Editar

Partilhar via


New-AzVpnClientIpsecPolicy

This command allows the users to create the Vpn ipsec policy object specifying one or all values such as IpsecEncryption,IpsecIntegrity,IkeEncryption,IkeIntegrity,DhGroup,PfsGroup to set on the VPN gateway. This command let output object is used to set vpn ipsec policy for both new / existing gateway.

Syntax

New-AzVpnClientIpsecPolicy
   [-SALifeTime <Int32>]
   [-SADataSize <Int32>]
   [-IpsecEncryption <String>]
   [-IpsecIntegrity <String>]
   [-IkeEncryption <String>]
   [-IkeIntegrity <String>]
   [-DhGroup <String>]
   [-PfsGroup <String>]
   [-DefaultProfile <IAzureContextContainer>]
   [<CommonParameters>]

Description

This command allows the users to create the Vpn ipsec policy object specifying one or all values such as IpsecEncryption,IpsecIntegrity,IkeEncryption,IkeIntegrity,DhGroup,PfsGroup to set on the VPN gateway. This command let output object is used to set vpn ipsec policy for both new / existing gateway.

Examples

Example 1: Define vpn ipsec policy object:

$vpnclientipsecpolicy = New-AzVpnClientIpsecPolicy -IpsecEncryption AES256 -IpsecIntegrity SHA256 -SALifeTime 86472 -SADataSize 429497 -IkeEncryption AES256 -IkeIntegrity SHA256 -DhGroup DHGroup2 -PfsGroup None

This cmdlet is used to create the vpn ipsec policy object using the passed one or all parameters' values which user can pass to param:VpnClientIpsecPolicy of PS command let: New-AzVirtualNetworkGateway (New VPN Gateway creation) / Set-AzVirtualNetworkGateway (existing VPN Gateway update) in ResourceGroup :

Example 2: Create new virtual network gateway with setting vpn custom ipsec policy:

$vnetGateway = New-AzVirtualNetworkGateway -ResourceGroupName vnet-gateway -name myNGW -location $location -IpConfigurations $vnetIpConfig -GatewayType Vpn -VpnType RouteBased -GatewaySku VpnGw1 -VpnClientIpsecPolicy $vpnclientipsecpolicy

This cmdlet returns virtual network gateway object after creation.

Example 3: Set vpn custom ipsec policy on existing virtual network gateway:

$vnetGateway = Set-AzVirtualNetworkGateway -VirtualNetworkGateway $gateway -VpnClientIpsecPolicy $vpnclientipsecpolicy

This cmdlet returns virtual network gateway object after setting vpn custom ipsec policy.

Example 4: Get virtual network gateway to see if vpn custom policy is set correctly:

$gateway = Get-AzVirtualNetworkGateway -ResourceGroupName vnet-gateway -name myNGW

This cmdlet returns virtual network gateway object.

Parameters

-DefaultProfile

The credentials, account, tenant, and subscription used for communication with Azure.

Type:IAzureContextContainer
Aliases:AzContext, AzureRmContext, AzureCredential
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-DhGroup

The VpnClient DH Groups used in IKE Phase 1 for initial SA

Type:String
Accepted values:DHGroup24, ECP384, ECP256, DHGroup14, DHGroup2
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-IkeEncryption

The VpnClient IKE encryption algorithm (IKE Phase 2)

Type:String
Accepted values:GCMAES256, GCMAES128, AES256, AES128
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-IkeIntegrity

The VpnClient IKE integrity algorithm (IKE Phase 2)

Type:String
Accepted values:SHA384, SHA256
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-IpsecEncryption

The VpnClient IPSec encryption algorithm (IKE Phase 1)

Type:String
Accepted values:GCMAES256, GCMAES128, AES256, AES128
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-IpsecIntegrity

The VpnClient IPSec integrity algorithm (IKE Phase 1)

Type:String
Accepted values:GCMAES256, GCMAES128, SHA256
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-PfsGroup

The VpnClient PFS Groups used in IKE Phase 2 for new child SA

Type:String
Accepted values:PFS24, PFSMM, ECP384, ECP256, PFS14, PFS2, None
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-SADataSize

The VpnClient IPSec Security Association (also called Quick Mode or Phase 2 SA) payload size in KB

Type:Int32
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-SALifeTime

The VpnClient IPSec Security Association (also called Quick Mode or Phase 2 SA) lifetime in seconds

Type:Int32
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

Inputs

None

Outputs

PSIpsecPolicy