Jump to main content
Airwall help  be invisible    - you can't hack what you can't see
Airwall help be invisible - you can't hack what you can't see
    1. Home
    2. Deploy Airwall™

      Successfully deploy and configure the Airwall solution and revolutionize security on your network.

    3. Deploy an Airwall secure network

      Learn how to deploy the Airwall solution, connect devices, set up overlays, configure device trust, and give people access to your Airwall secure network.

    4. Deploy and Configure Airwall Edge Services

      Airwall Edge Services let you securely connect managed endpoints, such as laptops, PCs, tablets, and smartphones.

    5. Configuring advanced Airwall Edge Service options

    6. Set up Port Groups on an Airwall Gateway

      The default port groups work for some deployments. You may need to set up underlay or overlay port groups if your deployment requires it.

    7. Replicate Port Settings

      For minimal disruption and less room for error, you can replicate the port configuration between two Airwall Gateways when setting up an Airwall Gateway HA pairing, or when replacing an Airwall Gateway.

    • Video Overview and Demos

      Overviews and demos for the Tempered Airwall Solution.

    • Connect to Airwall™

      Connect your mobile or laptop to Airwall to get access to protected resources.

    • Manage Airwall™

      Provision and manage Airwall Edge Services and devices, monitor activity, and install updates.

    • Deploy Airwall™

      Successfully deploy and configure the Airwall solution and revolutionize security on your network.

      • Get Started with the Airwall Solution

        Get started with the Airwall solution.

      • Deploy an Airwall secure network

        Learn how to deploy the Airwall solution, connect devices, set up overlays, configure device trust, and give people access to your Airwall secure network.

        • Deployment Checklist

          A checklist for deploying the Airwall Solution

        • Deployment Roadmap

          A roadmap to the most helpful topics for getting the Airwall Solution up and running on your network.

        • Confirm your Network Settings

          Check that your network is set up to start deploying the Airwall Solution.

        • License a Conductor and Airwall Edge Services

          Everything you need to know about licensing your Conductor and Airwall Edge Services.

        • Deploy and Configure a Conductor

          The Airwall Conductor helps you deploy, configure, administer, and update your Airwall Solution.

        • Deploy and Configure Airwall Edge Services

          Airwall Edge Services let you securely connect managed endpoints, such as laptops, PCs, tablets, and smartphones.

          • Set up Airwall Gateways

            Set up physical, virtual, or cloud Airwall Gateways.

          • Install Airwall Agents on people's laptops and devices

            How to connect people's cell phones, laptops, and servers to the resources people need access to behind your Airwall secure network.

          • Set up an Airwall Relay to Route Encrypted Connections

            An Airwall Relay routes encrypted Airwall Edge Service connections across all networks and transport options, without modifying the underlying network, for secure end-to-end connectivity.

          • Deploy a cloud Airwall Linux Agent

            You can deploy an Airwall Linux Agent on a cloud provider, which gives you a Windows Server machine with an Airwall Linux Agent installed and configured to connect with your Conductor.

          • Configuring Airwall Edge Service settings

            Edit Airwall Edge Service settings on Airwalls page.

          • Configure an authenticated Airwall Agent session

            An authenticated Airwall Agent session requires users to authenticate before the Airwall Agent can communicate in an overlay network. The authentication is based on a user’s Conductor login credentials.

          • Configuring advanced Airwall Edge Service options

            • Adding or replacing a signed certificate on an Airwall Gateway for Conductor communication
            • Set up Port Groups on an Airwall Gateway

              The default port groups work for some deployments. You may need to set up underlay or overlay port groups if your deployment requires it.

              • Setting up Overlay Port Groups

                The default port groups work for some deployments. You may need to set up overlay port groups if your deployment requires it.

              • Set up an Underlay Port Group

                By default, an Airwall Gateway has two port groups. One underlay port group assigned to Port 1 and one overlay port group assigned to the remaining ports. On virtual and cloud Airwall Gateways, you may be able to add additional ports by creating new virtual network adapters on the hypervisor. Some hardware models allow you to add new ports by inserting port expansion modules.

              • Replicate Port Settings

                For minimal disruption and less room for error, you can replicate the port configuration between two Airwall Gateways when setting up an Airwall Gateway HA pairing, or when replacing an Airwall Gateway.

