Policy overview

Key metadata and intent for this policy.

ClassComputer
CategoryNetwork > Network Connections
Supported onAt least Windows Server 2008 R2 or Windows 7

Supported OS tags: Windows10, Windows10RT, Windows11, Windows7, Windows8, Windows81, WindowsRT, WindowsRT81, WindowsServer2008, WindowsServer2012, WindowsServer2012R2, WindowsServer2016

This policy setting determines whether a remote client computer routes Internet traffic through the internal network or whether the client accesses the Internet directly. When a remote client computer connects to an internal network using DirectAccess, it can access the Internet in two ways: through the secure tunnel that DirectAccess establishes between the computer and the internal network, or directly through the local default gateway. If you enable this policy setting, all traffic between a remote client computer running DirectAccess and the Internet is routed through the internal network. If you disable this policy setting, traffic between remote client computers running DirectAccess and the Internet is not routed through the internal network. If you do not configure this policy setting, traffic between remote client computers running DirectAccess and the Internet is not routed through the internal network.

Internal name
NC_ForceTunneling
Policy ID
7ee99e28a601
Elements
1

Registry values

How enabled and disabled states update the registry.

No explicit registry values are set for enabled or disabled states.

Policy elements

Inputs and configuration options exposed by this policy.

ElementTypeRegistry mappingConstraints & behavior
Select from the following states:
ID StateSelect
enum
HKLM\Software\Policies\Microsoft\Windows\TCPIP\v6Transition\Force_Tunneling
Type REG_SZ
Options: Enabled State (Enabled), Disabled State (Disabled)

Other policies in this category

Explore related policies at the same level.

View all policies in this category