diff --git a/docset/winserver2016-ps/netsecurity/New-NetFirewallRule.md b/docset/winserver2016-ps/netsecurity/New-NetFirewallRule.md index 2097f0697e..111fe9dc9a 100644 --- a/docset/winserver2016-ps/netsecurity/New-NetFirewallRule.md +++ b/docset/winserver2016-ps/netsecurity/New-NetFirewallRule.md @@ -798,21 +798,25 @@ Accept wildcard characters: False ``` ### -RemoteAddress -Specifies that network packets with matching IP addresses match this rule. -This parameter value is an IPv4 or IPv6 address, subnet, range or keyword. -The acceptable formats for this parameter are: - -- Single IPv4 Address: 1.2.3.4 -- Single IPv6 Address: fe80::1 -- IPv4 Subnet (by network bit count): 1.2.3.4/24 -- IPv6 Subnet (by network bit count): fe80::1/48 -- IPv4 Subnet (by network mask): 1.2.3.4/255.255.255.0 -- IPv4 Range: 1.2.3.4-1.2.3.7 -- IPv6 Range: fe80::1-fe80::9 -- Keyword: Any, LocalSubnet, DNS, DHCP, WINS, DefaultGateway, Internet, Intranet, IntranetRemoteAccess, PlayToDevice. NOTE: Keywords can be restricted to IPv4 or IPv6 by appending a 4 or 6 (for example, keyword "LocalSubnet4" means that all local IPv4 addresses are matching this rule). - -Querying for rules with this parameter can only be performed using filter objects. -See the Get-NetFirewallAddressFilter cmdlet for more information. +Specifies that network packets with matching IP addresses match this rule. +This parameter value is an IPv4 or IPv6 address, subnet, range or keyword. +The acceptable formats for this parameter are: + +- Single IPv4 Address: 1.2.3.4 +- Single IPv6 Address: fe80::1 +- IPv4 Subnet (by network bit count): 1.2.3.4/24 +- IPv6 Subnet (by network bit count): fe80::1/48 +- IPv4 Subnet (by network mask): 1.2.3.4/255.255.255.0 +- IPv4 Range: 1.2.3.4-1.2.3.7 +- IPv6 Range: fe80::1-fe80::9 +- Keyword: Any, LocalSubnet, DNS, DHCP, WINS, DefaultGateway, Internet, Intranet, IntranetRemoteAccess, PlayToDevice. + +> [!TIP] +> Keywords can be restricted to IPv4 or IPv6 by appending a 4 or 6 (for example, keyword `LocalSubnet4` means that all local IPv4 addresses are matching this rule). + +> [!NOTE] +> Querying for rules with this parameter can only be performed using filter objects. +> See the [`Get-NetFirewallAddressFilter`](./Get-NetFirewallAddressFilter.md) cmdlet for more information. ```yaml Type: String[] diff --git a/docset/winserver2016-ps/netsecurity/Set-NetFirewallAddressFilter.md b/docset/winserver2016-ps/netsecurity/Set-NetFirewallAddressFilter.md index 4b8527b6af..744daf91ae 100644 --- a/docset/winserver2016-ps/netsecurity/Set-NetFirewallAddressFilter.md +++ b/docset/winserver2016-ps/netsecurity/Set-NetFirewallAddressFilter.md @@ -246,20 +246,25 @@ Accept wildcard characters: False ``` ### -RemoteAddress -Specifies that network packets with matching IP addresses match this rule. -This parameter value is the second end point of an IPsec rule and specifies the computers that are subject to the requirements of this rule. -This parameter value is an IPv4 or IPv6 address, hostname, subnet, range, or the following keyword: Any. -The acceptable formats for this parameter are: -- Single IPv4 Address: 1.2.3.4 -- Single IPv6 Address: fe80::1 -- IPv4 Subnet (by network bit count): 1.2.3.4/24 -- IPv6 Subnet (by network bit count): fe80::1/48 -- IPv4 Subnet (by network mask): 1.2.3.4/255.255.255.0 -- IPv4 Range: 1.2.3.4 through 