title | description | services | author | ms.service | ms.topic | ms.date | ms.author | ms.custom |
---|---|---|---|---|---|---|---|---|
include file |
include file |
virtual-wan |
cherylmc |
virtual-wan |
include |
10/07/2019 |
cherylmc |
include file |
When working with custom IPsec policies, keep in mind the following requirements:
- IKE - For IKE, you can select any parameter from IKE Encryption, plus any parameter from IKE Integrity, plus any parameter from DH Group.
- IPsec - For IPsec, you can select any parameter from IPsec Encryption, plus any parameter from IPsec Integrity, plus PFS. If any of the parameters for IPsec Encryption or IPsec Integrity is GCM, then the parameters for both settings must be GCM.
Note
With Custom IPsec policies, there is no concept of responder and initiator (unlike Default IPsec policies). Both sides (on-premises and Azure VPN gateway) will use the same settings for IKE Phase 1 and IKE Phase 2. Both IKEv1 and IKEv2 protocols are supported.
Available settings and parameters
Setting | Parameters |
---|---|
IKE Encryption | GCMAES256, GCMAES128, AES256, AES128 |
IKE Integrity | SHA384, SHA256 |
DH Group | ECP384, ECP256, DHGroup24, DHGroup14 |
IPsec Encryption | GCMAES256, GCMAES128, AES256, AES128, None |
IPsec Integrity | GCMAES256, GCMAES128, SHA256 |
PFS Group | ECP384, ECP256, PFS24, PFS14, None |
SA Lifetime | integer; min. 300/ default 3600 seconds |