When connecting using FortiClient, the FortiGate unit authenticates the FortiClient SSL VPN request based on the user group options. FortiClient uses local port TCP 1024 to initiate an SSL encrypted connection to the FortiGate unit, on port TCP 443.
Remote users can use the FortiClient software to initiate an SSL VPN tunnel to connect to the internal network. The next time you start the virtual desktop, the encrypted data is removed. If the session terminates abnormally (power loss, system failure, etc.), the data left behind is encrypted and unusable to the user. When the virtual desktop application exits normally, all the data written to the disk is removed. The browser file/directory operation is redirected to a new location, and the data is encrypted before it is written to the local disk. The user starts the web browser from within the virtual desktop and connects to the SSL VPN web portal. When the application starts, it presents a ‘virtual desktop’ to the user. The virtual desktop application creates a virtual desktop on a user’s PC and monitors the data read/write activity of the web browser running inside the virtual desktop.The remote user must use the standalone tunnel client application. See the Release Notes for your FortiOS firmware for the specific operating system versions that are supported.
If the client computer runs Linux or Mac OS X, the user needs to download the tunnel mode client application from the Fortinet Support web site.
If the client computer runs Microsoft Windows, they can download the tunnel mode client from the web portal.
FortiClient simplifies remote user experience with built-in auto-connect and always-up VPN features. Secure Remote AccessįortiClient uses SSL and IPSec VPN to provide secure, reliable access to corporate networks and applications from virtually any internet-connected remote location.
Yes, FortiClient is safe to install on Windows 10.