Can you explain what a "Network Tunnel" does❓ | Time to Level Up now.

Sdílet
Vložit
  • čas přidán 30. 09. 2020
  • Network tunnels are critical today, including overlay and Software Defined Networking (SDN). Learn the basic concepts of tunneling in this short video, as part of the VPN playlist.
    Free CZcams Playlists from Keith:
    ▶ Master Playlist for Cisco CCNA 200-301 ogit.online/sloth
    💻 Cisco CCNA 200-301 IPv4 Subnetting ogit.online/subnet
    💬 Join our Discord server (free) ogit.online/Join_OGIT_on_Discord
    🏪 Keith Barker Amazon Affiliate Store www.amazon.com/shop/keithbarker
    And…
    🏫 Keith’s Content at CBT Nuggets ogit.online/Keith-CBT
    #KeithBarker #CCNA #200-301

Komentáře • 99

  • @Crimson_Thief007
    @Crimson_Thief007 Před 2 lety +13

    I'm a computer science student and this video helped me understand tunneling so much better thank you. Reading out of a textbook is rarely the best approach to learning something!

  • @skwidfingaz
    @skwidfingaz Před měsícem +1

    This is SUCH a great demonstration of tunnelling for a student to understand tunnelling. Thank you.

  • @knight024
    @knight024 Před 3 lety +41

    One of my favorite quotes:
    "If you can't explain it simply, you don't understand it well enough." -Albert Einstein
    Keith is an amazing teacher

  • @TorresVr1
    @TorresVr1 Před 3 lety +2

    I logged in to my account just to give this video a like - enough said. Explaining concepts so clearly is something few people can do - thanks!

  • @gangstaberry2496
    @gangstaberry2496 Před 10 dny

    Excellent example... Just noticed CCNA is tagged, thank you so much

  • @nehajain1502
    @nehajain1502 Před 2 lety +1

    I love the way you explain. Thank you for the video.

  • @zacay5717
    @zacay5717 Před 3 lety +4

    Keith, I passed my ccna on Tuesday. Your channel played a big part. Thank you for the great content. I will be signing up with cbt nuggets for ENCOR.

    • @KeithBarker
      @KeithBarker  Před 3 lety +2

      Great job! So happy for you, congratulations!!!

  • @-cryptopacket0985
    @-cryptopacket0985 Před 3 lety +2

    Configuring GRE and IPSec is very fun. That was my favorite section when I was studying for the CCNA. That and FHRP's. Thank you Keith for all of your hard work!

  • @thewhistlehasbeenblown
    @thewhistlehasbeenblown Před 8 měsíci

    Forgive my unprofessional language for a moment here, but I have to say it... you are just so fucking good, Keith.
    I've been reading and watching videos trying to wrap my head around tunneling for about an hour now, then I found your video and 8mins later, I'm crystal clear about what's actually happening when we discuss tunneling.
    It's no longer this abstract concept in my mind, but instead is clearly defined now.
    Thank you, Keith.
    You are truly amazing man.

  • @edgarvalenzuela3604
    @edgarvalenzuela3604 Před 7 měsíci

    The cups was perfect to help visualize, thanks

  • @O2C69
    @O2C69 Před 3 lety +2

    Inner Tunnel & Outer Tunnel
    Phase 1 --> Phase 2
    Great teacher as always - Lots of Love 💝

  • @zelekewbake7652
    @zelekewbake7652 Před 7 měsíci

    Thank you Keith

  • @Mohammadjulfikar7187
    @Mohammadjulfikar7187 Před 3 lety

    Keith is always outstanding with his content. Thank you for this informative nugget.

    • @KeithBarker
      @KeithBarker  Před 3 lety

      Happy to do it, thanks for the feedback Mohammad Julfikar.

  • @barryhampton6270
    @barryhampton6270 Před 2 lety +1

    Awesome video! i really appreciate the analogies, thank you so so much!

