MicroNugget: IPsec Site to Site VPN Tunnels Explained | CBT Nuggets

Поделиться
HTML-код
  • Опубликовано: 29 дек 2024

Комментарии • 161

  • @bohemians77
    @bohemians77 11 лет назад +99

    You have a remarkable gift for teaching in plain language; I have watched a few of your videos on YT and gained in understanding, even though I am not an IT novice - I sense you enjoy what you do: thanks for taking the time to assist others.

  • @BijouBakson
    @BijouBakson 5 лет назад +1

    This stuff was pure gibberish before I started studying Cisco; now it's pure gold. Thank you very much CBT Nuggets.

  • @OsvaldoMaria
    @OsvaldoMaria 4 года назад +8

    Your enthusiasm made this much easier to understand

  • @KeithBarker
    @KeithBarker 11 лет назад +14

    Hello Ashwin-
    Yes, you've got it. The outside IP header will have the source IP of the VPN gateway sending the packet, with a destination IP header of the remote VPN gateway who will be receiving the packet over the internet. When the receiving router gets the packet, it will de-encapsulate and throw away the old outside header, decrypt the contents (which include the initial IP header addresses the client was using) and continue to route the packet.
    Keith

  • @ShivamMiglani
    @ShivamMiglani 4 года назад +15

    You teach amazingly well. I can see the hard work you put into first explain the theory and then back it up with a practical example.

  • @chickenman1176
    @chickenman1176 2 года назад +1

    Thank you for not having a monotone voice!

  • @KeithBarker
    @KeithBarker 11 лет назад +2

    You are very welcome Samer!
    Best wishes,
    Keith

  • @ksbpsb
    @ksbpsb 12 лет назад +3

    great job by keith barker and one of the best trainer on the internet

  • @felipegrings9357
    @felipegrings9357 2 года назад +2

    Simple. Easy to Understand. Straight to the point. Awesome!

  • @annehipolito7305
    @annehipolito7305 3 года назад

    Thanks. Been doing site to site VPN for years now. Still is reliable for small and medium sized businesses :)

  • @guerrillafocus
    @guerrillafocus 2 года назад +1

    AH would've been good to mention as well. You do teach very well Keith!

  • @KasunMadurasinghe
    @KasunMadurasinghe 2 года назад

    This is one of the coolest explanations I've seen ..You've got talent.. Kudos

  • @AfricanAstro
    @AfricanAstro 6 лет назад +1

    This was incredible. Simple, clear, well-paced, sticks to the subject, practical use-case. Just very well done.

  • @agustinothadeus
    @agustinothadeus 6 лет назад

    The way you explain it makes it seem so easy to the point where it becomes funny!!, thank you

  • @ManishYadav0719
    @ManishYadav0719 2 года назад +1

    You Deserved 5 star ⭐ believe me

    • @TheGshit1
      @TheGshit1 4 месяца назад

      Dude is just too good.

  • @ArindamChattopadhya
    @ArindamChattopadhya 4 года назад

    Your style of explaining is second to none. 👍🙏🙏🙏

  • @Leo-uy4qv
    @Leo-uy4qv 2 года назад

    Excellent, learned something new. thanks for showing packet tracer working in the background

  • @thebluegoonie
    @thebluegoonie 3 года назад +1

    I hadn't realised how old this vid is until I saw the Windows XP Start button! Still good, though, thanks.

  • @paulykamau
    @paulykamau 5 лет назад +3

    Amazing! I'm blown away. Thank you for the intelligent explanation.

  • @MojoTojoChannel
    @MojoTojoChannel 11 лет назад

    Man you're way of teaching is just awesome.. pls keep on doing what you're doing..

  • @KeithBarker
    @KeithBarker 11 лет назад

    My pleasure! Glad you liked the video.
    Keth

  • @anastasijat.4138
    @anastasijat.4138 9 лет назад +13

    Awesome video, love your enthusiasm! :)

  • @jairusan
    @jairusan 5 лет назад

    Best of the best! Super simplified nugget, this is the best explanation of IPsec I have seen, very informative and useful. Thank you so much, Keith!

