Thank you for this. I keep coming back to this video over the years whenever I need a refresher.
@shankarnair90093 жыл бұрын
Beautifully explained. If anyone wants a quick summary of IPSEC or if you have forgotten and wish to regain your understanding of IPSEC VPN, this one explains wonderfully well. Great job!
@PaloAltoNetworksLiveCommunity3 жыл бұрын
Hi Shankar! Thank you for your comment. Appreciate it!
@parthmonga41195 жыл бұрын
This is one of the best and most simplest explanation of how VPN works. Loved it.
@PaloAltoNetworksLiveCommunity5 жыл бұрын
Thank you so much for your comment. We are glad that you enjoyed the video. Please see the LIVEcommunity for more great Blogs, discussions and KB (Knowledge Base) articles. live.paloaltonetworks.com
@BorderlineBrilliance4 жыл бұрын
Studying for the security+ right now and whenever i have trouble visualizing something discussed in a book i come to your guys videos and they are SOOOOO helpful! Thank you for the time, effort and planning you guys put into these, they're a huge help!!👍
@PaloAltoNetworksLiveCommunity4 жыл бұрын
Our pleasure! We are glad it was helpful. Good luck! We encourage you to check out the LIVEcommunity page for more great information: live.paloaltonetworks.com
@abdimohamed15547 жыл бұрын
Never understood IPSEC fully until this video. Thank you Mitch
@PaloAltoNetworksLiveCommunity7 жыл бұрын
Thanks for your comment! We're glad you found the video helpful!
@racerx60415 жыл бұрын
This guy makes it all sound so simple. Thanks.
@bivash4893 жыл бұрын
A lot information to consume but enjoyed it. You definitely made it easy to understand. Thanks
@oladipoadeeko22732 жыл бұрын
Simple practical steps outlined. Thanks Mitch & Team.
@PawelSroka5 жыл бұрын
Short and packed with information, great presentation.
@Demodude1237 жыл бұрын
My real question is how in the world did you write all that backwards???
@PaloAltoNetworksLiveCommunity7 жыл бұрын
Its a Super-Secret.. (Hint: everything is flipped in editing.. so it looks like we are writing in reverse).. Please don't tell any one. ;)
@Demodude1237 жыл бұрын
Oh that's a genius idea, keep up the good work!
@PaloAltoNetworksLiveCommunity6 жыл бұрын
:-)
@allawy6 жыл бұрын
Dude! Thank you so much for your videos, I just passed CISSP ;)
@RichardBronosky6 жыл бұрын
I gave this a sarcastic upvote. I want to make a bunch of videos like this and wear a shirt with backwards text on it (which will be correct when flipped) just to double brainfuq people.
@gfavors6 жыл бұрын
Great video! I linked it to my class to understand IPsec. Also 1:35 had me cracking up, "...and that's crucial, the same IKE settings..."
@vainilk784 жыл бұрын
Great video about IPSec. I love it!
@PaloAltoNetworksLiveCommunity4 жыл бұрын
Glad you liked it! As always, please be sure to visit the LIVEcommunity to participate in online discussions, read our blogs and see all of the great information that we have there: live.paloaltonetworks.com
@harshvardhanchaturvedi72224 жыл бұрын
Really great Video for Understanding
@PaloAltoNetworksLiveCommunity4 жыл бұрын
Glad to hear that! We encourage you to check out the LIVEcommunity page for more great information: live.paloaltonetworks.com
@nasirsahak3 жыл бұрын
I Love IPsec ,this the best easiest summary ever. Thanks for the good work:)
@hrishikeshsonar46023 жыл бұрын
LEGEND. Thanks Miitch!
@FireicerCooper7 жыл бұрын
Transport mode IPv6 is what most ISP's are rolling out for their broadband services. Reason being is that the IP header not being encrypted allows the ISP to block traffic destined for particular sites they do not want you to reach.
@karolinho35 жыл бұрын
you mean DNS
@saltech2024Ай бұрын
I watched this video in 2020 while building my project
@vimalneha3 жыл бұрын
Excellent explanation!
