Netsh commands 
			for Internet Protocol security
			
			
			
			
			This page is from Microsoft
			Updated: January 21, 2005
			
				
				The Netsh commands for Internet Protocol security (IPSec) 
				provide an equivalent alternative to the console-based 
				management and diagnostic capabilities provided by the IP 
				Security Policy Management and IP Security Monitor snap-ins 
				available in the Microsoft Management Console (MMC). By using 
				the Netsh commands for IPSec, you can configure and view static 
				or dynamic IPSec main mode settings, quick mode settings, rules, 
				and configuration parameters. 
				Administering IPSec from the command line is especially 
				useful when you want to: 
				
					- Script IPSec configuration.
- Extend the security and manageability of IPSec by 
					configuring the following features, which are not available 
					in the IP Security Policy Management snap-in: IPSec 
					diagnostics, default traffic exemptions, strong certificate 
					revocation list (CRL) checking, IKE (Oakley) logging, 
					logging intervals, computer startup security, and computer 
					startup traffic exemptions. 
You can run these commands from the Windows Server™ 2003 
				family command prompt or from the command prompt for the 
				netsh ipsec context. For these commands to work at the 
				Windows Server™ 2003 family command prompt, you must type 
				netsh ipsec before typing commands and parameters as they 
				appear in the syntax below.
			 
			Netsh ipsec static mode commands
			
				You can use the netsh ipsec static commands to perform 
				the same management and monitoring tasks that you can perform by 
				using the IP Security Policy Management and IP Security Monitor 
				consoles. By using these commands, you can create, modify, and 
				assign IPSec policies without immediately affecting the 
				configuration of the active IPSec policy.
			Netsh ipsec dynamic mode commands
			
				
				You can use the netsh ipsec dynamic commands to display 
				the active state of IPSec and to immediately affect the 
				configuration of the active IPsec policy. These commands 
				directly configure the security policy database (SPD). Changes 
				that you make to an IPSec policy while using these commands take 
				effect only while the IPSec service is running. If the IPSec 
				service is stopped, the dynamic policy settings are discarded. 
				Although most of these commands take effect immediately, several 
				configuration commands still require you to restart the IPSec 
				service or restart the computer before they take effect. For 
				more information about these commands, see the syntax 
				descriptions for the netsh ipsec dynamic set config 
				commands.
				Caution
				
					- Because the IPSec Policy Agent does not interpret the 
					netsh ipsec dynamic commands, you must be knowledgeable 
					in the application of IKE main mode and quick mode policies 
					to use these commands effectively. Exercise caution when 
					using these commands, because it is possible to create 
					invalid IPSec policy configurations without warning.
Notes
				
					- 
					
						The Netsh commands for IPSec can only be used to 
					configure IPSec policies on computers running members of the 
					Windows Server™ 2003 family.  To use the command line to configure IPSec policies on 
					computers running Windows XP, use Ipseccmd.exe, which is 
					provided on the Windows XPCD, in the \Support\Tools folder. 
					To use the command line to configure IPSec policies on 
					computers running Windows 2000, use Ipsecpol.exe, which is 
					provided with the Windows 2000 Server Resource Kit. 
- For more information about netsh, see
					
					Netsh overview
 						and
					
					Enter a netsh context
						.
- For more information about Netsh commands, see
					
					The Netsh Command-Line Utility
						.
 
			Netsh ipsec
			
				
				The following commands are available at the ipsec> 
				prompt, which is rooted within the netsh environment.
				Note
				
					- Although the dump command is available at the 
					ipsec> prompt, it is not functional.
To view the command syntax, click a command:
				
			 
			
			
				Switches to the static context.
			Syntax
			
				static
			Parameters
			
				none
			
			
			
				Switches to the dynamic context.
			Syntax
			
				dynamic
			Parameters
			
				none
			
			Netsh ipsec static
			
				
				The following commands are available at the ipsec static> 
				prompt, which is rooted within the netsh environment.
				To view 
				the command syntax, click a command:
				
			 
			
				 
			
			
				Adds a filter to the specified filter list.
			Syntax
			
				add filter filterlist=srcaddr=dstaddr= [description=][protocol=][mirrored=] 
				[srcmask=][dstmask=][srcport=] [dstport=]
			Parameters
			
				
					
						
							filterlist=String
						
							Required. Specifies the name of the filter list to 
							which the filter is added. Each filter defines a set 
							of inbound or outbound network traffic to be 
							secured.
					 
					
						
							srcaddr={ Me| Any| IPAddress|
							DNSName| ServerType} 
						
							Required. Specifies the source IP address, DNS name, 
							or server type for the IP traffic. You can use 
							WINS, DNS, DHCP, or gateway 
							for ServerType.
					 
					
						
							dstaddr={ Me| Any| IPAddress|
							DNSName| ServerType} 
						
							Required. Specifies the destination IP address, DNS 
							name, or server type for the IP traffic. You can use
							WINS, DNS, DHCP, or gateway 
							for ServerType.
					 
					
						
							[ description=String] 
						
							Provides information about the IP filter.
					 
					
						
							[ protocol={ ANY| ICMP| TCP|
							UDP| RAW| Integer }] 
						
							Specifies the IP protocol if, in addition to 
							addressing information, you want to filter a 
							specific IP protocol. The default value is ANY, 
							meaning all protocols are used for the filter.
					 
					
						
							[ mirrored={ yes| no}] 
						
							Specifies whether to create a mirrored filter. Use
							yes to create two filters based on the filter 
							settings--one for traffic to the destination and one 
							for traffic from the destination. The default value 
							is yes.
					 
					
						
							[ srcmask={ Mask| Prefix}]
						
						
							Specifies the source address subnet mask or the 
							prefix of the packets to be filtered. You can 
							specify a prefix value in the range of 1 through 32. 
							The default value is the mask of 255.255.255.255.
					 
					
						
							[ dstmask={ Mask| Prefix} 
						
							Specifies the destination address subnet mask or the 
							prefix value of the packets to be filtered. You can 
							specify a prefix value in the range of 1 through 32. 
							The default value is the mask of 255.255.255.255.
					 
					
						
							[ srcport=Port] 
						
							Specifies the source port number of the packets to 
							be filtered. This option only applies if you are 
							filtering TCP or UDP packets. If 0 is specified, 
							packets sent from any port are filtered. The default 
							is any.
					 
					
						
							[ dstport=Port] 
						
							Specifies the destination port number of the packets 
							to be filtered. This option only applies if you are 
							filtering TCP or UDP packets. If 0 is specified, 
							packets sent to any port are filtered. The default 
							is any.
					 
				 
			 
			Remarks
			
				- If a filter list does not exist, it is created.
- Do not create a filter list with the name all. Doing 
				this creates a conflict with the netsh ipsec option to 
				select all IPSec filter lists (for example, delete filterlist 
				all).
- To filter any packets sent from or to the computer, you can 
				use srcaddr=Me or dstaddr=Me.
- To filter packets sent from or to any computer, you can use
				srcaddr=Any or dstaddr=Any.
- All string parameters are case-sensitive.
				 
			
			
			
				Creates a filter action with the specified quick mode security 
				methods.
			Syntax
			
				add filteractionname= [description=][qmpfs=][inpass=] 
				[soft=][action=][qmsecmethods=] 
			Parameters
			
				
					
						
							name=String
						
							Required. Specifies the name of the filter action to 
							be created.
					 
					
						
							[ description=String] 
						
							Provides information about the filter action.
					 
					
						
							[ qmpfs={ yes| no}] 
						
							Specifies whether to enable session key perfect 
							forward secrecy (PFS). If yes is specified, 
							new master key material is renegotiated each time a 
							new session key is required. The default value is 
							no.
					 
					
						
							[ inpass={ yes| no}] 
						
							Specifies whether to allow an incoming packet that 
							matches the configured filter list to be unsecured, 
							but require IPSec-secured communication when 
							replying. The default value is no.
					 
					
						
							[ soft={ yes| no}] 
						
							Specifies whether to fall back to unsecured 
							communication with other computers that do not 
							support IPSec, or when IPSec negotiations with an 
							IPSec-capable computer fail. The default value is 
							no.
					 
					
						
							[ action={ permit| block| 
							negotiate}] 
						
							Specifies whether to permit traffic without 
							negotiating IP security. If permit is 
							specified, traffic is transmitted or received 
							without negotiating or applying IP security. If 
							block is specified, traffic is blocked. If 
							negotiate is specified, IP security is used with 
							the specified list of security methods. The default 
							value is negotiate.
					 
					
						
							[ qmsecmethods="Neg1Neg2"]
						
						
							Specifies one or more security methods, separated by 
							spaces and defined by the following format: {ESP 
							[ConfAlg,AuthAlg]:k/s 
							| AH [HashAlg]:k/s | 
							AH [HashAlg+ESPConfAlg,AuthAlg]:k/s}]Where:ConfAlgSpecifies 
							the encryption algorithm. ConfigAlg can be 
							DES (Data Encryption Standard), 3DES, or
							none. AuthAlgSpecifies the integrity 
							algorithm. AuthAlg can be MD5 (Message 
							Digest 5), SHA1 (Secure Hash Algorithm 1), or
							none.HashAlgSpecifies the hash 
							function. HashAlg can be MD5 (Message 
							Digest 5) or SHA1.kSpecifies the 
							session key lifetime in kilobytes. After the 
							specified number of kilobytes of data is 
							transferred, a new session key for the quick mode SA 
							is generated. The default value is 100000 kilobytes.sSpecifies 
							the session key lifetime in seconds. The default 
							value is 3600 seconds.
					 
				 
			 
			Remarks
			
			
				 
			
			
			
				Creates an empty filter list with the specified name.
			Syntax
			
				add filterlistname= [description=]
			Parameters
			
				
					
						
							name=String
						
							Required. Specifies the name of the filter list to 
							be created.
					 
					
						
							[ description=String] 
						
							Provides information about the filter list.
					 
				 
			 
			Remarks
			
				- Do not create a filter list with the name all. Doing 
				this creates a conflict with the netsh ipsec option to 
				select all IPSec filter lists (for example, delete filterlist 
				all).
- All string parameters are case-sensitive.
				Creates an IPSec policy with the specified name.
			Syntax
			
				add policyname= [description=][mmpfs=][qmpermm=] 
				[mmlifetime=][activatedefaultrule=][pollinginterval=][assign=][mmsecmethods=]
			Parameters
			
				
					
						
							name=String
						
							Required. Specifies the name of the IPSec policy to 
							be created.
					 
					
						
							[ description=String] 
						
							Provides information about the IPSec policy.
					 
					
						
							[ mmpfs={ yes| no}] 
						
							Specifies whether to enable master key perfect 
							forward secrecy (PFS). If yes is specified, 
							main mode security SAs are reauthenticated and new 
							master key keying material is negotiated each time 
							session key material for a quick mode SA is 
							required. The default value is no.
					 
					
						
							[ qmpermm=Integer] 
						
							Specifies the number of times that master keying 
							material can be used to derive the session key. The 
							default value is 0, meaning an unlimited number of 
							quick mode SAs can be derived from the main mode SA.
					 
					
						
							[ mmlifetime=Integer] 
						
							Specifies the number of minutes after which a new 
							master key will be generated. The default value is 
							480 minutes.
					 
					
						
							[ activatedefaultrule={ yes| no}]
						
						
							Specifies whether to activate the default response 
							rule for this IPSec policy. The default value is 
							yes.
					 
					
						
							[ pollinginterval=Integer] 
						
							Specifies how often IPSec polls for changes to this 
							policy. The default value is 180 minutes.
					 
					
						
							[ assign={ yes| no}] 
						
							Specifies whether to assign this IPSec policy (only 
							one IPSec policy can be assigned) The default value 
							is no. 
					 
					
						
							[ mmsecmethods="SecMeth1SecMeth2"]
						
						
							Specifies one or more key exchange security methods, 
							separated by spaces and defined by the following 
							format: ConfAlg-HashAlg-GroupNumb, 
							where:ConfAlgSpecifies the encryption 
							algorithm. ConfAlg can be DES (Data 
							Encryption Standard) or 3DES.HashAlgSpecifies 
							the hash function. HashAlg can be MD5 
							(Message Digest 5) or SHA1 (Secure Hash 
							Algorithm 1).GroupNumSpecifies the 
							Diffie-Hellman group to be used for the base keying 
							material. GroupNumb can be: 1 (low, 
							protects with 768 bits of keying material), 2 
							(medium, protects with 1024 bits), and 3 
							(high, protects with 2048 bits). 
					 
