Wednesday, October 1, 2014

1. A. Datum uses many outside consultants. The enterprise's management has a concern that if a consultant was on the company network, they may be able to connect to unauthorized computers. Objectives Create a connection security rule on one computer. Verify that connectivity is blocked from unauthorized computers. Create a connection security rule on a second computer. Verify the configured computers can communicate.

Task 1. Create a connection security rule on one computer.

You have decided to test using secured connections between computers on sensitive segments of your
network.
The main tasks for this exercise are as follows:
1. Create a connection security rule on LON-CL1.
2. Verify that connectivity is blocked from unauthorized computers.
3. Create a connection security rule on LON-CL2.
4. Verify the configured computers can communicate.

Task 1: Create a connection security rule on LON-CL1
1. ON LON-CL1, open Control Panel and then open Windows Firewall.
2. Create a connection security rule allowing traffic on LON-CL1 with the following settings:
   o Rule: Isolation
   o Requirements: Require authentication for inbound connections and request authentication
     for outbound connections
   o Authentication: Computer and user (Kerberos V5)
   o Name: Authenticate all inbound connections

Task 2: Verify connectivity between LON-CL2 and LON-CL1
• Change to LON-CL2, open a command prompt, and ping LON-CL1.

Task 3: Create a connection security rule on LON-CL2
1. Open Control Panel, and then open Windows Firewall.
2. Create a connection security rule allowing traffic on LON-CL2 with the following settings:
   o Rule: Isolation
   o Requirements: Require authentication for inbound connections and request authentication
     for outbound connections
   o Authentication: Computer and user (Kerberos V5)
   o Name: Authenticate all inbound connections

Task 4: Verify connectivity between LON-CL2 and LON-CL1
1. Switch to the command prompt, and ping LON-CL1.
2. In the Windows Firewall with Advanced Security window, examine the Security Associations
   monitoring.

No comments:

Post a Comment