Skip to content

Commit 5bcf47d

Browse files
authored
Merge pull request #3936 from brandyking/patch-5
Update Get-NetIPsecRule.md
2 parents 21fdc9e + adc6ef3 commit 5bcf47d

File tree

2 files changed

+15
-21
lines changed

2 files changed

+15
-21
lines changed

docset/winserver2022-ps/netsecurity/Get-NetIPsecRule.md

Lines changed: 7 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
description: Use this topic to help manage Windows and Windows Server technologies with Windows PowerShell.
33
external help file: NetIPsecRule.cmdletDefinition.cdxml-help.xml
44
Module Name: NetSecurity
5-
ms.date: 12/27/2016
5+
ms.date: 03/03/2025
66
online version: https://learn.microsoft.com/powershell/module/netsecurity/get-netipsecrule?view=windowsserver2022-ps&wt.mc_id=ps-gethelp
77
schema: 2.0.0
88
title: Get-NetIPsecRule
@@ -600,15 +600,12 @@ Specifies that matching IPsec rules of the indicated key module are retrieved.
600600
This parameter specifies which keying modules to negotiate.
601601
The acceptable values for this parameter are: Default, AuthIP, IKEv1, or IKEv2.
602602
603-
- Default: Equivalent to both IKEv1 and AuthIP.
604-
Required in order for the rule to be applied to computers running Windows versions prior to nextref_server_7.
605-
---- There are authorization and cryptographic methods that are only compatible with certain keying modules.
606-
This is a very advanced setting intended only for specific interoperability scenarios.
607-
Overriding this parameter value may result in traffic being sent in plain-text if the authorization and cryptographic settings are not supported by the keying modules there.
603+
- Default: KeyModule is set based on the authentication method. As of Windows 11, version 24H2 and Windows Server 2025, the Default is equivalent to both IKEv1 and IKEv2, and only sets AuthIP if the authentication method(s) require it. In previous releases, Default is equivalent to both IKEv1 and AuthIP. Required in order for the rule to be applied to computers running Windows versions prior to Windows Server 2008.
608604
- AuthIP: Supported with phase 2 authentication.
609-
- IKEv1: Supported with pre-shared key (PSK), Certificates, and Kerberos.
610-
- IKEv2: Not supported with Kerberos, PSK, or NTLM.
611-
Windows versions prior to Windows Server 2012 only support the Default configuration.
605+
- IKEv1: Supported with pre-shared key (PSK), Certificates, and Kerberos. Supported with phase 1 authentication only.
606+
- IKEv2: Not supported with Kerberos, PSK, or NTLM. Supported with phase 1 authentication only.
607+
608+
The default value is Default. There are authentication and cryptographic methods that are only compatible with certain keying modules. This is a very advanced setting intended only for specific interoperability scenarios. Overriding this parameter value may result in traffic being sent in plain-text if the authorization and cryptographic settings are not supported by the keying modules. Windows versions prior to Windows Server 2012 only support the Default configuration.
612609
613610
```yaml
614611
Type: KeyModule[]
@@ -618,7 +615,7 @@ Accepted values: Default, IKEv1, AuthIP, IKEv2
618615

619616
Required: False
620617
Position: Named
621-
Default value: None
618+
Default value: Default
622619
Accept pipeline input: False
623620
Accept wildcard characters: False
624621
```

docset/winserver2025-ps/netsecurity/Get-NetIPsecRule.md

Lines changed: 8 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
description: Use this topic to help manage Windows and Windows Server technologies with Windows PowerShell.
33
external help file: NetIPsecRule.cmdletDefinition.cdxml-help.xml
44
Module Name: NetSecurity
5-
ms.date: 12/27/2016
5+
ms.date: 03/03/2025
66
online version: https://learn.microsoft.com/powershell/module/netsecurity/get-netipsecrule?view=windowsserver2025-ps&wt.mc_id=ps-gethelp
77
schema: 2.0.0
88
title: Get-NetIPsecRule
@@ -600,15 +600,12 @@ Specifies that matching IPsec rules of the indicated key module are retrieved.
600600
This parameter specifies which keying modules to negotiate.
601601
The acceptable values for this parameter are: Default, AuthIP, IKEv1, or IKEv2.
602602
603-
- Default: Equivalent to both IKEv1 and AuthIP.
604-
Required in order for the rule to be applied to computers running Windows versions prior to nextref_server_7.
605-
---- There are authorization and cryptographic methods that are only compatible with certain keying modules.
606-
This is a very advanced setting intended only for specific interoperability scenarios.
607-
Overriding this parameter value may result in traffic being sent in plain-text if the authorization and cryptographic settings are not supported by the keying modules there.
608-
- AuthIP: Supported with phase 2 authentication.
609-
- IKEv1: Supported with pre-shared key (PSK), Certificates, and Kerberos.
610-
- IKEv2: Not supported with Kerberos, PSK, or NTLM.
611-
Windows versions prior to Windows Server 2012 only support the Default configuration.
603+
- Default: KeyModule is set based on the authentication method. As of Windows 11, version 24H2 and Windows Server 2025, the Default is equivalent to both IKEv1 and IKEv2, and only sets AuthIP if the authentication method(s) require it. In previous releases, Default is equivalent to both IKEv1 and AuthIP. Required in order for the rule to be applied to computers running Windows versions prior to Windows Server 2008.
604+
- AuthIP: Supported with phase 2 authentication.
605+
- IKEv1: Supported with pre-shared key (PSK), Certificates, and Kerberos. Supported with phase 1 authentication only.
606+
- IKEv2: Not supported with Kerberos, PSK, or NTLM. Supported with phase 1 authentication only.
607+
608+
The default value is Default. There are authentication and cryptographic methods that are only compatible with certain keying modules. This is a very advanced setting intended only for specific interoperability scenarios. Overriding this parameter value may result in traffic being sent in plain-text if the authorization and cryptographic settings are not supported by the keying modules. Windows versions prior to Windows Server 2012 only support the Default configuration.
612609
613610
```yaml
614611
Type: KeyModule[]
@@ -618,7 +615,7 @@ Accepted values: Default, IKEv1, AuthIP, IKEv2
618615

619616
Required: False
620617
Position: Named
621-
Default value: None
618+
Default value: Default
622619
Accept pipeline input: False
623620
Accept wildcard characters: False
624621
```

0 commit comments

Comments
 (0)