[Last Call] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

Secure server IPSec policy between 2 XP machines

Posted on 2009-04-02
3
Medium Priority
?
342 Views
Last Modified: 2013-12-04
I have set up an IPSec policy that requires traffic from one PC (A) to another (B) use a secure connection (filter set to require security, negotiate security). This policy is applied to PC B.
The result is that no trafiic at all appears to pass between PC's A & B. I am unable to connect to a share on PC B from PC A, and when a ping is attempted I see 'Negotiaiting IP Security' as the 4 ping responses.
I need to get an understanding of how IPSec works before moving on to a larger project, so if anyone can explain why the two XP PC's cannot negotiate security I'd appreciate it.
Also, if you have tips on tools to use to troubleshoot IPSec I'd appreciate it (I'm using the IPSec monitor mmc).
0
Comment
Question by:agradmin
  • 2
3 Comments
 
LVL 31

Accepted Solution

by:
Toni Uranjek earned 2000 total points
ID: 24049085
Hi!

You have to enable IPsec policy on PC A also. Assign Client (respond only) to PC A to enable communications with PC B. Because you have used Secure Server (require security) PC B will only communicate with computers which can use IPSec.

HTH

Toni
0
 
LVL 1

Author Comment

by:agradmin
ID: 24049184
Thanks, I'll try that. I was wondering that myself, but documentation seems to imply that if a device is IPSec-able it would work, which would apply in this case.
0
 
LVL 1

Author Closing Comment

by:agradmin
ID: 31565754
Solution works fine.
0

Featured Post

New Tabletop Appliances Blow Competitors Away!

WatchGuard’s new T15, T35 and T55 tabletop UTMs provide the highest-performing security inspection in their class, allowing users at small offices, home offices and distributed enterprises to experience blazing-fast Internet speeds without sacrificing enterprise-grade security.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

An overview of cyber security, cyber crime, and personal protection against hackers. Includes a brief summary of the Equifax breach and why everyone should be aware of it. Other subjects include: how cyber security has failed to advance with technol…
Ransomware - Defeated! Client opened the wrong email and was attacked by Ransomware. I was able to use file recovery utilities to find shadow copies of the encrypted files and make a complete recovery.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

834 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question