Examples of using Security rule in English and their translations into Polish
{-}
-
Colloquial
-
Official
-
Medicine
-
Ecclesiastic
-
Ecclesiastic
-
Financial
-
Official/political
-
Programming
-
Computer
Double-click the connection security rule that you want to modify.
Sometimes a network packet might match more than one connection security rule.
If the connection security rule is not a tunnel rule,
Select the protocol whose network traffic will be protected by this connection security rule.
Do not name a security rule”all” because that name conflicts with the all keyword in the netsh command.
Click Customize to specify the interface types to which the connection security rule applies.
These settings apply to any connection security rule in which Default is selected as the authentication method.
Use these settings to configure the type of authentication used by this connection security rule.
When modifying an existing connection security rule, on the Computers tab,
Not all of the authentication methods listed here are available for all connection security rule types.
The connection security rule applies to communications between any computer in Endpoint 1 and any computer in Endpoint 2.
interface types to which the connection security rule applies.
After you create the connection security rule, you can change these settings in the Connection Security Rule Properties dialog box.
If you select All ports, then all network traffic for the protocol you selected matches this connection security rule.
Select this option if the connection is already protected by another connection security rule and you do not want the network packet to go through the IPsec tunnel.
You might still have to create a firewall rule to allow network traffic protected by a connection security rule.
Use this tab of the Connection Security Rule Properties dialog box to specify which protocols
You can also configure the default authentication settings used whenever a connection security rule uses the Default settings.
As a best practice, give each connection security rule a unique name so that you can later
This tab shows basic information about authentication methods used by a connection security rule that is applied to the computer.
If you need to create a connection security rule with custom data protection settings,
Ports tab of the Connection Security Rule Properties page.
In the IP Security Policy Properties dialog, select the correct IP Security rule and click Edit or you can create
Use the settings on this wizard page to specify the computers that can participate in connections created by this connection security rule.
Select Gateway-to-client on the Tunnel Type page if the connection security rule is for a computer that will be the local tunnel endpoint(gateway)
which the rule applies, as configured on the Advanced tab of the Connection Security Rule Properties page.
Use this tab of the Connection Security Rule Properties dialog box to specify the authentication requirements
Select the option to specify that network traffic that matches another IPsec connection security rule does not go through the IPsec tunnel.
Select Client-to-gateway on the Tunnel Type page if the connection security rule is for a client computer that must communicate with a remote gateway
outbound connections that match this connection security rule.