Solved

When should IPSEC be run?

Posted on 2004-08-11
4
237 Views
Last Modified: 2013-12-04
Please help with some answers.
In going over our Network design, we are organizing our Network layout.
My question is about IPSEC.

Is IPSEC  only required on the server running the IAS (Internet Authentication Service)
Or should it also be run on other servers.
If so, what are the advantages?

Any examples & or Web links would be greatly appreciated.

Thanks in advance... Michael
0
Comment
Question by:Linux_Hawk
  • 2
4 Comments
 
LVL 37

Expert Comment

by:bbao
ID: 11780708
whats your operating system?
0
 

Author Comment

by:Linux_Hawk
ID: 11783210
We are running Win 2000 & 2003 servers.
Thanks
0
 
LVL 38

Accepted Solution

by:
Rich Rumble earned 500 total points
ID: 11787416
Run an IPSEC tunnel when ever you need an encrypted tunnel between 2 or more points... typically when sensitive, or confidential information is passed over a connection often, you'd want an encrypted tunnel. Windows IPSEC isn't the same as the standard IPSEC most of us outside the windows world use- however it is compatible. M$ IPSEC also can act as a firewall, in addition to making secure connections- the firewall is by-passable however by binding your src port to port 88 (this is intended) - nonetheless it can be very effective FW.
http://support.microsoft.com/default.aspx?scid=kb;EN-US;253169 (traffic that cannot be secured with windows ipsec)
-rich


0
 
LVL 38

Expert Comment

by:Rich Rumble
ID: 11787431
oh, it can run on PC's also- anything from 2000 to xp, can run ipsec
-rich
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many people tend to confuse the function of a virus with the one of adware, this misunderstanding of the basic of what each software is and how it operates causes users and organizations to take the wrong security measures that would protect them ag…
No security measures warrant 100% as a "silver bullet". The truth is we also cannot assume anything but a defensive and vigilance posture. Adopt no trust by default and reveal in assumption. Only assume anonymity or invisibility in the reverse. Safe…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

773 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question