- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
on 11-12-2019 02:12 PM - edited on 11-23-2022 01:33 PM by mgordon
This video covers information about IPSec Crypto Profile Encryption. We explain why DES and 3DES are weak, vulnerable encryption algorithms, and we cover why you should be using AES algorithm instead.
Select desired algorithms and change the order as needed. The order in which algorithms are added is the order in which the firewall applies them. The IPSec Crypto Profile Encryption best practice check ensures that AES algorithm is being used in the IPSec Crypto Profile.
For more information about IPSec Crypto Profile Encryption, please review the following articles:
Network > Network Profiles > IPSec Crypto (TechDocs - PAN-OS® Web Interface Reference Guide)