O'Reilly logo

Getting Started with FortiGate by Fabrizio Volpe, Rosato Fabbri

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

FortiGate IPsec VPN

In the section where we introduced the SSL VPN, we said that looking at the TCP/IP protocol stack, usually the delivery protocol is located on a higher level than the payload protocol. This statement is not valid for the next type of VPN, which will be discussed. An IPsec VPN secures each IP (Internet Protocol) packet with authentication and encryption. IPsec uses two different protocols: AH and ESP, to provide authentication, integrity, and confidentiality of the communication. Basic operations related to IPsec include:

  • Transport mode: Only the payload of the IP datagram is handled by IPsec, which inserts the header between the IP header and the upper levels.
  • Tunnel mode: This is used to protect the entire IP datagram. This ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required