From 677b5676ed9462cd3e24c0158e9d8ca74d89f034 Mon Sep 17 00:00:00 2001 From: brandyking <102766995+brandyking@users.noreply.github.com> Date: Fri, 14 Feb 2025 16:47:29 -0500 Subject: [PATCH 1/3] Update Disable-NetIPsecRule.md Updating the details in -KeyModule parameter to reflect changes in the code for how this value is set. --- .../netsecurity/Disable-NetIPsecRule.md | 15 ++++++--------- 1 file changed, 6 insertions(+), 9 deletions(-) diff --git a/docset/winserver2022-ps/netsecurity/Disable-NetIPsecRule.md b/docset/winserver2022-ps/netsecurity/Disable-NetIPsecRule.md index 067600c75b..446b131d85 100644 --- a/docset/winserver2022-ps/netsecurity/Disable-NetIPsecRule.md +++ b/docset/winserver2022-ps/netsecurity/Disable-NetIPsecRule.md @@ -638,15 +638,12 @@ Accept wildcard characters: False Specifies that matching IPsec rules of the indicated key module are disabled. This parameter specifies which keying modules to negotiate. The acceptable values for this parameter are: Default, AuthIP, IKEv1, or IKEv2. -- Default: Equivalent to both IKEv1 and AuthIP. -Required in order for the rule to be applied to computers running Windows versions prior to nextref_server_7. ----- There are authorization and cryptographic methods that are only compatible with certain keying modules. -This is a very advanced setting intended only for specific interoperability scenarios. -Overriding this parameter value may result in traffic being sent in plain-text if the authorization and cryptographic settings are not supported by the keying modules there. +- Default: KeyModule is set based on the authentication method. As of Win11 24H2 and Server 2025, the Default is equivalent to both IKEv1 and IKEv2, and only sets AuthIP if the authentication method(s) require it. In previous releases, Default is equivalent to both IKEv1 and AuthIP. Required in order for the rule to be applied to computers running Windows versions prior to Server 2008. - AuthIP: Supported with phase 2 authentication. -- IKEv1: Supported with pre-shared key (PSK), Certificates, and Kerberos. -- IKEv2: Not supported with Kerberos, PSK, or NTLM. -Windows versions prior to Windows Server 2012 only support the Default configuration. +- IKEv1: Supported with pre-shared key (PSK), Certificates, and Kerberos. Supported with phase 1 authentication only. +- IKEv2: Not supported with Kerberos, PSK, or NTLM. Supported with phase 1 authentication only. + +The default value is Default. There are authentication and cryptographic methods that are only compatible with certain keying modules. This is a very advanced setting intended only for specific interoperability scenarios. Overriding this parameter value may result in traffic being sent in plain-text if the authorization and cryptographic settings are not supported by the keying modules. Windows versions prior to Windows Server 2012 only support the Default configuration. ```yaml Type: KeyModule[] @@ -656,7 +653,7 @@ Accepted values: Default, IKEv1, AuthIP, IKEv2 Required: False Position: Named -Default value: None +Default value: Default Accept pipeline input: False Accept wildcard characters: False ``` From 907d69ca326d6567b4d0bf8a70c41c22d6529564 Mon Sep 17 00:00:00 2001 From: Meghan Stewart <33289333+mestew@users.noreply.github.com> Date: Mon, 3 Mar 2025 14:15:48 -0800 Subject: [PATCH 2/3] add to 2025, edits --- .../netsecurity/Disable-NetIPsecRule.md | 5 +++-- .../netsecurity/Disable-NetIPsecRule.md | 20 +++++++++---------- 2 files changed, 12 insertions(+), 13 deletions(-) diff --git a/docset/winserver2022-ps/netsecurity/Disable-NetIPsecRule.md b/docset/winserver2022-ps/netsecurity/Disable-NetIPsecRule.md index 446b131d85..9dde8e2913 100644 --- a/docset/winserver2022-ps/netsecurity/Disable-NetIPsecRule.md +++ b/docset/winserver2022-ps/netsecurity/Disable-NetIPsecRule.md @@ -2,7 +2,7 @@ description: Use this topic to help manage Windows and Windows Server technologies with Windows PowerShell. external help file: NetIPsecRule.cmdletDefinition.cdxml-help.xml Module Name: NetSecurity -ms.date: 12/27/2016 +ms.date: 103/03/2025 online version: https://learn.microsoft.com/powershell/module/netsecurity/disable-netipsecrule?view=windowsserver2022-ps&wt.mc_id=ps-gethelp schema: 2.0.0 title: Disable-NetIPsecRule @@ -638,7 +638,8 @@ Accept wildcard characters: False Specifies that matching IPsec rules of the indicated key module are disabled. This parameter specifies which keying modules to negotiate. The acceptable values for this parameter are: Default, AuthIP, IKEv1, or IKEv2. -- Default: KeyModule is set based on the authentication method. As of Win11 24H2 and Server 2025, the Default is equivalent to both IKEv1 and IKEv2, and only sets AuthIP if the authentication method(s) require it. In previous releases, Default is equivalent to both IKEv1 and AuthIP. Required in order for the rule to be applied to computers running Windows versions prior to Server 2008. + +- Default: KeyModule is set based on