				 
			 
			Remarks
			
			
			
			
				Creates a rule that links the specified IPSec policy, filter 
				list, and filter action with the specified authentication 
				methods.
			Syntax
			
				add rulename=policy=filterlist=filteraction=[tunnel=][conntype=] 
				[activate=][description=][kerberos=][psk=][rootca=]
			Parameters
			
				
					
						
							name=String
						
							Required. Specifies the name of the IPSec rule to be 
							created.
					 
					
						
							policy=String
						
							Required. Specifies the name of the IPSec policy 
							that contains this rule.
					 
					
						
							filterlist=String
						
							Required. Specifies the name of the IP filter list 
							for this rule.
					 
					
						
							filteraction=String
						
							Required. Specifies the name of the filter action 
							for this rule.
					 
					
						
							[ tunnel={ IPAddress| DNSName}]
						
						
							Specifies the IP address or DNS name of the tunnel 
							endpoint for tunnel mode. By default, this option is 
							not specified and transport mode is used.
					 
					
						
							[ conntype={ lan| dialup| 
							all}] 
						
							Specifies whether the rule applies only to remote 
							access or dial-up connections or to local area 
							network (LAN) connections, or to all connections. 
							The default value is all.
					 
					
						
							[ activate={ yes | no}] 
						
							Specifies whether to activate this rule for the 
							specified IPSec policy. The default value is yes.
					 
					
						
							[ description=String] 
						
							Provides information about the rule.
					 
					
						
							[ kerberos={ yes | no}] 
						
							Specifies whether to use the Kerberos V5 protocol as 
							an authentication method.
					 
					
						
							[ psk=String] 
						
							Specifies the string of characters to use for the 
							preshared key, if a preshared key is used as an 
							authentication method.
					 
					
						
							[ rootca="Stringcertmap:{ 
							yes| no} excludecaname:{ yes|
							no} "] 
						
							Specifies certificate authentication options, where: 
							String Specifies the distinguished name of the 
							certificate, if a certificate is used as an 
							authentication method.certmap:{ yes|
							no} Specifies whether to enable 
							certificate-to-account mapping. You can enable 
							certificate-to-account mapping to verify that the 
							certificate is being used by a trusted computer.excludecaname:{
							yes| no} Specifies whether to exclude 
							from the certificate request the list of trusted 
							root CA names from which a certificate is accepted.
						
					 
				 
			 
			Remarks
			
				- Do not create a rule with the name all. Doing this 
				creates a conflict with the netsh ipsec option to select 
				all IPSec rules (for example, delete rule all).
- You can only use Kerberos V5 authentication or 
				certificate-to-account mapping for computers that are members of 
				an Active Directory domain.
- Although you can use only one preshared key for 
				authentication, you can use multiple certificates by specifying 
				the rootca parameter once, for each certificate you want 
				to use.
- All certificate authentication parameters must be contained 
				within quotation marks. Embedded quotation marks must be 
				replaced by a backslash followed by an apostrophe (\').
- All string parameters are case-sensitive.
- The preference order of each authentication method is 
				determined by the order in which it was specified in the 
				command.
- If no authentication methods are specified, dynamic defaults 
				are used. By default, IPSec policies use Kerberos V5 
				authentication. If the computer has a computer certificate, any 
				root CA to which the computer certificate chains is also used 
				for authentication.
- If excludecaname:yes is specified, the list of 
				trusted root CAs is not sent as part of the certificate request, 
				which prevents the potential disclosure of sensitive information 
				about the trust relationships of a computer. To enhance security 
				for computers connected to the Internet, specify this option.
- The use of preshared key authentication is not recommended 
				because it is a relatively weak authentication method. In 
				addition, preshared keys are stored in plaintext.
- IPSec peers must have at least one common authentication 
				method or communication will fail.
				Deletes all IPSec policies, filter lists, and filter actions.
			Syntax
			
				delete all
			Parameters
			
				None.
			
			
			
				Deletes a filter from a filter list that matches the specified 
				parameters.
			Syntax
			
				delete filter filterlist=srcaddr=dstaddr=[protocol=] 
				[srcmask=][dstmask=][srcport=] [dstport=][mirrored=]
			Parameters
			
				
					
						
							filterlist=String
						
							Required. Specifies the name of the filter list to 
							which the filter was added.
					 
					
						
							srcaddr={ Me| Any| IPAddress|
							DNSName| ServerType} 
						
							Required. Specifies the source IP address, DNS name, 
							or server type for the IP traffic being matched. You 
							can use WINS, DNS, DHCP, or 
							gateway for ServerType.
					 
					
						
							dstaddr={ Me| Any| IPAddress|
							DNSName| ServerType} 
						
							Required. Specifies the destination IP address, DNS 
							name, or server type for the IP traffic being 
							matched. You can use WINS, DNS, 
							DHCP, or gateway for ServerType.
					 
					
						
							[ protocol={ ANY| ICMP| TCP|
							UDP| RAW| Integer }] 
						
							Specifies the IP protocol if, in addition to 
							addressing information, a specific IP protocol is 
							filtered. A value of ANY matches filters with 
							a protocol setting of any.
					 
					
						
							[ srcmask={ Mask| Prefix}]
						
						
							Specifies the source address subnet mask or the 
							prefix of the packets being filtered. You can 
							specify a prefix value in the range of 1 through 32. 
							The default value is the mask of 255.255.255.255.
					 
					
						
							[ dstmask={ Mask| Prefix}]
						
						
							Specifies the destination address subnet mask or the 
							prefix value of the packets being filtered. You can 
							specify a prefix value in the range of 1 through 32. 
							The default value is the mask of 255.255.255.255.
					 
					
						
							[ srcport=Port] 
						
							Specifies the source port number of the packets 
							being filtered. This option only applies if you are 
							filtering TCP or UDP packets. A value of 0 
							matches filters with a source port setting of any.
						
					 
					
						
							[ dstport=Port] 
						
							Specifies the destination port number of the packets 
							being filtered. This option only applies if you are 
							filtering TCP or UDP packets. A value of 0 
							matches filters with a destination port setting of
							any.
					 
					
						
							[ mirrored={ yes| no}] 
						
							Specifies whether a mirrored filter was created.
					 
				 
			 
			Remarks
			
				- This command only deletes a filter that matches the exact 
				parameters specified.
- If no optional parameters are specified, all filters that 
				match the specified (required) parameters are deleted.
- To delete a filter that filtered any packets sent from or to 
				the computer, you can use srcaddr=Me or dstaddr=Me.
- To delete a filter that filtered packets sent from or to any 
				computer, you can use srcaddr=Any or dstaddr=Any.
- All string parameters are case-sensitive.
				Deletes the specified filter action, or all filter actions.
			Syntax
			
				delete filteractionname= | all
			Parameters
			
				
					
						
							name=String| all
						
							Required. Specifies the name of the filter action to 
							delete. Or, if all is specified, all filter 
							actions are deleted.
					 
				 
			 
			Remarks
			
				- All string parameters are case-sensitive.
				Deletes the specified filter list, or all filter lists. 
			Syntax
			
				delete filterlistname= | all
			Parameters
			
				
					
						
							name=String| all
						
							Required. Specifies the name of the filter list to 
							delete. Or, if all is specified, all filter 
							lists are deleted.
					 
				 
			 
			Remarks
			
				- All string parameters are case-sensitive.
				Deletes the specified IPSec policy and all associated rules, or 
				all IPSec policies.
			Syntax
			
				delete policyname= | all
			Parameters
			
				
					
						
							name=String| all
						
							Required. Specifies the name of the IPSec policy to 
							delete. Or, if all is specified, all IPSec 
							policies are deleted.
					 
				 
			 
			Remarks
			
				- All string parameters are case-sensitive.
				Deletes a specified rule, or all rules from the specified IPSec 
				policy. 
			Syntax
			
				delete rulename= | ID= | allpolicy=
			Parameters
			
				
					
						
							name=String| ID=Integer|
							all
						
							Required. Specifies the rule to delete. If either 
							the rule name or the rule ID (the number identifying 
							the position of the rule in the policy rule list) is 
							specified, the corresponding rule is deleted. If 
							all is specified, all rules are deleted.
					 
					
						
							policy=String
						
							Required. Specifies the name of the policy from 
							which one or more rules are deleted.
					 
				 
			 
			Remarks
			
				- The default response rule cannot be deleted.
- After a rule is deleted, all IDs for the remaining rules 
				change accordingly.
- All string parameters are case-sensitive.
				Exports all IPSec policy information to the specified file.
			
			Syntax
			
				exportpolicyfile=
			Parameters
			
				
					
						
							file=String
						
							Required. Specifies the name of the file into which 
							the IPSec policy information is exported.
					 
				 
			 
			Remarks
			
				- By default, when an IPSec policy is imported into a file, 
				the .ipsec extension added to the file name.
- To enhance interoperablity in a mixed environment with 
				computers running Windows 2000, limit the name of the file to 
				which you want the policy information saved to 60 characters.
				
- All string parameters are case-sensitive.
				Imports all IPSec policy information from the specified IPSec 
				file.
			Syntax
			
				importpolicyfile=
			Parameters
			
				
					
						
							file=String
						
							Required. Specifies the name of the file from which 
							the IPSec policy information is imported.
					 
				 
			 
			Remarks
			
				- All string parameters are case-sensitive.
				Restores the default IPSec policies.
			Syntax
			
				restorepolicyexamplesrelease=
			Parameters
			
				
					
						
							release={ win2K| Win2003} 
						
							Required. Specifies the version of the default IPSec 
							policies being restored. If win2K is 
							specified, the default IPSec policies that were 
							provided with Windows 2000 are restored. If 
							Win2003 is specified, the default IPSec policies 
							that were provided with the Windows Server™ 2003 
							family are restored. 
					 
				 
			 
			Remarks
			
				- Restoring default IPSec policies will overwrite any changes 
				to the original default policies, filter lists, and filter 
				actions, even when the names of these configuration items have 
				been changed. If you have modified these items and you do not 
				want the modifications to be overwritten, do not restore the 
				default policies.
- You can only restore default IPSec policies for 
				computer-based IPSec policies. You cannot restore the default 
				IPSec policies for IPSec policies in Active Directory.
				Modifies the default response rule for the specified policy.
			Syntax
			
				set defaultrulepolicy=[qmpfs=][activate=] [qmsecmethods=][kerberos=][psk=][rootca=]
			Parameters
			
				
					
						
							policy=String
						
							Required. Specifies the name of the IPSec policy for 
							which the default response rule is to be modified.
					 
					
						
							[ qmpfs={ yes| no}] 
						
							Specifies whether to enable session key perfect 
							forward secrecy (PFS). If yes is specified, 
							new master key material is renegotiated each time a 
							new session key is required. The default value is 
							no.
					 
					
						
							[ activate={ yes | no}] 
						
							Specifies whether to activate this rule for the 
							specified IPSec policy. The default value is yes.
					 
					
						
							[ qmsecmethods="Neg1Neg2"]
						
						
							Specifies one or more security methods, separated by 
							spaces and defined by the following format: {ESP 
							[ConfAlg,AuthAlg]:k/s 
							| AH [HashAlg]:k/s 
							| AH [HashAlg+ESPConfAlg,AuthAlg]:k/s}]Where:ConfAlgSpecifies 
							the encryption algorithm. ConfigAlg can be 
							DES (Data Encryption Standard), 3DES, or
							none. AuthAlgSpecifies the integrity 
							algorithm. AuthAlg can be MD5 (Message 
							Digest 5), SHA1 (Secure Hash Algorithm 1), or
							none.HashAlgSpecifies the hash 
							function. HashAlg can be MD5 (Message 
							Digest 5) or SHA1.kSpecifies the 
							session key lifetime in kilobytes. After the 
							specified number of kilobytes of data is 
							transferred, a new session key for the quick mode SA 
							is generated. The default value is 100,000 
							kilobytes.sSpecifies the session key lifetime 
							in seconds. The default value is 3600 seconds.
					 
					
						
							[ kerberos={ yes | no}] 
						
							Specifies whether to use the Kerberos V5 protocol as 
							an authentication method.
					 
					
						
							[ psk=String] 
						
							Specifies the string of characters to use for the 
							preshared key, if a preshared key is used as an 
							authentication method.
					 
					
						
							[ rootca="Stringcertmap:{ 
							yes| no} excludecaname:{ yes|
							no} "] 
						
							Specifies certificate authentication options, where: 
							String Specifies the distinguished name of the 
							certificate, if a certificate is used as an 
							authentication method. certmap:{ yes|
							no} Specifies whether to enable 
							certificate-to-account mapping. You can enable 
							certificate-to-account mapping to verify that the 
							certificate is being used by a trusted computer.excludecaname:{
							yes| no} Specifies whether to exclude 
							from the certificate request the list of trusted 
							root CA names from which a certificate is accepted.
						
