03.04.2013 Views

fortigate-ipsec-40-mr3

fortigate-ipsec-40-mr3

fortigate-ipsec-40-mr3

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

IPsec VPN concepts<br />

VPN tunnels<br />

FortiOS Handbook<br />

Virtual Private Network (VPN) technology enables remote users to connect to private<br />

computer networks to gain access to their resources in a secure way. For example, an<br />

employee traveling or working from home can use a VPN to securely access the office<br />

network through the Internet.<br />

Instead of remotely logging on to a private network using an unencrypted and unsecure<br />

Internet connection, the use of a VPN ensures that unauthorized parties cannot access<br />

the office network and cannot intercept any of the information that is exchanged between<br />

the employee and the office. It is also common to use a VPN to connect the private<br />

networks of two or more offices.<br />

Fortinet offers VPN capabilities in the FortiGate Unified Threat Management (UTM)<br />

appliance and in the FortiClient Endpoint Security suite of applications. A FortiGate unit<br />

can be installed on a private network, and FortiClient software can be installed on the<br />

user’s computer. It is also possible to use a FortiGate unit to connect to the private<br />

network instead of using FortiClient software.<br />

This chapter discusses VPN terms and concepts including:<br />

VPN tunnels<br />

VPN gateways<br />

Clients, servers, and peers<br />

Encryption<br />

Authentication<br />

Phase 1 and Phase 2 settings<br />

Security Association<br />

The data path between a user’s computer and a private network through a VPN is<br />

referred to as a tunnel. Like a physical tunnel, the data path is accessible only at both<br />

ends. In the telecommuting scenario, the tunnel runs between the FortiClient application<br />

on the user’s PC, or a FortiGate unit or other network device and the FortiGate unit on the<br />

office private network.<br />

Encapsulation makes this possible. IPsec packets pass from one end of the tunnel to the<br />

other and contain data packets that are exchanged between the local user and the<br />

remote private network. Encryption of the data packets ensures that any third-party who<br />

intercepts the IPsec packets can not access the data.<br />

FortiOS Handbook v3: IPsec VPNs<br />

01-434-112804-20120111 13<br />

http://docs.fortinet.com/

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!