the authentication method. As of Windows 11, version 24H2 and Windows Server 2025, the Default is equivalent to both IKEv1 and IKEv2, and only sets AuthIP if the authentication method(s) require it. In previous releases, Default is equivalent to both IKEv1 and AuthIP. Required in order for the rule to be applied to computers running Windows versions prior to Windows Server 2008. - AuthIP: Supported with phase 2 authentication. - IKEv1: Supported with pre-shared key (PSK), Certificates, and Kerberos. Supported with phase 1 authentication only. - IKEv2: Not supported with Kerberos, PSK, or NTLM. Supported with phase 1 authentication only. diff --git a/docset/winserver2025-ps/netsecurity/Disable-NetIPsecRule.md b/docset/winserver2025-ps/netsecurity/Disable-NetIPsecRule.md index d1090bc30b..fa72acb091 100644 --- a/docset/winserver2025-ps/netsecurity/Disable-NetIPsecRule.md +++ b/docset/winserver2025-ps/netsecurity/Disable-NetIPsecRule.md @@ -2,7 +2,7 @@ description: Use this topic to help manage Windows and Windows Server technologies with Windows PowerShell. external help file: NetIPsecRule.cmdletDefinition.cdxml-help.xml Module Name: NetSecurity -ms.date: 12/27/2016 +ms.date: 03/03/2025 online version: https://learn.microsoft.com/powershell/module/netsecurity/disable-netipsecrule?view=windowsserver2025-ps&wt.mc_id=ps-gethelp schema: 2.0.0 title: Disable-NetIPsecRule @@ -638,15 +638,13 @@ Accept wildcard characters: False Specifies that matching IPsec rules of the indicated key module are disabled. This parameter specifies which keying modules to negotiate. The acceptable values for this parameter are: Default, AuthIP, IKEv1, or IKEv2. -- Default: Equivalent to both IKEv1 and AuthIP. -Required in order for the rule to be applied to computers running Windows versions prior to nextref_server_7. ----- There are authorization and cryptographic methods that are only compatible with certain keying modules. -This is a very advanced setting intended only for specific interoperability scenarios. -Overriding this parameter value may result in traffic being sent in plain-text if the authorization and cryptographic settings are not supported by the keying modules there. -- AuthIP: Supported with phase 2 authentication. -- IKEv1: Supported with pre-shared key (PSK), Certificates, and Kerberos. -- IKEv2: Not supported with Kerberos, PSK, or NTLM. -Windows versions prior to Windows Server 2012 only support the Default configuration. + +- Default: KeyModule is set based on the authentication method. As of Windows 11, version 24H2 and Windows Server 2025, the Default is equivalent to both IKEv1 and IKEv2, and only sets AuthIP if the authentication method(s) require it. In previous releases, Default is equivalent to both IKEv1 and AuthIP. Required in order for the rule to be applied to computers running Windows versions prior to Windows Server 2008. +- AuthIP: Supported with phase 2 authentication. +- IKEv1: Supported with pre-shared key (PSK), Certificates, and Kerberos. Supported with phase 1 authentication only. +- IKEv2: Not supported with Kerberos, PSK, or NTLM. Supported with phase 1 authentication only. + +The default value is Default. There are authentication and cryptographic methods that are only compatible with certain keying modules. This is a very advanced setting intended only for specific interoperability scenarios. Overriding this parameter value may result in traffic being sent in plain-text if the authorization and cryptographic settings are not supported by the keying modules. Windows versions prior to Windows Server 2012 only support the Default configuration. ```yaml Type: KeyModule[] @@ -656,7 +654,7 @@ Accepted values: Default, IKEv1, AuthIP, IKEv2 Required: False Position: Named -Default value: None +Default value: Default Accept pipeline input: False Accept wildcard characters: False ``` From cd2cb6be554a1ae36ca20b0b0a033773f3bcf9ff Mon Sep 17 00:00:00 2001 From: Meghan Stewart <33289333+mestew@users.noreply.github.com> Date: Mon, 3 Mar 2025 14:16:34 -0800 Subject: [PATCH 3/3] Update docset/winserver2022-ps/netsecurity/Disable-NetIPsecRule.md --- docset/winserver2022-ps/netsecurity/Disable-NetIPsecRule.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docset/winserver2022-ps/netsecurity/Disable-NetIPsecRule.md b/docset/winserver2022-ps/netsecurity/Disable-NetIPsecRule.md index 9dde8e2913..788dcd2931 100644 --- a/docset/winserver2022-ps/netsecurity/Disable-NetIPsecRule.md +++ b/docset/winserver2022-ps/netsecurity/Disable-NetIPsecRule.md @@ -2,7 +2,7 @@ description: Use this topic to help manage Windows and Windows Server technologies with Windows PowerShell. external help file: NetIPsecRule.cmdletDefinition.cdxml-help.xml Module Name: NetSecurity -ms.date: 103/03/2025 +ms.date: 03/03/2025 online version: https://learn.microsoft.com/powershell/module/netsecurity/disable-netipsecrule?view=windowsserver2022-ps&wt.mc_id=ps-gethelp schema: 2.0.0 title: Disable-NetIPsecRule