CloudBurst VPN

Company networks are usually protected by one or more firewalls, which typically block any unknown incoming traffic. If you intend to use cloud agents to test an application on a server environment that is part of your company network, you have the following options:

To learn how to correctly configure a CloudBurst VPN, see Configuring a CloudBurst VPN.

Note: CloudBurst VPN is based on the UDP (User Datagram Protocol). It works through firewalls, which allow to establish UDP communication initiated from the router appliance (on-premise). Furthermore, operation through an HTTP proxy is not supported.