This activity examines various network configurations. Through analysis, you will determine whether IPSec can be implemented in the given scenario. Answers to the following questions can be found in the appendix.
- Figure 12.16 shows a client computer and a server located on your office's network. Can you use IPSec Authentication Headers to ensure the authentication and integrity of data transmitted between the two computers? If you can't use IPSec, can you use an alternate configuration to meet your business needs?
Figure 12.16 A proposed network infrastructure
- Figure 12.17 shows a server located on a network segment that's protected by a firewall. In this configuration can you use IPSec to encrypt all traffic transmitted between the client and the server?
Figure 12.17 A proposed network infrastructure
- Figure 12.18 shows a server located on a network segment that's protected by a firewall. In this configuration can you use IPSec to encrypt all traffic transmitted between the client and the server?
Figure 12.18 A proposed network infrastructure
The following two questions are based on Figure 12.19, which illustrates two office networks that are connected over the Internet. The client at IP address 192.168.5.2 wants to communicate securely over the Internet with the client at IP address 10.10.10.20.
Figure 12.19 A proposed network infrastructure
- Can you use IPSec transport mode to encrypt data transmitted between the two client computers?
- How could you use IPSec tunnel mode to protect the data transmitted over the Internet?
Answers