New-AzVpnServerConfiguration
Créez un vpnServerConfiguration pour la connectivité de point à site.
Syntax
New-AzVpnServerConfiguration
-ResourceGroupName <String>
-Name <String>
-Location <String>
[-VpnProtocol <String[]>]
[-VpnAuthenticationType <String[]>]
[-VpnClientRootCertificateFilesList <String[]>]
[-VpnClientRevokedCertificateFilesList <String[]>]
[-RadiusServerAddress <String>]
[-RadiusServerSecret <SecureString>]
[-RadiusServerList <PSRadiusServer[]>]
[-RadiusServerRootCertificateFilesList <String[]>]
[-RadiusClientRootCertificateFilesList <String[]>]
[-AadTenant <String>]
[-AadAudience <String>]
[-AadIssuer <String>]
[-VpnClientIpsecPolicy <PSIpsecPolicy[]>]
[-ConfigurationPolicyGroup <PSVpnServerConfigurationPolicyGroup[]>]
[-Tag <Hashtable>]
[-AsJob]
[-DefaultProfile <IAzureContextContainer>]
[-WhatIf]
[-Confirm]
[<CommonParameters>]
Description
L’applet de commande New-AzVpnServerConfiguration vous permet de créer un vpnServerConfiguration avec différents VpnProtocols, VpnAuthenticationTypes, IpsecPolicies et de définir les paramètres associés au type d’authentification vpn sélectionnés en fonction de l’exigence du client pour la connectivité point à site.
Exemples
Exemple 1
$VpnServerConfigCertFilePath = Join-Path -Path $basedir -ChildPath "\ScenarioTests\Data\ApplicationGatewayAuthCert.cer"
$listOfCerts = New-Object "System.Collections.Generic.List[String]"
$listOfCerts.Add($VpnServerConfigCertFilePath)
New-AzVpnServerConfiguration -Name "test1config" -ResourceGroupName "P2SCortexGATesting" -VpnProtocol IkeV2 -VpnAuthenticationType Certificate -VpnClientRootCertificateFilesList $listOfCerts -VpnClientRevokedCertificateFilesList $listOfCerts -Location "westus"
ResourceGroupName : P2SCortexGATesting
Name : test1config
Id : /subscriptions/b1f1deed-af60-4bab-9223-65d340462e24/resourceGroups/P2SCortexGATesting/providers/Microsoft.Network/vpnServerConfigurations/test1config
Location : westus
VpnProtocols : {IkeV2, OpenVPN}
VpnAuthenticationTypes : {Certificate}
VpnClientRootCertificates :
VpnClientRevokedCertificates : [
{
"Name": "cert2",
"Thumbprint": "83FFBFC8848B5A5836C94D0112367E16148A286F"
}
]
RadiusServerAddress :
RadiusServerRootCertificates : []
RadiusClientRootCertificates : []
VpnClientIpsecPolicies : []
AadAuthenticationParameters : null
P2sVpnGateways : []
Type : Microsoft.Network/vpnServerConfigurations
ProvisioningState : Succeeded
La commande ci-dessus crée un vpnServerConfiguration avec VpnAuthenticationType en tant que certificat.
Exemple 2
Créez un vpnServerConfiguration pour la connectivité de point à site. (généré automatiquement)
New-AzVpnServerConfiguration -AadAudience <String> -AadIssuer <String> -AadTenant <String> -Location 'westus' -Name 'test1config' -ResourceGroupName 'P2SCortexGATesting' -VpnAuthenticationType Certificate -VpnProtocol IkeV2
Paramètres
-AadAudience
Audience AAD pour l’authentification AAD P2S.
Type: | String |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-AadIssuer
Émetteur AAD pour l’authentification P2S AAD.
Type: | String |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-AadTenant
Locataire AAD pour l’authentification P2S AAD.
Type: | String |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-AsJob
Exécuter l’applet de commande en arrière-plan
Type: | SwitchParameter |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-ConfigurationPolicyGroup
Liste des vpnServerConfigurationPolicyGroups dont ce P2SVpnGateway doit avoir.
Type: | PSVpnServerConfigurationPolicyGroup[] |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-Confirm
Vous demande une confirmation avant d’exécuter l’applet de commande.
Type: | SwitchParameter |
Aliases: | cf |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-DefaultProfile
Informations d’identification, compte, locataire et abonnement utilisés pour la communication avec Azure.
Type: | IAzureContextContainer |
Aliases: | AzContext, AzureRmContext, AzureCredential |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-Location
Emplacement de la ressource.
Type: | String |
Position: | Named |
Default value: | None |
Required: | True |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-Name
Nom de la ressource.
Type: | String |
Aliases: | ResourceName, VpnServerConfigurationName |
Position: | Named |
Default value: | None |
Required: | True |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-RadiusClientRootCertificateFilesList
Liste des chemins d’accès des fichiers RadiusClientRootCertificate
Type: | String[] |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-RadiusServerAddress
Adresse du serveur Radius externe P2S.
Type: | String |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-RadiusServerList
Serveurs P2S externes à plusieurs serveurs radius.
Type: | PSRadiusServer[] |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-RadiusServerRootCertificateFilesList
Liste des chemins d’accès des fichiers RadiusClientRootCertificate
Type: | String[] |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-RadiusServerSecret
Secret du serveur Radius externe P2S.
Type: | SecureString |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-ResourceGroupName
Nom du groupe de ressources.
Type: | String |
Position: | Named |
Default value: | None |
Required: | True |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-Tag
Table de hachage qui représente les balises de ressource.
Type: | Hashtable |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-VpnAuthenticationType
Liste des protocoles de tunneling du client VPN P2S.
Type: | String[] |
Accepted values: | Certificate, Radius, AAD |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-VpnClientIpsecPolicy
Liste des stratégies IPSec pour VpnServerConfiguration.
Type: | PSIpsecPolicy[] |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | True |
Accept wildcard characters: | False |
-VpnClientRevokedCertificateFilesList
Liste des chemins d’accès des fichiers VpnClientCertificates à révoquer
Type: | String[] |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-VpnClientRootCertificateFilesList
Liste des chemins d’accès vpnClientRootCertificates à ajouter
Type: | String[] |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-VpnProtocol
Liste des protocoles de tunneling du client VPN P2S.
Type: | String[] |
Accepted values: | IkeV2, OpenVPN |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-WhatIf
Montre ce qui se passe en cas d’exécution de l’applet de commande. L’applet de commande n’est pas exécutée.
Type: | SwitchParameter |
Aliases: | wi |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
Entrées
Sorties
Commentaires
https://aka.ms/ContentUserFeedback.
Bientôt disponible : Tout au long de 2024, nous allons supprimer progressivement GitHub Issues comme mécanisme de commentaires pour le contenu et le remplacer par un nouveau système de commentaires. Pour plus d’informations, consultezEnvoyer et afficher des commentaires pour