New-AzVpnClientIpsecPolicy
This command allows the users to create the Vpn ipsec policy object specifying one or all values such as IpsecEncryption,IpsecIntegrity,IkeEncryption,IkeIntegrity,DhGroup,PfsGroup to set on the VPN gateway. This command let output object is used to set vpn ipsec policy for both new / existing gateway.
Note
This is the previous version of our documentation. Please consult the most recent version for up-to-date information.
Syntax
New-AzVpnClientIpsecPolicy
[-SALifeTime <Int32>]
[-SADataSize <Int32>]
[-IpsecEncryption <String>]
[-IpsecIntegrity <String>]
[-IkeEncryption <String>]
[-IkeIntegrity <String>]
[-DhGroup <String>]
[-PfsGroup <String>]
[-DefaultProfile <IAzureContextContainer>]
[<CommonParameters>]
Description
This command allows the users to create the Vpn ipsec policy object specifying one or all values such as IpsecEncryption,IpsecIntegrity,IkeEncryption,IkeIntegrity,DhGroup,PfsGroup to set on the VPN gateway. This command let output object is used to set vpn ipsec policy for both new / existing gateway.
Examples
Example 1: Define vpn ipsec policy object:
PS C:\>$vpnclientipsecpolicy = New-AzVpnClientIpsecPolicy -IpsecEncryption AES256 -IpsecIntegrity SHA256 -SALifeTime 86472 -SADataSize 429497 -IkeEncryption AES256 -IkeIntegrity SHA256 -DhGroup DHGroup2 -PfsGroup None
This cmdlet is used to create the vpn ipsec policy object using the passed one or all parameters' values which user can pass to param:VpnClientIpsecPolicy of PS command let: New-AzVirtualNetworkGateway (New VPN Gateway creation) / Set-AzVirtualNetworkGateway (existing VPN Gateway update) in ResourceGroup :
Example 2: Create new virtual network gateway with setting vpn custom ipsec policy:
PS C:\> $vnetGateway = New-AzVirtualNetworkGateway -ResourceGroupName vnet-gateway -name myNGW -location $location -IpConfigurations $vnetIpConfig -GatewayType Vpn -VpnType RouteBased -GatewaySku VpnGw1 -VpnClientIpsecPolicy $vpnclientipsecpolicy
This cmdlet returns virtual network gateway object after creation.
Example 3: Set vpn custom ipsec policy on existing virtual network gateway:
PS C:\> $vnetGateway = Set-AzVirtualNetworkGateway -VirtualNetworkGateway $gateway -VpnClientIpsecPolicy $vpnclientipsecpolicy
This cmdlet returns virtual network gateway object after setting vpn custom ipsec policy.
Example 4: Get virtual network gateway to see if vpn custom policy is set correctly:
PS C:\> $gateway = Get-AzVirtualNetworkGateway -ResourceGroupName vnet-gateway -name myNGW
This cmdlet returns virtual network gateway object.
Parameters
The credentials, account, tenant, and subscription used for communication with Azure.
| Type: | IAzureContextContainer |
| Aliases: | AzContext, AzureRmContext, AzureCredential |
| Position: | Named |
| Default value: | None |
| Accept pipeline input: | False |
| Accept wildcard characters: | False |
The VpnClient DH Groups used in IKE Phase 1 for initial SA
| Type: | String |
| Accepted values: | DHGroup24, ECP384, ECP256, DHGroup14, DHGroup2 |
| Position: | Named |
| Default value: | None |
| Accept pipeline input: | False |
| Accept wildcard characters: | False |
The VpnClient IKE encryption algorithm (IKE Phase 2)
| Type: | String |
| Accepted values: | GCMAES256, GCMAES128, AES256, AES128 |
| Position: | Named |
| Default value: | None |
| Accept pipeline input: | False |
| Accept wildcard characters: | False |
The VpnClient IKE integrity algorithm (IKE Phase 2)
| Type: | String |
| Accepted values: | SHA384, SHA256 |
| Position: | Named |
| Default value: | None |
| Accept pipeline input: | False |
| Accept wildcard characters: | False |
The VpnClient IPSec encryption algorithm (IKE Phase 1)
| Type: | String |
| Accepted values: | GCMAES256, GCMAES128, AES256, AES128 |
| Position: | Named |
| Default value: | None |
| Accept pipeline input: | False |
| Accept wildcard characters: | False |
The VpnClient IPSec integrity algorithm (IKE Phase 1)
| Type: | String |
| Accepted values: | GCMAES256, GCMAES128, SHA256 |
| Position: | Named |
| Default value: | None |
| Accept pipeline input: | False |
| Accept wildcard characters: | False |
The VpnClient PFS Groups used in IKE Phase 2 for new child SA
| Type: | String |
| Accepted values: | PFS24, PFSMM, ECP384, ECP256, PFS14, PFS2, None |
| Position: | Named |
| Default value: | None |
| Accept pipeline input: | False |
| Accept wildcard characters: | False |
The VpnClient IPSec Security Association (also called Quick Mode or Phase 2 SA) payload size in KB
| Type: | Int32 |
| Position: | Named |
| Default value: | None |
| Accept pipeline input: | False |
| Accept wildcard characters: | False |
The VpnClient IPSec Security Association (also called Quick Mode or Phase 2 SA) lifetime in seconds
| Type: | Int32 |
| Position: | Named |
| Default value: | None |
| Accept pipeline input: | False |
| Accept wildcard characters: | False |
Inputs
None