Source code of Windows XP (NT5)
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

74 lines
2.9 KiB

  1. IPSEC POLICY CONFIGURATION COMMAND LINE TOOL
  2. by Randy Ramig ([email protected])
  3. and Dennis Kalinichenko ([email protected])
  4. This tool is used to configure IP Security policies in the Directory
  5. Service, or in a local or remote registry. It does everything that the
  6. IP Security MMC snap-in does, and is even modeled after the snap-in.
  7. In addition, it can query IPSec Security Policies Database (SPD) and
  8. display the current state of IPSec Services
  9. ipseccmd has three mutually exclusive modes: static, dynamic and query.
  10. Dynamic mode will plumb policy into the IPSec Services
  11. Security Policies Database. The policy will be persisted, ie. it will stay
  12. after a reboot. The benefit of dynamic mode is that the policy can co-exist
  13. with DS based policies, which overrides any local policy not plumbed
  14. by ipseccmd.
  15. When the tool is used in static mode,
  16. it creates or modifies stored policy. This policy can be used again and
  17. will last the lifetime of the store. Static mode is indicated by the -w
  18. flag. The flags in the {} braces are only valid for static mode. The usage
  19. for static mode is an extension of dynamic mode, so please read through
  20. the dynamic mode section.
  21. In query mode, the tool queries IPSec Security Policies Database.
  22. WHY WOULD I WANT TO USE IPSECCMD?
  23. * You have a large and/or complex IPSec policy that you want to
  24. configure. IPSECCMD can help you by providing a scriptable way to
  25. create that policy. Just put your IPSECCMD commands into a batch file.
  26. This also provides a backup in case you lose the DS or registry that
  27. the policy is stored in. Just re-run the batch file.
  28. * IPSECCMD facilitates just in time policy with it's batch ability.
  29. If someone wants a secured channel with your server, simply send them
  30. the tool binaries and the command line or batch file to run.
  31. * Your machine is using DS policy and you want to enhance or add rules
  32. that will allow you to speak IPSec to machines not covered in the
  33. DS policy. Dynamic mode of IPSECCMD will achieve this for you.
  34. * You prefer command line tools to GUI apps.
  35. RESTRICTIONS
  36. You must have privileges to the storage that you write to in static mode.
  37. This is typically administrative privileges, but authorized users can
  38. modify the ACLs of the storage to give you access. IP Security policy
  39. objects are stored in
  40. HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\IPSec\Policy\Local
  41. for the local/remote machine case
  42. AND
  43. CN=IP Security,CN=System,DC=YourDCName,DC=ParentDCName,DC=TopLevelDC
  44. ie, the IP Security container under the System container,
  45. for the Directory Service case.
  46. CAVEATS
  47. * In dynamic mode, if you use a DNS name that resolves to multiple addresses
  48. only the first address in the list is used. This is not a problem in
  49. static mode.
  50. * Read the filter spec help carefully, it is the most difficult and
  51. easiest to confuse. In particular, pay attention to how a protocol
  52. is specified.
  53. REQUIRED FILES:
  54. ipseccmd.exe