Compartilhar via


IPsec Tunnel Settings

Applies To: Windows Server 2008

Tunneling

Internet Protocol security (IPsec) can perform Layer 3 tunneling for scenarios in which Layer Two Tunneling Protocol (L2TP) cannot be used. If you are using L2TP for remote communications, no tunnel configuration is required because the client and server virtual private networking (VPN) components of Windows Vista® and Windows Server® 2008 create the rules to secure L2TP traffic automatically.

To create a Layer 3 tunnel using IPsec, use the IP Security Policies or Group Policy snap-ins to configure and enable the following two rules for the policy:

  1. A rule for the outbound traffic for the tunnel. The rule for the outbound traffic is configured with both a filter list that describes the traffic to be sent across the tunnel and a tunnel endpoint of an IP address configured on the IPsec tunnel peer (the computer or router on the other side of the tunnel).

  2. A rule for the inbound traffic for the tunnel. The rule for the inbound traffic is configured with both a filter list that describes the traffic to be received across the tunnel and a tunnel endpoint of a local IP address (the computer or router on this side of the tunnel).

Note

You must create both an inbound and outbound for each tunnel connection. If a filter is created for only one direction, the rule will not be applied.

In Windows Vista and Windows Server 2008 you can specify either an IPv4 address or an IPv6 address. You must specify an endpoint for each side of the tunnel and the address protocol version must be the same for both sides. That is, if you specify an IPv6 address for the source side of the tunnel, then you must also use an IPv6 address for the remote side of the tunnel.

For each rule, you must also specify filter actions, authentication methods, and other settings.

See Also

Concepts

IPsec Rules