In 2023, a major healthcare provider was breached through a single compromised VPN credential. The attacker landed on a network with zero segmentation, moved laterally unimpeded, and exfiltrated 4.5 million patient records in under 72 hours. The VPN was properly licensed, the firewall was enterprise-grade, and none of it mattered—because the architecture behind it was flat. Let's fix that.
The Problem With "Just Having a VPN"
Too many organizations treat VPN deployment as a checkbox: install it, hand out credentials, move on. But a VPN without proper segmentation is simply an encrypted tunnel into a flat network—handing remote users (and anyone who compromises their credentials) the same access as someone sitting in the server room.
The goal isn't just encrypted remote access. It's controlled, segmented, least-privilege remote access with visibility at every layer.
VPN Hardening: Beyond Default Configurations
Start with the tunnel itself. If you're running OpenVPN or WireGuard, enforce modern cryptographic standards and eliminate legacy protocols.
OpenVPN server hardening example (server.conf):
tls-version-min 1.2
cipher AES-256-GCM
auth SHA384
tls-cipher TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384
reneg-sec 3600
max-clients 100
duplicate-cn off # Prevent credential sharing
client-cert-not-required # Remove this line—always require client certs
verify-client-cert requireCritical steps often missed:
- Enforce MFA at the VPN gateway. RADIUS integration with a TOTP provider (Duo, Azure MFA) should be non-negotiable.
- Disable split tunneling unless you have a documented, risk-accepted reason. Full tunnel ensures traffic inspection.
- Set session timeouts aggressively. An 8-hour idle VPN session is an 8-hour window for token theft.
Network Segmentation: Containing the Blast Radius
Once VPN users land on your network, segmentation determines whether a compromise stays contained or becomes catastrophic. The principle is simple: no system should be able to reach anything it doesn't explicitly need.
Segment by function and risk tier:
| Zone | Examples | Trust Level |
|---|---|---|
| DMZ | Web servers, reverse proxies | Untrusted |
| User VLAN | Workstations, VPN clients | Low |
| Application Tier | App servers, middleware | Medium |
| Data Tier | Databases, file servers | High |
| Management | Domain controllers, SIEM, hypervisors | Critical |
Cisco IOS ACL example—restricting VPN users (VLAN 50) from reaching the management zone (VLAN 99):
ip access-list extended VPN-TO-MGMT-DENY
deny ip 10.0.50.0 0.0.0.255 10.0.99.0 0.0.0.255 log
permit ip 10.0.50.0 0.0.0.255 10.0.10.0 0.0.0.255
deny ip any any log
interface Vlan50
ip access-group VPN-TO-MGMT-DENY inThe log keyword is intentional—every denied flow should generate a syslog event that feeds your SIEM.
Microsegmentation: The Next Evolution
Traditional VLANs handle macro-segmentation, but modern environments demand granularity at the workload level. Tools like VMware NSX, Illumio, or even host-based firewalling with iptables/nftables let you enforce policies between individual services.
Linux host-level microsegmentation with nftables:
nft add rule inet filter input ip saddr 10.0.50.0/24 tcp dport {443, 8080} accept
nft add rule inet filter input ip saddr 10.0.50.0/24 dropThis ensures VPN clients can reach only specific application ports on this host—nothing else.
Monitoring and Validation
Segmentation without monitoring is just wishful thinking. Implement:
- NetFlow/sFlow collection on segment boundaries to detect anomalous cross-zone traffic.
- Regular penetration testing that specifically attempts lateral movement from the VPN landing zone.
- Automated policy auditing using tools like Tufin or Batfish to detect segmentation drift.
Final Takeaway
A VPN protects data in transit. Network segmentation protects everything else. Neither is effective alone, and both fail silently when misconfigured. Treat your VPN landing zone as a semi-trusted entry point—not an all-access pass—and architect every segment boundary as if it's the last line of defense. Because one day, it will be.
Have questions about vpn and network segmentation best practices? I'm always happy to talk shop — reach out or connect with me on LinkedIn.