Skip to content

Commit 10a5e2b

Browse files
Merge pull request #231639 from aybatra/adding-note-ipsec-params
Adding note for custom policies
2 parents 54e3569 + c878c1a commit 10a5e2b

File tree

2 files changed

+10
-0
lines changed

2 files changed

+10
-0
lines changed

articles/vpn-gateway/ipsec-ike-policy-howto.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -36,6 +36,11 @@ The following table lists the supported configurable cryptographic algorithms an
3636

3737
[!INCLUDE [Important requirements table](../../includes/vpn-gateway-ipsec-ike-requirements-include.md)]
3838

39+
> [!NOTE]
40+
> IKEv2 Integrity is used for both Integrity and PRF(pseudo-random function). 
41+
> If IKEv2 Encryption algorithm specified is GCM*, the value passed in IKEv2 Integrity is used for PRF only and implicitly we set IKEv2 Integrity to GCM*. In all other cases, the value passed in IKEv2 Integrity is used for both IKEv2 Integrity and PRF.
42+
>
43+
3944
### Diffie-Hellman groups
4045

4146
The following table lists the corresponding Diffie-Hellman groups supported by the custom policy:

articles/vpn-gateway/vpn-gateway-ipsecikepolicy-rm-powershell.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -38,6 +38,11 @@ The following table lists the supported configurable cryptographic algorithms an
3838

3939
[!INCLUDE [Important requirements table](../../includes/vpn-gateway-ipsec-ike-requirements-include.md)]
4040

41+
> [!NOTE]
42+
> IKEv2 Integrity is used for both Integrity and PRF(pseudo-random function).
43+
> If IKEv2 Encryption algorithm specified is GCM*, the value passed in IKEv2 Integrity is used for PRF only and implicitly we set IKEv2 Integrity to GCM*. In all other cases, the value passed in IKEv2 Integrity is used for both IKEv2 Integrity and PRF.
44+
>
45+
4146
#### Diffie-Hellman groups
4247

4348
The following table lists the corresponding Diffie-Hellman groups supported by the custom policy:

0 commit comments

Comments
 (0)