Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
26 commits
Select commit Hold shift + click to select a range
284c123
Update Copy-NetIPsecRule.md
brandyking Feb 14, 2025
677b567
Update Disable-NetIPsecRule.md
brandyking Feb 14, 2025
836ea9a
Update Enable-NetIPsecRule.md
brandyking Feb 14, 2025
19edf93
Update Get-NetIPsecRule.md
brandyking Feb 14, 2025
214d18b
Update New-NetIPsecRule.md
brandyking Feb 14, 2025
e974fd2
Update Remove-NetIPsecRule.md
brandyking Feb 14, 2025
bb01fba
add to 2025, edits
mestew Mar 3, 2025
9355588
add to 2025, edits
mestew Mar 3, 2025
1918344
add to 2025, edits
mestew Mar 3, 2025
f5fa47e
add to 2025, edits
mestew Mar 3, 2025
907d69c
add to 2025, edits
mestew Mar 3, 2025
cd2cb6b
Update docset/winserver2022-ps/netsecurity/Disable-NetIPsecRule.md
mestew Mar 3, 2025
45a01be
Update docset/winserver2025-ps/netsecurity/Enable-NetIPsecRule.md
mestew Mar 3, 2025
948dded
add to 2025, edits
mestew Mar 3, 2025
3af5bcf
Merge branch 'main' into patch-2
mestew Mar 5, 2025
0476264
Merge pull request #3933 from brandyking/patch-2
mestew Mar 5, 2025
97f1731
Merge branch 'main' into patch-3
mestew Mar 5, 2025
5282155
Merge pull request #3934 from brandyking/patch-3
mestew Mar 5, 2025
034af8b
Merge branch 'main' into patch-4
mestew Mar 5, 2025
21fdc9e
Merge pull request #3935 from brandyking/patch-4
mestew Mar 5, 2025
adc6ef3
Merge branch 'main' into patch-5
mestew Mar 5, 2025
5bcf47d
Merge pull request #3936 from brandyking/patch-5
mestew Mar 5, 2025
425149c
Merge branch 'main' into patch-6
mestew Mar 5, 2025
85e2c5f
Merge pull request #3937 from brandyking/patch-6
mestew Mar 5, 2025
5e1bd89
Merge branch 'main' into patch-7
mestew Mar 5, 2025
6870d62
Merge pull request #3938 from brandyking/patch-7
mestew Mar 5, 2025
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
18 changes: 7 additions & 11 deletions docset/winserver2022-ps/netsecurity/Copy-NetIPsecRule.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
description: Use this topic to help manage Windows and Windows Server technologies with Windows PowerShell.
external help file: NetIPsecRule.cmdletDefinition.cdxml-help.xml
Module Name: NetSecurity
ms.date: 12/27/2016
ms.date: 03/03/2025
online version: https://learn.microsoft.com/powershell/module/netsecurity/copy-netipsecrule?view=windowsserver2022-ps&wt.mc_id=ps-gethelp
schema: 2.0.0
title: Copy-NetIPsecRule
Expand Down Expand Up @@ -706,16 +706,12 @@ Specifies that matching IPsec rules of the indicated key module are copied.
This parameter specifies which keying modules to negotiate.
The acceptable values for this parameter are: Default, AuthIP, IKEv1, or IKEv2.

- Default: Equivalent to both IKEv1 and AuthIP.
Required in order for the rule to be applied to computers running Windows versions prior to nextref_server_7.
- Default: KeyModule is set based on the authentication method. As of Windows 11, version 24H2 and Windows Server 2025, the Default is equivalent to both IKEv1 and IKEv2, and only sets AuthIP if the authentication method(s) require it. In previous releases, Default is equivalent to both IKEv1 and AuthIP. Required in order for the rule to be applied to computers running Windows versions prior to Windows Server 2008.
- AuthIP: Supported with phase 2 authentication.
- IKEv1: Supported with pre-shared key (PSK), Certificates, and Kerberos.
- IKEv2: Not supported with Kerberos, PSK, or NTLM.
The default value is Default.
There are authentication and cryptographic methods that are only compatible with certain keying modules.
This is a very advanced setting intended only for specific interoperability scenarios.
Overriding this parameter value may result in traffic being sent in plain-text if the authorization and cryptographic settings are not supported by the keying modules.
Windows versions prior to Windows Server 2012 only support the Default configuration.
- IKEv1: Supported with pre-shared key (PSK), Certificates, and Kerberos. Supported with phase 1 authentication only.
- IKEv2: Not supported with Kerberos, PSK, or NTLM. Supported with phase 1 authentication only.

