Skip to Content
← Back to Articles

VPN and Network Segmentation Best Practices: Building Defense in Depth That Actually Works

In 2023, a major healthcare provider was breached through a single compromised VPN credential. The attacker landed on a network with zero segmentation, moved laterally unimpeded, and exfiltrated 4.5 million patient records in under 72 hours. The VPN was properly licensed, the firewall was enterprise-grade, and none of it mattered—because the architecture behind it was flat. Let's fix that.


The Problem With "Just Having a VPN"

Too many organizations treat VPN deployment as a checkbox: install it, hand out credentials, move on. But a VPN without proper segmentation is simply an encrypted tunnel into a flat network—handing remote users (and anyone who compromises their credentials) the same access as someone sitting in the server room.

The goal isn't just encrypted remote access. It's controlled, segmented, least-privilege remote access with visibility at every layer.

VPN Hardening: Beyond Default Configurations

Start with the tunnel itself. If you're running OpenVPN or WireGuard, enforce modern cryptographic standards and eliminate legacy protocols.

OpenVPN server hardening example (server.conf):

tls-version-min 1.2
cipher AES-256-GCM
auth SHA384
tls-cipher TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384
reneg-sec 3600
max-clients 100
duplicate-cn off          # Prevent credential sharing
client-cert-not-required  # Remove this line—always require client certs
verify-client-cert require

Critical steps often missed:

  • Enforce MFA at the VPN gateway. RADIUS integration with a TOTP provider (Duo, Azure MFA) should be non-negotiable.
  • Disable split tunneling unless you have a documented, risk-accepted reason. Full tunnel ensures traffic inspection.
  • Set session timeouts aggressively. An 8-hour idle VPN session is an 8-hour window for token theft.

Network Segmentation: Containing the Blast Radius

Once VPN users land on your network, segmentation determines whether a compromise stays contained or becomes catastrophic. The principle is simple: no system should be able to reach anything it doesn't explicitly need.

Segment by function and risk tier:

Zone Examples Trust Level
DMZ Web servers, reverse proxies Untrusted
User VLAN Workstations, VPN clients Low
Application Tier App servers, middleware Medium
Data Tier Databases, file servers High
Management Domain controllers, SIEM, hypervisors Critical

Cisco IOS ACL example—restricting VPN users (VLAN 50) from reaching the management zone (VLAN 99):

ip access-list extended VPN-TO-MGMT-DENY
  deny   ip 10.0.50.0 0.0.0.255 10.0.99.0 0.0.0.255 log
  permit ip 10.0.50.0 0.0.0.255 10.0.10.0 0.0.0.255
  deny   ip any any log

interface Vlan50
  ip access-group VPN-TO-MGMT-DENY in

The log keyword is intentional—every denied flow should generate a syslog event that feeds your SIEM.

Microsegmentation: The Next Evolution

Traditional VLANs handle macro-segmentation, but modern environments demand granularity at the workload level. Tools like VMware NSX, Illumio, or even host-based firewalling with iptables/nftables let you enforce policies between individual services.

Linux host-level microsegmentation with nftables:

nft add rule inet filter input ip saddr 10.0.50.0/24 tcp dport {443, 8080} accept
nft add rule inet filter input ip saddr 10.0.50.0/24 drop

This ensures VPN clients can reach only specific application ports on this host—nothing else.

Monitoring and Validation

Segmentation without monitoring is just wishful thinking. Implement:

  • NetFlow/sFlow collection on segment boundaries to detect anomalous cross-zone traffic.
  • Regular penetration testing that specifically attempts lateral movement from the VPN landing zone.
  • Automated policy auditing using tools like Tufin or Batfish to detect segmentation drift.

Final Takeaway

A VPN protects data in transit. Network segmentation protects everything else. Neither is effective alone, and both fail silently when misconfigured. Treat your VPN landing zone as a semi-trusted entry point—not an all-access pass—and architect every segment boundary as if it's the last line of defense. Because one day, it will be.


Have questions about vpn and network segmentation best practices? I'm always happy to talk shop — reach out or connect with me on LinkedIn.

← Back to Articles