MicroNugget: IPsec Site to Site VPN Tunnels Explained | CBT Nuggets

Sdílet
Vložit
  • čas přidán 12. 09. 2012
  • Start learning cybersecurity with CBT Nuggets. courses.cbt.gg/security
    In this video, CBT Nuggets trainer Keith Barker takes a look at the concepts behind how IPsec site-to-site VPNs work. Keith uses a protocol analyzer to show you the before and after picture of a packet that's been encrypted and transmitted.
    Sending packets in the wild can be dangerous. The Big Bad Internet is just waiting for you to send sensitive or important information so it can be sniffed out and exploited. So any time you send a packet out there, it's a good idea to give it some protection. IPSec lets you do that
    Imagine a company with two geographically separated offices. They want full data networking between the two sites. All the servers and resources of both should be shared fully between the two.
    With high-speed connectivity at both sites, the impulse might be to just send it all over the internet. But that can pose a security risk.
    An IPsec VPN site-to-site tunnel can provide a number of things. First, confidentiality thanks to encryption. Also, integrity - IPsec can confirm that no bits were manipulated in transit. It can even provide authentication and anti-replay support.
    See the benefits of IPsec VPN tunnels and what the packets themselves look like before and after transmission.
    0:25: When you might need a VPN tunnel
    1:00: The risk of using the Internet
    1:45: What are IPsec’s claims to fame?
    2:40: How does it do it?
    3:55: Two perspectives of what the VPN looks like
    5:10: Side-by-side comparison of the encrypted packet
    6:40: Overview
    🌐 Download the Free Ultimate Networking Cert Guide: blog.cbt.gg/i297
    ⬇️ 13-Week Study Plan: CCNA (200-301): blog.cbt.gg/on5i
    Start learning with CBT Nuggets:
    • Intro to Networking | courses.cbt.gg/tuv
    • MPLS Fundamentals | courses.cbt.gg/u7u

Komentáře • 159

  • @bohemians77
    @bohemians77 Před 10 lety +97

    You have a remarkable gift for teaching in plain language; I have watched a few of your videos on YT and gained in understanding, even though I am not an IT novice - I sense you enjoy what you do: thanks for taking the time to assist others.

  • @ShivamMiglani
    @ShivamMiglani Před 4 lety +14

    You teach amazingly well. I can see the hard work you put into first explain the theory and then back it up with a practical example.

  • @AfricanAstro
    @AfricanAstro Před 5 lety +1

    This was incredible. Simple, clear, well-paced, sticks to the subject, practical use-case. Just very well done.

  • @jairusan
    @jairusan Před 5 lety

    Best of the best! Super simplified nugget, this is the best explanation of IPsec I have seen, very informative and useful. Thank you so much, Keith!

  • @BijouBakson
    @BijouBakson Před 4 lety +1

    This stuff was pure gibberish before I started studying Cisco; now it's pure gold. Thank you very much CBT Nuggets.

  • @OsvaldoMaria
    @OsvaldoMaria Před 4 lety +7

    Your enthusiasm made this much easier to understand

  • @elpidiagomez3701
    @elpidiagomez3701 Před 5 lety

    Thanks for the vid Mr. Barker...you take complicated topics and explain them so i can understand, keep up the great work!!

  • @AshwinRamdin
    @AshwinRamdin Před 11 lety

    Hi Keith, thank you for taking the time and answering my question. Great video!

  • @felipegrings9357
    @felipegrings9357 Před 2 lety +2

    Simple. Easy to Understand. Straight to the point. Awesome!

  • @KeithBarker
    @KeithBarker Před 11 lety +11

    Hello Ashwin-
    Yes, you've got it. The outside IP header will have the source IP of the VPN gateway sending the packet, with a destination IP header of the remote VPN gateway who will be receiving the packet over the internet. When the receiving router gets the packet, it will de-encapsulate and throw away the old outside header, decrypt the contents (which include the initial IP header addresses the client was using) and continue to route the packet.
    Keith

  • @myretarnation
    @myretarnation Před 9 lety

    Great description and even I got. :)
    Very good voice to match the video tutorial. Thanks Keith!!

  • @paulykamau
    @paulykamau Před 5 lety +3

    Amazing! I'm blown away. Thank you for the intelligent explanation.

  • @agustinothadeus
    @agustinothadeus Před 5 lety

    The way you explain it makes it seem so easy to the point where it becomes funny!!, thank you

  • @ArindamChattopadhya
    @ArindamChattopadhya Před 4 lety

    Your style of explaining is second to none. 👍🙏🙏🙏

  • @anastasijat.4138
    @anastasijat.4138 Před 9 lety +13

    Awesome video, love your enthusiasm! :)

  • @MojoTojoChannel
    @MojoTojoChannel Před 11 lety

    Man you're way of teaching is just awesome.. pls keep on doing what you're doing..

