B
Bill Tomlinson
I am trying to use Group Policy to apply IPSec policy to an Organizational
Unit and I am having difficulty getting it to work when logged into a
workstation as a standard domain user.
I have been following Article: KB313195 HOW TO: Use IPSec Monitor in
Windows 2000
Following this article I have logged into two W2k SP3 clients, in the same
W2k domain, as the local administrator, and set the Local Security Policy to
Assign one the IPSec-Client (Responds Only) modified policy (modified the
filter according to the article to 'require' security), and set the other
client's Local Security Policy to Assign the IPSec-Secure Server (modified
the filter according to the article to 'require' security) modified policy.
When I bring up the IPSecmon on each machine, the IPSecmon status window
shows: "IP security is enabled on this computer." When I open a cmd window
and use: ping -t [ipaddress of other client] the cmd window shows several
lines of "Negotiating IP security" and then the ping round trip information
starts to show up in the cmd until it is closed. The IPSecmon utility shows
the IPSec policy that is being used, and the packet counters increment with
each ping sent.
If I leave the Local Security IPSec policies assigned but logout as a local
administrator and login as a normal domain user, when I start the IPSecmon
utility it's status window shows: "IP security is not enabled on this
computer" and the same cmd ping test simply shows the normal round trip
statistics and the IPSecmon utility shows no policy or packet counters
incrementing. I am confused why the IPSec policy is no longer being used to
manage the same communication that was secured when I was logged is as an
Administrator. If I log back into the clients as a domain administrator I
can achieve the same results that I did as the Local Administrator; seems
like a permissions issue - not sure.
I have logged into each of the W2k workstations as the local administrator
and 'unassigned' the Local Security Policy IPSec policies; at that point
when I start the IPSecmon it's status window shows: "IP security is enabled
on this computer" but the ping test does not show the "Negotiating IP
security," and the packet counters do not increment with each ping sent.
This is confusing me, if the IP security is enabled, then where is it being
assigned? I have scoured the Site, AD OUs and Local Policies to ensure that
no IPSec policies are assigned anywhere, yet the IPSecmon shows it is
enabled, yet not being used for the ping test.
I am not sure if this is part of the problem I am having with trying to use
Group Policy to apply the IPSec policies.
I am trying to create the situation on these two workstations where the
IPSecmon status shows: "IP security is enabled on this computer," and the
ping test shows: "Negotiating IP security" and the IPSecmon's shows the
policy being used and the packet counters increment with each ping sent,
using Active Directory and Group Policies instead of Local Security Policy,
while logged in as a standard domain account user.
I have created two Group Policies, each one has an IPSec policy that has
been modified exactly as I did on my Local Security Policy example above,
and the modified IPSec policy has been assigned inside it's Group Policy. I
have linked each of these Group Policies to two different Active Directory
(AD) Organizational Units (OU), each one containing one of the domain user's
accounts I am using to log into the W2k clients with.
I get the same problem as when I logged to the workstation as a normal
domain user in the example above, the IPSecmon status window shows "IP
security is not enabled on this computer" and the ping test does not show
any "Negotiating IP security" and the IPSecmon shows no policy being used or
packet counter incrementing. My understanding is that when the domain
user's account is in an OU that has a Group Policy linked to it, when that
user logs into the client workstation it re-assigns the Group Policy, and
the IPSec policy that is part of the Group Policy. I have tried configuring
these Group Policies to "no override" and it had no effect.
I have even tried putting the two domain users accounts in the Domain
Administrator's group at the server level, and when I login to the
workstations and start the IPSecmon it's status window shows the same as
above when I turned off the Local Security IPSec policies: the IPSecmon
status window shows: "IP security is enabled on this computer" but the ping
test does not show the "Negotiating IP security," and the packet counters do
not increment with each ping sent.
Any help you could provide toward helping me understand how to get the IPSec
policy assigned, and to be in effect when a standard domain user is logged
in would be greatly appreciated.
