VPN, Remote Access, and NAC

Key Takeaways

  • VPNs create encrypted tunnels for remote users or site-to-site connectivity, but access should still be least privilege.
  • Split tunneling routes only selected traffic through the VPN; full tunneling routes all client traffic through the VPN.
  • Remote access should use MFA, device posture checks, strong encryption, logging, and scoped authorization.
  • NAC evaluates devices before or during network access and can assign VLANs, restrict access, or quarantine systems.
  • ZTNA may be better than broad VPN access when users need only specific private applications.
Last updated: April 2026

VPN, Remote Access, and NAC

Remote access architecture must balance confidentiality, usability, and least privilege. The exam often compares VPN, ZTNA, NAC, and device posture controls.

VPN Types

TypePurposeExample
Remote access VPNIndividual user connects to private resourcesEmployee laptop to corporate network
Site-to-site VPNConnects two networksBranch office to headquarters
Clientless VPNBrowser-based access to selected appsContractor reaches web portal
SSL/TLS VPNUses TLS-based tunnelRemote access through VPN gateway
IPsec VPNNetwork-layer secure tunnelSite-to-site encrypted connection

VPN provides an encrypted path, but it does not automatically provide least privilege. After the tunnel is established, firewall policy and authorization still matter.

Full Tunnel vs Split Tunnel

ModelBehaviorSecurity consideration
Full tunnelAll client traffic goes through corporate security stackMore visibility and control, more bandwidth use
Split tunnelOnly selected traffic goes through VPNLess bandwidth, but internet traffic may bypass corporate inspection

If the question emphasizes inspection of all remote user traffic, full tunnel or secure web gateway integration may be best. If it emphasizes bandwidth and local internet access with controlled private app routes, split tunnel may be acceptable with compensating controls.

Remote Access Hardening

RiskControl
Stolen passwordMFA, conditional access, risk-based challenge
Unmanaged deviceDevice posture check, MDM, certificate requirement
Broad network accessPer-group ACLs, ZTNA, segmentation
Lost endpointDisk encryption, remote wipe, EDR
Unknown activityVPN logs, identity logs, session recording for admins
Weak tunnel securityModern protocols, strong cipher suites, certificate validation

NAC Concepts

Network Access Control checks whether a device should connect and what access it should receive.

NAC actionScenario
Allow full accessManaged, healthy device with required controls
Assign restricted VLANContractor or limited-purpose device
QuarantineMissing patch, disabled EDR, malware suspicion
Guest networkUnmanaged visitor device
Deny accessUnknown or explicitly blocked device

NAC can use 802.1X, certificates, posture agents, MDM signals, MAC authentication bypass for limited devices, and integration with switches or wireless controllers.

PBQ-Style Scenario

A hospital allows employee laptops, contractor laptops, printers, and guest phones on the same wired and wireless networks. Security wants to reduce exposure without breaking access.

Better design:

  1. Use 802.1X for managed employee devices.
  2. Place healthy managed devices in role-based VLANs.
  3. Place contractor systems in a restricted VLAN with access only to required portals.
  4. Place printers in an IoT/device VLAN with limited print-server access.
  5. Place guest phones on internet-only guest Wi-Fi.
  6. Quarantine devices that fail posture checks.

Trap: "Block all unknown devices forever" may be too disruptive when printers or special devices cannot support 802.1X. A restricted VLAN or MAC authentication bypass with monitoring may be a practical compensating control.

Remote Access Design Example

Requirement: Administrators need emergency access to production servers from home.

Stronger design:

  • MFA with phishing-resistant method where supported.
  • Managed device requirement.
  • VPN or ZTNA path to a management jump host only.
  • PAM checkout for privileged credentials.
  • Session recording or command logging.
  • Firewall rules from jump host to specific admin ports.
  • Alerts for unusual login time, location, or failed attempts.

Weak design: allow RDP or SSH from the internet to every production server. Encryption alone does not fix exposure and brute-force risk.

Test Your Knowledge

A company wants all remote user web traffic inspected by corporate security tools while users are connected remotely. Which VPN routing model best fits?

A
B
C
D
Test Your KnowledgeMulti-Select

Which are appropriate NAC responses to device posture? Choose three.

Select all that apply

Place a noncompliant device in quarantine
Assign a guest device to an internet-only network
Grant full database access to every unknown device
Allow a healthy managed device into its role-based VLAN
Disable authentication for all switch ports
Test Your Knowledge

Remote employees need access only to a private payroll web application, not the whole internal network. Which option most closely follows least privilege?

A
B
C
D