devices need access to the Microsoft Tunnel app. You can deploy the app to devices by assigning it to users. The following apps are available:

  • For Android, download the Microsoft Tunnel app from the Google Play store. See Add Android store apps to Microsoft Intune.
  • For iOS/iPadOS, download the Microsoft Tunnel app from the Apple App Store. See Add iOS store apps to Microsoft Intune.
Tunnel

For more information on deploying apps with Intune, see Add apps to Microsoft Intune.

Create a VPN profile

After the Microsoft Tunnel installs on a server, and devices have installed the Microsoft Tunnel app, you can deploy VPN profiles to direct devices to use the tunnel. To do so, you’ll create VPN profiles with a connection type of Microsoft Tunnel.

  • The Android platform supports routing of traffic through a per-app VPN and split tunneling rules independently, or at the same time.
  • The iOS platform supports routing traffic by either a per-app VPN or by split tunneling rules, but not both simultaneously. If you enable a per-app VPN for iOS, your split tunneling rules are ignored.

Android

  1. Sign in to Microsoft Endpoint Manager admin center > Devices > Configuration profiles > Create profile.

  2. For Platform, select Android Enterprise, and then for Profile select VPN for either Corporate-Owned Work Profile or Personally-Owned Work Profile, and then select Create.

    Note

    Android Enterprise dedicated devices aren't supported by the Microsoft Tunnel.

  3. On the Basics tab, enter a Name and Description(optional) and select Next.

  4. For Connection type select Microsoft Tunnel, and then configure the following details:

    • Base VPN:

      • For Connection name, specify a name that will display to users.
      • For Microsoft Tunnel Site, select the tunnel Site that this VPN profile will use.
    • Per-app VPN:

      • Apps that are assigned in the per-app VPN profile send app traffic to the tunnel.
      • To enable a per-app VPN, select Add and then browse to apps you’ve imported to Intune. These can be custom or public apps.
    • Always-on VPN:

      • For Always-on VPN, select Enable to set the VPN client to automatically connect and reconnect to the VPN. Always-on VPN connections stay connected. If per-app VPN is enabled, only traffic from apps you select will go through the tunnel.
    • Proxy:

      • Configure proxy server details for your environment.

    For more information about VPN settings, see Android Enterprise device settings to configure VPN

  5. On the Assignments tab, configure groups that will receive this profile.

  6. On the Review + create tab, review the configuration, and then select Create to save it.

iOS

  1. Sign in to Microsoft Endpoint Manager admin center > Devices > Device Configuration > Create profile.

  2. For Platform, select iOS/iPadOS, and then for Profile select VPN, and then Create.

  3. On the Basics tab, enter a Name and Description(optional) and select Next.

  4. For Connection type select Microsoft Tunnel, and then Configure the following items:

    • Base VPN:

      • For Connection name, specify a name that will display to users.
      • For Microsoft Tunnel Site, select the tunnel Site that this VPN profile will use.
    • Per-app VPN:

      • To enable a per-app VPN, select Enable. Additional configuration steps are required for iOS per-app VPNs. When the per-app VPN is configured, your split tunneling rules are ignored by iOS.

        For more information, see Per-App VPN for iOS/iPadOS.

    • On-Demand VPN Rules:
      Define on-demand rules that allow use of the VPN when conditions are met for specific FQDNs or IP addresses.

      For more information, see Automatic VPN settings

      Calculator.exe

    • Proxy:

      • Configure proxy server details for your environment.

Upgrade Microsoft Tunnel

When there are updates for Microsoft Tunnel, upgrade of your installed Microsoft Tunnel is managed automatically by Intune in a rolling upgrade:

  • Intune upgrades the Microsoft Tunnel servers in a Site one server at a time. During upgrade, the Microsoft Tunnel on the server isn't available for use.

  • Intune starts updating the first server in a Site as soon as 10 minutes after the release becomes available, or after the server is turned on if it has been off.

  • After a successful upgrade of a server, Intune waits a short period of time before starting the upgrade of the next server.

  • This process continues until all servers in a Site have updated to the new version.

Because the tunnel update is automatic, but also updates only a single server per Site at a time, consider assigning two or more servers to each Microsoft Tunnel Site to mitigate the tunnel being unavailable during the update.

Uninstall the Microsoft Tunnel

To uninstall the product, run ./mst-cli uninstall from the Linux server as root.

Microsoft Tunnel updates

Updates for the Microsoft Tunnel are released periodically. When we update the tunnel version, you can read about the changes here. Because Microsoft Tunnel automatically updates when a new version is released, you shouldn’t have to take action to benefit from the new version.

After an update releases, it rolls out to tenants over the following days. Therefore, your tunnel servers might not start the process to update for a few days.

The Microsoft Tunnel version for a server isn’t available in the Intune UI at this time. Instead, run the following command on the Linux server that hosts the tunnel to identify the hash values of agentImageDigest and serverImageDiegest: cat /etc/mstunnel/images_configured

October 29, 2020

Image hash values:

  • agentImageDigest: sha256:ba48de2c746a68286d15985f807702c60004131368a4a6a50ceab0f04653031a

  • serverImageDigest: sha256:a60d778664f7f3ba28d363ec783014d9fc2eda6cc5f6057a1eab8635928e7b07

Changes in this release:

  • Fixes for logging. View the Microsoft Tunnel system logs.
  • Additional bug fixes.

