If you're using Win2K3 you can use netsh to script the creation of policies/rules.  It's really handy, we used it at our company to create thousands of complex rules quickly.
 
One you have the policies built you can apply them using a GPO.


From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Jorge de Almeida Pinto
Sent: Tuesday, April 05, 2005 3:43 AM
To: [email protected]
Subject: RE: [ActiveDir] IPSec

You can configure it (IP Security Policies under security settings in a GPO) with GPMC, GPO editor or some other third party GPO tool.
 
For more info on this:
How can I configure an IPSec Policy through GPO? (http://www.petri.co.il/configuring_ipsec_policies_through_gpo.htm)
Step-by-Step Guide to Internet Protocol Security (IPSec) (http://www.microsoft.com/windows2000/techinfo/planning/security/ipsecsteps.asp)
How to Configure IPSec Tunneling in Windows 2000 (http://support.microsoft.com/kb/q252735/)
 
Just curious: why?
 
Cheers,
Jorge


From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Sergio S�nchez Trujillo
Sent: dinsdag 5 april 2005 12:08
To: '[email protected]'
Subject: [ActiveDir] IPSec

Hello,

 

I Would like to use IPSec between our servers and Workstation.

 

Do I need a special software of Microsoft? Or can I do with GPO in a mmc with another snap-in?...

 

Thanks,

 

Sergio S�nchez Trujillo

www.epes.es

 

 

Este correo electr�nico y, en su caso, cualquier fichero anexo, contiene informaci�n confidencial exclusivamente dirigida a su(s) destinatario(s). Toda copia o divulgaci�n deber� ser autorizada por la Empresa P�blica de Emergencias Sanitarias (EPES).

This e-mail and any attachments are confidential and exclusively directed to its adressee(s). Any copy or distribution will have to be authorized by the Empresa P�blica de Emergencias Sanitarias (EPES).

 


This e-mail and any attachment is for authorised use by the intended recipient(s) only. It may contain proprietary material, confidential information and/or be subject to legal privilege. It should not be copied, disclosed to, retained or used by, any other party. If you are not an intended recipient then please promptly delete this e-mail and any attachment and all copies and inform the sender. Thank you.

Reply via email to