@chrisii18675 жыл бұрын
i jumped back in my chair when he started writing on air
@BortSlampson5 жыл бұрын
Bro, this is fire
@jaygeemmo3 жыл бұрын
Really !!
@csbshaw13 жыл бұрын
This video is great! Thank you!
@PaloAltoNetworksLiveCommunity3 жыл бұрын
Glad it helped!
@vivekprajapati79115 жыл бұрын
great sir thanks more videos on different concepts pls
@BIGBOSS-km9dn5 жыл бұрын
Very informative and super clear, THANK YOU
@12pita3naru4 жыл бұрын
My man, thank you for the explanation
@PaloAltoNetworksLiveCommunity4 жыл бұрын
You're welcome! Check out the LIVEcommunity page for more great info: live.paloaltonetworks.com
@beckdawg2k86 жыл бұрын
Excellent job Mitch! I have a good understanding of how IPSec works. I will reference this and send other engineers to this video.
@robertgeorge50204 жыл бұрын
beautifully explained thank you !!
@PaloAltoNetworksLiveCommunity4 жыл бұрын
Glad it was helpful! Please check out the LIVEcommunity page for more great info: live.paloaltonetworks.com
@Mastagon3 жыл бұрын
Not only are you gorgeous, but you are clearly skilled teacher as well. THANKS
@kumarpriyank444 жыл бұрын
You nailed it bro. 🤝🤝
@zoranomenjanahary63704 жыл бұрын
I really like your video, nice presentation ectc.. I was wondering, how about the MTU then with all of this encapsulation ?
@kelpkelp52522 жыл бұрын
You're very good at writing backwards
@Karim-nq1be4 жыл бұрын
F... please stop asking how he writes backwards. Great video, as usual.
@francispascual1374 жыл бұрын
Great presentation
@CreaTeach984 жыл бұрын
Nice please explain how SA are working in both phases
@semtex64126 жыл бұрын
my OCD-brain just went off the charts with the way you write backwards. i was like.. "okay, how the f*ck does one pull that off?" it keeps me from concentrating on the actual subject at hand. so i had to read the comments first and got into your replies. that was INSANELY CLEVER, man! totally awesome. but not awesome as the video itself. thank you, Mitch Sir!
@kushalghimire42063 жыл бұрын
Best explanation ever 👍
@PaloAltoNetworksLiveCommunity3 жыл бұрын
Hi Kushal, thanks for the positive feedback!
@rayang99295 жыл бұрын
amazing video, thank you
@jplobianco4 жыл бұрын
Great video. Thank you!
@rakesh4a13 жыл бұрын
Great.. Few very basic questions (new to ipsec) 1. When are the parameters used in phase1 and phase2 are exchanged between client and server. 2. When is the tunnel created?
@PaloAltoNetworksLiveCommunity3 жыл бұрын
Parameters for phase 1 are exchanged during phase 1 negotiations. IKE SAs are exchanged and setting up a secure channel for negotiating IPSec SAs in phase 2. You can follow the different phase progression in the ikemgr.log but you might have to increase the debug level for more verbose logging.
@oliveirajose275 жыл бұрын
Very good explanation, thank you!
@rockinron51134 жыл бұрын
Great video.
@macko3587 жыл бұрын
Greetings from Bydgoszcz Mitch ;)
@secureblob48747 жыл бұрын
This video is the best video in youtube that describes how IPSec works. I have a basic question. I pretty much understood that tunnel mode is useful to connect 2 different sites via internet. Is there any other use case where tunnel mode can be used? What all instances one should use Transport mode? It would be great if you can provide some customer use cases to use Tunnel and Transport modes. Thank you once again for such an awesome video.
@PaloAltoNetworksLiveCommunity7 жыл бұрын
The Palo Alto Networks supports only tunnel mode for IPSec VPN. The transport mode is not supported for IPSec VPN. For more information about this, please see this article: live.paloaltonetworks.com/t5/Configuration-Articles/How-to-Configure-IPSec-VPN/ta-p/56535 Thanks for your comment! We're glad you found the video helpful!