  • @pimguilherme
    @pimguilherme 4 года назад +6

    This is just so fun, thanks man!!

  • @ashishsontakke
    @ashishsontakke 3 года назад

    The VPN client installed in our home machines will do the ESP encapsulation at machine itself before it sends to our ISP ? Is that right ? In this example you said Router R1(ISP's router) is doing it.

  • @senyk1
    @senyk1 2 года назад

    Thanks for the video, what did you use to draw on the screen? Is that a pad you can hook up to a computer?

  • @AshwinRamdin
    @AshwinRamdin 11 лет назад

    Hi Keith, thank you for taking the time and answering my question. Great video!

  • @mitpatel4268
    @mitpatel4268 5 лет назад

    Hi Keith,
    I have a short question. Why do we not use SSL universally/predominantly for VPNs but use IPSec? One good reason to use SSL as opposed to IPSec is the popularity of port on which it works (443). The positive is that it's open everywhere! Am I missing something?? Maybe one similar question should be - What prevents us from using SSL instead of IPSEC protocol suite in Site-to-site tunnels?

  • @elpidiagomez3701
    @elpidiagomez3701 5 лет назад

    Thanks for the vid Mr. Barker...you take complicated topics and explain them so i can understand, keep up the great work!!

  • @proplemsolver5995
    @proplemsolver5995 11 лет назад

    شكرا للدكتور هيازع البارقي خبير امن نظم المعلومات

  • @KeithBarker
    @KeithBarker 11 лет назад

    The the crypto ACL says any-any, there are 2 challenges. The two peers will need to agree on that to bring up a tunnel, and then secondly, all traffic leaving the VPN peers would be sent to the peer on the other side. There may be some corner cases where something similar to that would work, but for general site to site VPNs it would be a configuration/design error.

  • @myretarnation
    @myretarnation 10 лет назад

    Great description and even I got. :)
    Very good voice to match the video tutorial. Thanks Keith!!

  • @semitangent
    @semitangent 3 года назад

    What I never understood is why a VPN is necessary at all - why not send a regular IP packet with encrypted payload?
    But I am getting the feeling that this is *exactly* what VPN (or rather IPsec) is doing. It always seemed to me that the encapsulation part, which was always presented as one of the two critical components of a VPN (the other being encryption), was a VPN-exclusive thing, but I guess when two PCs in their respective local networks talk to each other, encapsulation is *always* present - is that correct?

  • @ryutkin
    @ryutkin 8 лет назад +6

    You are amazing! I've never heard someone explain something so well! Brilliant!

  • @microsoftsarker
    @microsoftsarker Год назад

    This series is awesome.

  • @snehanaik4304
    @snehanaik4304 3 года назад

    thanks for this detailed explanation with the actual ping request!

  • @HongeraGideon
    @HongeraGideon 6 лет назад

    How can someone thumb down this video, fantastic explanation.

  • @erikvandervelden4566
    @erikvandervelden4566 Год назад

    Nice explanation. What i'm missing is: Who to do this? How do i create R1 and R2?
    After all, it's about. How to get this to work.

  • @tariksotalei4808
    @tariksotalei4808 3 года назад

    Brilliant video...simple and practical example ...loved it.

  • @Shake_Well_Before_Use
    @Shake_Well_Before_Use 7 месяцев назад

    Hi Keith,
    Can u help with something. I have this network that I'm working on packet tracer. I have two sites site A and B. Site A is ASN 10 and B is ASN 20. In the middle is an ISP router on the ASN 50. I use OSPF for the interior routing on my two sites and bgp has been configured successfully on all three routers and I managed to get IP connectivity from hosts on site A to B and vice versa. The thing is when I implemented the IPsec VPN tunnel, the hosts on site A can reach until the router that connects the destination hosts but never reached them. The thing is the pings from a host in A reaches all networks inside site B except the network of the destination host. Like if 192.168.1.0 / 24 is the source network in site A and 192.168.2.0 / 24 is the destination network on B, the hosts on A can reach all networks except the network on which my destination hosts live. Pls help me understand what could have gone wrong

  • @markarca6360
    @markarca6360 9 лет назад

    To check the data integrity of the packets as they are sent means they undergo tests like CRC (cyclic redundacy checking).

