- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
Enhanced Security Measures in Place: To ensure a safer experience, we’ve implemented additional, temporary security measures for all users.
on 11-13-2019 03:42 PM - edited on 07-08-2020 02:27 PM by DawgsFan
In this video, we provide information about IPSec Crypto Profile Authentication and why you should use SHA256 or a higher authentication.
Select the desired authentication algorithms and change the order as needed. The order in which algorithms are added is the order in which the firewall applies them. The IPSec Crypto Profile Authentication best practice check ensures SHA256 or a higher authentication is being used in the IPSec Crypto Profile. Keep in mind that MD5 and SHA1 are not secure.
For more information on IPSec Crypto Profile Authentication, please review the following articles:
Network - Network Profiles - IPSec Crypto (TechDocs - PAN-OS® Web Interface Reference Guide)