• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 449
  • Last Modified:

IPSEC with Kerberos

I have a task to enable IPSEC for computer/server communications. However, there are TONS of systems, 8500 Desktops and boat loads of servers.  They are all nicely placed into OU's based on department. Both Server/Workstations are nested in an OU IE

Root
 Department A
   Servers
   Desktops
   Users
 Department B

I was considering creating a single GPO linked to the Department OU that configures "Secure Server"  since it will initiate encryption to the target if supported. This way all traffice for that OU will be secured and I wont have to make TONS of filters to allow for other systems.  The clinets not only communicate with the OU servers but other servers in other OUs. Same with the Servers.  They need to be able to respond to non ipsec based systems.  The objective is to secure all communications WITHIN the OU.  

In the future they may required servers to be required, in that event filters will be needed.

Also, there is a mix of WIndows 7/Vista/XP for desktops 2003/2008 for servers.  

As far as filtering the GPO I was just going to link it the OU and leave security filtering to "Authenticated Users"   Edit my ipsec policy and assign it.

If I am not doing this correct please help me out.
0
Grady-Vogt
Asked:
Grady-Vogt
  • 3
  • 3
1 Solution
 
SandeshdubeySenior Server EngineerCommented:
You are correct,but  I would recommed to test the policy in the test OU first and then go for it if you dont find  any issue with the policy.
0
 
Grady-VogtAuthor Commented:
Correct on testing,  We are choosing pilot servers and desktops now.

I also believe this requires a reboot of the PC once the GPO is applied..

I know this sounds dumb but how do you know if the policy is in effect and functioning? I looked into netsh/ipsec and could not find a STATUS if you willl. I just need to verity the policy IS in fact operational on the server/client.
0
 
SandeshdubeySenior Server EngineerCommented:
Once the policy is applied you need to reboot the worksation PC.Ran gpresult to see if the policy is applied on the PC or you can also ran rsop.msc to check if the policy is applied.
Also check the application log event id 1704 should occur if the policy is applied sucessfully.
0
Simplify Active Directory Administration

Administration of Active Directory does not have to be hard.  Too often what should be a simple task is made more difficult than it needs to be.The solution?  Hyena from SystemTools Software.  With ease-of-use as well as powerful importing and bulk updating capabilities.

 
Grady-VogtAuthor Commented:
Do I only reboot the workstations?   Servers?
0
 
SandeshdubeySenior Server EngineerCommented:
Reboot only workstation after the policy is applied.
0
 
Grady-VogtAuthor Commented:
Everything appears to be working ONLY if I add the computer object to the security filter of the GPO.  

I had removed the authenticated users and pult in my AD Group that contained 10 test servers/destktops.  
They wont apply the policy unless I enter them in manually to the security filtering.  

Why are they not pulling from the defined AD Security group? I have tried Global/Universal
0

Featured Post

Has Powershell sent you back into the Stone Age?

If managing Active Directory using Windows Powershell® is making you feel like you stepped back in time, you are not alone.  For nearly 20 years, AD admins around the world have used one tool for day-to-day AD management: Hyena. Discover why.

  • 3
  • 3
Tackle projects and never again get stuck behind a technical roadblock.
Join Now