Solved

Windows 2000 VPN Encryption Question

Posted on 2004-09-03
4
224 Views
Last Modified: 2010-04-11
Quick question for anyone who's up for it.  I have a Windows 2000 Pro machine setup to accept incoming VPN connections.  It works great.  However, I've noticed an option for "require all users to secure their passwords and data."  

I did a little looking around on google and found this means it is requiring an encrypted connection.  Does anyone know the specs of this encryption?  

Thanks...
0
Comment
Question by:alanteigne
4 Comments
 
LVL 3

Accepted Solution

by:
SBPCGuru earned 125 total points
ID: 11978029
This should explain the two different types of encryption:
http://www.winnetmag.com/Web/Article/ArticleID/23275/23275.html
0
 
LVL 37

Assisted Solution

by:Bing CISM / CISSP
Bing CISM / CISSP earned 125 total points
ID: 11978559
1. PPTP: Point-to-Point Tunneling Protocol

A technology developed by Microsoft, US Robotics, and others to enable Virtual Private Networks (VPN) to work securely over the Internet without exposing their communications to intercept. It is currently available only to Windows NT and linux networks. As of June 2, 1998, security flaws have been revealed in Windows NT, which make it much less secure than previously believed.

2. L2TP with IPSec: Layer 2 Tunneling Protocol with IP Security

L2TP is a combination of Microsoft's PPTP and Cisco's L2F. L2TP is a network protocol and it can send encapsulated PPP packets over IP, x.25, frame relay or ATM networks.

Internet Protocol Security. IPSec uses encryption technology to provide data confidentiality, integrity, and authenticity between participating peers in a private network. IPSec provides two choices of security services: Authentication Header (AH), which essentially allows authentication of the sender of data, and Encapsulating Security Payload (ESP), which supports both authentication of the sender and encryption of data as well. The specific information associated with each of these services is inserted into the packet in a header that follows the IP packet header.

hope it helps,
bbao
0

Featured Post

Scale it in WD Gold

With up to ten times the workload capacity of desktop drives, WD Gold hard drives employ advanced technology to deliver among the best in reliability, capacity, power efficiency and performance.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
When you try to share a printer , you may receive one of the following error messages. Error message when you use the Add Printer Wizard to share a printer: Windows could not share your printer. Operation could not be completed (Error 0x000006…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now