The Everything Feed - All Packet Pushers Pods

N4N037: IPsec Basics

15 snips
Aug 28, 2025
Ethan and Holly dive into the world of IPsec, unraveling how it encrypts and authenticates traffic for secure communications. They discuss its pivotal role in protecting data against threats like man-in-the-middle attacks. The complexities of encryption and key management are unveiled, alongside the evolving challenges posed by quantum computing. The podcast also touches on practical applications in SD-WAN and tackles issues like Network Address Translation. Listeners gain insights into the practical setup and nuances of IPsec’s operation in real-world scenarios.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
ANECDOTE

Juniper SRX Office-To-Office Tunnel

  • Holly described building a Juniper-to-Juniper IPsec tunnel between a branch and HQ without routing protocols.
  • The tunnel carried layer-2 style traffic and simply worked after CLI key configuration.
INSIGHT

IPsec Provides Trust And Optional Secrecy

  • IPsec adds trustworthiness and secrecy to IP traffic by providing authentication and encryption.
  • Use it when you need endpoints to know who they're talking to and optionally keep payloads secret.
ADVICE

Plan For Keys And Crypto Overhead

  • Consider the operational cost: key management, certificate rotation, and CPU for encryption.
  • Use hardware crypto offloads or certificates to reduce CPU burden and simplify rotation practices.
Get the Snipd Podcast app to discover more snips from this episode
Get the app