answersLogoWhite

0

# How to create a customized IPSec policy # Open the IP Security Policy Management console. # Select IP Security Policies. # Right-click the security policy which you want to customize and then click Properties from the shortcut menu. # When the Properties dialog box of the security policy opens, click the Rules tab. # Find the rule which you want to change, and then click the Edit button. # Click the Filter Action tab. # Proceed to customize the filter action. # Click the Security Methods tab. # If you want to create a new security method, click Add. # If you want to remove an existing security method, click Remove. # If you want to change an existing security method, click Edit. # To add a security method, click Custom, and then click Settings. # The Custom Security Method Settings dialog box opens. # To provide data integrity for the IP header and payload, enable the Data and address integrity without encryption (AH) checkbox. Select either the MD5 option or the SHA1 option as the Integrity algorithm. # To provide data integrity and data confidentiality for the IP header and payload, enable the Data integrity and encryption (ESP) checkbox. Select either the MD5 option or the SHA1 option as the Integrity algorithm if you do not have the AH authentication protocol enabled. If you do have the authentication protocol enabled, click the None option. Select either the None option, DES option, or the 3DES option as the Encryption algorithm. # Info found @ http://www.tech-faq.com/configuring-and-managing-ipsec.shtml

User Avatar

Wiki User

16y ago

What else can I help you with?

Related Questions

What will configure which users will or will not be cached on rodc?

Password Replication Policy


What MMC snap-ins is used to configure Group Policy settings?

Group Policy Object Editor


How do you get around an Internet Explorer block with a password?

Login as a administrator. open group policy and configure possword policy.


What will configure which user accounts will or will not have their password in formation cached on an RODC?

password replication policy


Which law was specifically created to deal with encryption policy in the US?

The law that specifically deals with encryption policy in the United States is the Export Administration Act (EAA) of 1979. This law regulates the export of encryption software and products from the US, imposing certain requirements and restrictions on their exportation. However, it is worth noting that the EAA expired in 2001 and has not been reauthorized, so its provisions are currently not in effect.


What section of group policy allows you to configure the maximum allowable clock skew between a client and a domain controller?

Kerberos Policy: first sentence on page162


How do you Reset Local computer Policy to Default?

secedit /configure /cfg %windir%\repair\secsetup.inf /db secsetup.sdb /verbose


What is used to prevent users from reusing a certain number of network passwords what can you configure as a part of a domain wide policy or as part of a Fine Grained Password policy?

Enforce Password History


What is an implmentation plan in marketing?

Implementation is the realization of an application, or execution of a plan, idea, model, design, specification, standard, algorithm, or policy.


What is IPSec policy?

IPSec is a set of IP extensions that provide security services, such as encryption,authentication, and data integrity. IPSec is typically used with a VPN.


What section of Group Policy allow you to configure the maximum allowable clock skew between a client and a domain controller?

Kerberos Policy. This is found under: +Computer Configuration +Windows Settings +Security Settings +Account Policies +Kerberos Policies


What information does the Shutterfly privacy policy outline regarding the protection of user data and personal information?

The Shutterfly privacy policy outlines how user data and personal information are protected, including measures such as encryption, secure storage, and limited access to data.