Cours Module 10: Monitoring and troubleshooting IPsec

………

Using IP Security Monitor to Monitor IPsec

Options for using the IP Security Monitor:
• Modify IPsec data refresh interval to update information in the console at a set interval
• Allow DNS name resolution for IP addresses to provide additional information about computers connecting with IPsec
• Computers can monitored remotely:
• To enable remote management editing, the HKLM\system\currentcontrolset\services\policyagent key must have a value of 1
• To Discover the Active security policy on a computer, examine the Active Policy Node in the IP Security Monitoring MMC
• Main Mode Monitoring monitors initial IKE and SA:
• Information about the Internet Key Exchange
• Quick Mode Monitoring monitors subsequent key exchanges related to IPsec:
• Information about the IPsec driver

Using IP Security Monitor to Monitor IPsec

Options for using the IP Security Monitor:
• Modify IPsec data refresh interval to update information in the console at a set interval
• Allow DNS name resolution for IP addresses to provide additional information about computers connecting with IPsec
• Computers can monitored remotely:
• To enable remote management editing, the HKLM\system\currentcontrolset\services\policyagent key must have a value of 1
• To Discover the Active security policy on a computer, examine the Active Policy Node in the IP Security Monitoring MMC
• Main Mode Monitoring monitors initial IKE and SA:
• Information about the Internet Key Exchange
• Quick Mode Monitoring monitors subsequent key exchanges related to IPsec:
• Information about the IPsec driver

Demonstration: Monitoring IPsec

In this demonstration, you will see how to:
• Establish and monitor an IPsec connection
• Monitor an IPsec connection using the Windows Firewall with Advanced security MMC
IPsec Troubleshooting Process
1-Stop the IPsec Policy Agent and use the ping command to verify communications
2-Verify firewall settings
3-Start the IPsec Policy Agent and use IP Security Monitor to determine if a security association exists
4-Verify that the policies are assigned
5-Review the policies and ensure they are compatible
6-Use IP Security Monitor to ensure that any changes are applied

……….

Cours pdf

Télécharger aussi :

Laisser un commentaire

Votre adresse e-mail ne sera pas publiée. Les champs obligatoires sont indiqués avec *