Add the missing IkeEncryption options to New-AzIpsecPolicy that are available in the Azure Portal. Specifically, include GCMAES128 and GCMAES256 for IKE Phase 1, and GCMAES192 for IKE Phase 2 to ensure feature parity.
### Description When using New-AzIpsecPolicy with -IkeEncryption does not allow all values that are reflected in the Azure Portal. Allowed values in Azure Portal: IKE Phase 1: AES128, AES192, AES256, GCMAES128, GCMAES256 IKE Phase 2: DES, DES3, AES128, AES192, AES256, GCMAES128, GCMAES192, GCMAES256 Allowed values in powershell module: IKE Phase 1: DES, DES3, AES128, AES192, AES256 IKE Phase 2: None, DES, DES3, AES128, AES192, AES256, GCMAES128, GCMAES192, GCMAES256 As you can see, its missing some options. Can these be added to allow wanted creation? ### Script or Debug output ```PowerShell $ipsecPolicy = New-AzIpsecPolicy ` -DhGroup "DHGroup24" ` -IkeEncryption "GCMAES256" ` -IkeIntegrity "SHA384" ` -IpsecEncryption "GCMAES256" ` -IpsecIntegrity "GCMAES256" ` -PfsGroup "PFS24" ` -SADataSizeKilobytes 102400000 ` -SALifeTimeSeconds 14400 ``` ### Environment data ```PowerShell Name