Solved

How to configure a Win2000 box for only allowing ICMP requests from specific LAN with IPSEC?

Posted on 2004-08-16
7
186 Views
Last Modified: 2010-04-14
I'd like to create an IPSEC policy that will block all ICMP traffic except from the specific LAN.

for example

only allowing icmp requests from 192.168.1.64/26.
Allowing icmp requests to any IP address

Thanks in advance

Jerry
0
Comment
Question by:Jerryleo
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
7 Comments
 
LVL 9

Accepted Solution

by:
jdeclue earned 25 total points
ID: 11812989
Without running a software based firewall on the Server itself, I am not aware of any way to make a Windows 2000 server do what you ask. You may be able to create some type of rules in your Switch, etc... from the network side.

J
0
 
LVL 5

Assisted Solution

by:dgroscost
dgroscost earned 25 total points
ID: 11814516
Do this on the router level...
0
 
LVL 9

Expert Comment

by:jdeclue
ID: 11911884
Could you please give us an update as to the question, and/or close it please. Thank You ;)

J
0
 
LVL 9

Expert Comment

by:jdeclue
ID: 12362962
I gave a correct answer to the question and dgroscost gave good advice... split

J
0

Featured Post

Comparison of Amazon Drive, Google Drive, OneDrive

What is Best for Backup: Amazon Drive, Google Drive or MS OneDrive? In this free whitepaper we look at their performance, pricing, and platform availability to help you decide which cloud drive is right for your situation. Download and read the results of our testing for free!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
Popular third-party chat platforms like Slack, Discord, and Telegram are just a few of the many new productivity applications that are being hijacked by cybercriminals to create command-and-control (C&C) communications infrastructures for their malw…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
If you’ve ever visited a web page and noticed a cool font that you really liked the look of, but couldn’t figure out which font it was so that you could use it for your own work, then this video is for you! In this Micro Tutorial, you'll learn yo…

687 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question