?
Solved

Secure server IPSec policy between 2 XP machines

Posted on 2009-04-02
3
Medium Priority
?
331 Views
Last Modified: 2013-12-04
I have set up an IPSec policy that requires traffic from one PC (A) to another (B) use a secure connection (filter set to require security, negotiate security). This policy is applied to PC B.
The result is that no trafiic at all appears to pass between PC's A & B. I am unable to connect to a share on PC B from PC A, and when a ping is attempted I see 'Negotiaiting IP Security' as the 4 ping responses.
I need to get an understanding of how IPSec works before moving on to a larger project, so if anyone can explain why the two XP PC's cannot negotiate security I'd appreciate it.
Also, if you have tips on tools to use to troubleshoot IPSec I'd appreciate it (I'm using the IPSec monitor mmc).
0
Comment
Question by:agradmin
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 31

Accepted Solution

by:
Toni Uranjek earned 2000 total points
ID: 24049085
Hi!

You have to enable IPsec policy on PC A also. Assign Client (respond only) to PC A to enable communications with PC B. Because you have used Secure Server (require security) PC B will only communicate with computers which can use IPSec.

HTH

Toni
0
 

Author Comment

by:agradmin
ID: 24049184
Thanks, I'll try that. I was wondering that myself, but documentation seems to imply that if a device is IPSec-able it would work, which would apply in this case.
0
 

Author Closing Comment

by:agradmin
ID: 31565754
Solution works fine.
0

Featured Post

Want to be a Web Developer? Get Certified Today!

Enroll in the Certified Web Development Professional course package to learn HTML, Javascript, and PHP. Build a solid foundation to work toward your dream job!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A look at what happened in the Verizon cloud breach.
The well known Cerber ransomware continues to spread this summer through spear phishing email campaigns targeting enterprises. Learn how it easily bypasses traditional defenses - and what you can do to protect your data.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses
Course of the Month12 days, 19 hours left to enroll

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question