Skip to content

Commit 234e930

Browse files
Merge pull request #3946 from MicrosoftDocs/main
Publish main to live, 03/05/25, 3:30 PM PT
2 parents e903a49 + 6870d62 commit 234e930

File tree

12 files changed

+92
-128
lines changed

12 files changed

+92
-128
lines changed

docset/winserver2022-ps/netsecurity/Copy-NetIPsecRule.md

Lines changed: 7 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
description: Use this topic to help manage Windows and Windows Server technologies with Windows PowerShell.
33
external help file: NetIPsecRule.cmdletDefinition.cdxml-help.xml
44
Module Name: NetSecurity
5-
ms.date: 12/27/2016
5+
ms.date: 03/03/2025
66
online version: https://learn.microsoft.com/powershell/module/netsecurity/copy-netipsecrule?view=windowsserver2022-ps&wt.mc_id=ps-gethelp
77
schema: 2.0.0
88
title: Copy-NetIPsecRule
@@ -706,16 +706,12 @@ Specifies that matching IPsec rules of the indicated key module are copied.
706706
This parameter specifies which keying modules to negotiate.
707707
The acceptable values for this parameter are: Default, AuthIP, IKEv1, or IKEv2.
708708
709-
- Default: Equivalent to both IKEv1 and AuthIP.
710-
Required in order for the rule to be applied to computers running Windows versions prior to nextref_server_7.
709+
- Default: KeyModule is set based on the authentication method. As of Windows 11, version 24H2 and Windows Server 2025, the Default is equivalent to both IKEv1 and IKEv2, and only sets AuthIP if the authentication method(s) require it. In previous releases, Default is equivalent to both IKEv1 and AuthIP. Required in order for the rule to be applied to computers running Windows versions prior to Windows Server 2008.
711710
- AuthIP: Supported with phase 2 authentication.
712-
- IKEv1: Supported with pre-shared key (PSK), Certificates, and Kerberos.
713-
- IKEv2: Not supported with Kerberos, PSK, or NTLM.
714-
The default value is Default.
715-
There are authentication and cryptographic methods that are only compatible with certain keying modules.
716-
This is a very advanced setting intended only for specific interoperability scenarios.
717-
Overriding this parameter value may result in traffic being sent in plain-text if the authorization and cryptographic settings are not supported by the keying modules.
718-
Windows versions prior to Windows Server 2012 only support the Default configuration.
711+
- IKEv1: Supported with pre-shared key (PSK), Certificates, and Kerberos. Supported with phase 1 authentication only.
712+
- IKEv2: Not supported with Kerberos, PSK, or NTLM. Supported with phase 1 authentication only.
713+
714+
The default value is Default. There are authentication and cryptographic methods that are only compatible with certain keying modules. This is a very advanced setting intended only for specific interoperability scenarios. Overriding this parameter value may result in traffic being sent in plain-text if the authorization and cryptographic settings are not supported by the keying modules. Windows versions prior to Windows Server 2012 only support the Default configuration.
719715
720716
```yaml
721717
Type: KeyModule[]
@@ -725,7 +721,7 @@ Accepted values: Default, IKEv1, AuthIP, IKEv2
725721

726722
Required: False
727723
Position: Named
728-
Default value: None
724+
Default value: Default
729725
Accept pipeline input: False
730726
Accept wildcard characters: False
731727
```

