Traditional perimeter security assumes everything inside the network is trusted. Zero Trust flips this: verify every user and device, every time, regardless of location. Today covers VPN architecture, Zero Trust principles, and modern secure access.
IPSec operates at Layer 3 and is used for site-to-site VPNs between offices and for remote access. OpenVPN is SSL/TLS-based, runs on port 443 (bypasses most firewalls), and is highly configurable. WireGuard is the modern choice — it has 4,000 lines of code vs. OpenVPN's 70,000, performs faster, and is easier to audit. All three encrypt traffic between endpoints.
Zero Trust principles: never trust, always verify; assume breach; least privilege access. Implementation requires: identity verification (MFA), device posture checking (is the laptop patched?), micro-segmentation (workstations can't talk to databases directly), and continuous session monitoring. Google's BeyondCorp and Cloudflare Access are real-world implementations.
Passwords are the weakest authentication method. Certificate-based auth uses asymmetric cryptography: the server trusts your CA-signed certificate instead of a password. Deploy an internal PKI with an offline root CA, issuing CA, and client certificates. This is the standard for enterprise VPN and 802.1X network access control.
# WireGuard server setup
wg genkey | tee server_private.key | wg pubkey > server_public.key
wg genkey | tee client_private.key | wg pubkey > client_public.key
# /etc/wireguard/wg0.conf
[Interface]
Address = 10.0.0.1/24
ListenPort = 51820
PrivateKey = [server_private_key]
[Peer]
PublicKey = [client_public_key]
AllowedIPs = 10.0.0.2/32
# Start WireGuard
wg-quick up wg0
wg show
# OpenVPN quick certificate generation
easy-rsa init-pki
easy-rsa build-ca
easy-rsa gen-req server nopass
easy-rsa sign-req server server
Design a Zero Trust network architecture for a 50-person company with remote workers. Draw the diagram showing identity provider, device posture check, micro-segmented zones, and monitoring.