Solved

Windows 2000 VPN Encryption Question

Posted on 2004-09-03
4
223 Views
Last Modified: 2010-04-11
Quick question for anyone who's up for it.  I have a Windows 2000 Pro machine setup to accept incoming VPN connections.  It works great.  However, I've noticed an option for "require all users to secure their passwords and data."  

I did a little looking around on google and found this means it is requiring an encrypted connection.  Does anyone know the specs of this encryption?  

Thanks...
0
Comment
Question by:alanteigne
4 Comments
 
LVL 3

Accepted Solution

by:
SBPCGuru earned 125 total points
ID: 11978029
This should explain the two different types of encryption:
http://www.winnetmag.com/Web/Article/ArticleID/23275/23275.html
0
 
LVL 37

Assisted Solution

by:Bing CISM / CISSP
Bing CISM / CISSP earned 125 total points
ID: 11978559
1. PPTP: Point-to-Point Tunneling Protocol

A technology developed by Microsoft, US Robotics, and others to enable Virtual Private Networks (VPN) to work securely over the Internet without exposing their communications to intercept. It is currently available only to Windows NT and linux networks. As of June 2, 1998, security flaws have been revealed in Windows NT, which make it much less secure than previously believed.

2. L2TP with IPSec: Layer 2 Tunneling Protocol with IP Security

L2TP is a combination of Microsoft's PPTP and Cisco's L2F. L2TP is a network protocol and it can send encapsulated PPP packets over IP, x.25, frame relay or ATM networks.

Internet Protocol Security. IPSec uses encryption technology to provide data confidentiality, integrity, and authenticity between participating peers in a private network. IPSec provides two choices of security services: Authentication Header (AH), which essentially allows authentication of the sender of data, and Encapsulating Security Payload (ESP), which supports both authentication of the sender and encryption of data as well. The specific information associated with each of these services is inserted into the packet in a header that follows the IP packet header.

hope it helps,
bbao
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

Suggested Solutions

Even if you have implemented a Mobile Device Management solution company wide, it is a good idea to make sure you are taking into account all of the major risks to your electronic protected health information (ePHI).
If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now