Creating and Configuring Connection Security Rules
You can create and configure connection security rules on targeted computers using Group Policy. Connection security rules force computers to authenticate before they are allowed to establish a connection, and they use IPsec to protect the data passed between the computers once a connection has been established between them. For information concerning the types of connection security rules you can create, see the section titled "Understanding Connection Security Rules" earlier in this tutorial.
To create a connection security rule on targeted computers using Group Policy, right-click the Connection Security Rules node under the firewall policy node in your GPO and select New Rule. Doing this starts the New Connection Security Rule Wizard, which walks you through the steps of creating a connection security rule by selecting the type of rule you want to create and specifying the rule conditions needed for the rule. Note that different pages may be displayed in the wizard depending upon the options you select on each page.
For more information on creating connection security rules, see the following sections of the TechNet Library:
- "Understanding Connection Security Rules" at http://technet.microsoft.com/en-ca/library/dd448591.aspx
- "Creating Connection Security Rules" at http://technet.microsoft.com/en-us/library/cc725940.aspx
- "Connection Security Rule Wizard" at http://technet.microsoft.com/en-us/library/dd759064.aspx
Once you finish creating a new connection security rule, the rule is automatically enabled. To disable the rule, right-click it and select Disable Rule.
After you have created a connection security rule, you can further configure it if needed. To do this, double-click the rule to display its properties sheet, which exposes all configurable rule conditions for viewing and modification.
For more information on configuring connection security rules, see the following sections of the TechNet Library:
- "Understanding Connection Security Rules" at http://technet.microsoft.com/en-us/library/dd448591.aspx
- "Connection Security Rule Properties Page" at http://technet.microsoft.com/en-ca/library/dd421705.aspx
In this tutorial:
- Configuring Windows Firewall and IPsec
- Understanding Windows Firewall with Advanced Security
- Improvements to Windows Firewall Introduced Previously in Windows Vista
- Additional Improvements to Windows Firewall in Windows 7
- Understanding the Windows Filtering Platform
- Windows Firewall and the Startup Process
- Understanding Windows Service Hardening
- Understanding Service SIDs
- Windows Firewall and WSH
- Windows Firewall and Service Triggers
- Understanding Multiple Active Firewall Profiles
- Understanding Rules
- Understanding Firewall Rules
- Inbound vs . Outbound Rules
- Allow vs . Block Rules
- Allow If Secure Rules
- Authenticated Bypass Rules
- Filtering Conditions FOR Firewall RULES
- Understanding Connection Security Rules
- Types of Connection Security Rules
- Supported IPsec Settings for Connection Security Rules
- Default IPsec Settings for Connection Security Rules
- Windows Firewall and Windows PE
- Understanding Default Rules
- Understanding WSH Rules
- Understanding Rules Processing
- Managing Windows Firewall with Advanced Security
- Tools for Managing Windows Firewall with Advanced Security
- Managing Windows Firewall Using Control Panel
- Managing Windows Firewall Using the Windows Firewall with Advanced Security Snap-in
- Managing Windows Firewall Using Group Policy
- Considerations When Managing Windows Firewall Using Group Policy
- Managing Windows Firewall Using the Netsh Command
- Common Management Tasks
- Enabling or Disabling Windows Firewall
- Configuring Firewall Profiles and IPsec Settings by Using Group Policy
- Creating and Configuring Firewall Rules
- Creating and Configuring Connection Security Rules
- Monitoring Windows Firewall
- Troubleshooting Windows Firewall
- Troubleshooting Windows Firewall Using Firewall Logs
- Troubleshooting Windows Firewall Using Event Logs
- Troubleshooting Windows Firewall Using Auditing
- Troubleshooting IPsec Issues Using Netsh Wfp
- Troubleshooting Windows Filtering Platform and IPsec Issues Using Netsh Trace