{"id":8197,"date":"2020-05-06T23:50:52","date_gmt":"2020-05-07T02:50:52","guid":{"rendered":"https:\/\/forti1.com\/?p=8197"},"modified":"2025-02-12T19:48:21","modified_gmt":"2025-02-12T19:48:21","slug":"acesso-remoto-seguro","status":"publish","type":"post","link":"https:\/\/forti1.com\/en\/secure-remote-access\/","title":{"rendered":"Secure Remote Access"},"content":{"rendered":"<p>There are several methods for implementing secure remote access, but three of the most common are:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>VPN (Virtual Private Network): A VPN is a virtual private network that uses the Internet's public infrastructure to provide secure remote access. A VPN allows remote devices to connect to a private network using encryption to protect communication and guarantee data security.<\/li>\n\n\n\n<li>SSH (Secure Shell): SSH is an encrypted network protocol that allows one computer to connect to another in a secure and authenticated way. SSH is widely used for remote access to servers and network devices, allowing users to remotely connect to and manage servers and devices using an encrypted connection.<\/li>\n\n\n\n<li><a href=\"https:\/\/www.cloudflare.com\/learning\/ssl\/why-use-tls-1.3\/\" target=\"_blank\" rel=\"noreferrer noopener\">TLS<\/a> (Transport Layer Security): TLS is a security protocol that provides secure communications on the Internet. TLS is used to protect web connections, such as e-commerce sites and online banking services, by ensuring that communication between the user and the server is encrypted and authenticated. TLS is widely used in many applications and services to provide communications security.<\/li>\n<\/ol>\n\n\n\n<p>Organizations are subject to a number of potentially emergency situations, such as disease, floods, hurricanes and power outages. It is crucial that business continuity plans are established in order to ensure that the organization's operations can be maintained in the face of adversity and be prepared to deal with possible disasters.<\/p>\n\n\n\n<p>Understand the importance of secure remote access to maintain the business continuity plan.<\/p>\n\n\n\n<div class=\"wp-block-rank-math-toc-block\" id=\"rank-math-toc\"><h2>Summary<\/h2><nav><div><div><a href=\"#suporte-ao-trabalho-remoto\">Remote Work Support<\/a><\/div><div><a href=\"#trabalho-remoto-seguro\">Secure remote working<\/a><\/div><div><a href=\"#security-fabric-fortinet\">Security Fabric Fortinet<\/a><\/div><div><a href=\"#outros-recursos\">Other resources <\/a><\/div><div><a href=\"#casos-de-uso-trabalho-remoto\">Use Cases - Remote Work<\/a><div><div><a href=\"#conquiste-total-integracao-de-seguranca-com-as-solucoes-forti-one-it-amp-a-class-rank-math-link-href-https-forti-1-com-fortinet-target-blank-rel-noreferrer-noopener-aria-label-fortinet-opens-in-a-new-tab-fortinet-a\">Achieve total security integration with Forti One IT &amp; Fortinet solutions.<\/a><\/div><\/div><\/div><\/div><\/nav><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"suporte-ao-trabalho-remoto\">Remote Work Support<\/h2>\n\n\n\n<p>Firstly, the ability to support remote working is essential to ensure business continuity and security with remote working.<\/p>\n\n\n\n<p>In this sense, next-generation firewalls from <a href=\"https:\/\/forti1.com\/en\/como-ativar-e-registrar-o-fortigate\/\" target=\"_blank\" rel=\"noreferrer noopener\">FortiGate<\/a> (NGFWs) have built-in support for virtual private networks (<a href=\"https:\/\/forti1.com\/en\/configure-vpn-ssl-in-fortigate\/\" target=\"_blank\" rel=\"noreferrer noopener\">VPNs<\/a>) IPsec, in order to allow remote employees a connection of <a href=\"https:\/\/forti1.com\/en\/the-5-requirements-for-sd-wan-safe\/\" target=\"_blank\" rel=\"noreferrer noopener\">secure remote access<\/a>Connection to the company network.<\/p>\n\n\n\n<p>With the protection of <strong><a class=\"rank-math-link\" title=\"Why do you need an endpoint?