  • @joshuat6124
    @joshuat6124 Před 9 měsíci

    Great explanation with no skipping of details, well done.

  • @Vexterian
    @Vexterian Před 8 měsíci

    I finally understand what a tunnel is.

  • @vimalkrishna3375
    @vimalkrishna3375 Před 3 lety

    Best explanation i have ever seen..............

  • @aljaygonzalo3553
    @aljaygonzalo3553 Před 3 lety

    Nice and simple explanation. Hoping to see more of this. :)

  • @ahmadomidahmadi3569
    @ahmadomidahmadi3569 Před 3 lety

    Thanks a lot Mr. Keith for simplifying it in best possible way, learning a lot from you everyday.
    Hopefully I'll be in States by the end of 2021😊.
    - Lots of love from Afghanistan ❤

    • @KeithBarker
      @KeithBarker  Před 3 lety

      Thank you Omid Ahmadi!
      All the best to you and your family.

  • @dew-me8yp
    @dew-me8yp Před rokem

    Great explanation…thank you

  • @morganscott5588
    @morganscott5588 Před 3 lety +2

    That's funny, I work with a number of different Optical Carrier Networks, one of them is an OC-12 Transport called Jungle-mux, unrelated to tunneling, but made me chuckle :)

  • @nvv21
    @nvv21 Před 3 lety +9

    OMG!!!! THIS IS THE MOST SIMPLIEST PROFESSOR EXPLANATION IVE EVER SEEN...USING STACK CUPS WOW!!!...KUDOS! Keith

  • @EA-fb7ug
    @EA-fb7ug Před 2 lety

    Thanks so much

  • @faisalak7
    @faisalak7 Před rokem

    Brilliant as always thanks

  • @RameshKumar-yk4kl
    @RameshKumar-yk4kl Před 10 měsíci

    Awesome explanation

  • @InfoSecPat
    @InfoSecPat Před 3 lety

    You are the best Keith. Thanks for this.

    • @KeithBarker
      @KeithBarker  Před 3 lety +1

      Thank you InfoSec Pat! Always great to see your name pop up! Hope you are well.

    • @InfoSecPat
      @InfoSecPat Před 3 lety

      Keith Barker you’re welcome. Thanks, it’s always great seeing videos. All well and I hope the same with you.

  • @anshulsoni653
    @anshulsoni653 Před rokem

    what a video, thankyou Keith !!

  • @mohammadahmedragab837
    @mohammadahmedragab837 Před 8 měsíci

    thank you so much for your clear explanation. please how you were able to see the original(insider) packect? Is it because the GRE protocol is not encrypted by default?

  • @user-yu4og4cp6o
    @user-yu4og4cp6o Před 5 měsíci

    That is what needed. Although I am not fluent in English, I've got you straight. Thanks a lot

  • @Techlanda
    @Techlanda Před 3 lety

    Thank You 💕 Keith for Good content

    • @KeithBarker
      @KeithBarker  Před 3 lety +1

      Happy to do it, thanks for the feedback Ranjitkumar.

  • @rajnishpsinha4683
    @rajnishpsinha4683 Před rokem

    Tunneling well explained!

  • @libaaxalee
    @libaaxalee Před 3 lety +2

    Thank you Keith, you simplified the best way possible. More visualization please whenever you can, as it helps a lot. :)

  • @ProfQED
    @ProfQED Před 2 lety

    thanks keith

  • @JayJay-ki4mi
    @JayJay-ki4mi Před 2 lety

    So this is why unpacking my Amazon deliveries is like Matryoshka dolls.

  • @sohailanjum6337
    @sohailanjum6337 Před rokem

    Nice explanation carry on for better future

  • @MrMilesfinn
    @MrMilesfinn Před rokem

    By t=30s, I recognized that Keith is a supurb teacher.

