hands-on lab

Configuring IPsec on a Windows 2016 Server

Intermediate
Up to 2h
65
5/5
Get guided in a real environmentPractice with a step-by-step scenario in a real, provisioned environment.
Learn and validateUse validations to check your solutions every step of the way.
See resultsTrack your knowledge and monitor your progress.

Description

IPsec is a framework of open standards for ensuring private, secure communications over IP networks through the use of cryptographic security services. The Microsoft Windows implementation of IPsec is based on standards developed by the Internet Engineering Task Force (IETF) IPsec working group.

IPsec establishes trust and security from a source IP address to a destination IP address which provides an end-to-end tunnel between the hosts. The only hosts that can interpret the traffic being sent over the secure link are the sending and receiving hosts. Each end device implements security at its respective end with the assumption that the medium over which the communication takes place is not secure.

You will configure IPsec on a Windows Server 2016 machine in this lab. 

This lab is part of a series on cyber network security.

Learning Objectives

Upon completion of this lab you will be able to:

  • Demonstrate to delegates how to configure a Windows 2016 server to use IPsec which enables clients to connect securely to the domain using the Domain Controller (DC) as a VPN anchor point

Intended Audience

This lab is intended for:

  • Cyber and network security specialists

Prerequisites

You should possess:

  • A basic understanding of Windows operating system environments

About the author

Avatar
QA, opens in a new tab
Training Provider
Students
54,011
Labs
189
Courses
2,709
Learning paths
51

A world-leading tech and digital skills organization, we help many of the world’s leading companies to build their tech and digital capabilities via our range of world-class training courses, reskilling bootcamps, work-based learning programs, and apprenticeships. We also create bespoke solutions, blending elements to meet specific client needs.

Covered topics

Lab steps

Starting the Cyber Network Security Lab Exercise