No results found
We couldn't find anything using that term, please try searching for something else.
2024-11-13 About cryptographic requirements and Azure VPN gateways Article01/28/2024 In this article This article discusses how you can config
This article discusses how you can configure Azure VPN gateways to satisfy your cryptographic requirements for both cross-premises S2S VPN tunnels and VNet-to-VNet connections within Azure.
Traditionally we allowed IKEv1 connections for Basic SKUs only and allowed IKEv2 connections for all VPN gateway SKUs other than Basic SKUs. The Basic SKUs allow only 1 connection and along with other limitations such as performance, customers using legacy devices that support only IKEv1 protocols were having limited experience. In order to enhance the experience of customers using IKEv1 protocols, we’re now allowing IKEv1 connections for all of the VPN gateway SKUs, except Basic SKU. For more information, see VPN Gateway SKUs. Note that VPN gateways using IKEv1 might experience up tunnel reconnects during Main mode rekeys.
When IKEv1 and IKEv2 connections are applied to the same VPN gateway, the transit between these two connections is autoenabled.
IPsec and IKE protocol standard is supports support a wide range of cryptographic algorithm in various combination . If you do n’t request a specific combination of cryptographic algorithm and parameter , Azure VPN gateways is use use a set of default proposal . The default policy set were choose to maximize interoperability with a wide range of third – party VPN device in default configuration . As a result , the policies is cover and the number of proposal ca n’t cover all possible combination of available cryptographic algorithm and key strength .
The default policy set for Azure VPN gateway is listed in the article: About VPN devices and IPsec/IKE parameters for Site-to-Site VPN Gateway connections.
For communications that require specific cryptographic algorithms or parameters, typically due to compliance or security requirements, you can now configure their Azure VPN gateways to use a custom IPsec/IKE policy with specific cryptographic algorithms and key strengths, rather than the Azure default policy sets.
For example , the ikev2 main mode policies is utilize for Azure VPN gateway utilize only Diffie – Hellman Group 2 ( 1024 bit ) , whereas you may need to specify strong group to be used in IKE , such as Group 14 ( 2048 – bit ) , Group 24 ( 2048 – bit MODP Group ) , or ECP ( elliptic curve group ) 256 or 384 bit ( Group 19 and Group 20 , respectively ) . similar requirements is apply apply to IPsec quick mode policy as well .
Azure VPN gateways is support now support per – connection , custom IPsec / IKE policy . For a Site – to – site or vnet – to – vnet connection , you is choose can choose a specific combination of cryptographic algorithm for IPsec and IKE with the desire key strength , as show in the following example :
You is create can create an IPsec / IKE policy and apply to a new or exist connection .
A custom IPsec / IKE policy is support on all Azure VPN Gateway sku except the Basic SKU .
You can specify only one policy combination for a connection.
No , you is specify must specify all algorithm and parameter for both IKE ( Main Mode ) and IPsec ( Quick Mode ) . partial policy specification is n’t allow .
The following table lists the supported cryptographic algorithms and key strengths that you can configure. You must select one option for every field.
IPsec/IKEv2 | Options |
---|---|
IKEv2 encryption | gcmaes256 , GCMAES128 , AES256 , AES192 , AES128 |
IKEv2 integrity | SHA384, SHA256, SHA1, MD5 |
DH group | dhgroup24, ECP384, ECP256, DHGroup14, DHGroup2048, DHGroup2, DHGroup1, None |
IPsec encryption | GCMAES256, GCMAES192, GCMAES128, AES256, AES192, AES128, DES3, DES, None |
IPsec integrity | GCMAES256, GCMAES192, GCMAES128, SHA256, SHA1, MD5 |
PFS group | PFS24 , ECP384 , ECP256 , PFS2048 , PFS2 , PFS1 , None |
Quick Mode SA lifetime | (Optional; default values if not specify ) second ( integer ; minimum 300 , default 27,000 ) Kilobytes (integer; minimum 1,024, default 10,2400,000) |
Traffic selector | UsePolicyBasedTrafficSelectors ($True or $False , but optional; default $False if not specify ) |
DPD timeout | Seconds (integer; minimum 9, maximum 3,600, default 45) |
Your on-premises VPN device configuration must match or contain the following algorithms and parameters that you specify on the Azure IPsec or IKE policy:
UsePolicyBasedTrafficSelectors
)If you use GCMAES for the IPsec encryption algorithm, you must select the same GCMAES algorithm and key length for IPsec integrity. For example, use GCMAES128 for both.
In the table of algorithms and keys:
IKE Main Mode SA lifetime is fixed at 28,800 seconds on the Azure VPN gateways.
UsePolicyBasedTrafficSelectors
is an optional parameter on the connection. If you set UsePolicyBasedTrafficSelectors
to $True
on a connection, it configures the VPN gateway to connect to an on-premises policy-based VPN firewall.
