IPSec Crypto Profile Encryption BPA Checks


Changes to the LIVEcommunity experience are coming soon... Here's what you need to know.

Printer Friendly Page
Retired Member
Did you find this article helpful? Yes No
No ratings

IPSec Crypto - Profile Encryption - Interpreting BPA Checks - Network


This video covers information about IPSec Crypto Profile Encryption. We explain why DES and 3DES are weak, vulnerable encryption algorithms, and we cover why you should be using AES algorithm instead.


Select desired algorithms and change the order as needed. The order in which algorithms are added is the order in which the firewall applies them. The IPSec Crypto Profile Encryption best practice check ensures that AES algorithm is being used in the IPSec Crypto Profile.


For more information about IPSec Crypto Profile Encryption, please review the following articles:

Network > Network Profiles > IPSec Crypto (TechDocs - PAN-OS® Web Interface Reference Guide)


For additional resources regarding BPA, visit our LIVEcommunity BPA tool page.
View videos regarding BPA Network best practice checks.
View videos regarding BPA Policies best practice checks.
View videos regarding BPA Objects best practice checks.
View videos regarding BPA Devices best practice checks.
You may also view other BPA video playlist on the LIVEcommunity YouTube channel.
Register or Sign-in
Version history
Last update:
‎07-08-2020 02:21 PM
Updated by: