Skip to content

Commit c0572bf

Browse files
authored
Merge branch 'main' into patch-10
2 parents 63ac2d6 + fe9a85d commit c0572bf

File tree

10 files changed

+77
-105
lines changed

10 files changed

+77
-105
lines changed

docset/winserver2022-ps/netsecurity/Get-NetIPsecRule.md

Lines changed: 7 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
description: Use this topic to help manage Windows and Windows Server technologies with Windows PowerShell.
33
external help file: NetIPsecRule.cmdletDefinition.cdxml-help.xml
44
Module Name: NetSecurity
5-
ms.date: 12/27/2016
5+
ms.date: 03/03/2025
66
online version: https://learn.microsoft.com/powershell/module/netsecurity/get-netipsecrule?view=windowsserver2022-ps&wt.mc_id=ps-gethelp
77
schema: 2.0.0
88
title: Get-NetIPsecRule
@@ -600,15 +600,12 @@ Specifies that matching IPsec rules of the indicated key module are retrieved.
600600
This parameter specifies which keying modules to negotiate.
601601
The acceptable values for this parameter are: Default, AuthIP, IKEv1, or IKEv2.
602602
603-
- Default: Equivalent to both IKEv1 and AuthIP.
604-
Required in order for the rule to be applied to computers running Windows versions prior to nextref_server_7.
605-
---- There are authorization and cryptographic methods that are only compatible with certain keying modules.
606-
This is a very advanced setting intended only for specific interoperability scenarios.
607-
Overriding this parameter value may result in traffic being sent in plain-text if the authorization and cryptographic settings are not supported by the keying modules there.
603+
- Default: KeyModule is set based on the authentication method. As of Windows 11, version 24H2 and Windows Server 2025, the Default is equivalent to both IKEv1 and IKEv2, and only sets AuthIP if the authentication method(s) require it. In previous releases, Default is equivalent to both IKEv1 and AuthIP. Required in order for the rule to be applied to computers running Windows versions prior to Windows Server 2008.
608604
- AuthIP: Supported with phase 2 authentication.
609-
- IKEv1: Supported with pre-shared key (PSK), Certificates, and Kerberos.
610-
- IKEv2: Not supported with Kerberos, PSK, or NTLM.
611-
Windows versions prior to Windows Server 2012 only support the Default configuration.
605+
- IKEv1: Supported with pre-shared key (PSK), Certificates, and Kerberos. Supported with phase 1 authentication only.
606+
- IKEv2: Not supported with Kerberos, PSK, or NTLM. Supported with phase 1 authentication only.
607+
608+
The default value is Default. There are authentication and cryptographic methods that are only compatible with certain keying modules. This is a very advanced setting intended only for specific interoperability scenarios. Overriding this parameter value may result in traffic being sent in plain-text if the authorization and cryptographic settings are not supported by the keying modules. Windows versions prior to Windows Server 2012 only support the Default configuration.
612609
613610
```yaml
614611
Type: KeyModule[]
@@ -618,7 +615,7 @@ Accepted values: Default, IKEv1, AuthIP, IKEv2
618615

619616
Required: False
620617
Position: Named
621-
Default value: None
618+
Default value: Default
622619
Accept pipeline input: False
623620
Accept wildcard characters: False
624621
```

docset/winserver2022-ps/netsecurity/New-NetIPsecRule.md

Lines changed: 7 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
description: Use this topic to help manage Windows and Windows Server technologies with Windows PowerShell.
33
external help file: NetIPsecRule.cmdletDefinition.cdxml-help.xml
44
Module Name: NetSecurity
5-
ms.date: 12/27/2016
5+
ms.date: 03/03/2025
66
online version: https://learn.microsoft.com/powershell/module/netsecurity/new-netipsecrule?view=windowsserver2022-ps&wt.mc_id=ps-gethelp
77
schema: 2.0.0
88
title: New-NetIPsecRule
@@ -425,15 +425,12 @@ Specifies that matching IPsec rules of the indicated key module are created.
425425
This parameter specifies which keying modules to negotiate.
426426
The acceptable values for this parameter are: Default, AuthIP, IKEv1, or IKEv2.
427427
428-
- Default: Equivalent to both IKEv1 and AuthIP.
429-
Required in order for the rule to be applied to computers running Windows versions prior to nextref_server_7.
430-
---- There are authorization and cryptographic methods that are only compatible with certain keying modules.
431-
This is a very advanced setting intended only for specific interoperability scenarios.
432-
Overriding this parameter value may result in traffic being sent in plain-text if the authentication and cryptographic settings are not supported by the keying modules there.
428+
- Default: KeyModule is set based on the authentication method. As of Windows 11, version 24H2 and Windows Server 2025, the Default is equivalent to both IKEv1 and IKEv2, and only sets AuthIP if the authentication method(s) require it. In previous releases, Default is equivalent to both IKEv1 and AuthIP. Required in order for the rule to be applied to computers running Windows versions prior to Windows Server 2008.
433429
- AuthIP: Supported with phase 2 authentication.
434-
- IKEv1: Supported with pre-shared key (PSK), Certificates, and Kerberos.
435-
- IKEv2: Not supported with Kerberos, PSK, or NTLM.
436-
Windows versions prior to Windows Server 2012 only support the Default configuration.
430+
- IKEv1: Supported with pre-shared key (PSK), Certificates, and Kerberos. Supported with phase 1 authentication only.
431+
- IKEv2: Not supported with Kerberos, PSK, or NTLM. Supported with phase 1 authentication only.
432+
433+
The default value is Default. There are authentication and cryptographic methods that are only compatible with certain keying modules. This is a very advanced setting intended only for specific interoperability scenarios. Overriding this parameter value may result in traffic being sent in plain-text if the authorization and cryptographic settings are not supported by the keying modules. Windows versions prior to Windows Server 2012 only support the Default configuration.
437434
438435
```yaml
439436
Type: KeyModule
@@ -443,7 +440,7 @@ Accepted values: Default, IKEv1, AuthIP, IKEv2
443440

444441
Required: False
445442
Position: Named
446-
Default value: None
443+
Default value: Default
447444
Accept pipeline input: False
448445
Accept wildcard characters: False
449446
```

docset/winserver2022-ps/netsecurity/Remove-NetIPsecRule.md

Lines changed: 7 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
description: Use this topic to help manage Windows and Windows Server technologies with Windows PowerShell.
33
external help file: NetIPsecRule.cmdletDefinition.cdxml-help.xml
44
Module Name: NetSecurity
5-
ms.date: 12/27/2016
5+
ms.date: 03/03/2025
66
online version: https://learn.microsoft.com/powershell/module/netsecurity/remove-netipsecrule?view=windowsserver2022-ps&wt.mc_id=ps-gethelp
77
schema: 2.0.0
88
title: Remove-NetIPsecRule
@@ -644,15 +644,12 @@ Specifies that matching IPsec rules of the indicated key module are removed.
644644
This parameter specifies which keying modules to negotiate.
645645
The acceptable values for this parameter are: Default, AuthIP, IKEv1, or IKEv2.
646646
647-
- Default: Equivalent to both IKEv1 and AuthIP.
648-
Required in order for the rule to be applied to computers running Windows versions prior to nextref_server_7.
649-
---- There are authorization and cryptographic methods that are only compatible with certain keying modules.
650-
This is a very advanced setting intended only for specific interoperability scenarios.
651-
Overriding this parameter value may result in traffic being sent in plain-text if the authorization and cryptographic settings are not supported by the keying modules there.
647+
- Default: KeyModule is set based on the authentication method. As of Windows 11, version 24H2 and Windows Server 2025, the Default is equivalent to both IKEv1 and IKEv2, and only sets AuthIP if the authentication method(s) require it. In previous releases, Default is equivalent to both IKEv1 and AuthIP. Required in order for the rule to be applied to computers running Windows versions prior to Windows Server 2008.
652648
- AuthIP: Supported with phase 2 authentication.
653-
- IKEv1: Supported with pre-shared key (PSK), Certificates, and Kerberos.
654-
- IKEv2: Not supported with Kerberos, PSK, or NTLM.
655-
Windows versions prior to Windows Server 2012 only support the Default configuration.
649+
- IKEv1: Supported with pre-shared key (PSK), Certificates, and Kerberos. Supported with phase 1 authentication only.
650+
- IKEv2: Not supported with Kerberos, PSK, or NTLM. Supported with phase 1 authentication only.
651+
652+
The default value is Default. There are authentication and cryptographic methods that are only compatible with certain keying modules. This is a very advanced setting intended only for specific interoperability scenarios. Overriding this parameter value may result in traffic being sent in plain-text if the authorization and cryptographic settings are not supported by the keying modules. Windows versions prior to Windows Server 2012 only support the Default configuration.
656653
657654
```yaml
658655
Type: KeyModule[]
@@ -662,7 +659,7 @@ Accepted values: Default, IKEv1, AuthIP, IKEv2
662659

663660
Required: False
664661
Position: Named
665-
Default value: None
662+
Default value: Default
666663
Accept pipeline input: False
667664
Accept wildcard characters: False
668665
```

