Hello, I am looking at the basics of the network and I have a question. 1)In phase 1 of an ipsec tunnel there is a key What does this key correspond to 2)In phase 2 there's another key, what does it correspond to 3) Despite my numerous internet searches, I still can't understand what IKE and ISAKMP are in simple terms 4) why do we say that the security parameters are negotiated between the 2 peers when we define them manually? Thank you very much.
After looking so many videos I am still not clear why there is need of two phases. If already secure tunnel established in phase 1 then why there is need of phase 2
To make exchange of information required in the second IKE phase more secure, the first phase establishes a tunnel. And that tunnel is also secured. Two layers make it more secure.
Sir, the video is great for understanding but can you please proofread, also prepare notes and read from there rather? The representation is good. Kindly fix this in the feature video, ESP - Encapsulating Security Payload. I am going for an interview and when doing a quick recap, have noticed it
there is only one key - following video demonstrates site-to-site VPN in packet tracer showing configuration of the required key ruclips.net/video/TO4Spdmb4os/видео.html
It seems like they are the keys being used during both of the phases of IKE help.fortinet.com/fos40hlp/43/wwhelp/wwhimpl/js/html/wwhelp.htm?context=fgt&topic=autokey&single=true
Explained wrong...AH is not providing integrity..i suggest do not refer this video explained wrongly in multiple points.. like in phase 5messages are thr..... it's wrong
first at all this is an amazing video about IPSEC. But can somebody explain this: On first slides is described what ipsec provides (Integrity, auth, confidentiality, key management) than what ipsec negotiating (AH,ESP,IKE). Than on on IKE Slides there is HAGLE, which is same thing as ipsec doing in two phases. IPSEC = IKE? IKE=IPSEC? IKE using IPSEC or IPSEC using IKE?
It was very clear and straight to the point, thank you very much!
Thank you Carmen for your words
It was very clear and straight to the point, thank you very much!
This is a great explanation of VPN, you have made all these abstract concept so clear to us, Thanks!!
Glad it was helpful! Thank you for your encouraging comment
Thank you ! Iam trying to understand Ipsec with regard to cisco. You have explained it well
Glad it was helpful!
Great video!!! Thanks for the explanation and time you took to create the video!!
Glad you enjoyed it!
Very well explained, simple and to the point
Glad you liked it
Very good video and explanation, thank you 👍
This is to the point and very well explained to the point
Thanks for your comments SAM SAM
really loved the discussion on IPSec. Thanks
I am glad if it is bit helpful. Thanks for you encouraging comments!
Great explanation. Thank you.
Glad it was helpful!
Thank you!
Glad 🙏
Great video, thank you for.making it
Glad you enjoyed it!
One of the bests
Thanks for your comments
Hello,
I am looking at the basics of the network and I have a question.
1)In phase 1 of an ipsec tunnel there is a key What does this key correspond to
2)In phase 2 there's another key, what does it correspond to
3) Despite my numerous internet searches, I still can't understand what IKE and ISAKMP are in simple terms
4) why do we say that the security parameters are negotiated between the 2 peers when we define them manually?
Thank you very much.
Very helpful, thank you!
Glad it was helpful!
Absolutely fantastic explanation, very helpful... You got a new subscirber
Awesome, thank you!
Very good tutorial
Thank you! Cheers!
Could you share on how to check that each phase is up and running?
to verify IKE Phase 1
show crypto isakmp sa
to verify IKE Phase 1
show crypto ipsec sa
For checking crypto session
show crypto session
thank you.. you did me a solid
Glad to hear it!
Nicely Explained
:)
Glad you think so!
So useful brother
Thank you brother for liking it🙏
Thanks!
Welcome!
worth watching
Glad you like them! Thank you
After looking so many videos I am still not clear why there is need of two phases.
If already secure tunnel established in phase 1 then why there is need of phase 2
To make exchange of information required in the second IKE phase more secure, the first phase establishes a tunnel. And that tunnel is also secured. Two layers make it more secure.
Excellent
Thank you! Cheers!
Sir, the video is great for understanding but can you please proofread, also prepare notes and read from there rather? The representation is good.
Kindly fix this in the feature video, ESP - Encapsulating Security Payload.
I am going for an interview and when doing a quick recap, have noticed it
You are right, I missed the work Payload in my PowerPoint Slide, I am sorry for that. Thanks for your comment
Super
Thanks
Thank you bro
Glad it was helpful
super
Thank you akhil
Is there 4 keys regarding IPsec ? The Pre shared key to authenticate, key to encription, key to Gh group and key to Hmac ?
there is only one key - following video demonstrates site-to-site VPN in packet tracer showing configuration of the required key
ruclips.net/video/TO4Spdmb4os/видео.html
Very Helpful thanks ,what is Autokey?
It seems like they are the keys being used during both of the phases of IKE
help.fortinet.com/fos40hlp/43/wwhelp/wwhimpl/js/html/wwhelp.htm?context=fgt&topic=autokey&single=true
Explained wrong...AH is not providing integrity..i suggest do not refer this video explained wrongly in multiple points.. like in phase 5messages are thr..... it's wrong
Thank you for taking your time to comment on this video bro
first at all this is an amazing video about IPSEC. But can somebody explain this: On first slides is described what ipsec provides (Integrity, auth, confidentiality, key management) than what ipsec negotiating (AH,ESP,IKE). Than on on IKE Slides there is HAGLE, which is same thing as ipsec doing in two phases. IPSEC = IKE? IKE=IPSEC? IKE using IPSEC or IPSEC using IKE?
Thank you for your comment and IPSec uses different protocols and IKE is one of them. IPSec is not equal to IKE
@@GDNetworkingNewbie No, Thank you for answer! I have asked stupid question but i wish to learn it correctly by knowing details.
@@mikael3576 We all are learning and thank you for your question. Its really a good question to clear the doubts.
@@GDNetworkingNewbie you are awesome :)