Тёмный

What is IPSec? 

Palo Alto Networks LIVEcommunity
Подписаться 34 тыс.
Просмотров 174 тыс.
50% 1

This video describes the workings of the IKE and IPSec Phases that occur during the establishment of a VPN tunnel.
Presented by Mitch Densley, Security Training Engineer

Опубликовано:

 

4 июл 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 114   
@shankarnair9009
@shankarnair9009 3 года назад
Beautifully explained. If anyone wants a quick summary of IPSEC or if you have forgotten and wish to regain your understanding of IPSEC VPN, this one explains wonderfully well. Great job!
@PaloAltoNetworksLiveCommunity
@PaloAltoNetworksLiveCommunity 3 года назад
Hi Shankar! Thank you for your comment. Appreciate it!
@parthmonga4119
@parthmonga4119 4 года назад
This is one of the best and most simplest explanation of how VPN works. Loved it.
@PaloAltoNetworksLiveCommunity
@PaloAltoNetworksLiveCommunity 4 года назад
Thank you so much for your comment. We are glad that you enjoyed the video. Please see the LIVEcommunity for more great Blogs, discussions and KB (Knowledge Base) articles. live.paloaltonetworks.com
@racerx6041
@racerx6041 4 года назад
This guy makes it all sound so simple. Thanks.
@abdimohamed1554
@abdimohamed1554 6 лет назад
Never understood IPSEC fully until this video. Thank you Mitch
@PaloAltoNetworksLiveCommunity
@PaloAltoNetworksLiveCommunity 6 лет назад
Thanks for your comment! We're glad you found the video helpful!
@PawelSroka
@PawelSroka 5 лет назад
Short and packed with information, great presentation.
@oladipoadeeko2273
@oladipoadeeko2273 2 года назад
Simple practical steps outlined. Thanks Mitch & Team.
@beckdawg2k8
@beckdawg2k8 6 лет назад
Excellent job Mitch! I have a good understanding of how IPSec works. I will reference this and send other engineers to this video.
@BIGBOSS-km9dn
@BIGBOSS-km9dn 4 года назад
Very informative and super clear, THANK YOU
@BorderlineBrilliance
@BorderlineBrilliance 4 года назад
Studying for the security+ right now and whenever i have trouble visualizing something discussed in a book i come to your guys videos and they are SOOOOO helpful! Thank you for the time, effort and planning you guys put into these, they're a huge help!!👍
@PaloAltoNetworksLiveCommunity
@PaloAltoNetworksLiveCommunity 4 года назад
Our pleasure! We are glad it was helpful. Good luck! We encourage you to check out the LIVEcommunity page for more great information: live.paloaltonetworks.com
@bivash489
@bivash489 2 года назад
A lot information to consume but enjoyed it. You definitely made it easy to understand. Thanks
@nasirsahak
@nasirsahak 3 года назад
I Love IPsec ,this the best easiest summary ever. Thanks for the good work:)
@gfavors
@gfavors 5 лет назад
Great video! I linked it to my class to understand IPsec. Also 1:35 had me cracking up, "...and that's crucial, the same IKE settings..."
@vainilk78
@vainilk78 3 года назад
Great video about IPSec. I love it!
@PaloAltoNetworksLiveCommunity
@PaloAltoNetworksLiveCommunity 3 года назад
Glad you liked it! As always, please be sure to visit the LIVEcommunity to participate in online discussions, read our blogs and see all of the great information that we have there: live.paloaltonetworks.com
@oliveirajose27
@oliveirajose27 5 лет назад
Very good explanation, thank you!
@vimalneha
@vimalneha 3 года назад
Excellent explanation!
@hrishikeshsonar4602
@hrishikeshsonar4602 2 года назад
LEGEND. Thanks Miitch!
@jplobianco
@jplobianco 4 года назад
Great video. Thank you!
@csbshaw1
@csbshaw1 2 года назад
This video is great! Thank you!