  • @shk9269
    @shk9269 Před 2 lety

    6:51
    Today I learned how they made the "low battery" sound on my Samsung

  • @wally19
    @wally19 Před 3 lety

    i had discovered VPN tunneling trying to solve an extremly slow connection to Office 365 servers using our company VPN thanks to the "route add" command for every ip range (using a script) but i have no idea how to do the same for IPv6 on Windows 10

  • @69k_gold
    @69k_gold Před měsícem

    So basically, VPN client software creates a virtual router inside my PC and turns it into the default gateway to access the internet, so any packets have to first go through that.
    Then this virtual router which uses the same network card but has a different private IP, wraps these IP packets in a TCP segment and sends with its IP address and TCP port, to the VPN server it knows and trusts, then this server removes this padding and forwards the IP packet with its own IP and port to the internet

  • @menash8313
    @menash8313 Před 3 lety

    this cleared up things a bit. you just throw the packet out and say "hey, i need it to get to that destination. i dont care how, figure it out" and let the internet infasctructure do it for you, instead of planning it our ahead of time with a routing protocol.

  • @kimjames8328
    @kimjames8328 Před 12 dny

    Can i also say it's like someone walking to their destination where they could be kidnapped, robbed, or murdered. But then you buy that person a vehicle so that they can arrive at their destination safely?

  • @internettelevision1832

    Good imagery on encapsulation, I always thought of it as nesting dolls lol

  • @shaikhadil8157
    @shaikhadil8157 Před 3 lety

    Nice quote on t-shirt

  • @utkarshmishra1928
    @utkarshmishra1928 Před 5 měsíci

    Very nice explanation Keith. I just have a question - How does router 1 know what destination address to put? As in, does it contain some mapping of what local subnet is behind what router? Also, as an extension to this question, if router had formed multiple GRE tunnels with many other routers, then would it have to maintain this mapping for all remote routers. If so, where does it keep this mapping? If not, how does it know which local subnet is behind which router? Thanks a lot!

    • @KeithBarker
      @KeithBarker  Před 4 měsíci

      Thank you for the question @utkarshmishra1928.
      Depending on the vendor, and the type of VPN (remote access vs site to site) there are many options including:
      On the VPN client, using selective routing regarding which destination IP addresses/subnets should be sent through the tunnel.
      For site to site, statically configuring the networks reachable between the two sites
      For site to site, dynamically sharing routing via a routing protocol to identify which network are reachable via the tunnel
      ( and there are more options as well).
      Hope that helps a bit, from a high-level perspective.

  • @PowerUsr1
    @PowerUsr1 Před 3 lety

    I love your shirt. Where did you get it?

    • @KeithBarker
      @KeithBarker  Před 3 lety

      Thank you for the question Michael. It is a song from this group www.thesingerandthesongwriter.com/home
      Had the chance to see them perform a house concert in Vegas last year, and that is where I got the shirt.

  • @Warbots983
    @Warbots983 Před 3 lety

    Hello kieth thanks for the videos as always,
    I have request can you make roadmap how to master network security in 1 year or less?

    • @KeithBarker
      @KeithBarker  Před 3 lety

      Great suggestion! "Mastering" is a strong word for such a broad topic. Let me give that some thought.

  • @clxxcv4208
    @clxxcv4208 Před 3 lety

    Thx, wait for Explaination what is UndertheHood... with role of GRE / IPsec / SHA256/md5/ ikev1 vs ikev2 ... for me it's like a bunch of Terms. without final conclusion. BTW thx.

    • @KeithBarker
      @KeithBarker  Před 3 lety

      Thank you for the question Clxxcv 420. More videos coming.

  • @Surya045_
    @Surya045_ Před rokem

    How does our router know when to pass packets through tunnel ?

    • @KeithBarker
      @KeithBarker  Před rokem

      Thank you for the question Surya045. It will be based on the routing table on the router.

  • @shezzy97
    @shezzy97 Před 3 lety +1

    Keith can you explain what that wireshark filter means ip.id==0xc3c9 please :) also how does this effect MTU will packets be fragmented due to extra header increasing the size?

