{"id":112032,"date":"2025-05-30T11:53:40","date_gmt":"2025-05-30T03:53:40","guid":{"rendered":"https:\/\/version-2.com\/?p=112032"},"modified":"2025-05-28T11:56:13","modified_gmt":"2025-05-28T03:56:13","slug":"remote-network-access-how-to-easily-access-your-local-lan","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2025\/05\/remote-network-access-how-to-easily-access-your-local-lan\/","title":{"rendered":"Remote network access: How to easily access your local LAN"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"112032\" class=\"elementor elementor-112032\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a8be8f elementor-widget elementor-widget-text-editor\" data-id=\"5a8be8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/content.nordlayer.com\/uploads\/How_to_easily_access_your_local_LAN_866d5bbef7.webp\" width=\"1400\" height=\"800\" \/><\/p><div class=\"Grid_item__b3BBG Grid_col9Lg__8Rrwm BlogArticle_contentGrid__cESsj\"><div class=\"BlogArticle_articleSummary__Orlgt\"><div class=\"ArticleSummary_markdownWrapper__Wj_mp\"><p class=\"Text_text___v2aO Markdown_paragraph__sc4Gl ArticleSummary_paragraph___u7mV Text_bodyColor__a4VTo\" data-testid=\"text\"><strong class=\"Markdown_strong__Rxk9v ArticleSummary_strong___vw_3\">Summary:<\/strong> Explore secure, scalable remote access to local networks with Cloud LAN\u2014the modern alternative to VPNs, RDP, and static IP setups.<\/p><\/div><\/div><div id=\"section-1\"><p class=\"Text_text___v2aO SharedArticleMarkdownComponents_paragraph__va3m1 SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"text\">In a world where work happens anywhere, seamless and <strong class=\"Markdown_strong__Rxk9v\">secure remote network access is no longer a luxury\u2014it&#8217;s a must-have<\/strong>. Businesses need to keep their hybrid employees connected to critical internal resources. And they must do so without overstraining IT teams or putting their sensitive data and reputations at risk.<\/p><p class=\"Text_text___v2aO SharedArticleMarkdownComponents_paragraph__va3m1 SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"text\">Whether you&#8217;re managing remote desktop access, virtual machines, file servers, or network devices, the challenge remains the same: how do we provide reliable, secure local network access without the logistical and security headaches?<\/p><p class=\"Text_text___v2aO SharedArticleMarkdownComponents_paragraph__va3m1 SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"text\">Enter Cloud LAN\u2014a <strong class=\"Markdown_strong__Rxk9v\">modern approach to remote access that combines simplicity with robust security.<\/strong> In this article, we\u2019ll break down the traditional pain points, explore alternatives, and show why Cloud LAN stands out as a smarter network security solution for modern businesses.<\/p><h2 id=\"what-is-remote-network-access\" class=\"Heading_root__WNfE8 Heading_heading30__zsK4j Heading_primary__oRqei Heading_medium__JTPnX SharedArticleMarkdownComponents_heading__ZOvVm SharedArticleMarkdownComponents_heading2__1AkXN SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"heading\">What is remote network access?<\/h2><p class=\"Text_text___v2aO SharedArticleMarkdownComponents_paragraph__va3m1 SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"text\">Remote network access solutions allow users to securely connect to physical or cloud-based networks\u2014or specific devices\u2014from anywhere in the world via the internet. This technology enables employees to <strong class=\"Markdown_strong__Rxk9v\">access company resources, such as internal servers, printers, or desktop environments,<\/strong> as if they were physically present in the office.<\/p><p class=\"Text_text___v2aO SharedArticleMarkdownComponents_paragraph__va3m1 SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"text\">For instance, whether you&#8217;re launching a remote desktop session or managing shared drives, remote access ensures seamless interaction with internal infrastructure without being tied to a specific location. Thus, <strong class=\"Markdown_strong__Rxk9v\">teams can work from home, on the road, or across borders<\/strong>.