Always On VPN and Zero Trust Network Access (ZTNA) (2024)

Zero Trust Network Access (ZTNA) is a term that administrators are likely familiar with, as it is one of the hottest marketing buzzwords in circulation today. ZTNA can mean different things depending on the deployment scenario. ZTNA is fundamentally about enforcing the principle of least privilege for endpoints connecting remotely to the corporate network when it comes to enterprise mobility and remote access.

Trusted Access

Historically, VPNs and even DirectAccess granted full, unrestricted network access to authenticated devices and users. Once the endpoint has an IP address, and in the absence of other controls (routing limitations, firewall access controls, etc.), the user could access any resource on the internal network. The rationale was that authenticated devices and users should be considered “trusted”.

Limitations

The Trusted Access model has some significant limitations. It assumes that all traffic from authorized users and devices is legitimate. However, if an endpoint is compromised, an attacker has broad access to the internal network, which is not ideal from a security perspective.

Zero Trust Network Access is a concept where administrators define explicitly the minimum level of access required to support remote workers. Instead of granting full network access to the endpoint, controlling access using fine-grained policies is enforced on the VPN connection. Configuring limited network access for Always On VPN clients dramatically reduces exposure of the internal network to compromised endpoints.

ZTNA Management

There is a significant management burden associated with this approach, however. Administrators must identify each application requiring VPN access and determine all associated protocols and ports to be allowed, and internal resources to which they will communicate. Although this task isn’t difficult if clients require access to a small subset of internal resources, it can be a substantial undertaking if clients require access to many internal resources from numerous client applications.

Moving Targets

Making things more challenging is that application and network infrastructure often change constantly, requiring administrators to manage network access continually to ensure application availability. When adding new applications or changing the internal infrastructure, updating the configuration on all remote endpoints will be required.

Updating Always On VPN configuration for devices managed with Microsoft Endpoint Manager (formerly Intune) isn’t difficult. However, it can be more challenging when using PowerShell with System Center Configuration Manager (SCCM) or another endpoint management platform.

Traffic Filters

ZTNA can be configured with Always On VPN using Traffic Filters. With Traffic Filters, administrators can apply fine-grained access control for VPN traffic based on a combination of the following.

  • Source IP address (IP address, address range, or subnet)
  • Destination IP address (IP address, address range, or subnet)
  • Protocol (TCP, UDP, IP, etc.)
  • Source Port
  • Destination Port

Endpoint Manager Configuration

Configuring Traffic Filters for Always On VPN connections can be performed using Microsoft Endpoint Manager. Open the Endpoint Manager management console (https://endpoint.microsoft.com), navigate to the Always On VPN device configuration profile, then perform the following steps.

  1. Expand App and Traffic Rules.
  2. Click Add next to Network traffic rules for this VPN connection.
  1. Enter a descriptive name in the Name field.
  2. Select Split tunnel from the Rule type drop-down list.
  3. Enter “6” in the Protocol field.
  4. Enter “3389” in the Lower port and Upper port fields in the Remote port ranges section.
  5. Enter an IPv4 address in the Lower IPv4 address field.
  6. Enter an IPv4 address in the Upper IPv4 address field. Enter the same IPv4 address as the lower address to specify a single host.
  7. Click Save.

The example above shows a traffic filter restricting access to TCP port 3389 (Remote Desktop Protocol) from all VPN clients to the 172.16.0.0/24 network.

Note: Repeat these steps to create as many traffic filters as required for any processes or applications that must communicate over the Always On VPN connection.

XML Configuration

Traffic Filters can also be configured using custom XML. To implement the same Traffic Filter described previously, add the following code between the <VPNProfile> and </VPNProfile> tags in your XML configuration file.

<TrafficFilter>
<Protocol>6</Protocol>
<RemotePortRanges>3389</LocalPortRanges>
<RemoteAddressRanges>172.16.0.0/24</RemoteAddressRanges>
</TrafficFilter>

Note: Address ranges used in Traffic Filters can be defined using CIDR notation in XML, but they are not supported using Microsoft Endpoint Manager today.

Default Deny

When configuring a Traffic Filter for an Always On VPN profile, an implicit “deny all” rule is automatically enabled. Any traffic not explicitly defined in a Traffic Filter will be denied, including unsolicited inbound traffic, which has crucial implications for the device tunnel because it is used commonly for system management of remote devices.

