DEV Community

ZeroTrust Architect profile picture

ZeroTrust Architect

Network & Security Engineer with over 20 years of experience

Location UK Joined Joined on 

Work

Freelance Network & Security Engineer

IPsec vs TLS VPN: Protocol Mechanics, Port Behaviour, and When Each One Breaks

IPsec vs TLS VPN: Protocol Mechanics, Port Behaviour, and When Each One Breaks

Comments
3 min read

Want to connect with ZeroTrust Architect?

Create an account to connect with ZeroTrust Architect. You can also sign in below to proceed if you already have an account.

Already have an account? Sign in
TLS Handshake to Reverse Proxy: How HTTPS Works End-to-End in a Production Network

TLS Handshake to Reverse Proxy: How HTTPS Works End-to-End in a Production Network

Comments
3 min read
TLS Interception at the Gateway: Certificate Chains, SNI, and the SSL Pinning Problem

TLS Interception at the Gateway: Certificate Chains, SNI, and the SSL Pinning Problem

Comments
3 min read
How HTTPS Works: A Simple Explanation of Secure Web Communication

How HTTPS Works: A Simple Explanation of Secure Web Communication

Comments
3 min read
IPsec vs SSL VPN: What’s the Difference and Which One Should You Use?

IPsec vs SSL VPN: What’s the Difference and Which One Should You Use?

Comments
3 min read
Endian Firewall's Fork Lineage and Feature Gaps: A Technical Assessment

Endian Firewall's Fork Lineage and Feature Gaps: A Technical Assessment

Comments
2 min read
Smoothwall Express in 2026: What "No Major Release Since 2014" Means for a Security Appliance

Smoothwall Express in 2026: What "No Major Release Since 2014" Means for a Security Appliance

Comments
3 min read
Untangle's Plugin Architecture: Dependency Compatibility and the True Cost of Modular Pricing

Untangle's Plugin Architecture: Dependency Compatibility and the True Cost of Modular Pricing

Comments
2 min read
FortiGate ASIC vs Commodity Hardware: Where Dedicated Processing Matters and Where It Doesn't

FortiGate ASIC vs Commodity Hardware: Where Dedicated Processing Matters and Where It Doesn't

Comments
3 min read
OPNsense Plugin Compatibility on FreeBSD: What Breaks and Why

OPNsense Plugin Compatibility on FreeBSD: What Breaks and Why

Comments
3 min read
FreeBSD vs Linux Network Stack for Security Appliances: Kernel Differences That Matter Operationally

FreeBSD vs Linux Network Stack for Security Appliances: Kernel Differences That Matter Operationally

Comments
2 min read
Sophos XGS Feature Architecture: What Requires Proprietary Hardware and What Doesn't

Sophos XGS Feature Architecture: What Requires Proprietary Hardware and What Doesn't

Comments
2 min read
Cloud-Managed vs On-Premises Network Security: Management Plane Architecture Compared

Cloud-Managed vs On-Premises Network Security: Management Plane Architecture Compared

Comments
3 min read
ModSecurity and the OWASP Core Rule Set: How WAF Rules Actually Work

ModSecurity and the OWASP Core Rule Set: How WAF Rules Actually Work

Comments
3 min read
What a UTM Actually Does at the Packet Level (And Why Your Router's Firewall Isn't One)

What a UTM Actually Does at the Packet Level (And Why Your Router's Firewall Isn't One)

Comments
3 min read
Startup Network Security: A Practical Foundation Checklist

Startup Network Security: A Practical Foundation Checklist

Comments
3 min read
Open Source Firewall for Small Business: What You Should Actually Know

Open Source Firewall for Small Business: What You Should Actually Know

Comments
2 min read
Network Security Checklist for Startups: 10 Essential Steps

Network Security Checklist for Startups: 10 Essential Steps

Comments
3 min read
pfSense vs CacheGuard: Choosing Between Flexibility and Functionality

pfSense vs CacheGuard: Choosing Between Flexibility and Functionality

Comments 1
3 min read
Self-Hosted VPN: Benefits, Trade-Offs, and When It Makes Sense

Self-Hosted VPN: Benefits, Trade-Offs, and When It Makes Sense

Comments
2 min read
How a VPN Actually Works (Packet-Level Architecture Explained with CacheGuard)

How a VPN Actually Works (Packet-Level Architecture Explained with CacheGuard)

Comments
2 min read
🏠 I Stopped Using Commercial VPNs After Building My Own (Here’s Why)

🏠 I Stopped Using Commercial VPNs After Building My Own (Here’s Why)

Comments
2 min read
Most Small Businesses Still Don’t Have a Real Firewall (And It’s a Problem)

Most Small Businesses Still Don’t Have a Real Firewall (And It’s a Problem)

Comments
2 min read
loading...