Allow only Virtual Private Network (VPN) connections for end points

The end points should not be able to connect in a less than secure way, i.e. without strong authentication and/or without real-time encryption of communication.

A VPN allows users to have permanent and transparent encryption.