					 
				 
			 
			Remarks
			
				- You can only use Kerberos V5 authentication or 
				certificate-to-account mapping for computers that are members of 
				an Active Directory domain.
- Although you can use only one preshared key for 
				authentication, you can use multiple certificates by specifying 
				the rootca parameter once, for each certificate you want 
				to use.
- All certificate authentication parameters must be contained 
				within quotation marks. Embedded quotation marks must be 
				replaced by a backslash followed by an apostrophe (\').
- All string parameters are case-sensitive.
- The preference order of each authentication method is 
				determined by the order in which it was specified in the 
				command.
- If no authentication methods are specified, dynamic defaults 
				are used. By default, IPSec policies use Kerberos V5 
				authentication. If the computer has a computer certificate, any 
				root CA to which the computer certificate chains is also used 
				for authentication.
- If excludecaname:yes is specified, the list of 
				trusted root CAs is not sent as part of the certificate request, 
				which prevents the potential disclosure of sensitive information 
				about the trust relationships of a computer. To enhance security 
				for computers connected to the Internet, specify this option.
- The use of preshared key authentication is not recommended 
				because it is a relatively weak authentication method. In 
				addition, preshared keys are stored in plaintext.
- IPSec peers must have at least one common authentication 
				method or communication will fail. 
- Modifying authentication methods will overwrite all previous 
				authentication methods, even if the previous authentication 
				methods were different. For example, if kerberos=yes and
				psk=yes were previously specified, and then you specify
				kerberos=no, the psk=yes parameter will also be 
				overwritten, and preshared key authentication will no longer be 
				used.
- ConfAlg and AuthAlg cannot both be set to 
				none.
				Modifies a filter action.
			Syntax
			
				set filteractionname= | guid=[newname=] [description=][qmpfs=][inpass=] 
				[soft=][action=][qmsecmethods=]
			Parameters
			
				
					
						
							name=String| guid= guid
						
							Required. Specifies the name or global unique 
							identifier (GUID) of the filter action to modify.
					 
					
						
							[ newname=String] 
						
							Specifies the new name of the filter action.
					 
					
						
							[ description=String] 
						
							Provides information about the filter action.
					 
					
						
							[ qmpfs={ yes| no}] 
						
							Specifies whether to enable session key perfect 
							forward secrecy (PFS). If yes is specified, 
							new master key material is renegotiated each time a 
							new session key is required.
					 
					
						
							[ inpass={ yes| no}] 
						
							Specifies whether to allow an incoming packet that 
							matches the configured filter list to be unsecured, 
							but require IPSec-secured communication when 
							replying.
					 
					
						
							[ soft={ yes| no}] 
						
							Specifies whether to fall back to unsecured 
							communications with other computers that do not 
							support IPSec, or when IPSec negotiations with an 
							IPSec-capable computer fail.
					 
					
						
							[ action={ permit| block| 
							negotiate}] 
						
							Specifies whether to permit traffic without 
							negotiating IP security. If permit is 
							specified, traffic is transmitted or received 
							without negotiating or applying IP security. If 
							block is specified, traffic is blocked. If 
							negotiate is specified, IP security is used, 
							with the specified list of security methods.
					 
					
						
							[ qmsecmethods="Neg1Neg2"]
						
						
							Specifies one or more security methods, separated by 
							spaces and defined by the following format: {ESP 
							[ConfAlg,AuthAlg]:k/s 
							| AH [HashAlg]:k/s | 
							AH [HashAlg+ESPConfAlg,AuthAlg]:k/s}]Where:ConfAlgSpecifies 
							the encryption algorithm. ConfigAlg can be 
							DES (Data Encryption Standard), 3DES, or
							none. AuthAlgSpecifies the integrity 
							algorithm. AuthAlg can be MD5 (Message 
							Digest 5), SHA1 (Secure Hash Algorithm 1), or
							none.HashAlgSpecifies the hash 
							function. HashAlg can be MD5 (Message 
							Digest 5) or SHA1 (Secure Hash Algorithm 1).kSpecifies 
							the session key lifetime in kilobytes. After the 
							specified number of kilobytes of data is 
							transferred, a new session key for the quick mode SA 
							is generated. The default value is 100000 kilobytes.sSpecifies 
							the session key lifetime in seconds. The default 
							value is 3600 seconds.
					 
				 
			 
			Remarks
			
			
			
			
				Modifies a filter list.
			Syntax
			
				set filterlistname= [newname=] [description=]
			Parameters
			
				
					
						
							name=String
						
							Required. Specifies the name of the filter list to 
							modify.
					 
					
						
							[ newname=String] 
						
							Specifies the new name of the filter list.
					 
					
						
							[ description=String] 
						
							Provides information about the filter list.
					 
				 
			 
			Remarks
			
				- If you specify a new name for the filter list, do not use 
				the name all. Doing this creates a conflict with the 
				netsh ipsec option to select all IPSec filter lists (for 
				example, delete filterlist all).
- All string parameters are case-sensitive.
				Modifies an IPSec policy.
			Syntax
			
				set policyname=newname= [description=][mmpfs=][qmpermm=] 
				[mmlifetime=][activatedefaultrule=][pollinginterval=][assign=][gponame=][mmsecmethods=]
			Parameters
			
				
					
						
							name=String| guid=guid
						
							Required. Specifies the name or GUID of the IPSec 
							policy to modify.
					 
					
						
							newname=String
						
							Required. Specifies the new name of the IPSec 
							policy.
					 
					
						
							[ description=String] 
						
							Provides information about the IPSec policy.
					 
					
						
							[ mmpfs={ yes| no}] 
						
							Specifies whether to enable master key perfect 
							forward secrecy (PFS). If yes is specified, 
							main mode security SAs are reauthenticated and new 
							master key keying material is negotiated each time 
							session key material for a quick mode SA is 
							required.
					 
					
						
							[ qmpermm=Integer] 
						
							Specifies the number of times that master keying 
							material can be used to derive the session key.
					 
					
						
							[ mmlifetime=Integer] 
						
							Specifies the number of minutes after which a new 
							master key will be generated.
					 
					
						
							[ activatedefaultrule={ yes| no}]
						
						
							Specifies whether to activate the default response 
							rule for this IPSec policy.
					 
					
						
							[ pollinginterval=Integer] 
						
							Specifies how often IPSec polls for changes to this 
							policy. The default value is 180 minutes.
					 
					
						
							[ assign={ yes| no}] 
						
							Specifies whether to assign this IPSec policy.
					 
					
						
							[ gponame=String] 
						
							Specifies the name of the Group Policy object to 
							which the IPSec policy is assigned. This parameter 
							is only applicable if you are configuring policy for 
							a computer that is an Active Directory domain 
							member.
					 
					
						
							[ mmsecmethods="SecMeth1SecMeth2"]
						
						
							Specifies one or more key exchange security methods, 
							separated by spaces and defined by the following 
							format: ConfAlg-HashAlg-GroupNumb, 
							where:ConfAlgSpecifies the encryption 
							algorithm. ConfAlg can be DES (Data 
							Encryption Standard) or 3DES. HashAlgSpecifies 
							the hash function. HashAlg can be MD5 
							(Message Digest 5) or SHA1 (Secure Hash 
							Algorithm 1).GroupNumSpecifies the 
							Diffie-Hellman group to be used for the base keying 
							material. GroupNumb can be: 1 (low, 
							protects with 768 bits of keying material), 2 
							(medium, protects with 1024 bits), and 3 
							(high, protects with 2048 bits). 
					 
				 
			 
			Remarks
			
				- If you specify a new name for the policy, do not use the 
				name all. Doing this creates a conflict with the netsh 
				ipsec option to select all IPSec policies (for example, 
				delete policy all).
- If set store=domain is specified (when the IPSec 
				policy is stored in Active Directory), assign will have 
				no effect.
- If mmpfs=yes is specified (master key PFS is 
				enabled), by default qmperm is set to 1 and not 
				configurable, because each new session will cause the master key 
				keying material to be renegotiated.
- IPSec peers must have at least one common key exchange 
				security method (one that uses the same settings) or 
				negotiations will fail. 
- You can only specify a Group Policy object name if set 
				store=domain.
- All string parameters are case-sensitive.
				Modifies a rule in an IPSec policy.
			Syntax
			
				set rulename= | ID=policy= [newname=][description=][filterlist=] 
				[filteraction=] [tunnel=][conntype=] [activate=][kerberos=][psk=][rootca=]
			Parameters
			
				
					
						
							name=String| ID=Integer
						
							Required. Specifies the name or ID (the number 
							identifying the position of the rule in the policy 
							rule list) of the rule to modify.
					 
					
						
							policy=String
						
							Required. Specifies the name of the IPSec policy 
							that contains this rule.
					 
					
						
							[ newname=String] 
						
							Specifies the new name of the rule.
					 
					
						
							[ description=String] 
						
							Provides information about the rule.
					 
					
						
							[ filterlist=String] 
						
							Specifies the name of the IP filter list for this 
							rule.
					 
					
						
							[ filteraction=String] 
						
							Specifies the name of the filter action for this 
							rule.
					 
					
						
							[ tunnel={ IPAddress| DNSName}]
						
						
							Specifies the IP address or DNS name of the tunnel 
							endpoint for tunnel mode.
					 
					
						
							[ conntype={ lan| dialup| 
							all}] 
						
							Specifies whether the rule applies only to remote 
							access or dial-up connections or to local area 
							network (LAN) connections, or to all connections.
					 
					
						
							[ activate={ yes | no}] 
						
							Specifies whether to activate this rule for the 
							specified IPSec policy.
					 
					
						
							[ kerberos={ yes | no}] 
						
							Specifies whether to use the Kerberos V5 protocol as 
							an authentication method.
					 
					
						
							[ psk=String] 
						
							Specifies the string of characters to use for the 
							preshared key, if a preshared key is used as an 
							authentication method.
					 
					
						
							[ rootca="Stringcertmap:{ 
							yes| no} excludecaname:{ yes|
							no} "] 
						
							Specifies certificate authentication options, where: 
							String Specifies the distinguished name of the 
							certificate, if a certificate is used as an 
							authentication method.certmap:{ yes|
							no} Specifies whether to enable 
							certificate-to-account mapping. You can enable 
							certificate-to-account mapping to verify that the 
							certificate is being used by a trusted computer.excludecaname:{
							yes| no} Specifies whether to exclude 
							from the certificate request the list of trusted 
							root CA names from which a certificate is accepted.
						
					 
				 
			 
			Remarks
			
				- You can only use Kerberos V5 authentication or 
				certificate-to-account mapping for computers that are members of 
				an Active Directory domain.
- Although you can use only one preshared key for 
				authentication, you can use multiple certificates by specifying 
				the rootca parameter once, for each certificate you want 
				to use.
- All certificate authentication parameters must be contained 
				within quotation marks. Embedded quotation marks must be 
				replaced by a backslash followed by an apostrophe (\').
- All string parameters are case-sensitive.
- The preference order of each authentication method is 
				determined by the order in which it was specified in the 
				command.
- If no authentication methods are specified, dynamic defaults 
				are used. By default, IPSec policies use Kerberos V5 
				authentication. If the computer has a computer certificate, any 
				root CA to which the computer certificate chains is also used 
				for authentication.
- If excludecaname:yes is specified, the list of 
				trusted root CAs is not sent as part of the certificate request, 
				which prevents the potential disclosure of sensitive information 
				about the trust relationships of a computer. To enhance security 
				for computers connected to the Internet, specify this option.
- The use of preshared key authentication is not recommended 
				because it is a relatively weak authentication method. In 
				addition, preshared keys are stored in plaintext.
- IPSec peers must have at least one common authentication 
				method or communication will fail. 
- Modifying authentication methods will overwrite all previous 
				authentication methods, even if the previous authentication 
				methods were different. For example, if kerberos=yes and
				psk=yes were previously specified, and then you specify
				kerberos=no, the psk=yes parameter will also be 
				overwritten, and preshared key authentication will no longer be 
				used.
				 
			
			
			
				Sets the current IPSec policy storage location. 
			Syntax
			
				set storelocation= [domain=]
			Parameters
			
				
					
						
							location={ local| persistent|
							domain} 
						
							Required. Specifies the storage location for the 
							IPSec policy.
					 
					
						
							[ domain=] 
						
							Specifies the name of the domain where the IPSec 
							policy is stored, if the policy is stored in Active 
							Directory (when location=domain is 
							specified).
					 