1.2.3.7 -- IPv6 Range: fe80::1 through fe80::9 +Specifies that network packets with matching IP addresses match this rule. +This parameter value is an IPv4 or IPv6 address, subnet, range or keyword. +The acceptable formats for this parameter are: + +- Single IPv4 Address: 1.2.3.4 +- Single IPv6 Address: fe80::1 +- IPv4 Subnet (by network bit count): 1.2.3.4/24 +- IPv6 Subnet (by network bit count): fe80::1/48 +- IPv4 Subnet (by network mask): 1.2.3.4/255.255.255.0 +- IPv4 Range: 1.2.3.4-1.2.3.7 +- IPv6 Range: fe80::1-fe80::9 +- Keyword: Any, LocalSubnet, DNS, DHCP, WINS, DefaultGateway, Internet, Intranet, IntranetRemoteAccess, PlayToDevice. + +> [!TIP] +> Keywords can be restricted to IPv4 or IPv6 by appending a 4 or 6 (for example, keyword `LocalSubnet4` means that all local IPv4 addresses are matching this rule). > [!NOTE] -> Querying for rules with this parameter can only be performed using filter objects. See the **Get-NetFirewallAddressFilter** cmdlet for more information. +> Querying for rules with this parameter can only be performed using filter objects. +> See the [`Get-NetFirewallAddressFilter`](./Get-NetFirewallAddressFilter.md) cmdlet for more information. ```yaml Type: String[] diff --git a/docset/winserver2016-ps/netsecurity/Set-NetFirewallRule.md b/docset/winserver2016-ps/netsecurity/Set-NetFirewallRule.md index fb9c5c663f..f392cd6255 100644 --- a/docset/winserver2016-ps/netsecurity/Set-NetFirewallRule.md +++ b/docset/winserver2016-ps/netsecurity/Set-NetFirewallRule.md @@ -898,19 +898,25 @@ Accept wildcard characters: False ``` ### -RemoteAddress -Specifies that network packets with matching IP addresses match this rule. -This parameter value is the second end point of an IPsec rule and specifies the computers that are subject to the requirements of this rule. -This parameter value is an IPv4 or IPv6 address, subnet, range, or the following keyword: Any. -The acceptable formats for this parameter are: -- Single IPv4 Address: 1.2.3.4 -- Single IPv6 Address: fe80::1 -- IPv4 Subnet (by network bit count): 1.2.3.4/24 -- IPv6 Subnet (by network bit count): fe80::1/48 -- IPv4 Subnet (by network mask): 1.2.3.4/255.255.255.0 -- IPv4 Range: 1.2.3.4 through 1.2.3.7 -- IPv6 Range: fe80::1 through fe80::9 -Querying for rules with this parameter can only be performed using filter objects. -See the Get-NetFirewallAddressFilter cmdlet for more information. +Specifies that network packets with matching IP addresses match this rule. +This parameter value is an IPv4 or IPv6 address, subnet, range or keyword. +The acceptable formats for this parameter are: + +- Single IPv4 Address: 1.2.3.4 +- Single IPv6 Address: fe80::1 +- IPv4 Subnet (by network bit count): 1.2.3.4/24 +- IPv6 Subnet (by network bit count): fe80::1/48 +- IPv4 Subnet (by network mask): 1.2.3.4/255.255.255.0 +- IPv4 Range: 1.2.3.4-1.2.3.7 +- IPv6 Range: fe80::1-fe80::9 +- Keyword: Any, LocalSubnet, DNS, DHCP, WINS, DefaultGateway, Internet, Intranet, IntranetRemoteAccess, PlayToDevice. + +> [!TIP] +> Keywords can be restricted to IPv4 or IPv6 by appending a 4 or 6 (for example, keyword `LocalSubnet4` means that all local IPv4 addresses are matching this rule). + +> [!NOTE] +> Querying for rules with this parameter can only be performed using filter objects. +> See the [`Get-NetFirewallAddressFilter`](./Get-NetFirewallAddressFilter.md) cmdlet