  • @coveysax
    @coveysax Před 8 lety +1

    Subscribed thanks to this video. You sound so happy talking about this lol. Thanks for the vid!

  • @SarabjitMadan
    @SarabjitMadan Před 8 lety +1

    This was so well illustrated and explained. Thanks

  • @KeithBarker
    @KeithBarker Před 11 lety +1

    You are very welcome Samer!
    Best wishes,
    Keith

  • @ksbpsb
    @ksbpsb Před 12 lety +3

    great job by keith barker and one of the best trainer on the internet

  • @KasunMadurasinghe
    @KasunMadurasinghe Před rokem

    This is one of the coolest explanations I've seen ..You've got talent.. Kudos

  • @Leo-uy4qv
    @Leo-uy4qv Před 2 lety

    Excellent, learned something new. thanks for showing packet tracer working in the background

  • @pimguilherme
    @pimguilherme Před 4 lety +6

    This is just so fun, thanks man!!

  • @annehipolito7305
    @annehipolito7305 Před 2 lety

    Thanks. Been doing site to site VPN for years now. Still is reliable for small and medium sized businesses :)

  • @MrGvui
    @MrGvui Před 9 lety +1

    Thanks so much, really simple and clear explanation.

  • @iMPRE7ed
    @iMPRE7ed Před 11 lety

    Made it so clear and easy! Great job!

  • @guerrillafocus
    @guerrillafocus Před 2 lety +1

    AH would've been good to mention as well. You do teach very well Keith!

  • @manjunathnarendra3854
    @manjunathnarendra3854 Před 7 lety

    Thank you sir...You know exactly how to teach things..wonderful video

  • @YosiFeig
    @YosiFeig Před 11 lety

    Excellent. You did a great job. Simple to understand. Thanks!

  • @vaihi1
    @vaihi1 Před 5 lety

    Bro I loved this video. Thank you so much haha you have a gift at teaching simply

  • @AlexKontent
    @AlexKontent Před 5 lety

    Great tutorial man! Great work, Great examples!

  • @tariksotalei4808
    @tariksotalei4808 Před 2 lety

    Brilliant video...simple and practical example ...loved it.

  • @HongeraGideon
    @HongeraGideon Před 5 lety

    How can someone thumb down this video, fantastic explanation.

  • @microsoftsarker
    @microsoftsarker Před rokem

    This series is awesome.

  • @thebluegoonie
    @thebluegoonie Před 3 lety +1

    I hadn't realised how old this vid is until I saw the Windows XP Start button! Still good, though, thanks.

  • @proplemsolver5995
    @proplemsolver5995 Před 11 lety

    شكرا للدكتور هيازع البارقي خبير امن نظم المعلومات

  • @johnconnor9787
    @johnconnor9787 Před 5 lety

    Great explanation! Thank you!!!

  • @snehanaik4304
    @snehanaik4304 Před 2 lety

    thanks for this detailed explanation with the actual ping request!

  • @sobc2737
    @sobc2737 Před 3 lety

    Thank you for such a great explanation.

  • @ketansanil6046
    @ketansanil6046 Před 10 lety

    Great Explanation in Simple Language

  • @MrUglyDave
    @MrUglyDave Před 4 lety

    Thank you so much, so well explained

  • @alitajvidi5610
    @alitajvidi5610 Před 5 lety

    Excellent teacher!!! Thanks.

  • @Zehle325
    @Zehle325 Před 10 lety +1

    This was great! :D

  • @haimbendanan
    @haimbendanan Před 8 lety

    Thank for this video!

  • @ahmedabduljabar6269
    @ahmedabduljabar6269 Před 10 lety +3

    Keith that was amazing .. many thanks :)

    • @KeithBarker
      @KeithBarker Před 10 lety +3

      Ahmed Abduljabar Thanks for the feedback! It is appreciated.
      -Keith

    • @SuperKirkb
      @SuperKirkb Před 9 lety +2

      Keith Barker
      My best instructor

  • @shai2009
    @shai2009 Před 9 lety

    very professional video. thanks!

  • @ryutkin
    @ryutkin Před 8 lety +6

    You are amazing! I've never heard someone explain something so well! Brilliant!

  • @fightbackmatix
    @fightbackmatix Před 11 lety

    Great video :) Thanks again!

  • @chechobarbery
    @chechobarbery Před 10 lety +1

    Excelente !!!!!!!!!!! Congrats!!!!!!!!!!!

  • @johnson554671
    @johnson554671 Před 4 lety

    Good Job Keith!

