Defguard 2.0 is now feature-complete and entering the Beta stabilization phase.

Defguard 2.0 Beta 1 release hero image

Defguard 2.0 is now feature-complete and entering the Beta stabilization phase.

Although we have been running and testing this version in production-like environments, we still recommend using it first in staging. Beta 1 includes a simple migration path from 1.x and a set of tutorial videos to make evaluation easier.

If you are new to 2.0, start with the Defguard 2.0 technical overview and Alpha 2 release post.

In case you skipped previous release announcement - here is a quick tutorial on launching 2.0 for testing purposes:

Watch the demo video on YouTube

What’s changed in Beta 1 (vs Alpha 2 and Alpha 1)

Migration from 1.x

Testing migration is straightforward: deploy Core 2.0 and connect it to a PostgreSQL snapshot of your existing 1.x environment. Core detects the previous setup and runs a guided step-by-step migration.

We’ve recorded a guided migration - we walk through a full migration from Defguard 1.6 to 2.0 using a setup on AWS with separate Core, Edge, and Gateway instances. You’ll learn how to update the components, run the built-in migration process, adopt the Edge component, and securely migrate your locations and gateways — all step by step, with no VPN downtime.

The migration flow includes:

  1. Confirming or changing general configuration and URLs.
  2. Adopting Edge (previously Proxy) with the new UI-driven deployment process.
  3. Migrating each VPN location by deploying or upgrading a Gateway and adopting it.

Make a database backup before migration.

Defguard 2.0 migration wizard

Defguard Core and Edge built-in SSL termination

Starting in 2.0, Core and Edge can be configured with built-in SSL termination, reducing setup complexity for new deployments.

Core SSL termination options

For Core (internal Defguard URL), you can choose:

  • Do not configure SSL (recommended when an external reverse proxy handles TLS).
  • Generate certificates based on Defguard internal CA.
  • Upload your own certificate.

Core SSL termination options

Using a reverse proxy in production remains the best path for security and traffic control.

Edge SSL termination options

Edge supports the same options as Core and can additionally auto-configure a Let’s Encrypt certificate via HTTP challenge when ports 80 and 443 are publicly reachable.

Edge SSL termination options

New certificate settings

A new certificate section in settings lets you view the Defguard Root CA certificate and update SSL termination settings for both Core and Edge.

Certificate settings in Defguard 2.0 Beta 1

Video tutorials and contextual help

Beta 1 introduces a dedicated video tutorial section where users can browse and play published tutorials.

Video tutorials section in Defguard 2.0 Beta 1

When a tutorial is relevant to a specific module, Defguard also shows a contextual button for section-specific guidance.

Contextual video tutorial support button

Easier VM/OVA upgrades

We also introduced OVA Virtual Images for all-in-one testing and component-based VM deployments.

Until a native self-update mechanism is available, OVA updates are handled through container image refreshes. For this, OVA includes Dockge, making updates simpler from a UI.

To enable Dockge:

  1. Enable it via Cloud Init: Dockge docs
  2. Open https://<vm-ip>:5001
  3. Create your Dockge credentials

You can also update via SSH and Docker Compose if preferred.

Summary and release plan

Beta 1 is intended to validate migration and operational workflows before the final 2.0 stable release.

We plan to release 2.0.0 final after remaining minor, non-blocking bugs are resolved. You can track progress on the 2.0.0 project board.

Feedback from testing is highly appreciated.