

You can also obtain ipsecpol.exe from the IIS 5.0 Lockdown tool at. You can configure the IPSec policy either through the Microsoft Management Console (MMC) IP Security Policy Management snap-in or with ipsecpol.exe, a tool in the Microsoft Windows 2000 Server Resource Kit. IPSec policy determines how you use IPSec to secure connections between computers. IPSec policy-in fact, any policy-is a set of business requirements implemented as technical solutions. These capabilities include encryption, authentication, Hash Method Authentication Codes (HMACs), and packet filtering. ) IPSec offers a way to secure packets to make them less vulnerable. The standard derives from IETF Request for Comments (RFC) 2401, "Security Architecture for the Internet Protocol." (For a full list of the RFCs and Internet drafts, go to.

IPSec, which is built into Windows 2000, is an Internet Engineering Task Force (IETF)-ratified standard to secure IP traffic among computers. (See "Related Reading" for references.) Here, however, I discuss how to use the IPSec protocol to secure your environment. Many good magazine articles and books discuss IPSec theory and what an IPSec packet looks like. The IP Security (IPSec) protocol can help you defend your system from attack.