The default value is Default. There are authentication and cryptographic methods that are only compatible with certain keying modules. This is a very advanced setting intended only for specific interoperability scenarios. Overriding this parameter value may result in traffic being sent in plain-text if the authorization and cryptographic settings are not supported by the keying modules. Windows versions prior to Windows Server 2012 only support the Default configuration.

```yaml
Type: KeyModule[]
Expand All @@ -725,7 +721,7 @@ Accepted values: Default, IKEv1, AuthIP, IKEv2

Required: False
Position: Named
Default value: None
Default value: Default
Accept pipeline input: False
Accept wildcard characters: False
```
Expand Down
18 changes: 8 additions & 10 deletions docset/winserver2022-ps/netsecurity/Disable-NetIPsecRule.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
description: Use this topic to help manage Windows and Windows Server technologies with Windows PowerShell.
external help file: NetIPsecRule.cmdletDefinition.cdxml-help.xml
Module Name: NetSecurity
ms.date: 12/27/2016
ms.date: 03/03/2025
online version: https://learn.microsoft.com/powershell/module/netsecurity/disable-netipsecrule?view=windowsserver2022-ps&wt.mc_id=ps-gethelp
schema: 2.0.0
title: Disable-NetIPsecRule
Expand Down Expand Up @@ -638,15 +638,13 @@ Accept wildcard characters: False
Specifies that matching IPsec rules of the indicated key module are disabled.
This parameter specifies which keying modules to negotiate.
The acceptable values for this parameter are: Default, AuthIP, IKEv1, or IKEv2.
- Default: Equivalent to both IKEv1 and AuthIP.
Required in order for the rule to be applied to computers running Windows versions prior to nextref_server_7.
---- There are authorization and cryptographic methods that are only compatible with certain keying modules.
This is a very advanced setting intended only for specific interoperability scenarios.
Overriding this parameter value may result in traffic being sent in plain-text if the authorization and cryptographic settings are not supported by the keying modules there.

- Default: KeyModule is set based on the authentication method. As of Windows 11, version 24H2 and Windows Server 2025, the Default is equivalent to both IKEv1 and IKEv2, and only sets AuthIP if the authentication method(s) require it. In previous releases, Default is equivalent to both IKEv1 and AuthIP. Required in order for the rule to be applied to computers running Windows versions prior to Windows Server 2008.
- AuthIP: Supported with phase 2 authentication.
- IKEv1: Supported with pre-shared key (PSK), Certificates, and Kerberos.
- IKEv2: Not supported with Kerberos, PSK, or NTLM.
Windows versions prior to Windows Server 2012 only support the Default configuration.
- IKEv1: Supported with pre-shared key (PSK), Certificates, and Kerberos. Supported with phase 1 authentication only.
- IKEv2: Not supported with Kerberos, PSK, or NTLM. Supported with phase 1 authentication only.

The default value is Default. There are authentication and cryptographic methods that are only compatible with certain keying modules. This is a very advanced setting intended only for specific interoperability scenarios. Overriding this parameter value may result in traffic being sent in plain-text if the authorization and cryptographic settings are not supported by the keying modules. Windows versions prior to Windows Server 2012 only support the Default configuration.

```yaml
Type: KeyModule[]
Expand All @@ -656,7 +654,7 @@ Accepted values: Default, IKEv1, AuthIP, IKEv2

Required: False
Position: Named
Default value: None
Default value: Default
Accept pipeline input: False
Accept wildcard characters: False
```
Expand Down
17 changes: 7 additions & 10 deletions docset/winserver2022-ps/netsecurity/Enable-NetIPsecRule.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
description: Use this topic to help manage Windows and Windows Server technologies with Windows PowerShell.
external help file: NetIPsecRule.cmdletDefinition.cdxml-help.xml
Module Name: NetSecurity
ms.date: 12/27/2016
ms.date: 03/03/2025
online version: https://learn.microsoft.com/powershell/module/netsecurity/enable-netipsecrule?view=windowsserver2022-ps&wt.mc_id=ps-gethelp
schema: 2.0.0
title: Enable-NetIPsecRule
Expand Down Expand Up @@ -629,15 +629,12 @@ Specifies that matching IPsec rules of the indicated key module are enabled.
This parameter specifies which keying modules to negotiate.
The acceptable values for this parameter are: Default, AuthIP, IKEv1, or IKEv2.

