Hi,

Many times, we get scam emails in 0ur inbox that often mirrors a legitimate institution like Interswitch, Banks, etc. Our company expects us as Administrator to help them resolve this issue. One way to be sure Internet Resources or links are who they say they are through IPSec.

You’ll see in practical sense, the use of;

1. IPSEC Policy Component: you’ll be taught how to use Rule: IPSec rule consist of IP Filter List and Action IP Filter List:
Filter Action: Identifies something like a destination IP Address.
Security Method: This is negotiating security method. What to do here is to authenticate.
Tunnel Setting: To determine the channel IP Traffic will be sent.
Connection Type:

2. IPSec Console
We’ll analyze the default Securities Policies, namely;
Server (Request Security) Client (Respond Only) and Secure Server (Require Security):

3. To create our own Policy
You’ll learn and create IPSEC Policy using the IPSEC Wizard. As well as creating your own IPSEC Rule.



Join our current MCSE/MCITP Class for 100% Hands on Skill.

Adekugbe David Folorunsho (mcse,mcsa,mcts,mcdba,itil)
08035794444
[email protected]