<\/p><p class=\"Text_text___v2aO SharedArticleMarkdownComponents_paragraph__va3m1 SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"text\">This capability is fundamental for enabling <a class=\"Link_root__D2Mxm Link_inherit__j4LYr Link_medium__8LZIg SharedArticleMarkdownComponents_link__AVHkv\" href=\"https:\/\/nordlayer.com\/blog\/what-is-hybrid-work\/\">hybrid work<\/a>, supporting branch offices, and securely collaborating with contractors or vendors. It\u2019s also crucial for ensuring that globally dispersed teams have reliable access to the local apps, files, and systems they need to do their jobs.<\/p><h2 id=\"key-solutions-for-remote-network-access\" class=\"Heading_root__WNfE8 Heading_heading30__zsK4j Heading_primary__oRqei Heading_medium__JTPnX SharedArticleMarkdownComponents_heading__ZOvVm SharedArticleMarkdownComponents_heading2__1AkXN SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"heading\">Key solutions for remote network access<\/h2><p class=\"Text_text___v2aO SharedArticleMarkdownComponents_paragraph__va3m1 SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"text\">When it comes to implementing remote network access, IT teams often weigh several options. Let\u2019s explore the most common:<\/p><ul class=\"SharedArticleMarkdownComponents_list__7fmEv SharedArticleMarkdownComponents_horizontalSpacing__ayEp5 List_list__ysCsa\"><li class=\"ListItem_item__4bqJC SharedArticleMarkdownComponents_listItem___bICC\"><div><a class=\"Link_root__D2Mxm Link_inherit__j4LYr Link_medium__8LZIg SharedArticleMarkdownComponents_link__AVHkv\" href=\"https:\/\/nordlayer.com\/business-vpn\/\"><strong class=\"Markdown_strong__Rxk9v\">Traditional Virtual Private Network (VPN)<\/strong><\/a><strong class=\"Markdown_strong__Rxk9v\">:<\/strong> VPNs create a secure tunnel between the user and the company network. By masking the user&#8217;s IP address, VPNs allow remote connections to appear as if they originate from within the internal network. While effective for security, traditional VPNs can be slow and require manual configuration.<\/div><\/li><li class=\"ListItem_item__4bqJC SharedArticleMarkdownComponents_listItem___bICC\"><div><a class=\"Link_root__D2Mxm Link_inherit__j4LYr Link_medium__8LZIg SharedArticleMarkdownComponents_link__AVHkv\" href=\"https:\/\/nordlayer.com\/rdp\/\"><strong class=\"Markdown_strong__Rxk9v\">Remote Desktop Protocol (RDP)<\/strong><\/a><strong class=\"Markdown_strong__Rxk9v\">:<\/strong> RDP allows users to control a remote computer or server via the remote desktop connection. It\u2019s useful for accessing applications or files hosted on a central machine, but exposing it to the public Internet may introduce vulnerabilities.<\/div><\/li><li class=\"ListItem_item__4bqJC SharedArticleMarkdownComponents_listItem___bICC\"><div><a class=\"Link_root__D2Mxm Link_inherit__j4LYr Link_medium__8LZIg SharedArticleMarkdownComponents_link__AVHkv\" href=\"https:\/\/nordlayer.com\/features\/dedicated-ip\/\"><strong class=\"Markdown_strong__Rxk9v\">Static IP<\/strong><\/a> <strong class=\"Markdown_strong__Rxk9v\">address and port forwarding:<\/strong> Some IT teams assign a static IP address to devices and manually configure port forwarding to allow external access. While this works for certain setups, it\u2019s notoriously difficult to manage at scale and poses security risks if not properly secured.<\/div><\/li><\/ul><\/div><div id=\"section-2\"><div class=\"ArticleImage_root__KtuDJ BlogArticle_articleImage__qw2Gm\"><img decoding=\"async\" class=\"ArticleImage_image__L_45g\" src=\"https:\/\/content.nordlayer.com\/uploads\/Key_remote_access_solutions_6f6dbf4518.webp\" sizes=\"(max-width: 500px) 500px, (max-width: 750px) 750px, (max-width: 1000px) 1000px, 100vw\" srcset=\"https:\/\/content.nordlayer.com\/uploads\/large_Key_remote_access_solutions_6f6dbf4518.webp 1000w, https:\/\/content.nordlayer.com\/uploads\/small_Key_remote_access_solutions_6f6dbf4518.webp 500w, https:\/\/content.nordlayer.com\/uploads\/medium_Key_remote_access_solutions_6f6dbf4518.webp 750w, https:\/\/content.nordlayer.com\/uploads\/Key_remote_access_solutions_6f6dbf4518.webp\" alt=\"Key remote access solutions\" \/><\/div><\/div><div id=\"section-3\"><h2 