R
rolf
Hi all,
Im using IPsec to help lock down a webserver. I have a simple block
rule for all UDP and TCP traffic then various rules to allow sql server
trafic from 'allowed' IPs, terminal services and https, http traffic
plus ftp. Most of the ruleset I originally copied from here;
http://homepages.wmich.edu/~mchugha/w2kfirewall.htm
The webserver is not part of any domain and is hosted remotely.
At the local office the intranet runs behind a public IP. That IP is
given access through the IPsec policy. It does work but periodically
the connection takes 5-10 seconds to authenticate. Without the IPsec
policy enabled it is instantaneous.
The local intranet is on a domain with AD and DHCP etc. DNS resolving
is done via the router, no netbios is used.
Is there something I should do at the intranet end to 'help' this speed
issue...?
Any help greatly appreciated as Im having no luck.
PS Ive also tried reducing the number of rules (there were only 6 or so
anyways), everything is set to authenticate using kerbos.
Im using IPsec to help lock down a webserver. I have a simple block
rule for all UDP and TCP traffic then various rules to allow sql server
trafic from 'allowed' IPs, terminal services and https, http traffic
plus ftp. Most of the ruleset I originally copied from here;
http://homepages.wmich.edu/~mchugha/w2kfirewall.htm
The webserver is not part of any domain and is hosted remotely.
At the local office the intranet runs behind a public IP. That IP is
given access through the IPsec policy. It does work but periodically
the connection takes 5-10 seconds to authenticate. Without the IPsec
policy enabled it is instantaneous.
The local intranet is on a domain with AD and DHCP etc. DNS resolving
is done via the router, no netbios is used.
Is there something I should do at the intranet end to 'help' this speed
issue...?
Any help greatly appreciated as Im having no luck.
PS Ive also tried reducing the number of rules (there were only 6 or so
anyways), everything is set to authenticate using kerbos.