Objective 3.2High11 min

VPN and Remote Access

Secure remote connectivity using VPN technologies. Covers tunneling protocols including IPSec and TLS, site-to-site vs remote access VPNs, full tunnel vs split tunnel configurations, and VPN security considerations.

Understanding VPN and Remote Access

VPNs (Virtual Private Networks) create encrypted tunnels over untrusted networks, enabling secure remote access and site-to-site connectivity. Understanding VPN protocols and configurations is essential for secure remote work and branch office connectivity.

VPN use cases:Remote access — Employees connecting from home/travel • Site-to-site — Connecting branch offices securely • Client-to-site — Individual devices to corporate network • Extranet — Secure partner/vendor connections

The COVID-19 pandemic caused VPN usage to surge 400% as organizations rapidly shifted to remote work. Many discovered their VPN infrastructure wasn't sized for universal remote access—and some suffered breaches through unpatched VPN appliances, like the 2019 Pulse Secure VPN vulnerabilities that were exploited for years.

Properly configured VPNs are essential for secure remote connectivity.

Why This Matters for the Exam

VPN and remote access security is heavily tested on SY0-701 because remote work is ubiquitous. Questions cover VPN protocols, tunneling modes, and security configurations.

Understanding VPN security helps with remote workforce security, branch connectivity, and network architecture. Misconfigured VPNs expose corporate networks.

The exam tests both protocol knowledge and practical deployment scenarios.

Deep Dive

What Is the Difference Between IPSec and TLS VPNs?

IPSec VPN:

Operates at: Network layer (Layer 3)
Protects: All IP traffic
Requires: Client software or hardware
Use case: Site-to-site, full network access

TLS/SSL VPN:

Operates at: Transport/Application layer
Protects: Specific applications/services
Requires: Web browser or lightweight client
Use case: Remote access, specific apps

Protocol Comparison:

AspectIPSecTLS VPN
LayerNetwork (3)Transport/App (4-7)
ClientDedicated softwareBrowser/light client
AccessFull networkSpecific apps
Firewall traversalMay have issuesUsually port 443
Setup complexityHigherLower
Granular controlLimitedFine-grained

What Are IPSec Tunnel Mode and Transport Mode?

Tunnel Mode:

Original packet: [IP Header][Data]
                      ↓
Tunnel mode:    [New IP Header][IPSec Header][Original IP Header][Data]
                                              Encrypted

Entire original packet is encrypted
New IP header added for routing
Used for: Site-to-site VPNs

Transport Mode:

Original packet: [IP Header][Data]
                      ↓
Transport mode: [IP Header][IPSec Header][Data]
                                          Encrypted

Only payload encrypted, original header preserved
Used for: Host-to-host communication

Mode Comparison:

AspectTunnel ModeTransport Mode
EncryptionEntire packetPayload only
IP headerNew header addedOriginal preserved
Common useSite-to-siteHost-to-host
OverheadHigherLower

What Are IPSec AH and ESP?

Authentication Header (AH):

Provides: Integrity + Authentication
Does NOT provide: Confidentiality (no encryption)
Use: When you need to verify sender, encryption not required

Encapsulating Security Payload (ESP):

Provides: Confidentiality + Integrity + Authentication
Encryption: Yes
Use: Most common, provides full protection

AH vs ESP:

FeatureAHESP
ConfidentialityNoYes
IntegrityYesYes
AuthenticationYesYes
Protocol number5150
Common usageRareStandard

Most VPNs use ESP because encryption (confidentiality) is typically required.

What Is the Difference Between Site-to-Site and Remote Access VPN?

Site-to-Site VPN:

Site-to-Site VPN
Office A Network
Router
VPN Tunnel
Encrypted
Office B Network
Router
Always-on connection • All traffic encrypted • Users unaware of VPN (transparent)

Remote Access VPN:

Remote Access VPN
Remote User
Laptop
VPN Tunnel
On-demand
Corporate Network
VPN Concentrator
User initiates connection • Requires client software • Individual device to network

Comparison:

AspectSite-to-SiteRemote Access
EndpointsNetwork to NetworkDevice to Network
ConnectionPermanentOn-demand
UsersTransparentMust connect
Common protocolIPSecIPSec or TLS

What Is Full Tunnel vs Split Tunnel?

Full Tunnel:

Full Tunnel VPN
More Secure
ALL traffic
VPN tunnel
Corporate
Internet
Even internet browsing goes through corporate
✓ All traffic inspected✗ More bandwidth on VPN

Split Tunnel:

Split Tunnel VPN
Better Performance
Corporate
VPN tunnel
Corporate
Internet
Direct
Internet
✓ Better performance✗ Internet traffic not inspected

Security Comparison:

AspectFull TunnelSplit Tunnel
SecurityHigherLower
PerformanceSlowerFaster
Bandwidth usageHigherLower
Policy enforcementCompletePartial
Corporate visibilityAll trafficOnly corporate

What VPN Security Considerations Exist?