@arnav54894 жыл бұрын
Good article. I am looking at details of ike to exchange the keys and meaning of each fields. When and how psk and Dafile key used in phases1 and 2. In phases algorithms names are exchanged. In phase 2 its keys are exchanged securely? Can somebody suggest a simple program to establish the same.
@avcoe1237 жыл бұрын
Clear & Precise
@PaloAltoNetworksLiveCommunity7 жыл бұрын
Thanks for your comment! We're glad you found the video helpful!
@josefelix50474 жыл бұрын
Terrific video, no question about it. But, is he explaining a VPN or the protocol itself. Like, the title says What is IPsec, but then you just use it in a VPN?
@MegaMario00075 жыл бұрын
Only thing I don't fully understand yet is if the encryption key is pre-shared / installed on both sites, and already used in the initial authentication, OR if the encryption key is communicated during that first phase. In case of the latter, another party could compromise the whole security if they capture that initial UDP packet right?
@PANgurus5 жыл бұрын
In the first phase both ends identify and authenticate, this is when the pre-shared key (or certificate) is used and needs to be identical on both ends before negotiations can be continued. It works somewhat like a TCP handshake where server and client first identify and authenticate against one another, then exchange Diffie-Hellman asymmetric keys and re-encrypt their communication before negotiating phase 2. Another party would need to figure out pre-shared key and identification, then spoof the destination IP and then do the same to the other end before a man-in-the-middle could occur, simply sniffing would not help after the very first exchange as both peers then switch to dynamic keys
@MegaMario00075 жыл бұрын
@@PANgurus thanks!
@DonzLockz7 жыл бұрын
Good but the text is a bit small to read. When I was growing up, for someone to write left handed was thought to be possessed by the devil, they would have then freaked out to see you write in reverse! Good work 👌✌
@PaloAltoNetworksLiveCommunity7 жыл бұрын
Thanks for your comment! We're glad you found the video helpful! psst, the secret is that the video is recorded normally, but the image is reversed so you can read what is being written. As far as it being small, you can increase the resolution to 1080p and full screen it, which should help you see it a little better.
@anthonybarajas58964 жыл бұрын
can you see what sites people are on ?
@PaloAltoNetworksLiveCommunity4 жыл бұрын
IPSec will encrypt the traffic between the endpoint and the firewall. On the Firewall you will see what sites the endpoint is accessing because the traffic would then be decrypted. If any other device captures the traffic(from the endpoint to the firewall), it will all be encrypted.. and no one can see what sites are being accessed.
@nicoleamsler98877 жыл бұрын
Thank you!
@PaloAltoNetworksLiveCommunity7 жыл бұрын
Thanks for your comment! We're glad you found the video helpful!
@techlearner48063 жыл бұрын
Thanks Mitch for easiest explanation. Please make dedicated video for NAT-Traversal & NAT Discovery to understand it more clearly.
@BorderlineBrilliance4 жыл бұрын
Who in the world are the 19 people that gave this video a thumbs down??? Crazy🤷♂️
@PaloAltoNetworksLiveCommunity4 жыл бұрын
Thank you!
@atul.tripathi4 жыл бұрын
Might be because this requires a little more elaboration and most of the things written are hard to read and understand specially where the headers are explained.
@ralph17p2 жыл бұрын
One thing that makes no sense to me in this video is where, at about 5:40, you say that transport mode isn't the most popular because the original headers aren't encrypted, then you seem to immediately contradict that by drawing them out and saying "the original tcp or udp headers are encrypted". Seems like a clear contradiction, unless I'm missing something?
@manoharb56852 жыл бұрын
Yes, he didn't contradict but should have said Tunnel mode. In Transport mode the payload of each packet is encrypted but the original IP header is not. In Tunnel mode, both IP header and payload are encrypted.
@griciugriger45655 жыл бұрын
what does "e" written at the edge of the square imitating system stand for?
@PaloAltoNetworksLiveCommunity5 жыл бұрын
My guess is that this represents the tunnel termination interface on each side of the tunnel.
@esko9114 жыл бұрын
i see "IKEEXT" as an "owner" on my PC, why is that?
@advaitkulkarni32995 жыл бұрын
My Questio is How would you write reverse to see us correct ??