October 12, 2020

Image hash values:

  • agentImageDigest: sha256:d168e416591d94d6a02b64e5dde8709e2d5a44261d67036caafcb55b12912ca5

  • serverImageDigest: sha256:8b50257a94b9825915cb6a77ed49cfb3e5c6f68da9ae0272cdf8e49cff3d342e

Changes in this release:

  • Microsoft Tunnel now logs operational and monitoring details to Linux server logs in the syslog format.
  • Various bug fixes.

September 23, 2020

The initial public preview release of Microsoft Tunnel.

Tunnel

Next steps

MedTunnel is
Free HIPAA compliant
Communication for
Healthcare
Instant Messaging
For patients and providers
Document Transfer
Eliminate faxing
Your Own Patient Portal
Engage your patients
MedTunnel is..
Instant Messaging

Message instantly and securely with your office staff,
other providers and practices, or your patients. Learn More..

MedTunnel is..
Document Transfer

Say goodbye to faxing..send and view medical
documents securely using any computer or mobile
device. Learn More..

MedTunnel is..
Your Own Patient Portal

Patients can contact you anytime through your
practice’s very own MedTunnel patient portal page.
Whether it’s requesting an appointment, submitting
their insurance cards, or simply asking a question –
your patients have direct access to your practice
anytime. Learn More..

Private Tunnel App Android

MedTunnel salutes our Frontline Healthcare Heroes in the fight against COVID-19

We are proud to have our free HIPAA-compliant messaging support you in this fight!

MedTunnel Named Top 10 Healthcare Compliance Solutions Provider

“MedTunnel is at the forefront of secured communication gateways for doctors and patients and envisages emerging as the gold standard for healthcare communication in the U.S in the coming years.”

– Healthcare Tech Outlook Magazine

MedTunnel is a free service that provides secure HIPAA compliant communication for healthcare. It allows providers and patients to communicate and exchange private health information using their computers and mobile devices.

Amazingly this is one of the most frequent questions we get asked. The skepticism about how we can provide such a valuable service for free especially in a medical environment is justified because health care providers are used to paying premium prices for services. When a free service like MedTunnel comes along that provides such a great service for free, there is bound to be a feeling of “too good to be true.” Well, we wanted to state clearly for all the skeptics that MedTunnel is a great service for health care and it is absolutely free.

Why are Email and Text Messaging Not HIPAA compliant?

Amazingly this is one of the most frequent questions we get asked. The skepticism about how we can provide such a valuable service for free especially in a medical environment is justified because health care providers are used to paying premium prices for services. When a free service like MedTunnel comes along that provides such a great service for free, there is bound to be a feeling of “too good to be true.” Well, we wanted to state clearly for all the skeptics that MedTunnel is a great service for health care and it is absolutely free.

The main purpose of MedTunnel is to provide a free, secure, and HIPAA compliant messaging service for transmitting private health information (PHI) through the Internet. The core architecture of our product was designed to meet HIPAA and security guidelines. MedTunnel provides a secure conduit through the Internet for PHI transmission. In fact, our security protocol is such that no one at MedTunnel, even at the CEO level can access PHI even if they wanted to.

Message instantly and securely with your office staff, other providers, other practices, or your patients – using any device – anywhere, anytime.

MedTunnel is a secure HIPAA compliant messaging service which allows you to communicate with your partners, office staff, other providers and practices, and most importantly your patients – using any one of your devices (mobile or computer). MedTunnel instant HIPAA compliant messaging provides you the anywhere, anytime convenience of:

  • Answering questions (medical, billing, scheduling, etc) from your office staff

  • Exchanging advice with your partners

  • Providing a consult remotely from you mobile device

  • Making and communicating critical decisions on the go

Private Tunnel App Download

Is it HIPAA compliant texting? Is it HIPAA compliant e-mail? It’s both and all in one with MedTunnel’s instant messaging.

MedTunnel is your mobile HIPAA compliant companion – 24 hours a day, 7 days a week.

Say goodbye to faxing…You can now send, receive and view medical documents securely using any computer or mobile device.

MedTunnel allows you to send, receive and view medical documents using any one of your mobile devices or computer. You can view a patient’s medical records, x-rays, or any private health information – thereby, allowing you to perform consults from anywhere, at anytime.

Patients can contact you anytime through your practice’s very own MedTunnel patient portal page. Whether it’s requesting an appointment, submitting their insurance cards, or simply asking a question – your patients have direct access to your practice anytime.

By activating your practice’s own MedTunnel patient portal page – your current or prospective patients can connect with you and your office directly from anywhere…anytime. Whether it’s requesting an appointment, asking a question, or sending images of their insurance cards – your patients have direct access to you through your practice’s very own MedTunnel patient portal page.

Your Own
Custom Mobile App
For Your Medical Practice

Private Tunnel App Download

All medical practices have a website, but none have their own custom app in the app store. The vast majority of the adult US population has a smart phone and are getting more and more of their information using mobile devices, but getting a custom mobile app built and maintained is very expensive. MedTunnel has already built the hipaa-compliant infrastructure needed for building custom medical apps. We’ve decided to leverage this backbone and build custom mobile apps for medical practices that are very inexpensive and highly functional. This means that your practice can have it’s own app in both the Apple app store for iOS devices and Google play store for android devices complete with your own icon.

MedTunnel is a completely free service..Click below to get started.

Copyright 2021 MedTunnel, LLC – All Rights Reserved.