New-AzIpsecPolicy

IPSec 정책을 만듭니다.

Syntax

New-AzIpsecPolicy
   [-SALifeTimeSeconds <Int32>]
   [-SADataSizeKilobytes <Int32>]
   -IpsecEncryption <String>
   -IpsecIntegrity <String>
   -IkeEncryption <String>
   -IkeIntegrity <String>
   -DhGroup <String>
   -PfsGroup <String>
   [-DefaultProfile <IAzureContextContainer>]
   [<CommonParameters>]

Description

New-AzIpsecPolicy cmdlet은 가상 네트워크 게이트웨이 연결에 사용할 IPSec 정책 제안을 만듭니다.

예제

예 1

$ipsecPolicy = New-AzIpsecPolicy -SALifeTimeSeconds 1000 -SADataSizeKilobytes 2000 -IpsecEncryption "GCMAES256" -IpsecIntegrity "GCMAES256" -IkeEncryption "AES256" -IkeIntegrity "SHA256" -DhGroup "DHGroup14" -PfsGroup "PFS2048"
New-AzVirtualNetworkGatewayConnection -ResourceGroupName $rgname -name $vnetConnectionName -location $location -VirtualNetworkGateway1 $vnetGateway -LocalNetworkGateway2 $localnetGateway -ConnectionType IPsec -RoutingWeight 3 -SharedKey $sharedKey -UsePolicyBasedTrafficSelectors $true -IpsecPolicies $ipsecPolicy

새 가상 네트워크 게이트웨이 연결에 사용할 IPSec 정책 만들기

매개 변수

-DefaultProfile

Azure와의 통신에 사용되는 자격 증명, 계정, 테넌트 및 구독입니다.

Type:IAzureContextContainer
Aliases:AzContext, AzureRmContext, AzureCredential
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-DhGroup

초기 SA에 대해 IKE 1단계에서 사용되는 DH 그룹

Type:String
Accepted values:None, DHGroup1, DHGroup14, DHGroup2, DHGroup2048, DHGroup24, ECP256, ECP384
Position:Named
Default value:None
Required:True
Accept pipeline input:False
Accept wildcard characters:False

-IkeEncryption

IKE 암호화 알고리즘(IKE 1단계)

Type:String
Accepted values:DES, DES3, AES128, AES192, AES256
Position:Named
Default value:None
Required:True
Accept pipeline input:False
Accept wildcard characters:False

-IkeIntegrity

IKE 무결성 알고리즘(IKE 1단계)

Type:String
Accepted values:MD5, SHA1, SHA256, SHA384
Position:Named
Default value:None
Required:True
Accept pipeline input:False
Accept wildcard characters:False

-IpsecEncryption

IPSec 암호화 알고리즘(IKE 2단계)

Type:String
Accepted values:None, DES, DES3, AES128, AES192, AES256, GCMAES128, GCMAES192, GCMAES256
Position:Named
Default value:None
Required:True
Accept pipeline input:False
Accept wildcard characters:False

-IpsecIntegrity

IPSec 무결성 알고리즘(IKE 2단계)

Type:String
Accepted values:MD5, SHA1, SHA256, GCMAES128, GCMAES192, GCMAES256
Position:Named
Default value:None
Required:True
Accept pipeline input:False
Accept wildcard characters:False

-PfsGroup

새 자식 SA에 대해 IKE 2단계에서 사용되는 DH 그룹

Type:String
Accepted values:None, PFS1, PFS2, PFS2048, PFS24, ECP256, ECP384
Position:Named
Default value:None
Required:True
Accept pipeline input:False
Accept wildcard characters:False

-SADataSizeKilobytes

IPSec 보안 연결(빠른 모드 또는 2단계 SA라고도 함) 페이로드 크기(KB)

Type:Int32
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

-SALifeTimeSeconds

IPSec 보안 연결(빠른 모드 또는 2단계 SA라고도 함) 수명(초)

Type:Int32
Position:Named
Default value:None
Required:False
Accept pipeline input:False
Accept wildcard characters:False

입력

None

출력

PSIpsecPolicy