- Default: Equivalent to both IKEv1 and AuthIP.
Required in order for the rule to be applied to computers running Windows versions prior to nextref_server_7.
---- There are authorization and cryptographic methods that are only compatible with certain keying modules.
This is a very advanced setting intended only for specific interoperability scenarios.
Overriding this parameter value may result in traffic being sent in plain-text if the authorization and cryptographic settings are not supported by the keying modules there.
- Default: KeyModule is set based on the authentication method. As of Windows 11, version 24H2 and Windows Server 2025, the Default is equivalent to both IKEv1 and IKEv2, and only sets AuthIP if the authentication method(s) require it. In previous releases, Default is equivalent to both IKEv1 and AuthIP. Required in order for the rule to be applied to computers running Windows versions prior to Windows Server 2008.
- AuthIP: Supported with phase 2 authentication.
- IKEv1: Supported with pre-shared key (PSK), Certificates, and Kerberos.
- IKEv2: Not supported with Kerberos, PSK, or NTLM.
Windows versions prior to Windows Server 2012 only support the Default configuration.
- IKEv1: Supported with pre-shared key (PSK), Certificates, and Kerberos. Supported with phase 1 authentication only.
- IKEv2: Not supported with Kerberos, PSK, or NTLM. Supported with phase 1 authentication only.

The default value is Default. There are authentication and cryptographic methods that are only compatible with certain keying modules. This is a very advanced setting intended only for specific interoperability scenarios. Overriding this parameter value may result in traffic being sent in plain-text if the authorization and cryptographic settings are not supported by the keying modules. Windows versions prior to Windows Server 2012 only support the Default configuration.

```yaml
Type: KeyModule[]
Expand All @@ -647,7 +644,7 @@ Accepted values: Default, IKEv1, AuthIP, IKEv2

Required: False
Position: Named
Default value: None
Default value: Default
Accept pipeline input: False
Accept wildcard characters: False
```
Expand Down
17 changes: 7 additions & 10 deletions docset/winserver2022-ps/netsecurity/Get-NetIPsecRule.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
description: Use this topic to help manage Windows and Windows Server technologies with Windows PowerShell.
external help file: NetIPsecRule.cmdletDefinition.cdxml-help.xml
Module Name: NetSecurity
ms.date: 12/27/2016
ms.date: 03/03/2025
online version: https://learn.microsoft.com/powershell/module/netsecurity/get-netipsecrule?view=windowsserver2022-ps&wt.mc_id=ps-gethelp
schema: 2.0.0
title: Get-NetIPsecRule
Expand Down Expand Up @@ -600,15 +600,12 @@ Specifies that matching IPsec rules of the indicated key module are retrieved.
This parameter specifies which keying modules to negotiate.
The acceptable values for this parameter are: Default, AuthIP, IKEv1, or IKEv2.

- Default: Equivalent to both IKEv1 and AuthIP.
Required in order for the rule to be applied to computers running Windows versions prior to nextref_server_7.
---- There are authorization and cryptographic methods that are only compatible with certain keying modules.
This is a very advanced setting intended only for specific interoperability scenarios.
Overriding this parameter value may result in traffic being sent in plain-text if the authorization and cryptographic settings are not supported by the keying modules there.
- Default: KeyModule is set based on the authentication method. As of Windows 11, version 24H2 and Windows Server 2025, the Default is equivalent to both IKEv1 and IKEv2, and only sets AuthIP if the authentication method(s) require it. In previous releases, Default is equivalent to both IKEv1 and AuthIP. Required in order for the rule to be applied to computers running Windows versions prior to Windows Server 2008.
- AuthIP: Supported with phase 2 authentication.
- IKEv1: Supported with pre-shared key (PSK), Certificates, and Kerberos.
- IKEv2: Not supported with Kerberos, PSK, or NTLM.
Windows versions prior to Windows Server 2012 only support the Default configuration.
- IKEv1: Supported with pre-shared key (PSK), Certificates, and Kerberos. Supported with phase 1 authentication only.
- IKEv2: Not supported with Kerberos, PSK, or NTLM. Supported with phase 1 authentication only.