				 
			 
			Remarks
			
			
			
			
				Displays configuration information for all IPSec policies, 
				rules, filter lists, and filter actions. 
			Syntax
			
				show all [format=] [wide=]
			Parameters
			
				
					
						
							[ format={ list| table}] 
						
							Specifies whether to display IPSec configuration 
							information in screen or tab-delimited format. The 
							default value is list, meaning that output is 
							displayed in screen format. 
					 
					
						
							[ wide={ yes | no}] 
						
							Specifies whether to allow the display of IPSec 
							configuration information to exceed the screen width 
							of 80 characters. The default value is no, 
							meaning that the display of configuration 
							information is limited to the screen width.
					 
				 
			 
			Remarks
			
				- 
				
					Because the show all command can result in lengthy, 
				rapidly scrolling output, consider saving the output in a text 
				file, unless you only need to view limited portions.
				 To save output in a text file for the show all 
				command, do either of the following: If you are in the netsh environment (netsh>) 
				
					- At the netsh prompt, type:
					set file open FileName.txt 
- Then type:
					ipsec static show all 
- To stop sending output and close the file, type:
					set file close 
If you are not in the netsh environment
				
					- At the command prompt, type:
					netsh ipsec static show all >FileName.txt 
- 
					
						To stop the output of IPSec configuration information, 
					you must exit Netsh by doing one of the following: 
						- Close the Netsh window by clicking the X 
						icon in the upper-right corner of the window
- Use Task Manager to end the Netsh program.
 
			
			
			
				Displays configuration information for one or more filter 
				actions.
			Syntax
			
				show filteractionname= | rule= | all [level=][format=] 
				[wide=]
			Parameters
			
				
					
						
							name=String| rule=String|
							all
						
							Required. Specifies one or more filter actions for 
							which configuration information is to be displayed. 
							If name is specified, the filter action with 
							the specified name is displayed. If rule is 
							specified, all filter actions associated with the 
							specified rule are displayed. If all is 
							specified, all filter actions are displayed. 
					 
					
						
							[ level={ verbose| normal}]
						
						
							Specifies the level of information to display. If 
							verbose is specified, information about the 
							security methods, policy storage location, and 
							whether session key perfect forward secrecy (PFS) is 
							enabled is displayed, in addition to basic filter 
							action information. The default value is normal.
					 
					
						
							[ format={ list| table}] 
						
							Specifies whether to display IPSec configuration 
							information in screen or tab-delimited format. The 
							default value is list, meaning that output is 
							displayed in screen format. 
					 
					
						
							[ wide={ yes | no}] 
						
							Specifies whether to allow the display of IPSec 
							configuration information to exceed the screen width 
							of 80 characters. The default value is no, 
							meaning that the display of configuration 
							information is limited to the screen width.
					 
				 
			 
			Remarks
			
				- All string parameters are case-sensitive.
- 
				
					Because the show filteraction command can result in 
				lengthy, rapidly scrolling output, consider saving the output in 
				a text file, unless you only need to view limited portions.
				 To save output in a text file for the show filteraction 
				command, do either of the following: If you are in the netsh environment (netsh>) 
				
					- At the netsh prompt, type:
					set file open FileName.txt 
- Then type:
					ipsec static show filteractionName | 
					Rule | all [level=verbose | normal] 
- To stop sending output and close the file, type:
					set file close 
If you are not in the netsh environment
				
					- At the command prompt, type:
					netsh ipsec static show filteractionName |
					Rule | all [level=verbose | normal] 
					>FileName.txt 
- 
					
						To stop the output of IPSec configuration information, 
					you must exit Netsh by doing one of the following: 
						- Close the Netsh window by clicking the X 
						icon in the upper-right corner of the window.
- Use Task Manager to end the Netsh program.
 
			
			
			
				Displays configuration information for one or more filter lists.
			Syntax
			
				show filterlistname= | rule= | all [level=][format=][resolvedns=] 
				[wide=]
			Parameters
			
				
					
						
							name=String| rule=String|
							all
						
							Required. Specifies one or more filter lists to 
							display. If name is specified, the filter 
							list with the specified name is displayed. If 
							rule is specified, all filter lists associated 
							with the specified rule are displayed. If all 
							is specified, all filter lists are displayed. 
					 
					
						
							[ level={ verbose| normal}]
						
						
							Specifies the level of information to display. If 
							verbose is specified, the source, destination, 
							and type of IP traffic defined by each filter are 
							displayed, in addition to basic filter list 
							information. The default value is normal.
					 
					
						
							[ format={ list| table}] 
						
							Specifies whether to display IPSec configuration 
							information in screen or tab-delimited format. The 
							default value is list, meaning that output is 
							displayed in screen format. 
					 
					
						
							[ resolvedns={ yes | no}] 
						
							Specifies whether to resolve the Domain Name System 
							(DNS) or NETBIOS computer name associated with an IP 
							address when displaying sources or destinations. If
							yes is specified, level must also be 
							set to verbose, or the DNS names are not 
							displayed. The default value is no. 
					 
					
						
							[ wide={ yes | no}] 
						
							Specifies whether to allow the display of IPSec 
							configuration information to exceed the screen width 
							of 80 characters. The default value is no, 
							meaning that the display of configuration 
							information is limited to the screen width.
					 
				 
			 
			Remarks
			
				- All string parameters are case-sensitive.
- 
				
					Because the show filterlist command can result in 
				lengthy, rapidly scrolling output, consider saving the output in 
				a text file, unless you only need to view limited portions.
				 To save output in a text file for the show all 
				command, do either of the following: If you are in the netsh environment (netsh>) 
				
					- At the netsh prompt, type:
					set file open FileName.txt 
- Then type:
					ipsec static show filterlistName | rule 
					| all [level=verbose | normal][resolvedns=yes 
					| no 
- To stop sending output and close the file, type:
					set file close 
If you are not in the netsh environment
				
			
			
			
			
			
				Displays configuration information for the active IPSec policy 
				assigned to the specified Group Policy object.
			Syntax
			
				show gpoassignedpolicy [name= ]
			Parameters
			
				
					
						
							[ name=String] 
						
							Specifies the name of the Group Policy object to 
							which the active IPSec policy is assigned. If no 
							name is specified, the local IPSec policy is 
							displayed.
					 
				 
			 
			Remarks
			
				- You can only specify a Group Policy object name if set 
				store=domain.
- All string parameters are case-sensitive.
				To save output in a text file for the show 
				gpossignedpolicy command, do either of the following: If you are in the netsh environment (netsh>) 
				
					- At the netsh prompt, type:
					set file open FileName.txt 
- Then type:
					ipsec static show gpoassignedpolicy [Name] 
- To stop sending output and close the file, type:
					set file close 
If you are not in the netsh environment
				
			
			
			
			
				Displays configuration information for the specified IPSec 
				policy, or for all IPSec policies.
			Syntax
			
				show policyname= | all [level=] [format=] 
				[wide=]
			Parameters
			
				
					
						
							name=String| all
						
							Required. Specifies the name of the IPSec policy to 
							display or, if all is specified, that all 
							IPSec policies are displayed. 
					 
					
						
							[ level={ verbose| normal}]
						
						
							Specifies the level of information to display. If 
							verbose is specified, the security methods and 
							authentication method are displayed, in addition to 
							information about filter actions and rules. The 
							default value is normal.
					 
					
						
							[ format={ list| table}] 
						
							Specifies whether to display IPSec configuration 
							information in screen or tab-delimited format. The 
							default value is list, meaning that output is 
							displayed in screen format. 
					 
					
						
							[ wide={ yes | no}] 
						
							Specifies whether to allow the display of IPSec 
							configuration information to exceed the screen width 
							of 80 characters. The default value is no, 
							meaning that the display of configuration 
							information is limited to the screen width.
					 
				 
			 
			Remarks
			
				- All string parameters are case-sensitive.
- 
				
					Because the show policy command can result in 
				lengthy, rapidly scrolling output, consider saving the output in 
				a text file, unless you only need to view limited portions.
				 To save output in a text file for the show policy 
				command, do either of the following: If you are in the netsh environment (netsh>) 
				
					- At the netsh prompt, type:
					set file open FileName.txt 
- Then type:
					ipsec static show policyName | all >FileName.txt 
- To stop sending output and close the file, type:
					set file close 
If you are not in the netsh environment
				
			
			
			
			show rule
			
				Displays configuration information for a rule for a specified 
				policy, or for all rules for a specified policy.
			Syntax
			
				show rulename= | ID= | all | 
				defaultpolicy= [type=][level=][format=] 
				[wide=]
			Parameters
			
				
					
						
							name={ String| ID=Integer|
							all| default} 
						
							Required. Specifies one or more rules to display. If 
							either the rule name or the rule ID (the number 
							identifying the position of the rule in the policy 
							rule list) is specified, the corresponding rule is 
							displayed. If all is specified, all rules for 
							the specified policy are displayed. If default 
							is specified, the default response rule is 
							displayed.
					 
					
						
							policy=String
						
							Required. Specifies the name of the policy for which 
							the specified rule, or all rules, are displayed.
					 
					
						
							[ type={ transport| tunnel}]
						
						
							Specifies whether to display all transport rules or 
							all tunnel rules. The default value is to display 
							all rules.
					 
					
						
							[ level={ verbose| normal}]
						
						
							Specifies the level of information to display. If 
							verbose is specified, information about 
							associated filter actions is displayed, in addition 
							to basic information about the rule. The default 
							value is normal.
					 
					
						
							[ format={ list| table}] 
						
							Specifies whether to display IPSec configuration 
							information in screen or tab-delimited format. The 
							default value is list, meaning that output is 
							displayed in screen format. 
					 
					
						
							[ wide={ yes | no}] 
						
							Specifies whether to allow the display of IPSec 
							configuration information to exceed the screen width 
							of 80 characters. The default value is no, 
							meaning that the display of configuration 
							information is limited to the screen width.
					 
				 
			 
			Remarks
			
				- If you use the type parameter, you must also use the
				all parameter (you must specify show rule all).
				
- All string parameters are case-sensitive.
- 
				
					Because the show rule command can result in lengthy, 
				rapidly scrolling output, consider saving the output in a text 
				file, unless you only need to view limited portions.
				 To save output in a text file for the show rule 
				command, do either of the following: If you are in the netsh environment (netsh>) 
				
					- At the netsh prompt, type:
					set file open FileName.txt 
- Then type:
					ipsec static show ruleName | ID | 
					all | defaultPolicy [level=verbose 
					| normal] 
- To stop sending output and close the file, type:
					set file close 
If you are not in the netsh environment
				
			
			
			
			Netsh ipsec dynamic
			
				
				The following commands are available at the ipsec dynamic 
				> prompt, which is rooted within the netsh environment.
				To 
				view the command syntax, click a command:
				
			 
			
				 
			
			
				Creates an IPSec main mode policy with the specified name and 
				adds it to the security policy database (SPD).
			Syntax
			
				add mmpolicyname= [qmpermm=] [mmlifetime=][softsaexpirationtime=][mmsecmethods=]
			Parameters
			
				
					
						
							name=String
						
							Required. Specifies the name of the IPSec policy to 
							be created.
					 
					
						
							[ qmpermm=Integer] 
						
							Specifies the number of times that master keying 
							material can be used to derive the session key. The 
							default value is 0, The default value is 0, meaning 
							an unlimited number of quick mode SAs can be derived 
							from the main mode SA.
					 
					
						
							[ mmlifetime=Integer] 
						
							Specifies the number of minutes after which a new 
							master key is generated. The default value is 480 
							minutes.
					 
					
						
							[ softsaexpirationtime=Integer] 
						
							Specifies the number of minutes after which an 
							unprotected security association expires. The 
							default value is 480 minutes.
					 
					
						
							[ mmsecmethods="SecMeth1SecMeth2"]
						
						
							Specifies one or more key exchange security methods, 
							separated by spaces and defined by the following 
							format: ConfAlg-HashAlg-GroupNumb, 
							where:ConfAlgSpecifies the encryption 
							algorithm. ConfAlg can be DES or 
							3DES. HashAlgSpecifies the hash function.
							HashAlg can be MD5 or SHA1.GroupNumSpecifies 
							the Diffie-Hellman group to be used for the base 
							keying material. GroupNumb can be: 1 
							(low, protects with 768 bits of keying material), 
							2 (medium, protects with 1024 bits), and 3 
							(high, protects with 2048 bits). 
					 
				 
			 
			Remarks
			
			
				 
			
			
			
				Creates an IPSec quick mode policy with the specified name and 
				adds it to the SPD. 
			Syntax
			
				add qmpolicyname= [soft=][pfsgroup=][qmsecmethods=]
			Parameters
			
				
					
						
							name=String
						
							Required. Specifies the name of the IPSec quick mode 
							policy to be created.
					 
