4 Protocol Examples
The IT security office of Contoso, Ltd (contoso.com) decides to implement an IPsec-based security solution. On a network that is managed by a central IT department, computers will use the authentication infrastructure and policy distribution mechanism to implement domain and server isolation. Step-by-step details about the configuration and resulting settings can be found in the references [MSFT-ISOLATION-1], [MSFT-ISOLATION-2], and [MSFT-ISOLATION-3].
To configure this functionality, the administrator needs to ensure that computers are members of the domain and are configured with the Group Policy settings to require authentication for incoming communication attempts, to secure data traffic, and optionally, to encrypt data traffic. The security administrator configures this policy format in the IPsec policy administrative user interface.