I’m sure my approach to VPN design, configuration and assessment is different than others. If you have a different approach, or see something that I missed, I welcome your comments in the Security ...