@PaloAltoNetworksLiveCommunity
@PaloAltoNetworksLiveCommunity 2 года назад
Glad it helped!
@rayang9929
@rayang9929 4 года назад
amazing video, thank you
@BortSlampson
@BortSlampson 5 лет назад
Bro, this is fire
@jaygeemmo
@jaygeemmo 3 года назад
Really !!
@harshvardhanchaturvedi7222
@harshvardhanchaturvedi7222 4 года назад
Really great Video for Understanding
@PaloAltoNetworksLiveCommunity
@PaloAltoNetworksLiveCommunity 4 года назад
Glad to hear that! We encourage you to check out the LIVEcommunity page for more great information: live.paloaltonetworks.com
@robertgeorge5020
@robertgeorge5020 4 года назад
beautifully explained thank you !!
@PaloAltoNetworksLiveCommunity
@PaloAltoNetworksLiveCommunity 4 года назад
Glad it was helpful! Please check out the LIVEcommunity page for more great info: live.paloaltonetworks.com
@kumarpriyank44
@kumarpriyank44 4 года назад
You nailed it bro. 🤝🤝
@Demodude123
@Demodude123 6 лет назад
My real question is how in the world did you write all that backwards???
@PaloAltoNetworksLiveCommunity
@PaloAltoNetworksLiveCommunity 6 лет назад
Its a Super-Secret.. (Hint: everything is flipped in editing.. so it looks like we are writing in reverse).. Please don't tell any one. ;)
@Demodude123
@Demodude123 6 лет назад
Oh that's a genius idea, keep up the good work!
@PaloAltoNetworksLiveCommunity
@PaloAltoNetworksLiveCommunity 6 лет назад
:-)
@allawy
@allawy 6 лет назад
Dude! Thank you so much for your videos, I just passed CISSP ;)
@RichardBronosky
@RichardBronosky 6 лет назад
I gave this a sarcastic upvote. I want to make a bunch of videos like this and wear a shirt with backwards text on it (which will be correct when flipped) just to double brainfuq people.
@12pita3naru
@12pita3naru 4 года назад
My man, thank you for the explanation
@PaloAltoNetworksLiveCommunity
@PaloAltoNetworksLiveCommunity 4 года назад
You're welcome! Check out the LIVEcommunity page for more great info: live.paloaltonetworks.com
@vivekprajapati7911
@vivekprajapati7911 4 года назад
great sir thanks more videos on different concepts pls
@francispascual137
@francispascual137 4 года назад
Great presentation
@rockinron5113
@rockinron5113 4 года назад
Great video.
@avcoe123
@avcoe123 6 лет назад
Clear & Precise
@PaloAltoNetworksLiveCommunity
@PaloAltoNetworksLiveCommunity 6 лет назад
Thanks for your comment! We're glad you found the video helpful!
@macko358
@macko358 7 лет назад
Greetings from Bydgoszcz Mitch ;)
@chrisii1867
@chrisii1867 4 года назад
i jumped back in my chair when he started writing on air
@semtex6412
@semtex6412 6 лет назад
my OCD-brain just went off the charts with the way you write backwards. i was like.. "okay, how the f*ck does one pull that off?" it keeps me from concentrating on the actual subject at hand. so i had to read the comments first and got into your replies. that was INSANELY CLEVER, man! totally awesome. but not awesome as the video itself. thank you, Mitch Sir!
@kushalghimire4206
@kushalghimire4206 3 года назад
Best explanation ever 👍
@PaloAltoNetworksLiveCommunity
@PaloAltoNetworksLiveCommunity 3 года назад
Hi Kushal, thanks for the positive feedback!
@FireicerCooper
@FireicerCooper 7 лет назад
Transport mode IPv6 is what most ISP's are rolling out for their broadband services. Reason being is that the IP header not being encrypted allows the ISP to block traffic destined for particular sites they do not want you to reach.
@karolinho3
@karolinho3 5 лет назад
you mean DNS
@digitlx78
@digitlx78 4 года назад
Thank you!