					
						
							[ soft={ yes| no}] 
						
							Specifies whether to fall back to unsecured 
							communications with other computers that do not 
							support IPSec, or when IPSec negotiations with an 
							IPSec-capable computer fail. The default value is 
							no.
					 
					
						
							[ pfsgroup={ grp1| grp2| 
							grp3| grpmm| nopfs}] 
						
							Specifies the Diffie-Hellman group to use for 
							session key PFS. If grp1 is specified, Group 
							1 (low) is used. If grp2 is specified, Group 
							2 (medium) is used. If grp3 is specified, 
							Group 2048 (high) is used. If grpmm is 
							specified, the group value is taken from the current 
							main mode settings. The default value is nopfs, 
							meaning session key PFS is disabled.
					 
					
						
							[ qmsecmethods="Neg1Neg2"]
						
						
							Specifies one or more security methods, separated by 
							spaces and defined by the following format: {ESP 
							[ConfAlg,AuthAlg]:k/s 
							| AH [HashAlg]:k/s | 
							AH [HashAlg+ESPConfAlg,AuthAlg]:k/s}]Where:ConfAlgSpecifies 
							the encryption algorithm. ConfigAlg can be 
							DES (Data Encryption Standard), 3DES, or
							none. AuthAlgSpecifies the integrity 
							algorithm. AuthAlg can be MD5 (Message 
							Digest 5), SHA1 (Secure Hash Algorithm 1), or
							none.HashAlgSpecifies the hash 
							function. HashAlg can be MD5 (Message 
							Digest 5) or SHA1 (Secure Hash Algorithm 1).kSpecifies 
							the session key lifetime in kilobytes. After the 
							specified number of kilobytes of data is 
							transferred, a new session key for the quick mode SA 
							is generated. The default value is 100000 kilobytes.sSpecifies 
							the session key lifetime in seconds. The default 
							value is 3600 seconds.
					 
				 
			 
			Remarks
			
			
			
			
				Creates an IPSec rule with the specified main mode policy and 
				quick mode policy and adds it to the SPD.
			Syntax
			
				add rulesrcaddr=dstaddr=mmpolicy=[qmpolicy=][protocol=][srcport=][dstport=][mirrored=][conntype=][actioninbound=][actionoutbound=][srcmask=][dstmask=][tunneldstaddress=][kerberos=][psk=][rootca=]
			Parameters
			
				
					
						
							srcaddr={ Me| Any| IPAddress|
							DNSName| ServerType} 
						
							Required. Specifies the source IP address, DNS name, 
							or server type for the IP traffic. You can use 
							WINS, DNS, DHCP, or gateway 
							for ServerType.
					 
					
						
							dstaddr={ Me| Any| IPAddress|
							DNSName| ServerType} 
						
							Required. Specifies the destination IP address, DNS 
							name, or server type for the IP traffic. You can use
							WINS, DNS, DHCP, or gateway 
							for ServerType.
					 
					
						
							mmpolicy=String
						
							Required. Specifies the name of the main mode 
							policy.
					 
					
						
							[ qmpolicy=] String
						
							Specifies the name of the quick mode policy. 
							Required if actioninbound=negotiate or 
							actionoutbound=negotiate are specified.
					 
					
						
							[ protocol={ ANY| ICMP| TCP|
							UDP| RAW| Integer }] 
						
							Specifies the IP protocol if, in addition to address 
							information, you want to filter a specific IP 
							protocol. The default value is ANY, meaning 
							all protocols are used for the filter.
					 
					
						
							[ srcport=Port] 
						
							Specifies the source port number of the packets to 
							be filtered. This option only applies if you are 
							filtering TCP or UDP packets. If 0 is specified, 
							packets sent from any port are filtered. The default 
							is any.
					 
					
						
							[ dstport=Port] 
						
							Specifies the destination port number of the packets 
							to be filtered. This option only applies if you are 
							filtering TCP or UDP packets. If 0 is specified, 
							packets sent to any port are filtered. The default 
							is any.
					 
					
						
							[ mirrored={ yes| no}] 
						
							Specifies whether to create a mirrored filter. Use
							yes to create two filters based on the filter 
							settings, one for traffic to the destination and one 
							for traffic from the destination. The default value 
							is yes.
					 
					
						
							[ conntype={ lan| dialup| 
							all}] 
						
							Specifies whether the rule applies only to remote 
							access or dial-up connections or to local area 
							network (LAN) connections, or to all connections. 
							The default value is all.
					 
					
						
							[ actioninbound={ permit| block|
							negotiate}] 
						
							Specifies the action that IPSec is required to take 
							for inbound traffic. If permit is specified, 
							traffic is received without negotiating or applying 
							IP security. If block is specified, traffic 
							is blocked. If negotiate is specified, IP 
							security is used, with the list of security methods 
							specified in the main mode and quick mode policies. 
							The default value is negotiate.
					 
					
						
							[ actionoutbound={ permit| block|
							negotiate}] 
						
							Specifies the action that IPSec is required to take 
							for outbound traffic. If permit is specified, 
							traffic is sent without negotiating or applying IP 
							security. If block is specified, traffic is 
							blocked. If negotiate is specified, IP 
							security is used, with the list of security methods 
							specified in the main mode and quick mode policies. 
							The default value is negotiate.
					 
					
						
							[ srcmask={ Mask| Prefix}]
						
						
							Specifies the source address subnet mask or the 
							prefix of the packets to be filtered. You can 
							specify a prefix value in the range of 1 through 32. 
							The default value is the mask of 255.255.255.255.
					 
					
						
							[ dstmask={ Mask| Prefix}]
						
						
							Specifies the destination address subnet mask or the 
							prefix value of the packets to be filtered. You can 
							specify a prefix value in the range of 1 through 32. 
							The default value is the mask of 255.255.255.255.
					 
					
						
							[ tunneldstaddress={ IPAddress| 
							DNSName}] 
						
							Specifies whether the traffic is tunneled and, if it 
							is, the IP address or DNS name of the tunnel 
							destination (the computer or gateway on the other 
							side of the tunnel).
					 
					
						
							[ kerberos={ yes | no}] 
						
							Specifies whether to use the Kerberos V5 protocol as 
							an authentication method.
					 
					
						
							[ psk=String] 
						
							Specifies the string of characters to use for the 
							preshared key, if a preshared key is used as an 
							authentication method.
					 
					
						
							[ rootca="Stringcertmap:{ 
							yes| no} excludecaname:{ yes|
							no} "] 
						
							Specifies certificate authentication options, where: 
							String Specifies the distinguished name of the 
							certificate, if a certificate is used as an 
							authentication method. certmap:{ yes|
							no} Specifies whether to enable 
							certificate-to-account mapping. You can enable 
							certificate-to-account mapping to verify that the 
							certificate is being used by a trusted computer.excludecaname:{
							yes| no} Specifies whether to exclude 
							from the certificate request the list of trusted 
							root CA names from which a certificate is accepted.
						
					 
				 
			 
			Remarks
			
				- Do not create a rule with the name all. Doing this 
				creates a conflict with the netsh ipsec option to select 
				all IPSec rules (for example, delete rule all).
- If the filter action for both inbound and outbound traffic (actioninbound 
				and actionoutbound) are set to Permit or Block, 
				a quick mode filter is not required.
- If a tunnel rule is specified, mirror should be set 
				to no (by default, mirror is set to yes). 
				For IPSec tunnels, you must create two rules--one rule describes 
				the traffic to be sent through the tunnel (outbound traffic) and 
				the other describes the traffic to be received through the 
				tunnel (inbound). Next, create two rules that use the inbound 
				and outbound filter lists in your policy.
- To filter any packets sent from or to the computer, you can 
				use srcaddr=Me or dstaddr=Me.
- To filter packets sent from or to any computer, you can use
				srcaddr=Any or dstaddr=Any.
- You can only use Kerberos V5 authentication or 
				certificate-to-account mapping for computers that are members of 
				an Active Directory domain.
- Although you can use only one preshared key for 
				authentication, you can use multiple certificates by specifying 
				the rootca parameter once, for each certificate you want 
				to use.
- All certificate authentication parameters must be contained 
				within quotation marks. Embedded quotation marks must be 
				replaced by a backslash followed by an apostrophe (\').
- All string parameters are case-sensitive.
- The preference order of each authentication method is 
				determined by the order in which it was specified in the 
				command.
- If no authentication methods are specified, dynamic defaults 
				are used. By default, IPSec policies use Kerberos V5 
				authentication. If the computer has a computer certificate, any 
				root CA to which the computer certificate chains is also used 
				for authentication.
- If excludecaname:yes is specified, the list of 
				trusted root CAs is not sent as part of the certificate request, 
				which prevents the potential disclosure of sensitive information 
				about the trust relationships of a computer. To enhance security 
				for computers connected to the Internet, specify this option.
- The use of preshared key authentication is not recommended 
				because it is a relatively weak authentication method. In 
				addition, preshared keys are stored in plaintext.
- IPSec peers must have at least one common authentication 
				method or communication will fail.
				 
			
			
			
				Deletes all IPSec policies, filters, and authentication methods, 
				if possible, from the SPD.
			Syntax
			
				delete all
			Parameters
			
				None.
			
			
			
				Deletes the specified IPSec main mode policy, or all IPSec main 
				mode policies, from the SPD.
			Syntax
			
				delete mmpolicyname= | all
			Parameters
			
				
					
						
							name=String| all
						
							Required. Specifies the name of the IPSec main mode 
							policy to delete. Or, if all is specified, 
							all IPSec main mode policies are deleted.
					 
				 
			 
			Remarks
			
				- If a rule is associated with the main mode policy, you must 
				delete the rule before you can delete the policy.
- All string parameters are case-sensitive.
				Deletes the specified IPSec quick mode policy, or all IPSec 
				quick mode policies, from the SPD.
			Syntax
			
				delete qmpolicy [name=] | [all]
			Parameters
			
				
					
						
							name=String| all
						
							Required. Specifies the name of the IPSec quick mode 
							policy to delete. Or, if all is specified, 
							all IPSec quick mode policies are deleted.
					 
				 
			 
			Remarks
			
				- If a rule is associated with the quick mode policy, you must 
				delete the rule before you can delete the policy.
- All string parameters are case-sensitive.
				Deletes an IPSec rule from the SPD.
			Syntax
			
				delete 
				rulesrcaddr=dstaddr=protocol=srcport=dstport=mirrored=conntype=[srcmask=][dstmask=][tunneldstaddress=]
			Parameters
			
				
					
						
							srcaddr={ Me| Any| IPAddress|
							DNSName| ServerType} 
						
							Required. Specifies the source IP address, DNS name, 
							or server type for the IP traffic. You can use 
							WINS, DNS, DHCP, or gateway 
							for ServerType.
					 
					
						
							dstaddr={ Me| Any| IPAddress|
							DNSName| ServerType} 
						
							Required. Specifies the destination IP address, DNS 
							name, or server type for the IP traffic. You can use
							WINS, DNS, DHCP, or gateway 
							for ServerType.
					 
					
						
							protocol={ ANY| ICMP| TCP|
							UDP| RAW| Integer } 
						
							Required. Specifies the IP protocol used for the 
							filter.
					 
					
						
							srcport=Port
						
							Required. Specifies the source port number of the 
							packets being filtered. This option only applies if 
							you are filtering TCP or UDP packets. A value of 
							0 matches filters set to a source port of 0 
							or any.
					 
					
						
							dstport=Port
						
							Required. Specifies the destination port number of 
							the packets being filtered. This option only applies 
							if you are filtering TCP or UDP packets. A value of
							0 matches filters set to a destination port 
							of 0 or any.
					 
					
						
							mirrored={ yes| no} 
						
							Required. Specifies whether the rule was created 
							with mirrored filters.
					 
					
						
							conntype={ lan| dialup| all}
						
						
							Required. Specifies whether the rule to be deleted 
							applies only to remote access or dial-up connections 
							or to local area network (LAN) connections, or to 
							all connections.
					 
					
						
							[ srcmask={ Mask| Prefix}]
						
						
							Specifies the source address subnet mask or the 
							prefix of the packets being filtered. You can 
							specify a prefix value in the range of 1 through 32. 
							The default value is the mask of 255.255.255.255.
					 
					
						
							[ dstmask={ Mask| Prefix}]
						
						
							Specifies the destination address subnet mask or the 
							prefix value of the packets being filtered. You can 
							specify a prefix value in the range of 1 through 32. 
							The default value is the mask of 255.255.255.255.
					 
					
						
							[ tunneldstaddress={ IPAddress| 
							DNSName}] 
						
							Specifies whether the traffic is tunneled and, if it 
							is, the IP address or DNS name of the tunnel 
							destination (the computer or gateway on the other 
							side of the tunnel).
					 
