Usage: rule name = policy = filterlist = filteraction = tunnel = (ip | dns) conntype = (lan | dialup | all) activate = (yes ...

Usage:
  rule [ name = ] 
       [ policy = ] 
       [ filterlist = ]  
       [ filteraction = ]  
       [ [ tunnel = ] (ip | dns) ]
       [ [ conntype = ] (lan | dialup | all) ]
       [ [ activate = ] (yes | no) ]
       [ [ description = ]  ]
       [ [ kerberos = ] (yes | no) ]
       [ [ psk = ]  ]
       [ [ rootca = ] " certmap:(yes | no) excludecaname:(yes | no)" ]

  Creates a rule with the specified filter list and filter action.

Parameters:

  Tag            Value
  name          -Name of the rule.
  policy        -Name of the policy the rule belongs to.
  filterlist    -Name of the filter list to be used.
  filteraction  -Name of the filter action to be used.
  tunnel        -Tunnel end point IP address.
  conntype      -Connection type can be lan, dialup or ‘all'.
  activate      -Activates the rule in the policy if ‘yes' is specified.
  description   -Brief information about the rule.
  kerberos      -Provides Kerberos authentication if ‘yes' is specified.
  psk           -Provides authentication using a specified preshared key.
  rootca        -Provides authentication using a specified root certificate,
                 attempts to map the cert if certmap:Yes is specified,
                 excludes the CA name if excludecaname:Yes is specified.

Remarks:  1. Certificate, mapping, and CA name settings are all to be within
             quotes; embedded quotes are to be replaced with \'.
          2. Certificate mapping is valid only for domain members.
          3. Multiple certificates can be provided by using the rootca
             parameter multiple times.
          4. The preference of each authentication method is determined by
             its order in the command.
          5. If no auth methods are stated, dynamic defaults are used.
          6. Excluding the root certification authority (CA) name prevents
             the name from being sent as part of the certificate request.

Examples: add rule name=Rule policy=Policy filterlist=Filterlist
          filteraction=FilterAction kerberos=yes psk="my key"
          rootca="C=US,O=MSFT,CN=Microsoft Authenticode(tm) Root Authority"
          rootca="C=US,O=MSFT,CN=\'Microsoft North, South, East, and West Root
          Authority\' certmap:yes excludecaname:no"