docset/winserver2022-ps/netsecurity/Disable-NetIPsecRule.md

Lines changed: 8 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
description: Use this topic to help manage Windows and Windows Server technologies with Windows PowerShell.
33
external help file: NetIPsecRule.cmdletDefinition.cdxml-help.xml
44
Module Name: NetSecurity
5-
ms.date: 12/27/2016
5+
ms.date: 03/03/2025
66
online version: https://learn.microsoft.com/powershell/module/netsecurity/disable-netipsecrule?view=windowsserver2022-ps&wt.mc_id=ps-gethelp
77
schema: 2.0.0
88
title: Disable-NetIPsecRule
@@ -638,15 +638,13 @@ Accept wildcard characters: False
638638
Specifies that matching IPsec rules of the indicated key module are disabled.
639639
This parameter specifies which keying modules to negotiate.
640640
The acceptable values for this parameter are: Default, AuthIP, IKEv1, or IKEv2.
641-
- Default: Equivalent to both IKEv1 and AuthIP.
642-
Required in order for the rule to be applied to computers running Windows versions prior to nextref_server_7.
643-
---- There are authorization and cryptographic methods that are only compatible with certain keying modules.
644-
This is a very advanced setting intended only for specific interoperability scenarios.
645-
Overriding this parameter value may result in traffic being sent in plain-text if the authorization and cryptographic settings are not supported by the keying modules there.
641+
642+
- Default: KeyModule is set based on the authentication method. As of Windows 11, version 24H2 and Windows Server 2025, the Default is equivalent to both IKEv1 and IKEv2, and only sets AuthIP if the authentication method(s) require it. In previous releases, Default is equivalent to both IKEv1 and AuthIP. Required in order for the rule to be applied to computers running Windows versions prior to Windows Server 2008.
646643
- AuthIP: Supported with phase 2 authentication.
647-
- IKEv1: Supported with pre-shared key (PSK), Certificates, and Kerberos.
648-
- IKEv2: Not supported with Kerberos, PSK, or NTLM.
649-
Windows versions prior to Windows Server 2012 only support the Default configuration.
644+
- IKEv1: Supported with pre-shared key (PSK), Certificates, and Kerberos. Supported with phase 1 authentication only.
645+
- IKEv2: Not supported with Kerberos, PSK, or NTLM. Supported with phase 1 authentication only.
646+
647+
The default value is Default. There are authentication and cryptographic methods that are only compatible with certain keying modules. This is a very advanced setting intended only for specific interoperability scenarios. Overriding this parameter value may result in traffic being sent in plain-text if the authorization and cryptographic settings are not supported by the keying modules. Windows versions prior to Windows Server 2012 only support the Default configuration.
650648
651649
```yaml
652650
Type: KeyModule[]
@@ -656,7 +654,7 @@ Accepted values: Default, IKEv1, AuthIP, IKEv2
656654

657655
Required: False
658656
Position: Named
659-
Default value: None
657+
Default value: Default
660658
Accept pipeline input: False
661659
Accept wildcard characters: False
662660
```

docset/winserver2022-ps/netsecurity/Enable-NetIPsecRule.md

Lines changed: 7 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
description: Use this topic to help manage Windows and Windows Server technologies with Windows PowerShell.
33
external help file: NetIPsecRule.cmdletDefinition.cdxml-help.xml
44
Module Name: NetSecurity
5-
ms.date: 12/27/2016
5+
ms.date: 03/03/2025
66
online version: https://learn.microsoft.com/powershell/module/netsecurity/enable-netipsecrule?view=windowsserver2022-ps&wt.mc_id=ps-gethelp
77
schema: 2.0.0
88
title: Enable-NetIPsecRule
@@ -629,15 +629,12 @@ Specifies that matching IPsec rules of the indicated key module are enabled.
629629
This parameter specifies which keying modules to negotiate.
630630
The acceptable values for this parameter are: Default, AuthIP, IKEv1, or IKEv2.
631631
632-
- Default: Equivalent to both IKEv1 and AuthIP.
633-
Required in order for the rule to be applied to computers running Windows versions prior to nextref_server_7.
634-
---- There are authorization and cryptographic methods that are only compatible with certain keying modules.
635-
This is a very advanced setting intended only for specific interoperability scenarios.
636-
Overriding this parameter value may result in traffic being sent in plain-text if the authorization and cryptographic settings are not supported by the keying modules there.
632+
- Default: KeyModule is set based on the authentication method. As of Windows 11, version 24H2 and Windows Server 2025, the Default is equivalent to both IKEv1 and IKEv2, and only sets AuthIP if the authentication method(s) require it. In previous releases, Default is equivalent to both IKEv1 and AuthIP. Required in order for the rule to be applied to computers running Windows versions prior to Windows Server 2008.
637633
- AuthIP: Supported with phase 2 authentication.
638-
- IKEv1: Supported with pre-shared key (PSK), Certificates, and Kerberos.
639-
- IKEv2: Not supported with Kerberos, PSK, or NTLM.
640-
Windows versions prior to Windows Server 2012 only support the Default configuration.
634+
- IKEv1: Supported with pre-shared key (PSK), Certificates, and Kerberos. Supported with phase 1 authentication only.
635+
- IKEv2: Not supported with Kerberos, PSK, or NTLM. Supported with phase 1 authentication only.
636+
637+
The default value is Default. There are authentication and cryptographic methods that are only compatible with certain keying modules. This is a very advanced setting intended only for specific interoperability scenarios. Overriding this parameter value may result in traffic being sent in plain-text if the authorization and cryptographic settings are not supported by the keying modules. Windows versions prior to Windows Server 2012 only support the Default configuration.
641638
642639
```yaml
643640
Type: KeyModule[]
@@ -647,7 +644,7 @@ Accepted values: Default, IKEv1, AuthIP, IKEv2
647644

648645
Required: False
649646
Position: Named
650-
Default value: None
647+
Default value: Default
651648
Accept pipeline input: False
652649
Accept wildcard characters: False
653650
```

