Solved

W2K3 IPsec Manual

Posted on 2009-04-13
3
579 Views
Last Modified: 2013-12-04
Hey guys -

Would any of you be able to recommend a worthwhile tech manual that covers implementing IPsec in a Server 2003 environment?

Looking for something that fits the following criteria:

1.  Covers implementation from beginning to end.
2.  Prefer it includes troubleshooting guidelines.
3.  Presents step/area descriptions/information

I've already perused and contemplated a couple of manuals, specifically the Windows Security Resource Kit (http://www.amazon.com/Microsoft%C2%AE-Windows%C2%AE-Security-Resource-Second/dp/0735621748/ref=sr_1_5?ie=UTF8&s=books&qid=1239637836&sr=8-5) and one of the plethora of Windows Administrator Guides (http://www.amazon.com/Microsoft%C2%AE-Windows-Server-Administrators-Companion/dp/0735620474/ref=pd_bxgy_b_text_c).  Any input to these candidates is appreciated as well.

I'm all ears --

Cheers

Atlas
0
Comment
Question by:atlas_shuddered
  • 2
3 Comments
 
LVL 4

Accepted Solution

by:
dj_relentless earned 250 total points
ID: 24134452
You could start here.
http://technet.microsoft.com/en-us/network/bb531150.aspx

Just set aside a big chunk of time to start going over it as it's assumed you have knowledge with quite a few other technologies.
0
 
LVL 10

Author Comment

by:atlas_shuddered
ID: 24138999
dj -

Anything hard copy that you can think of?  I'm a tree cutter and prefer to have refences on my shelf.

Also, any other references that you can think of in general?

Cheers

Atlas
0
 
LVL 4

Expert Comment

by:dj_relentless
ID: 24152708
I haven't seen a dedicated ms press book for ipsec. The closest I've seen is the Windows Security Resource Kit book, but thats doesn't focus on ipsec. It just talks alot about it.
http://www.microsoft.com/learning/en/us/Books/6815.aspx
0

Featured Post

What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
The term "Bad USB" is a buzz word that is usually used when talking about attacks on computer systems that involve USB devices. In this article, I will show what possibilities modern windows systems (win8.x and win10) offer to fight these attacks wi…
This Micro Tutorial will teach you how to censor certain areas of your screen. The example in this video will show a little boy's face being blurred. This will be demonstrated using Adobe Premiere Pro CS6.
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question