Copyright (c) 2026 MindMesh Academy. All rights reserved. This content is proprietary and may not be reproduced or distributed without permission.

5.3.1. Network Observability and Traffic Analysis

💡 First Principle: A VPN creates a secure, authenticated tunnel across an untrusted network (typically the internet), making geographically separated network segments behave as if they share a private network. The encryption protects confidentiality; the authentication prevents unauthorized tunnel establishment; the tunnel encapsulates traffic from the underlying untrusted network.

VPN types by use case:
TypeConnectsProtocol OptionsUse Case
Site-to-Site (LAN-to-LAN)Two network gatewaysIPsec IKEv2, GRE over IPsecPermanently connect branch offices to HQ
Remote Access (Client-to-Site)Individual client to corporate gatewaySSL/TLS VPN, IPsec IKEv2, OpenVPN, WireGuardRoad warriors, remote employees
SSL/TLS VPNBrowser or thin client to SSL gatewayTLSApplication-specific access; clientless option
SD-WANBranch to cloud/HQVarious, often proprietaryModern WAN replacement with app-aware routing
IPsec VPN deep dive:

Site-to-site IPsec uses IKE (Internet Key Exchange) to negotiate security associations before tunnel establishment:

PhaseProcessModeWhat's Negotiated
IKE Phase 1Establish secure management channelMain (6 messages) or Aggressive (3 messages, less secure)Encryption algo, hash, DH group, authentication method; generates IKE SA
IKE Phase 2Negotiate IPsec SA for actual dataQuick ModeIPsec protocols (AH/ESP), encryption algo, SA lifetime; generates IPsec SA
Main mode vs. Aggressive mode:
  • Main mode: identity is protected (encrypted during exchange); more secure
  • Aggressive mode: identity sent in cleartext; faster; vulnerable to offline dictionary attacks on pre-shared keys
Split tunneling tradeoffs:
ConfigurationTraffic through VPNAdvantageSecurity Risk
Full tunnelAll trafficCorporate controls all traffic; DLP sees everythingPerformance; privacy concerns; VPN becomes single point of failure
Split tunnelOnly corporate destinationsBetter performance; bandwidth efficiencyInternet traffic bypasses corporate security; malware can exfiltrate via internet path
Split tunnel excludeAll except specifiedBlocks specified risky destinations; internet through VPNComplex to maintain; risky destinations must be continuously updated

WireGuard — modern VPN protocol:

  • Uses state-of-the-art cryptography (ChaCha20, Curve25519, BLAKE2)
  • Simpler than IPsec (far fewer lines of code = smaller attack surface)
  • Faster than OpenVPN; comparable to IPsec
  • Limitation: static IP configuration; no dynamic routing integration; public IPs of peers must be known in advance

⚠️ Exam Trap: SSL VPN and TLS VPN are the same thing — TLS replaced SSL, but "SSL VPN" remains the common name for browser-based or thin-client VPN solutions. In contrast to IPsec VPN (operates at Layer 3, requires client software), SSL/TLS VPN can operate at Layer 7 and may be accessed via a standard web browser without installed software — making it well-suited for temporary access from unmanaged devices.

Reflection Question: A law firm has 50 attorneys who work from home, client offices, and coffee shops. They need access to case management software, document repositories, and email. The IT team is debating between full-tunnel IPsec VPN and SSL VPN with split tunneling. Analyze the security tradeoffs of each option, specifically addressing confidentiality risk, performance, and regulatory requirements for protecting client-privileged information.

Alvin Varughese
Written byAlvin Varughese
Founder15 professional certifications