for more information. ```yaml Type: String[] @@ -1100,4 +1106,3 @@ The path after the pound sign (`#`) provides the namespace and class name for th [Set-NetFirewallSetting](./Set-NetFirewallSetting.md) [Show-NetFirewallRule](./Show-NetFirewallRule.md) - diff --git a/docset/winserver2019-ps/netsecurity/New-NetFirewallRule.md b/docset/winserver2019-ps/netsecurity/New-NetFirewallRule.md index c4339ed36f..38614cc468 100644 --- a/docset/winserver2019-ps/netsecurity/New-NetFirewallRule.md +++ b/docset/winserver2019-ps/netsecurity/New-NetFirewallRule.md @@ -798,21 +798,25 @@ Accept wildcard characters: False ``` ### -RemoteAddress -Specifies that network packets with matching IP addresses match this rule. -This parameter value is an IPv4 or IPv6 address, subnet, range or keyword. -The acceptable formats for this parameter are: - -- Single IPv4 Address: 1.2.3.4 -- Single IPv6 Address: fe80::1 -- IPv4 Subnet (by network bit count): 1.2.3.4/24 -- IPv6 Subnet (by network bit count): fe80::1/48 -- IPv4 Subnet (by network mask): 1.2.3.4/255.255.255.0 -- IPv4 Range: 1.2.3.4-1.2.3.7 -- IPv6 Range: fe80::1-fe80::9 -- Keyword: Any, LocalSubnet, DNS, DHCP, WINS, DefaultGateway, Internet, Intranet, IntranetRemoteAccess, PlayToDevice. NOTE: Keywords can be restricted to IPv4 or IPv6 by appending a 4 or 6 (for example, keyword "LocalSubnet4" means that all local IPv4 addresses are matching this rule). - -Querying for rules with this parameter can only be performed using filter objects. -See the Get-NetFirewallAddressFilter cmdlet for more information. +Specifies that network packets with matching IP addresses match this rule. +This parameter value is an IPv4 or IPv6 address, subnet, range or keyword. +The acceptable formats for this parameter are: + +- Single IPv4 Address: 1.2.3.4 +- Single IPv6 Address: fe80::1 +- IPv4 Subnet (by network bit count): 1.2.3.4/24 +- IPv6 Subnet (by network bit count): fe80::1/48 +- IPv4 Subnet (by network mask): 1.2.3.4/255.255.255.0 +- IPv4 Range: 1.2.3.4-1.2.3.7 +- IPv6 Range: fe80::1-fe80::9 +- Keyword: Any, LocalSubnet, DNS, DHCP, WINS, DefaultGateway, Internet, Intranet, IntranetRemoteAccess, PlayToDevice, CaptivePortal (Windows 10 only). + +> [!TIP] +> Keywords can be restricted to IPv4 or IPv6 by appending a 4 or 6 (for example, keyword `LocalSubnet4` means that all local IPv4 addresses are matching this rule). + +> [!NOTE] +> Querying for rules with this parameter can only be performed using filter objects. +> See the [`Get-NetFirewallAddressFilter`](./Get-NetFirewallAddressFilter.md) cmdlet for more information. ```yaml Type: String[] diff --git a/docset/winserver2019-ps/netsecurity/Set-NetFirewallAddressFilter.md b/docset/winserver2019-ps/netsecurity/Set-NetFirewallAddressFilter.md index f097834a87..bf80866f2d 100644 --- a/docset/winserver2019-ps/netsecurity/Set-NetFirewallAddressFilter.md +++ b/docset/winserver2019-ps/netsecurity/Set-NetFirewallAddressFilter.md @@ -246,20 +246,25 @@ Accept wildcard characters: False ``` ### -RemoteAddress -Specifies that network packets with matching IP addresses match this rule. -This parameter value is the second end point of an IPsec rule and specifies the computers that are subject to the requirements of this rule. -This parameter value is an IPv4 or IPv6 address, hostname, subnet, range, or the following keyword: Any. -The acceptable formats for this parameter are: -- Single IPv4 Address: 1.2.3.4 -- Single IPv6 Address: fe80::1 -- IPv4 Subnet (by network bit count): 1.2.3.4/24 -- IPv6 Subnet (by network bit count): fe80::1/48 -- IPv4 Subnet (by network mask): 1.2.3.4/255.255.255.0 -- IPv4 Range: 1.2.3.4 through 1.2.3.7 -- IPv6 Range: fe80::1 through fe80::9 +Specifies that network packets with matching IP addresses match this rule. +This parameter value is an IPv4 or IPv6 address, subnet, range or keyword. +The acceptable formats for this parameter are: + +- Single IPv4 Address: 1.2.3.4 +- Single IPv6 Address: fe80::1 +- IPv4 Subnet (by network bit count): 1.2.3.4/24 +- IPv6 Subnet (by network bit count): fe80::1/48 +- IPv4 Subnet (by network mask): 1.2.3.4/255.255.255.0 +- IPv4 Range: 1.2.3.4-1.2.3.7 +- IPv6 Range: fe80::1-fe80::9 +- Keyword: Any, LocalSubnet, DNS, DHCP, WINS, DefaultGateway, Internet, Intranet, IntranetRemoteAccess, PlayToDevice, CaptivePortal (Windows 10 only). + +> [!TIP] +> Keywords can be restricted to IPv4 or IPv6 by appending a 4 or 6 (for example, keyword `LocalSubnet4` means that all local IPv4 addresses are matching this rule). > [!NOTE] -> Querying for rules with this parameter can only be performed using filter objects. See the **Get-NetFirewallAddressFilter** cmdlet for more information. +> Querying for rules with this parameter can only be performed using filter objects. +> See the [`Get-NetFirewallAddressFilter`](./Get-NetFirewallAddressFilter.md) cmdlet for more information. ```yaml Type: String[] diff --git a/docset/winserver2019-ps/netsecurity/Set-NetFirewallRule.md b/docset/winserver2019-ps/netsecurity/Set-NetFirewallRule.md index f287fb734a..ff6ede626a 100644 --- a/docset/winserver2019-ps/netsecurity/Set-NetFirewallRule.md +++ b/docset/winserver2019-ps/netsecurity/Set-NetFirewallRule.md @@ -898,19 +898,25 @@ Accept wildcard characters: False ``` ### -RemoteAddress -Specifies that network packets with matching IP addresses match this rule. -This parameter value is the second end point of an IPsec rule and specifies the computers that are subject to the requirements of this rule. -This parameter value is an IPv4 or IPv6 address, subnet, range, or the following keyword: Any. -The acceptable formats for this parameter are: -- Single IPv4 Address: 1.2.3.4 -- Single IPv6 Address: fe80::1 -- IPv4 Subnet (by network bit count): 1.2.3.4/24 -- IPv6 Subnet (by network bit count): fe80::1/48 -- IPv4 Subnet (by network mask): 1.2.3.4/255.255.255.0 -- IPv4 Range: 1.2.3.4 through 1.2.3.7 -- IPv6 Range: fe80::1 through fe80::9 -Querying for rules with this parameter can only be performed using filter objects. -See the Get-NetFirewallAddressFilter cmdlet for more information. +Specifies that network packets with matching IP addresses match this rule. +This parameter value is an IPv4 or IPv6 address, subnet, range or keyword. +The acceptable formats for this parameter are: + +- Single IPv4 Address: 1.2.3.4 +- Single IPv6 Address: fe80::1 +- IPv4 Subnet (by network bit count): 1.2.3.4/24 +- IPv6 Subnet (by network bit count): fe80::1/48 +- IPv4 Subnet (by network mask): 1.2.3.4/255.255.255.0 +- IPv4 Range: 1.2.3.4-1.2.3.7 +- IPv6 Range: fe80::1-fe80::9 +- Keyword: Any, LocalSubnet, DNS, DHCP, WINS, DefaultGateway, Internet, Intranet, IntranetRemoteAccess, PlayToDevice, CaptivePortal (Windows 10 only). + +> [!TIP] +> Keywords can be restricted to IPv4 or IPv6 by appending a 4 or 6 (for example, keyword `LocalSubnet4` means that all local IPv4 addresses are matching this rule). + +> [!NOTE] +> Querying for rules with this parameter can only be performed using filter objects. +> See the [`Get-NetFirewallAddressFilter`](./Get-NetFirewallAddressFilter.md) cmdlet for more information. ```yaml Type: String[] @@ -1100,4 +1106,3 @@ The path after the pound sign (`#`) provides the namespace and class name for th [Set-NetFirewallSetting](./Set-NetFirewallSetting.md) [Show-NetFirewallRule](./Show-NetFirewallRule.md) - diff --git a/docset/winserver2022-ps/netsecurity/New-NetFirewallRule.md b/docset/winserver2022-ps/netsecurity/New-NetFirewallRule.md index a72b7076c7..aa9aaa7cbb 100644 --- a/docset/winserver2022-ps/netsecurity/New-NetFirewallRule.md +++ b/docset/winserver2022-ps/netsecurity/New-NetFirewallRule.md @@ -798,21 +798,25 @@ Accept wildcard characters: False ``` ### -RemoteAddress -Specifies that network packets with matching IP addresses match this rule. -This parameter value is an IPv4 or IPv6 address, subnet, range or keyword. -The acceptable formats for this parameter are: - -- Single IPv4 Address: 1.2.3.4 -- Single IPv6 Address: fe80::1 -- IPv4 Subnet (by network bit count): 1.2.3.4/24 -- IPv6 Subnet (by network bit count): fe80::1/48 -- IPv4 Subnet (by network mask): 1.2.3.4/255.255.255.0 -- IPv4 Range: 1.2.3.4-1.2.3.7 -- IPv6 Range: fe80::1-fe80::9 -- Keyword: Any, LocalSubnet, DNS, DHCP, WINS, DefaultGateway, Internet, Intranet, IntranetRemoteAccess, PlayToDevice. NOTE: Keywords can be restricted to IPv4 or IPv6 by appending a 4 or 6 (for example, keyword "LocalSubnet4" means that all local IPv4 addresses are matching this rule). - -Querying for rules with this parameter can only be performed using filter objects. -See the Get-NetFirewallAddressFilter cmdlet for more information. +Specifies that network packets with matching IP addresses match this rule. +This parameter value is an IPv4 or IPv6 address, subnet, range or keyword. +The acceptable formats for this parameter are: + +- Single IPv4 Address: 1.2.3.4 +- Single IPv6 Address: fe80::1 +- IPv4 Subnet (by network bit count): 1.2.3.4/24 +- IPv6 Subnet (by network bit count): fe80::1/48 +- IPv4 Subnet (by network mask): 1.2.3.4/255.255.255.0 +- IPv4 Range: 1.2.3.4-1.2.3.7 +- IPv6 Range: fe80::1-fe80::9 +- Keyword: Any, LocalSubnet, DNS, DHCP, WINS, DefaultGateway, Internet, Intranet, IntranetRemoteAccess, PlayToDevice, CaptivePortal. + +> [!TIP] +> Keywords can be restricted to IPv4 or IPv6 by appending a 4 or 6 (for example, keyword `LocalSubnet4` means that all local IPv4 addresses are matching this rule). + +> [!NOTE] +> Querying for rules with this parameter can only be performed using filter objects. +> See the [`Get-NetFirewallAddressFilter`](./Get-NetFirewallAddressFilter.md) cmdlet for more information. ```yaml Type: String[] diff --git a/docset/winserver2022-ps/netsecurity/Set-NetFirewallAddressFilter.md b/docset/winserver2022-ps/netsecurity/Set-NetFirewallAddressFilter.md index 8c17d6ce00..64417b6104 100644 --- a/docset/winserver2022-ps/netsecurity/Set-NetFirewallAddressFilter.md +++ b/docset/winserver2022-ps/netsecurity/Set-NetFirewallAddressFilter.md @@ -246,20 +246,25 @@ Accept wildcard characters: False ``` ### -RemoteAddress -Specifies that network packets with matching IP addresses match this rule. -This parameter value is the second end point of an IPsec rule and specifies the computers that are subject to the requirements of this rule. -This parameter value is an IPv4 or IPv6 address, hostname, subnet, range, or the following keyword: Any. -The acceptable formats for this parameter are: -- Single IPv4 Address: 1.2.3.4 -- Single IPv6 Address: fe80::1 -- IPv4 Subnet (by network bit count): 1.2.3.4/24 -- IPv6 Subnet (by network bit count): fe80::1/48 -- IPv4 Subnet (by network mask): 1.2.3.4/255.255.255.0 -- IPv4 Range: 1.2.3.4 through 1.2.3.7 -- IPv6 Range: fe80::1 through fe80::9 +Specifies that network packets with matching IP addresses match this rule. +This parameter value is an IPv4 or IPv6 address, subnet, range or keyword. +The acceptable formats for this parameter are: + +- Single IPv4 Address: 1.2.3.4 +- Single IPv6 Address: fe80::1 +- IPv4 Subnet (by network bit count): 1.2.3.4/24 +- IPv6 Subnet (by network bit count): fe80::1/48 +- IPv4 Subnet (by network mask): 1.2.3.4/255.255.255.0 +- IPv4 Range: 1.2.3.4-1.2.3.7 +- IPv6 Range: fe80::1-fe80::9 +- Keyword: Any, LocalSubnet, DNS, DHCP, WINS, DefaultGateway, Internet, Intranet, IntranetRemoteAccess, PlayToDevice, CaptivePortal. + +> [!TIP] +> Keywords can be restricted to IPv4 or IPv6 by appending a 4 or 6 (for example, keyword `LocalSubnet4` means that all local IPv4 addresses are matching this rule). > [!NOTE] -> Querying for rules with this parameter can only be performed using filter objects. See the **Get-NetFirewallAddressFilter** cmdlet for more information. +> Querying for rules with this parameter can only be performed using filter objects. +> See the [`Get-NetFirewallAddressFilter`](./Get-NetFirewallAddressFilter.md) cmdlet for more information. ```yaml Type: String[] diff --git a/docset/winserver2022-ps/netsecurity/Set-NetFirewallRule.md b/docset/winserver2022-ps/netsecurity/Set-NetFirewallRule.md index 5d173cf638..4136b6e016 100644 --- a/docset/winserver2022-ps/netsecurity/Set-NetFirewallRule.md +++ b/docset/winserver2022-ps/netsecurity/Set-NetFirewallRule.md @@ -880,19 +880,25 @@ Accept wildcard characters: False ``` ### -RemoteAddress -Specifies that network packets with matching IP addresses match this rule. -This parameter value is the second end point of an IPsec rule and specifies the computers that are subject to the requirements of this rule. -This parameter value is an IPv4 or IPv6 address, subnet, range, or the following keyword: Any. -The acceptable formats for this parameter are: -- Single IPv4 Address: 1.2.3.4 -- Single IPv6 Address: fe80::1 -- IPv4 Subnet (by network bit count): 1.2.3.4/24 -- IPv6 Subnet (by network bit count): fe80::1/48 -- IPv4 Subnet (by network mask): 1.2.3.4/255.255.255.0 -- IPv4 Range: 1.2.3.4 through 1.2.3.7 -- IPv6 Range: fe80::1 through fe80::9 -Querying for rules with this parameter can only be performed using filter objects. -See the Get-NetFirewallAddressFilter cmdlet for more information. +Specifies that network packets with matching IP addresses match this rule. +This parameter value is an IPv4 or IPv6 address, subnet, range or keyword. +The acceptable formats for this parameter are: + +- Single IPv4 Address: 1.2.3.4 +- Single IPv6 Address: fe80::1 +- IPv4 Subnet (by