FortiOS 5.4 Online Help Link FortiOS 5.2 Online Help Link FortiOS 5.0 Online Help Link FortiOS 4.3 Online Help Link

Home > Online Help

> Chapter 20 - Parallel Path Processing - Life of a Packet > Example 3 Dialup IPsec VPN with Application Control

Dialup IPsec VPN with Application control example

This example includes these steps:

  1. FortiGate unit receives IPsec encrypted packet from the Internet.
  2. Packet intercepted by FortiGate unit interface.
  3. DoS sensor checks to ensure the sender is valid and not attempting a denial of service attack.
  4. IP integrity header checking. If the packet is OK it continues, otherwise it is dropped.
  5. IPsec
  • Packet matches IPsec phase 1
  • Packet is unencrypted
  1. Interface policy
  2. Destination NAT
  3. Next hop route
  4. Stateful Inspection
  • Session Tracking
  1. Flow-based inspection
  • IPS
  • Application Control
  1. Source NAT
  2. Routing
  3. Interface transmission to network
  4. Packet forwarded to internal server
Response from server
  1. Server sends response packet
  2. Packet intercepted by FortiGate unit interface
  3. DoS sensor checks to ensure the sender is valid and not attempting a denial of service attack.
  4. IP integrity header checking. If the packet is OK it continues, otherwise it is dropped.
  5. Destination NAT
  1. Flow-based inspection
  • IPS
  • Application Control
  1. Stateful Inspection
  • Session Tracking
  1. IPsec
  • Packet is encrypted
  1. Routing
  2. Interface transmission to network
  3. Encrypted Packet returns to internet