Udemy
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Development
Web Development Data Science Mobile Development Programming Languages Game Development Database Design & Development Software Testing Software Engineering Development Tools No-Code Development
Business
Entrepreneurship Communications Management Sales Business Strategy Operations Project Management Business Law Business Analytics & Intelligence Human Resources Industry E-Commerce Media Real Estate Other Business
Finance & Accounting
Accounting & Bookkeeping Compliance Cryptocurrency & Blockchain Economics Finance Finance Cert & Exam Prep Financial Modeling & Analysis Investing & Trading Money Management Tools Taxes Other Finance & Accounting
IT & Software
IT Certification Network & Security Hardware Operating Systems Other IT & Software
Office Productivity
Microsoft Apple Google SAP Oracle Other Office Productivity
Personal Development
Personal Transformation Personal Productivity Leadership Career Development Parenting & Relationships Happiness Esoteric Practices Religion & Spirituality Personal Brand Building Creativity Influence Self Esteem & Confidence Stress Management Memory & Study Skills Motivation Other Personal Development
Design
Web Design Graphic Design & Illustration Design Tools User Experience Design Game Design Design Thinking 3D & Animation Fashion Design Architectural Design Interior Design Other Design
Marketing
Digital Marketing Search Engine Optimization Social Media Marketing Branding Marketing Fundamentals Marketing Analytics & Automation Public Relations Advertising Video & Mobile Marketing Content Marketing Growth Hacking Affiliate Marketing Product Marketing Other Marketing
Lifestyle
Arts & Crafts Beauty & Makeup Esoteric Practices Food & Beverage Gaming Home Improvement Pet Care & Training Travel Other Lifestyle
Photography & Video
Digital Photography Photography Portrait Photography Photography Tools Commercial Photography Video Design Other Photography & Video
Health & Fitness
Fitness General Health Sports Nutrition Yoga Mental Health Dieting Self Defense Safety & First Aid Dance Meditation Other Health & Fitness
Music
Instruments Music Production Music Fundamentals Vocal Music Techniques Music Software Other Music
Teaching & Academics
Engineering Humanities Math Science Online Education Social Science Language Teacher Training Test Prep Other Teaching & Academics
AWS Certification Microsoft Certification AWS Certified Solutions Architect - Associate AWS Certified Cloud Practitioner CompTIA A+ Cisco CCNA Amazon AWS CompTIA Security+ AWS Certified Developer - Associate
Photoshop Graphic Design Adobe Illustrator Drawing Digital Painting InDesign Character Design Canva Figure Drawing
Life Coach Training Neuro-Linguistic Programming Mindfulness Personal Development Meditation Personal Transformation Life Purpose Neuroscience Emotional Intelligence
Web Development JavaScript React CSS Angular PHP WordPress Node.Js Python
Google Flutter Android Development iOS Development Swift React Native Dart Programming Language Mobile Development Kotlin SwiftUI
Digital Marketing Google Ads (Adwords) Social Media Marketing Google Ads (AdWords) Certification Marketing Strategy Internet Marketing YouTube Marketing Email Marketing Retargeting
SQL Microsoft Power BI Tableau Business Analysis Business Intelligence MySQL Data Analysis Data Modeling Data Science
Business Fundamentals Entrepreneurship Fundamentals Business Strategy Online Business Business Plan Startup Freelancing Blogging Home Business
Unity Game Development Fundamentals Unreal Engine C# 3D Game Development C++ 2D Game Development Unreal Engine Blueprints Blender
30-Day Money-Back Guarantee
IT & Software Network & Security MikroTik

IPSEC VPN Tunnel on MikroTik

Understand how IPSEC tunneling protocol works and know how to apply it correctly on MikroTik RouterOS
Bestseller
Rating: 4.6 out of 54.6 (135 ratings)
588 students
Created by Maher Haddad
Last updated 11/2019
English
English [Auto]
30-Day Money-Back Guarantee

What you'll learn

  • Understand what is VPN
  • Understand what is IPSEC
  • Understand the 4 features of IPSEC
  • Understand why IPSEC is a protocol suite
  • Understand the Protocols used in the IPSEC features
  • Understand IPSEC modes of communications
  • Understand IPSEC Transport mode
  • Understand IPSEC Tunnel mode
  • Understand what is Symmetric key encryption
  • Understand what is Asymmetric key encryption
  • Understand how DH works to share the secret key in a secure way
  • Understand the encryption protocols such as: DES, 3DES, AES, Blowfish, Camellia, RSA & DH
  • Understand Data Integrity using Hashing algorithms such as: MD5, SHA1, SHA256, SHA512
  • Understand the types of IPSEC authentication: Pre-shared key vs Certificate
  • Understand IPSEC Negotiation Protocols: AH vs ESP
  • Understand the IPSEC negotiation process
  • Understand what is the initiator to start the IPSEC VPN
  • Understand IKE Phase 1 (ISAKMP)
  • Understand the difference between Main and Aggressive mode on IKE Phase 1
  • Understand IKE Phase 2
  • Understand what is PFS Group
  • Understand the difference between IKEv1 & IKEv2
  • Configuring IPSEC site-to-site using IKEv1
  • Configuring IPSEC site-to-site using IKEv2
  • Configure IPSEC IKv2 Remote Access using certificates
Curated for the Udemy for Business collection

Requirements

  • Have a TCP/IP knowledge
  • Have an experience with networking
  • Ideally have an MTCNA certificate

Description

Internet Protocol Security, or what is known as IPSEC, is a VPN protocol suite widely used nowadays in our network to connect 2 or more offices securely to each other using the public internet service, and this will save for companies a lot of cost and time instead of using dedicated leased lines between their offices.