  • @johnson554671
    @johnson554671 5 лет назад

    Good Job Keith!

  • @GL455_
    @GL455_ 2 года назад

    Man! You mad helpful! So glad I found ya!

  • @IkramKhan-gk3wl
    @IkramKhan-gk3wl 7 лет назад

    Dear Sir, you teach very very nice "super nice" than the other

  • @SarabjitMadan
    @SarabjitMadan 8 лет назад +1

    This was so well illustrated and explained. Thanks

  • @AshwinRamdin
    @AshwinRamdin 11 лет назад

    Hi Keith,
    At around 3:05 you say the packet is going to be encapsulated. Does this mean that the Packet basically has 2 Destination and 2 Source IP adresses, from which only 1 Destination and 1 Source Address are visable when the packet is send over the Internet?

  • @kingofhavila9850
    @kingofhavila9850 3 года назад

    Your channel enlighten some dark spots i had in networking, I'd like to thank you I have my network security exam at the end of this month.
    Otherwise, would you tell me what software are you using for the facilitation of the course?

  • @abhijeetagrawal5817
    @abhijeetagrawal5817 2 года назад

    Brilliant.. Thanks a lot for simplifying it.

  • @ryanbarrera2595
    @ryanbarrera2595 6 лет назад

    Hi Keith..What tool are you using in creating your topology? and also the tool you use to capture the packet

  • @ketansanil6046
    @ketansanil6046 10 лет назад

    Great Explanation in Simple Language

  • @Jdiddy1792
    @Jdiddy1792 9 лет назад

    How were you able to capture the packets sent from machine to router? Then router to web?

  • @abhyudaychattopadhyay8632
    @abhyudaychattopadhyay8632 9 лет назад

    So.. the routing table of R1 is supposed to contain the entire range of IPs of PCs under R2, or else how does it understand which of the requests are to be encrypted and sent to R2's IP ???? (and vice versa)

  • @Rowans9
    @Rowans9 2 года назад

    Would IP sec need to be configured both ways?

  • @hosseinsabouri3121
    @hosseinsabouri3121 4 года назад

    Thanks. But how do you connect two routers with each other? Do you use Public IP addres forwarding to each Router? For Example....How can i RDP from 172.16.0.2 to 192.168.0.20 ?

  • @manjunathnarendra3854
    @manjunathnarendra3854 8 лет назад

    Thank you sir...You know exactly how to teach things..wonderful video

  • @coveysax
    @coveysax 8 лет назад +1

    Subscribed thanks to this video. You sound so happy talking about this lol. Thanks for the vid!

  • @AlexKontent
    @AlexKontent 5 лет назад

    Great tutorial man! Great work, Great examples!

  • @viclam1633
    @viclam1633 4 года назад

    Does Ipsec add latency to voip calls because it has to encrypt the message? When would I turn on or off ipsec? Any help would be appreciated.

  • @KeithBarker
    @KeithBarker 12 лет назад

    CBT Nuggets licenses access to it directly from their web site.
    Keith

  • @atlantis7896
    @atlantis7896 4 года назад

    ipsec uses 2 protocols ESP for encryption and AH for authentication . using sha1 sha2 or md5 and using aes for authentication

  • @ahmedabduljabar6269
    @ahmedabduljabar6269 10 лет назад +3

    Keith that was amazing .. many thanks :)

    • @KeithBarker
      @KeithBarker 10 лет назад +3

      Ahmed Abduljabar Thanks for the feedback! It is appreciated.
      -Keith

    • @SuperKirkb
      @SuperKirkb 10 лет назад +2

      Keith Barker
      My best instructor

  • @IQ88612
    @IQ88612 6 лет назад

    hi , thanks for your nice video but, software did you use??