@PaloAltoNetworksLiveCommunity
@PaloAltoNetworksLiveCommunity 4 года назад
You're welcome! Please check out the LIVEcommunity page for more great info: live.paloaltonetworks.com
@zoranomenjanahary6370
@zoranomenjanahary6370 4 года назад
I really like your video, nice presentation ectc.. I was wondering, how about the MTU then with all of this encapsulation ?
@secureblob4874
@secureblob4874 6 лет назад
This video is the best video in youtube that describes how IPSec works. I have a basic question. I pretty much understood that tunnel mode is useful to connect 2 different sites via internet. Is there any other use case where tunnel mode can be used? What all instances one should use Transport mode? It would be great if you can provide some customer use cases to use Tunnel and Transport modes. Thank you once again for such an awesome video.
@PaloAltoNetworksLiveCommunity
@PaloAltoNetworksLiveCommunity 6 лет назад
The Palo Alto Networks supports only tunnel mode for IPSec VPN. The transport mode is not supported for IPSec VPN. For more information about this, please see this article: live.paloaltonetworks.com/t5/Configuration-Articles/How-to-Configure-IPSec-VPN/ta-p/56535 Thanks for your comment! We're glad you found the video helpful!
@Mastagon
@Mastagon 3 года назад
Not only are you gorgeous, but you are clearly skilled teacher as well. THANKS
@kipa_chu
@kipa_chu 7 лет назад
thanks
@kelpkelp5252
@kelpkelp5252 2 года назад
You're very good at writing backwards
@CreaTeach98
@CreaTeach98 4 года назад
Nice please explain how SA are working in both phases
@Karim-nq1be
@Karim-nq1be 4 года назад
F... please stop asking how he writes backwards. Great video, as usual.
@arnav5489
@arnav5489 3 года назад
Good article. I am looking at details of ike to exchange the keys and meaning of each fields. When and how psk and Dafile key used in phases1 and 2. In phases algorithms names are exchanged. In phase 2 its keys are exchanged securely? Can somebody suggest a simple program to establish the same.
@DonzLockz
@DonzLockz 6 лет назад
Good but the text is a bit small to read. When I was growing up, for someone to write left handed was thought to be possessed by the devil, they would have then freaked out to see you write in reverse! Good work 👌✌
@PaloAltoNetworksLiveCommunity
@PaloAltoNetworksLiveCommunity 6 лет назад
Thanks for your comment! We're glad you found the video helpful! psst, the secret is that the video is recorded normally, but the image is reversed so you can read what is being written. As far as it being small, you can increase the resolution to 1080p and full screen it, which should help you see it a little better.
@rakesh4a1
@rakesh4a1 3 года назад
Great.. Few very basic questions (new to ipsec) 1. When are the parameters used in phase1 and phase2 are exchanged between client and server. 2. When is the tunnel created?
@PaloAltoNetworksLiveCommunity
@PaloAltoNetworksLiveCommunity 2 года назад
Parameters for phase 1 are exchanged during phase 1 negotiations. IKE SAs are exchanged and setting up a secure channel for negotiating IPSec SAs in phase 2. You can follow the different phase progression in the ikemgr.log but you might have to increase the debug level for more verbose logging.
@MegaMario0007
@MegaMario0007 5 лет назад
Only thing I don't fully understand yet is if the encryption key is pre-shared / installed on both sites, and already used in the initial authentication, OR if the encryption key is communicated during that first phase. In case of the latter, another party could compromise the whole security if they capture that initial UDP packet right?
@PANgurus
@PANgurus 5 лет назад
In the first phase both ends identify and authenticate, this is when the pre-shared key (or certificate) is used and needs to be identical on both ends before negotiations can be continued. It works somewhat like a TCP handshake where server and client first identify and authenticate against one another, then exchange Diffie-Hellman asymmetric keys and re-encrypt their communication before negotiating phase 2. Another party would need to figure out pre-shared key and identification, then spoof the destination IP and then do the same to the other end before a man-in-the-middle could occur, simply sniffing would not help after the very first exchange as both peers then switch to dynamic keys
@MegaMario0007
@MegaMario0007 5 лет назад
@@PANgurus thanks!
