Skip to content

Services, Wiki-Artikel, Blog-Beiträge und Glossar-Einträge durchsuchen

↑↓NavigierenEnterÖffnenESCSchließen
Netzwerksicherheit Glossary

VPN (Virtual Private Network)

An encrypted tunnel that securely connects two endpoints over a public network (the Internet)—protects remote employees, connects company locations, and hides network traffic from third parties.

A VPN (Virtual Private Network) is a cryptographically secured communication channel over an insecure network—typically the public internet. For employees working from home, in the field, or while traveling, a VPN is the foundation for secure access to the corporate network.

Types of VPNs and Use Cases

Remote Access VPN: Individual users connect securely to the corporate network from outside. Typical clients: Cisco AnyConnect, GlobalProtect (Palo Alto), FortiClient, OpenVPN client.

Use case: Remote workers accessing internal resources (ERP, file servers, intranets).

Site-to-Site VPN: Permanently connects two corporate networks via the Internet—transparent to users. A branch office communicates with headquarters as if they were on the same LAN.

SSL VPN / TLS VPN: Browser-based access via HTTPS—no client required. Often used for partners or devices that do not need full access. Lower overhead than IPsec, but limited scope.

WireGuard: Modern VPN protocol (2018) with a very small codebase (~4,000 lines). Faster than OpenVPN and IPsec, cryptographically modern (ChaCha20, Curve25519, BLAKE2s). Increasingly used for remote access VPNs (e.g., Mullvad, Tailscale).

VPN Protocols Compared

ProtocolLayerSecurityPerformancePrevalence
IPsec/IKEv2Layer 3High (BSI-recommended)HighEnterprise standard
OpenVPNLayer 3/4HighMediumWidely used
WireGuardLayer 3Very highVery highIncreasingly
SSTPLayer 2MediumMediumWindows
L2TP/IPsecLayer 2MediumMediumObsolete
PPTPLayer 2InsecureHighObsolete (do not use!)

Security Risks with VPNs

Unpatched VPN Appliances: VPN gateways are one of the most common entry points for attackers. Known critical vulnerabilities 2020–2024:

  • Fortinet FortiOS (CVE-2023-27997, CVSS 9.8): Pre-Auth RCE
  • Cisco IOS XE (CVE-2023-20198, CVSS 10.0): Active Exploitation
  • Pulse Secure / Ivanti (CVE-2024-21887, CVSS 9.1)
  • Citrix Bleed (CVE-2023-4966): Session token theft

These vulnerabilities have been actively exploited by state-sponsored actors (APT groups) and ransomware gangs to gain initial access.

BSI Recommendation: VPN appliances must be patched as a priority—within 24 hours for critical vulnerabilities.

Lack of MFA: VPN access using only a username and password is insufficient. Compromised credentials (via phishing or credential stuffing) are then sufficient to gain network access. MFA is mandatory—preferably certificate-based or FIDO2.

Split-tunneling risks: Split-tunneling means: Only corporate traffic runs through the VPN; private traffic (Netflix, YouTube) goes directly to the internet. Advantage: less load on the VPN. Risk: Employee devices are directly exposed to the internet and can serve as a bridge into the corporate network.

Recommendation: Full-tunnel VPN for all corporate devices. Split tunneling only with consistent endpoint protection.

Weak PSKs (Pre-Shared Keys): Easily guessable PSKs can be cracked via offline brute force if IKE handshakes have been intercepted. Certificate-based authentication is better.

VPN vs. Zero Trust Network Access (ZTNA)

A traditional VPN grants access to the entire subnet—or at least to a large network segment—after authentication. This is the trust issue with VPNs: Once inside, many resources are accessible.

ZTNA (Zero Trust Network Access) is the more modern model:

  • Access only to specific applications, not to the entire network
  • Every access request is verified (user + device + context)
  • No "lateral movement" after compromise
  • Device health check before access

Solutions: Cloudflare Access, Zscaler Private Access, Microsoft Entra Private Access.

Recommendation: VPN remains useful for site-to-site connections. For remote access scenarios, ZTNA is preferable in new architectures.

Configuration Recommendations (BSI TR-02102-3)

Mandatory IKEv2 Parameters:

ParameterValue
EncryptionAES-256-GCM
IntegritySHA-384
DH GroupDH-20 (P-384) or better
AuthenticationCertificates (RSA-3072+ or ECDSA-256)
PFSAlways enable

Prohibited configurations: IKEv1 Aggressive Mode, PSK in large deployments, 3DES/DES (weak encryption), MD5/SHA-1 (weak hashes), DH group < 14 (1024-bit).