network bit count): 1.2.3.4/24 +- IPv6 Subnet (by network bit count): fe80::1/48 +- IPv4 Subnet (by network mask): 1.2.3.4/255.255.255.0 +- IPv4 Range: 1.2.3.4-1.2.3.7 +- IPv6 Range: fe80::1-fe80::9 +- Keyword: Any, LocalSubnet, DNS, DHCP, WINS, DefaultGateway, Internet, Intranet, IntranetRemoteAccess, PlayToDevice, CaptivePortal. + +> [!TIP] +> Keywords can be restricted to IPv4 or IPv6 by appending a 4 or 6 (for example, keyword `LocalSubnet4` means that all local IPv4 addresses are matching this rule). + +> [!NOTE] +> Querying for rules with this parameter can only be performed using filter objects. +> See the [`Get-NetFirewallAddressFilter`](./Get-NetFirewallAddressFilter.md) cmdlet for more information. ```yaml Type: String[] @@ -1097,4 +1103,3 @@ The path after the pound sign (`#`) provides the namespace and class name for th [Set-NetFirewallSetting](./Set-NetFirewallSetting.md) [Show-NetFirewallRule](./Show-NetFirewallRule.md) - diff --git a/docset/winserver2025-ps/netsecurity/New-NetFirewallRule.md b/docset/winserver2025-ps/netsecurity/New-NetFirewallRule.md index 61a8adb035..f9d443bb22 100644 --- a/docset/winserver2025-ps/netsecurity/New-NetFirewallRule.md +++ b/docset/winserver2025-ps/netsecurity/New-NetFirewallRule.md @@ -804,15 +804,19 @@ The acceptable formats for this parameter are: - Single IPv4 Address: 1.2.3.4 - Single IPv6 Address: fe80::1 -- IPv4 Subnet (by network bit count): 1.2.3.4/24 -- IPv6 Subnet (by network bit count): fe80::1/48 -- IPv4 Subnet (by network mask): 1.2.3.4/255.255.255.0 +- IPv4 Subnet (by network bit count): 1.2.3.4/24 +- IPv6 Subnet (by network bit count): fe80::1/48 +- IPv4 Subnet (by network mask): 1.2.3.4/255.255.255.0 - IPv4 Range: 1.2.3.4-1.2.3.7 - IPv6 Range: fe80::1-fe80::9 -- Keyword: Any, LocalSubnet, DNS, DHCP, WINS, DefaultGateway, Internet, Intranet, IntranetRemoteAccess, PlayToDevice. NOTE: Keywords can be restricted to IPv4 or IPv6 by appending a 4 or 6 (for example, keyword "LocalSubnet4" means that all local IPv4 addresses are matching this rule). +- Keyword: Any, LocalSubnet, DNS, DHCP, WINS, DefaultGateway, Internet, Intranet, IntranetRemoteAccess, PlayToDevice, CaptivePortal. -Querying for rules with this parameter can only be performed using filter objects. -See the Get-NetFirewallAddressFilter cmdlet for more information. +> [!TIP] +> Keywords can be restricted to IPv4 or IPv6 by appending a 4 or 6 (for example, keyword `LocalSubnet4` means that all local IPv4 addresses are matching this rule). + +> [!NOTE] +> Querying for rules with this parameter can only be performed using filter objects. +> See the [`Get-NetFirewallAddressFilter`](./Get-NetFirewallAddressFilter.md) cmdlet for more information. ```yaml Type: String[] diff --git a/docset/winserver2025-ps/netsecurity/Set-NetFirewallAddressFilter.md b/docset/winserver2025-ps/netsecurity/Set-NetFirewallAddressFilter.md index b6a9574fc1..e25acf4f3d 100644 --- a/docset/winserver2025-ps/netsecurity/Set-NetFirewallAddressFilter.md +++ b/docset/winserver2025-ps/netsecurity/Set-NetFirewallAddressFilter.md @@ -247,19 +247,24 @@ Accept wildcard characters: False ### -RemoteAddress Specifies that network packets with matching IP addresses match this rule. -This parameter value is the second end point of an IPsec rule and specifies the computers that are subject to the requirements of this