				 
			 
			Remarks
			
				- To filter any packets sent from or to the computer, you can 
				use srcaddr=Me or dstaddr=Me.
- To filter packets sent from or to any computer, you can use
				srcaddr=Any or dstaddr=Any.
				Creates or modifies the following IPSec settings: IPSec 
				diagnostics, default traffic exemptions, strong certificate 
				revocation list (CRL) checking, IKE (Oakley) logging, logging 
				intervals, computer startup security, and computer startup 
				traffic exemptions.
			Syntax
			
				set config [property=] [value=]
			Parameters
			
				
					
						
							[ property=]{ ipsecdiagnostics value=|
							ipsecexempt value=| ipsecloginterval 
							value=| ikelogging value=| 
							strongcrlcheck value=| bootmode value=|
							bootexemptions value=} 
						
							Required. Specifies the name of the IPSec setting to 
							be created or modified and a value for the setting, 
							where:ipsecdiagnostics value={ 0| 1|
							2| 3| 4| 5| 6| 
							7} Specifies whether to enable IPSec diagnostic 
							logging and, if so, which level of logging to 
							provide. The default value is 0, meaning that 
							logging is disabled. If you change the value for 
							this setting, you must restart the computer for the 
							new value to take effect. You can specify other 
							values as follows, to enable different levels of 
							logging:When 1 is specified, bad SPI packets 
							(the total number of packets for which the Security 
							Parameters Index or SPI was incorrect), IKE 
							negotiation failures, IPSec processing failures, 
							packets received with invalid packet syntax, and 
							other errors are recorded in the System log. 
							Unauthenticated hashes (with the exception of the 
							"Clear text received when should have been secured" 
							event) are logged as well. When 2 is 
							specified, inbound per-packet drop events are 
							recorded in the System log. When 3 is 
							specified, level 1 and level 2 logging are 
							performed. In addition, unexpected clear text events 
							(packets that are sent or received in plaintext) are 
							also recorded. When 4 is specified, outbound 
							per-packet drop events are recorded in the System 
							log. When 5 is specified, level 1 and level 4 
							logging are performed.When 6 is specified, 
							level 2 and level 4 logging are performed.When 7 
							specified, all levels of logging are performed.ipsecexempt 
							value={ 0| 1| 2| 3} 
							Specifies whether to modify the default IPSec 
							traffic exemption (traffic that is not matched 
							against IPSec filters but is still permitted). The 
							default value is 3, meaning that only IKE 
							traffic is exempted from IPSec filtering. If you 
							change the value for this setting, you must restart 
							the computer for the new value to take effect. You 
							can specify other values as follows:If 0 is 
							specified, multicast, broadcast, RSVP, Kerberos, and 
							IKE traffic is exempted from IPSec filtering. If 
							1 is specified, Kerberos and RSVP traffic is not 
							exempted from IPSec filtering (multicast, broadcast, 
							and IKE traffic is exempted).If 2 is 
							specified, multicast and broadcast traffic is not 
							exempted from IPSec filtering (RSVP, Kerberos, and 
							IKE traffic is exempted).ipsecloginterval value={
							Integer} Specifies the interval, in seconds, 
							after which IPSec event logs are sent to the System 
							log. For Integer, valid values range from 
							60 through 86400. The default value is 
							3600. If you change the value for this setting, 
							you must restart the computer for the new value to 
							take effect.ikelogging value={ 0| 1} 
							Specifies whether to enable IKE (Oakley) logging, to 
							generate details about the SA establishment process. 
							The default value is 0, meaning that IKE 
							logging is disabled.strongcrlcheck value={ 
							0| 1| 2} Specifies the level of 
							CRL checking to use. If 0 is specified, CRL 
							checking is disabled. If 1 is specified, 
							standard CRL checking is used, and certificate 
							validation fails only if the certificate is 
							determined to be revoked. If 2 is specified, 
							strong CRL checking is used, and certificate 
							validation fails if any CRL check error occurs. The 
							default value is 1.bootmode value={ 
							stateful| block| permit} Specifies 
							the action that IPSec is required to take when the 
							computer starts. If stateful is specified, 
							only the following traffic is permitted during 
							computer startup: outbound traffic initiated by the 
							computer during startup, inbound traffic that is 
							sent in response to the outbound traffic, and DHCP 
							traffic. If block is specified, all inbound 
							and outbound traffic is blocked until a local IPSec 
							policy or a domain-based IPSec policy is applied. If
							permit is specified, all traffic is 
							transmitted and received. The default value is 
							stateful. If you use either stateful filtering 
							or if you specify that traffic be blocked during 
							computer startup, you can also use the 
							bootexemptions parameter to specify traffic 
							types that you want to exempt from IPSec filtering 
							during computer startup. If you change the value for 
							this setting, you must restart the computer for the 
							new value to take effect.bootexemptions value=Exemption1Exemption2Specifies 
							one or more IPSec traffic exemptions from startup 
							security, separated by spaces and defined by the 
							following format for TCP and UDP traffic: 
							protocol:srcport:dstport:direction 
							and the following format for non-TCP/UDP traffic: 
							protocol:direction, where:protocol={
							ICMP| TCP| UDP| RAW| 
							Integer } Specifies the IP protocol type to 
							exempt from IPSec filtering during computer startup.
							srcport=PortSpecifies the 
							source port number of the packets to exempt from 
							IPSec filtering during computer startup. A value of 
							0 means that any source port is exempted. dstport=PortSpecifies 
							the destination port number of the packets to exempt 
							from IPSec filtering during computer startup. A 
							value of 0 means that any destination port is 
							exempted.direction={ inbound |
							outbound} Specifies the direction of the 
							traffic to exempt from IPSec filtering during 
							computer startup.
					 
				 
			 
			Remarks
			
				- Use strong CRL checking (set property=strongcrlcheck 
				value=2) if the CRL distribution point must be reachable on 
				the network and certificates can only be validated if no CRL 
				check error occurs. 
- IPSec can only negotiate security associations for Kerberos 
				traffic if your IPSec policy does not use Kerberos as the 
				authentication method. If Kerberos is required for 
				authentication, you must exempt Kerberos traffic by using the 
				ipsecexempt parameter.
- In Windows 2000 and Windows XP, by default, all broadcast, 
				multicast, Internet Key Exchange (IKE), Kerberos, and Resource 
				Reservation Protocol (RSVP) traffic was exempted from IPSec 
				filtering. In the Windows Server™ 2003 family, only IKE traffic 
				is exempted from IPSec filtering by default. All other traffic 
				types are now matched against IPSec filters, and you can 
				configure block or permit filter actions specifically for 
				multicast and broadcast traffic (IPSec does not negotiate 
				security associations for multicast and broadcast traffic).
				As a result of this change in default behavior for IPSec, you 
				should verify the behavior of IPSec policies designed for 
				Windows 2000 or Windows XPand determine whether to configure 
				explicit permit filters to permit specific traffic types. To 
				restore the default behavior of Windows 2000 and Windows XPfor 
				IPSec policies, edit the following registry key: 
				HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ IPSec. 
				Add a new DWORD value named NoDefaultExempt and assign to 
				it a value of 0. For more information about adding values 
				to registry keys, see
				
				Add a value to a registry key entry
						. 
				Caution
				
					- Incorrectly editing the registry may severely damage 
					your system. Before making changes to the registry, you 
					should back up any valued data on the computer.
- Modifying IPSec traffic exemptions from startup security 
					(that is, modifying the bootexemptions= parameter) 
					will overwrite all previous exemptions from startup 
					security.
 
			
			
			
				Modifies an IPSec main mode policy and writes the changes to the 
				SPD.
			Syntax
			
				set mmpolicyname= [qmperm=][mmlifetime=][softsaexpirationtime=][mmsecmethods=]
			Parameters
			
				
					
						
							name=String
						
							Required. Specifies the name of the IPSec main mode 
							policy to modify.
					 
					
						
							[ qmpermm=Integer] 
						
							Specifies the number of times that master keying 
							material is used to derive the session key. A value 
							of 0 means that an unlimited number of quick mode 
							SAs can be derived from the main mode SA.
					 
					
						
							[ mmlifetime=Integer] 
						
							Specifies the number of minutes after which a new 
							master key is generated.
					 
					
						
							[ softsaexpirationtime=Integer] 
						
							Specifies the number of minutes after which an 
							unprotected security association expires.
					 
					
						
							[ mmsecmethods="SecMeth1SecMeth2"]
						
						
							Specifies one or more key exchange security methods, 
							separated by spaces and defined by the format 
							ConfAlg-HashAlg-GroupNumb, where:ConfAlgSpecifies 
							the encryption algorithm. ConfAlg can be 
							DES or 3DES.HashAlgSpecifies the 
							hash function. HashAlg can be MD5 or
							SHA1.GroupNumSpecifies the Diffie-Hellman 
							group to be used for the base keying material. 
							GroupNumb can be: 1 (low, protects with 
							768 bits of keying material), 2 (medium, 
							protects with 1024 bits), and 3 (high, 
							protects with 2048 bits). 
					 
				 
			 
			Remarks
			
				- IPSec peers must have at least one common key exchange 
				security method (one that uses the same settings) or 
				negotiations will fail. 
- If the number of quick mode negotiations will exceed the 
				value set for the number of quick mode negotiations per main 
				mode negotiation during the main mode lifetime, a new main mode 
				negotiation occurs.
- All string parameters are case-sensitive.
				Modifies an IPSec quick mode policy and writes the changes to 
				the SPD. 
			Syntax
			
				set qmpolicyname= [soft=][pfsgroup=][qmsecmethods=]
			Parameters
			
				
					
						
							name=String
						
							Required. Specifies the name of the IPSec quick mode 
							policy to modify.
					 
					
						
							[ soft={ yes| no}] 
						
							Specifies whether to fall back to unsecured 
							communications with other computers that do not 
							support IPSec, or when IPSec negotiations with an 
							IPSec-capable computer fail.
					 
					
						
							[ pfsgroup={ grp1| grp2| 
							grp3| grpmm| nopfs}] 
						
							Specifies the Diffie-Hellman group to use for 
							session key PFS. If grp1 is specified, Group 
							1 (low) is used. If grp2 is specified, Group 
							2 (medium) is used. If grp3 is specified, 
							Group 2048 (high) is used. If grpmm is 
							specified, the group value is taken from the current 
							main mode settings. A value of nopfs means 
							that session key PFS is disabled.
					 
					
						
							[ qmsecmethods="Neg1Neg2"]
						
						
							Specifies one or more security methods, separated by 
							spaces and defined by the following format:{ESP 
							[ConfAlg,AuthAlg]:k/s 
							| AH [HashAlg]:k/s | 
							AH [HashAlg+ESPConfAlg,AuthAlg]:k/s}] 
							Where:ConfAlgSpecifies the encryption 
							algorithm. ConfigAlg can be DES (Data 
							Encryption Standard), 3DES, or none.
							AuthAlgSpecifies the integrity algorithm. 
							AuthAlg can be MD5 (Message Digest 5), 
							SHA1 (Secure Hash Algorithm 1), or none.HashAlgSpecifies 
							the hash function. HashAlg can be MD5 
							or SHA1.kSpecifies the session key 
							lifetime in kilobytes. After the specified number of 
							kilobytes of data is transferred, a new session key 
							for the quick mode SA is generated. The default 
							value is 100000 kilobytes.sSpecifies the 
							session key lifetime in seconds. The default value 
							is 3600 seconds.
					 
				 
			 
			Remarks
			
				- The preference order of each quick mode security method is 
				determined by the order in which it was specified in the 
				command.
- IPSec peers must have the same pfsgroup enabled (that 
				is, both peers must use the same Diffie-Hellman group for 
				session key PFS), or communication will fail. 
- For enhanced security, do not use Diffie-Hellman Group 1. 
				For maximum security, use Group 2048 whenever possible. Use 
				Group 2 when required for interoperability with Windows 2000 and 
				Windows XP.
- All string parameters are case-sensitive.
				Modifies an IPSec rule that defines a set of filters and writes 
				the changes to the SPD.
			Syntax
			
				set rulesrcaddr=dstaddr=protocol=srcport=dstport=mirrored=conntype= 
				[srcmask=][dstmask=][tunneldstaddress=][mmpolicy=][qmpolicy=][actioninbound=][actionoutbound=][kerberos=][psk=][rootca=]
			Parameters
			
				
					
						
							srcaddr={ Me| Any| IPAddress|
							DNSName| ServerType} 
						
							Required. Specifies the source IP address, DNS name, 
							or server type for the IP traffic. You can use 
							WINS, DNS, DHCP, or gateway 
							for ServerType.
					 
