FortiGate-50A Installation and Configuration Guide Version 2.50
FortiGate-50A Installation and Configuration Guide
179
IPSec VPN
A Virtual Private Network (VPN) is an extension of a private network that
encompasses links across shared or public networks such as the Internet. For
example, a company that has two offices in different cities, each with its own private
network, can use a VPN to create a secure tunnel between the offices. Similarly, a
teleworker can use a VPN client for remote access to a private office network. In both
cases, the secure connection appears to the user as a private network
communication, even though the communication is over a public network.
Secure VPN connections are enabled by a combination of tunneling, data encryption,
and authentication. Tunneling encapsulates data so that it can be transferred over the
public network. Instead of being sent in its original format, the data frames are
encapsulated within an additional header and then routed between tunnel endpoints.
Upon arrival at the destination endpoint, the data is decapsulated and forwarded to its
destination within the private network.
Encryption changes a data stream from clear text (something that a human or a
program can interpret) to cipher text (something that cannot be interpreted). The
information is encrypted and decrypted using mathematical algorithms known as
keys.
Authentication provides a means to verify the origin of a packet and the integrity of its
contents. Authentication is done using checksums calculated with keyed hash
function algorithms.
This chapter provides an overview about how to configure FortiGate IPSec VPN. For
a complete description of FortiGate VPN, see the
FortiGate VPN Guide
.
•
Key management
•
Manual key IPSec VPNs
•
AutoIKE IPSec VPNs
•
Managing digital certificates
•
Configuring encrypt policies
•
IPSec VPN concentrators
•
Monitoring and Troubleshooting VPNs
Содержание FortiGate 50A
Страница 12: ...Contents 12 Fortinet Inc ...
Страница 32: ...32 Fortinet Inc Next steps Getting started ...
Страница 40: ...40 Fortinet Inc Completing the configuration NAT Route mode installation ...
Страница 72: ...72 Fortinet Inc Session list System status ...
Страница 112: ...112 Fortinet Inc Configuring the modem interface Network configuration ...
Страница 120: ...120 Fortinet Inc Adding RIP filters RIP configuration ...
Страница 170: ...170 Fortinet Inc Content profiles Firewall configuration ...
Страница 224: ...224 Fortinet Inc Logging attacks Network Intrusion Detection System NIDS ...
Страница 230: ...230 Fortinet Inc Viewing the virus list Antivirus protection ...
Страница 244: ...244 Fortinet Inc Exempt URL list Web filtering ...
Страница 262: ...262 Fortinet Inc Glossary ...
Страница 272: ...272 Fortinet Inc Index ...