This preview shows pages 1–3. Sign up to view the full content.
This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: S tephen Coates J r T uesday, September 21, 2010 Activity 11-6
The rules that are configured on the computer are as followed<All I T raffic>, <All ICMP Traffic>, <Dynamic>. Connection type: 1) All Network connection 2) Local area network (LAN) 3) Remote access F i lter Action: 1) Permit 2) Request security (optional) 3) Request security Authentication Methods:
1) Kerberos Tunnel setting: 1) This rule not specify an IPSec tunnel 2) The tunnel endpoint is specified by this IP address I P F i lter L ist: 1) All ICMP Traffic 2) All IP Traffic I PSec-is a protocol suite for securing Internet Protocol (IP) communications
• • Client -responds by using IPSec communication Server –if the responding client does not support IPSec, w indows server switches to the clear mode, which does not employ IPSec • Secure Server - T his means that announcement using any account and with any client is secured thought authoritarian I PSec enforcement. I PSec
• What? I P Security- A set of IP-based Secure communications a nd encryption standards developed by the Internet E ngineering Task Force (IETF) and used to protect network communications through IP. • Who? I nternet Engineering Task Force • Roles? C lient, Server, Secure Server ...
View Full Document
This document was uploaded on 12/07/2010.
- Spring '09