70_642_part1

Page 318

288

Chapter 6

Protecting Network Traffic with IPSec

Figure 6-11 Creating a new filter action â–

Security can be negotiated only after the IPSec clients are authenticated. By default, IPSec rules rely on Active Directory directory service and the Kerberos protocol to authenticate clients. However, you can also specify a certificate infrastructure or a preshared key as a means to authenticate IPSec clients. To select the authentication method for IPSec, you can use the Authentication Method page of the Security Rule Wizard, as shown in Figure 6-12. (Note that this page does not appear if you select Permit on the Filter Action page.) Authentication Method page

Figure 6-12 Specifying an authentication method for a new IPSec Policy rule


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.