Chapter Review

To further practice and reinforce the skills you learned in this chapter, you can perform the following tasks:

  • Review the chapter summary.

  • Review the list of key terms introduced in this chapter.

  • Complete the case scenario. This scenario sets up a real-world situation involving the topics of this chapter and asks you to create solutions.

  • Complete the suggested practices.

  • Take a practice test.

Chapter Summary

  • IPsec allows you to protect network traffic by providing data authentication or encryption, or both.

  • In Windows Server 2008 and Windows Serer 2008 R2 networks, you can implement IPsec either through IPsec policies or through Connection Security Rules. As a means to deploy IPsec, IPsec policies are more powerful but are also more difficult ...

Get Self-Paced Training Kit (Exam 70-642): Configuring Windows Server® 2008 Network Infrastructure now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.