288
Chapter 6
Protecting Network Traffic with IPSec
Figure 6-11 Creating a new filter action â–
Security can be negotiated only after the IPSec clients are authenticated. By default, IPSec rules rely on Active Directory directory service and the Kerberos protocol to authenticate clients. However, you can also specify a certificate infrastructure or a preshared key as a means to authenticate IPSec clients. To select the authentication method for IPSec, you can use the Authentication Method page of the Security Rule Wizard, as shown in Figure 6-12. (Note that this page does not appear if you select Permit on the Filter Action page.) Authentication Method page
Figure 6-12 Specifying an authentication method for a new IPSec Policy rule