IPSec Crypto Profile Encryption BPA Checks

Printer Friendly Page

IPSec Crypto - Profile Encryption - Interpreting BPA Checks - Network

 

This video covers information about IPSec Crypto Profile Encryption. We explain why DES and 3DES are weak, vulnerable encryption algorithms, and we cover why you should be using AES algorithm instead.

 

Select desired algorithms and change the order as needed. The order in which algorithms are added is the order in which the firewall applies them. The IPSec Crypto Profile Encryption best practice check ensures that AES algorithm is being used in the IPSec Crypto Profile.

 

For more information about IPSec Crypto Profile Encryption, please review the following articles:

Network > Network Profiles > IPSec Crypto (TechDocs - PAN-OS® Web Interface Reference Guide)

 

For additional resources regarding BPA, visit our LIVEcommunity BPA tool page.
View videos regarding BPA Network best practice checks.
View videos regarding BPA Policies best practice checks.
View videos regarding BPA Objects best practice checks.
View videos regarding BPA Devices best practice checks.
You may also view other BPA video playlist on the LIVEcommunity YouTube channel.