VPN Security Best Practices:

PracticePurpose
Strong authenticationMFA for VPN access
Certificate-based authStronger than passwords
Endpoint complianceNAC for VPN clients
Session timeoutsLimit idle connections
Split tunnel policyBalance security/performance
VPN appliance patchingCritical vulnerabilities

VPN Vulnerabilities:

  • Unpatched VPN appliances
  • Weak authentication
  • Credential theft (phishing)
  • Split tunnel data exposure
  • Session hijacking

How CompTIA Tests This

Example Analysis

Scenario: A company needs to connect their headquarters to a new branch office. They require all traffic between sites to be encrypted, and the connection should be always-on without user intervention. Additionally, remote employees need to access corporate resources from home.

Analysis - VPN Solution Design:

Requirements:

RequirementSolution
HQ to branch encryptedSite-to-site VPN
Always-on, transparentIPSec tunnel mode
Remote employee accessRemote access VPN
Strong authenticationCertificates + MFA

Site-to-Site Solution:

Site-to-Site VPN Solution
HQ Network
VPN Router
IPSec Tunnel
Encrypted, Always-on
Branch Network
VPN Router
Protocol: IPSec ESPMode: TunnelEncryption: AES-256
Tunnel mode encrypts entire packets • Transparent to users

Remote Access Solution:

Remote Access VPN Solution
Remote Employee
VPN Client
TLS VPN
On-demand, MFA
VPN Concentrator
Corporate Network
Protocol: TLS VPNAuth: Username + MFAFull tunnel
TLS VPN uses port 443 • Firewall-friendly • User initiates connection

Why These Choices:

DecisionReason
IPSec for site-to-siteFull network connectivity, always-on
Tunnel modeEncrypts entire packets, new IP header
ESP (not AH)Need encryption, not just authentication
TLS for remoteFirewall-friendly (port 443), easier client
Full tunnelSecurity policy enforcement for remote
MFAProtect against credential theft

Key insight: Site-to-site VPNs use IPSec tunnel mode for transparent, always-on connectivity. Remote access VPNs typically use TLS for easier deployment and firewall traversal. Both need strong authentication.

Key Terms

VPN securityIPSecTLS VPNremote accesssite-to-site VPNtunnel modetransport modesecure connectivity

Common Mistakes

Confusing tunnel and transport mode—tunnel mode encrypts entire packet (site-to-site), transport mode encrypts only payload (host-to-host).
Using AH when encryption needed—AH provides integrity but NOT confidentiality. Use ESP for encryption.
Split tunnel without policy consideration—split tunnel improves performance but reduces security visibility.
Ignoring VPN appliance patches—VPN vulnerabilities are actively exploited. Patch immediately.

Exam Tips

IPSec tunnel mode = entire packet encrypted, new IP header added = site-to-site VPN.
IPSec transport mode = only payload encrypted, original header preserved = host-to-host.
ESP provides confidentiality (encryption). AH provides only integrity/authentication (no encryption).
TLS/SSL VPN uses port 443, easier through firewalls. IPSec may have NAT traversal issues.
Full tunnel = ALL traffic through VPN (more secure). Split tunnel = only corporate traffic through VPN (better performance).
Site-to-site = always-on, network-to-network. Remote access = on-demand, user-to-network.

Memory Trick

IPSec Modes:

Tunnel mode = "Totally encrypted, new header on Top" Entire original packet encrypted, new IP header added Think: A tunnel completely covers the road

Transport mode = "Transporting only the Package" Only payload encrypted, original header stays Think: Transport truck, cargo covered but truck visible

ESP vs AH:

ESP = Encrypts Stuff Properly Confidentiality + Integrity + Authentication

AH = Authentication Header (no encryption) Only integrity/authentication, NO confidentiality

"AH is A Half solution—no encryption"

VPN Types: "Site-to-Site = Switch to Switch" Routers/networks connected, always on

"Remote Access = Remote Anyone connecting" Individual users, on-demand

Full vs Split Tunnel: "Full = ALL traffic through the Firewall (corporate)" "Split = Some goes Public, some Local, some through Internal Tunnel"

Test Your Knowledge

Q1.A company needs to connect two office networks with an always-on encrypted connection where users are unaware of the VPN. What is the BEST solution?

Q2.Which IPSec component provides encryption (confidentiality)?

Q3.What is the security concern with split tunnel VPN configuration?

Want more practice with instant AI feedback?

Continue Learning

Ready for the Exam?

See exactly where you stand on this concept and 182 others.

99% pass rate · Pass guarantee