Security policies

Description

Microsoft 70-410 (Networking) Note on Security policies, created by kamsz on 13/08/2013.
kamsz
Note by kamsz, updated more than 1 year ago
kamsz
Created by kamsz over 10 years ago
65
0

Resource summary

Page 1

Connection security involves the authentication of two computers before they begin communications and the securing of information sent between two computers. Windows Firewall with Advanced Security uses Internet Protocol security (IPsec) to achieve connection security by using key exchange, authentication, data integrity, and, optionally, data encryption.

NoteUnlike firewall rules, which operate unilaterally, connection security rules require that both communicating computers have a policy with connection security rules or another compatible IPsec policy.

New Page

Show full summary Hide full summary

Similar

CCNA Answers – CCNA Exam
Abdul Demir
Home networks
johnson8221
ISATAP
kamsz
Single-label names (GlobalNames zone)
kamsz
Authenticated Firewall Bypass
kamsz
DHCP Failover
kamsz
Hardware, Software and Networking
dphillips211
DHCP Relay agent
kamsz
SRV Resource records
kamsz
CHAP
kamsz
2.1.6 Networks
Jake Youd