              • Configure an Underlay Port Failover Group

            • Local bypass

              With local bypass you can separate traffic (split tunnel) going through your Airwall Gateway, where you selectively encrypt and tunnel some traffic, while allowing other traffic to pass through the Airwall Gateway unchanged. This ability also allows protected devices to securely communicate with devices or network locations that are not protected by Airwall Edge Services.

            • Backhaul bypass

              Set up backhaul bypass to allow any v3.0 or later Airwall Gateway to reach bypass destinations by tunneling traffic using designated bypass egress Airwall Gateways. Optionally, you can use a regional backhaul bypass pool for Airwall Gateways that support backhaul bypass and are not gateways themselves. See content/topics/backhaul_bypass.html#region_bypass.

            • Enable DNS lookup for bypass destinations

              If you want or need to use a fully-qualified domain name (FQDN) when specifying a bypass destination, you can enable DNS lookup for bypass. An FQDN may be necessary if the bypass destination IP is not static.

            • Airwall Edge Service High Availability (HA)

              High Availability (HA) Airwall Gateways provide hardware redundancy in a hot-standby mode. Airwall Gateways installed in an HA configuration maintain a heartbeat on a dedicated Ethernet link where only the current primary is participating in overlay network communications. If the primary fails to send heartbeat messages to the secondary, the secondary takes over overlay network communications for the HA pair.

            • One-arm mode

              You can configure an Airwall Gateway to use a single network connection in cases where you want to prevent common routing errors caused by multiple interfaces.

            • Network address translation (NAT)

              Network Address Translation (NAT) translates an IP address in one network to a different IP address in another network. The two IP addresses are referred to as the External IP address and the Internal IP address. The External IP address is the IP address of the device in the overlay network and the Internal IP address is the actual IP address of the device.

            • Encryption and tunnel compression on an Airwall Gateway

              You can change the encryption or compression of Airwall Gateways.

            • Protected devices with static routing

              You can configure static routing for protected devices with IP addresses not directly connected to an Airwall Gateway.

            • Protected devices with DHCP

              If you have protected devices that use DHCP to obtain an IP address, you need to configure DHCP on the Airwall Gateway that protects that device.

            • DHCP relay on an Airwall Gateway

              If you have protected devices that use DHCP to obtain an IP address, you can configure the Airwall Gateway to relay the DHCP address to your DHCP server.

            • Limit Device Traffic on an Airwall Gateway with Port Filtering

              You can use Airwall Gateway port filtering to limit what traffic can pass over an Overlay based on TCP/UDP Ports. With port filtering enabled, all communication from remote to local devices is disabled, and you create custom rules to tell the local Airwall Gateway what to allow as incoming connections to local devices.

            • Spanning Tree Protocol on the Overlay Network

        • Connecting and Configuring devices

          As you prepare to connect devices to Airwall Gateways, you may want your Airwall Gateway product guide available to identify the ports reserved for connecting devices you want to protect.

        • Create and Manage an Overlay (Protected) Network

          Create an overlay (protected) network for your deployment.

        • Configuring device trust

          Configure device trust to set up secure communication between devices in your Airwall secure network.

        • Set up Cloud Providers

          Setting up one of the supported cloud providers in your Conductor makes it easier to deploy Airwall Gateways and High-Availability Conductors directly from your Conductor.

      • Integrate Third-party Services

        How to integrate the Airwall Solution with third-party services.

      • Diagnostics and Troubleshooting

        There are various tools available on our platform to help you diagnose problems you may encounter.

      • Security Notices, Advisory Notices, and Product Bulletins

        Go here for important information on known issues, end-of-life notices, and other product updates.

      • Airwall API

        You can access the Airwall API Reference from your Conductor.

    • Software Downloads and Release Notes

      Download firmware, software, and hotfixes by version, and see release notes for versions.

    • Get Support

      You can often find answers to your questions in Airwall help. If you still need help, check here for help getting support.

    Replicate Port Settings

    For minimal disruption and less room for error, you can replicate the port configuration between two Airwall Gateways when setting up an Airwall Gateway HA pairing, or when replacing an Airwall Gateway.

    Follow these links for more information on how it works in each situation:
    • Configure High Availability Airwall Gateways (v2.2.8 and later)
    • Replacing an Airwall Gateway

    © Copyright 2025 tempered.io | Terms of Product Sale, License and Warranty