IPSEC VPN Tunnel on MikroTik

Understand how IPSEC tunneling protocol works and know how to apply it correctly on MikroTik RouterOS

4.75 (438 reviews)
Udemy
platform
English
language
Network & Security
category
instructor
2,172
students
3.5 hours
content
Mar 2023
last update
$59.99
regular price

What you will learn

Understand what is VPN

Understand what is IPSEC

Understand the 4 features of IPSEC

Understand why IPSEC is a protocol suite

Understand the Protocols used in the IPSEC features

Understand IPSEC modes of communications

Understand IPSEC Transport mode

Understand IPSEC Tunnel mode

Understand what is Symmetric key encryption

Understand what is Asymmetric key encryption

Understand how DH works to share the secret key in a secure way

Understand the encryption protocols such as: DES, 3DES, AES, Blowfish, Camellia, RSA & DH

Understand Data Integrity using Hashing algorithms such as: MD5, SHA1, SHA256, SHA512

Understand the types of IPSEC authentication: Pre-shared key vs Certificate

Understand IPSEC Negotiation Protocols: AH vs ESP

Understand the IPSEC negotiation process

Understand what is the initiator to start the IPSEC VPN

Understand IKE Phase 1 (ISAKMP)

Understand the difference between Main and Aggressive mode on IKE Phase 1

Understand IKE Phase 2

Understand what is PFS Group

Understand the difference between IKEv1 & IKEv2

Configuring IPSEC site-to-site using IKEv1

Configuring IPSEC site-to-site using IKEv2

Configure IPSEC IKv2 Remote Access using certificates

Description

Internet Protocol Security, or what is known as IPSEC, is a VPN protocol suite widely used nowadays in our network to connect 2 or more offices securely to each other using the public internet service, and this will save for companies a lot of cost and time instead of using dedicated leased lines between their offices.

However, configuring IPSEC correctly is a challenge because IPSEC is considered as a Framework protocol which has many sub-protocols and phases under its umbrella.

I have designed this course to help you to understand how IPSEC works, that means that big part of this course is going to be a theoretical part explaining in details all parts of IPSEC. During this course, I will explain also about a lot of security terms that we always hear and is used on IPSEC such as: Encryption, Hashing, Authentication, Deffie-Hellman, Symmetric and Asymmetric keys, etc.....

After the theoretical part, I am going to do LABs where I will show you how to configure correctly IPSEC on MikroTik Routers and we will test it to see if it works good. The LABs will include both versions of IPSEC which are IKEv1 and IKEv2.

That's in brief what I am going to do in this course, of course more details will be shown in the lessons.

I can't wait to see you in my course .

Content

Introduction to Virtual Private Network (VPN)

What is VPN? - Intro
What is VPN? - Explanation

Internet Protocol Security (IPSEC) Framework

What is IPSEC? - Intro
What is IPSEC? - Explanation
IPSEC Protocol suite - Explained
IPSEC modes of communication - Transport vs Tunnel mode
Types of Encryption - Symmetric vs Asymmetric
Security over the internet using IPSEC
Encyption Protocols (DES - 3DES- AES - Blowfish - Camellia - RSA - DH)
Data Integrity - Hashing Algorithms (MD5 - SHA1 - SHA256 - SHA512)
IPSEC Authentication (Pre-shared key vs Certificates)
IPSEC Negotiation Protocols (AH vs ESP)

IPSEC Negotiation Process

IPSEC Negotiation Process - Introduction
IPSEC Negotiation Process and choices of IPSEC interesting traffic
IPSEC IKE Phase 1 (ISAKMP Tunnel)
IPSEC IKE Phase 1 (Main vs Aggressive mode)
IPSEC IKE Phase 2 (IPSEC Tunnel)
IPSEC Data Transfer
Difference between IKEv1 and IKEv2

Site to Site IPSEC VPN

Introduction to the IPSEC LAB
Pre-configuration of the IPSEC Tunnel
Configuring site-to-site IPSEC tunnel using IKEv1 & IKEv2 - Part1
Configuring site-to-site IPSEC tunnel using IKEv1 & IKEv2 - Part2