docset/winserver2022-ps/netsecurity/Rename-NetIPsecRule.md

Lines changed: 8 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
description: Use this topic to help manage Windows and Windows Server technologies with Windows PowerShell.
33
external help file: NetIPsecRule.cmdletDefinition.cdxml-help.xml
44
Module Name: NetSecurity
5-
ms.date: 12/27/2016
5+
ms.date: 03/03/2025
66
online version: https://learn.microsoft.com/powershell/module/netsecurity/rename-netipsecrule?view=windowsserver2022-ps&wt.mc_id=ps-gethelp
77
schema: 2.0.0
88
title: Rename-NetIPsecRule
@@ -630,15 +630,13 @@ Accept wildcard characters: False
630630
Specifies that matching IPsec rules of the indicated key module are renamed.
631631
This parameter specifies which keying modules to negotiate.
632632
The acceptable values for this parameter are: Default, AuthIP, IKEv1, or IKEv2.
633-
-- Default: Equivalent to both IKEv1 and AuthIP.
634-
Required in order for the rule to be applied to computers running Windows versions prior to nextref_server_7.
635-
---- There are authentication and cryptographic methods that are only compatible with certain keying modules.
636-
This is a very advanced setting intended only for specific interoperability scenarios.
637-
Overriding this parameter value may result in traffic being sent in plain-text if the authorization and cryptographic settings are not supported by the keying modules there.
633+
634+
- Default: KeyModule is set based on the authentication method. As of Win11 24H2 and Server 2025, the Default is equivalent to both IKEv1 and IKEv2, and only sets AuthIP if the authentication method(s) require it. In previous releases, Default is equivalent to both IKEv1 and AuthIP. Required in order for the rule to be applied to computers running Windows versions prior to Server 2008.
638635
- AuthIP: Supported with phase 2 authentication.
639-
- IKEv1: Supported with pre-shared key (PSK), Certificates, and Kerberos.
640-
- IKEv2: Not supported with Kerberos, PSK, or NTLM.
641-
Windows versions prior to Windows Server 2012 only support the Default configuration.
636+
- IKEv1: Supported with pre-shared key (PSK), Certificates, and Kerberos. Supported with phase 1 authentication only.
637+
- IKEv2: Not supported with Kerberos, PSK, or NTLM. Supported with phase 1 authentication only.
638+
639+
The default value is Default. There are authentication and cryptographic methods that are only compatible with certain keying modules. This is a very advanced setting intended only for specific interoperability scenarios. Overriding this parameter value may result in traffic being sent in plain-text if the authorization and cryptographic settings are not supported by the keying modules. Windows versions prior to Windows Server 2012 only support the Default configuration.
642640
643641
```yaml
644642
Type: KeyModule[]
@@ -648,7 +646,7 @@ Accepted values: Default, IKEv1, AuthIP, IKEv2
648646

649647
Required: False
650648
Position: Named
651-
Default value: None
649+
Default value: Default
652650
Accept pipeline input: False
653651
Accept wildcard characters: False
654652
```

