Skip to content

Commit 332d9c5

Browse files
Merge pull request #251183 from cherylmc/patch-1
update
2 parents 4dfaf6d + ca5e82b commit 332d9c5

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

includes/virtual-wan-ipsec-custom-include.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55
author: cherylmc
66
ms.service: virtual-wan
77
ms.topic: include
8-
ms.date: 05/25/2023
8+
ms.date: 09/12/2023
99
ms.author: cherylmc
1010
ms.custom: include file
1111
---
@@ -15,7 +15,7 @@ When working with custom IPsec policies, keep in mind the following requirements
1515
* **IKE** - For IKE, you can select any parameter from IKE Encryption, plus any parameter from IKE Integrity, plus any parameter from DH Group.
1616
* **IPsec** - For IPsec, you can select any parameter from IPsec Encryption, plus any parameter from IPsec Integrity, plus PFS. If any of the parameters for IPsec Encryption or IPsec Integrity is GCM, then the parameters for both settings must be GCM.
1717

18-
With Custom IPsec policies, there is no concept of responder and initiator (unlike Default IPsec policies). Both sides (on-premises and Azure VPN gateway) will use the same settings for IKE Phase 1 and IKE Phase 2. Both IKEv1 and IKEv2 protocols are supported.
18+
The default custom policy includes SHA1, DHGroup2, and 3DES for backward compatibility. These are weaker algorithms that aren't supported when creating a custom policy. We recommend only using the following algorithms:
1919

2020
**Available settings and parameters**
2121

0 commit comments

Comments
 (0)