diff --git a/docset/winserver2025-ps/NetSecurity/New-NetIPsecRule.md b/docset/winserver2025-ps/NetSecurity/New-NetIPsecRule.md index 05ff0d65c8..ac9aa34dff 100644 --- a/docset/winserver2025-ps/NetSecurity/New-NetIPsecRule.md +++ b/docset/winserver2025-ps/NetSecurity/New-NetIPsecRule.md @@ -19,7 +19,7 @@ Creates an IPsec rule that defines security requirements for network connections New-NetIPsecRule [-PolicyStore ] [-GPOSession ] [-IPsecRuleName ] -DisplayName [-Description ] [-Group ] [-Enabled ] [-Profile ] [-Platform ] [-Mode ] [-InboundSecurity ] [-OutboundSecurity ] - [-QuickModeCryptoSet ] [-Phase1AuthSet ] [-Phase2AuthSet ] [-KeyModule ] + [-QuickModeCryptoSet ] [-Phase1AuthSet ] [-Phase2AuthSet ] [-KeyModule ] [-TunnelType ] [-AllowWatchKey ] [-AllowSetKey ] [-LocalTunnelEndpoint ] [-RemoteTunnelEndpoint ] [-RemoteTunnelHostname ] [-ForwardPathLifetime ] [-EncryptedTunnelBypass ] [-RequireAuthorization ] [-User ] [-Machine ] @@ -885,6 +885,25 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -TunnelType +Specifies that matching IPsec rules of the indicated tunnel type are created. +This parameter specifies which tunnel type to negotiate. +The acceptable value for this parameter is: PointToSite. +- PointToSite: Indicates that the IPsec rule applies only to point-to-site tunnels, typically used for connecting an individual client to a network. +The default value is PointToSite. This setting is very advanced and should only be modified for specific interoperability or security scenarios. Overriding this parameter incorrectly may result in rules not applying as intended, potentially leaving traffic unprotected. Windows versions prior to Windows Server 2025 do not support explicit tunnel type configuration. +```yaml +Type: TunnelType +Parameter Sets: (All) +Aliases: +Accepted values: PointToSite + +Required: False +Position: Named +Default value: PointToSite +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -User Specifies that matching IPsec rules of the indicated user accounts are created. This parameter specifies that only network packets that are authenticated as incoming from or outgoing to a user identified in the list of user accounts match this rule.