

N4N037: IPsec Basics
15 snips Aug 28, 2025
Ethan and Holly dive into the world of IPsec, unraveling how it encrypts and authenticates traffic for secure communications. They discuss its pivotal role in protecting data against threats like man-in-the-middle attacks. The complexities of encryption and key management are unveiled, alongside the evolving challenges posed by quantum computing. The podcast also touches on practical applications in SD-WAN and tackles issues like Network Address Translation. Listeners gain insights into the practical setup and nuances of IPsec’s operation in real-world scenarios.
AI Snips
Chapters
Transcript
Episode notes
Juniper SRX Office-To-Office Tunnel
- Holly described building a Juniper-to-Juniper IPsec tunnel between a branch and HQ without routing protocols.
- The tunnel carried layer-2 style traffic and simply worked after CLI key configuration.
IPsec Provides Trust And Optional Secrecy
- IPsec adds trustworthiness and secrecy to IP traffic by providing authentication and encryption.
- Use it when you need endpoints to know who they're talking to and optionally keep payloads secret.
Plan For Keys And Crypto Overhead
- Consider the operational cost: key management, certificate rotation, and CPU for encryption.
- Use hardware crypto offloads or certificates to reduce CPU burden and simplify rotation practices.