IPsec - IKE Phase 1 | IKE Phase 2

Поделиться
HTML-код
  • Опубликовано: 20 авг 2024

Комментарии • 67

  • @carmenbonfante
    @carmenbonfante 2 года назад +8

    It was very clear and straight to the point, thank you very much!

  • @technicalshayaz9107
    @technicalshayaz9107 24 дня назад

    It was very clear and straight to the point, thank you very much!

  • @rotrose7531
    @rotrose7531 2 года назад +1

    This is a great explanation of VPN, you have made all these abstract concept so clear to us, Thanks!!

    • @GDNetworkingNewbie
      @GDNetworkingNewbie  2 года назад

      Glad it was helpful! Thank you for your encouraging comment

  • @kappi4882
    @kappi4882 2 года назад +2

    Thank you ! Iam trying to understand Ipsec with regard to cisco. You have explained it well

  • @ALEJANDROMARTINEZ-ei4yp
    @ALEJANDROMARTINEZ-ei4yp 2 года назад +3

    Great video!!! Thanks for the explanation and time you took to create the video!!

  • @navalkumarshukla9447
    @navalkumarshukla9447 2 года назад +3

    Very well explained, simple and to the point

  • @nicolas_cz
    @nicolas_cz 25 дней назад

    Very good video and explanation, thank you 👍

  • @SAMSAM-up5nd
    @SAMSAM-up5nd 2 года назад +1

    This is to the point and very well explained to the point

  • @MandyZen
    @MandyZen 3 года назад +1

    really loved the discussion on IPSec. Thanks

    • @GDNetworkingNewbie
      @GDNetworkingNewbie  3 года назад +1

      I am glad if it is bit helpful. Thanks for you encouraging comments!

  • @19holegolf
    @19holegolf 11 месяцев назад +1

    Great explanation. Thank you.

  • @ezequielalgueramercado6070
    @ezequielalgueramercado6070 6 месяцев назад +2

    Thank you!

  • @grahammccann8554
    @grahammccann8554 2 года назад +1

    Great video, thank you for.making it

  • @meghanabr5873
    @meghanabr5873 2 года назад +1

    One of the bests

  • @user-vu2co7yt4v
    @user-vu2co7yt4v Месяц назад

    Hello,
    I am looking at the basics of the network and I have a question.
    1)In phase 1 of an ipsec tunnel there is a key What does this key correspond to
    2)In phase 2 there's another key, what does it correspond to
    3) Despite my numerous internet searches, I still can't understand what IKE and ISAKMP are in simple terms
    4) why do we say that the security parameters are negotiated between the 2 peers when we define them manually?
    Thank you very much.

  • @shadowthehedgehog9190
    @shadowthehedgehog9190 2 года назад +1

    Very helpful, thank you!

  • @yaseen7749
    @yaseen7749 2 года назад +2

    Absolutely fantastic explanation, very helpful... You got a new subscirber

  • @deochandharricharan2953
    @deochandharricharan2953 Год назад +1

    Very good tutorial

  • @rupees6
    @rupees6 Месяц назад +1

    Could you share on how to check that each phase is up and running?

    • @GDNetworkingNewbie
      @GDNetworkingNewbie  Месяц назад

      to verify IKE Phase 1
      show crypto isakmp sa
      to verify IKE Phase 1
      show crypto ipsec sa
      For checking crypto session
      show crypto session

  • @felixmugire6583
    @felixmugire6583 2 года назад +1

    thank you.. you did me a solid

  • @shruthesh
    @shruthesh 2 года назад +1

    Nicely Explained
    :)

  • @hasanal-aradi5162
    @hasanal-aradi5162 2 года назад +1

    So useful brother

  • @billyg.7032
    @billyg.7032 2 года назад +1

    Thanks!

  • @innfinityraag7682
    @innfinityraag7682 2 года назад

    worth watching

  • @dhananjay3974
    @dhananjay3974 2 года назад +2

    After looking so many videos I am still not clear why there is need of two phases.
    If already secure tunnel established in phase 1 then why there is need of phase 2

    • @GDNetworkingNewbie
      @GDNetworkingNewbie  2 года назад +2

      To make exchange of information required in the second IKE phase more secure, the first phase establishes a tunnel. And that tunnel is also secured. Two layers make it more secure.

  • @sarojguru987
    @sarojguru987 2 года назад +1

    Excellent

  • @dragonrider9677
    @dragonrider9677 Год назад

    Sir, the video is great for understanding but can you please proofread, also prepare notes and read from there rather? The representation is good.
    Kindly fix this in the feature video, ESP - Encapsulating Security Payload.
    I am going for an interview and when doing a quick recap, have noticed it

    • @GDNetworkingNewbie
      @GDNetworkingNewbie  11 месяцев назад

      You are right, I missed the work Payload in my PowerPoint Slide, I am sorry for that. Thanks for your comment

  • @yourquery
    @yourquery Год назад +1

    Super

  • @dharmendras2878
    @dharmendras2878 3 года назад +1

    Thank you bro

  • @akhilveluthedathodi8743
    @akhilveluthedathodi8743 2 года назад +1

    super

  • @pedrokogawa8191
    @pedrokogawa8191 3 года назад +1

    Is there 4 keys regarding IPsec ? The Pre shared key to authenticate, key to encription, key to Gh group and key to Hmac ?

    • @GDNetworkingNewbie
      @GDNetworkingNewbie  3 года назад +1

      there is only one key - following video demonstrates site-to-site VPN in packet tracer showing configuration of the required key
      ruclips.net/video/TO4Spdmb4os/видео.html

  • @hanishhanish4861
    @hanishhanish4861 2 года назад

    Very Helpful thanks ,what is Autokey?

    • @GDNetworkingNewbie
      @GDNetworkingNewbie  2 года назад

      It seems like they are the keys being used during both of the phases of IKE
      help.fortinet.com/fos40hlp/43/wwhelp/wwhimpl/js/html/wwhelp.htm?context=fgt&topic=autokey&single=true

  • @jayujadhav9678
    @jayujadhav9678 Год назад +1

    Explained wrong...AH is not providing integrity..i suggest do not refer this video explained wrongly in multiple points.. like in phase 5messages are thr..... it's wrong

  • @mikael3576
    @mikael3576 Год назад +1

    first at all this is an amazing video about IPSEC. But can somebody explain this: On first slides is described what ipsec provides (Integrity, auth, confidentiality, key management) than what ipsec negotiating (AH,ESP,IKE). Than on on IKE Slides there is HAGLE, which is same thing as ipsec doing in two phases. IPSEC = IKE? IKE=IPSEC? IKE using IPSEC or IPSEC using IKE?

    • @GDNetworkingNewbie
      @GDNetworkingNewbie  Год назад

      Thank you for your comment and IPSec uses different protocols and IKE is one of them. IPSec is not equal to IKE

    • @mikael3576
      @mikael3576 Год назад +1

      @@GDNetworkingNewbie No, Thank you for answer! I have asked stupid question but i wish to learn it correctly by knowing details.

    • @GDNetworkingNewbie
      @GDNetworkingNewbie  Год назад

      @@mikael3576 We all are learning and thank you for your question. Its really a good question to clear the doubts.

    • @mikael3576
      @mikael3576 Год назад +1

      @@GDNetworkingNewbie you are awesome :)