docset/winserver2022-ps/netsecurity/Get-NetIPsecRule.md

Lines changed: 7 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
description: Use this topic to help manage Windows and Windows Server technologies with Windows PowerShell.
33
external help file: NetIPsecRule.cmdletDefinition.cdxml-help.xml
44
Module Name: NetSecurity
5-
ms.date: 12/27/2016
5+
ms.date: 03/03/2025
66
online version: https://learn.microsoft.com/powershell/module/netsecurity/get-netipsecrule?view=windowsserver2022-ps&wt.mc_id=ps-gethelp
77
schema: 2.0.0
88
title: Get-NetIPsecRule
@@ -600,15 +600,12 @@ Specifies that matching IPsec rules of the indicated key module are retrieved.
600600
This parameter specifies which keying modules to negotiate.
601601
The acceptable values for this parameter are: Default, AuthIP, IKEv1, or IKEv2.
602602
603-
- Default: Equivalent to both IKEv1 and AuthIP.
604-
Required in order for the rule to be applied to computers running Windows versions prior to nextref_server_7.
605-
---- There are authorization and cryptographic methods that are only compatible with certain keying modules.
606-
This is a very advanced setting intended only for specific interoperability scenarios.
607-
Overriding this parameter value may result in traffic being sent in plain-text if the authorization and cryptographic settings are not supported by the keying modules there.
603+
- Default: KeyModule is set based on the authentication method. As of Windows 11, version 24H2 and Windows Server 2025, the Default is equivalent to both IKEv1 and IKEv2, and only sets AuthIP if the authentication method(s) require it. In previous releases, Default is equivalent to both IKEv1 and AuthIP. Required in order for the rule to be applied to computers running Windows versions prior to Windows Server 2008.
608604
- AuthIP: Supported with phase 2 authentication.
609-
- IKEv1: Supported with pre-shared key (PSK), Certificates, and Kerberos.
610-
- IKEv2: Not supported with Kerberos, PSK, or NTLM.
611-
Windows versions prior to Windows Server 2012 only support the Default configuration.
605+
- IKEv1: Supported with pre-shared key (PSK), Certificates, and Kerberos. Supported with phase 1 authentication only.
606+
- IKEv2: Not supported with Kerberos, PSK, or NTLM. Supported with phase 1 authentication only.
607+
608+
The default value is Default. There are authentication and cryptographic methods that are only compatible with certain keying modules. This is a very advanced setting intended only for specific interoperability scenarios. Overriding this parameter value may result in traffic being sent in plain-text if the authorization and cryptographic settings are not supported by the keying modules. Windows versions prior to Windows Server 2012 only support the Default configuration.
612609
613610
```yaml
614611
Type: KeyModule[]
@@ -618,7 +615,7 @@ Accepted values: Default, IKEv1, AuthIP, IKEv2
618615

619616
Required: False
620617
Position: Named
621-
Default value: None
618+
Default value: Default
622619
Accept pipeline input: False
623620
Accept wildcard characters: False
624621
```

