Monitor Connection Security Rules - Advanced Tab

Published: January 20, 2009

Updated: January 20, 2009

Applies To: Windows 7, Windows Server 2008 R2

If the rule specifies an Internet Protocol security (IPsec) tunnel, this tab shows information about the tunnel endpoints and whether computer or user authorization is required.

  1. In the Windows Firewall with Advanced Security MMC snap-in, expand Monitoring, and then expand Connection Security Rules.

  2. Double-click the rule you want to examine, and then click the Advanced tab.

If the connection security rule is a tunnel rule, then this indicates the address of the tunnel endpoint that is closest to the local computer, as configured on the Customize IPsec Tunneling Settings dialog box.

If the connection security rule is not a tunnel rule, then None is displayed.

If the connection security rule is a tunnel rule, then this indicates the address of the tunnel endpoint that is farthest from the local computer, as configured on the Customize IPsec Tunneling Settings dialog box.

If the connection security rule is not a tunnel rule, then None is displayed.

This indicates the network interface types to which the rule applies, as configured on the Advanced tab of the Connection Security Rule Properties page.

This indicates whether the use of the tunnel is restricted to only authorized users and computers, as configured on the Customize IPsec Tunneling Settings dialog box. The list of authorized users and computers is configured on the Customize IPsec Tunnel Authorizations dialog box.

This indicates whether network packets addressed to a computer in Endpoint 2 that are already protected by IPsec are sent through the tunnel. This includes any network packet with an ESP header, including ESP NULL. This setting is configured on the Customize IPsec Tunneling Settings dialog box.

Community Additions

ADD
Show: