Activity 11.6 - S tephen Coates J r T uesday, September 21,...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: S tephen Coates J r T uesday, September 21, 2010 Activity 11-6 The rules that are configured on the computer are as followed<All I T raffic>, <All ICMP Traffic>, <Dynamic>. Connection type: 1) All Network connection 2) Local area network (LAN) 3) Remote access F i lter Action: 1) Permit 2) Request security (optional) 3) Request security Authentication Methods: 1) Kerberos Tunnel setting: 1) This rule not specify an IPSec tunnel 2) The tunnel endpoint is specified by this IP address I P F i lter L ist: 1) All ICMP Traffic 2) All IP Traffic I PSec-is a protocol suite for securing Internet Protocol (IP) communications • • Client -responds by using IPSec communication Server –if the responding client does not support IPSec, w indows server switches to the clear mode, which does not employ IPSec • Secure Server - T his means that announcement using any account and with any client is secured thought authoritarian I PSec enforcement. I PSec • What? I P Security- A set of IP-based Secure communications a nd encryption standards developed by the Internet E ngineering Task Force (IETF) and used to protect network communications through IP. • Who? I nternet Engineering Task Force • Roles? C lient, Server, Secure Server ...
View Full Document

This document was uploaded on 12/07/2010.

Page1 / 3

Activity 11.6 - S tephen Coates J r T uesday, September 21,...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online