docset/winserver2022-ps/netsecurity/Set-NetIPsecRule.md

Lines changed: 7 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
description: Use this topic to help manage Windows and Windows Server technologies with Windows PowerShell.
33
external help file: NetIPsecRule.cmdletDefinition.cdxml-help.xml
44
Module Name: NetSecurity
5-
ms.date: 12/27/2016
5+
ms.date: 03/03/2025
66
online version: https://learn.microsoft.com/powershell/module/netsecurity/set-netipsecrule?view=windowsserver2022-ps&wt.mc_id=ps-gethelp
77
schema: 2.0.0
88
title: Set-NetIPsecRule
@@ -521,15 +521,12 @@ Specifies that matching IPsec rules of the indicated key module are modified.
521521
This parameter specifies which keying modules to negotiate.
522522
The acceptable values for this parameter are: Default, AuthIP, IKEv1, or IKEv2.
523523
524-
- Default: Equivalent to both IKEv1 and AuthIP.
525-
Required in order for the rule to be applied to computers running Windows versions prior to nextref_server_7.
526-
---- There are authentication and cryptographic methods that are only compatible with certain keying modules.
527-
This is a very advanced setting intended only for specific interoperability scenarios.
528-
Overriding this parameter value may result in traffic being sent in plain-text if the authorization and cryptographic settings are not supported by the keying modules there.
524+
- Default: KeyModule is set based on the authentication method. As of Windows 11, version 24H2 and Windows Server 2025, the Default is equivalent to both IKEv1 and IKEv2, and only sets AuthIP if the authentication method(s) require it. In previous releases, Default is equivalent to both IKEv1 and AuthIP. Required in order for the rule to be applied to computers running Windows versions prior to Windows Server 2008.
529525
- AuthIP: Supported with phase 2 authentication.
530-
- IKEv1: Supported with pre-shared key (PSK), Certificates, and Kerberos.
531-
- IKEv2: Not supported with Kerberos, PSK, or NTLM.
532-
Windows versions prior to Windows Server 2012 only support the Default configuration.
526+
- IKEv1: Supported with pre-shared key (PSK), Certificates, and Kerberos. Supported with phase 1 authentication only.
527+
- IKEv2: Not supported with Kerberos, PSK, or NTLM. Supported with phase 1 authentication only.
528+
529+
The default value is Default. There are authentication and cryptographic methods that are only compatible with certain keying modules. This is a very advanced setting intended only for specific interoperability scenarios. Overriding this parameter value may result in traffic being sent in plain-text if the authorization and cryptographic settings are not supported by the keying modules. Windows versions prior to Windows Server 2012 only support the Default configuration.
533530
534531
```yaml
535532
Type: KeyModule
@@ -539,7 +536,7 @@ Accepted values: Default, IKEv1, AuthIP, IKEv2
539536

540537
Required: False
541538
Position: Named
542-
Default value: None
539+
Default value: Default
543540
Accept pipeline input: False
544541
Accept wildcard characters: False
545542
```

docset/winserver2025-ps/netsecurity/Get-NetIPsecRule.md

Lines changed: 8 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
description: Use this topic to help manage Windows and Windows Server technologies with Windows PowerShell.
33
external help file: NetIPsecRule.cmdletDefinition.cdxml-help.xml
44
Module Name: NetSecurity
5-
ms.date: 12/27/2016
5+
ms.date: 03/03/2025
66
online version: https://learn.microsoft.com/powershell/module/netsecurity/get-netipsecrule?view=windowsserver2025-ps&wt.mc_id=ps-gethelp
77
schema: 2.0.0
88
title: Get-NetIPsecRule
@@ -600,15 +600,12 @@ Specifies that matching IPsec rules of the indicated key module are retrieved.
600600
This parameter specifies which keying modules to negotiate.
601601
The acceptable values for this parameter are: Default, AuthIP, IKEv1, or IKEv2.
602602
603-
- Default: Equivalent to both IKEv1 and AuthIP.
604-
Required in order for the rule to be applied to computers running Windows versions prior to nextref_server_7.
605-
---- There are authorization and cryptographic methods that are only compatible with certain keying modules.
606-
This is a very advanced setting intended only for specific interoperability scenarios.
607-
Overriding this parameter value may result in traffic being sent in plain-text if the authorization and cryptographic settings are not supported by the keying modules there.
608-
- AuthIP: Supported with phase 2 authentication.
609-
- IKEv1: Supported with pre-shared key (PSK), Certificates, and Kerberos.
610-
- IKEv2: Not supported with Kerberos, PSK, or NTLM.
611-
Windows versions prior to Windows Server 2012 only support the Default configuration.
603+
- Default: KeyModule is set based on the authentication method. As of Windows 11, version 24H2 and Windows Server 2025, the Default is equivalent to both IKEv1 and IKEv2, and only sets AuthIP if the authentication method(s) require it. In previous releases, Default is equivalent to both IKEv1 and AuthIP. Required in order for the rule to be applied to computers running Windows versions prior to Windows Server 2008.
604+
- AuthIP: Supported with phase 2 authentication.
605+
- IKEv1: Supported with pre-shared key (PSK), Certificates, and Kerberos. Supported with phase 1 authentication only.
606+
- IKEv2: Not supported with Kerberos, PSK, or NTLM. Supported with phase 1 authentication only.
607+
608+
The default value is Default. There are authentication and cryptographic methods that are only compatible with certain keying modules. This is a very advanced setting intended only for specific interoperability scenarios. Overriding this parameter value may result in traffic being sent in plain-text if the authorization and cryptographic settings are not supported by the keying modules. Windows versions prior to Windows Server 2012 only support the Default configuration.
612609
613610
```yaml
614611
Type: KeyModule[]
@@ -618,7 +615,7 @@ Accepted values: Default, IKEv1, AuthIP, IKEv2
618615

619616
Required: False
620617
Position: Named
621-
Default value: None
618+
Default value: Default
622619
Accept pipeline input: False
623620
Accept wildcard characters: False
624621
```

