Skip to Content
Microsoft® Windows® 2000 Security Handbook
book

Microsoft® Windows® 2000 Security Handbook

by Jeff Schmidt
August 2000
Intermediate to advanced
800 pages
21h 5m
English
Que
Content preview from Microsoft® Windows® 2000 Security Handbook

The IPSec Model

For the purpose of this illustration, I will use two computers, Computer ABC and Computer XYZ. These computers need to use IPSec to establish a secure connection and transfer some payroll data for the PDQ Corporation. Here's how it works:

Note

This example demonstrates the method Windows 2000 uses to establish this connection. Although most IPSec implementation works in a similar fashion, your mileage might vary. With so many vendors and a complex specification, many implementations vary from solution to solution. As an aside, expecting your Windows 2000 IPSec VPN client to interoperate with a Cisco or a 3Com VPN is probably not realistic, at least not at the time of this writing.

  1. The payroll application on Computer ABC initiates ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Windows Server® 2008 Security Resource Kit

Windows Server® 2008 Security Resource Kit

Jesper M. Johansson
Windows Server® 2008 Active Directory® Resource Kit

Windows Server® 2008 Active Directory® Resource Kit

Conan Kezema Stan Riemer Mike Mulcare, Byron Wright, and Microsoft Active Directory

Publisher Resources

ISBN: 0789719991Purchase book