Solved

When should IPSEC be run?

Posted on 2004-08-11
4
241 Views
Last Modified: 2013-12-04
Please help with some answers.
In going over our Network design, we are organizing our Network layout.
My question is about IPSEC.

Is IPSEC  only required on the server running the IAS (Internet Authentication Service)
Or should it also be run on other servers.
If so, what are the advantages?

Any examples & or Web links would be greatly appreciated.

Thanks in advance... Michael
0
Comment
Question by:Linux_Hawk
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 37

Expert Comment

by:bbao
ID: 11780708
whats your operating system?
0
 

Author Comment

by:Linux_Hawk
ID: 11783210
We are running Win 2000 & 2003 servers.
Thanks
0
 
LVL 38

Accepted Solution

by:
Rich Rumble earned 500 total points
ID: 11787416
Run an IPSEC tunnel when ever you need an encrypted tunnel between 2 or more points... typically when sensitive, or confidential information is passed over a connection often, you'd want an encrypted tunnel. Windows IPSEC isn't the same as the standard IPSEC most of us outside the windows world use- however it is compatible. M$ IPSEC also can act as a firewall, in addition to making secure connections- the firewall is by-passable however by binding your src port to port 88 (this is intended) - nonetheless it can be very effective FW.
http://support.microsoft.com/default.aspx?scid=kb;EN-US;253169 (traffic that cannot be secured with windows ipsec)
-rich


0
 
LVL 38

Expert Comment

by:Rich Rumble
ID: 11787431
oh, it can run on PC's also- anything from 2000 to xp, can run ipsec
-rich
0

Featured Post

IoT Devices - Fast, Cheap or Secure…Pick Two

The IoT market is growing at a rapid pace and manufacturers are under pressure to quickly provide new products. Can you be sure that your devices do what they're supposed to do, while still being secure?

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
The term "Bad USB" is a buzz word that is usually used when talking about attacks on computer systems that involve USB devices. In this article, I will show what possibilities modern windows systems (win8.x and win10) offer to fight these attacks wi…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
Suggested Courses

617 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question