| < Day Day Up > |
|
Deploy and manage Internet Protocol Security (IPSec) policies.
Deploy IPSec policies by using local policy objects or Group Policy objects (GPOs).
Deploy IPSec policies by using commands and scripts. Tools include IPSecPol and Netsh.
Deploy IPSec certificates. Considerations include deployment of certificates and renewing certificates on managed and unmanaged client computers.
Troubleshoot IPSec.
Monitor IPSec policies by using IP Security Monitor.
Configure IPSec logging. Considerations include Oakley logs and IPSec driver logging.
Troubleshoot IPSec across networks. Considerations include network address translation, port filters, protocol filters, firewalls, and routers.
Troubleshoot IPSec certificates. Considerations include enterprise trust policies and certificate revocation list (CRL) checking.
| < Day Day Up > |
|