id=\"why-traditional-remote-access-methods-fall-short\" class=\"Heading_root__WNfE8 Heading_heading30__zsK4j Heading_primary__oRqei Heading_medium__JTPnX SharedArticleMarkdownComponents_heading__ZOvVm SharedArticleMarkdownComponents_heading2__1AkXN SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"heading\">Why traditional remote access methods fall short<\/h2><p class=\"Text_text___v2aO SharedArticleMarkdownComponents_paragraph__va3m1 SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"text\">Despite being widely used, traditional remote access tools have critical limitations\u2014especially when applied to fast-growing or remote-first organizations.<\/p><ul class=\"SharedArticleMarkdownComponents_list__7fmEv SharedArticleMarkdownComponents_horizontalSpacing__ayEp5 List_list__ysCsa\"><li class=\"ListItem_item__4bqJC SharedArticleMarkdownComponents_listItem___bICC\"><div><strong class=\"Markdown_strong__Rxk9v\">Complex configuration.<\/strong> Legacy VPN appliances, hardware <a class=\"Link_root__D2Mxm Link_inherit__j4LYr Link_medium__8LZIg SharedArticleMarkdownComponents_link__AVHkv\" href=\"https:\/\/nordlayer.com\/learn\/firewall\/what-is-firewall\/\">firewalls<\/a>, and remote desktop gateways require manual setup, network configuration, and ongoing provisioning. This creates an administrative burden and increases the risk of misconfigurations if user counts grow or change frequently.<\/div><\/li><li class=\"ListItem_item__4bqJC SharedArticleMarkdownComponents_listItem___bICC\"><div><strong class=\"Markdown_strong__Rxk9v\">High maintenance and overhead.<\/strong> Traditional infrastructure demands constant upkeep. IT teams must patch VPN servers, troubleshoot remote access failures, and monitor performance across on-premise hardware, driving up costs and resource allocation.<\/div><\/li><li class=\"ListItem_item__4bqJC SharedArticleMarkdownComponents_listItem___bICC\"><div><strong class=\"Markdown_strong__Rxk9v\">Security concerns.<\/strong> Exposing RDP to the internet, misconfigured VPN tunnels, or weak segmentation policies can all leave organizations vulnerable to <a class=\"Link_root__D2Mxm Link_inherit__j4LYr Link_medium__8LZIg SharedArticleMarkdownComponents_link__AVHkv\" href=\"https:\/\/nordlayer.com\/learn\/threats\/data-breach\/\">breaches<\/a>. These tools often rely on outdated encryption standards or credentials, increasing the overall <a class=\"Link_root__D2Mxm Link_inherit__j4LYr Link_medium__8LZIg SharedArticleMarkdownComponents_link__AVHkv\" href=\"https:\/\/nordlayer.com\/blog\/attack-surface-management-a-brief-guide\/\">attack surface<\/a>.<\/div><\/li><li class=\"ListItem_item__4bqJC SharedArticleMarkdownComponents_listItem___bICC\"><div><strong class=\"Markdown_strong__Rxk9v\">Limited scalability.<\/strong> Most traditional solutions weren\u2019t built for the hybrid or remote-first era. As companies grow and teams become more distributed, these tools often can\u2019t keep pace with modern workforce needs.<\/div><\/li><\/ul><p>\u00a0<\/p><\/div><div id=\"section-5\"><h2 id=\"security-factors-to-consider-in-remote-access-solutions\" class=\"Heading_root__WNfE8 Heading_heading30__zsK4j Heading_primary__oRqei Heading_medium__JTPnX SharedArticleMarkdownComponents_heading__ZOvVm SharedArticleMarkdownComponents_heading2__1AkXN SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"heading\">Security factors to consider in remote access solutions<\/h2><p class=\"Text_text___v2aO SharedArticleMarkdownComponents_paragraph__va3m1 SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"text\">Security should be <strong class=\"Markdown_strong__Rxk9v\">at the heart of any remote network access decision<\/strong>. Here\u2019s what to keep in mind when evaluating solutions:<\/p><ul class=\"SharedArticleMarkdownComponents_list__7fmEv SharedArticleMarkdownComponents_horizontalSpacing__ayEp5 List_list__ysCsa\"><li class=\"ListItem_item__4bqJC SharedArticleMarkdownComponents_listItem___bICC\"><div><strong class=\"Markdown_strong__Rxk9v\">Data encryption:<\/strong> Ensure all remote desktop connections and data in transit are <a class=\"Link_root__D2Mxm Link_inherit__j4LYr Link_medium__8LZIg SharedArticleMarkdownComponents_link__AVHkv\" href=\"https:\/\/nordlayer.com\/blog\/how-to-encrypt-internet-connection\/\">encrypted<\/a> using modern standards.