rule. -This parameter value is an IPv4 or IPv6 address, hostname, subnet, range, or the following keyword: Any. +This parameter value is an IPv4 or IPv6 address, subnet, range or keyword. The acceptable formats for this parameter are: + - Single IPv4 Address: 1.2.3.4 - Single IPv6 Address: fe80::1 - IPv4 Subnet (by network bit count): 1.2.3.4/24 - IPv6 Subnet (by network bit count): fe80::1/48 - IPv4 Subnet (by network mask): 1.2.3.4/255.255.255.0 -- IPv4 Range: 1.2.3.4 through 1.2.3.7 -- IPv6 Range: fe80::1 through fe80::9 +- IPv4 Range: 1.2.3.4-1.2.3.7 +- IPv6 Range: fe80::1-fe80::9 +- Keyword: Any, LocalSubnet, DNS, DHCP, WINS, DefaultGateway, Internet, Intranet, IntranetRemoteAccess, PlayToDevice, CaptivePortal. + +> [!TIP] +> Keywords can be restricted to IPv4 or IPv6 by appending a 4 or 6 (for example, keyword `LocalSubnet4` means that all local IPv4 addresses are matching this rule). > [!NOTE] -> Querying for rules with this parameter can only be performed using filter objects. See the **Get-NetFirewallAddressFilter** cmdlet for more information. +> Querying for rules with this parameter can only be performed using filter objects. +> See the [`Get-NetFirewallAddressFilter`](./Get-NetFirewallAddressFilter.md) cmdlet for more information. ```yaml Type: String[] diff --git a/docset/winserver2025-ps/netsecurity/Set-NetFirewallRule.md b/docset/winserver2025-ps/netsecurity/Set-NetFirewallRule.md index 4ec8d7bcfe..ee5bec181c 100644 --- a/docset/winserver2025-ps/netsecurity/Set-NetFirewallRule.md +++ b/docset/winserver2025-ps/netsecurity/Set-NetFirewallRule.md @@ -881,18 +881,24 @@ Accept wildcard characters: False ### -RemoteAddress Specifies that network packets with matching IP addresses match this rule. -This parameter value is the second end point of an IPsec rule and specifies the computers that are subject to the requirements of this rule. -This parameter value is an IPv4 or IPv6 address, subnet, range, or the following keyword: Any. +This parameter value is an IPv4 or IPv6 address, subnet, range or keyword. The acceptable formats for this parameter are: + - Single IPv4 Address: 1.2.3.4 - Single IPv6 Address: fe80::1 - IPv4 Subnet (by network bit count): 1.2.3.4/24 - IPv6 Subnet (by network bit count): fe80::1/48 - IPv4 Subnet (by network mask): 1.2.3.4/255.255.255.0 -- IPv4 Range: 1.2.3.4 through 1.2.3.7 -- IPv6 Range: fe80::1 through fe80::9 -Querying for rules with this parameter can only be performed using filter objects. -See the Get-NetFirewallAddressFilter cmdlet for more information. +- IPv4 Range: 1.2.3.4-1.2.3.7 +- IPv6 Range: fe80::1-fe80::9 +- Keyword: Any, LocalSubnet, DNS, DHCP, WINS, DefaultGateway, Internet, Intranet, IntranetRemoteAccess, PlayToDevice, CaptivePortal. + +> [!TIP] +> Keywords can be restricted to IPv4 or IPv6 by appending a 4 or 6 (for example, keyword `LocalSubnet4` means that all local IPv4 addresses are matching this rule). + +> [!NOTE] +> Querying for rules with this parameter can only be performed using filter objects. +> See the [`Get-NetFirewallAddressFilter`](./Get-NetFirewallAddressFilter.md) cmdlet for more information. ```yaml Type: String[] @@ -1097,4 +1103,3 @@ The path after the pound sign (`#`) provides the namespace and class name for th [Set-NetFirewallSetting](./Set-NetFirewallSetting.md) [Show-NetFirewallRule](./Show-NetFirewallRule.md) -