The security of a network design is measured by the ability of the design to prevent unauthorized access to data transmission and intranet-based resources.
TCP/IP incorporates security features that provide protection of the TCP/IP data as it is sent on the network, along with configuration of the types of local host traffic that are processed.
The Windows® implementation of TCP/IP includes additional security features that you can employ to secure data as it moves "through the wire."
Probably the most significant feature included with Windows is Internet Protocol Security, or IPSec, which is
able to encrypt and decrypt data transparently as it is transferred across the network. This module demonstrates how to create a successful
network design strategy using IPSec.
By the end of this module, you should be able to:
Reduce unauthorized access to network resources using filters
Define the data protection features provided by IPSec
Define the data protection levels provided by IPSec
Define how to negotiate security keys
Define the strategies used to enhance the availability of TCP/IP routing structures
The next lesson examines how to protect IP traffic with filters.