
282 Chapter 4 • Security and Policies
www.syngress.com
6. From here, you can right-click on the rule to disable or delete it,
or you can select Properties to modify any of the settings that
you configured in the wizard.
EXERCISE 4.5
C
ONFIGURING AN AUTHENTICATION EXEMPTION RULE
1. To create an authentication exemption rule, perhaps for a
destination computer that does not support IPsec or that needs to
be made available to public-facing clients, select Authentication
Exemption from the screen shown in Figure 4.24 and click Next.
2. Click Add to configure the list of computers that should be exempt
from IPsec authentication; you’ll see the screen ...