The default value is Default. There are authentication and cryptographic methods that are only compatible with certain keying modules. This is a very advanced setting intended only for specific interoperability scenarios. Overriding this parameter value may result in traffic being sent in plain-text if the authorization and cryptographic settings are not supported by the keying modules. Windows versions prior to Windows Server 2012 only support the Default configuration.

```yaml
Type: KeyModule[]
Expand All @@ -618,7 +615,7 @@ Accepted values: Default, IKEv1, AuthIP, IKEv2

Required: False
Position: Named
Default value: None
Default value: Default
Accept pipeline input: False
Accept wildcard characters: False
```
Expand Down
17 changes: 7 additions & 10 deletions docset/winserver2022-ps/netsecurity/New-NetIPsecRule.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
description: Use this topic to help manage Windows and Windows Server technologies with Windows PowerShell.
external help file: NetIPsecRule.cmdletDefinition.cdxml-help.xml
Module Name: NetSecurity
ms.date: 12/27/2016
ms.date: 03/03/2025
online version: https://learn.microsoft.com/powershell/module/netsecurity/new-netipsecrule?view=windowsserver2022-ps&wt.mc_id=ps-gethelp
schema: 2.0.0
title: New-NetIPsecRule
Expand Down Expand Up @@ -425,15 +425,12 @@ Specifies that matching IPsec rules of the indicated key module are created.
This parameter specifies which keying modules to negotiate.
The acceptable values for this parameter are: Default, AuthIP, IKEv1, or IKEv2.

- Default: Equivalent to both IKEv1 and AuthIP.
Required in order for the rule to be applied to computers running Windows versions prior to nextref_server_7.
---- There are authorization and cryptographic methods that are only compatible with certain keying modules.
This is a very advanced setting intended only for specific interoperability scenarios.
Overriding this parameter value may result in traffic being sent in plain-text if the authentication and cryptographic settings are not supported by the keying modules there.
- Default: KeyModule is set based on the authentication method. As of Windows 11, version 24H2 and Windows Server 2025, the Default is equivalent to both IKEv1 and IKEv2, and only sets AuthIP if the authentication method(s) require it. In previous releases, Default is equivalent to both IKEv1 and AuthIP. Required in order for the rule to be applied to computers running Windows versions prior to Windows Server 2008.
- AuthIP: Supported with phase 2 authentication.
- IKEv1: Supported with pre-shared key (PSK), Certificates, and Kerberos.
- IKEv2: Not supported with Kerberos, PSK, or NTLM.
Windows versions prior to Windows Server 2012 only support the Default configuration.
- IKEv1: Supported with pre-shared key (PSK), Certificates, and Kerberos. Supported with phase 1 authentication only.
- IKEv2: Not supported with Kerberos, PSK, or NTLM. Supported with phase 1 authentication only.

The default value is Default. There are authentication and cryptographic methods that are only compatible with certain keying modules. This is a very advanced setting intended only for specific interoperability scenarios. Overriding this parameter value may result in traffic being sent in plain-text if the authorization and cryptographic settings are not supported by the keying modules. Windows versions prior to Windows Server 2012 only support the Default configuration.

```yaml
Type: KeyModule
Expand All @@ -443,7 +440,7 @@ Accepted values: Default, IKEv1, AuthIP, IKEv2

Required: False
Position: Named
Default value: None
Default value: Default
Accept pipeline input: False
Accept wildcard characters: False
```
Expand Down
17 changes: 7 additions & 10 deletions docset/winserver2022-ps/netsecurity/Remove-NetIPsecRule.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
description: Use this topic to help manage Windows and Windows Server technologies with Windows PowerShell.
external help file: NetIPsecRule.cmdletDefinition.cdxml-help.xml
Module Name: NetSecurity
ms.date: 12/27/2016
ms.date: 03/03/2025
online version: https://learn.microsoft.com/powershell/module/netsecurity/remove-netipsecrule?view=windowsserver2022-ps&wt.mc_id=ps-gethelp
schema: 2.0.0
title: Remove-NetIPsecRule
Expand Down Expand Up @@ -644,15 +644,12 @@ Specifies that matching IPsec rules of the indicated key module are removed.
This parameter specifies which keying modules to negotiate.
The acceptable values for this parameter are: Default, AuthIP, IKEv1, or IKEv2.

