IPsec VPN
Virtual Private Network (VPN) technology lets remote users connect to private computer networks to gain access to their resources in a secure way. For example, an employee traveling or working at home can use a VPN to securely access the office network through the internet.
Instead of remotely logging into a private network using an unencrypted and unsecured internet connection, using a VPN ensures that unauthorized parties cannot access the office network and cannot intercept information going between the employee and the office. Another common use of a VPN is to connect the private networks of multiple offices.
IPsec VPN uses the Internet Protocol Security (IPsec) protocol to create encrypted tunnels on the internet. The IPsec protocol operates at the network layer of the OS model and runs on top of the IP protocol, which routes packets. All transmitted data is protected by the IPsec tunnel.
The following sections provide instructions on configuring IPsec VPN connections in FortiOS 7.0.16.