Introduction
What is Baseguard and why should you use it?
Baseguard is a modern mesh VPN designed for teams and organizations that need secure, reliable connectivity between devices regardless of their physical location.
What is a Mesh VPN?
Traditional VPNs route all traffic through a central server, creating a hub-and-spoke topology. This approach has limitations:
- Single point of failure: If the VPN server goes down, all connectivity is lost
- Increased latency: Traffic between two nearby devices must travel through a distant server
- Bandwidth bottleneck: All traffic funnels through one server
A mesh VPN solves these problems by enabling direct peer-to-peer connections between devices:
Traditional VPN: Mesh VPN:
Device A Device A
↓ ↙ ↘
VPN Server Device B ─ Device C
↓ ↘ ↙
Device B Device DLearn more about mesh networking and how connections work.
Key Benefits
Secure by Default
- WireGuard encryption: Industry-standard, audited cryptographic protocol
- End-to-end encryption: Traffic is encrypted between devices.
- Zero trust model: Explicit access rules required; nothing is allowed by default
Simple to Use
- Zero configuration: Automatic NAT traversal and node discovery
- Cross-platform: Works on Linux, macOS, Windows, iOS, and Android
- CLI and GUI: Choose your preferred interface
Enterprise Ready
- Multi-organization: Manage multiple networks with separate policies
- Tag-based ACLs: Flexible access control without managing IP addresses
- Audit logging: Track all administrative actions
- SSO integration: Support for OIDC providers (Google, Microsoft, etc.)
For a detailed breakdown of how these components work together, see Architecture.
Get Started
Ready to connect your first device?
Quick Start
Connect your first device in under 2 minutes.
Installation
Download Baseguard for your platform.
Core Concepts
Understand how mesh networking works.
First Network
Set up a complete network with access control.
See Also
- Architecture — How clients, control plane, and console work together
- Security — Encryption, authentication, and zero-trust principles
- CLI Reference — All available commands
- FAQ — Frequently asked questions