MicroNugget: IPsec Site to Site VPN Tunnels Explained | CBT Nuggets

Поділитися
Вставка
  • Опубліковано 12 вер 2012
  • Start learning cybersecurity with CBT Nuggets. courses.cbt.gg/security
    In this video, CBT Nuggets trainer Keith Barker takes a look at the concepts behind how IPsec site-to-site VPNs work. Keith uses a protocol analyzer to show you the before and after picture of a packet that's been encrypted and transmitted.
    Sending packets in the wild can be dangerous. The Big Bad Internet is just waiting for you to send sensitive or important information so it can be sniffed out and exploited. So any time you send a packet out there, it's a good idea to give it some protection. IPSec lets you do that
    Imagine a company with two geographically separated offices. They want full data networking between the two sites. All the servers and resources of both should be shared fully between the two.
    With high-speed connectivity at both sites, the impulse might be to just send it all over the internet. But that can pose a security risk.
    An IPsec VPN site-to-site tunnel can provide a number of things. First, confidentiality thanks to encryption. Also, integrity - IPsec can confirm that no bits were manipulated in transit. It can even provide authentication and anti-replay support.
    See the benefits of IPsec VPN tunnels and what the packets themselves look like before and after transmission.
    0:25: When you might need a VPN tunnel
    1:00: The risk of using the Internet
    1:45: What are IPsec’s claims to fame?
    2:40: How does it do it?
    3:55: Two perspectives of what the VPN looks like
    5:10: Side-by-side comparison of the encrypted packet
    6:40: Overview
    🌐 Download the Free Ultimate Networking Cert Guide: blog.cbt.gg/i297
    ⬇️ 13-Week Study Plan: CCNA (200-301): blog.cbt.gg/on5i
    Start learning with CBT Nuggets:
    • Intro to Networking | courses.cbt.gg/tuv
    • MPLS Fundamentals | courses.cbt.gg/u7u

КОМЕНТАРІ • 159

  • @bohemians77
    @bohemians77 10 років тому +97

    You have a remarkable gift for teaching in plain language; I have watched a few of your videos on YT and gained in understanding, even though I am not an IT novice - I sense you enjoy what you do: thanks for taking the time to assist others.

  • @BijouBakson
    @BijouBakson 4 роки тому +1

    This stuff was pure gibberish before I started studying Cisco; now it's pure gold. Thank you very much CBT Nuggets.

  • @OsvaldoMaria
    @OsvaldoMaria 4 роки тому +7

    Your enthusiasm made this much easier to understand

  • @ShivamMiglani
    @ShivamMiglani 3 роки тому +14

    You teach amazingly well. I can see the hard work you put into first explain the theory and then back it up with a practical example.

  • @AfricanAstro
    @AfricanAstro 5 років тому +1

    This was incredible. Simple, clear, well-paced, sticks to the subject, practical use-case. Just very well done.

  • @KeithBarker
    @KeithBarker 10 років тому +11

    Hello Ashwin-
    Yes, you've got it. The outside IP header will have the source IP of the VPN gateway sending the packet, with a destination IP header of the remote VPN gateway who will be receiving the packet over the internet. When the receiving router gets the packet, it will de-encapsulate and throw away the old outside header, decrypt the contents (which include the initial IP header addresses the client was using) and continue to route the packet.
    Keith

  • @KeithBarker
    @KeithBarker 11 років тому +1

    You are very welcome Samer!
    Best wishes,
    Keith

  • @felipegrings9357
    @felipegrings9357 2 роки тому +2

    Simple. Easy to Understand. Straight to the point. Awesome!

  • @AshwinRamdin
    @AshwinRamdin 10 років тому

    Hi Keith, thank you for taking the time and answering my question. Great video!

  • @jairusan
    @jairusan 5 років тому

    Best of the best! Super simplified nugget, this is the best explanation of IPsec I have seen, very informative and useful. Thank you so much, Keith!

  • @ksbpsb
    @ksbpsb 11 років тому +3

    great job by keith barker and one of the best trainer on the internet

  • @ArindamChattopadhya
    @ArindamChattopadhya 4 роки тому

    Your style of explaining is second to none. 👍🙏🙏🙏

  • @elpidiagomez3701
    @elpidiagomez3701 5 років тому

    Thanks for the vid Mr. Barker...you take complicated topics and explain them so i can understand, keep up the great work!!

  • @anastasijat.4138
    @anastasijat.4138 9 років тому +13

    Awesome video, love your enthusiasm! :)

  • @paulykamau
    @paulykamau 5 років тому +3

    Amazing! I'm blown away. Thank you for the intelligent explanation.

