The
At least one Windows security method must match the
IKE aggressive mode
IPsec default transform
The default Windows IPsec transform is ESP with
Configuration overview
To configure IPsec on Microsoft Windows Vista and Windows Server 2008 systems, you must complete the following tasks:
1.Configure IKE algorithms, if needed.
2.Configure connection security rules.
3.Configure firewall rules.
4.(Optional) Configure additional IPsec transforms.
Connection security rules specify IPsec parameters, including IKE and IPsec security algorithms, IKE authentication methods and IP address filters for the packets to be secured by IPsec. Depending on the method used to configure a rule, the rule can also specify protocols and port numbers for the filter.
Firewall rules are required to allow inbound and outbound packets when the Windows firewall is enabled. Firewall rules specify a packet filter and the action for packets that match the filter, such as requiring IPsec security to the packets.
Configuring a connection security rule is not sufficient to allow IPsec packets to pass in and out of a Windows system. If you have a connection security rule to secure packets between the local system and a remote system but do not have a firewall rule to allow packets to and from the remote system, the firewall will block the packets.
NOTE: Microsoft Windows Vista and Windows Server 2008 also support IPsec Policy Agent rules. These rules are functionally the same as the IPsec rules on Windows XP and Windows Server 2003 systems and can be configured using the IPsec Policy MMC
Configuring Windows IKE algorithms
The default
3