8.+IPSec

=​IPSec=

Team Members: Brad Pitre and Steve Veron

Per the toplogy map, the 2 servers will be your DC with IPsec. Client A will be the workstation that is used. Client B will be the badguy trying to get into the network. -Steven

Take a screenshot of both the unauthenticated access attempt and the Microsoft Network Monitor showing captured packets.



A Note from the Boss Great job so far setting up the network. Your CIO is concerned about security and wants you to investigate and test a plan to protect network data transmissions and secure the network. The policy should include using IPSec to secure the network traffic, configuring authentication to prevent unauthorized access, and setting Windows Firewall to allow basic network troubleshooting. Ensure that the test is properly documented for future reference and does not interfere with daily job duties of personel. You must test the security by impersonating a network attack using Microsoft Network Monitor to capture packets and read them as well as try to access secured network directories.

Make copies of your .vhd file to set up a test environment.

Here are the guildlines I want you to follow: · Configure the Windows Firewall to allow ping · Set an IPSec filter to allow traffic between the 2 servers · Create an IPSec filter to block all traffic except that which has specific permissions · Create an IPSec filter to allow access to shared folders and printers??? · Create an IPSec filter to Negotiate Security and to not allow unsecured negotiations. · Create an exceptin rule in Windows Firewall to allow access to the shared folders and printers · Set a Windows Firewall rule to require authentication for connections using a Preshared key (not redommended) From a secondary computer, simulate and unauthenticated connection and attempt to capture and read packets using Microsoft Network Monitor
 * //__Task at hand: __//**