					
						
							dstaddr={ Me| Any| IPAddress|
							DNSName| ServerType} 
						
							Required. Specifies the destination IP address, DNS 
							name, or server type for the IP traffic. You can use
							WINS, DNS, DHCP, or gateway 
							for ServerType.
					 
					
						
							protocol={ ANY| ICMP| TCP|
							UDP| RAW| Integer } 
						
							Required. Specifies the IP protocol used for the 
							filter.
					 
					
						
							srcport=Port
						
							Required. Specifies the source port number of the 
							packets being filtered. This option only applies if 
							you are filtering TCP or UDP packets. A value of 
							0 matches filters set to a source port of 0 
							or any.
					 
					
						
							dstport=Port
						
							Required. Specifies the destination port number of 
							the packets being filtered. This option only applies 
							if you are filtering TCP or UDP packets. A value of
							0 matches filters set to a destination port 
							of 0 or any.
					 
					
						
							mirrored={ yes| no} 
						
							Required. Specifies whether the rule was created 
							with mirrored filters.
					 
					
						
							conntype={ lan| dialup| all}
						
						
							Required. Specifies whether the rule applies only to 
							remote access or dial-up connections or to local 
							area network (LAN) connections, or to all 
							connections.
					 
					
						
							[ srcmask={ Mask| Prefix}]
						
						
							Specifies the source address subnet mask or the 
							prefix of the packets being filtered. You can 
							specify a prefix value in the range of 1 through 32. 
							The default value is the mask of 255.255.255.255.
					 
					
						
							[ dstmask={ Mask| Prefix}]
						
						
							Specifies the destination address subnet mask or the 
							prefix value of the packets being filtered. You can 
							specify a prefix value in the range of 1 through 32. 
							The default value is the mask of 255.255.255.255.
					 
					
						
							[ tunneldstaddress={ IPAddress| 
							DNSName}] 
						
							Specifies whether the traffic is tunneled and, if it 
							is, the IP address or DNS name of the tunnel 
							destination (the computer or gateway on the other 
							side of the tunnel).
					 
					
						
							[ mmpolicy=String] 
						
							Specifies the name of the main mode policy.
					 
					
						
							[ qmpolicy=String] 
						
							Specifies the name of the quick mode policy.
					 
					
						
							[ actioninbound={ permit| block|
							negotiate}] 
						
							Specifies the action that IPSec is required to take 
							for inbound traffic. If permit is specified, 
							traffic is received without negotiating or applying 
							IP security. If block is specified, traffic 
							is blocked. If negotiate is specified, IP 
							security is used, with the list of security methods 
							specified in the main mode and quick mode policies.
					 
					
						
							[ actionoutbound={ permit| block|
							negotiate}] 
						
							Specifies the action that IPSec is required to take 
							for outbound traffic. If permit is specified, 
							traffic is sent without negotiating or applying IP 
							security. If block is specified, traffic is 
							blocked. If negotiate is specified, IP 
							security is used, with the list of security methods 
							specified in the main mode and quick mode policies.
					 
					
						
							[ kerberos={ yes | no}] 
						
							Specifies whether to use the Kerberos V5 protocol as 
							an authentication method.
					 
					
						
							[ psk=String] 
						
							Specifies the string of characters to use for the 
							preshared key, if a preshared key is used as an 
							authentication method.
					 
					
						
							[ rootca="Stringcertmap:{ 
							yes| no} excludecaname:{ yes|
							no} "] 
						
							Specifies certificate authentication options, where: 
							String Specifies the distinguished name of the 
							certificate, if a certificate is used as an 
							authentication method.certmap:{ yes|
							no} Specifies whether to enable 
							certificate-to-account mapping. You can enable 
							certificate-to-account mapping to verify that the 
							certificate is being used by a trusted computer.excludecaname:{
							yes| no} Specifies whether to exclude 
							from the certificate request the list of trusted 
							root CA names from which a certificate is accepted.
						
					 
				 
			 
			Remarks
			
				- You can modify the following parameters: mmpolicy=,
				qmpolicy=, actioninbound=, and actionoutbound=. 
				All other parameters are used to identify the rule that you want 
				to modify, and therefore they cannot be modified.
- If the filter action for both inbound and outbound traffic (actioninbound 
				and actionoutbound) are set to Permit or Block, 
				a quick mode filter is not required.
- If a tunnel rule is specified, mirror should be set 
				to no (by default, mirror is set to yes). 
				For IPSec tunnels, you must create two rules: one rule describes 
				the traffic to be sent through the tunnel (outbound traffic) and 
				the other describes the traffic to be received through the 
				tunnel (inbound). Next, create two rules that use the inbound 
				and outbound filter lists in your policy.
- To filter any packets sent from or to the computer, you can 
				use srcaddr=Me or dstaddr=Me.
- To filter packets sent from or to any computer, you can use
				srcaddr=Any or dstaddr=Any.
- You can only use Kerberos V5 authentication or 
				certificate-to-account mapping for computers that are members of 
				an Active Directory domain.
- Although you can use only one preshared key for 
				authentication, you can use multiple certificates by specifying 
				the rootca parameter once, for each certificate you want 
				to use.
- All certificate authentication parameters must be contained 
				within quotation marks. Embedded quotation marks must be 
				replaced by a backslash followed by an apostrophe (\').
- All string parameters are case-sensitive.
- The preference order of each authentication method is 
				determined by the order in which it was specified in the 
				command.
- If no authentication methods are specified, dynamic defaults 
				are used. By default, IPSec policies use Kerberos V5 
				authentication. If the computer has a computer certificate, any 
				root CA to which the computer certificate chains is also used 
				for authentication.
- If excludecaname:yes is specified, the list of 
				trusted root CAs is not sent as part of the certificate request, 
				which prevents the potential disclosure of sensitive information 
				about the trust relationships of a computer. To enhance security 
				for computers connected to the Internet, specify this option.
- The use of preshared key authentication is not recommended 
				because it is a relatively weak authentication method. In 
				addition, preshared keys are stored in plaintext.
- IPSec peers must have at least one common authentication 
				method or communication will fail. 
- Modifying authentication methods will overwrite all previous 
				authentication methods, even if the previous authentication 
				methods were different. For example, if kerberos=yes and
				psk=yes were previously specified, and then you specify
				kerberos=no, the psk=yes parameter will also be 
				overwritten, and preshared key authentication will no longer be 
				used.
				Displays configuration information for all IPSec policies, 
				filters, statistics, and security associations in the SPD. 
			Syntax
			
				show all [resolvedns=]
			Parameters
			
				
					
						
							[ resolvedns={ yes | no}] 
						
							Specifies whether to resolve the Domain Name System 
							(DNS) or NETBIOS computer name associated with an IP 
							address when displaying sources or destinations.
						
					 
				 
			 
			Remarks
			
				- 
				
					Because the show all command can result in lengthy, 
				rapidly scrolling output, consider saving the output in a text 
				file, unless you only need to view limited portions.
				 To save output in a text file for the show all 
				command, do either of the following: If you are in the netsh environment (netsh>) 
				
					- At the netsh prompt, type:
					set file open FileName.txt 
- Then type:
					ipsec dynamic show all 
- To stop sending output and close the file, type:
					set file close 
If you are not in the netsh environment
				
			
			
			
			
			
				Displays values for the following IPSec settings: IPSec 
				diagnostics, default traffic exemptions, strong certificate 
				revocation list (CRL) checking, IKE (Oakley) logging, logging 
				intervals, computer startup security, and computer startup 
				traffic exemptions.
			Syntax
			
				show config
			Parameters
			
				None.
			Remarks
			
				- 
				
					To save output in a text file for the show config 
				command, do either of the following:
				 If you are in the netsh environment (netsh>) 
				
					- At the netsh prompt, type:
					set file open FileName.txt 
- Then type:
					ipsec dynamic show config 
- To stop sending output and close the file, type:
					set file close 
If you are not in the netsh environment
				
			
			
			
			
				Displays configuration information for the specified IPSec main 
				mode filter, or for all IPSec main mode filters, in the SPD.
			
			Syntax
			
				show mmfiltername= | all [type=] srcaddr=dstadd= 
				[srcmask=][dstmask=] [resolvedns=]
			Parameters
			
				
					
						
							name=String| all
						
							Required. Specifies the name of the IPSec main mode 
							filter to display. Or, if all is specified, 
							all IPSec main mode filters are displayed. 
					 
					
						
							type={ generic| specific} 
						
							Specifies whether to display generic or specific 
							main mode filters. The default value is generic.
					 
					
						
							[ srcaddr={ Me| Any| 
							IPAddress| DNSName| ServerType}]
						
						
							Specifies the source IP address, DNS name, or server 
							type for the IP traffic being filtered. You can use
							WINS, DNS, DHCP, or gateway 
							for ServerType.
					 
					
						
							[ dstaddr={ Me| Any| 
							IPAddress| DNSName| ServerType}]
						
						
							Specifies the destination IP address, DNS name, or 
							server type for the IP traffic being filtered. You 
							can use WINS, DNS, DHCP, or 
							gateway for ServerType.
					 
					
						
							[ srcmask={ Mask| Prefix}]
						
						
							Specifies the source address subnet mask or the 
							prefix of the packets being filtered. You can 
							specify a prefix value in the range of 1 through 32. 
							The default value is the mask of 255.255.255.255.
					 
					
						
							[ dstmask={ Mask| Prefix}]
						
						
							Specifies the destination address subnet mask or the 
							prefix value of the packets being filtered. You can 
							specify a prefix value in the range of 1 through 32. 
							The default value is the mask of 255.255.255.255.
					 
					
						
							[ resolvedns={ yes | no}] 
						
							Specifies whether to resolve the Domain Name System 
							(DNS) or NETBIOS computer name associated with an IP 
							address when displaying sources or destinations. The 
							default value is no. 
					 
				 
			 
			Remarks
			
				- All string parameters are case-sensitive.
- 
				
					Because the show mmfilter command can result in 
				lengthy, rapidly scrolling output, consider saving the output in 
				a text file, unless you only need to view limited portions.
				 To save output in a text file for the show mmfilter 
				command, do either of the following: If you are in the netsh environment (netsh>) 
				
					- At the netsh prompt, type:
					set file open FileName.txt 
- Then type:
					ipsec dynamic show mmfilterName | all 
- To stop sending output and close the file, type:
					set file close 
If you are not in the netsh environment
				
			
			
			
			
			
				Displays configuration information for the specified IPSec main 
				mode policy, or for all IPSec main mode policies, in the SPD.
			Syntax
			
				show mmpolicyname= | all
			Parameters
			
				
					
						
							name=String| all
						
							Required. Specifies the name of the IPSec main mode 
							policy to display. Or, if all is specified, 
							all IPSec main mode policies are displayed.
					 
				 
			 
			Remarks
			
				- All string parameters are case-sensitive.
- 
				
					Because the show mmpolicy command can result in 
				lengthy, rapidly scrolling output, consider saving the output in 
				a text file, unless you only need to view limited portions.
				 To save output in a text file for the show mmpolicy 
				command, do either of the following: If you are in the netsh environment (netsh>) 
				
					- At the netsh prompt, type:
					set file open FileName.txt 
- Then type:
					ipsec dynamic show mmpolicyName | all 
- To stop sending output and close the file, type:
					set file close 
If you are not in the netsh environment
				
			
			
			
			
			
				Displays the IPSec main mode security associations for the 
				specified source and destination addresses, or all IPSec main 
				mode security associations, in the SPD. 
			Syntax
			
				show mmsas [all] [srcaddr=][dstaddr=][format=] 
				[resolvedns=] 
			Parameters
			
				
					
						
							[ all] 
						
							Specifies that all main mode security associations 
							are displayed.
					 
					
						
							[ srcaddr={ Me| Any| 
							IPAddress| DNSName| ServerType}]
						
						
							Specifies the source IP address, DNS name, or server 
							type for the IP traffic being filtered. You can use
							WINS, DNS, DHCP, or gateway 
							for ServerType.
					 
					
						
							[ dstaddr={ Me| Any| 
							IPAddress| DNSName| ServerType}]
						
						
							Specifies the destination IP address, DNS name, or 
							server type for the IP traffic being filtered. You 
							can use WINS, DNS, DHCP, or 
							gateway for ServerType.
					 
					
						
							[ format={ list| table}] 
						
							Specifies whether to display IPSec configuration 
							information in screen or tab-delimited format. The 
							default value is list, meaning that output is 
							displayed in screen format. 
					 
