Forest Trust via IPSEC

Posted on 2007-11-20
Medium Priority
Last Modified: 2012-05-05
Looking for information on how to create a trust between 2 seperate forest using ipsec. Firewalls seperate the forests and I do not want to open the convential ports to allow a trust.
Question by:58872
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
LVL 48

Expert Comment

ID: 20323852
you cant create a trust without opening up the trust required ports
LVL 19

Accepted Solution

SteveH_UK earned 2000 total points
ID: 20342043
You can do this but only if you use a gateway-to-gateway vpn.

This can be completed using most enterprise firewalls, including ISA Server and GnatBox (GTA).

The traffic is encrypted between the gateways but acts normally from the servers' perspective.

Author Closing Comment

ID: 31410127

Expert Comment

ID: 33556654
what are the trust required ports ?

i want to open that trust required ports into this current setup : ipsec using juniper and cisco asa.. please let me know how to do it.. many thanks

Featured Post

On Demand Webinar: Networking for the Cloud Era

Ready to improve network connectivity? Watch this webinar to learn how SD-WANs and a one-click instant connect tool can boost provisions, deployment, and management of your cloud connection.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Here's a look at newsworthy articles and community happenings during the last month.
After seeing many questions for JRNL_WRAP_ERROR for replication failure, I thought it would be useful to write this article.
Are you ready to implement Active Directory best practices without reading 300+ pages? You're in luck. In this webinar hosted by Skyport Systems, you gain insight into Microsoft's latest comprehensive guide, with tips on the best and easiest way…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question