NAT Traversal IPSec | NAT traversal | Network address translation in English | The Confused Engineer

Поделиться
HTML-код
  • Опубликовано: 6 сен 2024
  • NAT Traversal IPSec | NAT traversal | Network address translation in Hindi
    Your Queries:
    Network address translation
    Network address translation in Hindi
    NAT
    ipsec
    ipsec vpn
    ipsec tunnel
    ipsec interview questions and answers
    ipsec vpn in hindi
    pat translation
    hindi
    English
    network engineer
    IT
    software
    server
    router
    switch
    firewall
    cloud
    datacentre
    ssl
    tls
    tcp
    network
    engineer
    http
    https
    server
    client
    network security
    ccna
    ccnp
    ccie
    cisco
    zscaler
    juniper
    security
    online
    training
    education
    certificate
    network down
    troubleshoot
    latency
    wireshark
    packet capture
    pcap
    capture
    ccna lecture
    free training
    network chuck
    the confused engineer
    network admin
    osi
    osi model
    tcp/ip
    tcp ip
    model
    packet tracer
    lab
    new ccna
    free ccna
    ccna training

Комментарии • 11

  • @techlearner4806
    @techlearner4806 6 месяцев назад +2

    Very well explained. Wireshark captures are must in these kind of explanations. Appreciate your efforts 👍

  • @geekmuralin
    @geekmuralin 2 месяца назад +1

    Wow

  • @someitguy9611
    @someitguy9611 7 месяцев назад +1

    Great video!!! thank you my friend. but just to be in the same page, this ISAKMP pcap you show here is for main mode/ agressive (IKEv1) but how I find this info on a pcap on IKEv2 ?

    • @the-confused-engineer
      @the-confused-engineer  6 месяцев назад

      Hi Friend, I am glad you liked the video and I apologise for the delay in responding. I usually respond within 24 hours, but this time got delayed. Extremely sorry for this.
      Regarding your query, please view the answer below :
      In order to view NAT Traversal traffic in the IKEv2 pcap, you can use below options:
      in the pcap, expand "IKE_SA_INIT" and check for NAT_DETECTION_SOURCE_IP and NAT_DETECTION_DESTINATION_IP. The NAT_DETECTION_SOURCE/DESTINATION_IP notifications included in the IKE_SA_INIT exchange indicate the peer's NAT-T capability and allow detecting which peer, if any, is behind a NAT device. If a NAT situation is detected, the client switches to UDP port 4500 to send the IKE_AUTH request (only if it used port 500 initially, see below regarding custom ports) and UDP encapsulation will be activated for IPsec SAs.
      to filter , use :
      udp.srcport == 4500 (only traffic originating from source/client ) OR
      udp.port =4500 ( to see both sides traffic )
      When you are able to view this traffic, then since ESP is encapsulated inside UDP, you won't be able to decrypt it, so in order to see further details, you need to decode it first.
      to decode, select the packet you want to decode and click decode as and select "udpencap" , since it is udp encapsulated. Then only you will be able to view detailed ESP payloads inside that UDP packet.
      Please do let me know if you need any further info.

  • @alexandruchiriac7212
    @alexandruchiriac7212 3 месяца назад +1

    number 1

  • @vivekkumar-jz8zb
    @vivekkumar-jz8zb 7 месяцев назад +1

    Very informative.. but what happens when this UDP 4500 is received on the destination and what happens if this UDP 4500 is changed by the pat device is missing ..

    • @the-confused-engineer
      @the-confused-engineer  7 месяцев назад

      Thank you buddy ☺️

    • @the-confused-engineer
      @the-confused-engineer  7 месяцев назад

      Your first question is already answered in the video, but second one is not clear, "what happens if this UDP 4500 is changed by the pat device is missing" please elaborate