YoVDO

Opportunistic Encryption Using IPsec - Implementation and Configuration

Offered By: Linux Foundation via YouTube

Tags

Network Security Courses VPN Courses Cloud Security Courses IPsec Courses DNSSec Courses x.509 Certificates Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore opportunistic encryption using IPsec in this informative conference talk by Paul Wouters from the Libreswan IPsec VPN Project. Discover how the libreswan IKE daemon leverages XFRM code to encrypt host traffic and integrate with DNS calls for enhanced security. Learn about various authentication mechanisms, including X.509 certificates, GSSAPI, and DNSSEC secured IPSECKEY records, and their applications in enterprise, cloud, and internet-wide deployments. Follow along as Wouters demonstrates the configuration of Opportunistic IPsec for X.509-based cloud deployment and internet-wide implementation using LetsEncrypt. Gain insights into IPsec's history, Libreswan's role, and the Linux implementation of IPsec. Delve into topics such as anonymous IPsec, internal configuration, and server setup through a comprehensive demo and feature overview.

Syllabus

Intro
What is IPsec
History of IPsec
What is Libreswan
What happened to IPsec
John Gilmour gave up
IPsec v2
NSA
Linux Implementation
Opportunistic Encryption
The Problem
Configuration
Internal Configuration
Anonymous IPsec
Lets Encrypt
Demo
Server config
Features


Taught by

Linux Foundation

Tags

Related Courses

Microsoft Azure Solutions Architect: Implement a Virtual Networking Strategy
Pluralsight
Cisco Network Security: VPN
LinkedIn Learning
Virtual Private Networks for beginners - VPN, Cisco training
Udemy
Cisco Enterprise Networks: Troubleshooting BGP and GRE Tunnels
Pluralsight
Windows 10 Configuring (70-697): Configure Networking
Pluralsight