Export (0) Print
Expand All
Expand Minimize
1 out of 2 rated this helpful - Rate this topic

Configure Key Exchange (Main Mode) Settings on Windows 7, Windows Vista, Windows Server 2008, and Windows Server 2008 R2

Updated: January 27, 2010

Applies To: Windows 7, Windows Essential Business Server, Windows SBS 2003, Windows SBS 2008, Windows Server 2000, Windows Server 2003, Windows Server 2003 R2, Windows Server 2003 with SP1, Windows Server 2003 with SP2, Windows Server 2008, Windows Server 2008 R2, Windows Vista

This procedure shows you how to configure the main mode key exchange settings used to secure the IPsec authentication traffic.

Administrative credentials

To complete these procedures, you must be a member of the Domain Administrators group, or otherwise be delegated permissions to modify the GPOs.

  1. Open the Group Policy Management Console to the Windows Firewall with Advanced Security.

  2. In the details pane on the main Windows Firewall with Advanced Security page, click Windows Firewall Properties.

  3. On the IPsec Settings tab, click Customize.

  4. In the Key exchange (Main Mode) section, click Advanced, and then click Customize.

  5. Select the security methods to be used to help protect the main mode negotiations between the two computers. If the security methods displayed in the list are not what you want, then do the following:

    ImportantImportant
    In Windows 7, Windows Vista, Windows Server 2008, and Windows Server 2008 R2, you can specify only one key exchange algorithm. This means that if you want to communicate by using IPsec with another computer running Windows 7 or Windows Server 2008 R2, then you must select the same key exchange algorithm on both computers. Because Windows XP, Windows Server 2003, and Windows 2000 support multiple key exchange algorithms, the one selected on Windows 7 or Windows Server 2008 R2 must match one of the algorithms in the list on the earlier versions of Windows.

    Also, if you create a connection security rule that specifies an option that requires AuthIP instead of IKE, then only the one combination of the top integrity and encryption security method are used in the negotiation. Make sure that all of your computers that run Windows 7, Windows Vista, Windows Server 2008, or Windows Server 2008 R2 have the same methods at the top of the list and the same key exchange algorithm selected.

    noteNote
    When AuthIP is used, no Diffie-Hellman key exchange protocol is used. Instead, when Kerberos V5 authentication is requested, the Kerberos V5 service ticket secret is used in place of a Diffie-Hellman value. When either certificate authentication or NTLM authentication is requested, a transport level security (TLS) session is established, and its secret is used in place of the Diffie-Hellman value. This happens no matter which Diffie-Hellman key exchange protocol you select.

    1. Remove any of the security methods that you do not want by selecting the method and then clicking Remove.

    2. Add any required security method combinations by clicking Add, selecting the appropriate encryption algorithm and integrity algorithm from the lists, and then clicking OK.

      CautionCaution
      We recommend that you do not include MD5 or DES in any combination. They are included for backward compatibility only.

    3. After the list contains only the combinations you want, use the up and down arrows to the right of the list to arrange them in the order of preference. The combination that appears first in the list is tried first, and so on.

  6. From the list on the right, select the key exchange algorithm that you want to use.

    CautionCaution
    We recommend that you do not use Diffie-Hellman Group 1. It is included for backward compatibility only.

  7. In Key lifetime (in minutes), type the number of minutes. When the specified number of minutes has elapsed, any IPsec operation between the two computers requires a new key.

    noteNote
    You need to balance performance with security requirements. Although a shorter key lifetime results in better security, it also reduces performance.

  8. In Key lifetime (in sessions), type the number of sessions. After the specified number of quick mode sessions have been created within the security association protected by this key, IPsec requires a new key.

  9. Click OK three times to save your settings.

If you arrived at this page by clicking a link in a checklist, use your browser’s Back button to return to the checklist.

Did you find this helpful?
(1500 characters remaining)
Thank you for your feedback

Community Additions

ADD
Show:
© 2014 Microsoft. All rights reserved.