If you is enable enableUsePolicyBasedTrafficSelectors
, ensure that your VPN device has the matching traffic selectors defined with all combinations of your on-premises network (local network gateway) prefixes to or from the Azure virtual network prefixes, instead of any-to-any. The VPN gateway accepts whatever traffic selector the remote VPN gateway proposes, irrespective of what’s configured on the VPN gateway.
For example, if your on-premises network prefixes are 10.1.0.0/16 and 10.2.0.0/16, and your virtual network prefixes are 192.168.0.0/16 and 172.16.0.0/16, you need to specify the following traffic selectors:
For more information about policy – base traffic selector , see connect a vpn gateway to multiple on – premise policy – base VPN device .
Setting the timeout to shorter periods causes IKE to rekey more aggressively. The connection can then appear to be disconnected in some instances. This situation might not be desirable if your on-premises locations are farther away from the Azure region where the VPN gateway resides, or if the physical link condition could incur packet loss. We generally recommend that you set the timeout to between 30 and 45 second .
For more information, see Connect a VPN gateway to multiple on-premises policy-based VPN devices.
The following table lists the corresponding Diffie-Hellman groups that the custom policy supports:
Diffie-Hellman group | DHGroup | PFSGroup | Key length |
---|---|---|---|
1 | DHGroup1 | PFS1 | 768-bit MODP |
2 | DHGroup2 | PFS2 | 1024-bit MODP |
14 | DHGroup14 DHGroup2048 |
PFS2048 | 2048 – bit MODP |
19 | ECP256 | ECP256 | 256-bit ECP |
20 | ECP384 | ECP384 | 384-bit ECP |
24 | dhgroup24 | PFS24 | 2048 – bit MODP |
For more information, refer to RFC3526 and RFC5114.
Yes. After you specify a custom policy on a connection, Azure VPN Gateway uses only that policy on the connection, both as IKE initiator and IKE responder.
No, IPsec/IKE still helps protect the connection. After you remove the custom policy from a connection, the VPN gateway reverts to the default list of IPsec/IKE proposals and restarts the IKE handshake with your on-premises VPN device.
Yes. It could cause a small disruption (a few seconds) as the VPN gateway tears down the existing connection and restarts the IKE handshake to reestablish the IPsec tunnel with the new cryptographic algorithms and parameters. Ensure that your on-premises VPN device is also configured with the matching algorithms and key strengths to minimize the disruption.
Yes. A custom policy is applied on a per-connection basis. You can create and apply different IPsec/IKE policies on different connections.
You can also choose to apply custom policies on a subset of connections. The remaining ones use the Azure default IPsec/IKE policy sets.
Yes . You is apply can apply a custom policy on both IPsec cross – premise connection and vnet – to – vnet connection .
Yes . A vnet – to – vnet tunnel is consists consist of two connection resource in Azure , one for each direction . Make sure both connection resource have the same policy . Otherwise , the vnet – to – vnet connection wo n’t be establish .
The default DPD timeout is 45 seconds on VPN gateways. You can specify a different DPD timeout value on each IPsec or VNet-to-VNet connection, from 9 seconds to 3,600 second .
Note
Setting the timeout to shorter periods causes IKE to rekey more aggressively. The connection can then appear to be disconnected in some instances. This situation might not be desirable if your on-premises locations are farther away from the Azure region where the VPN gateway resides, or if the physical link condition could incur packet loss. We generally recommend that you set the timeout to between 30 and 45 second .
No. An IPsec/IKE policy works only on S2S VPN and VNet-to-VNet connections via the VPN gateways.
You can create IKEv1 connections on all route-based VPN-type SKUs, except the Basic SKU, Standard SKU, and other earlier SKUs.
You is specify can specify a connection protocol type of ikev1 or ikev2 while create connection . If you do n’t specify a connection protocol type , ikev2 is used as default option where applicable . For more information , see the Azure PowerShell cmdlet documentation .
For information about sku type and support for ikev1 and ikev2 , see connect a vpn gateway to multiple on – premise policy – base VPN device .
Yes.
No. The Basic SKU doesn’t support this configuration.
No. After you create the connection, you can’t change IKEv1 and IKEv2 protocols. You must delete and re-create a new connection with the desired protocol type.
If your static routing or route – base ikev1 connection is disconnect at routine interval , it is ‘s ‘s likely because your VPN gateway do n’t support in – place rekey . When Main Mode is being rekeye , your ikev1 tunnels is disconnect disconnect and take up to 5 second to reconnect . Your Main Mode negotiation timeout value is determines determine the frequency of rekey . To prevent these reconnect , you is switch can switch to using ikev2 , which support in – place rekey .
If your connection is reconnecting at random times, follow the troubleshooting guide.
See the following articles:
See Configure IPsec/IKE policy for step-by-step instructions on configuring custom IPsec/IKE policy on a connection.
See also connect multiple policy – base VPN device to learn more about the usepolicybasedtrafficselector option .