casvirtual.blogg.se

Mikrotik routeros ipsec tunnel configuration
Mikrotik routeros ipsec tunnel configuration











mikrotik routeros ipsec tunnel configuration

During this course, I will explain also about a lot of security terms that we always hear and is used on IPSEC such as: Encryption, Hashing, Authentication, Deffie-Hellman, Symmetric and Asymmetric keys, etc.Īfter the theoretical part, I am going to do LABs where I will show you how to configure correctly IPSEC on MikroTik Routers and we will test it to see if it works good. I have designed this course to help you to understand how IPSEC works, that means that big part of this course is going to be a theoretical part explaining in details all parts of IPSEC. However, configuring IPSEC correctly is a challenge because IPSEC is considered as a Framework protocol which has many sub-protocols and phases under its umbrella. Internet Protocol Security, or what is known as IPSEC, is a VPN protocol suite widely used nowadays in our network to connect 2 or more offices securely to each other using the public internet service, and this will save for companies a lot of cost and time instead of using dedicated leased lines between their offices. Configuring IPSEC site-to-site using IKEv2.Configuring IPSEC site-to-site using IKEv1.Understand the difference between IKEv1 & IKEv2.

mikrotik routeros ipsec tunnel configuration

Understand the difference between Main and Aggressive mode on IKE Phase 1.Understand what is the initiator to start the IPSEC VPN.

mikrotik routeros ipsec tunnel configuration

Understand the IPSEC negotiation process.Understand IPSEC Negotiation Protocols: AH vs ESP.

mikrotik routeros ipsec tunnel configuration

  • Understand the types of IPSEC authentication: Pre-shared key vs Certificate.
  • Understand Data Integrity using Hashing algorithms such as: MD5, SHA1, SHA256, SHA512.
  • Understand the encryption protocols such as: DES, 3DES, AES, Blowfish, Camellia, RSA & DH.
  • Understand how DH works to share the secret key in a secure way.
  • Understand what is Asymmetric key encryption.
  • Understand what is Symmetric key encryption.
  • Understand IPSEC modes of communications.
  • Understand the Protocols used in the IPSEC features.
  • Understand why IPSEC is a protocol suite.












  • Mikrotik routeros ipsec tunnel configuration