Use this tab of the Connection Security Rule Properties dialog box to specify the authentication requirements and protocols that are used to protect network traffic that matches this rule.

To get to this tab
  1. In the Windows Firewall with Advanced Security MMC snap-in, click Connection Security Rules.

  2. Right-click the rule that you want to modify, and then click Properties.

  3. Click the Authentication tab.

Requirements

Under Authentication mode, select one of the following options to indicate whether authentication of network traffic is required or requested.

Option Description

Do not authenticate

Select this option to make the rule an authentication exemption rule. Network traffic that matches this rule is not authenticated by Internet Protocol security (IPsec) on this computer. The option is also valid on tunnel mode rules that are created by using the Custom Configuration or Client-to-Gateway options.

Request inbound and outbound

Connections are authenticated if possible, but the connections are allowed if authentication fails.

Require inbound and request outbound

All inbound network connections must be authenticated or they fail. Outbound connections are authenticated if possible, but are allowed if authentication fails.

Require inbound and outbound

Only connections that are authenticated are allowed.

Require inbound and clear outbound

All inbound network connections must be authenticated or they fail. Outbound connections are not authenticated.

Security Note

We recommend that you use this setting only when required on an IPsec gateway that must be able to initiate communications with computers that cannot use IPsec on the Internet.

Method

Use these settings to configure the type of authentication used by this connection security rule.

For more information about the authentication methods, see IPsec Algorithms and Methods Supported in Windows (https://go.microsoft.com/fwlink/?linkid=129230).

If you choose Advanced, then you must click Customize and add the authentication methods by using the Customize Advanced Authentication Methods dialog box.

Additional references


Table Of Contents