Fortinet VPN - FortiGate Appliances Provide Enterprise-Class Protection Against Network, Content, And Application-Level Threats
A Virtual Private Network (VPN) allows organizations to securely connect multiple physical locations and users together using an untrusted public network, such as the Internet, as the primary transport medium
(prHWY.com) February 10, 2013 - Florida, FL -- Florida, Feb 11, 2013 - A Virtual Private Network (VPN) allows organizations to securely connect multiple physical locations and users together using an untrusted public network, such as the Internet, as the primary transport medium. Moreover, mobile broadband, cable, and
DSL providers have made notable increases in market penetration over the past decade, making access to high-bandwidth Internet connectivity almost ubiquitous. The increased adoption has also made these types of Internet connectivity less costly than private leased line alternatives. By combining VPN technology with common Internet access, organizations are able to extend the speed and reach of their network while also reducing costs. VPNs provide high levels of security by encrypting data in transit to prevent unauthorized access.
VPNs are generally divided into one of two high-level categories: site-to-site (also known as gateway-to-gateway) or remote access (also known as client-to-gateway or dialup). While the fundamental concept of providing an encrypted tunnel between two networked nodes remains constant in both categories, the implementation and technologies used to deliver the solution differ substantially.
Fortinet VPN solutions offer customers a broad range of options for establishing VPNs in both major categories by supporting IPsec, SSL-TLS, and L2TP VPN technologies. The Fortinet VPN solution is comprised of FortiGate® multi-threat security devices, FortiClient™ endpoint agents, and FortiManager™ centralized management. The Fortinet solution for secured connectivity integrates technologies not commonly found together into a single platform, which improves security, simplifies the IT environment, lowers total cost of ownership, and provides the most flexibility and choice when it comes to deployment options.
Site-to-Site VPNs commonly connect remote office and branch office locations back to a headquarters location. Some organizations also use site-to-site VPNs to establish limited access for trusted business partners to their private network. In both situations, a FortiGate multi-threat security device, or other supported VPN device, is deployed at each network location where VPN tunnels are to be established. FortiGate devices are then configured to establish an authenticated and encrypted tunnel, routing traffic through this virtualized tunnel between the sites and according to the defined policy.
There are varying VPN topologies for site-to-site tunnels, including hub-and-spoke, partially-meshed, and fully-meshed configurations.
- In a hub-and-spoke configuration, VPN connections radiate from a central FortiGate device (the hub) to a number of remote FortiGate devices (the spokes).
- With partially-meshed configurations, locations that commonly communicate with one another are configured to have dedicated VPN tunnels.
- Fully-meshed configurations connect all VPN peers to one another for the most
FortiGate devices support all commonly used VPN topologies. FortiManager centralized management platforms can greatly simplify the overhead associated with configuring highly redundant fully-meshed networks.
About the Author:
Modcomp is a technology company that evaluates its clients' current technologies, and creates aligned solutions for their unique environment. Modcomp offers implementation services, network design, user training, and product maintenance for all hardware and software environments through a highly trained and skilled team of technical and sales experts.
Fortinet VPN configurations are easier to setup and deploy as they communicate at the highest levels in the OSI model, independent of the underlying network architecture. Since the SSL protocol is already built into most web browsers as HTTPS, no additional endpoint configuration is typically required.
Contact Details
MODCOMP, Inc
1500 S. Powerline Rd.
Deerfield Beach, FL 33442
Phone: (800) 940-1111
###