Usage: defaultrule policy = qmpfs = (yes | no) activate = (yes | no) qmsecmethods = (neg#1 neg#2 . neg#n) kerberos = (yes ...

Usage:
  defaultrule [ policy = ] 
              [ [ qmpfs = ] (yes | no) ]
              [ [ activate = ] (yes | no) ]
              [ [ qmsecmethods = ] (neg#1 neg#2 ... neg#n) ]
              [ [ kerberos = ] (yes | no) ]
              [ [ psk = ]  ]
              [ [ rootca = ] " certmap:(yes | no) excludecaname:(yes | no)" ]

  Modifies the default response rule of the specified policy.
  This rule will be ignored on Windows Vista and later versions of Windows
 

Parameters:

  Tag            
Value
  policy       -Name of the policy for which the default response rule  
is
                to be modified 
.
  qmpfs        -Option to set quick mode perfect forward secrecy 
.
  activate     -Activates the rule in the policy if ‘yes' is specified 
.
  qmsecmethods -IPsec offer in one of the following formats:
                ESP[ConfAlg,AuthAlg]:k/ 
s
                AH[HashAlg]:k/ 
s
                AH[HashAlg]+ESP[ConfAlg,AuthAlg]:k/ 
s
                where ConfAlg can be DES, or 3DES or None 
.
                where AuthAlg can be MD5, or SHA1 or None 
.
                where HashAlg is MD5 or SHA1 
.
                where k is lifetime in kilobytes 
.
                where s is lifetime in seconds 
.
  kerberos     -Provides Kerberos authentication if ‘yes' is specified 
.
  psk          -Provides authentication using a specified preshared key 
.
  rootca       -Provides authentication using a specified root certificate,
                attempts to map the cert if certmap:Yes is specified,
                excludes the CA name if excludecaname:Yes is specified 
.

Remarks:  1. Certificate, mapping, and CA name settings are all to be  
within
             quotes; embedded quotes are to be replaced with \' 
.
          2. Certificate mapping is valid only for domain members 
.
          3. Multiple certificates can be provided by using the  
rootca
             parameter multiple times 
.
          4. The preference of each authentication method is determined  
by
             its order in the command 
.
          5. If no auth methods are stated, dynamic defaults are used 
.
          6. The use of DES and MD5 is not recommended. These  
cryptographic
             algorithms are provided for backward compatibility only 
.

Examples: set defaultrule Policy1 activate= 
y
          qmsec="AH[MD5]+ESP[3DES,MD5]:100000k/2000s"