Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Installing and Configuring Windows 10: 70-698 Exam Guide

You're reading from   Installing and Configuring Windows 10: 70-698 Exam Guide Learn to deploy, configure, and monitor Windows 10 effectively to prepare for the 70-698 exam

Arrow left icon
Product type Paperback
Published in Jan 2019
Publisher
ISBN-13 9781788990868
Length 490 pages
Edition 1st Edition
Arrow right icon
Author (1):
Arrow left icon
Bekim Dauti Bekim Dauti
Author Profile Icon Bekim Dauti
Bekim Dauti
Arrow right icon
View More author details
Toc

Table of Contents (19) Chapters Close

Preface 1. Preparing for Installation FREE CHAPTER 2. Installing Windows 10 3. Configuring Devices and Device Drivers 4. Performing Post-Installation Configuration 5. Implement Windows in an Enterprise Environment 6. Configuring Networking 7. Configuring Storage 8. Configuring Data Access and Usage 9. Implementing Apps 10. Configuring Remote Management 11. Configuring Updates 12. Monitoring Windows 10 13. Configuring Systems and Data Recovery 14. Configuring Authorization and Authentication 15. Configuring Advanced Management Tools 16. Studying and Passing Exam 70-698 17. Assessments 18. Other Books You May Enjoy

Configuring IPsec


Internet Protocol Security (IPsec) is a suite of protocols that enables secure network services on IP packet-switched networks. IPsec is a standard (RFC 2401-2412) that has been developed under the supervision of the Internet Engineering Task Force (IETF) organization to allowauthentication, integrity, access control, and confidentiality on network services.That being said, the authentication is achieved using the Internet Key Exchange (IKE) protocol, integrity is achieved using hashing algorithms, and confidentiality is achieved using encryption. Authentication Header (AH) and Encapsulation Security Protocol (ESP) are protocols that are utilized by IPsec. These features, and many more, enable IPsec todefine how a VPN can be secured across all IP networks.

Securing a VPN connection using IPsec

To secure a VPN connectionon your Windows 10 computer using IPsec, complete the following steps:

  1. Repeatstep 1 to step 5from the Setting up a VPN connection section.
  1. In theAdd a VPN connection...
lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image