Get in Touch

Course Outline

Fundamentals of VPN Sovereignty

  • Reasons why commercial VPNs log metadata and comply with legal requests.
  • OpenVPN: a mature, feature-rich protocol with TAP/TUN flexibility.
  • WireGuard: a modern, minimalist, high-performance cryptographic solution.
  • Selecting the appropriate protocol for your specific threat model.

OpenVPN Deployment

  • Installing OpenVPN alongside Easy-RSA PKI.
  • Server configuration: ciphers, HMAC, TLS-auth, and topology.
  • Generating and distributing client configurations.
  • Managing revocation and Certificate Revocation Lists (CRL).

WireGuard Deployment

  • Installing the kernel module and WireGuard-tools.
  • Generating keys and configuring peers.
  • Managing wg-quick and systemd units.
  • Implementing road warrior and site-to-site mesh topologies.

Authentication and Authorization

  • Certificate-based authentication with OpenVPN.
  • Integrating LDAP and RADIUS backends.
  • Enabling two-factor authentication via TOTP plugins.
  • Configuring access control lists and per-user IP allocation.

Routing and Network Design

  • Differentiating between full tunnel and split tunnel routing.
  • Configuring pushed routes, DNS, and WINS.
  • Applying NAT and masquerading for egress traffic.
  • Implementing multi-WAN and policy-based routing.

Performance and Scaling

  • Comparing throughput benchmarks between WireGuard and OpenVPN.
  • Optimizing for multi-core processors and kernel bypass techniques.
  • Load balancing across multiple VPN servers.
  • Implementing DDoS protection and connection rate limiting.

Monitoring and Maintenance

  • Tracking connection logs and bandwidth accounting.
  • Integrating Syslog and Prometheus exporters.
  • Automating certificate renewal and setting up expiration alerts.
  • Establishing disaster recovery plans and configuration backups.

Requirements

  • Intermediate knowledge of Linux networking and firewall administration.
  • Understanding of PKI, certificates, and encryption protocols.
  • Familiarity with routing, NAT, and IP forwarding.

Target Audience

  • Network administrators looking to replace commercial VPN services.
  • Remote work teams requiring secure, sovereign access.
  • Organizations located in regions with VPN restrictions or surveillance.
 14 Hours

Testimonials (2)

Related Categories