Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

ipsec setup with Windows Server 2008

Posted on 2011-09-06
9
Medium Priority
?
466 Views
Last Modified: 2012-05-12
If I want all the computers within the domain communicate using IPSec, do I have to configure peer t o peer communication of each of the computer with each of the computer within in domain.

Is there any procedure to configure IPSec setup with Windows Server 2008 for this purpose?
0
Comment
Question by:tommym121
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 5
  • 4
9 Comments
 
LVL 20

Expert Comment

by:brwwiggins
ID: 36495485
do you just want to use IPSEC between client & server or is there client to client traffic?
0
 

Author Comment

by:tommym121
ID: 36497476
I am looking a peer to peer communication.  Clients talk to servers, Servers talk to servers.
0
 
LVL 20

Accepted Solution

by:
brwwiggins earned 1500 total points
ID: 36497848
Some of this will depend on what version your clients/servers are. You can easily setup these rules in group policy or locally with the Windows Firewall with advanced security MMC. There you can specify connection security rules for say your domain profile and have it either require or request encrypted traffic. You could also configure it to use Kerberos auth to verify identity between computers.

It will be more difficult if you have XP/2003 in the mix
0
Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

 

Author Comment

by:tommym121
ID: 36498119
I will be using mainly Windows server 2008 and Windows 7.  I am hoping I can set a rule to say enable encrypted traffice within the domains for each PC but not to set specific rule to talk to each of the PC from a PC within the domain.

Would you be able to point to me how to do that?
0
 

Author Comment

by:tommym121
ID: 36498288
Or please let me know the right terminology so I can search for the right info to find how to do that. Thanks.
0
 
LVL 20

Expert Comment

by:brwwiggins
ID: 36498328
let me try to get some screenshots going and show you an example. As usual there will be several different ways you can configure the rules.
0
 
LVL 20

Expert Comment

by:brwwiggins
ID: 36498367
0
 

Author Comment

by:tommym121
ID: 36498540
Thanks for making the screen shot and looking forward to it.
0
 

Author Closing Comment

by:tommym121
ID: 36580588
no screen shot
0

Featured Post

Creating Active Directory Users from a Text File

If your organization has a need to mass-create AD user accounts, watch this video to see how its done without the need for scripting or other unnecessary complexities.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I was prompted to write this article after the recent World-Wide Ransomware outbreak. For years now, System Administrators around the world have used the excuse of "Waiting a Bit" before applying Security Patch Updates. This type of reasoning to me …
This article provides a convenient collection of links to Microsoft provided Security Patches for operating systems that have reached their End of Life support cycle. Included operating systems covered by this article are Windows XP,  Windows Server…
This tutorial will walk an individual through locating and launching the BEUtility application and how to execute it on the appropriate database. Log onto the server running the Backup Exec database. In a larger environment, this would generally be …
There are cases when e.g. an IT administrator wants to have full access and view into selected mailboxes on Exchange server, directly from his own email account in Outlook or Outlook Web Access. This proves useful when for example administrator want…
Suggested Courses

610 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question