However, configuring IPSEC correctly is a challenge because IPSEC is considered as a Framework protocol which has many sub-protocols and phases under its umbrella.

I have designed this course to help you to understand how IPSEC works, that means that big part of this course is going to be a theoretical part explaining in details all parts of IPSEC. During this course, I will explain also about a lot of security terms that we always hear and is used on IPSEC such as: Encryption, Hashing, Authentication, Deffie-Hellman, Symmetric and Asymmetric keys, etc.....

After the theoretical part, I am going to do LABs where I will show you how to configure correctly IPSEC on MikroTik Routers and we will test it to see if it works good. The LABs will include both versions of IPSEC which are IKEv1 and IKEv2.

That's in brief what I am going to do in this course, of course more details will be shown in the lessons.

I can't wait to see you in my course .

Who this course is for:

  • Students who want to learn and understand how IPSEC works and know how to configure it on MikroTik RouterOS
  • Engineers who want to apply IPSEC tunneling protocol in their networks

Course content

5 sections • 26 lectures • 3h 34m total length

  • Preview02:07
  • What is VPN? - Explanation
    09:24

  • What is IPSEC? - Intro
    01:37
  • What is IPSEC? - Explanation
    09:10
  • IPSEC Protocol suite - Explained
    05:15
  • IPSEC modes of communication - Transport vs Tunnel mode
    08:16
  • Types of Encryption - Symmetric vs Asymmetric
    05:57
  • Security over the internet using IPSEC
    14:47
  • Preview15:30
  • Data Integrity - Hashing Algorithms (MD5 - SHA1 - SHA256 - SHA512)
    08:52
  • IPSEC Authentication (Pre-shared key vs Certificates)
    08:47
  • IPSEC Negotiation Protocols (AH vs ESP)
    08:10

  • IPSEC Negotiation Process - Introduction
    01:00
  • IPSEC Negotiation Process and choices of IPSEC interesting traffic
    09:04
  • IPSEC IKE Phase 1 (ISAKMP Tunnel)
    08:40
  • IPSEC IKE Phase 1 (Main vs Aggressive mode)
    05:42
  • IPSEC IKE Phase 2 (IPSEC Tunnel)
    07:03
  • IPSEC Data Transfer
    02:59
  • Difference between IKEv1 and IKEv2
    05:45

  • Introduction to the IPSEC LAB
    01:27
  • Pre-configuration of the IPSEC Tunnel
    16:28
  • Configuring site-to-site IPSEC tunnel using IKEv1 & IKEv2 - Part1
    21:00
  • Configuring site-to-site IPSEC tunnel using IKEv1 & IKEv2 - Part2
    07:03

  • Introduction to IPSEC IKEv2 Remote Access
    01:30
  • Creating certificates for remote access IPSEC
    14:38
  • Configuring IPSEC IKEv2 remote access
    14:32

Instructor

Maher Haddad
IT instructor
Maher Haddad
  • 4.6 Instructor Rating
  • 6,361 Reviews
  • 49,395 Students
  • 47 Courses

Hello everyone. My name is Maher Haddad with a very long experience in the IT sector. I hold a Bachelor in Computer Communications and a Master in Computer science. 

I work as a trainer and I hold the following certificates: CCNA, CCNA Security, CCNA Voice, CCDA, CCNP R&S, CCDP,  Microsoft MCP, Microsoft MCSA , MikroTik MTCNA & MTCRE, MTCWE, MTCUME, MTCTCE, MTCINE, MTCSE, Huawei HCNA, CWTS, LigoWave NFT engineer, LigoWave DLB Engineer, Fortinet NSE1, Fortinet NSE2,  GVF Level1, GVF level2, GVF Level3 and much more.....

My experience in IT goes to year 2003 and I have been working all my life for international Internet Service Providers (ISP's) in different countries in the world.

You can visit my Facebook page as well as my YouTube channel where I set a lot of online labs.

I hope you will enjoy watching my courses.


  • Udemy for Business
  • Teach on Udemy
  • Get the app
  • About us
  • Contact us
  • Careers
  • Blog
  • Help and Support
  • Affiliate
  • Terms
  • Privacy policy
  • Cookie settings
  • Sitemap
  • Featured courses
Udemy
© 2021 Udemy, Inc.