					
						
							[ resolvedns={ yes | no}] 
						
							Specifies whether to resolve the Domain Name System 
							(DNS) or NETBIOS computer name associated with an IP 
							address when displaying sources or destinations. The 
							default value is no. 
					 
				 
			 
			Remarks
			
				- If no parameters are specified, all main mode security 
				associations are displayed.
- All string parameters are case-sensitive.
- 
				
					Because the show mmsas command can result in lengthy, 
				rapidly scrolling output, consider saving the output in a text 
				file, unless you only need to view limited portions.
				 To save output in a text file for the show mmsas 
				command, do either of the following: If you are in the netsh environment (netsh>) 
				
					- At the netsh prompt, type:
					set file open FileName.txt 
- Then type:
					ipsec dynamic show mmsas 
- To stop sending output and close the file, type:
					set file close 
If you are not in the netsh environment
				
			
			
			
			
			
				Displays configuration information for the specified quick mode 
				filter, or for all quick mode filters, in the SPD. 
			Syntax
			
				show qmfiltername= | all [type=] [srcaddr=][dstaddr=][srcmask=][dstmask=][protocol=][srcport=][dstport=][actioninbound=][actionoutbound=][resolvedns=]
			
			Parameters
			
				
					
						
							name=String| all
						
							Required. Specifies the name of the IPSec quick mode 
							filter to display, or, if all is specified, 
							that all IPSec quick mode filters are displayed.
						
					 
					
						
							[ type={ generic| specific}]
						
						
							Specifies whether to display generic or specific 
							quick mode filters. The default value is generic.
					 
					
						
							[ srcaddr={ Me| Any| 
							IPAddress| DNSName| ServerType}]
						
						
							Specifies the source IP address, DNS name, or server 
							type for the IP traffic being filtered. You can use
							WINS, DNS, DHCP, or gateway 
							for ServerType.
					 
					
						
							[ dstaddr={ Me| Any| 
							IPAddress| DNSName| ServerType}]
						
						
							Specifies the destination IP address, DNS name, or 
							server type for the IP traffic being filtered. You 
							can use WINS, DNS, DHCP, or 
							gateway for ServerType.
					 
					
						
							[ srcmask={ Mask| Prefix}]
						
						
							Specifies the source address subnet mask or the 
							prefix of the packets being filtered. You can 
							specify a prefix value in the range of 1 through 32. 
							The default value is the mask of 255.255.255.255.
					 
					
						
							[ dstmask={ Mask| Prefix}]
						
						
							Specifies the destination address subnet mask or the 
							prefix value of the packets being filtered. You can 
							specify a prefix value in the range of 1 through 32. 
							The default value is the mask of 255.255.255.255.
					 
					
						
							[ protocol={ ANY| ICMP| TCP|
							UDP| RAW| Integer }] 
						
							Specifies the IP protocol if, in addition to 
							addressing information, a specific IP protocol is 
							filtered. The default value is ANY, meaning 
							all protocols are used for the filter.
					 
					
						
							[ srcport=Port] 
						
							Specifies the source port number of the packets 
							being filtered. This option only applies if you are 
							filtering TCP or UDP packets. If 0 is specified, 
							packets sent from any port are filtered. The default 
							is any.
					 
					
						
							[ dstport=Port] 
						
							Specifies the destination port number of the packets 
							being filtered. This option only applies if you are 
							filtering TCP or UDP packets. If 0 is specified, 
							packets sent to any port are filtered. The default 
							is any.
					 
					
						
							[ actioninbound={ permit| block|
							negotiate}] 
						
							Specifies the action that IPSec is required to take 
							for inbound traffic. The default value is 
							negotiate.
					 
					
						
							[ actionoutbound={ permit| block|
							negotiate}] 
						
							Specifies the action that IPSec is required to take 
							for outbound traffic. The default value is 
							negotiate
					 
					
						
							[ resolvedns={ yes | no}] 
						
							Specifies whether to resolve the Domain Name System 
							(DNS) or NETBIOS computer name associated with an IP 
							address when displaying sources or destinations. The 
							default value is no. 
					 
				 
			 
			Remarks
			
				- All string parameters are case-sensitive.
- 
				
					Because the show qmfilter command can result in 
				lengthy, rapidly scrolling output, consider saving the output in 
				a text file, unless you only need to view limited portions.
				 To save output in a text file for the show qmfilter 
				command, do either of the following: If you are in the netsh environment (netsh>) 
				
					- At the netsh prompt, type:
					set file open FileName.txt 
- Then type:
					ipsec dynamic show qmfilter Name | all 
- To stop sending output and close the file, type:
					set file close 
If you are not in the netsh environment
				
			
			
			
			
			
				Displays configuration information for the specified IPSec quick 
				mode policy, or for all IPSec quick mode policies, in the SPD.
			Syntax
			
				show qmpolicyname= | all
			Parameters
			
				
					
						
							name=String| all
						
							Required. Specifies the name of the IPSec quick mode 
							policy to display. Or, if all is specified, 
							all IPSec quick mode policies are displayed.
					 
				 
			 
			Remarks
			
				- All string parameters are case-sensitive.
- 
				
					Because the show qmpolicy command can result in 
				lengthy, rapidly scrolling output, consider saving the output in 
				a text file, unless you only need to view limited portions.
				 To save output in a text file for the show qmpolicy 
				command, do either of the following: If you are in the netsh environment (netsh>) 
				
					- At the netsh prompt, type:
					set file open FileName.txt 
- Then type:
					ipsec dynamic show qmpolicyName | all 
- To stop sending output and close the file, type:
					set file close 
If you are not in the netsh environment
				
			
			
			
			
			
				Displays the IPSec quick mode security associations for the 
				specified source and destination addresses, or all IPSec quick 
				mode security associations, in the SPD. 
			Syntax
			
				show qmsas [all][srcaddr=][dstaddr=] [protocol=][format=][resolvedns=]
			Parameters
			
				
					
						
							[ all] 
						
							Specifies that all IPSec quick mode security 
							associations are displayed.
					 
					
						
							[ srcaddr={ Me| Any| 
							IPAddress| DNSName| ServerType}]
						
						
							Specifies the source IP address, DNS name, or server 
							type for the IP traffic being filtered. You can use
							WINS, DNS, DHCP, or gateway 
							for ServerType.
					 
					
						
							[ dstaddr={ Me| Any| 
							IPAddress| DNSName| ServerType]
						
						
							Specifies the destination IP address, DNS name, or 
							server type for the IP traffic being filtered. You 
							can use WINS, DNS, DHCP, or 
							gateway for ServerType.
					 
					
						
							[ protocol={ ANY| ICMP| TCP|
							UDP| RAW| Integer }] 
						
							Specifies the IP protocol if, in addition to 
							addressing information, a specific IP protocol is 
							being used for the security association. The default 
							value is ANY, meaning all protocols are used 
							for the security association.
					 
					
						
							[ format={ list| table}] 
						
							Specifies whether to display IPSec configuration 
							information in screen or tab-delimited format. The 
							default value is list, meaning that output is 
							displayed in screen format. 
					 
					
						
							[ resolvedns={ yes | no}] 
						
							Specifies whether to resolve the Domain Name System 
							(DNS) or NETBIOS computer name associated with an IP 
							address when displaying sources or destinations. The 
							default value is no. 
					 
				 
			 
			Remarks
			
				- 
				
					Because the show qmsas command can result in lengthy, 
				rapidly scrolling output, consider saving the output in a text 
				file, unless you only need to view limited portions.
				 To save output in a text file for the show qmsas 
				command, do either of the following: If you are in the netsh environment (netsh>) 
				
					- At the netsh prompt, type:
					set file open FileName.txt 
- Then type:
					ipsec dynamic show qmsas all  
- To stop sending output and close the file, type:
					set file close 
If you are not in the netsh environment
				
			
			
			
			
			
				Displays configuration information for one or more IPSec rules 
				in the SPD.
			Syntax
			
				show rule [type=][srcaddr=] [dstaddr=][srcmask=][dstmask=] 
				[protocol=][srcport=][dstport=][actioninbound=][actionoutbound=][resolvedns=]
			Parameters
			
				
					
						
							[ type={ transport| tunnel}]
						
						
							Specifies whether to display a transport rule or a 
							tunnel rule. The default value is to display all 
							rules.
					 
					
						
							[ srcaddr={ Me| Any| 
							IPAddress| DNSName| ServerType}]
						
						
							Specifies the source IP address, DNS name, or server 
							type for the IP traffic being filtered. You can use
							WINS, DNS, DHCP, or gateway 
							for ServerType.
					 
					
						
							[ dstaddr={ Me| Any| 
							IPAddress| DNSName| ServerType}]
						
						
							Specifies the destination IP address, DNS name, or 
							server type for the IP traffic being filtered. You 
							can use WINS, DNS, DHCP, or 
							gateway for ServerType.
					 
					
						
							[ srcmask={ Mask| Prefix}]
						
						
							Specifies the source address subnet mask or the 
							prefix of the packets being filtered. You can 
							specify a prefix value in the range of 1 through 32. 
							The default value is the mask of 255.255.255.255.
					 
					
						
							[ dstmask={ Mask| Prefix}]
						
						
							Specifies the destination address subnet mask or the 
							prefix value of the packets being filtered. You can 
							specify a prefix value in the range of 1 through 32. 
							The default value is the mask of 255.255.255.255.
					 
					
						
							[ protocol={ ANY| ICMP| TCP|
							UDP| RAW| Integer }] 
						
							Specifies the IP protocol if, in addition to 
							addressing information, a specific IP protocol is 
							used for the rule. The default value is ANY, 
							meaning all protocols are used for the rule.
					 
					
						
							[ srcport=Port] 
						
							Specifies the source port number of the packets 
							being filtered. This option only applies if you are 
							filtering TCP or UDP packets. If 0 is specified, 
							packets sent from any port are filtered. The default 
							is any.
					 
					
						
							[ dstport=Port] 
						
							Specifies the destination port number of the packets 
							being filtered. This option only applies if you are 
							filtering TCP or UDP packets. If 0 is specified, 
							packets sent to any port are filtered. The default 
							is any.
					 
					
						
							[ actioninbound={ permit| block|
							negotiate}] 
						
							Specifies the action that IPSec is required to take 
							for inbound traffic. The default value is 
							negotiate.
					 
					
						
							[ actionoutbound={ permit| block|
							negotiate}] 
						
							Specifies the action that IPSec is required to take 
							for outbound traffic. The default value is 
							negotiate.
					 
					
						
							[ resolvedns={ yes | no}] 
						
							Specifies whether to resolve the Domain Name System 
							(DNS) or NETBIOS computer name associated with an IP 
							address when displaying sources or destinations. The 
							default value is no. 
					 
				 
			 
			Remarks
			
				- All string parameters are case-sensitive.
- 
				
					Because the show rule command can result in lengthy, 
				rapidly scrolling output, consider saving the output in a text 
				file, unless you only need to view limited portions.
				 To save output in a text file for the show rule 
				command, do either of the following: If you are in the netsh environment (netsh>) 
				
					- At the netsh prompt, type:
					set file open FileName.txt 
- Then type:
					ipsec dynamic show rule 
- To stop sending output and close the file, type:
					set file close 
If you are not in the netsh environment
				
			
			
			
			
			
				Displays main mode and quick mode statistics for IPSec.
			Syntax
			
				show stats [type=]
			Parameters
			
				
					
						
							[ type=all| ike| ipsec] 
						
							Specifies the IPSec statistics to display. If all 
							is specified, IPSec main mode and quick mode 
							statistics are displayed. If ike is 
							specified, only IPSec main mode statistics are 
							displayed. If ipsec is specified, only IPSec 
							quick mode statistics are displayed.
					 
				 
			 
			Remarks
			
				- 
				
					Because the show stats command can result in lengthy, 
				rapidly scrolling output, consider saving the output in a text 
				file, unless you only need to view limited portions.
				 To save output in a text file for the show stats 
				command, do either of the following: If you are in the netsh environment (netsh>) 
				
					- At the netsh prompt, type:
					set file open FileName.txt 
- Then type:
					ipsec dynamic show stats 
- To stop sending output and close the file, type:
					set file close 
If you are not in the netsh environment
				
			
			
			
			Formatting legend
			
				
					
					
						| Italic | Information that the user must supply | 
					
						| Bold | Elements that the user must type exactly as shown | 
					
						| Ellipsis (...) | Parameter that can be repeated several times in a 
						command line | 
					
						| Between brackets ([]) | Optional items | 
					
						| Between braces ({}); choices separated by pipe (|). 
						Example: {even|odd} | Set of choices from which the user must choose only 
						one | 
					
						| Courier font | Code or program output | 
				
			 
			
			
			
 |  |