  • @agustinothadeus
    @agustinothadeus 5 років тому

    The way you explain it makes it seem so easy to the point where it becomes funny!!, thank you

  • @MojoTojoChannel
    @MojoTojoChannel 11 років тому

    Man you're way of teaching is just awesome.. pls keep on doing what you're doing..

  • @pimguilherme
    @pimguilherme 4 роки тому +6

    This is just so fun, thanks man!!

  • @chickenman1176
    @chickenman1176 2 роки тому +1

    Thank you for not having a monotone voice!

  • @myretarnation
    @myretarnation 9 років тому

    Great description and even I got. :)
    Very good voice to match the video tutorial. Thanks Keith!!

  • @SarabjitMadan
    @SarabjitMadan 8 років тому +1

    This was so well illustrated and explained. Thanks

  • @KasunMadurasinghe
    @KasunMadurasinghe Рік тому

    This is one of the coolest explanations I've seen ..You've got talent.. Kudos

  • @iMPRE7ed
    @iMPRE7ed 11 років тому

    Made it so clear and easy! Great job!

  • @annehipolito7305
    @annehipolito7305 2 роки тому

    Thanks. Been doing site to site VPN for years now. Still is reliable for small and medium sized businesses :)

  • @guerrillafocus
    @guerrillafocus 2 роки тому +1

    AH would've been good to mention as well. You do teach very well Keith!

  • @MrGvui
    @MrGvui 9 років тому +1

    Thanks so much, really simple and clear explanation.

  • @Leo-uy4qv
    @Leo-uy4qv Рік тому

    Excellent, learned something new. thanks for showing packet tracer working in the background

  • @YosiFeig
    @YosiFeig 11 років тому

    Excellent. You did a great job. Simple to understand. Thanks!

  • @coveysax
    @coveysax 8 років тому +1

    Subscribed thanks to this video. You sound so happy talking about this lol. Thanks for the vid!

  • @tariksotalei4808
    @tariksotalei4808 2 роки тому

    Brilliant video...simple and practical example ...loved it.

  • @AlexKontent
    @AlexKontent 5 років тому

    Great tutorial man! Great work, Great examples!

  • @thebluegoonie
    @thebluegoonie 3 роки тому +1

    I hadn't realised how old this vid is until I saw the Windows XP Start button! Still good, though, thanks.

  • @manjunathnarendra3854
    @manjunathnarendra3854 7 років тому

    Thank you sir...You know exactly how to teach things..wonderful video

  • @microsoftsarker
    @microsoftsarker Рік тому

    This series is awesome.

  • @alitajvidi5610
    @alitajvidi5610 5 років тому

    Excellent teacher!!! Thanks.

  • @ketansanil6046
    @ketansanil6046 10 років тому

    Great Explanation in Simple Language

  • @johnconnor9787
    @johnconnor9787 5 років тому

    Great explanation! Thank you!!!

  • @Zehle325
    @Zehle325 10 років тому +1

    This was great! :D

  • @vaihi1
    @vaihi1 5 років тому

    Bro I loved this video. Thank you so much haha you have a gift at teaching simply

  • @HongeraGideon
    @HongeraGideon 5 років тому

    How can someone thumb down this video, fantastic explanation.

  • @GL455_
    @GL455_ 2 роки тому

    Man! You mad helpful! So glad I found ya!

  • @johnson554671
    @johnson554671 4 роки тому

    Good Job Keith!

  • @snehanaik4304
    @snehanaik4304 2 роки тому

    thanks for this detailed explanation with the actual ping request!

  • @MrUglyDave
    @MrUglyDave 4 роки тому

    Thank you so much, so well explained

  • @ahmedabduljabar6269
    @ahmedabduljabar6269 10 років тому +3

    Keith that was amazing .. many thanks :)

    • @KeithBarker
      @KeithBarker 10 років тому +3

      Ahmed Abduljabar Thanks for the feedback! It is appreciated.
      -Keith

    • @SuperKirkb
      @SuperKirkb 9 років тому +2

      Keith Barker
      My best instructor

  • @abhijeetagrawal5817
    @abhijeetagrawal5817 Рік тому

    Brilliant.. Thanks a lot for simplifying it.

  • @sobc2737
    @sobc2737 3 роки тому

    Thank you for such a great explanation.

  • @ryutkin
    @ryutkin 8 років тому +6

    You are amazing! I've never heard someone explain something so well! Brilliant!

  • @shai2009
    @shai2009 8 років тому

    very professional video. thanks!

  • @proplemsolver5995
    @proplemsolver5995 11 років тому

    شكرا للدكتور هيازع البارقي خبير امن نظم المعلومات

  • @haimbendanan
    @haimbendanan 8 років тому

    Thank for this video!

