[Okta Webinar] Learn how to a build a cloud-first strategyRegister Now


Forest Trust via IPSEC

Posted on 2007-11-20
Medium Priority
Last Modified: 2012-05-05
Looking for information on how to create a trust between 2 seperate forest using ipsec. Firewalls seperate the forests and I do not want to open the convential ports to allow a trust.
Question by:58872
LVL 48

Expert Comment

ID: 20323852
you cant create a trust without opening up the trust required ports
LVL 19

Accepted Solution

SteveH_UK earned 2000 total points
ID: 20342043
You can do this but only if you use a gateway-to-gateway vpn.

This can be completed using most enterprise firewalls, including ISA Server and GnatBox (GTA).

The traffic is encrypted between the gateways but acts normally from the servers' perspective.

Author Closing Comment

ID: 31410127

Expert Comment

ID: 33556654
what are the trust required ports ?

i want to open that trust required ports into this current setup : ipsec using juniper and cisco asa.. please let me know how to do it.. many thanks

Featured Post

Has Powershell sent you back into the Stone Age?

If managing Active Directory using Windows Powershell® is making you feel like you stepped back in time, you are not alone.  For nearly 20 years, AD admins around the world have used one tool for day-to-day AD management: Hyena. Discover why.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Had a business requirement to store the mobile number in an environmental variable. This is just a quick article on how this was done.
High user turnover can cause old/redundant user data to consume valuable space. UserResourceCleanup was developed to address this by automatically deleting user folders when the user account is deleted.
This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

873 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question