  • @alokgupta6152
    @alokgupta6152 8 лет назад

    Great explanantion. Am new to networks and have a (stupid) question.
    Doesn't HTTPS communication provide this (Encryption/Security) already ?
    If so then why do we need a tunnel? why don't we just use SSL protocol for communication.

    • @andrewk3218
      @andrewk3218 8 лет назад

      +Alok Gupta If your doing it from your work pc to say VPN to your home pc as you cannot establish a connection from your pc directly that approach would work. If you are however wanting to connection two different offices together the proper way to do it is via a LAN LAN or DMVPN as it gives flexibility that is simply not available if things are being routed via a https connection

  • @AWSwithChetan
    @AWSwithChetan 2 года назад

    Great video on VPN tunnels. I was trying to setup S2S VPN in AWS and what I did not understand is role of Inside IPv4 addresses (typically 169.254.0.0/16 range). It would be great if you could help me understand what these inside IPs are, why they are used, are these actual IPs?

    • @psyedd
      @psyedd Год назад

      This is a year late but that looks to be APIPA range. Just google that and I think you'll be good to go

  • @babouras84
    @babouras84 12 лет назад

    I don't get it with the source ip adresses. The router would change the source private ip address anyway if it is ipsec or not if it goes through the internet. It also encapsulates the whole packet with HDLC or whatever protocol the router is using to connect to the ISP router. No one could ever see the private ip address even if ipsec is not used. Could you please elaborate on that one?I really don't get it

  • @MaHutchy
    @MaHutchy 8 лет назад +1

    IPSec or OpenVPN, which would you suggest in terms of security?

  • @MrGvui
    @MrGvui 10 лет назад +1

    Thanks so much, really simple and clear explanation.

  • @AliTaj5610
    @AliTaj5610 6 лет назад

    Excellent teacher!!! Thanks.

  • @YosiFeig
    @YosiFeig 11 лет назад

    Excellent. You did a great job. Simple to understand. Thanks!

  • @kricsek
    @kricsek 4 года назад

    What if both PCs had the same IP address like 192.168.1.123 before setting up the VPN? Do the subnets have to be different at each site?

  • @metalliciano
    @metalliciano 9 лет назад

    if I get the videos on your CBT Nuggets, would subtitles in my language?

  • @HAPPYSLAPS1
    @HAPPYSLAPS1 2 года назад

    Can we use black or dark mode in you videos please instead of bright white backgrounds please???

  • @gambettonsa4528
    @gambettonsa4528 4 года назад

    When PC1 pings 192.168.0.20, how does router 1 know that private IP is at site 2 rather than any other company using the same private address for a host? I mean it's on the internet right? it could go anywhere, that has me confused. Can you please explain?

  • @techtejas804
    @techtejas804 3 года назад

    Superb! Got it exact

  • @shernaj255
    @shernaj255 6 лет назад

    what ports? and IPsec uses what kind of routing paths? bgp? and how do they open sessions with eachother? sorry

  • @vaihi1
    @vaihi1 6 лет назад

    Bro I loved this video. Thank you so much haha you have a gift at teaching simply

  • @ericlaforge9445
    @ericlaforge9445 2 года назад

    Is the data bridge trottled

  • @SuuhDude-Menace
    @SuuhDude-Menace 2 года назад

    Does a vpn tunnel have to go through an isp to even be called a vpn tunnel?

  • @MrJinsilverx
    @MrJinsilverx 11 лет назад

    Hi, I just wanna ask. What will happen if I use an access-list with permit ip any any in Ipsec VPN? Will the network be able to browse the internet?

  • @rockinron5113
    @rockinron5113 3 месяца назад

    Nice one. Cheers.

  • @newkool100
    @newkool100 9 лет назад

    thanks. good one. well explained. short and to the point.