    • @knight024
      @knight024 Před 3 lety +1

      IPv4 ID Used Only for Fragmentation
      Although RFC 1122 suggests that the IPv4 ID field has other uses,
      including datagram de-duplication, such uses are already not
      interoperable with known implementations of sources that do not vary
      their ID. This document thus defines this field's value only for
      fragmentation and reassembly:
      >> The IPv4 ID field MUST NOT be used for purposes other than
      fragmentation and reassembly.

    • @shezzy97
      @shezzy97 Před 3 lety

      Thanks Michael, So if you filter on that ID in wireshark it displays only packets that have been fragmented ?

    • @knight024
      @knight024 Před 3 lety

      Also from RFC 791:
      Procedure:
      IF TL =< MTU THEN Submit this datagram to the next step
      in datagram processing ELSE IF DF = 1 THEN discard the
      datagram ELSE
      To produce the first fragment:
      (1) Copy the original internet header;
      (2) OIHL

    • @knight024
      @knight024 Před 3 lety +2

      @@shezzy97 Yes going by how the RFC describes it.
      I think Keith used it as an easy way to filter out all the noise on the network and follow the TCP stream still capturing the packets that had (2) IP headers.
      In which if you did a follow stream via the GUI, it might only follow the session at the starting point of the addition of the ip header and end when it was decapsulated on the other end. By using the ip.id field he followed the underlaying network so it was end to end including the tunnel (e.g. another header being slapped on the packet) if that makes sense.

    • @KeithBarker
      @KeithBarker  Před 3 lety +1

      Thank you for the question shezzy97. And thank you Michael for the great replies.
      In the captures, I wanted to look at the same packet before, during, and after the tunnel. Each IP packet has a unique ID, so I used a display filter to show that same packet in each of the 3 captures.

  • @SuperBoi45
    @SuperBoi45 Před 2 lety

    Is tunneling always used between routers when passing data?

    • @KeithBarker
      @KeithBarker  Před 2 lety +1

      Thank you SuperBoi45!
      On a local area network (LAN), the norm is to NOT use any tunnels, just forward the traffic on its way to the destination IP.
      Some exceptions exist, such as VXLANs and a few others, but again most of the traffic between routers is NOT through a tunnel.
      Hope that helps.

  • @user-wu7xh1fc2q
    @user-wu7xh1fc2q Před 6 měsíci

    So. The idea of tunnel is just misleading. There is no dedicated private route that these packages take , as in a paper mail being transported through a underground tunnel and not the highway. The packages go through the same internet with their addresses being concealed. They should not call it a tunnel, the word "wrapper"/"Packaging" would be a better fit. that would avoid a lot of confusion.
    Maybe i misunderstood but do these VPN service provider have their own private routes that transfer the data or is our "concealed and encrypted" data still going through the public internet ? If it is going through the public internet, then what is so private about a Virtual private network ? Would you please help me understand. Thank you

  • @robertobufano7415
    @robertobufano7415 Před 2 lety

    please speak slowly for no english language people :)

    • @KeithBarker
      @KeithBarker  Před 2 lety +1

      Thank you Roberto BUFANO! I appreciate the feedback. Have you considered using the "Playback speed" controls in CZcams? I think setting it to .75 may be helpful for you.
      Thank you again for the feedback.

  • @leeroyjenkins5754
    @leeroyjenkins5754 Před rokem

    This is an outstanding video, sir! You're doing the Lord's work 🫡

  • @user-nm7wj6se6e
    @user-nm7wj6se6e Před rokem

    Omg you are like a kindergarten teacher🫶 I was struggling and you saved me with perfect analogy! I subscribed!!!

  • @spiraldynamics6008
    @spiraldynamics6008 Před rokem

    Thank you very much

    • @KeithBarker
      @KeithBarker  Před rokem +1

      Happy to do it, thanks for the feedback Spiral Dynamics.