Solved

W2K3 IPsec Manual

Posted on 2009-04-13
3
575 Views
Last Modified: 2013-12-04
Hey guys -

Would any of you be able to recommend a worthwhile tech manual that covers implementing IPsec in a Server 2003 environment?

Looking for something that fits the following criteria:

1.  Covers implementation from beginning to end.
2.  Prefer it includes troubleshooting guidelines.
3.  Presents step/area descriptions/information

I've already perused and contemplated a couple of manuals, specifically the Windows Security Resource Kit (http://www.amazon.com/Microsoft%C2%AE-Windows%C2%AE-Security-Resource-Second/dp/0735621748/ref=sr_1_5?ie=UTF8&s=books&qid=1239637836&sr=8-5) and one of the plethora of Windows Administrator Guides (http://www.amazon.com/Microsoft%C2%AE-Windows-Server-Administrators-Companion/dp/0735620474/ref=pd_bxgy_b_text_c).  Any input to these candidates is appreciated as well.

I'm all ears --

Cheers

Atlas
0
Comment
Question by:atlas_shuddered
  • 2
3 Comments
 
LVL 4

Accepted Solution

by:
dj_relentless earned 250 total points
ID: 24134452
You could start here.
http://technet.microsoft.com/en-us/network/bb531150.aspx

Just set aside a big chunk of time to start going over it as it's assumed you have knowledge with quite a few other technologies.
0
 
LVL 10

Author Comment

by:atlas_shuddered
ID: 24138999
dj -

Anything hard copy that you can think of?  I'm a tree cutter and prefer to have refences on my shelf.

Also, any other references that you can think of in general?

Cheers

Atlas
0
 
LVL 4

Expert Comment

by:dj_relentless
ID: 24152708
I haven't seen a dedicated ms press book for ipsec. The closest I've seen is the Windows Security Resource Kit book, but thats doesn't focus on ipsec. It just talks alot about it.
http://www.microsoft.com/learning/en/us/Books/6815.aspx
0

Featured Post

Control application downtime with dependency maps

Visualize the interdependencies between application components better with Applications Manager's automated application discovery and dependency mapping feature. Resolve performance issues faster by quickly isolating problematic components.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many people tend to confuse the function of a virus with the one of adware, this misunderstanding of the basic of what each software is and how it operates causes users and organizations to take the wrong security measures that would protect them ag…
Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
Hi friends,  in this video  I'll show you how new windows 10 user can learn the using of windows 10. Thank you.
As a trusted technology advisor to your customers you are likely getting the daily question of, ‘should I put this in the cloud?’ As customer demands for cloud services increases, companies will see a shift from traditional buying patterns to new…

895 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now