|
If you're using Win2K3 you can use netsh to script the
creation of policies/rules. It's really handy, we used it at our company
to create thousands of complex rules quickly.
One you have the policies built you can apply them using a
GPO. From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Jorge de Almeida Pinto Sent: Tuesday, April 05, 2005 3:43 AM To: [email protected] Subject: RE: [ActiveDir] IPSec You can configure it (IP
Security Policies under security settings in a GPO) with GPMC, GPO editor or
some other third party GPO tool.
For more info on
this:
How can I configure an IPSec
Policy through GPO? (http://www.petri.co.il/configuring_ipsec_policies_through_gpo.htm)
Step-by-Step Guide to Internet
Protocol Security (IPSec) (http://www.microsoft.com/windows2000/techinfo/planning/security/ipsecsteps.asp)
How to Configure IPSec Tunneling
in Windows 2000 (http://support.microsoft.com/kb/q252735/)
Just curious:
why?
Cheers,
Jorge From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Sergio S�nchez Trujillo Sent: dinsdag 5 april 2005 12:08 To: '[email protected]' Subject: [ActiveDir] IPSec Hello, I Would like to use IPSec between
our servers and Workstation. Do I need a special software of
Microsoft? Or can I do with GPO in a mmc with another
snap-in?... Thanks, Sergio S�nchez
Trujillo Este
correo electr�nico y, en su caso, cualquier fichero anexo, contiene informaci�n
confidencial exclusivamente dirigida a su(s) destinatario(s). Toda copia o
divulgaci�n deber� ser autorizada por This
e-mail and any attachments are confidential and exclusively directed to its
adressee(s). Any copy or distribution will have to be authorized by the Empresa
P�blica de Emergencias Sanitarias (EPES). This e-mail and any attachment is for authorised use by the intended recipient(s) only. It may contain proprietary material, confidential information and/or be subject to legal privilege. It should not be copied, disclosed to, retained or used by, any other party. If you are not an intended recipient then please promptly delete this e-mail and any attachment and all copies and inform the sender. Thank you. |