@techlearner4806
@techlearner4806 2 года назад
Thanks Mitch for easiest explanation. Please make dedicated video for NAT-Traversal & NAT Discovery to understand it more clearly.
@josefelix5047
@josefelix5047 3 года назад
Terrific video, no question about it. But, is he explaining a VPN or the protocol itself. Like, the title says What is IPsec, but then you just use it in a VPN?
@9830508642
@9830508642 6 лет назад
nice ...
@griciugriger4565
@griciugriger4565 5 лет назад
what does "e" written at the edge of the square imitating system stand for?
@PaloAltoNetworksLiveCommunity
@PaloAltoNetworksLiveCommunity 5 лет назад
My guess is that this represents the tunnel termination interface on each side of the tunnel.
@BijouBakson
@BijouBakson 4 года назад
I'd stick to traditional chalk on board if you asked me. Because 2 problems: Colour clash & not enough space the board. And it's really distracting. Nothing wrong with chalk on board as it's faster, efficient and require no editing tricks. Or why not try Ink? that's a lot more accurate and far better adapted for this type of task - I am talking about Windows Ink or other writing technologies that are now widely available of course. Thank you.
@BorderlineBrilliance
@BorderlineBrilliance 4 года назад
Who in the world are the 19 people that gave this video a thumbs down??? Crazy🤷‍♂️
@PaloAltoNetworksLiveCommunity
@PaloAltoNetworksLiveCommunity 4 года назад
Thank you!
@atul.tripathi
@atul.tripathi 3 года назад
Might be because this requires a little more elaboration and most of the things written are hard to read and understand specially where the headers are explained.
@robertmartin8301
@robertmartin8301 6 лет назад
Can ipsec be used to block other devices
@PaloAltoNetworksLiveCommunity
@PaloAltoNetworksLiveCommunity 6 лет назад
Hi Robert! 'ipsec' is a set of protocols (ike and ipsec) used to establish a secure communication channel between two devices. To be able to establish this communication, both peers need to be configured with matching parameters beforehand. controlling which IP's are allowed to connect, or which communication is allowed to traverse the tunnel requires security policies to allow or deny certain sources or destinations.
@advaitkulkarni3299
@advaitkulkarni3299 5 лет назад
My Questio is How would you write reverse to see us correct ??
@PaloAltoNetworksLiveCommunity
@PaloAltoNetworksLiveCommunity 5 лет назад
It is all Magic. Just kidding. We reverse the image like a mirror so everyone can see and understand what is being discussed in the video. Thanks for viewing!
@anthonybarajas5896
@anthonybarajas5896 4 года назад
can you see what sites people are on ?
@PaloAltoNetworksLiveCommunity
@PaloAltoNetworksLiveCommunity 3 года назад
IPSec will encrypt the traffic between the endpoint and the firewall. On the Firewall you will see what sites the endpoint is accessing because the traffic would then be decrypted. If any other device captures the traffic(from the endpoint to the firewall), it will all be encrypted.. and no one can see what sites are being accessed.
@esko911
@esko911 4 года назад
i see "IKEEXT" as an "owner" on my PC, why is that?
@MrWhaatay
@MrWhaatay 6 лет назад
So you don't need L2TP to work with this?
@PaloAltoNetworksLiveCommunity
@PaloAltoNetworksLiveCommunity 6 лет назад
Thanks for your comment ! At this time there's no L2TP support. You can reach out to a local SE and have him add your vote to the feature request.
@rachadlakis1
@rachadlakis1 7 лет назад
great (Y)
@dbsautometer9878
@dbsautometer9878 4 года назад
I think he used a mirror to reflect him standing behind plex glass.
