Main mode vs Aggresive Mode- IPSEC Training |

  Рет қаралды 26,209

NETWORKERS HOME

NETWORKERS HOME

Күн бұрын

Join Live Networking Trainings with Lab Access at Networkers Home - www.networkers...
In this video, we'll be digging deeper into IPSEC. We'll be taking a look at the message exchange details of this security protocol, so that you can understand how it works.
If you're interested in learning more about IPSEC, then this video is for you! By the end of this video, you'll have a better understanding of how IPSEC works and what its benefits are. So be sure to watch it to the end!
About Networkers Home:
At Networkers Home, we are dedicated to shaping the future of networking and cybersecurity professionals. Our mission is to provide top-tier education and training to help you excel in the fast-paced world of IT and networking. Learn from industry-leading experts and gain hands-on experience with our state-of-the-art labs located in Bangalore.
📱 Connect with Us:
LinkedIn: / networkershome
Instagram: / networkershome_india
Phone: 📞 9611027980
📚 Placement Programs:
CCNA + CCNP Combo
www.networkers...
CCIE Security
www.networkers...
AI CyberX Masters
www.networkers...
AI Cloud Masters
www.networkers...
📘 Cisco Courses:
CCNA Course 200-301
www.networkers...
CCNP Enterprise
www.networkers...
CCIE Enterprise
www.networkers...
Cisco SDWAN
www.networkers...
Cisco DNAC
www.networkers...
Python Programming for Cisco Network Engineers
www.networkers...
🔥 Firewall Courses:
F5 LTM v13
www.networkers...
PALO ALTO Firewall
www.networkers...
FortiGate Firewall
www.networkers...
Cisco Firepower Next-Generation Firewall
www.networkers...
☁️ Cloud and Security:
AWS Associate
www.networkers...
AWS Professional
www.networkers...
AWS Security
www.networkers...
AWS Advance
www.networkers...
AZ-104: Microsoft Azure Administrator
www.networkers...
AZ-500: Microsoft Azure Security
www.networkers...
Certified Ethical Hacker
www.networkers...
=================================
⚠️ DISCLAIMER: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your research.
Copyright Notice: This video and our KZbin channel contain dialogue, music, and images that are the property of NETWORKERS HOME. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our KZbin channel is provided.
© NETWORKERS HOME

Пікірлер: 20
@VinayKumar-fo3cy
@VinayKumar-fo3cy Жыл бұрын
clear cut explanation sir ! Thank you so much for the clarity about Ipsec.❤❤
@Jamesaepp
@Jamesaepp 3 жыл бұрын
I really like your lecture but have a couple questions. 1 - You mention that IKE phase 2 is like a data plane. I'm not sure I see this. I would call ESP and AH the data plane - they are the payload. IKE (ISAKMP & NAT-T) are your control plane -- they authenticate the peers mutually, setup the sessions and handle key negotiation. The management plane might be something like if you had some SDN that was automatically creating and tearing down tunnels. Yes, the ESP is still inside UDP 500 or UDP 4500 but it's not really a phase 2 negotiation, it's just taking advantage of the encapsulation transport provided by UDP. 2 - Around 30 minutes you ask the students where the key is coming from and you call DH the correct answer. Here I am thinking this is wrong. The diffie hellman is used to provide PFS of the IKE traffic. There is a PSK (or public keys) in use to secure the IKE traffic between the two peers. Without DH, an eavesdropper could take your conversation, brute force it offline, and figure out the PSK (or private keys). DH helps protect against this by creating a session key but only for IKE transport. Now the attacker would have to both know the PSK (or private keys) AND intercept the traffic and re-write it between both peers in order to see the traffic. Intercepting is harder than eavesdropping. So I understand the use of DH for perfect forward secrecy, but are we positive the key used in DES/3DES/AES256 comes from diffie hellman? Are we sure it doesn't come from somewhere else?
@amitmukherjee8076
@amitmukherjee8076 Жыл бұрын
Awsome explainations
@fact2891
@fact2891 3 жыл бұрын
Excellent Explanation
@rajeshsingh7065
@rajeshsingh7065 2 жыл бұрын
Hi...Thanks for such good presentation and informative video. One suggestion from my side, Can you please add sequence of video link in description of IPSEC ?. Its easy for user to get know from which video he should start to know details on IPSEC protocol.
@MuhamedUsman
@MuhamedUsman 2 ай бұрын
i think you are wrong isakmp is not used in ikev2
@ganeshbonal-j9j
@ganeshbonal-j9j 10 ай бұрын
Best Video
@DeepakKumar-ov8ko
@DeepakKumar-ov8ko 3 жыл бұрын
6 main +6 (3 *2 - unidirectional tunnel) quick mode messages are exchanged by isakmp ,So where i can we see " ike "in wireshark ???Encyption odf user payload is done using ESP.
@AshutoshCK
@AshutoshCK 3 жыл бұрын
Nice explanation
@rohanjamwal7651
@rohanjamwal7651 3 жыл бұрын
In the fifth and sixth packets of the Main Mode's SA negotiation when using IKEv1. What is the Identification payload ?From what I understand, when using PSK, this gets set to the IP address of the VPN peer, which can already be found in the source IP field. The source IP field might not be encrypted, but so what? Is there some advantage to having this same IP information encrypted?
@khelouiazzeddine3113
@khelouiazzeddine3113 Жыл бұрын
Graet explications
@shahbazahmed6179
@shahbazahmed6179 2 ай бұрын
Is there an ikev2 videos?
@networkershome
@networkershome 2 ай бұрын
Thank you for your interest! Here is the IKEV2 Phase 1 video link - kzbin.info/www/bejne/bV7ChKune9Wia6s You can Visit our channel for any other topics
@shahbazahmed6179
@shahbazahmed6179 2 ай бұрын
@@networkershome I want from the same teacher... The above link is not a very good explanation
@Sriranjan_Nanda_Ramesh
@Sriranjan_Nanda_Ramesh 3 ай бұрын
43:00
@Shubhontube
@Shubhontube Жыл бұрын
Best
@amitkumarsingh2176
@amitkumarsingh2176 6 ай бұрын
JAI SHREE RAM🙏
@krushnakantanayak5786
@krushnakantanayak5786 2 жыл бұрын
Maja nehi aya .... video lenght is too much....
@tusharbhardwaj1048
@tusharbhardwaj1048 2 жыл бұрын
Great Content. Is it possible to get a hold of this VPN Prsesntation1.pdf file?
Minecraft Creeper Family is back! #minecraft #funny #memes
00:26
Do you choose Inside Out 2 or The Amazing World of Gumball? 🤔
00:19
Implementing and Troubleshooting Site-to-Site VPN
1:23:11
INEtraining
Рет қаралды 70 М.
Understanding AH vs ESP and ISKAKMP vs IPSec in VPN tunnels
18:30
Ryan Lindfield
Рет қаралды 314 М.
Virtual Private Network (VPN) - Deep Dive
1:42:03
Kevin Wallace Training, LLC
Рет қаралды 21 М.
Authentication Header (AH) and Encapsulating Security Payload (ESP)
22:39
GD Networking Newbie
Рет қаралды 15 М.
IPsec  - IKE Phase 1 | IKE Phase 2
13:47
GD Networking Newbie
Рет қаралды 88 М.
002 IKEv1  vs  IKEv2
13:48
Sikandar Shaik
Рет қаралды 22 М.
You can pass any IT certification doing this!
14:14
Gerard O'Brien
Рет қаралды 71 М.
Minecraft Creeper Family is back! #minecraft #funny #memes
00:26