<\/div><\/li><li class=\"ListItem_item__4bqJC SharedArticleMarkdownComponents_listItem___bICC\"><div><strong class=\"Markdown_strong__Rxk9v\">Network access control:<\/strong> <a class=\"Link_root__D2Mxm Link_inherit__j4LYr Link_medium__8LZIg SharedArticleMarkdownComponents_link__AVHkv\" href=\"https:\/\/nordlayer.com\/learn\/access-control\/role-based-access-control\/\">Role-based<\/a> permissions, Device Security Posture (DPS), and location policies are vital to prevent unauthorized access.<\/div><\/li><li class=\"ListItem_item__4bqJC SharedArticleMarkdownComponents_listItem___bICC\"><div><strong class=\"Markdown_strong__Rxk9v\">Network segmentation:<\/strong> Avoid exposing your entire local network to every user. Instead, use segmentation to limit access to only what\u2019s necessary.<\/div><\/li><li class=\"ListItem_item__4bqJC SharedArticleMarkdownComponents_listItem___bICC\"><div><strong class=\"Markdown_strong__Rxk9v\">Visibility &amp; monitoring:<\/strong> Real-time logs and traffic analysis help detect suspicious behavior early.<\/div><\/li><\/ul><p class=\"Text_text___v2aO SharedArticleMarkdownComponents_paragraph__va3m1 SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"text\">Many legacy tools offer piecemeal versions of these protections, but they often lack seamless integration or require additional software and manual setup.<\/p><h2 id=\"cloud-lan-a-simpler-way-to-access-your-local-network-remotely\" class=\"Heading_root__WNfE8 Heading_heading30__zsK4j Heading_primary__oRqei Heading_medium__JTPnX SharedArticleMarkdownComponents_heading__ZOvVm SharedArticleMarkdownComponents_heading2__1AkXN SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"heading\">Cloud LAN: A simpler way to access your local network remotely<\/h2><p class=\"Text_text___v2aO SharedArticleMarkdownComponents_paragraph__va3m1 SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"text\"><strong class=\"Markdown_strong__Rxk9v\">Here\u2019s where Cloud LAN changes the game.<\/strong> Cloud LAN simplifies remote access by creating a virtual private network between enrolled devices.<\/p><\/div><div id=\"section-6\"><div class=\"ArticleImage_root__KtuDJ BlogArticle_articleImage__qw2Gm\"><img decoding=\"async\" class=\"ArticleImage_image__L_45g\" src=\"https:\/\/content.nordlayer.com\/uploads\/Scheme_bbd82d8bb9.webp\" sizes=\"(max-width: 500px) 500px, (max-width: 750px) 750px, (max-width: 1000px) 1000px, 100vw\" srcset=\"https:\/\/content.nordlayer.com\/uploads\/large_Scheme_bbd82d8bb9.webp 1000w, https:\/\/content.nordlayer.com\/uploads\/small_Scheme_bbd82d8bb9.webp 500w, https:\/\/content.nordlayer.com\/uploads\/medium_Scheme_bbd82d8bb9.webp 750w, https:\/\/content.nordlayer.com\/uploads\/Scheme_bbd82d8bb9.webp\" alt=\"How Cloud LAN works\" \/><\/div><\/div><div id=\"section-7\"><p class=\"Text_text___v2aO SharedArticleMarkdownComponents_paragraph__va3m1 SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"text\">With NordLayer\u2019s Cloud LAN (previously called <a class=\"Link_root__D2Mxm Link_inherit__j4LYr Link_medium__8LZIg SharedArticleMarkdownComponents_link__AVHkv\" href=\"https:\/\/nordlayer.com\/features\/smart-remote-access\/\">Smart Remote Access<\/a>), users can connect directly to remote devices\u2014computers, tablets, or mobiles\u2014running supported operating systems (Windows, macOS, Linux, Android, iOS). It\u2019s a secure way to access and interact with other devices as if they were on the same local network, no matter where they actually are.<\/p><p class=\"Text_text___v2aO SharedArticleMarkdownComponents_paragraph__va3m1 SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"text\">It\u2019s ideal for remote troubleshooting, file sharing, virtual desktop use, or collaborating across distributed endpoints\u2014without exposing your broader infrastructure.<\/p><\/div><div id=\"section-8\"><div class=\"ArticleDefinitionBox_root__IzeWW BlogArticle_definitionBox__Slla6\"><h3 class=\"Heading_root__WNfE8 Heading_heading20__nWkNG Heading_primary__oRqei Heading_medium__JTPnX SharedArticleMarkdownComponents_heading__ZOvVm SharedArticleMarkdownComponents_heading3__usnTx ArticleDefinitionBox_heading__9B6fm\" data-testid=\"heading\">What makes Cloud LAN different?