Solved

IPSEC used to secure FTP server - What are the XP Client requitements

Posted on 2003-11-30
4
420 Views
Last Modified: 2010-08-05
Q1)

On my test network I have set-up an AD IPSEC policy for FTP traffic.  I have assigned the policy in AD to a test OU that contains a test FTP server.

Do I need to assign a policy to the XP clients to access this resource?  (Client respond only?) Or will an XP desktop automaticaly negotiate IPSEC.

Q2)

Following on from Q1 my understanding of the default policies is you set the Server policys on the resource you want to protect and then you have to assign the Client policy to the clients for them to access the protected resource, is this correct ?

Thanks
Super Play


0
Comment
Question by:superplay
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
4 Comments
 
LVL 7

Expert Comment

by:wtrmk74
ID: 9846703
make sure your IPSec Policies are set in the Group Policy
Computer Config >Admin Templates > System >  Group Policy

And add Computers to OU structure
0
 
LVL 7

Accepted Solution

by:
wtrmk74 earned 125 total points
ID: 9846756
0
 
LVL 7

Expert Comment

by:wtrmk74
ID: 9846849
Also Verify these settings match your requirements:
Computer Config >Windows Settings >Security Settings >IPSec Policies on local Machine
0
 
LVL 7

Expert Comment

by:wtrmk74
ID: 9846982
Glad everything worked out!

have a great holiday!
wtrmk74
0

Featured Post

Free eBook: Backup on AWS

Everything you need to know about backup and disaster recovery with AWS, for FREE!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
This article provides a convenient collection of links to Microsoft provided Security Patches for operating systems that have reached their End of Life support cycle. Included operating systems covered by this article are Windows XP,  Windows Server…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …

691 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question