PowerShell Logo Small

Find-NetIPsecRule



This is the built-in help made by Microsoft for the command 'Find-NetIPsecRule', in PowerShell version 5 - as retrieved from Windows version 'Microsoft Windows Server 2012 R2 Standard' PowerShell help files on 2016-06-23.

For PowerShell version 3 and up, where you have Update-Help, this command was run just before creating the web pages from the help files.

SYNOPSIS

Gets IPsec rules that match specified criteria.

SYNTAX


Find-NetIPsecRule [-AsJob] [-CimSession <CimSession[]>] [-LocalAddress <String>] [-LocalPort <UInt16>] [-Protocol <String>] [-RemotePort <UInt16>] [-ThrottleLimit <Int32>]
-RemoteAddress <String> [<CommonParameters>]



Search powershellhelp.space

DESCRIPTION


The Find-NetIPsecRule cmdlet gets IPsec rules that match the criteria that you specify.



<

RELATED LINKS

Online Version: http://go.microsoft.com/fwlink/?LinkId=321134
Get-NetIPsecRule
Set-NetIPsecRule
New-NetIPsecRule
Show-NetIPsecRule
Enable-NetIPsecRule
Disable-NetIPsecRule
Sync-NetIPsecRule
Rename-NetIPsecRule
Remove-NetIPsecRule
Copy-NetIPsecRule
Update-NetIPsecRule

REMARKS

<

Examples


Example 1: Get an IPSec rule

PS C:\>Find-NetIPsecRule -RemoteAddress "131.107.33.200" -Protocol "TCP" -RemotePort 80
IPsecRuleName         : {c1988b9c-9546-4eea-bf64-fbe85ddbef8c}
DisplayName           : External Traffic – Attempt IPsec
Description           :
DisplayGroup          : Protection for Internet Traffic
Group                 : Protection for Internet Traffic
Enabled               : True
Profile               : Domain
Platform              : {6.2+}
Mode                  : Transport
InboundSecurity       : Require
OutboundSecurity      : Request
QuickModeCryptoSet    : Msit-Qm-EspAes128Sha1-Or-AhSha1
Phase1AuthSet         : Msit-Mm-Kerb-Or-CorpCertMap
Phase2AuthSet         : Msit-Em-Kerb
KeyModule             : Default
AllowWatchKey         : False
AllowSetKey           : False
LocalTunnelEndpoint   :
RemoteTunnelEndpoint  :
RemoteTunnelHostname  :
ForwardPathLifetime   : 0
EncryptedTunnelBypass : False
RequireAuthorization  : False
User                  :
PrimaryStatus         : OK
Status                : The rule was parsed successfully from the store. (65536)
EnforcementStatus     : NotApplicable
PolicyStoreSource     :
PolicyStoreSourceType : GroupPolicy



This command finds the IPsec rule that the system uses for conventional web traffic to the specified IP address. The command gets the IPSec rule that matches the TCP
connection that has the remote address 131.107.33.200 and that uses the remote port 80. The command returns a WMIv2 IPsec rule object.