.      How to articles       Windows Services       Group Policy             Donate        
Computer step by step

IPsec Tunnel Endpoints

GPO PowerShell Regedit CMD

In PowerShell we can use Get-GPRegistryValue cmled to identify the registry key(s) associated with:


More information about Get-GPRegistryValue can be found on this link:

https://docs.microsoft.com/en-us/powershell/module/grouppolicy/get-gpregistryvalue?view=win10-ps


For Enabled we get:

Description:

Specifies the IPv6 addresses of the endpoints of the Internet Protocol security (IPsec) tunnels that enable DirectAccess. NCA attempts to access the resources

that are specified in the Corporate Resources setting through these configured tunnel endpoints.


By default, NCA uses the same DirectAccess server that the DirectAccess client computer connection is using. In default configurations of DirectAccess, there are

typically two IPsec tunnel endpoints: one for the infrastructure tunnel and one for the intranet tunnel. You should configure one endpoint for each tunnel.

   

Each entry consists of the text PING: followed by the IPv6 address of an IPsec tunnel endpoint. Example: PING:2002:836b:1::836b:1.


You must configure this setting to have complete NCA functionality.





Supported on:

At least Windows Server 2008 R2 or Windows 7

For Disabled we get:


Delete the specific key created.