LINUXMAKER, OpenSource, Tutorials

Home office with VPN, Jitsi-Meet and BigBlueButton

Virtual Private Network (VPN) is a network connection technology with which you can connect yourself and your employees, pupils, students from outside, for example from home, in your company network, school or university network quickly, easily and securely.

  • All internal released resources are available to you externally.
  • The connection to your network is absolutely encrypted and secure, without your intervention.
  • You save costs when your employees can do the same work from home.
  • Class sizes no longer depend on the capacity of classrooms.

Jitsi-Meet is software that can be used to generate video conferences, employee meetings, school lessons, lectures with two or more participants quickly, efficiently and easily. Several video conferences can be held at the same time.

  • The software works independently of the platform (Linux, macOS, Windows) and there are apps for smartphones, tablets (Android, iOS).
  • The moderator and teacher can invite to their conference with password protection.
  • The data is encrypted and the conference is therefore restricted to the participants.
  • Employee meetings can be implemented inexpensively without your employees having to go to the office.
  • Teachers and students can also keep in touch with the class outside of the school building.
  • Presentations and desktops can be shared with all participants.

BigBlueButton is another open source web conference solution for online learning. They enable your employees, students, and students to share audio, video, slides, whiteboard, chat and screen in real time. Guest speakers can also be invited and every participant is included via webcams.

  • Lessons or meetings can be recorded on video and shared later.
  • Comment on important parts of your presentation on the whiteboard and show them to the students in real time.
  • With desktop sharing, you can present your desktop to all participants.

Virtual Private Network (VPN)

The acronym VPN stands for "Virtual Private Network". VPN is therefore a logical private network on a publicly accessible infrastructure. Only the communication partners belonging to this private network can communicate with each other and exchange information and data.
However, there is no general definition for VPN. The term and the abbreviation VPN stand for a variety of different techniques. For example, some technology, protocol or product is assigned to VPN, although aspects such as encryption or authentication are completely left out.
VPNs must ensure authenticity, confidentiality and integrity so that they can be operated safely with data protection. Authenticity means identifying authorized users and verifying that the data comes only from the authorized source. Confidentiality and confidentiality is created by encrypting the data. Integrity ensures that the data has not been changed by third parties. Regardless of the infrastructure, VPNs ensure the security of the data that is transmitted over it.

Technical solutions in detail:

End-to-site VPN describes a VPN scenario in which home workplaces or mobile users are integrated into a company network. The external employee should work as if he is in the company's network. This VPN scenario is also known as remote access. VPN technology creates a logical connection, the VPN tunnel, to the remote local network via a public network. A VPN client must be installed on the computer of the external employee.
The focus is on the lowest possible technical and financial expenditure for secure access to the remote network.

Site-to-Site VPN and LAN-to-LAN VPN are VPN scenarios for interconnecting several local networks from branch offices or branches to form a virtual network via a public network. Networks located in different locations can be connected directly via a leased dedicated line. This dedicated line usually corresponds to a physical leased line between the two locations. Since every network usually also has a connection to the Internet, it makes sense to use this Internet connection to interconnect two or more networks with VPN technology (LAN-to-LAN coupling).
A variant of Site-to-Site-VPN is the Extranet-VPN. While a Branch-Office-VPN only connects several local networks of a company, an extranet VPN is a virtual network that connects the networks of different companies. As a rule, it is about integrating certain services of external companies into your own network or offering services for external companies. For example for business partners, suppliers and companies providing support. The external company is granted access to parts of its own network. Access is restricted by means of a firewall between the local network and the service network. Extranet VPNs enable secure communication and data exchange between the companies involved.

End-to-end VPN describes a VPN scenario in which a client accesses another client in a remote network. The VPN tunnel covers the entire connection between two hosts. Appropriate VPN software must be installed and configured on both sides. As a rule, the connection can only be established with the support of an intermediate station. This means that a direct connection from host to host is not possible. Instead, both sides establish a connection to a gateway, which then interconnects the two connections.
A typical application of an End-to-End-VPN is remote desktop over public networks.


Jitsi Meet is a WebRTC-based conference software. The Chromium (browser) is recommended for use on PCs on most servers, an app is available for Android and iOS. Jitsi apps for Windows, MacOS and Linux are also available. The service can be installed on your own servers.
Jitsi supports presence and instant messages in all protocols. In most cases, file transfer is also possible. (Video) telephony is currently possible with SIP and jingle. The support of the Google variant of Jingle (Google Talk) also enables connections from a Gmail account to Android devices. In addition, Jitsi also offers desktop sharing - that is, sharing your own screen for viewing and operation by the other side.


BigBlueButton is an open source web conferencing system. In addition to various web conferencing services, it integrates with many of the most important learning and content management systems.
BigBlueButton supports the sharing of multiple audio and video formats, presentations with advanced whiteboard functions such as pointers, zooming and drawing, public and private chats, desktop sharing, integrated VoIP with FreeSWITCH and support for the presentation of PDF documents and Microsoft Office documents and subordinate online conference rooms (breakout rooms). In addition, users can participate in the conference in one of two roles: as a viewer or as a moderator.
As a viewer, a user can participate in the voice conference, share his webcam with others, raise his hand and chat with others. As a moderator, a user can mute or unmute others, exclude any user from the session, and make any user the current moderator. The moderator can upload slides and control the presentation.

IT service and IT consulting

The digitization of business life, essential production processes and private life is in full swing. At the same time, threats from server failures, viruses and cybercrime are increasing. The whole thing is reinforced by neglecting IT security both in the private sphere and in the business world. Protective mechanisms that are really necessary are usually only considered when the damage has already occurred and the restoration of the IT infrastructure has caused enormous costs.
Linux offers you a secure basis in your IT infrastructure right from the start. On the one hand, because it has always been conceived as an operating system geared towards network operation. On the other hand, because the free availability of the source code makes the possibility of defective or misused functions almost impossible. In addition, “Open Source” has always meant permanent improvement by innovative specialists from all over the world. In the meantime, more and more users trust Linux, which among other things provides the kernel for the numerous Android installations, including companies and institutions such as Siemens, BMW, Lufthansa, Deutsche Post AG, Greenpeace and state institutions including the Federal Commissioner for Data Protection.
You are a company, a medium-sized company, a craft company, a sole trader with the appropriate IT infrastructure and you want to fully satisfy your customers with your products. Or you are a private individual with corresponding support requests. Your IT infrastructure should work reliably around the clock. As an expert in this field, IT-LINUXMAKER can protect your information effectively and quickly. With the services of IT-LINUXMAKER you secure your competitive advantage through the stability of your IT infrastructure and your data.

The support contracts from IT-LINUXMAKER are the ideal plus for your IT or development department. IT-LINUXMAKER supports you in all situations related to Linux with administration, monitoring, configuration, troubleshooting and script programming. Where your IT infrastructure is located, how large it is or how many users work in it does not matter for IT-LINUXMAKER.

Checklists - safe digital work

Since the beginning of the corona pandemic, many companies have also been organizing their work via home office regulations. The tips from IT-LINUXMAKER in a practical checklist format show what needs to be considered.

You can find all checklists for safe digital work here:

Secure passwords with the password card

Generate secure passwords of any length with the passwort card. You can check it out here.



Our fees depend on the service/product and the scope. Therefore, we can only state our fees in an offer if we already know your request.


Consultation request