O'Reilly logo

Getting Started with FortiGate by Fabrizio Volpe, Rosato Fabbri

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 3. VPNs and Tunneling

A Virtual Private Network (VPN) enables computers connected via an insecure network (for example, the Internet) to establish secure connections to work on a private network using a virtual point-to-point connection that prevents eavesdropping by external parties. VPN technologies guarantee security and privacy on the communication using various techniques of authentication and encryption. As soon as the computer or user is connected through a virtual channel, they can benefit from the additional reliability of the internal network, including network policies and security controls dedicated to the endpoints. The VPN client has a level of access to data that is usually reserved for a LAN client. VPN technologies are ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required