@PaloAltoNetworksLiveCommunity5 жыл бұрын
It is all Magic. Just kidding. We reverse the image like a mirror so everyone can see and understand what is being discussed in the video. Thanks for viewing!
@SimoneAKABrigante3 жыл бұрын
American Computer Science tutorials -> any other country's tutorials
@BijouBakson4 жыл бұрын
I'd stick to traditional chalk on board if you asked me. Because 2 problems: Colour clash & not enough space the board. And it's really distracting. Nothing wrong with chalk on board as it's faster, efficient and require no editing tricks. Or why not try Ink? that's a lot more accurate and far better adapted for this type of task - I am talking about Windows Ink or other writing technologies that are now widely available of course. Thank you.
@kipa_chu7 жыл бұрын
thanks
@dbsautometer98784 жыл бұрын
I think he used a mirror to reflect him standing behind plex glass.
@PaloAltoNetworksLiveCommunity4 жыл бұрын
Thanks for asking.. The Video is reversed, and they are behind a glass panel to write on. Thanks for watching! Be sure to check out the LIVEcommunity for more great information: live.paloaltonetworks.com
@tjokkerstar14625 жыл бұрын
So is this right?: Transport mode = AH Tunnel mode = ESP
@PaloAltoNetworksLiveCommunity5 жыл бұрын
Yes, Authentication Header (AH) adds a header that 'authenticates' the content is unaltered (like a signature), no encryption so simply transporting the payload with proof of integrity. Encapsulating Security Payload (ESP), packages the payload in an encrypted container, creating a virtual tunnel between 2 points
@tjokkerstar14625 жыл бұрын
@@PaloAltoNetworksLiveCommunity Thank you very much :) This information is really helpfull.
@marcooconnor4 жыл бұрын
@@PaloAltoNetworksLiveCommunity Are you sure? I don't believe Transport mode = AH or Tunnel mode equals ESP. They are separate entities and Transport/tunnel can be either AH or ESP.
@MrWhaatay7 жыл бұрын
So you don't need L2TP to work with this?
@PaloAltoNetworksLiveCommunity7 жыл бұрын
Thanks for your comment ! At this time there's no L2TP support. You can reach out to a local SE and have him add your vote to the feature request.
@robertmartin83017 жыл бұрын
Can ipsec be used to block other devices
@PaloAltoNetworksLiveCommunity7 жыл бұрын
Hi Robert! 'ipsec' is a set of protocols (ike and ipsec) used to establish a secure communication channel between two devices. To be able to establish this communication, both peers need to be configured with matching parameters beforehand. controlling which IP's are allowed to connect, or which communication is allowed to traverse the tunnel requires security policies to allow or deny certain sources or destinations.
@svstorm2196 Жыл бұрын
how does he write backwards
@samin.mahmud4 жыл бұрын
But why do we need this if we have TLS
@PaloAltoNetworksLiveCommunity4 жыл бұрын
Thanks for asking.. SSL/TLS VPN products protect application traffic streams from remote users to an SSL/TLS gateway. In other words, IPsec VPNs connect hosts or networks to a protected private network, while SSL/TLS VPNs securely connect a user's application session to services inside a protected network. As always, please be sure to visit the LIVEcommunity to participate in online discussions, read our blogs and see all of the great information that we have there: live.paloaltonetworks.com
@coffle13 жыл бұрын
TLS only operates on TCP at the transport layer which relies on ip at the network layer. TCP segments are sent unencrypted as part of the payload in ip packets so having the payload of ip packets encrypted will help in concealing that. IPSec also has the added benefit of doing this for UDP (which has its own transport level security protocols) and any other transport level protocol
@98305086426 жыл бұрын
nice ...
@r4nehd266 жыл бұрын
Does this come to windows 7 automatically becouse i got virus and never installed this, should i be scared?
@rachadlakis17 жыл бұрын
great (Y)
@jaygeemmo3 жыл бұрын
When i write scripts i pretend their cheat codes
@digitlx784 жыл бұрын
Thank you!
@PaloAltoNetworksLiveCommunity4 жыл бұрын
You're welcome! Please check out the LIVEcommunity page for more great info: live.paloaltonetworks.com