MSS: (NoDefaultExempt) Configure IPSec exemptions for various types of network traffic.
|ID: oval:org.secpod.oval:def:27691||Date: (C)2015-10-08 (M)2017-10-31|
|Class: COMPLIANCE||Family: windows|
The registry value entry NoDefaultExempt was added to the template file in the HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\IPSEC\ registry key. The entry appears as MSS: (NoDefaultExempt) Configure IPSec exemptions for various types of network traffic in the SCE.
The default exemptions to IPsec policy filters are documented in the online help for the specific operating system. These filters make it possible for Internet Key Exchange (IKE) and the Kerberos authentication protocol to function. The filters also make it possible for the network Quality of Service (QoS) to be signaled (RSVP) when the data traffic is secured by IPsec, and for traffic that IPsec might not secure such as multicast and broadcast traffic.
IPsec is increasingly used for basic host-firewall packet filtering, particularly in Internet-exposed scenarios, and the affect of these default exemptions has not been fully understood. Therefore, some IPsec administrators may create IPsec policies that they think are secure, but are not actually secure against inbound attacks that use the default exemptions.
For additional information, see the Knowledge Base article 811832, IPSec Default Exemptions Can Be Used to Bypass IPsec Protection in Some Scenarios.
(1) GPO: Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options!The entry appears as MSS: (NoDefaultExempt) Configure IPSec exemptions for various types of network traffic in the SCE.
(2) REG: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\IPSEC!NoDefaultExempt
|Microsoft Windows Server 2012 R2|