\" href=\"https:\/\/forti1.com\/en\/why-do-you-need-the-endpoint-security\/\" target=\"_blank\" rel=\"noopener\" aria-label=\" (opens in a new tab)\" data-schema-attribute=\"\">endpoint<\/a><\/strong>provided by <a class=\"rank-math-link\" href=\"https:\/\/forti1.com\/en\/fortinet\/forticlient-endpoint\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"FortiClient (opens in a new tab)\">FortiClient<\/a>With FortiAuthenticator, organizations can not only securely support remote work, but also maintain business continuity.<\/p>\n\n\n\n<p>The ability to offer secure remote working support is an essential component of any organization's business continuity plan, especially disaster recovery.<\/p>\n\n\n\n<p>In addition, the <a class=\"rank-math-link\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/forti1.com\/en\/fortinet\/fortigate\/\" target=\"_blank\" rel=\"noreferrer noopener\">NGFW from FortiGate<\/a> have <strong>integrated support for IPsec VPNs<\/strong>The aim is to provide a <a href=\"https:\/\/forti1.com\/en\/ssl-vpn-melhores-praticas-7-dicas-para-seguranca\/\" target=\"_blank\" rel=\"noreferrer noopener\">secure connection<\/a> for employees working in alternative workplaces.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"trabalho-remoto-seguro\">Secure remote working<\/h2>\n\n\n\n<p>Secure remote working with NGFWs FortiGate and FortiClient Endpoint<\/p>\n\n\n\n<p>Primarily, IPsec and <a href=\"https:\/\/forti1.com\/en\/configure-vpn-ssl-in-fortigate\/\" data-type=\"post\" data-id=\"10933\">SSL<\/a> VPNs integrated into all <a href=\"https:\/\/forti1.com\/en\/melhores-praticas-fortigate-1\/\" data-type=\"post\" data-id=\"7194\">FortiGate<\/a> NGFW, offer a <strong>flexible deployment<\/strong>. In other words, remote users can take advantage of an experience without determining the client, as well as gaining access to additional resources through a robust Endpoint integrated into the security solution of the <a title=\"endpoint Fortinet\" href=\"https:\/\/forti1.com\/en\/fortinet\/forticlient-endpoint\/\" target=\"_blank\" rel=\"noopener\" data-schema-attribute=\"\">FortiClient endpoint<\/a>.<\/p>\n\n\n\n<p>Above all, Fortinet solutions have been designed to be easy to use from the initial purchase to the end of life. In addition, the <a class=\"rank-math-link\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/forti1.com\/en\/fortinet\/fortigate\/\" target=\"_blank\" rel=\"noreferrer noopener\">FortiGate NGFW<\/a> and the Access Point <a href=\"https:\/\/forti1.com\/en\/7-infallible-tips-to-configure-fortiap\/\" data-type=\"post\" data-id=\"6357\">FortiAP<\/a> include \"zero touch\" deployment functionality.<\/p>\n\n\n\n<p>As a result, devices deployed in remote locations can be pre-configured before shipment, thus enabling automatic on-site installation, which guarantees business continuity and home office support.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"security-fabric-fortinet\">Security Fabric Fortinet<\/h2>\n\n\n\n<p>Surprisingly, with the <a class=\"rank-math-link\" href=\"https:\/\/forti1.com\/en\/fortinet\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Fortinet (opens in a new tab)\">Fortinet<\/a> Security Fabric, all of an organization's devices, including those deployed remotely to support remote working, can be monitored and managed from a single dashboard.<\/p>\n\n\n\n<p>What's more, with a <a href=\"https:\/\/forti1.com\/en\/como-ativar-e-registrar-o-fortigate\/\">FortiGate<\/a> NGFW or FortiManager centralized management and deployed at a company's headquarters, the TI team can obtain <strong>visibility<\/strong> total of all connected devices, regardless of the deployment situation.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe title=\"Fortinet Security Fabric Secures Digital Innovation | Cybersecurity Platform\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/x8US5w7D5Mc?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p>Certainly in the event of a natural disaster or other event that interrupts business operations, an organization must be able to quickly transition to a fully remote workforce. In this regard, Table 1 shows the number of simultaneous VPN users that each model of the <a href=\"https:\/\/forti1.com\/en\/melhores-praticas-fortigate-1\/\" data-type=\"post\" data-id=\"7194\">FortiGate<\/a> NGFW can support.