IPSec Crypto - Profile Authentication - Interpreting BPA Checks - Network
In this video, provides information about IPSec Crypto Profile Authentication and why you should use SHA256 or a higher authentication.
Select the desired authentication algorithms and change the order as needed. The order in which algorithms are added is the order in which the firewall applies them. The IPSec Crypto Profile Authentication best practice check ensures SHA256 or a higher authentication is being used in the IPSec Crypto Profile. Keep in mind that MD5 and SHA1 are not secure.
For more information on IPSec Crypto Profile Authentication, please review the following articles:
Network - Network Profiles - IPSec Crypto (TechDocs - PAN-OS® Web Interface Reference Guide)
https://docs.paloaltonetworks.com/pan-os/7-1/pan-os-web-interface-help/network/network-network-profiles-ipsec-crypto
Define IPSec Crypto Profiles
https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/vpns/set-up-site-to-site-vpn/define-cryptographic-profiles/define-ipsec-crypto-profiles
Comments
Post a Comment