  • @newkool100
    @newkool100 Před 9 lety

    thanks. good one. well explained. short and to the point.

  • @GL455_
    @GL455_ Před 2 lety

    Man! You mad helpful! So glad I found ya!

  • @virajayachit5702
    @virajayachit5702 Před 9 lety +1

    Thank you. Awesome work

    • @davidnadon6879
      @davidnadon6879 Před 6 lety

      viraj ayachit 🎒😈🍯👨‍👦👚👨‍👦‍👦♥️U.K.

  • @abhijeetagrawal5817
    @abhijeetagrawal5817 Před 2 lety

    Brilliant.. Thanks a lot for simplifying it.

  • @chickenman1176
    @chickenman1176 Před 2 lety +1

    Thank you for not having a monotone voice!

  • @IkramKhan-gk3wl
    @IkramKhan-gk3wl Před 7 lety

    Dear Sir, you teach very very nice "super nice" than the other

  • @BJ24hk
    @BJ24hk Před 11 lety

    awesome video thank u so much !

  • @techtejas804
    @techtejas804 Před 3 lety

    Superb! Got it exact

  • @markarca6360
    @markarca6360 Před 9 lety

    To check the data integrity of the packets as they are sent means they undergo tests like CRC (cyclic redundacy checking).

  • @OnsDlaili1
    @OnsDlaili1 Před 9 lety

    so helpful thx !

  • @amankinson7384
    @amankinson7384 Před 10 lety

    Great Stuff!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

  • @nikl0618
    @nikl0618 Před 10 lety +2

    Awesome video, thank you so much!

  • @ryanbarrera2595
    @ryanbarrera2595 Před 5 lety

    Hi Keith..What tool are you using in creating your topology? and also the tool you use to capture the packet

  • @issiagadiallo3684
    @issiagadiallo3684 Před 9 lety

    Hello CBT, This was quit a great one. Could you please share a simulated one with packet tracer or GNS3 what ever ... Please. it will be very helpfull begginers as me :D

  • @kingofhavila9850
    @kingofhavila9850 Před 2 lety

    Your channel enlighten some dark spots i had in networking, I'd like to thank you I have my network security exam at the end of this month.
    Otherwise, would you tell me what software are you using for the facilitation of the course?

  • @RaphaelMeyer
    @RaphaelMeyer Před 8 lety

    awesome dude. thx

  • @jaafarali1417
    @jaafarali1417 Před 11 lety

    great and simplified vedio

  • @josecarlosglz.barron9314

    good job!

  • @ibarrax3872
    @ibarrax3872 Před 6 lety

    THANK YOU !!!!!!!!!!!!!!!!!!!!!!!

  • @nemanjajovic2854
    @nemanjajovic2854 Před 8 lety

    Very nice !

  • @erikvandervelden4566
    @erikvandervelden4566 Před rokem

    Nice explanation. What i'm missing is: Who to do this? How do i create R1 and R2?
    After all, it's about. How to get this to work.

  • @andrejss
    @andrejss Před 3 lety

    Amazing! Thank you!

    • @cbtnuggets
      @cbtnuggets  Před 3 lety

      Our pleasure! Glad you were able to find value in this video! :)

  • @happyshay1977
    @happyshay1977 Před 4 lety

    Great facilitated! thanks

  • @senyk1
    @senyk1 Před 2 lety

    Thanks for the video, what did you use to draw on the screen? Is that a pad you can hook up to a computer?

  • @ashishsontakke
    @ashishsontakke Před 3 lety

    The VPN client installed in our home machines will do the ESP encapsulation at machine itself before it sends to our ISP ? Is that right ? In this example you said Router R1(ISP's router) is doing it.

  • @MaHutchy
    @MaHutchy Před 7 lety +1

    IPSec or OpenVPN, which would you suggest in terms of security?

  • @mitpatel4268
    @mitpatel4268 Před 4 lety

    Hi Keith,
    I have a short question. Why do we not use SSL universally/predominantly for VPNs but use IPSec? One good reason to use SSL as opposed to IPSec is the popularity of port on which it works (443). The positive is that it's open everywhere! Am I missing something?? Maybe one similar question should be - What prevents us from using SSL instead of IPSEC protocol suite in Site-to-site tunnels?

  • @KeithBarker
    @KeithBarker Před 11 lety

    The the crypto ACL says any-any, there are 2 challenges. The two peers will need to agree on that to bring up a tunnel, and then secondly, all traffic leaving the VPN peers would be sent to the peer on the other side. There may be some corner cases where something similar to that would work, but for general site to site VPNs it would be a configuration/design error.

  • @Jdiddy1792
    @Jdiddy1792 Před 9 lety

    How were you able to capture the packets sent from machine to router? Then router to web?

  • @HylianEvil
    @HylianEvil Před 11 lety

    You're awesome.

  • @snsathishbe
    @snsathishbe Před 9 lety

    thank you

  • @AshwinRamdin
    @AshwinRamdin Před 11 lety

    Hi Keith,
    At around 3:05 you say the packet is going to be encapsulated. Does this mean that the Packet basically has 2 Destination and 2 Source IP adresses, from which only 1 Destination and 1 Source Address are visable when the packet is send over the Internet?

  • @ManishYadav0719
    @ManishYadav0719 Před 2 lety

    You Deserved 5 star ⭐ believe me

  • @SwooshxWu
    @SwooshxWu Před 11 lety

    That is awesome.

  • @kracherjon3938
    @kracherjon3938 Před 3 lety

    Danke Bre

  • @IQ88612
    @IQ88612 Před 5 lety

    hi , thanks for your nice video but, software did you use??

  • @MARINADELY777
    @MARINADELY777 Před 11 lety

    thanks

  • @AWSwithChetan
    @AWSwithChetan Před 2 lety

    Great video on VPN tunnels. I was trying to setup S2S VPN in AWS and what I did not understand is role of Inside IPv4 addresses (typically 169.254.0.0/16 range). It would be great if you could help me understand what these inside IPs are, why they are used, are these actual IPs?

    • @psyedd
      @psyedd Před 11 měsíci

      This is a year late but that looks to be APIPA range. Just google that and I think you'll be good to go

  • @cesarausan
    @cesarausan Před 10 lety

    Muchas Gracias! implementar una VPN.

  • @MrJinsilverx
    @MrJinsilverx Před 11 lety

    Hi, I just wanna ask. What will happen if I use an access-list with permit ip any any in Ipsec VPN? Will the network be able to browse the internet?

  • @poligon333
    @poligon333 Před 11 lety

    Thanks

  • @metalliciano
    @metalliciano Před 8 lety

    if I get the videos on your CBT Nuggets, would subtitles in my language?

  • @viclam1633
    @viclam1633 Před 3 lety

    Does Ipsec add latency to voip calls because it has to encrypt the message? When would I turn on or off ipsec? Any help would be appreciated.

  • @semitangent
    @semitangent Před 3 lety

    What I never understood is why a VPN is necessary at all - why not send a regular IP packet with encrypted payload?
    But I am getting the feeling that this is *exactly* what VPN (or rather IPsec) is doing. It always seemed to me that the encapsulation part, which was always presented as one of the two critical components of a VPN (the other being encryption), was a VPN-exclusive thing, but I guess when two PCs in their respective local networks talk to each other, encapsulation is *always* present - is that correct?

  • @KeithBarker
    @KeithBarker Před 11 lety

    My pleasure! Glad you liked the video.
    Keth

  • @hosseinsabouri3121
    @hosseinsabouri3121 Před 4 lety

    Thanks. But how do you connect two routers with each other? Do you use Public IP addres forwarding to each Router? For Example....How can i RDP from 172.16.0.2 to 192.168.0.20 ?

  • @yiannisserpico2646
    @yiannisserpico2646 Před 4 lety

    Hi dear teacher. As always, an amazing teaching video, and thank you! Beginning VPN self-studying, why so many companies selling VPN connections? Can't we set up VPNs from both sites using just internet connections of two routers? Thank you!

  • @abhyudaychattopadhyay8632

    So.. the routing table of R1 is supposed to contain the entire range of IPs of PCs under R2, or else how does it understand which of the requests are to be encrypted and sent to R2's IP ???? (and vice versa)

  • @Shake_Well_Before_Use
    @Shake_Well_Before_Use Před 2 měsíci

    Hi Keith,
    Can u help with something. I have this network that I'm working on packet tracer. I have two sites site A and B. Site A is ASN 10 and B is ASN 20. In the middle is an ISP router on the ASN 50. I use OSPF for the interior routing on my two sites and bgp has been configured successfully on all three routers and I managed to get IP connectivity from hosts on site A to B and vice versa. The thing is when I implemented the IPsec VPN tunnel, the hosts on site A can reach until the router that connects the destination hosts but never reached them. The thing is the pings from a host in A reaches all networks inside site B except the network of the destination host. Like if 192.168.1.0 / 24 is the source network in site A and 192.168.2.0 / 24 is the destination network on B, the hosts on A can reach all networks except the network on which my destination hosts live. Pls help me understand what could have gone wrong

  • @atlantis7896
    @atlantis7896 Před 4 lety

    ipsec uses 2 protocols ESP for encryption and AH for authentication . using sha1 sha2 or md5 and using aes for authentication