Start learning cybersecurity with CBT Nuggets. https://courses.cbt.gg/security
In this video, CBT Nuggets trainer Keith Barker takes a look at the concepts behind how IPsec site-to-site VPNs work. Keith uses a protocol analyzer to show you the before and after picture of a packet that's been encrypted and transmitted.
Sending packets in the wild can be dangerous. The Big Bad Internet is just waiting for you to send sensitive or important information so it can be sniffed out and exploited. So any time you send a packet out there, it's a good idea to give it some protection. IPSec lets you do that
Imagine a company with two geographically separated offices. They want full data networking between the two sites. All the servers and resources of both should be shared fully between the two.
With high-speed connectivity at both sites, the impulse might be to just send it all over the internet. But that can pose a security risk.
An IPsec VPN site-to-site tunnel can provide a number of things. First, confidentiality thanks to encryption. Also, integrity – IPsec can confirm that no bits were manipulated in transit. It can even provide authentication and anti-replay support.
See the benefits of IPsec VPN tunnels and what the packets themselves look like before and after transmission.
0:25: When you might need a VPN tunnel
1:00: The risk of using the Internet
1:45: What are IPsec’s claims to fame?
2:40: How does it do it?
3:55: Two perspectives of what the VPN looks like
5:10: Side-by-side comparison of the encrypted packet
6:40: Overview
Download the Free Ultimate Networking Cert Guide: https://blog.cbt.gg/i297
⬇️ 13-Week Study Plan: CCNA (200-301): https://blog.cbt.gg/on5i
Start learning with CBT Nuggets:
• Intro to Networking | https://courses.cbt.gg/tuv
• MPLS Fundamentals | https://courses.cbt.gg/u7u