docset/winserver2022-ps/netsecurity/New-NetIPsecRule.md

Lines changed: 7 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
description: Use this topic to help manage Windows and Windows Server technologies with Windows PowerShell.
33
external help file: NetIPsecRule.cmdletDefinition.cdxml-help.xml
44
Module Name: NetSecurity
5-
ms.date: 12/27/2016
5+
ms.date: 03/03/2025
66
online version: https://learn.microsoft.com/powershell/module/netsecurity/new-netipsecrule?view=windowsserver2022-ps&wt.mc_id=ps-gethelp
77
schema: 2.0.0
88
title: New-NetIPsecRule
@@ -425,15 +425,12 @@ Specifies that matching IPsec rules of the indicated key module are created.
425425
This parameter specifies which keying modules to negotiate.
426426
The acceptable values for this parameter are: Default, AuthIP, IKEv1, or IKEv2.
427427
428-
- Default: Equivalent to both IKEv1 and AuthIP.
429-
Required in order for the rule to be applied to computers running Windows versions prior to nextref_server_7.
430-
---- There are authorization and cryptographic methods that are only compatible with certain keying modules.
431-
This is a very advanced setting intended only for specific interoperability scenarios.
432-
Overriding this parameter value may result in traffic being sent in plain-text if the authentication and cryptographic settings are not supported by the keying modules there.
428+
- Default: KeyModule is set based on the authentication method. As of Windows 11, version 24H2 and Windows Server 2025, the Default is equivalent to both IKEv1 and IKEv2, and only sets AuthIP if the authentication method(s) require it. In previous releases, Default is equivalent to both IKEv1 and AuthIP. Required in order for the rule to be applied to computers running Windows versions prior to Windows Server 2008.
433429
- AuthIP: Supported with phase 2 authentication.
434-
- IKEv1: Supported with pre-shared key (PSK), Certificates, and Kerberos.
435-
- IKEv2: Not supported with Kerberos, PSK, or NTLM.
436-
Windows versions prior to Windows Server 2012 only support the Default configuration.
430+
- IKEv1: Supported with pre-shared key (PSK), Certificates, and Kerberos. Supported with phase 1 authentication only.
431+
- IKEv2: Not supported with Kerberos, PSK, or NTLM. Supported with phase 1 authentication only.
432+
433+
The default value is Default. There are authentication and cryptographic methods that are only compatible with certain keying modules. This is a very advanced setting intended only for specific interoperability scenarios. Overriding this parameter value may result in traffic being sent in plain-text if the authorization and cryptographic settings are not supported by the keying modules. Windows versions prior to Windows Server 2012 only support the Default configuration.
437434
438435
```yaml
439436
Type: KeyModule
@@ -443,7 +440,7 @@ Accepted values: Default, IKEv1, AuthIP, IKEv2
443440

444441
Required: False
445442
Position: Named
446-
Default value: None
443+
Default value: Default
447444
Accept pipeline input: False
448445
Accept wildcard characters: False
449446
```

docset/winserver2022-ps/netsecurity/Remove-NetIPsecRule.md

Lines changed: 7 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
description: Use this topic to help manage Windows and Windows Server technologies with Windows PowerShell.
33
external help file: NetIPsecRule.cmdletDefinition.cdxml-help.xml
44
Module Name: NetSecurity
5-
ms.date: 12/27/2016
5+
ms.date: 03/03/2025
66
online version: https://learn.microsoft.com/powershell/module/netsecurity/remove-netipsecrule?view=windowsserver2022-ps&wt.mc_id=ps-gethelp
77
schema: 2.0.0
88
title: Remove-NetIPsecRule
@@ -644,15 +644,12 @@ Specifies that matching IPsec rules of the indicated key module are removed.
644644
This parameter specifies which keying modules to negotiate.
645645
The acceptable values for this parameter are: Default, AuthIP, IKEv1, or IKEv2.
646646
647-
- Default: Equivalent to both IKEv1 and AuthIP.
648-
Required in order for the rule to be applied to computers running Windows versions prior to nextref_server_7.
649-
---- There are authorization and cryptographic methods that are only compatible with certain keying modules.
650-
This is a very advanced setting intended only for specific interoperability scenarios.
651-
Overriding this parameter value may result in traffic being sent in plain-text if the authorization and cryptographic settings are not supported by the keying modules there.
647+
- Default: KeyModule is set based on the authentication method. As of Windows 11, version 24H2 and Windows Server 2025, the Default is equivalent to both IKEv1 and IKEv2, and only sets AuthIP if the authentication method(s) require it. In previous releases, Default is equivalent to both IKEv1 and AuthIP. Required in order for the rule to be applied to computers running Windows versions prior to Windows Server 2008.
652648
- AuthIP: Supported with phase 2 authentication.
653-
- IKEv1: Supported with pre-shared key (PSK), Certificates, and Kerberos.
654-
- IKEv2: Not supported with Kerberos, PSK, or NTLM.
655-
Windows versions prior to Windows Server 2012 only support the Default configuration.
649+
- IKEv1: Supported with pre-shared key (PSK), Certificates, and Kerberos. Supported with phase 1 authentication only.
650+
- IKEv2: Not supported with Kerberos, PSK, or NTLM. Supported with phase 1 authentication only.
651+
652+
The default value is Default. There are authentication and cryptographic methods that are only compatible with certain keying modules. This is a very advanced setting intended only for specific interoperability scenarios. Overriding this parameter value may result in traffic being sent in plain-text if the authorization and cryptographic settings are not supported by the keying modules. Windows versions prior to Windows Server 2012 only support the Default configuration.
656653
657654
```yaml
658655
Type: KeyModule[]
@@ -662,7 +659,7 @@ Accepted values: Default, IKEv1, AuthIP, IKEv2
662659

663660
Required: False
664661
Position: Named
665-
Default value: None
662+
Default value: Default
666663
Accept pipeline input: False
667664
Accept wildcard characters: False
668665
```