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"outros-recursos\">Other resources <\/h2>\n\n\n\n<p>Other Features for Secure Remote Access<\/p>\n\n\n\n<p>Firstly, in addition to offering encryption of data in transit via a VPN, the solutions <a class=\"rank-math-link\" href=\"https:\/\/forti1.com\/en\/fortinet\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Fortinet<\/a> offer several other features that can help your organization protect remote work. These features include:<\/p>\n\n\n\n<figure class=\"wp-block-table is-style-stripes\"><table class=\"has-fixed-layout\"><tbody><tr><td>Model<\/td><td>Simultaneous SSL VPN users<\/td><td>Simultaneous IPsec VPN users<\/td><td>Managed FortiAPs (Tunnel mode)<\/td><\/tr><tr><td><a href=\"https:\/\/forti1.com\/en\/fortinet\/fortigate\/100e\/\" data-type=\"page\" data-id=\"6041\">100E<\/a><\/td><td>500<\/td><td>10,000<\/td><td>32<\/td><\/tr><tr><td>100F<\/td><td>500<\/td><td>16,000<\/td><td>64<\/td><\/tr><tr><td>300E<\/td><td>5,000<\/td><td>50,000<\/td><td>256<\/td><\/tr><tr><td>500E<\/td><td>10,000<\/td><td>50,000<\/td><td>256<\/td><\/tr><tr><td>600E<\/td><td>10,000<\/td><td>50,000<\/td><td>512<\/td><\/tr><tr><td>1100E<\/td><td>10,000<\/td><td>100,000<\/td><td>2,048<\/td><\/tr><tr><td>2000E<\/td><td>30,000<\/td><td>100,000<\/td><td>2,048<\/td><\/tr><tr><td>All Larger Models*<\/td><td>30,000<\/td><td>100,000<\/td><td>2,048<\/td><\/tr><tr><td>*3300E supports 1,024 Tunnel Mode APs<\/td><\/tr><\/tbody><\/table><figcaption class=\"wp-element-caption\">Table 1: Number of simultaneous VPN connections supported by the various <a class=\"rank-math-link\" href=\"https:\/\/forti1.com\/en\/fortinet\/fortigate\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">FortiGate<\/a> NGFWs.<\/figcaption><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"casos-de-uso-trabalho-remoto\">Use Cases - Remote Work<\/h2>\n\n\n\n<p>Firstly, we know that not every employee in an organization requires the same level of access to company resources when working remotely.<\/p>\n\n\n\n<p>In this sense <a class=\"rank-math-link\" href=\"https:\/\/forti1.com\/en\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Forti One IT (opens in a new tab)\">Forti One IT<\/a> together with Fortinet, is able to provide customized home office solutions for all remote workers:<\/p>\n\n\n\n<p>At the same time, basic remote workers can connect to the organization using <a href=\"https:\/\/forti1.com\/en\/fortinet\/forticlient-endpoint\/\" data-type=\"page\" data-id=\"5766\">FortiClient<\/a> integrated into <a href=\"https:\/\/forti1.com\/en\/configure-vpn-ssl-in-fortigate\/\" data-type=\"post\" data-id=\"10933\">VPN<\/a> and verify your identity with FortiToken for multi-factor authentication.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1098\" height=\"588\" src=\"https:\/\/forti1.com\/wp-content\/uploads\/2020\/05\/implementacao-fortinet-trabalho-remoto.jpg\" alt=\"Trabalho e acesso remoto com Fortinet\" class=\"wp-image-8213\" title=\"\" srcset=\"https:\/\/forti1.com\/wp-content\/uploads\/2020\/05\/implementacao-fortinet-trabalho-remoto.jpg 1098w, https:\/\/forti1.com\/wp-content\/uploads\/2020\/05\/implementacao-fortinet-trabalho-remoto-300x161.jpg 300w, https:\/\/forti1.com\/wp-content\/uploads\/2020\/05\/implementacao-fortinet-trabalho-remoto-1024x548.jpg 1024w, https:\/\/forti1.com\/wp-content\/uploads\/2020\/05\/implementacao-fortinet-trabalho-remoto-768x411.jpg 768w\" sizes=\"(max-width: 1098px) 100vw, 1098px\" \/><figcaption class=\"wp-element-caption\">Figure 1: Example Fortinet Implementation for Remote Working<\/figcaption><\/figure>\n\n\n\n<p>This can not only include the ability to operate in several parallel TI environments, but also the inclusion of system administrator employees, TI support technicians and emergency teams.