Task 1. Create a connection security rule on one computer.
You have decided to test using secured connections between computers on sensitive segments of your
network.
The main tasks for this exercise are as follows:
1. Create a connection security rule on LON-CL1.
2. Verify that connectivity is blocked from unauthorized computers.
3. Create a connection security rule on LON-CL2.
4. Verify the configured computers can communicate.
Task 1: Create a connection security rule on LON-CL1
1. ON LON-CL1, open Control Panel and then open Windows Firewall.
2. Create a connection security rule allowing traffic on LON-CL1 with the following settings:
o Rule: Isolation
o Requirements: Require authentication for inbound connections and request authentication
for outbound connections
o Authentication: Computer and user (Kerberos V5)
o Name: Authenticate all inbound connections
Task 2: Verify connectivity between LON-CL2 and LON-CL1
• Change to LON-CL2, open a command prompt, and ping LON-CL1.
Task 3: Create a connection security rule on LON-CL2
1. Open Control Panel, and then open Windows Firewall.
2. Create a connection security rule allowing traffic on LON-CL2 with the following settings:
o Rule: Isolation
o Requirements: Require authentication for inbound connections and request authentication
for outbound connections
o Authentication: Computer and user (Kerberos V5)
o Name: Authenticate all inbound connections
Task 4: Verify connectivity between LON-CL2 and LON-CL1
1. Switch to the command prompt, and ping LON-CL1.
2. In the Windows Firewall with Advanced Security window, examine the Security Associations
monitoring.
You have decided to test using secured connections between computers on sensitive segments of your
network.
The main tasks for this exercise are as follows:
1. Create a connection security rule on LON-CL1.
2. Verify that connectivity is blocked from unauthorized computers.
3. Create a connection security rule on LON-CL2.
4. Verify the configured computers can communicate.
Task 1: Create a connection security rule on LON-CL1
1. ON LON-CL1, open Control Panel and then open Windows Firewall.
2. Create a connection security rule allowing traffic on LON-CL1 with the following settings:
o Rule: Isolation
o Requirements: Require authentication for inbound connections and request authentication
for outbound connections
o Authentication: Computer and user (Kerberos V5)
o Name: Authenticate all inbound connections
Task 2: Verify connectivity between LON-CL2 and LON-CL1
• Change to LON-CL2, open a command prompt, and ping LON-CL1.
Task 3: Create a connection security rule on LON-CL2
1. Open Control Panel, and then open Windows Firewall.
2. Create a connection security rule allowing traffic on LON-CL2 with the following settings:
o Rule: Isolation
o Requirements: Require authentication for inbound connections and request authentication
for outbound connections
o Authentication: Computer and user (Kerberos V5)
o Name: Authenticate all inbound connections
Task 4: Verify connectivity between LON-CL2 and LON-CL1
1. Switch to the command prompt, and ping LON-CL1.
2. In the Windows Firewall with Advanced Security window, examine the Security Associations
monitoring.
No comments:
Post a Comment