Default IPsec Settings for Connection Security Rules
The default IPsec settings for Windows Firewall with Advanced Security are as follows:
- Default key exchange settings (main mode):
- Key exchange algorithm: DH Group 2
- Data integrity algorithm: SHA-1
- Primary data encryption algorithm: AES-CBC 128
- Secondary data encryption algorithm: 3DES
- Key lifetime: 480 minutes/0 sessions
- Default data integrity settings (quick mode):
- Primary protocol: Encapsulating Security Payload (ESP)
- Secondary protocol: Authentication Header (AH)
- Data integrity algorithm: SHA-1
- Key lifetime: 60 minutes/100,000 KB
- Default data encryption settings (quick mode):
- Primary protocol: ESP
- Secondary protocol: ESP
- Data integrity algorithm: SHA-1
- Primary data encryption algorithm: AES-CBC 128
- Secondary data encryption algorithm: 3DES
- Key lifetime: 60 minutes/100,000 KB
The default authentication method used for first authentication of IPsec connections is Computer (Kerberos V5). By default, no second authentication method is configured for IPsec connections.
By default, these settings are used when creating new connection security rules unless you select different settings when using the New Connection Security Rule Wizard. For more information, see the section titled "Creating and Configuring Connection Security Rules" later in this tutorial.
In this tutorial:
- Configuring Windows Firewall and IPsec
- Understanding Windows Firewall with Advanced Security
- Improvements to Windows Firewall Introduced Previously in Windows Vista
- Additional Improvements to Windows Firewall in Windows 7
- Understanding the Windows Filtering Platform
- Windows Firewall and the Startup Process
- Understanding Windows Service Hardening
- Understanding Service SIDs
- Windows Firewall and WSH
- Windows Firewall and Service Triggers
- Understanding Multiple Active Firewall Profiles
- Understanding Rules
- Understanding Firewall Rules
- Inbound vs . Outbound Rules
- Allow vs . Block Rules
- Allow If Secure Rules
- Authenticated Bypass Rules
- Filtering Conditions FOR Firewall RULES
- Understanding Connection Security Rules
- Types of Connection Security Rules
- Supported IPsec Settings for Connection Security Rules
- Default IPsec Settings for Connection Security Rules
- Windows Firewall and Windows PE
- Understanding Default Rules
- Understanding WSH Rules
- Understanding Rules Processing
- Managing Windows Firewall with Advanced Security
- Tools for Managing Windows Firewall with Advanced Security
- Managing Windows Firewall Using Control Panel
- Managing Windows Firewall Using the Windows Firewall with Advanced Security Snap-in
- Managing Windows Firewall Using Group Policy
- Considerations When Managing Windows Firewall Using Group Policy
- Managing Windows Firewall Using the Netsh Command
- Common Management Tasks
- Enabling or Disabling Windows Firewall
- Configuring Firewall Profiles and IPsec Settings by Using Group Policy
- Creating and Configuring Firewall Rules
- Creating and Configuring Connection Security Rules
- Monitoring Windows Firewall
- Troubleshooting Windows Firewall
- Troubleshooting Windows Firewall Using Firewall Logs
- Troubleshooting Windows Firewall Using Event Logs
- Troubleshooting Windows Firewall Using Auditing
- Troubleshooting IPsec Issues Using Netsh Wfp
- Troubleshooting Windows Filtering Platform and IPsec Issues Using Netsh Trace