Windows Defender Firewall: Allow authenticated IPsec bypass

Allows unsolicited incoming messages from specified systems that authenticate using the IPsec transport.

If you enable this policy setting, you must type a security descriptor containing a list of computers or groups of computers. If a computer on that list authenticates using IPsec, Windows Defender Firewall does not block its unsolicited messages. This policy setting overrides other policy settings that would block those messages.

If you disable or do not configure this policy setting, Windows Defender Firewall makes no exception for messages sent by computers that authenticate using IPsec. If you enable this policy setting and add systems to the list, upon disabling this policy, Windows Defender Firewall deletes the list.

Note: You define entries in this list by using Security Descriptor Definition Language (SDDL) strings. For more information about the SDDL format, see the Windows Defender Firewall deployment information at the Microsoft Web site (http://go.microsoft.com/fwlink/?LinkId=25131).


Supported on: At least Windows XP Professional with SP2
Define IPsec peers to be exempted from firewall policy:

Registry HiveHKEY_LOCAL_MACHINE
Registry PathSOFTWARE\Policies\Microsoft\Windows\IPSec\ICFv4
Value NameBypassFirewall
Value TypeREG_SZ
Default Value

Specify the IPsec peers to exempt

using an SDDL string.

Syntax:

O:<OwnerSID>G:<GroupSID>D:<DACLflags>

<OwnerSID> is the owner security descriptor

<GroupSID> is the group security descriptor

<DACLflags> is a list of ACEs

Example:

O:DAG:DAD:(A;;RCGW;;;S-1-5-21-2157571284-1609012320)


windowsfirewall.admx

Administrative Templates (Computers)

Administrative Templates (Users)