Configuring Microsoft Windows Vista and Windows Server 2008 to Operate with
Introduction......................................................................................................................................... | 2 |
Related Documentation ..................................................................................................................... | 2 |
Protocol implementation differences.................................................................................................... | 2 |
IKE version .................................................................................................................................. | 2 |
IKE authentication method ............................................................................................................. | 2 |
IKE default algorithms ................................................................................................................... | 2 |
IKE aggressive mode .................................................................................................................... | 3 |
IPsec default transform .................................................................................................................. | 3 |
Configuration overview ........................................................................................................................ | 3 |
Configuring Windows IKE algorithms..................................................................................................... | 3 |
Configuring connection security rules ..................................................................................................... | 4 |
Using the Windows Firewall MMC to configure connection security rules ............................................... | 4 |
Using the netsh advfirewall consec command to configure connection security rules................................. | 5 |
Configuring inbound and outbound firewall rules .................................................................................... | 6 |
(Optional) Configuring IPsec transforms.................................................................................................. | 6 |