- Default: Equivalent to both IKEv1 and AuthIP.
Required in order for the rule to be applied to computers running Windows versions prior to nextref_server_7.
---- There are authorization and cryptographic methods that are only compatible with certain keying modules.
This is a very advanced setting intended only for specific interoperability scenarios.
Overriding this parameter value may result in traffic being sent in plain-text if the authorization and cryptographic settings are not supported by the keying modules there.
- Default: KeyModule is set based on the authentication method. As of Windows 11, version 24H2 and Windows Server 2025, the Default is equivalent to both IKEv1 and IKEv2, and only sets AuthIP if the authentication method(s) require it. In previous releases, Default is equivalent to both IKEv1 and AuthIP. Required in order for the rule to be applied to computers running Windows versions prior to Windows Server 2008.
- AuthIP: Supported with phase 2 authentication.
- IKEv1: Supported with pre-shared key (PSK), Certificates, and Kerberos.
- IKEv2: Not supported with Kerberos, PSK, or NTLM.
Windows versions prior to Windows Server 2012 only support the Default configuration.
- IKEv1: Supported with pre-shared key (PSK), Certificates, and Kerberos. Supported with phase 1 authentication only.
- IKEv2: Not supported with Kerberos, PSK, or NTLM. Supported with phase 1 authentication only.

The default value is Default. There are authentication and cryptographic methods that are only compatible with certain keying modules. This is a very advanced setting intended only for specific interoperability scenarios. Overriding this parameter value may result in traffic being sent in plain-text if the authorization and cryptographic settings are not supported by the keying modules. Windows versions prior to Windows Server 2012 only support the Default configuration.

```yaml
Type: KeyModule[]
Expand All @@ -662,7 +659,7 @@ Accepted values: Default, IKEv1, AuthIP, IKEv2

Required: False
Position: Named
Default value: None
Default value: Default
Accept pipeline input: False
Accept wildcard characters: False
```
Expand Down
20 changes: 8 additions & 12 deletions docset/winserver2025-ps/netsecurity/Copy-NetIPsecRule.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
description: Use this topic to help manage Windows and Windows Server technologies with Windows PowerShell.
external help file: NetIPsecRule.cmdletDefinition.cdxml-help.xml
Module Name: NetSecurity
ms.date: 12/27/2016
ms.date: 03/03/2025
online version: https://learn.microsoft.com/powershell/module/netsecurity/copy-netipsecrule?view=windowsserver2025-ps&wt.mc_id=ps-gethelp
schema: 2.0.0
title: Copy-NetIPsecRule
Expand Down Expand Up @@ -706,16 +706,12 @@ Specifies that matching IPsec rules of the indicated key module are copied.
This parameter specifies which keying modules to negotiate.
The acceptable values for this parameter are: Default, AuthIP, IKEv1, or IKEv2.

- Default: Equivalent to both IKEv1 and AuthIP.
Required in order for the rule to be applied to computers running Windows versions prior to nextref_server_7.
- AuthIP: Supported with phase 2 authentication.
- IKEv1: Supported with pre-shared key (PSK), Certificates, and Kerberos.
- IKEv2: Not supported with Kerberos, PSK, or NTLM.
The default value is Default.
There are authentication and cryptographic methods that are only compatible with certain keying modules.
This is a very advanced setting intended only for specific interoperability scenarios.
Overriding this parameter value may result in traffic being sent in plain-text if the authorization and cryptographic settings are not supported by the keying modules.
Windows versions prior to Windows Server 2012 only support the Default configuration.
- Default: KeyModule is set based on the authentication method. As of Windows 11, version 24H2 and Windows Server 2025, the Default is equivalent to both IKEv1 and IKEv2, and only sets AuthIP if the authentication method(s) require it. In previous releases, Default is equivalent to both IKEv1 and AuthIP. Required in order for the rule to be applied to computers running Windows versions prior to Windows Server 2008.
- AuthIP: Supported with phase 2 authentication.
- IKEv1: Supported with pre-shared key (PSK), Certificates, and Kerberos. Supported with phase 1 authentication only.
- IKEv2: Not supported with Kerberos, PSK, or NTLM. Supported with phase 1 authentication only.

The default value is Default. There are authentication and cryptographic methods that are only compatible with certain keying modules. This is a very advanced setting intended only for specific interoperability scenarios. Overriding this parameter value may result in traffic being sent in plain-text if the authorization and cryptographic settings are not supported by the keying modules. Windows versions prior to Windows Server 2012 only support the Default configuration.

```yaml
Type: KeyModule[]
Expand All @@ -725,7 +721,7 @@ Accepted values: Default, IKEv1, AuthIP, IKEv2

Required: False
Position: Named
Default value: None
Default value: Default
Accept pipeline input: False
Accept wildcard characters: False
```
Expand Down
Loading