<\/h3><ul class=\"SharedArticleMarkdownComponents_list__7fmEv List_list__ysCsa\"><li class=\"ListItem_item__4bqJC SharedArticleMarkdownComponents_listItem___bICC ArticleDefinitionBox_listItem__p3hNV\"><div><strong class=\"Markdown_strong__Rxk9v\">Quick to deploy<\/strong>\u2014Cloud LAN is toggle-ready and takes just minutes to activate<\/div><\/li><li class=\"ListItem_item__4bqJC SharedArticleMarkdownComponents_listItem___bICC ArticleDefinitionBox_listItem__p3hNV\"><div><strong class=\"Markdown_strong__Rxk9v\">Built for scale<\/strong>\u2014Whether you have 10 or 10,000 users, Cloud LAN scales effortlessly without the need for additional infrastructure.<\/div><\/li><li class=\"ListItem_item__4bqJC SharedArticleMarkdownComponents_listItem___bICC ArticleDefinitionBox_listItem__p3hNV\"><div><strong class=\"Markdown_strong__Rxk9v\">Device-to-device remote access<\/strong>\u2014Establish secure connections between any authorized devices with the NordLayer app installed, across platforms and locations.<\/div><\/li><li class=\"ListItem_item__4bqJC SharedArticleMarkdownComponents_listItem___bICC ArticleDefinitionBox_listItem__p3hNV\"><div><strong class=\"Markdown_strong__Rxk9v\">Secure by default<\/strong>\u2014Every connection runs thorough encrypted tunnels with <a class=\"Link_root__D2Mxm Link_inherit__j4LYr Link_medium__8LZIg SharedArticleMarkdownComponents_link__AVHkv\" href=\"https:\/\/nordlayer.com\/zero-trust\/network-access\/\">Zero Trust Network Access (ZTNA)<\/a>, and <a class=\"Link_root__D2Mxm Link_inherit__j4LYr Link_medium__8LZIg SharedArticleMarkdownComponents_link__AVHkv\" href=\"https:\/\/nordlayer.com\/features\/network-segmentation\/\">network segmentation<\/a> by design.<\/div><\/li><li class=\"ListItem_item__4bqJC SharedArticleMarkdownComponents_listItem___bICC ArticleDefinitionBox_listItem__p3hNV\"><div><strong class=\"Markdown_strong__Rxk9v\">No manual routing hassle<\/strong>\u2014NordLayer automatically manages routing between devices, so teams can connect directly without needing static IP assignments or manual configurations.<\/div><\/li><\/ul><\/div><\/div><div id=\"section-9\"><h2 id=\"setting-up-remote-access-with-nordlayer-cloud-lan\" class=\"Heading_root__WNfE8 Heading_heading30__zsK4j Heading_primary__oRqei Heading_medium__JTPnX SharedArticleMarkdownComponents_heading__ZOvVm SharedArticleMarkdownComponents_heading2__1AkXN SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"heading\">Setting up remote access with NordLayer Cloud LAN<\/h2><p class=\"Text_text___v2aO SharedArticleMarkdownComponents_paragraph__va3m1 SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"text\">NordLayer makes <strong class=\"Markdown_strong__Rxk9v\">remote connectivity simple<\/strong>\u2014without the usual complexity of network reconfiguration. Cloud LAN securely links <strong class=\"Markdown_strong__Rxk9v\">distributed devices into a virtual private network,<\/strong> enabling direct access from anywhere.<\/p><p class=\"Text_text___v2aO SharedArticleMarkdownComponents_paragraph__va3m1 SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"text\"><strong class=\"Markdown_strong__Rxk9v\">Getting started is easy.<\/strong> Just create a Virtual Private Gateway, add your team members, and <a class=\"Link_root__D2Mxm Link_inherit__j4LYr Link_medium__8LZIg SharedArticleMarkdownComponents_link__AVHkv\" href=\"https:\/\/help.nordlayer.com\/docs\/how-to-set-up-smart-remote-access-feature\" target=\"_blank\" rel=\"noopener\">enable Cloud LAN<\/a> in the <a class=\"Link_root__D2Mxm Link_inherit__j4LYr Link_medium__8LZIg SharedArticleMarkdownComponents_link__AVHkv\" href=\"https:\/\/cp.nordlayer.com\/login\/\">Control Panel<\/a>. Admins can also manage access via user groups, integrate with identity providers (like Okta, Azure AD, or Google Workspace), and monitor device posture and activity.<\/p><p class=\"Text_text___v2aO SharedArticleMarkdownComponents_paragraph__va3m1 SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"text\">Cloud LAN is fast to set up, secure by design, and intuitive to manage\u2014ideal for teams looking to simplify remote collaboration without relying on outdated or overcomplicated remote desktop solutions.