<\/p>\n\n\n\n<div class=\"inherit-container-width wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\">\n<figure class=\"wp-block-image alignfull size-full\"><img decoding=\"async\" width=\"1072\" height=\"568\" src=\"https:\/\/forti1.com\/wp-content\/uploads\/2020\/05\/Implementacao-Fortinet-acesso-remoto-avancado.jpg\" alt=\"\" class=\"wp-image-8226\" title=\"\" srcset=\"https:\/\/forti1.com\/wp-content\/uploads\/2020\/05\/Implementacao-Fortinet-acesso-remoto-avancado.jpg 1072w, https:\/\/forti1.com\/wp-content\/uploads\/2020\/05\/Implementacao-Fortinet-acesso-remoto-avancado-300x159.jpg 300w, https:\/\/forti1.com\/wp-content\/uploads\/2020\/05\/Implementacao-Fortinet-acesso-remoto-avancado-1024x543.jpg 1024w, https:\/\/forti1.com\/wp-content\/uploads\/2020\/05\/Implementacao-Fortinet-acesso-remoto-avancado-768x407.jpg 768w\" sizes=\"(max-width: 1072px) 100vw, 1072px\" \/><figcaption class=\"wp-element-caption\">Figure 2: Fortinet implementation for Advanced User Remote Access.<\/figcaption><\/figure>\n<\/div>\n\n\n\n<p>In short, for these users the deployment of an access point <a href=\"https:\/\/forti1.com\/en\/7-infallible-tips-to-configure-fortiap\/\" target=\"_blank\" data-type=\"post\" data-id=\"6357\" rel=\"noreferrer noopener\">FortiAP<\/a> in the alternative workplace, provides the level of access and security they require. As a result, it provides secure wireless connectivity as well as a secure tunnel to the corporate network.<\/p>\n\n\n\n<p>Just to illustrate, the <a class=\"rank-math-link\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/forti1.com\/en\/fortinet\/fortiap\/\" target=\"_blank\" rel=\"noreferrer noopener\">FortiAPs<\/a> can be deployed with ZTP (zero-touch provisioning) and will be managed by the FortiGate NGFWs in the office. For example, if a t<strong>corporate phone<\/strong> need to be deployed, it can simply be connected to FortiAP for connectivity back to the main office.<\/p>\n\n\n\n<h3 class=\"has-text-align-center wp-block-heading\" id=\"conquiste-total-integracao-de-seguranca-com-as-solucoes-forti-one-it-amp-a-class-rank-math-link-href-https-forti-1-com-fortinet-target-blank-rel-noreferrer-noopener-aria-label-fortinet-opens-in-a-new-tab-fortinet-a\">Achieve total security integration with Forti One IT &amp; <a class=\"rank-math-link\" href=\"https:\/\/forti1.com\/en\/fortinet\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Fortinet (opens in a new tab)\">Fortinet<\/a>.<\/h3>","protected":false},"excerpt":{"rendered":"<p>Protect your company with secure remote access through efficient solutions from Forti One. Ensure the privacy of your data and the security of your network with our VPN, SSH and TLS technologies. Find out more on our website!<\/p>","protected":false},"author":4,"featured_media":5701,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":null,"ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":null,"ast-hfb-below-header-display":null,"ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":null,"ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":null,"stick-header-meta":null,"header-above-stick-meta":null,"header-main-stick-meta":null,"header-below-stick-meta":null,"astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[2417],"tags":[1751,17,16,2352,1027,1703,637,2353,2041,1767,1753],"class_list":["post-8197","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-acesso-remoto","tag-forticlient","tag-fortinet","tag-privacidade-de-dados","tag-sd-wan","tag-secure-sd-wan","tag-seguranca-cibernetica","tag-seguranca-de-rede","tag-ssl-vpn","tag-trabalho-remoto","tag-vpn"],"_links":{"self":[{"href":"https:\/\/forti1.com\/en\/wp-json\/wp\/v2\/posts\/8197","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forti1.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forti1.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forti1.com\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/forti1.com\/en\/wp-json\/wp\/v2\/comments?post=8197"}],"version-history":[{"count":0,"href":"https:\/\/forti1.com\/en\/wp-json\/wp\/v2\/posts\/8197\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forti1.com\/en\/wp-json\/wp\/v2\/media\/5701"}],"wp:attachment":[{"href":"https:\/\/forti1.com\/en\/wp-json\/wp\/v2\/media?parent=8197"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forti1.com\/en\/wp-json\/wp\/v2\/categories?post=8197"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forti1.com\/en\/wp-json\/wp\/v2\/tags?post=8197"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}