Why All The So-Called VPN Replacements Are Not VPN Replacements

ACM.473 Taking a closer look at AWS Verified Access and How It Works Compared to An IPSEC VPN — should you use it?

Teri Radichel
Cloud Security
Published in
8 min readMar 7, 2024

--

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

⚙️ Check out my series on Automating Cybersecurity Metrics. The Code.

🔒 Related Stories: Network Security | AWS Security | Cloud Architecture

💻 Free Content on Jobs in Cybersecurity | ✉️ Sign up for the Email List

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

This is part of my series on configuring a Site To Site VPN from pfSense to AWS using a Virtual Private Gateway or a Transit Gateway. All the links are at the bottom of this post:

In the last post I showed how to set up a Transit Gateway and connect it to pfSense with proper routing to send all traffic out via a NAT.

--

--

Teri Radichel
Teri Radichel

Written by Teri Radichel

CEO 2nd Sight Lab | Penetration Testing & Assessments | AWS Hero | Masters of Infosec & Software Engineering | GSE 240 etc | IANS | SANS Difference Makers Award