MicroNugget: IPsec Site to Site VPN Tunnels Explained | CBT Nuggets

preview_player
Показать описание

In this video, CBT Nuggets trainer Keith Barker takes a look at the concepts behind how IPsec site-to-site VPNs work. Keith uses a protocol analyzer to show you the before and after picture of a packet that's been encrypted and transmitted.

Sending packets in the wild can be dangerous. The Big Bad Internet is just waiting for you to send sensitive or important information so it can be sniffed out and exploited. So any time you send a packet out there, it's a good idea to give it some protection. IPSec lets you do that

Imagine a company with two geographically separated offices. They want full data networking between the two sites. All the servers and resources of both should be shared fully between the two.

With high-speed connectivity at both sites, the impulse might be to just send it all over the internet. But that can pose a security risk.

An IPsec VPN site-to-site tunnel can provide a number of things. First, confidentiality thanks to encryption. Also, integrity – IPsec can confirm that no bits were manipulated in transit. It can even provide authentication and anti-replay support.

See the benefits of IPsec VPN tunnels and what the packets themselves look like before and after transmission.

0:25: When you might need a VPN tunnel
1:00: The risk of using the Internet
1:45: What are IPsec’s claims to fame?
2:40: How does it do it?
3:55: Two perspectives of what the VPN looks like
5:10: Side-by-side comparison of the encrypted packet
6:40: Overview

Start learning with CBT Nuggets:

Рекомендации по теме
Комментарии
Автор

You have a remarkable gift for teaching in plain language; I have watched a few of your videos on YT and gained in understanding, even though I am not an IT novice - I sense you enjoy what you do: thanks for taking the time to assist others.

bohemians
Автор

Your enthusiasm made this much easier to understand

OsvaldoMaria
Автор

This stuff was pure gibberish before I started studying Cisco; now it's pure gold. Thank you very much CBT Nuggets.

BijouBakson
Автор

Hello Ashwin-

Yes, you've got it. The outside IP header will have the source IP of the VPN gateway sending the packet, with a destination IP header of the remote VPN gateway who will be receiving the packet over the internet. When the receiving router gets the packet, it will de-encapsulate and throw away the old outside header, decrypt the contents (which include the initial IP header addresses the client was using) and continue to route the packet.

Keith

KeithBarker
Автор

Thank you for not having a monotone voice!

chickenman
Автор

You teach amazingly well. I can see the hard work you put into first explain the theory and then back it up with a practical example.

ShivamMiglani
Автор

great job by keith barker and one of the best trainer on the internet

ksbpsb
Автор

You are very welcome Samer!

Best wishes,

Keith

KeithBarker
Автор

AH would've been good to mention as well. You do teach very well Keith!

guerrillafocus
Автор

I hadn't realised how old this vid is until I saw the Windows XP Start button! Still good, though, thanks.

thebluegoonie
Автор

Simple. Easy to Understand. Straight to the point. Awesome!

felipegrings
Автор

Thanks. Been doing site to site VPN for years now. Still is reliable for small and medium sized businesses :)

annehipolito
Автор

This is one of the coolest explanations I've seen ..You've got talent.. Kudos

KasunMadurasinghe
Автор

The way you explain it makes it seem so easy to the point where it becomes funny!!, thank you

agustinothadeus
Автор

Excellent, learned something new. thanks for showing packet tracer working in the background

Leo-uyqv
Автор

Your style of explaining is second to none. 👍🙏🙏🙏

ArindamChattopadhya
Автор

This was incredible. Simple, clear, well-paced, sticks to the subject, practical use-case. Just very well done.

AfricanAstro
Автор

Man you're way of teaching is just awesome.. pls keep on doing what you're doing..

MojoTojoChannel
Автор

My pleasure! Glad you liked the video.

Keth

KeithBarker
Автор

شكرا للدكتور هيازع البارقي خبير امن نظم المعلومات

proplemsolver