Use this tab of the Connection Security Rule Properties dialog box to specify the authentication requirements and protocols that are used to protect network traffic that matches this rule.
To get to this tab |
In the Windows Firewall with Advanced Security MMC snap-in, click Connection Security Rules.
Right-click the rule that you want to modify, and then click Properties.
Click the Authentication tab.
Requirements
Under Authentication mode, select one of the following options to indicate whether authentication of network traffic is required or requested.
Option | Description | ||||
---|---|---|---|---|---|
Do not authenticate |
Select this option to make the rule an authentication exemption rule. Network traffic that matches this rule is not authenticated by Internet Protocol security (IPsec) on this computer. The option is also valid on tunnel mode rules that are created by using the Custom Configuration or Client-to-Gateway options. | ||||
Request inbound and outbound |
Connections are authenticated if possible, but the connections are allowed if authentication fails. | ||||
Require inbound and request outbound |
All inbound network connections must be authenticated or they fail. Outbound connections are authenticated if possible, but are allowed if authentication fails. | ||||
Require inbound and outbound |
Only connections that are authenticated are allowed. | ||||
Require inbound and clear outbound |
All inbound network connections must be authenticated or they fail. Outbound connections are not authenticated.
|
Method
Use these settings to configure the type of authentication used by this connection security rule.
For more information about the authentication methods, see
If you choose Advanced, then you must click Customize and add the authentication methods by using the Customize Advanced Authentication Methods dialog box.