

N4N037: IPsec Basics
Aug 28, 2025
Dive into the world of IPsec, the go-to protocol for securing internet traffic! Learn how it authenticates and encrypts communications, ensuring trust and secrecy. Discover its practical applications in SD-WAN and the challenges of key management. Explore the impact of quantum computing on encryption and the advantages of MACsec over IPsec. Unravel the complexities of integrating IPsec with NAT and tackle troubleshooting tips. This engaging discussion brings clarity to a tech essential that’s crucial for modern networking.
AI Snips
Chapters
Transcript
Episode notes
Real-World Juniper SRX Tunnel
- Holly set up an IPsec tunnel between a branch office and HQ using Juniper SRX devices across the internet.
- She configured keys and the tunnel in CLI and it worked without routing protocols being passed through.
IPsec Provides Trust And Secrecy
- IPsec adds authentication and encryption to plain IP to provide trustworthiness and secrecy.
- Use it when you need to know who you talk to and keep traffic confidential over untrusted networks.
Plan For Key Management And Overhead
- Expect added complexity: manage keys, rotate them, and maintain certificate infrastructure if you use certs.
- Factor encryption/decryption CPU cost and use hardware offload when available.