Direction

Traffic Filters are enabled for the Outbound direction only, by default. Beginning with Windows 10 2004, Microsoft introduced support for Inbound traffic filters. Before Windows 10 2004, configuring a Traffic Filter on the device tunnel would break manage-out scenarios by denying all unsolicited inbound network access.

As of this writing, configuring inbound Traffic Filters using Microsoft Endpoint Manager is not supported. They are only configurable using custom XML.

To implement a Traffic Filter to allow inbound RDP access from the internal network over the device tunnel, add the following code between the <VPNProfile> and </VPNProfile> tags in your XML configuration file.

<TrafficFilter>
<Protocol>6</Protocol>
<LocalPortRanges>3389</LocalPortRanges>
<RemoteAddressRanges>172.16.0.0/16</RemoteAddressRanges>
<Direction>Inbound</Direction>
</TrafficFilter>

Note: When configuring inbound Traffic Filters, specify the port of the listening process or application using the LocalPortRanges field.

Application Filters

Administrators can combine Application Filters with Traffic Filters to control network access over the Always On VPN connection even more granularly. Applications can be defined by the following.

  • Package Family Name (PFN) – This is the unique name of a Microsoft Store application. Use the Get-AppxPackage PowerShell command to find the PFN for an application.
  • File Path – This is the full path to any executable on the file system. For example, c:\Windows\System32\mstsc.exe.
  • SYSTEM – This allows Windows kernel-mode drivers (such as ping.exe and net.exe) to send traffic over the Always On VPN connection.

As of this writing, configuring Application Filters using Microsoft Endpoint Manager is not supported. They are only configurable using custom XML.

Application Filter Examples

Below are three examples showing different Application Filters based on file path, Package Family Name, and SYSTEM.

File Path

This example shows a Traffic Filter configured to allow RDP access to an internal subnet using the native Windows Remote Desktop client (mstsc.exe).

<TrafficFilter>
<App>
<Id>C:\Windows\System32\mstsc.exe</Id>
</App>
<Protocol>6</Protocol>
<RemotePortRanges>3389</RemotePortRanges>
<RemoteAddressRanges>172.16.0.0/24</RemoteAddressRanges>
</TrafficFilter>

Package Family Name

This example shows a Traffic Filter configured to allow RDP access to an internal subnet using the Microsoft Windows Store Remote Desktop client.

<TrafficFilter>
<App>
<Id>Microsoft.RemoteDesktop_8wekyb3d8bbwe</Id>
</App>
<Protocol>6</Protocol>
<RemotePortRanges>3389</RemotePortRanges>
<RemoteAddressRanges>172.16.0.0/24</RemoteAddressRanges>
</TrafficFilter>

SYSTEM

This example shows a Traffic Filter configured to allow the netsh.exe process access to an internal subnet.

<TrafficFilter>
<App>
<Id>SYSTEM</Id>
</App>
<Protocol>6</Protocol>
<RemotePortRanges>445</RemotePortRanges>
<RemoteAddressRanges>172.16.0.0/24</RemoteAddressRanges>
</TrafficFilter>

This example shows a Traffic Filter configured to allow the ping.exe process access to an internal subnet.

<TrafficFilter>
<App>
<Id>SYSTEM</Id>
</App>
<Protocol>1</Protocol>
<RemoteAddressRanges>172.16.0.0/24</RemoteAddressRanges>
</TrafficFilter>

Note: Ping uses ICMP (IP protocol 1), which is a network layer protocol. As such, defining ports for the filter is not required.

Sadly, the filtering techniques described in this article do not work when also configuring IPv6 on the Always On VPN connection. As of this writing, enabling Traffic Filters when an IPv6 address is assigned to the VPN interface is not supported. More details can be found here.

Always On VPN Traffic Filters and IPv6

Configuring Zero Trust Network Access (ZTNA) with Windows 10 Always On VPN is not trivial. Still, with attention to detail, it can be a highly effective tool to enforce fine-grained network access policies and reduce exposure of the internal network to compromised endpoints. Combining Traffic Filters with Application Filters allows administrators to tightly control Always On VPN access and ensure the principle of least privilege is applied.