<\/p><p data-testid=\"text\">\u00a0<\/p><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-cf03edf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cf03edf\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b576c6d\" data-id=\"b576c6d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9e34e91 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"9e34e91\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-bb2c932\" data-id=\"bb2c932\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bfd91ca elementor-widget elementor-widget-shortcode\" data-id=\"bfd91ca\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"63561\" class=\"elementor elementor-63561\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1b6aa2c4 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"1b6aa2c4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1b283ee5\" data-id=\"1b283ee5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4e466f1a elementor-widget elementor-widget-text-editor\" data-id=\"4e466f1a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About NordLayer<br \/><\/strong>NordLayer is an adaptive network access security solution for modern businesses \u2013 from the world\u2019s most trusted cybersecurity brand, Nord Security.<\/p><p>The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Summary: Explore secure, scalable remote access to loca [&hellip;]<\/p>","protected":false},"author":149011790,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[973,1130,1305,61],"tags":[974,1077,1132],"class_list":["post-112032","post","type-post","status-publish","format-standard","hentry","category-nord-security","category-nordlayer","category-1305","category-press-release","tag-nord-security","tag-1077","tag-nordlayer"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Remote network access: How to easily access your local LAN - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nordlayer.com\/blog\/access-local-lan-remotely\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Remote network access: How to easily access your local LAN - Version 2\" \/>\n<meta property=\"og:description\" content=\"Summary: Explore secure, scalable remote access to loca [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nordlayer.com\/blog\/access-local-lan-remotely\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-30T03:53:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/content.nordlayer.com\/uploads\/How_to_easily_access_your_local_LAN_866d5bbef7.webp\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/access-local-lan-remotely\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/05\\\/remote-network-access-how-to-easily-access-your-local-lan\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"Remote network access: How to easily access your local LAN\",\"datePublished\":\"2025-05-30T03:53:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/05\\\/remote-network-access-how-to-easily-access-your-local-lan\\\/\"},\"wordCount\":1080,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/access-local-lan-remotely\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/content.nordlayer.com\\\/uploads\\\/How_to_easily_access_your_local_LAN_866d5bbef7.webp\",\"keywords\":[\"Nord Security\",\"2025\",\"NordLayer\"],\"articleSection\":[\"Nord Security\",\"NordLayer\",\"2025\",\"Press Release\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/05\\\/remote-network-access-how-to-easily-access-your-local-lan\\\/\",\"url\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/access-local-lan-remotely\\\/\",\"name\":\"Remote network access: How to easily access your local LAN - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/access-local-lan-remotely\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/access-local-lan-remotely\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/content.nordlayer.com\\\/uploads\\\/How_to_easily_access_your_local_LAN_866d5bbef7.webp\",\"datePublished\":\"2025-05-30T03:53:40+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/access-local-lan-remotely\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nordlayer.com\\\/blog\\\/access-local-lan-remotely\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/access-local-lan-remotely\\\/#primaryimage\",\"url\":\"https:\\\/\\\/content.nordlayer.com\\\/uploads\\\/How_to_easily_access_your_local_LAN_866d5bbef7.webp\",\"contentUrl\":\"https:\\\/\\\/content.nordlayer.com\\\/uploads\\\/How_to_easily_access_your_local_LAN_866d5bbef7.webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/access-local-lan-remotely\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Remote network access: How to easily access your local LAN\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Remote network access: How to easily access your local LAN - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nordlayer.com\/blog\/access-local-lan-remotely\/","og_locale":"en_US","og_type":"article","og_title":"Remote network access: How to easily access your local LAN - Version 2","og_description":"Summary: Explore secure, scalable remote access to loca [&hellip;]","og_url":"https:\/\/nordlayer.com\/blog\/access-local-lan-remotely\/","og_site_name":"Version 2","article_published_time":"2025-05-30T03:53:40+00:00","og_image":[{"url":"https:\/\/content.nordlayer.com\/uploads\/How_to_easily_access_your_local_LAN_866d5bbef7.webp","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"Written by":"tracylamv2","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nordlayer.com\/blog\/access-local-lan-remotely\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2025\/05\/remote-network-access-how-to-easily-access-your-local-lan\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"Remote network access: How to easily access your local LAN","datePublished":"2025-05-30T03:53:40+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2025\/05\/remote-network-access-how-to-easily-access-your-local-lan\/"},"wordCount":1080,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/nordlayer.com\/blog\/access-local-lan-remotely\/#primaryimage"},"thumbnailUrl":"https:\/\/content.nordlayer.com\/uploads\/How_to_easily_access_your_local_LAN_866d5bbef7.webp","keywords":["Nord Security","2025","NordLayer"],"articleSection":["Nord Security","NordLayer","2025","Press Release"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2025\/05\/remote-network-access-how-to-easily-access-your-local-lan\/","url":"https:\/\/nordlayer.com\/blog\/access-local-lan-remotely\/","name":"Remote network access: How to easily access your local LAN - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nordlayer.com\/blog\/access-local-lan-remotely\/#primaryimage"},"image":{"@id":"https:\/\/nordlayer.com\/blog\/access-local-lan-remotely\/#primaryimage"},"thumbnailUrl":"https:\/\/content.nordlayer.com\/uploads\/How_to_easily_access_your_local_LAN_866d5bbef7.webp","datePublished":"2025-05-30T03:53:40+00:00","breadcrumb":{"@id":"https:\/\/nordlayer.com\/blog\/access-local-lan-remotely\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nordlayer.com\/blog\/access-local-lan-remotely\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nordlayer.com\/blog\/access-local-lan-remotely\/#primaryimage","url":"https:\/\/content.nordlayer.com\/uploads\/How_to_easily_access_your_local_LAN_866d5bbef7.webp","contentUrl":"https:\/\/content.nordlayer.com\/uploads\/How_to_easily_access_your_local_LAN_866d5bbef7.webp"},{"@type":"BreadcrumbList","@id":"https:\/\/nordlayer.com\/blog\/access-local-lan-remotely\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Remote network access: How to easily access your local LAN"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/en\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-t8Y","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/112032","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=112032"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/112032\/revisions"}],"predecessor-version":[{"id":112036,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/112032\/revisions\/112036"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=112032"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=112032"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=112032"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}