Remote Access IPSEC IKEv2 VPN

Introduction to IPSEC IKEv2 Remote Access
Creating certificates for remote access IPSEC
Configuring IPSEC IKEv2 remote access

Screenshots

IPSEC VPN Tunnel on MikroTik - Screenshot_01IPSEC VPN Tunnel on MikroTik - Screenshot_02IPSEC VPN Tunnel on MikroTik - Screenshot_03IPSEC VPN Tunnel on MikroTik - Screenshot_04

Reviews

Ashish
June 22, 2023
well explain, now concept is cleared about IPsec tunnel.thaks foe this kind of lectures which is created by you.
Mitesh
March 31, 2023
This has been a best explaination in IPSec framework! Really explained in a simple way...I am giving 5 STAR as the content was explained in depth...the only thing i miss here and I dont want to cut any star for it, is some documentation, like PDF or something that we can keep for reference.
James
March 6, 2023
Wow. I can't believe I learned all this in college and for my CCNA and I didn't fully grasp it until this lecture! This guy made it so easy to understand, I can't thank him enough. I only wished he made more videos. Hands down, one of the best person to explain a complex theory so easily!
Anvesh
November 20, 2021
Good course on IPSEC. We can improve by adding more granular details of messages of IKE phase1 and phase2.
Andreas
September 29, 2021
Richtig cool, sehr gute Mischung aus Theorie und Praxis. Es fehlten leider die Ansätze zum Debugging und Logging falls mal etwas nicht funktioniert wie erwartet. Gerne hätte ich noch die gezeigten Slides als pdf zum ausdrucken und mit persönlichen Kommentaren zu versehen.
Cyril
August 17, 2021
Thanks for creating such great Videos. What I like is that the fundamentals are explained, so after this course I feel like i know what I do now :)
Jason
June 25, 2021
Great course, explains the IPSec protocol suite in a understandable way to learn and explains why you should make certain types of choices upon configuration.
Alec
January 24, 2021
Great course, good explanations of the concepts, great digestion of the IPsec blocks and hands-on labs for the use cases. Thank you Maher!
Rajanesh
December 30, 2020
concepts are very clearly explained, not sure why i am not getting the options here to raise my doubts
Nisar
November 2, 2020
Excellent course. Explains a fairly complex subject in an easy to understand manner. Only reason I am giving 4 instead of 5 stars is because, the need for 2 phases in IKE was not clear to me. I had to lookup some material outside this course to understand that. But overall a course I would recommend to anyone looking to get an understanding of IPSec
Ashraf
August 12, 2020
The course gave me the required knowledge I needed. Just some questions that would help to be answered if there is a section for it.
Milton
May 21, 2020
Súperbueno!!! Teoría y práctica paso a paso para entender, aprender y aplicar con criterio en el mundo real.
Ismaiel
April 16, 2020
I tested the configuration but I still receive an error message on the certificate. I reported the problem on Q&A but I have no feedback. shame
Jonathan
November 19, 2019
Thank you Maher for teaching concisely the IPsec implementation on MikroTik RouterOS. It is indeed a whole protocol suite on its own. Don't be afraid as Maher will show you where the settings based on the lecture of "ipsec theories" are located in the "winbox". The fundamentals of IPsec was explained clearly, in simple terms and segmented into bite size videos so if you happen to "forget" it can be easily reviewed. The good thing with this course is it already reflects the latest changes of done to IPsec by MikroTik in RouterOS v6.44+. Looking for other modes of VPN, check out his course VPN Tunneling Protocols on Mikrotik with Labs. I highly recommend this course to anyone interested to do IPsec on MikroTik RouterOS.

Coupons

DateDiscountStatus
6/28/202250% OFF
expired

Charts

Price

IPSEC VPN Tunnel on MikroTik - Price chart

Rating

IPSEC VPN Tunnel on MikroTik - Ratings chart

Enrollment distribution

IPSEC VPN Tunnel on MikroTik - Distribution chart

Related Topics

2625994
udemy ID
10/26/2019
course created date
11/22/2019
course indexed date
Bot
course submited by