  • @brianhm7706
    @brianhm7706 9 лет назад +1

    in order to decrypt the data in the other router,
    does the other router need to install ipsec too or it will automatically decrypt it?

    • @ciscojunipergns3760
      @ciscojunipergns3760 9 лет назад +5

      both routers need to have same configuration on both sides in order to transmit traffic
      first part: IKE negotiation 1
      second part : ipsec IKE negotiation 2

    • @brianhm7706
      @brianhm7706 9 лет назад

      CISCO | JUNIPER | GNS3 okay thanks

  • @iMPRE7ed
    @iMPRE7ed 11 лет назад

    Made it so clear and easy! Great job!

  • @svmayol
    @svmayol 11 лет назад +2

    hi sir keith,
    what is the difference between ipsec and ssl vpn?
    thanks

    • @liamhatch3073
      @liamhatch3073 6 лет назад

      SSL is clientless uses a browser and does not require any network information to create a secure tunnel
      IPsec is client based and requires networking information (ip addresses) to create a tunnel

  • @sobc2737
    @sobc2737 3 года назад

    Thank you for such a great explanation.

  • @ksbpsb
    @ksbpsb 12 лет назад

    right on one can see your private ip address and what about your data
    is your data is secure on the network ipsec does it for vpn

  • @khushitshah2215
    @khushitshah2215 5 лет назад

    HOW ENCRYPTION DECRYPTION WORKS, WHERE ARE KEYS PRESENT?

  • @shai2009
    @shai2009 9 лет назад

    very professional video. thanks!

  • @MrUglyDave
    @MrUglyDave 5 лет назад

    Thank you so much, so well explained

  • @johnconnor9787
    @johnconnor9787 6 лет назад

    Great explanation! Thank you!!!

  • @ivandrofly
    @ivandrofly 10 лет назад +2

    What app you used to trace ping packages:

  • @kasperbaun
    @kasperbaun 4 года назад

    Did Alice change name to Lois?

  • @virajayachit5702
    @virajayachit5702 9 лет назад +1

    Thank you. Awesome work

    • @davidnadon6879
      @davidnadon6879 7 лет назад

      viraj ayachit 🎒😈🍯👨‍👦👚👨‍👦‍👦♥️U.K.

  • @chechobarbery
    @chechobarbery 11 лет назад +1

    Excelente !!!!!!!!!!! Congrats!!!!!!!!!!!

  • @llaease
    @llaease 8 лет назад

    How did the R2 know that the packet was destined to it? there are millions of routers on the internet which have the same ip (192.168.0.20) on their local network ?

    • @twdk01
      @twdk01 8 лет назад

      R1 "knows" the destination network is on the other side of the VPN, so it shoots the packet that way.

  • @msharee9
    @msharee9 10 лет назад

    Nice explanation. However, telling how the VPN Client in Site 1 gets a private IP Address of Site 2 after authentication happens at VPN Server would clarify things better.

    • @ClovisdeCruz
      @ClovisdeCruz 10 лет назад +1

      IP address translation is taking place at the router level and the host doesn't need an IP address from the other private network to communicate. Also, there is no "client / server" concept here.

  • @avinashshankarpalli2130
    @avinashshankarpalli2130 8 лет назад

    What happens if the customer using the same address range as ours at pc1 and pc2?I mean the private address range

    • @TehDraconas
      @TehDraconas 8 лет назад +3

      You have to NAT the traffic or change one of the subnets. Having identical ranges on both ends is a bad idea.

    • @vincentmuyo
      @vincentmuyo 8 лет назад

      There may be address conflicts if two different machines use the same IP.
      So you NAT or change the private network. If you want, you can have different subnets sharing address parts and supernet the two different private networks, like 192.168.0.0/24 and 192.168.1.0/24 being supernetted into one 192.168.0.0/16 net.

  • @zehle
    @zehle 11 лет назад +1

    This was great! :D

  • @haimbendanan
    @haimbendanan 9 лет назад

    Thank for this video!

  • @roseandmose
    @roseandmose Год назад

    What this tracer called ?