  • @virajayachit5702
    @virajayachit5702 9 років тому +1

    Thank you. Awesome work

    • @davidnadon6879
      @davidnadon6879 6 років тому

      viraj ayachit 🎒😈🍯👨‍👦👚👨‍👦‍👦♥️U.K.

  • @fightbackmatix
    @fightbackmatix 11 років тому

    Great video :) Thanks again!

  • @newkool100
    @newkool100 9 років тому

    thanks. good one. well explained. short and to the point.

  • @chechobarbery
    @chechobarbery 10 років тому +1

    Excelente !!!!!!!!!!! Congrats!!!!!!!!!!!

  • @techtejas804
    @techtejas804 3 роки тому

    Superb! Got it exact

  • @ryanbarrera2595
    @ryanbarrera2595 5 років тому

    Hi Keith..What tool are you using in creating your topology? and also the tool you use to capture the packet

  • @ManishYadav0719
    @ManishYadav0719 2 роки тому

    You Deserved 5 star ⭐ believe me

  • @IkramKhan-gk3wl
    @IkramKhan-gk3wl 7 років тому

    Dear Sir, you teach very very nice "super nice" than the other

  • @BJ24hk
    @BJ24hk 11 років тому

    awesome video thank u so much !

  • @nikl0618
    @nikl0618 10 років тому +2

    Awesome video, thank you so much!

  • @senyk1
    @senyk1 2 роки тому

    Thanks for the video, what did you use to draw on the screen? Is that a pad you can hook up to a computer?

  • @amankinson7384
    @amankinson7384 10 років тому

    Great Stuff!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

  • @MaHutchy
    @MaHutchy 7 років тому +1

    IPSec or OpenVPN, which would you suggest in terms of security?

  • @OnsDlaili1
    @OnsDlaili1 8 років тому

    so helpful thx !

  • @andrejss
    @andrejss 3 роки тому

    Amazing! Thank you!

    • @cbtnuggets
      @cbtnuggets  3 роки тому

      Our pleasure! Glad you were able to find value in this video! :)

  • @AshwinRamdin
    @AshwinRamdin 10 років тому

    Hi Keith,
    At around 3:05 you say the packet is going to be encapsulated. Does this mean that the Packet basically has 2 Destination and 2 Source IP adresses, from which only 1 Destination and 1 Source Address are visable when the packet is send over the Internet?

  • @jaafarali1417
    @jaafarali1417 11 років тому

    great and simplified vedio

  • @KeithBarker
    @KeithBarker 11 років тому

    My pleasure! Glad you liked the video.
    Keth

  • @happyshay1977
    @happyshay1977 4 роки тому

    Great facilitated! thanks

  • @nemanjajovic2854
    @nemanjajovic2854 8 років тому

    Very nice !

  • @RaphaelMeyer
    @RaphaelMeyer 8 років тому

    awesome dude. thx

  • @markarca6360
    @markarca6360 9 років тому

    To check the data integrity of the packets as they are sent means they undergo tests like CRC (cyclic redundacy checking).

  • @mitpatel4268
    @mitpatel4268 4 роки тому

    Hi Keith,
    I have a short question. Why do we not use SSL universally/predominantly for VPNs but use IPSec? One good reason to use SSL as opposed to IPSec is the popularity of port on which it works (443). The positive is that it's open everywhere! Am I missing something?? Maybe one similar question should be - What prevents us from using SSL instead of IPSEC protocol suite in Site-to-site tunnels?

  • @IQ88612
    @IQ88612 5 років тому

    hi , thanks for your nice video but, software did you use??

  • @Jdiddy1792
    @Jdiddy1792 9 років тому

    How were you able to capture the packets sent from machine to router? Then router to web?

  • @josecarlosglz.barron9314
    @josecarlosglz.barron9314 9 років тому

    good job!

  • @kingofhavila9850
    @kingofhavila9850 2 роки тому

    Your channel enlighten some dark spots i had in networking, I'd like to thank you I have my network security exam at the end of this month.
    Otherwise, would you tell me what software are you using for the facilitation of the course?

  • @ibarrax3872
    @ibarrax3872 6 років тому

    THANK YOU !!!!!!!!!!!!!!!!!!!!!!!

  • @ashishsontakke
    @ashishsontakke 3 роки тому

    The VPN client installed in our home machines will do the ESP encapsulation at machine itself before it sends to our ISP ? Is that right ? In this example you said Router R1(ISP's router) is doing it.

  • @metalliciano
    @metalliciano 8 років тому

    if I get the videos on your CBT Nuggets, would subtitles in my language?

  • @pablocaiza.
    @pablocaiza. 3 роки тому

    thank you

  • @KeithBarker
    @KeithBarker 10 років тому

    The the crypto ACL says any-any, there are 2 challenges. The two peers will need to agree on that to bring up a tunnel, and then secondly, all traffic leaving the VPN peers would be sent to the peer on the other side. There may be some corner cases where something similar to that would work, but for general site to site VPNs it would be a configuration/design error.