docset/winserver2025-ps/netsecurity/New-NetIPsecRule.md

Lines changed: 8 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
description: Use this topic to help manage Windows and Windows Server technologies with Windows PowerShell.
33
external help file: NetIPsecRule.cmdletDefinition.cdxml-help.xml
44
Module Name: NetSecurity
5-
ms.date: 12/27/2016
5+
ms.date: 03/03/2025
66
online version: https://learn.microsoft.com/powershell/module/netsecurity/new-netipsecrule?view=windowsserver2025-ps&wt.mc_id=ps-gethelp
77
schema: 2.0.0
88
title: New-NetIPsecRule
@@ -425,15 +425,12 @@ Specifies that matching IPsec rules of the indicated key module are created.
425425
This parameter specifies which keying modules to negotiate.
426426
The acceptable values for this parameter are: Default, AuthIP, IKEv1, or IKEv2.
427427
428-
- Default: Equivalent to both IKEv1 and AuthIP.
429-
Required in order for the rule to be applied to computers running Windows versions prior to nextref_server_7.
430-
---- There are authorization and cryptographic methods that are only compatible with certain keying modules.
431-
This is a very advanced setting intended only for specific interoperability scenarios.
432-
Overriding this parameter value may result in traffic being sent in plain-text if the authentication and cryptographic settings are not supported by the keying modules there.
433-
- AuthIP: Supported with phase 2 authentication.
434-
- IKEv1: Supported with pre-shared key (PSK), Certificates, and Kerberos.
435-
- IKEv2: Not supported with Kerberos, PSK, or NTLM.
436-
Windows versions prior to Windows Server 2012 only support the Default configuration.
428+
- Default: KeyModule is set based on the authentication method. As of Windows 11, version 24H2 and Windows Server 2025, the Default is equivalent to both IKEv1 and IKEv2, and only sets AuthIP if the authentication method(s) require it. In previous releases, Default is equivalent to both IKEv1 and AuthIP. Required in order for the rule to be applied to computers running Windows versions prior to Windows Server 2008.
429+
- AuthIP: Supported with phase 2 authentication.
430+
- IKEv1: Supported with pre-shared key (PSK), Certificates, and Kerberos. Supported with phase 1 authentication only.
431+
- IKEv2: Not supported with Kerberos, PSK, or NTLM. Supported with phase 1 authentication only.
432+
433+
The default value is Default. There are authentication and cryptographic methods that are only compatible with certain keying modules. This is a very advanced setting intended only for specific interoperability scenarios. Overriding this parameter value may result in traffic being sent in plain-text if the authorization and cryptographic settings are not supported by the keying modules. Windows versions prior to Windows Server 2012 only support the Default configuration.
437434
438435
```yaml
439436
Type: KeyModule
@@ -443,7 +440,7 @@ Accepted values: Default, IKEv1, AuthIP, IKEv2
443440

444441
Required: False
445442
Position: Named
446-
Default value: None
443+
Default value: Default
447444
Accept pipeline input: False
448445
Accept wildcard characters: False
449446
```

0 commit comments

Comments
 (0)