docset/winserver2025-ps/netsecurity/Copy-NetIPsecRule.md

Lines changed: 8 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
description: Use this topic to help manage Windows and Windows Server technologies with Windows PowerShell.
33
external help file: NetIPsecRule.cmdletDefinition.cdxml-help.xml
44
Module Name: NetSecurity
5-
ms.date: 12/27/2016
5+
ms.date: 03/03/2025
66
online version: https://learn.microsoft.com/powershell/module/netsecurity/copy-netipsecrule?view=windowsserver2025-ps&wt.mc_id=ps-gethelp
77
schema: 2.0.0
88
title: Copy-NetIPsecRule
@@ -706,16 +706,12 @@ Specifies that matching IPsec rules of the indicated key module are copied.
706706
This parameter specifies which keying modules to negotiate.
707707
The acceptable values for this parameter are: Default, AuthIP, IKEv1, or IKEv2.
708708
709-
- Default: Equivalent to both IKEv1 and AuthIP.
710-
Required in order for the rule to be applied to computers running Windows versions prior to nextref_server_7.
711-
- AuthIP: Supported with phase 2 authentication.
712-
- IKEv1: Supported with pre-shared key (PSK), Certificates, and Kerberos.
713-
- IKEv2: Not supported with Kerberos, PSK, or NTLM.
714-
The default value is Default.
715-
There are authentication and cryptographic methods that are only compatible with certain keying modules.
716-
This is a very advanced setting intended only for specific interoperability scenarios.
717-
Overriding this parameter value may result in traffic being sent in plain-text if the authorization and cryptographic settings are not supported by the keying modules.
718-
Windows versions prior to Windows Server 2012 only support the Default configuration.
709+
- Default: KeyModule is set based on the authentication method. As of Windows 11, version 24H2 and Windows Server 2025, the Default is equivalent to both IKEv1 and IKEv2, and only sets AuthIP if the authentication method(s) require it. In previous releases, Default is equivalent to both IKEv1 and AuthIP. Required in order for the rule to be applied to computers running Windows versions prior to Windows Server 2008.
710+
- AuthIP: Supported with phase 2 authentication.
711+
- IKEv1: Supported with pre-shared key (PSK), Certificates, and Kerberos. Supported with phase 1 authentication only.
712+
- IKEv2: Not supported with Kerberos, PSK, or NTLM. Supported with phase 1 authentication only.
713+
714+
The default value is Default. There are authentication and cryptographic methods that are only compatible with certain keying modules. This is a very advanced setting intended only for specific interoperability scenarios. Overriding this parameter value may result in traffic being sent in plain-text if the authorization and cryptographic settings are not supported by the keying modules. Windows versions prior to Windows Server 2012 only support the Default configuration.
719715
720716
```yaml
721717
Type: KeyModule[]
@@ -725,7 +721,7 @@ Accepted values: Default, IKEv1, AuthIP, IKEv2
725721

726722
Required: False
727723
Position: Named
728-
Default value: None
724+
Default value: Default
729725
Accept pipeline input: False
730726
Accept wildcard characters: False
731727
```

0 commit comments

Comments
 (0)