Posts

Showing posts from November, 2009

IPsec, and IPsec over GRE Tunnel

Image
Intro Most of enterprise today move to IPsec over GRE tunnel to save cost, but I'm not saying that this technology already rule out MPLS, lease line, etc. It depend on that site, how critical it is, how stable the internet connection is. Usually small office like sales that only have few workers use this to connect to corporate LAN. IPsec and GRE Tunnel is 2 different thing, we'll go with IPsec first, then brief about GRE then I'll give you an example of IPsec over GRE tunnel IPsec The three main point of IPsec is Authentication Data Integrity Confidentiality Authentication to make sure you communicating or talking to the right person Data Integrity to make sure what you sending is received at the destination with the same shape, mean no modification happen along the way confidentiality to make sure what send not able to be seen by third party What build an IPsec ? Basically, IPsec is a combo of a few protocol Negotiation : IKE Security : AH, ES...

First Post

I work for a giant microprocessor company as a network engineer. Our network infrastructure are very complex, but the problem is my knowledge and experience are not that complex (I'm a fresh grad). so i must do something about this, and i decided to start blogging about network technologies and set a target; to become a CCIE certified !! well, this is where i coming from, and see you on next post ;-)