@PaloAltoNetworksLiveCommunity
@PaloAltoNetworksLiveCommunity 4 года назад
Thanks for asking.. The Video is reversed, and they are behind a glass panel to write on. Thanks for watching! Be sure to check out the LIVEcommunity for more great information: live.paloaltonetworks.com
@SimoneAKABrigante
@SimoneAKABrigante 3 года назад
American Computer Science tutorials -> any other country's tutorials
@ralph17p
@ralph17p Год назад
One thing that makes no sense to me in this video is where, at about 5:40, you say that transport mode isn't the most popular because the original headers aren't encrypted, then you seem to immediately contradict that by drawing them out and saying "the original tcp or udp headers are encrypted". Seems like a clear contradiction, unless I'm missing something?
@manoharb5685
@manoharb5685 Год назад
Yes, he didn't contradict but should have said Tunnel mode. In Transport mode the payload of each packet is encrypted but the original IP header is not. In Tunnel mode, both IP header and payload are encrypted.
@r4nehd26
@r4nehd26 6 лет назад
Does this come to windows 7 automatically becouse i got virus and never installed this, should i be scared?
@tjokkerstar1462
@tjokkerstar1462 4 года назад
So is this right?: Transport mode = AH Tunnel mode = ESP
@PaloAltoNetworksLiveCommunity
@PaloAltoNetworksLiveCommunity 4 года назад
Yes, Authentication Header (AH) adds a header that 'authenticates' the content is unaltered (like a signature), no encryption so simply transporting the payload with proof of integrity. Encapsulating Security Payload (ESP), packages the payload in an encrypted container, creating a virtual tunnel between 2 points
@tjokkerstar1462
@tjokkerstar1462 4 года назад
@@PaloAltoNetworksLiveCommunity Thank you very much :) This information is really helpfull.
@marcooconnor
@marcooconnor 4 года назад
@@PaloAltoNetworksLiveCommunity Are you sure? I don't believe Transport mode = AH or Tunnel mode equals ESP. They are separate entities and Transport/tunnel can be either AH or ESP.
@svstorm2196
@svstorm2196 Год назад
how does he write backwards
@saminyaseermahmud
@saminyaseermahmud 3 года назад
But why do we need this if we have TLS
@PaloAltoNetworksLiveCommunity
@PaloAltoNetworksLiveCommunity 3 года назад
Thanks for asking.. SSL/TLS VPN products protect application traffic streams from remote users to an SSL/TLS gateway. In other words, IPsec VPNs connect hosts or networks to a protected private network, while SSL/TLS VPNs securely connect a user's application session to services inside a protected network. As always, please be sure to visit the LIVEcommunity to participate in online discussions, read our blogs and see all of the great information that we have there: live.paloaltonetworks.com
@coffle1
@coffle1 3 года назад
TLS only operates on TCP at the transport layer which relies on ip at the network layer. TCP segments are sent unencrypted as part of the payload in ip packets so having the payload of ip packets encrypted will help in concealing that. IPSec also has the added benefit of doing this for UDP (which has its own transport level security protocols) and any other transport level protocol
@jaygeemmo
@jaygeemmo 3 года назад
When i write scripts i pretend their cheat codes
@nicoleamsler9887
@nicoleamsler9887 7 лет назад
Thank you!
@PaloAltoNetworksLiveCommunity
@PaloAltoNetworksLiveCommunity 6 лет назад
Thanks for your comment! We're glad you found the video helpful!
Далее
IP Sec VPN Fundamentals
14:55
Просмотров 149 тыс.
Basic IPSec VPN Configuration with PAN-OS
14:52
Просмотров 70 тыс.
Tutorial: IPSec VPN Setup
9:48
Просмотров 75 тыс.
VPN Types Options and Protocols Explained
10:24
Просмотров 23 тыс.
#TheSASEShow: SASE is Groovy, Baby!
14:23
Просмотров 5 тыс.
Understanding Cisco SSL VPN vs IPSec VPN
15:17
Просмотров 228 тыс.
CertMike Explains IPSec
5:28
Просмотров 6 тыс.