Additional Information

Windows 10 Always On VPN Traffic Filters and IPv6

Windows 10 Always On VPN User Tunnel XML Configuration Reference File

Windows 10 Always On VPN Device Tunnel XML Configuration Reference File

Windows 10 Always On VPN VPNv2 CSP Reference

IP Protocol Numbers

Always On VPN and Zero Trust Network Access (ZTNA) (2024)

FAQs

Always On VPN and Zero Trust Network Access (ZTNA)? ›

Security. Security is the main difference between VPN and Zero Trust; the former connects devices to the network without restriction, while the latter requires continuous context-based verification before granting access to customers.

What is difference between ZTNA and VPN? ›

VPN provides direct tunneled access to a LAN or server, while ZTNA provides access to explicitly authorized applications and services for remote users.

Is ZTNA the same as zero trust? ›

Zero Trust Network Access (ZTNA) is the technology that enables organizations to implement a Zero Trust security model.

Do you need VPN with zero trust? ›

Properly implemented, a zero trust architecture provides much more granular and effective security than legacy security models. However, this is only true if a zero trust initiative is supported with the right tools.

What are the two approaches to implementing ZTNA? ›

There are two approaches to ZTNA implementation, endpoint initiated and service-initiated.As the name implies, in an endpoint-initiated zero trust network architecture the user initiates access to an application from an endpoint connected device, similarly to an SDP.

What does ZTNA mean Zero Trust? ›

Zero trust network access (ZTNA), also known as the software-defined perimeter (SDP), is a set of technologies and functionalities that enable secure access to internal applications for remote users.

What is the advantage of ZTNA? ›

ZTNA allows users to access applications without connecting them to the corporate network. This eliminates risk to the network while keeping infrastructure completely invisible. Managing ZTNA solutions is easy with a centralized admin portal with granular controls.

Can ZTNA replace VPN? ›

One thing to consider is that a ZTNA solution will not completely replace a VPN. ZTNA will replace VPNs for application access, which is 90% of what organizations need for remote access. However there are times that users will need network access (not application access) where they will still need to use a VPN.

What is the difference between ZTNA and network access control? ›

In the ZTNA vs. NAC race, ZTNA offers superior secure access and more advanced features. While the NAC solution trusts everyone entering the network and verifies its authenticity, ZTNA first proves and then trusts identities, making it a more robust security architecture.

Does ZTNA replace firewall? ›

ZTNA security solutions do not replace firewalls, but work with them to make them more agile.

What's more secure than a VPN? ›

Is Tor safer than a VPN? In some ways, Tor is considered safer than a VPN. Tor is great for anonymity and has a reputation for protecting people's identity online, and much of that stems from its use to access the dark web, which a VPN cannot provide. However, Tor is more difficult to use than a VPN.

What is the difference between ZTNA and SSL VPN? ›

A VPN creates a secure tunnel between two networks, while ZTNA creates secure connections between end users and endpoints at any location to remote devices or applications based on characteristics such as time, location, identity, and endpoint verification status.

How secure is ZTNA? ›

Because ZTNA limits user connections to specific applications and continually verifies user and device trust, zero trust security can better reduce risk and build security resilience than VPNs can.

Which feature or principle differentiates ZTNA from VPN knowledge check? ›

What is the difference between ZTNA and a VPN? ZTNA is a security model that extends the principles of zero-trust security to the network and enforces strict policies to access corporate resources, while traditional VPNs are more limited in remote access security.

Why zero trust network access may be a better choice than traditional VPNs? ›

It provides access to specific applications based on user identity and context, without connecting the user directly to the network. Benefits: Enhanced security, reduced attack surface, and better user experience as it grants access based on the principle of least privilege.

What is the difference between ZTNA and WAF? ›

ZTNA ensures only authorized users and devices can access applications, while WAF protects applications from malicious content within the allowed traffic. Reduced Risk: ZTNA minimizes the potential attack surface by limiting access to specific users and devices.

Top Articles
Latest Posts
Article information

Author: Mrs. Angelic Larkin

Last Updated:

Views: 5608

Rating: 4.7 / 5 (47 voted)

Reviews: 86% of readers found this page helpful

Author information

Name: Mrs. Angelic Larkin

Birthday: 1992-06-28

Address: Apt. 413 8275 Mueller Overpass, South Magnolia, IA 99527-6023

Phone: +6824704719725

Job: District Real-Estate Facilitator

Hobby: Letterboxing, Vacation, Poi, Homebrewing, Mountain biking, Slacklining, Cabaret

Introduction: My name is Mrs. Angelic Larkin, I am a cute, charming, funny, determined, inexpensive, joyous, cheerful person who loves writing and wants to share my knowledge and understanding with you.