BT
Unit and I am having difficulty getting it to work when logged into a
workstation as a standard domain user.
I have been following Article: KB313195 HOW TO: Use IPSec Monitor in
Windows 2000
Following this article I have logged into two W2k SP3 clients, in the same
W2k domain, as the local administrator, and set the Local Security Policy to
Assign one the IPSec-Client (Responds Only) modified policy (modified the
filter according to the article to 'require' security), and set the other
client's Local Security Policy to Assign the IPSec-Secure Server (modified
the filter according to the article to 'require' security) modified policy.
When I bring up the IPSecmon on each machine, the IPSecmon status window
shows: "IP security is enabled on this computer." When I open a cmd window
and use: ping -t [ipaddress of other client] the cmd window shows several
lines of "Negotiating IP security" and then the ping round trip information
starts to show up in the cmd until it is closed. The IPSecmon utility shows
the IPSec policy that is being used, and the packet counters increment with
each ping sent.
If I leave the Local Security IPSec policies assigned but logout as a local
administrator and login as a normal domain user, when I start the IPSecmon
utility it's status window shows: "IP security is not enabled on this
computer" and the same cmd ping test simply shows the normal round trip
statistics and the IPSecmon utility shows no policy or packet counters
incrementing. I am confused why the IPSec policy is no longer being used to
manage the same communication that was secured when I was logged is as an
Administrator. If I log back into the clients as a domain administrator I
can achieve the same results that I did as the Local Administrator; seems
like a permissions issue - not sure.
I have logged into each of the W2k workstations as the local administrator
and 'unassigned' the Local Security Policy IPSec policies; at that point
when I start the IPSecmon it's status window shows: "IP security is enabled
on this computer" but the ping test does not show the "Negotiating IP
security," and the packet counters do not increment with each ping sent.
This is confusing me, if the IP security is enabled, then where is it being
assigned? I have scoured the Site, AD OUs and Local Policies to ensure that
no IPSec policies are assigned anywhere, yet the IPSecmon shows it is
enabled, yet not being used for the ping test.
I am not sure if this is part of the problem I am having with trying to use
Group Policy to apply the IPSec policies.
I am trying to create the situation on these two workstations where the
IPSecmon status shows: "IP security is enabled on this computer," and the
ping test shows: "Negotiating IP security" and the IPSecmon's shows the
policy being used and the packet counters increment with each ping sent,
using Active Directory and Group Policies instead of Local Security Policy,
while logged in as a standard domain account user.
I have created two Group Policies, each one has an IPSec policy that has
been modified exactly as I did on my Local Security Policy example above,
and the modified IPSec policy has been assigned inside it's Group Policy. I
have linked each of these Group Policies to two different Active Directory
(AD) Organizational Units (OU), each one containing one of the domain user's
accounts I am using to log into the W2k clients with.
I get the same problem as when I logged to the workstation as a normal
domain user in the example above, the IPSecmon status window shows "IP
security is not enabled on this computer" and the ping test does not show
any "Negotiating IP security" and the IPSecmon shows no policy being used or
packet counter incrementing. My understanding is that when the domain
user's account is in an OU that has a Group Policy linked to it, when that
user logs into the client workstation it re-assigns the Group Policy, and
the IPSec policy that is part of the Group Policy. I have tried configuring
these Group Policies to "no override" and it had no effect.
I have even tried putting the two domain users accounts in the Domain
Administrator's group at the server level, and when I login to the
workstations and start the IPSecmon it's status window shows the same as
above when I turned off the Local Security IPSec policies: the IPSecmon
status window shows: "IP security is enabled on this computer" but the ping
test does not show the "Negotiating IP security," and the packet counters do
not increment with each ping sent.
Any help you could provide toward helping me understand how to get the IPSec
policy assigned, and to be in effect when a standard domain user is logged
in would be greatly appreciated.
BT