  • @kracherjon3938
    @kracherjon3938 3 роки тому

    Danke Bre

  • @AWSwithChetan
    @AWSwithChetan 2 роки тому

    Great video on VPN tunnels. I was trying to setup S2S VPN in AWS and what I did not understand is role of Inside IPv4 addresses (typically 169.254.0.0/16 range). It would be great if you could help me understand what these inside IPs are, why they are used, are these actual IPs?

    • @psyedd
      @psyedd 10 місяців тому

      This is a year late but that looks to be APIPA range. Just google that and I think you'll be good to go

  • @HylianEvil
    @HylianEvil 11 років тому

    You're awesome.

  • @issiagadiallo3684
    @issiagadiallo3684 9 років тому

    Hello CBT, This was quit a great one. Could you please share a simulated one with packet tracer or GNS3 what ever ... Please. it will be very helpfull begginers as me :D

  • @SwooshxWu
    @SwooshxWu 11 років тому

    That is awesome.

  • @poligon333
    @poligon333 11 років тому

    Thanks

  • @cesarausan
    @cesarausan 10 років тому

    Muchas Gracias! implementar una VPN.

  • @MrJinsilverx
    @MrJinsilverx 11 років тому

    Hi, I just wanna ask. What will happen if I use an access-list with permit ip any any in Ipsec VPN? Will the network be able to browse the internet?

  • @yiannisserpico2646
    @yiannisserpico2646 4 роки тому

    Hi dear teacher. As always, an amazing teaching video, and thank you! Beginning VPN self-studying, why so many companies selling VPN connections? Can't we set up VPNs from both sites using just internet connections of two routers? Thank you!

  • @alokgupta6152
    @alokgupta6152 8 років тому

    Great explanantion. Am new to networks and have a (stupid) question.
    Doesn't HTTPS communication provide this (Encryption/Security) already ?
    If so then why do we need a tunnel? why don't we just use SSL protocol for communication.

    • @andrewk3218
      @andrewk3218 8 років тому

      +Alok Gupta If your doing it from your work pc to say VPN to your home pc as you cannot establish a connection from your pc directly that approach would work. If you are however wanting to connection two different offices together the proper way to do it is via a LAN LAN or DMVPN as it gives flexibility that is simply not available if things are being routed via a https connection

  • @erikvandervelden4566
    @erikvandervelden4566 Рік тому

    Nice explanation. What i'm missing is: Who to do this? How do i create R1 and R2?
    After all, it's about. How to get this to work.

  • @svmayol
    @svmayol 10 років тому +2

    hi sir keith,
    what is the difference between ipsec and ssl vpn?
    thanks

    • @liamhatch3073
      @liamhatch3073 6 років тому

      SSL is clientless uses a browser and does not require any network information to create a secure tunnel
      IPsec is client based and requires networking information (ip addresses) to create a tunnel

  • @MARINADELY777
    @MARINADELY777 11 років тому

    thanks

  • @abhyudaychattopadhyay8632
    @abhyudaychattopadhyay8632 8 років тому

    So.. the routing table of R1 is supposed to contain the entire range of IPs of PCs under R2, or else how does it understand which of the requests are to be encrypted and sent to R2's IP ???? (and vice versa)

  • @shernaj255
    @shernaj255 6 років тому

    what ports? and IPsec uses what kind of routing paths? bgp? and how do they open sessions with eachother? sorry

  • @hosseinsabouri3121
    @hosseinsabouri3121 4 роки тому

    Thanks. But how do you connect two routers with each other? Do you use Public IP addres forwarding to each Router? For Example....How can i RDP from 172.16.0.2 to 192.168.0.20 ?

  • @Shake_Well_Before_Use
    @Shake_Well_Before_Use Місяць тому

    Hi Keith,
    Can u help with something. I have this network that I'm working on packet tracer. I have two sites site A and B. Site A is ASN 10 and B is ASN 20. In the middle is an ISP router on the ASN 50. I use OSPF for the interior routing on my two sites and bgp has been configured successfully on all three routers and I managed to get IP connectivity from hosts on site A to B and vice versa. The thing is when I implemented the IPsec VPN tunnel, the hosts on site A can reach until the router that connects the destination hosts but never reached them. The thing is the pings from a host in A reaches all networks inside site B except the network of the destination host. Like if 192.168.1.0 / 24 is the source network in site A and 192.168.2.0 / 24 is the destination network on B, the hosts on A can reach all networks except the network on which my destination hosts live. Pls help me understand what could have gone wrong