NAT Traversal IPSec | NAT traversal | Network address translation in Hindi | The Confused Engineer

  Рет қаралды 1,219

The Confused Engineer 😜

The Confused Engineer 😜

11 ай бұрын

In this video, we'll be discussing NAT traversal in IPSec. We'll be talking about how to NAT traversal in IPv4 and IPv6, as well as covering the theory behind it. We'll also be providing a basic example of NAT traversal in IPSec. If you're looking to understand NAT traversal in IPSec better, then this video is for you!
NAT Traversal IPSec | NAT traversal | Network address translation in Hindi
Your Queries:
Network address translation
Network address translation in Hindi
NAT
ipsec
ipsec vpn
ipsec tunnel
ipsec interview questions and answers
ipsec vpn in hindi
pat translation
hindi
----------
kali linux
linux
nmap
ssl
http
https
ssh
telnet
chargen
port
port numbers
kali
hack
hacker
hacking
cyber
cybersecurity
infosec
wireshark
tcp
filters
ip
wireshark filters
wireshark tutorial
wireshark course
wireshark tips
tcp/ip
how to use wireshark
network troubleshooting
packet analysis
packet filtering
free wireshark training
free wireshark tutorial
wireshark training
wireshark analysis
packet capture
tcp fundamentals
introduction to wireshark

Пікірлер: 4
@yuvi3678
@yuvi3678 4 ай бұрын
thanks for this type of information, it isn't easy to find things like this on youtube. can you add more questions on IPsec nat traversal, that an interviewer can ask
@the-confused-engineer
@the-confused-engineer 4 ай бұрын
Thanks Yuvi ☺️ Sure, I will make more such videos on ipsec and nat traversal.
@techlearner4806
@techlearner4806 5 ай бұрын
Hi Admin. I took last two characters of HASH in above captures in my next query. Please check all references (which HASH I referenced for what) very carefully. So, in above captures, hash values are c6 (for source IP and source port) and c9 (for destination IP and destination port) in message 3. These values are from sender side. But other side which is receiver side sending HASH values in message 4, calculated HASH are 6f (for source IP and source port) and c6 (for destination IP and destination port). Now value C6 is common. It means source IP and source port HASH of sender side doesn't changed along the path. But HASH of destination IP and destination port was changed (destination HASH from the perspective of sender or we can say source HASH as well from the perspective of receiver). So, this is the reason that why in your displayed captures, ports are switched from 500 to 4500. Am I correct in my understanding? Please do some research on above and let me know the correct answer. Also, please let me know if any additional information required from my side to resolve above query. Thanks in advance.
@the-confused-engineer
@the-confused-engineer 5 ай бұрын
You are correct. The port 500 changed to 4500 because there was a NAT device in between ( specifically PAT device). You see only destination port changed, but actually PAT device makes a separate mapping to a random source port number, so that it can send the response traffic back to source. That mapping would be visible to the admin of the PAT device.
IPSEC Basics | Introduction | HINDI
34:22
The Confused Engineer 😜
Рет қаралды 2,3 М.
NAT Explained - Network Address Translation with example in Hindi
9:09
Tech Guru Manjit
Рет қаралды 11 М.
ПРОВЕРИЛ АРБУЗЫ #shorts
00:34
Паша Осадчий
Рет қаралды 7 МЛН
Best Toilet Gadgets and #Hacks you must try!!💩💩
00:49
Poly Holy Yow
Рет қаралды 22 МЛН
02 About Git
6:26
Networking & Information Technology
Рет қаралды 10
NAT Traversal for IPSec
5:44
Cyber Security Entertainment
Рет қаралды 17 М.
EXPLINATION OF IP 4 HEADER
8:10
CODING WITH MR H
Рет қаралды 3
IKEv1 V/S IKEv2 | Version of IKE (Internet Key Exchange) [IPSEC]
1:43
Check Point  NAT-T
6:01
CP_Tech_Solution
Рет қаралды 3,6 М.
Это - iPhone 16!
16:29
Rozetked
Рет қаралды 419 М.
iPhone socket cleaning #Fixit
0:30
Tamar DB (mt)
Рет қаралды 18 МЛН