- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
In this video, we provide information about IPSec Crypto Profile Authentication and why you should use SHA256 or a higher authentication.
Select the desired authentication algorithms and change the order as needed. The order in which algorithms are added is the order in which the firewall applies them. The IPSec Crypto Profile Authentication best practice check ensures SHA256 or a higher authentication is being used in the IPSec Crypto Profile. Keep in mind that MD5 and SHA1 are not secure.
For more information on IPSec Crypto Profile Authentication, please review the following articles: