Authentication Requirements

Applies To: Windows Server 2008

Authentication requirements

Use this wizard page to specify how authentication is applied to inbound and outbound connections. Requesting authentication allows the communications when authentication fails; requiring authentication causes the connection to be dropped if authentication fails.

Use the Authentication Method page of the wizard to configure the credential used for authentication.

Request authentication for inbound and outbound connections

Use this option to ask that all inbound and outbound traffic be authenticated, but allow the connection if authentication fails. If authentication can proceed, that traffic will be authenticated. This option is typically used in either a low-security environment or an environment with computers that must be able to connect, but cannot perform the types of authentication available with Windows Firewall with Advanced Security.

Require authentication for inbound connections and request authentication for outbound connections

Use this option to require that all inbound traffic be authenticated or the traffic will be blocked. Outbound traffic can be authenticated but will be allowed if authentication fails. If authentication can proceed for outbound traffic, that traffic will be authenticated. This option is used most in IT environments in which the computers that must be able to connect can perform the types of authentication available with Windows Firewall with Advanced Security.

Require authentication for inbound and outbound connections

Use this option to require that all inbound and outbound traffic be authenticated or the traffic will be blocked. This option is typically used in higher-security IT environments where traffic flow must be secured and controlled and where the computers that must be able to connect can perform the types of authentication available with Windows Firewall with Advanced Security.

Additional references

Authentication Settings

First Authentication

Second Authentication

Connection Security Rules