Solved

When should IPSEC be run?

Posted on 2004-08-11
4
240 Views
Last Modified: 2013-12-04
Please help with some answers.
In going over our Network design, we are organizing our Network layout.
My question is about IPSEC.

Is IPSEC  only required on the server running the IAS (Internet Authentication Service)
Or should it also be run on other servers.
If so, what are the advantages?

Any examples & or Web links would be greatly appreciated.

Thanks in advance... Michael
0
Comment
Question by:Linux_Hawk
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 37

Expert Comment

by:bbao
ID: 11780708
whats your operating system?
0
 

Author Comment

by:Linux_Hawk
ID: 11783210
We are running Win 2000 & 2003 servers.
Thanks
0
 
LVL 38

Accepted Solution

by:
Rich Rumble earned 500 total points
ID: 11787416
Run an IPSEC tunnel when ever you need an encrypted tunnel between 2 or more points... typically when sensitive, or confidential information is passed over a connection often, you'd want an encrypted tunnel. Windows IPSEC isn't the same as the standard IPSEC most of us outside the windows world use- however it is compatible. M$ IPSEC also can act as a firewall, in addition to making secure connections- the firewall is by-passable however by binding your src port to port 88 (this is intended) - nonetheless it can be very effective FW.
http://support.microsoft.com/default.aspx?scid=kb;EN-US;253169 (traffic that cannot be secured with windows ipsec)
-rich


0
 
LVL 38

Expert Comment

by:Rich Rumble
ID: 11787431
oh, it can run on PC's also- anything from 2000 to xp, can run ipsec
-rich
0

Featured Post

Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Recently, a new law in my state forced us to get a top-to-bottom analysis of all of our contract client's networks. While we have documentation, it was spotty at best for some - and in any event it needed to be checked against reality. That was m…
OfficeMate Freezes on login or does not load after login credentials are input.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Finding and deleting duplicate (picture) files can be a time consuming task. My wife and I, our three kids and their families all share one dilemma: Managing our pictures. Between desktops, laptops, phones, tablets, and cameras; over the last decade…

730 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question