This document discusses VPN security concerns and policy enforcement. It provides an overview of VPNs and how they allow secure tunnels for transmitting information over insecure networks. However, VPNs can be attractive targets if compromised as they provide full access to internal networks. The document outlines objectives to expose security vulnerabilities in VPNs and enforce policies to address them. It proposes researching attacks and policies through document reviews and analyzing IDS evasion techniques that hackers use when gaining VPN access.